Module Name:    src
Committed By:   maxv
Date:           Sat Nov 24 17:05:54 UTC 2018

Modified Files:
        src/sys/netinet: tcp_usrreq.c

Log Message:
KNF, no functional change.


To generate a diff of this commit:
cvs rdiff -u -r1.220 -r1.221 src/sys/netinet/tcp_usrreq.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netinet/tcp_usrreq.c
diff -u src/sys/netinet/tcp_usrreq.c:1.220 src/sys/netinet/tcp_usrreq.c:1.221
--- src/sys/netinet/tcp_usrreq.c:1.220	Sat Nov 24 16:58:40 2018
+++ src/sys/netinet/tcp_usrreq.c	Sat Nov 24 17:05:54 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: tcp_usrreq.c,v 1.220 2018/11/24 16:58:40 maxv Exp $	*/
+/*	$NetBSD: tcp_usrreq.c,v 1.221 2018/11/24 17:05:54 maxv Exp $	*/
 
 /*
  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
@@ -99,7 +99,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: tcp_usrreq.c,v 1.220 2018/11/24 16:58:40 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: tcp_usrreq.c,v 1.221 2018/11/24 17:05:54 maxv Exp $");
 
 #ifdef _KERNEL_OPT
 #include "opt_inet.h"
@@ -152,8 +152,8 @@ __KERNEL_RCSID(0, "$NetBSD: tcp_usrreq.c
 #include <netinet/tcp_debug.h>
 #include <netinet/tcp_vtw.h>
 
-static int  
-tcp_debug_capture(struct tcpcb *tp, int req)  
+static int
+tcp_debug_capture(struct tcpcb *tp, int req)
 {
 #ifdef TCP_DEBUG
 	return tp->t_state;
@@ -163,7 +163,7 @@ tcp_debug_capture(struct tcpcb *tp, int 
 
 static inline void
 tcp_debug_trace(struct socket *so, struct tcpcb *tp, int ostate, int req)
-{        
+{
 #ifdef TCP_DEBUG
 	if (tp && (so->so_options & SO_DEBUG))
 		tcp_trace(TA_USER, ostate, tp, NULL, req);
@@ -216,7 +216,7 @@ change_keepalive(struct socket *so, stru
 	if (tp->t_state == TCPS_SYN_RECEIVED ||
 	    tp->t_state == TCPS_SYN_SENT) {
 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepinit);
-	} else if (so->so_options & SO_KEEPALIVE && 
+	} else if (so->so_options & SO_KEEPALIVE &&
 	    tp->t_state <= TCPS_CLOSE_WAIT) {
 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepintvl);
 	} else {
@@ -330,7 +330,7 @@ tcp_ctloutput(int op, struct socket *so,
 #endif
 	{
 		splx(s);
-		return (ECONNRESET);
+		return ECONNRESET;
 	}
 	if (level != IPPROTO_TCP) {
 		switch (family) {
@@ -344,7 +344,7 @@ tcp_ctloutput(int op, struct socket *so,
 #endif
 		}
 		splx(s);
-		return (error);
+		return error;
 	}
 	if (inp)
 		tp = intotcpcb(inp);
@@ -487,7 +487,7 @@ setval:			error = sockopt_set(sopt, &opt
 		break;
 	}
 	splx(s);
-	return (error);
+	return error;
 }
 
 #ifndef TCP_SENDSPACE
@@ -1255,7 +1255,7 @@ tcp_disconnect1(struct tcpcb *tp)
 		if (tp)
 			(void) tcp_output(tp);
 	}
-	return (tp);
+	return tp;
 }
 
 /*
@@ -1322,7 +1322,7 @@ tcp_usrclosed(struct tcpcb *tp)
 			tp = 0;
 		}
 	}
-	return (tp);
+	return tp;
 }
 
 /*
@@ -1340,17 +1340,17 @@ sysctl_net_inet_tcp_mssdflt(SYSCTLFN_ARG
 	node.sysctl_data = &mssdflt;
 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
 	if (error || newp == NULL)
-		return (error);
+		return error;
 
 	if (mssdflt < 32)
-		return (EINVAL);
+		return EINVAL;
 	tcp_mssdflt = mssdflt;
 
 	mutex_enter(softnet_lock);
 	tcp_tcpcb_template();
 	mutex_exit(softnet_lock);
 
-	return (0);
+	return 0;
 }
 
 /*
@@ -1401,7 +1401,7 @@ sysctl_net_inet_ip_ports(SYSCTLFN_ARGS)
 	struct sysctlnode node;
 
 	if (namelen != 0)
-		return (EINVAL);
+		return EINVAL;
 
 	switch (name[-3]) {
 	    case PF_INET:
@@ -1423,7 +1423,7 @@ sysctl_net_inet_ip_ports(SYSCTLFN_ARGS)
 		break;
 #endif /* INET6 */
 	    default:
-		return (EINVAL);
+		return EINVAL;
 	}
 
