Message232246
In the event of calls back into Python code in multithreaded execution (or GIL release), this would mean you no longer have guarantees as to the contents (or even the validity) of the pointer you get back. I'd think the only safe way to accept mutable buffers would be to use the s*, z*, y* codes, which lock the buffer to prevent resize/destruction. Do we want to open segfault vulnerabilities in arbitrary functions? |
|
Date |
User |
Action |
Args |
2014-12-06 15:55:29 | josh.r | set | recipients:
+ josh.r, serhiy.storchaka |
2014-12-06 15:55:28 | josh.r | set | messageid: <1417881328.98.0.646919280576.issue23001@psf.upfronthosting.co.za> |
2014-12-06 15:55:28 | josh.r | link | issue23001 messages |
2014-12-06 15:55:28 | josh.r | create | |
|