diff --git a/stm-firmware/safety/stack-check.c b/stm-firmware/safety/stack-check.c index 9940c8c..bdf449e 100644 --- a/stm-firmware/safety/stack-check.c +++ b/stm-firmware/safety/stack-check.c @@ -1,22 +1,22 @@ /* Reflow Oven Controller -* -* Copyright (C) 2020 Mario Hüttel -* -* This file is part of the Reflow Oven Controller Project. -* -* The reflow oven controller is free software: you can redistribute it and/or modify -* it under the terms of the GNU General Public License version 2 as -* published by the Free Software Foundation. -* -* The Reflow Oven Control Firmware is distributed in the hope that it will be useful, -* but WITHOUT ANY WARRANTY; without even the implied warranty of -* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -* GNU General Public License for more details. -* -* You should have received a copy of the GNU General Public License -* along with the reflow oven controller project. -* If not, see . -*/ + * + * Copyright (C) 2020 Mario Hüttel + * + * This file is part of the Reflow Oven Controller Project. + * + * The reflow oven controller is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. + * + * The Reflow Oven Control Firmware is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with the reflow oven controller project. + * If not, see . + */ #include #include @@ -26,7 +26,7 @@ extern char __ld_top_of_stack; extern char __ld_end_stack; -int32_t stack_check_get_usage() +int32_t stack_check_get_usage(void) { uint32_t stack_top; uint32_t stack_ptr; @@ -37,7 +37,7 @@ int32_t stack_check_get_usage() return stack_top - stack_ptr; } -int32_t stack_check_get_free() +int32_t stack_check_get_free(void) { uint32_t upper_heap_boundary; uint32_t stack_ptr; @@ -102,9 +102,6 @@ int stack_check_corruption_detect_area(void) &__ld_start_stack_corruption_detect_area; crc_unit_reset(); crc_unit_input_array(&__ld_start_stack_corruption_detect_area, area_size_in_words); - if (crc_unit_get_crc() == 0UL) { - return 0; - } else { - return -1; - } + + return crc_unit_get_crc() == 0UL ? 0 : -1; }