summaryrefslogtreecommitdiffhomepage
path: root/Private/Source
diff options
context:
space:
mode:
authorAmlal El Mahrouss <amlal@el-mahrouss-logic.com>2024-03-23 00:59:31 +0100
committerAmlal El Mahrouss <amlal@el-mahrouss-logic.com>2024-03-23 01:04:00 +0100
commit77bf7cab39fef40797e8832aaef91abbdf0098f5 (patch)
tree157f6f82188c505f1333abf93aeda63b3373cf04 /Private/Source
parent954285b6c9553a047d0789707ad520c84099e74a (diff)
Kernel and Bootloader: See below.
Kernel: Add kPefArchPowerPC type. Kernel: Working on NewFS support for NewKernel. Kernel: Cleaned-up DriveManager. Kernel: Use kernel mouse on install mode. Bootloader: Refactor and cleanup. FirmwareKit: Fix EPM header. Signed-off-by: Amlal El Mahrouss <amlal@el-mahrouss-logic.com>
Diffstat (limited to 'Private/Source')
-rw-r--r--Private/Source/CxxAbi.cxx2
-rw-r--r--Private/Source/KernelCheck.cxx2
-rw-r--r--Private/Source/NewFS+IO.cxx4
-rw-r--r--Private/Source/NewFS+Journal.cxx2
-rw-r--r--Private/Source/ThreadLocalStorage.cxx6
5 files changed, 8 insertions, 8 deletions
diff --git a/Private/Source/CxxAbi.cxx b/Private/Source/CxxAbi.cxx
index 619fe8e0..730e9f81 100644
--- a/Private/Source/CxxAbi.cxx
+++ b/Private/Source/CxxAbi.cxx
@@ -13,7 +13,7 @@ atexit_func_entry_t __atexit_funcs[kDSOMaxObjects];
uarch_t __atexit_func_count;
extern "C" void __cxa_pure_virtual() {
- HCore::kcout << "HCoreKrnl.exe: C++ placeholder method.\n";
+ HCore::kcout << "NewKernel.exe: C++ placeholder method.\n";
}
extern "C" void ___chkstk_ms() {
diff --git a/Private/Source/KernelCheck.cxx b/Private/Source/KernelCheck.cxx
index 0fb81d47..40833a87 100644
--- a/Private/Source/KernelCheck.cxx
+++ b/Private/Source/KernelCheck.cxx
@@ -22,7 +22,7 @@ extern "C" [[noreturn]] void ke_wait_for_debugger() {
namespace HCore {
void ke_stop(const HCore::Int &id) {
kcout << "*** STOP *** \r\n";
- kcout << "*** HCoreKrnl.exe has trigerred a runtime stop. *** \r\n";
+ kcout << "*** NewKernel.exe has trigerred a runtime stop. *** \r\n";
switch (id) {
case RUNTIME_CHECK_PROCESS: {
diff --git a/Private/Source/NewFS+IO.cxx b/Private/Source/NewFS+IO.cxx
index 9d03e3ae..a62970e7 100644
--- a/Private/Source/NewFS+IO.cxx
+++ b/Private/Source/NewFS+IO.cxx
@@ -33,7 +33,7 @@ enum {
kHCFSSubDriveCount,
};
-Int32 ke_newfs_read(Mountpoint* Mnt, DriveTrait& DrvTrait, Int32 DrvIndex) {
+Int32 ke_newfs_read(MountpointInterface* Mnt, DriveTrait& DrvTrait, Int32 DrvIndex) {
if (!Mnt) return -1;
switch (DrvIndex) {
@@ -58,7 +58,7 @@ Int32 ke_newfs_read(Mountpoint* Mnt, DriveTrait& DrvTrait, Int32 DrvIndex) {
return DrvTrait.fPacket.fPacketGood;
}
-Int32 ke_newfs_write(Mountpoint* Mnt, DriveTrait& DrvTrait, Int32 DrvIndex) {
+Int32 ke_newfs_write(MountpointInterface* Mnt, DriveTrait& DrvTrait, Int32 DrvIndex) {
if (!Mnt) return -1;
switch (DrvIndex) {
diff --git a/Private/Source/NewFS+Journal.cxx b/Private/Source/NewFS+Journal.cxx
index ec3c5eb7..b693e696 100644
--- a/Private/Source/NewFS+Journal.cxx
+++ b/Private/Source/NewFS+Journal.cxx
@@ -45,7 +45,7 @@ class NewFSJournalRunner final {
switch (operation) {
case kNewFSOpLog: {
if (!classPtr) {
- kcout << "HCoreKrnl.exe: Miss for classPtr at "
+ kcout << "NewKernel.exe: Miss for classPtr at "
"NewFSJournalManager::Run(classPtr) "
<< __FILE__ << "\n";
return false;
diff --git a/Private/Source/ThreadLocalStorage.cxx b/Private/Source/ThreadLocalStorage.cxx
index ab3b8383..45a52e46 100644
--- a/Private/Source/ThreadLocalStorage.cxx
+++ b/Private/Source/ThreadLocalStorage.cxx
@@ -31,7 +31,7 @@ Boolean tls_check_tib(ThreadInformationBlock* tib) {
Encoder encoder;
const char* tibAsBytes = encoder.AsBytes(tib);
- kcout << "HCoreKrnl\\TLS: Checking for a valid cookie...\n";
+ kcout << "NewKernel.exe: Checking for a valid cookie...\n";
return tibAsBytes[0] == kCookieMag0 && tibAsBytes[1] == kCookieMag1 &&
tibAsBytes[2] == kCookieMag2;
@@ -46,9 +46,9 @@ EXTERN_C Void tls_check_syscall_impl(HCore::HAL::StackFramePtr stackPtr) noexcep
ThreadInformationBlock* tib = (ThreadInformationBlock*)stackPtr->Gs;
if (!tls_check_tib(tib)) {
- kcout << "HCoreKrnl\\TLS: Verification failed, Crashing...\n";
+ kcout << "NewKernel.exe: Verification failed, Crashing...\n";
ProcessManager::Shared().Leak().GetCurrent().Leak().Crash();
}
- kcout << "HCoreKrnl\\TLS: Verification succeeded! Keeping on...\n";
+ kcout << "NewKernel.exe: Verification succeeded! Keeping on...\n";
}