17c478bd9Sstevel@tonic-gate /****************************************************************************** 27c478bd9Sstevel@tonic-gate * 37c478bd9Sstevel@tonic-gate * Name: acmacros.h - C macros for the entire subsystem. 47c478bd9Sstevel@tonic-gate * 57c478bd9Sstevel@tonic-gate *****************************************************************************/ 67c478bd9Sstevel@tonic-gate 7*35786f68SRobert Mustacchi /****************************************************************************** 8*35786f68SRobert Mustacchi * 9*35786f68SRobert Mustacchi * 1. Copyright Notice 10*35786f68SRobert Mustacchi * 11*35786f68SRobert Mustacchi * Some or all of this work - Copyright (c) 1999 - 2018, Intel Corp. 127c478bd9Sstevel@tonic-gate * All rights reserved. 137c478bd9Sstevel@tonic-gate * 14*35786f68SRobert Mustacchi * 2. License 15*35786f68SRobert Mustacchi * 16*35786f68SRobert Mustacchi * 2.1. This is your license from Intel Corp. under its intellectual property 17*35786f68SRobert Mustacchi * rights. You may have additional license terms from the party that provided 18*35786f68SRobert Mustacchi * you this software, covering your right to use that party's intellectual 19*35786f68SRobert Mustacchi * property rights. 20*35786f68SRobert Mustacchi * 21*35786f68SRobert Mustacchi * 2.2. Intel grants, free of charge, to any person ("Licensee") obtaining a 22*35786f68SRobert Mustacchi * copy of the source code appearing in this file ("Covered Code") an 23*35786f68SRobert Mustacchi * irrevocable, perpetual, worldwide license under Intel's copyrights in the 24*35786f68SRobert Mustacchi * base code distributed originally by Intel ("Original Intel Code") to copy, 25*35786f68SRobert Mustacchi * make derivatives, distribute, use and display any portion of the Covered 26*35786f68SRobert Mustacchi * Code in any form, with the right to sublicense such rights; and 27*35786f68SRobert Mustacchi * 28*35786f68SRobert Mustacchi * 2.3. Intel grants Licensee a non-exclusive and non-transferable patent 29*35786f68SRobert Mustacchi * license (with the right to sublicense), under only those claims of Intel 30*35786f68SRobert Mustacchi * patents that are infringed by the Original Intel Code, to make, use, sell, 31*35786f68SRobert Mustacchi * offer to sell, and import the Covered Code and derivative works thereof 32*35786f68SRobert Mustacchi * solely to the minimum extent necessary to exercise the above copyright 33*35786f68SRobert Mustacchi * license, and in no event shall the patent license extend to any additions 34*35786f68SRobert Mustacchi * to or modifications of the Original Intel Code. No other license or right 35*35786f68SRobert Mustacchi * is granted directly or by implication, estoppel or otherwise; 36*35786f68SRobert Mustacchi * 37*35786f68SRobert Mustacchi * The above copyright and patent license is granted only if the following 38*35786f68SRobert Mustacchi * conditions are met: 39*35786f68SRobert Mustacchi * 40*35786f68SRobert Mustacchi * 3. Conditions 41*35786f68SRobert Mustacchi * 42*35786f68SRobert Mustacchi * 3.1. Redistribution of Source with Rights to Further Distribute Source. 