Removed trailing whitespace.

diff --git a/msdos/vxd.c b/msdos/vxd.c
index 5816b28..91d2dc8 100644
--- a/msdos/vxd.c
+++ b/msdos/vxd.c
@@ -104,7 +104,7 @@
     case 0x01: /* get swap file info */
 	TRACE("VxD PageFile: returning swap file info\n");
 	AX_reg(context) = 0x00; /* paging disabled */
-	context->Ecx = 0;   /* maximum size of paging file */	
+	context->Ecx = 0;   /* maximum size of paging file */
 	/* FIXME: do I touch DS:SI or DS:DI? */
 	RESET_CFLAG(context);
 	break;
@@ -230,7 +230,7 @@
 	AX_reg(context) = 0x000B; /* invalid function number */
 	SET_CFLAG(context);
 	break;
-    }	
+    }
 }
 
 /***********************************************************************
@@ -487,20 +487,20 @@
  *
  * This is an implementation of the services of the Win32s VxD.
  * Since official documentation of these does not seem to be available,
- * certain arguments of some of the services remain unclear.  
+ * certain arguments of some of the services remain unclear.
  *
- * FIXME: The following services are currently unimplemented: 
+ * FIXME: The following services are currently unimplemented:
  *        Exception handling      (0x01, 0x1C)
  *        Debugger support        (0x0C, 0x14, 0x17)
  *        Low-level memory access (0x02, 0x03, 0x0A, 0x0B)
  *        Memory Statistics       (0x1B)
- *        
+ *
  *
  * We have a specific problem running Win32s on Linux (and probably also
  * the other x86 unixes), since Win32s tries to allocate its main 'flat
  * code/data segment' selectors with a base of 0xffff0000 (and limit 4GB).
- * The rationale for this seems to be that they want one the one hand to 
- * be able to leave the Win 3.1 memory (starting with the main DOS memory) 
+ * The rationale for this seems to be that they want one the one hand to
+ * be able to leave the Win 3.1 memory (starting with the main DOS memory)
  * at linear address 0, but want at other hand to have offset 0 of the
  * flat data/code segment point to an unmapped page (to catch NULL pointer
  * accesses). Hence they allocate the flat segments with a base of 0xffff0000
@@ -532,7 +532,7 @@
  *
  * The offset is set the first time any application calls the GetVersion()
  * service of the Win32s VxD. (Note that the offset is never reset.)
- * 
+ *
  */
 
 void WINAPI VXD_Win32s( CONTEXT86 *context )
@@ -552,25 +552,25 @@
          *
          *          EDX: Debugging Flags
          *
-         *          EDI: Error Flag 
+         *          EDI: Error Flag
          *               0 if OK,
          *               1 if VMCPD VxD not found
          */
 
         TRACE("GetVersion()\n");
-        
+
 	context->Eax = VXD_WinVersion() | (200 << 16);
         context->Ebx = 0;
         context->Ecx = 0;
         context->Edx = 0;
         context->Edi = 0;
 
-        /* 
+        /*
          * If this is the first time we are called for this process,
          * hack the memory image of WIN32S16 so that it doesn't try
          * to access the GDT directly ...
          *
-         * The first code segment of WIN32S16 (version 1.30) contains 
+         * The first code segment of WIN32S16 (version 1.30) contains
          * an unexported function somewhere between the exported functions
          * SetFS and StackLinearToSegmented that tries to find a selector
          * in the LDT that maps to the memory image of the LDT itself.
@@ -615,7 +615,7 @@
             SEGPTR func1 = (SEGPTR)GetProcAddress16(hModule, "SetFS");
             SEGPTR func2 = (SEGPTR)GetProcAddress16(hModule, "StackLinearToSegmented");
 
-            if (   hModule && func1 && func2 
+            if (   hModule && func1 && func2
                 && SELECTOROF(func1) == SELECTOROF(func2))
             {
                 BYTE *start = MapSL(func1);
@@ -634,7 +634,7 @@
                 {
                     TRACE("PERF130 hack: "
                                "Replacing byte %02X at offset %04X:%04X\n",
-                               *(retv+1), SELECTOROF(func1), 
+                               *(retv+1), SELECTOROF(func1),
                                           OFFSETOF(func1) + retv+1-start);
 
                     *(retv+1) = (BYTE)0xCB;
@@ -642,7 +642,7 @@
             }
         }
 
-        /* 
+        /*
          * Mark process as Win32s, so that subsequent DPMI calls
          * will perform the W32S_APP2WINE/W32S_WINE2APP address shift.
          */
@@ -657,7 +657,7 @@
          *          ECX: LoWord: Flat Code Selector
          *               HiWord: Flat Data Selector
          *
-         *          EDX: Flat address of W32SKRNL Exception Handler 
+         *          EDX: Flat address of W32SKRNL Exception Handler
          *               (this is equal to W32S_BackTo32 + 0x40)
          *
          *          ESI: SEGPTR KERNEL.HASGPHANDLER
@@ -667,7 +667,7 @@
          * Output:  EAX: 0 if OK
          */
 
-        TRACE("[0001] EBX=%lx ECX=%lx EDX=%lx ESI=%lx EDI=%lx\n", 
+        TRACE("[0001] EBX=%lx ECX=%lx EDX=%lx ESI=%lx EDI=%lx\n",
                    context->Ebx, context->Ecx, context->Edx,
                    context->Esi, context->Edi);
 
@@ -690,7 +690,7 @@
          * Output:  EAX: Size of area changed
          */
 
-        TRACE("[0002] EBX=%lx ECX=%lx EDX=%lx\n", 
+        TRACE("[0002] EBX=%lx ECX=%lx EDX=%lx\n",
                    context->Ebx, context->Ecx, context->Edx);
 
         /* FIXME */
@@ -747,14 +747,14 @@
             DWORD  relocDelta;
         };
 
-        /* 
-         * Note: This function should set up a demand-paged memory image 
+        /*
+         * Note: This function should set up a demand-paged memory image
          *       of the given module. Since mmap does not allow file offsets
          *       not aligned at 1024 bytes, we simply load the image fully
          *       into memory.
          */
 
-        struct Win32sModule *moduleTable = 
+        struct Win32sModule *moduleTable =
                             (struct Win32sModule *)W32S_APP2WINE(context->Edx);
         struct Win32sModule *module = moduleTable + context->Ecx;
 
@@ -767,8 +767,8 @@
 
         TRACE("MapModule: Loading %s\n", module->pathName);
 
-        for (i = 0; 
-             !error && i < nt_header->FileHeader.NumberOfSections; 
+        for (i = 0;
+             !error && i < nt_header->FileHeader.NumberOfSections;
              i++, pe_seg++)
             if(!(pe_seg->Characteristics & IMAGE_SCN_CNT_UNINITIALIZED_DATA))
             {
@@ -777,14 +777,14 @@
                 LPBYTE addr = module->baseAddr + pe_seg->VirtualAddress;
 
                 TRACE("MapModule: "
-                           "Section %d at %08lx from %08lx len %08lx\n", 
+                           "Section %d at %08lx from %08lx len %08lx\n",
                            i, (DWORD)addr, off, len);
 
                 if (   _llseek(image, off, SEEK_SET) != off
                     || _lread(image, addr, len) != len)
                     error = TRUE;
             }
-        
+
         _lclose(image);
 
         if (error)
@@ -805,7 +805,7 @@
                 WORD *TypeOffset = (WORD *)(r + 1);
                 int count = (r->SizeOfBlock - sizeof(*r)) / sizeof(*TypeOffset);
 
-                TRACE("MapModule: %d relocations for page %08lx\n", 
+                TRACE("MapModule: %d relocations for page %08lx\n",
                            count, (DWORD)page);
 
                 for(i = 0; i < count; i++)
@@ -814,7 +814,7 @@
                     int type   = TypeOffset[i] >> 12;
                     switch(type)
                     {
-                    case IMAGE_REL_BASED_ABSOLUTE: 
+                    case IMAGE_REL_BASED_ABSOLUTE:
                         break;
                     case IMAGE_REL_BASED_HIGH:
                         *(WORD *)(page+offset) += HIWORD(module->relocDelta);
@@ -843,11 +843,11 @@
 
     case 0x0005: /* UnMap Module */
         /*
-         * Input:   EDX: Flat address of module image 
+         * Input:   EDX: Flat address of module image
          *
          * Output:  EAX: 1 if OK
          */
-        
+
         TRACE("UnMapModule: %lx\n", (DWORD)W32S_APP2WINE(context->Edx));
 
         /* As we didn't map anything, there's nothing to unmap ... */
@@ -857,11 +857,11 @@
 
 
     case 0x0006: /* VirtualAlloc */
-        /* 
+        /*
          * Input:   ECX: Current Process
          *
          *          EDX: Flat address of arguments on stack
-         * 
+         *
          *   DWORD *retv     [out] Flat base address of allocated region
          *   LPVOID base     [in]  Flat address of region to reserve/commit
          *   DWORD  size     [in]  Size of region
@@ -879,7 +879,7 @@
         DWORD  prot   = stack[4];
         DWORD  result;
 
-        TRACE("VirtualAlloc(%lx, %lx, %lx, %lx, %lx)\n", 
+        TRACE("VirtualAlloc(%lx, %lx, %lx, %lx, %lx)\n",
                    (DWORD)retv, (DWORD)base, size, type, prot);
 
         if (type & 0x80000000)
@@ -907,11 +907,11 @@
 
 
     case 0x0007: /* VirtualFree */
-        /* 
+        /*
          * Input:   ECX: Current Process
          *
          *          EDX: Flat address of arguments on stack
-         * 
+         *
          *   DWORD *retv     [out] TRUE if success, FALSE if failure
          *   LPVOID base     [in]  Flat address of region
          *   DWORD  size     [in]  Size of region
@@ -927,7 +927,7 @@
         DWORD  type   = stack[3];
         DWORD  result;
 
-        TRACE("VirtualFree(%lx, %lx, %lx, %lx)\n", 
+        TRACE("VirtualFree(%lx, %lx, %lx, %lx)\n",
                    (DWORD)retv, (DWORD)base, size, type);
 
         result = VirtualFree(base, size, type);
@@ -943,11 +943,11 @@
 
 
     case 0x0008: /* VirtualProtect */
-        /* 
+        /*
          * Input:   ECX: Current Process
          *
          *          EDX: Flat address of arguments on stack
-         * 
+         *
          *   DWORD *retv     [out] TRUE if success, FALSE if failure
          *   LPVOID base     [in]  Flat address of region
          *   DWORD  size     [in]  Size of region
@@ -965,7 +965,7 @@
         DWORD *old_prot = (DWORD *)W32S_APP2WINE(stack[4]);
         DWORD  result;
 
-        TRACE("VirtualProtect(%lx, %lx, %lx, %lx, %lx)\n", 
+        TRACE("VirtualProtect(%lx, %lx, %lx, %lx, %lx)\n",
                    (DWORD)retv, (DWORD)base, size, new_prot, (DWORD)old_prot);
 
         result = VirtualProtect(base, size, new_prot, old_prot);
@@ -981,11 +981,11 @@
 
 
     case 0x0009: /* VirtualQuery */
-        /* 
+        /*
          * Input:   ECX: Current Process
          *
          *          EDX: Flat address of arguments on stack
-         * 
+         *
          *   DWORD *retv                     [out] Nr. bytes returned
          *   LPVOID base                     [in]  Flat address of region
          *   LPMEMORY_BASIC_INFORMATION info [out] Info buffer
@@ -997,12 +997,12 @@
         DWORD *stack  = (DWORD *)W32S_APP2WINE(context->Edx);
         DWORD *retv   = (DWORD *)W32S_APP2WINE(stack[0]);
         LPVOID base   = (LPVOID) W32S_APP2WINE(stack[1]);
-        LPMEMORY_BASIC_INFORMATION info = 
+        LPMEMORY_BASIC_INFORMATION info =
                         (LPMEMORY_BASIC_INFORMATION)W32S_APP2WINE(stack[2]);
         DWORD  len    = stack[3];
         DWORD  result;
 
-        TRACE("VirtualQuery(%lx, %lx, %lx, %lx)\n", 
+        TRACE("VirtualQuery(%lx, %lx, %lx, %lx)\n",
                    (DWORD)retv, (DWORD)base, (DWORD)info, len);
 
         result = VirtualQuery(base, info, len);
@@ -1062,9 +1062,9 @@
 
 
     case 0x000D: /* NtCreateSection */
-        /* 
+        /*
          * Input:   EDX: Flat address of arguments on stack
-         * 
+         *
          *   HANDLE32 *retv      [out] Handle of Section created
          *   DWORD  flags1       [in]  (?? unknown ??)
          *   DWORD  atom         [in]  Name of Section to create
@@ -1098,9 +1098,9 @@
         {
             TRACE("NtCreateSection: name=%s\n", atom? name : NULL);
 
-            result = CreateFileMappingA(hFile, NULL, protect, 
-                                          size? size->s.HighPart : 0, 
-                                          size? size->s.LowPart  : 0, 
+            result = CreateFileMappingA(hFile, NULL, protect,
+                                          size? size->s.HighPart : 0,
+                                          size? size->s.LowPart  : 0,
                                           atom? name : NULL);
         }
 
@@ -1120,9 +1120,9 @@
 
 
     case 0x000E: /* NtOpenSection */
-        /* 
+        /*
          * Input:   EDX: Flat address of arguments on stack
-         * 
+         *
          *   HANDLE32 *retv  [out] Handle of Section opened
          *   DWORD  protect  [in]  Access protection
          *   DWORD  atom     [in]  Name of Section to create
@@ -1138,7 +1138,7 @@
         HANDLE result = INVALID_HANDLE_VALUE;
         char name[128];
 
-        TRACE("NtOpenSection(%lx, %lx, %lx)\n", 
+        TRACE("NtOpenSection(%lx, %lx, %lx)\n",
                    (DWORD)retv, protect, atom);
 
         if (atom && GlobalGetAtomNameA(atom, name, sizeof(name)))
@@ -1164,9 +1164,9 @@
 
 
     case 0x000F: /* NtCloseSection */
-        /* 
+        /*
          * Input:   EDX: Flat address of arguments on stack
-         * 
+         *
          *   HANDLE32 handle  [in]  Handle of Section to close
          *   DWORD *id        [out] Unique ID  (?? unclear ??)
          *
@@ -1188,9 +1188,9 @@
 
 
     case 0x0010: /* NtDupSection */
-        /* 
+        /*
          * Input:   EDX: Flat address of arguments on stack
-         * 
+         *
          *   HANDLE32 handle  [in]  Handle of Section to duplicate
          *
          * Output:  EAX: NtStatus
@@ -1201,7 +1201,7 @@
         HANDLE new_handle;
 
         TRACE("NtDupSection(%lx)\n", (DWORD)handle);
- 
+
         DuplicateHandle( GetCurrentProcess(), handle,
                          GetCurrentProcess(), &new_handle,
                          0, FALSE, DUPLICATE_SAME_ACCESS );
@@ -1211,9 +1211,9 @@
 
 
     case 0x0011: /* NtMapViewOfSection */
-        /* 
+        /*
          * Input:   EDX: Flat address of arguments on stack
-         * 
+         *
          *   HANDLE32 SectionHandle       [in]     Section to be mapped
          *   DWORD    ProcessHandle       [in]     Process to be mapped into
          *   DWORD *  BaseAddress         [in/out] Address to be mapped at
@@ -1257,16 +1257,16 @@
 
         TRACE("NtMapViewOfSection"
                    "(%lx, %lx, %lx, %lx, %lx, %lx, %lx, %lx, %lx, %lx)\n",
-                   (DWORD)SectionHandle, ProcessHandle, (DWORD)BaseAddress, 
+                   (DWORD)SectionHandle, ProcessHandle, (DWORD)BaseAddress,
                    ZeroBits, CommitSize, (DWORD)SectionOffset, (DWORD)ViewSize,
                    InheritDisposition, AllocationType, Protect);
         TRACE("NtMapViewOfSection: "
-                   "base=%lx, offset=%lx, size=%lx, access=%lx\n", 
-                   (DWORD)address, SectionOffset? SectionOffset->s.LowPart : 0, 
+                   "base=%lx, offset=%lx, size=%lx, access=%lx\n",
+                   (DWORD)address, SectionOffset? SectionOffset->s.LowPart : 0,
                    ViewSize? *ViewSize : 0, access);
 
