diff --git a/reactos/lib/rtl/avlsupp.c b/reactos/lib/rtl/avlsupp.c index 3360418426c..6d303d19a68 100644 --- a/reactos/lib/rtl/avlsupp.c +++ b/reactos/lib/rtl/avlsupp.c @@ -27,8 +27,8 @@ C_ASSERT(RtlBalancedAvlTree == 0); /* FUNCTIONS ******************************************************************/ -TABLE_SEARCH_RESULT FORCEINLINE +TABLE_SEARCH_RESULT RtlpFindAvlTableNodeOrParent(IN PRTL_AVL_TABLE Table, IN PVOID Buffer, OUT PRTL_BALANCED_LINKS *NodeOrParent) @@ -94,8 +94,8 @@ RtlpFindAvlTableNodeOrParent(IN PRTL_AVL_TABLE Table, } } -VOID FORCEINLINE +VOID RtlPromoteAvlTreeNode(IN PRTL_BALANCED_LINKS Node) { PRTL_BALANCED_LINKS ParentNode, SuperParentNode; @@ -122,8 +122,8 @@ RtlPromoteAvlTreeNode(IN PRTL_BALANCED_LINKS Node) RtlSetParent(Node, SuperParentNode); } -BOOLEAN FORCEINLINE +BOOLEAN RtlpRebalanceAvlTreeNode(IN PRTL_BALANCED_LINKS Node) { PRTL_BALANCED_LINKS ChildNode, SubChildNode; @@ -203,8 +203,8 @@ RtlpRebalanceAvlTreeNode(IN PRTL_BALANCED_LINKS Node) return TRUE; } -VOID FORCEINLINE +VOID RtlpInsertAvlTreeNode(IN PRTL_AVL_TABLE Table, IN PRTL_BALANCED_LINKS NewNode, IN OUT PVOID NodeOrParent, @@ -290,8 +290,8 @@ RtlpInsertAvlTreeNode(IN PRTL_AVL_TABLE Table, } } -VOID FORCEINLINE +VOID RtlpDeleteAvlTreeNode(IN PRTL_AVL_TABLE Table, IN PRTL_BALANCED_LINKS Node) { diff --git a/reactos/ntoskrnl/fsrtl/notify.c b/reactos/ntoskrnl/fsrtl/notify.c index 50a0410eac5..f70a598902a 100644 --- a/reactos/ntoskrnl/fsrtl/notify.c +++ b/reactos/ntoskrnl/fsrtl/notify.c @@ -83,8 +83,8 @@ FsRtlIsNotifyOnList(IN PLIST_ENTRY NotifyList, return NULL; } -VOID FORCEINLINE +VOID FsRtlNotifyAcquireFastMutex(IN PREAL_NOTIFY_SYNC RealNotifySync) { ULONG_PTR CurrentThread = (ULONG_PTR)KeGetCurrentThread(); @@ -233,8 +233,8 @@ FsRtlNotifyCompleteIrpList(IN PNOTIFY_CHANGE NotifyChange, } } -VOID FORCEINLINE +VOID FsRtlNotifyReleaseFastMutex(IN PREAL_NOTIFY_SYNC RealNotifySync) { RealNotifySync->OwnerCount--; diff --git a/reactos/ntoskrnl/include/internal/i386/ke.h b/reactos/ntoskrnl/include/internal/i386/ke.h index f0343c521a8..d461a01187e 100644 --- a/reactos/ntoskrnl/include/internal/i386/ke.h +++ b/reactos/ntoskrnl/include/internal/i386/ke.h @@ -553,8 +553,8 @@ extern CHAR KiSystemCallExit2[]; // // Returns a thread's FPU save area // -PFX_SAVE_AREA FORCEINLINE +PFX_SAVE_AREA KiGetThreadNpxArea(IN PKTHREAD Thread) { return (PFX_SAVE_AREA)((ULONG_PTR)Thread->InitialStack - sizeof(FX_SAVE_AREA)); @@ -614,9 +614,9 @@ Ke386SanitizeDr(IN PVOID DrAddress, // // Exception with no arguments // -VOID FORCEINLINE DECLSPEC_NORETURN +VOID KiDispatchException0Args(IN NTSTATUS Code, IN ULONG_PTR Address, IN