Josh Rosenberg added the comment:

In the event of calls back into Python code in multithreaded execution (or GIL 
release), this would mean you no longer have guarantees as to the contents (or 
even the validity) of the pointer you get back. I'd think the only safe way to 
accept mutable buffers would be to use the s*, z*, y* codes, which lock the 
buffer to prevent resize/destruction. Do we want to open segfault 
vulnerabilities in arbitrary functions?

----------
nosy: +josh.r

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue23001>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to