Home | History | Annotate | Download | only in Analysis

Lines Matching full:leak

15     in++; // expected-warning {{leak}}
21 A[0] = 0;// expected-warning {{leak}}
29 return;// expected-warning {{leak}}
104 // Test that we refer to the last symbol used in the leak diagnostic.
195 } // expected-warning {{Potential leak of memory}}
206 my_malloc_into_struct(); // expected-warning {{Potential leak of memory}}
418 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;p&apos;</string>
420 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;p&apos;</string>
423 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;p&apos;</string>
425 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
583 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;A&apos;</string>
585 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;A&apos;</string>
588 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;A&apos;</string>
590 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
971 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
973 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
976 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
978 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
1373 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1375 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1378 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
1380 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
2458 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2460 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2463 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;buf&apos;</string>
2465 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
2729 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;v&apos;</string>
2731 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;v&apos;</string>
2734 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;v&apos;</string>
2736 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
3243 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;m&apos;</string>
3245 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;m&apos;</string>
3248 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;m&apos;</string>
3250 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
3451 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3453 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3456 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3458 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
3659 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3661 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3664 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3666 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
3964 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3966 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
3969 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
3971 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
4269 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4271 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4274 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
4276 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
4477 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4479 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4482 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
4484 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
4685 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4687 // CHECK-NEXT: <string>Potential leak of memory pointed to by &apos;x&apos;</string>
4690 // CHECK-NEXT: <key>description</key><string>Potential leak of memory pointed to by &apos;x&apos;</string>
4692 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
4922 // CHECK-NEXT: <string>Potential memory leak</string>
4924 // CHECK-NEXT: <string>Potential memory leak</string>
4927 // CHECK-NEXT: <key>description</key><string>Potential memory leak</string>
4929 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
5159 // CHECK-NEXT: <string>Potential memory leak</string>
5161 // CHECK-NEXT: <string>Potential memory leak</string>
5164 // CHECK-NEXT: <key>description</key><string>Potential memory leak</string>
5166 // CHECK-NEXT: <key>type</key><string>Memory leak</string>
5430 // CHECK-NEXT: <string>Potential memory leak</string>
5432 // CHECK-NEXT: <string>Potential memory leak</string>
5435 // CHECK-NEXT: <key>description</key><string>Potential memory leak</string>
5437 // CHECK-NEXT: <key>type</key><string>Memory leak</string>