1a9f12690SJung-uk Kim /******************************************************************************
2a9f12690SJung-uk Kim  *
3a9f12690SJung-uk Kim  * Name: acmacros.h - C macros for the entire subsystem.
4a9f12690SJung-uk Kim  *
5a9f12690SJung-uk Kim  *****************************************************************************/
6a9f12690SJung-uk Kim 
70d84335fSJung-uk Kim /******************************************************************************
80d84335fSJung-uk Kim  *
90d84335fSJung-uk Kim  * 1. Copyright Notice
100d84335fSJung-uk Kim  *
11722b1667SJung-uk Kim  * Some or all of this work - Copyright (c) 1999 - 2023, Intel Corp.
12a9f12690SJung-uk Kim  * All rights reserved.
13a9f12690SJung-uk Kim  *
140d84335fSJung-uk Kim  * 2. License
150d84335fSJung-uk Kim  *
160d84335fSJung-uk Kim  * 2.1. This is your license from Intel Corp. under its intellectual property
170d84335fSJung-uk Kim  * rights. You may have additional license terms from the party that provided
180d84335fSJung-uk Kim  * you this software, covering your right to use that party's intellectual
190d84335fSJung-uk Kim  * property rights.
200d84335fSJung-uk Kim  *
210d84335fSJung-uk Kim  * 2.2. Intel grants, free of charge, to any person ("Licensee") obtaining a
220d84335fSJung-uk Kim  * copy of the source code appearing in this file ("Covered Code") an
230d84335fSJung-uk Kim  * irrevocable, perpetual, worldwide license under Intel's copyrights in the
240d84335fSJung-uk Kim  * base code distributed originally by Intel ("Original Intel Code") to copy,
250d84335fSJung-uk Kim  * make derivatives, distribute, use and display any portion of the Covered
260d84335fSJung-uk Kim  * Code in any form, with the right to sublicense such rights; and
270d84335fSJung-uk Kim  *
280d84335fSJung-uk Kim  * 2.3. Intel grants Licensee a non-exclusive and non-transferable patent
290d84335fSJung-uk Kim  * license (with the right to sublicense), under only those claims of Intel
300d84335fSJung-uk Kim  * patents that are infringed by the Original Intel Code, to make, use, sell,
310d84335fSJung-uk Kim  * offer to sell, and import the Covered Code and derivative works thereof
320d84335fSJung-uk Kim  * solely to the minimum extent necessary to exercise the above copyright
330d84335fSJung-uk Kim  * license, and in no event shall the patent license extend to any additions
340d84335fSJung-uk Kim  * to or modifications of the Original Intel Code. No other license or right
350d84335fSJung-uk Kim  * is granted directly or by implication, estoppel or otherwise;
360d84335fSJung-uk Kim  *
370d84335fSJung-uk Kim  * The above copyright and patent license is granted only if the following
380d84335fSJung-uk Kim  * conditions are met:
390d84335fSJung-uk Kim  *
400d84335fSJung-uk Kim  * 3. Conditions
410d84335fSJung-uk Kim  *
420d84335fSJung-uk Kim  * 3.1. Redistribution of Source with Rights to Further Distribute Source.
430d84335fSJung-uk Kim  * Redistribution of source code of any substantial portion of the Covered
440d84335fSJung-uk Kim  * Code or modification with rights to further distribute source must include
450d84335fSJung-uk Kim  * the above Copyright Notice, the above License, this list of Conditions,
460d84335fSJung-uk Kim  * and the following Disclaimer and Export Compliance provision. In addition,
470d84335fSJung-uk Kim  * Licensee must cause all Covered Code to which Licensee contributes to
480d84335fSJung-uk Kim  * contain a file documenting the changes Licensee made to create that Covered
490d84335fSJung-uk Kim  * Code and the date of any change. Licensee must include in that file the
500d84335fSJung-uk Kim  * documentation of any changes made by any predecessor Licensee. Licensee
510d84335fSJung-uk Kim  * must include a prominent statement that the modification is derived,
520d84335fSJung-uk Kim  * directly or indirectly, from Original Intel Code.
530d84335fSJung-uk Kim  *
540d84335fSJung-uk Kim  * 3.2. Redistribution of Source with no Rights to Further Distribute Source.
550d84335fSJung-uk Kim  * Redistribution of source code of any substantial portion of the Covered
560d84335fSJung-uk Kim  * Code or modification without rights to further distribute source must
570d84335fSJung-uk Kim  * include the following Disclaimer and Export Compliance provision in the
580d84335fSJung-uk Kim  * documentation and/or other materials provided with distribution. In
590d84335fSJung-uk Kim  * addition, Licensee may not authorize further sublicense of source of any
600d84335fSJung-uk Kim  * portion of the Covered Code, and must include terms to the effect that the
610d84335fSJung-uk Kim  * license from Licensee to its licensee is limited to the intellectual
620d84335fSJung-uk Kim  * property embodied in the software Licensee provides to its licensee, and
630d84335fSJung-uk Kim  * not to intellectual property embodied in modifications its licensee may
640d84335fSJung-uk Kim  * make.
650d84335fSJung-uk Kim  *
660d84335fSJung-uk Kim  * 3.3. Redistribution of Executable. Redistribution in executable form of any
670d84335fSJung-uk Kim  * substantial portion of the Covered Code or modification must reproduce the
680d84335fSJung-uk Kim  * above Copyright Notice, and the following Disclaimer and Export Compliance
690d84335fSJung-uk Kim  * provision in the documentation and/or other materials provided with the
700d84335fSJung-uk Kim  * distribution.
710d84335fSJung-uk Kim  *
720d84335fSJung-uk Kim  * 3.4. Intel retains all right, title, and interest in and to the Original
730d84335fSJung-uk Kim  * Intel Code.
740d84335fSJung-uk Kim  *
750d84335fSJung-uk Kim  * 3.5. Neither the name Intel nor any other trademark owned or controlled by
760d84335fSJung-uk Kim  * Intel shall be used in advertising or otherwise to promote the sale, use or
770d84335fSJung-uk Kim  * other dealings in products derived from or relating to the Covered Code
780d84335fSJung-uk Kim  * without prior written authorization from Intel.
790d84335fSJung-uk Kim  *
800d84335fSJung-uk Kim  * 4. Disclaimer and Export Compliance
810d84335fSJung-uk Kim  *
820d84335fSJung-uk Kim  * 4.1. INTEL MAKES NO WARRANTY OF ANY KIND REGARDING ANY SOFTWARE PROVIDED
830d84335fSJung-uk Kim  * HERE. ANY SOFTWARE ORIGINATING FROM INTEL OR DERIVED FROM INTEL SOFTWARE
840d84335fSJung-uk Kim  * IS PROVIDED "AS IS," AND INTEL WILL NOT PROVIDE ANY SUPPORT, ASSISTANCE,
850d84335fSJung-uk Kim  * INSTALLATION, TRAINING OR OTHER SERVICES. INTEL WILL NOT PROVIDE ANY
860d84335fSJung-uk Kim  * UPDATES, ENHANCEMENTS OR EXTENSIONS. INTEL SPECIFICALLY DISCLAIMS ANY
870d84335fSJung-uk Kim  * IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A
880d84335fSJung-uk Kim  * PARTICULAR PURPOSE.
890d84335fSJung-uk Kim  *
900d84335fSJung-uk Kim  * 4.2. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY TO LICENSEE, ITS LICENSEES
910d84335fSJung-uk Kim  * OR ANY OTHER THIRD PARTY, FOR ANY LOST PROFITS, LOST DATA, LOSS OF USE OR
920d84335fSJung-uk Kim  * COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY INDIRECT,
930d84335fSJung-uk Kim  * SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, UNDER ANY
940d84335fSJung-uk Kim  * CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF WHETHER INTEL
950d84335fSJung-uk Kim  * HAS ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. THESE LIMITATIONS
960d84335fSJung-uk Kim  * SHALL APPLY NOTWITHSTANDING THE FAILURE OF THE ESSENTIAL PURPOSE OF ANY
970d84335fSJung-uk Kim  * LIMITED REMEDY.
980d84335fSJung-uk Kim  *
990d84335fSJung-uk Kim  * 4.3. Licensee shall not export, either directly or indirectly, any of this
1000d84335fSJung-uk Kim  * software or system incorporating such software without first obtaining any
1010d84335fSJung-uk Kim  * required license or other approval from the U. S. Department of Commerce or
1020d84335fSJung-uk Kim  * any other agency or department of the United States Government. In the
1030d84335fSJung-uk Kim  * event Licensee exports any such software from the United States or
1040d84335fSJung-uk Kim  * re-exports any such software from a foreign destination, Licensee shall
1050d84335fSJung-uk Kim  * ensure that the distribution and export/re-export of the software is in
1060d84335fSJung-uk Kim  * compliance with all laws, regulations, orders, or other restrictions of the
1070d84335fSJung-uk Kim  * U.S. Export Administration Regulations. Licensee agrees that neither it nor
1080d84335fSJung-uk Kim  * any of its subsidiaries will export/re-export any technical data, process,
1090d84335fSJung-uk Kim  * software, or service, directly or indirectly, to any country for which the
1100d84335fSJung-uk Kim  * United States government or any agency thereof requires an export license,
1110d84335fSJung-uk Kim  * other governmental approval, or letter of assurance, without first obtaining
1120d84335fSJung-uk Kim  * such license, approval or letter.
1130d84335fSJung-uk Kim  *
1140d84335fSJung-uk Kim  *****************************************************************************
1150d84335fSJung-uk Kim  *
1160d84335fSJung-uk Kim  * Alternatively, you may choose to be licensed under the terms of the
1170d84335fSJung-uk Kim  * following license:
1180d84335fSJung-uk Kim  *
119d244b227SJung-uk Kim  * Redistribution and use in source and binary forms, with or without
120d244b227SJung-uk Kim  * modification, are permitted provided that the following conditions
121d244b227SJung-uk Kim  * are met:
122d244b227SJung-uk Kim  * 1. Redistributions of source code must retain the above copyright
123d244b227SJung-uk Kim  *    notice, this list of conditions, and the following disclaimer,
124d244b227SJung-uk Kim  *    without modification.
125d244b227SJung-uk Kim  * 2. Redistributions in binary form must reproduce at minimum a disclaimer
126d244b227SJung-uk Kim  *    substantially similar to the "NO WARRANTY" disclaimer below
127d244b227SJung-uk Kim  *    ("Disclaimer") and any redistribution must be conditioned upon
128d244b227SJung-uk Kim  *    including a substantially similar Disclaimer requirement for further
129d244b227SJung-uk Kim  *    binary redistribution.
130d244b227SJung-uk Kim  * 3. Neither the names of the above-listed copyright holders nor the names
131d244b227SJung-uk Kim  *    of any contributors may be used to endorse or promote products derived
132d244b227SJung-uk Kim  *    from this software without specific prior written permission.
133a9f12690SJung-uk Kim  *
1340d84335fSJung-uk Kim  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
1350d84335fSJung-uk Kim  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
1360d84335fSJung-uk Kim  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
1370d84335fSJung-uk Kim  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
1380d84335fSJung-uk Kim  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
1390d84335fSJung-uk Kim  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
1400d84335fSJung-uk Kim  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
1410d84335fSJung-uk Kim  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
1420d84335fSJung-uk Kim  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
1430d84335fSJung-uk Kim  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
1440d84335fSJung-uk Kim  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1450d84335fSJung-uk Kim  *
1460d84335fSJung-uk Kim  * Alternatively, you may choose to be licensed under the terms of the
147d244b227SJung-uk Kim  * GNU General Public License ("GPL") version 2 as published by the Free
148d244b227SJung-uk Kim  * Software Foundation.
149a9f12690SJung-uk Kim  *
1500d84335fSJung-uk Kim  *****************************************************************************/
151a9f12690SJung-uk Kim 
152a9f12690SJung-uk Kim #ifndef __ACMACROS_H__
153a9f12690SJung-uk Kim #define __ACMACROS_H__
154a9f12690SJung-uk Kim 
155a9f12690SJung-uk Kim 
156a9f12690SJung-uk Kim /*
157a9f12690SJung-uk Kim  * Extract data using a pointer. Any more than a byte and we
15828482948SJung-uk Kim  * get into potential alignment issues -- see the STORE macros below.
159a9f12690SJung-uk Kim  * Use with care.
160a9f12690SJung-uk Kim  */
161ed17e06eSJung-uk Kim #define ACPI_CAST8(ptr)                 ACPI_CAST_PTR (UINT8, (ptr))
162ed17e06eSJung-uk Kim #define ACPI_CAST16(ptr)                ACPI_CAST_PTR (UINT16, (ptr))
163ed17e06eSJung-uk Kim #define ACPI_CAST32(ptr)                ACPI_CAST_PTR (UINT32, (ptr))
164ed17e06eSJung-uk Kim #define ACPI_CAST64(ptr)                ACPI_CAST_PTR (UINT64, (ptr))
165ed17e06eSJung-uk Kim #define ACPI_GET8(ptr)                  (*ACPI_CAST8 (ptr))
166ed17e06eSJung-uk Kim #define ACPI_GET16(ptr)                 (*ACPI_CAST16 (ptr))
167ed17e06eSJung-uk Kim #define ACPI_GET32(ptr)                 (*ACPI_CAST32 (ptr))
168ed17e06eSJung-uk Kim #define ACPI_GET64(ptr)                 (*ACPI_CAST64 (ptr))
169ed17e06eSJung-uk Kim #define ACPI_SET8(ptr, val)             (*ACPI_CAST8 (ptr) = (UINT8) (val))
170ed17e06eSJung-uk Kim #define ACPI_SET16(ptr, val)            (*ACPI_CAST16 (ptr) = (UINT16) (val))
171ed17e06eSJung-uk Kim #define ACPI_SET32(ptr, val)            (*ACPI_CAST32 (ptr) = (UINT32) (val))
172ed17e06eSJung-uk Kim #define ACPI_SET64(ptr, val)            (*ACPI_CAST64 (ptr) = (UINT64) (val))
173a9f12690SJung-uk Kim 
174a9f12690SJung-uk Kim /*
17528482948SJung-uk Kim  * printf() format helper. This macro is a workaround for the difficulties
176313a0c13SJung-uk Kim  * with emitting 64-bit integers and 64-bit pointers with the same code
177313a0c13SJung-uk Kim  * for both 32-bit and 64-bit hosts.
