/external/pdfium/fpdfsdk/javascript/ |
H A D | report.cpp | 23 IMPLEMENT_JS_CLASS(CJS_Report, Report) 25 Report::Report(CJS_Object* pJSObject) : CJS_EmbedObj(pJSObject) {} function in class:Report 27 Report::~Report() {} 29 bool Report::writeText(CJS_Runtime* pRuntime, 37 bool Report::save(CJS_Runtime* pRuntime,
|
H A D | report.h | 14 class Report : public CJS_EmbedObj { class in inherits:CJS_EmbedObj 16 explicit Report(CJS_Object* pJSObject); 17 ~Report() override; 37 JS_STATIC_METHOD(save, Report) 38 JS_STATIC_METHOD(writeText, Report);
|
/external/clang/unittests/Basic/ |
H A D | DiagnosticTest.cpp | 30 Diags.Report(diag::err_target_unknown_triple) << "unknown"; 33 Diags.Report(diag::err_cannot_open_file) << "file" << "error"; 37 Diags.Report(diag::warn_mt_message) << "warning"; 57 Diags.Report(diag::err_target_unknown_triple) << "unknown"; 60 Diags.Report(diag::err_cannot_open_file) << "file" << "error"; 64 Diags.Report(diag::warn_mt_message) << "warning";
|
/external/clang/lib/StaticAnalyzer/Checkers/MPI-Checker/ |
H A D | MPIBugReporter.cpp | 34 auto Report = llvm::make_unique<BugReport>(*DoubleNonblockingBugType, local 37 Report->addRange(MPICallEvent.getSourceRange()); 41 Report->addRange(Range); 43 Report->addVisitor(llvm::make_unique<RequestNodeVisitor>( 45 Report->markInteresting(RequestRegion); 47 BReporter.emitReport(std::move(Report)); 57 auto Report = local 62 Report->addRange(Range); 63 Report->addVisitor(llvm::make_unique<RequestNodeVisitor>( 65 Report 77 auto Report = local [all...] |
/external/lisa/libs/utils/ |
H A D | __init__.py | 29 from report import Report namespace
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
H A D | NSAutoreleasePoolChecker.cpp | 71 auto Report = llvm::make_unique<BugReport>( local 74 Report->addRange(msg.getSourceRange()); 75 C.emitReport(std::move(Report));
|
H A D | PthreadLockChecker.cpp | 210 auto Report = llvm::make_unique<BugReport>( 212 Report->addRange(CE->getArg(0)->getSourceRange()); 213 C.emitReport(std::move(Report)); 278 auto Report = llvm::make_unique<BugReport>(*BT_destroylock, Message, N); 279 Report->addRange(CE->getArg(0)->getSourceRange()); 280 C.emitReport(std::move(Report)); 313 auto Report = llvm::make_unique<BugReport>(*BT_initlock, Message, N); 314 Report->addRange(CE->getArg(0)->getSourceRange()); 315 C.emitReport(std::move(Report)); 326 auto Report [all...] |
H A D | ReturnUndefChecker.cpp | 87 auto Report = llvm::make_unique<BugReport>(BT, BT.getDescription(), N); 89 Report->addRange(RetE->getSourceRange()); 90 bugreporter::trackNullOrUndefValue(N, TrackingE ? TrackingE : RetE, *Report); 92 C.emitReport(std::move(Report));
|
H A D | MacOSKeychainAPIChecker.cpp | 242 // Report deallocator mismatch. Remove the region from tracking - reporting a 262 auto Report = llvm::make_unique<BugReport>(*BT, os.str(), N); local 263 Report->addVisitor(llvm::make_unique<SecKeychainBugVisitor>(AP.first)); 264 Report->addRange(ArgExpr->getSourceRange()); 265 markInteresting(Report.get(), AP); 266 C.emitReport(std::move(Report)); 307 auto Report = llvm::make_unique<BugReport>(*BT, os.str(), N); local 308 Report->addVisitor(llvm::make_unique<SecKeychainBugVisitor>(V)); 309 Report->addRange(ArgExpr->getSourceRange()); 310 Report 363 auto Report = llvm::make_unique<BugReport>( local 429 auto Report = llvm::make_unique<BugReport>( local 539 auto Report = local [all...] |
/external/lisa/tools/ |
H A D | report.py | 22 from utils.report import Report namespace 40 Report(args.results, compare=[(args.bases, args.tests)])
|
/external/clang/lib/Frontend/ |
H A D | TextDiagnosticBuffer.cpp | 51 Diags.Report(Diags.getCustomDiagID(DiagnosticsEngine::Error, "%0")) 54 Diags.Report(Diags.getCustomDiagID(DiagnosticsEngine::Warning, "%0")) 57 Diags.Report(Diags.getCustomDiagID(DiagnosticsEngine::Remark, "%0")) 60 Diags.Report(Diags.getCustomDiagID(DiagnosticsEngine::Note, "%0"))
|
H A D | CreateInvocationFromCommandLine.cpp | 85 Diags->Report(diag::err_fe_expected_compiler_job) << OS.str(); 91 Diags->Report(diag::err_fe_expected_clang_command);
|
/external/doclava/test/doclava/ |
H A D | ApiCheckTest.java | 22 import com.google.doclava.apicheck.ApiCheck.Report; 48 Report report = apiCheck.checkApi(args); 56 Report report = apiCheck.checkApi(args); 65 Report report = apiCheck.checkApi(args); 80 Report report = apiCheck.checkApi(args); 94 Report report = apiCheck.checkApi(args); 103 Report report = apiCheck.checkApi(args); 112 Report report = apiCheck.checkApi(args); 121 Report report = apiCheck.checkApi(args); 133 Report repor [all...] |
/external/gptfdisk/ |
H A D | cgdisk.cc | 69 Report("Warning! Non-GPT or damaged disk detected! This program will attempt to\n" 76 Report("Could not load partitions from '" + device + "'! Aborting!");
|
/external/compiler-rt/lib/scudo/ |
H A D | scudo_termination.cpp | 36 Report("Sanitizer CHECK failed: %s:%d %s (%lld, %lld)\n", file, line, cond,
|
/external/clang/lib/StaticAnalyzer/Frontend/ |
H A D | CheckerRegistration.cpp | 58 diags->Report(diag::err_fe_unable_to_load_plugin) << *i << err; 97 diags->Report(diag::warn_incompatible_analyzer_plugin_api) 99 diags->Report(diag::note_incompatible_analyzer_plugin_api) 124 diags.Report(diag::err_unknown_analyzer_checker) 126 diags.Report(diag::note_suggest_disabling_all_checkers);
|
/external/clang/lib/Basic/ |
H A D | Warnings.cpp | 39 Diags.Report(diag::warn_unknown_diag_option) 80 for (unsigned Report = 0, ReportEnd = 2; Report != ReportEnd; ++Report) { 81 bool SetDiagnostic = (Report == 0); 138 if (Report) 139 Diags.Report(diag::warn_unknown_warning_specifier) 166 if (Report) 167 Diags.Report(diag::warn_unknown_warning_specifier) 189 if (Report) { [all...] |
/external/compiler-rt/lib/asan/ |
H A D | asan_flags.cc | 131 Report("%s: detect_leaks is not supported on this platform.\n", 151 Report("%s: please use either 'quarantine_size' (deprecated) or " 163 Report("WARNING: strlen interceptor is enabled even though replace_str=0. " 167 Report("WARNING: strchr* interceptors are enabled even though "
|
H A D | asan_linux.cc | 108 Report("Your application is linked against incompatible ASan runtimes.\n"); 120 Report("ASan runtime does not come first in initial library list; " 145 Report("Your application is linked against "
|
/external/jacoco/org.jacoco.cli/src/org/jacoco/cli/internal/commands/ |
H A D | AllCommands.java | 32 new Report(), new ClassInfo(), new ExecInfo(), new Version());
|
/external/v8/tools/clang/plugins/ |
H A D | SuppressibleDiagnosticBuilder.h | 23 : DiagnosticBuilder(diagnostics->Report(loc, diagnostic_id)),
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_symbolizer_win.cc | 59 Report("*** WARNING: Failed to initialize DbgHelp! ***\n"); 60 Report("*** Most likely this means that the app is already ***\n"); 61 Report("*** using DbgHelp, possibly with incompatible flags. ***\n"); 62 Report("*** Due to technical reasons, symbolization might crash ***\n"); 63 Report("*** or produce wrong results. ***\n"); 76 Report("*** WARNING: Failed to SymGetSearchPathW ***\n"); 86 Report("*** WARNING: Failed to getting the EXE directory ***\n"); 95 Report("*** WARNING: Failed to SymSetSearchPathW\n");
|
H A D | sanitizer_libignore.cc | 27 Report("%s: too many ignored libraries (max: %d)\n", SanitizerToolName, 67 Report("%s: called_from_lib suppression '%s' is matched against" 88 Report("%s: library '%s' that was matched against called_from_lib"
|
/external/compiler-rt/lib/esan/ |
H A D | cache_frag.cpp | 64 Report("%s: total struct field access count = %llu\n", SanitizerToolName, 100 Report(" %s %.*s\n", type, end - start, start); 101 Report(" size = %u, count = %llu, ratio = %llu, array access = %llu\n", 105 Report(" #%2u: offset = %u,\t size = %u," 112 Report(" #%2u: count = %llu\n", i, Struct->FieldCounters[i]);
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_interceptors.h | 34 Report("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \
|