Summary: Only run the buck (and ant) tests if the tools can be found at ./configure-time. Reviewed By: jberdine Differential Revision: D4167586 fbshipit-source-id: e77b736master
parent
281d5b49fe
commit
2d846d89a6
@ -0,0 +1,29 @@
|
||||
# Copyright (c) 2016 - present Facebook, Inc.
|
||||
# All rights reserved.
|
||||
#
|
||||
# This source code is licensed under the BSD style license found in the
|
||||
# LICENSE file in the root directory of this source tree. An additional grant
|
||||
# of patent rights can be found in the PATENTS file in the same directory.
|
||||
|
||||
CURDIR = $(shell pwd)
|
||||
|
||||
TESTS_DIR = ../..
|
||||
ROOT_DIR = $(TESTS_DIR)/../..
|
||||
|
||||
ANALYZER = infer
|
||||
SOURCES = $(wildcard $(TESTS_DIR)/codetoanalyze/java/infer/*.java)
|
||||
OBJECTS = $(ROOT_DIR)/buck-out/gen/infer/tests/codetoanalyze/java/infer/lib__compile__output/compile.jar
|
||||
INFERPRINT_OPTIONS = --project-root $(ROOT_DIR) --issues-tests
|
||||
CLEAN_EXTRAS = $(ROOT_DIR)/buck-out/ $(CURDIR)/buck-out/
|
||||
|
||||
include $(TESTS_DIR)/java.make
|
||||
include $(TESTS_DIR)/base.make
|
||||
|
||||
$(JAR_OUTPUT): $(JAVA_SOURCE_FILES)
|
||||
NO_BUCKD=1 buck build --no-cache //infer/tests/codetoanalyze/java/infer:compile
|
||||
|
||||
infer-out/report.json: $(INFER_BIN) $(JAVA_SOURCE_FILES)
|
||||
$(call silent_on_success,\
|
||||
cd $(ROOT_DIR) && \
|
||||
NO_BUCKD=1 $(INFER_BIN) -a $(ANALYZER) --results-dir $(CURDIR)/infer-out -- \
|
||||
buck build --no-cache //infer/tests/codetoanalyze/java/infer:compile)
|
@ -0,0 +1,187 @@
|
||||
infer/tests/codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.fieldReadInCalleeMayCauseFalseNegative(), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.fieldReadInCalleeWithAngelicObjFieldMayCauseFalseNegative(), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.skipFunctionInLoopMayCauseFalseNegative(), 5, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/AutoGenerated.java, void AutoGenerated.npe(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/Builtins.java, void Builtins.doNotBlockError(Object), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, T CloseableAsResourceExample.sourceOfNullWithResourceLeak(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.failToCloseWithCloseQuietly(), 5, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.leakFoundWhenIndirectlyImplementingCloseable(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.notClosingCloseable(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.notClosingWrapper(), 2, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.skippedVritualCallDoesNotCloseResourceOnReceiver(), 2, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.withException(), 4, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ContextLeaks.java, ContextLeaks$Singleton ContextLeaks$Singleton.getInstance(Context), 4, CONTEXT_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ContextLeaks.java, ContextLeaks$Singleton ContextLeaks.singletonLeak(), 1, CONTEXT_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.directLeak(), 2, CONTEXT_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.indirectLeak(), 4, CONTEXT_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.leakAfterInstanceFieldWrite(), 3, CONTEXT_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.nonStaticInnerClassLeak(), 2, CONTEXT_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.completeDownloadNotClosed(DownloadManager), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.cursorNotClosed(SQLiteDatabase), 4, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.getBucketCountNotClosed(), 10, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.getImageCountHelperNotClosed(String), 13, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CursorLeaks.java, void CursorLeaks.loadPrefsFromContentProviderNotClosed(), 11, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/CursorLeaks.java, void CursorLeaks.queryUVMLegacyDbNotClosed(), 4, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/DynamicDispatch.java, void DynamicDispatch.dynamicDispatchShouldNotCauseFalseNegativeEasy(), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/DynamicDispatch.java, void DynamicDispatch.interfaceShouldNotCauseFalseNegativeEasy(), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/DynamicDispatch.java, void DynamicDispatch.interfaceShouldNotCauseFalseNegativeHard(DynamicDispatch$Interface), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.bufferedInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.checkedInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.cipherInputStreamNotClosedAfterSkip(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.dataInputStreamNotClosedAfterRead(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.deflaterInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.digestInputStreamNotClosedAfterRead(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.gzipInputStreamNotClosedAfterRead(), 4, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.gzipInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.inflaterInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.pushbackInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.bufferedOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.checkedOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.cipherOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.dataOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.deflaterOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.digestOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.filterOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush(), 4, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.inflaterOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.printStreamNotClosedAfterWrite(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, Object GuardedByExample.byRefTrickyBad(), 5, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, String GuardedByExample$3.readFromInnerClassBad1(), 2, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, String GuardedByExample$4.readFromInnerClassBad2(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFAfterBlockBad(), 3, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBad(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadButSuppressedOther(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadWrongAnnotation(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadWrongLock(), 2, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readHBad(), 2, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readHBadSynchronizedMethodShouldntHelp(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedMethodReadBad(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedMethodWriteBad(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedOnThisBad(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFAfterBlockBad(), 3, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFBad(), 1, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFBadWrongLock(), 2, UNSAFE_GUARDED_BY_ACCESS
