List of all categories of issue types
Here are all the categories that issue types might belong to in Infer. Some issue types have no associated category at the moment. This usually indicates that the issue type is not yet mature enough to be used.
+List of all categories of issue types
Here are all the categories that issue types might belong to in Infer. Some issue types have no associated category at the moment. This usually indicates that the issue type is not yet mature enough to be used.
Concurrency
Concurrent accesses to the same resource conflict in a way that can give incorrect results, block progress, or result in undefined behaviour.
Issue types in this category:
diff --git a/docs/next/all-checkers/index.html b/docs/next/all-checkers/index.html index d331d419cd3..1bb19ec0f4f 100644 --- a/docs/next/all-checkers/index.html +++ b/docs/next/all-checkers/index.html @@ -13,11 +13,11 @@ - + -List of all checkers
Here is an overview of the checkers currently available in Infer.
+List of all checkers
Here is an overview of the checkers currently available in Infer.
Annotation Reachability
Given pairs of source and sink annotations, e.g. @A
and @B
, this checker will warn whenever some method annotated with @A
calls, directly or indirectly, another method annotated with @B
. Besides the custom pairs, it is also possible to enable some built-in checks, such as @PerformanceCritical
reaching @Expensive
or @NoAllocation
reaching new
. See flags starting with --annotation-reachability
.
Visit here for more information.
@@ -47,6 +47,9 @@ImpurityInefficient keySet Iterator
Check for inefficient uses of iterators that iterate on keys then lookup their values, instead of iterating on key-value pairs directly.
Visit here for more information.
+Lineage
+Computes a dataflow graph
+Visit here for more information.
Litho "Required Props"
Checks that all non-optional @Prop
s have been specified when constructing Litho components.
Visit here for more information.
@@ -79,18 +82,15 @@RacerDResource Leak Lab Exercise
Toy checker for the "resource leak" write-your-own-checker exercise.
Visit here for more information.
-Scope Leakage
-The Java/Kotlin checker takes into account a set of "scope" annotations and a must-not-hold relation over the scopes. The checker raises an alarm if there exists a field access path from object A to object B, with respective scopes SA and SB, such that must-not-hold(SA, SB).
-Visit here for more information.
-Static Initialization Order Fiasco
-Catches Static Initialization Order Fiascos in C++, that can lead to subtle, compiler-version-dependent errors.
-Visit here for more information.
SIL validation
This checker validates that all SIL instructions in all procedure bodies conform to a (front-end specific) subset of SIL.
Visit here for more information.
-Lineage
-Computes a dataflow graph
-Visit here for more information.
+Static Initialization Order Fiasco
+Catches Static Initialization Order Fiascos in C++, that can lead to subtle, compiler-version-dependent errors.
+Visit here for more information.
+Scope Leakage
+The Java/Kotlin checker takes into account a set of "scope" annotations and a must-not-hold relation over the scopes. The checker raises an alarm if there exists a field access path from object A to object B, with respective scopes SA and SB, such that must-not-hold(SA, SB).
+Visit here for more information.
Self in Block
An Objective-C-specific analysis to detect when a block captures self
.
Visit here for more information.
diff --git a/docs/next/all-issue-types/index.html b/docs/next/all-issue-types/index.html index 4c515f7a6bb..a020161cc71 100644 --- a/docs/next/all-issue-types/index.html +++ b/docs/next/all-issue-types/index.html @@ -13,11 +13,11 @@ - + -List of all issue types
Here is an overview of the issue types currently reported by Infer.
+List of all issue types
Here is an overview of the issue types currently reported by Infer.
ARBITRARY_CODE_EXECUTION_UNDER_LOCK
Reported as "Arbitrary Code Execution Under lock" by starvation.
A call that may execute arbitrary code (such as registered, or chained, callbacks) is made while holding a lock. diff --git a/docs/next/analyzing-apps-or-projects/index.html b/docs/next/analyzing-apps-or-projects/index.html index 8cd5291efbc..d5a16f10559 100644 --- a/docs/next/analyzing-apps-or-projects/index.html +++ b/docs/next/analyzing-apps-or-projects/index.html @@ -13,7 +13,7 @@ - +
diff --git a/docs/next/checker-annotation-reachability/index.html b/docs/next/checker-annotation-reachability/index.html index b47e07e48f5..e45ecdd4944 100644 --- a/docs/next/checker-annotation-reachability/index.html +++ b/docs/next/checker-annotation-reachability/index.html @@ -13,11 +13,11 @@ - + -Annotation Reachability
Given pairs of source and sink annotations, e.g. @A
and @B
, this checker will warn whenever some method annotated with @A
calls, directly or indirectly, another method annotated with @B
. Besides the custom pairs, it is also possible to enable some built-in checks, such as @PerformanceCritical
reaching @Expensive
or @NoAllocation
reaching new
. See flags starting with --annotation-reachability
.
