Native code sandboxing: 1. Run code userland. Use virtual mem + syscalls to isolate the process 2. Compile to wasm and run in-kernel --syscall overhead ++bounds checks. Which would get better perf? Is it app dependant? I'd love to see stats + make the choice myself
And yeah, perf + security are more complicated. - Can you protect against spectre with (2)? - POSIX processes are a crap security model for apps - In-kernel means we can use a more fine-grained kernel API. We can improve on POSIX perf if syscalls + context switching was cheaper.