17c478bd9Sstevel@tonic-gate /******************************************************************************
27c478bd9Sstevel@tonic-gate  *
37b1019a6SJerry Jelinek  * Module Name: exstorob - AML object store support, store to object
47c478bd9Sstevel@tonic-gate  *
57c478bd9Sstevel@tonic-gate  *****************************************************************************/
67c478bd9Sstevel@tonic-gate 
7*35786f68SRobert Mustacchi /******************************************************************************
8*35786f68SRobert Mustacchi  *
9*35786f68SRobert Mustacchi  * 1. Copyright Notice
10*35786f68SRobert Mustacchi  *
11*35786f68SRobert Mustacchi  * Some or all of this work - Copyright (c) 1999 - 2018, Intel Corp.
127c478bd9Sstevel@tonic-gate  * All rights reserved.
137c478bd9Sstevel@tonic-gate  *
14*35786f68SRobert Mustacchi  * 2. License
15*35786f68SRobert Mustacchi  *
16*35786f68SRobert Mustacchi  * 2.1. This is your license from Intel Corp. under its intellectual property
17*35786f68SRobert Mustacchi  * rights. You may have additional license terms from the party that provided
18*35786f68SRobert Mustacchi  * you this software, covering your right to use that party's intellectual
19*35786f68SRobert Mustacchi  * property rights.
20*35786f68SRobert Mustacchi  *
21*35786f68SRobert Mustacchi  * 2.2. Intel grants, free of charge, to any person ("Licensee") obtaining a
22*35786f68SRobert Mustacchi  * copy of the source code appearing in this file ("Covered Code") an
23*35786f68SRobert Mustacchi  * irrevocable, perpetual, worldwide license under Intel's copyrights in the
24*35786f68SRobert Mustacchi  * base code distributed originally by Intel ("Original Intel Code") to copy,
25*35786f68SRobert Mustacchi  * make derivatives, distribute, use and display any portion of the Covered
26*35786f68SRobert Mustacchi  * Code in any form, with the right to sublicense such rights; and
27*35786f68SRobert Mustacchi  *
28*35786f68SRobert Mustacchi  * 2.3. Intel grants Licensee a non-exclusive and non-transferable patent
29*35786f68SRobert Mustacchi  * license (with the right to sublicense), under only those claims of Intel
30*35786f68SRobert Mustacchi  * patents that are infringed by the Original Intel Code, to make, use, sell,
31*35786f68SRobert Mustacchi  * offer to sell, and import the Covered Code and derivative works thereof
32*35786f68SRobert Mustacchi  * solely to the minimum extent necessary to exercise the above copyright
33*35786f68SRobert Mustacchi  * license, and in no event shall the patent license extend to any additions
34*35786f68SRobert Mustacchi  * to or modifications of the Original Intel Code. No other license or right
35*35786f68SRobert Mustacchi  * is granted directly or by implication, estoppel or otherwise;
36*35786f68SRobert Mustacchi  *
37*35786f68SRobert Mustacchi  * The above copyright and patent license is granted only if the following
38*35786f68SRobert Mustacchi  * conditions are met:
39*35786f68SRobert Mustacchi  *
40*35786f68SRobert Mustacchi  * 3. Conditions
41*35786f68SRobert Mustacchi  *
42*35786f68SRobert Mustacchi  * 3.1. Redistribution of Source with Rights to Further Distribute Source.
43*35786f68SRobert Mustacchi  * Redistribution of source code of any substantial portion of the Covered
44*35786f68SRobert Mustacchi  * Code or modification with rights to further distribute source must include
45*35786f68SRobert Mustacchi  * the above Copyright Notice, the above License, this list of Conditions,
46*35786f68SRobert Mustacchi  * and the following Disclaimer and Export Compliance provision. In addition,
47*35786f68SRobert Mustacchi  * Licensee must cause all Covered Code to which Licensee contributes to
48*35786f68SRobert Mustacchi  * contain a file documenting the changes Licensee made to create that Covered
49*35786f68SRobert Mustacchi  * Code and the date of any change. Licensee must include in that file the
50*35786f68SRobert Mustacchi  * documentation of any changes made by any predecessor Licensee. Licensee
51*35786f68SRobert Mustacchi  * must include a prominent statement that the modification is derived,
52*35786f68SRobert Mustacchi  * directly or indirectly, from Original Intel Code.