43*35786f68SRobert Mustacchi * Redistribution of source code of any substantial portion of the Covered 44*35786f68SRobert Mustacchi * Code or modification with rights to further distribute source must include 45*35786f68SRobert Mustacchi * the above Copyright Notice, the above License, this list of Conditions, 46*35786f68SRobert Mustacchi * and the following Disclaimer and Export Compliance provision. In addition, 47*35786f68SRobert Mustacchi * Licensee must cause all Covered Code to which Licensee contributes to 48*35786f68SRobert Mustacchi * contain a file documenting the changes Licensee made to create that Covered 49*35786f68SRobert Mustacchi * Code and the date of any change. Licensee must include in that file the 50*35786f68SRobert Mustacchi * documentation of any changes made by any predecessor Licensee. Licensee 51*35786f68SRobert Mustacchi * must include a prominent statement that the modification is derived, 52*35786f68SRobert Mustacchi * directly or indirectly, from Original Intel Code. 53*35786f68SRobert Mustacchi * 54*35786f68SRobert Mustacchi * 3.2. Redistribution of Source with no Rights to Further Distribute Source. 55*35786f68SRobert Mustacchi * Redistribution of source code of any substantial portion of the Covered 56*35786f68SRobert Mustacchi * Code or modification without rights to further distribute source must 57*35786f68SRobert Mustacchi * include the following Disclaimer and Export Compliance provision in the 58*35786f68SRobert Mustacchi * documentation and/or other materials provided with distribution. In 59*35786f68SRobert Mustacchi * addition, Licensee may not authorize further sublicense of source of any 60*35786f68SRobert Mustacchi * portion of the Covered Code, and must include terms to the effect that the 61*35786f68SRobert Mustacchi * license from Licensee to its licensee is limited to the intellectual 62*35786f68SRobert Mustacchi * property embodied in the software Licensee provides to its licensee, and 63*35786f68SRobert Mustacchi * not to intellectual property embodied in modifications its licensee may 64*35786f68SRobert Mustacchi * make. 65*35786f68SRobert Mustacchi * 66*35786f68SRobert Mustacchi * 3.3. Redistribution of Executable. Redistribution in executable form of any 67*35786f68SRobert Mustacchi * substantial portion of the Covered Code or modification must reproduce the 68*35786f68SRobert Mustacchi * above Copyright Notice, and the following Disclaimer and Export Compliance 69*35786f68SRobert Mustacchi * provision in the documentation and/or other materials provided with the 70*35786f68SRobert Mustacchi * distribution. 71*35786f68SRobert Mustacchi * 72*35786f68SRobert Mustacchi * 3.4. Intel retains all right, title, and interest in and to the Original 73*35786f68SRobert Mustacchi * Intel Code. 74*35786f68SRobert Mustacchi * 75*35786f68SRobert Mustacchi * 3.5. Neither the name Intel nor any other trademark owned or controlled by 76*35786f68SRobert Mustacchi * Intel shall be used in advertising or otherwise to promote the sale, use or 77*35786f68SRobert Mustacchi * other dealings in products derived from or relating to the Covered Code 78*35786f68SRobert Mustacchi * without prior written authorization from Intel. 79*35786f68SRobert Mustacchi * 80*35786f68SRobert Mustacchi * 4. Disclaimer and Export Compliance 81*35786f68SRobert Mustacchi * 82*35786f68SRobert Mustacchi * 4.1. INTEL MAKES NO WARRANTY OF ANY KIND REGARDING ANY SOFTWARE PROVIDED 83*35786f68SRobert Mustacchi * HERE. ANY SOFTWARE ORIGINATING FROM INTEL OR DERIVED FROM INTEL SOFTWARE 84*35786f68SRobert Mustacchi * IS PROVIDED "AS IS," AND INTEL WILL NOT PROVIDE ANY SUPPORT, ASSISTANCE, 85*35786f68SRobert Mustacchi * INSTALLATION, TRAINING OR OTHER SERVICES. INTEL WILL NOT PROVIDE ANY 86*35786f68SRobert Mustacchi * UPDATES, ENHANCEMENTS OR EXTENSIONS. INTEL SPECIFICALLY DISCLAIMS ANY 87*35786f68SRobert Mustacchi * IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A 88*35786f68SRobert Mustacchi * PARTICULAR PURPOSE. 