Rev 2725 | Rev 4377 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
517 | jermar | 1 | /* |
2071 | jermar | 2 | * Copyright (c) 2005 Jakub Jermar |
517 | jermar | 3 | * All rights reserved. |
4 | * |
||
5 | * Redistribution and use in source and binary forms, with or without |
||
6 | * modification, are permitted provided that the following conditions |
||
7 | * are met: |
||
8 | * |
||
9 | * - Redistributions of source code must retain the above copyright |
||
10 | * notice, this list of conditions and the following disclaimer. |
||
11 | * - Redistributions in binary form must reproduce the above copyright |
||
12 | * notice, this list of conditions and the following disclaimer in the |
||
13 | * documentation and/or other materials provided with the distribution. |
||
14 | * - The name of the author may not be used to endorse or promote products |
||
15 | * derived from this software without specific prior written permission. |
||
16 | * |
||
17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
||
18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||
19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
||
20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
||
21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
||
22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
||
23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
||
24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||
25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
||
26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||
27 | */ |
||
28 | |||
1812 | decky | 29 | /** @addtogroup generic |
1702 | cejka | 30 | * @{ |
31 | */ |
||
32 | /** @file |
||
33 | */ |
||
34 | |||
1855 | jermar | 35 | #ifndef KERN_MACROS_H_ |
36 | #define KERN_MACROS_H_ |
||
517 | jermar | 37 | |
1812 | decky | 38 | #include <arch/types.h> |
39 | |||
2572 | jermar | 40 | #define isdigit(d) (((d) >= '0') && ((d) <= '9')) |
41 | #define islower(c) (((c) >= 'a') && ((c) <= 'z')) |
||
42 | #define isupper(c) (((c) >= 'A') && ((c) <= 'Z')) |
||
43 | #define isalpha(c) (is_lower(c) || is_upper(c)) |
||
44 | #define isalphanum(c) (is_alpha(c) || is_digit(c)) |
||
45 | #define isspace(c) (((c) == ' ') || ((c) == '\t') || ((c) == '\n') || \ |
||
2048 | jermar | 46 | ((c) == '\r')) |
517 | jermar | 47 | |
1812 | decky | 48 | #define min(a,b) ((a) < (b) ? (a) : (b)) |
49 | #define max(a,b) ((a) > (b) ? (a) : (b)) |
||
518 | jermar | 50 | |
1855 | jermar | 51 | /** Return true if the interlvals overlap. |
52 | * |
||
53 | * @param s1 Start address of the first interval. |
||
54 | * @param sz1 Size of the first interval. |
||
55 | * @param s2 Start address of the second interval. |
||
56 | * @param sz2 Size of the second interval. |
||
57 | */ |
||
1780 | jermar | 58 | static inline int overlaps(uintptr_t s1, size_t sz1, uintptr_t s2, size_t sz2) |
1063 | palkovsky | 59 | { |
1812 | decky | 60 | uintptr_t e1 = s1 + sz1; |
61 | uintptr_t e2 = s2 + sz2; |
||
1063 | palkovsky | 62 | |
1812 | decky | 63 | return (s1 < e2) && (s2 < e1); |
1063 | palkovsky | 64 | } |
2712 | decky | 65 | |
1063 | palkovsky | 66 | /* Compute overlapping of physical addresses */ |
1812 | decky | 67 | #define PA_overlaps(x, szx, y, szy) overlaps(KA2PA(x), szx, KA2PA(y), szy) |
1063 | palkovsky | 68 | |
2725 | decky | 69 | #define SIZE2KB(size) (size >> 10) |
70 | #define SIZE2MB(size) (size >> 20) |
||
71 | |||
1812 | decky | 72 | #define STRING(arg) STRING_ARG(arg) |
73 | #define STRING_ARG(arg) #arg |
||
74 | |||
517 | jermar | 75 | #endif |
1702 | cejka | 76 | |
1812 | decky | 77 | /** @} |
1702 | cejka | 78 | */ |