Who has permission to change this?
_______________________________________________
LLVM Developers mailing list
llvm...@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev
Whoever setup the original account, needs to change this. Or someone with admin permissions on github needs to create a new account? Who would I talk to about this?
Hello,
The issue isn't about the repo configuration but more having a build working with cov-build. I stop carrying for two reasons:
* it was often regressing
* afaik, nobody but me was paying attention to newly detected defects (if I am wrong, please let me know and I can have a look).
By the way, I have been generating these reports:
https://llvm.org/reports/scan-build/
Cheers,
Sylvestre
> * afaik, nobody but me was paying attention to newly detected defects (if I am wrong, please let me know and I can have a look).
In my experience, a weekly report of new defects helps keep engagement up and issues down. Here is an example:
Would a weekly scan report be welcome here?
Should run once a day.
Currently, it finds 3 048 defects in llvm, clang, lld, lldb, etc. Keep in mind that a bunch of them are false positive.
The component view broken currently (doesn't refresh with new configurations).
Screenshot of the kind of defect Coverity is identifying:
https://imgur.com/729Yrtp
Cheers,
Sylvestre
Le 02/06/2021 à 23:11, Mehdi AMINI a écrit :
> +Sylvestre Ledru <mailto:sylv...@debian.org> is the admin here.
>
> That said, I believe that anyone with admin permissions on the LLVM organization on Github can set up a new LLVM project on the coverity website.
>
>
> On Wed, Jun 2, 2021 at 12:53 PM Eli Friedman via llvm-dev <llvm...@lists.llvm.org <mailto:llvm...@lists.llvm.org>> wrote:
>
> I doubt anyone on this mailing list has any control over the Coverity scan. I'd suggest emailing Coverity; it looks like the address is scan-...@coverity.com <mailto:scan-...@coverity.com> .
>
> -Eli
>
> -----Original Message-----
> From: llvm-dev <llvm-dev...@lists.llvm.org <mailto:llvm-dev...@lists.llvm.org>> On Behalf Of Luke Benes via llvm-dev
> Sent: Wednesday, June 2, 2021 12:14 PM
> To: llvm...@lists.llvm.org <mailto:llvm...@lists.llvm.org>
> Subject: [EXT] Re: [llvm-dev] Coverity Scan Needs to be Updated after GitHub Migration
>
> As a reminder, the Coverity scan of the llvm project, https://scan.coverity.com/projects/llvm <https://scan.coverity.com/projects/llvm> is still pulling from the old subversion repository. It needs to be updated to https://github.com/llvm/llvm-project <https://github.com/llvm/llvm-project>.
>
> Whoever setup the original account, needs to change this. Or someone with admin permissions on github needs to create a new account? Who would I talk to about this?
>
>
>
>
> _______________________________________________
> LLVM Developers mailing list
> llvm...@lists.llvm.org <mailto:llvm...@lists.llvm.org>
> https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev <https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev>
> _______________________________________________
> LLVM Developers mailing list
> llvm...@lists.llvm.org <mailto:llvm...@lists.llvm.org>
> https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev <https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev>
Sylvester,
The report seems to be working perfectly. Thank you for taking the time to get this up and running again!
My only concern is that there is no visibly on these reports. Without the new issues being reported here, it is highly unlikely that they will get addressed.
Since there was interest and no objections, could you please add the [llvm-dev] list to the email?
You can do this by going to the "Project Settings" page:
https://scan.coverity.com/projects/llvm?tab=project_settings
"Additional Emails for New Defect Notifications"
-> llvm...@lists.llvm.org
Then could you please lower the report frequency to once or twice a week? With that we will receive weekly reports like this:
Do the reports have deltas? (highlighting new defects with as fine revision granularity as possible) or do they only show the total set of findings at a given revision?
On Thu, Jun 10, 2021 at 10:20 AM David Blaikie via llvm-dev <llvm...@lists.llvm.org> wrote:Do the reports have deltas? (highlighting new defects with as fine revision granularity as possible) or do they only show the total set of findings at a given revision?Yes (see below sample email from today), which is why I'd prefer to keep this daily rather than weekly.
llvm-commits@ may be more suitable than llvm-dev@ for this?
