1bc36eafdSMike Gerdts /******************************************************************************
2bc36eafdSMike Gerdts *
3bc36eafdSMike Gerdts * Module Name: exstorob - AML object store support, store to object
4bc36eafdSMike Gerdts *
5bc36eafdSMike Gerdts *****************************************************************************/
6bc36eafdSMike Gerdts
7*35786f68SRobert Mustacchi /******************************************************************************
8*35786f68SRobert Mustacchi *
9*35786f68SRobert Mustacchi * 1. Copyright Notice
10*35786f68SRobert Mustacchi *
11*35786f68SRobert Mustacchi * Some or all of this work - Copyright (c) 1999 - 2018, Intel Corp.
12bc36eafdSMike Gerdts * All rights reserved.
13bc36eafdSMike Gerdts *
14*35786f68SRobert Mustacchi * 2. License
15*35786f68SRobert Mustacchi *
16*35786f68SRobert Mustacchi * 2.1. This is your license from Intel Corp. under its intellectual property
17*35786f68SRobert Mustacchi * rights. You may have additional license terms from the party that provided
18*35786f68SRobert Mustacchi * you this software, covering your right to use that party's intellectual
19*35786f68SRobert Mustacchi * property rights.
20*35786f68SRobert Mustacchi *
21*35786f68SRobert Mustacchi * 2.2. Intel grants, free of charge, to any person ("Licensee") obtaining a
22*35786f68SRobert Mustacchi * copy of the source code appearing in this file ("Covered Code") an
23*35786f68SRobert Mustacchi * irrevocable, perpetual, worldwide license under Intel's copyrights in the
24*35786f68SRobert Mustacchi * base code distributed originally by Intel ("Original Intel Code") to copy,
25*35786f68SRobert Mustacchi * make derivatives, distribute, use and display any portion of the Covered
26*35786f68SRobert Mustacchi * Code in any form, with the right to sublicense such rights; and
27*35786f68SRobert Mustacchi *
28*35786f68SRobert Mustacchi * 2.3. Intel grants Licensee a non-exclusive and non-transferable patent
29*35786f68SRobert Mustacchi * license (with the right to sublicense), under only those claims of Intel
30*35786f68SRobert Mustacchi * patents that are infringed by the Original Intel Code, to make, use, sell,
31*35786f68SRobert Mustacchi * offer to sell, and import the Covered Code and derivative works thereof
32*35786f68SRobert Mustacchi * solely to the minimum extent necessary to exercise the above copyright
33*35786f68SRobert Mustacchi * license, and in no event shall the patent license extend to any additions
34*35786f68SRobert Mustacchi * to or modifications of the Original Intel Code. No other license or right
35*35786f68SRobert Mustacchi * is granted directly or by implication, estoppel or otherwise;
36*35786f68SRobert Mustacchi *
37*35786f68SRobert Mustacchi * The above copyright and patent license is granted only if the following
38*35786f68SRobert Mustacchi * conditions are met:
39*35786f68SRobert Mustacchi *
40*35786f68SRobert Mustacchi * 3. Conditions
41*35786f68SRobert Mustacchi *
42*35786f68SRobert Mustacchi * 3.1. Redistribution of Source with Rights to Further Distribute Source.
43*35786f68SRobert Mustacchi * Redistribution of source code of any substantial portion of the Covered
44*35786f68SRobert Mustacchi * Code or modification with rights to further distribute source must include
45*35786f68SRobert Mustacchi * the above Copyright Notice, the above License, this list of Conditions,
46*35786f68SRobert Mustacchi * and the following Disclaimer and Export Compliance provision. In addition,
47*35786f68SRobert Mustacchi * Licensee must cause all Covered Code to which Licensee contributes to
48*35786f68SRobert Mustacchi * contain a file documenting the changes Licensee made to create that Covered
49*35786f68SRobert Mustacchi * Code and the date of any change. Licensee must include in that file the
50*35786f68SRobert Mustacchi * documentation of any changes made by any predecessor Licensee. Licensee
51*35786f68SRobert Mustacchi * must include a prominent statement that the modification is derived,
52*35786f68SRobert Mustacchi * directly or indirectly, from Original Intel Code.
53*35786f68SRobert Mustacchi *
54*35786f68SRobert Mustacchi * 3.2. Redistribution of Source with no Rights to Further Distribute Source.
