1. 41
    1. 1

      Maybe this is a dummy question, but:

      we depend on operating system features to share as much memory between instances as we can,

      Isn’t this a potential attack vector? Depends on a bug on the underlying system, but, still?

      1. 3

        Everything is an attack vector.

      2. 2

        Sure, if there is a bug in e.g. Linux’s MAP_PRIVATE implementation then it could become an attack vector. If that tradeoff doesn’t make sense for someone then the feature can be disabled.