chicken-janitors
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Chicken-janitors] #981: entropy-unix from srfi-27 pegs the CPU afte


From: Chicken Trac
Subject: Re: [Chicken-janitors] #981: entropy-unix from srfi-27 pegs the CPU after /dev/urandom is accessed
Date: Sun, 10 Feb 2013 20:04:06 -0000

#981: entropy-unix from srfi-27 pegs the CPU after /dev/urandom is accessed
----------------------+-----------------------------------------------------
  Reporter:  andyjpb  |       Owner:  kon     
      Type:  defect   |      Status:  assigned
  Priority:  major    |   Milestone:  someday 
 Component:  unknown  |     Version:  4.8.x   
Resolution:           |    Keywords:          
----------------------+-----------------------------------------------------

Comment(by andyjpb):

 Thanks for looking into this Kon!

 How long did you leave csi at the {{{#;4>}}} prompt before quitting? Rough
 testing suggests that it won't peg the CPU for the first 60 seconds after
 the random source is first accessed. Leaving it at the prompt for that
 long is enough to let it trigger. In the compiled version the bug triggers
 after around six 'x's have appeared. 'x's continue to appear until the
 process is killed.


 When the bug happens, everything responds normally, except CPU utilisation
 goes up to 99.9% as measured in top. Perhaps it's spinning in a tight loop
 or something? It causes the fans on my machine to come on.

-- 
Ticket URL: <http://bugs.call-cc.org/ticket/981#comment:4>
Chicken Scheme <http://www.call-with-current-continuation.org/>
Chicken Scheme is a compiler for the Scheme programming language.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]