Hi,
Please find the latest report on new defect(s) introduced to cloudstack found
with Coverity Scan.
11 new defect(s) introduced to cloudstack found with Coverity Scan.
18 defect(s), reported by Coverity Scan earlier, were marked fixed in the
recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 11 of 11 defect(s)
** CID 1254843: Copy-paste error (COPY_PASTE_ERROR)
/server/src/com/cloud/capacity/CapacityManagerImpl.java: 712 in
com.cloud.capacity.CapacityManagerImpl.updateCapacityForHost(com.cloud.host.Host)()
** CID 1254842: Bx: Questionable Boxing of primitive value
(FB.BX_UNBOXING_IMMEDIATELY_REBOXED)
/server/src/com/cloud/network/NetworkServiceImpl.java: 1409 in
com.cloud.network.NetworkServiceImpl.commitNetwork(java.lang.Long,
java.lang.String, java.lang.String, java.lang.String, java.lang.String,
java.lang.String, java.lang.String, java.lang.String, java.lang.String,
com.cloud.user.Account, java.lang.Long, java.lang.Long, java.lang.Long,
boolean, java.lang.Boolean, java.lang.Long, java.lang.String, java.lang.String,
java.lang.String, java.lang.String, java.lang.Boolean, java.lang.Long,
java.lang.String, com.cloud.offerings.NetworkOfferingVO,
com.cloud.network.PhysicalNetwork,
org.apache.cloudstack.acl.ControlledEntity$ACLType, com.cloud.user.Account,
java.lang.String, boolean)()
** CID 1254841: DLS: Dead local store (FB.DLS_DEAD_LOCAL_STORE)
/server/src/com/cloud/network/router/VirtualNetworkApplianceManagerImpl.java:
2577 in
com.cloud.network.router.VirtualNetworkApplianceManagerImpl.postStateTransitionEvent(com.cloud.utils.fsm.StateMachine2$Transition,
com.cloud.vm.VirtualMachine, boolean, java.lang.Object)()
** CID 1254840: Dm: Dubious method used (FB.DM_DEFAULT_ENCODING)
/plugins/hypervisors/xenserver/src/com/cloud/hypervisor/xenserver/resource/Xenserver625StorageProcessor.java:
1054 in
com.cloud.hypervisor.xenserver.resource.Xenserver625StorageProcessor.createTemplateFromSnapshot2(org.apache.cloudstack.storage.command.CopyCommand)()
** CID 1254839: Dm: Dubious method used (FB.DM_DEFAULT_ENCODING)
/utils/src/org/apache/cloudstack/utils/graphite/GraphiteClient.java: 86 in
org.apache.cloudstack.graphite.GraphiteClient.sendMetrics(java.util.Map, long)()
** CID 1254838: REC: RuntimeException capture (FB.REC_CATCH_EXCEPTION)
/plugins/hypervisors/xenserver/src/com/cloud/hypervisor/xenserver/resource/Xenserver625StorageProcessor.java:
1102 in
com.cloud.hypervisor.xenserver.resource.Xenserver625StorageProcessor.createTemplateFromSnapshot2(org.apache.cloudstack.storage.command.CopyCommand)()
** CID 1254837: REC: RuntimeException capture (FB.REC_CATCH_EXCEPTION)
/server/src/com/cloud/server/StatsCollector.java: 515 in
com.cloud.server.StatsCollector$VmStatsCollector.runInContext()()
** CID 1254835: Dereference after null check (FORWARD_NULL)
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 63 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 69 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 80 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 91 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 110 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 121 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 135 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
** CID 1254834: Dereference after null check (FORWARD_NULL)
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 62 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 68 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 78 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 92 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 115 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 127 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 138 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
** CID 1254833: Dereference after null check (FORWARD_NULL)
/utils/src/com/cloud/utils/net/NetUtils.java: 1326 in
com.cloud.utils.net.NetUtils.countIp6InRange(java.lang.String)()
** CID 1254832: Resource leak on an exceptional path (RESOURCE_LEAK)
/utils/src/org/apache/cloudstack/utils/graphite/GraphiteClient.java: 83 in
org.apache.cloudstack.graphite.GraphiteClient.sendMetrics(java.util.Map, long)()
________________________________________________________________________________________________________
*** CID 1254843: Copy-paste error (COPY_PASTE_ERROR)
/server/src/com/cloud/capacity/CapacityManagerImpl.java: 712 in
com.cloud.capacity.CapacityManagerImpl.updateCapacityForHost(com.cloud.host.Host)()
706 host.getTotalMemory());
707 memCap.setTotalCapacity(host.getTotalMemory());
708
709 }
710 // Set the capacity state as per the host allocation state.
711 if(capacityState != memCap.getCapacityState()){
>>> CID 1254843: Copy-paste error (COPY_PASTE_ERROR)
>>> "cpuCap" in "cpuCap.getTotalCapacity()" looks like a copy-paste error.
>>> Should it say "memCap" instead?
712 s_logger.debug("Calibrate memory capacity state for
host: " + host.getId() + " old capacity state:" + cpuCap.getTotalCapacity() + "
new capacity state:" + hostTotalCpu);
713 memCap.setCapacityState(capacityState);
714 }
715
716 if (memCap.getUsedCapacity() == usedMemory &&
memCap.getReservedCapacity() == reservedMemory) {
717 s_logger.debug("No need to calibrate memory capacity,
host:" + host.getId() + " usedMem: " + memCap.getUsedCapacity() + "
reservedMem: " +
________________________________________________________________________________________________________
*** CID 1254842: Bx: Questionable Boxing of primitive value
(FB.BX_UNBOXING_IMMEDIATELY_REBOXED)
/server/src/com/cloud/network/NetworkServiceImpl.java: 1409 in
com.cloud.network.NetworkServiceImpl.commitNetwork(java.lang.Long,
java.lang.String, java.lang.String, java.lang.String, java.lang.String,
java.lang.String, java.lang.String, java.lang.String, java.lang.String,
com.cloud.user.Account, java.lang.Long, java.lang.Long, java.lang.Long,
boolean, java.lang.Boolean, java.lang.Long, java.lang.String, java.lang.String,
java.lang.String, java.lang.String, java.lang.Boolean, java.lang.Long,
java.lang.String, com.cloud.offerings.NetworkOfferingVO,
com.cloud.network.PhysicalNetwork,
org.apache.cloudstack.acl.ControlledEntity$ACLType, com.cloud.user.Account,
java.lang.String, boolean)()
1403 if (domainId != null && aclType == ACLType.Domain) {
1404 // send event for storing the domain wide resource
access
1405 Map<String, Object> params = new HashMap<String,
Object>();
1406 params.put(ApiConstants.ENTITY_TYPE, Network.class);
1407 params.put(ApiConstants.ENTITY_ID, network.getId());
1408 params.put(ApiConstants.DOMAIN_ID, domainId);
>>> CID 1254842: Bx: Questionable Boxing of primitive value
>>> (FB.BX_UNBOXING_IMMEDIATELY_REBOXED)
>>> Boxed value is unboxed and then immediately reboxed
1409 params.put(ApiConstants.SUBDOMAIN_ACCESS,
subdomainAccessFinal == null ? true : subdomainAccessFinal);
1410 _messageBus.publish(_name,
EntityManager.MESSAGE_ADD_DOMAIN_WIDE_ENTITY_EVENT, PublishScope.LOCAL, params);
1411 }
1412 return network;
1413 } catch (Exception e) {
1414 ExceptionUtil.rethrowRuntime(e);
________________________________________________________________________________________________________
*** CID 1254841: DLS: Dead local store (FB.DLS_DEAD_LOCAL_STORE)
/server/src/com/cloud/network/router/VirtualNetworkApplianceManagerImpl.java:
2577 in
com.cloud.network.router.VirtualNetworkApplianceManagerImpl.postStateTransitionEvent(com.cloud.utils.fsm.StateMachine2$Transition,
com.cloud.vm.VirtualMachine, boolean, java.lang.Object)()
2571 final Object opaque) {
2572 return true;
2573 }
2574
2575 @Override
2576 public boolean postStateTransitionEvent(final
StateMachine2.Transition<State, VirtualMachine.Event> transition, final
VirtualMachine vo, final boolean status, final Object opaque) {
>>> CID 1254841: DLS: Dead local store (FB.DLS_DEAD_LOCAL_STORE)
>>> Dead store to oldState
2577 final State oldState = transition.getCurrentState();
2578 final State newState = transition.getToState();
2579 final VirtualMachine.Event event = transition.getEvent();
2580 if (event == VirtualMachine.Event.FollowAgentPowerOnReport &&
newState == State.Running) {
2581 if (vo.getType() == VirtualMachine.Type.DomainRouter) {
2582 s_logger.info("Schedule a router reboot task as router
" + vo.getId() + " is powered-on out-of-band. we need to reboot to refresh
network rules");
________________________________________________________________________________________________________
*** CID 1254840: Dm: Dubious method used (FB.DM_DEFAULT_ENCODING)
/plugins/hypervisors/xenserver/src/com/cloud/hypervisor/xenserver/resource/Xenserver625StorageProcessor.java:
1054 in
com.cloud.hypervisor.xenserver.resource.Xenserver625StorageProcessor.createTemplateFromSnapshot2(org.apache.cloudstack.storage.command.CopyCommand)()
1048 String chapInitiatorUsername =
srcDetails.get(DiskTO.CHAP_INITIATOR_USERNAME);
1049 String chapInitiatorSecret =
srcDetails.get(DiskTO.CHAP_INITIATOR_SECRET);
1050
1051 srcSr = hypervisorResource.getIscsiSR(conn, iScsiName,
storageHost, iScsiName, chapInitiatorUsername, chapInitiatorSecret, true);
1052
1053 String destNfsPath = destUri.getHost() + ":" +
destUri.getPath();
>>> CID 1254840: Dm: Dubious method used (FB.DM_DEFAULT_ENCODING)
>>> Found reliance on default encoding: String.getBytes()
1054 String localDir = "/var/cloud_mount/" +
UUID.nameUUIDFromBytes(destNfsPath.getBytes());
1055
1056 mountNfs(conn, destNfsPath, localDir);
1057 makeDirectory(conn, localDir + "/" + destDir);
1058
1059 destSr = createFileSR(conn, localDir + "/" + destDir);
________________________________________________________________________________________________________
*** CID 1254839: Dm: Dubious method used (FB.DM_DEFAULT_ENCODING)
/utils/src/org/apache/cloudstack/utils/graphite/GraphiteClient.java: 86 in
org.apache.cloudstack.graphite.GraphiteClient.sendMetrics(java.util.Map, long)()
80 public void sendMetrics(Map<String, Integer> metrics, long
timeStamp) {
81 try {
82 DatagramSocket sock = new DatagramSocket();
83 InetAddress addr = InetAddress.getByName(this.graphiteHost);
84
85 for (Map.Entry<String, Integer> metric: metrics.entrySet()) {
>>> CID 1254839: Dm: Dubious method used (FB.DM_DEFAULT_ENCODING)
>>> Found reliance on default encoding: String.getBytes()
86 byte[] message = new String(metric.getKey() + " " +
metric.getValue() + " " + timeStamp + "\n").getBytes();
87 DatagramPacket packet = new DatagramPacket(message,
message.length, addr, this.graphitePort);
88 sock.send(packet);
89 }
90
91 sock.close();
________________________________________________________________________________________________________
*** CID 1254838: REC: RuntimeException capture (FB.REC_CATCH_EXCEPTION)
/plugins/hypervisors/xenserver/src/com/cloud/hypervisor/xenserver/resource/Xenserver625StorageProcessor.java:
1102 in
com.cloud.hypervisor.xenserver.resource.Xenserver625StorageProcessor.createTemplateFromSnapshot2(org.apache.cloudstack.storage.command.CopyCommand)()
1096 newTemplate.setPhysicalSize(physicalSize);
1097 newTemplate.setName(templateUuid);
1098
1099 result = true;
1100
1101 return new CopyCmdAnswer(newTemplate);
>>> CID 1254838: REC: RuntimeException capture (FB.REC_CATCH_EXCEPTION)
>>> Catching RuntimeExceptions, perhaps unintentionally, with a catch block
>>> for Exception
1102 } catch (Exception ex) {
1103 s_logger.error("Failed to create a template from a
snapshot", ex);
1104
1105 return new CopyCmdAnswer("Failed to create a template from
a snapshot: " + ex.toString());
1106 } finally {
1107 if (!result) {
________________________________________________________________________________________________________
*** CID 1254837: REC: RuntimeException capture (FB.REC_CATCH_EXCEPTION)
/server/src/com/cloud/server/StatsCollector.java: 515 in
com.cloud.server.StatsCollector$VmStatsCollector.runInContext()()
509
510 metrics.clear();
511 }
512 }
513 }
514
>>> CID 1254837: REC: RuntimeException capture (FB.REC_CATCH_EXCEPTION)
>>> Catching RuntimeExceptions, perhaps unintentionally, with a catch block
>>> for Exception
515 } catch (Exception e) {
516 s_logger.debug("Failed to get VM stats for host
with ID: " + host.getId());
517 continue;
518 }
519 }
520
________________________________________________________________________________________________________
*** CID 1254835: Dereference after null check (FORWARD_NULL)
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 63 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
57 if (proxy == null && args.getProxyId() != 0)
58 proxy = _consoleProxyDao.findById(args.getProxyId());
59
60 switch (args.getType()) {
61 case ConsoleProxyAlertEventArgs.PROXY_CREATED:
62 if (s_logger.isDebugEnabled())
>>> CID 1254835: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "proxy".
63 s_logger.debug("New console proxy created, zone: " +
dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
proxy.getPublicIpAddress() +
64 ", private IP: " + proxy.getPrivateIpAddress());
65 break;
66
67 case ConsoleProxyAlertEventArgs.PROXY_UP:
68 if (s_logger.isDebugEnabled())
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 69 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
63 s_logger.debug("New console proxy created, zone: " +
dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
proxy.getPublicIpAddress() +
64 ", private IP: " + proxy.getPrivateIpAddress());
65 break;
66
67 case ConsoleProxyAlertEventArgs.PROXY_UP:
68 if (s_logger.isDebugEnabled())
>>> CID 1254835: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "proxy".
69 s_logger.debug("Console proxy is up, zone: " +
dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
proxy.getPublicIpAddress() +
70 ", private IP: " + proxy.getPrivateIpAddress());
71
72
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_CONSOLE_PROXY,
args.getZoneId(), proxy.getPodIdToDeployIn(),
73 "Console proxy up in zone: " + dc.getName() +
74 ", proxy: " + proxy.getHostName() + ", public
IP: " + proxy.getPublicIpAddress() + ", private IP: " +
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 80 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
74 ", proxy: " + proxy.getHostName() + ", public
IP: " + proxy.getPublicIpAddress() + ", private IP: " +
75 (proxy.getPrivateIpAddress() == null ? "N/A" :
proxy.getPrivateIpAddress()), "Console proxy up (zone " + dc.getName() + ")");
76 break;
77
78 case ConsoleProxyAlertEventArgs.PROXY_DOWN:
79 if (s_logger.isDebugEnabled())
>>> CID 1254835: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "proxy".
80 s_logger.debug("Console proxy is down, zone: " +
dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
proxy.getPublicIpAddress() +
81 ", private IP: " + (proxy.getPrivateIpAddress()
== null ? "N/A" : proxy.getPrivateIpAddress()));
82
83
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_CONSOLE_PROXY,
args.getZoneId(), proxy.getPodIdToDeployIn(),
84 "Console proxy down in zone: " + dc.getName() +
85 ", proxy: " + proxy.getHostName() + ", public
IP: " + proxy.getPublicIpAddress() + ", private IP: " +
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 91 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
85 ", proxy: " + proxy.getHostName() + ", public
IP: " + proxy.getPublicIpAddress() + ", private IP: " +
86 (proxy.getPrivateIpAddress() == null ? "N/A" :
proxy.getPrivateIpAddress()), "Console proxy down (zone " + dc.getName() + ")");
87 break;
88
89 case ConsoleProxyAlertEventArgs.PROXY_REBOOTED:
90 if (s_logger.isDebugEnabled())
>>> CID 1254835: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "proxy".
91 s_logger.debug("Console proxy is rebooted, zone: " +
dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
proxy.getPublicIpAddress() +
92 ", private IP: " + (proxy.getPrivateIpAddress()
== null ? "N/A" : proxy.getPrivateIpAddress()));
93
94
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_CONSOLE_PROXY,
args.getZoneId(), proxy.getPodIdToDeployIn(),
95 "Console proxy rebooted in zone: " + dc.getName() +
", proxy: " + proxy.getHostName() + ", public IP: " +
proxy.getPublicIpAddress() +
96 ", private IP: " + (proxy.getPrivateIpAddress()
== null ? "N/A" : proxy.getPrivateIpAddress()), "Console proxy rebooted (zone "
+ dc.getName() +
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 110 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
104 "Console proxy creation failure. zone: " +
dc.getName() + ", error details: " + args.getMessage(),
105 "Console proxy creation failure (zone " +
dc.getName() + ")");
106 break;
107
108 case ConsoleProxyAlertEventArgs.PROXY_START_FAILURE:
109 if (s_logger.isDebugEnabled())
>>> CID 1254835: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "proxy".
110 s_logger.debug("Console proxy startup failure,
zone: " + dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
111 proxy.getPublicIpAddress() + ", private IP: " +
(proxy.getPrivateIpAddress() == null ? "N/A" : proxy.getPrivateIpAddress()));
112
113
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_CONSOLE_PROXY,
args.getZoneId(), proxy.getPodIdToDeployIn(),
114 "Console proxy startup failure. zone: " +
dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
proxy.getPublicIpAddress() +
115 ", private IP: " + (proxy.getPrivateIpAddress()
== null ? "N/A" : proxy.getPrivateIpAddress()) + ", error details: " +
args.getMessage(),
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 121 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
115 ", private IP: " + (proxy.getPrivateIpAddress()
== null ? "N/A" : proxy.getPrivateIpAddress()) + ", error details: " +
args.getMessage(),
116 "Console proxy startup failure (zone " +
dc.getName() + ")");
117 break;
118
119 case ConsoleProxyAlertEventArgs.PROXY_FIREWALL_ALERT:
120 if (s_logger.isDebugEnabled())
>>> CID 1254835: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "proxy".
121 s_logger.debug("Console proxy firewall alert, zone:
" + dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
122 proxy.getPublicIpAddress() + ", private IP: " +
(proxy.getPrivateIpAddress() == null ? "N/A" : proxy.getPrivateIpAddress()));
123
124 _alertMgr.sendAlert(
125 AlertManager.AlertType.ALERT_TYPE_CONSOLE_PROXY,
126 args.getZoneId(),
/server/src/com/cloud/alert/ConsoleProxyAlertAdapter.java: 135 in
com.cloud.alert.ConsoleProxyAlertAdapter.onProxyAlert(java.lang.Object,
com.cloud.consoleproxy.ConsoleProxyAlertEventArgs)()
129 proxy.getPublicIpAddress() + ", private IP: " +
(proxy.getPrivateIpAddress() == null ? "N/A" : proxy.getPrivateIpAddress()),
130 "Console proxy alert (zone " + dc.getName() + ")");
131 break;
132
133 case ConsoleProxyAlertEventArgs.PROXY_STORAGE_ALERT:
134 if (s_logger.isDebugEnabled())
>>> CID 1254835: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "proxy".
135 s_logger.debug("Console proxy storage alert, zone:
" + dc.getName() + ", proxy: " + proxy.getHostName() + ", public IP: " +
136 proxy.getPublicIpAddress() + ", private IP: " +
proxy.getPrivateIpAddress() + ", message: " + args.getMessage());
137
138
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_STORAGE_MISC,
args.getZoneId(), proxy.getPodIdToDeployIn(),
139 "Console proxy storage issue. zone: " +
dc.getName() + ", message: " + args.getMessage(), "Console proxy alert (zone "
+ dc.getName() + ")");
140 break;
________________________________________________________________________________________________________
*** CID 1254834: Dereference after null check (FORWARD_NULL)
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 62 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
56 if (secStorageVm == null && args.getSecStorageVmId() != 0)
57 secStorageVm = _ssvmDao.findById(args.getSecStorageVmId());
58
59 switch (args.getType()) {
60 case SecStorageVmAlertEventArgs.SSVM_CREATED:
61 if (s_logger.isDebugEnabled())
>>> CID 1254834: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "secStorageVm".
62 s_logger.debug("New secondary storage vm created,
zone: " + dc.getName() + ", secStorageVm: " + secStorageVm.getHostName() + ",
public IP: " +
63 secStorageVm.getPublicIpAddress() + ", private
IP: " + secStorageVm.getPrivateIpAddress());
64 break;
65
66 case SecStorageVmAlertEventArgs.SSVM_UP:
67 if (s_logger.isDebugEnabled())
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 68 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
62 s_logger.debug("New secondary storage vm created,
zone: " + dc.getName() + ", secStorageVm: " + secStorageVm.getHostName() + ",
public IP: " +
63 secStorageVm.getPublicIpAddress() + ", private
IP: " + secStorageVm.getPrivateIpAddress());
64 break;
65
66 case SecStorageVmAlertEventArgs.SSVM_UP:
67 if (s_logger.isDebugEnabled())
>>> CID 1254834: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "secStorageVm".
68 s_logger.debug("Secondary Storage Vm is up, zone: "
+ dc.getName() + ", secStorageVm: " + secStorageVm.getHostName() + ", public
IP: " +
69 secStorageVm.getPublicIpAddress() + ", private
IP: " + secStorageVm.getPrivateIpAddress());
70
71
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_SSVM, args.getZoneId(),
secStorageVm.getPodIdToDeployIn(), "Secondary Storage Vm up in zone: " +
72 dc.getName() + ", secStorageVm: " +
secStorageVm.getHostName() + ", public IP: " +
secStorageVm.getPublicIpAddress() + ", private IP: " +
73 (secStorageVm.getPrivateIpAddress() == null ? "N/A"
: secStorageVm.getPrivateIpAddress()), "Secondary Storage Vm up (zone " +
dc.getName() + ")");
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 78 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
72 dc.getName() + ", secStorageVm: " +
secStorageVm.getHostName() + ", public IP: " +
secStorageVm.getPublicIpAddress() + ", private IP: " +
73 (secStorageVm.getPrivateIpAddress() == null ? "N/A"
: secStorageVm.getPrivateIpAddress()), "Secondary Storage Vm up (zone " +
dc.getName() + ")");
74 break;
75
76 case SecStorageVmAlertEventArgs.SSVM_DOWN:
77 if (s_logger.isDebugEnabled())
>>> CID 1254834: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "secStorageVm".
78 s_logger.debug("Secondary Storage Vm is down, zone:
" + dc.getName() + ", secStorageVm: " + secStorageVm.getHostName() + ", public
IP: " +
79 secStorageVm.getPublicIpAddress() + ", private
IP: " + (secStorageVm.getPrivateIpAddress() == null ? "N/A" :
secStorageVm.getPrivateIpAddress()));
80
81 _alertMgr.sendAlert(
82 AlertManager.AlertType.ALERT_TYPE_SSVM,
83 args.getZoneId(),
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 92 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
86 secStorageVm.getPublicIpAddress() + ", private
IP: " + (secStorageVm.getPrivateIpAddress() == null ? "N/A" :
secStorageVm.getPrivateIpAddress()),
87 "Secondary Storage Vm down (zone " + dc.getName() +
")");
88 break;
89
90 case SecStorageVmAlertEventArgs.SSVM_REBOOTED:
91 if (s_logger.isDebugEnabled())
>>> CID 1254834: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "secStorageVm".
92 s_logger.debug("Secondary Storage Vm is rebooted,
zone: " + dc.getName() + ", secStorageVm: " + secStorageVm.getHostName() + ",
public IP: " +
93 secStorageVm.getPublicIpAddress() + ", private
IP: " + (secStorageVm.getPrivateIpAddress() == null ? "N/A" :
secStorageVm.getPrivateIpAddress()));
94
95 _alertMgr.sendAlert(
96 AlertManager.AlertType.ALERT_TYPE_SSVM,
97 args.getZoneId(),
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 115 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
109 "Secondary Storage Vm creation failure. zone: " +
dc.getName() + ", error details: " + args.getMessage(),
110 "Secondary Storage Vm creation failure (zone " +
dc.getName() + ")");
111 break;
112
113 case SecStorageVmAlertEventArgs.SSVM_START_FAILURE:
114 if (s_logger.isDebugEnabled())
>>> CID 1254834: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "secStorageVm".
115 s_logger.debug("Secondary Storage Vm startup
failure, zone: " + dc.getName() + ", secStorageVm: " +
secStorageVm.getHostName() + ", public IP: " +
116 secStorageVm.getPublicIpAddress() + ", private
IP: " + (secStorageVm.getPrivateIpAddress() == null ? "N/A" :
secStorageVm.getPrivateIpAddress()));
117
118
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_SSVM, args.getZoneId(),
secStorageVm.getPodIdToDeployIn(),
119 "Secondary Storage Vm startup failure. zone: " +
120 dc.getName() + ", secStorageVm: " +
secStorageVm.getHostName() + ", public IP: " +
secStorageVm.getPublicIpAddress() + ", private IP: " +
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 127 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
121 (secStorageVm.getPrivateIpAddress() == null ?
"N/A" : secStorageVm.getPrivateIpAddress()) + ", error details: " +
args.getMessage(),
122 "Secondary Storage Vm startup failure (zone " +
dc.getName() + ")");
123 break;
124
125 case SecStorageVmAlertEventArgs.SSVM_FIREWALL_ALERT:
126 if (s_logger.isDebugEnabled())
>>> CID 1254834: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "secStorageVm".
127 s_logger.debug("Secondary Storage Vm firewall
alert, zone: " + dc.getName() + ", secStorageVm: " + secStorageVm.getHostName()
+ ", public IP: " +
128 secStorageVm.getPublicIpAddress() + ", private
IP: " + (secStorageVm.getPrivateIpAddress() == null ? "N/A" :
secStorageVm.getPrivateIpAddress()));
129
130
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_SSVM, args.getZoneId(),
secStorageVm.getPodIdToDeployIn(),
131 "Failed to open secondary storage vm firewall port.
