[Larceny-users] Weak references

William D Clinger will at ccs.neu.edu
Tue Jul 24 11:02:34 EDT 2007

David Rush wrote:
> Are there weak references in there that can be exploited by an application?

I don't think the current code base contains any form
of weak references, unless you count gctwa.

Weak references would be pretty easy to implement,
however.  Why don't you point me to your preferred
API for weak references, so I can respond with an
implementation of it?

(I'll respond to your FFI questions later; they're
harder to answer.)


More information about the Larceny-users mailing list