53*35786f68SRobert Mustacchi  *
54*35786f68SRobert Mustacchi  * 3.2. Redistribution of Source with no Rights to Further Distribute Source.
55*35786f68SRobert Mustacchi  * Redistribution of source code of any substantial portion of the Covered
56*35786f68SRobert Mustacchi  * Code or modification without rights to further distribute source must
57*35786f68SRobert Mustacchi  * include the following Disclaimer and Export Compliance provision in the
58*35786f68SRobert Mustacchi  * documentation and/or other materials provided with distribution. In
59*35786f68SRobert Mustacchi  * addition, Licensee may not authorize further sublicense of source of any
60*35786f68SRobert Mustacchi  * portion of the Covered Code, and must include terms to the effect that the
61*35786f68SRobert Mustacchi  * license from Licensee to its licensee is limited to the intellectual
62*35786f68SRobert Mustacchi  * property embodied in the software Licensee provides to its licensee, and
63*35786f68SRobert Mustacchi  * not to intellectual property embodied in modifications its licensee may
64*35786f68SRobert Mustacchi  * make.
65*35786f68SRobert Mustacchi  *
66*35786f68SRobert Mustacchi  * 3.3. Redistribution of Executable. Redistribution in executable form of any
67*35786f68SRobert Mustacchi  * substantial portion of the Covered Code or modification must reproduce the
68*35786f68SRobert Mustacchi  * above Copyright Notice, and the following Disclaimer and Export Compliance
69*35786f68SRobert Mustacchi  * provision in the documentation and/or other materials provided with the
70*35786f68SRobert Mustacchi  * distribution.
71*35786f68SRobert Mustacchi  *
72*35786f68SRobert Mustacchi  * 3.4. Intel retains all right, title, and interest in and to the Original
73*35786f68SRobert Mustacchi  * Intel Code.
74*35786f68SRobert Mustacchi  *
75*35786f68SRobert Mustacchi  * 3.5. Neither the name Intel nor any other trademark owned or controlled by
76*35786f68SRobert Mustacchi  * Intel shall be used in advertising or otherwise to promote the sale, use or
77*35786f68SRobert Mustacchi  * other dealings in products derived from or relating to the Covered Code
78*35786f68SRobert Mustacchi  * without prior written authorization from Intel.
79*35786f68SRobert Mustacchi  *
80*35786f68SRobert Mustacchi  * 4. Disclaimer and Export Compliance
81*35786f68SRobert Mustacchi  *
82*35786f68SRobert Mustacchi  * 4.1. INTEL MAKES NO WARRANTY OF ANY KIND REGARDING ANY SOFTWARE PROVIDED
83*35786f68SRobert Mustacchi  * HERE. ANY SOFTWARE ORIGINATING FROM INTEL OR DERIVED FROM INTEL SOFTWARE
84*35786f68SRobert Mustacchi  * IS PROVIDED "AS IS," AND INTEL WILL NOT PROVIDE ANY SUPPORT, ASSISTANCE,
85*35786f68SRobert Mustacchi  * INSTALLATION, TRAINING OR OTHER SERVICES. INTEL WILL NOT PROVIDE ANY
86*35786f68SRobert Mustacchi  * UPDATES, ENHANCEMENTS OR EXTENSIONS. INTEL SPECIFICALLY DISCLAIMS ANY
87*35786f68SRobert Mustacchi  * IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A
88*35786f68SRobert Mustacchi  * PARTICULAR PURPOSE.
89*35786f68SRobert Mustacchi  *
90*35786f68SRobert Mustacchi  * 4.2. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY TO LICENSEE, ITS LICENSEES
91*35786f68SRobert Mustacchi  * OR ANY OTHER THIRD PARTY, FOR ANY LOST PROFITS, LOST DATA, LOSS OF USE OR
92*35786f68SRobert Mustacchi  * COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY INDIRECT,
93*35786f68SRobert Mustacchi  * SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, UNDER ANY
94*35786f68SRobert Mustacchi  * CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF WHETHER INTEL
95*35786f68SRobert Mustacchi  * HAS ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. THESE LIMITATIONS
96*35786f68SRobert Mustacchi  * SHALL APPLY NOTWITHSTANDING THE FAILURE OF THE ESSENTIAL PURPOSE OF ANY
97*35786f68SRobert Mustacchi  * LIMITED REMEDY.
98*35786f68SRobert Mustacchi  *
99*35786f68SRobert Mustacchi  * 4.3. Licensee shall not export, either directly or indirectly, any of this
100*35786f68SRobert Mustacchi  * software or system incorporating such software without first obtaining any
101*35786f68SRobert Mustacchi  * required license or other approval from the U. S. Department of Commerce or
102*35786f68SRobert Mustacchi  * any other agency or department of the United States Government. In the
103*35786f68SRobert Mustacchi  * event Licensee exports any such software from the United States or
104*35786f68SRobert Mustacchi  * re-exports any such software from a foreign destination, Licensee shall
105*35786f68SRobert Mustacchi  * ensure that the distribution and export/re-export of the software is in
106*35786f68SRobert Mustacchi  * compliance with all laws, regulations, orders, or other restrictions of the
107*35786f68SRobert Mustacchi  * U.S. Export Administration Regulations. Licensee agrees that neither it nor
108*35786f68SRobert Mustacchi  * any of its subsidiaries will export/re-export any technical data, process,
109*35786f68SRobert Mustacchi  * software, or service, directly or indirectly, to any country for which the
110*35786f68SRobert Mustacchi  * United States government or any agency thereof requires an export license,
111*35786f68SRobert Mustacchi  * other governmental approval, or letter of assurance, without first obtaining
112*35786f68SRobert Mustacchi  * such license, approval or letter.
113*35786f68SRobert Mustacchi  *
114*35786f68SRobert Mustacchi  *****************************************************************************
115*35786f68SRobert Mustacchi  *
116*35786f68SRobert Mustacchi  * Alternatively, you may choose to be licensed under the terms of the
117*35786f68SRobert Mustacchi  * following license:
118*35786f68SRobert Mustacchi  *
11926f3cdf0SGordon Ross  * Redistribution and use in source and binary forms, with or without
12026f3cdf0SGordon Ross  * modification, are permitted provided that the following conditions
12126f3cdf0SGordon Ross  * are met:
12226f3cdf0SGordon Ross  * 1. Redistributions of source code must retain the above copyright
12326f3cdf0SGordon Ross  *    notice, this list of conditions, and the following disclaimer,
12426f3cdf0SGordon Ross  *    without modification.
12526f3cdf0SGordon Ross  * 2. Redistributions in binary form must reproduce at minimum a disclaimer
12626f3cdf0SGordon Ross  *    substantially similar to the "NO WARRANTY" disclaimer below
12726f3cdf0SGordon Ross  *    ("Disclaimer") and any redistribution must be conditioned upon
12826f3cdf0SGordon Ross  *    including a substantially similar Disclaimer requirement for further
12926f3cdf0SGordon Ross  *    binary redistribution.
13026f3cdf0SGordon Ross  * 3. Neither the names of the above-listed copyright holders nor the names
13126f3cdf0SGordon Ross  *    of any contributors may be used to endorse or promote products derived
13226f3cdf0SGordon Ross  *    from this software without specific prior written permission.
