VOID
NTAPI
-KiRaiseUserExceptionDispatcher()
+KiRaiseUserExceptionDispatcher(VOID)
{
UNIMPLEMENTED;
return;
VOID
NTAPI
-KiUserCallbackDispatcher()
+KiUserCallbackDispatcher(VOID)
{
UNIMPLEMENTED;
return;
VOID
NTAPI
-KiUserExceptionDispatcher()
+KiUserExceptionDispatcher(VOID)
{
UNIMPLEMENTED;
return;
VOID
NTAPI
-LdrpEnsureLoaderLockIsHeld()
+LdrpEnsureLoaderLockIsHeld(VOID)
{
// Ignored atm
}
KPROCESSOR_MODE
NTAPI
-RtlpGetMode()
+RtlpGetMode(VOID)
{
return UserMode;
}
RtlpCreateAtomHandleTable(PRTL_ATOM_TABLE AtomTable)
{
RtlInitializeHandleTable(0xCFFF,
- sizeof(RTL_ATOM_HANDLE),
- &AtomTable->RtlHandleTable);
+ sizeof(RTL_ATOM_HANDLE),
+ &AtomTable->RtlHandleTable);
return TRUE;
}
VOID
NTAPI
-HalpInitializeTsc()
+HalpInitializeTsc(VOID)
{
ULONG_PTR Flags;
KIDTENTRY OldIdtEntry, *IdtPointer;
VOID
DECLSPEC_NORETURN
-HalpTrap06()
+HalpTrap06(VOID)
{
/* Restore ES/DS to known good values first */
Ke386SetEs(KGDT_R3_DATA | RPL_MASK);
VOID
NTAPI
-HalpBiosCall()
+HalpBiosCall(VOID)
{
/* Must be volatile so it doesn't get optimized away! */
volatile KTRAP_FRAME V86TrapFrame;
* COPYRIGHT: See COPYING in the top level directory\r
* PROJECT: ReactOS Kernel\r
* FILE: ntoskrnl/include/amd64/asmmacro.S\r
- * PURPOSE: ASM macros for for GAS and MASM/ML64\r
+ * PURPOSE: ASM macros for GAS and MASM/ML64\r
* PROGRAMMERS: Timo Kreuzer (timo.kreuzer@reactos.org)\r
*/\r
\r
static int InfpHeapRefCount;
static VOID
-CheckHeap()
+CheckHeap(VOID)
{
if (NULL == InfpHeap)
{
}
NTSTATUS NTAPI
-RtlpDphInitializeDelayedFreeQueue()
+RtlpDphInitializeDelayedFreeQueue(VOID)
{
NTSTATUS Status;
}
NTSTATUS NTAPI
-RtlpDphTargetDllsLogicInitialize()
+RtlpDphTargetDllsLogicInitialize(VOID)
{
UNIMPLEMENTED;
return STATUS_SUCCESS;
}
NTSTATUS NTAPI
-RtlpDphProcessStartupInitialization()
+RtlpDphProcessStartupInitialization(VOID)
{
NTSTATUS Status;
PTEB Teb = NtCurrentTeb();
VOID
NTAPI
INIT_FUNCTION
-ExpInitLookasideLists()
+ExpInitLookasideLists(VOID)
{
ULONG i;
INIT_FUNCTION
VOID
NTAPI
-FsRtlInitializeTunnels()
+FsRtlInitializeTunnels(VOID)
{
ULONG TunnelEntries;
UNICODE_STRING MaximumTunnelEntryAgeInSeconds = RTL_CONSTANT_STRING(L"MaximumTunnelEntryAgeInSeconds");
VOID
FORCEINLINE
-KiSendEOI()
+KiSendEOI(VOID)
{
/* Write 0 to the apic EOI register */
*((volatile ULONG*)APIC_EOI_REGISTER) = 0;
FORCEINLINE
USHORT
-Ke386GetLocalDescriptorTable()
+Ke386GetLocalDescriptorTable(VOID)
{
USHORT Ldt;
__asm__("sldt %0\n\t"
BOOLEAN
INIT_FUNCTION
NTAPI
-IopCreateRootDirectories()
+IopCreateRootDirectories(VOID)
{
OBJECT_ATTRIBUTES ObjectAttributes;
UNICODE_STRING DirName;
/* scan for the sequence $<data>#<Checksum> */
PCHAR
-GspGetPacket()
+GspGetPacket(VOID)
{
PCHAR Buffer = &GspInBuffer[0];
CHAR Checksum;
/* scan for the sequence $<data>#<Checksum> */
PCHAR
-GspGetPacket()
+GspGetPacket(VOID)
{
PCHAR Buffer = &GspInBuffer[0];
CHAR Checksum;
* Disables interrupts, releases display ownership, ...
*/
static VOID
-KdbpInternalEnter()
+KdbpInternalEnter(VOID)
{
PETHREAD Thread;
PVOID SavedInitialStack, SavedStackBase, SavedKernelStack;
* call this function if KdbInitFileBuffer is not NULL.