From Coverity:
Please find the latest report on new defect(s) introduced to llvm found with Coverity Scan.
8 new defect(s) introduced to llvm found with Coverity Scan.
19 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 8 of 8 defect(s)
** CID 1457502: Uninitialized members (UNINIT_CTOR)
/lld/MachO/InputSection.h: 109 in lld::macho::StringPiece::StringPiece(unsigned long, unsigned int)()
On Thu, Jun 10, 2021 at 10:42 AM Mehdi AMINI <joke...@gmail.com> wrote:
From Coverity:
Please find the latest report on new defect(s) introduced to llvm found with Coverity Scan.
8 new defect(s) introduced to llvm found with Coverity Scan.
19 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 8 of 8 defect(s)
** CID 1457502: Uninitialized members (UNINIT_CTOR)
/lld/MachO/InputSection.h: 109 in lld::macho::StringPiece::StringPiece(unsigned long, unsigned int)()
Is it easy for us to disable low-value findings (both on a per-instance, but also per-check-tye) basis in source (ie: without having to modify an external config)?
Source annotations are available for suppressing per-instance issues, but no source annotations are available to disable checkers entirely.
I don't see an option for disabling specific checkers in Coverity Scan. Checker enable/disable and tuning options are available when using a Coverity installation. I don't know why those capabilities wouldn't be exposed to Coverity Scan users.
For instance, I'm not sure it's valuable for us to get notification on any member not initialized by a ctor. That could readily be detected by clang-tidy or clang warnings and we don't implement such checks in those places (which would be higher value because they can find the issue sooner rather than waiting for a long-running static analysis to come back with results).
Keeping the warnings low-noise would be really important (so whoever set this up or requested it I hope is really pushing to reduce the noise until nearly all results have pretty broad agreement that they should be fixed).
Yes, the general deployment recommendation is to tune to minimize FPs and low value results and then relax such tuning as issues are addressed.
Tom.
On 6/10/2021 2:54 PM, David Blaikie via llvm-dev wrote:
On Thu, Jun 10, 2021 at 10:42 AM Mehdi AMINI <joke...@gmail.com> wrote:
From Coverity:
Please find the latest report on new defect(s) introduced to llvm found with Coverity Scan.
8 new defect(s) introduced to llvm found with Coverity Scan.
19 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 8 of 8 defect(s)
** CID 1457502: Uninitialized members (UNINIT_CTOR)
/lld/MachO/InputSection.h: 109 in lld::macho::StringPiece::StringPiece(unsigned long, unsigned int)()
Is it easy for us to disable low-value findings (both on a per-instance, but also per-check-tye) basis in source (ie: without having to modify an external config)?
Source annotations are available for suppressing per-instance issues, but no source annotations are available to disable checkers entirely.
I don't see an option for disabling specific checkers in Coverity Scan. Checker enable/disable and tuning options are available when using a Coverity installation. I don't know why those capabilities wouldn't be exposed to Coverity Scan users.
For instance, I'm not sure it's valuable for us to get notification on any member not initialized by a ctor. That could readily be detected by clang-tidy or clang warnings and we don't implement such checks in those places (which would be higher value because they can find the issue sooner rather than waiting for a long-running static analysis to come back with results).
I'm going to push back on this a bit. I've had to debug problems in Clang that turned out to be due to failure to initialize a data member. I find the number of uninitialized data member issues that Coverity reports on LLVM to be out of line with respect
to other projects I've seen scanned. I'm skeptical that omitting initializers has a significant impact on performance.
Coverity doesn't report every data member that isn't initialized by a member init; it looks for evidence that the data member is not initialized by any functions invoked by the constructor as well (whether in the same TU or not). It will therefore report
fewer FPs than either clang-tidy or clang warnings.
Tom.
