Commit Graph

37733 Commits

Author SHA1 Message Date
Joel Sherrill
80365c94a7 cpukit/libdl: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This addresses warnings that only occurred on 64-bit targets.  For the
ones which only appeared on 64-bit targets, the cause was frequently
a mismatch when comparing a combination off_t, ssize_t, and int.
2026-02-02 12:57:12 -06:00
Joel Sherrill
7499713116 cpukit/libdebugger/rtems-debugger-smp.c: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This addresses warnings that only occurred on 64-bit targets.  For the
ones which only appeared on 64-bit targets, the cause was frequently
a mismatch when comparing a combination off_t, ssize_t, and int.
2026-02-02 12:57:12 -06:00
Joel Sherrill
d4d68cb960 cpukit/libcsupport: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This addresses warnings that only occurred on 64-bit targets.  For the
ones which only appeared on 64-bit targets, the cause was frequently
a mismatch when comparing a combination off_t, ssize_t, and int.
2026-02-02 12:57:12 -06:00
Joel Sherrill
feac23ce18 cpukit/.../imfs: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This addresses warnings that only occurred on 64-bit targets.  For the
ones which only appeared on 64-bit targets, the cause was frequently
a mismatch when comparing a combination off_t, ssize_t, and int.
2026-02-02 12:48:43 -06:00
Joel Sherrill
0b7eb103fe cpukit/dev: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This addresses warnings that only occurred on 64-bit targets.  For the
ones which only appeared on 64-bit targets, the cause was frequently
a mismatch when comparing a combination off_t, ssize_t, and int.
2026-02-02 12:48:43 -06:00
Joel Sherrill
efe6dd524c testsuites/fstests/fsrdwr/init.c: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This addresses warnings that only occurred on 64-bit targets.  For the
ones which only appeared on 64-bit targets, the cause was frequently
a mismatch when comparing a combination off_t, ssize_t, and int.
2026-02-02 12:48:43 -06:00
Joel Sherrill
31103bd0b3 cpukit/libcsupport: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-02-02 18:40:50 +00:00
Gedare Bloom
324673568b cpukit/score: reformat include with clang-format
Updates #3560.
Updates #5351.
2026-02-01 19:24:33 -06:00
Gedare Bloom
969f1a823b cpukit/score: reformat src with clang-format
Updates #3860.
Updates #5351.
2026-02-01 19:24:33 -06:00
Gedare Bloom
f85f0d822e score: disable clang-format in log2table
Updates #5351.
2026-02-01 19:24:33 -06:00
Gedare Bloom
4da7a225e8 rtems: add _clang-format in root
Updates #3860.
2026-02-01 19:24:33 -06:00
Joel Sherrill
9deb5b8323 spec/build/cpukit/optwarn.yml: Update warning CFLAGS
Warnings enabled by -Wextra have now been addressed except for
-Wcast-function-type and -Wsign-compare.
2026-01-30 09:04:58 -06:00
Ning Yang
33950b4418 aarch64: add rk3399_rockpro64 BSP
This adds a basic BSP for RockPro64, which includes a UART,
an ARM timer, and GICv3 support, and utilizes all available
memory as defined by the upstream U-Boot configuration.

Closes #5414
2026-01-29 18:51:40 -06:00
Kinsey Moore
76614d5200 jffs2: Resolve signed comparison warnings
JFFS2 uses the high values of the unsigned flash offset in a raw node
reference as special identifiers and specifies them using negative
integer literals. This disables those errors for non-RTEMS source and
constrains such comparisons in RTEMS code to avoid larger reworks of the
JFFS2 upstream source.
2026-01-29 18:08:05 -06:00
Yash
578d2e4e46 confdefs: Remove error for reporter without stack checker
Previously, if a user defined a stack checker reporter but disabled
the stack checker (e.g. for testing), the build would fail with an #error.
This change removes the error to allow flexible configuration.

Closes #5425
2026-01-29 19:40:44 +00:00
Joel Sherrill
9b1a9ec163 bsps/sparc/shared/gnatcommon.c: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 19:31:11 +00:00
Joel Sherrill
b906181b15 bsps/shared/dev: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 19:31:11 +00:00
Joel Sherrill
474c74efce bsps/shared/grlib: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 19:31:11 +00:00
Joel Sherrill
be62df1493 cpukit/rtems/rtemsobjectgetclassinfo.c: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 19:20:27 +00:00
Joel Sherrill
211acc10da cpukit/shell/edit: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 13:19:23 -06:00
Joel Sherrill
963ba98047 cpukit/.../scheduler*: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.