*/
VOID
-KdbpCliInterpretInitFile()
+KdbpCliInterpretInitFile(VOID)
{
PCHAR p1, p2;
INT i;
* Reads the KDBinit file from the SystemRoot\System32\drivers\etc directory and executes it.
*/
VOID
-KdbpCliInit()
+KdbpCliInit(VOID)
{
NTSTATUS Status;
OBJECT_ATTRIBUTES ObjectAttributes;
VOID
NTAPI
-KiSetupSyscallHandler()
+KiSetupSyscallHandler(VOID)
{
paddr_t handler_target;
int *source;
for(source = syscall_start, handler_target = 0xc00;
- source < &syscall_end;
- source++, handler_target += sizeof(int))
- SetPhys(handler_target, *source);
+ source < &syscall_end;
+ source++, handler_target += sizeof(int))
+ {
+ SetPhys(handler_target, *source);
+ }
}
VOID
NTAPI
-KiSetupDecrementerTrap()
+KiSetupDecrementerTrap(VOID)
{
paddr_t handler_target;
int *source;
0,
0xFFFFFFFF,
&PageDirectory,
- TRUE);
+ TRUE);
InitProcess->QuantumReset = MAXCHAR;
}
else
Cpu = KeNumberProcessors;
if (!Cpu)
{
- /* We'll allocate a page from the end of the kernel area for KPCR. This code will probably
- * change when we get SMP support.
- */
- info[0].phys = 0;
- info[0].proc = 2;
- info[0].addr = (vaddr_t)Pcr;
- info[0].flags = MMU_KRW_UR;
- info[1].phys = 0;
- info[1].proc = 2;
- info[1].addr = ((vaddr_t)Pcr) + (1 << PAGE_SHIFT);
- info[1].flags = MMU_KRW_UR;
- info[2].phys = 0;
- info[2].proc = 2;
- info[2].addr = (vaddr_t)KI_USER_SHARED_DATA;
- info[2].flags = MMU_KRW_UR;
+ /* We'll allocate a page from the end of the kernel area for KPCR. This code will probably
+ * change when we get SMP support.
+ */
+ info[0].phys = 0;
+ info[0].proc = 2;
+ info[0].addr = (vaddr_t)Pcr;
+ info[0].flags = MMU_KRW_UR;
+ info[1].phys = 0;
+ info[1].proc = 2;
+ info[1].addr = ((vaddr_t)Pcr) + (1 << PAGE_SHIFT);
+ info[1].flags = MMU_KRW_UR;
+ info[2].phys = 0;
+ info[2].proc = 2;
+ info[2].addr = (vaddr_t)KI_USER_SHARED_DATA;
+ info[2].flags = MMU_KRW_UR;
info[3].phys = 0;
info[3].proc = 2;
info[3].addr = (vaddr_t)KIP0PCRADDRESS;
info[3].flags = MMU_KRW_UR;
- MmuMapPage(info, 4);
+ MmuMapPage(info, 4);
}
/* Skip initial setup if this isn't the Boot CPU */
/* Check for break-in */
if (KdPollBreakIn())
{
- DbgBreakPointWithStatus(DBG_STATUS_CONTROL_C);
+ DbgBreakPointWithStatus(DBG_STATUS_CONTROL_C);
}
/* Raise to HIGH_LEVEL */
{
}
-void abort()
+void abort(VOID)
{
KeBugCheck(KMODE_EXCEPTION_NOT_HANDLED);
while(1);
VOID
NTAPI
-KiUnexpectedInterrupt()
+KiUnexpectedInterrupt(VOID)
{
}
VOID
NTAPI
INIT_FUNCTION
-MiInitializeSessionSpaceLayout()
+MiInitializeSessionSpaceLayout(VOID)
{
//
// Set the size of session view, pool, and image
FORCEINLINE
KIRQL
-MiAcquireExpansionLock()
+MiAcquireExpansionLock(VOID)
{
KIRQL OldIrql;
VOID
NTAPI
-MiTestSpecialPool()
+MiTestSpecialPool(VOID)
{
ULONG i;
PVOID p1, p2[100];
VOID
INIT_FUNCTION
NTAPI
-MiInitSystemMemoryAreas()
+MiInitSystemMemoryAreas(VOID)
{
//
// Create all the static memory areas.
#if DBG
VOID
NTAPI
-PspCheckProcessList()
+PspCheckProcessList(VOID)
{
PLIST_ENTRY Entry;
NTAPI
PspIsProcessExiting(IN PEPROCESS Process)
{
- return Process->Flags & PSF_PROCESS_EXITING_BIT;
+ return Process->Flags & PSF_PROCESS_EXITING_BIT;
}
VOID
BOOLEAN
NTAPI
INIT_FUNCTION
-PspInitPhase1()
+PspInitPhase1(VOID)
{
/* Initialize the System DLL and return status of operation */
if (!NT_SUCCESS(PspInitializeSystemDll())) return FALSE;
KPROCESSOR_MODE
NTAPI
-RtlpGetMode()
+RtlpGetMode(VOID)
{
return KernelMode;
}