* bug#20079: Fwd: Memory leak from seek/ftell with files larger than 2GB [not found] <CAFNjtaA+apdrw3dhze-jSQ-Qo9j9jWpDmD=BwKCvC1DWc14=8Q@mail.gmail.com> @ 2015-03-11 12:38 ` Anand Mohanadoss 2016-06-23 12:22 ` Andy Wingo 2016-06-23 13:01 ` Andy Wingo 0 siblings, 2 replies; 4+ messages in thread From: Anand Mohanadoss @ 2015-03-11 12:38 UTC (permalink / raw) To: 20079 [-- Attachment #1: Type: text/plain, Size: 2013 bytes --] Hi, I had sent the following to the user forum and did not receive any comments. I am reposting it in the bug forum with the hope that one of the experts may be able to comment... Thanks, Anand ---------- Forwarded message ---------- From: Anand Mohanadoss <anand108@gmail.com> Date: Wed, Feb 25, 2015 at 9:35 PM Subject: Memory leak from seek/ftell with files larger than 2GB To: guile-user@gnu.org Hi, We are seeing an issue with seek and ftell leaking memory with files larger than 2GB. We are using 2.0.11 guile built as a 32-bit application with large file support enabled (guile was built using gcc 4.4.0 for Linux with flags _FILE_OFFSET_BITS=64, _LARGEFILE_SOURCE and _LARGEFILE64_SOURCE). The issue also appears to happen with guile 2.2. The memory leaks start only after the offset exceeds maximum positive value for a 32-bit signed integer. ftell and seek do work as expected (given how lseek should work with large file support). Appended is a program that illustrates the problem. The first seek simply skips the part of the file where you won't see a memory leak. If you comment out ftell and the second seek lines and un-comment the lines that follow them, there is no memory leak. Is this a bug in guile or should we be doing things differently? If this is a known issue, is there a recommended work around? Thanks, Anand (define MAX_SIGNED_INT 2147483647) (define BYTES_TO_READ 10) (define file "/tmp/test.pcap") ;sample file greater than 2.5GB (define (traverse file) (let* ((port (open-input-file file #:binary #t)) (file-sz (stat:size (stat port))) (ua (make-bytevector BYTES_TO_READ 0)) (cur-offset 0)) (seek port (- MAX_UNSIGNED_INT 1000) SEEK_CUR) (while (< (ftell port) (- file-sz BYTES_TO_READ)) ;(while (< cur-offset (- file-sz BYTES_TO_READ)) (seek port BYTES_TO_READ SEEK_CUR) ;(get-bytevector-n! port ua 0 BYTES_TO_READ) (set! cur-offset (+ BYTES_TO_READ cur-offset))) (close-port port))) (traverse file) [-- Attachment #2: Type: text/html, Size: 2757 bytes --] ^ permalink raw reply [flat|nested] 4+ messages in thread
* bug#20079: Fwd: Memory leak from seek/ftell with files larger than 2GB 2015-03-11 12:38 ` bug#20079: Fwd: Memory leak from seek/ftell with files larger than 2GB Anand Mohanadoss @ 2016-06-23 12:22 ` Andy Wingo 2016-06-23 13:01 ` Andy Wingo 1 sibling, 0 replies; 4+ messages in thread From: Andy Wingo @ 2016-06-23 12:22 UTC (permalink / raw) To: Anand Mohanadoss; +Cc: 20079 [-- Attachment #1: Type: text/plain, Size: 55 bytes --] Very strange bug! I can reproduce it with this file: [-- Attachment #2: run as "guile foo.scm" --] [-- Type: text/plain, Size: 578 bytes --] (use-modules (rnrs bytevectors) (ice-9 binary-ports)) (define MAX_SIGNED_INT 2147483647) (define BYTES_TO_READ 10) (define (traverse port) (let* ((file-sz (stat:size (stat port))) (ua (make-bytevector BYTES_TO_READ 0)) (cur-offset 0)) (let lp ((cur-offset (seek port (- MAX_SIGNED_INT 1000) SEEK_CUR))) (when (< cur-offset (- file-sz BYTES_TO_READ)) (lp (seek port BYTES_TO_READ SEEK_CUR)))) (close-port port))) (define port (mkstemp! (string-copy "/tmp/big-file-XXXXXX"))) (truncate-file port #e2.5e9) (traverse port) [-- Attachment #3: Type: text/plain, Size: 2163 bytes --] I wonder what it could be! Andy On Wed 11 Mar 2015 13:38, Anand Mohanadoss <anand108@gmail.com> writes: > Hi, > > I had sent the following to the user forum and did not receive any > comments. I am reposting it in the bug forum with the hope that one of > the experts may be able to comment... > > Thanks, > Anand > > ---------- Forwarded message ---------- > From: Anand Mohanadoss <anand108@gmail.com> > Date: Wed, Feb 25, 2015 at 9:35 