File tree Expand file tree Collapse file tree 2 files changed +6
-5
lines changed
Expand file tree Collapse file tree 2 files changed +6
-5
lines changed Original file line number Diff line number Diff line change @@ -390,11 +390,12 @@ Initializing and finalizing the interpreter
390390 time (without calling :c:func: `Py_Initialize ` again first). Normally the
391391 return value is ``0``. If there were errors during finalization
392392 (flushing buffered data), ``-1`` is returned.
393-
393+
394394 Note that Python will do a best effort at freeing all memory allocated by the Python
395395 interpreter. Therefore, any C-Extension should make sure to correctly clean up all
396396 of the preveiously allocated PyObjects before using them in subsequent calls to
397- `Py_Initialize`. Otherwise it introduces vulnerabilities and incorrect behavior.
397+ :c:func:`Py_Initialize`. Otherwise it could introduce vulnerabilities and incorrect
398+ behavior.
398399
399400 This function is provided for a number of reasons. An embedding application
400401 might want to restart Python without having to restart the application itself.
Original file line number Diff line number Diff line change @@ -1366,10 +1366,10 @@ New Features
13661366* Modified :c:func: `_PyUnicode_ClearInterned ` function to always delete all
13671367 interned strings during a call to :c:func: `Py_Finalize `. This makes all
13681368 is backwards incompatible to any C-Extension that holds onto an interned
1369- string after a call to c:func: `Py_Finalize ` and is then reused after a
1370- call to c:func: `Py_Initialize `. Any issues arising from this behavior will
1369+ string after a call to : c:func: `Py_Finalize ` and is then reused after a
1370+ call to : c:func: `Py_Initialize `. Any issues arising from this behavior will
13711371 normally result in crashes during the exectuion of the subsequent call to
1372- c:func: `Py_Initatilize ` from accessing uninitialized memory. To fix, use
1372+ : c:func: `Py_Initatilize ` from accessing uninitialized memory. To fix, use
13731373 an address sanitizer (i.e. ASAN) to identify any use-after-free coming from
13741374 an interned string and deallocate it during module shutdown.
13751375 (Contribued by Eddie Elizondo in :gh: `113601 `.)
You can’t perform that action at this time.
0 commit comments