|
||||
infer/tests/codetoanalyze/java/infer/HashMapExample.java, int HashMapExample.getOneIntegerWithoutCheck(), 6, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/HashMapExample.java, void HashMapExample.getTwoIntegersWithOneCheck(Integer,Integer), 11, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/InvokeDynamic.java, int InvokeDynamic.lambda$npeInLambdaBad$1(String,String), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/InvokeDynamic.java, void InvokeDynamic.invokeDynamicThenNpeBad(List), 5, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, String NullPointerExceptions.hashmapNPE(HashMap,Object), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, String NullPointerExceptions.nullTryLock(FileChannel), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, String NullPointerExceptions.testSystemGetPropertyArgument(), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, String NullPointerExceptions.tryLockThrows(FileChannel), 6, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.NPEvalueOfFromHashmapBad(HashMap,int), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.nullListFiles(String), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.nullPointerException(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.nullPointerExceptionInterProc(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.nullPointerExceptionWithExceptionHandling(boolean), 5, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions$$$Class$Name$With$Dollars.npeWithDollars(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.badCheckShouldCauseNPE(), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.cursorFromContentResolverNPE(String), 9, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefNull(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefNullableGetter(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefNullableRet(boolean), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefUndefNullableRet(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefUndefNullableRetWrapper(), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterLoopOnList(NullPointerExceptions$L), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterUnlock1(Lock), 4, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterUnlock2(Lock), 6, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionArrayLength(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionCallArrayReadMethod(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionFromFailingFileOutputStreamConstructor(), 7, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionFromFaillingResourceConstructor(), 6, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionInArrayLengthLoop(java.lang.Object[]), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionUnlessFrameFails(), 4, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionWithNullArrayParameter(), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionWithNullObjectParameter(), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullableFieldNPE(), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullableParamNPE(Object), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.optionalNPE(Optional), 1, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.otherSinkWithNeverNullSource(), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.sinkWithNeverNullSource(), 3, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.someNPEAfterResourceLeak(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.stringConstantEqualsFalseNotNPE_FP(), 10, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.stringVarEqualsFalseNPE(), 5, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.testSystemGetPropertyReturn(), 2, NULL_DEREFERENCE
|
||||
infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.bufferedReaderNotClosedAfterRead(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.fileReaderNotClosedAfterRead(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.inputStreamReaderNotClosedAfterRead(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.pipedReaderFalsePositive(), 5, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.pipedReaderNotClosedAfterConnect(PipedWriter), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.pipedReaderNotClosedAfterConstructedWithWriter(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.pushbackReaderNotClosedAfterRead(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.readerNotClosedAfterRead(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, String ResourceLeaks.readInstallationFileBad(File), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, boolean ResourceLeaks.jarFileNotClosed(), 3, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, int ResourceLeaks.fileOutputStreamTwoLeaks1(boolean), 3, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, int ResourceLeaks.fileOutputStreamTwoLeaks1(boolean), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, int ResourceLeaks.readConfigNotCloseStream(String), 5, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.activityObtainTypedArrayAndLeak(Activity), 2, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.contextObtainTypedArrayAndLeak(Context), 2, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.copyFileLeak(File,File), 11, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.copyFileLeak(File,File), 11, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.deflaterLeak(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileInputStreamNotClosedAfterRead(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamNotClosed(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamNotClosedAfterWrite(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamOneLeak(), 2, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamTwoLeaks2(), 2, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamTwoLeaks2(), 5, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.inflaterLeak(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.jarInputStreamLeak(), 3, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.jarOutputStreamLeak(), 3, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.nestedBad1(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.nestedBad2(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.nestedBadJarInputStream(File), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.nestedBadJarOutputStream(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectInputStreamClosedNestedBad(), 3, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectInputStreamNotClosedAfterRead(), 3, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectInputStreamNotClosedAfterRead(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectOutputStreamClosedNestedBad(), 3, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectOutputStreamNotClosedAfterWrite(), 4, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectOutputStreamNotClosedAfterWrite(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.openHttpURLConnectionNotDisconnected(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.openHttpsURLConnectionNotDisconnected(), 3, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.parseFromInputStreamAndLeak(JsonFactory), 5, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.pipedInputStreamNotClosedAfterRead(PipedOutputStream), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.pipedOutputStreamNotClosedAfterWrite(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.scannerNotClosed(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.serverSocketNotClosed(), 12, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.socketNotClosed(), 1, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.themeObtainTypedArrayAndLeak(Resources$Theme), 2, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.twoResources(), 11, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.twoResourcesRandomAccessFile(), 10, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.twoResourcesServerSocket(), 10, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.zipFileLeakExceptionalBranch(), 5, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.socketIgnoreExceptionNoVerify(SSLSocketFactory), 9, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.socketNotVerifiedSimple(SSLSocketFactory), 3, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.socketVerifiedForgotToCheckRetval(SSLSocketFactory,HostnameVerifier,SSLSession), 7, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.taintingShouldNotPreventInference1(SSLSocketFactory), 4, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.taintingShouldNotPreventInference2(SSLSocketFactory), 3, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, Socket TaintExample.callReadInputStreamCauseTaintError(SSLSocketFactory), 3, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.contentValuesPutWithTaintedString(ContentValues,SharedPreferences,String,String), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethods1(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethods2(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethods3(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethodsUndefined1(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethodsUndefined2(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethodsUndefined3(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.simpleTaintErrorWithModelMethods(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.simpleTaintErrorWithModelMethodsUndefined(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testIntegritySinkAnnotReport(String), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testIntegritySourceAnnot(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testIntegritySourceInstanceFieldAnnot(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testIntegritySourceStaticFieldAnnot(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySinkAnnot1(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySinkAnnot3(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySourceAnnot(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySourceFieldAnnotPropagation(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySourceInstanceFieldAnnot(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySourceStaticFieldAnnot(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION
|
||||
infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.bufferedWriterNotClosedAfterWrite(), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.fileWriterNotClosedAfterWrite(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.outputStreamWriterNotClosedAfterWrite(), 6, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.pipedWriterNotClosedAfterConnect(PipedReader), 7, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.pipedWriterNotClosedAfterConstructedWithReader(), 8, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.printWriterNotClosedAfterAppend(), 4, RESOURCE_LEAK
|
||||
infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.writerNotClosedAfterWrite(), 6, RESOURCE_LEAK
|
@ -1,937 +0,0 @@
|
||||
[
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "Socket TaintExample.callReadInputStreamCauseTaintError(SSLSocketFactory)"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.contentValuesPutWithTaintedString(ContentValues,SharedPreferences,String,String)"
|
||||
},
|
||||
{
|
||||
"bug_type": "CONTEXT_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java",
|
||||
