fixed spelling

git-svn-id: https://arducopter.googlecode.com/svn/trunk@3244 f9c3cf11-9bcb-44bc-f272-b75c42450872
This commit is contained in:
tridge60@gmail.com 2011-09-04 21:23:06 +00:00
parent 694bfc5b87
commit 5980e80333
1 changed files with 7 additions and 7 deletions

View File

@ -1,7 +1,7 @@
/// -*- tab-width: 4; Mode: C++; c-basic-offset: 4; indent-tabs-mode: nil -*-
/*
note that we use a 32 bit sentinal to reduce the chance
note that we use a 32 bit sentinel to reduce the chance
of false positives with uninitialised stack variables
*/
@ -11,7 +11,7 @@ static const uint32_t *stack_low;
extern unsigned __brkval;
#define STACK_OFFSET 2
#define SENTINAL 0x28021967
#define SENTINEL 0x28021967
/*
return the current stack pointer
@ -23,7 +23,7 @@ static __attribute__((noinline)) const uint32_t *current_stackptr(void)
/*
this can be added in deeply nested code to ensure we catch
deep stack usage. It should be caught by the sentinal, but this
deep stack usage. It should be caught by the sentinel, but this
is an added protection
*/
void memcheck_update_stackptr(void)
@ -35,7 +35,7 @@ void memcheck_update_stackptr(void)
}
/*
initialise memcheck, setting up the sentinals
initialise memcheck, setting up the sentinels
*/
void memcheck_init(void)
{
@ -44,18 +44,18 @@ void memcheck_init(void)
stack_low = current_stackptr();
memcheck_update_stackptr();
for (p=(uint32_t *)(stack_low-1); p>(uint32_t *)__brkval; p--) {
*p = SENTINAL;
*p = SENTINEL;
}
}
/*
this returns the real amount of free memory by looking for
overwrites of the stack sentinal values
overwrites of the stack sentinel values
*/
unsigned memcheck_available_memory(void)
{
memcheck_update_stackptr();
while (*stack_low != SENTINAL && stack_low > (const uint32_t *)__brkval) {
while (*stack_low != SENTINEL && stack_low > (const uint32_t *)__brkval) {
stack_low--;
}
return (unsigned)(stack_low) - __brkval;