Skip to content
  1. Oct 04, 2017
  2. Oct 03, 2017
    • Gregory Nutt's avatar
      Squashed commit of the following: · 42a07966
      Gregory Nutt authored
          sched/semaphore:  Add nxsem_post() which is identical to sem_post() except that it never modifies the errno variable.  Changed all references to sem_post in the OS to nxsem_post().
      
          sched/semaphore:  Add nxsem_destroy() which is identical to sem_destroy() except that it never modifies the errno variable.  Changed all references to sem_destroy() in the OS to nxsem_destroy().
      
          libc/semaphore and sched/semaphore:  Add nxsem_getprotocol() and nxsem_setprotocola which are identical to sem_getprotocol() and set_setprotocol() except that they never modifies the errno variable.  Changed all references to sem_setprotocol in the OS to nxsem_setprotocol().  sem_getprotocol() was not used in the OS
      42a07966
    • Gregory Nutt's avatar
      Squashed commit of the following: · 83cdb0c5
      Gregory Nutt authored
          libc/semaphore:  Add nxsem_getvalue() which is identical to sem_getvalue() except that it never modifies the errno variable.  Changed all references to sem_getvalue in the OS to nxsem_getvalue().
      
          sched/semaphore:  Rename all internal private functions from sem_xyz to nxsem_xyz.  The sem_ prefix is (will be) reserved only for the application semaphore interfaces.
      
          libc/semaphore:  Add nxsem_init() which is identical to sem_init() except that it never modifies the errno variable.  Changed all references to sem_init in the OS to nxsem_init().
      
          sched/semaphore:  Rename sem_tickwait() to nxsem_tickwait() so that it is clear this is an internal OS function.
      
          sched/semaphoate:  Rename sem_reset() to nxsem_reset() so that it is clear this is an internal OS function.
      83cdb0c5
    • Juha Niskanen's avatar
      Merged in juniskane/nuttx_stm32l4/stm32l4_rtc_pm_fixes_pr (pull request #502) · 2997a49e
      Juha Niskanen authored
      
      
      STM32L4 RTC, PM: small fixes to subseconds handling, ADC power-management hooks
      
      * STM32L4 ADC: add PM hooks from Motorola MDK
      
      * STM32L4 RTC: add up_rtc_getdatetime_with_subseconds
      
      * STM32 RTC: workaround for potential subseconds race condition
      
          In all recent STM32 chips reading either RTC_SSR or RTC_TR is supposed to lock
          the values in the higher-order calendar shadow registers until RTC_DR is read.
          However many old chips have in their errata this silicon bug (at least F401xB/C,
          F42xx, F43xx, L15xxE, L15xVD and likely others):
      
          "When reading the calendar registers with BYPSHAD=0, the RTC_TR and RTC_DR
          registers may not be locked after reading the RTC_SSR register. This happens
          if the read operation is initiated one APB clock period before the shadow
          registers are updated. This can result in a non-consistency of the three
          registers. Similarly, RTC_DR register can be updated after reading the RTC_TR
          register instead of being locked."
      
      * STM32L4 RTC: correct RTC_SSR and RTC_TR read ordering
      
          In all recent STM32 chips reading either RTC_SSR or RTC_TR is supposed to lock
          the values in the higher-order calendar shadow registers until RTC_DR is read.
          Change the register read ordering to match this and don't keep a workaround
          for a hypothetical race condition (not in any L4 errata, lets for once assume
          ST's silicon works as it is documented...)
      
      * STM32L4 PM: remove useless #ifdefs and old non-L4 STM32 code
      
      Approved-by: default avatarGregory Nutt <gnutt@nuttx.org>
      2997a49e
    • Sebastien Lorquet's avatar
      Merge branch 'master' into radio · 51bccbe3
      Sebastien Lorquet authored
      51bccbe3
    • Gregory Nutt's avatar
    • Gregory Nutt's avatar
      syscall/: The non-standard interface exec() is now enshrined as a official... · 8e966546
      Gregory Nutt authored
      syscall/:  The non-standard interface exec() is now enshrined as a official NuttX API.  I really dislike doing this but I think that this is probably the only want to load programs in the protected mode.  It is currently used by some example code under apps/ that generate their own symbol tables for linking.  Other file execution APIs relay on a symbol table provided by the OS.  In the protected mode, the OS cannot provide any meaning symbol table for execution of code in the user-space blob so that is they exec() is really needed in that build case.  And, finally, the interface is completely useless and will not be supported in the KERNEL build mode where the contrary is true:  An application process cannot provide any meaning symbolic information for use in linking a different process.
      8e966546
  3. Oct 02, 2017
  4. Oct 01, 2017
  5. Sep 30, 2017