summaryrefslogtreecommitdiffhomepage
path: root/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp')
-rw-r--r--Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp54
1 files changed, 27 insertions, 27 deletions
diff --git a/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp b/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
index 657ab622..f41ee55e 100644
--- a/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
+++ b/Kernel/HALKit/AMD64/HalCoreInterruptHandlerAMD64.cpp
@@ -10,84 +10,84 @@
/// @brief Handle GPF fault.
/// @param rsp
-EXTERN_C void idt_handle_gpf(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_gpf(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: General Protection Fault, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Handle page fault.
/// @param rsp
-EXTERN_C void idt_handle_pf(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_pf(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: Segmentation Fault, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Handle math fault.
/// @param rsp
-EXTERN_C void idt_handle_math(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_math(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: Math error, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Handle any generic fault.
/// @param rsp
-EXTERN_C void idt_handle_generic(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_generic(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: Execution error, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Handle #UD fault.
/// @param rsp
-EXTERN_C void idt_handle_ud(NewOS::UIntPtr rsp)
+EXTERN_C void idt_handle_ud(Kernel::UIntPtr rsp)
{
- NewOS::kcout
+ Kernel::kcout
<< "newoskrnl: Invalid interrupt, caused by "
- << NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
+ << Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().GetName();
- NewOS::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
+ Kernel::ProcessScheduler::The().Leak().TheCurrent().Leak().Crash();
}
/// @brief Enter syscall from assembly.
/// @param stack the stack pushed from assembly routine.
/// @return nothing.
-EXTERN_C NewOS::Void hal_system_call_enter(NewOS::UIntPtr rcx, NewOS::UIntPtr rdx)
+EXTERN_C Kernel::Void hal_system_call_enter(Kernel::UIntPtr rcx, Kernel::UIntPtr rdx)
{
if (rcx <= (kSyscalls.Count() - 1))
{
- NewOS::kcout << "newoskrnl: syscall: enter.\r";
+ Kernel::kcout << "newoskrnl: syscall: enter.\r";
if (kSyscalls[rcx].Leak().Leak()->fHooked)
- (kSyscalls[rcx].Leak().Leak()->fProc)((NewOS::VoidPtr)rdx);
+ (kSyscalls[rcx].Leak().Leak()->fProc)((Kernel::VoidPtr)rdx);
- NewOS::kcout << "newoskrnl: syscall: exit.\r";
+ Kernel::kcout << "newoskrnl: syscall: exit.\r";
}
}
/// @brief Enter kernel call from assembly (DDK only).
/// @param stack the stack pushed from assembly routine.
/// @return nothing.
-EXTERN_C NewOS::Void hal_kernel_call_enter(NewOS::UIntPtr rcx, NewOS::UIntPtr rdx, NewOS::UIntPtr r8, NewOS::UIntPtr r9)
+EXTERN_C Kernel::Void hal_kernel_call_enter(Kernel::UIntPtr rcx, Kernel::UIntPtr rdx, Kernel::UIntPtr r8, Kernel::UIntPtr r9)
{
if (rcx != 0)
{
- NewOS::kcout << "newoskrnl: kerncall: enter.\r";
+ Kernel::kcout << "newoskrnl: kerncall: enter.\r";
- NewOS::kcout << "newoskrnl: kerncall: exit.\r";
+ Kernel::kcout << "newoskrnl: kerncall: exit.\r";
}
}