[ 
https://issues.apache.org/jira/browse/AXIS2C-1669?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Robert Lazarski resolved AXIS2C-1669.
-------------------------------------
    Fix Version/s: 2.0.0
                       (was: 1.7.0)
       Resolution: Fixed

[~billblough] I evaluated the remaining issues with Claude Code and the 
suggestion is to close this issue, so I am taking that action here though feel 
free of course to re-open.  

 AXIS2C-1669 can be closed. 6 of 11 patches have been applied. The remaining 4 
patches were evaluated and found to have issues:
  - op_client.c.patch: Contains a bug - conditional engine free causes memory 
leak on success path (AXIS2_SUCCESS=0)
  - ssl_utils.c.patch: Would break server SSL - changing BIO_NOCLOSE to 
BIO_CLOSE needs client/server detection
  - http_sender.c.patch: Mixed quality - some valid fixes but also bugs in 
connection_map handling
  - libxml2_reader_wrapper.c.patch: Low priority cosmetic fix

  The core memory leak issues from the original patches have been addressed. 
The remaining patches need redesign or contain bugs that would introduce new 
issues.




> Misc patches for mem leak, REST Call, SSL, XPATH
> ------------------------------------------------
>
>                 Key: AXIS2C-1669
>                 URL: https://issues.apache.org/jira/browse/AXIS2C-1669
>             Project: Axis2-C
>          Issue Type: Bug
>          Components: core/engine
>    Affects Versions: 1.6.0
>         Environment: LINUX X86_64, AIX 6.1
>            Reporter: Jean-Marc Lamond
>            Assignee: Bill Blough
>            Priority: Major
>              Labels: patch
>             Fix For: 2.0.0
>
>         Attachments: Consolidated.patch, http_sender.c.patch, 
> http_transport_utils.c.patch, libxml2_reader_wrapper.c.patch, 
> op_client.c.patch, options.c.patch, ssl_utils.c.patch, xpath.c.patch, 
> xpath_internals_engine.c.patch, xpath_internals_parser.c.patch, 
> xpath_streaming.c.patch
>
>   Original Estimate: 120h
>  Remaining Estimate: 120h
>
> Dear Mr. Mantaut,
>  Late 2013, I had submit some patches that you reject because of other mem 
> leak induced by my work. I did follow your guidance and used valgrind to help 
> me debug the mem leak problem from XPATH and Client API.
> I solved all my case early january 2014 but never took the time to upload my 
> clean patches.
> I have a sample program that I can send you to reproduce mem leak from the 
> current trunk if you need so.
> Please find attached following patches:
>  Consolidated.patch - all patches
>  http_sender.c.patch - mem leak + REST + "check your log and buffer"
>  *APPLIED* http_transport_utils.c.patch - mem leak 
>  libxml2_reader_wrapper.c.patch - error 
>  op_client.c.patch - mem leak
>  *APPLIED* options.c.patch - mem leak 
>  ssl_utils.c.patch - design problem between client end server socket handling
>  *APPLIED* xpath.c.patch - mostly printf to log and mem leak
>  *APPLIED* xpath_internals_engine.c.patch - mem leak
>  *APPLIED* xpath_internals_parser.c.patch - mem leak
>  *APPLIED* xpath_streaming.c.patch - mem leak
> Best regards,
> Jean-Marc



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to