-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CodeQL #12
CodeQL #12
Conversation
I'm all for As for CodeQL, it has all false positives from LGTM and some more, most notably it doesn't seem to understand On the positive side, information is presented in much more readable way than LGTM did it. |
I have a suspicion that all of this fallout stems from https://github.com/TrenchBoot/secure-kernel-loader/security/code-scanning/14 and the likes of https://github.com/TrenchBoot/secure-kernel-loader/security/code-scanning/17 where CodeQL is clearly getting confused as to what a My best guess is that it's either something about not parsing The two "real" issues are the high severity ones. https://github.com/TrenchBoot/secure-kernel-loader/security/code-scanning/18 is a false positive, due to the identified code being unreachable in all cases where |
I've opened github/codeql#10600 for the noreturn issue, and github/codeql#10601 for the size_t issue. |
Both of these are closed already. Did you have any more comments or suggestions on how to move forward here? We could push this as part of the task: TrenchBoot/trenchboot-issues#19 |
CodeQL complains, and they're not strictly necessary. Signed-off-by: Andrew Cooper <[email protected]>
It turns out that CodeQL gets confused with an integer 'bits' value in the matrix, causing it to merge results. Switch to using strings values instead. Additionally, M32 is a very unintuitive name. Change the build system to take a BITS=32/64 input and parse it appropriately. Update the build invocations to match. Signed-off-by: Andrew Cooper <[email protected]>
LGTM is deprecated and will cease working in Decemeber, per https://github.blog/2022-08-15-the-next-step-for-lgtm-com-github-code-scanning/ Drop the LGTM badges too, as they will stop working as well. Signed-off-by: Andrew Cooper <[email protected]>
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looked it over...
Reviewed-by: Ross Philipson [email protected]
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed-by: Daniel P. Smith [email protected]
Several RFCs here.
@dpsmith Along with merging this, we should disable the LGTM plugin for the repo.
https://github.blog/2022-08-15-the-next-step-for-lgtm-com-github-code-scanning/ for full info.