Hello,

The story about seccomp is that as long as there are users CPUShare
will support it because it's a more efficient and more secure
computing model.

About the seccomp overhead, that is zero. It adds zero overhead to the
fast path of the scheduler. It never added any overhead on x86-64. For
x86 I added a tsc_disable feature that wasn't zero overhead initially
and so that was used as argument against seccomp (despite it really
had little to do with the seccomp core), it is zero overhead now that
I optimized that little tsc_disable feature.

So you can always enable seccomp on x86-64 without performance
worries (I guess it only adds an hundred byte of .text).

On x86 you can enable seccomp as safely as on x86-64 if you find a
TIF_NOTSC implemented in your x86 32bit kernel. TIF_NOTSC is zerocost
and so after implementing TIF_NOTSC, I changed seccomp to use it to
avoid any overhead in all archs.

In the latest kernels the only overhead generated by seccomp is a bit
larger .text image, everything else is false or obsolete.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to