1bc36eafdSMike Gerdts /******************************************************************************
2bc36eafdSMike Gerdts  *
3bc36eafdSMike Gerdts  * Module Name: exstorob - AML object store support, store to object
4bc36eafdSMike Gerdts  *
5bc36eafdSMike Gerdts  *****************************************************************************/
6bc36eafdSMike Gerdts 
7*35786f68SRobert Mustacchi /******************************************************************************
8*35786f68SRobert Mustacchi  *
9*35786f68SRobert Mustacchi  * 1. Copyright Notice
10*35786f68SRobert Mustacchi  *
11*35786f68SRobert Mustacchi  * Some or all of this work - Copyright (c) 1999 - 2018, Intel Corp.
12bc36eafdSMike Gerdts  * All rights reserved.
13bc36eafdSMike Gerdts  *
14*35786f68SRobert Mustacchi  * 2. License
15*35786f68SRobert Mustacchi  *
16*35786f68SRobert Mustacchi  * 2.1. This is your license from Intel Corp. under its intellectual property
17*35786f68SRobert Mustacchi  * rights. You may have additional license terms from the party that provided
18*35786f68SRobert Mustacchi  * you this software, covering your right to use that party's intellectual
19*35786f68SRobert Mustacchi  * property rights.
20*35786f68SRobert Mustacchi  *
21*35786f68SRobert Mustacchi  * 2.2. Intel grants, free of charge, to any person ("Licensee") obtaining a
22*35786f68SRobert Mustacchi  * copy of the source code appearing in this file ("Covered Code") an
23*35786f68SRobert Mustacchi  * irrevocable, perpetual, worldwide license under Intel's copyrights in the
24*35786f68SRobert Mustacchi  * base code distributed originally by Intel ("Original Intel Code") to copy,
25*35786f68SRobert Mustacchi  * make derivatives, distribute, use and display any portion of the Covered
26*35786f68SRobert Mustacchi  * Code in any form, with the right to sublicense such rights; and
27*35786f68SRobert Mustacchi  *
28*35786f68SRobert Mustacchi  * 2.3. Intel grants Licensee a non-exclusive and non-transferable patent
29*35786f68SRobert Mustacchi  * license (with the right to sublicense), under only those claims of Intel
30*35786f68SRobert Mustacchi  * patents that are infringed by the Original Intel Code, to make, use, sell,
31*35786f68SRobert Mustacchi  * offer to sell, and import the Covered Code and derivative works thereof
32*35786f68SRobert Mustacchi  * solely to the minimum extent necessary to exercise the above copyright
33*35786f68SRobert Mustacchi  * license, and in no event shall the patent license extend to any additions
34*35786f68SRobert Mustacchi  * to or modifications of the Original Intel Code. No other license or right
35*35786f68SRobert Mustacchi  * is granted directly or by implication, estoppel or otherwise;
36*35786f68SRobert Mustacchi  *
37*35786f68SRobert Mustacchi  * The above copyright and patent license is granted only if the following
38*35786f68SRobert Mustacchi  * conditions are met:
39*35786f68SRobert Mustacchi  *
40*35786f68SRobert Mustacchi  * 3. Conditions
41*35786f68SRobert Mustacchi  *
42*35786f68SRobert Mustacchi  * 3.1. Redistribution of Source with Rights to Further Distribute Source.
43*35786f68SRobert Mustacchi  * Redistribution of source code of any substantial portion of the Covered
44*35786f68SRobert Mustacchi  * Code or modification with rights to further distribute source must include
45*35786f68SRobert Mustacchi  * the above Copyright Notice, the above License, this list of Conditions,
46*35786f68SRobert Mustacchi  * and the following Disclaimer and Export Compliance provision. In addition,
47*35786f68SRobert Mustacchi  * Licensee must cause all Covered Code to which Licensee contributes to
48*35786f68SRobert Mustacchi  * contain a file documenting the changes Licensee made to create that Covered
49*35786f68SRobert Mustacchi  * Code and the date of any change. Licensee must include in that file the
50*35786f68SRobert Mustacchi  * documentation of any changes made by any predecessor Licensee. Licensee
51*35786f68SRobert Mustacchi  * must include a prominent statement that the modification is derived,
52*35786f68SRobert Mustacchi  * directly or indirectly, from Original Intel Code.
53*35786f68SRobert Mustacchi  *
54*35786f68SRobert Mustacchi  * 3.2. Redistribution of Source with no Rights to Further Distribute Source.
