Skip Menu |
 
rt.cpan.org will be shut down on March 1st, 2021.

This queue is for tickets about the DBM-Deep CPAN distribution.

Report information
The Basics
Id: 103795
Status: new
Priority: 0/
Queue: DBM-Deep

People
Owner: Nobody in particular
Requestors: s.evan.staton [...] gmail.com
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



Subject: Memory link in hash storage with version 2.0011
Date: Fri, 17 Apr 2015 12:07:14 -0700
To: bug-DBM-Deep [...] rt.cpan.org
From: Evan Staton <s.evan.staton [...] gmail.com>
Download (untitled) / with headers
text/plain 535b
I have discovered a memory leak when using a tied hash or the OO interface. Here is a simple example to demonstrate this behavior: use strict; use warnings; use DBM::Deep; my $dbm = "does_leak.dbm"; my $db = DBM::Deep->new( $dbm ); open my $list, '-|', 'cat /usr/share/dict/words' or die $!; while (my $word = <$list>) { chomp $word; $db->{$word} = 1; } close $list; I previously posted this to the github issues, sorry for the double posting. I'd be happy to create a test or provide more information. Thanks, Evan


This service is sponsored and maintained by Best Practical Solutions and runs on Perl.org infrastructure.

Please report any issues with rt.cpan.org to rt-cpan-admin@bestpractical.com.