55*35786f68SRobert Mustacchi * Redistribution of source code of any substantial portion of the Covered
56*35786f68SRobert Mustacchi * Code or modification without rights to further distribute source must
57*35786f68SRobert Mustacchi * include the following Disclaimer and Export Compliance provision in the
58*35786f68SRobert Mustacchi * documentation and/or other materials provided with distribution. In
59*35786f68SRobert Mustacchi * addition, Licensee may not authorize further sublicense of source of any
60*35786f68SRobert Mustacchi * portion of the Covered Code, and must include terms to the effect that the
61*35786f68SRobert Mustacchi * license from Licensee to its licensee is limited to the intellectual
62*35786f68SRobert Mustacchi * property embodied in the software Licensee provides to its licensee, and
63*35786f68SRobert Mustacchi * not to intellectual property embodied in modifications its licensee may
64*35786f68SRobert Mustacchi * make.
65*35786f68SRobert Mustacchi *
66*35786f68SRobert Mustacchi * 3.3. Redistribution of Executable. Redistribution in executable form of any
67*35786f68SRobert Mustacchi * substantial portion of the Covered Code or modification must reproduce the
68*35786f68SRobert Mustacchi * above Copyright Notice, and the following Disclaimer and Export Compliance
69*35786f68SRobert Mustacchi * provision in the documentation and/or other materials provided with the
70*35786f68SRobert Mustacchi * distribution.
71*35786f68SRobert Mustacchi *
72*35786f68SRobert Mustacchi * 3.4. Intel retains all right, title, and interest in and to the Original
73*35786f68SRobert Mustacchi * Intel Code.
74*35786f68SRobert Mustacchi *
75*35786f68SRobert Mustacchi * 3.5. Neither the name Intel nor any other trademark owned or controlled by
76*35786f68SRobert Mustacchi * Intel shall be used in advertising or otherwise to promote the sale, use or
77*35786f68SRobert Mustacchi * other dealings in products derived from or relating to the Covered Code
78*35786f68SRobert Mustacchi * without prior written authorization from Intel.
79*35786f68SRobert Mustacchi *
80*35786f68SRobert Mustacchi * 4. Disclaimer and Export Compliance
81*35786f68SRobert Mustacchi *
82*35786f68SRobert Mustacchi * 4.1. INTEL MAKES NO WARRANTY OF ANY KIND REGARDING ANY SOFTWARE PROVIDED
83*35786f68SRobert Mustacchi * HERE. ANY SOFTWARE ORIGINATING FROM INTEL OR DERIVED FROM INTEL SOFTWARE
84*35786f68SRobert Mustacchi * IS PROVIDED "AS IS," AND INTEL WILL NOT PROVIDE ANY SUPPORT, ASSISTANCE,
85*35786f68SRobert Mustacchi * INSTALLATION, TRAINING OR OTHER SERVICES. INTEL WILL NOT PROVIDE ANY
86*35786f68SRobert Mustacchi * UPDATES, ENHANCEMENTS OR EXTENSIONS. INTEL SPECIFICALLY DISCLAIMS ANY
87*35786f68SRobert Mustacchi * IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A
88*35786f68SRobert Mustacchi * PARTICULAR PURPOSE.
89*35786f68SRobert Mustacchi *
90*35786f68SRobert Mustacchi * 4.2. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY TO LICENSEE, ITS LICENSEES
91*35786f68SRobert Mustacchi * OR ANY OTHER THIRD PARTY, FOR ANY LOST PROFITS, LOST DATA, LOSS OF USE OR
92*35786f68SRobert Mustacchi * COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY INDIRECT,
93*35786f68SRobert Mustacchi * SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, UNDER ANY
94*35786f68SRobert Mustacchi * CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF WHETHER INTEL
95*35786f68SRobert Mustacchi * HAS ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. THESE LIMITATIONS
96*35786f68SRobert Mustacchi * SHALL APPLY NOTWITHSTANDING THE FAILURE OF THE ESSENTIAL PURPOSE OF ANY
97*35786f68SRobert Mustacchi * LIMITED REMEDY.