178a9f12690SJung-uk Kim  */
179a9f12690SJung-uk Kim #define ACPI_FORMAT_UINT64(i)           ACPI_HIDWORD(i), ACPI_LODWORD(i)
180a9f12690SJung-uk Kim 
181a9f12690SJung-uk Kim 
182a9f12690SJung-uk Kim /*
183a9f12690SJung-uk Kim  * Macros for moving data around to/from buffers that are possibly unaligned.
184a9f12690SJung-uk Kim  * If the hardware supports the transfer of unaligned data, just do the store.
185a9f12690SJung-uk Kim  * Otherwise, we have to move one byte at a time.
186a9f12690SJung-uk Kim  */
187a9f12690SJung-uk Kim #ifdef ACPI_BIG_ENDIAN
188a9f12690SJung-uk Kim /*
189a9f12690SJung-uk Kim  * Macros for big-endian machines
190a9f12690SJung-uk Kim  */
191a9f12690SJung-uk Kim 
192a9f12690SJung-uk Kim /* These macros reverse the bytes during the move, converting little-endian to big endian */
193a9f12690SJung-uk Kim 
194a9f12690SJung-uk Kim                                                      /* Big Endian      <==        Little Endian */
195a9f12690SJung-uk Kim                                                      /*  Hi...Lo                     Lo...Hi     */
196a9f12690SJung-uk Kim /* 16-bit source, 16/32/64 destination */
197a9f12690SJung-uk Kim 
198a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_16(d, s)        {((  UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[1];\
199a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[0];}
200a9f12690SJung-uk Kim 
201a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_32(d, s)        {(*(UINT32 *)(void *)(d))=0;\
202a9f12690SJung-uk Kim                                            ((UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[1];\
203a9f12690SJung-uk Kim                                            ((UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[0];}
204a9f12690SJung-uk Kim 
205a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_64(d, s)        {(*(UINT64 *)(void *)(d))=0;\
206a9f12690SJung-uk Kim                                            ((UINT8 *)(void *)(d))[6] = ((UINT8 *)(void *)(s))[1];\
207a9f12690SJung-uk Kim                                            ((UINT8 *)(void *)(d))[7] = ((UINT8 *)(void *)(s))[0];}
208a9f12690SJung-uk Kim 
209a9f12690SJung-uk Kim /* 32-bit source, 16/32/64 destination */
210a9f12690SJung-uk Kim 
211a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_16(d, s)        ACPI_MOVE_16_TO_16(d, s)    /* Truncate to 16 */
212a9f12690SJung-uk Kim 
213a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_32(d, s)        {((  UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[3];\
214a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[2];\
215a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[1];\
216a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[0];}
217a9f12690SJung-uk Kim 
218a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_64(d, s)        {(*(UINT64 *)(void *)(d))=0;\
219a9f12690SJung-uk Kim                                            ((UINT8 *)(void *)(d))[4] = ((UINT8 *)(void *)(s))[3];\
220a9f12690SJung-uk Kim                                            ((UINT8 *)(void *)(d))[5] = ((UINT8 *)(void *)(s))[2];\
221a9f12690SJung-uk Kim                                            ((UINT8 *)(void *)(d))[6] = ((UINT8 *)(void *)(s))[1];\
222a9f12690SJung-uk Kim                                            ((UINT8 *)(void *)(d))[7] = ((UINT8 *)(void *)(s))[0];}
223a9f12690SJung-uk Kim 
224a9f12690SJung-uk Kim /* 64-bit source, 16/32/64 destination */
225a9f12690SJung-uk Kim 
226a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_16(d, s)        ACPI_MOVE_16_TO_16(d, s)    /* Truncate to 16 */
227a9f12690SJung-uk Kim 
228a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_32(d, s)        ACPI_MOVE_32_TO_32(d, s)    /* Truncate to 32 */
229a9f12690SJung-uk Kim 
230a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_64(d, s)        {((  UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[7];\
231a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[6];\
232a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[5];\
233a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[4];\
234a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[4] = ((UINT8 *)(void *)(s))[3];\
235a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[5] = ((UINT8 *)(void *)(s))[2];\
236a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[6] = ((UINT8 *)(void *)(s))[1];\
237a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[7] = ((UINT8 *)(void *)(s))[0];}
238a9f12690SJung-uk Kim #else
239a9f12690SJung-uk Kim /*
240a9f12690SJung-uk Kim  * Macros for little-endian machines
241a9f12690SJung-uk Kim  */
242a9f12690SJung-uk Kim 
243a9f12690SJung-uk Kim #ifndef ACPI_MISALIGNMENT_NOT_SUPPORTED
244a9f12690SJung-uk Kim 
245a9f12690SJung-uk Kim /* The hardware supports unaligned transfers, just do the little-endian move */
246a9f12690SJung-uk Kim 
247a9f12690SJung-uk Kim /* 16-bit source, 16/32/64 destination */
248a9f12690SJung-uk Kim 
249a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_16(d, s)        *(UINT16 *)(void *)(d) = *(UINT16 *)(void *)(s)
250a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_32(d, s)        *(UINT32 *)(void *)(d) = *(UINT16 *)(void *)(s)
251a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_64(d, s)        *(UINT64 *)(void *)(d) = *(UINT16 *)(void *)(s)
252a9f12690SJung-uk Kim 
253a9f12690SJung-uk Kim /* 32-bit source, 16/32/64 destination */
254a9f12690SJung-uk Kim 
255a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_16(d, s)        ACPI_MOVE_16_TO_16(d, s)    /* Truncate to 16 */
256a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_32(d, s)        *(UINT32 *)(void *)(d) = *(UINT32 *)(void *)(s)
257a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_64(d, s)        *(UINT64 *)(void *)(d) = *(UINT32 *)(void *)(s)
258a9f12690SJung-uk Kim 
259a9f12690SJung-uk Kim /* 64-bit source, 16/32/64 destination */
260a9f12690SJung-uk Kim 
261a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_16(d, s)        ACPI_MOVE_16_TO_16(d, s)    /* Truncate to 16 */
262a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_32(d, s)        ACPI_MOVE_32_TO_32(d, s)    /* Truncate to 32 */
263a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_64(d, s)        *(UINT64 *)(void *)(d) = *(UINT64 *)(void *)(s)
264a9f12690SJung-uk Kim 
265a9f12690SJung-uk Kim #else
266a9f12690SJung-uk Kim /*
267a9f12690SJung-uk Kim  * The hardware does not support unaligned transfers. We must move the
