The workaround destroys the output of dmalloc, so I see things like
Error: %s (err %d)
and
%ld: %lu: Warning tried to free (0) from '%s'
%ld: %lu: error details: %s
%ld: %lu: pointer '%#lx' from '%s' prev access '%s'
none of which is particularly usefull, and I might as well not be using
dma
I confirm this.
You can compile dmalloc with
./configure ac_cv_func_vsnprintf=no ac_cv_func_vprintf=no
if you don't want to patch source.
Anyway, it's an upstream bug.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
The bug is related to the call to libc's vsnprintf in compat.c on line
145.. Commenting out all the calls to vsnprintf and leaving it to use
the string copy works fine on the tests I have run.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
** Changed in: dmalloc (Ubuntu)
Importance: Undecided => High
** Changed in: dmalloc (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/971174
Title:
segfault o