|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2 2/5] xen/scripts: add cppcheck tool to the xen-analysis.py script
On Tue, 6 Dec 2022, Luca Fancellu wrote:
> > On 6 Dec 2022, at 17:06, Stefano Stabellini <sstabellini@xxxxxxxxxx> wrote:
> > On Tue, 6 Dec 2022, Luca Fancellu wrote:
> >> Hi Stefano,
> >>>>
> >>>> +++ b/docs/misra/false-positive-cppcheck.json
> >>>> @@ -0,0 +1,12 @@
> >>>> +{
> >>>> + "version": "1.0",
> >>>> + "content": [
> >>>> + {
> >>>> + "id": "SAF-0-false-positive-cppcheck",
> >>>> + "violation-id": "",
> >>>> + "tool-version": "",
> >>>> + "name": "Sentinel",
> >>>> + "text": "Next ID to be used"
> >>>> + }
> >>>> + ]
> >>>> +}
> >>>
> >>> I think we need to add to the cppcheck document how to figure out the
> >>> cppcheck id for a given violation in the html report
> >>
> >> I’m planning to send some patches with cppcheck false positive fixes,
> >> would them be enough?
> >>
> >> We already have a section in documenting-violation.rst on how to document
> >> the finding, for
> >> cppcheck it’s just a matter to get the text report, do you think it’s
> >> better to add a part to that section
> >> on how to locate the cppcheck violation id from its text report?
> >
> > Examples would certainly help a lot. Looking at the html results it
> > wasn't clear to me what the violation-id actually was. It took me a few
> > tries to understand that "shadowVariable" was the cppcheck violation-id.
> >
> > Maybe just add: look under the column "Defect ID" amoung the html
> > results to find the violation-id, such as "variableScope".
>
> I was thinking about showing where to locate the violation ID from the text
> report, do you think it’s better
> to give an example from the HTML report instead?
I haven't used the text report, only the HTML report, so far. Maybe you
could document both.
> So far I have added this part to the bottom of documenting-violations.rst:
>
> Also, the same tag can be used on other symbols from the linker that are
> declared in the codebase, because the justification holds for them too.
>
> A possible violation found by Cppcheck can be handled in the same way, from
> the
> cppcheck report it is possible to identify the violation id:
>
> | include/public/arch-arm.h(226,0):misra-c2012-20.7:style:Expressions
> resulting from the expansion of macro parameters shall be enclosed in
> parentheses (Misra rule 20.7)
>
> Given the violation id "misra-c2012-20.7", we can follow the procedure above
> to
> justify the finding.
Yes that makes sense, and maybe add something similar for the html
report
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |