Hi Michael,
Love the overall idea. A few thoughts (feel free to ignore as I'm by no
means an expert in the VM).
* Is there a risk that Gargantuan can expand to infinite size?
* I'm really nervous about the security implications of being able to load
an arbitrary byte[] that can be executed as a
Hi Michael,
In the JEP's description you write:
/"The loadCode method creates a method from the passed bytecode
instructions and constants and returns a MethodHandle that can be
used to call the method. The implementation of loadCode will take
care of verification of the code to load
Hi Michael,
On 08/09/2016 02:05 PM, Peter Levart wrote:
In which case would lookup privileges be insufficient to define an
isolated method? I would expect the privileges of the code in the
isolated method to be checked when such method is executed and not
when defining such method - lazily, l