Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Determine what might be limiting # of parallel decrypts #241

Closed
BobWall23 opened this issue Jul 19, 2021 · 1 comment
Closed

Determine what might be limiting # of parallel decrypts #241

BobWall23 opened this issue Jul 19, 2021 · 1 comment
Assignees

Comments

@BobWall23
Copy link
Member

During TSP testing, it appears that ironoxide may be limiting the number of decrypt operations (which include a call to ironcore_id to fetch the transformed EDEK) that are being done in parallel.

Need to determine if there is something that is limiting the parallelism, or if it is something in the ironoxide consumer in the TSP.

@skeet70
Copy link
Member

skeet70 commented Jul 20, 2021

AES decrypts and Recrypt transforms were both happening in the decrypt future after the network DocumentGet for metadata comes back. This meant that the future was doing a big chunk of CPU heavy crypto work without yielding or doing anything special to accommodate it. We should have a PR soon that uses tokio::spawn_blocking to explicitly move that section of the future onto a threadpool for heavy stuff, allowing the normal threadpool to keep cranking on the network work. This immediately improved CPU utilization.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants