Oracle Corporation
Identifying permitted illegal access operations in a module system

Last updated:

Abstract:

Techniques for identifying permitted illegal access operations in a module system are disclosed. An operation, expressed in a first module, that attempts to access a module element of a second module is identified. Based on a module declaration associated with the second module, the module element is determined inaccessible to the first module. Additionally or alternatively, based on an access modifier associated with the module element, the module element is determined inaccessible to the operation. The operation is determined as an illegal access operation. The illegal access operation is permitted to access the module element. A warning corresponding to the illegal access operation is generated.

Status:
Grant
Type:

Utility

Filling date:

17 Oct 2017

Issue date:

24 Nov 2020