Mill Computing, Inc. Forums The Mill Architecture The Belt Reply To: The Belt

Post count: 98

1. Yes we make sure that results don’t end up in the wrong frame and that results that are in-flight when a function returns are discarded. How this happens is implementation-specific; there are several approaches that could be used.

2. If the Bad Guy can create ‘fake’ functions etc then its already game-over 🙁 The Mill contains novel hardware protection mechanism to prevent vulnerabilities being exploitable. More in the Security Talk.

3. I am hopeful we can have real tail-calls on the Mill 🙂