RFR: 8350459: MontgomeryIntegerPolynomialP256 multiply intrinsic with AVX2 on x86_64 [v4]
Volodymyr Paprotski
vpaprotski at openjdk.org
Mon Mar 24 17:29:08 UTC 2025
On Thu, 20 Mar 2025 17:34:53 GMT, Anthony Scarpino <ascarpino at openjdk.org> wrote:
>> I used it this testcase for development (and figured I should also check it in..) so what might be 'obvious' to me, might not be for anyone else?
>>
>> Typically, when a test failed, I grabbed the SEED from the test output, reran the test with that seed fixed and I went to the exception and printed the hex values of the inputs; (then debug from there. Typically, I would write another test, so I could GDB into the intrinsic, with just those input values).
>>
>> It was pretty much always the case always that once I got the inputs, I could reproduce the error i.e. not a type of bug that happens silently then discovered somewhere else. Luckily. All this crypto code is constant-time -no-branches-; so the 'test coverage' here is not 'all-branches-taken' but really 'did you remember to collect all the carries'. like 53-bit limb needs to be propagated back down to 52. Thats what the test here is 'searching' for, some input that could trip up computation.
>
> Can you add a comment to the test code about how you use the seed to reproduce any failures? So that in the future, someone who doesn't know will now have an idea how to start debugging this.
(was having fun reviewing MLDSA, getting back to this one..) just added some comments and hopefully better test error messages. Let me know if that works @ascarpino ?
-------------
PR Review Comment: https://git.openjdk.org/jdk/pull/23719#discussion_r2010632985
More information about the hotspot-dev
mailing list