 	/*
@@ -1435,13 +1435,13 @@ sysctl_net_inet_ip_ports(SYSCTLFN_ARGS)
 	node.sysctl_data = &tmp;
 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
 	if (error || newp == NULL)
-		return (error);
+		return error;
 
 	/*
 	 * simple port range check
 	 */
 	if (tmp < 0 || tmp > 65535)
-		return (EINVAL);
+		return EINVAL;
 
 	/*
 	 * per-node range checks
@@ -1450,20 +1450,20 @@ sysctl_net_inet_ip_ports(SYSCTLFN_ARGS)
 	case IPCTL_ANONPORTMIN:
 	case IPV6CTL_ANONPORTMIN:
 		if (tmp >= apmax)
-			return (EINVAL);
+			return EINVAL;
 #ifndef IPNOPRIVPORTS
 		if (tmp < IPPORT_RESERVED)
-                        return (EINVAL);
+                        return EINVAL;
 #endif /* IPNOPRIVPORTS */
 		break;
 
 	case IPCTL_ANONPORTMAX:
 	case IPV6CTL_ANONPORTMAX:
                 if (apmin >= tmp)
-			return (EINVAL);
+			return EINVAL;
 #ifndef IPNOPRIVPORTS
 		if (tmp < IPPORT_RESERVED)
-                        return (EINVAL);
+                        return EINVAL;
 #endif /* IPNOPRIVPORTS */
 		break;
 
@@ -1473,7 +1473,7 @@ sysctl_net_inet_ip_ports(SYSCTLFN_ARGS)
 		if (tmp >= lpmax ||
 		    tmp > IPPORT_RESERVEDMAX ||
 		    tmp < IPPORT_RESERVEDMIN)
-			return (EINVAL);
+			return EINVAL;
 		break;
 
 	case IPCTL_LOWPORTMAX:
@@ -1481,17 +1481,17 @@ sysctl_net_inet_ip_ports(SYSCTLFN_ARGS)
 		if (lpmin >= tmp ||
 		    tmp > IPPORT_RESERVEDMAX ||
 		    tmp < IPPORT_RESERVEDMIN)
-			return (EINVAL);
+			return EINVAL;
 		break;
 #endif /* IPNOPRIVPORTS */
 
 	default:
-		return (EINVAL);
+		return EINVAL;
 	}
 
 	*(int*)rnode->sysctl_data = tmp;
 
-	return (0);
+	return 0;
 }
 
 static inline int
@@ -1524,14 +1524,14 @@ inet4_ident_core(struct in_addr raddr, u
 	struct socket *sockp;
 
 	inp = in_pcblookup_connect(&tcbtable, raddr, rport, laddr, lport, 0);
-	
+
 	if (inp == NULL || (sockp = inp->inp_socket) == NULL)
 		return ESRCH;
 
 	if (dodrop) {
 		struct tcpcb *tp;
 		int error;
-		
+
 		if (inp == NULL || (tp = intotcpcb(inp)) == NULL ||
 		    (inp->inp_socket->so_options & SO_ACCEPTCONN) != 0)
 			return ESRCH;
@@ -1539,13 +1539,13 @@ inet4_ident_core(struct in_addr raddr, u
 		error = kauth_authorize_network(l->l_cred, KAUTH_NETWORK_SOCKET,
 		    KAUTH_REQ_NETWORK_SOCKET_DROP, inp->inp_socket, tp, NULL);
 		if (error)
-			return (error);
-		
+			return error;
+
 		(void)tcp_drop(tp, ECONNABORTED);
 		return 0;
 	}
-	else
-		return copyout_uid(sockp, oldp, oldlenp);
+
+	return copyout_uid(sockp, oldp, oldlenp);
 }
 
 #ifdef INET6
@@ -1562,11 +1562,11 @@ inet6_ident_core(struct in6_addr *raddr,
 
 	if (in6p == NULL || (sockp = in6p->in6p_socket) == NULL)
 		return ESRCH;
-	
+
 	if (dodrop) {
 		struct tcpcb *tp;
 		int error;
-		
+
 		if (in6p == NULL || (tp = in6totcpcb(in6p)) == NULL ||
 		    (in6p->in6p_socket->so_options & SO_ACCEPTCONN) != 0)
 			return ESRCH;
@@ -1574,13 +1574,13 @@ inet6_ident_core(struct in6_addr *raddr,
 		error = kauth_authorize_network(l->l_cred, KAUTH_NETWORK_SOCKET,
 		    KAUTH_REQ_NETWORK_SOCKET_DROP, in6p->in6p_socket, tp, NULL);
 		if (error)
-			return (error);
+			return error;
 
