On Tue, Jun 7, 2011 at 11:48, Tom Lane <t...@sss.pgh.pa.us> wrote:
> Alex Hunsaker <bada...@gmail.com> writes:
>> On Mon, Jun 6, 2011 at 21:16, Robert Creager <robert.crea...@oracle.com> 
>> wrote:
>>> (gdb) bt
>>> #0  0x0000000100a505e4 in Perl_get_hash_seed ()
>>> #1  0x0000000100a69b94 in perl_parse ()
>
>> I don't suppose /dev/urandom blocks on OS X?
>
> The man page for it avers not, and besides it's hard to believe that
> there wouldn't be a libc routine or two on the stack if we were blocked
> in a kernel call,

Yeah.

> and also Robert showed that the process was consuming
> CPU time, so it's not blocked.  Tis puzzling if there's no loop in the
> function.

Well there is one, I snipped it out for brevity (I don't see how it
could be at fault):

const char *s = PerlEnv_getenv("PERL_HASH_SEED");
if (s)
   while (isSPACE(*s))
     s++;
if (s && isDIGIT(*s))
    myseed = (UV)Atoul(s);
else
{
  srand(Perl_seed());
  myseed = rand() *UV_MAX;
   ....
}

Im looking at the "raw" perl 5.10.0 source... I wonder if apple is
shipping a modified version?

-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to