this is the problem with:
apr_uuid_t *uuid = (apr_uuid_t *)safemalloc(sizeof(apr_uuid_t));
which happens to be a perl call. I will post a patch for you test with shortly.
Steve, Randy, please test with this patch:
Index: src/modules/perl/mod_perl.c =================================================================== RCS file: /home/cvs/modperl-2.0/src/modules/perl/mod_perl.c,v retrieving revision 1.183 diff -u -r1.183 mod_perl.c --- src/modules/perl/mod_perl.c 11 Sep 2003 18:10:39 -0000 1.183 +++ src/modules/perl/mod_perl.c 15 Sep 2003 18:44:40 -0000 @@ -41,7 +41,7 @@
/* calculate our own random hash seed */ if (!MP_init_hash_seed_set) { - apr_uuid_t *uuid = (apr_uuid_t *)safemalloc(sizeof(apr_uuid_t)); + apr_uuid_t *uuid = (apr_uuid_t *)apr_palloc(p, sizeof(apr_uuid_t)); char buf[APR_UUID_FORMATTED_LENGTH + 1]; int i;
__________________________________________________________________ Stas Bekman JAm_pH ------> Just Another mod_perl Hacker http://stason.org/ mod_perl Guide ---> http://perl.apache.org mailto:[EMAIL PROTECTED] http://use.perl.org http://apacheweek.com http://modperlbook.org http://apache.org http://ticketmaster.com
--------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]