On 11/23/2013 01:35 AM, Lalatendu Mohanty wrote:
On 11/23/2013 01:27 AM, Anand Avati wrote:
Lala,
It would be ideal if we hooked this into Jenkins and run along with
regression test in parallel. How feasible is it to set it up that way?
Yup, agree. Will try to find a solution for this. We need a way to
download the result from http://scan.coverity.com and analyse it
through scripts. If anybody already have done it let us know :).
Bummer! . Coverity allows only 4 runs per week for opensource projects
that have lines of code between 100K to 500K and GlusterFS has more than
300K lines of code. Read the faq link below for details.
https://scan.coverity.com/faq#frequency
What should we do now?
-Lala
Avati
On Fri, Nov 22, 2013 at 11:51 AM, Lalatendu Mohanty
<lmoha...@redhat.com <mailto:lmoha...@redhat.com>> wrote:
Hi Gluster Ants,
There is a way, we can automate the Coverity scan runs and we
will get a email like below, which will tell us if any code
issues introduced in to the code base. Will it be helpful/good if
we run Coverity scan daily with the latest code base and send the
results to "gluster-devel@nongnu.org
<mailto:gluster-devel@nongnu.org>"? I think it would be helpful.
But wanted to take a feed back from you all before doing it.
Feedback/ Thoughts?
Thanks,
Lala
-------- Original Message --------
Subject: New Defects reported by Coverity Scan for GlusterFS
Date: Thu, 21 Nov 2013 14:14:04 -0800
From: scan-ad...@coverity.com <mailto:scan-ad...@coverity.com>
Hi,
Please find the latest report on new defect(s) introduced to
GlusterFS found with Coverity Scan.
Defect(s) Reported-by: Coverity Scan
Showing 7 of 10 defect(s)
** CID 1130760: Sizeof not portable (SIZEOF_MISMATCH)
/xlators/encryption/crypt/src/data.c: 487 in
set_config_avec_data()
** CID 1130759: Sizeof not portable (SIZEOF_MISMATCH)
/xlators/encryption/crypt/src/data.c: 566 in
set_config_avec_hole()
** CID 1130756: Unchecked return value (CHECKED_RETURN)
/xlators/encryption/crypt/src/crypt.c: 2627 in crypt_fsetxattr()
** CID 1130755: Unchecked return value (CHECKED_RETURN)
/xlators/encryption/crypt/src/crypt.c: 2649 in crypt_setxattr()
** CID 1130758: Dereference after null check (FORWARD_NULL)
/xlators/encryption/crypt/src/crypt.c: 3298 in
linkop_grab_local()
** CID 1130757: Null pointer dereference (FORWARD_NULL)
/api/src/glfs-fops.c: 718 in glfs_preadv_async()
/api/src/glfs-fops.c: 718 in glfs_preadv_async()
** CID 1124349: Unchecked return value (CHECKED_RETURN)
/xlators/mgmt/glusterd/src/glusterd-volume-set.c: 120 in
validate_cache_max_min_size()
/xlators/mgmt/glusterd/src/glusterd-volume-set.c: 129 in
validate_cache_max_min_size()
/xlators/mgmt/glusterd/src/glusterd-volume-set.c: 130 in
validate_cache_max_min_size()
________________________________________________________________________________________________________
To view the defects in Coverity Scan visit,
http://scan.coverity.com
To unsubscribe from the email notification for new defects,
http://scan5.coverity.com/cgi-bin/unsubscribe.py
_______________________________________________
Gluster-devel mailing list
Gluster-devel@nongnu.org <mailto:Gluster-devel@nongnu.org>
https://lists.nongnu.org/mailman/listinfo/gluster-devel
_______________________________________________
Gluster-devel mailing list
Gluster-devel@nongnu.org <mailto:Gluster-devel@nongnu.org>
https://lists.nongnu.org/mailman/listinfo/gluster-devel
_______________________________________________
Gluster-devel mailing list
Gluster-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/gluster-devel
_______________________________________________
Gluster-devel mailing list
Gluster-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/gluster-devel