55*35786f68SRobert Mustacchi  * Redistribution of source code of any substantial portion of the Covered
56*35786f68SRobert Mustacchi  * Code or modification without rights to further distribute source must
57*35786f68SRobert Mustacchi  * include the following Disclaimer and Export Compliance provision in the
58*35786f68SRobert Mustacchi  * documentation and/or other materials provided with distribution. In
59*35786f68SRobert Mustacchi  * addition, Licensee may not authorize further sublicense of source of any
60*35786f68SRobert Mustacchi  * portion of the Covered Code, and must include terms to the effect that the
61*35786f68SRobert Mustacchi  * license from Licensee to its licensee is limited to the intellectual
62*35786f68SRobert Mustacchi  * property embodied in the software Licensee provides to its licensee, and
63*35786f68SRobert Mustacchi  * not to intellectual property embodied in modifications its licensee may
64*35786f68SRobert Mustacchi  * make.
65*35786f68SRobert Mustacchi  *
66*35786f68SRobert Mustacchi  * 3.3. Redistribution of Executable. Redistribution in executable form of any
67*35786f68SRobert Mustacchi  * substantial portion of the Covered Code or modification must reproduce the
68*35786f68SRobert Mustacchi  * above Copyright Notice, and the following Disclaimer and Export Compliance
69*35786f68SRobert Mustacchi  * provision in the documentation and/or other materials provided with the
70*35786f68SRobert Mustacchi  * distribution.
71*35786f68SRobert Mustacchi  *
72*35786f68SRobert Mustacchi  * 3.4. Intel retains all right, title, and interest in and to the Original
73*35786f68SRobert Mustacchi  * Intel Code.
74*35786f68SRobert Mustacchi  *
75*35786f68SRobert Mustacchi  * 3.5. Neither the name Intel nor any other trademark owned or controlled by
76*35786f68SRobert Mustacchi  * Intel shall be used in advertising or otherwise to promote the sale, use or
77*35786f68SRobert Mustacchi  * other dealings in products derived from or relating to the Covered Code
78*35786f68SRobert Mustacchi  * without prior written authorization from Intel.
79*35786f68SRobert Mustacchi  *
80*35786f68SRobert Mustacchi  * 4. Disclaimer and Export Compliance
81*35786f68SRobert Mustacchi  *
82*35786f68SRobert Mustacchi  * 4.1. INTEL MAKES NO WARRANTY OF ANY KIND REGARDING ANY SOFTWARE PROVIDED
83*35786f68SRobert Mustacchi  * HERE. ANY SOFTWARE ORIGINATING FROM INTEL OR DERIVED FROM INTEL SOFTWARE
84*35786f68SRobert Mustacchi  * IS PROVIDED "AS IS," AND INTEL WILL NOT PROVIDE ANY SUPPORT, ASSISTANCE,
85*35786f68SRobert Mustacchi  * INSTALLATION, TRAINING OR OTHER SERVICES. INTEL WILL NOT PROVIDE ANY
86*35786f68SRobert Mustacchi  * UPDATES, ENHANCEMENTS OR EXTENSIONS. INTEL SPECIFICALLY DISCLAIMS ANY
87*35786f68SRobert Mustacchi  * IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A
88*35786f68SRobert Mustacchi  * PARTICULAR PURPOSE.
89*35786f68SRobert Mustacchi  *
90*35786f68SRobert Mustacchi  * 4.2. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY TO LICENSEE, ITS LICENSEES
91*35786f68SRobert Mustacchi  * OR ANY OTHER THIRD PARTY, FOR ANY LOST PROFITS, LOST DATA, LOSS OF USE OR
92*35786f68SRobert Mustacchi  * COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY INDIRECT,
93*35786f68SRobert Mustacchi  * SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, UNDER ANY
94*35786f68SRobert Mustacchi  * CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF WHETHER INTEL
95*35786f68SRobert Mustacchi  * HAS ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. THESE LIMITATIONS
96*35786f68SRobert Mustacchi  * SHALL APPLY NOTWITHSTANDING THE FAILURE OF THE ESSENTIAL PURPOSE OF ANY
97*35786f68SRobert Mustacchi  * LIMITED REMEDY.
