File: control

package info (click to toggle)
libtest-weaken-perl 3.022000-1.1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, bullseye, sid, trixie
  • size: 372 kB
  • sloc: perl: 3,828; makefile: 24; sh: 6
file content (32 lines) | stat: -rw-r--r-- 1,728 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Source: libtest-weaken-perl
Section: perl
Priority: optional
Build-Depends: debhelper (>= 8)
Build-Depends-Indep: perl
Maintainer: Debian Perl Group <pkg-perl-maintainers@lists.alioth.debian.org>
Uploaders: Nicholas Bamber <nicholas@periapt.co.uk>,
 gregor herrmann <gregoa@debian.org>,
 Alessandro Ghedini <ghedo@debian.org>
Standards-Version: 3.9.4
Homepage: http://search.cpan.org/dist/Test-Weaken/
Vcs-Git: git://git.debian.org/pkg-perl/packages/libtest-weaken-perl.git
Vcs-Browser: http://anonscm.debian.org/gitweb/?p=pkg-perl/packages/libtest-weaken-perl.git

Package: libtest-weaken-perl
Architecture: all
Depends: ${misc:Depends}, ${perl:Depends}
Description: Perl module to test that freed memory objects were actually freed
 A memory leak occurs when a Perl data structure is destroyed but some of the
 contents of that structure are not freed. Leaked memory is a useless
 overhead. Leaks can significantly impact system performance. They can also
 cause an application to abend due to lack of memory. In Perl, circular
 references are a common cause of memory leaks. Circular references are
 allowed in Perl, but data structures containing circular references will leak
 memory unless the programmer takes specific measures to prevent leaks.
 Preventive measures include weakening the references and arranging to break
 the reference cycle just before the structure is destroyed. When using
 circular references, it is easy to misdesign or misimplement a scheme for
 preventing memory leaks. Mistakes of this kind have been hard to detect in a
 test suite. Test::Weaken allows easy detection of unfreed Perl data and
 allows you to examine the unfreed data, even data that would usually have
 been made inaccessible.