On 26.06.2014 13:15, Philip Martin wrote:
> Branko Čibej <br...@wandisco.com> writes:
>
>> On 26.06.2014 13:04, Philip Martin wrote:
>>
>> Yup, I've been looking at exactly this spot and I suspect that I need to
>> make a copy of the hash table into the correct pool.
>>> (gdb) p ht
>>> $1 = (apr_hash_t *) 0x7fffd8060c60
>>> (gdb) p ht[0]
>>> $2 = {pool = 0x7fffd8006470, array = 0x4141414141414141, iterator = {
>>>     ht = 0x4141414141414141, this = 0x4141414141414141, 
>>>     next = 0x4141414141414141, index = 1094795585}, count = 1094795585, 
>>>   max = 1094795585, seed = 1094795585, hash_func = 0x4141414141414141, 
>>>   free = 0x4141414141414141}
> I have pool debugging enabled and 0x41 is the poison byte that is used
> to overwrite memory before it is freed.

Should be fixed in r1605739.

-- Brane


-- 
Branko Čibej | Director of Subversion
WANdisco // Non-Stop Data
e. br...@wandisco.com

Reply via email to