1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107
|
/* This is the GetData model file for Coverity Scan. It provides hints to
* Coverity Scan's static code analysis.
*
* Although this looks like a C source file, it isn't meant to be compiled.
* Expect to see stack variables being used without initialisation.
*/
#define assert(...) /* */
typedef struct {int error;} DIRFILE;
typedef struct {} gd_entry_t;
/* sets D->error to non-zero when it returns zero */
unsigned int _GD_GetSPF(DIRFILE *D, gd_entry_t *E)
{
unsigned int spf;
if (spf == 0) {
assert(D->error != 0);
}
return spf;
}
/* only allocates memory if supplied no buffer */
char *gd_error_string(const DIRFILE *D, char *buffer, size_t buflen)
{
if (buffer == 0)
__coverity_alloc__(buffer);
return buffer;
}
/* sets D->error to non-zero when it returns NULL */
char *_GD_MungeFrag(DIRFILE *D, const gd_entry_t *P, int me, const char *code,
int *offset)
{
char *new_code;
if (new_code == 0) {
assert(D->error != 0);
}
return new_code;
}
/* sets D->error to non-zero when it returns NULL */
gd_entry_t *_GD_FindField(const DIRFILE *D, const char *field_code,
gd_entry_t *const *list, unsigned int u, int dealias, unsigned int *index)
{
gd_entry_t *E;
if (E == 0) {
assert(D->error != 0);
}
return E;
}
/* either sets D->error to non-zero and returns NULL or else allocates memory */
void *_GD_Malloc(DIRFILE *D, size_t size)
{
void *ptr;
__coverity_alloc__(ptr);
if (ptr == 0) {
assert(D->error != 0);
}
return ptr;
}
/* When fdopendir returns non-NULL, it has stolen the descriptor */
typedef struct {int fd} DIR;
DIR *fdopendir(int fd)
{
DIR *d;
if (d) {
d->fd = fd;
}
return d;
}
int closedir(DIR *d)
{
__coverity_close__(d->fd);
}
/* doesn't return */
void zend_error(int type, const char *format, ...)
{
__coverity_panic__();
}
/* may not return */
#define IDL_MSG_LONGJMP 2
void IDL_Message(int code, int action, ...)
{
if (action == IDL_MSG_LONGJMP)
__coverity_panic__();
}
/* doesn't return */
void croak(const char *pat, ...)
{
__coverity_panic__();
}
/* doesn't return */
void mexErrMsgIdAndTxt(const char *id, const char *txt)
{
__coverity_panic__();
}
|