summaryrefslogtreecommitdiffhomepage
path: root/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
diff options
context:
space:
mode:
authorAmlal EL Mahrouss <amlalelmahrouss@icloud.com>2024-07-02 22:00:35 +0200
committerAmlal EL Mahrouss <amlalelmahrouss@icloud.com>2024-07-02 22:00:49 +0200
commit375d0210dcb2070a12d916523f4a1dafff28360c (patch)
treed0c217f529b8069ea659778c2ee9ca20aeba33a4 /Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
parentf1d3744829a661d1600c2f3bbdbdf679ee0bd0e1 (diff)
MHR-36: Change namespace name, got out of the codename stage.
Signed-off-by: Amlal EL Mahrouss <amlalelmahrouss@icloud.com>
Diffstat (limited to 'Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp')
-rw-r--r--Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp54
1 files changed, 27 insertions, 27 deletions
diff --git a/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp b/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
index 657ab622..f41ee55e 100644
--- a/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
+++ b/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
@@ -10,84 +10,84 @@
/// @brief Handle GPF fault.
/// @param rsp
-EXTERN_C void idt_handle_gpf(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_gpf(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: General Protection Fault, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Handle page fault.
/// @param rsp
-EXTERN_C void idt_handle_pf(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_pf(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: Segmentation Fault, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Handle math fault.
/// @param rsp
-EXTERN_C void idt_handle_math(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_math(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: Math error, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Handle any generic fault.
/// @param rsp
-EXTERN_C void idt_handle_generic(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_generic(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: Execution error, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Handle #UD fault.
/// @param rsp
-EXTERN_C void idt_handle_ud(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_ud(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: Invalid interrupt, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Enter syscall from assembly.
/// @param stack the stack pushed from assembly routine.
/// @return nothing.
-EXTERN_C NewOS::Void hal_system_call_enter(NewOS::UIntPtr rcx, NewOS::UIntPtr rdx)
+EXTERN_C Kernel::Void hal_system_call_enter(Kernel::UIntPtr rcx, Kernel::UIntPtr rdx)
{
if (rcx <= (kSyscalls.Count() - 1))
{
- NewOS::kcout << "newoskrnl: syscall: enter.\r";
+ Kernel::kcout << "newoskrnl: syscall: enter.\r";
if (kSyscalls[rcx].Leak().Leak()->fHooked)
- (kSyscalls[rcx].Leak().Leak()->fProc)((NewOS::VoidPtr)rdx);
+ (kSyscalls[rcx].Leak().Leak()->fProc)((Kernel::VoidPtr)rdx);
- NewOS::kcout << "newoskrnl: syscall: exit.\r";
+ Kernel::kcout << "newoskrnl: syscall: exit.\r";
}
}
/// @brief Enter kernel call from assembly (DDK only).
/// @param stack the stack pushed from assembly routine.
/// @return nothing.
-EXTERN_C NewOS::Void hal_kernel_call_enter(NewOS::UIntPtr rcx, NewOS::UIntPtr rdx, NewOS::UIntPtr r8, NewOS::UIntPtr r9)
+EXTERN_C Kernel::Void hal_kernel_call_enter(Kernel::UIntPtr rcx, Kernel::UIntPtr rdx, Kernel::UIntPtr r8, Kernel::UIntPtr r9)
{
if (rcx != 0)
{
- NewOS::kcout << "newoskrnl: kerncall: enter.\r";
+ Kernel::kcout << "newoskrnl: kerncall: enter.\r";
- NewOS::kcout << "newoskrnl: kerncall: exit.\r";
+ Kernel::kcout << "newoskrnl: kerncall: exit.\r";
}
}