13326f3cdf0SGordon Ross  *
13426f3cdf0SGordon Ross  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
13526f3cdf0SGordon Ross  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
136*35786f68SRobert Mustacchi  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
13726f3cdf0SGordon Ross  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
138*35786f68SRobert Mustacchi  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
139*35786f68SRobert Mustacchi  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
140*35786f68SRobert Mustacchi  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
141*35786f68SRobert Mustacchi  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
142*35786f68SRobert Mustacchi  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
143*35786f68SRobert Mustacchi  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
144*35786f68SRobert Mustacchi  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
145*35786f68SRobert Mustacchi  *
146*35786f68SRobert Mustacchi  * Alternatively, you may choose to be licensed under the terms of the
147*35786f68SRobert Mustacchi  * GNU General Public License ("GPL") version 2 as published by the Free
148*35786f68SRobert Mustacchi  * Software Foundation.
149*35786f68SRobert Mustacchi  *
150*35786f68SRobert Mustacchi  *****************************************************************************/
1517c478bd9Sstevel@tonic-gate 
1527c478bd9Sstevel@tonic-gate #include "acpi.h"
153aa2aa9a6SDana Myers #include "accommon.h"
1547c478bd9Sstevel@tonic-gate #include "acinterp.h"
1557c478bd9Sstevel@tonic-gate 
1567c478bd9Sstevel@tonic-gate 
1577c478bd9Sstevel@tonic-gate #define _COMPONENT          ACPI_EXECUTER
1587c478bd9Sstevel@tonic-gate         ACPI_MODULE_NAME    ("exstorob")
1597c478bd9Sstevel@tonic-gate 
1607c478bd9Sstevel@tonic-gate 
1617c478bd9Sstevel@tonic-gate /*******************************************************************************
1627c478bd9Sstevel@tonic-gate  *
1637c478bd9Sstevel@tonic-gate  * FUNCTION:    AcpiExStoreBufferToBuffer
1647c478bd9Sstevel@tonic-gate  *
1657c478bd9Sstevel@tonic-gate  * PARAMETERS:  SourceDesc          - Source object to copy
1667c478bd9Sstevel@tonic-gate  *              TargetDesc          - Destination object of the copy
1677c478bd9Sstevel@tonic-gate  *
1687c478bd9Sstevel@tonic-gate  * RETURN:      Status
1697c478bd9Sstevel@tonic-gate  *
1707c478bd9Sstevel@tonic-gate  * DESCRIPTION: Copy a buffer object to another buffer object.
1717c478bd9Sstevel@tonic-gate  *
1727c478bd9Sstevel@tonic-gate  ******************************************************************************/
1737c478bd9Sstevel@tonic-gate 
1747c478bd9Sstevel@tonic-gate ACPI_STATUS
AcpiExStoreBufferToBuffer(ACPI_OPERAND_OBJECT * SourceDesc,ACPI_OPERAND_OBJECT * TargetDesc)1757c478bd9Sstevel@tonic-gate AcpiExStoreBufferToBuffer (
1767c478bd9Sstevel@tonic-gate     ACPI_OPERAND_OBJECT     *SourceDesc,
1777c478bd9Sstevel@tonic-gate     ACPI_OPERAND_OBJECT     *TargetDesc)
1787c478bd9Sstevel@tonic-gate {
1797c478bd9Sstevel@tonic-gate     UINT32                  Length;
1807c478bd9Sstevel@tonic-gate     UINT8                   *Buffer;
1817c478bd9Sstevel@tonic-gate 
1827c478bd9Sstevel@tonic-gate 
18327f7c583Smyers     ACPI_FUNCTION_TRACE_PTR (ExStoreBufferToBuffer, SourceDesc);
