From 01fb3ca21dd5846ecd7e4e94571ede5a5264d9a6 Mon Sep 17 00:00:00 2001 From: Amlal EL Mahrouss Date: Tue, 30 Jul 2024 18:06:17 +0200 Subject: [SMP] WiP impelementation of SMP inside the HAL. - Doing R&D on SMP on AMD64, - Working on a first application. Signed-off-by: Amlal EL Mahrouss --- Kernel/KernelKit/Heap.hxx | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) (limited to 'Kernel/KernelKit/Heap.hxx') diff --git a/Kernel/KernelKit/Heap.hxx b/Kernel/KernelKit/Heap.hxx index 0f673ffb..1ed029cd 100644 --- a/Kernel/KernelKit/Heap.hxx +++ b/Kernel/KernelKit/Heap.hxx @@ -18,12 +18,12 @@ namespace Kernel /// @brief Declare pointer as free. /// @param allocatedPtr the pointer. /// @return - Int32 ke_delete_ke_heap(voidPtr allocatedPtr); + Int32 mm_delete_ke_heap(voidPtr allocatedPtr); /// @brief Declare a new size for allocatedPtr. /// @param allocatedPtr the pointer. /// @return - voidPtr ke_realloc_ke_heap(voidPtr allocatedPtr, SizeT newSz); + voidPtr mm_realloc_ke_heap(voidPtr allocatedPtr, SizeT newSz); /// @brief Check if pointer is a valid kernel pointer. /// @param allocatedPtr the pointer @@ -35,17 +35,17 @@ namespace Kernel /// @param rw read write (true to enable it) /// @param user is it accesible by user processes? /// @return the pointer - voidPtr ke_new_ke_heap(const SizeT sz, const Bool rw, const Bool user); + voidPtr mm_new_ke_heap(const SizeT sz, const Bool rw, const Bool user); /// @brief Protect the heap with a CRC value. /// @param allocatedPtr pointer. /// @return if it valid: point has crc now., otherwise fail. - Boolean ke_protect_ke_heap(VoidPtr allocatedPtr); + Boolean mm_protect_ke_heap(VoidPtr allocatedPtr); /// @brief Makes a kernel heap page. /// @param allocatedPtr the page pointer. /// @return - Int32 ke_make_ke_page(VoidPtr allocatedPtr); + Int32 mm_make_ke_page(VoidPtr allocatedPtr); } // namespace Kernel #endif // !_INC_KERNEL_HEAP_HXX_ -- cgit v1.2.3