268a9f12690SJung-uk Kim  * data one byte at a time. These macros work whether the source or
269a9f12690SJung-uk Kim  * the destination (or both) is/are unaligned. (Little-endian move)
270a9f12690SJung-uk Kim  */
271a9f12690SJung-uk Kim 
272a9f12690SJung-uk Kim /* 16-bit source, 16/32/64 destination */
273a9f12690SJung-uk Kim 
274a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_16(d, s)        {((  UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[0];\
275a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[1];}
276a9f12690SJung-uk Kim 
277a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_32(d, s)        {(*(UINT32 *)(void *)(d)) = 0; ACPI_MOVE_16_TO_16(d, s);}
278a9f12690SJung-uk Kim #define ACPI_MOVE_16_TO_64(d, s)        {(*(UINT64 *)(void *)(d)) = 0; ACPI_MOVE_16_TO_16(d, s);}
279a9f12690SJung-uk Kim 
280a9f12690SJung-uk Kim /* 32-bit source, 16/32/64 destination */
281a9f12690SJung-uk Kim 
282a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_16(d, s)        ACPI_MOVE_16_TO_16(d, s)    /* Truncate to 16 */
283a9f12690SJung-uk Kim 
284a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_32(d, s)        {((  UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[0];\
285a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[1];\
286a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[2];\
287a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[3];}
288a9f12690SJung-uk Kim 
289a9f12690SJung-uk Kim #define ACPI_MOVE_32_TO_64(d, s)        {(*(UINT64 *)(void *)(d)) = 0; ACPI_MOVE_32_TO_32(d, s);}
290a9f12690SJung-uk Kim 
291a9f12690SJung-uk Kim /* 64-bit source, 16/32/64 destination */
292a9f12690SJung-uk Kim 
293a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_16(d, s)        ACPI_MOVE_16_TO_16(d, s)    /* Truncate to 16 */
294a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_32(d, s)        ACPI_MOVE_32_TO_32(d, s)    /* Truncate to 32 */
295a9f12690SJung-uk Kim #define ACPI_MOVE_64_TO_64(d, s)        {((  UINT8 *)(void *)(d))[0] = ((UINT8 *)(void *)(s))[0];\
296a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[1] = ((UINT8 *)(void *)(s))[1];\
297a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[2] = ((UINT8 *)(void *)(s))[2];\
298a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[3] = ((UINT8 *)(void *)(s))[3];\
299a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[4] = ((UINT8 *)(void *)(s))[4];\
300a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[5] = ((UINT8 *)(void *)(s))[5];\
301a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[6] = ((UINT8 *)(void *)(s))[6];\
302a9f12690SJung-uk Kim                                          ((  UINT8 *)(void *)(d))[7] = ((UINT8 *)(void *)(s))[7];}
303a9f12690SJung-uk Kim #endif
304a9f12690SJung-uk Kim #endif
305a9f12690SJung-uk Kim 
306a9f12690SJung-uk Kim 
307a9f12690SJung-uk Kim /*
308a9f12690SJung-uk Kim  * Fast power-of-two math macros for non-optimized compilers
309a9f12690SJung-uk Kim  */
310a9f12690SJung-uk Kim #define _ACPI_DIV(value, PowerOf2)      ((UINT32) ((value) >> (PowerOf2)))
311a9f12690SJung-uk Kim #define _ACPI_MUL(value, PowerOf2)      ((UINT32) ((value) << (PowerOf2)))
312a9f12690SJung-uk Kim #define _ACPI_MOD(value, Divisor)       ((UINT32) ((value) & ((Divisor) -1)))
313a9f12690SJung-uk Kim 
314a9f12690SJung-uk Kim #define ACPI_DIV_2(a)                   _ACPI_DIV(a, 1)
315a9f12690SJung-uk Kim #define ACPI_MUL_2(a)                   _ACPI_MUL(a, 1)
316a9f12690SJung-uk Kim #define ACPI_MOD_2(a)                   _ACPI_MOD(a, 2)
317a9f12690SJung-uk Kim 
318a9f12690SJung-uk Kim #define ACPI_DIV_4(a)                   _ACPI_DIV(a, 2)
319a9f12690SJung-uk Kim #define ACPI_MUL_4(a)                   _ACPI_MUL(a, 2)
320a9f12690SJung-uk Kim #define ACPI_MOD_4(a)                   _ACPI_MOD(a, 4)
321a9f12690SJung-uk Kim 
322a9f12690SJung-uk Kim #define ACPI_DIV_8(a)                   _ACPI_DIV(a, 3)
323a9f12690SJung-uk Kim #define ACPI_MUL_8(a)                   _ACPI_MUL(a, 3)
324a9f12690SJung-uk Kim #define ACPI_MOD_8(a)                   _ACPI_MOD(a, 8)
325a9f12690SJung-uk Kim 
326a9f12690SJung-uk Kim #define ACPI_DIV_16(a)                  _ACPI_DIV(a, 4)
327a9f12690SJung-uk Kim #define ACPI_MUL_16(a)                  _ACPI_MUL(a, 4)
328a9f12690SJung-uk Kim #define ACPI_MOD_16(a)                  _ACPI_MOD(a, 16)
329a9f12690SJung-uk Kim 
330a9f12690SJung-uk Kim #define ACPI_DIV_32(a)                  _ACPI_DIV(a, 5)
331a9f12690SJung-uk Kim #define ACPI_MUL_32(a)                  _ACPI_MUL(a, 5)
332a9f12690SJung-uk Kim #define ACPI_MOD_32(a)                  _ACPI_MOD(a, 32)
333a9f12690SJung-uk Kim 
334fe0f0bbbSJung-uk Kim /* Test for ASCII character */
335fe0f0bbbSJung-uk Kim 
336fe0f0bbbSJung-uk Kim #define ACPI_IS_ASCII(c)                ((c) < 0x80)
337fe0f0bbbSJung-uk Kim 
338fe0f0bbbSJung-uk Kim /* Signed integers */
339fe0f0bbbSJung-uk Kim 
340fe0f0bbbSJung-uk Kim #define ACPI_SIGN_POSITIVE              0
341fe0f0bbbSJung-uk Kim #define ACPI_SIGN_NEGATIVE              1
342fe0f0bbbSJung-uk Kim 
343fe0f0bbbSJung-uk Kim 
344a9f12690SJung-uk Kim /*
345a9f12690SJung-uk Kim  * Rounding macros (Power of two boundaries only)
346a9f12690SJung-uk Kim  */
347a9f12690SJung-uk Kim #define ACPI_ROUND_DOWN(value, boundary)    (((ACPI_SIZE)(value)) & \
348a9f12690SJung-uk Kim                                                 (~(((ACPI_SIZE) boundary)-1)))
349a9f12690SJung-uk Kim 
350a9f12690SJung-uk Kim #define ACPI_ROUND_UP(value, boundary)      ((((ACPI_SIZE)(value)) + \
351a9f12690SJung-uk Kim                                                 (((ACPI_SIZE) boundary)-1)) & \
352a9f12690SJung-uk Kim                                                 (~(((ACPI_SIZE) boundary)-1)))
353a9f12690SJung-uk Kim 
354a9f12690SJung-uk Kim /* Note: sizeof(ACPI_SIZE) evaluates to either 4 or 8 (32- vs 64-bit mode) */
355a9f12690SJung-uk Kim 
356a9f12690SJung-uk Kim #define ACPI_ROUND_DOWN_TO_32BIT(a)         ACPI_ROUND_DOWN(a, 4)
357a9f12690SJung-uk Kim #define ACPI_ROUND_DOWN_TO_64BIT(a)         ACPI_ROUND_DOWN(a, 8)
358a9f12690SJung-uk Kim #define ACPI_ROUND_DOWN_TO_NATIVE_WORD(a)   ACPI_ROUND_DOWN(a, sizeof(ACPI_SIZE))
359a9f12690SJung-uk Kim 
360a9f12690SJung-uk Kim #define ACPI_ROUND_UP_TO_32BIT(a)           ACPI_ROUND_UP(a, 4)
361a9f12690SJung-uk Kim #define ACPI_ROUND_UP_TO_64BIT(a)           ACPI_ROUND_UP(a, 8)
362a9f12690SJung-uk Kim #define ACPI_ROUND_UP_TO_NATIVE_WORD(a)     ACPI_ROUND_UP(a, sizeof(ACPI_SIZE))
363a9f12690SJung-uk Kim 
