Home | History | Annotate | Download | only in Analysis

Lines Matching full:apos

258 // CHECK-NEXT:      <string>Assuming &apos;in&apos; is &gt; 5</string>
260 // CHECK-NEXT: <string>Assuming &apos;in&apos; is &gt; 5</string>
403 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;p&apos;</string>
405 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;p&apos;</string>
408 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;p&apos;</string>
565 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;A&apos;</string>
567 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;A&apos;</string>
570 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;A&apos;</string>
839 // CHECK-NEXT: <string>Assuming &apos;tmp&apos; is null</string>
841 // CHECK-NEXT: <string>Assuming &apos;tmp&apos; is null</string>
950 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
952 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
955 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1030 // CHECK-NEXT: <string>Calling &apos;wrapper&apos;</string>
1032 // CHECK-NEXT: <string>Calling &apos;wrapper&apos;</string>
1044 // CHECK-NEXT: <string>Entered call from &apos;test_wrapper&apos;</string>
1046 // CHECK-NEXT: <string>Entered call from &apos;test_wrapper&apos;</string>
1238 // CHECK-NEXT: <string>Assuming &apos;x&apos; is non-null</string>
1240 // CHECK-NEXT: <string>Assuming &apos;x&apos; is non-null</string>
1349 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1351 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1354 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1429 // CHECK-NEXT: <string>Calling &apos;my_malloc_and_free&apos;</string>
1431 // CHECK-NEXT: <string>Calling &apos;my_malloc_and_free&apos;</string>
1443 // CHECK-NEXT: <string>Entered call from &apos;test_double_action_call&apos;</string>
1445 // CHECK-NEXT: <string>Entered call from &apos;test_double_action_call&apos;</string>
1637 // CHECK-NEXT: <string>Calling &apos;my_free&apos;</string>
1639 // CHECK-NEXT: <string>Calling &apos;my_free&apos;</string>
1651 // CHECK-NEXT: <string>Entered call from &apos;my_malloc_and_free&apos;</string>
1653 // CHECK-NEXT: <string>Entered call from &apos;my_malloc_and_free&apos;</string>
2012 // CHECK-NEXT: <string>Calling &apos;my_realloc&apos;</string>
2014 // CHECK-NEXT: <string>Calling &apos;my_realloc&apos;</string>
2026 // CHECK-NEXT: <string>Entered call from &apos;reallocIntra&apos;</string>
2028 // CHECK-NEXT: <string>Entered call from &apos;reallocIntra&apos;</string>
2254 // CHECK-NEXT: <string>Assuming &apos;tmp&apos; is null</string>
2256 // CHECK-NEXT: <string>Assuming &apos;tmp&apos; is null</string>
2428 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2430 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2433 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2508 // CHECK-NEXT: <string>Calling &apos;malloc_wrapper_ret&apos;</string>
2510 // CHECK-NEXT: <string>Calling &apos;malloc_wrapper_ret&apos;</string>
2522 // CHECK-NEXT: <string>Entered call from &apos;use_ret&apos;</string>
2524 // CHECK-NEXT: <string>Entered call from &apos;use_ret&apos;</string>
2696 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;v&apos;</string>
2698 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;v&apos;</string>
2701 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;v&apos;</string>
2858 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;m&apos;</string>
2860 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;m&apos;</string>
2863 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;m&apos;</string>
2904 // CHECK-NEXT: <string>Calling &apos;function_with_leak1&apos;</string>
2906 // CHECK-NEXT: <string>Calling &apos;function_with_leak1&apos;</string>
2918 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak1&apos;</string>
2920 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak1&apos;</string>
3063 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3065 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3068 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3109 // CHECK-NEXT: <string>Calling &apos;function_with_leak2&apos;</string>
3111 // CHECK-NEXT: <string>Calling &apos;function_with_leak2&apos;</string>
3123 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak2&apos;</string>
3125 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak2&apos;</string>
3268 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3270 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3273 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3314 // CHECK-NEXT: <string>Calling &apos;function_with_leak3&apos;</string>
3316 // CHECK-NEXT: <string>Calling &apos;function_with_leak3&apos;</string>
3328 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak3&apos;</string>
3330 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak3&apos;</string>
3522 // CHECK-NEXT: <string>Assuming &apos;y&apos; is not equal to 0</string>
3524 // CHECK-NEXT: <string>Assuming &apos;y&apos; is not equal to 0</string>
3570 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3572 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3575 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3616 // CHECK-NEXT: <string>Calling &apos;function_with_leak4&apos;</string>
3618 // CHECK-NEXT: <string>Calling &apos;function_with_leak4&apos;</string>
3630 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak4&apos;</string>
3632 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak4&apos;</string>
3824 // CHECK-NEXT: <string>Assuming &apos;y&apos; is 0</string>
3826 // CHECK-NEXT: <string>Assuming &apos;y&apos; is 0</string>
3872 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3874 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3877 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3918 // CHECK-NEXT: <string>Calling &apos;function_with_leak5&apos;</string>
3920 // CHECK-NEXT: <string>Calling &apos;function_with_leak5&apos;</string>
3932 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak5&apos;</string>
3934 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak5&apos;</string>
4077 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4079 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4082 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
4123 // CHECK-NEXT: <string>Calling &apos;function_with_leak6&apos;</string>
4125 // CHECK-NEXT: <string>Calling &apos;function_with_leak6&apos;</string>
4137 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak6&apos;</string>
4139 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak6&apos;</string>
4282 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4284 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4287 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
4328 // CHECK-NEXT: <string>Calling &apos;function_with_leak7&apos;</string>
4330 // CHECK-NEXT: <string>Calling &apos;function_with_leak7&apos;</string>
4342 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak7&apos;</string>
4344 // CHECK-NEXT: <string>Entered call from &apos;use_function_with_leak7&apos;</string>
4562 // CHECK-NEXT: <string>Calling &apos;my_malloc&apos;</string>
4564 // CHECK-NEXT: <string>Calling &apos;my_malloc&apos;</string>
4576 // CHECK-NEXT: <string>Entered call from &apos;testOnlyRefferToVisibleVariables&apos;</string>
4578 // CHECK-NEXT: <string>Entered call from &apos;testOnlyRefferToVisibleVariables&apos;</string>
4796 // CHECK-NEXT: <string>Calling &apos;my_malloc_into_struct&apos;</string>
4798 // CHECK-NEXT: <string>Calling &apos;my_malloc_into_struct&apos;</string>
4810 // CHECK-NEXT: <string>Entered call from &apos;testMyMalloc&apos;</string>
4812 // CHECK-NEXT: <string>Entered call from &apos;testMyMalloc&apos;</string>