Lines Matching refs:CheckNames
332 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon0957485b0411::MallocChecker
1702 BT_TaintedAlloc.reset(new BugType(CheckNames[CK_TaintedAllocChecker], in reportTaintBug()
2271 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc()
2319 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca()
2344 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc()
2407 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree()
2461 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); in HandleUseAfterFree()
2500 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree()
2529 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete()
2558 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc()
2590 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleFunctionPtrFree()
2807 BT_Leak[*CheckKind].reset(new BugType(CheckNames[*CheckKind], "Memory leak", in HandleLeak()
3641 Out << " (" << CheckNames[*CheckKind].getName() << ")"; in printState()
3666 checker->CheckNames[MallocChecker::CK_InnerPointerChecker] = in registerInnerPointerCheckerAux()
3687 checker->CheckNames[MallocChecker::CK_##name] = \