|
58 | 58 | /* Only the current stack state is to be checked. */
|
59 | 59 | #define taskCHECK_FOR_STACK_OVERFLOW() \
|
60 | 60 | do { \
|
61 |
| - TCB_t * const pxConstCurrentTCB = prvGetCurrentTaskTCBUnsafe(); \ |
| 61 | + TCB_t * const pxConstCurrentTCB = prvGetCurrentTCBUnsafe(); \ |
62 | 62 | \
|
63 | 63 | /* Is the currently saved stack pointer within the stack limit? */ \
|
64 | 64 | if( pxConstCurrentTCB->pxTopOfStack <= pxConstCurrentTCB->pxStack + portSTACK_LIMIT_PADDING ) \
|
|
76 | 76 | /* Only the current stack state is to be checked. */
|
77 | 77 | #define taskCHECK_FOR_STACK_OVERFLOW() \
|
78 | 78 | do { \
|
79 |
| - TCB_t * const pxConstCurrentTCB = prvGetCurrentTaskTCBUnsafe(); \ |
| 79 | + TCB_t * const pxConstCurrentTCB = prvGetCurrentTCBUnsafe(); \ |
80 | 80 | \
|
81 | 81 | /* Is the currently saved stack pointer within the stack limit? */ \
|
82 | 82 | if( pxConstCurrentTCB->pxTopOfStack >= pxConstCurrentTCB->pxEndOfStack - portSTACK_LIMIT_PADDING ) \
|
|
93 | 93 |
|
94 | 94 | #define taskCHECK_FOR_STACK_OVERFLOW() \
|
95 | 95 | do { \
|
96 |
| - TCB_t * const pxConstCurrentTCB = prvGetCurrentTaskTCBUnsafe(); \ |
| 96 | + TCB_t * const pxConstCurrentTCB = prvGetCurrentTCBUnsafe(); \ |
97 | 97 | const uint32_t * const pulStack = ( uint32_t * ) pxConstCurrentTCB->pxStack; \
|
98 | 98 | const uint32_t ulCheckValue = ( uint32_t ) 0xa5a5a5a5U; \
|
99 | 99 | \
|
|
114 | 114 |
|
115 | 115 | #define taskCHECK_FOR_STACK_OVERFLOW() \
|
116 | 116 | do { \
|
117 |
| - TCB_t * const pxConstCurrentTCB = prvGetCurrentTaskTCBUnsafe(); \ |
| 117 | + TCB_t * const pxConstCurrentTCB = prvGetCurrentTCBUnsafe(); \ |
118 | 118 | int8_t * pcEndOfStack = ( int8_t * ) pxConstCurrentTCB->pxEndOfStack; \
|
119 | 119 | static const uint8_t ucExpectedStackBytes[] = { tskSTACK_FILL_BYTE, tskSTACK_FILL_BYTE, tskSTACK_FILL_BYTE, tskSTACK_FILL_BYTE, \
|
120 | 120 | tskSTACK_FILL_BYTE, tskSTACK_FILL_BYTE, tskSTACK_FILL_BYTE, tskSTACK_FILL_BYTE, \
|
|
0 commit comments