1847c478bd9Sstevel@tonic-gate 
1857c478bd9Sstevel@tonic-gate 
18657190917SDana Myers     /* If Source and Target are the same, just return */
18757190917SDana Myers 
18857190917SDana Myers     if (SourceDesc == TargetDesc)
18957190917SDana Myers     {
19057190917SDana Myers         return_ACPI_STATUS (AE_OK);
19157190917SDana Myers     }
19257190917SDana Myers 
1937c478bd9Sstevel@tonic-gate     /* We know that SourceDesc is a buffer by now */
1947c478bd9Sstevel@tonic-gate 
19530082d0cSmyers     Buffer = ACPI_CAST_PTR (UINT8, SourceDesc->Buffer.Pointer);
1967c478bd9Sstevel@tonic-gate     Length = SourceDesc->Buffer.Length;
1977c478bd9Sstevel@tonic-gate 
1987c478bd9Sstevel@tonic-gate     /*
1997c478bd9Sstevel@tonic-gate      * If target is a buffer of length zero or is a static buffer,
2007c478bd9Sstevel@tonic-gate      * allocate a new buffer of the proper length
2017c478bd9Sstevel@tonic-gate      */
2027c478bd9Sstevel@tonic-gate     if ((TargetDesc->Buffer.Length == 0) ||
2037c478bd9Sstevel@tonic-gate         (TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER))
2047c478bd9Sstevel@tonic-gate     {
20527f7c583Smyers         TargetDesc->Buffer.Pointer = ACPI_ALLOCATE (Length);
2067c478bd9Sstevel@tonic-gate         if (!TargetDesc->Buffer.Pointer)
2077c478bd9Sstevel@tonic-gate         {
2087c478bd9Sstevel@tonic-gate             return_ACPI_STATUS (AE_NO_MEMORY);
2097c478bd9Sstevel@tonic-gate         }
2107c478bd9Sstevel@tonic-gate 
2117c478bd9Sstevel@tonic-gate         TargetDesc->Buffer.Length = Length;
2127c478bd9Sstevel@tonic-gate     }
2137c478bd9Sstevel@tonic-gate 
2147c478bd9Sstevel@tonic-gate     /* Copy source buffer to target buffer */
2157c478bd9Sstevel@tonic-gate 
2167c478bd9Sstevel@tonic-gate     if (Length <= TargetDesc->Buffer.Length)
2177c478bd9Sstevel@tonic-gate     {
2187c478bd9Sstevel@tonic-gate         /* Clear existing buffer and copy in the new one */
2197c478bd9Sstevel@tonic-gate 
2207b1019a6SJerry Jelinek         memset (TargetDesc->Buffer.Pointer, 0, TargetDesc->Buffer.Length);
2217b1019a6SJerry Jelinek         memcpy (TargetDesc->Buffer.Pointer, Buffer, Length);
2227c478bd9Sstevel@tonic-gate 
2237c478bd9Sstevel@tonic-gate #ifdef ACPI_OBSOLETE_BEHAVIOR
2247c478bd9Sstevel@tonic-gate         /*
2257c478bd9Sstevel@tonic-gate          * NOTE: ACPI versions up to 3.0 specified that the buffer must be
2267b1019a6SJerry Jelinek          * truncated if the string is smaller than the buffer. However, "other"
2277c478bd9Sstevel@tonic-gate          * implementations of ACPI never did this and thus became the defacto
2287c478bd9Sstevel@tonic-gate          * standard. ACPI 3.0A changes this behavior such that the buffer
2297c478bd9Sstevel@tonic-gate          * is no longer truncated.
2307c478bd9Sstevel@tonic-gate          */
2317c478bd9Sstevel@tonic-gate 
2327c478bd9Sstevel@tonic-gate         /*
2337c478bd9Sstevel@tonic-gate          * OBSOLETE BEHAVIOR:
2347c478bd9Sstevel@tonic-gate          * If the original source was a string, we must truncate the buffer,
2357b1019a6SJerry Jelinek          * according to the ACPI spec. Integer-to-Buffer and Buffer-to-Buffer
2367c478bd9Sstevel@tonic-gate          * copy must not truncate the original buffer.
2377c478bd9Sstevel@tonic-gate          */
2387c478bd9Sstevel@tonic-gate         if (OriginalSrcType == ACPI_TYPE_STRING)
2397c478bd9Sstevel@tonic-gate         {
2407c478bd9Sstevel@tonic-gate             /* Set the new length of the target */
2417c478bd9Sstevel@tonic-gate 
2427c478bd9Sstevel@tonic-gate             TargetDesc->Buffer.Length = Length;
2437c478bd9Sstevel@tonic-gate         }
2447c478bd9Sstevel@tonic-gate #endif
2457c478bd9Sstevel@tonic-gate     }
2467c478bd9Sstevel@tonic-gate     else
2477c478bd9Sstevel@tonic-gate     {
2487c478bd9Sstevel@tonic-gate         /* Truncate the source, copy only what will fit */
2497c478bd9Sstevel@tonic-gate 
2507b1019a6SJerry Jelinek         memcpy (TargetDesc->Buffer.Pointer, Buffer,
2517c478bd9Sstevel@tonic-gate             TargetDesc->Buffer.Length);
2527c478bd9Sstevel@tonic-gate 
2537c478bd9Sstevel@tonic-gate         ACPI_DEBUG_PRINT ((ACPI_DB_INFO,
2547c478bd9Sstevel@tonic-gate             "Truncating source buffer from %X to %X\n",
2557c478bd9Sstevel@tonic-gate             Length, TargetDesc->Buffer.Length));
2567c478bd9Sstevel@tonic-gate     }
2577c478bd9Sstevel@tonic-gate 
2587c478bd9Sstevel@tonic-gate     /* Copy flags */
2597c478bd9Sstevel@tonic-gate 
2607c478bd9Sstevel@tonic-gate     TargetDesc->Buffer.Flags = SourceDesc->Buffer.Flags;
2617c478bd9Sstevel@tonic-gate     TargetDesc->Common.Flags &= ~AOPOBJ_STATIC_POINTER;
2627c478bd9Sstevel@tonic-gate     return_ACPI_STATUS (AE_OK);
2637c478bd9Sstevel@tonic-gate }
2647c478bd9Sstevel@tonic-gate 
2657c478bd9Sstevel@tonic-gate 
2667c478bd9Sstevel@tonic-gate /*******************************************************************************
2677c478bd9Sstevel@tonic-gate  *
2687c478bd9Sstevel@tonic-gate  * FUNCTION:    AcpiExStoreStringToString
2697c478bd9Sstevel@tonic-gate  *
2707c478bd9Sstevel@tonic-gate  * PARAMETERS:  SourceDesc          - Source object to copy
2717c478bd9Sstevel@tonic-gate  *              TargetDesc          - Destination object of the copy
2727c478bd9Sstevel@tonic-gate  *
2737c478bd9Sstevel@tonic-gate  * RETURN:      Status
2747c478bd9Sstevel@tonic-gate  *
2757c478bd9Sstevel@tonic-gate  * DESCRIPTION: Copy a String object to another String object
2767c478bd9Sstevel@tonic-gate  *
2777c478bd9Sstevel@tonic-gate  ******************************************************************************/
2787c478bd9Sstevel@tonic-gate 
2797c478bd9Sstevel@tonic-gate ACPI_STATUS
AcpiExStoreStringToString(ACPI_OPERAND_OBJECT * SourceDesc,ACPI_OPERAND_OBJECT * TargetDesc)2807c478bd9Sstevel@tonic-gate AcpiExStoreStringToString (
2817c478bd9Sstevel@tonic-gate     ACPI_OPERAND_OBJECT     *SourceDesc,
2827c478bd9Sstevel@tonic-gate     ACPI_OPERAND_OBJECT     *TargetDesc)
2837c478bd9Sstevel@tonic-gate {
2847c478bd9Sstevel@tonic-gate     UINT32                  Length;
2857c478bd9Sstevel@tonic-gate     UINT8                   *Buffer;
2867c478bd9Sstevel@tonic-gate 
2877c478bd9Sstevel@tonic-gate 
28827f7c583Smyers     ACPI_FUNCTION_TRACE_PTR (ExStoreStringToString, SourceDesc);
2897c478bd9Sstevel@tonic-gate 
2907c478bd9Sstevel@tonic-gate 
29157190917SDana Myers     /* If Source and Target are the same, just return */
29257190917SDana Myers 
29357190917SDana Myers     if (SourceDesc == TargetDesc)
29457190917SDana Myers     {
29557190917SDana Myers         return_ACPI_STATUS (AE_OK);
29657190917SDana Myers     }
29757190917SDana Myers 
2987c478bd9Sstevel@tonic-gate     /* We know that SourceDesc is a string by now */
2997c478bd9Sstevel@tonic-gate 
30030082d0cSmyers     Buffer = ACPI_CAST_PTR (UINT8, SourceDesc->String.Pointer);
3017c478bd9Sstevel@tonic-gate     Length = SourceDesc->String.Length;
3027c478bd9Sstevel@tonic-gate 
3037c478bd9Sstevel@tonic-gate     /*
3047c478bd9Sstevel@tonic-gate      * Replace existing string value if it will fit and the string
3057c478bd9Sstevel@tonic-gate      * pointer is not a static pointer (part of an ACPI table)
3067c478bd9Sstevel@tonic-gate      */
3077c478bd9Sstevel@tonic-gate     if ((Length < TargetDesc->String.Length) &&
3087c478bd9Sstevel@tonic-gate        (!(TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER)))
3097c478bd9Sstevel@tonic-gate     {
3107c478bd9Sstevel@tonic-gate         /*
3117c478bd9Sstevel@tonic-gate          * String will fit in existing non-static buffer.
