mirror of
https://github.com/reactos/reactos.git
synced 2024-12-28 10:04:49 +00:00
[NTDLL][HAL][INFLIB][RTL][NTOS] VOIDify function paramater lists when they indeed don't take any arguments.
svn path=/trunk/; revision=68971
This commit is contained in:
parent
9f74cf45b1
commit
26b7393e00
26 changed files with 60 additions and 58 deletions
|
@ -44,7 +44,7 @@ KiUserApcDispatcher(IN PVOID NormalRoutine,
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
KiRaiseUserExceptionDispatcher()
|
||||
KiRaiseUserExceptionDispatcher(VOID)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return;
|
||||
|
@ -52,7 +52,7 @@ KiRaiseUserExceptionDispatcher()
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
KiUserCallbackDispatcher()
|
||||
KiUserCallbackDispatcher(VOID)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return;
|
||||
|
@ -60,7 +60,7 @@ KiUserCallbackDispatcher()
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
KiUserExceptionDispatcher()
|
||||
KiUserExceptionDispatcher(VOID)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return;
|
||||
|
|
|
@ -395,7 +395,7 @@ LdrQueryImageFileExecutionOptions(IN PUNICODE_STRING SubKey,
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
LdrpEnsureLoaderLockIsHeld()
|
||||
LdrpEnsureLoaderLockIsHeld(VOID)
|
||||
{
|
||||
// Ignored atm
|
||||
}
|
||||
|
|
|
@ -66,7 +66,7 @@ RtlpClearInDbgPrint(VOID)
|
|||
|
||||
KPROCESSOR_MODE
|
||||
NTAPI
|
||||
RtlpGetMode()
|
||||
RtlpGetMode(VOID)
|
||||
{
|
||||
return UserMode;
|
||||
}
|
||||
|
@ -298,8 +298,8 @@ BOOLEAN
|
|||
RtlpCreateAtomHandleTable(PRTL_ATOM_TABLE AtomTable)
|
||||
{
|
||||
RtlInitializeHandleTable(0xCFFF,
|
||||
sizeof(RTL_ATOM_HANDLE),
|
||||
&AtomTable->RtlHandleTable);
|
||||
sizeof(RTL_ATOM_HANDLE),
|
||||
&AtomTable->RtlHandleTable);
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
|
|
@ -53,7 +53,7 @@ DoLinearRegression(
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
HalpInitializeTsc()
|
||||
HalpInitializeTsc(VOID)
|
||||
{
|
||||
ULONG_PTR Flags;
|
||||
KIDTENTRY OldIdtEntry, *IdtPointer;
|
||||
|
|
|
@ -228,7 +228,7 @@ HalpTrap0DHandler(IN PKTRAP_FRAME TrapFrame)
|
|||
|
||||
VOID
|
||||
DECLSPEC_NORETURN
|
||||
HalpTrap06()
|
||||
HalpTrap06(VOID)
|
||||
{
|
||||
/* Restore ES/DS to known good values first */
|
||||
Ke386SetEs(KGDT_R3_DATA | RPL_MASK);
|
||||
|
@ -247,7 +247,7 @@ HalpTrap06()
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
HalpBiosCall()
|
||||
HalpBiosCall(VOID)
|
||||
{
|
||||
/* Must be volatile so it doesn't get optimized away! */
|
||||
volatile KTRAP_FRAME V86TrapFrame;
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
* COPYRIGHT: See COPYING in the top level directory
|
||||
* PROJECT: ReactOS Kernel
|
||||
* FILE: ntoskrnl/include/amd64/asmmacro.S
|
||||
* PURPOSE: ASM macros for for GAS and MASM/ML64
|
||||
* PURPOSE: ASM macros for GAS and MASM/ML64
|
||||
* PROGRAMMERS: Timo Kreuzer (timo.kreuzer@reactos.org)
|
||||
*/
|
||||
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
static int InfpHeapRefCount;
|
||||
|
||||
static VOID
|
||||