89*35786f68SRobert Mustacchi * 90*35786f68SRobert Mustacchi * 4.2. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY TO LICENSEE, ITS LICENSEES 91*35786f68SRobert Mustacchi * OR ANY OTHER THIRD PARTY, FOR ANY LOST PROFITS, LOST DATA, LOSS OF USE OR 92*35786f68SRobert Mustacchi * COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY INDIRECT, 93*35786f68SRobert Mustacchi * SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, UNDER ANY 94*35786f68SRobert Mustacchi * CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF WHETHER INTEL 95*35786f68SRobert Mustacchi * HAS ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. THESE LIMITATIONS 96*35786f68SRobert Mustacchi * SHALL APPLY NOTWITHSTANDING THE FAILURE OF THE ESSENTIAL PURPOSE OF ANY 97*35786f68SRobert Mustacchi * LIMITED REMEDY. 98*35786f68SRobert Mustacchi * 99*35786f68SRobert Mustacchi * 4.3. Licensee shall not export, either directly or indirectly, any of this 100*35786f68SRobert Mustacchi * software or system incorporating such software without first obtaining any 101*35786f68SRobert Mustacchi * required license or other approval from the U. S. Department of Commerce or 102*35786f68SRobert Mustacchi * any other agency or department of the United States Government. In the 103*35786f68SRobert Mustacchi * event Licensee exports any such software from the United States or 104*35786f68SRobert Mustacchi * re-exports any such software from a foreign destination, Licensee shall 105*35786f68SRobert Mustacchi * ensure that the distribution and export/re-export of the software is in 106*35786f68SRobert Mustacchi * compliance with all laws, regulations, orders, or other restrictions of the 107*35786f68SRobert Mustacchi * U.S. Export Administration Regulations. Licensee agrees that neither it nor 108*35786f68SRobert Mustacchi * any of its subsidiaries will export/re-export any technical data, process, 109*35786f68SRobert Mustacchi * software, or service, directly or indirectly, to any country for which the 110*35786f68SRobert Mustacchi * United States government or any agency thereof requires an export license, 111*35786f68SRobert Mustacchi * other governmental approval, or letter of assurance, without first obtaining 112*35786f68SRobert Mustacchi * such license, approval or letter. 113*35786f68SRobert Mustacchi * 114*35786f68SRobert Mustacchi ***************************************************************************** 115*35786f68SRobert Mustacchi * 116*35786f68SRobert Mustacchi * Alternatively, you may choose to be licensed under the terms of the 117*35786f68SRobert Mustacchi * following license: 118*35786f68SRobert Mustacchi * 11926f3cdf0SGordon Ross * Redistribution and use in source and binary forms, with or without 12026f3cdf0SGordon Ross * modification, are permitted provided that the following conditions 12126f3cdf0SGordon Ross * are met: 12226f3cdf0SGordon Ross * 1. Redistributions of source code must retain the above copyright 12326f3cdf0SGordon Ross * notice, this list of conditions, and the following disclaimer, 12426f3cdf0SGordon Ross * without modification. 12526f3cdf0SGordon Ross * 2. Redistributions in binary form must reproduce at minimum a disclaimer 12626f3cdf0SGordon Ross * substantially similar to the "NO WARRANTY" disclaimer below 12726f3cdf0SGordon Ross * ("Disclaimer") and any redistribution must be conditioned upon 12826f3cdf0SGordon Ross * including a substantially similar Disclaimer requirement for further 12926f3cdf0SGordon Ross * binary redistribution. 