-
Notifications
You must be signed in to change notification settings - Fork 1
Add known false positives for usbutils #6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
What? No, you shouldn't add foolish files for broken tools that no one should be using. That's just noise, fix the tools instead to NOT say stuff like this! Again, no, this is NOT how you do any of this at all. |
|
@gregkh The findings were reported by open-source static analyzers. We are not developers of the tools. We only automate the scanning. The tools were not chosen randomly though. There are thousands of success stories behind them, both internally at Red Hat and in upstream projects. If you find other open-source static analyzers more useful than what OSH uses in the default scanning configuration, we are open to suggestions. |
|
Don't "automate" using tools that are broken, that feels like a failing proposition in the long run as who will then go back and review all of these to verify if they have changed or not? And did you verify that all of these issues are really false-positives? Where is the documentation that shows that the tool is wrong here, and why not submit that information to the tool authors so that it can be fixed instead of just papering over all of this? |
|
Good point. We should append a comment to each finding to explain why we think it is a false positive before this get merged, like we did it for bash: https://github.com/openscanhub/known-false-positives/blob/5eea38e13238e0ca25be9fb3c31300bda38fb92f/bash/ignore.err Cppcheck is not based on a real C compiler, so its precision is limited by design. Still the tool was able to find true positives for example in Linux kernel: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=40251b8eb46e48c011939a3ddf056fe13a223319 GCC Analyzer is still under heavy development and many bugs are being reported and fixed in the tool. We are in touch with the main developer of the tool but a deep analysis of each single false positive is not possible with the amount of data we get in a Fedora mass scan. |
Then perhaps you shouldn't be doing mass-scans and then sending them out to others to have them review them all like you all did? Please be much more mindful of maintainers/developers time. |
While running mass scans on Fedora, the reports should be verified by the package maintainer or someone from the community to make the reports more useful for the upstream developers. There would always be false positives in reports from static analysis tools that should be either filtered out or the analyzers should be fixed not to report them. Thanks for your feedback! |
4de41f9 to
a109349
Compare
Related: gregkh/usbutils#229 Signed-off-by: Siteshwar Vashisht <svashisht@redhat.com>
a109349 to
d7c17da
Compare
kdudka
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I checked the justifications for the recorded false positives and they look valid to me.
... so that we do not end up with paths like this: ``` usbutils-018/redhat-linux-build/../usbmisc.c ``` Related: openscanhub/known-false-positives#6
... so that we do not end up with paths like this: ``` usbutils-018/redhat-linux-build/../usbmisc.c ``` Related: openscanhub/known-false-positives#6 Related: openscanhub/known-false-positives#7 PR: csutils#228
Related: gregkh/usbutils#229