During string initialization we first copy the bytes and then traverse the bytes again to compute the hashcode.
Investigate if it's worthwhile to roll hash computation into the copy loop. (This will involve building the necessary instructions ourselves on x86 and arm64.)
During string initialization we first copy the bytes and then traverse the bytes again to compute the hashcode.
Investigate if it's worthwhile to roll hash computation into the copy loop. (This will involve building the necessary instructions ourselves on x86 and arm64.)