Lines Matching full:apos
258 // CHECK-NEXT: <string>Assuming 'in' is > 5</string>
260 // CHECK-NEXT: <string>Assuming 'in' is > 5</string>
403 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'p'</string>
405 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'p'</string>
408 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'p'</string>
565 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'A'</string>
567 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'A'</string>
570 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'A'</string>
839 // CHECK-NEXT: <string>Assuming 'tmp' is null</string>
841 // CHECK-NEXT: <string>Assuming 'tmp' is null</string>
950 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'buf'</string>
952 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'buf'</string>
955 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'buf'</string>
1030 // CHECK-NEXT: <string>Calling 'wrapper'</string>
1032 // CHECK-NEXT: <string>Calling 'wrapper'</string>
1044 // CHECK-NEXT: <string>Entered call from 'test_wrapper'</string>
1046 // CHECK-NEXT: <string>Entered call from 'test_wrapper'</string>
1238 // CHECK-NEXT: <string>Assuming 'x' is non-null</string>
1240 // CHECK-NEXT: <string>Assuming 'x' is non-null</string>
1349 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'buf'</string>
1351 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'buf'</string>
1354 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'buf'</string>
1429 // CHECK-NEXT: <string>Calling 'my_malloc_and_free'</string>
1431 // CHECK-NEXT: <string>Calling 'my_malloc_and_free'</string>
1443 // CHECK-NEXT: <string>Entered call from 'test_double_action_call'</string>
1445 // CHECK-NEXT: <string>Entered call from 'test_double_action_call'</string>
1637 // CHECK-NEXT: <string>Calling 'my_free'</string>
1639 // CHECK-NEXT: <string>Calling 'my_free'</string>
1651 // CHECK-NEXT: <string>Entered call from 'my_malloc_and_free'</string>
1653 // CHECK-NEXT: <string>Entered call from 'my_malloc_and_free'</string>
2012 // CHECK-NEXT: <string>Calling 'my_realloc'</string>
2014 // CHECK-NEXT: <string>Calling 'my_realloc'</string>
2026 // CHECK-NEXT: <string>Entered call from 'reallocIntra'</string>
2028 // CHECK-NEXT: <string>Entered call from 'reallocIntra'</string>
2254 // CHECK-NEXT: <string>Assuming 'tmp' is null</string>
2256 // CHECK-NEXT: <string>Assuming 'tmp' is null</string>
2428 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'buf'</string>
2430 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'buf'</string>
2433 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'buf'</string>
2508 // CHECK-NEXT: <string>Calling 'malloc_wrapper_ret'</string>
2510 // CHECK-NEXT: <string>Calling 'malloc_wrapper_ret'</string>
2522 // CHECK-NEXT: <string>Entered call from 'use_ret'</string>
2524 // CHECK-NEXT: <string>Entered call from 'use_ret'</string>
2696 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'v'</string>
2698 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'v'</string>
2701 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'v'</string>
2858 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'm'</string>
2860 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'm'</string>
2863 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'm'</string>
2904 // CHECK-NEXT: <string>Calling 'function_with_leak1'</string>
2906 // CHECK-NEXT: <string>Calling 'function_with_leak1'</string>
2918 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak1'</string>
2920 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak1'</string>
3063 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
3065 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
3068 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'x'</string>
3109 // CHECK-NEXT: <string>Calling 'function_with_leak2'</string>
3111 // CHECK-NEXT: <string>Calling 'function_with_leak2'</string>
3123 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak2'</string>
3125 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak2'</string>
3268 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
3270 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
3273 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'x'</string>
3314 // CHECK-NEXT: <string>Calling 'function_with_leak3'</string>
3316 // CHECK-NEXT: <string>Calling 'function_with_leak3'</string>
3328 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak3'</string>
3330 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak3'</string>
3522 // CHECK-NEXT: <string>Assuming 'y' is not equal to 0</string>
3524 // CHECK-NEXT: <string>Assuming 'y' is not equal to 0</string>
3570 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
3572 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
3575 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'x'</string>
3616 // CHECK-NEXT: <string>Calling 'function_with_leak4'</string>
3618 // CHECK-NEXT: <string>Calling 'function_with_leak4'</string>
3630 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak4'</string>
3632 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak4'</string>
3824 // CHECK-NEXT: <string>Assuming 'y' is 0</string>
3826 // CHECK-NEXT: <string>Assuming 'y' is 0</string>
3872 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
3874 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
3877 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'x'</string>
3918 // CHECK-NEXT: <string>Calling 'function_with_leak5'</string>
3920 // CHECK-NEXT: <string>Calling 'function_with_leak5'</string>
3932 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak5'</string>
3934 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak5'</string>
4077 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
4079 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
4082 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'x'</string>
4123 // CHECK-NEXT: <string>Calling 'function_with_leak6'</string>
4125 // CHECK-NEXT: <string>Calling 'function_with_leak6'</string>
4137 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak6'</string>
4139 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak6'</string>
4282 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
4284 // CHECK-NEXT: <string>Potential leak of memory pointed to by 'x'</string>
4287 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by 'x'</string>
4328 // CHECK-NEXT: <string>Calling 'function_with_leak7'</string>
4330 // CHECK-NEXT: <string>Calling 'function_with_leak7'</string>
4342 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak7'</string>
4344 // CHECK-NEXT: <string>Entered call from 'use_function_with_leak7'</string>
4562 // CHECK-NEXT: <string>Calling 'my_malloc'</string>
4564 // CHECK-NEXT: <string>Calling 'my_malloc'</string>
4576 // CHECK-NEXT: <string>Entered call from 'testOnlyRefferToVisibleVariables'</string>
4578 // CHECK-NEXT: <string>Entered call from 'testOnlyRefferToVisibleVariables'</string>
4796 // CHECK-NEXT: <string>Calling 'my_malloc_into_struct'</string>
4798 // CHECK-NEXT: <string>Calling 'my_malloc_into_struct'</string>
4810 // CHECK-NEXT: <string>Entered call from 'testMyMalloc'</string>
4812 // CHECK-NEXT: <string>Entered call from 'testMyMalloc'</string>