"procedure": "void ContextLeaks.directLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "CONTEXT_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java",
|
||||
"procedure": "ContextLeaks$Singleton ContextLeaks$Singleton.getInstance(Context)"
|
||||
},
|
||||
{
|
||||
"bug_type": "CONTEXT_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java",
|
||||
"procedure": "void ContextLeaks.indirectLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.interprocTaintErrorWithModelMethods1()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.interprocTaintErrorWithModelMethods2()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.interprocTaintErrorWithModelMethods3()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.interprocTaintErrorWithModelMethodsUndefined1()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.interprocTaintErrorWithModelMethodsUndefined2()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.interprocTaintErrorWithModelMethodsUndefined3()"
|
||||
},
|
||||
{
|
||||
"bug_type": "CONTEXT_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java",
|
||||
"procedure": "void ContextLeaks.leakAfterInstanceFieldWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "CONTEXT_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java",
|
||||
"procedure": "void ContextLeaks.nonStaticInnerClassLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.simpleTaintErrorWithModelMethods()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.simpleTaintErrorWithModelMethodsUndefined()"
|
||||
},
|
||||
{
|
||||
"bug_type": "CONTEXT_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java",
|
||||
"procedure": "ContextLeaks$Singleton ContextLeaks.singletonLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "InputStream TaintExample.socketIgnoreExceptionNoVerify(SSLSocketFactory)"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "InputStream TaintExample.socketNotVerifiedSimple(SSLSocketFactory)"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "InputStream TaintExample.socketVerifiedForgotToCheckRetval(SSLSocketFactory,HostnameVerifier,SSLSession)"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "InputStream TaintExample.taintingShouldNotPreventInference1(SSLSocketFactory)"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "InputStream TaintExample.taintingShouldNotPreventInference2(SSLSocketFactory)"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testIntegritySinkAnnotReport(String)"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testIntegritySourceAnnot()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testIntegritySourceInstanceFieldAnnot()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testIntegritySourceStaticFieldAnnot()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testPrivacySinkAnnot1()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testPrivacySinkAnnot3()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testPrivacySourceAnnot()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testPrivacySourceFieldAnnotPropagation()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testPrivacySourceInstanceFieldAnnot()"
|
||||
},
|
||||
{
|
||||
"bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/TaintExample.java",
|
||||
"procedure": "void TaintExample.testPrivacySourceStaticFieldAnnot()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "int NullPointerExceptions.NPEvalueOfFromHashmapBad(HashMap,int)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.activityObtainTypedArrayAndLeak(Activity)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.badCheckShouldCauseNPE()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.bufferedInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.bufferedOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java",
|
||||
"procedure": "void ReaderLeaks.bufferedReaderNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java",
|
||||
"procedure": "void WriterLeaks.bufferedWriterNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "Object GuardedByExample.byRefTrickyBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.checkedInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.checkedOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.cipherInputStreamNotClosedAfterSkip()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.cipherOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java",
|
||||
"procedure": "int CursorLeaks.completeDownloadNotClosed(DownloadManager)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.contextObtainTypedArrayAndLeak(Context)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.copyFileLeak(File,File)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.copyFileLeak(File,File)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.cursorFromContentResolverNPE(String)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java",
|
||||
"procedure": "int CursorLeaks.cursorNotClosed(SQLiteDatabase)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.dataInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.dataOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.deflaterInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.deflaterLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.deflaterOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.derefNull()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.derefNullableGetter()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.derefNullableRet(boolean)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.derefUndefNullableRet()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.derefUndefNullableRetWrapper()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.dereferenceAfterLoopOnList(NullPointerExceptions$L)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.dereferenceAfterUnlock1(Lock)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.dereferenceAfterUnlock2(Lock)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.digestInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.digestOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/Builtins.java",
|
||||
"procedure": "void Builtins.doNotBlockError(Object)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/DynamicDispatch.java",
|
||||
