Joshua Branson, le sam. 27 févr. 2021 09:34:05 -0500, a ecrit: > Paul Dufresne <dufres...@zoho.com> writes: > > ---- Le ven., 26 févr. 2021 23:29:01 -0500 Jessica Clarke > > <jrt...@debian.org> écrit ---- > >> > > > I'd advise you to not delve too deeply into malloc. This is likely a > > > buffer overflow that then corrupts the (inline) state maintained by > > > malloc, so you really need to be looking at vim. > > > > > > Jess > > > > I have an idea. > > I could replace the assert by a printf of the address of the pointer. > > > > Then if I could generate a map of vim, I could figure out approximately > > that the buffer overflowing is just before that address? > > > > Frankly, not knowing exactly what I am doing... ;-) > > You may not know exactly what you're doing, but you are currently the > world's leading expert in fixing this particular bug. :) No offense > meant to other Hurd developers. They are just busy addressing other > issues.
That's the point indeed: better somebody not knowing what he's doing than nobody who would know what he's doing. Samuel