PM > Subject: Memory leak from seek/ftell with files larger than 2GB > To: guile-user@gnu.org > > Hi, > > We are seeing an issue with seek and ftell leaking memory with files > larger than 2GB. > > We are using 2.0.11 guile built as a 32-bit application with large > file support enabled (guile was built using gcc 4.4.0 for Linux with > flags _FILE_OFFSET_BITS=64, _LARGEFILE_SOURCE and _ > LARGEFILE64_SOURCE). The issue also appears to happen with guile 2.2. > > The memory leaks start only after the offset exceeds maximum positive > value for a 32-bit signed integer. ftell and seek do work as expected > (given how lseek should work with large file support). > > Appended is a program that illustrates the problem. The first seek > simply skips the part of the file where you won't see a memory leak. > If you comment out ftell and the second seek lines and un-comment the > lines that follow them, there is no memory leak. > > Is this a bug in guile or should we be doing things differently? If > this is a known issue, is there a recommended work around? > > Thanks, > Anand > > (define MAX_SIGNED_INT 2147483647) > (define BYTES_TO_READ 10) > > (define file "/tmp/test.pcap") ;sample file greater than 2.5GB > > (define (traverse file) > (let* ((port (open-input-file file #:binary #t)) > (file-sz (stat:size (stat port))) > (ua (make-bytevector BYTES_TO_READ 0)) > (cur-offset 0)) > (seek port (- MAX_UNSIGNED_INT 1000) SEEK_CUR) > (while (< (ftell port) (- file-sz BYTES_TO_READ)) > ;(while (< cur-offset (- file-sz BYTES_TO_READ)) > (seek port BYTES_TO_READ SEEK_CUR) > ;(get-bytevector-n! port ua 0 BYTES_TO_READ) > (set! cur-offset (+ BYTES_TO_READ cur-offset))) > (close-port port))) > > (traverse file) ^ permalink raw reply [flat|nested] 4+ messages in thread
* bug#20079: Fwd: Memory leak from seek/ftell with files larger than 2GB 2015-03-11 12:38 ` bug#20079: Fwd: Memory leak from seek/ftell with files larger than 2GB Anand Mohanadoss 2016-06-23 12:22 ` Andy Wingo @ 2016-06-23 13:01 ` Andy Wingo 2016-06-23 14:43 ` Anand Mohanadoss 1 sibling, 1 reply; 4+ messages in thread From: Andy Wingo @ 2016-06-23 13:01 UTC (permalink / raw) To: Anand Mohanadoss; +Cc: 20079-done Hi, Thank you very much for this one! Turns out we had an incredibly embarrassing bug in which we forgot to attach finalizers for bignums created by scm_from_{uint64,int64} on 32-bit platforms. Fixed in master and stable-2.0. Cheers, Andy On Wed 11 Mar 2015 13:38, Anand Mohanadoss <anand108@gmail.com> writes: > Hi, > > I had sent the following to the user forum and did not receive any > comments. I am reposting it in the bug forum with the hope that one of > the experts may be able to comment... > > Thanks, > Anand > > ---------- Forwarded message ---------- > From: Anand Mohanadoss <anand108@gmail.com> > Date: Wed, Feb 25, 2015 at 9:35 PM > Subject: Memory leak from seek/ftell with files larger than 2GB > To: guile-user@gnu.org > > Hi, > > We are seeing an issue with seek and ftell leaking memory with files > larger than 2GB. > > We are using 2.0.11 guile built as a 32-bit application with large > file support enabled (guile was built using gcc 4.4.0 for Linux with > flags _FILE_OFFSET_BITS=64, _LARGEFILE_SOURCE and _ > LARGEFILE64_SOURCE). The issue also appears to happen with guile 2.2. > > The memory leaks start only after the offset exceeds maximum positive > value for a 32-bit signed integer. ftell and seek do work as expected > (given how lseek should work with large file support). > > Appended is a program that illustrates the problem. The first seek > simply skips the part of the file where you won't see a memory leak. > If you comment out ftell and the second seek lines and un-comment the > lines that follow them, there is no memory leak. > > Is this a bug in guile or should we be doing things differently? If > this is a known issue, is there a recommended work around? > > Thanks, > Anand > > (define MAX_SIGNED_INT 2147483647) > (define BYTES_TO_READ 10) > > (define file "/tmp/test.pcap") ;sample file greater than 2.5GB > > (define (traverse file) > (let* ((port (open-input-file file #:binary #t)) > (file-sz (stat:size (stat port))) > (ua (make-bytevector BYTES_TO_READ 0)) > (cur-offset 0)) > (seek port (- MAX_UNSIGNED_INT 1000) SEEK_CUR) > (while (< (ftell port) (- file-sz BYTES_TO_READ)) > ;(while (< cur-offset (- file-sz BYTES_TO_READ)) > (seek port BYTES_TO_READ SEEK_CUR) > ;(get-bytevector-n! port ua 0 BYTES_TO_READ) > (set! cur-offset (+ BYTES_TO_READ cur-offset))) > (close-port port))) > > (traverse file) ^ permalink raw reply [flat|nested] 4+ messages in thread
