[NTDLL][HAL][INFLIB][RTL][NTOS] VOIDify function paramater lists when they indeed...
authorHermès Bélusca-Maïto <hermes.belusca-maito@reactos.org>
Thu, 3 Sep 2015 23:57:39 +0000 (23:57 +0000)
committerHermès Bélusca-Maïto <hermes.belusca-maito@reactos.org>
Thu, 3 Sep 2015 23:57:39 +0000 (23:57 +0000)
svn path=/trunk/; revision=68971

26 files changed:
reactos/dll/ntdll/dispatch/amd64/stubs.c
reactos/dll/ntdll/ldr/ldrinit.c
reactos/dll/ntdll/rtl/libsupp.c
reactos/hal/halx86/apic/tsc.c
reactos/hal/halx86/generic/bios.c
reactos/include/asm/asm.inc
reactos/lib/inflib/infrosgen.c
reactos/lib/rtl/heappage.c
reactos/ntoskrnl/ex/lookas.c
reactos/ntoskrnl/fsrtl/tunnel.c
reactos/ntoskrnl/include/internal/amd64/ke.h
reactos/ntoskrnl/include/internal/i386/intrin_i.h
reactos/ntoskrnl/io/iomgr/iomgr.c
reactos/ntoskrnl/kd/wrappers/gdbstub.c
reactos/ntoskrnl/kd/wrappers/gdbstub_powerpc.c
reactos/ntoskrnl/kdbg/kdb.c
reactos/ntoskrnl/kdbg/kdb_cli.c
reactos/ntoskrnl/ke/powerpc/kiinit.c
reactos/ntoskrnl/ke/powerpc/stubs.c
reactos/ntoskrnl/mm/ARM3/i386/init.c
reactos/ntoskrnl/mm/ARM3/session.c
reactos/ntoskrnl/mm/ARM3/special.c
reactos/ntoskrnl/mm/mminit.c
reactos/ntoskrnl/ps/kill.c
reactos/ntoskrnl/ps/psmgr.c
reactos/ntoskrnl/rtl/libsupp.c

index f8c8364..b5af8f7 100644 (file)
@@ -44,7 +44,7 @@ KiUserApcDispatcher(IN PVOID NormalRoutine,
 
 VOID
 NTAPI
-KiRaiseUserExceptionDispatcher()
+KiRaiseUserExceptionDispatcher(VOID)
 {
     UNIMPLEMENTED;
     return;
@@ -52,7 +52,7 @@ KiRaiseUserExceptionDispatcher()
 
 VOID
 NTAPI
-KiUserCallbackDispatcher()
+KiUserCallbackDispatcher(VOID)
 {
     UNIMPLEMENTED;
     return;
@@ -60,7 +60,7 @@ KiUserCallbackDispatcher()
 
 VOID
 NTAPI
-KiUserExceptionDispatcher()
+KiUserExceptionDispatcher(VOID)
 {
     UNIMPLEMENTED;
     return;
index f4b5e82..2bcfbeb 100644 (file)
@@ -395,7 +395,7 @@ LdrQueryImageFileExecutionOptions(IN PUNICODE_STRING SubKey,
 
 VOID
 NTAPI
-LdrpEnsureLoaderLockIsHeld()
+LdrpEnsureLoaderLockIsHeld(VOID)
 {
     // Ignored atm
 }
index 81daf81..b0bf8ea 100644 (file)
@@ -66,7 +66,7 @@ RtlpClearInDbgPrint(VOID)
 
 KPROCESSOR_MODE
 NTAPI
-RtlpGetMode()
+RtlpGetMode(VOID)
 {
    return UserMode;
 }
@@ -298,8 +298,8 @@ BOOLEAN
 RtlpCreateAtomHandleTable(PRTL_ATOM_TABLE AtomTable)
 {
    RtlInitializeHandleTable(0xCFFF,
-                           sizeof(RTL_ATOM_HANDLE),
-                           &AtomTable->RtlHandleTable);
+                            sizeof(RTL_ATOM_HANDLE),
+                            &AtomTable->RtlHandleTable);
 
    return TRUE;
 }
index 6a52bf5..0f0d74b 100644 (file)
@@ -53,7 +53,7 @@ DoLinearRegression(
 
 VOID
 NTAPI
-HalpInitializeTsc()
+HalpInitializeTsc(VOID)
 {
     ULONG_PTR Flags;
     KIDTENTRY OldIdtEntry, *IdtPointer;
index 7f32e43..013f417 100644 (file)
@@ -228,7 +228,7 @@ HalpTrap0DHandler(IN PKTRAP_FRAME TrapFrame)
 
 VOID
 DECLSPEC_NORETURN
-HalpTrap06()
+HalpTrap06(VOID)
 {
     /* Restore ES/DS to known good values first */
     Ke386SetEs(KGDT_R3_DATA | RPL_MASK);
@@ -247,7 +247,7 @@ HalpTrap06()
 
 VOID
 NTAPI
-HalpBiosCall()
+HalpBiosCall(VOID)
 {
     /* Must be volatile so it doesn't get optimized away! */
     volatile KTRAP_FRAME V86TrapFrame;
index 46803ea..d81db8b 100644 (file)
@@ -2,7 +2,7 @@
  * COPYRIGHT:       See COPYING in the top level directory\r
  * PROJECT:         ReactOS Kernel\r
  * FILE:            ntoskrnl/include/amd64/asmmacro.S\r
- * PURPOSE:         ASM macros for for GAS and MASM/ML64\r
+ * PURPOSE:         ASM macros for GAS and MASM/ML64\r
  * PROGRAMMERS:     Timo Kreuzer (timo.kreuzer@reactos.org)\r
  */\r
 \r
index b23403b..d38160e 100644 (file)
@@ -19,7 +19,7 @@
 static int InfpHeapRefCount;
 
 static VOID
-CheckHeap()
+CheckHeap(VOID)
 {
   if (NULL == InfpHeap)
     {
index 94f1a40..3d11e5f 100644 (file)
@@ -1201,7 +1201,7 @@ RtlpDphFreeNodeForTable(IN PRTL_AVL_TABLE Table,
 }
 
 NTSTATUS NTAPI
-RtlpDphInitializeDelayedFreeQueue()
+RtlpDphInitializeDelayedFreeQueue(VOID)
 {
     NTSTATUS Status;
 
@@ -1278,7 +1278,7 @@ RtlpDphFreeDelayedBlocksFromHeap(PDPH_HEAP_ROOT DphRoot,
 }
 
 NTSTATUS NTAPI
-RtlpDphTargetDllsLogicInitialize()
+RtlpDphTargetDllsLogicInitialize(VOID)
 {
     UNIMPLEMENTED;
     return STATUS_SUCCESS;
@@ -1428,7 +1428,7 @@ RtlpDphIsNormalFreeHeapBlock(PVOID Block,
 }
 
 NTSTATUS NTAPI
-RtlpDphProcessStartupInitialization()
+RtlpDphProcessStartupInitialization(VOID)
 {
     NTSTATUS Status;
     PTEB Teb = NtCurrentTeb();
index 5b32af5..ceb3789 100644 (file)
@@ -90,7 +90,7 @@ ExInitPoolLookasidePointers(VOID)
 VOID
 NTAPI
 INIT_FUNCTION
-ExpInitLookasideLists()
+ExpInitLookasideLists(VOID)
 {
     ULONG i;
 
index db292f6..a8006ac 100644 (file)
@@ -196,7 +196,7 @@ FsRtlGetTunnelParameterValue(
 INIT_FUNCTION
 VOID
 NTAPI
-FsRtlInitializeTunnels()
+FsRtlInitializeTunnels(VOID)
 {
     ULONG TunnelEntries;
     UNICODE_STRING MaximumTunnelEntryAgeInSeconds = RTL_CONSTANT_STRING(L"MaximumTunnelEntryAgeInSeconds");
index c5af042..250a87f 100644 (file)
@@ -260,7 +260,7 @@ KeQueryInterruptHandler(IN ULONG Vector)
 
 VOID
 FORCEINLINE
-KiSendEOI()
+KiSendEOI(VOID)
 {
     /* Write 0 to the apic EOI register */
     *((volatile ULONG*)APIC_EOI_REGISTER) = 0;
index 35cfd8e..76e391e 100644 (file)
@@ -52,7 +52,7 @@ Ke386SaveFpuState(IN PFX_SAVE_AREA SaveArea)
 
 FORCEINLINE
 USHORT
-Ke386GetLocalDescriptorTable()
+Ke386GetLocalDescriptorTable(VOID)
 {
     USHORT Ldt;
     __asm__("sldt %0\n\t"
index 20d2416..aa01098 100644 (file)
@@ -332,7 +332,7 @@ IopCreateObjectTypes(VOID)
 BOOLEAN
 INIT_FUNCTION
 NTAPI
-IopCreateRootDirectories()
+IopCreateRootDirectories(VOID)
 {
     OBJECT_ATTRIBUTES ObjectAttributes;
     UNICODE_STRING DirName;
index e32da19..6ca6893 100644 (file)
@@ -133,7 +133,7 @@ GdbGetChar(VOID)
 
 /* scan for the sequence $<data>#<Checksum> */
 PCHAR
-GspGetPacket()
+GspGetPacket(VOID)
 {
     PCHAR Buffer = &GspInBuffer[0];
     CHAR Checksum;
index 032bc02..a0c1ba5 100644 (file)
@@ -181,7 +181,7 @@ GdbGetChar(VOID)
 /* scan for the sequence $<data>#<Checksum>     */
 
 PCHAR
-GspGetPacket()
+GspGetPacket(VOID)
 {
     PCHAR Buffer = &GspInBuffer[0];
     CHAR Checksum;
index 17f4c78..2a00306 100644 (file)
@@ -1236,7 +1236,7 @@ KdbpCallMainLoop(VOID)
  * Disables interrupts, releases display ownership, ...
  */
 static VOID
-KdbpInternalEnter()
+KdbpInternalEnter(VOID)
 {
     PETHREAD Thread;
     PVOID SavedInitialStack, SavedStackBase, SavedKernelStack;
index f2940ed..b18ceb7 100644 (file)
@@ -3512,7 +3512,7 @@ KdbpCliModuleLoaded(
  * call this function if KdbInitFileBuffer is not NULL.
  */
 VOID
-KdbpCliInterpretInitFile()
+KdbpCliInterpretInitFile(VOID)
 {
     PCHAR p1, p2;
     INT i;
@@ -3561,7 +3561,7 @@ KdbpCliInterpretInitFile()
  * Reads the KDBinit file from the SystemRoot\System32\drivers\etc directory and executes it.
  */
 VOID
-KdbpCliInit()
+KdbpCliInit(VOID)
 {
     NTSTATUS Status;
     OBJECT_ATTRIBUTES ObjectAttributes;
index 94ed31e..5b56409 100644 (file)
@@ -41,19 +41,21 @@ extern int syscall_start[], syscall_end, KiDecrementerTrapHandler[],
 
 VOID
 NTAPI
-KiSetupSyscallHandler()
+KiSetupSyscallHandler(VOID)
 {
     paddr_t handler_target;
     int *source;
     for(source = syscall_start, handler_target = 0xc00;
-       source < &syscall_end;
-       source++, handler_target += sizeof(int))
-       SetPhys(handler_target, *source);
+        source < &syscall_end;
+        source++, handler_target += sizeof(int))
+    {
+        SetPhys(handler_target, *source);
+    }
 }
 
 VOID
 NTAPI
-KiSetupDecrementerTrap()
+KiSetupDecrementerTrap(VOID)
 {
     paddr_t handler_target;
     int *source;
@@ -165,7 +167,7 @@ KiInitializeKernel(IN PKPROCESS InitProcess,
                             0,
                             0xFFFFFFFF,
                             &PageDirectory,
-                           TRUE);
+                            TRUE);
         InitProcess->QuantumReset = MAXCHAR;
     }
     else
@@ -270,26 +272,26 @@ KiSystemStartupReal(IN PLOADER_PARAMETER_BLOCK LoaderBlock)
     Cpu = KeNumberProcessors;
     if (!Cpu)
     {
-       /* We'll allocate a page from the end of the kernel area for KPCR.  This code will probably
-        * change when we get SMP support.
-        */
-       info[0].phys = 0;
-       info[0].proc = 2;
-       info[0].addr = (vaddr_t)Pcr;
-       info[0].flags = MMU_KRW_UR;
-       info[1].phys = 0;
-       info[1].proc = 2;
-       info[1].addr = ((vaddr_t)Pcr) + (1 << PAGE_SHIFT);
-       info[1].flags = MMU_KRW_UR;
-       info[2].phys = 0;
-       info[2].proc = 2;
-       info[2].addr = (vaddr_t)KI_USER_SHARED_DATA;
-       info[2].flags = MMU_KRW_UR;
+        /* We'll allocate a page from the end of the kernel area for KPCR.  This code will probably
+         * change when we get SMP support.
+         */
+        info[0].phys = 0;
+        info[0].proc = 2;
+        info[0].addr = (vaddr_t)Pcr;
+        info[0].flags = MMU_KRW_UR;
+        info[1].phys = 0;
+        info[1].proc = 2;
+        info[1].addr = ((vaddr_t)Pcr) + (1 << PAGE_SHIFT);
+        info[1].flags = MMU_KRW_UR;
+        info[2].phys = 0;
+        info[2].proc = 2;
+        info[2].addr = (vaddr_t)KI_USER_SHARED_DATA;
+        info[2].flags = MMU_KRW_UR;
         info[3].phys = 0;
         info[3].proc = 2;
         info[3].addr = (vaddr_t)KIP0PCRADDRESS;
         info[3].flags = MMU_KRW_UR;
-       MmuMapPage(info, 4);
+        MmuMapPage(info, 4);
     }
 
