From 93e72e50362f38002e3f52c2d3893868aeb8f293 Mon Sep 17 00:00:00 2001 From: Richard Barry Date: Fri, 2 Dec 2011 19:13:33 +0000 Subject: [PATCH] Correct the prototype of the function call vApplicationStackOverflowHook(). --- Demo/ARM7_LPC2138_Rowley/main.c | 2 +- Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c | 2 +- Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c | 2 +- Demo/CORTEX_A2F200_SoftConsole/main-blinky.c | 2 +- Demo/CORTEX_A2F200_SoftConsole/main-full.c | 2 +- Demo/CORTEX_AT91SAM3U256_IAR/main.c | 4 ++-- .../FreeRTOS_Demo.cydsn/main.c | 2 +- .../FreeRTOS_Demo.cydsn/main.c | 2 +- .../FreeRTOS_Demo.cydsn/main.c | 2 +- Demo/CORTEX_EFMG890F128_IAR/main.c | 2 +- Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c | 2 +- Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c | 2 +- Demo/CORTEX_LM3Sxxxx_Rowley/main.c | 2 +- Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c | 2 +- Demo/CORTEX_LPC1768_GCC_Rowley/main.c | 2 +- Demo/CORTEX_LPC1768_IAR/main.c | 2 +- Demo/CORTEX_MB9A310_IAR_Keil/main-full.c | 2 +- Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c | 2 +- Demo/CORTEX_MB9B500_IAR_Keil/main-full.c | 2 +- Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c | 2 +- Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c | 2 +- Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c | 2 +- Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c | 2 +- Demo/CORTEX_STM32F103_GCC_Rowley/main.c | 2 +- Demo/CORTEX_STM32F107_GCC_Rowley/main.c | 2 +- Demo/CORTEX_STM32L152_IAR/main.c | 2 +- Demo/CORTUS_APS3_GCC/Demo/main.c | 2 +- Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c | 2 +- Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c | 2 +- Demo/MSP430X_MSP430F5438_IAR/main.c | 2 +- .../SDKProjects/RTOSDemo/main-blinky.c | 2 +- .../SDKProjects/RTOSDemo/main-full.c | 9 ++++++--- .../SDKProjects/RTOSDemo/main-blinky.c | 2 +- .../SDKProjects/RTOSDemo/main-full.c | 2 +- Demo/RL78_RL78G13_Promo_Board_IAR/main.c | 2 +- Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c | 2 +- Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c | 4 ++-- Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c | 2 +- Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c | 4 ++-- Demo/RX600_RX62N-RDK_IAR/main-blinky.c | 2 +- Demo/RX600_RX62N-RDK_IAR/main-full.c | 4 ++-- Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c | 2 +- Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c | 4 ++-- Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c | 2 +- Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c | 4 ++-- Demo/RX600_RX62N-RSK_IAR/main-blinky.c | 2 +- Demo/RX600_RX62N-RSK_IAR/main-full.c | 4 ++-- Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c | 2 +- Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c | 4 ++-- Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c | 2 +- Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c | 4 ++-- Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c | 2 +- 52 files changed, 66 insertions(+), 63 deletions(-) diff --git a/Demo/ARM7_LPC2138_Rowley/main.c b/Demo/ARM7_LPC2138_Rowley/main.c index 12aba286b2..fbb047286b 100644 --- a/Demo/ARM7_LPC2138_Rowley/main.c +++ b/Demo/ARM7_LPC2138_Rowley/main.c @@ -390,7 +390,7 @@ extern void (vButtonISRWrapper) ( void ); } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* Check pcTaskName for the name of the offending task, or pxCurrentTCB if pcTaskName has itself been corrupted. */ diff --git a/Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c b/Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c index 4ddbf6c3c5..36ff6c226d 100644 --- a/Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c +++ b/Demo/CORTEX_A2F200_IAR_and_Keil/main-blinky.c @@ -343,7 +343,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c b/Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c index c05bff8ad9..fc1eee6541 100644 --- a/Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c +++ b/Demo/CORTEX_A2F200_IAR_and_Keil/main-full.c @@ -568,7 +568,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_A2F200_SoftConsole/main-blinky.c b/Demo/CORTEX_A2F200_SoftConsole/main-blinky.c index 4ddbf6c3c5..36ff6c226d 100644 --- a/Demo/CORTEX_A2F200_SoftConsole/main-blinky.c +++ b/Demo/CORTEX_A2F200_SoftConsole/main-blinky.c @@ -343,7 +343,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_A2F200_SoftConsole/main-full.c b/Demo/CORTEX_A2F200_SoftConsole/main-full.c index c05bff8ad9..fc1eee6541 100644 --- a/Demo/CORTEX_A2F200_SoftConsole/main-full.c +++ b/Demo/CORTEX_A2F200_SoftConsole/main-full.c @@ -568,7 +568,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_AT91SAM3U256_IAR/main.c b/Demo/CORTEX_AT91SAM3U256_IAR/main.c index aa7aeb9c2f..99df4384c4 100644 --- a/Demo/CORTEX_AT91SAM3U256_IAR/main.c +++ b/Demo/CORTEX_AT91SAM3U256_IAR/main.c @@ -151,7 +151,7 @@ static void prvLCDTask( void *pvParameters ); * Hook functions that can get called by the kernel. The 'check' functionality * is implemented within the tick hook. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The tick hook function as described in the comments at the top of this file. @@ -268,7 +268,7 @@ portBASE_TYPE xHigherPriorityTaskWoken = pdFALSE; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pxTask; ( void ) pcTaskName; diff --git a/Demo/CORTEX_CY8C5588_PSoC_Creator_GCC/FreeRTOS_Demo.cydsn/main.c b/Demo/CORTEX_CY8C5588_PSoC_Creator_GCC/FreeRTOS_Demo.cydsn/main.c index f19b5e0bd6..19572d798d 100644 --- a/Demo/CORTEX_CY8C5588_PSoC_Creator_GCC/FreeRTOS_Demo.cydsn/main.c +++ b/Demo/CORTEX_CY8C5588_PSoC_Creator_GCC/FreeRTOS_Demo.cydsn/main.c @@ -313,7 +313,7 @@ extern unsigned portSHORT usMaxJitter; } /*---------------------------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* The stack space has been execeeded for a task, considering allocating more. */ taskDISABLE_INTERRUPTS(); diff --git a/Demo/CORTEX_CY8C5588_PSoC_Creator_Keil/FreeRTOS_Demo.cydsn/main.c b/Demo/CORTEX_CY8C5588_PSoC_Creator_Keil/FreeRTOS_Demo.cydsn/main.c index f19b5e0bd6..19572d798d 100644 --- a/Demo/CORTEX_CY8C5588_PSoC_Creator_Keil/FreeRTOS_Demo.cydsn/main.c +++ b/Demo/CORTEX_CY8C5588_PSoC_Creator_Keil/FreeRTOS_Demo.cydsn/main.c @@ -313,7 +313,7 @@ extern unsigned portSHORT usMaxJitter; } /*---------------------------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* The stack space has been execeeded for a task, considering allocating more. */ taskDISABLE_INTERRUPTS(); diff --git a/Demo/CORTEX_CY8C5588_PSoC_Creator_RVDS/FreeRTOS_Demo.cydsn/main.c b/Demo/CORTEX_CY8C5588_PSoC_Creator_RVDS/FreeRTOS_Demo.cydsn/main.c index f19b5e0bd6..19572d798d 100644 --- a/Demo/CORTEX_CY8C5588_PSoC_Creator_RVDS/FreeRTOS_Demo.cydsn/main.c +++ b/Demo/CORTEX_CY8C5588_PSoC_Creator_RVDS/FreeRTOS_Demo.cydsn/main.c @@ -313,7 +313,7 @@ extern unsigned portSHORT usMaxJitter; } /*---------------------------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* The stack space has been execeeded for a task, considering allocating more. */ taskDISABLE_INTERRUPTS(); diff --git a/Demo/CORTEX_EFMG890F128_IAR/main.c b/Demo/CORTEX_EFMG890F128_IAR/main.c index 0a8ea29b09..8c9723f1be 100644 --- a/Demo/CORTEX_EFMG890F128_IAR/main.c +++ b/Demo/CORTEX_EFMG890F128_IAR/main.c @@ -182,7 +182,7 @@ void vApplicationIdleHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will be called if a task overflows its stack, if configCHECK_FOR_STACK_OVERFLOW != 0. It might be that the function diff --git a/Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c b/Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c index 19cfa685ba..a8b60fa3ed 100644 --- a/Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c +++ b/Demo/CORTEX_Kinetis_K60_Tower_IAR/main-full.c @@ -524,7 +524,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c b/Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c index 80ad2c10ba..6625c73852 100644 --- a/Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c +++ b/Demo/CORTEX_Kinetis_K60_Tower_IAR/main_blinky.c @@ -328,7 +328,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_LM3Sxxxx_Rowley/main.c b/Demo/CORTEX_LM3Sxxxx_Rowley/main.c index 2abd3439f5..af9909a309 100644 --- a/Demo/CORTEX_LM3Sxxxx_Rowley/main.c +++ b/Demo/CORTEX_LM3Sxxxx_Rowley/main.c @@ -439,7 +439,7 @@ void ( *vOLEDClear )( void ) = NULL; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c b/Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c index 1847d8a9ce..81bb85e4fa 100644 --- a/Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c +++ b/Demo/CORTEX_LPC1768_GCC_RedSuite/src/main.c @@ -355,7 +355,7 @@ void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_LPC1768_GCC_Rowley/main.c b/Demo/CORTEX_LPC1768_GCC_Rowley/main.c index 17509511a4..418bc5cb6d 100644 --- a/Demo/CORTEX_LPC1768_GCC_Rowley/main.c +++ b/Demo/CORTEX_LPC1768_GCC_Rowley/main.c @@ -255,7 +255,7 @@ void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_LPC1768_IAR/main.c b/Demo/CORTEX_LPC1768_IAR/main.c index ba2b2cc47b..889fd18ebb 100644 --- a/Demo/CORTEX_LPC1768_IAR/main.c +++ b/Demo/CORTEX_LPC1768_IAR/main.c @@ -360,7 +360,7 @@ void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_MB9A310_IAR_Keil/main-full.c b/Demo/CORTEX_MB9A310_IAR_Keil/main-full.c index 6fb95d67c9..4bbdb06370 100644 --- a/Demo/CORTEX_MB9A310_IAR_Keil/main-full.c +++ b/Demo/CORTEX_MB9A310_IAR_Keil/main-full.c @@ -626,7 +626,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c b/Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c index e5583e67d7..1f7882e1e1 100644 --- a/Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c +++ b/Demo/CORTEX_MB9A310_IAR_Keil/main_blinky.c @@ -348,7 +348,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_MB9B500_IAR_Keil/main-full.c b/Demo/CORTEX_MB9B500_IAR_Keil/main-full.c index 50626184e1..b10a2feee3 100644 --- a/Demo/CORTEX_MB9B500_IAR_Keil/main-full.c +++ b/Demo/CORTEX_MB9B500_IAR_Keil/main-full.c @@ -610,7 +610,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c b/Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c index 21cef46219..8a0cef3143 100644 --- a/Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c +++ b/Demo/CORTEX_MB9B500_IAR_Keil/main_blinky.c @@ -350,7 +350,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c b/Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c index 316f6e6122..d3f81ac90f 100644 --- a/Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c +++ b/Demo/CORTEX_MPU_LM3Sxxxx_Rowley/main.c @@ -879,7 +879,7 @@ portBASE_TYPE xDummy; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* If configCHECK_FOR_STACK_OVERFLOW is set to either 1 or 2 then this function will automatically get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c b/Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c index c56612a820..c3b67cb5f2 100644 --- a/Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c +++ b/Demo/CORTEX_MPU_LPC1768_GCC_RedSuite/src/main.c @@ -970,7 +970,7 @@ portBASE_TYPE xDummy; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* If configCHECK_FOR_STACK_OVERFLOW is set to either 1 or 2 then this function will automatically get called if a task overflows its stack. */ diff --git a/Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c b/Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c index 1951e0ea05..56ee76acba 100644 --- a/Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c +++ b/Demo/CORTEX_STM32F100_Atollic/Simple_Demo_Source/main.c @@ -311,7 +311,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTEX_STM32F103_GCC_Rowley/main.c b/Demo/CORTEX_STM32F103_GCC_Rowley/main.c index a6aae57010..6138579ac4 100644 --- a/Demo/CORTEX_STM32F103_GCC_Rowley/main.c +++ b/Demo/CORTEX_STM32F103_GCC_Rowley/main.c @@ -339,7 +339,7 @@ static void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. If the parameters are corrupt then inspect pxCurrentTCB to find which was the diff --git a/Demo/CORTEX_STM32F107_GCC_Rowley/main.c b/Demo/CORTEX_STM32F107_GCC_Rowley/main.c index 1366703cb4..4381f5687a 100644 --- a/Demo/CORTEX_STM32F107_GCC_Rowley/main.c +++ b/Demo/CORTEX_STM32F107_GCC_Rowley/main.c @@ -335,7 +335,7 @@ static void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will get called if a task overflows its stack. If the parameters are corrupt then inspect pxCurrentTCB to find which was the diff --git a/Demo/CORTEX_STM32L152_IAR/main.c b/Demo/CORTEX_STM32L152_IAR/main.c index c8fe32ba14..a5973fed88 100644 --- a/Demo/CORTEX_STM32L152_IAR/main.c +++ b/Demo/CORTEX_STM32L152_IAR/main.c @@ -566,7 +566,7 @@ void TIM6_IRQHandler( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/CORTUS_APS3_GCC/Demo/main.c b/Demo/CORTUS_APS3_GCC/Demo/main.c index 4e08138243..9f9c53d5f7 100644 --- a/Demo/CORTUS_APS3_GCC/Demo/main.c +++ b/Demo/CORTUS_APS3_GCC/Demo/main.c @@ -264,7 +264,7 @@ long lReturn = pdPASS; } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This function will be called if a task overflows its stack. Inspect pxCurrentTCB to find the offending task if the overflow was sever enough diff --git a/Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c b/Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c index 2ef90e9bfd..b42cbfef76 100644 --- a/Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c +++ b/Demo/ColdFire_MCF51CN128_CodeWarrior/Sources/main.c @@ -287,7 +287,7 @@ static void prvSetupHardware( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* This will get called if a stack overflow is detected during the context switch. Set configCHECK_FOR_STACK_OVERFLOWS to 2 to also check for stack diff --git a/Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c b/Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c index b10eae05e0..7e7ffa80cf 100644 --- a/Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c +++ b/Demo/MSP430X_MSP430F5438_CCS4/Demo_Source/main.c @@ -658,7 +658,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pxTask; ( void ) pcTaskName; diff --git a/Demo/MSP430X_MSP430F5438_IAR/main.c b/Demo/MSP430X_MSP430F5438_IAR/main.c index ff5b136c5c..fbe12d8d83 100644 --- a/Demo/MSP430X_MSP430F5438_IAR/main.c +++ b/Demo/MSP430X_MSP430F5438_IAR/main.c @@ -618,7 +618,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pxTask; ( void ) pcTaskName; diff --git a/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-blinky.c b/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-blinky.c index e43866cb14..cc8c1aa01a 100644 --- a/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-blinky.c +++ b/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-blinky.c @@ -398,7 +398,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-full.c b/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-full.c index bb99fc4c55..7d33561876 100644 --- a/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-full.c +++ b/Demo/MicroBlaze_Spartan-6_EthernetFull/SDKProjects/RTOSDemo/main-full.c @@ -241,6 +241,9 @@ int main( void ) /* Configure the interrupt controller, LED outputs and button inputs. */ prvSetupHardware(); + xil_printf( "Hello world2. %s %u\r\n", "string", 100 ); + printf( "Hello world2. %s %u\r\n", "string", 100 ); + /* This call creates the TCP/IP thread. */ tcpip_init( lwIPAppsInit, NULL ); @@ -258,7 +261,7 @@ int main( void ) vStartLEDFlashTasks( mainFLASH_TASK_PRIORITY ); vStartQueuePeekTasks(); vStartRecursiveMutexTasks(); - vStartComTestStringsTasks( mainCOM_TEST_PRIORITY, mainCOM_TEST_BAUD_RATE, mainCOM_TEST_LED ); +// vStartComTestStringsTasks( mainCOM_TEST_PRIORITY, mainCOM_TEST_BAUD_RATE, mainCOM_TEST_LED ); vStartDynamicPriorityTasks(); vStartTimerDemoTask( mainTIMER_TEST_PERIOD ); @@ -499,7 +502,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; @@ -616,7 +619,7 @@ unsigned long ulTimerCounts1, ulTimerCounts2, ulTickCount, ulReturn; /* How many times has it overflowed? */ ulTickCount = xTaskGetTickCountFromISR(); - + /* If this is being called from a yield, has the counter overflowed since it was read? If that is the case then ulTickCounts will need incrementing again as it will not yet have been incremented from the tick interrupt. */ diff --git a/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-blinky.c b/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-blinky.c index e43866cb14..cc8c1aa01a 100644 --- a/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-blinky.c +++ b/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-blinky.c @@ -398,7 +398,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-full.c b/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-full.c index bb99fc4c55..1b7261106d 100644 --- a/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-full.c +++ b/Demo/MicroBlaze_Spartan-6_EthernetLite/SDKProjects/RTOSDemo/main-full.c @@ -499,7 +499,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/RL78_RL78G13_Promo_Board_IAR/main.c b/Demo/RL78_RL78G13_Promo_Board_IAR/main.c index 3b733fc873..708ee94659 100644 --- a/Demo/RL78_RL78G13_Promo_Board_IAR/main.c +++ b/Demo/RL78_RL78G13_Promo_Board_IAR/main.c @@ -411,7 +411,7 @@ void vApplicationMallocFailedHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; diff --git a/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c b/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c index 7dab184a63..391d905822 100644 --- a/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c +++ b/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-blinky.c @@ -218,7 +218,7 @@ void vApplicationMallocFailedHook( void ) FreeRTOSConfig.h, then this function will be called if a task overflows its stack space. See http://www.freertos.org/Stacks-and-stack-overflow-checking.html. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c b/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c index e384e1e192..ac6d7c28eb 100644 --- a/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c +++ b/Demo/RX200_RX210-RSK_Renesas/RTOSDemo/main-full.c @@ -210,7 +210,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -425,7 +425,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c b/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c index a94d7a5f01..3c6d1f088f 100644 --- a/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c b/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c index 1925315a67..41e54f78a8 100644 --- a/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c +++ b/Demo/RX600_RX62N-RDK_GNURX/RTOSDemo/main-full.c @@ -207,7 +207,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -436,7 +436,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_IAR/main-blinky.c b/Demo/RX600_RX62N-RDK_IAR/main-blinky.c index fc45cf1dab..7edb83e125 100644 --- a/Demo/RX600_RX62N-RDK_IAR/main-blinky.c +++ b/Demo/RX600_RX62N-RDK_IAR/main-blinky.c @@ -207,7 +207,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_IAR/main-full.c b/Demo/RX600_RX62N-RDK_IAR/main-full.c index f1d054dc85..8052475981 100644 --- a/Demo/RX600_RX62N-RDK_IAR/main-full.c +++ b/Demo/RX600_RX62N-RDK_IAR/main-full.c @@ -217,7 +217,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -466,7 +466,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c b/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c index 15d26d343f..0a41a8a9aa 100644 --- a/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c b/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c index 1daac2f9e1..c6fbe6c62b 100644 --- a/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c +++ b/Demo/RX600_RX62N-RDK_Renesas/RTOSDemo/main-full.c @@ -206,7 +206,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -439,7 +439,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c b/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c index a94d7a5f01..3c6d1f088f 100644 --- a/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c b/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c index 1925315a67..41e54f78a8 100644 --- a/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c +++ b/Demo/RX600_RX62N-RSK_GNURX/RTOSDemo/main-full.c @@ -207,7 +207,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -436,7 +436,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_IAR/main-blinky.c b/Demo/RX600_RX62N-RSK_IAR/main-blinky.c index 0089d92960..65e7ffdc92 100644 --- a/Demo/RX600_RX62N-RSK_IAR/main-blinky.c +++ b/Demo/RX600_RX62N-RSK_IAR/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_IAR/main-full.c b/Demo/RX600_RX62N-RSK_IAR/main-full.c index 440276c66a..4c60475381 100644 --- a/Demo/RX600_RX62N-RSK_IAR/main-full.c +++ b/Demo/RX600_RX62N-RSK_IAR/main-full.c @@ -217,7 +217,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -466,7 +466,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c b/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c index 15d26d343f..0a41a8a9aa 100644 --- a/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-blinky.c @@ -206,7 +206,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c b/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c index 07e9c9514f..1c493f15cb 100644 --- a/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c +++ b/Demo/RX600_RX62N-RSK_Renesas/RTOSDemo/main-full.c @@ -206,7 +206,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -439,7 +439,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c b/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c index a63ebd6222..91594c98d8 100644 --- a/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c +++ b/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-blinky.c @@ -217,7 +217,7 @@ void vApplicationMallocFailedHook( void ) FreeRTOSConfig.h, then this function will be called if a task overflows its stack space. See http://www.freertos.org/Stacks-and-stack-overflow-checking.html. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c b/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c index b7ac879fd8..676c8f7555 100644 --- a/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c +++ b/Demo/RX600_RX630-RSK_Renesas/RTOSDemo/main-full.c @@ -200,7 +200,7 @@ void vApplicationIdleHook( void ); * it is possible that the stack overflow will have corrupted these - in which * case pxCurrentTCB can be inspected to find the same information. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ); +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ); /* * The reg test tasks as described at the top of this file. @@ -420,7 +420,7 @@ void vApplicationMallocFailedHook( void ) /* This function is explained by the comments above its prototype at the top of this file. */ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { for( ;; ); } diff --git a/Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c b/Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c index 83be907f60..1baf45d384 100644 --- a/Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c +++ b/Demo/SuperH_SH7216_Renesas/RTOSDemo/main.c @@ -401,7 +401,7 @@ void vApplicationIdleHook( void ) } /*-----------------------------------------------------------*/ -void vApplicationStackOverflowHook( xTaskHandle *pxTask, signed char *pcTaskName ) +void vApplicationStackOverflowHook( xTaskHandle pxTask, signed char *pcTaskName ) { /* Just to remove compiler warnings. This function will only actually get called if configCHECK_FOR_STACK_OVERFLOW is set to a non zero value.