Re: RFC: seccomp-bpf support - Mailing list pgsql-hackers

From Andres Freund
Subject Re: RFC: seccomp-bpf support
Date
Msg-id 20190828194905.sjy2jsqiw3wsact4@alap3.anarazel.de
Whole thread Raw
In response to Re: RFC: seccomp-bpf support  (Joshua Brindle <joshua.brindle@crunchydata.com>)
List pgsql-hackers
Hi,

On 2019-08-28 15:38:11 -0400, Joshua Brindle wrote:
> It seems like complete system compromises should be prioritized over
> slowdowns, and it seems very unlikely to cause a noticeable slowdown
> anyway.

The point isn't really this specific issue, but that the argument that
you'll not cause problems by disabling certain syscalls, or that it's
easy to find which ones are used, just plainly isn't true.


> Are there PG users that backed out all of the Linux KPTI patches due
> to the slowdown?

Well, not backed out on a code level, but straight out disabled at boot
time (i.e. pti=off)? Yea, I know of several.


> I think we need to reign in the thread somewhat. The feature allows
> end users to define some sandboxing within PG. Nothing is being forced
> on anyone

Well, we'll have to deal with the fallout of this to some degree. When
postgres breaks people will complain, when it's slow, people will
complain, ...

Greetings,

Andres Freund



pgsql-hackers by date:

Previous
From: Thomas Munro
Date:
Subject: Re: RFC: seccomp-bpf support
Next
From: Taylor Vesely
Date:
Subject: Re: Memory-Bounded Hash Aggregation