[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[Libevent-users] coverity and event_new/bufferevent_socket_new
- To: libevent-users@xxxxxxxxxxxxx
- Subject: [Libevent-users] coverity and event_new/bufferevent_socket_new
- From: Vincent Bernat <bernat@xxxxxxxx>
- Date: Fri, 22 Nov 2013 23:52:12 +0100
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: libevent-users-outgoing@xxxxxxxx
- Delivered-to: libevent-users@xxxxxxxx
- Delivery-date: Fri, 22 Nov 2013 18:01:32 -0500
- Dkim-signature: v=1; a=rsa-sha1; c=simple; d=luffy.cx; h=from:to:subject :date:message-id:mime-version:content-type; s=postfix; bh=sZKcx0 0xY36O6C5gUHUbwt1Fzjo=; b=ghvm6j1vJ5RWAL1Fp7do4G2GZ0pRlPoZ/LpKiC undGc1y3Y9/YuFmPHXEh8HtW2/54C4TiCCS/l19Qh0O3Sxen9cpRKggvyVpBGt3k 4YNgrFgHQmrMcELTKcFUbZpn10tAHSWelmuTxCVGI5mgqwYPusFsf/DfoTP4xETD YOwiw=
- Domainkey-signature: a=rsa-sha1; c=simple; d=luffy.cx; h=from:to:subject :date:message-id:mime-version:content-type; q=dns; s=postfix; b= R+erxgarftxFZDw5JeBC0YA1p8oh00KSjKWyKEBlTbgVChdoFjJUEeMLn2kSbu5s 73uHAJuze9KMTnrp5a1T9PZeZf4CTzBcKD7nIfQGe3Tdi9818PlWFSE8chzsF3p0 o4WmvxBjqwDkJi6Q7NCQ7YKnVoMIJZuLQF8WH44A+Yc=
- Reply-to: libevent-users@xxxxxxxxxxxxx
- Sender: owner-libevent-users@xxxxxxxxxxxxx
- User-agent: Gnus/5.130008 (Ma Gnus v0.8) Emacs/24.3 (gnu/linux)
Hi!
Using coverity with libevent triggers a resource leaks for socket
descriptors registered to event_new or bufferevent_socket_new. To my
understanding, coverity can be taught globally for such cases.
Since I have seen some coverity-related bugfixes in the changelog, I
wonder if something has already been tried on this front?
--
# Okay, what on Earth is this one supposed to be used for?
2.4.0 linux/drivers/char/cp437.uni
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxx with
unsubscribe libevent-users in the body.