[tahoe-lafs-trac-stream] [Tahoe-LAFS] #419: pycryptopp uses up too much RAM

Tahoe-LAFS trac at tahoe-lafs.org
Mon Jun 5 09:39:52 UTC 2017


#419: pycryptopp uses up too much RAM
-------------------------------+-------------------------------------------
     Reporter:  zooko          |      Owner:  nobody
         Type:  defect         |     Status:  reopened
     Priority:  minor          |  Milestone:  undecided
    Component:  code-encoding  |    Version:  1.0.0
   Resolution:                 |   Keywords:  memory pycryptopp performance
Launchpad Bug:                 |
-------------------------------+-------------------------------------------
Changes (by warner):

 * status:  closed => reopened
 * resolution:  fixed =>


Old description:

> Brian pointed out that the graph which shows the time to create a mutable
> ("SSK") file has shown a dramatic reduction in time recent:
>
> http://allmydata.org/tahoe-figleaf-graph/hanford.allmydata.com-
> tahoe_speedstats_SSK_creation.html
>
> The time to create an SSK is supposed to be dominated by the time to
> create a new RSA public/private keypair, which is a randomized process
> involving iteratively creating a big number and testing it for primality.
>
> Brian writes:
>
> {{{
> so, the munin performance graphs show a considerable speedup in mutable
> file creation time that occurred last tuesday around noon it affected
> both the colo and DSL tests, so I assume it was a code thing instead of a
> buildslave getting moved or something
>
> in addition, our 32-bit initial memory footprint went up by 6MB the only
> code change that appears relevant was the new reliance upon pycryptopp >=
> 0.5
>
> I can somewhat believe that the memory increase is due to the inclusion
> of the EC-DSA code but can you think of any reason why RSA key generation
> might have speed up by nearly a factor of 10?
> }}}

New description:

 Brian pointed out that the graph which shows the time to create a mutable
 ("SSK") file has shown a dramatic reduction in time recent:

 http://allmydata.org/tahoe-figleaf-graph/hanford.allmydata.com-
 tahoe_speedstats_SSK_creation.html

 The time to create an SSK is supposed to be dominated by the time to
 create a new RSA public/private keypair, which is a randomized process
 involving iteratively creating a big number and testing it for primality.

 Brian writes:

 {{{
 so, the munin performance graphs show a considerable speedup in mutable
 file creation time that occurred last tuesday around noon it affected both
 the colo and DSL tests, so I assume it was a code thing instead of a
 buildslave getting moved or something

 in addition, our 32-bit initial memory footprint went up by 6MB the only
 code change that appears relevant was the new reliance upon pycryptopp >=
 0.5

 I can somewhat believe that the memory increase is due to the inclusion of
 the EC-DSA code but can you think of any reason why RSA key generation
 might have speed up by nearly a factor of 10?
 }}}

--

Comment:

 Oops, I forgot to use the don't-close-Trac style of github commit message.
 This ticket might not be worth keeping around, but it shouldn't have been
 closed like that. Sorry!

--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/419#comment:12>
Tahoe-LAFS <https://Tahoe-LAFS.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list