X-Debbugs-CC: [EMAIL PROTECTED]

Sorry for the selfreply, but I forgot to attach the valgrind trace.

Here it is. The offending access seems to be in the GC:

==16702== Invalid read of size 4
==16702==    at 0x4065770: gc_mark (gc.c:723)
==16702==    by 0x4065648: gc_mark_children (gc.c:982)
==16702==    by 0x4046365: blk_mark (eval.c:8075)
==16702==    by 0x40652FF: gc_mark_children (gc.c:950)
==16702==    by 0x4065860: mark_entry (gc.c:656)
==16702==    by 0x40B2AC8: st_foreach (st.c:482)
==16702==    by 0x4064E0D: mark_tbl (gc.c:666)
==16702==    by 0x406569A: gc_mark_children (gc.c:916)
==16702==    by 0x406583D: mark_keyvalue (gc.c:683)
==16702==    by 0x40B2AC8: st_foreach (st.c:482)
==16702==    by 0x4064DBD: mark_hash (gc.c:693)
==16702==    by 0x40655B4: gc_mark_children (gc.c:937)
==16702==  Address 0x40 is not stack'd, malloc'd or (recently) free'd



Regards, David

-- 
You can have your application built cheaply, quickly, or well. Pick two.

Attachment: puppet.log.gz
Description: GNU Zip compressed data

Reply via email to