mirror of
https://sourceware.org/git/glibc.git
synced 2024-12-22 19:00:07 +00:00
3f02f778cd
* sysdeps/i386/__longjmp.S: Define & use symbolic argument stack offsets. Add ENTER/LEAVE macros for optionally maintaining frame-pointer chain when debugging. * sysdeps/i386/add_n.S: Likewise. * sysdeps/i386/addmul_1.S: Likewise. * sysdeps/i386/lshift.S: Likewise. * sysdeps/i386/memchr.S: Likewise. * sysdeps/i386/memcmp.S: Likewise. * sysdeps/i386/mul_1.S: Likewise. * sysdeps/i386/rawmemchr.S: Likewise. * sysdeps/i386/rshift.S: Likewise. * sysdeps/i386/stpcpy.S: Likewise. * sysdeps/i386/stpncpy.S: Likewise. * sysdeps/i386/strchr.S: Likewise. * sysdeps/i386/strchrnul.S: Likewise. * sysdeps/i386/strcspn.S: Likewise. * sysdeps/i386/strpbrk.S: Likewise. * sysdeps/i386/strrchr.S: Likewise. * sysdeps/i386/strspn.S: Likewise. * sysdeps/i386/strtok.S: Likewise. * sysdeps/i386/sub_n.S: Likewise. * sysdeps/i386/submul_1.S: Likewise. * sysdeps/i386/elf/setjmp.S: Likewise. * sysdeps/i386/i486/strcat.S: Likewise. * sysdeps/i386/i486/strlen.S: Likewise. * sysdeps/i386/i586/add_n.S: Likewise. * sysdeps/i386/i586/lshift.S: Likewise. * sysdeps/i386/i586/memcpy.S: Likewise. * sysdeps/i386/i586/memset.S: Likewise. * sysdeps/i386/i586/rshift.S: Likewise. * sysdeps/i386/i586/strchr.S: Likewise. * sysdeps/i386/i586/strcpy.S: Likewise. * sysdeps/i386/i586/strlen.S: Likewise. * sysdeps/i386/i586/sub_n.S: Likewise. * sysdeps/i386/i686/add_n.S: Likewise. * sysdeps/i386/i686/memcpy.S: Likewise. * sysdeps/i386/i686/mempcpy.S: Likewise. * sysdeps/i386/i686/memset.S: Likewise. * sysdeps/i386/i686/strcmp.S: Likewise. 2000-06-08 Greg McGary <greg@mcgary.org> * sysdeps/i386/bp-asm.h: New file. * sysdeps/i386/__longjmp.S: Define & use symbolic argument stack offsets. Add ENTER/LEAVE macros for optionally maintaining frame-pointer chain when debugging. * sysdeps/i386/add_n.S: Likewise. * sysdeps/i386/addmul_1.S: Likewise. * sysdeps/i386/lshift.S: Likewise. * sysdeps/i386/memchr.S: Likewise. * sysdeps/i386/memcmp.S: Likewise. * sysdeps/i386/mul_1.S: Likewise. * sysdeps/i386/rawmemchr.S: Likewise. * sysdeps/i386/rshift.S: Likewise. * sysdeps/i386/stpcpy.S: Likewise. * sysdeps/i386/stpncpy.S: Likewise. * sysdeps/i386/strchr.S: Likewise. * sysdeps/i386/strchrnul.S: Likewise. * sysdeps/i386/strcspn.S: Likewise. * sysdeps/i386/strpbrk.S: Likewise. * sysdeps/i386/strrchr.S: Likewise. * sysdeps/i386/strspn.S: Likewise. * sysdeps/i386/strtok.S: Likewise. * sysdeps/i386/sub_n.S: Likewise. * sysdeps/i386/submul_1.S: Likewise. * sysdeps/i386/elf/setjmp.S: Likewise. * sysdeps/i386/i486/strcat.S: Likewise. * sysdeps/i386/i486/strlen.S: Likewise. * sysdeps/i386/i586/add_n.S: Likewise. * sysdeps/i386/i586/lshift.S: Likewise. * sysdeps/i386/i586/memcpy.S: Likewise. * sysdeps/i386/i586/memset.S: Likewise. * sysdeps/i386/i586/rshift.S: Likewise. * sysdeps/i386/i586/strchr.S: Likewise. * sysdeps/i386/i586/strcpy.S: Likewise. * sysdeps/i386/i586/strlen.S: Likewise. * sysdeps/i386/i586/sub_n.S: Likewise. * sysdeps/i386/i686/add_n.S: Likewise. * sysdeps/i386/i686/memcpy.S: Likewise. * sysdeps/i386/i686/mempcpy.S: Likewise. * sysdeps/i386/i686/memset.S: Likewise. * sysdeps/i386/i686/strcmp.S: Likewise.
186 lines
5.6 KiB
ArmAsm
186 lines
5.6 KiB
ArmAsm
/* strlen -- Compute length og NUL terminated string.
|
|
Highly optimized version for ix86, x>=5.
|
|
Copyright (C) 1995, 1996, 1997, 2000 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
Contributed by Ulrich Drepper, <drepper@gnu.ai.mit.edu>.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Library General Public License as
|
|
published by the Free Software Foundation; either version 2 of the
|
|
License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Library General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Library General Public
|
|
License along with the GNU C Library; see the file COPYING.LIB. If not,
|
|
write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
Boston, MA 02111-1307, USA. */
|
|
|
|
#include <sysdep.h>
|
|
#include "asm-syntax.h"
|
|
#include "bp-asm.h"
|
|
|
|
/* This version is especially optimized for the i586 (and following?)
|
|
processors. This is mainly done by using the two pipelines. The
|
|
version optimized for i486 is weak in this aspect because to get
|
|
as much parallelism we have to execute some *more* instructions.
|
|
|
|
The code below is structured to reflect the pairing of the instructions
|
|
as *I think* it is. I have no processor data book to verify this.
|
|
If you find something you think is incorrect let me know. */
|
|
|
|
|
|
/* The magic value which is used throughout in the whole code. */
|
|
#define magic 0xfefefeff
|
|
|
|
#define PARMS LINKAGE /* no space for saved regs */
|
|
#define STR PARMS
|
|
|
|
.text
|
|
ENTRY(strlen)
|
|
ENTER
|
|
|
|
movl STR(%esp), %eax
|
|
movl $3, %edx /* load mask (= 3) */
|
|
|
|
andl %eax, %edx /* separate last two bits of address */
|
|
|
|
jz L(1) /* aligned => start loop */
|
|
jp L(0) /* exactly two bits set */
|
|
|
|
cmpb %dh, (%eax) /* is byte NUL? */
|
|
je L(2) /* yes => return */
|
|
|
|
incl %eax /* increment pointer */
|
|
cmpb %dh, (%eax) /* is byte NUL? */
|
|
|
|
je L(2) /* yes => return */
|
|
|
|
incl %eax /* increment pointer */
|
|
xorl $2, %edx
|
|
|
|
jz L(1)
|
|
|
|
L(0): cmpb %dh, (%eax) /* is byte NUL? */
|
|
je L(2) /* yes => return */
|
|
|
|
incl %eax /* increment pointer */
|
|
xorl %edx, %edx /* We need %edx == 0 for later */
|
|
|
|
/* We exit the loop if adding MAGIC_BITS to LONGWORD fails to
|
|
change any of the hole bits of LONGWORD.
|
|
|
|
1) Is this safe? Will it catch all the zero bytes?
|
|
Suppose there is a byte with all zeros. Any carry bits
|
|
propagating from its left will fall into the hole at its
|
|
least significant bit and stop. Since there will be no
|
|
carry from its most significant bit, the LSB of the
|
|
byte to the left will be unchanged, and the zero will be
|
|
detected.
|
|
|
|
2) Is this worthwhile? Will it ignore everything except
|
|
zero bytes? Suppose every byte of LONGWORD has a bit set
|
|
somewhere. There will be a carry into bit 8. If bit 8
|
|
is set, this will carry into bit 16. If bit 8 is clear,
|
|
one of bits 9-15 must be set, so there will be a carry
|
|
into bit 16. Similarly, there will be a carry into bit
|
|
24. If one of bits 24-31 is set, there will be a carry
|
|
into bit 32 (=carry flag), so all of the hole bits will
|
|
be changed.
|
|
|
|
Note: %edx == 0 in any case here. */
|
|
|
|
L(1):
|
|
movl (%eax), %ecx /* get word (= 4 bytes) in question */
|
|
addl $4, %eax /* adjust pointer for *next* word */
|
|
|
|
subl %ecx, %edx /* first step to negate word */
|
|
addl $magic, %ecx /* add magic word */
|
|
|
|
decl %edx /* complete negation of word */
|
|
jnc L(3) /* previous addl caused overflow? */
|
|
|
|
xorl %ecx, %edx /* (word+magic)^word */
|
|
|
|
andl $~magic, %edx /* any of the carry flags set? */
|
|
|
|
jne L(3) /* yes => determine byte */
|
|
|
|
|
|
movl (%eax), %ecx /* get word (= 4 bytes) in question */
|
|
addl $4, %eax /* adjust pointer for *next* word */
|
|
|
|
subl %ecx, %edx /* first step to negate word */
|
|
addl $magic, %ecx /* add magic word */
|
|
|
|
decl %edx /* complete negation of word */
|
|
jnc L(3) /* previous addl caused overflow? */
|
|
|
|
xorl %ecx, %edx /* (word+magic)^word */
|
|
|
|
andl $~magic, %edx /* any of the carry flags set? */
|
|
|
|
jne L(3) /* yes => determine byte */
|
|
|
|
|
|
movl (%eax), %ecx /* get word (= 4 bytes) in question */
|
|
addl $4, %eax /* adjust pointer for *next* word */
|
|
|
|
subl %ecx, %edx /* first step to negate word */
|
|
addl $magic, %ecx /* add magic word */
|
|
|
|
decl %edx /* complete negation of word */
|
|
jnc L(3) /* previous addl caused overflow? */
|
|
|
|
xorl %ecx, %edx /* (word+magic)^word */
|
|
|
|
andl $~magic, %edx /* any of the carry flags set? */
|
|
|
|
jne L(3) /* yes => determine byte */
|
|
|
|
|
|
movl (%eax), %ecx /* get word (= 4 bytes) in question */
|
|
addl $4, %eax /* adjust pointer for *next* word */
|
|
|
|
subl %ecx, %edx /* first step to negate word */
|
|
addl $magic, %ecx /* add magic word */
|
|
|
|
decl %edx /* complete negation of word */
|
|
jnc L(3) /* previous addl caused overflow? */
|
|
|
|
xorl %ecx, %edx /* (word+magic)^word */
|
|
|
|
andl $~magic, %edx /* any of the carry flags set? */
|
|
|
|
je L(1) /* no => start loop again */
|
|
|
|
|
|
L(3): subl $4, %eax /* correct too early pointer increment */
|
|
subl $magic, %ecx
|
|
|
|
cmpb $0, %cl /* lowest byte NUL? */
|
|
jz L(2) /* yes => return */
|
|
|
|
inc %eax /* increment pointer */
|
|
testb %ch, %ch /* second byte NUL? */
|
|
|
|
jz L(2) /* yes => return */
|
|
|
|
shrl $16, %ecx /* make upper bytes accessible */
|
|
incl %eax /* increment pointer */
|
|
|
|
cmpb $0, %cl /* is third byte NUL? */
|
|
jz L(2) /* yes => return */
|
|
|
|
incl %eax /* increment pointer */
|
|
|
|
L(2): subl STR(%esp), %eax /* now compute the length as difference
|
|
between start and terminating NUL
|
|
character */
|
|
LEAVE
|
|
ret
|
|
END (strlen)
|