xref: /freebsd/lib/libc/i386/string/strcpy.S (revision 17ee9d00bc1ae1e598c38f25826f861e4bc6c3ce)
1/*
2 * Copyright (c) 1993 Winning Strategies, Inc.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *      This product includes software developed by Winning Strategies, Inc.
16 * 4. The name of the author may not be used to endorse or promote products
17 *    derived from this software withough specific prior written permission
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 *
30 *	$Id: strcpy.S,v 1.1 1994/08/05 01:18:34 wollman Exp $
31 */
32
33#if defined(LIBC_RCS) && !defined(lint)
34	.text
35        .asciz "$Id: strcpy.S,v 1.1 1994/08/05 01:18:34 wollman Exp $"
36#endif /* LIBC_RCS and not lint */
37
38#include "DEFS.h"
39
40/*
41 * strcpy (dst, src)
42 *	copy the string src to dst.
43 *
44 * Written by:
45 *	J.T. Conklin (jtc@wimsey.com), Winning Strategies, Inc.
46 */
47
48/*
49 * I've unrolled the loop eight times: large enough to make a
50 * significant difference, and small enough not to totally trash the
51 * cashe.
52 */
53
54ENTRY(strcpy)
55	movl	4(%esp),%ecx		/* dst address */
56	movl	8(%esp),%edx		/* src address */
57	pushl	%ecx			/* push dst address */
58
59	.align 2,0x90
60L1:	movb	(%edx),%al		/* unroll loop, but not too much */
61	movb	%al,(%ecx)
62	testb	%al,%al
63	je	L2
64	movb	1(%edx),%al
65	movb	%al,1(%ecx)
66	testb	%al,%al
67	je	L2
68	movb	2(%edx),%al
69	movb	%al,2(%ecx)
70	testb	%al,%al
71	je	L2
72	movb	3(%edx),%al
73	movb	%al,3(%ecx)
74	testb	%al,%al
75	je	L2
76	movb	4(%edx),%al
77	movb	%al,4(%ecx)
78	testb	%al,%al
79	je	L2
80	movb	5(%edx),%al
81	movb	%al,5(%ecx)
82	testb	%al,%al
83	je	L2
84	movb	6(%edx),%al
85	movb	%al,6(%ecx)
86	testb	%al,%al
87	je	L2
88	movb	7(%edx),%al
89	movb	%al,7(%ecx)
90	addl	$8,%edx
91	addl	$8,%ecx
92	testb	%al,%al
93	jne	L1
94L2:	popl	%eax			/* pop dst address */
95	ret
96