* bug#20079: Fwd: Memory leak from seek/ftell with files larger than 2GB 2016-06-23 13:01 ` Andy Wingo @ 2016-06-23 14:43 ` Anand Mohanadoss 0 siblings, 0 replies; 4+ messages in thread From: Anand Mohanadoss @ 2016-06-23 14:43 UTC (permalink / raw) To: Andy Wingo; +Cc: 20079-done [-- Attachment #1: Type: text/plain, Size: 2626 bytes --] Hi Andy, Thanks a lot for the fix! Anand On Thu, Jun 23, 2016 at 6:31 PM, Andy Wingo <wingo@pobox.com> wrote: > Hi, > > Thank you very much for this one! Turns out we had an incredibly > embarrassing bug in which we forgot to attach finalizers for bignums > created by scm_from_{uint64,int64} on 32-bit platforms. Fixed in master > and stable-2.0. > > Cheers, > > Andy > > On Wed 11 Mar 2015 13:38, Anand Mohanadoss <anand108@gmail.com> writes: > > > Hi, > > > > I had sent the following to the user forum and did not receive any > > comments. I am reposting it in the bug forum with the hope that one of > > the experts may be able to comment... > > > > Thanks, > > Anand > > > > ---------- Forwarded message ---------- > > From: Anand Mohanadoss <anand108@gmail.com> > > Date: Wed, Feb 25, 2015 at 9:35 PM > > Subject: Memory leak from seek/ftell with files larger than 2GB > > To: guile-user@gnu.org > > > > Hi, > > > > We are seeing an issue with seek and ftell leaking memory with files > > larger than 2GB. > > > > We are using 2.0.11 guile built as a 32-bit application with large > > file support enabled (guile was built using gcc 4.4.0 for Linux with > > flags _FILE_OFFSET_BITS=64, _LARGEFILE_SOURCE and _ > > LARGEFILE64_SOURCE). The issue also appears to happen with guile 2.2. > > > > The memory leaks start only after the offset exceeds maximum positive > > value for a 32-bit signed integer. ftell and seek do work as expected > > (given how lseek should work with large file support). > > > > Appended is a program that illustrates the problem. The first seek > > simply skips the part of the file where you won't see a memory leak. > > If you comment out ftell and the second seek lines and un-comment the > > lines that follow them, there is no memory leak. > > > > Is this a bug in guile or should we be doing things differently? If > > this is a known issue, is there a recommended work around? > > > > Thanks, > > Anand > > > > (define MAX_SIGNED_INT 2147483647) > > (define BYTES_TO_READ 10) > > > > (define file "/tmp/test.pcap") ;sample file greater than 2.5GB > > > > (define (traverse file) > > (let* ((port (open-input-file file #:binary #t)) > > (file-sz (stat:size (stat port))) > > (ua (make-bytevector BYTES_TO_READ 0)) > > (cur-offset 0)) > > (seek port (- MAX_UNSIGNED_INT 1000) SEEK_CUR) > > (while (< (ftell port) (- file-sz BYTES_TO_READ)) > > ;(while (< cur-offset (- file-sz BYTES_TO_READ)) > > (seek port BYTES_TO_READ SEEK_CUR) > > ;(get-bytevector-n! port ua 0 BYTES_TO_READ) > > (set! cur-offset (+ BYTES_TO_READ cur-offset))) > > (close-port port))) > > > > (traverse file) > [-- Attachment #2: Type: text/html, Size: 3505 bytes --] ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2016-06-23 14:43 UTC | newest] Thread overview: 4+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- [not found] <CAFNjtaA+apdrw3dhze-jSQ-Qo9j9jWpDmD=BwKCvC1DWc14=8Q@mail.gmail.com> 2015-03-11 12:38 ` bug#20079: Fwd: Memory leak from seek/ftell with files larger than 2GB Anand Mohanadoss 2016-06-23 12:22 ` Andy Wingo 2016-06-23 13:01 ` Andy Wingo 2016-06-23 14:43 ` Anand Mohanadoss
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).