Rev 534 | Rev 1264 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
1 | jermar | 1 | /* |
2 | * Copyright (C) 2001-2004 Jakub Jermar |
||
3 | * All rights reserved. |
||
4 | * |
||
5 | * Redistribution and use in source and binary forms, with or without |
||
6 | * modification, are permitted provided that the following conditions |
||
7 | * are met: |
||
8 | * |
||
9 | * - Redistributions of source code must retain the above copyright |
||
10 | * notice, this list of conditions and the following disclaimer. |
||
11 | * - Redistributions in binary form must reproduce the above copyright |
||
12 | * notice, this list of conditions and the following disclaimer in the |
||
13 | * documentation and/or other materials provided with the distribution. |
||
14 | * - The name of the author may not be used to endorse or promote products |
||
15 | * derived from this software without specific prior written permission. |
||
16 | * |
||
17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
||
18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||
19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
||
20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
||
21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
||
22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
||
23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
||
24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||
25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
||
26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||
27 | */ |
||
28 | |||
29 | #include <memstr.h> |
||
30 | #include <arch/types.h> |
||
31 | |||
62 | decky | 32 | /** Copy block of memory |
33 | * |
||
34 | * Copy cnt bytes from src address to dst address. |
||
882 | jermar | 35 | * The copying is done word-by-word and then byte-by-byte. |
36 | * The source and destination memory areas cannot overlap. |
||
62 | decky | 37 | * |
38 | * @param src Origin address to copy from. |
||
39 | * @param dst Origin address to copy to. |
||
40 | * @param cnt Number of bytes to copy. |
||
41 | * |
||
42 | */ |
||
360 | jermar | 43 | void *_memcpy(void * dst, const void *src, size_t cnt) |
1 | jermar | 44 | { |
882 | jermar | 45 | int i, j; |
1 | jermar | 46 | |
882 | jermar | 47 | for (i = 0; i < cnt/sizeof(__native); i++) |
48 | ((__native *) dst)[i] = ((__native *) src)[i]; |
||
195 | vana | 49 | |
882 | jermar | 50 | for (j = 0; j < cnt%sizeof(__native); j++) |
51 | ((__u8 *)(((__native *) dst) + i))[j] = ((__u8 *)(((__native *) src) + i))[j]; |
||
52 | |||
195 | vana | 53 | return (char *)src; |
1 | jermar | 54 | } |
55 | |||
62 | decky | 56 | /** Fill block of memory |
57 | * |
||
58 | * Fill cnt bytes at dst address with the value x. |
||
59 | * The filling is done byte-by-byte. |
||
60 | * |
||
61 | * @param dst Origin address to fill. |
||
62 | * @param cnt Number of bytes to fill. |
||
63 | * @param x Value to fill. |
||
64 | * |
||
65 | */ |
||
72 | decky | 66 | void _memsetb(__address dst, size_t cnt, __u8 x) |
1 | jermar | 67 | { |
68 | int i; |
||
69 | __u8 *p = (__u8 *) dst; |
||
70 | |||
71 | for(i=0; i<cnt; i++) |
||
72 | p[i] = x; |
||
73 | } |
||
200 | palkovsky | 74 | |
75 | /** Fill block of memory |
||
76 | * |
||
77 | * Fill cnt words at dst address with the value x. |
||
78 | * The filling is done word-by-word. |
||
79 | * |
||
80 | * @param dst Origin address to fill. |
||
81 | * @param cnt Number of words to fill. |
||
82 | * @param x Value to fill. |
||
83 | * |
||
84 | */ |
||
85 | void _memsetw(__address dst, size_t cnt, __u16 x) |
||
86 | { |
||
87 | int i; |
||
202 | palkovsky | 88 | __u16 *p = (__u16 *) dst; |
200 | palkovsky | 89 | |
90 | for(i=0; i<cnt; i++) |
||
91 | p[i] = x; |
||
92 | } |