Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cache Security Algorithms For CRIU Startup #16888

Merged
merged 1 commit into from
Mar 17, 2023
Merged

Cache Security Algorithms For CRIU Startup #16888

merged 1 commit into from
Mar 17, 2023

Conversation

jasonkatonica
Copy link
Contributor

@jasonkatonica jasonkatonica commented Mar 13, 2023

When making use of the CRIU feature for a fast startup it has been found
that fetching algorithms is quite slow from the providers installed.

This update saves all algorithms available in all providers prior to
a checkpoint being taken. This cache then becomes available for callers
after a restore has taken place.

Any updates to the security providers order made via the Security
classes triggers the invalidation of this cache.

This update is needed for ibmruntimes/openj9-openjdk-jdk#565

Signed-off-by: Jason Katonica katonica@us.ibm.com

@jasonkatonica jasonkatonica changed the title Cache Algorithms For CRIU Startup WIP Cache Algorithms For CRIU Startup Mar 13, 2023
@jasonkatonica jasonkatonica changed the title WIP Cache Algorithms For CRIU Startup Cache Security Algorithms For CRIU Startup Mar 13, 2023
@jasonkatonica jasonkatonica marked this pull request as draft March 13, 2023 21:05
@jasonkatonica jasonkatonica marked this pull request as ready for review March 14, 2023 19:40
When making use of the CRIU feature for a fast startup it has been found
that fetching algorithms is quite slow from the providers installed.

This update saves all algorithms available in all providers prior to
a checkpoint being taken. This cache then becomes available for callers
after a restore has taken place.

Any updates to the security providers order made via the Security
classes triggers the invalidation of this cache.
@keithc-ca
Copy link
Contributor

Jenkins test sanity xlinux jdk17

jasonkatonica added a commit to jasonkatonica/openj9-openjdk-jdk11 that referenced this pull request Mar 17, 2023
that fetching algorithms is quite slow from the providers installed.

This update saves all algorithms available in all providers prior to
a checkpoint being taken. This cache then becomes available for callers
after a restore has taken place.

Any updates to the security providers order made via the Security
classes triggers the invalidation of this cache.

This update is dependent upon:

eclipse-openj9/openj9#16888

Signed-off-by: Jason Katonica katonica@us.ibm.com
jasonkatonica added a commit to jasonkatonica/openj9-openjdk-jdk17 that referenced this pull request Mar 17, 2023
that fetching algorithms is quite slow from the providers installed.

This update saves all algorithms available in all providers prior to
a checkpoint being taken. This cache then becomes available for callers
after a restore has taken place.

Any updates to the security providers order made via the Security
classes triggers the invalidation of this cache.

This update is dependent upon:

eclipse-openj9/openj9#16888

Signed-off-by: Jason Katonica katonica@us.ibm.com
jasonkatonica added a commit to jasonkatonica/openj9-openjdk-jdk11 that referenced this pull request Mar 17, 2023
When making use of the CRIU feature for a fast startup it has been found
that fetching algorithms is quite slow from the providers installed.

This update saves all algorithms available in all providers prior to
a checkpoint being taken. This cache then becomes available for callers
after a restore has taken place.

Any updates to the security providers order made via the Security
classes triggers the invalidation of this cache.

This update is dependent upon:

eclipse-openj9/openj9#16888

Signed-off-by: Jason Katonica katonica@us.ibm.com
jasonkatonica added a commit to jasonkatonica/openj9-openjdk-jdk17 that referenced this pull request Mar 17, 2023
When making use of the CRIU feature for a fast startup it has been found
that fetching algorithms is quite slow from the providers installed.

This update saves all algorithms available in all providers prior to
a checkpoint being taken. This cache then becomes available for callers
after a restore has taken place.

Any updates to the security providers order made via the Security
classes triggers the invalidation of this cache.

This update is dependent upon:

eclipse-openj9/openj9#16888

Signed-off-by: Jason Katonica katonica@us.ibm.com
jasonkatonica added a commit to jasonkatonica/openj9-openjdk-jdk11 that referenced this pull request Mar 17, 2023
When making use of the CRIU feature for a fast startup it has been found
that fetching algorithms is quite slow from the providers installed.

This update saves all algorithms available in all providers prior to
a checkpoint being taken. This cache then becomes available for callers
after a restore has taken place.

Any updates to the security providers order made via the Security
classes triggers the invalidation of this cache.

This update is dependent upon:

eclipse-openj9/openj9#16888

Signed-off-by: Jason Katonica katonica@us.ibm.com
jasonkatonica added a commit to jasonkatonica/openj9-openjdk-jdk17 that referenced this pull request Mar 17, 2023
When making use of the CRIU feature for a fast startup it has been found
that fetching algorithms is quite slow from the providers installed.

This update saves all algorithms available in all providers prior to
a checkpoint being taken. This cache then becomes available for callers
after a restore has taken place.

Any updates to the security providers order made via the Security
classes triggers the invalidation of this cache.

This update is dependent upon:

eclipse-openj9/openj9#16888

Signed-off-by: Jason Katonica katonica@us.ibm.com
@keithc-ca keithc-ca merged commit 9e9fe32 into eclipse-openj9:master Mar 17, 2023
@jasonkatonica jasonkatonica deleted the katonica/feature/cachegetalgorithms branch March 17, 2023 19:55
@pshipton
Copy link
Member

Is this change supposed to go into the 0.38 release? The extension changes went in, but not this one, so the builds are failing.

@tajila

@tajila
Copy link
Contributor

tajila commented Mar 27, 2023

Yes we need this in 0.38

@tajila
Copy link
Contributor

tajila commented Mar 27, 2023

@jasonkatonica Please open a PR for 0.38

@jasonkatonica
Copy link
Contributor Author

Just opened a PR against branch v0.38.0-release at #17031

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants