Mill Computing, Inc. › Forums › The Mill › Architecture › The Belt › Reply To: The Belt
December 21, 2014 at 1:11 pm
Post count: 98
1. Yes we make sure that results don’t end up in the wrong frame and that results that are in-flight when a function returns are discarded. How this happens is implementation-specific; there are several approaches that could be used.
2. If the Bad Guy can create ‘fake’ functions etc then its already game-over 🙁 The Mill contains novel hardware protection mechanism to prevent vulnerabilities being exploitable. More in the Security Talk.
3. I am hopeful we can have real tail-calls on the Mill 🙂