Date: Mon, 27 Oct 2014 20:18:31 +0000 (UTC) From: Mateusz Guzik <mjg@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r273745 - head/sys/kern Message-ID: <201410272018.s9RKIVjM065652@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: mjg Date: Mon Oct 27 20:18:30 2014 New Revision: 273745 URL: https://svnweb.freebsd.org/changeset/base/273745 Log: De-k&r-ify function definitions in kern/kern_resource.c No functional changes. Modified: head/sys/kern/kern_resource.c Modified: head/sys/kern/kern_resource.c ============================================================================== --- head/sys/kern/kern_resource.c Mon Oct 27 18:37:11 2014 (r273744) +++ head/sys/kern/kern_resource.c Mon Oct 27 20:18:30 2014 (r273745) @@ -92,9 +92,7 @@ struct getpriority_args { }; #endif int -sys_getpriority(td, uap) - struct thread *td; - register struct getpriority_args *uap; +sys_getpriority(struct thread *td, register struct getpriority_args *uap) { struct proc *p; struct pgrp *pg; @@ -177,9 +175,7 @@ struct setpriority_args { }; #endif int -sys_setpriority(td, uap) - struct thread *td; - struct setpriority_args *uap; +sys_setpriority(struct thread *td, struct setpriority_args *uap) { struct proc *curp, *p; struct pgrp *pg; @@ -373,9 +369,7 @@ struct rtprio_args { }; #endif int -sys_rtprio(td, uap) - struct thread *td; /* curthread */ - register struct rtprio_args *uap; +sys_rtprio(struct thread *td, register struct rtprio_args *uap) { struct proc *p; struct thread *tdp; @@ -541,9 +535,7 @@ struct osetrlimit_args { }; #endif int -osetrlimit(td, uap) - struct thread *td; - register struct osetrlimit_args *uap; +osetrlimit(struct thread *td, register struct osetrlimit_args *uap) { struct orlimit olim; struct rlimit lim; @@ -564,9 +556,7 @@ struct ogetrlimit_args { }; #endif int -ogetrlimit(td, uap) - struct thread *td; - register struct ogetrlimit_args *uap; +ogetrlimit(struct thread *td, register struct ogetrlimit_args *uap) { struct orlimit olim; struct rlimit rl; @@ -603,9 +593,7 @@ struct __setrlimit_args { }; #endif int -sys_setrlimit(td, uap) - struct thread *td; - register struct __setrlimit_args *uap; +sys_setrlimit(struct thread *td, register struct __setrlimit_args *uap) { struct rlimit alim; int error; @@ -797,9 +785,7 @@ struct __getrlimit_args { #endif /* ARGSUSED */ int -sys_getrlimit(td, uap) - struct thread *td; - register struct __getrlimit_args *uap; +sys_getrlimit(struct thread *td, register struct __getrlimit_args *uap) { struct rlimit rlim; struct proc *p; @@ -820,10 +806,7 @@ sys_getrlimit(td, uap) * into user and system time usage. */ void -calccru(p, up, sp) - struct proc *p; - struct timeval *up; - struct timeval *sp; +calccru(struct proc *p, struct timeval *up, struct timeval *sp) { PROC_LOCK_ASSERT(p, MA_OWNED); @@ -976,9 +959,7 @@ struct getrusage_args { }; #endif int -sys_getrusage(td, uap) - register struct thread *td; - register struct getrusage_args *uap; +sys_getrusage(register struct thread *td, register struct getrusage_args *uap) { struct rusage ru; int error; @@ -1133,8 +1114,7 @@ lim_alloc() } struct plimit * -lim_hold(limp) - struct plimit *limp; +lim_hold(struct plimit *limp) { refcount_acquire(&limp->pl_refcnt); @@ -1142,8 +1122,7 @@ lim_hold(limp) } static __inline int -lim_shared(limp) - struct plimit *limp; +lim_shared(struct plimit *limp) { return (limp->pl_refcnt > 1); @@ -1164,8 +1143,7 @@ lim_fork(struct proc *p1, struct proc *p } void -lim_free(limp) - struct plimit *limp; +lim_free(struct plimit *limp) { if (refcount_release(&limp->pl_refcnt)) @@ -1177,8 +1155,7 @@ lim_free(limp) * We share these structures copy-on-write after fork. */ void -lim_copy(dst, src) - struct plimit *dst, *src; +lim_copy(struct plimit *dst, struct plimit *src) { KASSERT(!lim_shared(dst), ("lim_copy to shared limit")); @@ -1240,8 +1217,7 @@ uihashinit() * uihashtbl_lock must be locked. */ static struct uidinfo * -uilookup(uid) - uid_t uid; +uilookup(uid_t uid) { struct uihashhead *uipp; struct uidinfo *uip; @@ -1261,8 +1237,7 @@ uilookup(uid) * uifree() should be called on a struct uidinfo when released. */ struct uidinfo * -uifind(uid) - uid_t uid; +uifind(uid_t uid) { struct uidinfo *old_uip, *uip; @@ -1300,8 +1275,7 @@ uifind(uid) * Place another refcount on a uidinfo struct. */ void -uihold(uip) - struct uidinfo *uip; +uihold(struct uidinfo *uip) { refcount_acquire(&uip->ui_ref); @@ -1323,8 +1297,7 @@ uihold(uip) * order to try again. */ void -uifree(uip) - struct uidinfo *uip; +uifree(struct uidinfo *uip) { int old; @@ -1380,10 +1353,7 @@ ui_racct_foreach(void (*callback)(struct * a given user is using. When 'max' is 0, don't enforce a limit */ int -chgproccnt(uip, diff, max) - struct uidinfo *uip; - int diff; - rlim_t max; +chgproccnt(struct uidinfo *uip, int diff, rlim_t max) { /* Don't allow them to exceed max, but allow subtraction. */ @@ -1404,11 +1374,7 @@ chgproccnt(uip, diff, max) * Change the total socket buffer size a user has used. */ int -chgsbsize(uip, hiwat, to, max) - struct uidinfo *uip; - u_int *hiwat; - u_int to; - rlim_t max; +chgsbsize(struct uidinfo *uip, u_int *hiwat, u_int to, rlim_t max) { int diff; @@ -1432,10 +1398,7 @@ chgsbsize(uip, hiwat, to, max) * a given user is using. When 'max' is 0, don't enforce a limit */ int -chgptscnt(uip, diff, max) - struct uidinfo *uip; - int diff; - rlim_t max; +chgptscnt(struct uidinfo *uip, int diff, rlim_t max) { /* Don't allow them to exceed max, but allow subtraction. */
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410272018.s9RKIVjM065652>