/freebsd-11.0-release/contrib/binutils/opcodes/ |
H A D | ia64-opc-b.c | 81 #define BR(a,b) \ macro 83 {"br.few", BR (0, 0)}, 84 {"br", BR (0, 0)}, 85 {"br.few.clr", BR (0, 1)}, 86 {"br.clr", BR (0, 1)}, 87 {"br.many", BR (1, 0)}, 88 {"br.many.clr", BR (1, 1)}, 89 #undef BR macro 91 #define BR(a,b,c,d,e) B0, OpX6BtypePaWhaD (0, a, b, c, d, e), {B2}, EMPTY macro 94 {"br.cond.sptk.few", BR ( 190 #undef BR macro 246 #define BR macro 254 #undef BR macro 256 #define BR macro 308 #undef BR macro 311 #define BR macro 362 #undef BR macro 363 #define BR macro 439 #undef BR macro [all...] |
/freebsd-11.0-release/contrib/llvm/tools/clang/lib/StaticAnalyzer/Checkers/ |
H A D | CheckSizeofPointer.cpp | 26 BugReporter &BR; member in class:__anon4145::WalkAST 32 : BR(br), Checker(checker), AC(ac) {} 66 PathDiagnosticLocation::createBegin(E, BR.getSourceManager(), AC); 67 BR.EmitBasicReport(AC->getDecl(), Checker, 84 BugReporter &BR) const { 85 WalkAST walker(BR, this, mgr.getAnalysisDeclContext(D));
|
H A D | CheckObjCInstMethSignature.cpp | 42 BugReporter &BR, ASTContext &Ctx, 71 BR.getSourceManager()); 73 BR.EmitBasicReport( 80 BugReporter &BR, 89 ASTContext &Ctx = BR.getContext(); 116 CompareReturnTypes(MethDerived, M, BR, Ctx, ID, Checker); 132 BugReporter &BR) const { 133 CheckObjCInstMethSignature(D, BR, this); 40 CompareReturnTypes(const ObjCMethodDecl *MethDerived, const ObjCMethodDecl *MethAncestor, BugReporter &BR, ASTContext &Ctx, const ObjCImplementationDecl *ID, const CheckerBase *Checker) argument 79 CheckObjCInstMethSignature(const ObjCImplementationDecl *ID, BugReporter &BR, const CheckerBase *Checker) argument
|
H A D | LLVMConventionsChecker.cpp | 119 BugReporter &BR; member in class:__anon4173::StringRefCheckerVisitor 125 : DeclWithIssue(declWithIssue), BR(br), Checker(checker) {} 138 static void CheckStringRefAssignedTemporary(const Decl *D, BugReporter &BR, argument 140 StringRefCheckerVisitor walker(D, BR, Checker); 184 PathDiagnosticLocation::createBegin(VD, BR.getSourceManager()); 185 BR.EmitBasicReport(DeclWithIssue, Checker, desc, "LLVM Conventions", desc, 219 BugReporter &BR; member in class:__anon4174::ASTFieldVisitor 225 : Root(root), BR(br), Checker(checker) {} 232 static void CheckASTMemory(const CXXRecordDecl *R, BugReporter &BR, argument 238 ASTFieldVisitor walker(R, BR, Checke [all...] |
H A D | UndefCapturedBlockVarChecker.cpp | 39 if (const DeclRefExpr *BR = dyn_cast<DeclRefExpr>(S)) 40 if (BR->getDecl() == VD) 41 return BR; 45 if (const DeclRefExpr *BR = FindBlockDeclRefExpr(Child, VD)) 46 return BR;
|
H A D | NSErrorChecker.cpp | 48 AnalysisManager &mgr, BugReporter &BR) const; 54 BugReporter &BR) const { 76 PathDiagnosticLocation::create(D, BR.getSourceManager()); 77 BR.EmitBasicReport(D, this, "Bad return type when passing NSError**", 95 AnalysisManager &mgr, BugReporter &BR) const; 101 BugReporter &BR) const { 123 PathDiagnosticLocation::create(D, BR.getSourceManager()); 124 BR.EmitBasicReport(D, this, "Bad return type when passing CFErrorRef*", 246 BugReporter &BR = *event.BR; local [all...] |
H A D | DirectIvarAssignment.cpp | 64 BugReporter &BR; member in class:__anon4162::DirectIvarAssignment::MethodCrawler 72 : IvarToPropMap(InMap), MD(InMD), InterfD(InID), BR(InBR), 92 BugReporter &BR) const; 119 BugReporter &BR) const { 150 MethodCrawler MC(IvarToPropMap, M->getCanonicalDecl(), InterD, BR, this, 199 BR.EmitBasicReport( 203 PathDiagnosticLocation(IvarRef, BR.getSourceManager(), DCtx));
|
H A D | VirtualCallChecker.cpp | 32 BugReporter &BR; member in class:__anon4233::WalkAST 64 : Checker(checker), BR(br), AC(ac), visitingCallExpr(nullptr) {} 191 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 197 BR.EmitBasicReport(AC->getDecl(), Checker, 206 BR.EmitBasicReport(AC->getDecl(), Checker, 222 BugReporter &BR) const { 223 WalkAST walker(this, BR, mgr.getAnalysisDeclContext(RD));
|
H A D | CheckSecuritySyntaxOnly.cpp | 63 BugReporter &BR; member in class:__anon4142::WalkAST 74 : BR(br), AC(ac), II_setid(), 75 CheckRand(isArc4RandomAvailable(BR.getContext())), 293 PathDiagnosticLocation::createBegin(FS, BR.getSourceManager(), AC); 294 BR.EmitBasicReport(AC->getDecl(), filter.checkName_FloatLoopCounter, 323 if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 328 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 329 BR.EmitBasicReport(AC->getDecl(), filter.checkName_gets, 363 if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 368 PathDiagnosticLocation::createBegin(CE, BR [all...] |
H A D | CStringSyntaxChecker.cpp | 35 BugReporter &BR; member in class:__anon4135::WalkAST 86 : Checker(checker), BR(br), AC(ac) {} 145 PathDiagnosticLocation::createBegin(LenArg, BR.getSourceManager(), AC); 160 BR.EmitBasicReport(FD, Checker, "Anti-pattern in the argument", 181 BugReporter &BR) const { 182 WalkAST walker(this, BR, Mgr.getAnalysisDeclContext(D));
|
H A D | ObjCContainersASTChecker.cpp | 29 BugReporter &BR; member in class:__anon4194::WalkAST 75 : BR(br), Checker(checker), AC(ac), ASTC(AC->getASTContext()), 144 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 145 BR.EmitBasicReport(AC->getDecl(), Checker, OsName.str(), 165 BugReporter &BR) const { 166 WalkAST walker(BR, this, Mgr.getAnalysisDeclContext(D));
|
H A D | ObjCUnusedIVarsChecker.cpp | 108 BugReporter &BR, 152 SourceManager &SM = BR.getSourceManager(); 165 PathDiagnosticLocation::create(I->first, BR.getSourceManager()); 166 BR.EmitBasicReport(D, Checker, "Unused instance variable", "Optimization", 180 BugReporter &BR) const { 181 checkObjCUnusedIvar(D, BR, this); 107 checkObjCUnusedIvar(const ObjCImplementationDecl *D, BugReporter &BR, const CheckerBase *Checker) argument
|
H A D | IdenticalExprChecker.cpp | 38 BugReporter &BR; member in class:__anon4169::FindIdenticalExprVisitor 45 : BR(B), Checker(Checker), AC(A) {} 71 PathDiagnosticLocation::createOperatorLoc(B, BR.getSourceManager()); 72 BR.EmitBasicReport(AC->getDecl(), Checker, 120 PathDiagnosticLocation ELoc(InnerIf->getCond(), BR.getSourceManager(), AC); 121 BR.EmitBasicReport(AC->getDecl(), Checker, "Identical conditions", 143 PathDiagnosticLocation ELoc(Cond2, BR.getSourceManager(), AC); 144 BR.EmitBasicReport(AC->getDecl(), Checker, "Identical conditions", 173 PathDiagnosticLocation::createBegin(I, BR.getSourceManager(), AC); 174 BR [all...] |
H A D | CheckObjCDealloc.cpp | 81 const LangOptions &LOpts, BugReporter &BR) { 85 ASTContext &Ctx = BR.getContext(); 146 PathDiagnosticLocation::createBegin(D, BR.getSourceManager()); 158 BR.EmitBasicReport(D, Checker, name, categories::CoreFoundationObjectiveC, 220 PathDiagnosticLocation::createBegin(I, BR.getSourceManager()); 222 BR.EmitBasicReport(MD, Checker, name, 237 BugReporter &BR) const { 241 BR); 79 checkObjCDealloc(const CheckerBase *Checker, const ObjCImplementationDecl *D, const LangOptions &LOpts, BugReporter &BR) argument
|
H A D | StackAddrEscapeChecker.cpp | 69 else if (const BlockDataRegion *BR = dyn_cast<BlockDataRegion>(R)) { 70 const BlockDecl *BD = BR->getCodeRegion()->getDecl();
|
H A D | ObjCMissingSuperCallChecker.cpp | 71 BugReporter &BR) const; 168 BugReporter &BR) const { 169 ASTContext &Ctx = BR.getContext(); 198 BR.getSourceManager(), 209 BR.EmitBasicReport(MD, this, Name, categories::CoreFoundationObjectiveC,
|
H A D | DebugCheckers.cpp | 38 BugReporter &BR) const { 60 BugReporter &BR) const { 80 BugReporter &BR) const { 100 BugReporter &BR) const { 126 BugReporter &BR) const { 146 BugReporter &BR) const { 175 BugReporter &BR) const {
|
H A D | CheckerDocumentation.cpp | 183 BugReporter &BR, 191 BugReporter &BR) const {} 312 BugReporter &BR) const {} 182 checkEndAnalysis(ExplodedGraph &G, BugReporter &BR, ExprEngine &Eng) const argument
|
H A D | MallocOverflowSecurityChecker.cpp | 47 BugReporter &BR) const; 55 const Decl *D, BugReporter &BR, AnalysisManager &mgr) const; 269 const Decl *D, BugReporter &BR, AnalysisManager &mgr) const { 275 CheckOverflowOps c(PossibleMallocOverflows, BR.getContext()); 284 BR.EmitBasicReport( 288 BR.getSourceManager()), 295 BugReporter &BR) const { 331 OutputPossibleOverflows(PossibleMallocOverflows, D, BR, mgr); 267 OutputPossibleOverflows( SmallVectorImpl<MallocOverflowCheck> &PossibleMallocOverflows, const Decl *D, BugReporter &BR, AnalysisManager &mgr) const argument
|
H A D | MallocSizeofChecker.cpp | 178 BugReporter &BR) const { 180 CastedAllocFinder Finder(&BR.getContext()); 203 if (typesCompatible(BR.getContext(), PointeeType, SizeofType)) 208 if (compatibleWithArrayType(BR.getContext(), PointeeType, SizeofType)) 239 BR.getSourceManager(), ADC); 241 BR.EmitBasicReport(D, this, "Allocator sizeof operand mismatch",
|
/freebsd-11.0-release/usr.bin/tip/tip/ |
H A D | cu.c | 61 BR = DEFBR; 106 BR = (int)l; 156 (void)snprintf(sbuf, sizeof(sbuf), "cu%ld", BR); 182 if (HW && ttysetup(BR)) { 184 __progname, BR); 195 if (!HW && ttysetup(BR)) { 197 __progname, BR);
|
H A D | remote.c | 100 if (!BR) 101 BR = DEFBR; 126 if (!BR && (cgetnum(bp, "br", &BR) == -1)) 127 BR = DEFBR;
|
/freebsd-11.0-release/contrib/llvm/tools/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
H A D | BugReporterVisitor.h | 64 BugReport &BR) = 0; 73 getEndPath(BugReporterContext &BRC, const ExplodedNode *N, BugReport &BR); 80 BugReport &BR); 111 static void registerStatementVarDecls(BugReport &BR, const Stmt *S, 126 BugReport &BR) override; 155 BugReport &BR) override; 177 BugReport &BR) override; 200 BugReport &BR) override; 205 BugReport &BR); 267 BugReport &BR) overrid [all...] |
/freebsd-11.0-release/contrib/binutils/include/opcode/ |
H A D | spu-insns.h | 118 BR Branch pipeline 136 APUOP(M_BR, RI16, 0x190, "br", _A1(A_R18), 00000, BR) /* BRel IP<-IP+I16 */ 137 APUOP(M_BRSL, RI16, 0x198, "brsl", _A2(A_T,A_R18), 00002, BR) /* BRelSetLink RT,IP<-IP,IP+I16 */ 138 APUOP(M_BRA, RI16, 0x180, "bra", _A1(A_S18), 00000, BR) /* BRAbs IP<-I16 */ 139 APUOP(M_BRASL, RI16, 0x188, "brasl", _A2(A_T,A_S18), 00002, BR) /* BRAbsSetLink RT,IP<-IP,I16 */ 143 APUOP(M_STOP, RR, 0x000, "stop", _A0(), 00000, BR) /* STOP stop */ 144 APUOP(M_STOP2, RR, 0x000, "stop", _A1(A_U14), 00000, BR) /* STOP stop */ 145 APUOP(M_STOPD, RR, 0x140, "stopd", _A3(A_T,A_A,A_B), 00111, BR) /* STOPD stop (with register dependencies) */ 147 APUOP(M_SYNC, RR, 0x002, "sync", _A0(), 00000, BR) /* SYNC flush_pipe */ 148 APUOP(M_DSYNC, RR, 0x003, "dsync", _A0(), 00000, BR) /* DSYN [all...] |
/freebsd-11.0-release/contrib/llvm/tools/clang/lib/StaticAnalyzer/Core/ |
H A D | BugReporterVisitors.cpp | 105 const ExplodedNode *EndPathNode, BugReport &BR) { 110 BugReporterContext &BRC, const ExplodedNode *EndPathNode, BugReport &BR) { 114 const auto &Ranges = BR.getRanges(); 119 L, BR.getDescription(), Ranges.begin() == Ranges.end()); 168 BugReport &BR, 219 BR.markInteresting(CalleeContext); 220 BR.addVisitor(llvm::make_unique<ReturnVisitor>(CalleeContext, 233 BugReport &BR) { 279 BR.markInteresting(V); 280 ReturnVisitor::addVisitorIfNecessary(N, RetE, BR, 104 getEndPath(BugReporterContext &BRC, const ExplodedNode *EndPathNode, BugReport &BR) argument 109 getDefaultEndPath( BugReporterContext &BRC, const ExplodedNode *EndPathNode, BugReport &BR) argument 167 addVisitorIfNecessary(const ExplodedNode *Node, const Stmt *S, BugReport &BR, bool InEnableNullFPSuppression) argument 230 visitNodeInitial(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 329 visitNodeMaybeUnsuppress(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 446 VisitNode(const ExplodedNode *Succ, const ExplodedNode *Pred, BugReporterContext &BRC, BugReport &BR) argument 727 VisitNode(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 807 VisitNode(const ExplodedNode *Succ, const ExplodedNode *Pred, BugReporterContext &BRC, BugReport &BR) argument 1065 VisitNode(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument 1103 registerStatementVarDecls(BugReport &BR, const Stmt *S, bool EnableNullFPSuppression) argument 1148 VisitNode(const ExplodedNode *N, const ExplodedNode *Prev, BugReporterContext &BRC, BugReport &BR) argument 1161 VisitNodeImpl(const ExplodedNode *N, const ExplodedNode *Prev, BugReporterContext &BRC, BugReport &BR) argument 1512 getEndPath(BugReporterContext &BRC, const ExplodedNode *N, BugReport &BR) argument 1592 VisitNode(const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC, BugReport &BR) argument [all...] |