sprintf(prntBufLoc,"\n SInit(): ssdInitGen failed to initialize\
implementation specific general information \n");
SDisplay(1,prntBufLoc);
- RETVALUE(RFAILED);
+ return RFAILED;
}
#ifdef SSI_STATIC_MEM_LEAK_DETECTION
ssdStart();
- RETVALUE(ROK);
+ return ROK;
/* clean up code */
ssdDeinitGen();
- RETVALUE(RFAILED);
+ return RFAILED;
}
\f
#if (ERRCLASS & ERRCLS_DEBUG)
SSLOGERROR(ERRCLS_DEBUG, ESS014, ERRZERO,
"Could not destroy the Semaphore");
- RETVALUE(RFAILED);
+ return RFAILED;
#endif
}
#if (ERRCLASS & ERRCLS_DEBUG)
SSLOGERROR(ERRCLS_DEBUG, ESS015, ERRZERO,
"Could not destroy the Semaphore");
- RETVALUE(RFAILED);
+ return RFAILED;
#endif
}
SDestroyLock(&(osCp.logger.bufLock));
#endif /* SS_LOGGER_SUPPORT */
ssdDeinitLog();
- RETVALUE(ROK);
+ return ROK;
}
/* ss001.301: additions */
if(osCp.logger.started == FALSE)
{
(Void)SUnlock(&(osCp.logger.bufLock));
- RETVALUE(ROK);
+ return ROK;
}
/*
* Append the buffer to the global buffer
osCp.logger.curBufSiz += bufSz;
}
(Void)SUnlock(&(osCp.logger.bufLock));
- RETVALUE(ROK);
+ return ROK;
}
#endif /* SS_LOGGER_SUPPORT */
/*
SWrtLogBuf(buf);
#endif /* SS_LOGGER_SUPPORT */
- RETVALUE(ROK);
+ return ROK;
} /* end of SPrint */
ret = ssdError(seq, reason);
- RETVALUE(ret);
+ return (ret);
}
\f
{
TRC1(SFndProcId);
- RETVALUE(osCp.procId);
+ return (osCp.procId);
} /* end of SFndProcId */
\f
if (osCp.procLst.procId[i] == proc)
return i;
- RETVALUE(SS_INV_PROCID_IDX);
+ return (SS_INV_PROCID_IDX);
} /* SGetProcIdIdx */
\f
{
osCp.procLst.procId[i] = proc;
osCp.procLst.free--;
- RETVALUE(ROK);
+ return ROK;
}
/* search for free entry upto idx */
{
osCp.procLst.procId[i] = proc;
osCp.procLst.free--;
- RETVALUE(ROK);
+ return ROK;
}
- RETVALUE(RFAILED);
+ return RFAILED;
} /* SInsProcId */
\f
{
osCp.procLst.procId[i] = SS_INV_PROCID;
osCp.procLst.free++;
- RETVALUE(ROK);
+ return ROK;
}
/* search upto idx */
{
osCp.procLst.procId[i] = SS_INV_PROCID;
osCp.procLst.free++;
- RETVALUE(ROK);
+ return ROK;
}
- RETVALUE(RFAILED);
+ return RFAILED;
} /* SRemProcId */
\f
{
SSLOGERROR(ERRCLS_DEBUG, ESS016, ERRZERO,
"Could not lock system task table");
- RETVALUE(RFAILED);
+ return RFAILED;
}
SS_ACQUIRE_ALL_SEMA(&osCp.tTskTblSem, ret);
#if (ERRCLASS & ERRCLS_DEBUG)
SSLOGERROR(ERRCLS_DEBUG, ESS018, ERRZERO,
"Could not give the Semaphore");
- RETVALUE(RFAILED);
+ return RFAILED;
#endif
}
- RETVALUE(RFAILED);
+ return RFAILED;
}
- RETVALUE(ROK);
+ return ROK;
} /* SLockOsCp */
#if (ERRCLASS & ERRCLS_DEBUG)
SSLOGERROR(ERRCLS_DEBUG, ESS019, ERRZERO,
"Could not give the Semaphore");
- RETVALUE(RFAILED);
+ return RFAILED;
#endif
}
- RETVALUE(ROK);
+ return ROK;
} /* SULockOsCp */
{
SSLOGERROR(ERRCLS_INT_PAR, ESS020, ERRZERO, "number of proc Ids exceeds\
limit");
- RETVALUE(RFAILED);
+ return RFAILED;
}
/* find if the entry exist in the table */
if (pIdLst[i] == SS_INV_PROCID)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS021, ERRZERO, "Invalid proc Ids");
- RETVALUE(RFAILED);
+ return RFAILED;
}
}
#endif
if (SLockOsCp() != ROK)
- RETVALUE(RFAILED);
+ return RFAILED;
#if (ERRCLASS & ERRCLS_INT_PAR)
for (i = 0; i < numPIds; i++)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS022, ERRZERO, "Duplicate proc id");
(Void) SULockOsCp();
- RETVALUE(RFAILED);
+ return RFAILED;
}
if (numPIds > osCp.procLst.free)
SSLOGERROR(ERRCLS_INT_PAR, ESS023, ERRZERO, "Total number of proc id \
exceeds");
(Void) SULockOsCp();
- RETVALUE(RFAILED);
+ return RFAILED;
}
#endif
"Could not insert the proc id");
#endif
(Void) SULockOsCp();
- RETVALUE(RFAILED);
+ return RFAILED;
}
}
/* unlock the table */
if (SULockOsCp() != ROK)
- RETVALUE(RFAILED);
+ return RFAILED;
- RETVALUE(ret);
+ return (ret);
} /* SAddProcIdLst */
\f
#if (ERRCLASS & ERRCLS_INT_PAR)
/* range check */
if (numPIds > SS_MAX_PROCS)
- RETVALUE(RFAILED);
+ return RFAILED;
#endif
if (SLockOsCp() != ROK)
- RETVALUE(RFAILED);
+ return RFAILED;
if (numPIds > (SS_MAX_PROCS - osCp.procLst.free))
{
(Void) SULockOsCp();
- RETVALUE(RFAILED);
+ return RFAILED;
}
/* find if the entry exist in the table */
if (SGetProcIdIdx(pIdLst[i]) == SS_INV_PROCID_IDX)
{
(Void) SULockOsCp();
- RETVALUE(RFAILED);
+ return RFAILED;
}
}
SRemProcId(pIdLst[i]);
if (SULockOsCp() != ROK)
- RETVALUE(RFAILED);
+ return RFAILED;
- RETVALUE(ROK);
+ return ROK;
} /* SRemProcIdLst */
\f
if ((numPIds == NULLP) || (pIdLst == NULLP))
{
SSLOGERROR(ERRCLS_INT_PAR, ESS025, ERRZERO, "Invalid numPIds/pIdLst");
- RETVALUE(RFAILED);
+ return RFAILED;
}
#endif
if (SLockOsCp() != ROK)
- RETVALUE(RFAILED);
+ return RFAILED;
for (i = 0; i < SS_MAX_PROCS; i++)
{
*numPIds = count;
if (SULockOsCp() != ROK)
- RETVALUE(RFAILED);
+ return RFAILED;
if (count == 0)
- RETVALUE(RFAILED);
+ return RFAILED;
- RETVALUE(ROK);
+ return ROK;
} /* SGetProcIdLst */
\f
if ((proc == SS_INV_PROCID) || (ent >= SS_MAX_ENT) || (inst >= SS_MAX_INST))
{
SSLOGERROR(ERRCLS_INT_PAR, ESS026, ERRZERO, "Invalid proc/entity/instance");
- RETVALUE(RFAILED);
+ return RFAILED;
}
#endif
#if (ERRCLASS & ERRCLS_INT_PAR)
SSLOGERROR(ERRCLS_INT_PAR, ESS027, ERRZERO, "Could not get proc table idx");
#endif
- RETVALUE(RFAILED);
+ return RFAILED;
}
idx = osCp.tTskIds[procIdIdx][ent][inst];
if (idx == SS_TSKNC)
{
- RETVALUE(RFAILED);
+ return RFAILED;
}
/* update the CB */
*xxCb = osCp.tTskTbl[idx].xxCb;
/*ss032.103 added a check for NULLP */
if (*xxCb == NULLP)
- RETVALUE(RFAILED);
+ return RFAILED;
- RETVALUE(ROK);
+ return ROK;
} /* SGetXxCb */
#endif /* SS_MULTIPLE_PROCS */
TRC2(SFillEntIds)
memcpy((U8*)osCp.entId, (U8*)entInfo, sizeof(entInfo));
- RETVALUE(ROK);
+ return ROK;
} /* SFillEntIds */
if (letter[1] == 'g' && letter[2] == 'u')
{
*entId = ENTGT;
- RETVALUE(ROK);
+ return ROK;
}
default:
break;
if(letter[count] < 'a' || letter[count] > 'z')
{
*entId = ENTNC;
- RETVALUE(ROK);
+ return ROK;
}
else
{
/* First two letter of file name are alphabets the get the
* entity id from the static data base which is loaded in sFillEntIds() */
*entId = osCp.entId[firstIdx][secondIdx];
- RETVALUE(ROK);
+ return ROK;
} /* SGetEntInd */
#endif /* SS_HISTOGRAM_SUPPORT */
if((retVal = ssdLockNew(lockId, lockType)) != ROK)
{
SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SLockNew(): Failed to aquire the lock\n");
- RETVALUE(RFAILED);
+ return RFAILED;
}
- RETVALUE(ROK);
+ return ROK;
}
/*
if((retVal = ssdInitLockNew(lockId, lockType)) != ROK)
{
SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SInitLockNew(): Initialization of lock Failed\n");
- RETVALUE(RFAILED);
+ return RFAILED;
}
- RETVALUE(ROK);
+ return ROK;
}
/*
if((retVal = ssdUnlockNew(lockId, lockType)) != ROK)
{
SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SUnlockNew(): Failed to release the lock\n");
- RETVALUE(RFAILED);
+ return RFAILED;
}
- RETVALUE(ROK);
+ return ROK;
}
/*
if((retVal = ssdDestroyLockNew(lockId, lockType)) != ROK)
{
SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SDestroyLockNew(): Failed to destroy the lock\n");
- RETVALUE(RFAILED);
+ return RFAILED;
}
- RETVALUE(ROK);
+ return ROK;
}
#endif /* SS_LOCK_SUPPORT */
{
/*ss012.301 : Fix log related issue to suite MT and NS implementations*/
SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SReInitTmr(): Failed to Restart the Tmr\n");
- RETVALUE(RFAILED);
+ return RFAILED;
}
- RETVALUE(ROK);
+ return ROK;
}
/*