ctx->probelist[i], ctx->linebuf + i * ctx->linebuf_len);
}
- /* Mark trigger with ^ */
+ /* Mark trigger with a ^ character. */
if (ctx->mark_trigger != -1)
sprintf(outbuf + strlen(outbuf), "T:%*s^\n",
ctx->mark_trigger + (ctx->mark_trigger / 8), "");
int num_probes;
char *samplerate_s;
- ctx = malloc(sizeof(struct context));
+ if (!(ctx = calloc(1, sizeof(struct context))))
+ return SIGROK_ERR_MALLOC;
+
o->internal = ctx;
ctx->num_enabled_probes = 0;
else
ctx->samples_per_line = default_spl;
- ctx->header = malloc(512);
+ if (!(ctx->header = malloc(512))) {
+ free(ctx);
+ return SIGROK_ERR_MALLOC;
+ }
+
snprintf(ctx->header, 511, "%s\n", PACKAGE_STRING);
if (o->device->plugin) {
num_probes = g_slist_length(o->device->probes);
samplerate = *((uint64_t *) o->device->plugin->get_device_info(
o->device->plugin_index, DI_CUR_SAMPLERATE));
- if ((samplerate_s = sigrok_samplerate_string(samplerate)) == NULL)
+ if (!(samplerate_s = sigrok_samplerate_string(samplerate))) {
+ free(ctx->header);
+ free(ctx);
return SIGROK_ERR;
- snprintf(ctx->header + strlen(ctx->header), 511 - strlen(ctx->header),
- "Acquisition with %d/%d probes at %s\n", ctx->num_enabled_probes,
- num_probes, samplerate_s);
+ }
+ snprintf(ctx->header + strlen(ctx->header),
+ 511 - strlen(ctx->header),
+ "Acquisition with %d/%d probes at %s\n",
+ ctx->num_enabled_probes, num_probes, samplerate_s);
free(samplerate_s);
}
ctx->linebuf_len = ctx->samples_per_line * 2;
- ctx->linebuf = calloc(1, num_probes * ctx->linebuf_len);
- ctx->linevalues = calloc(1, num_probes);
+ if (!(ctx->linebuf = calloc(1, num_probes * ctx->linebuf_len))) {
+ free(ctx->header);
+ free(ctx);
+ return SIGROK_ERR_MALLOC;
+ }
+ if (!(ctx->linevalues = calloc(1, num_probes))) {
+ free(ctx->header);
+ free(ctx);
+ return SIGROK_ERR_MALLOC;
+ }
- return 0;
+ return SIGROK_OK;
}
static int event(struct output *o, int event_type, char **data_out,
case DF_END:
outsize = ctx->num_enabled_probes
* (ctx->samples_per_line + 20) + 512;
- outbuf = calloc(1, outsize);
+ if (!(outbuf = calloc(1, outsize)))
+ return SIGROK_ERR_MALLOC;
flush_linebufs(ctx, outbuf);
*data_out = outbuf;
*length_out = strlen(outbuf);
ctx = o->internal;
outsize = length_in / ctx->unitsize * ctx->num_enabled_probes *
ctx->samples_per_line + 512;
- outbuf = calloc(1, outsize + 1);
+
+ if (!(outbuf = calloc(1, outsize + 1)))
+ return SIGROK_ERR_MALLOC;
+
+ outbuf[0] = '\0';
if (ctx->header) {
/* The header is still here, this must be the first packet. */
strncpy(outbuf, ctx->header, outsize);
free(ctx->header);
ctx->header = NULL;
- } else
- outbuf[0] = 0;
+ }
if (length_in >= ctx->unitsize) {
for (offset = 0; offset <= length_in - ctx->unitsize;
ctx->mark_trigger = -1;
}
}
- } else
+ } else {
g_message("short buffer (length_in=%" PRIu64 ")", length_in);
+ }
*data_out = outbuf;
*length_out = strlen(outbuf);
ctx = o->internal;
outsize = length_in / ctx->unitsize * ctx->num_enabled_probes *
ctx->samples_per_line + 512;
- outbuf = calloc(1, outsize + 1);
+
+ if (!(outbuf = calloc(1, outsize + 1)))
+ return SIGROK_ERR_MALLOC;
+
+ outbuf[0] = '\0';
if (ctx->header) {
/* The header is still here, this must be the first packet. */
strncpy(outbuf, ctx->header, outsize);
free(ctx->header);
ctx->header = NULL;
- } else
- outbuf[0] = 0;
+ }
ctx->line_offset = 0;
for (offset = 0; offset <= length_in - ctx->unitsize;