Annotation Reachability
Given pairs of source and sink annotations, e.g. @A
and @B
, this checker will warn whenever some method annotated with @A
calls, directly or indirectly, another method annotated with @B
. Besides the custom pairs, it is also possible to enable some built-in checks, such as @PerformanceCritical
reaching @Expensive
or @NoAllocation
reaching new
. See flags starting with --annotation-reachability
.
Activate with --annotation-reachability
.
Supported languages:
-
diff --git a/docs/next/checker-biabduction/index.html b/docs/next/checker-biabduction/index.html
index 4ea30dd6f8a..7f68f2ffbda 100644
--- a/docs/next/checker-biabduction/index.html
+++ b/docs/next/checker-biabduction/index.html
@@ -13,11 +13,11 @@
-
+
-
Biabduction
This analysis deals with a range of issues, many linked to memory safety.
+Biabduction
This analysis deals with a range of issues, many linked to memory safety.
***DEPRECATED*** This has been replaced by Pulse and will be removed in the next release.
Activate with --biabduction
.
Supported languages:
diff --git a/docs/next/checker-bufferoverrun/index.html b/docs/next/checker-bufferoverrun/index.html index f34934da3f8..f16ac7f2038 100644 --- a/docs/next/checker-bufferoverrun/index.html +++ b/docs/next/checker-bufferoverrun/index.html @@ -13,11 +13,11 @@ - + -Buffer Overrun Analysis (InferBO)
InferBO is a detector for out-of-bounds array accesses.
+Buffer Overrun Analysis (InferBO)
InferBO is a detector for out-of-bounds array accesses.
Activate with --bufferoverrun
.
Supported languages:
-
diff --git a/docs/next/checker-config-impact-analysis/index.html b/docs/next/checker-config-impact-analysis/index.html
index 6252ab00fca..bacdadd53bc 100644
--- a/docs/next/checker-config-impact-analysis/index.html
+++ b/docs/next/checker-config-impact-analysis/index.html
@@ -13,11 +13,11 @@
-
+
-
Config Impact Analysis
[EXPERIMENTAL] Collects function that are called without config checks.
+Config Impact Analysis
[EXPERIMENTAL] Collects function that are called without config checks.
Activate with --config-impact-analysis
.
Supported languages:
-
diff --git a/docs/next/checker-cost/index.html b/docs/next/checker-cost/index.html
index 89eaf34051b..f6e265930d9 100644
--- a/docs/next/checker-cost/index.html
+++ b/docs/next/checker-cost/index.html
@@ -13,11 +13,11 @@
-
+
-
Cost: Complexity Analysis
Computes the asymptotic complexity of functions with respect to execution cost or other user defined resources. Can be used to detect changes in the complexity with infer reportdiff
.
Cost: Complexity Analysis
Computes the asymptotic complexity of functions with respect to execution cost or other user defined resources. Can be used to detect changes in the complexity with infer reportdiff
.
Activate with --cost
.
Supported languages:
-
diff --git a/docs/next/checker-datalog/index.html b/docs/next/checker-datalog/index.html
index dc7f89ab8ed..17ed2011927 100644
--- a/docs/next/checker-datalog/index.html
+++ b/docs/next/checker-datalog/index.html
@@ -13,11 +13,11 @@
-
+
-
Datalog-based points-to analysis
Experimental datalog-based points-to analysis.
+Datalog-based points-to analysis
Experimental datalog-based points-to analysis.
Activate with --datalog
.
Supported languages:
-
diff --git a/docs/next/checker-fragment-retains-view/index.html b/docs/next/checker-fragment-retains-view/index.html
index e99922b22f8..d3bce854f4e 100644
--- a/docs/next/checker-fragment-retains-view/index.html
+++ b/docs/next/checker-fragment-retains-view/index.html
@@ -13,11 +13,11 @@
-
+
-
Fragment Retains View
Detects when Android fragments are not explicitly nullified before becoming unreachable.
+Fragment Retains View
Detects when Android fragments are not explicitly nullified before becoming unreachable.
***DEPRECATED*** Unmaintained due to poor precision.
Activate with --fragment-retains-view
.
Supported languages:
diff --git a/docs/next/checker-impurity/index.html b/docs/next/checker-impurity/index.html index 92b2b252c2e..cda663f8440 100644 --- a/docs/next/checker-impurity/index.html +++ b/docs/next/checker-impurity/index.html @@ -13,11 +13,11 @@ - + -Impurity
Detects functions with potential side-effects. Same as "purity", but implemented on top of Pulse.
+