1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
|
/* $NetBSD: strlen.S,v 1.1 2005/12/20 19:28:50 christos Exp $ */
/*
* Copyright 2002 Wasabi Systems, Inc.
* All rights reserved.
*
* Written by Eduardo Horvath for Wasabi Systems, Inc.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed for the NetBSD Project by
* Wasabi Systems, Inc.
* 4. The name of Wasabi Systems, Inc. may not be used to endorse
* or promote products derived from this software without specific prior
* written permission.
*
* THIS SOFTWARE IS PROVIDED BY WASABI SYSTEMS, INC. ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL WASABI SYSTEMS, INC
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
#include <machine/asm.h>
#if defined(LIBC_SCCS) && !defined(lint)
RCSID("$NetBSD: strlen.S,v 1.1 2005/12/20 19:28:50 christos Exp $")
#endif /* LIBC_SCCS and not lint */
/* The algorithm here uses the following techniques:
*
* 1) Given a word 'x', we can test to see if it contains any 0 bytes
* by subtracting 0x01010101, and seeing if any of the high bits of each
* byte changed from 0 to 1. This works because the least significant
* 0 byte must have had no incoming carry (otherwise it's not the least
* significant), so it is 0x00 - 0x01 == 0xff. For all other
* byte values, either they have the high bit set initially, or when
* 1 is subtracted you get a value in the range 0x00-0x7f, none of which
* have their high bit set. The expression here is
* (x + 0xfefefeff) & ~(x | 0x7f7f7f7f), which gives 0x00000000 when
* there were no 0x00 bytes in the word.
*
* 2) Now just hunt for the first byte that's 0x00 in 'x'.
*
* This is from the book 'The PowerPC Compiler Writer's Guide',
* by Steve Hoxey, Faraydon Karim, Bill Hay and Hank Warren.
*/
ENTRY(strlen)
/*
* Calculate address for and load the first xword.
*/
andn %o0, 0x7, %o1
ldx [%o1], %g1
/*
* Now prepare some constants while the data arrives...
*/
sethi %hi(0xfefefefe), %o3
sethi %hi(0x7f7f7f7f), %o2
or %o3, %lo(0xfefefefe), %o3
or %o2, %lo(0x7f7f7f7f), %o2
sllx %o3, 32, %o5
andcc %o0, 0x7, %g5 ! Hoisted from below to fill a slot
sllx %o2, 32, %o4
or %o3, %o5, %o3
sll %g5, 3, %g5 ! Convert to bytes. hoisted
or %o2, %o4, %o2
inc %o3
neg %g5 ! hoisted
/*
* Mask off the leading bits:
*
* if (ptr & 0x7)
* mask = -1 << (64 - ((ptr & 0x7) << 3));
*/
! andcc %o0, 0x7, %g5 ! Hoisted above
bz,pt %icc, 0f
! sll %g5, 3, %g5 ! Convert to bytes. Also hoisted
! neg %g5 ! Hoisted
add %g5, 64, %g5
mov -1, %o4
sllx %o4, %g5, %o4
or %o4, %g1, %g1 ! Make leading bytes != 0
0:
or %g1, %o2, %o5 ! Do step 1 -- use or/andn instead of nor/and
add %g1, %o3, %g5
inc 8, %o1 ! Point to next word
andncc %g5, %o5, %g0
bz,a,pt %xcc, 0b
ldx [%o1], %g1
mov -1, %o4
dec 8, %o1
sllx %o4, 64-8, %o5
btst %g1, %o5 ! Check high byte
bz %xcc,0f
srlx %o5, 8, %o5
inc %o1
btst %g1, %o5 ! Check 2nd byte
bz %xcc,0f
srlx %o5, 8, %o5
inc %o1
btst %g1, %o5 ! Check 3rd byte
bz %xcc,0f
srlx %o5, 8, %o5
inc %o1
btst %g1, %o5 ! Check 4th byte
bz %xcc,0f
srlx %o5, 8, %o5
inc %o1
btst %g1, %o5 ! Check 5th byte
bz %xcc,0f
srlx %o5, 8, %o5
inc %o1
btst %g1, %o5 ! Check 6th byte
bz %xcc,0f
srlx %o5, 8, %o5
inc %o1
btst %g1, %o5 ! Check 7th byte
bz %xcc,0f
nop
inc %o1
0:
retl
sub %o1, %o0, %o0 ! return length (ptr - (origptr+1))
|