diff --git a/infer/models/c/Makefile b/infer/models/c/Makefile index a4fcf0ee9..688fccc67 100644 --- a/infer/models/c/Makefile +++ b/infer/models/c/Makefile @@ -16,7 +16,7 @@ all: install $(INFER_RESULTS): $(C_MODELS_SOURCES) $(CLANG_DEPS_NO_MODELS) $(MAKEFILE_LIST) # make clean in src/ to recompile all the models $(QUIET)$(call silent_on_success,Building C models,\ - $(INFER_BIN) -o $(@D) --models-mode -- $(MAKE) -C src clean all) + $(INFER_BIN) -a checkers --biabduction-only -o $(@D) --models-mode -- $(MAKE) -C src clean all) $(C_MODELS_FILE): $(INFER_RESULTS) $(QUIET)$(INSTALL_DATA) $(dir $(INFER_RESULTS))/specs/*.specs $(SPECS_LIB_DIR) diff --git a/infer/models/cpp/Makefile b/infer/models/cpp/Makefile index c0556f08e..13c9d521b 100644 --- a/infer/models/cpp/Makefile +++ b/infer/models/cpp/Makefile @@ -18,7 +18,7 @@ all: install $(INFER_RESULTS): $(MODELS_SOURCES) $(CLANG_DEPS_NO_MODELS) $(MAKEFILE_LIST) # make clean in src/ to recompile all the models $(QUIET)$(call silent_on_success,Building C++ models,\ - $(INFER_BIN) -o $(@D) --models-mode -- $(MAKE) -C src clean all) + $(INFER_BIN) -a checkers --biabduction-only -o $(@D) --models-mode -- $(MAKE) -C src clean all) $(CPP_MODELS_FILE): $(INFER_RESULTS) $(QUIET)$(INSTALL_DATA) $(dir $(INFER_RESULTS))/specs/*.specs $(SPECS_LIB_DIR) diff --git a/infer/models/objc/Makefile b/infer/models/objc/Makefile index 83b61c09e..2106e8c3d 100644 --- a/infer/models/objc/Makefile +++ b/infer/models/objc/Makefile @@ -16,7 +16,7 @@ all: install $(INFER_RESULTS): $(OBJC_MODELS_SOURCES) $(CLANG_DEPS_NO_MODELS) $(MAKEFILE_LIST) # make clean in src/ to recompile all the models $(QUIET)$(call silent_on_success,Building Objective-C models,\ - $(INFER_BIN) -o $(@D) --models-mode -- $(MAKE) -C src clean all) + $(INFER_BIN) -a checkers --biabduction-only -o $(@D) --models-mode -- $(MAKE) -C src clean all) $(OBJC_MODELS_FILE): $(INFER_RESULTS) $(QUIET)$(INSTALL_DATA) $(dir $(INFER_RESULTS))/specs/*.specs $(SPECS_LIB_DIR) diff --git a/infer/tests/build_systems/ant/Makefile b/infer/tests/build_systems/ant/Makefile index 8f2faa985..7a4aa7253 100644 --- a/infer/tests/build_systems/ant/Makefile +++ b/infer/tests/build_systems/ant/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers SOURCES = $(wildcard src/infer/*.java) OBJECTS = $(patsubst %.java,ant_out/%.class,$(SOURCES)) INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/ant/issues.exp b/infer/tests/build_systems/ant/issues.exp index 6e2e80650..96f3e5cf7 100644 --- a/infer/tests/build_systems/ant/issues.exp +++ b/infer/tests/build_systems/ant/issues.exp @@ -1,6 +1,6 @@ codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.fieldReadInCalleeMayCauseFalseNegative(), 3, NULL_DEREFERENCE, [start of procedure fieldReadInCalleeMayCauseFalseNegative(),Skipping externalFunc2(): method has no implementation,start of procedure derefParam(...),Skipping toString(): unknown method] codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.fieldReadInCalleeWithAngelicObjFieldMayCauseFalseNegative(), 3, NULL_DEREFERENCE, [start of procedure fieldReadInCalleeWithAngelicObjFieldMayCauseFalseNegative(),Skipping externalFunc2(): method has no implementation,start of procedure derefParam(...),Skipping toString(): unknown method] -codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.skipFunctionInLoopMayCauseFalseNegative(), 5, NULL_DEREFERENCE, [start of procedure skipFunctionInLoopMayCauseFalseNegative(),Taking true branch,Skipping externalFunc(): method has no implementation,Taking false branch] +codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.skipFunctionInLoopMayCauseFalseNegative(), 5, NULL_DEREFERENCE, [start of procedure skipFunctionInLoopMayCauseFalseNegative(),Taking true branch,Skipping externalFunc(): method has no implementation,Taking true branch,Skipping externalFunc(): method has no implementation,Taking false branch] codetoanalyze/java/infer/AutoGenerated.java, void AutoGenerated.npe(), 2, NULL_DEREFERENCE, [start of procedure npe()] codetoanalyze/java/infer/Builtins.java, void Builtins.doNotBlockError(Object), 3, NULL_DEREFERENCE, [start of procedure doNotBlockError(...),Taking true branch] codetoanalyze/java/infer/CloseableAsResourceExample.java, T CloseableAsResourceExample.sourceOfNullWithResourceLeak(), 1, RESOURCE_LEAK, [start of procedure sourceOfNullWithResourceLeak(),start of procedure SomeResource(),return from a call to SomeResource.()] @@ -17,12 +17,12 @@ codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.directLeak(), 2, C codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.indirectLeak(), 4, CONTEXT_LEAK, [start of procedure indirectLeak(),start of procedure ContextLeaks$Obj(),return from a call to ContextLeaks$Obj.