This addresses sign comparison warnings primarily in the CBS.
2026-01-28 19:18:27 +00:00
Joel Sherrill
54d703967f cpukit/.../termios: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 19:15:44 +00:00
Joel Sherrill
55d18c302e fstests: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 19:14:53 +00:00
Joel Sherrill
dd4670e83d cpukit/libfs/rfs: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.

This addresses sign comparison warnings in the RFS.
2026-01-28 19:13:39 +00:00
Joel Sherrill
785130d379 cpukit/libfs/tftpfs: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.

This addresses sign comparison warnings in the tftp file system.
2026-01-28 19:13:39 +00:00
Joel Sherrill
63d3c17d8f cpukit/libfs/dosfs: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.

This addresses sign comparison warnings in the dosfs.
2026-01-28 19:13:39 +00:00
Joel Sherrill
939d18ba4e cpukit/libcrypt: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 19:12:45 +00:00
Joel Sherrill
5be6a2ea4f bsps/shared/.../spictrl.c: Address -Wsign-compare warnings
This warning occurs when comparing a signed variable to an unsigned one.
This is frequently an int or ssize_t variable compared to a uint32_t or
size_t. Sometimes the size_t is from a sizeof() use.
2026-01-28 10:13:21 -06:00
Shaunak Datar
cbba19c44a bsp/aarch64/raspberrypi: Add Mailbox Support
Adds mailbox and property tags support to the aarch64/raspberrypi BSP
2026-01-28 07:36:50 -06:00
Kinsey Moore
7e5d1a851a cpukit/libmisc/monitor: Resolve function cast warning
Wrap rtems_monitor_config_dump to match the required function signature.
2026-01-27 12:44:03 -06:00
Kinsey Moore
f2b6a2383b bsps/aarch64/xilinx-zynqmp: Obsolete direct JFFS2 adapters
This removes the adapters that provide glue code directly from JFFS2 to
backend storage drivers since JFFS2, the NAND driver, and the QSPI NOR
driver all support the flashdev interface.
2026-01-27 12:44:03 -06:00
Kinsey Moore
1eac734295 cpukit/libfs: Move JFFS2 sources to contrib
This moves the JFFS2 sources imported from Linux into the contrib/
subdirectory since that is where 3rd party sources belong. The import
revision is currently "v6.1" with some alterations.
2026-01-27 12:34:56 -06:00
Kinsey Moore
3bb45e2084 cpukit/libfs/jffs2: Correct sign mismatches
Correct sign mismatches in non-upstream JFFS2 interworking code.
2026-01-27 12:34:56 -06:00
Joel Sherrill
3a61921132 mp misc: Address build failures and warnings
Changes required to build with RTEMS_MULTIPROCESSING and
associated tests without warnings.
2026-01-27 18:20:55 +00:00
Yash
cecbf340e9 cpukit/dev/can: Fix spelling errors in comments
Correct 'succesful' to 'successful' and 'succesfully' to 'successfully'
in the CAN and CTUCANFD driver comments.

Updates #5429
2026-01-24 17:01:35 +00:00
Joel Sherrill
b8d245499e testsuites/sptests/spcache01/init.c: Address -Wclobbered warning
This warning indicates the potential for using a local variable which
is not guaranteed to be preserved across a setjmp()/longjmp() pair.

Updates #5364.
2026-01-24 00:07:29 -06:00
Joel Sherrill
63c93acec1 cpukit/libmisc/shell/main_mknod.c: Address -Wclobbered warning
This warning indicates the potential for using a local variable which
is not guaranteed to be preserved across a setjmp()/longjmp() pair.
In this case, it was a false positive and the warning was disabled.