98*35786f68SRobert Mustacchi *
99*35786f68SRobert Mustacchi * 4.3. Licensee shall not export, either directly or indirectly, any of this
100*35786f68SRobert Mustacchi * software or system incorporating such software without first obtaining any
101*35786f68SRobert Mustacchi * required license or other approval from the U. S. Department of Commerce or
102*35786f68SRobert Mustacchi * any other agency or department of the United States Government. In the
103*35786f68SRobert Mustacchi * event Licensee exports any such software from the United States or
104*35786f68SRobert Mustacchi * re-exports any such software from a foreign destination, Licensee shall
105*35786f68SRobert Mustacchi * ensure that the distribution and export/re-export of the software is in
106*35786f68SRobert Mustacchi * compliance with all laws, regulations, orders, or other restrictions of the
107*35786f68SRobert Mustacchi * U.S. Export Administration Regulations. Licensee agrees that neither it nor
108*35786f68SRobert Mustacchi * any of its subsidiaries will export/re-export any technical data, process,
109*35786f68SRobert Mustacchi * software, or service, directly or indirectly, to any country for which the
110*35786f68SRobert Mustacchi * United States government or any agency thereof requires an export license,
111*35786f68SRobert Mustacchi * other governmental approval, or letter of assurance, without first obtaining
112*35786f68SRobert Mustacchi * such license, approval or letter.
113*35786f68SRobert Mustacchi *
114*35786f68SRobert Mustacchi *****************************************************************************
115*35786f68SRobert Mustacchi *
116*35786f68SRobert Mustacchi * Alternatively, you may choose to be licensed under the terms of the
117*35786f68SRobert Mustacchi * following license:
118*35786f68SRobert Mustacchi *
119bc36eafdSMike Gerdts * Redistribution and use in source and binary forms, with or without
120bc36eafdSMike Gerdts * modification, are permitted provided that the following conditions
121bc36eafdSMike Gerdts * are met:
122bc36eafdSMike Gerdts * 1. Redistributions of source code must retain the above copyright
123bc36eafdSMike Gerdts * notice, this list of conditions, and the following disclaimer,
124bc36eafdSMike Gerdts * without modification.
125bc36eafdSMike Gerdts * 2. Redistributions in binary form must reproduce at minimum a disclaimer
126bc36eafdSMike Gerdts * substantially similar to the "NO WARRANTY" disclaimer below
127bc36eafdSMike Gerdts * ("Disclaimer") and any redistribution must be conditioned upon
128bc36eafdSMike Gerdts * including a substantially similar Disclaimer requirement for further
129bc36eafdSMike Gerdts * binary redistribution.
130bc36eafdSMike Gerdts * 3. Neither the names of the above-listed copyright holders nor the names
131bc36eafdSMike Gerdts * of any contributors may be used to endorse or promote products derived
132bc36eafdSMike Gerdts * from this software without specific prior written permission.
133bc36eafdSMike Gerdts *
134*35786f68SRobert Mustacchi * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
135*35786f68SRobert Mustacchi * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
136*35786f68SRobert Mustacchi * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
137*35786f68SRobert Mustacchi * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
138*35786f68SRobert Mustacchi * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
139*35786f68SRobert Mustacchi * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
140*35786f68SRobert Mustacchi * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
141*35786f68SRobert Mustacchi * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
142*35786f68SRobert Mustacchi * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
143*35786f68SRobert Mustacchi * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
144*35786f68SRobert Mustacchi * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
145*35786f68SRobert Mustacchi *
146*35786f68SRobert Mustacchi * Alternatively, you may choose to be licensed under the terms of the
147bc36eafdSMike Gerdts * GNU General Public License ("GPL") version 2 as published by the Free
148bc36eafdSMike Gerdts * Software Foundation.
149bc36eafdSMike Gerdts *
150*35786f68SRobert Mustacchi *****************************************************************************/
151bc36eafdSMike Gerdts
152bc36eafdSMike Gerdts #include "acpi.h"
153bc36eafdSMike Gerdts #include "accommon.h"
154bc36eafdSMike Gerdts #include "acinterp.h"
155bc36eafdSMike Gerdts
156bc36eafdSMike Gerdts
157bc36eafdSMike Gerdts #define _COMPONENT ACPI_EXECUTER
158bc36eafdSMike Gerdts ACPI_MODULE_NAME ("exstorob")
159bc36eafdSMike Gerdts
160bc36eafdSMike Gerdts
161bc36eafdSMike Gerdts /*******************************************************************************
162bc36eafdSMike Gerdts *
163bc36eafdSMike Gerdts * FUNCTION: AcpiExStoreBufferToBuffer
164bc36eafdSMike Gerdts *
165bc36eafdSMike Gerdts * PARAMETERS: SourceDesc - Source object to copy
166bc36eafdSMike Gerdts * TargetDesc - Destination object of the copy
167bc36eafdSMike Gerdts *
168bc36eafdSMike Gerdts * RETURN: Status
169bc36eafdSMike Gerdts *
170bc36eafdSMike Gerdts * DESCRIPTION: Copy a buffer object to another buffer object.