(),return from a call to void ContextLeaks.indirectLeak()] codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.leakAfterInstanceFieldWrite(), 3, CONTEXT_LEAK, [start of procedure leakAfterInstanceFieldWrite(),return from a call to void ContextLeaks.leakAfterInstanceFieldWrite()] codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.nonStaticInnerClassLeak(), 2, CONTEXT_LEAK, [start of procedure nonStaticInnerClassLeak(),start of procedure ContextLeaks$NonStaticInner(...),return from a call to ContextLeaks$NonStaticInner.(ContextLeaks),return from a call to void ContextLeaks.nonStaticInnerClassLeak()] -codetoanalyze/java/infer/CursorLeaks.java, Object CursorLeaks.cursorClosedCheckNullCheckClosed_FP(SQLiteDatabase), 13, RESOURCE_LEAK, [start of procedure cursorClosedCheckNullCheckClosed_FP(...),Taking false branch,Skipping getString(...): unknown method,Taking true branch,Taking false branch] +codetoanalyze/java/infer/CursorLeaks.java, Object CursorLeaks.cursorClosedCheckNullCheckClosed_FP(SQLiteDatabase), 17, RESOURCE_LEAK, [start of procedure cursorClosedCheckNullCheckClosed_FP(...),Taking false branch,Skipping getString(...): unknown method,Taking true branch,Taking false branch] codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.completeDownloadNotClosed(DownloadManager), 8, RESOURCE_LEAK, [start of procedure completeDownloadNotClosed(...),Taking false branch,Skipping getColumnIndex(...): unknown method] codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.cursorNotClosed(SQLiteDatabase), 4, RESOURCE_LEAK, [start of procedure cursorNotClosed(...),Skipping getCount(): unknown method] codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.getBucketCountNotClosed(), 10, RESOURCE_LEAK, [start of procedure getBucketCountNotClosed(),Taking false branch,Taking false branch] codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.getImageCountHelperNotClosed(String), 13, RESOURCE_LEAK, [start of procedure getImageCountHelperNotClosed(...),Taking true branch,Skipping getInt(...): unknown method] -codetoanalyze/java/infer/CursorLeaks.java, void CursorLeaks.loadPrefsFromContentProviderNotClosed(), 11, RESOURCE_LEAK, [start of procedure loadPrefsFromContentProviderNotClosed(),Taking false branch,Taking true branch] +codetoanalyze/java/infer/CursorLeaks.java, void CursorLeaks.loadPrefsFromContentProviderNotClosed(), 15, RESOURCE_LEAK, [start of procedure loadPrefsFromContentProviderNotClosed(),Taking false branch,Taking true branch,return from a call to void CursorLeaks.loadPrefsFromContentProviderNotClosed()] codetoanalyze/java/infer/CursorLeaks.java, void CursorLeaks.queryUVMLegacyDbNotClosed(), 4, RESOURCE_LEAK, [start of procedure queryUVMLegacyDbNotClosed(),Skipping setTables(...): unknown method,Taking true branch] codetoanalyze/java/infer/CursorNPEs.java, int CursorNPEs.cursorFromDownloadManagerNPE(DownloadManager), 5, NULL_DEREFERENCE, [start of procedure cursorFromDownloadManagerNPE(...)] codetoanalyze/java/infer/CursorNPEs.java, void CursorNPEs.cursorFromContentResolverNPE(String), 12, NULL_DEREFERENCE, [start of procedure cursorFromContentResolverNPE(...)] @@ -56,24 +56,42 @@ codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLe codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush(), 7, RESOURCE_LEAK, [start of procedure gzipOutputStreamNotClosedAfterFlush(),exception java.io.IOException] codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.inflaterOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK, [start of procedure inflaterOutputStreamNotClosedAfterWrite(),exception java.io.IOException] codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.printStreamNotClosedAfterWrite(), 6, RESOURCE_LEAK, [start of procedure printStreamNotClosedAfterWrite()] +codetoanalyze/java/infer/GuardedByExample.java, Object GuardedByExample.byRefTrickyBad(), 5, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.g`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.g`] codetoanalyze/java/infer/GuardedByExample.java, Object GuardedByExample.byRefTrickyBad(), 5, UNSAFE_GUARDED_BY_ACCESS, [start of procedure byRefTrickyBad()] codetoanalyze/java/infer/GuardedByExample.java, String GuardedByExample$3.readFromInnerClassBad1(), 2, UNSAFE_GUARDED_BY_ACCESS, [start of procedure readFromInnerClassBad1()] codetoanalyze/java/infer/GuardedByExample.java, String GuardedByExample$4.readFromInnerClassBad2(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure readFromInnerClassBad2()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample$Sub.badSub(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.xForSub`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.xForSub`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample$Sub.badSub(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure badSub()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.badGuardedByNormalLock(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.guardedbynl`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.guardedbynl`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.badGuardedByNormalLock(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure badGuardedByNormalLock()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.badGuardedByReentrantLock(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.guardedbyrel`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.guardedbyrel`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.badGuardedByReentrantLock(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure badGuardedByReentrantLock()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.guardedByTypeSyntaxBad(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.guardedByLock1`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.guardedByLock1`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.guardedByTypeSyntaxBad(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure guardedByTypeSyntaxBad()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.guardedByTypeSyntaxBad(), 2, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.guardedByLock2`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.guardedByLock2`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.guardedByTypeSyntaxBad(), 2, UNSAFE_GUARDED_BY_ACCESS, [start of procedure guardedByTypeSyntaxBad()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFAfterBlockBad(), 3, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFAfterBlockBad(), 3, UNSAFE_GUARDED_BY_ACCESS, [start of procedure readFAfterBlockBad()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBad(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBad(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure readFBad()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadWrongAnnotation(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadWrongAnnotation(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure readFBadWrongAnnotation()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadWrongLock(), 2, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadWrongLock(), 2, UNSAFE_GUARDED_BY_ACCESS, [start of procedure readFBadWrongLock()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFOkMethodAnnotated(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFOkSynchronized(), 2, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readGFromCopyOk(), 5, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.mCopyOfG`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.mCopyOfG`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readHBad(), 2, UNSAFE_GUARDED_BY_ACCESS, [start of procedure readHBad()] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readHBadSynchronizedMethodShouldntHelp(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure readHBadSynchronizedMethodShouldntHelp()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.reassignCopyOk(), 4, THREAD_SAFETY_VIOLATION, [access to `&this.codetoanalyze.java.infer.GuardedByExample.mCopyOfG`] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedMethodReadBad(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedMethodReadBad(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure synchronizedMethodReadBad()] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedMethodWriteBad(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure synchronizedMethodWriteBad()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedOnThisBad(), 1, THREAD_SAFETY_VIOLATION, [,access to `&#GB$codetoanalyze.java.infer.GuardedByExample.codetoanalyze.java.infer.GuardedByExample.sGuardedByClass`,,access to `&#GB$codetoanalyze.java.infer.GuardedByExample.codetoanalyze.java.infer.GuardedByExample.sGuardedByClass`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedOnThisBad(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure synchronizedOnThisBad()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFAfterBlockBad(), 3, THREAD_SAFETY_VIOLATION, [access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFAfterBlockBad(), 3, UNSAFE_GUARDED_BY_ACCESS, [start of procedure writeFAfterBlockBad()] +codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFBad(), 1, THREAD_SAFETY_VIOLATION, [,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`,,access to `&this.codetoanalyze.java.infer.GuardedByExample.f`] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFBad(), 1, UNSAFE_GUARDED_BY_ACCESS, [start of procedure writeFBad()] codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFBadWrongLock(), 2, UNSAFE_GUARDED_BY_ACCESS, [start of procedure writeFBadWrongLock()] codetoanalyze/java/infer/HashMapExample.java, int HashMapExample.getOneIntegerWithoutCheck(), 6, NULL_DEREFERENCE, [start of procedure getOneIntegerWithoutCheck()] @@ -105,7 +123,6 @@ codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions. codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefNullableRet(boolean), 2, NULL_DEREFERENCE, [start