364a9f12690SJung-uk Kim #define ACPI_ROUND_BITS_UP_TO_BYTES(a)      ACPI_DIV_8((a) + 7)
365a9f12690SJung-uk Kim #define ACPI_ROUND_BITS_DOWN_TO_BYTES(a)    ACPI_DIV_8((a))
366a9f12690SJung-uk Kim 
367a9f12690SJung-uk Kim #define ACPI_ROUND_UP_TO_1K(a)              (((a) + 1023) >> 10)
368a9f12690SJung-uk Kim 
369a9f12690SJung-uk Kim /* Generic (non-power-of-two) rounding */
370a9f12690SJung-uk Kim 
371a9f12690SJung-uk Kim #define ACPI_ROUND_UP_TO(value, boundary)   (((value) + ((boundary)-1)) / (boundary))
372a9f12690SJung-uk Kim 
373a9f12690SJung-uk Kim #define ACPI_IS_MISALIGNED(value)           (((ACPI_SIZE) value) & (sizeof(ACPI_SIZE)-1))
374a9f12690SJung-uk Kim 
37528482948SJung-uk Kim /* Generic bit manipulation */
37628482948SJung-uk Kim 
37728482948SJung-uk Kim #ifndef ACPI_USE_NATIVE_BIT_FINDER
37828482948SJung-uk Kim 
37928482948SJung-uk Kim #define __ACPI_FIND_LAST_BIT_2(a, r)        ((((UINT8)  (a)) & 0x02) ? (r)+1 : (r))
38028482948SJung-uk Kim #define __ACPI_FIND_LAST_BIT_4(a, r)        ((((UINT8)  (a)) & 0x0C) ? \
38128482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_2  ((a)>>2,  (r)+2) : \
38228482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_2  ((a), (r)))
38328482948SJung-uk Kim #define __ACPI_FIND_LAST_BIT_8(a, r)        ((((UINT8)  (a)) & 0xF0) ? \
38428482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_4  ((a)>>4,  (r)+4) : \
38528482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_4  ((a), (r)))
38628482948SJung-uk Kim #define __ACPI_FIND_LAST_BIT_16(a, r)       ((((UINT16) (a)) & 0xFF00) ? \
38728482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_8  ((a)>>8,  (r)+8) : \
38828482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_8  ((a), (r)))
38928482948SJung-uk Kim #define __ACPI_FIND_LAST_BIT_32(a, r)       ((((UINT32) (a)) & 0xFFFF0000) ? \
39028482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_16 ((a)>>16, (r)+16) : \
39128482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_16 ((a), (r)))
39228482948SJung-uk Kim #define __ACPI_FIND_LAST_BIT_64(a, r)       ((((UINT64) (a)) & 0xFFFFFFFF00000000) ? \
39328482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_32 ((a)>>32, (r)+32) : \
39428482948SJung-uk Kim                                              __ACPI_FIND_LAST_BIT_32 ((a), (r)))
39528482948SJung-uk Kim 
39628482948SJung-uk Kim #define ACPI_FIND_LAST_BIT_8(a)             ((a) ? __ACPI_FIND_LAST_BIT_8 (a, 1) : 0)
39728482948SJung-uk Kim #define ACPI_FIND_LAST_BIT_16(a)            ((a) ? __ACPI_FIND_LAST_BIT_16 (a, 1) : 0)
39828482948SJung-uk Kim #define ACPI_FIND_LAST_BIT_32(a)            ((a) ? __ACPI_FIND_LAST_BIT_32 (a, 1) : 0)
39928482948SJung-uk Kim #define ACPI_FIND_LAST_BIT_64(a)            ((a) ? __ACPI_FIND_LAST_BIT_64 (a, 1) : 0)
40028482948SJung-uk Kim 
40128482948SJung-uk Kim #define __ACPI_FIND_FIRST_BIT_2(a, r)       ((((UINT8) (a)) & 0x01) ? (r) : (r)+1)
40228482948SJung-uk Kim #define __ACPI_FIND_FIRST_BIT_4(a, r)       ((((UINT8) (a)) & 0x03) ? \
40328482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_2  ((a), (r)) : \
40428482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_2  ((a)>>2, (r)+2))
40528482948SJung-uk Kim #define __ACPI_FIND_FIRST_BIT_8(a, r)       ((((UINT8) (a)) & 0x0F) ? \
40628482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_4  ((a), (r)) : \
40728482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_4  ((a)>>4, (r)+4))
40828482948SJung-uk Kim #define __ACPI_FIND_FIRST_BIT_16(a, r)      ((((UINT16) (a)) & 0x00FF) ? \
40928482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_8  ((a), (r)) : \
41028482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_8  ((a)>>8, (r)+8))
41128482948SJung-uk Kim #define __ACPI_FIND_FIRST_BIT_32(a, r)      ((((UINT32) (a)) & 0x0000FFFF) ? \
41228482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_16 ((a), (r)) : \
41328482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_16 ((a)>>16, (r)+16))
41428482948SJung-uk Kim #define __ACPI_FIND_FIRST_BIT_64(a, r)      ((((UINT64) (a)) & 0x00000000FFFFFFFF) ? \
41528482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_32 ((a), (r)) : \
41628482948SJung-uk Kim                                              __ACPI_FIND_FIRST_BIT_32 ((a)>>32, (r)+32))
41728482948SJung-uk Kim 
41828482948SJung-uk Kim #define ACPI_FIND_FIRST_BIT_8(a)            ((a) ? __ACPI_FIND_FIRST_BIT_8 (a, 1) : 0)
41928482948SJung-uk Kim #define ACPI_FIND_FIRST_BIT_16(a)           ((a) ? __ACPI_FIND_FIRST_BIT_16 (a, 1) : 0)
42028482948SJung-uk Kim #define ACPI_FIND_FIRST_BIT_32(a)           ((a) ? __ACPI_FIND_FIRST_BIT_32 (a, 1) : 0)
42128482948SJung-uk Kim #define ACPI_FIND_FIRST_BIT_64(a)           ((a) ? __ACPI_FIND_FIRST_BIT_64 (a, 1) : 0)
42228482948SJung-uk Kim 
42328482948SJung-uk Kim #endif /* ACPI_USE_NATIVE_BIT_FINDER */
42428482948SJung-uk Kim 
42528482948SJung-uk Kim /* Generic (power-of-two) rounding */
42628482948SJung-uk Kim 
42728482948SJung-uk Kim #define ACPI_ROUND_UP_POWER_OF_TWO_8(a)     ((UINT8) \
42828482948SJung-uk Kim                                             (((UINT16) 1) <<  ACPI_FIND_LAST_BIT_8  ((a)  - 1)))
42928482948SJung-uk Kim #define ACPI_ROUND_DOWN_POWER_OF_TWO_8(a)   ((UINT8) \
43028482948SJung-uk Kim                                             (((UINT16) 1) << (ACPI_FIND_LAST_BIT_8  ((a)) - 1)))
43128482948SJung-uk Kim #define ACPI_ROUND_UP_POWER_OF_TWO_16(a)    ((UINT16) \
43228482948SJung-uk Kim                                             (((UINT32) 1) <<  ACPI_FIND_LAST_BIT_16 ((a)  - 1)))
43328482948SJung-uk Kim #define ACPI_ROUND_DOWN_POWER_OF_TWO_16(a)  ((UINT16) \
43428482948SJung-uk Kim                                             (((UINT32) 1) << (ACPI_FIND_LAST_BIT_16 ((a)) - 1)))
43528482948SJung-uk Kim #define ACPI_ROUND_UP_POWER_OF_TWO_32(a)    ((UINT32) \
43628482948SJung-uk Kim                                             (((UINT64) 1) <<  ACPI_FIND_LAST_BIT_32 ((a)  - 1)))
43728482948SJung-uk Kim #define ACPI_ROUND_DOWN_POWER_OF_TWO_32(a)  ((UINT32) \
43828482948SJung-uk Kim                                             (((UINT64) 1) << (ACPI_FIND_LAST_BIT_32 ((a)) - 1)))
43928482948SJung-uk Kim #define ACPI_IS_ALIGNED(a, s)               (((a) & ((s) - 1)) == 0)
44028482948SJung-uk Kim #define ACPI_IS_POWER_OF_TWO(a)             ACPI_IS_ALIGNED(a, a)
44128482948SJung-uk Kim 
442a9f12690SJung-uk Kim /*
443a9f12690SJung-uk Kim  * Bitmask creation
444a9f12690SJung-uk Kim  * Bit positions start at zero.