CheckHeap()
|
||||
CheckHeap(VOID)
|
||||
{
|
||||
if (NULL == InfpHeap)
|
||||
{
|
||||
|
|
|
@ -1201,7 +1201,7 @@ RtlpDphFreeNodeForTable(IN PRTL_AVL_TABLE Table,
|
|||
}
|
||||
|
||||
NTSTATUS NTAPI
|
||||
RtlpDphInitializeDelayedFreeQueue()
|
||||
RtlpDphInitializeDelayedFreeQueue(VOID)
|
||||
{
|
||||
NTSTATUS Status;
|
||||
|
||||
|
@ -1278,7 +1278,7 @@ RtlpDphFreeDelayedBlocksFromHeap(PDPH_HEAP_ROOT DphRoot,
|
|||
}
|
||||
|
||||
NTSTATUS NTAPI
|
||||
RtlpDphTargetDllsLogicInitialize()
|
||||
RtlpDphTargetDllsLogicInitialize(VOID)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_SUCCESS;
|
||||
|
@ -1428,7 +1428,7 @@ RtlpDphIsNormalFreeHeapBlock(PVOID Block,
|
|||
}
|
||||
|
||||
NTSTATUS NTAPI
|
||||
RtlpDphProcessStartupInitialization()
|
||||
RtlpDphProcessStartupInitialization(VOID)
|
||||
{
|
||||
NTSTATUS Status;
|
||||
PTEB Teb = NtCurrentTeb();
|
||||
|
|
|
@ -90,7 +90,7 @@ ExInitPoolLookasidePointers(VOID)
|
|||
VOID
|
||||
NTAPI
|
||||
INIT_FUNCTION
|
||||
ExpInitLookasideLists()
|
||||
ExpInitLookasideLists(VOID)
|
||||
{
|
||||
ULONG i;
|
||||
|
||||
|
|
|
@ -196,7 +196,7 @@ FsRtlGetTunnelParameterValue(
|
|||
INIT_FUNCTION
|
||||
VOID
|
||||
NTAPI
|
||||
FsRtlInitializeTunnels()
|
||||
FsRtlInitializeTunnels(VOID)
|
||||
{
|
||||
ULONG TunnelEntries;
|
||||
UNICODE_STRING MaximumTunnelEntryAgeInSeconds = RTL_CONSTANT_STRING(L"MaximumTunnelEntryAgeInSeconds");
|
||||
|
|
|
@ -260,7 +260,7 @@ KeQueryInterruptHandler(IN ULONG Vector)
|
|||
|
||||
VOID
|
||||
FORCEINLINE
|
||||
KiSendEOI()
|
||||
KiSendEOI(VOID)
|
||||
{
|
||||
/* Write 0 to the apic EOI register */
|
||||
*((volatile ULONG*)APIC_EOI_REGISTER) = 0;
|
||||
|
|
|
@ -52,7 +52,7 @@ Ke386SaveFpuState(IN PFX_SAVE_AREA SaveArea)
|
|||
|
||||
FORCEINLINE
|
||||
USHORT
|
||||
Ke386GetLocalDescriptorTable()
|
||||
Ke386GetLocalDescriptorTable(VOID)
|
||||
{
|
||||
USHORT Ldt;
|
||||
__asm__("sldt %0\n\t"
|
||||
|
|
|
@ -332,7 +332,7 @@ IopCreateObjectTypes(VOID)
|
|||
BOOLEAN
|
||||
INIT_FUNCTION
|
||||
NTAPI
|
||||
IopCreateRootDirectories()
|
||||
IopCreateRootDirectories(VOID)
|
||||
{
|
||||
OBJECT_ATTRIBUTES ObjectAttributes;
|
||||
UNICODE_STRING DirName;
|
||||
|
|
|
@ -133,7 +133,7 @@ GdbGetChar(VOID)
|
|||
|
||||
/* scan for the sequence $<data>#<Checksum> */
|
||||
PCHAR
|
||||
GspGetPacket()
|
||||
GspGetPacket(VOID)
|
||||
{
|
||||
PCHAR Buffer = &GspInBuffer[0];
|
||||
CHAR Checksum;
|
||||
|
|
|
@ -181,7 +181,7 @@ GdbGetChar(VOID)
|
|||
/* scan for the sequence $<data>#<Checksum> */
|
||||
|
||||
PCHAR
|
||||
GspGetPacket()
|
||||
GspGetPacket(VOID)
|
||||
{
|
||||
PCHAR Buffer = &GspInBuffer[0];
|
||||
CHAR Checksum;
|
||||
|
|
|
@ -1236,7 +1236,7 @@ KdbpCallMainLoop(VOID)
|
|||
* Disables interrupts, releases display ownership, ...
|
||||
*/
|
||||
static VOID
|
||||
KdbpInternalEnter()
|
||||
KdbpInternalEnter(VOID)
|
||||
{
|
||||
PETHREAD Thread;
|
||||
PVOID SavedInitialStack, SavedStackBase, SavedKernelStack;
|
||||
|
|
|
@ -3512,7 +3512,7 @@ KdbpCliModuleLoaded(
|
|||
* call this function if KdbInitFileBuffer is not NULL.
