mirror of
https://sourceware.org/git/glibc.git
synced 2024-11-16 10:00:12 +00:00
bc15410ece
2002-03-11 Ulrich Drepper <drepper@redhat.com> * manual/examples/mkfsock.c: Include <string.h> as well. Patch by Alain De Carolis <alaind@wseurope.com>. 2002-03-06 Isamu Hasegawa <isamu@yamato.ibm.com> * posix/regexec.c (re_match): Fix incorrect register sizes. (re_search): Likewise. 2002-03-05 Isamu Hasegawa <isamu@yamato.ibm.com> * posix/regcomp.c (regfree): Remove a disused condition. * posix/regex_internal.c (re_acquire_state): Likewise. (re_acquire_state_context): Likewise. (register_state): Remove a redundant malloc invocation. * posix/regex_internal.h: (re_state_table_entry): Simplify the structure. 2002-03-05 Isamu Hasegawa <isamu@yamato.ibm.com> * posix/regcomp.c (regcomp): Add __builtin_expect to error handling conditions. (regerror): Likewise. (regfree): Likewise. (re_compile_internal): Likewise. (init_dfa): Likewise. (init_word_char): Likewise. (create_initial_state): Likewise. (analyze): Likewise. (analyze_tree): Likewise. (duplicate_node): Likewise. (calc_eclosure): Likewise. (calc_eclosure_iter): Likewise. (parse): Likewise. (parse_reg_exp): Likewise. (parse_branch): Likewise. (parse_expression): Likewise. (parse_subexp): Likewise. (parse_dup_op): Likewise. (parse_bracket_exp): Likewise. (build_equiv_class): Likewise. (build_charclass): Likewise. (build_word_op): Likewise. (fetch_number): Likewise. (create_tree): Likewise. (duplicate_tree): Likewise. * posix/regex.c (BE): New macro. * posix/regexec.c (re_match): Add __builtin_expect to error handling conditions. (re_match_2): Likewise. (re_search): Likewise. (re_search_internal): Likewise. (check_matching): Likewise. (proceed_next_node): Likewise. (set_regs): Likewise. (sift_states_backward): Likewise. (add_epsilon_backreference): Likewise. (transit_state): Likewise. (transit_state_sb): Likewise. (transit_state_mb): Likewise. (transit_state_bkref): Likewise. (transit_state_bkref_loop): Likewise. (build_trtable): Likewise. (group_nodes_into_DFAstates): Likewise. (match_ctx_init): Likewise. (match_ctx_add_entry): Likewise. * posix/regex_internal.c (re_string_construct): Add __builtin_expect to error handling conditions. (re_string_construct_toupper): Likewise. (build_wcs_buffer): Likewise. (build_wcs_upper_buffer): Likewise. (build_upper_buffer): Likewise. (re_string_translate_buffer): Likewise. (re_node_set_alloc): Likewise. (re_node_set_init_1): Likewise. (re_node_set_init_2): Likewise. (re_node_set_init_copy): Likewise. (re_node_set_intersect): Likewise. (re_node_set_init_union): Likewise. (re_node_set_merge): Likewise. (re_node_set_insert): Likewise. (re_dfa_add_node): Likewise. (re_acquire_state): Likewise. (re_acquire_state_context): Likewise. (create_new_state_common): Likewise. (register_state): Likewise. (create_ci_new_state): Likewise. (create_cd_new_state): Likewise. (re_string_context_at): Remove redundant condition. 2002-01-16 Roger Sayle <roger@eyesopen.com> * sysdeps/i386/i686/strcmp.S: Avoid unconditional jump to a ret. * sysdeps/i386/i586/strlen.S: Fix typo in comment.
189 lines
5.7 KiB
ArmAsm
189 lines
5.7 KiB
ArmAsm
/* strlen -- Compute length of NUL terminated string.
|
|
Highly optimized version for ix86, x>=5.
|
|
Copyright (C) 1995, 1996, 1997, 2000, 2002 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
Contributed by Ulrich Drepper, <drepper@gnu.ai.mit.edu>.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, write to the Free
|
|
Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
|
02111-1307 USA. */
|
|
|
|
#include <sysdep.h>
|
|
#include "asm-syntax.h"
|
|
#include "bp-sym.h"
|
|
#include "bp-asm.h"
|
|
|
|
/* This version is especially optimized for the i586 (and following?)
|
|
processors. This is mainly done by using the two pipelines. The
|
|
version optimized for i486 is weak in this aspect because to get
|
|
as much parallelism we have to execute some *more* instructions.
|
|
|
|
The code below is structured to reflect the pairing of the instructions
|
|
as *I think* it is. I have no processor data book to verify this.
|
|
If you find something you think is incorrect let me know. */
|
|
|
|
|
|
/* The magic value which is used throughout in the whole code. */
|
|
#define magic 0xfefefeff
|
|
|
|
#define PARMS LINKAGE /* no space for saved regs */
|
|
#define STR PARMS
|
|
|
|
.text
|
|
ENTRY (BP_SYM (strlen))
|
|
ENTER
|
|
|
|
movl STR(%esp), %eax
|
|
CHECK_BOUNDS_LOW (%eax, STR(%esp))
|
|
movl $3, %edx /* load mask (= 3) */
|
|
|
|
andl %eax, %edx /* separate last two bits of address */
|
|
|
|
jz L(1) /* aligned => start loop */
|
|
jp L(0) /* exactly two bits set */
|
|
|
|
cmpb %dh, (%eax) /* is byte NUL? */
|
|
je L(2) /* yes => return */
|
|
|
|
incl %eax /* increment pointer */
|
|
cmpb %dh, (%eax) /* is byte NUL? */
|
|
|
|
je L(2) /* yes => return */
|
|
|
|
incl %eax /* increment pointer */
|
|
xorl $2, %edx
|
|
|
|
jz L(1)
|
|
|
|
L(0): cmpb %dh, (%eax) /* is byte NUL? */
|
|
je L(2) /* yes => return */
|
|
|
|
incl %eax /* increment pointer */
|
|
xorl %edx, %edx /* We need %edx == 0 for later */
|
|
|
|
/* We exit the loop if adding MAGIC_BITS to LONGWORD fails to
|
|
change any of the hole bits of LONGWORD.
|
|
|
|
1) Is this safe? Will it catch all the zero bytes?
|
|
Suppose there is a byte with all zeros. Any carry bits
|
|
propagating from its left will fall into the hole at its
|
|
least significant bit and stop. Since there will be no
|
|
carry from its most significant bit, the LSB of the
|
|
byte to the left will be unchanged, and the zero will be
|
|
detected.
|
|
|
|
2) Is this worthwhile? Will it ignore everything except
|
|
zero bytes? Suppose every byte of LONGWORD has a bit set
|
|
somewhere. There will be a carry into bit 8. If bit 8
|
|
is set, this will carry into bit 16. If bit 8 is clear,
|
|
one of bits 9-15 must be set, so there will be a carry
|
|
into bit 16. Similarly, there will be a carry into bit
|
|
24. If one of bits 24-31 is set, there will be a carry
|
|
into bit 32 (=carry flag), so all of the hole bits will
|
|
be changed.
|
|
|
|
Note: %edx == 0 in any case here. */
|
|
|
|
L(1):
|
|
movl (%eax), %ecx /* get word (= 4 bytes) in question */
|
|
addl $4, %eax /* adjust pointer for *next* word */
|
|
|
|
subl %ecx, %edx /* first step to negate word */
|
|
addl $magic, %ecx /* add magic word */
|
|
|
|
decl %edx /* complete negation of word */
|
|
jnc L(3) /* previous addl caused overflow? */
|
|
|
|
xorl %ecx, %edx /* (word+magic)^word */
|
|
|
|
andl $~magic, %edx /* any of the carry flags set? */
|
|
|
|
jne L(3) /* yes => determine byte */
|
|
|
|
|
|
movl (%eax), %ecx /* get word (= 4 bytes) in question */
|
|
addl $4, %eax /* adjust pointer for *next* word */
|
|
|
|
subl %ecx, %edx /* first step to negate word */
|
|
addl $magic, %ecx /* add magic word */
|
|
|
|
decl %edx /* complete negation of word */
|
|
jnc L(3) /* previous addl caused overflow? */
|
|
|
|
xorl %ecx, %edx /* (word+magic)^word */
|
|
|
|
andl $~magic, %edx /* any of the carry flags set? */
|
|
|
|
jne L(3) /* yes => determine byte */
|
|
|
|
|
|
movl (%eax), %ecx /* get word (= 4 bytes) in question */
|
|
addl $4, %eax /* adjust pointer for *next* word */
|
|
|
|
subl %ecx, %edx /* first step to negate word */
|
|
addl $magic, %ecx /* add magic word */
|
|
|
|
decl %edx /* complete negation of word */
|
|
jnc L(3) /* previous addl caused overflow? */
|
|
|
|
xorl %ecx, %edx /* (word+magic)^word */
|
|
|
|
andl $~magic, %edx /* any of the carry flags set? */
|
|
|
|
jne L(3) /* yes => determine byte */
|
|
|
|
|
|
movl (%eax), %ecx /* get word (= 4 bytes) in question */
|
|
addl $4, %eax /* adjust pointer for *next* word */
|
|
|
|
subl %ecx, %edx /* first step to negate word */
|
|
addl $magic, %ecx /* add magic word */
|
|
|
|
decl %edx /* complete negation of word */
|
|
jnc L(3) /* previous addl caused overflow? */
|
|
|
|
xorl %ecx, %edx /* (word+magic)^word */
|
|
|
|
andl $~magic, %edx /* any of the carry flags set? */
|
|
|
|
je L(1) /* no => start loop again */
|
|
|
|
|
|
L(3): subl $4, %eax /* correct too early pointer increment */
|
|
subl $magic, %ecx
|
|
|
|
cmpb $0, %cl /* lowest byte NUL? */
|
|
jz L(2) /* yes => return */
|
|
|
|
inc %eax /* increment pointer */
|
|
testb %ch, %ch /* second byte NUL? */
|
|
|
|
jz L(2) /* yes => return */
|
|
|
|
shrl $16, %ecx /* make upper bytes accessible */
|
|
incl %eax /* increment pointer */
|
|
|
|
cmpb $0, %cl /* is third byte NUL? */
|
|
jz L(2) /* yes => return */
|
|
|
|
incl %eax /* increment pointer */
|
|
|
|
L(2): CHECK_BOUNDS_HIGH (%eax, STR(%esp), jb)
|
|
subl STR(%esp), %eax /* now compute the length as difference
|
|
between start and terminating NUL
|
|
character */
|
|
LEAVE
|
|
ret
|
|
END (BP_SYM (strlen))
|