Home | History | Annotate | Download | only in Analysis

Lines Matching full:leak

15     in++; // expected-warning {{leak}}
21 A[0] = 0;// expected-warning {{leak}}
29 return;// expected-warning {{leak}}
89 // Test that we refer to the last symbol used in the leak diagnostic.
180 } // expected-warning {{Potential leak of memory}}
191 my_malloc_into_struct(); // expected-warning {{Potential leak of memory}}
403 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;p&apos;</string>
405 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;p&apos;</string>
408 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;p&apos;</string>
410 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
565 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;A&apos;</string>
567 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;A&apos;</string>
570 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;A&apos;</string>
572 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
950 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
952 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
955 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
957 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
1349 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1351 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1354 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1356 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
2428 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2430 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2433 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2435 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
2696 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;v&apos;</string>
2698 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;v&apos;</string>
2701 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;v&apos;</string>
2703 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
2858 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;m&apos;</string>
2860 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;m&apos;</string>
2863 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;m&apos;</string>
2865 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
3063 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3065 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3068 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3070 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
3268 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3270 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3273 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3275 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
3570 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3572 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3575 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3577 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
3872 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3874 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3877 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3879 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
4077 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4079 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4082 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
4084 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
4282 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4284 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4287 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
4289 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
4516 // CHECK-NEXT: <string>Potential memory leak</string>
4518 // CHECK-NEXT: <string>Potential memory leak</string>
4521 // CHECK-NEXT: <key>description</key><string>Potential memory leak</string>
4523 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
4750 // CHECK-NEXT: <string>Potential memory leak</string>
4752 // CHECK-NEXT: <string>Potential memory leak</string>
4755 // CHECK-NEXT: <key>description</key><string>Potential memory leak</string>
4757 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
5018 // CHECK-NEXT: <string>Potential memory leak</string>
5020 // CHECK-NEXT: <string>Potential memory leak</string>
5023 // CHECK-NEXT: <key>description</key><string>Potential memory leak</string>
5025 // CHECK-NEXT: <key>type</key><string>Memory leak</string>