13026f3cdf0SGordon Ross * 3. Neither the names of the above-listed copyright holders nor the names 13126f3cdf0SGordon Ross * of any contributors may be used to endorse or promote products derived 13226f3cdf0SGordon Ross * from this software without specific prior written permission. 1337c478bd9Sstevel@tonic-gate * 13426f3cdf0SGordon Ross * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 13526f3cdf0SGordon Ross * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 136*35786f68SRobert Mustacchi * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 13726f3cdf0SGordon Ross * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 138*35786f68SRobert Mustacchi * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 139*35786f68SRobert Mustacchi * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 140*35786f68SRobert Mustacchi * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 141*35786f68SRobert Mustacchi * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 142*35786f68SRobert Mustacchi * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 143*35786f68SRobert Mustacchi * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 144*35786f68SRobert Mustacchi * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 145*35786f68SRobert Mustacchi * 146*35786f68SRobert Mustacchi * Alternatively, you may choose to be licensed under the terms of the 147*35786f68SRobert Mustacchi * GNU General Public License ("GPL") version 2 as published by the Free 148*35786f68SRobert Mustacchi * Software Foundation. 149*35786f68SRobert Mustacchi * 150*35786f68SRobert Mustacchi *****************************************************************************/ 1517c478bd9Sstevel@tonic-gate 1527c478bd9Sstevel@tonic-gate #ifndef __ACMACROS_H__ 1537c478bd9Sstevel@tonic-gate #define __ACMACROS_H__ 1547c478bd9Sstevel@tonic-gate 1557c478bd9Sstevel@tonic-gate 1567c478bd9Sstevel@tonic-gate /* 157db2bae30SDana Myers * Extract data using a pointer. Any more than a byte and we 158*35786f68SRobert Mustacchi * get into potential alignment issues -- see the STORE macros below. 15930082d0cSmyers * Use with care. 1607c478bd9Sstevel@tonic-gate */ 1617b1019a6SJerry Jelinek #define ACPI_CAST8(ptr) ACPI_CAST_PTR (UINT8, (ptr)) 1627b1019a6SJerry Jelinek #define ACPI_CAST16(ptr) ACPI_CAST_PTR (UINT16, (ptr)) 1637b1019a6SJerry Jelinek #define ACPI_CAST32(ptr) ACPI_CAST_PTR (UINT32, (ptr)) 1647b1019a6SJerry Jelinek #define ACPI_CAST64(ptr) ACPI_CAST_PTR (UINT64, (ptr)) 1657b1019a6SJerry Jelinek #define ACPI_GET8(ptr) (*ACPI_CAST8 (ptr)) 1667b1019a6SJerry Jelinek #define ACPI_GET16(ptr) (*ACPI_CAST16 (ptr)) 1677b1019a6SJerry Jelinek #define ACPI_GET32(ptr) (*ACPI_CAST32 (ptr)) 1687b1019a6SJerry Jelinek #define ACPI_GET64(ptr) (*ACPI_CAST64 (ptr)) 1697b1019a6SJerry Jelinek #define ACPI_SET8(ptr, val) (*ACPI_CAST8 (ptr) = (UINT8) (val)) 1707b1019a6SJerry Jelinek #define ACPI_SET16(ptr, val) (*ACPI_CAST16 (ptr) = (UINT16) (val)) 1717b1019a6SJerry Jelinek #define ACPI_SET32(ptr, val) (*ACPI_CAST32 (ptr) = (UINT32) (val)) 1727b1019a6SJerry Jelinek #define ACPI_SET64(ptr, val) (*ACPI_CAST64 (ptr) = (UINT64) (val)) 1737c478bd9Sstevel@tonic-gate 174db2bae30SDana Myers /* 175*35786f68SRobert Mustacchi * printf() format helper. This macro is a workaround for the difficulties 1767b1019a6SJerry Jelinek * with emitting 64-bit integers and 64-bit pointers with the same code 1777b1019a6SJerry Jelinek * for both 32-bit and 64-bit hosts. 178db2bae30SDana Myers */ 179db2bae30SDana Myers #define ACPI_FORMAT_UINT64(i) ACPI_HIDWORD(i), ACPI_LODWORD(i) 180db2bae30SDana Myers 181db2bae30SDana Myers 1827c478bd9Sstevel@tonic-gate /* 1837c478bd9Sstevel@tonic-gate * Macros for moving data around to/from buffers that are possibly unaligned. 