X-Debbugs-CC: [EMAIL PROTECTED] Sorry for the selfreply, but I forgot to attach the valgrind trace.
Here it is. The offending access seems to be in the GC: ==16702== Invalid read of size 4 ==16702== at 0x4065770: gc_mark (gc.c:723) ==16702== by 0x4065648: gc_mark_children (gc.c:982) ==16702== by 0x4046365: blk_mark (eval.c:8075) ==16702== by 0x40652FF: gc_mark_children (gc.c:950) ==16702== by 0x4065860: mark_entry (gc.c:656) ==16702== by 0x40B2AC8: st_foreach (st.c:482) ==16702== by 0x4064E0D: mark_tbl (gc.c:666) ==16702== by 0x406569A: gc_mark_children (gc.c:916) ==16702== by 0x406583D: mark_keyvalue (gc.c:683) ==16702== by 0x40B2AC8: st_foreach (st.c:482) ==16702== by 0x4064DBD: mark_hash (gc.c:693) ==16702== by 0x40655B4: gc_mark_children (gc.c:937) ==16702== Address 0x40 is not stack'd, malloc'd or (recently) free'd Regards, David -- You can have your application built cheaply, quickly, or well. Pick two.
puppet.log.gz
Description: GNU Zip compressed data