-        result = (DWORD)MapViewOfFileEx(SectionHandle, access, 
-                            SectionOffset? SectionOffset->s.HighPart : 0, 
+        result = (DWORD)MapViewOfFileEx(SectionHandle, access,
+                            SectionOffset? SectionOffset->s.HighPart : 0,
                             SectionOffset? SectionOffset->s.LowPart  : 0,
                             ViewSize? *ViewSize : 0, address);
 
@@ -1284,9 +1284,9 @@
 
 
     case 0x0012: /* NtUnmapViewOfSection */
-        /* 
+        /*
          * Input:   EDX: Flat address of arguments on stack
-         * 
+         *
          *   DWORD  ProcessHandle  [in]  Process (defining address space)
          *   LPBYTE BaseAddress    [in]  Base address of view to be unmapped
          *
@@ -1297,7 +1297,7 @@
         DWORD  ProcessHandle  = stack[0]; /* ignored */
         LPBYTE BaseAddress    = (LPBYTE)W32S_APP2WINE(stack[1]);
 
-        TRACE("NtUnmapViewOfSection(%lx, %lx)\n", 
+        TRACE("NtUnmapViewOfSection(%lx, %lx)\n",
                    ProcessHandle, (DWORD)BaseAddress);
 
         UnmapViewOfFile(BaseAddress);
@@ -1308,9 +1308,9 @@
 
 
     case 0x0013: /* NtFlushVirtualMemory */
-        /* 
+        /*
          * Input:   EDX: Flat address of arguments on stack
-         * 
+         *
          *   DWORD   ProcessHandle  [in]  Process (defining address space)
          *   LPBYTE *BaseAddress    [in?] Base address of range to be flushed
          *   DWORD  *ViewSize       [in?] Number of bytes to be flushed
@@ -1324,14 +1324,14 @@
         DWORD *BaseAddress    = (DWORD *)W32S_APP2WINE(stack[1]);
         DWORD *ViewSize       = (DWORD *)W32S_APP2WINE(stack[2]);
         DWORD *unknown        = (DWORD *)W32S_APP2WINE(stack[3]);
-        
+
         LPBYTE address = (LPBYTE)(BaseAddress? W32S_APP2WINE(*BaseAddress) : 0);
         DWORD  size    = ViewSize? *ViewSize : 0;
 
-        TRACE("NtFlushVirtualMemory(%lx, %lx, %lx, %lx)\n", 
-                   ProcessHandle, (DWORD)BaseAddress, (DWORD)ViewSize, 
+        TRACE("NtFlushVirtualMemory(%lx, %lx, %lx, %lx)\n",
+                   ProcessHandle, (DWORD)BaseAddress, (DWORD)ViewSize,
                    (DWORD)unknown);
-        TRACE("NtFlushVirtualMemory: base=%lx, size=%lx\n", 
+        TRACE("NtFlushVirtualMemory: base=%lx, size=%lx\n",
                    (DWORD)address, size);
 
         FlushViewOfFile(address, size);
@@ -1352,7 +1352,7 @@
          * Output:  None
          */
 
-        FIXME("[0014] ECX=%lx EDX=%lx\n", 
+        FIXME("[0014] ECX=%lx EDX=%lx\n",
                    context->Ecx, context->Edx);
 
         /* FIXME */
@@ -1385,7 +1385,7 @@
          *                  HiWord: Paragraph of Win32s VxD PSP (DOSMEM)
          *     Output: None
          */
- 
+
         if (context->Ebx == 0)
             context->Edx = 0x80;
         else
@@ -1406,7 +1406,7 @@
          * Output:  None
          */
 
-        FIXME("[0017] EBX=%lx CX=%x\n", 
+        FIXME("[0017] EBX=%lx CX=%x\n",
                    context->Ebx, CX_reg(context));
 
         /* FIXME */
@@ -1414,11 +1414,11 @@
 
 
     case 0x0018: /* VirtualLock */
-        /* 
+        /*
          * Input:   ECX: Current Process
          *
          *          EDX: Flat address of arguments on stack
-         * 
+         *
          *   DWORD *retv     [out] TRUE if success, FALSE if failure
          *   LPVOID base     [in]  Flat address of range to lock
          *   DWORD  size     [in]  Size of range
@@ -1432,7 +1432,7 @@
         DWORD  size   = stack[2];
         DWORD  result;
 
