Jens Rieks <[EMAIL PROTECTED]> wrote:

> The following code crashes parrot if run with -t (trace).

Fixed.

That was not an easy one. A slightly wrong implementation (braino
courtesy of leo) did reset interpreter->lo_var_ptr (the stack limit),
when reentering the run loop, e.g. in object's __init calls.

This lead to memory corruption if a DOD or GC was triggered inside the
method call. During tracing, a lot of string handling is done, which
sooner or later always exposed the bug.

> jens

leo

Reply via email to