1847c478bd9Sstevel@tonic-gate * If the hardware supports the transfer of unaligned data, just do the store. 1857c478bd9Sstevel@tonic-gate * Otherwise, we have to move one byte at a time. 1867c478bd9Sstevel@tonic-gate */ 1877c478bd9Sstevel@tonic-gate #ifdef ACPI_BIG_ENDIAN 1887c478bd9Sstevel@tonic-gate /* 1897c478bd9Sstevel@tonic-gate * Macros for big-endian machines 1907c478bd9Sstevel@tonic-gate */ 1917c478bd9Sstevel@tonic-gate 1927c478bd9Sstevel@tonic-gate /* These macros reverse the bytes during the move, converting little-endian to big endian */ 1937c478bd9Sstevel@tonic-gate 1947c478bd9Sstevel@tonic-gate /* Big Endian <== Little Endian */ 1957c478bd9Sstevel@tonic-gate /* Hi...Lo Lo...Hi */ 1967c478bd9Sstevel@tonic-gate /* 16-bit source, 16/32/64 destination */ 1977c478bd9Sstevel@tonic-gate 198db2bae30SDana Myers #define ACPI_MOVE_16_TO_16(d, s) {(( UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[1];\ 1997c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[0];} 2007c478bd9Sstevel@tonic-gate 201db2bae30SDana Myers #define ACPI_MOVE_16_TO_32(d, s) {(*(UINT32 *)(void *)(d))=0;\ 2027c478bd9Sstevel@tonic-gate ((UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[1];\ 2037c478bd9Sstevel@tonic-gate ((UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[0];} 2047c478bd9Sstevel@tonic-gate 205db2bae30SDana Myers #define ACPI_MOVE_16_TO_64(d, s) {(*(UINT64 *)(void *)(d))=0;\ 2067c478bd9Sstevel@tonic-gate ((UINT8 *)(void *)(d))[6] = ((UINT8 *)(void *)(s))[1];\ 2077c478bd9Sstevel@tonic-gate ((UINT8 *)(void *)(d))[7] = ((UINT8 *)(void *)(s))[0];} 2087c478bd9Sstevel@tonic-gate 2097c478bd9Sstevel@tonic-gate /* 32-bit source, 16/32/64 destination */ 2107c478bd9Sstevel@tonic-gate 211db2bae30SDana Myers #define ACPI_MOVE_32_TO_16(d, s) ACPI_MOVE_16_TO_16(d, s) /* Truncate to 16 */ 2127c478bd9Sstevel@tonic-gate 213db2bae30SDana Myers #define ACPI_MOVE_32_TO_32(d, s) {(( UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[3];\ 2147c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[2];\ 2157c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[1];\ 2167c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[0];} 2177c478bd9Sstevel@tonic-gate 218db2bae30SDana Myers #define ACPI_MOVE_32_TO_64(d, s) {(*(UINT64 *)(void *)(d))=0;\ 2197c478bd9Sstevel@tonic-gate ((UINT8 *)(void *)(d))[4] = ((UINT8 *)(void *)(s))[3];\ 2207c478bd9Sstevel@tonic-gate ((UINT8 *)(void *)(d))[5] = ((UINT8 *)(void *)(s))[2];\ 2217c478bd9Sstevel@tonic-gate ((UINT8 *)(void *)(d))[6] = ((UINT8 *)(void *)(s))[1];\ 2227c478bd9Sstevel@tonic-gate ((UINT8 *)(void *)(d))[7] = ((UINT8 *)(void *)(s))[0];} 2237c478bd9Sstevel@tonic-gate 2247c478bd9Sstevel@tonic-gate /* 64-bit source, 16/32/64 destination */ 2257c478bd9Sstevel@tonic-gate 226db2bae30SDana Myers #define ACPI_MOVE_64_TO_16(d, s) ACPI_MOVE_16_TO_16(d, s) /* Truncate to 16 */ 2277c478bd9Sstevel@tonic-gate 228db2bae30SDana Myers #define ACPI_MOVE_64_TO_32(d, s) ACPI_MOVE_32_TO_32(d, s) /* Truncate to 32 */ 2297c478bd9Sstevel@tonic-gate 230db2bae30SDana Myers #define ACPI_MOVE_64_TO_64(d, s) {(( UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[7];\ 2317c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[6];\ 2327c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[5];\ 2337c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[4];\ 2347c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[4] = ((UINT8 *)(void *)(s))[3];\ 