 		(void)tcp_drop(tp, ECONNABORTED);
 		return 0;
 	}
-	else
-		return copyout_uid(sockp, oldp, oldlenp);
+
+	return copyout_uid(sockp, oldp, oldlenp);
 }
 #endif
 
@@ -1632,7 +1632,7 @@ sysctl_net_inet_tcp_ident(SYSCTLFN_ARGS)
 		rport = (u_int)name[1];
 		laddr.s_addr = (uint32_t)name[2];
 		lport = (u_int)name[3];
-		
+
 		mutex_enter(softnet_lock);
 		error = inet4_ident_core(raddr, rport, laddr, lport,
 		    oldp, oldlenp, l, dodrop);
@@ -1692,7 +1692,7 @@ sysctl_net_inet_tcp_ident(SYSCTLFN_ARGS)
 		if (si4[0]->sin_len != sizeof(*si4[0]) ||
 		    si4[0]->sin_len != sizeof(*si4[1]))
 			return EINVAL;
-	
+
 		mutex_enter(softnet_lock);
 		error = inet4_ident_core(si4[0]->sin_addr, si4[0]->sin_port,
 		    si4[1]->sin_addr, si4[1]->sin_port,
@@ -1729,7 +1729,7 @@ sysctl_inpcblist(SYSCTLFN_ARGS)
 	int error, elem_count, pf, proto, pf2;
 
 	if (namelen != 4)
-		return (EINVAL);
+		return EINVAL;
 
 	if (oldp != NULL) {
 		    len = *oldlenp;
@@ -1751,7 +1751,7 @@ sysctl_inpcblist(SYSCTLFN_ARGS)
 		return (sysctl_query(SYSCTLFN_CALL(rnode)));
 
 	if (name - oname != 4)
-		return (EINVAL);
+		return EINVAL;
 
 	pf = oname[1];
 	proto = oname[2];
@@ -1874,7 +1874,7 @@ sysctl_inpcblist(SYSCTLFN_ARGS)
 			error = copyout(&pcb, dp, out_size);
 			if (error) {
 				mutex_exit(softnet_lock);
-				return (error);
+				return error;
 			}
 			dp += elem_size;
 			len -= elem_size;
@@ -1890,7 +1890,7 @@ sysctl_inpcblist(SYSCTLFN_ARGS)
 
 	mutex_exit(softnet_lock);
 
-	return (error);
+	return error;
 }
 
 static int
@@ -1901,14 +1901,14 @@ sysctl_tcp_congctl(SYSCTLFN_ARGS)
 	char newname[TCPCC_MAXLEN];
 
 	strlcpy(newname, tcp_congctl_global_name, sizeof(newname) - 1);
-	
+
 	node = *rnode;
 	node.sysctl_data = newname;
 	node.sysctl_size = sizeof(newname);
 
 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
-	
-	if (error || 
+
+	if (error ||
 	    newp == NULL ||
 	    strncmp(newname, tcp_congctl_global_name, sizeof(newname)) == 0)
 		return error;
@@ -1943,7 +1943,7 @@ sysctl_tcp_init_win(SYSCTLFN_ARGS)
 
 static int
 sysctl_tcp_keep(SYSCTLFN_ARGS)
-{  
+{
 	int error;
 	u_int tmp;
 	struct sysctlnode node;
@@ -2284,7 +2284,7 @@ sysctl_net_inet_tcp_setup2(struct sysctl
 		       SYSCTL_DESCR("Number of times to retry ECN setup "
 			       "before disabling ECN on the connection"),
 	    	       NULL, 0, &tcp_ecn_maxretries, 0, CTL_CREATE, CTL_EOL);
-	
+
 	/* SACK gets its own little subtree. */
 	sysctl_createv(clog, 0, NULL, &sack_node,
 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
@@ -2404,7 +2404,7 @@ sysctl_net_inet_tcp_setup2(struct sysctl
 	sysctl_createv(clog, 0, &mslt_node, NULL,
 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
 		       CTLTYPE_INT, "remote_threshold",
-		       SYSCTL_DESCR("RTT estimate value to promote local to remote"), 
+		       SYSCTL_DESCR("RTT estimate value to promote local to remote"),
 		       NULL, 0, &tcp_msl_remote_threshold, 0, CTL_CREATE, CTL_EOL);
 
 	/* vestigial TIME_WAIT tuning subtree */

Reply via email to