* the stack limit. Setting configCHECK_FOR_STACK_OVERFLOW to greater than 1\r
* will also cause the last few stack bytes to be checked to ensure the value\r
* to which the bytes were set when the task was created have not been \r
- * overwritten. Note this second test does not guarantee that an overflown\r
+ * overwritten. Note this second test does not guarantee that an overflowed\r
* stack will always be recognised.\r
*/\r
\r
/* Is the currently saved stack pointer within the stack limit? */ \\r
if( pxCurrentTCB->pxTopOfStack <= pxCurrentTCB->pxStack ) \\r
{ \\r
- vApplicationStackOverflowHook( pxCurrentTCB, pxCurrentTCB->pcTaskName ); \\r
+ vApplicationStackOverflowHook( ( xTaskHandle ) pxCurrentTCB, pxCurrentTCB->pcTaskName ); \\r
} \\r
}\r
\r
/* Is the currently saved stack pointer within the stack limit? */ \\r
if( pxCurrentTCB->pxTopOfStack <= pxCurrentTCB->pxStack ) \\r
{ \\r
- vApplicationStackOverflowHook( pxCurrentTCB, pxCurrentTCB->pcTaskName ); \\r
+ vApplicationStackOverflowHook( ( xTaskHandle ) pxCurrentTCB, pxCurrentTCB->pcTaskName ); \\r
} \\r
\\r
/* Has the extremity of the task stack ever been written over? */ \\r
- if( memcmp( pxCurrentTCB->pxStack, ucExpectedStackBytes, sizeof( ucExpectedStackBytes ) ) != 0 ) \\r
+ if( memcmp( ( void * ) pxCurrentTCB->pxStack, ( void * ) ucExpectedStackBytes, sizeof( ucExpectedStackBytes ) ) != 0 ) \\r
{ \\r
- vApplicationStackOverflowHook( pxCurrentTCB, pxCurrentTCB->pcTaskName ); \\r
+ vApplicationStackOverflowHook( ( xTaskHandle ) pxCurrentTCB, pxCurrentTCB->pcTaskName ); \\r
} \\r
}\r
\r
#endif /* #if( configCHECK_FOR_STACK_OVERFLOW > 1 ) */\r
+\r
/*-----------------------------------------------------------*/\r
\r
/*\r
\r
unsigned portBASE_TYPE uxTaskGetStackHighWaterMark( void )\r
{\r
- return usTaskCheckFreeStackSpace( pxCurrentTCB->pxStack );\r
+ return usTaskCheckFreeStackSpace( ( unsigned portCHAR * ) pxCurrentTCB->pxStack );\r
}\r
\r
#endif\r