2007-06-08 13:31:52 +02:00
|
|
|
/** @file
|
|
|
|
Processor or compiler specific defines and types for EBC.
|
|
|
|
|
2009-06-04 18:16:15 +02:00
|
|
|
We currently only have one EBC compiler so there may be some Intel compiler
|
2007-06-08 13:31:52 +02:00
|
|
|
specific functions in this file.
|
|
|
|
|
2018-06-27 15:11:33 +02:00
|
|
|
Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
|
2019-04-04 01:06:00 +02:00
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
2007-06-08 13:31:52 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#ifndef __PROCESSOR_BIND_H__
|
|
|
|
#define __PROCESSOR_BIND_H__
|
|
|
|
|
2008-08-14 04:53:43 +02:00
|
|
|
///
|
|
|
|
/// Define the processor type so other code can make processor based choices
|
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
#define MDE_CPU_EBC
|
|
|
|
|
|
|
|
//
|
|
|
|
// Native integer types
|
|
|
|
//
|
2008-12-08 00:10:08 +01:00
|
|
|
|
|
|
|
///
|
|
|
|
/// 1-byte signed value
|
|
|
|
///
|
2012-05-16 02:42:21 +02:00
|
|
|
typedef signed char INT8;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
|
|
|
/// Logical Boolean. 1-byte value containing 0 for FALSE or a 1 for TRUE. Other
|
|
|
|
/// values are undefined.
|
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef unsigned char BOOLEAN;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// 1-byte unsigned value.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef unsigned char UINT8;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// 1-byte Character.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2008-06-05 03:57:08 +02:00
|
|
|
typedef char CHAR8;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// 2-byte signed value.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef short INT16;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// 2-byte unsigned value.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef unsigned short UINT16;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
|
|
|
/// 2-byte Character. Unless otherwise specified all strings are stored in the
|
|
|
|
/// UTF-16 encoding format as defined by Unicode 2.1 and ISO/IEC 10646 standards.
|
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef unsigned short CHAR16;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// 4-byte signed value.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef int INT32;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// 4-byte unsigned value.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef unsigned int UINT32;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// 8-byte signed value.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef __int64 INT64;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// 8-byte unsigned value.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef unsigned __int64 UINT64;
|
|
|
|
|
2008-08-14 04:53:43 +02:00
|
|
|
///
|
2008-12-08 00:10:08 +01:00
|
|
|
/// Signed value of native width. (4 bytes on supported 32-bit processor instructions,
|
|
|
|
/// 8 bytes on supported 64-bit processor instructions)
|
2008-08-14 04:53:43 +02:00
|
|
|
/// "long" type scales to the processor native size with EBC compiler
|
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef long INTN;
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2010-03-12 23:19:12 +01:00
|
|
|
/// The unsigned value of native width. (4 bytes on supported 32-bit processor instructions;
|
2008-12-08 00:10:08 +01:00
|
|
|
/// 8 bytes on supported 64-bit processor instructions)
|
2010-03-12 23:19:12 +01:00
|
|
|
/// "long" type scales to the processor native size with the EBC compiler.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
typedef unsigned long UINTN;
|
|
|
|
|
2008-08-14 04:53:43 +02:00
|
|
|
///
|
2008-12-08 00:10:08 +01:00
|
|
|
/// A value of native width with the highest bit set.
|
2010-03-12 23:19:12 +01:00
|
|
|
/// Scalable macro to set the most significant bit in a natural number.
|
2008-08-14 04:53:43 +02:00
|
|
|
///
|
MdePkg/BaseSafeIntLib: Add SafeIntLib class and instance
https://bugzilla.tianocore.org/show_bug.cgi?id=798
SafeIntLib provides helper functions to prevent integer overflow
during type conversion, addition, subtraction, and multiplication.
Conversion Functions
====================
* Converting from a signed type to an unsigned type of the same
size, or vice-versa.
* Converting to a smaller type that could possibly overflow.
* Converting from a signed type to a larger unsigned type.