|
||||
*/
|
||||
VOID
|
||||
KdbpCliInterpretInitFile()
|
||||
KdbpCliInterpretInitFile(VOID)
|
||||
{
|
||||
PCHAR p1, p2;
|
||||
INT i;
|
||||
|
@ -3561,7 +3561,7 @@ KdbpCliInterpretInitFile()
|
|||
* Reads the KDBinit file from the SystemRoot\System32\drivers\etc directory and executes it.
|
||||
*/
|
||||
VOID
|
||||
KdbpCliInit()
|
||||
KdbpCliInit(VOID)
|
||||
{
|
||||
NTSTATUS Status;
|
||||
OBJECT_ATTRIBUTES ObjectAttributes;
|
||||
|
|
|
@ -41,19 +41,21 @@ extern int syscall_start[], syscall_end, KiDecrementerTrapHandler[],
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
KiSetupSyscallHandler()
|
||||
KiSetupSyscallHandler(VOID)
|
||||
{
|
||||
paddr_t handler_target;
|
||||
int *source;
|
||||
for(source = syscall_start, handler_target = 0xc00;
|
||||
source < &syscall_end;
|
||||
source++, handler_target += sizeof(int))
|
||||
SetPhys(handler_target, *source);
|
||||
source < &syscall_end;
|
||||
source++, handler_target += sizeof(int))
|
||||
{
|
||||
SetPhys(handler_target, *source);
|
||||
}
|
||||
}
|
||||
|
||||
VOID
|
||||
NTAPI
|
||||
KiSetupDecrementerTrap()
|
||||
KiSetupDecrementerTrap(VOID)
|
||||
{
|
||||
paddr_t handler_target;
|
||||
int *source;
|
||||
|
@ -165,7 +167,7 @@ KiInitializeKernel(IN PKPROCESS InitProcess,
|
|||
0,
|
||||
0xFFFFFFFF,
|
||||
&PageDirectory,
|
||||
TRUE);
|
||||
TRUE);
|
||||
InitProcess->QuantumReset = MAXCHAR;
|
||||
}
|
||||
else
|
||||
|
@ -270,26 +272,26 @@ KiSystemStartupReal(IN PLOADER_PARAMETER_BLOCK LoaderBlock)
|
|||
Cpu = KeNumberProcessors;
|
||||
if (!Cpu)
|
||||
{
|
||||
/* We'll allocate a page from the end of the kernel area for KPCR. This code will probably
|
||||
* change when we get SMP support.
|
||||
*/
|
||||
info[0].phys = 0;
|
||||
info[0].proc = 2;
|
||||
info[0].addr = (vaddr_t)Pcr;
|
||||
info[0].flags = MMU_KRW_UR;
|
||||
info[1].phys = 0;
|
||||
info[1].proc = 2;
|
||||
info[1].addr = ((vaddr_t)Pcr) + (1 << PAGE_SHIFT);
|
||||
info[1].flags = MMU_KRW_UR;
|
||||
info[2].phys = 0;
|
||||
info[2].proc = 2;
|
||||
info[2].addr = (vaddr_t)KI_USER_SHARED_DATA;
|
||||
info[2].flags = MMU_KRW_UR;
|
||||
/* We'll allocate a page from the end of the kernel area for KPCR. This code will probably
|
||||
* change when we get SMP support.