PKTRAP_FRAME TrapFrame) @@ -628,9 +628,9 @@ KiDispatchException0Args(IN NTSTATUS Code, // // Exception with one argument // -VOID FORCEINLINE DECLSPEC_NORETURN +VOID KiDispatchException1Args(IN NTSTATUS Code, IN ULONG_PTR Address, IN ULONG P1, @@ -643,9 +643,9 @@ KiDispatchException1Args(IN NTSTATUS Code, // // Exception with two arguments // -VOID FORCEINLINE DECLSPEC_NORETURN +VOID KiDispatchException2Args(IN NTSTATUS Code, IN ULONG_PTR Address, IN ULONG P1, @@ -676,8 +676,8 @@ KiDispatchException2Args(IN NTSTATUS Code, * */ #ifdef __GNUC__ -NTSTATUS FORCEINLINE +NTSTATUS KiSystemCallTrampoline(IN PVOID Handler, IN PVOID Arguments, IN ULONG StackBytes) @@ -702,8 +702,8 @@ KiSystemCallTrampoline(IN PVOID Handler, return Result; } #elif defined(_MSC_VER) -NTSTATUS FORCEINLINE +NTSTATUS KiSystemCallTrampoline(IN PVOID Handler, IN PVOID Arguments, IN ULONG StackBytes) @@ -729,8 +729,8 @@ KiSystemCallTrampoline(IN PVOID Handler, // // Checks for pending APCs // -VOID FORCEINLINE +VOID KiCheckForApcDelivery(IN PKTRAP_FRAME TrapFrame) { PKTHREAD Thread; @@ -767,8 +767,8 @@ KiCheckForApcDelivery(IN PKTRAP_FRAME TrapFrame) // Converts a base thread to a GUI thread // #ifdef __GNUC__ -NTSTATUS FORCEINLINE +NTSTATUS KiConvertToGuiThread(VOID) { NTSTATUS Result; @@ -814,8 +814,8 @@ KiConvertToGuiThread(VOID); // // Switches from boot loader to initial kernel stack // -VOID FORCEINLINE +VOID KiSwitchToBootStack(IN ULONG_PTR InitialStack) { /* We have to switch to a new stack before continuing kernel initialization */ @@ -849,9 +849,9 @@ KiSwitchToBootStack(IN ULONG_PTR InitialStack) // // Emits the iret instruction for C code // +FORCEINLINE DECLSPEC_NORETURN VOID -FORCEINLINE KiIret(VOID) { #if defined(__GNUC__) @@ -874,8 +874,8 @@ KiIret(VOID) // Normally this is done by the HAL, but on x86 as an optimization, the kernel // initiates the end by calling back into the HAL and exiting the trap here. // -VOID FORCEINLINE +VOID KiEndInterrupt(IN KIRQL Irql, IN PKTRAP_FRAME TrapFrame) { @@ -890,8 +890,8 @@ KiEndInterrupt(IN KIRQL Irql, // // PERF Code // -VOID FORCEINLINE +VOID Ki386PerfEnd(VOID) { extern ULONGLONG BootCyclesEnd, BootCycles; diff --git a/reactos/ntoskrnl/include/internal/i386/trap_x.h b/reactos/ntoskrnl/include/internal/i386/trap_x.h index 88102a22d9f..86f7c77d02e 100644 --- a/reactos/ntoskrnl/include/internal/i386/trap_x.h +++ b/reactos/ntoskrnl/include/internal/i386/trap_x.h @@ -19,8 +19,8 @@ // // Helper Code // -BOOLEAN FORCEINLINE +BOOLEAN KiUserTrap(IN PKTRAP_FRAME TrapFrame) { /* Anything else but Ring 0 is Ring 3 */ @@ -30,8 +30,8 @@ KiUserTrap(IN PKTRAP_FRAME TrapFrame) // // Debug Macros // -VOID FORCEINLINE +VOID KiDumpTrapFrame(IN PKTRAP_FRAME TrapFrame) { /* Dump the whole thing */ @@ -100,8 +100,8 @@ KiFillTrapFrameDebug(IN PKTRAP_FRAME TrapFrame) extern BOOLEAN StopChecking; -VOID FORCEINLINE +VOID KiExitTrapDebugChecks(IN PKTRAP_FRAME TrapFrame, IN BOOLEAN SkipPreviousMode) { @@ -180,8 +180,8 @@ KiExitTrapDebugChecks(IN PKTRAP_FRAME TrapFrame, StopChecking = FALSE; } -VOID FORCEINLINE +VOID KiExitSystemCallDebugChecks(IN ULONG SystemCall, IN PKTRAP_FRAME TrapFrame) { @@ -248,8 +248,8 @@ extern PFAST_SYSTEM_CALL_EXIT KiFastCallExitHandler; // // Save user mode debug registers and restore kernel values // -VOID FORCEINLINE +VOID KiHandleDebugRegistersOnTrapEntry( IN PKTRAP_FRAME TrapFrame) { @@ -275,8 +275,8 @@ KiHandleDebugRegistersOnTrapEntry( __writedr(7, Prcb->ProcessorState.SpecialRegisters.KernelDr7); } -VOID FORCEINLINE +VOID KiHandleDebugRegistersOnTrapExit( PKTRAP_FRAME TrapFrame) { @@ -295,9 +295,9 @@ KiHandleDebugRegistersOnTrapExit( // // Virtual 8086 Mode Optimized Trap Exit // -VOID FORCEINLINE DECLSPEC_NORETURN +VOID KiExitV86Trap(IN PKTRAP_FRAME TrapFrame) { PKTHREAD Thread; @@ -342,8 +342,8 @@ KiExitV86Trap(IN PKTRAP_FRAME TrapFrame) // // Virtual 8086 Mode Optimized Trap Entry // -VOID FORCEINLINE +VOID KiEnterV86Trap(IN PKTRAP_FRAME TrapFrame) { /* Save exception list */ @@ -361,8 +361,8 @@ KiEnterV86Trap(IN PKTRAP_FRAME TrapFrame) // // Interrupt Trap Entry // -VOID FORCEINLINE +VOID KiEnterInterruptTrap(IN PKTRAP_FRAME TrapFrame) { /* Save exception list and terminate it */ @@ -391,8 +391,8 @@ KiEnterInterruptTrap(IN PKTRAP_FRAME TrapFrame) // // Generic Trap Entry // -VOID FORCEINLINE +VOID KiEnterTrap(IN PKTRAP_FRAME TrapFrame) { /* Save exception list */ diff --git a/reactos/ntoskrnl/include/internal/ke_x.h b/reactos/ntoskrnl/include/internal/ke_x.h index 9fb5e09cd1f..5b2dbc900ca 100644 --- a/reactos/ntoskrnl/include/internal/ke_x.h +++ b/reactos/ntoskrnl/include/internal/ke_x.h @@ -852,8 +852,8 @@ KiCheckAlertability(IN PKTHREAD Thread, return STATUS_WAIT_0; } -ULONG FORCEINLINE +ULONG KiComputeTimerTableIndex(IN ULONGLONG DueTime) { return (DueTime / KeMaximumIncrement) & (TIMER_TABLE_SIZE - 1); diff --git a/reactos/ntoskrnl/include/internal/se.h b/reactos/ntoskrnl/include/internal/se.h index b045d428138..8ff47fd400f 100644 --- a/reactos/ntoskrnl/include/internal/se.h +++ b/reactos/ntoskrnl/include/internal/se.h @@ -24,8 +24,8 @@ typedef struct _KNOWN_COMPOUND_ACE ULONG SidStart; } KNOWN_COMPOUND_ACE, *PKNOWN_COMPOUND_ACE; -PSID FORCEINLINE +PSID SepGetGroupFromDescriptor(PVOID _Descriptor) { PISECURITY_DESCRIPTOR Descriptor = (PISECURITY_DESCRIPTOR)_Descriptor; @@ -43,8 +43,8 @@ SepGetGroupFromDescriptor(PVOID _Descriptor) } } -PSID FORCEINLINE +PSID SepGetOwnerFromDescriptor(PVOID _Descriptor) { PISECURITY_DESCRIPTOR Descriptor = (PISECURITY_DESCRIPTOR)_Descriptor; @@ -62,8 +62,8 @@ SepGetOwnerFromDescriptor(PVOID _Descriptor) } } -PACL FORCEINLINE +PACL SepGetDaclFromDescriptor(PVOID _Descriptor) { PISECURITY_DESCRIPTOR Descriptor = (PISECURITY_DESCRIPTOR)_Descriptor; @@ -83,8 +83,8 @@ SepGetDaclFromDescriptor(PVOID _Descriptor) } } -PACL FORCEINLINE +PACL SepGetSaclFromDescriptor(PVOID _Descriptor) { PISECURITY_DESCRIPTOR Descriptor = (PISECURITY_DESCRIPTOR)_Descriptor; diff --git a/reactos/ntoskrnl/io/iomgr/volume.c b/reactos/ntoskrnl/io/iomgr/volume.c index 98163904ef2..114def8aeb4 100644 --- a/reactos/ntoskrnl/io/iomgr/volume.c +++ b/reactos/ntoskrnl/io/iomgr/volume.c @@ -277,8 +277,8 @@ IopMountInitializeVpb(IN PDEVICE_OBJECT DeviceObject, /* * @implemented */ -VOID FORCEINLINE +VOID IopNotifyFileSystemChange(IN PDEVICE_OBJECT DeviceObject, IN BOOLEAN DriverActive) { diff --git a/reactos/ntoskrnl/ke/i386/irqobj.c b/reactos/ntoskrnl/ke/i386/irqobj.c index 734872cec8e..dcb4a1e6f10 100644 --- a/reactos/ntoskrnl/ke/i386/irqobj.c +++ b/reactos/ntoskrnl/ke/i386/irqobj.c @@ -129,9 +129,9 @@ KiConnectVectorToInterrupt(IN PKINTERRUPT Interrupt, KeRegisterInterruptHandler(Interrupt->Vector, Handler); } -VOID FORCEINLINE DECLSPEC_NORETURN +VOID KiExitInterrupt(IN PKTRAP_FRAME TrapFrame, IN KIRQL OldIrql, IN BOOLEAN Spurious) diff --git a/reactos/ntoskrnl/ke/i386/traphdlr.c b/reactos/ntoskrnl/ke/i386/traphdlr.c index 42422838a58..d98109a21ac 100644 --- a/reactos/ntoskrnl/ke/i386/traphdlr.c +++ b/reactos/ntoskrnl/ke/i386/traphdlr.c @@ -57,8 +57,8 @@ BOOLEAN StopChecking = FALSE; /* TRAP EXIT CODE *************************************************************/ -BOOLEAN FORCEINLINE +BOOLEAN KiVdmTrap(IN PKTRAP_FRAME TrapFrame) { /* Either the V8086 flag is on, or this is user-mode with a VDM */ @@ -66,16 +66,16 @@ KiVdmTrap(IN PKTRAP_FRAME TrapFrame) ((KiUserTrap(TrapFrame)) && (PsGetCurrentProcess()->VdmObjects))); } -BOOLEAN FORCEINLINE +BOOLEAN KiV86Trap(IN PKTRAP_FRAME TrapFrame) { /* Check if the V8086 flag is on */ return ((TrapFrame->EFlags & EFLAGS_V86_MASK) != 0); } -BOOLEAN FORCEINLINE +BOOLEAN KiIsFrameEdited(IN PKTRAP_FRAME TrapFrame) { /* An edited frame changes esp. It is marked by clearing the bits @@ -83,8 +83,8 @@ KiIsFrameEdited(IN PKTRAP_FRAME TrapFrame) return ((TrapFrame->SegCs & FRAME_EDITED) == 0); } -VOID FORCEINLINE +VOID KiCommonExit(IN PKTRAP_FRAME TrapFrame, BOOLEAN SkipPreviousMode) { /* Disable interrupts until we return */ @@ -1521,9 +1521,9 @@ KiDbgPostServiceHook(ULONG SystemCallNumber, ULONG_PTR Result) return Result; } +FORCEINLINE DECLSPEC_NORETURN VOID -FORCEINLINE KiSystemCall(IN PKTRAP_FRAME TrapFrame, IN PVOID Arguments) { diff --git a/reactos/ntoskrnl/ke/time.c b/reactos/ntoskrnl/ke/time.c index e6bdd9ed4d9..76b125321fc 100644 --- a/reactos/ntoskrnl/ke/time.c +++ b/reactos/ntoskrnl/ke/time.c @@ -20,8 +20,8 @@ BOOLEAN KiTimeAdjustmentEnabled = FALSE; /* FUNCTIONS ******************************************************************/ -VOID FORCEINLINE +VOID KiWriteSystemTime(volatile KSYSTEM_TIME *SystemTime, ULARGE_INTEGER NewTime) { #ifdef _WIN64 @@ -35,8 +35,8 @@ KiWriteSystemTime(volatile KSYSTEM_TIME *SystemTime, ULARGE_INTEGER NewTime) #endif } -VOID FORCEINLINE +VOID KiCheckForTimerExpiration( PKPRCB Prcb, PKTRAP_FRAME TrapFrame, diff --git a/reactos/ntoskrnl/mm/ARM3/miarm.h b/reactos/ntoskrnl/mm/ARM3/miarm.h index f2f39f9e2d2..428e0e31834 100644 --- a/reactos/ntoskrnl/mm/ARM3/miarm.h +++ b/reactos/ntoskrnl/mm/ARM3/miarm.h @@ -731,8 +731,8 @@ extern ULONG_PTR MmSubsectionBase; extern LARGE_INTEGER MmCriticalSectionTimeout; extern LIST_ENTRY MmWorkingSetExpansionHead; -BOOLEAN FORCEINLINE +BOOLEAN MiIsMemoryTypeFree(TYPE_OF_MEMORY MemoryType) { return ((MemoryType == LoaderFree) || @@ -741,8 +741,8 @@ MiIsMemoryTypeFree(TYPE_OF_MEMORY MemoryType) (MemoryType == LoaderOsloaderStack)); } -BOOLEAN FORCEINLINE +BOOLEAN MiIsMemoryTypeInvisible(TYPE_OF_MEMORY MemoryType) { return ((MemoryType == LoaderFirmwarePermanent) || @@ -752,44 +752,44 @@ MiIsMemoryTypeInvisible(TYPE_OF_MEMORY MemoryType) } #ifdef _M_AMD64 -BOOLEAN FORCEINLINE +BOOLEAN MiIsUserPxe(PVOID Address) { return ((ULONG_PTR)Address >> 7) == 0x1FFFFEDF6FB7DA0ULL; } -BOOLEAN FORCEINLINE +BOOLEAN MiIsUserPpe(PVOID Address) { return ((ULONG_PTR)Address >> 16) == 0xFFFFF6FB7DA0ULL; } -BOOLEAN FORCEINLINE +BOOLEAN MiIsUserPde(PVOID Address) { return ((ULONG_PTR)Address >> 25) == 0x7FFFFB7DA0ULL; } -BOOLEAN FORCEINLINE +BOOLEAN MiIsUserPte(PVOID Address) { return ((ULONG_PTR)Address >> 34) == 0x3FFFFDA0ULL; } #else -BOOLEAN FORCEINLINE +BOOLEAN MiIsUserPde(PVOID Address) { return ((Address >= (PVOID)MiAddressToPde(NULL)) && (Address <= (PVOID)MiHighestUserPde)); } -BOOLEAN FORCEINLINE +BOOLEAN MiIsUserPte(PVOID Address) { return (Address <= (PVOID)MiHighestUserPte); @@ -799,8 +799,8 @@ MiIsUserPte(PVOID Address) // // Figures out the hardware bits for a PTE // -ULONG_PTR FORCEINLINE +ULONG_PTR MiDetermineUserGlobalPteMask(IN PVOID PointerPte) { MMPTE TempPte; @@ -991,8 +991,8 @@ MI_IS_PHYSICAL_ADDRESS(IN PVOID Address) // // Writes a valid PTE // -VOID FORCEINLINE +VOID MI_WRITE_VALID_PTE(IN PMMPTE PointerPte, IN MMPTE TempPte) { @@ -1005,8 +1005,8 @@ MI_WRITE_VALID_PTE(IN PMMPTE PointerPte, // // Writes an invalid PTE // -VOID FORCEINLINE +VOID MI_WRITE_INVALID_PTE(IN PMMPTE PointerPte, IN MMPTE InvalidPte) { @@ -1018,8 +1018,8 @@ MI_WRITE_INVALID_PTE(IN PMMPTE PointerPte, // // Writes a valid PDE // -VOID FORCEINLINE +VOID MI_WRITE_VALID_PDE(IN PMMPDE PointerPde, IN MMPDE TempPde) { @@ -1032,8 +1032,8 @@ MI_WRITE_VALID_PDE(IN PMMPDE PointerPde, // // Writes an invalid PDE // -VOID FORCEINLINE +VOID MI_WRITE_INVALID_PDE(IN PMMPDE PointerPde, IN MMPDE InvalidPde) { @@ -1082,8 +1082,8 @@ MI_WS_OWNER(IN PEPROCESS Process) // // New ARM3<->RosMM PAGE Architecture // -BOOLEAN FORCEINLINE +BOOLEAN MiIsRosSectionObject(IN PVOID Section) { PROS_SECTION_OBJECT RosSection = Section; @@ -2294,8 +2294,8 @@ MiMakePdeExistAndMakeValid( // then we'd like to have our own code to grab a free page and zero it out, by // using MiRemoveAnyPage. This macro implements this. // -PFN_NUMBER FORCEINLINE +PFN_NUMBER MiRemoveZeroPageSafe(IN ULONG Color) { if (MmFreePagesByColor[ZeroedPageList][Color].Flink != LIST_HEAD) return MiRemoveZeroPage(Color); diff --git a/reactos/ntoskrnl/mm/ARM3/miavl.h b/reactos/ntoskrnl/mm/ARM3/miavl.h index b16c84eea67..6c514baefab 100644 --- a/reactos/ntoskrnl/mm/ARM3/miavl.h +++ b/reactos/ntoskrnl/mm/ARM3/miavl.h @@ -28,8 +28,8 @@ #define PRTL_BALANCED_LINKS PMMADDRESS_NODE #define MI_ASSERT(x) ASSERT(x) -VOID FORCEINLINE +VOID RtlpCopyAvlNodeData(IN PRTL_BALANCED_LINKS Node1, IN PRTL_BALANCED_LINKS Node2) { @@ -38,8 +38,8 @@ RtlpCopyAvlNodeData(IN PRTL_BALANCED_LINKS Node1, Node1->RightChild = Node2->RightChild; } -RTL_GENERIC_COMPARE_RESULTS FORCEINLINE +RTL_GENERIC_COMPARE_RESULTS RtlpAvlCompareRoutine(IN PRTL_AVL_TABLE Table, IN PVOID Buffer, IN PVOID UserData) @@ -60,73 +60,73 @@ RtlpAvlCompareRoutine(IN PRTL_AVL_TABLE Table, } } -VOID FORCEINLINE +VOID RtlSetParent(IN PRTL_BALANCED_LINKS Node, IN PRTL_BALANCED_LINKS Parent) { Node->u1.Parent = (PRTL_BALANCED_LINKS)((ULONG_PTR)Parent | (Node->u1.Balance & 0x3)); } -VOID FORCEINLINE +VOID RtlSetBalance(IN PRTL_BALANCED_LINKS Node, IN SCHAR Balance) { Node->u1.Balance = Balance; } -SCHAR FORCEINLINE +SCHAR RtlBalance(IN PRTL_BALANCED_LINKS Node) { return (SCHAR)Node->u1.Balance; } -PRTL_BALANCED_LINKS FORCEINLINE +PRTL_BALANCED_LINKS RtlParentAvl(IN PRTL_BALANCED_LINKS Node) { return (PRTL_BALANCED_LINKS)((ULONG_PTR)Node->u1.Parent & ~3); } -BOOLEAN FORCEINLINE +BOOLEAN RtlIsRootAvl(IN PRTL_BALANCED_LINKS Node) { return (RtlParentAvl(Node) == Node); } -PRTL_BALANCED_LINKS FORCEINLINE +PRTL_BALANCED_LINKS RtlRightChildAvl(IN PRTL_BALANCED_LINKS Node) { return Node->RightChild; } -PRTL_BALANCED_LINKS FORCEINLINE +PRTL_BALANCED_LINKS RtlLeftChildAvl(IN PRTL_BALANCED_LINKS Node) { return Node->LeftChild; } -BOOLEAN FORCEINLINE +BOOLEAN RtlIsLeftChildAvl(IN PRTL_BALANCED_LINKS Node) { return (RtlLeftChildAvl(RtlParentAvl(Node)) == Node); } -BOOLEAN FORCEINLINE +BOOLEAN RtlIsRightChildAvl(IN PRTL_BALANCED_LINKS Node) { return (RtlRightChildAvl(RtlParentAvl(Node)) == Node); } -VOID FORCEINLINE +VOID RtlInsertAsLeftChildAvl(IN PRTL_BALANCED_LINKS Parent, IN PRTL_BALANCED_LINKS Node) { @@ -134,8 +134,8 @@ RtlInsertAsLeftChildAvl(IN PRTL_BALANCED_LINKS Parent, RtlSetParent(Node, Parent); } -VOID FORCEINLINE +VOID RtlInsertAsRightChildAvl(IN PRTL_BALANCED_LINKS Parent, IN PRTL_BALANCED_LINKS Node) { diff --git a/reactos/ntoskrnl/mm/ARM3/pagfault.c b/reactos/ntoskrnl/mm/ARM3/pagfault.c index 29a3c197258..5c69317ffd2 100644 --- a/reactos/ntoskrnl/mm/ARM3/pagfault.c +++ b/reactos/ntoskrnl/mm/ARM3/pagfault.c @@ -311,8 +311,8 @@ MiCheckVirtualAddress(IN PVOID VirtualAddress, } #if (_MI_PAGING_LEVELS == 2) -BOOLEAN FORCEINLINE +BOOLEAN MiSynchronizeSystemPde(PMMPDE PointerPde) { MMPDE SystemPde; diff --git a/reactos/ntoskrnl/mm/ARM3/pool.c b/reactos/ntoskrnl/mm/ARM3/pool.c index 547891224d5..620d87c0141 100644 --- a/reactos/ntoskrnl/mm/ARM3/pool.c +++ b/reactos/ntoskrnl/mm/ARM3/pool.c @@ -98,8 +98,8 @@ MiUnProtectFreeNonPagedPool(IN PVOID VirtualAddress, return UnprotectedPages ? TRUE : FALSE; } -VOID FORCEINLINE +VOID MiProtectedPoolUnProtectLinks(IN PLIST_ENTRY Links, OUT PVOID* PoolFlink, OUT PVOID* PoolBlink) @@ -133,8 +133,8 @@ MiProtectedPoolUnProtectLinks(IN PLIST_ENTRY Links, } } -VOID FORCEINLINE +VOID MiProtectedPoolProtectLinks(IN PVOID PoolFlink, IN PVOID PoolBlink) { diff --git a/reactos/ntoskrnl/mm/ARM3/syspte.c b/reactos/ntoskrnl/mm/ARM3/syspte.c index 27fe8343394..714ffa3a393 100644 --- a/reactos/ntoskrnl/mm/ARM3/syspte.c +++ b/reactos/ntoskrnl/mm/ARM3/syspte.c @@ -56,8 +56,8 @@ ULONG MmTotalSystemPtes; // being released, which is then inserted in front of the recorded cluster. // -ULONG FORCEINLINE +ULONG MI_GET_CLUSTER_SIZE(IN PMMPTE Pte) { // diff --git a/reactos/ntoskrnl/mm/i386/page.c b/reactos/ntoskrnl/mm/i386/page.c index 4441857c199..b79e10285c9 100644 --- a/reactos/ntoskrnl/mm/i386/page.c +++ b/reactos/ntoskrnl/mm/i386/page.c @@ -199,8 +199,8 @@ ProtectToPTE(ULONG flProtect) } /* Taken from ARM3/pagfault.c */ -BOOLEAN FORCEINLINE +BOOLEAN MiSynchronizeSystemPde(PMMPDE PointerPde) { MMPDE SystemPde;