instruction
stringclasses
1 value
input
stringlengths
31
235k
output
class label
2 classes
Categorize the following code snippet as vulnerable or not. True or False
static void mips_pica61_init ( QEMUMachineInitArgs * args ) { ram_addr_t ram_size = args -> ram_size ; const char * cpu_model = args -> cpu_model ; mips_jazz_init ( get_system_memory ( ) , get_system_io ( ) , ram_size , cpu_model , JAZZ_PICA61 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void abort_request ( ngx_http_request_t * r ) { ngx_log_debug0 ( NGX_LOG_DEBUG_HTTP , r -> connection -> log , 0 , "abort Passenger request" ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void more_files_callback ( GObject * source_object , GAsyncResult * res , gpointer user_data ) { DirectoryLoadState * state ; NautilusDirectory * directory ; GError * error ; GList * files , * l ; GFileInfo * info ; state = user_data ; if ( state -> directory == NULL ) { directory_load_state_free ( state ) ; return ; } directory = nautilus_directory_ref ( state -> directory ) ; g_assert ( directory -> details -> directory_load_in_progress != NULL ) ; g_assert ( directory -> details -> directory_load_in_progress == state ) ; error = NULL ; files = g_file_enumerator_next_files_finish ( state -> enumerator , res , & error ) ; for ( l = files ; l != NULL ; l = l -> next ) { info = l -> data ; directory_load_one ( directory , info ) ; g_object_unref ( info ) ; } if ( files == NULL ) { directory_load_done ( directory , error ) ; directory_load_state_free ( state ) ; } else { g_file_enumerator_next_files_async ( state -> enumerator , DIRECTORY_LOAD_ITEMS_PER_CALLBACK , G_PRIORITY_DEFAULT , state -> cancellable , more_files_callback , state ) ; } nautilus_directory_unref ( directory ) ; if ( error ) { g_error_free ( error ) ; } g_list_free ( files ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void s390_machine_init ( void ) { qemu_register_machine ( & s390_machine ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int getulong ( const char * numstr , unsigned long int * result ) { unsigned long int val ; char * endptr ; errno = 0 ; val = strtoul ( numstr , & endptr , 0 ) ; if ( ( '\0' == * numstr ) || ( '\0' != * endptr ) || ( ERANGE == errno ) ) { return 0 ; } * result = val ; return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_type_bitmap ( proto_tree * rr_tree , tvbuff_t * tvb , int cur_offset , int rr_len ) { int mask , blockbase , blocksize ; int i , initial_offset , rr_type ; guint8 bits ; initial_offset = cur_offset ; while ( rr_len != 0 ) { blockbase = tvb_get_guint8 ( tvb , cur_offset ) ; blocksize = tvb_get_guint8 ( tvb , cur_offset + 1 ) ; cur_offset += 2 ; rr_len -= 2 ; rr_type = blockbase * 256 ; for ( ; blocksize ; blocksize -- ) { bits = tvb_get_guint8 ( tvb , cur_offset ) ; mask = 1 << 7 ; for ( i = 0 ; i < 8 ; i ++ ) { if ( bits & mask ) { proto_tree_add_uint_format ( rr_tree , hf_dns_rr_type , tvb , cur_offset , 1 , rr_type , "RR type in bit map: %s" , val_to_str_ext ( rr_type , & dns_types_description_vals_ext , "Unknown (%d)" ) ) ; } mask >>= 1 ; rr_type ++ ; } cur_offset += 1 ; rr_len -= 1 ; } } return ( initial_offset - cur_offset ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void xsltDebug ( xsltTransformContextPtr ctxt , xmlNodePtr node ATTRIBUTE_UNUSED , xmlNodePtr inst ATTRIBUTE_UNUSED , xsltStylePreCompPtr comp ATTRIBUTE_UNUSED ) { int i , j ; xsltGenericError ( xsltGenericErrorContext , "Templates:\n" ) ; for ( i = 0 , j = ctxt -> templNr - 1 ; ( ( i < 15 ) && ( j >= 0 ) ) ; i ++ , j -- ) { xsltGenericError ( xsltGenericErrorContext , "#%d " , i ) ; if ( ctxt -> templTab [ j ] -> name != NULL ) xsltGenericError ( xsltGenericErrorContext , "name %s " , ctxt -> templTab [ j ] -> name ) ; if ( ctxt -> templTab [ j ] -> match != NULL ) xsltGenericError ( xsltGenericErrorContext , "name %s " , ctxt -> templTab [ j ] -> match ) ; if ( ctxt -> templTab [ j ] -> mode != NULL ) xsltGenericError ( xsltGenericErrorContext , "name %s " , ctxt -> templTab [ j ] -> mode ) ; xsltGenericError ( xsltGenericErrorContext , "\n" ) ; } xsltGenericError ( xsltGenericErrorContext , "Variables:\n" ) ; for ( i = 0 , j = ctxt -> varsNr - 1 ; ( ( i < 15 ) && ( j >= 0 ) ) ; i ++ , j -- ) { xsltStackElemPtr cur ; if ( ctxt -> varsTab [ j ] == NULL ) continue ; xsltGenericError ( xsltGenericErrorContext , "#%d\n" , i ) ; cur = ctxt -> varsTab [ j ] ; while ( cur != NULL ) { if ( cur -> comp == NULL ) { xsltGenericError ( xsltGenericErrorContext , "corrupted !!!\n" ) ; } else if ( cur -> comp -> type == XSLT_FUNC_PARAM ) { xsltGenericError ( xsltGenericErrorContext , "param " ) ; } else if ( cur -> comp -> type == XSLT_FUNC_VARIABLE ) { xsltGenericError ( xsltGenericErrorContext , "var " ) ; } if ( cur -> name != NULL ) xsltGenericError ( xsltGenericErrorContext , "%s " , cur -> name ) ; else xsltGenericError ( xsltGenericErrorContext , "noname !!!!" ) ; # ifdef LIBXML_DEBUG_ENABLED if ( cur -> value != NULL ) { xmlXPathDebugDumpObject ( stdout , cur -> value , 1 ) ; } else { xsltGenericError ( xsltGenericErrorContext , "NULL !!!!" ) ; } # endif xsltGenericError ( xsltGenericErrorContext , "\n" ) ; cur = cur -> next ; } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
GType hb_gobject_ ## name ## _get_type ( void ) \ { static gsize type_id = 0 ; if ( g_once_init_enter ( & type_id ) ) { GType id = g_boxed_type_register_static ( g_intern_static_string ( "hb_" # name "_t" ) , ( GBoxedCopyFunc ) copy_func , ( GBoxedFreeFunc ) free_func ) ; g_once_init_leave ( & type_id , id ) ; } return type_id ; \ } # define HB_DEFINE_OBJECT_TYPE ( name ) HB_DEFINE_BOXED_TYPE ( name , hb_ ## name ## _reference , hb_ ## name ## _destroy ) ; # define HB_DEFINE_VALUE_TYPE ( name ) static hb_ ## name ## _t * _hb_ ## name ## _reference ( const hb_ ## name ## _t * l ) { hb_ ## name ## _t * c = ( hb_ ## name ## _t * ) calloc ( 1 , sizeof ( hb_ ## name ## _t ) ) ; if ( unlikely ( ! c ) ) return NULL ; * c = * l ; return c ; } static void _hb_ ## name ## _destroy ( hb_ ## name ## _t * l ) { free ( l ) ; } HB_DEFINE_BOXED_TYPE ( name , _hb_ ## name ## _reference , _hb_ ## name ## _destroy ) ; HB_DEFINE_OBJECT_TYPE ( buffer ) HB_DEFINE_OBJECT_TYPE ( blob ) HB_DEFINE_OBJECT_TYPE ( face )
0False
Categorize the following code snippet as vulnerable or not. True or False
static uint32_t pointerTOCEntryCount ( const UDataMemory * pData ) { const PointerTOC * toc = ( PointerTOC * ) pData -> toc ; return ( uint32_t ) ( ( toc != NULL ) ? ( toc -> count ) : 0 ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int read_dcs ( AVCodecContext * avctx , GetBitContext * gb , Bundle * b , int start_bits , int has_sign ) { int i , j , len , len2 , bsize , sign , v , v2 ; int16_t * dst = ( int16_t * ) b -> cur_dec ; int16_t * dst_end = ( int16_t * ) b -> data_end ; CHECK_READ_VAL ( gb , b , len ) ; v = get_bits ( gb , start_bits - has_sign ) ; if ( v && has_sign ) { sign = - get_bits1 ( gb ) ; v = ( v ^ sign ) - sign ; } if ( dst_end - dst < 1 ) return AVERROR_INVALIDDATA ; * dst ++ = v ; len -- ; for ( i = 0 ; i < len ; i += 8 ) { len2 = FFMIN ( len - i , 8 ) ; if ( dst_end - dst < len2 ) return AVERROR_INVALIDDATA ; bsize = get_bits ( gb , 4 ) ; if ( bsize ) { for ( j = 0 ; j < len2 ; j ++ ) { v2 = get_bits ( gb , bsize ) ; if ( v2 ) { sign = - get_bits1 ( gb ) ; v2 = ( v2 ^ sign ) - sign ; } v += v2 ; * dst ++ = v ; if ( v < - 32768 || v > 32767 ) { av_log ( avctx , AV_LOG_ERROR , "DC value went out of bounds: %d\n" , v ) ; return AVERROR_INVALIDDATA ; } } } else { for ( j = 0 ; j < len2 ; j ++ ) * dst ++ = v ; } } b -> cur_dec = ( uint8_t * ) dst ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void pcnet_transmit ( PCNetState * s ) { hwaddr xmit_cxda = 0 ; int count = CSR_XMTRL ( s ) - 1 ; int add_crc = 0 ; int bcnt ; s -> xmit_pos = - 1 ; if ( ! CSR_TXON ( s ) ) { s -> csr [ 0 ] &= ~ 0x0008 ; return ; } s -> tx_busy = 1 ; txagain : if ( pcnet_tdte_poll ( s ) ) { struct pcnet_TMD tmd ; TMDLOAD ( & tmd , PHYSADDR ( s , CSR_CXDA ( s ) ) ) ; # ifdef PCNET_DEBUG_TMD printf ( " TMDLOAD 0x%08x\n" , PHYSADDR ( s , CSR_CXDA ( s ) ) ) ; PRINT_TMD ( & tmd ) ; # endif if ( GET_FIELD ( tmd . status , TMDS , STP ) ) { s -> xmit_pos = 0 ; xmit_cxda = PHYSADDR ( s , CSR_CXDA ( s ) ) ; if ( BCR_SWSTYLE ( s ) != 1 ) add_crc = GET_FIELD ( tmd . status , TMDS , ADDFCS ) ; } if ( s -> lnkst == 0 && ( ! CSR_LOOP ( s ) || ( ! CSR_INTL ( s ) && ! BCR_TMAULOOP ( s ) ) ) ) { SET_FIELD ( & tmd . misc , TMDM , LCAR , 1 ) ; SET_FIELD ( & tmd . status , TMDS , ERR , 1 ) ; SET_FIELD ( & tmd . status , TMDS , OWN , 0 ) ; s -> csr [ 0 ] |= 0xa000 ; s -> xmit_pos = - 1 ; goto txdone ; } if ( s -> xmit_pos < 0 ) { goto txdone ; } bcnt = 4096 - GET_FIELD ( tmd . length , TMDL , BCNT ) ; if ( s -> xmit_pos + bcnt > sizeof ( s -> buffer ) - 4 ) { s -> xmit_pos = - 1 ; goto txdone ; } s -> phys_mem_read ( s -> dma_opaque , PHYSADDR ( s , tmd . tbadr ) , s -> buffer + s -> xmit_pos , bcnt , CSR_BSWP ( s ) ) ; s -> xmit_pos += bcnt ; if ( ! GET_FIELD ( tmd . status , TMDS , ENP ) ) { goto txdone ; } # ifdef PCNET_DEBUG printf ( "pcnet_transmit size=%d\n" , s -> xmit_pos ) ; # endif if ( CSR_LOOP ( s ) ) { if ( BCR_SWSTYLE ( s ) == 1 ) add_crc = ! GET_FIELD ( tmd . status , TMDS , NOFCS ) ; s -> looptest = add_crc ? PCNET_LOOPTEST_CRC : PCNET_LOOPTEST_NOCRC ; pcnet_receive ( qemu_get_queue ( s -> nic ) , s -> buffer , s -> xmit_pos ) ; s -> looptest = 0 ; } else { if ( s -> nic ) { qemu_send_packet ( qemu_get_queue ( s -> nic ) , s -> buffer , s -> xmit_pos ) ; } } s -> csr [ 0 ] &= ~ 0x0008 ; s -> csr [ 4 ] |= 0x0004 ; s -> xmit_pos = - 1 ; txdone : SET_FIELD ( & tmd . status , TMDS , OWN , 0 ) ; TMDSTORE ( & tmd , PHYSADDR ( s , CSR_CXDA ( s ) ) ) ; if ( ! CSR_TOKINTD ( s ) || ( CSR_LTINTEN ( s ) && GET_FIELD ( tmd . status , TMDS , LTINT ) ) ) { s -> csr [ 0 ] |= 0x0200 ; } if ( CSR_XMTRC ( s ) <= 1 ) { CSR_XMTRC ( s ) = CSR_XMTRL ( s ) ; } else { CSR_XMTRC ( s ) -- ; } if ( count -- ) { goto txagain ; } } else if ( s -> xmit_pos >= 0 ) { struct pcnet_TMD tmd ; TMDLOAD ( & tmd , xmit_cxda ) ; SET_FIELD ( & tmd . misc , TMDM , BUFF , 1 ) ; SET_FIELD ( & tmd . misc , TMDM , UFLO , 1 ) ; SET_FIELD ( & tmd . status , TMDS , ERR , 1 ) ; SET_FIELD ( & tmd . status , TMDS , OWN , 0 ) ; TMDSTORE ( & tmd , xmit_cxda ) ; s -> csr [ 0 ] |= 0x0200 ; if ( ! CSR_DXSUFLO ( s ) ) { s -> csr [ 0 ] &= ~ 0x0010 ; } else if ( count -- ) { goto txagain ; } } s -> tx_busy = 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int mem_draw_thin_line ( gx_device * dev , fixed fx0 , fixed fy0 , fixed fx1 , fixed fy1 , const gx_drawing_color * pdcolor , gs_logical_operation_t lop , fixed adjustx , fixed adjusty ) { return gx_default_draw_thin_line ( dev , fx0 , fy0 , fx1 , fy1 , pdcolor , lop , adjustx , adjusty ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static