Updates #5364.
2026-01-23 17:43:20 -06:00
Amar Takhar
8ab6a256d3 ignore: Add contrib
Ignore all files in contrib/* as we do not want to touch files there in any way,
at least for now.
2026-01-23 16:26:32 -06:00
Joel Sherrill
ec711f1ae9 cpukit/libdl/rtl-bit-alloc.c: Change false to NULL
This bug was caught when turning on --std=gnu2y on Microblaze.
2026-01-23 14:11:24 -06:00
Joel Sherrill
0975fe5f6c optstdcc.yml: Add C standard version for Microblaze GCC 12
Add --std= argument to RTEMS compilation. Microblaze uses GCC 12
and the argument is gnu2x rather than gnu23 which is used after
C23 was released.
2026-01-23 14:11:24 -06:00
Prakhar Kumar
a5803cbc89 bsp/shared/grlib: Fixed missing semicolon
Fixes a typo where a '.' was placed instead of semicolon.
2026-01-23 13:37:25 +05:30
Jeremy Lorelli
297dc2367b bsps/m68k: Add -D_LDBL_EQ_DBL=1 workaround to ABI_FLAGS
This is to workaround a difficult bug in newlib related to
configure-time generation of this flag in newlib.h. Since there is no
multi-lib mechanism for headers, _LDBL_EQ_DBL ends up in newlib.h, which
is installed architecture wide. The default -mcpu= setting for the 68k
toolchain does support long double, so this flag is not defined in
newlib.h.

However, Coldfire targets lack support for long double, leading to some
undesirable behavior in the C/C++ standard headers. ieeefp.h has
numerous sanity checks that will #error and <cmath> from C++ will fail
to compile.

It doesn't look like this issue will ever be fixed in newlib, so we'll
just define this manually as a workaround.
2026-01-23 13:39:43 +11:00
Kinsey Moore
5efed52222 cpukit/sapi/src/interrtext.c: Add missing definition
This adds a missing text description for an internal error and updates
the spinternalerror02 test to check for the correct end of internal
error definitions.
2026-01-23 01:30:49 +00:00
Joel Sherrill
dcab8a9eac bsps/*: Review of Andy Dachs submissions for relicensing
Updates from verifying all of Andy Dachs submissions to see if
all had given permission to relicense.

Updates #3053.
2026-01-23 01:27:25 +00:00
Joel Sherrill
485e0b2b79 bsps/powerpc/include/bsp/VMEDMA.h: Fix function cast warnings.
This changes the signature of the VMEBus DMA IRQ Callback type
(BSP_VMEDmaIRQCallback) to match that expected by BSP_installVME_isr()
when the callback is installed.
2026-01-23 01:25:21 +00:00
Joel Sherrill
9a55909e09 grlib and users: Fix function cast warnings
grlib has places where a function similar to memcpy() can be
provided by the driver. The signature does not match memcpy()
which led to function cast warnings when memcpy() was sufficient.
Provided a wrapper function to aligned the signatures.
2026-01-22 18:48:59 -06:00
Joel Sherrill
a5d3e5e8ef smptests: Address -Wsign-compare warnings
Most of these warnings were between int or ssize_t and size_t.
In particular, various POSIX system calls like read() and write()
return ssize_t and comparing that value with the sizeof a buffer
is a common source of these warnings. Another common source is
using an int as the iterator in a for loop with the limit being
a size_t.

With the type change, some printf() specifiers needed to change also.
2026-01-22 17:30:54 -06:00
Joel Sherrill
3a5a39c765 validation/tr-event-send-receive.c: Address -Wsign-compare warnings
Most of these warnings were between int or ssize_t and size_t.
In particular, various POSIX system calls like read() and write()
return ssize_t and comparing that value with the sizeof a buffer
is a common source of these warnings. Another common source is
using an int as the iterator in a for loop with the limit being
a size_t.

With the type change, some printf() specifiers needed to change also.
2026-01-22 23:24:35 +00:00
Joel Sherrill
f7911033b5 testsuites/samples/fileio/init.c: Address -Wsign-compare warnings
Most of these warnings were between int or ssize_t and size_t.
In particular, various POSIX system calls like read() and write()
return ssize_t and comparing that value with the sizeof a buffer
is a common source of these warnings. Another common source is
using an int as the iterator in a for loop with the limit being
a size_t.

With the type change, some printf() specifiers needed to change also.
2026-01-22 23:24:35 +00:00
Joel Sherrill
3e0cf85d9c sptests: Address -Wsign-compare warnings
Most of these warnings were between int or ssize_t and size_t.
In particular, various POSIX system calls like read() and write()
return ssize_t and comparing that value with the sizeof a buffer
is a common source of these warnings. Another common source is
using an int as the iterator in a for loop with the limit being
a size_t.

With the type change, some printf() specifiers needed to change also.
2026-01-22 23:19:32 +00:00