zone: " + dc.getName() + ", secStorageVm: " + secStorageVm.getHostName() + ",
public IP: " +
132 secStorageVm.getPublicIpAddress() + ", private
IP: " + (secStorageVm.getPrivateIpAddress() == null ? "N/A" :
secStorageVm.getPrivateIpAddress()),
/server/src/com/cloud/alert/SecondaryStorageVmAlertAdapter.java: 138 in
com.cloud.alert.SecondaryStorageVmAlertAdapter.onSSVMAlert(java.lang.Object,
com.cloud.storage.secondary.SecStorageVmAlertEventArgs)()
132 secStorageVm.getPublicIpAddress() + ", private
IP: " + (secStorageVm.getPrivateIpAddress() == null ? "N/A" :
secStorageVm.getPrivateIpAddress()),
133 "Secondary Storage Vm alert (zone " + dc.getName()
+ ")");
134 break;
135
136 case SecStorageVmAlertEventArgs.SSVM_STORAGE_ALERT:
137 if (s_logger.isDebugEnabled())
>>> CID 1254834: Dereference after null check (FORWARD_NULL)
>>> Calling a method on null object "secStorageVm".
138 s_logger.debug("Secondary Storage Vm storage alert,
zone: " + dc.getName() + ", secStorageVm: " + secStorageVm.getHostName() + ",
public IP: " +
139 secStorageVm.getPublicIpAddress() + ", private
IP: " + secStorageVm.getPrivateIpAddress() + ", message: " + args.getMessage());
140
141
_alertMgr.sendAlert(AlertManager.AlertType.ALERT_TYPE_STORAGE_MISC,
args.getZoneId(), secStorageVm.getPodIdToDeployIn(),
142 "Secondary Storage Vm storage issue. zone: " +
dc.getName() + ", message: " + args.getMessage(), "Secondary Storage Vm alert
(zone " + dc.getName() +
143 ")");
________________________________________________________________________________________________________
*** CID 1254833: Dereference after null check (FORWARD_NULL)
/utils/src/com/cloud/utils/net/NetUtils.java: 1326 in
com.cloud.utils.net.NetUtils.countIp6InRange(java.lang.String)()
1320 if (startInt != null)
1321 {
1322 if(startInt.compareTo(endInt) > 0) {
1323 return null;
1324 }
1325 }
>>> CID 1254833: Dereference after null check (FORWARD_NULL)
>>> Passing null pointer "startInt" to function
>>> "java.math.BigInteger.subtract(java.math.BigInteger)", which dereferences
>>> it.
1326 return endInt.subtract(startInt).add(BigInteger.ONE);
1327 }
1328 return null;
1329 }
1330
1331 public static boolean isIp6InRange(String ip6, String ip6Range) {
________________________________________________________________________________________________________
*** CID 1254832: Resource leak on an exceptional path (RESOURCE_LEAK)
/utils/src/org/apache/cloudstack/utils/graphite/GraphiteClient.java: 83 in
org.apache.cloudstack.graphite.GraphiteClient.sendMetrics(java.util.Map, long)()
77 * @param metrics the metrics as key-value-pairs
78 * @param timeStamp the timestamp
79 */
80 public void sendMetrics(Map<String, Integer> metrics, long
timeStamp) {
81 try {
82 DatagramSocket sock = new DatagramSocket();
>>> CID 1254832: Resource leak on an exceptional path (RESOURCE_LEAK)
>>> Variable "sock" going out of scope leaks the resource it refers to.
83 InetAddress addr = InetAddress.getByName(this.graphiteHost);
84
85 for (Map.Entry<String, Integer> metric: metrics.entrySet()) {
86 byte[] message = new String(metric.getKey() + " " +
metric.getValue() + " " + timeStamp + "\n").getBytes();
87 DatagramPacket packet = new DatagramPacket(message,
message.length, addr, this.graphitePort);
88 sock.send(packet);
________________________________________________________________________________________________________
To view the defects in Coverity Scan visit,
http://scan.coverity.com/projects/943?tab=overview
To unsubscribe from the email notification for new defects,
http://scan5.coverity.com/cgi-bin/unsubscribe.py