RFR: 8317538: potential bottleneck in Provider::getService: specjvm2008::crypto.rsa have scalability issue for high vCPU numbers

Anthony Scarpino ascarpino at openjdk.org
Thu Oct 24 18:13:06 UTC 2024


On Mon, 21 Oct 2024 18:18:12 GMT, Vladimir Ivanov <vaivanov at openjdk.org> wrote:

> This patch remove access to the shared variable to fix scalability issue in the multithread environment.  According to testing by the specjvm2008::crypto.rsa the one thread performance reduced for less than 1% while the score for the multithread run increased in ~2x. For the 2 socket system with Xeon 8480+ numbers looks as: 
> - 1 thread: 643.15 for original version vs 642.54 for patched one;
> - 224 threads: 22446.19 for original vs 46147.41 for patched.
> 
> The RSABench microbenchmark reports no score changes for the 1 thread (average for all testcases) and 2.4% improvement for the 224 threads.

Did you see the same performance improvement with specjvm2008::crypto.aes?  I believe that should be running through this code as well unless there is something particular with RSA or any other asymmetric key.

-------------

PR Comment: https://git.openjdk.org/jdk/pull/21622#issuecomment-2436041987


More information about the security-dev mailing list