2357c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[5] = ((UINT8 *)(void *)(s))[2];\ 2367c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[6] = ((UINT8 *)(void *)(s))[1];\ 2377c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[7] = ((UINT8 *)(void *)(s))[0];} 2387c478bd9Sstevel@tonic-gate #else 2397c478bd9Sstevel@tonic-gate /* 2407c478bd9Sstevel@tonic-gate * Macros for little-endian machines 2417c478bd9Sstevel@tonic-gate */ 2427c478bd9Sstevel@tonic-gate 24330082d0cSmyers #ifndef ACPI_MISALIGNMENT_NOT_SUPPORTED 2447c478bd9Sstevel@tonic-gate 2457c478bd9Sstevel@tonic-gate /* The hardware supports unaligned transfers, just do the little-endian move */ 2467c478bd9Sstevel@tonic-gate 2477c478bd9Sstevel@tonic-gate /* 16-bit source, 16/32/64 destination */ 2487c478bd9Sstevel@tonic-gate 249db2bae30SDana Myers #define ACPI_MOVE_16_TO_16(d, s) *(UINT16 *)(void *)(d) = *(UINT16 *)(void *)(s) 250db2bae30SDana Myers #define ACPI_MOVE_16_TO_32(d, s) *(UINT32 *)(void *)(d) = *(UINT16 *)(void *)(s) 251db2bae30SDana Myers #define ACPI_MOVE_16_TO_64(d, s) *(UINT64 *)(void *)(d) = *(UINT16 *)(void *)(s) 2527c478bd9Sstevel@tonic-gate 2537c478bd9Sstevel@tonic-gate /* 32-bit source, 16/32/64 destination */ 2547c478bd9Sstevel@tonic-gate 255db2bae30SDana Myers #define ACPI_MOVE_32_TO_16(d, s) ACPI_MOVE_16_TO_16(d, s) /* Truncate to 16 */ 256db2bae30SDana Myers #define ACPI_MOVE_32_TO_32(d, s) *(UINT32 *)(void *)(d) = *(UINT32 *)(void *)(s) 257db2bae30SDana Myers #define ACPI_MOVE_32_TO_64(d, s) *(UINT64 *)(void *)(d) = *(UINT32 *)(void *)(s) 2587c478bd9Sstevel@tonic-gate 2597c478bd9Sstevel@tonic-gate /* 64-bit source, 16/32/64 destination */ 2607c478bd9Sstevel@tonic-gate 261db2bae30SDana Myers #define ACPI_MOVE_64_TO_16(d, s) ACPI_MOVE_16_TO_16(d, s) /* Truncate to 16 */ 262db2bae30SDana Myers #define ACPI_MOVE_64_TO_32(d, s) ACPI_MOVE_32_TO_32(d, s) /* Truncate to 32 */ 263db2bae30SDana Myers #define ACPI_MOVE_64_TO_64(d, s) *(UINT64 *)(void *)(d) = *(UINT64 *)(void *)(s) 2647c478bd9Sstevel@tonic-gate 2657c478bd9Sstevel@tonic-gate #else 2667c478bd9Sstevel@tonic-gate /* 267db2bae30SDana Myers * The hardware does not support unaligned transfers. We must move the 268db2bae30SDana Myers * data one byte at a time. These macros work whether the source or 269aa2aa9a6SDana Myers * the destination (or both) is/are unaligned. (Little-endian move) 2707c478bd9Sstevel@tonic-gate */ 2717c478bd9Sstevel@tonic-gate 2727c478bd9Sstevel@tonic-gate /* 16-bit source, 16/32/64 destination */ 2737c478bd9Sstevel@tonic-gate 274db2bae30SDana Myers #define ACPI_MOVE_16_TO_16(d, s) {(( UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[0];\ 2757c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[1];} 2767c478bd9Sstevel@tonic-gate 277db2bae30SDana Myers #define ACPI_MOVE_16_TO_32(d, s) {(*(UINT32 *)(void *)(d)) = 0; ACPI_MOVE_16_TO_16(d, s);} 278db2bae30SDana Myers #define ACPI_MOVE_16_TO_64(d, s) {(*(UINT64 *)(void *)(d)) = 0; ACPI_MOVE_16_TO_16(d, s);} 2797c478bd9Sstevel@tonic-gate 2807c478bd9Sstevel@tonic-gate /* 32-bit source, 16/32/64 destination */ 2817c478bd9Sstevel@tonic-gate 282db2bae30SDana Myers #define ACPI_MOVE_32_TO_16(d, s) ACPI_MOVE_16_TO_16(d, s) /* Truncate to 16 */ 2837c478bd9Sstevel@tonic-gate 284db2bae30SDana Myers #define ACPI_MOVE_32_TO_32(d, s) {(( UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[0];\ 2857c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[1];\ 2867c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[2];\ 2877c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[3];} 2887c478bd9Sstevel@tonic-gate 