/freebsd-10.3-release/contrib/binutils/opcodes/ |
H A D | ia64-opc-b.c | 81 #define BR(a,b) \ macro 83 {"br.few", BR (0, 0)}, 84 {"br", BR (0, 0)}, 85 {"br.few.clr", BR (0, 1)}, 86 {"br.clr", BR (0, 1)}, 87 {"br.many", BR (1, 0)}, 88 {"br.many.clr", BR (1, 1)}, 89 #undef BR macro 91 #define BR(a,b,c,d,e) B0, OpX6BtypePaWhaD (0, a, b, c, d, e), {B2}, EMPTY macro 94 {"br.cond.sptk.few", BR ( 190 #undef BR macro 246 #define BR macro 254 #undef BR macro 256 #define BR macro 308 #undef BR macro 311 #define BR macro 362 #undef BR macro 363 #define BR macro 439 #undef BR macro [all...] |
/freebsd-10.3-release/contrib/llvm/tools/clang/lib/StaticAnalyzer/Checkers/ |
H A D | CheckSizeofPointer.cpp | 26 BugReporter &BR; member in class:__anon3536::WalkAST 30 WalkAST(BugReporter &br, AnalysisDeclContext* ac) : BR(br), AC(ac) {} 64 PathDiagnosticLocation::createBegin(E, BR.getSourceManager(), AC); 65 BR.EmitBasicReport(AC->getDecl(), 82 BugReporter &BR) const { 83 WalkAST walker(BR, mgr.getAnalysisDeclContext(D));
|
H A D | UndefCapturedBlockVarChecker.cpp | 39 if (const DeclRefExpr *BR = dyn_cast<DeclRefExpr>(S)) 40 if (BR->getDecl() == VD) 41 return BR; 46 const DeclRefExpr *BR = FindBlockDeclRefExpr(child, VD); local 47 if (BR) 48 return BR;
|
H A D | CheckObjCInstMethSignature.cpp | 42 BugReporter &BR, ASTContext &Ctx, 70 BR.getSourceManager()); 72 BR.EmitBasicReport(MethDerived, 80 BugReporter& BR) { 88 ASTContext &Ctx = BR.getContext(); 121 CompareReturnTypes(MethDerived, M, BR, Ctx, ID); 137 BugReporter &BR) const { 138 CheckObjCInstMethSignature(D, BR); 40 CompareReturnTypes(const ObjCMethodDecl *MethDerived, const ObjCMethodDecl *MethAncestor, BugReporter &BR, ASTContext &Ctx, const ObjCImplementationDecl *ID) argument 79 CheckObjCInstMethSignature(const ObjCImplementationDecl *ID, BugReporter& BR) argument
|
H A D | LLVMConventionsChecker.cpp | 118 BugReporter &BR; member in class:__anon3563::StringRefCheckerVisitor 122 : BR(br), DeclWithIssue(declWithIssue) {} 136 static void CheckStringRefAssignedTemporary(const Decl *D, BugReporter &BR) { argument 137 StringRefCheckerVisitor walker(D, BR); 181 PathDiagnosticLocation::createBegin(VD, BR.getSourceManager()); 182 BR.EmitBasicReport(DeclWithIssue, desc, "LLVM Conventions", desc, 218 BugReporter &BR; member in class:__anon3564::ASTFieldVisitor 221 : Root(root), BR(br) {} 228 static void CheckASTMemory(const CXXRecordDecl *R, BugReporter &BR) { argument 234 ASTFieldVisitor walker(R, BR); [all...] |
H A D | NSErrorChecker.cpp | 48 AnalysisManager &mgr, BugReporter &BR) const; 54 BugReporter &BR) const { 77 PathDiagnosticLocation::create(D, BR.getSourceManager()); 78 BR.EmitBasicReport(D, "Bad return type when passing NSError**", 96 AnalysisManager &mgr, BugReporter &BR) const; 102 BugReporter &BR) const { 125 PathDiagnosticLocation::create(D, BR.getSourceManager()); 126 BR.EmitBasicReport(D, "Bad return type when passing CFErrorRef*", 244 BugReporter &BR = *event.BR; local [all...] |
H A D | DebugCheckers.cpp | 35 BugReporter &BR) const { 57 BugReporter &BR) const { 77 BugReporter &BR) const { 97 BugReporter &BR) const { 118 BugReporter &BR) const { 138 BugReporter &BR) const { 167 BugReporter &BR) const {
|
H A D | VirtualCallChecker.cpp | 31 BugReporter &BR; member in class:__anon3618::WalkAST 62 : BR(br), 184 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 190 BR.EmitBasicReport(AC->getDecl(), 200 BR.EmitBasicReport(AC->getDecl(), 217 BugReporter &BR) const { 218 WalkAST walker(BR, mgr.getAnalysisDeclContext(RD));
|
H A D | CheckSecuritySyntaxOnly.cpp | 52 BugReporter &BR; member in class:__anon3533::WalkAST 63 : BR(br), AC(ac), II_setid(), 64 CheckRand(isArc4RandomAvailable(BR.getContext())), 283 PathDiagnosticLocation::createBegin(FS, BR.getSourceManager(), AC); 284 BR.EmitBasicReport(AC->getDecl(), 313 if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 318 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 319 BR.EmitBasicReport(AC->getDecl(), 353 if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 358 PathDiagnosticLocation::createBegin(CE, BR [all...] |
H A D | CStringSyntaxChecker.cpp | 34 BugReporter &BR; member in class:__anon3526::WalkAST 85 BR(br), AC(ac) { 145 PathDiagnosticLocation::createBegin(LenArg, BR.getSourceManager(), AC); 160 BR.EmitBasicReport(FD, "Anti-pattern in the argument", "C String API", 181 BugReporter &BR) const { 182 WalkAST walker(BR, Mgr.getAnalysisDeclContext(D));
|
H A D | ObjCContainersASTChecker.cpp | 29 BugReporter &BR; member in class:__anon3581::WalkAST 75 : BR(br), AC(ac), ASTC(AC->getASTContext()), 144 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 145 BR.EmitBasicReport(AC->getDecl(), 165 BugReporter &BR) const { 166 WalkAST walker(BR, Mgr.getAnalysisDeclContext(D));
|
H A D | CheckObjCDealloc.cpp | 101 const LangOptions& LOpts, BugReporter& BR) { 105 ASTContext &Ctx = BR.getContext(); 171 PathDiagnosticLocation::createBegin(D, BR.getSourceManager()); 183 BR.EmitBasicReport(D, name, categories::CoreFoundationObjectiveC, 201 BR.EmitBasicReport(MD, name, categories::CoreFoundationObjectiveC, 265 PathDiagnosticLocation::createBegin(*I, BR.getSourceManager()); 267 BR.EmitBasicReport(MD, name, categories::CoreFoundationObjectiveC, 282 BugReporter &BR) const { 285 checkObjCDealloc(cast<ObjCImplementationDecl>(D), mgr.getLangOpts(), BR); 100 checkObjCDealloc(const ObjCImplementationDecl *D, const LangOptions& LOpts, BugReporter& BR) argument
|
H A D | MallocOverflowSecurityChecker.cpp | 44 BugReporter &BR) const; 52 const Decl *D, BugReporter &BR, AnalysisManager &mgr) const; 201 const Decl *D, BugReporter &BR, AnalysisManager &mgr) const { 207 CheckOverflowOps c(PossibleMallocOverflows, BR.getContext()); 216 BR.EmitBasicReport(D, "malloc() size overflow", categories::UnixAPI, 219 BR.getSourceManager()), 226 BugReporter &BR) const { 262 OutputPossibleOverflows(PossibleMallocOverflows, D, BR, mgr); 199 OutputPossibleOverflows( SmallVectorImpl<MallocOverflowCheck> &PossibleMallocOverflows, const Decl *D, BugReporter &BR, AnalysisManager &mgr) const argument
