Linux Security Modules development
 help / color / mirror / Atom feed
* use per-cpu refcounts for apparmor labels?
@ 2023-09-22 21:19 Mateusz Guzik
  2023-09-25 23:49 ` [apparmor] " Vinicius Costa Gomes
  0 siblings, 1 reply; 5+ messages in thread
From: Mateusz Guzik @ 2023-09-22 21:19 UTC (permalink / raw)
  To: John Johansen; +Cc: apparmor, linux-security-module, linux-kernel

I'm sanity-checking perf in various microbenchmarks and I found
apparmor to be the main bottleneck in some of them.

For example: will-it-scale open1_processes -t 16, top of the profile:
  20.17%  [kernel]                   [k] apparmor_file_alloc_security
  20.08%  [kernel]                   [k] apparmor_file_open
  20.05%  [kernel]                   [k] apparmor_file_free_security
  18.39%  [kernel]                   [k] apparmor_current_getsecid_subj
[snip]

This serializes on refing/unrefing apparmor objs, sounds like a great
candidate for per-cpu refcounting instead (I'm assuming they are
expected to be long-lived).

I would hack it up myself, but I failed to find a clear spot to switch
back from per-cpu to centalized operation and don't want to put
serious effort into it.

Can you sort this out?

Thanks,
-- 
Mateusz Guzik <mjguzik gmail.com>

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2023-09-26 12:48 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-09-22 21:19 use per-cpu refcounts for apparmor labels? Mateusz Guzik
2023-09-25 23:49 ` [apparmor] " Vinicius Costa Gomes
2023-09-26  6:21   ` John Johansen
2023-09-26  6:38     ` Mateusz Guzik
2023-09-26 12:48       ` John Johansen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox