[444] | 1 | /* |
---|
| 2 | Copyright (c) 2013 Andes Technology Corporation. |
---|
| 3 | All rights reserved. |
---|
| 4 | |
---|
| 5 | Redistribution and use in source and binary forms, with or without |
---|
| 6 | modification, are permitted provided that the following conditions are met: |
---|
| 7 | |
---|
| 8 | Redistributions of source code must retain the above copyright |
---|
| 9 | notice, this list of conditions and the following disclaimer. |
---|
| 10 | |
---|
| 11 | Redistributions in binary form must reproduce the above copyright |
---|
| 12 | notice, this list of conditions and the following disclaimer in the |
---|
| 13 | documentation and/or other materials provided with the distribution. |
---|
| 14 | |
---|
| 15 | The name of the company may not be used to endorse or promote |
---|
| 16 | products derived from this software without specific prior written |
---|
| 17 | permission. |
---|
| 18 | |
---|
| 19 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
---|
| 20 | AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
---|
| 21 | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
---|
| 22 | DISCLAIMED. IN NO EVENT SHALL RED HAT INCORPORATED BE LIABLE FOR ANY |
---|
| 23 | DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
---|
| 24 | (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
---|
| 25 | LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND |
---|
| 26 | ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
---|
| 27 | (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
---|
| 28 | SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
---|
| 29 | |
---|
| 30 | |
---|
| 31 | Function: |
---|
| 32 | memcpy - copy memory regions |
---|
| 33 | Syntax: |
---|
| 34 | void *memcpy(void *s1, const void *s2, size_t n); |
---|
| 35 | Description: |
---|
| 36 | The memcpy function copies n characters from the object pointed to |
---|
| 37 | by s2 into the object pointed to by s1. If copying takes place |
---|
| 38 | between objects that overlap, the behavior is undefined. |
---|
| 39 | Return value: |
---|
| 40 | The memcpy function returns the value of s1. |
---|
| 41 | */ |
---|
| 42 | .text |
---|
| 43 | .align 2 |
---|
| 44 | .globl memcpy |
---|
| 45 | .type memcpy, @function |
---|
| 46 | memcpy: |
---|
| 47 | /* Corner cases. If *s1 equals *s2 |
---|
| 48 | or size_t is zero, just go return. */ |
---|
| 49 | beq $r0, $r1, .Lend_memcpy |
---|
| 50 | beqz $r2, .Lend_memcpy |
---|
| 51 | |
---|
| 52 | /* Keep *s1 as return value. |
---|
| 53 | Set $r3 as how many words to copy. |
---|
| 54 | Set $r2 as how many bytes are less than a word. */ |
---|
| 55 | move $r5, $r0 |
---|
| 56 | srli $r3, $r2, 2 |
---|
| 57 | andi $r2, $r2, 3 |
---|
| 58 | beqz $r3, .Lbyte_copy |
---|
| 59 | |
---|
| 60 | .Lword_copy: |
---|
| 61 | /* Do the word copy $r3 times. Then, do the byte copy $r2 times. */ |
---|
| 62 | lmw.bim $r4, [$r1], $r4, 0 |
---|
| 63 | addi $r3, $r3, -1 |
---|
| 64 | smw.bim $r4, [$r5], $r4, 0 |
---|
| 65 | bnez $r3, .Lword_copy /* Loop again ? */ |
---|
| 66 | beqz $r2, .Lend_memcpy /* Fall THRU or go return ? */ |
---|
| 67 | |
---|
| 68 | .Lbyte_copy: |
---|
| 69 | /* Do the byte copy $r2 times. */ |
---|
| 70 | lbi.bi $r4, [$r1], 1 |
---|
| 71 | addi $r2, $r2, -1 |
---|
| 72 | sbi.bi $r4, [$r5], 1 |
---|
| 73 | bnez $r2, .Lbyte_copy /* Loop again ? */ |
---|
| 74 | |
---|
| 75 | .Lend_memcpy: |
---|
| 76 | ret |
---|
| 77 | .size memcpy, .-memcpy |
---|