From: richardbarry Date: Fri, 2 Dec 2011 19:13:33 +0000 (+0000) Subject: Correct the prototype of the function call vApplicationStackOverflowHook(). X-Git-Tag: V7.1.0~12 X-Git-Url: https://git.sur5r.net/?a=commitdiff_plain;h=e37bb9f64fb046ba87675f1d61e8ac85d30fee85;p=freertos Correct the prototype of the function call vApplicationStackOverflowHook(). git-svn-id: https://svn.code.sf.net/p/freertos/code/trunk@1648 1d2547de-c912-0410-9cb9-b8ca96c0e9e2 --- diff --git a/Demo/ARM7_LPC2138_Rowley/main.c b/Demo/ARM7_LPC2138_Rowley/main.c index 12aba286b..fbb047286 100644 --- a/Demo/ARM7_LPC2138_Rowley/main.c +++ b/Demo/ARM7_LPC2138_Rowley/main.c @@ -390,7 +390,7 @@ extern void (vButtonISRWrapper) ( void ); } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* Check pcTaskName for the name of the offending task, or pxCurrentTCB if pcTaskName has itself been corrupted. */ diff --git a/Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c b/Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c index 4ddbf6c3c..36ff6c226 100644 --- a/Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c +++ b/Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c @@ -343,7 +343,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c b/Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c index c05bff8ad..fc1eee654 100644 --- a/Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c +++ b/Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c @@ -568,7 +568,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_A2F200_SoftConsole/main-blinky.c b/Demo/CORTEX_A2F200_SoftConsole/main-blinky.c index 4ddbf6c3c..36ff6c226 100644 --- a/Demo/CORTEX_A2F200_SoftConsole/main-blinky.c +++ b/Demo/CORTEX_A2F200_SoftConsole/main-blinky.c @@ -343,7 +343,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_A2F200_SoftConsole/main-full.c b/Demo/CORTEX_A2F200_SoftConsole/main-full.c index c05bff8ad..fc1eee654 100644 --- a/Demo/CORTEX_A2F200_SoftConsole/main-full.c +++ b/Demo/CORTEX_A2F200_SoftConsole/main-full.c @@ -568,7 +568,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_AT91SAM3U256_IAR/main.c b/Demo/CORTEX_AT91SAM3U256_IAR/main.c index aa7aeb9c2..99df4384c 100644 --- a/Demo/CORTEX_AT91SAM3U256_IAR/main.c +++ b/Demo/CORTEX_AT91SAM3U256_IAR/main.c @@ -151,7 +151,7 @@ static void prvLCDTask( void *pvParameters ); * Hook functions that can get called by the kernel. The 'check' functionality * is implemented within the tick hook. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The tick hook function as described in the comments at the top of this file. @@ -268,7 +268,7 @@ portBASE_TYPE xHigherPriorityTaskWoken = pdFALSE; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pxTask; ( void ) pcTaskName; diff --git a/Demo/CORTEX_CY8C5588_PSoC_Creator_GCC/FreeRTOS_Demo.cydsn/main.c b/Demo/CORTEX_CY8C5588_PSoC_Creator_GCC/FreeRTOS_Demo.cydsn/main.c index f19b5e0bd..19572d798 100644 --- a/Demo/CORTEX_CY8C5588_PSoC_Creator_GCC/FreeRTOS_Demo.cydsn/main.c +++ b/Demo/CORTEX_CY8C5588_PSoC_Creator_GCC/FreeRTOS_Demo.cydsn/main.c @@ -313,7 +313,7 @@ extern unsigned portSHORT usMaxJitter; } /*---------------------------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* The stack space has been execeeded for a task, considering allocating more. */ taskDISABLE_INTERRUPTS(); diff --git a/Demo/CORTEX_CY8C5588_PSoC_Creator_Keil/FreeRTOS_Demo.cydsn/main.c b/Demo/CORTEX_CY8C5588_PSoC_Creator_Keil/FreeRTOS_Demo.cydsn/main.c index f19b5e0bd..19572d798 100644 --- a/Demo/CORTEX_CY8C5588_PSoC_Creator_Keil/FreeRTOS_Demo.cydsn/main.c +++ b/Demo/CORTEX_CY8C5588_PSoC_Creator_Keil/FreeRTOS_Demo.cydsn/main.c @@ -313,7 +313,7 @@ extern unsigned portSHORT usMaxJitter; } /*---------------------------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* The stack space has been execeeded for a task, considering allocating more. */ taskDISABLE_INTERRUPTS(); diff --git a/Demo/CORTEX_CY8C5588_PSoC_Creator_RVDS/FreeRTOS_Demo.cydsn/main.c b/Demo/CORTEX_CY8C5588_PSoC_Creator_RVDS/FreeRTOS_Demo.cydsn/main.c index f19b5e0bd..19572d798 100644 --- a/Demo/CORTEX_CY8C5588_PSoC_Creator_RVDS/FreeRTOS_Demo.cydsn/main.c +++ b/Demo/CORTEX_CY8C5588_PSoC_Creator_RVDS/FreeRTOS_Demo.cydsn/main.c @@ -313,7 +313,7 @@ extern unsigned portSHORT usMaxJitter; } /*---------------------------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* The stack space has been execeeded for a task, considering allocating more. */ taskDISABLE_INTERRUPTS(); diff --git a/Demo/CORTEX_EFMG890F128_IAR/main.c b/Demo/CORTEX_EFMG890F128_IAR/main.c index 0a8ea29b0..8c9723f1b 100644 --- a/Demo/CORTEX_EFMG890F128_IAR/main.c +++ b/Demo/CORTEX_EFMG890F128_IAR/main.c @@ -182,7 +182,7 @@ void vApplicationIdleHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will be called if a task overflows its stack, if configCHECK_FOR_STACK_OVERFLOW != 0. It might be that the function diff --git