svn commit: r237967 - stable/9/sys/kern
David E. O'Brien
obrien at FreeBSD.org
Mon Jul 2 07:10:34 UTC 2012
Author: obrien
Date: Mon Jul 2 07:10:33 2012
New Revision: 237967
URL: http://svn.freebsd.org/changeset/base/237967
Log:
MFC: r227518: reformat comment to be more readable in standard Xterm.
Modified:
stable/9/sys/kern/kern_descrip.c
Directory Properties:
stable/9/ (props changed)
stable/9/sys/ (props changed)
Modified: stable/9/sys/kern/kern_descrip.c
==============================================================================
--- stable/9/sys/kern/kern_descrip.c Mon Jul 2 07:01:41 2012 (r237966)
+++ stable/9/sys/kern/kern_descrip.c Mon Jul 2 07:10:33 2012 (r237967)
@@ -842,12 +842,12 @@ do_dup(struct thread *td, int flags, int
if (flags & DUP_FIXED) {
if (new >= fdp->fd_nfiles) {
/*
- * The resource limits are here instead of e.g. fdalloc(),
- * because the file descriptor table may be shared between
- * processes, so we can't really use racct_add()/racct_sub().
- * Instead of counting the number of actually allocated
- * descriptors, just put the limit on the size of the file
- * descriptor table.
+ * The resource limits are here instead of e.g.
+ * fdalloc(), because the file descriptor table may be
+ * shared between processes, so we can't really use
+ * racct_add()/racct_sub(). Instead of counting the
+ * number of actually allocated descriptors, just put
+ * the limit on the size of the file descriptor table.
*/
#ifdef RACCT
PROC_LOCK(p);
@@ -1520,7 +1520,7 @@ fdalloc(struct thread *td, int minfd, in
FILEDESC_XLOCK_ASSERT(fdp);
if (fdp->fd_freefile > minfd)
- minfd = fdp->fd_freefile;
+ minfd = fdp->fd_freefile;
PROC_LOCK(p);
maxfd = min((int)lim_cur(p, RLIMIT_NOFILE), maxfilesperproc);
@@ -2252,7 +2252,7 @@ closef(struct file *fp, struct thread *t
/*
* Initialize the file pointer with the specified properties.
- *
+ *
* The ops are set with release semantics to be certain that the flags, type,
* and data are visible when ops is. This is to prevent ops methods from being
* called with bad data.
@@ -3789,28 +3789,32 @@ SYSINIT(select, SI_SUB_LOCK, SI_ORDER_FI
/*-------------------------------------------------------------------*/
static int
-badfo_readwrite(struct file *fp, struct uio *uio, struct ucred *active_cred, int flags, struct thread *td)
+badfo_readwrite(struct file *fp, struct uio *uio, struct ucred *active_cred,
+ int flags, struct thread *td)
{
return (EBADF);
}
static int
-badfo_truncate(struct file *fp, off_t length, struct ucred *active_cred, struct thread *td)
+badfo_truncate(struct file *fp, off_t length, struct ucred *active_cred,
+ struct thread *td)
{
return (EINVAL);
}
static int
-badfo_ioctl(struct file *fp, u_long com, void *data, struct ucred *active_cred, struct thread *td)
+badfo_ioctl(struct file *fp, u_long com, void *data, struct ucred *active_cred,
+ struct thread *td)
{
return (EBADF);
}
static int
-badfo_poll(struct file *fp, int events, struct ucred *active_cred, struct thread *td)
+badfo_poll(struct file *fp, int events, struct ucred *active_cred,
+ struct thread *td)
{
return (0);
@@ -3824,7 +3828,8 @@ badfo_kqfilter(struct file *fp, struct k
}
static int
-badfo_stat(struct file *fp, struct stat *sb, struct ucred *active_cred, struct thread *td)
+badfo_stat(struct file *fp, struct stat *sb, struct ucred *active_cred,
+ struct thread *td)
{
return (EBADF);
More information about the svn-src-stable-9
mailing list