|
H A D | StackAddrEscapeChecker.cpp | 69 else if (const BlockDataRegion *BR = dyn_cast<BlockDataRegion>(R)) { 70 const BlockDecl *BD = BR->getCodeRegion()->getDecl();
|
H A D | ObjCMissingSuperCallChecker.cpp | 73 BugReporter &BR) const; 170 BugReporter &BR) const { 171 ASTContext &Ctx = BR.getContext(); 204 BR.getSourceManager(), 215 BR.EmitBasicReport(MD, Name, categories::CoreFoundationObjectiveC,
|
H A D | DirectIvarAssignment.cpp | 65 BugReporter &BR; member in class:__anon3552::DirectIvarAssignment::MethodCrawler 72 : IvarToPropMap(InMap), MD(InMD), InterfD(InID), BR(InBR), DCtx(InDCtx) {} 91 BugReporter &BR) const; 118 BugReporter &BR) const { 155 MethodCrawler MC(IvarToPropMap, M->getCanonicalDecl(), InterD, BR, DCtx); 207 BR.EmitBasicReport(MD, 212 BR.getSourceManager(),
|
H A D | CheckerDocumentation.cpp | 173 BugReporter &BR, 181 BugReporter &BR) const {} 302 BugReporter &BR) const {} 172 checkEndAnalysis(ExplodedGraph &G, BugReporter &BR, ExprEngine &Eng) const argument
|
H A D | IdenticalExprChecker.cpp | 39 : BR(B), AC(A) {} 45 BugReporter &BR; member in class:__anon3559::FindIdenticalExprVisitor 107 PathDiagnosticLocation::createOperatorLoc(B, BR.getSourceManager()); 113 BR.EmitBasicReport(AC->getDecl(), "Compare of identical expressions", 217 BugReporter &BR) const { 218 FindIdenticalExprVisitor Visitor(BR, Mgr.getAnalysisDeclContext(D));
|
H A D | MallocSizeofChecker.cpp | 176 BugReporter &BR) const { 178 CastedAllocFinder Finder(&BR.getContext()); 201 if (typesCompatible(BR.getContext(), PointeeType, SizeofType)) 206 if (compatibleWithArrayType(BR.getContext(), PointeeType, SizeofType)) 237 BR.getSourceManager(), ADC); 239 BR.EmitBasicReport(D, "Allocator sizeof operand mismatch",
|
H A D | ObjCUnusedIVarsChecker.cpp | 114 BugReporter &BR) { 161 SourceManager &SM = BR.getSourceManager(); 174 PathDiagnosticLocation::create(I->first, BR.getSourceManager()); 175 BR.EmitBasicReport(D, "Unused instance variable", "Optimization", 189 BugReporter &BR) const { 190 checkObjCUnusedIvar(D, BR); 113 checkObjCUnusedIvar(const ObjCImplementationDecl *D, BugReporter &BR) argument
|
/freebsd-10.3-release/usr.bin/tip/tip/ |
H A D | cu.c | 61 BR = DEFBR; 106 BR = (int)l; 156 (void)snprintf(sbuf, sizeof(sbuf), "cu%ld", BR); 182 if (HW && ttysetup(BR)) { 184 __progname, BR); 195 if (!HW && ttysetup(BR)) { 197 __progname, BR);
|
H A D | remote.c | 100 if (!BR) 101 BR = DEFBR; 126 if (!BR && (cgetnum(bp, "br", &BR) == -1)) 127 BR = DEFBR;
|
/freebsd-10.3-release/contrib/llvm/tools/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
H A D | BugReporterVisitor.h | 61 BugReport &BR) = 0; 71 BugReport &BR); 78 BugReport &BR); 111 static void registerStatementVarDecls(BugReport &BR, const Stmt *S, 126 BugReport &BR); 156 BugReport &BR); 178 BugReport &BR); 200 BugReport &BR); 205 BugReport &BR); 267 BugReport &BR) { 264 VisitNode(const ExplodedNode *N, const ExplodedNode *Prev, BugReporterContext &BRC, BugReport &BR) argument [all...] |