a/Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c b/Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c index 19cfa685b..a8b60fa3e 100644 --- a/Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c +++ b/Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c @@ -524,7 +524,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c b/Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c index 80ad2c10b..6625c7385 100644 --- a/Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c +++ b/Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c @@ -328,7 +328,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_LM3Sxxxx_Rowley/main.c b/Demo/CORTEX_LM3Sxxxx_Rowley/main.c index 2abd3439f..af9909a30 100644 --- a/Demo/CORTEX_LM3Sxxxx_Rowley/main.c +++ b/Demo/CORTEX_LM3Sxxxx_Rowley/main.c @@ -439,7 +439,7 @@ void ( *vOLEDClear )( void ) = NULL; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c b/Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c index 1847d8a9c..81bb85e4f 100644 --- a/Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c +++ b/Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c @@ -355,7 +355,7 @@ void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_LPC1768_GCC_Rowley/main.c b/Demo/CORTEX_LPC1768_GCC_Rowley/main.c index 17509511a..418bc5cb6 100644 --- a/Demo/CORTEX_LPC1768_GCC_Rowley/main.c +++ b/Demo/CORTEX_LPC1768_GCC_Rowley/main.c @@ -255,7 +255,7 @@ void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_LPC1768_IAR/main.c b/Demo/CORTEX_LPC1768_IAR/main.c index ba2b2cc47..889fd18eb 100644 --- a/Demo/CORTEX_LPC1768_IAR/main.c +++ b/Demo/CORTEX_LPC1768_IAR/main.c @@ -360,7 +360,7 @@ void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_MB9A310_IAR_Keil/main-full.c b/Demo/CORTEX_MB9A310_IAR_Keil/main-full.c index 6fb95d67c..4bbdb0637 100644 --- a/Demo/CORTEX_MB9A310_IAR_Keil/main-full.c +++ b/Demo/CORTEX_MB9A310_IAR_Keil/main-full.c @@ -626,7 +626,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c b/Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c index e5583e67d..1f7882e1e 100644 --- a/Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c +++ b/Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c @@ -348,7 +348,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_MB9B500_IAR_Keil/main-full.c b/Demo/CORTEX_MB9B500_IAR_Keil/main-full.c index 50626184e..b10a2feee 100644 --- a/Demo/CORTEX_MB9B500_IAR_Keil/main-full.c +++ b/Demo/CORTEX_MB9B500_IAR_Keil/main-full.c @@ -610,7 +610,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c b/Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c index 21cef4621..8a0cef314 100644 --- a/Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c +++ b/Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c @@ -350,7 +350,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c b/Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c index 316f6e612..d3f81ac90 100644 --- a/Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c +++ b/Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c @@ -879,7 +879,7 @@ portBASE_TYPE xDummy; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* If configCHECK_FOR_STACK_OVERFLOW is set to either 1 or 2 then this function will automatically get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c b/Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c index c56612a82..c3b67cb5f 100644 --- a/Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c +++ b/Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c @@ -970,7 +970,7 @@ portBASE_TYPE xDummy; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* If configCHECK_FOR_STACK_OVERFLOW is set to either 1 or 2 then this function will automatically get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c b/Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c index 1951e0ea0..56ee76acb 100644 --- a/Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c +++ b/Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c @@ -311,7 +311,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_STM32F103_GCC_Rowley/main.c b/Demo/CORTEX_STM32F103_GCC_Rowley/main.c index a6aae5701..6138579ac 100644 --- a/Demo/CORTEX_STM32F103_GCC_Rowley/main.c +++ b/Demo/CORTEX_STM32F103_GCC_Rowley/main.c @@ -339,7 +339,7 @@ static void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. If the parameters are corrupt then inspect pxCurrentTCB to find which was the diff --git a/Demo/CORTEX_STM32F107_GCC_Rowley/main.c b/Demo/CORTEX_STM32F107_GCC_Rowley/main.c index 1366703cb..4381f5687 100644 --- a/Demo/CORTEX_STM32F107_GCC_Rowley/main.c +++ b/Demo/CORTEX_STM32F107_GCC_Rowley/main.c @@ -335,7 +335,7 @@ static void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. If the parameters are corrupt then inspect pxCurrentTCB to find which was the diff --git a/Demo/CORTEX_STM32L152_IAR/main.c b/Demo/CORTEX_STM32L152_IAR/main.c index