171bc36eafdSMike Gerdts *
172bc36eafdSMike Gerdts ******************************************************************************/
173bc36eafdSMike Gerdts
174bc36eafdSMike Gerdts ACPI_STATUS
AcpiExStoreBufferToBuffer(ACPI_OPERAND_OBJECT * SourceDesc,ACPI_OPERAND_OBJECT * TargetDesc)175bc36eafdSMike Gerdts AcpiExStoreBufferToBuffer (
176bc36eafdSMike Gerdts ACPI_OPERAND_OBJECT *SourceDesc,
177bc36eafdSMike Gerdts ACPI_OPERAND_OBJECT *TargetDesc)
178bc36eafdSMike Gerdts {
179bc36eafdSMike Gerdts UINT32 Length;
180bc36eafdSMike Gerdts UINT8 *Buffer;
181bc36eafdSMike Gerdts
182bc36eafdSMike Gerdts
183bc36eafdSMike Gerdts ACPI_FUNCTION_TRACE_PTR (ExStoreBufferToBuffer, SourceDesc);
184bc36eafdSMike Gerdts
185bc36eafdSMike Gerdts
186bc36eafdSMike Gerdts /* If Source and Target are the same, just return */
187bc36eafdSMike Gerdts
188bc36eafdSMike Gerdts if (SourceDesc == TargetDesc)
189bc36eafdSMike Gerdts {
190bc36eafdSMike Gerdts return_ACPI_STATUS (AE_OK);
191bc36eafdSMike Gerdts }
192bc36eafdSMike Gerdts
193bc36eafdSMike Gerdts /* We know that SourceDesc is a buffer by now */
194bc36eafdSMike Gerdts
195bc36eafdSMike Gerdts Buffer = ACPI_CAST_PTR (UINT8, SourceDesc->Buffer.Pointer);
196bc36eafdSMike Gerdts Length = SourceDesc->Buffer.Length;
197bc36eafdSMike Gerdts
198bc36eafdSMike Gerdts /*
199bc36eafdSMike Gerdts * If target is a buffer of length zero or is a static buffer,
200bc36eafdSMike Gerdts * allocate a new buffer of the proper length
201bc36eafdSMike Gerdts */
202bc36eafdSMike Gerdts if ((TargetDesc->Buffer.Length == 0) ||
203bc36eafdSMike Gerdts (TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER))
204bc36eafdSMike Gerdts {
205bc36eafdSMike Gerdts TargetDesc->Buffer.Pointer = ACPI_ALLOCATE (Length);
206bc36eafdSMike Gerdts if (!TargetDesc->Buffer.Pointer)
207bc36eafdSMike Gerdts {
208bc36eafdSMike Gerdts return_ACPI_STATUS (AE_NO_MEMORY);
209bc36eafdSMike Gerdts }
210bc36eafdSMike Gerdts
211bc36eafdSMike Gerdts TargetDesc->Buffer.Length = Length;
212bc36eafdSMike Gerdts }
213bc36eafdSMike Gerdts
214bc36eafdSMike Gerdts /* Copy source buffer to target buffer */
215bc36eafdSMike Gerdts
216bc36eafdSMike Gerdts if (Length <= TargetDesc->Buffer.Length)
217bc36eafdSMike Gerdts {
218bc36eafdSMike Gerdts /* Clear existing buffer and copy in the new one */
219bc36eafdSMike Gerdts
220bc36eafdSMike Gerdts memset (TargetDesc->Buffer.Pointer, 0, TargetDesc->Buffer.Length);
221bc36eafdSMike Gerdts memcpy (TargetDesc->Buffer.Pointer, Buffer, Length);
222bc36eafdSMike Gerdts
223bc36eafdSMike Gerdts #ifdef ACPI_OBSOLETE_BEHAVIOR
224bc36eafdSMike Gerdts /*
225bc36eafdSMike Gerdts * NOTE: ACPI versions up to 3.0 specified that the buffer must be
226bc36eafdSMike Gerdts * truncated if the string is smaller than the buffer. However, "other"
227bc36eafdSMike Gerdts * implementations of ACPI never did this and thus became the defacto
228bc36eafdSMike Gerdts * standard. ACPI 3.0A changes this behavior such that the buffer
229bc36eafdSMike Gerdts * is no longer truncated.