289db2bae30SDana Myers #define ACPI_MOVE_32_TO_64(d, s) {(*(UINT64 *)(void *)(d)) = 0; ACPI_MOVE_32_TO_32(d, s);} 2907c478bd9Sstevel@tonic-gate 2917c478bd9Sstevel@tonic-gate /* 64-bit source, 16/32/64 destination */ 2927c478bd9Sstevel@tonic-gate 293db2bae30SDana Myers #define ACPI_MOVE_64_TO_16(d, s) ACPI_MOVE_16_TO_16(d, s) /* Truncate to 16 */ 294db2bae30SDana Myers #define ACPI_MOVE_64_TO_32(d, s) ACPI_MOVE_32_TO_32(d, s) /* Truncate to 32 */ 295db2bae30SDana Myers #define ACPI_MOVE_64_TO_64(d, s) {(( UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[0];\ 2967c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[1];\ 2977c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[2];\ 2987c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[3];\ 2997c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[4] = ((UINT8 *)(void *)(s))[4];\ 3007c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[5] = ((UINT8 *)(void *)(s))[5];\ 3017c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[6] = ((UINT8 *)(void *)(s))[6];\ 3027c478bd9Sstevel@tonic-gate (( UINT8 *)(void *)(d))[7] = ((UINT8 *)(void *)(s))[7];} 3037c478bd9Sstevel@tonic-gate #endif 3047c478bd9Sstevel@tonic-gate #endif 3057c478bd9Sstevel@tonic-gate 3067c478bd9Sstevel@tonic-gate 3077c478bd9Sstevel@tonic-gate /* 3087c478bd9Sstevel@tonic-gate * Fast power-of-two math macros for non-optimized compilers 3097c478bd9Sstevel@tonic-gate */ 310db2bae30SDana Myers #define _ACPI_DIV(value, PowerOf2) ((UINT32) ((value) >> (PowerOf2))) 311db2bae30SDana Myers #define _ACPI_MUL(value, PowerOf2) ((UINT32) ((value) << (PowerOf2))) 312db2bae30SDana Myers #define _ACPI_MOD(value, Divisor) ((UINT32) ((value) & ((Divisor) -1))) 3137c478bd9Sstevel@tonic-gate 314db2bae30SDana Myers #define ACPI_DIV_2(a) _ACPI_DIV(a, 1) 315db2bae30SDana Myers #define ACPI_MUL_2(a) _ACPI_MUL(a, 1) 316db2bae30SDana Myers #define ACPI_MOD_2(a) _ACPI_MOD(a, 2) 3177c478bd9Sstevel@tonic-gate 318db2bae30SDana Myers #define ACPI_DIV_4(a) _ACPI_DIV(a, 2) 319db2bae30SDana Myers #define ACPI_MUL_4(a) _ACPI_MUL(a, 2) 320db2bae30SDana Myers #define ACPI_MOD_4(a) _ACPI_MOD(a, 4) 3217c478bd9Sstevel@tonic-gate 322db2bae30SDana Myers #define ACPI_DIV_8(a) _ACPI_DIV(a, 3) 323db2bae30SDana Myers #define ACPI_MUL_8(a) _ACPI_MUL(a, 3) 324db2bae30SDana Myers #define ACPI_MOD_8(a) _ACPI_MOD(a, 8) 3257c478bd9Sstevel@tonic-gate 326db2bae30SDana Myers #define ACPI_DIV_16(a) _ACPI_DIV(a, 4) 327db2bae30SDana Myers #define ACPI_MUL_16(a) _ACPI_MUL(a, 4) 328db2bae30SDana Myers #define ACPI_MOD_16(a) _ACPI_MOD(a, 16) 3297c478bd9Sstevel@tonic-gate 330db2bae30SDana Myers #define ACPI_DIV_32(a) _ACPI_DIV(a, 5) 331db2bae30SDana Myers #define ACPI_MUL_32(a) _ACPI_MUL(a, 5) 332db2bae30SDana Myers #define ACPI_MOD_32(a) _ACPI_MOD(a, 32) 3337c478bd9Sstevel@tonic-gate 3347b1019a6SJerry Jelinek /* Test for ASCII character */ 3357b1019a6SJerry Jelinek 3367b1019a6SJerry Jelinek #define ACPI_IS_ASCII(c) ((c) < 0x80) 3377b1019a6SJerry Jelinek 3387b1019a6SJerry Jelinek /* Signed integers */ 3397b1019a6SJerry Jelinek 3407b1019a6SJerry Jelinek #define ACPI_SIGN_POSITIVE 0 3417b1019a6SJerry Jelinek #define ACPI_SIGN_NEGATIVE 1 3427b1019a6SJerry Jelinek 3437b1019a6SJerry Jelinek 3447c478bd9Sstevel@tonic-gate /* 3457c478bd9Sstevel@tonic-gate * Rounding macros (Power of two boundaries only) 3467c478bd9Sstevel@tonic-gate */ 347db2bae30SDana Myers #define ACPI_ROUND_DOWN(value, boundary) (((ACPI_SIZE)(value)) & \ 348db2bae30SDana Myers (~(((ACPI_SIZE) boundary)-1))) 3497c478bd9Sstevel@tonic-gate 350db2bae30SDana Myers #define ACPI_ROUND_UP(value, boundary) ((((ACPI_SIZE)(value)) + \ 351db2bae30SDana Myers (((ACPI_SIZE) boundary)-1)) & \ 352db2bae30SDana Myers (~(((ACPI_SIZE) boundary)-1))) 3537c478bd9Sstevel@tonic-gate 354db2bae30SDana Myers /* Note: sizeof(ACPI_SIZE) evaluates to either 4 or 8 (32- vs 64-bit mode) */ 3557c478bd9Sstevel@tonic-gate 356db2bae30SDana Myers #define ACPI_ROUND_DOWN_TO_32BIT(a) ACPI_ROUND_DOWN(a, 4) 357db2bae30SDana Myers #define ACPI_ROUND_DOWN_TO_64BIT(a) ACPI_ROUND_DOWN(a, 8) 358db2bae30SDana Myers #define ACPI_ROUND_DOWN_TO_NATIVE_WORD(a) ACPI_ROUND_DOWN(a, sizeof(ACPI_SIZE)) 3597c478bd9Sstevel@tonic-gate 360db2bae30SDana Myers #define ACPI_ROUND_UP_TO_32BIT(a) ACPI_ROUND_UP(a, 4) 361db2bae30SDana Myers #define ACPI_ROUND_UP_TO_64BIT(a) ACPI_ROUND_UP(a, 8) 362db2bae30SDana Myers #define ACPI_ROUND_UP_TO_NATIVE_WORD(a) ACPI_ROUND_UP(a, sizeof(ACPI_SIZE)) 3637c478bd9Sstevel@tonic-gate 36430082d0cSmyers #define ACPI_ROUND_BITS_UP_TO_BYTES(a) ACPI_DIV_8((a) + 7) 36530082d0cSmyers #define ACPI_ROUND_BITS_DOWN_TO_BYTES(a) ACPI_DIV_8((a)) 36630082d0cSmyers 36730082d0cSmyers #define ACPI_ROUND_UP_TO_1K(a) (((a) + 1023) >> 10) 3687c478bd9Sstevel@tonic-gate 3697c478bd9Sstevel@tonic-gate /* Generic (non-power-of-two) rounding */ 3707c478bd9Sstevel@tonic-gate 371db2bae30SDana Myers #define ACPI_ROUND_UP_TO(value, boundary) (((value) + ((boundary)-1)) / (boundary)) 37230082d0cSmyers 373db2bae30SDana Myers #define ACPI_IS_MISALIGNED(value) (((ACPI_SIZE) value) & (sizeof(ACPI_SIZE)-1)) 3747c478bd9Sstevel@tonic-gate 375*35786f68SRobert Mustacchi /* Generic bit manipulation */ 376*35786f68SRobert Mustacchi 377*35786f68SRobert Mustacchi #ifndef ACPI_USE_NATIVE_BIT_FINDER 378*35786f68SRobert Mustacchi 379*35786f68SRobert Mustacchi #define __ACPI_FIND_LAST_BIT_2(a, r) ((((UINT8) (a)) & 0x02) ? (r)+1 : (r)) 380*35786f68SRobert Mustacchi #define __ACPI_FIND_LAST_BIT_4(a, r) ((((UINT8) (a)) & 0x0C) ? \ 381*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_2 ((a)>>2, (r)+2) : \ 382*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_2 ((a), (r))) 383*35786f68SRobert Mustacchi #define __ACPI_FIND_LAST_BIT_8(a, r) ((((UINT8) (a)) & 0xF0) ? \ 384*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_4 ((a)>>4, (r)+4) : \ 385*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_4 ((a), (r))) 386*35786f68SRobert Mustacchi #define __ACPI_FIND_LAST_BIT_16(a, r) ((((UINT16) (a)) & 0xFF00) ? \ 387*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_8 ((a)>>8, (r)+8) : \ 388*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_8 ((a), (r))) 389*35786f68SRobert Mustacchi #define __ACPI_FIND_LAST_BIT_32(a, r) ((((UINT32) (a)) & 0xFFFF0000) ? \ 390*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_16 ((a)>>16, (r)+16) : \ 391*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_16 ((a), (r))) 392*35786f68SRobert Mustacchi #define __ACPI_FIND_LAST_BIT_64(a, r) ((((UINT64) (a)) & 0xFFFFFFFF00000000) ? \ 393*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_32 ((a)>>32, (r)+32) : \ 394*35786f68SRobert Mustacchi __ACPI_FIND_LAST_BIT_32 ((a), (r))) 395*35786f68SRobert Mustacchi 396*35786f68SRobert Mustacchi #define ACPI_FIND_LAST_BIT_8(a) ((a) ? __ACPI_FIND_LAST_BIT_8 (a, 1) : 0) 397*35786f68SRobert Mustacchi #define ACPI_FIND_LAST_BIT_16(a) ((a) ? __ACPI_FIND_LAST_BIT_16 (a, 1) : 0) 398*35786f68SRobert Mustacchi #define ACPI_FIND_LAST_BIT_32(a) ((a) ? __ACPI_FIND_LAST_BIT_32 (a, 1) : 0) 399*35786f68SRobert Mustacchi #define ACPI_FIND_LAST_BIT_64(a) ((a) ? __ACPI_FIND_LAST_BIT_64 (a, 1) : 0) 400