Cc: ke.vigouroux@laposte.net, eggert@cs.ucla.edu, 40671@debbugs.gnu.org,
michael_heerdegen@web.de, mattiase@acm.org, rms@gnu.org
From: Dmitry Gutov <dgutov@yandex.ru>
Date: Sun, 26 Apr 2020 21:32:45 +0300
My point is, that program is using the same instrument as this one,
which *will* blow up at runtime.
No, it isn't the same instrument. Your program constructs a function
call using address that has no valid instructions. Paul's program
does nothing like that, it just attempts to write to a data address
which may or may not be in write-protected storage. So your program
will always blow up, whereas the other one will only blow up if the
memory is write-protected.