Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 Oct 2014 20:18:31 +0000 (UTC)
From:      Mateusz Guzik <mjg@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r273745 - head/sys/kern
Message-ID:  <201410272018.s9RKIVjM065652@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mjg
Date: Mon Oct 27 20:18:30 2014
New Revision: 273745
URL: https://svnweb.freebsd.org/changeset/base/273745

Log:
  De-k&r-ify function definitions in kern/kern_resource.c
  
  No functional changes.

Modified:
  head/sys/kern/kern_resource.c

Modified: head/sys/kern/kern_resource.c
==============================================================================
--- head/sys/kern/kern_resource.c	Mon Oct 27 18:37:11 2014	(r273744)
+++ head/sys/kern/kern_resource.c	Mon Oct 27 20:18:30 2014	(r273745)
@@ -92,9 +92,7 @@ struct getpriority_args {
 };
 #endif
 int
-sys_getpriority(td, uap)
-	struct thread *td;
-	register struct getpriority_args *uap;
+sys_getpriority(struct thread *td, register struct getpriority_args *uap)
 {
 	struct proc *p;
 	struct pgrp *pg;
@@ -177,9 +175,7 @@ struct setpriority_args {
 };
 #endif
 int
-sys_setpriority(td, uap)
-	struct thread *td;
-	struct setpriority_args *uap;
+sys_setpriority(struct thread *td, struct setpriority_args *uap)
 {
 	struct proc *curp, *p;
 	struct pgrp *pg;
@@ -373,9 +369,7 @@ struct rtprio_args {
 };
 #endif
 int
-sys_rtprio(td, uap)
-	struct thread *td;		/* curthread */
-	register struct rtprio_args *uap;
+sys_rtprio(struct thread *td, register struct rtprio_args *uap)
 {
 	struct proc *p;
 	struct thread *tdp;
@@ -541,9 +535,7 @@ struct osetrlimit_args {
 };
 #endif
 int
-osetrlimit(td, uap)
-	struct thread *td;
-	register struct osetrlimit_args *uap;
+osetrlimit(struct thread *td, register struct osetrlimit_args *uap)
 {
 	struct orlimit olim;
 	struct rlimit lim;
@@ -564,9 +556,7 @@ struct ogetrlimit_args {
 };
 #endif
 int
-ogetrlimit(td, uap)
-	struct thread *td;
-	register struct ogetrlimit_args *uap;
+ogetrlimit(struct thread *td, register struct ogetrlimit_args *uap)
 {
 	struct orlimit olim;
 	struct rlimit rl;
@@ -603,9 +593,7 @@ struct __setrlimit_args {
 };
 #endif
 int
-sys_setrlimit(td, uap)
-	struct thread *td;
-	register struct __setrlimit_args *uap;
+sys_setrlimit(struct thread *td, register struct __setrlimit_args *uap)
 {
 	struct rlimit alim;
 	int error;
@@ -797,9 +785,7 @@ struct __getrlimit_args {
 #endif
 /* ARGSUSED */
 int
-sys_getrlimit(td, uap)
-	struct thread *td;
-	register struct __getrlimit_args *uap;
+sys_getrlimit(struct thread *td, register struct __getrlimit_args *uap)
 {
 	struct rlimit rlim;
 	struct proc *p;
@@ -820,10 +806,7 @@ sys_getrlimit(td, uap)
  * into user and system time usage.
  */
 void
-calccru(p, up, sp)
-	struct proc *p;
-	struct timeval *up;
-	struct timeval *sp;
+calccru(struct proc *p, struct timeval *up, struct timeval *sp)
 {
 
 	PROC_LOCK_ASSERT(p, MA_OWNED);
@@ -976,9 +959,7 @@ struct getrusage_args {
 };
 #endif
 int
-sys_getrusage(td, uap)
-	register struct thread *td;
-	register struct getrusage_args *uap;
+sys_getrusage(register struct thread *td, register struct getrusage_args *uap)
 {
 	struct rusage ru;
 	int error;
@@ -1133,8 +1114,7 @@ lim_alloc()
 }
 
 struct plimit *
-lim_hold(limp)
-	struct plimit *limp;
+lim_hold(struct plimit *limp)
 {
 
 	refcount_acquire(&limp->pl_refcnt);
@@ -1142,8 +1122,7 @@ lim_hold(limp)
 }
 
 static __inline int
-lim_shared(limp)
-	struct plimit *limp;
+lim_shared(struct plimit *limp)
 {
 
 	return (limp->pl_refcnt > 1);
@@ -1164,8 +1143,7 @@ lim_fork(struct proc *p1, struct proc *p
 }
 
 void
-lim_free(limp)
-	struct plimit *limp;
+lim_free(struct plimit *limp)
 {
 
 	if (refcount_release(&limp->pl_refcnt))
@@ -1177,8 +1155,7 @@ lim_free(limp)
  * We share these structures copy-on-write after fork.
  */
 void
-lim_copy(dst, src)
-	struct plimit *dst, *src;
+lim_copy(struct plimit *dst, struct plimit *src)
 {
 
 	KASSERT(!lim_shared(dst), ("lim_copy to shared limit"));
@@ -1240,8 +1217,7 @@ uihashinit()
  * uihashtbl_lock must be locked.
  */
 static struct uidinfo *
-uilookup(uid)
-	uid_t uid;
+uilookup(uid_t uid)
 {
 	struct uihashhead *uipp;
 	struct uidinfo *uip;
@@ -1261,8 +1237,7 @@ uilookup(uid)
  * uifree() should be called on a struct uidinfo when released.
  */
 struct uidinfo *
-uifind(uid)
-	uid_t uid;
+uifind(uid_t uid)
 {
 	struct uidinfo *old_uip, *uip;
 
@@ -1300,8 +1275,7 @@ uifind(uid)
  * Place another refcount on a uidinfo struct.
  */
 void
-uihold(uip)
-	struct uidinfo *uip;
+uihold(struct uidinfo *uip)
 {
 
 	refcount_acquire(&uip->ui_ref);
@@ -1323,8 +1297,7 @@ uihold(uip)
  *   order to try again.
  */
 void
-uifree(uip)
-	struct uidinfo *uip;
+uifree(struct uidinfo *uip)
 {
 	int old;
 
@@ -1380,10 +1353,7 @@ ui_racct_foreach(void (*callback)(struct
  * a given user is using.  When 'max' is 0, don't enforce a limit
  */
 int
-chgproccnt(uip, diff, max)
-	struct	uidinfo	*uip;
-	int	diff;
-	rlim_t	max;
+chgproccnt(struct uidinfo *uip, int diff, rlim_t max)
 {
 
 	/* Don't allow them to exceed max, but allow subtraction. */
@@ -1404,11 +1374,7 @@ chgproccnt(uip, diff, max)
  * Change the total socket buffer size a user has used.
  */
 int
-chgsbsize(uip, hiwat, to, max)
-	struct	uidinfo	*uip;
-	u_int  *hiwat;
-	u_int	to;
-	rlim_t	max;
+chgsbsize(struct uidinfo *uip, u_int *hiwat, u_int to, rlim_t max)
 {
 	int diff;
 
@@ -1432,10 +1398,7 @@ chgsbsize(uip, hiwat, to, max)
  * a given user is using.  When 'max' is 0, don't enforce a limit
  */
 int
-chgptscnt(uip, diff, max)
-	struct	uidinfo	*uip;
-	int	diff;
-	rlim_t	max;
+chgptscnt(struct uidinfo *uip, int diff, rlim_t max)
 {
 
 	/* Don't allow them to exceed max, but allow subtraction. */



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410272018.s9RKIVjM065652>