Message260918
| Author |
eric.fahlgren |
| Recipients |
Barun Parruck, eric.fahlgren, llllllllll |
| Date |
2016年02月27日.04:34:10 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1456547650.7.0.389919617824.issue26448@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
Well, now that I'm thinking about it, you could synthesize a bytecode stream trivially and have a much better test. This is completely off the top of my head, so take it is guaranteed to (probably) not work as written, but it should get you started:
from opcodes import *
import dis
bytecode = (
chr(EXTENDED_ARG) + chr(1) + chr(0) +
chr(JUMP_IF_TRUE_OR_POP) + chr(0) + chr(0)
)
print(dis.findlabels(bytecode)) |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2016年02月27日 04:34:10 | eric.fahlgren | set | recipients:
+ eric.fahlgren, llllllllll, Barun Parruck |
| 2016年02月27日 04:34:10 | eric.fahlgren | set | messageid: <1456547650.7.0.389919617824.issue26448@psf.upfronthosting.co.za> |
| 2016年02月27日 04:34:10 | eric.fahlgren | link | issue26448 messages |
| 2016年02月27日 04:34:10 | eric.fahlgren | create |
|