xref: /freebsd/lib/libc/i386/string/strcpy.S (revision d0b2dbfa)
1/*
2 * Copyright (c) 1993 Winning Strategies, Inc.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *      This product includes software developed by Winning Strategies, Inc.
16 * 4. The name of the author may not be used to endorse or promote products
17 *    derived from this software without specific prior written permission
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#include <machine/asm.h>
32/*
33 * strcpy (dst, src)
34 *	copy the string src to dst.
35 *
36 * Written by:
37 *	J.T. Conklin (jtc@wimsey.com), Winning Strategies, Inc.
38 */
39
40/*
41 * I've unrolled the loop eight times: large enough to make a
42 * significant difference, and small enough not to totally trash the
43 * cache.
44 */
45
46ENTRY(strcpy)
47	movl	4(%esp),%ecx		/* dst address */
48	movl	8(%esp),%edx		/* src address */
49	pushl	%ecx			/* push dst address */
50
51	.align 2,0x90
52L1:	movb	(%edx),%al		/* unroll loop, but not too much */
53	movb	%al,(%ecx)
54	testb	%al,%al
55	je	L2
56	movb	1(%edx),%al
57	movb	%al,1(%ecx)
58	testb	%al,%al
59	je	L2
60	movb	2(%edx),%al
61	movb	%al,2(%ecx)
62	testb	%al,%al
63	je	L2
64	movb	3(%edx),%al
65	movb	%al,3(%ecx)
66	testb	%al,%al
67	je	L2
68	movb	4(%edx),%al
69	movb	%al,4(%ecx)
70	testb	%al,%al
71	je	L2
72	movb	5(%edx),%al
73	movb	%al,5(%ecx)
74	testb	%al,%al
75	je	L2
76	movb	6(%edx),%al
77	movb	%al,6(%ecx)
78	testb	%al,%al
79	je	L2
80	movb	7(%edx),%al
81	movb	%al,7(%ecx)
82	addl	$8,%edx
83	addl	$8,%ecx
84	testb	%al,%al
85	jne	L1
86L2:	popl	%eax			/* pop dst address */
87	ret
88END(strcpy)
89
90	.section .note.GNU-stack,"",%progbits
91