-        TRACE("VirtualLock(%lx, %lx, %lx)\n", 
+        TRACE("VirtualLock(%lx, %lx, %lx)\n",
                    (DWORD)retv, (DWORD)base, size);
 
         result = VirtualLock(base, size);
@@ -1448,11 +1448,11 @@
 
 
     case 0x0019: /* VirtualUnlock */
-        /* 
+        /*
          * Input:   ECX: Current Process
          *
          *          EDX: Flat address of arguments on stack
-         * 
+         *
          *   DWORD *retv     [out] TRUE if success, FALSE if failure
          *   LPVOID base     [in]  Flat address of range to unlock
          *   DWORD  size     [in]  Size of range
@@ -1466,7 +1466,7 @@
         DWORD  size   = stack[2];
         DWORD  result;
 
-        TRACE("VirtualUnlock(%lx, %lx, %lx)\n", 
+        TRACE("VirtualUnlock(%lx, %lx, %lx)\n",
                    (DWORD)retv, (DWORD)base, size);
 
         result = VirtualUnlock(base, size);
@@ -1490,10 +1490,10 @@
          */
 
         TRACE("KGetSystemInfo()\n");
-        
+
         /*
-         * Note: Win32s reserves 0GB - 2GB for Win 3.1 and uses 2GB - 4GB as 
-         *       sparse memory arena. We do it the other way around, since 
+         * Note: Win32s reserves 0GB - 2GB for Win 3.1 and uses 2GB - 4GB as
+         *       sparse memory arena. We do it the other way around, since
          *       we have to reserve 3GB - 4GB for Linux, and thus use
          *       0GB - 3GB as sparse memory arena.
          *
@@ -1523,7 +1523,7 @@
             DWORD SparseFree;         /* Free size of sparse arena (bytes ?) */
         };
 
-        struct Win32sMemoryInfo *info = 
+        struct Win32sMemoryInfo *info =
                        (struct Win32sMemoryInfo *)W32S_APP2WINE(context->Esi);
 
         FIXME("KGlobalMemStat(%lx)\n", (DWORD)info);
@@ -1547,9 +1547,9 @@
 
 
     case 0x001D: /* VirtualAlloc called from 16-bit code */
-        /* 
+        /*
          * Input:   EDX: Segmented address of arguments on stack
-         * 
+         *
          *   LPVOID base     [in]  Flat address of region to reserve/commit
          *   DWORD  size     [in]  Size of region
          *   DWORD  type     [in]  Type of allocation
@@ -1566,7 +1566,7 @@
         DWORD  prot   = stack[3];
         DWORD  result;
 
-        TRACE("VirtualAlloc16(%lx, %lx, %lx, %lx)\n", 
+        TRACE("VirtualAlloc16(%lx, %lx, %lx, %lx)\n",
                    (DWORD)base, size, type, prot);
 
         if (type & 0x80000000)
@@ -1589,9 +1589,9 @@
 
 
     case 0x001E: /* VirtualFree called from 16-bit code */
-        /* 
+        /*
          * Input:   EDX: Segmented address of arguments on stack
-         * 
+         *
          *   LPVOID base     [in]  Flat address of region
          *   DWORD  size     [in]  Size of region
          *   DWORD  type     [in]  Type of operation
@@ -1606,7 +1606,7 @@
         DWORD  type   = stack[2];
         DWORD  result;
 
-        TRACE("VirtualFree16(%lx, %lx, %lx)\n", 
+        TRACE("VirtualFree16(%lx, %lx, %lx)\n",
                    (DWORD)base, size, type);
 
         result = VirtualFree(base, size, type);
@@ -1633,7 +1633,7 @@
     {
         DWORD *ptr = (DWORD *)W32S_APP2WINE(context->Ecx);
         BOOL set = context->Edx;
-        
+
         TRACE("FWorkingSetSize(%lx, %lx)\n", (DWORD)ptr, (DWORD)set);
 
         if (set)