Unsigned Addition, Subtraction, Multiplication
===============================================
* Unsigned integer math functions protect from overflow and
underflow (in case of subtraction).
Signed Addition, Subtraction, Multiplication
============================================
* Strongly consider using unsigned numbers.
* Signed numbers are often used where unsigned numbers should
be used. For example file sizes and array indices should always
be unsigned. Subtracting a larger positive signed number from a
smaller positive signed number with SafeInt32Sub() will succeed,
producing a negative number, that then must not be used as an
array index (but can occasionally be used as a pointer index.)
Similarly for adding a larger magnitude negative number to a
smaller magnitude positive number.
* SafeIntLib does not protect you from such errors. It tells you
if your integer operations overflowed, not if you are doing the
right thing with your non-overflowed integers.
* Likewise you can overflow a buffer with a non-overflowed
unsigned index.
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
https://github.com/Microsoft/MS_UEFI/commit/21ef3a321c907b40fa93797619c9f6c686dd92e0
https://github.com/Microsoft/MS_UEFI/commit/ca516b1a61315c2d823f453e12d2135098f53d61
https://github.com/Microsoft/MS_UEFI/commit/33bab4031a417d7d5a7d356c15a14c2e60302b2d
Cc: Sean Brogan <sean.brogan@microsoft.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Liming Gao <liming.gao@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Reviewed-by: Sean Brogan <sean.brogan@microsoft.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>
2017-04-25 01:37:20 +02:00
|
|
|
#define MAX_BIT ((UINTN)((1ULL << (sizeof (INTN) * 8 - 1))))
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
|
|
|
/// A value of native width with the two highest bits set.
|
2010-03-12 23:19:12 +01:00
|
|
|
/// Scalable macro to set the most 2 significant bits in a natural number.
|
2008-12-08 00:10:08 +01:00
|
|
|
///
|
MdePkg/BaseSafeIntLib: Add SafeIntLib class and instance
https://bugzilla.tianocore.org/show_bug.cgi?id=798
SafeIntLib provides helper functions to prevent integer overflow
during type conversion, addition, subtraction, and multiplication.
Conversion Functions
====================
* Converting from a signed type to an unsigned type of the same
size, or vice-versa.
* Converting to a smaller type that could possibly overflow.
* Converting from a signed type to a larger unsigned type.
Unsigned Addition, Subtraction, Multiplication
===============================================
* Unsigned integer math functions protect from overflow and
underflow (in case of subtraction).
Signed Addition, Subtraction, Multiplication
============================================
* Strongly consider using unsigned numbers.
* Signed numbers are often used where unsigned numbers should
be used. For example file sizes and array indices should always
be unsigned. Subtracting a larger positive signed number from a
smaller positive signed number with SafeInt32Sub() will succeed,
producing a negative number, that then must not be used as an
array index (but can occasionally be used as a pointer index.)
Similarly for adding a larger magnitude negative number to a
smaller magnitude positive number.
* SafeIntLib does not protect you from such errors. It tells you
if your integer operations overflowed, not if you are doing the
right thing with your non-overflowed integers.
* Likewise you can overflow a buffer with a non-overflowed
unsigned index.
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
https://github.com/Microsoft/MS_UEFI/commit/21ef3a321c907b40fa93797619c9f6c686dd92e0
https://github.com/Microsoft/MS_UEFI/commit/ca516b1a61315c2d823f453e12d2135098f53d61
https://github.com/Microsoft/MS_UEFI/commit/33bab4031a417d7d5a7d356c15a14c2e60302b2d
Cc: Sean Brogan <sean.brogan@microsoft.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Liming Gao <liming.gao@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Reviewed-by: Sean Brogan <sean.brogan@microsoft.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>
2017-04-25 01:37:20 +02:00
|
|
|
#define MAX_2_BITS ((UINTN)(3ULL << (sizeof (INTN) * 8 - 2)))
|
2007-06-08 13:31:52 +02:00
|
|
|
|
2008-08-14 04:53:43 +02:00
|
|
|
///
|
|
|
|
/// Maximum legal EBC address
|
|
|
|
///
|
MdePkg/BaseSafeIntLib: Add SafeIntLib class and instance
https://bugzilla.tianocore.org/show_bug.cgi?id=798
SafeIntLib provides helper functions to prevent integer overflow
during type conversion, addition, subtraction, and multiplication.
