This queue is for tickets about the Continuation-Escape CPAN distribution.

Report information
The Basics
Id:
87506
Status:
new
Priority:
Low/Low

People
Owner:
Nobody in particular
Requestors:
MAUKE [...] cpan.org
Cc:
AdminCc:

BugTracker
Severity:
Normal
Broken in:
0.03
Fixed in:
(no value)



Subject: Memory leak in call_cc
MIME-Version: 1.0
X-Mailer: MIME-tools 5.504 (Entity 5.504)
Content-Disposition: inline
X-RT-Interface: Web
Message-ID: <rt-4.0.16-3946-1375336718-1468.0-0-0@rt.cpan.org>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: binary
X-RT-Original-Encoding: utf-8
X-RT-Encrypt: 0
X-RT-Sign: 0
Content-Length: 323
There is a memory leak in call_cc: % ( ulimit -v $((100*1024)); perl -e 'use Continuation::Escape; call_cc {} for 0 .. 999999' ) Out of memory! For comparison, the same code using Return::MultiLevel works: % ( ulimit -v $((100*1024)); perl -e 'use Return::MultiLevel qw(with_return); with_return {} for 0 .. 999999' ) %


This service runs on Request Tracker, is sponsored by The Perl Foundation, and maintained by Best Practical Solutions.

Please report any issues with rt.cpan.org to rt-cpan-admin@bestpractical.com.