Integrated: 8330611: AES-CTR vector intrinsic may read out of bounds (x86_64, AVX-512)

Martin Balao mbalao at openjdk.org
Wed Apr 24 20:26:34 UTC 2024


On Fri, 19 Apr 2024 00:04:41 GMT, Martin Balao <mbalao at openjdk.org> wrote:

> We would like to propose a fix for 8330611.
> 
> To avoid an out of bounds memory read when the input's size is not multiple of the block size, we read the plaintext/ciphertext tail in 8, 4, 2 and 1 byte batches depending on what it is guaranteed to be available by 'len_reg'. This behavior replaces the read of 16 bytes of input upfront and later discard of spurious data.
> 
> While we add 3 extra instructions + 3 extra memory reads in the worst case —to the same cache line probably—, the performance impact of this fix should be low because it only occurs at the end of the input and when its length is not multiple of the block size.
> 
> A reliable test case for this bug is hard to develop because we would need accurate heap allocation. The fact that spuriously read data is silently discarded most of the time makes this bug harder to observe. No regressions have been observed in the compiler/codegen/aes jtreg category. Additionally, we verified the fix manually with the debugger.
> 
> This work is in collaboration with @franferrax .

This pull request has now been integrated.

Changeset: 8a8d9288
Author:    Martin Balao <mbalao at openjdk.org>
URL:       https://git.openjdk.org/jdk/commit/8a8d9288980513db459f7d6b36554b65844951ca
Stats:     23 lines in 3 files changed: 18 ins; 1 del; 4 mod

8330611: AES-CTR vector intrinsic may read out of bounds (x86_64, AVX-512)

Co-authored-by: Francisco Ferrari Bihurriet <fferrari at openjdk.org>
Co-authored-by: Martin Balao <mbalao at openjdk.org>
Reviewed-by: aph, sviswanathan

-------------

PR: https://git.openjdk.org/jdk/pull/18849


More information about the hotspot-compiler-dev mailing list