Conversion Functions
====================
* Converting from a signed type to an unsigned type of the same
size, or vice-versa.
* Converting to a smaller type that could possibly overflow.
* Converting from a signed type to a larger unsigned type.
Unsigned Addition, Subtraction, Multiplication
===============================================
* Unsigned integer math functions protect from overflow and
underflow (in case of subtraction).
Signed Addition, Subtraction, Multiplication
============================================
* Strongly consider using unsigned numbers.
* Signed numbers are often used where unsigned numbers should
be used. For example file sizes and array indices should always
be unsigned. Subtracting a larger positive signed number from a
smaller positive signed number with SafeInt32Sub() will succeed,
producing a negative number, that then must not be used as an
array index (but can occasionally be used as a pointer index.)
Similarly for adding a larger magnitude negative number to a
smaller magnitude positive number.
* SafeIntLib does not protect you from such errors. It tells you
if your integer operations overflowed, not if you are doing the
right thing with your non-overflowed integers.
* Likewise you can overflow a buffer with a non-overflowed
unsigned index.
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
https://github.com/Microsoft/MS_UEFI/commit/21ef3a321c907b40fa93797619c9f6c686dd92e0
https://github.com/Microsoft/MS_UEFI/commit/ca516b1a61315c2d823f453e12d2135098f53d61
https://github.com/Microsoft/MS_UEFI/commit/33bab4031a417d7d5a7d356c15a14c2e60302b2d
Cc: Sean Brogan <sean.brogan@microsoft.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Liming Gao <liming.gao@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Reviewed-by: Sean Brogan <sean.brogan@microsoft.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>
2017-04-25 01:37:20 +02:00
|
|
|
#define MAX_ADDRESS ((UINTN)(~0ULL >> (64 - sizeof (INTN) * 8)))
|
2007-06-08 13:31:52 +02:00
|
|
|
|
2018-12-07 11:27:32 +01:00
|
|
|
///
|
|
|
|
/// Maximum usable address at boot time (48 bits using 4 KB pages)
|
|
|
|
///
|
|
|
|
#define MAX_ALLOC_ADDRESS MAX_ADDRESS
|
|
|
|
|
2013-08-13 10:45:45 +02:00
|
|
|
///
|
|
|
|
/// Maximum legal EBC INTN and UINTN values.
|
|
|
|
///
|
MdePkg/BaseSafeIntLib: Add SafeIntLib class and instance
https://bugzilla.tianocore.org/show_bug.cgi?id=798
SafeIntLib provides helper functions to prevent integer overflow
during type conversion, addition, subtraction, and multiplication.
Conversion Functions
====================
* Converting from a signed type to an unsigned type of the same
size, or vice-versa.
* Converting to a smaller type that could possibly overflow.
* Converting from a signed type to a larger unsigned type.
Unsigned Addition, Subtraction, Multiplication
===============================================
* Unsigned integer math functions protect from overflow and
underflow (in case of subtraction).
Signed Addition, Subtraction, Multiplication
============================================
* Strongly consider using unsigned numbers.
* Signed numbers are often used where unsigned numbers should
be used. For example file sizes and array indices should always
be unsigned. Subtracting a larger positive signed number from a
smaller positive signed number with SafeInt32Sub() will succeed,
producing a negative number, that then must not be used as an
array index (but can occasionally be used as a pointer index.)
Similarly for adding a larger magnitude negative number to a
smaller magnitude positive number.
* SafeIntLib does not protect you from such errors. It tells you
if your integer operations overflowed, not if you are doing the
right thing with your non-overflowed integers.
* Likewise you can overflow a buffer with a non-overflowed
unsigned index.
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
https://github.com/Microsoft/MS_UEFI/commit/21ef3a321c907b40fa93797619c9f6c686dd92e0
https://github.com/Microsoft/MS_UEFI/commit/ca516b1a61315c2d823f453e12d2135098f53d61
https://github.com/Microsoft/MS_UEFI/commit/33bab4031a417d7d5a7d356c15a14c2e60302b2d
Cc: Sean Brogan <sean.brogan@microsoft.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Liming Gao <liming.gao@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Reviewed-by: Sean Brogan <sean.brogan@microsoft.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>
2017-04-25 01:37:20 +02:00
|
|
|
#define MAX_UINTN ((UINTN)(~0ULL >> (64 - sizeof (INTN) * 8)))
|
|
|
|
#define MAX_INTN ((INTN)(~0ULL >> (65 - sizeof (INTN) * 8)))
|
|
|
|
|
|
|
|
///
|
|
|
|
/// Minimum legal EBC INTN value.
|
|
|
|
///
|
|
|
|
#define MIN_INTN (((INTN)-MAX_INTN) - 1)
|
2013-08-13 10:45:45 +02:00
|
|
|
|
2008-08-14 04:53:43 +02:00
|
|
|
///
|
|
|
|
/// The stack alignment required for EBC
|
|
|
|
///
|
2007-06-08 13:31:52 +02:00
|
|
|
#define CPU_STACK_ALIGNMENT sizeof(UINTN)
|
|
|
|
|
2017-03-03 16:11:31 +01:00
|
|
|
///
|
|
|
|
/// Page allocation granularity for EBC
|
|
|
|
///
|
|
|
|
#define DEFAULT_PAGE_ALLOCATION_GRANULARITY (0x1000)
|
|
|
|
#define RUNTIME_PAGE_ALLOCATION_GRANULARITY (0x1000)
|
|
|
|
|
2008-08-14 04:53:43 +02:00
|
|
|
///
|
|
|
|
/// Modifier to ensure that all protocol member functions and EFI intrinsics
|
|
|
|
/// use the correct C calling convention. All protocol member functions and
|
2008-12-05 03:28:51 +01:00
|
|
|
/// EFI intrinsics are required to modify their member functions with EFIAPI.
|
2008-08-14 04:53:43 +02:00
|
|
|
///
|
2009-04-10 22:58:10 +02:00
|
|
|
#ifdef EFIAPI
|
|
|
|
///
|
|
|
|
/// If EFIAPI is already defined, then we use that definition.
|
|
|
|
///
|
|
|
|
#else
|
2018-06-27 15:11:33 +02:00
|
|
|
#define EFIAPI
|
2009-04-10 22:58:10 +02:00
|
|
|
#endif
|
2007-06-08 13:31:52 +02:00
|
|
|
|
2008-12-04 09:35:07 +01:00
|
|
|
/**
|
|
|
|
Return the pointer to the first instruction of a function given a function pointer.
|
2018-06-27 15:11:33 +02:00
|
|
|
On EBC architectures, these two pointer values are the same,
|
2008-12-04 09:35:07 +01:00
|
|
|
so the implementation of this macro is very simple.
|
2018-06-27 15:11:33 +02:00
|
|
|
|
2008-12-05 03:28:51 +01:00
|
|
|
@param FunctionPointer A pointer to a function.
|
2008-12-04 09:35:07 +01:00
|
|
|
|
|
|
|
@return The pointer to the first instruction of a function given a function pointer.
|
|
|
|
**/
|
2008-12-06 00:23:59 +01:00
|
|
|
#define FUNCTION_ENTRY_POINT(FunctionPointer) (VOID *)(UINTN)(FunctionPointer)
|
2007-11-27 03:48:59 +01:00
|
|
|
|
2014-09-01 19:23:10 +02:00
|
|
|
#ifndef __USER_LABEL_PREFIX__
|
|
|
|
#define __USER_LABEL_PREFIX__
|
|
|
|
#endif
|
|
|
|
|
2018-06-27 15:11:33 +02:00
|
|
|
#endif
|
2007-06-08 13:31:52 +02:00
|
|
|
|