diff --git a/reactos/ntoskrnl/kd64/amd64/kdx64.c b/reactos/ntoskrnl/kd64/amd64/kdx64.c index 219013bf982..26e4ecf2e9c 100644 --- a/reactos/ntoskrnl/kd64/amd64/kdx64.c +++ b/reactos/ntoskrnl/kd64/amd64/kdx64.c @@ -105,7 +105,7 @@ KdpSysReadMsr(IN ULONG Msr, { _SEH2_YIELD(return STATUS_NO_SUCH_DEVICE); } - _SEH2_END + _SEH2_END; return STATUS_SUCCESS; } @@ -124,7 +124,7 @@ KdpSysWriteMsr(IN ULONG Msr, { _SEH2_YIELD(return STATUS_NO_SUCH_DEVICE); } - _SEH2_END + _SEH2_END; return STATUS_SUCCESS; } diff --git a/reactos/ntoskrnl/ke/amd64/except.c b/reactos/ntoskrnl/ke/amd64/except.c index 6fccfabb06b..299035290af 100644 --- a/reactos/ntoskrnl/ke/amd64/except.c +++ b/reactos/ntoskrnl/ke/amd64/except.c @@ -229,7 +229,7 @@ KiPrepareUserDebugData(void) _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER) { } - _SEH2_END + _SEH2_END; } VOID diff --git a/reactos/ntoskrnl/lpc/send.c b/reactos/ntoskrnl/lpc/send.c index 6c75c9d3cd5..be7ef1bff99 100644 --- a/reactos/ntoskrnl/lpc/send.c +++ b/reactos/ntoskrnl/lpc/send.c @@ -746,7 +746,7 @@ NtRequestWaitReplyPort(IN HANDLE PortHandle, if (!NT_SUCCESS(Status)) { DPRINT1("LpcpVerifyMessageDataInfo failed\n"); - return Status; + _SEH2_YIELD(return Status); } } _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER) @@ -861,7 +861,7 @@ NtRequestWaitReplyPort(IN HANDLE PortHandle, ObDereferenceObject(Port); DPRINT1("NumberOfEntries has changed: %u, %u\n", DataInfo->NumberOfEntries, NumberOfDataEntries); - return STATUS_INVALID_PARAMETER; + _SEH2_YIELD(return STATUS_INVALID_PARAMETER); } } diff --git a/reactos/ntoskrnl/se/audit.c b/reactos/ntoskrnl/se/audit.c index ea9f7b73b4b..c10e3bf3ad8 100644 --- a/reactos/ntoskrnl/se/audit.c +++ b/reactos/ntoskrnl/se/audit.c @@ -1101,7 +1101,7 @@ NtOpenObjectAuditAlarm( if (PrivilegeCount > SEP_PRIVILEGE_SET_MAX_COUNT) { Status = STATUS_INVALID_PARAMETER; - goto Cleanup; + _SEH2_YIELD(goto Cleanup); } /* Calculate the size of the PrivilegeSet structure */ @@ -1118,7 +1118,7 @@ NtOpenObjectAuditAlarm( { DPRINT1("Failed to allocate %u bytes\n", PrivilegeSetSize); Status = STATUS_INSUFFICIENT_RESOURCES; - goto Cleanup; + _SEH2_YIELD(goto Cleanup); } /* Copy the privileges */ @@ -1324,7 +1324,7 @@ NtPrivilegedServiceAuditAlarm( if (PrivilegeCount > SEP_PRIVILEGE_SET_MAX_COUNT) { Status = STATUS_INVALID_PARAMETER; - goto Cleanup; + _SEH2_YIELD(goto Cleanup); } /* Calculate the size of the Privileges structure */ @@ -1341,7 +1341,7 @@ NtPrivilegedServiceAuditAlarm( { DPRINT1("Failed to allocate %u bytes\n", PrivilegesSize); Status = STATUS_INSUFFICIENT_RESOURCES; - goto Cleanup; + _SEH2_YIELD(goto Cleanup); } /* Copy the privileges */ diff --git a/reactos/ntoskrnl/se/sd.c b/reactos/ntoskrnl/se/sd.c index 15b8c65e540..998b2fe0af1 100644 --- a/reactos/ntoskrnl/se/sd.c +++ b/reactos/ntoskrnl/se/sd.c @@ -528,7 +528,7 @@ SeCaptureSecurityDescriptor( { _SEH2_YIELD(return _SEH2_GetExceptionCode()); } - _SEH2_END + _SEH2_END; /* * Allocate enough memory to store a complete copy of a self-relative