$ 0 0 Every leak detected gives a detailed call stack. From the call stack one can know from where exactly in your source code is the leak being generated.