At Thu, 19 Jan 2006 14:48:00 +1100, Dean Hamstead wrote:
> in using Crypt::RandPasswd (::word() specifically), it doesnt seem at
> all mod_perl safe. there definately seems to be something that loops
> of and consumes all the web servers cpu.

From a quick glance through the Crypt::RandPasswd code, I don't see
anything that leaps out as being mod_perl unsafe.

To get an idea of where a mod_perl script is spinning, try the process
described here:
 http://perl.apache.org/docs/1.0/guide/debug.html#Using_the_Perl_Trace

If you can't work it out from that, post the resulting stacktrace here
and we can all have a bash at it.

-- 
 - Gus
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to