"procedure": "void DynamicDispatch.dynamicDispatchShouldNotCauseFalseNegativeEasy()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java",
|
||||
"procedure": "void CloseableAsResourceExample.failToCloseWithCloseQuietly()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/AnalysisStops.java",
|
||||
"procedure": "void AnalysisStops.fieldReadInCalleeMayCauseFalseNegative()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/AnalysisStops.java",
|
||||
"procedure": "void AnalysisStops.fieldReadInCalleeWithAngelicObjFieldMayCauseFalseNegative()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.fileInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.fileOutputStreamNotClosed()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.fileOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.fileOutputStreamOneLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "int ResourceLeaks.fileOutputStreamTwoLeaks1(boolean)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "int ResourceLeaks.fileOutputStreamTwoLeaks1(boolean)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.fileOutputStreamTwoLeaks2()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.fileOutputStreamTwoLeaks2()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java",
|
||||
"procedure": "void ReaderLeaks.fileReaderNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java",
|
||||
"procedure": "void WriterLeaks.fileWriterNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.filterOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java",
|
||||
"procedure": "int CursorLeaks.getBucketCountNotClosed()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java",
|
||||
"procedure": "int CursorLeaks.getImageCountHelperNotClosed(String)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/HashMapExample.java",
|
||||
"procedure": "int HashMapExample.getOneIntegerWithoutCheck()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/HashMapExample.java",
|
||||
"procedure": "void HashMapExample.getTwoIntegersWithOneCheck(Integer,Integer)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.gzipInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.gzipInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "String NullPointerExceptions.hashmapNPE(HashMap,Object)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.inflaterInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.inflaterLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.inflaterOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java",
|
||||
"procedure": "void ReaderLeaks.inputStreamReaderNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/DynamicDispatch.java",
|
||||
"procedure": "void DynamicDispatch.interfaceShouldNotCauseFalseNegativeEasy()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/DynamicDispatch.java",
|
||||
"procedure": "void DynamicDispatch.interfaceShouldNotCauseFalseNegativeHard(DynamicDispatch$Interface)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/InvokeDynamic.java",
|
||||
"procedure": "void InvokeDynamic.invokeDynamicThenNpeBad(List)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "boolean ResourceLeaks.jarFileNotClosed()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.jarInputStreamLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.jarOutputStreamLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/InvokeDynamic.java",
|
||||
"procedure": "int InvokeDynamic.lambda$npeInLambdaBad$1(String,String)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java",
|
||||
"procedure": "void CloseableAsResourceExample.leakFoundWhenIndirectlyImplementingCloseable()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java",
|
||||
"procedure": "void CursorLeaks.loadPrefsFromContentProviderNotClosed()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.nestedBad1()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.nestedBad2()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.nestedBadJarInputStream(File)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.nestedBadJarOutputStream()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java",
|
||||
"procedure": "void CloseableAsResourceExample.notClosingCloseable()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java",
|
||||
"procedure": "void CloseableAsResourceExample.notClosingWrapper()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/AutoGenerated.java",
|
||||
"procedure": "void AutoGenerated.npe()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions$$$Class$Name$With$Dollars.npeWithDollars()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "int NullPointerExceptions.nullListFiles(String)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "int NullPointerExceptions.nullPointerException()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullPointerExceptionArrayLength()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullPointerExceptionCallArrayReadMethod()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullPointerExceptionFromFailingFileOutputStreamConstructor()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullPointerExceptionFromFaillingResourceConstructor()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullPointerExceptionInArrayLengthLoop(java.lang.Object[])"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "int NullPointerExceptions.nullPointerExceptionInterProc()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullPointerExceptionUnlessFrameFails()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "int NullPointerExceptions.nullPointerExceptionWithExceptionHandling(boolean)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullPointerExceptionWithNullArrayParameter()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullPointerExceptionWithNullObjectParameter()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "String NullPointerExceptions.nullTryLock(FileChannel)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullableFieldNPE()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.nullableParamNPE(Object)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.objectInputStreamClosedNestedBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.objectInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.objectInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.objectOutputStreamClosedNestedBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.objectOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.objectOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.openHttpURLConnectionNotDisconnected()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.openHttpsURLConnectionNotDisconnected()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.optionalNPE(Optional)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.otherSinkWithNeverNullSource()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java",