230bc36eafdSMike Gerdts */
231bc36eafdSMike Gerdts
232bc36eafdSMike Gerdts /*
233bc36eafdSMike Gerdts * OBSOLETE BEHAVIOR:
234bc36eafdSMike Gerdts * If the original source was a string, we must truncate the buffer,
235bc36eafdSMike Gerdts * according to the ACPI spec. Integer-to-Buffer and Buffer-to-Buffer
236bc36eafdSMike Gerdts * copy must not truncate the original buffer.
237bc36eafdSMike Gerdts */
238bc36eafdSMike Gerdts if (OriginalSrcType == ACPI_TYPE_STRING)
239bc36eafdSMike Gerdts {
240bc36eafdSMike Gerdts /* Set the new length of the target */
241bc36eafdSMike Gerdts
242bc36eafdSMike Gerdts TargetDesc->Buffer.Length = Length;
243bc36eafdSMike Gerdts }
244bc36eafdSMike Gerdts #endif
245bc36eafdSMike Gerdts }
246bc36eafdSMike Gerdts else
247bc36eafdSMike Gerdts {
248bc36eafdSMike Gerdts /* Truncate the source, copy only what will fit */
249bc36eafdSMike Gerdts
250bc36eafdSMike Gerdts memcpy (TargetDesc->Buffer.Pointer, Buffer,
251bc36eafdSMike Gerdts TargetDesc->Buffer.Length);
252bc36eafdSMike Gerdts
253bc36eafdSMike Gerdts ACPI_DEBUG_PRINT ((ACPI_DB_INFO,
254bc36eafdSMike Gerdts "Truncating source buffer from %X to %X\n",
255bc36eafdSMike Gerdts Length, TargetDesc->Buffer.Length));
256bc36eafdSMike Gerdts }
257bc36eafdSMike Gerdts
258bc36eafdSMike Gerdts /* Copy flags */
259bc36eafdSMike Gerdts
260bc36eafdSMike Gerdts TargetDesc->Buffer.Flags = SourceDesc->Buffer.Flags;
261bc36eafdSMike Gerdts TargetDesc->Common.Flags &= ~AOPOBJ_STATIC_POINTER;
262bc36eafdSMike Gerdts return_ACPI_STATUS (AE_OK);
263bc36eafdSMike Gerdts }
264bc36eafdSMike Gerdts
265bc36eafdSMike Gerdts
266bc36eafdSMike Gerdts /*******************************************************************************
267bc36eafdSMike Gerdts *
268bc36eafdSMike Gerdts * FUNCTION: AcpiExStoreStringToString
269bc36eafdSMike Gerdts *
270bc36eafdSMike Gerdts * PARAMETERS: SourceDesc - Source object to copy
271bc36eafdSMike Gerdts * TargetDesc - Destination object of the copy
272bc36eafdSMike Gerdts *
273bc36eafdSMike Gerdts * RETURN: Status
274bc36eafdSMike Gerdts *
275bc36eafdSMike Gerdts * DESCRIPTION: Copy a String object to another String object
276bc36eafdSMike Gerdts *
277bc36eafdSMike Gerdts ******************************************************************************/
278bc36eafdSMike Gerdts
279bc36eafdSMike Gerdts ACPI_STATUS
AcpiExStoreStringToString(ACPI_OPERAND_OBJECT * SourceDesc,ACPI_OPERAND_OBJECT * TargetDesc)280bc36eafdSMike Gerdts AcpiExStoreStringToString (
281bc36eafdSMike Gerdts ACPI_OPERAND_OBJECT *SourceDesc,
282bc36eafdSMike Gerdts ACPI_OPERAND_OBJECT *TargetDesc)
283bc36eafdSMike Gerdts {
284bc36eafdSMike Gerdts UINT32 Length;
285bc36eafdSMike Gerdts UINT8 *Buffer;
286bc36eafdSMike Gerdts
287bc36eafdSMike Gerdts
288bc36eafdSMike Gerdts ACPI_FUNCTION_TRACE_PTR (ExStoreStringToString, SourceDesc);
289bc36eafdSMike Gerdts
290bc36eafdSMike Gerdts
291bc36eafdSMike Gerdts /* If Source and Target are the same, just return */
292bc36eafdSMike Gerdts
293bc36eafdSMike Gerdts if (SourceDesc == TargetDesc)
294bc36eafdSMike Gerdts {
295bc36eafdSMike Gerdts return_ACPI_STATUS (AE_OK);
296bc36eafdSMike Gerdts }
297bc36eafdSMike Gerdts
298bc36eafdSMike Gerdts /* We know that SourceDesc is a string by now */
299bc36eafdSMike Gerdts
300bc36eafdSMike Gerdts Buffer = ACPI_CAST_PTR (UINT8, SourceDesc->String.Pointer);
301bc36eafdSMike Gerdts Length = SourceDesc->String.Length;
302bc36eafdSMike Gerdts
303bc36eafdSMike Gerdts /*
304bc36eafdSMike Gerdts * Replace existing string value if it will fit and the string
305bc36eafdSMike Gerdts * pointer is not a static pointer (part of an ACPI table)
306bc36eafdSMike Gerdts */
307bc36eafdSMike Gerdts if ((Length < TargetDesc->String.Length) &&
308bc36eafdSMike Gerdts (!(TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER)))
309bc36eafdSMike Gerdts {
310bc36eafdSMike Gerdts /*
311bc36eafdSMike Gerdts * String will fit in existing non-static buffer.
312bc36eafdSMike Gerdts * Clear old string and copy in the new one
313bc36eafdSMike Gerdts */
314bc36eafdSMike Gerdts memset (TargetDesc->String.Pointer, 0,
315bc36eafdSMike Gerdts (ACPI_SIZE) TargetDesc->String.Length + 1);
316bc36eafdSMike Gerdts memcpy (TargetDesc->String.Pointer, Buffer, Length);
317bc36eafdSMike Gerdts }
318bc36eafdSMike Gerdts else
319bc36eafdSMike Gerdts {
320bc36eafdSMike Gerdts /*
321bc36eafdSMike Gerdts * Free the current buffer, then allocate a new buffer
322bc36eafdSMike Gerdts * large enough to hold the value
323bc36eafdSMike Gerdts */
324bc36eafdSMike Gerdts if (TargetDesc->String.Pointer &&
325bc36eafdSMike Gerdts (!(TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER)))
326bc36eafdSMike Gerdts {
327bc36eafdSMike Gerdts /* Only free if not a pointer into the DSDT */
328bc36eafdSMike Gerdts
329bc36eafdSMike Gerdts ACPI_FREE (TargetDesc->String.Pointer);
330bc36eafdSMike Gerdts }
331bc36eafdSMike Gerdts
332bc36eafdSMike Gerdts TargetDesc->String.Pointer =
333bc36eafdSMike Gerdts ACPI_ALLOCATE_ZEROED ((ACPI_SIZE) Length + 1);
334bc36eafdSMike Gerdts
335bc36eafdSMike Gerdts if (!TargetDesc->String.Pointer)
336bc36eafdSMike Gerdts {
337bc36eafdSMike Gerdts return_ACPI_STATUS (AE_NO_MEMORY);
338bc36eafdSMike Gerdts }
339bc36eafdSMike Gerdts
340bc36eafdSMike Gerdts TargetDesc->Common.Flags &= ~AOPOBJ_STATIC_POINTER;
341bc36eafdSMike Gerdts memcpy (TargetDesc->String.Pointer, Buffer, Length);
342bc36eafdSMike Gerdts }
343bc36eafdSMike Gerdts
344bc36eafdSMike Gerdts /* Set the new target length */
345bc36eafdSMike Gerdts
346bc36eafdSMike Gerdts TargetDesc->String.Length = Length;
347bc36eafdSMike Gerdts return_ACPI_STATUS (AE_OK);
348bc36eafdSMike Gerdts }
349