98*35786f68SRobert Mustacchi  *
99*35786f68SRobert Mustacchi  * 4.3. Licensee shall not export, either directly or indirectly, any of this
100*35786f68SRobert Mustacchi  * software or system incorporating such software without first obtaining any
101*35786f68SRobert Mustacchi  * required license or other approval from the U. S. Department of Commerce or
102*35786f68SRobert Mustacchi  * any other agency or department of the United States Government. In the
103*35786f68SRobert Mustacchi  * event Licensee exports any such software from the United States or
104*35786f68SRobert Mustacchi  * re-exports any such software from a foreign destination, Licensee shall
105*35786f68SRobert Mustacchi  * ensure that the distribution and export/re-export of the software is in
106*35786f68SRobert Mustacchi  * compliance with all laws, regulations, orders, or other restrictions of the
107*35786f68SRobert Mustacchi  * U.S. Export Administration Regulations. Licensee agrees that neither it nor
108*35786f68SRobert Mustacchi  * any of its subsidiaries will export/re-export any technical data, process,
109*35786f68SRobert Mustacchi  * software, or service, directly or indirectly, to any country for which the
110*35786f68SRobert Mustacchi  * United States government or any agency thereof requires an export license,
111*35786f68SRobert Mustacchi  * other governmental approval, or letter of assurance, without first obtaining
112*35786f68SRobert Mustacchi  * such license, approval or letter.
113*35786f68SRobert Mustacchi  *
114*35786f68SRobert Mustacchi  *****************************************************************************
115*35786f68SRobert Mustacchi  *
116*35786f68SRobert Mustacchi  * Alternatively, you may choose to be licensed under the terms of the
117*35786f68SRobert Mustacchi  * following license:
118*35786f68SRobert Mustacchi  *
119bc36eafdSMike Gerdts  * Redistribution and use in source and binary forms, with or without
120bc36eafdSMike Gerdts  * modification, are permitted provided that the following conditions
121bc36eafdSMike Gerdts  * are met:
122bc36eafdSMike Gerdts  * 1. Redistributions of source code must retain the above copyright
123bc36eafdSMike Gerdts  *    notice, this list of conditions, and the following disclaimer,
124bc36eafdSMike Gerdts  *    without modification.
125bc36eafdSMike Gerdts  * 2. Redistributions in binary form must reproduce at minimum a disclaimer
126bc36eafdSMike Gerdts  *    substantially similar to the "NO WARRANTY" disclaimer below
127bc36eafdSMike Gerdts  *    ("Disclaimer") and any redistribution must be conditioned upon
128bc36eafdSMike Gerdts  *    including a substantially similar Disclaimer requirement for further
129bc36eafdSMike Gerdts  *    binary redistribution.
130bc36eafdSMike Gerdts  * 3. Neither the names of the above-listed copyright holders nor the names
131bc36eafdSMike Gerdts  *    of any contributors may be used to endorse or promote products derived
132bc36eafdSMike Gerdts  *    from this software without specific prior written permission.
133bc36eafdSMike Gerdts  *
134*35786f68SRobert Mustacchi  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
135*35786f68SRobert Mustacchi  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
136*35786f68SRobert Mustacchi  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
137*35786f68SRobert Mustacchi  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
138*35786f68SRobert Mustacchi  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
139*35786f68SRobert Mustacchi  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
140*35786f68SRobert Mustacchi  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
141*35786f68SRobert Mustacchi  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
142*35786f68SRobert Mustacchi  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
143*35786f68SRobert Mustacchi  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
144*35786f68SRobert Mustacchi  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
145*35786f68SRobert Mustacchi  *
146*35786f68SRobert Mustacchi  * Alternatively, you may choose to be licensed under the terms of the
147bc36eafdSMike Gerdts  * GNU General Public License ("GPL") version 2 as published by the Free
148bc36eafdSMike Gerdts  * Software Foundation.
149bc36eafdSMike Gerdts  *
150*35786f68SRobert Mustacchi  *****************************************************************************/
151bc36eafdSMike Gerdts 
152bc36eafdSMike Gerdts #include "acpi.h"
153bc36eafdSMike Gerdts #include "accommon.h"
154bc36eafdSMike Gerdts #include "acinterp.h"
155bc36eafdSMike Gerdts 
156bc36eafdSMike Gerdts 
157bc36eafdSMike Gerdts #define _COMPONENT          ACPI_EXECUTER
158bc36eafdSMike Gerdts         ACPI_MODULE_NAME    ("exstorob")
159bc36eafdSMike Gerdts 
160bc36eafdSMike Gerdts 
161bc36eafdSMike Gerdts /*******************************************************************************
162bc36eafdSMike Gerdts  *
163bc36eafdSMike Gerdts  * FUNCTION:    AcpiExStoreBufferToBuffer
164bc36eafdSMike Gerdts  *
165bc36eafdSMike Gerdts  * PARAMETERS:  SourceDesc          - Source object to copy
166bc36eafdSMike Gerdts  *              TargetDesc          - Destination object of the copy
167bc36eafdSMike Gerdts  *
168bc36eafdSMike Gerdts  * RETURN:      Status
169bc36eafdSMike Gerdts  *
170bc36eafdSMike Gerdts  * DESCRIPTION: Copy a buffer object to another buffer object.
171bc36eafdSMike Gerdts  *
172bc36eafdSMike Gerdts  ******************************************************************************/
173bc36eafdSMike Gerdts 
174bc36eafdSMike Gerdts ACPI_STATUS
AcpiExStoreBufferToBuffer(ACPI_OPERAND_OBJECT * SourceDesc,ACPI_OPERAND_OBJECT * TargetDesc)175bc36eafdSMike Gerdts AcpiExStoreBufferToBuffer (
176bc36eafdSMike Gerdts     ACPI_OPERAND_OBJECT     *SourceDesc,
177bc36eafdSMike Gerdts     ACPI_OPERAND_OBJECT     *TargetDesc)
178bc36eafdSMike Gerdts {
179bc36eafdSMike Gerdts     UINT32                  Length;
180bc36eafdSMike Gerdts     UINT8                   *Buffer;
181bc36eafdSMike Gerdts 
182bc36eafdSMike Gerdts 
183bc36eafdSMike Gerdts     ACPI_FUNCTION_TRACE_PTR (ExStoreBufferToBuffer, SourceDesc);
184bc36eafdSMike Gerdts 
185bc36eafdSMike Gerdts 
186bc36eafdSMike Gerdts     /* If Source and Target are the same, just return */
187bc36eafdSMike Gerdts 
188bc36eafdSMike Gerdts     if (SourceDesc == TargetDesc)
189bc36eafdSMike Gerdts     {
190bc36eafdSMike Gerdts         return_ACPI_STATUS (AE_OK);
191bc36eafdSMike Gerdts     }
192bc36eafdSMike Gerdts 
193bc36eafdSMike Gerdts     /* We know that SourceDesc is a buffer by now */
194bc36eafdSMike Gerdts 
195bc36eafdSMike Gerdts     Buffer = ACPI_CAST_PTR (UINT8, SourceDesc->Buffer.Pointer);
196bc36eafdSMike Gerdts     Length = SourceDesc->Buffer.Length;
197bc36eafdSMike Gerdts 
198bc36eafdSMike Gerdts     /*
199bc36eafdSMike Gerdts      * If target is a buffer of length zero or is a static buffer,
200bc36eafdSMike Gerdts      * allocate a new buffer of the proper length
201bc36eafdSMike Gerdts      */
202bc36eafdSMike Gerdts     if ((TargetDesc->Buffer.Length == 0) ||
203bc36eafdSMike Gerdts         (TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER))
204bc36eafdSMike Gerdts     {
205bc36eafdSMike Gerdts         TargetDesc->Buffer.Pointer = ACPI_ALLOCATE (Length);
206bc36eafdSMike Gerdts         if (!TargetDesc->Buffer.Pointer)
207bc36eafdSMike Gerdts         {
208bc36eafdSMike Gerdts             return_ACPI_STATUS (AE_NO_MEMORY);
209bc36eafdSMike Gerdts         }
210bc36eafdSMike Gerdts 
211bc36eafdSMike Gerdts         TargetDesc->Buffer.Length = Length;
212bc36eafdSMike Gerdts     }
213bc36eafdSMike Gerdts 
214bc36eafdSMike Gerdts     /* Copy source buffer to target buffer */
215bc36eafdSMike Gerdts 
216bc36eafdSMike Gerdts     if (Length <= TargetDesc->Buffer.Length)
217bc36eafdSMike Gerdts     {
218bc36eafdSMike Gerdts         /* Clear existing buffer and copy in the new one */
219bc36eafdSMike Gerdts 
220bc36eafdSMike Gerdts         memset (TargetDesc->Buffer.Pointer, 0, TargetDesc->Buffer.Length);
221bc36eafdSMike Gerdts         memcpy (TargetDesc->Buffer.Pointer, Buffer, Length);
222bc36eafdSMike Gerdts 
223bc36eafdSMike Gerdts #ifdef ACPI_OBSOLETE_BEHAVIOR
224bc36eafdSMike Gerdts         /*
225bc36eafdSMike Gerdts          * NOTE: ACPI versions up to 3.0 specified that the buffer must be
226bc36eafdSMike Gerdts          * truncated if the string is smaller than the buffer. However, "other"
227bc36eafdSMike Gerdts          * implementations of ACPI never did this and thus became the defacto
228bc36eafdSMike Gerdts          * standard. ACPI 3.0A changes this behavior such that the buffer
229bc36eafdSMike Gerdts          * is no longer truncated.
