Performance impact
Performance impact
Posted Aug 8, 2022 22:57 UTC (Mon) by Cyberax (✭ supporter ✭, #52523)In reply to: Performance impact by cschaufler
Parent article: Security requirements for new kernel features
AppArmor in Ubuntu is a bit more sane, because it doesn't require crazy labelling and impenetrable policies.
> And there's every cloud provider
Not every. And I know how one large provider works internally (a couple of years outdated, but I doubt it has changed much).
Heck, here's what EC2 offers for their own supported in-house distribution:
> [ec2-user@ip-172-31-0-166 ~]$ getenforce
> Disabled
> When we search our souls it's not about whether we should do a better job of getting out of the way, it's about how we can provide more of the features developers are screaming for and still maintain performance.
How long did it take to build stackable LSMs? For a decade the inability to run multiple LSMs made anything but SELinux/AppArmor impractical.
Sorry. But right now LSMs are just an impediment that most people try to wave away so it won't bother them. Large companies like Google have time and money to invest in getting it into shape, sure. But that's a far cry from being a useful and productive feature. Unlike cgroups or namespaces that are widely accepted by developers.