On 6/11/2021 9:58 AM, Tom Honermann via llvm-dev wrote:
I confirmed with internal Coverity support that such options are not currently exposed to Coverity Scan users. Enhancement requests sent to scan-...@coverity.com will be considered for future Coverity Scan updates (I encourage sending an enhancement request).On 6/10/2021 2:54 PM, David Blaikie via llvm-dev wrote:
On Thu, Jun 10, 2021 at 10:42 AM Mehdi AMINI <joke...@gmail.com> wrote:
From Coverity:
Please find the latest report on new defect(s) introduced to llvm found with Coverity Scan.
8 new defect(s) introduced to llvm found with Coverity Scan.
19 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 8 of 8 defect(s)
** CID 1457502: Uninitialized members (UNINIT_CTOR)
/lld/MachO/InputSection.h: 109 in lld::macho::StringPiece::StringPiece(unsigned long, unsigned int)()
Is it easy for us to disable low-value findings (both on a per-instance, but also per-check-tye) basis in source (ie: without having to modify an external config)?
Source annotations are available for suppressing per-instance issues, but no source annotations are available to disable checkers entirely.
I don't see an option for disabling specific checkers in Coverity Scan. Checker enable/disable and tuning options are available when using a Coverity installation. I don't know why those capabilities wouldn't be exposed to Coverity Scan users.
For instance, I'm not sure it's valuable for us to get notification on any member not initialized by a ctor. That could readily be detected by clang-tidy or clang warnings and we don't implement such checks in those places (which would be higher value because they can find the issue sooner rather than waiting for a long-running static analysis to come back with results).
I'm going to push back on this a bit. I've had to debug problems in Clang that turned out to be due to failure to initialize a data member. I find the number of uninitialized data member issues that Coverity reports on LLVM to be out of line with respect to other projects I've seen scanned. I'm skeptical that omitting initializers has a significant impact on performance.
On Fri, Jun 11, 2021 at 8:15 AM Tom Honermann <Thomas.H...@synopsys.com> wrote:
On 6/11/2021 9:58 AM, Tom Honermann via llvm-dev wrote:
I confirmed with internal Coverity support that such options are not currently exposed to Coverity Scan users. Enhancement requests sent to scan-...@coverity.com will be considered for future Coverity Scan updates (I encourage sending an enhancement request).On 6/10/2021 2:54 PM, David Blaikie via llvm-dev wrote:
On Thu, Jun 10, 2021 at 10:42 AM Mehdi AMINI <joke...@gmail.com> wrote:
From Coverity:
Please find the latest report on new defect(s) introduced to llvm found with Coverity Scan.
8 new defect(s) introduced to llvm found with Coverity Scan.
19 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 8 of 8 defect(s)
** CID 1457502: Uninitialized members (UNINIT_CTOR)
/lld/MachO/InputSection.h: 109 in lld::macho::StringPiece::StringPiece(unsigned long, unsigned int)()
Is it easy for us to disable low-value findings (both on a per-instance, but also per-check-tye) basis in source (ie: without having to modify an external config)?
Source annotations are available for suppressing per-instance issues, but no source annotations are available to disable checkers entirely.
I don't see an option for disabling specific checkers in Coverity Scan. Checker enable/disable and tuning options are available when using a Coverity installation. I don't know why those capabilities wouldn't be exposed to Coverity Scan users.
Having not setup the scanning/emails/etc I don't think I have enough context (I'm not exactly a "user" - at best I've read one email produced by the tool) to make a feature request.
For instance, I'm not sure it's valuable for us to get notification on any member not initialized by a ctor. That could readily be detected by clang-tidy or clang warnings and we don't implement such checks in those places (which would be higher value because they can find the issue sooner rather than waiting for a long-running static analysis to come back with results).
I'm going to push back on this a bit. I've had to debug problems in Clang that turned out to be due to failure to initialize a data member. I find the number of uninitialized data member issues that Coverity reports on LLVM to be out of line with respect to other projects I've seen scanned. I'm skeptical that omitting initializers has a significant impact on performance.
The tradeoff is that initializing values that aren't meant to be used reduces msan's ability to identify bugs if such a value is really used.
Yes, fair enough. Perhaps there is a way to provide a poisened initializer that is (effectively) elided when msan is enabled and used otherwise?
struct S {
int *p = POISON(nullptr);
};
Tom.