On 26.06.2014 13:15, Philip Martin wrote: > Branko Čibej <br...@wandisco.com> writes: > >> On 26.06.2014 13:04, Philip Martin wrote: >> >> Yup, I've been looking at exactly this spot and I suspect that I need to >> make a copy of the hash table into the correct pool. >>> (gdb) p ht >>> $1 = (apr_hash_t *) 0x7fffd8060c60 >>> (gdb) p ht[0] >>> $2 = {pool = 0x7fffd8006470, array = 0x4141414141414141, iterator = { >>> ht = 0x4141414141414141, this = 0x4141414141414141, >>> next = 0x4141414141414141, index = 1094795585}, count = 1094795585, >>> max = 1094795585, seed = 1094795585, hash_func = 0x4141414141414141, >>> free = 0x4141414141414141} > I have pool debugging enabled and 0x41 is the poison byte that is used > to overwrite memory before it is freed.
Should be fixed in r1605739. -- Brane -- Branko Čibej | Director of Subversion WANdisco // Non-Stop Data e. br...@wandisco.com