ffs.S revision 1.1
1/*
2 * Copyright (c) 1992, 1993
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * This software was developed by the Computer Systems Engineering group
6 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
7 * contributed to Berkeley.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 *    notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 *    notice, this list of conditions and the following disclaimer in the
16 *    documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 *    must display the following acknowledgement:
19 *	This product includes software developed by the University of
20 *	California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 *    may be used to endorse or promote products derived from this software
23 *    without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * SUCH DAMAGE.
36 */
37
38#include <machine/asm.h>
39/*
40 * ffs returns the number of the rightmost bit set in its argument,
41 * i.e., the lowest value such that (x & (ffs(x) - 1)) is nonzero.
42 * If no bits are set, ffs returns 0.
43 *
44 * We use a table lookup on each byte.
45 *
46 * In each section below, %o1 is the current byte (0, 1, 2, or 3).
47 * The last byte is handled specially: for the first three,
48 * if that byte is nonzero, we return the table value
49 * (plus 0, 8, or 16 for the byte number), but for the last
50 * one, we just return the table value plus 24.  This means
51 * that ffstab[0] must be -24 so that ffs(0) will return 0.
52 */
53ENTRY(ffs)
54#ifdef PIC
55	PICCY_SET(_C_LABEL(__ffstab), %o2, %o3)
56#else
57	set	_C_LABEL(__ffstab), %o2
58#endif
59	andcc	%o0, 0xff, %o1	! get low byte
60	be,a	1f		! try again if 0
61	 srl	%o0, 8, %o0	! delay slot, get ready for next byte
62
63	retl			! return ffstab[%o1]
64	 ldsb	[%o2 + %o1], %o0
65
661:
67	andcc	%o0, 0xff, %o1	! byte 1 like byte 0...
68	be,a	2f
69	 srl	%o0, 8, %o0	! (use delay to prepare for byte 2)
70
71	ldsb	[%o2 + %o1], %o0
72	retl			! return ffstab[%o1] + 8
73	 add	%o0, 8, %o0
74
752:
76	andcc	%o0, 0xff, %o1
77	be,a	3f
78	 srl	%o0, 8, %o0	! (prepare for byte 3)
79
80	ldsb	[%o2 + %o1], %o0
81	retl			! return ffstab[%o1] + 16
82	 add	%o0, 16, %o0
83
843:				! just return ffstab[%o0] + 24
85	ldsb	[%o2 + %o0], %o0
86	retl
87	 add	%o0, 24, %o0
88
89_C_LABEL(__ffstab):
90	.byte	-24,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1 /* 00-0f */
91	.byte	5,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 10-1f */
92	.byte	6,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 20-2f */
93	.byte	5,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 30-3f */
94	.byte	7,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 40-4f */
95	.byte	5,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 50-5f */
96	.byte	6,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 60-6f */
97	.byte	5,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 70-7f */
98	.byte	8,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 80-8f */
99	.byte	5,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* 10-9f */
100	.byte	6,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* a0-af */
101	.byte	5,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* b0-bf */
102	.byte	7,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* c0-cf */
103	.byte	5,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* d0-df */
104	.byte	6,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* e0-ef */
105	.byte	5,1,2,1,3,1,2,1,4,1,2,1,3,1,2,1	/* f0-ff */
106