> > Unfortunately the lines that follow:
> > 
> >>       either sanitized by an external program to allow only trusted,
> >>       safe compilation and execution in the context of the application,
> > 
> > again make a reference to a purely theoretical "external program" that
> > is not going to exist in reality, and I made a fuss about that in another
> > subthread (sorry Siddhesh). We shouldn't speak as if this solution is
> > actually available to users.
> > 
> > I know this is not the main point of your email, but we came up with
> > a better wording for the compiler driver, and it would be good to align
> > this text with that.
> 
> How about:
> 
>     The libgccjit library can, despite the name, be used both for
>     ahead-of-time compilation and for just-in-compilation.  In both
>     cases it can be used to translate input representations (such as
>     source code) in the application context; in the latter case the
>     generated code is also run in the application context.
> 
>     Limitations that apply to the compiler driver, apply here too in
>     terms of sanitizing inputs and it is recommended that both the

I'd prefer 'trusting inputs' instead of 'sanitizing inputs' above.

>     compilation *and* execution context of the code are appropriately
>     sandboxed to contain the effects of any bugs in libgccjit, the
>     application code using it, or its generated code to the sandboxed
>     environment.

*thumbs up*

Thanks.
Alexander

Reply via email to