     /* Skip initial setup if this isn't the Boot CPU */
@@ -326,7 +328,7 @@ AppCpuInit:
     /* Check for break-in */
     if (KdPollBreakIn())
     {
-       DbgBreakPointWithStatus(DBG_STATUS_CONTROL_C);
+        DbgBreakPointWithStatus(DBG_STATUS_CONTROL_C);
     }
 
     /* Raise to HIGH_LEVEL */
@@ -347,7 +349,7 @@ KiInitMachineDependent(VOID)
 {
 }
 
-void abort()
+void abort(VOID)
 {
     KeBugCheck(KMODE_EXCEPTION_NOT_HANDLED);
     while(1);
index 99744da..2e00284 100644 (file)
@@ -31,7 +31,7 @@ Ke386CallBios(IN ULONG Int,
 
 VOID
 NTAPI
-KiUnexpectedInterrupt()
+KiUnexpectedInterrupt(VOID)
 {
 }
 
index d4f05fb..c5c6bb3 100644 (file)
@@ -42,7 +42,7 @@ MMPTE MmDecommittedPte = {{MM_DECOMMIT << MM_PTE_SOFTWARE_PROTECTION_BITS}};
 VOID
 NTAPI
 INIT_FUNCTION
-MiInitializeSessionSpaceLayout()
+MiInitializeSessionSpaceLayout(VOID)
 {
     //
     // Set the size of session view, pool, and image
index dcdbcce..0b4865d 100644 (file)
@@ -37,7 +37,7 @@ PETHREAD MiExpansionLockOwner;
 
 FORCEINLINE
 KIRQL
-MiAcquireExpansionLock()
+MiAcquireExpansionLock(VOID)
 {
     KIRQL OldIrql;
 
index 84b9fd5..fcff05b 100644 (file)
@@ -588,7 +588,7 @@ MmFreeSpecialPool(PVOID P)
 
 VOID
 NTAPI
-MiTestSpecialPool()
+MiTestSpecialPool(VOID)
 {
     ULONG i;
     PVOID p1, p2[100];
index d7167bf..4838f59 100644 (file)
@@ -67,7 +67,7 @@ MiCreateArm3StaticMemoryArea(PVOID BaseAddress, ULONG Size, BOOLEAN Executable)
 VOID
 INIT_FUNCTION
 NTAPI
-MiInitSystemMemoryAreas()
+MiInitSystemMemoryAreas(VOID)
 {
     //
     // Create all the static memory areas.
index 5fac03d..b263505 100644 (file)
@@ -208,7 +208,7 @@ PspReapRoutine(IN PVOID Context)
 #if DBG
 VOID
 NTAPI
-PspCheckProcessList()
+PspCheckProcessList(VOID)
 {
     PLIST_ENTRY Entry;
 
@@ -1066,7 +1066,7 @@ BOOLEAN
 NTAPI
 PspIsProcessExiting(IN PEPROCESS Process)
 {
-       return Process->Flags & PSF_PROCESS_EXITING_BIT;
+    return Process->Flags & PSF_PROCESS_EXITING_BIT;
 }
 
 VOID
index c7f321f..e78a447 100644 (file)
@@ -395,7 +395,7 @@ PspInitializeSystemDll(VOID)
 BOOLEAN
 NTAPI
 INIT_FUNCTION
-PspInitPhase1()
+PspInitPhase1(VOID)
 {
     /* Initialize the System DLL and return status of operation */
     if (!NT_SUCCESS(PspInitializeSystemDll())) return FALSE;
index c78d2b9..da6db03 100644 (file)
@@ -92,7 +92,7 @@ RtlpClearInDbgPrint(VOID)
 
 KPROCESSOR_MODE
 NTAPI
-RtlpGetMode()
+RtlpGetMode(VOID)
 {
    return KernelMode;
 }