445a9f12690SJung-uk Kim  * MASK_BITS_ABOVE creates a mask starting AT the position and above
446a9f12690SJung-uk Kim  * MASK_BITS_BELOW creates a mask starting one bit BELOW the position
44728482948SJung-uk Kim  * MASK_BITS_ABOVE/BELOW accepts a bit offset to create a mask
44828482948SJung-uk Kim  * MASK_BITS_ABOVE/BELOW_32/64 accepts a bit width to create a mask
44928482948SJung-uk Kim  * Note: The ACPI_INTEGER_BIT_SIZE check is used to bypass compiler
45028482948SJung-uk Kim  * differences with the shift operator
451a9f12690SJung-uk Kim  */
4529a179dd8SJung-uk Kim #define ACPI_MASK_BITS_ABOVE(position)      (~((ACPI_UINT64_MAX) << ((UINT32) (position))))
4539a179dd8SJung-uk Kim #define ACPI_MASK_BITS_BELOW(position)      ((ACPI_UINT64_MAX) << ((UINT32) (position)))
45428482948SJung-uk Kim #define ACPI_MASK_BITS_ABOVE_32(width)      ((UINT32) ACPI_MASK_BITS_ABOVE(width))
45528482948SJung-uk Kim #define ACPI_MASK_BITS_BELOW_32(width)      ((UINT32) ACPI_MASK_BITS_BELOW(width))
45628482948SJung-uk Kim #define ACPI_MASK_BITS_ABOVE_64(width)      ((width) == ACPI_INTEGER_BIT_SIZE ? \
45728482948SJung-uk Kim                                                 ACPI_UINT64_MAX : \
45828482948SJung-uk Kim                                                 ACPI_MASK_BITS_ABOVE(width))
45928482948SJung-uk Kim #define ACPI_MASK_BITS_BELOW_64(width)      ((width) == ACPI_INTEGER_BIT_SIZE ? \
46028482948SJung-uk Kim                                                 (UINT64) 0 : \
46128482948SJung-uk Kim                                                 ACPI_MASK_BITS_BELOW(width))
462a9f12690SJung-uk Kim 
463a9f12690SJung-uk Kim /* Bitfields within ACPI registers */
464a9f12690SJung-uk Kim 
4651df130f1SJung-uk Kim #define ACPI_REGISTER_PREPARE_BITS(Val, Pos, Mask) \
4661df130f1SJung-uk Kim     ((Val << Pos) & Mask)
467a9f12690SJung-uk Kim 
4681df130f1SJung-uk Kim #define ACPI_REGISTER_INSERT_VALUE(Reg, Pos, Mask, Val) \
4691df130f1SJung-uk Kim     Reg = (Reg & (~(Mask))) | ACPI_REGISTER_PREPARE_BITS(Val, Pos, Mask)
4701df130f1SJung-uk Kim 
4711df130f1SJung-uk Kim #define ACPI_INSERT_BITS(Target, Mask, Source) \
4721df130f1SJung-uk Kim     Target = ((Target & (~(Mask))) | (Source & Mask))
4731df130f1SJung-uk Kim 
4741df130f1SJung-uk Kim /* Generic bitfield macros and masks */
4751df130f1SJung-uk Kim 
4761df130f1SJung-uk Kim #define ACPI_GET_BITS(SourcePtr, Position, Mask) \
477f8146b88SJung-uk Kim     ((*(SourcePtr) >> (Position)) & (Mask))
4781df130f1SJung-uk Kim 
4791df130f1SJung-uk Kim #define ACPI_SET_BITS(TargetPtr, Position, Mask, Value) \
480f8146b88SJung-uk Kim     (*(TargetPtr) |= (((Value) & (Mask)) << (Position)))
4811df130f1SJung-uk Kim 
4821df130f1SJung-uk Kim #define ACPI_1BIT_MASK      0x00000001
4831df130f1SJung-uk Kim #define ACPI_2BIT_MASK      0x00000003
4841df130f1SJung-uk Kim #define ACPI_3BIT_MASK      0x00000007
4851df130f1SJung-uk Kim #define ACPI_4BIT_MASK      0x0000000F
4861df130f1SJung-uk Kim #define ACPI_5BIT_MASK      0x0000001F
4871df130f1SJung-uk Kim #define ACPI_6BIT_MASK      0x0000003F
4881df130f1SJung-uk Kim #define ACPI_7BIT_MASK      0x0000007F
4891df130f1SJung-uk Kim #define ACPI_8BIT_MASK      0x000000FF
4901df130f1SJung-uk Kim #define ACPI_16BIT_MASK     0x0000FFFF
4911df130f1SJung-uk Kim #define ACPI_24BIT_MASK     0x00FFFFFF
492a9f12690SJung-uk Kim 
493ed17e06eSJung-uk Kim /* Macros to extract flag bits from position zero */
494ed17e06eSJung-uk Kim 
495ed17e06eSJung-uk Kim #define ACPI_GET_1BIT_FLAG(Value)                   ((Value) & ACPI_1BIT_MASK)
496ed17e06eSJung-uk Kim #define ACPI_GET_2BIT_FLAG(Value)                   ((Value) & ACPI_2BIT_MASK)
497ed17e06eSJung-uk Kim #define ACPI_GET_3BIT_FLAG(Value)                   ((Value) & ACPI_3BIT_MASK)
498ed17e06eSJung-uk Kim #define ACPI_GET_4BIT_FLAG(Value)                   ((Value) & ACPI_4BIT_MASK)
499ed17e06eSJung-uk Kim 
500ed17e06eSJung-uk Kim /* Macros to extract flag bits from position one and above */
501ed17e06eSJung-uk Kim 
502ed17e06eSJung-uk Kim #define ACPI_EXTRACT_1BIT_FLAG(Field, Position)     (ACPI_GET_1BIT_FLAG ((Field) >> Position))
503ed17e06eSJung-uk Kim #define ACPI_EXTRACT_2BIT_FLAG(Field, Position)     (ACPI_GET_2BIT_FLAG ((Field) >> Position))
504ed17e06eSJung-uk Kim #define ACPI_EXTRACT_3BIT_FLAG(Field, Position)     (ACPI_GET_3BIT_FLAG ((Field) >> Position))
505ed17e06eSJung-uk Kim #define ACPI_EXTRACT_4BIT_FLAG(Field, Position)     (ACPI_GET_4BIT_FLAG ((Field) >> Position))
506ed17e06eSJung-uk Kim 
507efcc2a30SJung-uk Kim /* ACPI Pathname helpers */
508efcc2a30SJung-uk Kim 
509efcc2a30SJung-uk Kim #define ACPI_IS_ROOT_PREFIX(c)      ((c) == (UINT8) 0x5C) /* Backslash */
510efcc2a30SJung-uk Kim #define ACPI_IS_PARENT_PREFIX(c)    ((c) == (UINT8) 0x5E) /* Carat */
511efcc2a30SJung-uk Kim #define ACPI_IS_PATH_SEPARATOR(c)   ((c) == (UINT8) 0x2E) /* Period (dot) */
512efcc2a30SJung-uk Kim 
513a9f12690SJung-uk Kim /*
514e8241eabSJung-uk Kim  * An object of type ACPI_NAMESPACE_NODE can appear in some contexts
515e8241eabSJung-uk Kim  * where a pointer to an object of type ACPI_OPERAND_OBJECT can also
516a9f12690SJung-uk Kim  * appear. This macro is used to distinguish them.
