lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20220528081236.3020-1-arthurchang09@gmail.com> Date: Sat, 28 May 2022 16:12:34 +0800 From: Yu-Jen Chang <arthurchang09@...il.com> To: ak@...ux.intel.com, jdike@...ux.intel.com Cc: tglx@...utronix.de, mingo@...hat.com, bp@...en8.de, dave.hansen@...ux.intel.com, x86@...nel.org, hpa@...or.com, keescook@...omium.org, linux-kernel@...r.kernel.org, linux-hardening@...r.kernel.org, richard@....at, anton.ivanov@...bridgegreys.com, johannes@...solutions.net, linux-um@...ts.infradead.org, jserv@...s.ncku.edu.tw, Yu-Jen Chang <arthurchang09@...il.com> Subject: [PATCH 0/2] x86: Optimize memchr() for x86-64 *** BLURB HERE *** These patch series add an optimized "memchr()" for x86-64 and USER-MODE LINUX (UML). There exists an assemebly implementation for x86-32. However, for x86-64, there isn't any optimized version. We implement word-wise comparison so that 8 characters can be compared at the same time on x86-64 CPU. The optimized “memchr()” is nearly 4x faster than the orginal implementation for long strings. We test the optimized “memchr()” in UML and also recompile the 5.18 Kernel with the optimized “memchr()”. They run correctly. In this patch we add a new file "string_64.c", which only contains "memchr()". We can add more optimized string functions in it in the future. Yu-Jen Chang (2): x86/lib: Optimize memchr() x86/um: Use x86_64-optimized memchr arch/x86/include/asm/string_64.h | 3 ++ arch/x86/lib/Makefile | 1 + arch/x86/lib/string_64.c | 78 ++++++++++++++++++++++++++++++++ arch/x86/um/Makefile | 2 +- 4 files changed, 83 insertions(+), 1 deletion(-) create mode 100644 arch/x86/lib/string_64.c -- 2.25.1
Powered by blists - more mailing lists