New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Memleak in conversion for univariate polynomial rings #8444
Comments
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
comment:5
Sage-4.3.3 does not have this problem on my mac running 10.6.2. |
comment:6
For the record: Gonzalo Tornaria stated at sage-devel: "I think this is caused by a duplicate _sig_on in the bottom part of pari. |
Attachment: trac_8444.fix_pari_memleak.patch.gz fix memory leak due to dup call to _sig_on |
Changed keywords from univariate polynomial ring coercion to univariate polynomial ring coercion, pari, sig_on |
Author: Gonzalo Tornaria |
comment:7
The attached patch seems to fix the memleak. I worked on top of 4.3.3; all tests pass with this patch, and the snippet in the ticket description goes through without extra allocations:
Here's the full commit log which explains the patch: #8444: fix memory leak due to dup call to At the bottom of A double The patch is one-liner: removing the first Note: this line was added by changeset |
Reviewer: Paul Zimmermann |
comment:8
Dear Gonzalo, great work! It is very important to fix such issues, thanks a lot. Paul |
comment:9
Merged "trac_8444.fix_pari_memleak.patch" into 4.4.alpha0. |
Merged: sage-4.4.alpha0 |
Changed author from Gonzalo Tornaria to Gonzalo Tornaría |
At sage-support, Ben Linowitz reported a problem with memory. Apparently it boils down to the following problem:
This is with sage 4.3.3 on sage.math.
So, the first 6673 everything is good. Then, regularly after 2112 rounds there is a leak of 135168 Byte. As Yann has observed, we have
135168==2112*64
. Thus it seems that the memory is allocated in chunks, but the leak is 64 Byte in each round.The leak does not occur for multivariate rings:
Component: memleak
Keywords: univariate polynomial ring coercion, pari, sig_on
Author: Gonzalo Tornaría
Reviewer: Paul Zimmermann
Merged: sage-4.4.alpha0
Issue created by migration from https://trac.sagemath.org/ticket/8444
The text was updated successfully, but these errors were encountered: