[krbdev.mit.edu #3665] idea for kerberos!
Folkert van Heusden via RT
rt-comment at krbdev.mit.edu
Wed Apr 19 04:02:13 EDT 2006
Ok, thanks for your reply and for considering!
On Tue, Apr 18, 2006 at 05:41:44PM -0400, Ken Raeburn via RT wrote:
> On Apr 18, 2006, at 17:11, Folkert van Heusden via RT wrote:
> > Maybe it is a good idee to get kerberos scanned by coverity!
> > http://scan.coverity.com/
> > Coverity is an excellent static sourcecode analyzer which found quit a
> > few bugs in the linux kernel. I'm NOT in any way related to them
> > (altough I'm really hoping they'll scan multitail as well). Please see
> > that page for a list of all the projects they're already scanning.
>
>
> Yeah, I thought about this after seeing some of the work they've done
> on GNU Emacs recently. But a couple of issues come to mind:
>
> 1) They've gotten quite a few false positives in the reports I've
> seen. The most common is probably the "possibly uninitialized" type
> where initialization happens in a path that also includes a setting
> of a second variable that you need to have in order to reach the site
> of the warning; i.e., if the variable being warned about wasn't set,
> then other conditions necessary to reach the warning site couldn't be
> met.
>
> 2) If we (MIT, or some other developers who want to help out) have
> got the cycles to chase down these reports, we could start by
> applying OCD-like focus to cleaning up the warnings GCC spits out
> during a build. That's not to say that using the Coverity tool
> wouldn't be useful. But we've got other, simpler things we could do
> first to knock off the more obvious possible problems, and mildly
> "interesting" data/control flow constructs that trigger false
> positives in simple analyses like these, and we aren't doing enough
> of *that* currently in my opinion.
>
> If you feel like tackling either of these -- GCC warnings or Coverity
> -- and sorting through the false positives and giving us patches for
> the rest, I expect we'd be happy to take them.... :-)
>
> Ken
>
> P.S. There's also Splint, which I've used a few times on parts of
> our code to search for possible problems; you'll even find some
> Splint annotations in the code in a few places. Unfortunately,
> Splint has problems with functions like realloc() where the memory
> management behavior goes two different ways depending on success or
> failure.
Folkert van Heusden
--
Temperature outside: 10.562500, temperature livingroom: 19.7
----------------------------------------------------------------------
Phone: +31-6-41278122, PGP-key: 1F28D8AE, www.vanheusden.com
More information about the krb5-bugs
mailing list