3127c478bd9Sstevel@tonic-gate          * Clear old string and copy in the new one
3137c478bd9Sstevel@tonic-gate          */
3147b1019a6SJerry Jelinek         memset (TargetDesc->String.Pointer, 0,
3157c478bd9Sstevel@tonic-gate             (ACPI_SIZE) TargetDesc->String.Length + 1);
3167b1019a6SJerry Jelinek         memcpy (TargetDesc->String.Pointer, Buffer, Length);
3177c478bd9Sstevel@tonic-gate     }
3187c478bd9Sstevel@tonic-gate     else
3197c478bd9Sstevel@tonic-gate     {
3207c478bd9Sstevel@tonic-gate         /*
3217c478bd9Sstevel@tonic-gate          * Free the current buffer, then allocate a new buffer
3227c478bd9Sstevel@tonic-gate          * large enough to hold the value
3237c478bd9Sstevel@tonic-gate          */
3247c478bd9Sstevel@tonic-gate         if (TargetDesc->String.Pointer &&
3257c478bd9Sstevel@tonic-gate            (!(TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER)))
3267c478bd9Sstevel@tonic-gate         {
3277c478bd9Sstevel@tonic-gate             /* Only free if not a pointer into the DSDT */
3287c478bd9Sstevel@tonic-gate 
32927f7c583Smyers             ACPI_FREE (TargetDesc->String.Pointer);
3307c478bd9Sstevel@tonic-gate         }
3317c478bd9Sstevel@tonic-gate 
3327b1019a6SJerry Jelinek         TargetDesc->String.Pointer =
3337b1019a6SJerry Jelinek             ACPI_ALLOCATE_ZEROED ((ACPI_SIZE) Length + 1);
3347b1019a6SJerry Jelinek 
3357c478bd9Sstevel@tonic-gate         if (!TargetDesc->String.Pointer)
3367c478bd9Sstevel@tonic-gate         {
3377c478bd9Sstevel@tonic-gate             return_ACPI_STATUS (AE_NO_MEMORY);
3387c478bd9Sstevel@tonic-gate         }
3397c478bd9Sstevel@tonic-gate 
3407c478bd9Sstevel@tonic-gate         TargetDesc->Common.Flags &= ~AOPOBJ_STATIC_POINTER;
3417b1019a6SJerry Jelinek         memcpy (TargetDesc->String.Pointer, Buffer, Length);
3427c478bd9Sstevel@tonic-gate     }
3437c478bd9Sstevel@tonic-gate 
3447c478bd9Sstevel@tonic-gate     /* Set the new target length */
3457c478bd9Sstevel@tonic-gate 
3467c478bd9Sstevel@tonic-gate     TargetDesc->String.Length = Length;
3477c478bd9Sstevel@tonic-gate     return_ACPI_STATUS (AE_OK);
3487c478bd9Sstevel@tonic-gate }
349