On 8 June 2018 at 11:53, Dmitry Vyukov <dvyu...@google.com> wrote:
> keccakf() is the only function in kernel that uses __optimize() macro.
> __optimize() breaks frame pointer unwinder as optimized code uses RBP,
> and amusingly this always lead to degraded performance as gcc does not
> inline across different optimizations levels, so keccakf() wasn't inlined
> into its callers and keccakf_round() wasn't inlined into keccakf().
>
> Drop __optimize() to resolve both problems.
>
> Signed-off-by: Dmitry Vyukov <dvyu...@google.com>
> Fixes: 83dee2ce1ae7 ("crypto: sha3-generic - rewrite KECCAK transform to help 
> the compiler optimize")
> Reported-by: syzbot+37035ccfa9a0a017f...@syzkaller.appspotmail.com
> Reported-by: syzbot+e073e4740cfbb3ae2...@syzkaller.appspotmail.com
> Cc: linux-crypto@vger.kernel.org
> Cc: "David S. Miller" <da...@davemloft.net>
> Cc: Herbert Xu <herb...@gondor.apana.org.au>
> Cc: Ard Biesheuvel <ard.biesheu...@linaro.org>

Acked-by: Ard Biesheuvel <ard.biesheu...@linaro.org>

> ---
>  crypto/sha3_generic.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/crypto/sha3_generic.c b/crypto/sha3_generic.c
> index 264ec12c0b9c..7f6735d9003f 100644
> --- a/crypto/sha3_generic.c
> +++ b/crypto/sha3_generic.c
> @@ -152,7 +152,7 @@ static SHA3_INLINE void keccakf_round(u64 st[25])
>         st[24] ^= bc[ 4];
>  }
>
> -static void __optimize("O3") keccakf(u64 st[25])
> +static void keccakf(u64 st[25])
>  {
>         int round;
>
> --
> 2.18.0.rc1.242.g61856ae69a-goog
>

Reply via email to