[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#249510: acknowledged by developer (selinux in debian kernel)



On Wed, Sep 29, 2004 at 11:47:20PM +0200, Christoph Hellwig wrote:
> On Wed, Sep 29, 2004 at 10:54:21PM +0100, Luke Kenneth Casson Leighton wrote:
> > On Wed, Sep 29, 2004 at 10:33:28PM +0200, Christoph Hellwig wrote:
> > > On Wed, Sep 29, 2004 at 09:14:20PM +0100, Luke Kenneth Casson Leighton wrote:
> > > > it's not a severe performance penalty.
> > > > 
> > > > especially when it's disabled by default with "selinux=0".
> > > 
> > > Yes, all the indirect calls due to CONFIG_SECURITY are a performance
> > > penalty.
> >  
> >  ... of about 2%.
> > 
> >  sufficiently insignificant for both redhat _and_ suse to have
> >  started shipping, six months ago, kernels with selinux compiled in and
> >  disabled by default.
> 
> It's more like 5% for the benchmarks I've seen (from HP), and yes, they
> complained to SuSE loudly because of that.
 
 2%, 5% - it's not 10% and it's not 20% is is?

 20%+ is a severe performance penalty.

 ... what's the cutoff point at which a decision can be made
 to encourage people to take security seriously rather than
 to believe speed is all-important?

 if people _desperately_ need their 5% performance back, they
 can compile the kernel - and all applications - with gcc 3.4
 or greater, using arguments specifically tailored for their
 architecture, and they can use prelink.

 that way they will get, like the new yoper distribution and like
 gentoo, a whopping great performance boost.

 l.

-- 
--
Truth, honesty and respect are rare commodities that all spring from
the same well: Love.  If you love yourself and everyone and everything
around you, funnily and coincidentally enough, life gets a lot better.
--
<a href="http://lkcl.net";>      lkcl.net      </a> <br />
<a href="mailto:lkcl@lkcl.net";> lkcl@lkcl.net </a> <br />




Reply to: