On 11/23/2013 01:27 AM, Anand Avati wrote:
Lala,

It would be ideal if we hooked this into Jenkins and run along with regression test in parallel. How feasible is it to set it up that way?


Yup, agree. Will try to find a solution for this. We need a way to download the result from http://scan.coverity.com and analyse it through scripts. If anybody already have done it let us know :).

Avati


On Fri, Nov 22, 2013 at 11:51 AM, Lalatendu Mohanty <lmoha...@redhat.com <mailto:lmoha...@redhat.com>> wrote:

    Hi Gluster Ants,

    There is a way, we can automate the Coverity scan runs and we will
    get a email like below, which will tell us if any code issues
    introduced in to the code base. Will it be helpful/good if we run
    Coverity scan daily with the latest code base and send the results
    to "gluster-devel@nongnu.org <mailto:gluster-devel@nongnu.org>"? I
    think it would be helpful. But wanted to take a feed back from you
    all before doing it. Feedback/ Thoughts?


    Thanks,
    Lala

        -------- Original Message --------
        Subject: New Defects reported by Coverity Scan for GlusterFS
        Date: Thu, 21 Nov 2013 14:14:04 -0800
        From: scan-ad...@coverity.com <mailto:scan-ad...@coverity.com>


        Hi,


        Please find the latest report on new defect(s) introduced to
        GlusterFS found with Coverity Scan.

        Defect(s) Reported-by: Coverity Scan
        Showing 7 of 10 defect(s)


        ** CID 1130760:  Sizeof not portable  (SIZEOF_MISMATCH)
        /xlators/encryption/crypt/src/data.c: 487 in
        set_config_avec_data()

        ** CID 1130759:  Sizeof not portable  (SIZEOF_MISMATCH)
        /xlators/encryption/crypt/src/data.c: 566 in
        set_config_avec_hole()

        ** CID 1130756:  Unchecked return value  (CHECKED_RETURN)
        /xlators/encryption/crypt/src/crypt.c: 2627 in crypt_fsetxattr()

        ** CID 1130755:  Unchecked return value  (CHECKED_RETURN)
        /xlators/encryption/crypt/src/crypt.c: 2649 in crypt_setxattr()

        ** CID 1130758:  Dereference after null check  (FORWARD_NULL)
        /xlators/encryption/crypt/src/crypt.c: 3298 in linkop_grab_local()

        ** CID 1130757:  Null pointer dereference  (FORWARD_NULL)
        /api/src/glfs-fops.c: 718 in glfs_preadv_async()
        /api/src/glfs-fops.c: 718 in glfs_preadv_async()

        ** CID 1124349:  Unchecked return value  (CHECKED_RETURN)
        /xlators/mgmt/glusterd/src/glusterd-volume-set.c: 120 in
        validate_cache_max_min_size()
        /xlators/mgmt/glusterd/src/glusterd-volume-set.c: 129 in
        validate_cache_max_min_size()
        /xlators/mgmt/glusterd/src/glusterd-volume-set.c: 130 in
        validate_cache_max_min_size()




        
________________________________________________________________________________________________________

        To view the defects in Coverity Scan visit,
        http://scan.coverity.com

        To unsubscribe from the email notification for new defects,
        http://scan5.coverity.com/cgi-bin/unsubscribe.py






        _______________________________________________
        Gluster-devel mailing list
        Gluster-devel@nongnu.org <mailto:Gluster-devel@nongnu.org>
        https://lists.nongnu.org/mailman/listinfo/gluster-devel



    _______________________________________________
    Gluster-devel mailing list
    Gluster-devel@nongnu.org <mailto:Gluster-devel@nongnu.org>
    https://lists.nongnu.org/mailman/listinfo/gluster-devel



_______________________________________________
Gluster-devel mailing list
Gluster-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/gluster-devel

Reply via email to