Re: Avoid resource leak (src/test/regress/pg_regress.c)

From: Kirill Reshke <reshkekirill(at)gmail(dot)com>
To: Michael Paquier <michael(at)paquier(dot)xyz>
Cc: Ranier Vilela <ranier(dot)vf(at)gmail(dot)com>, Pg Hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: Avoid resource leak (src/test/regress/pg_regress.c)
Date: 2025-10-24 06:06:18
Message-ID: CALdSSPiS_xAn+Q39zKg+T70AL-VgsdEkR4i7KUfGOFaF6o=uYQ@mail.gmail.com
Views: Whole Thread | Raw Message | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Fri, 24 Oct 2025, 11:03 Michael Paquier, <michael(at)paquier(dot)xyz> wrote:

> On Thu, Oct 23, 2025 at 09:37:21PM -0300, Ranier Vilela wrote:
> > The function *config_sspi_auth* is responsible for
> > rewrite pg_hba.conf and pg_ident.conf to use SSPI authentication.
> >
> > Coverity complains that the struct addrinfo gai_result is leaked.
> > The variable is declared inside block and is not used
> > outside the block.
> >
> > So if the function WSAStartup is successful then the function getaddrinfo
> > allocates and fills the struct addrinfo.
> >
> > The memory must be released at the end of the block.
>
> Not sure that this one is worth caring about. We have a bunch of
> allocations that we know would be freed once a binary exits. This is
> just one of them, allocated in the context of what is a short-term
> execution.
> --
> Michael
>

Hi!
Yes, this is indeed minor and false positive, but maybe there is still
value in committing this - to silence coverity? There is nothing wrong in
being extra-tidy about memory

>

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message shveta malik 2025-10-24 06:13:17 Re: Logical Replication of sequences
Previous Message Michael Paquier 2025-10-24 06:04:50 Re: Avoid resource leak (src/bin/pg_resetwal/pg_resetwal.c)