Searched refs:GetInstructionFlags (Results 1 – 4 of 4) sorted by relevance
29 inline const InstructionFlags& MethodVerifier::GetInstructionFlags(size_t index) const { in GetInstructionFlags() function
976 if (!GetInstructionFlags(start).IsOpcode()) { in ScanTryCatchBlocks()994 if (!GetInstructionFlags(dex_pc).IsOpcode()) { in ScanTryCatchBlocks()1348 if (UNLIKELY(!GetInstructionFlags(cur_offset + array_data_offset).IsOpcode())) { in CheckArrayData()1391 !GetInstructionFlags(abs_offset).IsOpcode())) { in CheckBranchTarget()1465 if (UNLIKELY(!GetInstructionFlags(cur_offset + switch_offset).IsOpcode())) { in CheckSwitchTargets()1537 !GetInstructionFlags(abs_offset).IsOpcode())) { in CheckSwitchTargets()1645 << StringPrintf("0x%04zx", dex_pc) << ": " << GetInstructionFlags(dex_pc).ToString() << " "; in Dump()1846 if (GetInstructionFlags(insn_idx).IsChanged()) in CodeFlowVerifyMethod()1866 if (GetInstructionFlags(insn_idx).IsBranchTarget()) { in CodeFlowVerifyMethod()1923 if (!GetInstructionFlags(insn_idx).IsVisited()) { in CodeFlowVerifyMethod()[all …]
171 ALWAYS_INLINE const InstructionFlags& GetInstructionFlags(size_t index) const;
74 if (!method_verifier->GetInstructionFlags(dex_pc).IsVisited()) { in GenerateSafeCastSet()