517a9f12690SJung-uk Kim  *
5186f4860fcSJung-uk Kim  * The "DescriptorType" field is the second field in both structures.
519a9f12690SJung-uk Kim  */
5206f4860fcSJung-uk Kim #define ACPI_GET_DESCRIPTOR_PTR(d)      (((ACPI_DESCRIPTOR *)(void *)(d))->Common.CommonPointer)
5216f4860fcSJung-uk Kim #define ACPI_SET_DESCRIPTOR_PTR(d, p)   (((ACPI_DESCRIPTOR *)(void *)(d))->Common.CommonPointer = (p))
522a9f12690SJung-uk Kim #define ACPI_GET_DESCRIPTOR_TYPE(d)     (((ACPI_DESCRIPTOR *)(void *)(d))->Common.DescriptorType)
5236f4860fcSJung-uk Kim #define ACPI_SET_DESCRIPTOR_TYPE(d, t)  (((ACPI_DESCRIPTOR *)(void *)(d))->Common.DescriptorType = (t))
524a9f12690SJung-uk Kim 
525a9f12690SJung-uk Kim /*
526a9f12690SJung-uk Kim  * Macros for the master AML opcode table
527a9f12690SJung-uk Kim  */
528a9f12690SJung-uk Kim #if defined (ACPI_DISASSEMBLER) || defined (ACPI_DEBUG_OUTPUT)
529a9f12690SJung-uk Kim #define ACPI_OP(Name, PArgs, IArgs, ObjType, Class, Type, Flags) \
530a9f12690SJung-uk Kim     {Name, (UINT32)(PArgs), (UINT32)(IArgs), (UINT32)(Flags), ObjType, Class, Type}
531a9f12690SJung-uk Kim #else
532a9f12690SJung-uk Kim #define ACPI_OP(Name, PArgs, IArgs, ObjType, Class, Type, Flags) \
533a9f12690SJung-uk Kim     {(UINT32)(PArgs), (UINT32)(IArgs), (UINT32)(Flags), ObjType, Class, Type}
534a9f12690SJung-uk Kim #endif
535a9f12690SJung-uk Kim 
536a9f12690SJung-uk Kim #define ARG_TYPE_WIDTH                  5
537a9f12690SJung-uk Kim #define ARG_1(x)                        ((UINT32)(x))
538a9f12690SJung-uk Kim #define ARG_2(x)                        ((UINT32)(x) << (1 * ARG_TYPE_WIDTH))
539a9f12690SJung-uk Kim #define ARG_3(x)                        ((UINT32)(x) << (2 * ARG_TYPE_WIDTH))
540a9f12690SJung-uk Kim #define ARG_4(x)                        ((UINT32)(x) << (3 * ARG_TYPE_WIDTH))
541a9f12690SJung-uk Kim #define ARG_5(x)                        ((UINT32)(x) << (4 * ARG_TYPE_WIDTH))
542a9f12690SJung-uk Kim #define ARG_6(x)                        ((UINT32)(x) << (5 * ARG_TYPE_WIDTH))
543a9f12690SJung-uk Kim 
544a9f12690SJung-uk Kim #define ARGI_LIST1(a)                   (ARG_1(a))
545a9f12690SJung-uk Kim #define ARGI_LIST2(a, b)                (ARG_1(b)|ARG_2(a))
546a9f12690SJung-uk Kim #define ARGI_LIST3(a, b, c)             (ARG_1(c)|ARG_2(b)|ARG_3(a))
547a9f12690SJung-uk Kim #define ARGI_LIST4(a, b, c, d)          (ARG_1(d)|ARG_2(c)|ARG_3(b)|ARG_4(a))
548a9f12690SJung-uk Kim #define ARGI_LIST5(a, b, c, d, e)       (ARG_1(e)|ARG_2(d)|ARG_3(c)|ARG_4(b)|ARG_5(a))
549a9f12690SJung-uk Kim #define ARGI_LIST6(a, b, c, d, e, f)    (ARG_1(f)|ARG_2(e)|ARG_3(d)|ARG_4(c)|ARG_5(b)|ARG_6(a))
550a9f12690SJung-uk Kim 
551a9f12690SJung-uk Kim #define ARGP_LIST1(a)                   (ARG_1(a))
552a9f12690SJung-uk Kim #define ARGP_LIST2(a, b)                (ARG_1(a)|ARG_2(b))
553a9f12690SJung-uk Kim #define ARGP_LIST3(a, b, c)             (ARG_1(a)|ARG_2(b)|ARG_3(c))
554a9f12690SJung-uk Kim #define ARGP_LIST4(a, b, c, d)          (ARG_1(a)|ARG_2(b)|ARG_3(c)|ARG_4(d))
555a9f12690SJung-uk Kim #define ARGP_LIST5(a, b, c, d, e)       (ARG_1(a)|ARG_2(b)|ARG_3(c)|ARG_4(d)|ARG_5(e))
556a9f12690SJung-uk Kim #define ARGP_LIST6(a, b, c, d, e, f)    (ARG_1(a)|ARG_2(b)|ARG_3(c)|ARG_4(d)|ARG_5(e)|ARG_6(f))
557a9f12690SJung-uk Kim 
558a9f12690SJung-uk Kim #define GET_CURRENT_ARG_TYPE(List)      (List & ((UINT32) 0x1F))
559a9f12690SJung-uk Kim #define INCREMENT_ARG_LIST(List)        (List >>= ((UINT32) ARG_TYPE_WIDTH))
560a9f12690SJung-uk Kim 
561a9f12690SJung-uk Kim /*
562a9f12690SJung-uk Kim  * Ascii error messages can be configured out
563a9f12690SJung-uk Kim  */
564a9f12690SJung-uk Kim #ifndef ACPI_NO_ERROR_MESSAGES
565a9f12690SJung-uk Kim /*
56628482948SJung-uk Kim  * Error reporting. The callers module and line number are inserted by AE_INFO,
567a9f12690SJung-uk Kim  * the plist contains a set of parens to allow variable-length lists.
568a9f12690SJung-uk Kim  * These macros are used for both the debug and non-debug versions of the code.