of procedure derefNullableRet(...),start of procedure nullableRet(...),Taking true branch,return from a call to Object NullPointerExceptions.nullableRet(boolean)] codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefUndefNullableRet(), 2, NULL_DEREFERENCE, [start of procedure derefUndefNullableRet(),Skipping undefNullableRet(): method has no implementation] codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefUndefNullableRetWrapper(), 1, NULL_DEREFERENCE, [start of procedure derefUndefNullableRetWrapper(),start of procedure undefNullableWrapper(),return from a call to Object NullPointerExceptions.undefNullableWrapper()] -codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterLoopOnList(NullPointerExceptions$L), 2, NULL_DEREFERENCE, [start of procedure dereferenceAfterLoopOnList(...),start of procedure returnsNullAfterLoopOnList(...),Taking true branch,Taking true branch,Taking false branch,return from a call to Object NullPointerExceptions.returnsNullAfterLoopOnList(NullPointerExceptions$L)] codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterUnlock1(Lock), 4, NULL_DEREFERENCE, [start of procedure dereferenceAfterUnlock1(...),Skipping toString(): unknown method] codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterUnlock2(Lock), 6, NULL_DEREFERENCE, [start of procedure dereferenceAfterUnlock2(...),Skipping toString(): unknown method] codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullDerefernceReturnOfSkippedFunctionBad(), 3, NULL_DEREFERENCE, [start of procedure nullDerefernceReturnOfSkippedFunctionBad(),Skipping unknownFunc(): method has no implementation,Taking true branch] @@ -147,8 +164,8 @@ codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.deflaterLeak(), codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileInputStreamNotClosedAfterRead(), 6, RESOURCE_LEAK, [start of procedure fileInputStreamNotClosedAfterRead(),exception java.io.IOException] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamNotClosed(), 1, RESOURCE_LEAK, [start of procedure fileOutputStreamNotClosed()] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamNotClosedAfterWrite(), 7, RESOURCE_LEAK, [start of procedure fileOutputStreamNotClosedAfterWrite(),exception java.io.IOException] -codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamOneLeak(), 2, RESOURCE_LEAK, [start of procedure fileOutputStreamOneLeak(),Taking true branch] -codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamTwoLeaks2(), 2, RESOURCE_LEAK, [start of procedure fileOutputStreamTwoLeaks2(),Taking true branch] +codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamOneLeak(), 5, RESOURCE_LEAK, [start of procedure fileOutputStreamOneLeak(),Taking true branch,return from a call to void ResourceLeaks.fileOutputStreamOneLeak()] +codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamTwoLeaks2(), 5, RESOURCE_LEAK, [start of procedure fileOutputStreamTwoLeaks2(),Taking true branch] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamTwoLeaks2(), 5, RESOURCE_LEAK, [start of procedure fileOutputStreamTwoLeaks2(),Taking true branch] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.inflaterLeak(), 1, RESOURCE_LEAK, [start of procedure inflaterLeak()] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.jarInputStreamLeak(), 3, RESOURCE_LEAK, [start of procedure jarInputStreamLeak()] @@ -170,7 +187,6 @@ codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.parseFromStringA codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.pipedInputStreamNotClosedAfterRead(PipedOutputStream), 6, RESOURCE_LEAK, [start of procedure pipedInputStreamNotClosedAfterRead(...),exception java.io.IOException] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.pipedOutputStreamNotClosedAfterWrite(), 7, RESOURCE_LEAK, [start of procedure pipedOutputStreamNotClosedAfterWrite(),exception java.io.IOException] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.scannerNotClosed(), 1, RESOURCE_LEAK, [start of procedure scannerNotClosed()] -codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.serverSocketNotClosed(), 12, RESOURCE_LEAK, [start of procedure serverSocketNotClosed(),Skipping ServerSocket(...): unknown method,exception java.io.IOException] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.socketNotClosed(), 1, RESOURCE_LEAK, [start of procedure socketNotClosed()] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.themeObtainTypedArrayAndLeak(Resources$Theme), 2, RESOURCE_LEAK, [start of procedure themeObtainTypedArrayAndLeak(...),start of procedure ignore(...),return from a call to void ResourceLeaks.ignore(TypedArray)] codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.twoResources(), 11, RESOURCE_LEAK, [start of procedure twoResources(),Taking true branch,exception java.io.IOException] diff --git a/infer/tests/build_systems/assembly/Makefile