|
||||
*/
|
||||
info[0].phys = 0;
|
||||
info[0].proc = 2;
|
||||
info[0].addr = (vaddr_t)Pcr;
|
||||
info[0].flags = MMU_KRW_UR;
|
||||
info[1].phys = 0;
|
||||
info[1].proc = 2;
|
||||
info[1].addr = ((vaddr_t)Pcr) + (1 << PAGE_SHIFT);
|
||||
info[1].flags = MMU_KRW_UR;
|
||||
info[2].phys = 0;
|
||||
info[2].proc = 2;
|
||||
info[2].addr = (vaddr_t)KI_USER_SHARED_DATA;
|
||||
info[2].flags = MMU_KRW_UR;
|
||||
info[3].phys = 0;
|
||||
info[3].proc = 2;
|
||||
info[3].addr = (vaddr_t)KIP0PCRADDRESS;
|
||||
info[3].flags = MMU_KRW_UR;
|
||||
MmuMapPage(info, 4);
|
||||
MmuMapPage(info, 4);
|
||||
}
|
||||
|
||||
/* Skip initial setup if this isn't the Boot CPU */
|
||||
|
@ -326,7 +328,7 @@ AppCpuInit:
|
|||
/* Check for break-in */
|
||||
if (KdPollBreakIn())
|
||||
{
|
||||
DbgBreakPointWithStatus(DBG_STATUS_CONTROL_C);
|
||||
DbgBreakPointWithStatus(DBG_STATUS_CONTROL_C);
|
||||
}
|
||||
|
||||
/* Raise to HIGH_LEVEL */
|
||||
|
@ -347,7 +349,7 @@ KiInitMachineDependent(VOID)
|
|||
{
|
||||
}
|
||||
|
||||
void abort()
|
||||
void abort(VOID)
|
||||
{
|
||||
KeBugCheck(KMODE_EXCEPTION_NOT_HANDLED);
|
||||
while(1);
|
||||
|
|
|
@ -31,7 +31,7 @@ Ke386CallBios(IN ULONG Int,
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
KiUnexpectedInterrupt()
|
||||
KiUnexpectedInterrupt(VOID)
|
||||
{
|
||||
}
|
||||
|
||||
|
|
|
@ -42,7 +42,7 @@ MMPTE MmDecommittedPte = {{MM_DECOMMIT << MM_PTE_SOFTWARE_PROTECTION_BITS}};
|
|||
VOID
|
||||
NTAPI
|
||||
INIT_FUNCTION
|
||||
MiInitializeSessionSpaceLayout()
|
||||
MiInitializeSessionSpaceLayout(VOID)
|
||||
{
|
||||
//
|
||||
// Set the size of session view, pool, and image
|
||||
|
|
|
@ -37,7 +37,7 @@ PETHREAD MiExpansionLockOwner;
|
|||
|
||||
FORCEINLINE
|
||||
KIRQL
|
||||
MiAcquireExpansionLock()
|
||||
MiAcquireExpansionLock(VOID)
|
||||
{
|
||||
KIRQL OldIrql;
|
||||
|
||||
|
|
|
@ -588,7 +588,7 @@ MmFreeSpecialPool(PVOID P)
|
|||
|
||||
VOID
|
||||
NTAPI
|
||||
MiTestSpecialPool()
|
||||
MiTestSpecialPool(VOID)
|
||||
{
|
||||
ULONG i;
|
||||
PVOID p1, p2[100];
|
||||
|
|
|
@ -67,7 +67,7 @@ MiCreateArm3StaticMemoryArea(PVOID BaseAddress, ULONG Size, BOOLEAN Executable)
|
|||
VOID
|
||||
INIT_FUNCTION
|
||||
NTAPI
|
||||
MiInitSystemMemoryAreas()
|
||||
MiInitSystemMemoryAreas(VOID)
|
||||
{
|
||||
//
|
||||
// Create all the static memory areas.
|
||||
|
|
|
@ -208,7 +208,7 @@ PspReapRoutine(IN PVOID Context)
|
|||
#if DBG
|
||||
VOID
|
||||
NTAPI
|
||||
PspCheckProcessList()
|
||||
PspCheckProcessList(VOID)
|
||||
{
|
||||
PLIST_ENTRY Entry;
|
||||
|
||||
|
@ -1066,7 +1066,7 @@ BOOLEAN
|
|||
NTAPI
|
||||
PspIsProcessExiting(IN PEPROCESS Process)
|
||||
{
|
||||
return Process->Flags & PSF_PROCESS_EXITING_BIT;
|
||||
return Process->Flags & PSF_PROCESS_EXITING_BIT;
|
||||
}
|
||||
|
||||
VOID
|
||||
|
|
|
@ -395,7 +395,7 @@ PspInitializeSystemDll(VOID)
|
|||
BOOLEAN
|
||||
NTAPI
|
||||
INIT_FUNCTION
|
||||
PspInitPhase1()
|
||||
PspInitPhase1(VOID)
|
||||
{
|
||||
/* Initialize the System DLL and return status of operation */
|
||||
if (!NT_SUCCESS(PspInitializeSystemDll())) return FALSE;
|
||||
|
|
|
@ -92,7 +92,7 @@ RtlpClearInDbgPrint(VOID)
|
|||
|
||||
KPROCESSOR_MODE
|
||||
NTAPI
|
||||
RtlpGetMode()
|
||||
RtlpGetMode(VOID)
|
||||
{
|
||||
return KernelMode;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue