[Gluster-devel] Daily Coverity runs for GlusterFS?

Lalatendu Mohanty lmohanty at redhat.com
Fri Nov 22 20:05:06 UTC 2013


On 11/23/2013 01:27 AM, Anand Avati wrote:
> Lala,
>
> It would be ideal if we hooked this into Jenkins and run along with 
> regression test in parallel. How feasible is it to set it up that way?
>

Yup, agree.  Will try to find a solution for this. We need a way to 
download the result from http://scan.coverity.com and analyse it through 
scripts. If anybody already have done it let us know :).

> Avati
>
>
> On Fri, Nov 22, 2013 at 11:51 AM, Lalatendu Mohanty 
> <lmohanty at redhat.com <mailto:lmohanty at redhat.com>> wrote:
>
>     Hi Gluster Ants,
>
>     There is a way, we can automate the Coverity scan runs and we will
>     get a email like below, which will tell us if any code issues
>     introduced in to the code base. Will it be helpful/good if we run
>     Coverity scan daily with the latest code base and send the results
>     to "gluster-devel at nongnu.org <mailto:gluster-devel at nongnu.org>"? I
>     think it would be helpful. But wanted to take a feed back from you
>     all before doing it. Feedback/ Thoughts?
>
>
>     Thanks,
>     Lala
>
>         -------- Original Message --------
>         Subject: New Defects reported by Coverity Scan for GlusterFS
>         Date: Thu, 21 Nov 2013 14:14:04 -0800
>         From: scan-admin at coverity.com <mailto:scan-admin at coverity.com>
>
>
>         Hi,
>
>
>         Please find the latest report on new defect(s) introduced to
>         GlusterFS found with Coverity Scan.
>
>         Defect(s) Reported-by: Coverity Scan
>         Showing 7 of 10 defect(s)
>
>
>         ** CID 1130760:  Sizeof not portable  (SIZEOF_MISMATCH)
>         /xlators/encryption/crypt/src/data.c: 487 in
>         set_config_avec_data()
>
>         ** CID 1130759:  Sizeof not portable  (SIZEOF_MISMATCH)
>         /xlators/encryption/crypt/src/data.c: 566 in
>         set_config_avec_hole()
>
>         ** CID 1130756:  Unchecked return value  (CHECKED_RETURN)
>         /xlators/encryption/crypt/src/crypt.c: 2627 in crypt_fsetxattr()
>
>         ** CID 1130755:  Unchecked return value  (CHECKED_RETURN)
>         /xlators/encryption/crypt/src/crypt.c: 2649 in crypt_setxattr()
>
>         ** CID 1130758:  Dereference after null check  (FORWARD_NULL)
>         /xlators/encryption/crypt/src/crypt.c: 3298 in linkop_grab_local()
>
>         ** CID 1130757:  Null pointer dereference  (FORWARD_NULL)
>         /api/src/glfs-fops.c: 718 in glfs_preadv_async()
>         /api/src/glfs-fops.c: 718 in glfs_preadv_async()
>
>         ** CID 1124349:  Unchecked return value  (CHECKED_RETURN)
>         /xlators/mgmt/glusterd/src/glusterd-volume-set.c: 120 in
>         validate_cache_max_min_size()
>         /xlators/mgmt/glusterd/src/glusterd-volume-set.c: 129 in
>         validate_cache_max_min_size()
>         /xlators/mgmt/glusterd/src/glusterd-volume-set.c: 130 in
>         validate_cache_max_min_size()
>
>
>
>
>         ________________________________________________________________________________________________________
>
>         To view the defects in Coverity Scan visit,
>         http://scan.coverity.com
>
>         To unsubscribe from the email notification for new defects,
>         http://scan5.coverity.com/cgi-bin/unsubscribe.py
>
>
>
>
>
>
>         _______________________________________________
>         Gluster-devel mailing list
>         Gluster-devel at nongnu.org <mailto:Gluster-devel at nongnu.org>
>         https://lists.nongnu.org/mailman/listinfo/gluster-devel
>
>
>
>     _______________________________________________
>     Gluster-devel mailing list
>     Gluster-devel at nongnu.org <mailto:Gluster-devel at nongnu.org>
>     https://lists.nongnu.org/mailman/listinfo/gluster-devel
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://supercolony.gluster.org/pipermail/gluster-devel/attachments/20131123/dabcda75/attachment-0001.html>


More information about the Gluster-devel mailing list