569a9f12690SJung-uk Kim  */
570b7b7e711SJung-uk Kim #define ACPI_ERROR_NAMESPACE(s, p, e)       AcpiUtPrefixedNamespaceError (AE_INFO, s, p, e);
57142fecd12SJung-uk Kim #define ACPI_ERROR_METHOD(s, n, p, e)       AcpiUtMethodError (AE_INFO, s, n, p, e);
572d6dd1baeSJung-uk Kim #define ACPI_WARN_PREDEFINED(plist)         AcpiUtPredefinedWarning plist
5732272d050SJung-uk Kim #define ACPI_INFO_PREDEFINED(plist)         AcpiUtPredefinedInfo plist
574895f26a9SJung-uk Kim #define ACPI_BIOS_ERROR_PREDEFINED(plist)   AcpiUtPredefinedBiosError plist
5758438a7a8SJung-uk Kim #define ACPI_ERROR_ONLY(s)                  s
576a9f12690SJung-uk Kim 
577a9f12690SJung-uk Kim #else
578a9f12690SJung-uk Kim 
579a9f12690SJung-uk Kim /* No error messages */
580a9f12690SJung-uk Kim 
5818438a7a8SJung-uk Kim #define ACPI_ERROR_NAMESPACE(s, p, e)
582a9f12690SJung-uk Kim #define ACPI_ERROR_METHOD(s, n, p, e)
583d6dd1baeSJung-uk Kim #define ACPI_WARN_PREDEFINED(plist)
5842272d050SJung-uk Kim #define ACPI_INFO_PREDEFINED(plist)
585895f26a9SJung-uk Kim #define ACPI_BIOS_ERROR_PREDEFINED(plist)
5868438a7a8SJung-uk Kim #define ACPI_ERROR_ONLY(s)
587a9f12690SJung-uk Kim 
588a9f12690SJung-uk Kim #endif /* ACPI_NO_ERROR_MESSAGES */
589a9f12690SJung-uk Kim 
590a159c266SJung-uk Kim #if (!ACPI_REDUCED_HARDWARE)
591a159c266SJung-uk Kim #define ACPI_HW_OPTIONAL_FUNCTION(addr)     addr
592a159c266SJung-uk Kim #else
593a159c266SJung-uk Kim #define ACPI_HW_OPTIONAL_FUNCTION(addr)     NULL
594a159c266SJung-uk Kim #endif
595a159c266SJung-uk Kim 
596a159c266SJung-uk Kim 
597a9f12690SJung-uk Kim /*
598a9f12690SJung-uk Kim  * Macros used for ACPICA utilities only
599a9f12690SJung-uk Kim  */
600a9f12690SJung-uk Kim 
601a9f12690SJung-uk Kim /* Generate a UUID */
602a9f12690SJung-uk Kim 
603a9f12690SJung-uk Kim #define ACPI_INIT_UUID(a, b, c, d0, d1, d2, d3, d4, d5, d6, d7) \
604a9f12690SJung-uk Kim     (a) & 0xFF, ((a) >> 8) & 0xFF, ((a) >> 16) & 0xFF, ((a) >> 24) & 0xFF, \
605a9f12690SJung-uk Kim     (b) & 0xFF, ((b) >> 8) & 0xFF, \
606a9f12690SJung-uk Kim     (c) & 0xFF, ((c) >> 8) & 0xFF, \
607a9f12690SJung-uk Kim     (d0), (d1), (d2), (d3), (d4), (d5), (d6), (d7)
608a9f12690SJung-uk Kim 
609a9f12690SJung-uk Kim #define ACPI_IS_OCTAL_DIGIT(d)              (((char)(d) >= '0') && ((char)(d) <= '7'))
610a9f12690SJung-uk Kim 
611a9f12690SJung-uk Kim 
6120d84335fSJung-uk Kim /*
613cd6518c7SJung-uk Kim  * Macros used for the ASL-/ASL+ converter utility
6140d84335fSJung-uk Kim  */
6150d84335fSJung-uk Kim #ifdef ACPI_ASL_COMPILER
6160d84335fSJung-uk Kim 
6170d84335fSJung-uk Kim #define ASL_CV_LABEL_FILENODE(a)         CvLabelFileNode(a);
6180d84335fSJung-uk Kim #define ASL_CV_CAPTURE_COMMENTS_ONLY(a)   CvCaptureCommentsOnly (a);
6190d84335fSJung-uk Kim #define ASL_CV_CAPTURE_COMMENTS(a)       CvCaptureComments (a);
6200d84335fSJung-uk Kim #define ASL_CV_TRANSFER_COMMENTS(a)      CvTransferComments (a);
6210d84335fSJung-uk Kim #define ASL_CV_CLOSE_PAREN(a,b)          CvCloseParenWriteComment(a,b);
6220d84335fSJung-uk Kim #define ASL_CV_CLOSE_BRACE(a,b)          CvCloseBraceWriteComment(a,b);
6230d84335fSJung-uk Kim #define ASL_CV_SWITCH_FILES(a,b)         CvSwitchFiles(a,b);
6240d84335fSJung-uk Kim #define ASL_CV_CLEAR_OP_COMMENTS(a)       CvClearOpComments(a);
6250d84335fSJung-uk Kim #define ASL_CV_PRINT_ONE_COMMENT(a,b,c,d) CvPrintOneCommentType (a,b,c,d);
6260d84335fSJung-uk Kim #define ASL_CV_PRINT_ONE_COMMENT_LIST(a,b) CvPrintOneCommentList (a,b);
6270d84335fSJung-uk Kim #define ASL_CV_FILE_HAS_SWITCHED(a)       CvFileHasSwitched(a)
628ec0234b4SJung-uk Kim #define ASL_CV_INIT_FILETREE(a,b)      CvInitFileTree(a,b);
6290d84335fSJung-uk Kim 
6300d84335fSJung-uk Kim #else
6310d84335fSJung-uk Kim 
6320d84335fSJung-uk Kim #define ASL_CV_LABEL_FILENODE(a)
6330d84335fSJung-uk Kim #define ASL_CV_CAPTURE_COMMENTS_ONLY(a)
6340d84335fSJung-uk Kim #define ASL_CV_CAPTURE_COMMENTS(a)
6350d84335fSJung-uk Kim #define ASL_CV_TRANSFER_COMMENTS(a)
6360d84335fSJung-uk Kim #define ASL_CV_CLOSE_PAREN(a,b)          AcpiOsPrintf (")");
6370d84335fSJung-uk Kim #define ASL_CV_CLOSE_BRACE(a,b)          AcpiOsPrintf ("}");
6380d84335fSJung-uk Kim #define ASL_CV_SWITCH_FILES(a,b)
6390d84335fSJung-uk Kim #define ASL_CV_CLEAR_OP_COMMENTS(a)
6400d84335fSJung-uk Kim #define ASL_CV_PRINT_ONE_COMMENT(a,b,c,d)
6410d84335fSJung-uk Kim #define ASL_CV_PRINT_ONE_COMMENT_LIST(a,b)
6420d84335fSJung-uk Kim #define ASL_CV_FILE_HAS_SWITCHED(a)       0
643ec0234b4SJung-uk Kim #define ASL_CV_INIT_FILETREE(a,b)
6440d84335fSJung-uk Kim 
6450d84335fSJung-uk Kim #endif
6460d84335fSJung-uk Kim 
647a9f12690SJung-uk Kim #endif /* ACMACROS_H */
648