|
||||
"procedure": "void WriterLeaks.outputStreamWriterNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.parseFromInputStreamAndLeak(JsonFactory)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.pipedInputStreamNotClosedAfterRead(PipedOutputStream)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.pipedOutputStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java",
|
||||
"procedure": "void ReaderLeaks.pipedReaderFalsePositive()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java",
|
||||
"procedure": "void ReaderLeaks.pipedReaderNotClosedAfterConnect(PipedWriter)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java",
|
||||
"procedure": "void ReaderLeaks.pipedReaderNotClosedAfterConstructedWithWriter()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java",
|
||||
"procedure": "void WriterLeaks.pipedWriterNotClosedAfterConnect(PipedReader)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java",
|
||||
"procedure": "void WriterLeaks.pipedWriterNotClosedAfterConstructedWithReader()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java",
|
||||
"procedure": "void FilterOutputStreamLeaks.printStreamNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java",
|
||||
"procedure": "void WriterLeaks.printWriterNotClosedAfterAppend()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java",
|
||||
"procedure": "void FilterInputStreamLeaks.pushbackInputStreamNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java",
|
||||
"procedure": "void ReaderLeaks.pushbackReaderNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java",
|
||||
"procedure": "void CursorLeaks.queryUVMLegacyDbNotClosed()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "int ResourceLeaks.readConfigNotCloseStream(String)"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.readFAfterBlockBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.readFBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.readFBadButSuppressedOther()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.readFBadWrongAnnotation()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.readFBadWrongLock()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "String GuardedByExample$3.readFromInnerClassBad1()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "String GuardedByExample$4.readFromInnerClassBad2()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.readHBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.readHBadSynchronizedMethodShouldntHelp()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "String ResourceLeaks.readInstallationFileBad(File)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java",
|
||||
"procedure": "void ReaderLeaks.readerNotClosedAfterRead()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.scannerNotClosed()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.serverSocketNotClosed()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.sinkWithNeverNullSource()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/AnalysisStops.java",
|
||||
"procedure": "void AnalysisStops.skipFunctionInLoopMayCauseFalseNegative()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java",
|
||||
"procedure": "void CloseableAsResourceExample.skippedVritualCallDoesNotCloseResourceOnReceiver()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.socketNotClosed()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.someNPEAfterResourceLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java",
|
||||
"procedure": "T CloseableAsResourceExample.sourceOfNullWithResourceLeak()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.stringConstantEqualsFalseNotNPE_FP()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.stringVarEqualsFalseNPE()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.synchronizedMethodReadBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.synchronizedMethodWriteBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.synchronizedOnThisBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "String NullPointerExceptions.testSystemGetPropertyArgument()"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "void NullPointerExceptions.testSystemGetPropertyReturn()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.themeObtainTypedArrayAndLeak(Resources$Theme)"
|
||||
},
|
||||
{
|
||||
"bug_type": "NULL_DEREFERENCE",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java",
|
||||
"procedure": "String NullPointerExceptions.tryLockThrows(FileChannel)"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.twoResources()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.twoResourcesRandomAccessFile()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.twoResourcesServerSocket()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java",
|
||||
"procedure": "void CloseableAsResourceExample.withException()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.writeFAfterBlockBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.writeFBad()"
|
||||
},
|
||||
{
|
||||
"bug_type": "UNSAFE_GUARDED_BY_ACCESS",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java",
|
||||
"procedure": "void GuardedByExample.writeFBadWrongLock()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java",
|
||||
"procedure": "void WriterLeaks.writerNotClosedAfterWrite()"
|
||||
},
|
||||
{
|
||||
"bug_type": "RESOURCE_LEAK",
|
||||
"file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java",
|
||||
"procedure": "void ResourceLeaks.zipFileLeakExceptionalBranch()"
|
||||
}
|
||||
]
|
Loading…
Reference in new issue