question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Potentially unsafe implementations of method-based entrypoints

See original GitHub issue

The current language adapter creates an entrypoint from methods with proxies. However, the invocation handler delegates all calls, meaning if the entrypoint created was called with e.g. hashCode (such as adding to a hash set) something wrong may happen. In addition, default methods from entrypoint interfaces are broken as well.

I have looked into using lambdas, but it appears that lambdas need tricky access and cannot be used properly after the introduction of hidden classes (cannot obtain lookups easily).

Guess a better solution for this is that we write our own asm class generator in the future.

Issue Analytics

  • State:closed
  • Created 3 years ago
  • Reactions:2
  • Comments:5 (5 by maintainers)

github_iconTop GitHub Comments

1reaction
Technici4ncommented, May 28, 2021

assuming we make loader use java 16 as well

that’s not planned right now. https://fabricmc.net/2021/05/27/117-for-developers.html

0reactions
liachcommented, May 28, 2021

Yeah, the plan a while ago is to create a java 16 component like a loader plugin to support those advanced functionalities.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Performance Improvements in .NET 7
NET 7 is fast. Really fast. This post deep-dives into hundreds of performance improvements that contributed to that reality.
Read more >
40 CFR Part 63 Subpart CC -- National Emission ... - eCFR
(a) This subpart applies to petroleum refining process units and to related emissions points that are specified in paragraphs (c)(1) through (9) of...
Read more >
Army Public Health Program
This pamphlet provides implementing guidance for the public health ... potentially harmful occupational and environmental agents and data ...
Read more >
Implementing a Zero Trust Security Model - Portnox
The zero trust security model focuses on three key components: user/application authentication, device authentication, and trust score.
Read more >
A survey on COVID-19 impact in the healthcare domain - NCBI
This research paper analyses the advancement of IoMT implementation in addressing various healthcare concerns from the perspectives of enabling ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found