Your message dated Thu, 8 Nov 2007 10:07:17 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#450561: Memory leak in Slony 1.2.1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: slony1-bin
Version: 1.2.1-1
Severity: normal
Tags: patch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

 I my case, this bug cause problems and eventually makes slon use more
than 128MB of ram per instance. So I had to patch the source to avoid
needing to restart periodically slon and postgres daemons.

 While It is not a critical bug, It would be nice if you could fix It
at the same time if there is ever a need for a security update on this
package.

 Meantime, affected fellow Debian users can easily apply the following
patch.

 It has been fixed upstream in 1.2.2.


Simon Valiquette
http://gulus.USherbrooke.ca


diff -Lsrc/slon/remote_worker.c -Lsrc/slon/remote_worker.c -u -w -r1.128
- -r1.129
- --- src/slon/remote_worker.c
+++ src/slon/remote_worker.c
@@ -4847,6 +4847,7 @@
         * Good job!
         */
        dstring_free(&query);
+       dstring_free(&lsquery);
        gettimeofday(&tv_now, NULL);
        slon_log(SLON_DEBUG2, "remoteWorkerThread_%d: SYNC "
                         INT64_FORMAT " done in %.3f seconds\n",

- -- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.18-5-vserver-powerpc
Locale: LANG=fr_CA, LC_CTYPE=fr_CA (charmap=ISO-8859-1)

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHMoHnJPE+P+aMAJIRA9O/AKDHlWZFtjmoeHRhJ0wC7vI3Eca8EgCgmv1J
/4GfCMJ3QKjDjr1K9uNmYZc=
=kVQx
-----END PGP SIGNATURE-----



--- End Message ---
--- Begin Message ---
Version: 1.2.2

Am Donnerstag, 8. November 2007 schrieb Simon Valiquette:
>  It has been fixed upstream in 1.2.2.


--- End Message ---

Reply via email to