230bc36eafdSMike Gerdts          */
231bc36eafdSMike Gerdts 
232bc36eafdSMike Gerdts         /*
233bc36eafdSMike Gerdts          * OBSOLETE BEHAVIOR:
234bc36eafdSMike Gerdts          * If the original source was a string, we must truncate the buffer,
235bc36eafdSMike Gerdts          * according to the ACPI spec. Integer-to-Buffer and Buffer-to-Buffer
236bc36eafdSMike Gerdts          * copy must not truncate the original buffer.
237bc36eafdSMike Gerdts          */
238bc36eafdSMike Gerdts         if (OriginalSrcType == ACPI_TYPE_STRING)
239bc36eafdSMike Gerdts         {
240bc36eafdSMike Gerdts             /* Set the new length of the target */
241bc36eafdSMike Gerdts 
242bc36eafdSMike Gerdts             TargetDesc->Buffer.Length = Length;
243bc36eafdSMike Gerdts         }
244bc36eafdSMike Gerdts #endif
245bc36eafdSMike Gerdts     }
246bc36eafdSMike Gerdts     else
247bc36eafdSMike Gerdts     {
248bc36eafdSMike Gerdts         /* Truncate the source, copy only what will fit */
249bc36eafdSMike Gerdts 
250bc36eafdSMike Gerdts         memcpy (TargetDesc->Buffer.Pointer, Buffer,
251bc36eafdSMike Gerdts             TargetDesc->Buffer.Length);
252bc36eafdSMike Gerdts 
253bc36eafdSMike Gerdts         ACPI_DEBUG_PRINT ((ACPI_DB_INFO,
254bc36eafdSMike Gerdts             "Truncating source buffer from %X to %X\n",
255bc36eafdSMike Gerdts             Length, TargetDesc->Buffer.Length));
256bc36eafdSMike Gerdts     }
257bc36eafdSMike Gerdts 
258bc36eafdSMike Gerdts     /* Copy flags */
259bc36eafdSMike Gerdts 
260bc36eafdSMike Gerdts     TargetDesc->Buffer.Flags = SourceDesc->Buffer.Flags;
261bc36eafdSMike Gerdts     TargetDesc->Common.Flags &= ~AOPOBJ_STATIC_POINTER;
262bc36eafdSMike Gerdts     return_ACPI_STATUS (AE_OK);
263bc36eafdSMike Gerdts }
264bc36eafdSMike Gerdts 
265bc36eafdSMike Gerdts 
266bc36eafdSMike Gerdts /*******************************************************************************
267bc36eafdSMike Gerdts  *
268bc36eafdSMike Gerdts  * FUNCTION:    AcpiExStoreStringToString
269bc36eafdSMike Gerdts  *
270bc36eafdSMike Gerdts  * PARAMETERS:  SourceDesc          - Source object to copy
271bc36eafdSMike Gerdts  *              TargetDesc          - Destination object of the copy
272bc36eafdSMike Gerdts  *
273bc36eafdSMike Gerdts  * RETURN:      Status
274bc36eafdSMike Gerdts  *
275bc36eafdSMike Gerdts  * DESCRIPTION: Copy a String object to another String object
276bc36eafdSMike Gerdts  *
277bc36eafdSMike Gerdts  ******************************************************************************/
278bc36eafdSMike Gerdts 
279bc36eafdSMike Gerdts ACPI_STATUS
AcpiExStoreStringToString(ACPI_OPERAND_OBJECT * SourceDesc,ACPI_OPERAND_OBJECT * TargetDesc)280bc36eafdSMike Gerdts AcpiExStoreStringToString (
281bc36eafdSMike Gerdts     ACPI_OPERAND_OBJECT     *SourceDesc,
282bc36eafdSMike Gerdts     ACPI_OPERAND_OBJECT     *TargetDesc)
283bc36eafdSMike Gerdts {
284bc36eafdSMike Gerdts     UINT32                  Length;
285bc36eafdSMike Gerdts     UINT8                   *Buffer;
286bc36eafdSMike Gerdts 
287bc36eafdSMike Gerdts 
288bc36eafdSMike Gerdts     ACPI_FUNCTION_TRACE_PTR (ExStoreStringToString, SourceDesc);
289bc36eafdSMike Gerdts 
290bc36eafdSMike Gerdts 
291bc36eafdSMike Gerdts     /* If Source and Target are the same, just return */
292bc36eafdSMike Gerdts 
293bc36eafdSMike Gerdts     if (SourceDesc == TargetDesc)
294bc36eafdSMike Gerdts     {
295bc36eafdSMike Gerdts         return_ACPI_STATUS (AE_OK);
296bc36eafdSMike Gerdts     }
297bc36eafdSMike Gerdts 
298bc36eafdSMike Gerdts     /* We know that SourceDesc is a string by now */
299bc36eafdSMike Gerdts 
300bc36eafdSMike Gerdts     Buffer = ACPI_CAST_PTR (UINT8, SourceDesc->String.Pointer);
301bc36eafdSMike Gerdts     Length = SourceDesc->String.Length;
302bc36eafdSMike Gerdts 
303bc36eafdSMike Gerdts     /*
304bc36eafdSMike Gerdts      * Replace existing string value if it will fit and the string
305bc36eafdSMike Gerdts      * pointer is not a static pointer (part of an ACPI table)
306bc36eafdSMike Gerdts      */
307bc36eafdSMike Gerdts     if ((Length < TargetDesc->String.Length) &&
308bc36eafdSMike Gerdts        (!(TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER)))
309bc36eafdSMike Gerdts     {
310bc36eafdSMike Gerdts         /*
311bc36eafdSMike Gerdts          * String will fit in existing non-static buffer.
312bc36eafdSMike Gerdts          * Clear old string and copy in the new one
313bc36eafdSMike Gerdts          */
314bc36eafdSMike Gerdts         memset (TargetDesc->String.Pointer, 0,
315bc36eafdSMike Gerdts             (ACPI_SIZE) TargetDesc->String.Length + 1);
316bc36eafdSMike Gerdts         memcpy (TargetDesc->String.Pointer, Buffer, Length);
317bc36eafdSMike Gerdts     }
318bc36eafdSMike Gerdts     else
319bc36eafdSMike Gerdts     {
320bc36eafdSMike Gerdts         /*
321bc36eafdSMike Gerdts          * Free the current buffer, then allocate a new buffer
322bc36eafdSMike Gerdts          * large enough to hold the value
323bc36eafdSMike Gerdts          */
324bc36eafdSMike Gerdts         if (TargetDesc->String.Pointer &&
325bc36eafdSMike Gerdts            (!(TargetDesc->Common.Flags & AOPOBJ_STATIC_POINTER)))
326bc36eafdSMike Gerdts         {
327bc36eafdSMike Gerdts             /* Only free if not a pointer into the DSDT */
328bc36eafdSMike Gerdts 
329bc36eafdSMike Gerdts             ACPI_FREE (TargetDesc->String.Pointer);
330bc36eafdSMike Gerdts         }
331bc36eafdSMike Gerdts 
332bc36eafdSMike Gerdts         TargetDesc->String.Pointer =
333bc36eafdSMike Gerdts             ACPI_ALLOCATE_ZEROED ((ACPI_SIZE) Length + 1);
334bc36eafdSMike Gerdts 
335bc36eafdSMike Gerdts         if (!TargetDesc->String.Pointer)
336bc36eafdSMike Gerdts         {
337bc36eafdSMike Gerdts             return_ACPI_STATUS (AE_NO_MEMORY);
338bc36eafdSMike Gerdts         }
339bc36eafdSMike Gerdts 
340bc36eafdSMike Gerdts         TargetDesc->Common.Flags &= ~AOPOBJ_STATIC_POINTER;
341bc36eafdSMike Gerdts         memcpy (TargetDesc->String.Pointer, Buffer, Length);
342bc36eafdSMike Gerdts     }
343bc36eafdSMike Gerdts 
344bc36eafdSMike Gerdts     /* Set the new target length */
345bc36eafdSMike Gerdts 
346bc36eafdSMike Gerdts     TargetDesc->String.Length = Length;
347bc36eafdSMike Gerdts     return_ACPI_STATUS (AE_OK);
348bc36eafdSMike Gerdts }
349