Hi, Please find the latest report on new defect(s) introduced to gluster/glusterfs found with Coverity Scan. 200 new defect(s) introduced to gluster/glusterfs found with Coverity Scan. 164 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 20 of 200 defect(s) ** CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING) /xlators/nfs/server/src/mount3.c: 516 in mnt3svc_update_mountlist() ________________________________________________________________________________________________________ *** CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING) /xlators/nfs/server/src/mount3.c: 516 in mnt3svc_update_mountlist() 510 if (ret) { 511 gf_log (GF_MNT, GF_LOG_WARNING, "Failed to open '%s'", 512 nfs->rmtab); 513 goto free_err; 514 } 515 >>> CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING) >>> Calling strncpy with a maximum size argument of 1024 bytes on destination array "me->exname" of size 1024 bytes might leave the destination string unterminated. 516 strncpy (me->exname, expname, MNTPATHLEN); 517 518 INIT_LIST_HEAD (&me->mlist); 519 /* Must get the IP or hostname of the client so we 520 * can map it into the mount entry. 521 */ ________________________________________________________________________________________________________ To view the defects in Coverity Scan visit, https://scan.coverity.com/projects/987?tab=overview To manage Coverity Scan email notifications for "gluster-devel@xxxxxxxxxxx", click https://scan.coverity.com/subscriptions/edit?email=gluster-devel%40gluster.org&token=7dffab14bc5a7180e75b0d047539f148 . _______________________________________________ Gluster-devel mailing list Gluster-devel@xxxxxxxxxxx http://www.gluster.org/mailman/listinfo/gluster-devel