Stas Bekman wrote:
this is the problem with:

apr_uuid_t *uuid = (apr_uuid_t *)safemalloc(sizeof(apr_uuid_t));

which happens to be a perl call. I will post a patch for you test with shortly.

Steve, Randy, please test with this patch:


Index: src/modules/perl/mod_perl.c
===================================================================
RCS file: /home/cvs/modperl-2.0/src/modules/perl/mod_perl.c,v
retrieving revision 1.183
diff -u -r1.183 mod_perl.c
--- src/modules/perl/mod_perl.c 11 Sep 2003 18:10:39 -0000      1.183
+++ src/modules/perl/mod_perl.c 15 Sep 2003 18:44:40 -0000
@@ -41,7 +41,7 @@

     /* calculate our own random hash seed */
     if (!MP_init_hash_seed_set) {
-        apr_uuid_t *uuid = (apr_uuid_t *)safemalloc(sizeof(apr_uuid_t));
+        apr_uuid_t *uuid = (apr_uuid_t *)apr_palloc(p, sizeof(apr_uuid_t));
         char buf[APR_UUID_FORMATTED_LENGTH + 1];
         int i;



__________________________________________________________________
Stas Bekman            JAm_pH ------> Just Another mod_perl Hacker
http://stason.org/     mod_perl Guide ---> http://perl.apache.org
mailto:[EMAIL PROTECTED] http://use.perl.org http://apacheweek.com
http://modperlbook.org http://apache.org   http://ticketmaster.com


--------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]



Reply via email to