/freebsd-10.3-release/contrib/binutils/include/opcode/ |
H A D | spu-insns.h | 118 BR Branch pipeline 136 APUOP(M_BR, RI16, 0x190, "br", _A1(A_R18), 00000, BR) /* BRel IP<-IP+I16 */ 137 APUOP(M_BRSL, RI16, 0x198, "brsl", _A2(A_T,A_R18), 00002, BR) /* BRelSetLink RT,IP<-IP,IP+I16 */ 138 APUOP(M_BRA, RI16, 0x180, "bra", _A1(A_S18), 00000, BR) /* BRAbs IP<-I16 */ 139 APUOP(M_BRASL, RI16, 0x188, "brasl", _A2(A_T,A_S18), 00002, BR) /* BRAbsSetLink RT,IP<-IP,I16 */ 143 APUOP(M_STOP, RR, 0x000, "stop", _A0(), 00000, BR) /* STOP stop */ 144 APUOP(M_STOP2, RR, 0x000, "stop", _A1(A_U14), 00000, BR) /* STOP stop */ 145 APUOP(M_STOPD, RR, 0x140, "stopd", _A3(A_T,A_A,A_B), 00111, BR) /* STOPD stop (with register dependencies) */ 147 APUOP(M_SYNC, RR, 0x002, "sync", _A0(), 00000, BR) /* SYNC flush_pipe */ 148 APUOP(M_DSYNC, RR, 0x003, "dsync", _A0(), 00000, BR) /* DSYN [all...] |
/freebsd-10.3-release/contrib/llvm/tools/clang/lib/StaticAnalyzer/Core/ |
H A D | BugReporterVisitors.cpp | 106 BugReport &BR) { 113 BugReport &BR) { 118 llvm::tie(Beg, End) = BR.getRanges(); 123 BR.getDescription(), 173 BugReport &BR, 224 BR.markInteresting(CalleeContext); 225 BR.addVisitor(new ReturnVisitor(CalleeContext, EnableNullFPSuppression)); 237 BugReport &BR) { 283 BR.markInteresting(V); 284 ReturnVisitor::addVisitorIfNecessary(N, RetE, BR, 104 getEndPath(BugReporterContext &BRC, const ExplodedNode *EndPathNode, BugReport &BR) argument 111 getDefaultEndPath(BugReporterContext &BRC, const ExplodedNode *EndPathNode, BugReport &BR) argument 172 addVisitorIfNecessary(const ExplodedNode *Node, const Stmt *S, BugReport &BR, bool InEnableNullFPSuppression) argument 234 visitNodeInitial(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 333 visitNodeMaybeUnsuppress(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 386 VisitNode(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 402 getEndPath(BugReporterContext &BRC, const ExplodedNode *N, BugReport &BR) argument 450 VisitNode(const ExplodedNode *Succ, const ExplodedNode *Pred, BugReporterContext &BRC, BugReport &BR) argument 731 VisitNode(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 811 VisitNode(const ExplodedNode *Succ, const ExplodedNode *Pred, BugReporterContext &BRC, BugReport &BR) argument 1073 VisitNode(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 1109 registerStatementVarDecls(BugReport &BR, const Stmt *S, bool EnableNullFPSuppression) argument 1155 VisitNode(const ExplodedNode *N, const ExplodedNode *Prev, BugReporterContext &BRC, BugReport &BR) argument 1168 VisitNodeImpl(const ExplodedNode *N, const ExplodedNode *Prev, BugReporterContext &BRC, BugReport &BR) argument 1520 getEndPath(BugReporterContext &BRC, const ExplodedNode *N, BugReport &BR) argument 1597 VisitNode(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument [all...] |