c8fe32ba1..a5973fed8 100644 --- a/Demo/CORTEX_STM32L152_IAR/main.c +++ b/Demo/CORTEX_STM32L152_IAR/main.c @@ -566,7 +566,7 @@ void TIM6_IRQHandler( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTUS_APS3_GCC/Demo/main.c b/Demo/CORTUS_APS3_GCC/Demo/main.c index 4e0813824..9f9c53d5f 100644 --- a/Demo/CORTUS_APS3_GCC/Demo/main.c +++ b/Demo/CORTUS_APS3_GCC/Demo/main.c @@ -264,7 +264,7 @@ long lReturn = pdPASS; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will be called if a task overflows its stack. Inspect pxCurrentTCB to find the offending task if the overflow was sever enough diff --git a/Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c b/Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c index 2ef90e9bf..b42cbfef7 100644 --- a/Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c +++ b/Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c @@ -287,7 +287,7 @@ static void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This will get called if a stack overflow is detected during the context switch. Set configCHECK_FOR_STACK_OVERFLOWS to 2 to also check for stack diff --git a/Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c b/Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c index b10eae05e..7e7ffa80c 100644 --- a/Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c +++ b/Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c @@ -658,7 +658,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pxTask; ( void ) pcTaskName; diff --git a/Demo/MSP430X_MSP430F5438_IAR/main.c b/Demo/MSP430X_MSP430F5438_IAR/main.c index ff5b136c5..fbe12d8d8 100644 --- a/Demo/MSP430X_MSP430F5438_IAR/main.c +++ b/Demo/MSP430X_MSP430F5438_IAR/main.c @@ -618,7 +618,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pxTask; ( void ) pcTaskName; diff --git a/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-blinky.c b/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-blinky.c index e43866cb1..cc8c1aa01 100644 --- a/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-blinky.c +++ b/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-blinky.c @@ -398,7 +398,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-full.c b/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-full.c index bb99fc4c5..7d3356187 100644 --- a/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-full.c +++ b/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-full.c @@ -241,6 +241,9 @@ int main( void ) /* Configure the interrupt controller, LED outputs and button inputs. */ prvSetupHardware(); + xil_printf( "Hello world2. %s %u\r\n", "string", 100 ); + printf( "Hello world2. %s %u\r\n", "string", 100 ); + /* This call creates the TCP/IP thread. */ tcpip_init( lwIPAppsInit, NULL ); @@ -258,7 +261,7 @@ int main( void ) vStartLEDFlashTasks( mainFLASH_TASK_PRIORITY ); vStartQueuePeekTasks(); vStartRecursiveMutexTasks(); - vStartComTestStringsTasks( mainCOM_TEST_PRIORITY, mainCOM_TEST_BAUD_RATE, mainCOM_TEST_LED ); +// vStartComTestStringsTasks( mainCOM_TEST_PRIORITY, mainCOM_TEST_BAUD_RATE, mainCOM_TEST_LED ); vStartDynamicPriorityTasks(); vStartTimerDemoTask( mainTIMER_TEST_PERIOD ); @@ -499,7 +502,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; @@ -616,7 +619,7 @@ unsigned long ulTimerCounts1, ulTimerCounts2, ulTickCount, ulReturn; /* How many times has it overflowed? */ ulTickCount = xTaskGetTickCountFromISR(); - + /* If this is being called from a yield, has the counter overflowed since it was read? If that is the case then ulTickCounts will need incrementing again as it will not yet have been incremented from the tick interrupt. */ diff --git a/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-blinky.c b/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-blinky.c index e43866cb1..cc8c1aa01 100644 --- a/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-blinky.c +++ b/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-blinky.c @@ -398,7 +398,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-full.c b/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-full.c index bb99fc4c5..1b7261106 100644 --- a/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-full.c +++ b/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-full.c @@ -499,7 +499,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/RL78_RL78G13_Promo_Board_IAR/main.c b/Demo/RL78_RL78G13_Promo_Board_IAR/main.c index 3b733fc87..708ee9465 100644 --- a/Demo/RL78_RL78G13_Promo_Board_IAR/main.c +++ b/Demo/RL78_RL78G13_Promo_Board_IAR/main.c @@ -411,7 +411,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c b/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c index 7dab184a6..391d90582 100644 --- a/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c +++ b/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c @@ -218,7 +218,7 @@ void vApplicationMallocFailedHook( void ) FreeRTOSConfig.h, then this function will be called if a task overflows its stack space. See http://www.freertos.org/Stacks-and-stack-overflow-checking.html. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c b/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c index e384e1e19..ac6d7c28e 100644 --- a/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c +++ b/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c @@ -210,7 +210,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -425,7 +425,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c b/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c index a94d7a5f0..3c6d1f088 100644 --- a/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c b/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c index 1925315a6..41e54f78a 100644 --- a/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c +++ b/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c @@ -207,7 +207,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -436,7 +436,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_IAR/main-blinky.c b/Demo/RX600_RX62N-RDK_IAR/main-blinky.c index fc45cf1da..7edb83e12 100644 --- a/Demo/RX600_RX62N-RDK_IAR/main-blinky.c +++ b/Demo/RX600_RX62N-RDK_IAR/main-blinky.c @@ -207,7 +207,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_IAR/main-full.c b/Demo/RX600_RX62N-RDK_IAR/main-full.c index f1d054dc8..805247598 100644 --- a/Demo/RX600_RX62N-RDK_IAR/main-full.c +++ b/Demo/RX600_RX62N-RDK_IAR/main-full.c @@ -217,7 +217,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -466,7 +466,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c b/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c index 15d26d343..0a41a8a9a 100644 --- a/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c b/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c index 1daac2f9e..c6fbe6c62 100644 --- a/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c +++ b/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c @@ -206,7 +206,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -439,7 +439,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c b/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c index a94d7a5f0..3c6d1f088 100644 --- a/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c b/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c index 1925315a6..41e54f78a 100644 --- a/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c +++ b/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c @@ -207,7 +207,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -436,7 +436,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_IAR/main-blinky.c b/Demo/RX600_RX62N-RSK_IAR/main-blinky.c index 0089d9296..65e7ffdc9 100644 --- a/Demo/RX600_RX62N-RSK_IAR/main-blinky.c +++ b/Demo/RX600_RX62N-RSK_IAR/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_IAR/main-full.c b/Demo/RX600_RX62N-RSK_IAR/main-full.c index 440276c66..4c6047538 100644 --- a/Demo/RX600_RX62N-RSK_IAR/main-full.c +++ b/Demo/RX600_RX62N-RSK_IAR/main-full.c @@ -217,7 +217,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -466,7 +466,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c b/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c index 15d26d343..0a41a8a9a 100644 --- a/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c b/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c index 07e9c9514..1c493f15c 100644 --- a/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c +++ b/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c @@ -206,7 +206,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -439,7 +439,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c b/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c index a63ebd622..91594c98d 100644 --- a/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c @@ -217,7 +217,7 @@ void vApplicationMallocFailedHook( void ) FreeRTOSConfig.h, then this function will be called if a task overflows its stack space. See http://www.freertos.org/Stacks-and-stack-overflow-checking.html. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c b/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c index b7ac879fd..676c8f755 100644 --- a/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c +++ b/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c @@ -200,7 +200,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -420,7 +420,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c b/Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c index 83be907f6..1baf45d38 100644 --- a/Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c +++ b/Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c @@ -401,7 +401,7 @@ void vApplicationIdleHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* Just to remove compiler warnings. This function will only actually get called if configCHECK_FOR_STACK_OVERFLOW is set to a non zero value.