b/infer/tests/build_systems/assembly/Makefile index 3cff41b19..252aa47c0 100644 --- a/infer/tests/build_systems/assembly/Makefile +++ b/infer/tests/build_systems/assembly/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c INFER_OPTIONS = --report-custom-error --developer-mode --project-root ../codetoanalyze INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/buck-clang-db/Makefile b/infer/tests/build_systems/buck-clang-db/Makefile index 1a1d4ee0e..0571c86ce 100644 --- a/infer/tests/build_systems/buck-clang-db/Makefile +++ b/infer/tests/build_systems/buck-clang-db/Makefile @@ -9,7 +9,7 @@ TESTS_DIR = ../.. SOURCE_DIR = ../codetoanalyze -ANALYZER = infer +ANALYZER = checkers INFER_OPTIONS = --report-custom-error --developer-mode --project-root $(SOURCE_DIR) SOURCES = $(wildcard $(SOURCE_DIR)/*.cpp $(SOURCE_DIR)/*.h) OBJECTS = '$(SOURCE_DIR)/buck-out/gen/clang_compilation_database/__Hel lo\#compilation-database,x86_64.json' diff --git a/infer/tests/build_systems/buck/Makefile b/infer/tests/build_systems/buck/Makefile index 2bb8c4402..8f4c17b02 100644 --- a/infer/tests/build_systems/buck/Makefile +++ b/infer/tests/build_systems/buck/Makefile @@ -8,7 +8,7 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. -ANALYZER = infer +ANALYZER = checkers BUCK_TARGET = //infer/tests/build_systems/genrule/module2:module2 SOURCES = $(wildcard $(TESTS_DIR)/codetoanalyze/java/infer/*.java) OBJECTS = $(ROOT_DIR)/buck-out/gen/infer/tests/build_systems/genrule/module2/lib__module2__output/module2.jar diff --git a/infer/tests/build_systems/buck_cross_module/Makefile b/infer/tests/build_systems/buck_cross_module/Makefile index 6ce68895e..2b7554643 100644 --- a/infer/tests/build_systems/buck_cross_module/Makefile +++ b/infer/tests/build_systems/buck_cross_module/Makefile @@ -8,7 +8,7 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. -ANALYZER = infer +ANALYZER = checkers BUCK_TARGET = //infer/tests/build_systems/buck_cross_module/module2:module2 INFERPRINT_OPTIONS = --project-root $(ROOT_DIR) --issues-tests CLEAN_EXTRA = $(ROOT_DIR)/buck-out diff --git a/infer/tests/build_systems/buck_flavors/Makefile b/infer/tests/build_systems/buck_flavors/Makefile index d8ce934bf..577ede378 100644 --- a/infer/tests/build_systems/buck_flavors/Makefile +++ b/infer/tests/build_systems/buck_flavors/Makefile @@ -8,7 +8,7 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. -ANALYZER = infer +ANALYZER = checkers BUCK_TARGET = //src:hello @buck_target.txt SOURCES = $(wildcard src/*.c) $(wildcard src/subtarget1/*.c) $(wildcard src/subtarget2/*.c) OBJECTS = buck-out/gen/src/hello\#compile-hello.c.o1f717d69,default/hello.c.o diff --git a/infer/tests/build_systems/buck_flavors_deterministic/Makefile b/infer/tests/build_systems/buck_flavors_deterministic/Makefile index 2722015e7..b1ced1157 100644 --- a/infer/tests/build_systems/buck_flavors_deterministic/Makefile +++ b/infer/tests/build_systems/buck_flavors_deterministic/Makefile @@ -8,7 +8,7 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. -ANALYZER = infer +ANALYZER = checkers BUCK_TARGET = //src:hello SOURCES = $(wildcard src/hello.c) OBJECTS = buck-out/gen/src/hello\#compile-hello.c.o1f717d69,default/hello.c.o diff --git a/infer/tests/build_systems/buck_flavors_run/Makefile b/infer/tests/build_systems/buck_flavors_run/Makefile index 59debc547..c1a16ea26 100644 --- a/infer/tests/build_systems/buck_flavors_run/Makefile +++ b/infer/tests/build_systems/buck_flavors_run/Makefile @@ -8,7 +8,7 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. -ANALYZER = infer +ANALYZER = checkers BUCK_TARGET = //src:hello SOURCES = $(wildcard src/hello.c) OBJECTS = buck-out/gen/src/hello\#compile-hello.c.o1f717d69,default/hello.c.o diff --git a/infer/tests/build_systems/clang_compilation_db/Makefile b/infer/tests/build_systems/clang_compilation_db/Makefile index d22c189e0..2bf5a9a41 100644 --- a/infer/tests/build_systems/clang_compilation_db/Makefile +++ b/infer/tests/build_systems/clang_compilation_db/Makefile @@ -10,7 +10,7 @@ TESTS_DIR = ../.. CMAKE_DIR = ../codetoanalyze/clang_compilation_database CMAKE_BUILD_DIR = $(CMAKE_DIR)/_build_infer -ANALYZER = infer +ANALYZER = checkers CLEAN_EXTRA = $(CMAKE_BUILD_DIR) INFER_OPTIONS = --report-custom-error --developer-mode --project-root $(CMAKE_DIR) SOURCES = $(CMAKE_DIR)/hello.cpp diff --git a/infer/tests/build_systems/clang_compilation_db_escaped/Makefile b/infer/tests/build_systems/clang_compilation_db_escaped/Makefile index dc7e5f411..e9a7ba584 100644 --- a/infer/tests/build_systems/clang_compilation_db_escaped/Makefile +++ b/infer/tests/build_systems/clang_compilation_db_escaped/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers INFER_OPTIONS = --report-custom-error --developer-mode SOURCES = ../codetoanalyze/path\ with\ spaces/hel\ lo.c OBJECTS = $(SOURCES:.c=.o) diff --git a/infer/tests/build_systems/clang_compilation_db_relpath/Makefile b/infer/tests/build_systems/clang_compilation_db_relpath/Makefile index ba8cf52b0..e55adc5f3 100644 --- a/infer/tests/build_systems/clang_compilation_db_relpath/Makefile +++ b/infer/tests/build_systems/clang_compilation_db_relpath/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers INFER_OPTIONS = --report-custom-error --developer-mode SOURCES = \ ../codetoanalyze/hello.c ../codetoanalyze/hello2.c ../codetoanalyze/hello3.c \ diff --git a/infer/tests/build_systems/clang_multiple_files/Makefile b/infer/tests/build_systems/clang_multiple_files/Makefile index 052b803f5..c3ecc06d5 100644 --- a/infer/tests/build_systems/clang_multiple_files/Makefile +++ b/infer/tests/build_systems/clang_multiple_files/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c INFER_OPTIONS = --project-root ../codetoanalyze diff --git a/infer/tests/build_systems/clang_unknown_ext/Makefile b/infer/tests/build_systems/clang_unknown_ext/Makefile index 20f8b3891..cddb48313 100644 --- a/infer/tests/build_systems/clang_unknown_ext/Makefile +++ b/infer/tests/build_systems/clang_unknown_ext/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -x c -c INFER_OPTIONS = --project-root ../codetoanalyze diff --git a/infer/tests/build_systems/clang_with_E_flag/Makefile b/infer/tests/build_systems/clang_with_E_flag/Makefile index e688b72fa..e3a41a656 100644 --- a/infer/tests/build_systems/clang_with_E_flag/Makefile +++ b/infer/tests/build_systems/clang_with_E_flag/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -E -c INFER_OPTIONS = --report-custom-error --developer-mode --project-root ../codetoanalyze INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/clang_with_MD_flag/Makefile b/infer/tests/build_systems/clang_with_MD_flag/Makefile index 8b90d8acd..b27b0a206 100644 --- a/infer/tests/build_systems/clang_with_MD_flag/Makefile +++ b/infer/tests/build_systems/clang_with_MD_flag/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -MD -c INFER_OPTIONS = --report-custom-error --developer-mode --project-root ../codetoanalyze INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/clang_with_M_flag/Makefile b/infer/tests/build_systems/clang_with_M_flag/Makefile index 5119047ae..036049feb 100644 --- a/infer/tests/build_systems/clang_with_M_flag/Makefile +++ b/infer/tests/build_systems/clang_with_M_flag/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -M -c INFER_OPTIONS = --report-custom-error --developer-mode --project-root ../codetoanalyze INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/clang_with_blacklisted_flags/Makefile b/infer/tests/build_systems/clang_with_blacklisted_flags/Makefile index 5cf249be1..5a7c4f7ca 100644 --- a/infer/tests/build_systems/clang_with_blacklisted_flags/Makefile +++ b/infer/tests/build_systems/clang_with_blacklisted_flags/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers # The "-index-store-path " argument does not exist in Clang and it gets # discarded without any error message. The problem is that its argument, # a folder, is not discarded, and Clang considers it as a source file. This diff --git a/infer/tests/build_systems/cmake/Makefile b/infer/tests/build_systems/cmake/Makefile index b29866045..baa978c63 100644 --- a/infer/tests/build_systems/cmake/Makefile +++ b/infer/tests/build_systems/cmake/Makefile @@ -11,7 +11,7 @@ CMAKE_DIR = ../codetoanalyze/cmake CMAKE_BUILD_DIR = $(CMAKE_DIR)/_build CMAKE_ANALYZE_DIR = $(CMAKE_DIR)/_build_infer -ANALYZER = infer +ANALYZER = checkers CLEAN_EXTRA = $(CMAKE_BUILD_DIR) $(CMAKE_ANALYZE_DIR) INFER_OPTIONS = --project-root $(TESTS_DIR) SOURCES = $(CMAKE_DIR)/hello.c diff --git a/infer/tests/build_systems/delete_results_dir/Makefile b/infer/tests/build_systems/delete_results_dir/Makefile index a050a6991..48020e5e5 100644 --- a/infer/tests/build_systems/delete_results_dir/Makefile +++ b/infer/tests/build_systems/delete_results_dir/Makefile @@ -10,7 +10,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CODETOANALYZE_DIR = ../codetoanalyze diff --git a/infer/tests/build_systems/fail_on_issue/Makefile b/infer/tests/build_systems/fail_on_issue/Makefile index d4cd63fcd..dbdb59203 100644 --- a/infer/tests/build_systems/fail_on_issue/Makefile +++ b/infer/tests/build_systems/fail_on_issue/Makefile @@ -9,7 +9,7 @@ TESTS_DIR = ../.. include $(TESTS_DIR)/base.make -ANALYZER = infer +ANALYZER = checkers CODETOANALYZE_DIR = ../codetoanalyze diff --git a/infer/tests/build_systems/genrule/Makefile b/infer/tests/build_systems/genrule/Makefile index 538ab4a5c..25bf44dc8 100644 --- a/infer/tests/build_systems/genrule/Makefile +++ b/infer/tests/build_systems/genrule/Makefile @@ -8,7 +8,7 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. -ANALYZER = infer +ANALYZER = checkers BUCK_TARGET = //infer/tests/build_systems/genrule/module2:module2 INFER_TARGET = $(BUCK_TARGET)_infer SOURCES = $(wildcard $(TESTS_DIR)/codetoanalyze/java/infer/*.java) diff --git a/infer/tests/build_systems/gradle/Makefile b/infer/tests/build_systems/gradle/Makefile index 0bd9a0918..616fce9d9 100644 --- a/infer/tests/build_systems/gradle/Makefile +++ b/infer/tests/build_systems/gradle/Makefile @@ -8,7 +8,7 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. -ANALYZER = infer +ANALYZER = checkers SOURCES_DIR = $(ROOT_DIR)/examples/java_hello SOURCES = $(wildcard $(SOURCES_DIR)/*.java) # no objects since we only run a mock gradle that cannot compile Java sources diff --git a/infer/tests/build_systems/inferconfig/Makefile b/infer/tests/build_systems/inferconfig/Makefile index be42f0a21..100743e25 100644 --- a/infer/tests/build_systems/inferconfig/Makefile +++ b/infer/tests/build_systems/inferconfig/Makefile @@ -10,7 +10,7 @@ TESTS_DIR = ../.. CMAKE_DIR = $(CURDIR)/../codetoanalyze/clang_compilation_database CMAKE_BUILD_DIR = $(CURDIR)/_build_infer -ANALYZER = infer +ANALYZER = checkers CLEAN_EXTRA = $(CMAKE_BUILD_DIR) INFER_OPTIONS = --report-custom-error --developer-mode --project-root $(CMAKE_DIR) SOURCES = $(CMAKE_DIR)/hello.cpp diff --git a/infer/tests/build_systems/javac/Makefile b/infer/tests/build_systems/javac/Makefile index 69f293369..0a22eaeb5 100644 --- a/infer/tests/build_systems/javac/Makefile +++ b/infer/tests/build_systems/javac/Makefile @@ -8,7 +8,7 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. -ANALYZER = infer +ANALYZER = checkers INFER_OPTIONS = INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/make/Makefile b/infer/tests/build_systems/make/Makefile index 4c0cdfa52..aff425f46 100644 --- a/infer/tests/build_systems/make/Makefile +++ b/infer/tests/build_systems/make/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/mvn/Makefile b/infer/tests/build_systems/mvn/Makefile index dec3174e9..9d7464032 100644 --- a/infer/tests/build_systems/mvn/Makefile +++ b/infer/tests/build_systems/mvn/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers INFERPRINT_OPTIONS = --issues-tests MVN_DIRS = app_with_submodules simple_app app_with_infer_profile app_with_profiles diff --git a/infer/tests/build_systems/ndk_build/Makefile b/infer/tests/build_systems/ndk_build/Makefile index e04a29848..ba6706af0 100644 --- a/infer/tests/build_systems/ndk_build/Makefile +++ b/infer/tests/build_systems/ndk_build/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers PROJECT_ROOT = ../codetoanalyze/ndk-build/hello_app SOURCES = $(PROJECT_ROOT)/hello.c diff --git a/infer/tests/build_systems/objc_getters_setters/Makefile b/infer/tests/build_systems/objc_getters_setters/Makefile index 33e01af78..2105475d3 100644 --- a/infer/tests/build_systems/objc_getters_setters/Makefile +++ b/infer/tests/build_systems/objc_getters_setters/Makefile @@ -9,10 +9,10 @@ TESTS_DIR = ../.. ROOT_DIR = $(TESTS_DIR)/../.. CODETOANALYZE_DIR = ../codetoanalyze/objc_getters_setters -ANALYZER = infer +ANALYZER = checkers SOURCES = $(CODETOANALYZE_DIR)/A.m $(CODETOANALYZE_DIR)/B.m OBJECTS = $(CODETOANALYZE_DIR)/A.o $(CODETOANALYZE_DIR)/B.o -INFER_OPTIONS = --report-custom-error --developer-mode --project-root $(TESTS_DIR) +INFER_OPTIONS = --biabduction-only --report-custom-error --developer-mode --project-root $(TESTS_DIR) INFERPRINT_OPTIONS = --project-root $(TESTS_DIR) --issues-tests CLEAN_EXTRA = -c diff --git a/infer/tests/build_systems/preprocessed/Makefile b/infer/tests/build_systems/preprocessed/Makefile index 48d99c115..c648b1643 100644 --- a/infer/tests/build_systems/preprocessed/Makefile +++ b/infer/tests/build_systems/preprocessed/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c INFER_OPTIONS = --report-custom-error --developer-mode --headers --project-root ../codetoanalyze INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/project_root_rel/Makefile b/infer/tests/build_systems/project_root_rel/Makefile index 88e8af7d6..6dffcb757 100644 --- a/infer/tests/build_systems/project_root_rel/Makefile +++ b/infer/tests/build_systems/project_root_rel/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c INFER_OPTIONS = --report-custom-error --developer-mode --project-root $(TESTS_DIR) INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/reactive/Makefile b/infer/tests/build_systems/reactive/Makefile index 83e32cc4b..6ca177cf7 100644 --- a/infer/tests/build_systems/reactive/Makefile +++ b/infer/tests/build_systems/reactive/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c INFER_OPTIONS = --project-root ../codetoanalyze diff --git a/infer/tests/build_systems/results_xml/Makefile b/infer/tests/build_systems/results_xml/Makefile index e65581eda..3c371c5e0 100644 --- a/infer/tests/build_systems/results_xml/Makefile +++ b/infer/tests/build_systems/results_xml/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CODETOANALYZE_DIR = ../codetoanalyze diff --git a/infer/tests/build_systems/utf8_in_procname/Makefile b/infer/tests/build_systems/utf8_in_procname/Makefile index ddf1ef8f5..7907e0f2d 100644 --- a/infer/tests/build_systems/utf8_in_procname/Makefile +++ b/infer/tests/build_systems/utf8_in_procname/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c INFER_OPTIONS = --project-root ../codetoanalyze diff --git a/infer/tests/build_systems/utf8_in_pwd/Makefile b/infer/tests/build_systems/utf8_in_pwd/Makefile index 0e5151e37..4df5f0251 100644 --- a/infer/tests/build_systems/utf8_in_pwd/Makefile +++ b/infer/tests/build_systems/utf8_in_pwd/Makefile @@ -33,7 +33,7 @@ MAKE_DIR = $(UTF8_DIR)/make MAKE_SOURCES_DIR = ../codetoanalyze/make MAKE_SOURCES = $(wildcard $(MAKE_SOURCES_DIR)/*.c $(MAKE_SOURCES_DIR)/*.java) -ANALYZER = infer +ANALYZER = checkers CLEAN_EXTRA = $(CMAKE_BUILD_DIR) $(CMAKE_ANALYZE_DIR) infer-out-cmake INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/waf/Makefile b/infer/tests/build_systems/waf/Makefile index aaf016c9a..499b8ab5a 100644 --- a/infer/tests/build_systems/waf/Makefile +++ b/infer/tests/build_systems/waf/Makefile @@ -8,7 +8,7 @@ CUR_DIR = $(shell pwd) TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c INFERPRINT_OPTIONS = --issues-tests diff --git a/infer/tests/build_systems/xcodebuild/Makefile b/infer/tests/build_systems/xcodebuild/Makefile index 7a37aec44..0f7e4cb7e 100644 --- a/infer/tests/build_systems/xcodebuild/Makefile +++ b/infer/tests/build_systems/xcodebuild/Makefile @@ -7,7 +7,7 @@ TESTS_DIR = ../.. -ANALYZER = infer +ANALYZER = checkers APP_DIR = ../codetoanalyze/xcodebuild/simple_app SOURCES = $(wildcard $(APP_DIR)/simple_app/*.m) OBJECTS = $(APP_DIR)/app_built diff --git a/infer/tests/codetoanalyze/c/errors/Makefile b/infer/tests/codetoanalyze/c/errors/Makefile index 44b71bded..981dd044f 100644 --- a/infer/tests/codetoanalyze/c/errors/Makefile +++ b/infer/tests/codetoanalyze/c/errors/Makefile @@ -7,9 +7,12 @@ TESTS_DIR = ../../.. -ANALYZER = infer +ANALYZER = checkers CLANG_OPTIONS = -c -INFER_OPTIONS = --report-custom-error --developer-mode --no-filtering --debug-exceptions --project-root $(TESTS_DIR) +INFER_OPTIONS = \ + --biabduction-only --report-custom-error --developer-mode --no-filtering --debug-exceptions \ + --project-root $(TESTS_DIR) \ + # we need to disable traces in C tests because assertions/assertion_failure.c has different traces # on Linux and OSX because of different implementations of assert() on each platform INFERPRINT_OPTIONS = --issues-fields "file,procedure,line_offset,bug_type" --issues-tests diff --git a/infer/tests/codetoanalyze/java/.inferconfig b/infer/tests/codetoanalyze/java/.inferconfig index 3613e92e3..29aaaad8b 100644 --- a/infer/tests/codetoanalyze/java/.inferconfig +++ b/infer/tests/codetoanalyze/java/.inferconfig @@ -11,7 +11,7 @@ "method": "get" } ], - "infer-blacklist-files-containing": [ + "checkers-blacklist-files-containing": [ "@generated" ], "enable-issue-type": [ diff --git a/infer/tests/codetoanalyze/java/harness/Makefile b/infer/tests/codetoanalyze/java/harness/Makefile index 8484949d8..5f35de25e 100644 --- a/infer/tests/codetoanalyze/java/harness/Makefile +++ b/infer/tests/codetoanalyze/java/harness/Makefile @@ -7,8 +7,8 @@ TESTS_DIR = ../../.. -ANALYZER = infer -INFER_OPTIONS = --android-harness --debug-exceptions +ANALYZER = checkers +INFER_OPTIONS = --biabduction-only --android-harness --no-filtering --debug-exceptions INFERPRINT_OPTIONS = --issues-fields "file,procedure,line_offset,bug_type" --issues-tests SOURCES = \ BasicHarnessActivity.java \ diff --git a/infer/tests/codetoanalyze/java/tracing/.inferconfig b/infer/tests/codetoanalyze/java/tracing/.inferconfig index dc3c086c7..a7e342c8c 100644 --- a/infer/tests/codetoanalyze/java/tracing/.inferconfig +++ b/infer/tests/codetoanalyze/java/tracing/.inferconfig @@ -11,7 +11,7 @@ "method": "get" } ], - "infer-blacklist-files-containing": [ + "checkers-blacklist-files-containing": [ "@generated" ], "skip-translation": [ diff --git a/infer/tests/codetoanalyze/java/tracing/Makefile b/infer/tests/codetoanalyze/java/tracing/Makefile index 0888b21b5..a495ae213 100644 --- a/infer/tests/codetoanalyze/java/tracing/Makefile +++ b/infer/tests/codetoanalyze/java/tracing/Makefile @@ -7,8 +7,8 @@ TESTS_DIR = ../../.. -ANALYZER = infer -INFER_OPTIONS = --tracing --debug-exceptions +ANALYZER = checkers +INFER_OPTIONS = --biabduction-only --tracing --debug-exceptions INFERPRINT_OPTIONS = --issues-tests SOURCES = $(wildcard *.java) diff --git a/infer/tests/infer.make b/infer/tests/infer.make index 5777f2fe8..64bed261e 100644 --- a/infer/tests/infer.make +++ b/infer/tests/infer.make @@ -8,8 +8,7 @@ include $(TESTS_DIR)/base.make # useful to print non-default analyzer -ANALYZER_STRING=$(shell if [ -n $(ANALYZER) ] && [ $(ANALYZER) != infer ]; then \ - printf ' ($(ANALYZER))'; fi) +ANALYZER_STRING=$(shell if [ -n $(ANALYZER) ]; then printf ' ($(ANALYZER))'; fi) default: compile