cmsBool Type_Curve_Write ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , void * Ptr , cmsUInt32Number nItems ) { cmsToneCurve * Curve = ( cmsToneCurve * ) Ptr ; if ( Curve -> nSegments == 1 && Curve -> Segments [ 0 ] . Type == 1 ) { cmsUInt16Number SingleGammaFixed = _cmsDoubleTo8Fixed8 ( Curve -> Segments [ 0 ] . Params [ 0 ] ) ; if ( ! _cmsWriteUInt32Number ( io , 1 ) ) return FALSE ; if ( ! _cmsWriteUInt16Number ( io , SingleGammaFixed ) ) return FALSE ; return TRUE ; } if ( ! _cmsWriteUInt32Number ( io , Curve -> nEntries ) ) return FALSE ; return _cmsWriteUInt16Array ( io , Curve -> nEntries , Curve -> Table16 ) ; cmsUNUSED_PARAMETER ( nItems ) ; cmsUNUSED_PARAMETER ( self ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int kex_agree_methods ( LIBSSH2_SESSION * session , unsigned char * data , unsigned data_len ) { unsigned char * kex , * hostkey , * crypt_cs , * crypt_sc , * comp_cs , * comp_sc , * mac_cs , * mac_sc ; size_t kex_len , hostkey_len , crypt_cs_len , crypt_sc_len , comp_cs_len ; size_t comp_sc_len , mac_cs_len , mac_sc_len ; unsigned char * s = data ; s ++ ; s += 16 ; if ( kex_string_pair ( & s , data , data_len , & kex_len , & kex ) ) return - 1 ; if ( kex_string_pair ( & s , data , data_len , & hostkey_len , & hostkey ) ) return - 1 ; if ( kex_string_pair ( & s , data , data_len , & crypt_cs_len , & crypt_cs ) ) return - 1 ; if ( kex_string_pair ( & s , data , data_len , & crypt_sc_len , & crypt_sc ) ) return - 1 ; if ( kex_string_pair ( & s , data , data_len , & mac_cs_len , & mac_cs ) ) return - 1 ; if ( kex_string_pair ( & s , data , data_len , & mac_sc_len , & mac_sc ) ) return - 1 ; if ( kex_string_pair ( & s , data , data_len , & comp_cs_len , & comp_cs ) ) return - 1 ; if ( kex_string_pair ( & s , data , data_len , & comp_sc_len , & comp_sc ) ) return - 1 ; session -> burn_optimistic_kexinit = * ( s ++ ) ; if ( data_len < ( unsigned ) ( s - data ) ) return - 1 ; if ( kex_agree_kex_hostkey ( session , kex , kex_len , hostkey , hostkey_len ) ) { return - 1 ; } if ( kex_agree_crypt ( session , & session -> local , crypt_cs , crypt_cs_len ) || kex_agree_crypt ( session , & session -> remote , crypt_sc , crypt_sc_len ) ) { return - 1 ; } if ( kex_agree_mac ( session , & session -> local , mac_cs , mac_cs_len ) || kex_agree_mac ( session , & session -> remote , mac_sc , mac_sc_len ) ) { return - 1 ; } if ( kex_agree_comp ( session , & session -> local , comp_cs , comp_cs_len ) || kex_agree_comp ( session , & session -> remote , comp_sc , comp_sc_len ) ) { return - 1 ; } # if 0 if ( libssh2_kex_agree_lang ( session , & session -> local , lang_cs , lang_cs_len ) || libssh2_kex_agree_lang ( session , & session -> remote , lang_sc , lang_sc_len ) ) { return - 1 ; } # endif _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Agreed on KEX method: %s" , session -> kex -> name ) ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Agreed on HOSTKEY method: %s" , session -> hostkey -> name ) ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Agreed on CRYPT_CS method: %s" , session -> local . crypt -> name ) ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Agreed on CRYPT_SC method: %s" , session -> remote . crypt -> name ) ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Agreed on MAC_CS method: %s" , session -> local . mac -> name ) ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Agreed on MAC_SC method: %s" , session -> remote . mac -> name ) ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Agreed on COMP_CS method: %s" , session -> local . comp -> name ) ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Agreed on COMP_SC method: %s" , session -> remote . comp -> name ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void s390_virtio_register ( void ) { s390_virtio_bus_register_withprop ( & s390_virtio_console ) ; s390_virtio_bus_register_withprop ( & s390_virtio_blk ) ; s390_virtio_bus_register_withprop ( & s390_virtio_net ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExtensionWelcomeNotificationTest , WelcomeNotificationPreviouslyDismissedLocal ) { StartPreferenceSyncing ( ) ; SetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal , true ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissed ) ) ; EXPECT_TRUE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationPreviouslyPoppedUp ) ) ; ShowChromeNowNotification ( ) ; EXPECT_EQ ( message_center ( ) -> add_notification_calls ( ) , 0 ) ; EXPECT_EQ ( message_center ( ) -> remove_notification_calls ( ) , 0 ) ; EXPECT_EQ ( message_center ( ) -> notifications_with_shown_as_popup ( ) , 0 ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissed ) ) ; EXPECT_TRUE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationPreviouslyPoppedUp ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( MultiBufferTest , ReadAllAdvanceFirst_NeverDefer2 ) { multibuffer_ . SetMaxWriters ( 1 ) ; size_t pos = 0 ; size_t end = 10000 ; multibuffer_ . SetFileSize ( 10000 ) ; multibuffer_ . SetMustReadWholeFile ( true ) ; multibuffer_ . SetMaxBlocksAfterDefer ( - 10000 ) ; media : : MultiBufferReader reader ( & multibuffer_ , pos , end , base : : Callback < void ( int64_t , int64_t ) > ( ) ) ; reader . SetMaxBuffer ( 2000 , 5000 ) ; reader . SetPreload ( 1000 , 1000 ) ; while ( pos < end ) { unsigned char buffer [ 27 ] ; buffer [ 17 ] = 17 ; size_t to_read = std : : min < size_t > ( end - pos , 17 ) ; while ( AdvanceAll ( ) ) ; int64_t bytes = reader . TryRead ( buffer , to_read ) ; EXPECT_GT ( bytes , 0 ) ; EXPECT_EQ ( buffer [ 17 ] , 17 ) ; for ( int64_t i = 0 ; i < bytes ; i ++ ) { uint8_t expected = static_cast < uint8_t > ( ( pos * 15485863 ) >> 16 ) ; EXPECT_EQ ( expected , buffer [ i ] ) << " pos = " << pos ; pos ++ ; } } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_Application ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { # line 502 "../../asn1/h245/h245.cnf" gint32 value ; offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h245_Application , Application_choice , & value ) ; codec_type = val_to_str ( value , h245_Application_vals , "<unknown>" ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void unistim_calls_init_tap ( void ) { GString * error_string ; if ( have_unistim_tap_listener == FALSE ) { error_string = register_tap_listener ( "unistim" , & ( the_tapinfo_struct . unistim_dummy ) , NULL , 0 , voip_calls_dlg_reset , unistim_calls_packet , voip_calls_dlg_draw ) ; if ( error_string != NULL ) { simple_dialog ( ESD_TYPE_ERROR , ESD_BTN_OK , "%s" , error_string -> str ) ; g_string_free ( error_string , TRUE ) ; exit ( 1 ) ; } have_unistim_tap_listener = TRUE ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void chomp6 ( ChannelData * chd , int16_t * output , uint8_t val , int tab_idx ) { int16_t current = read_table ( chd , val , tab_idx ) ; if ( ( chd -> previous ^ current ) >= 0 ) { chd -> factor = FFMIN ( chd -> factor + 506 , 32767 ) ; } else { if ( chd -> factor - 314 < - 32768 ) chd -> factor = - 32767 ; else chd -> factor -= 314 ; } current = mace_broken_clip_int16 ( current + chd -> level ) ; chd -> level = ( current * chd -> factor ) >> 15 ; current >>= 1 ; output [ 0 ] = QT_8S_2_16S ( chd -> previous + chd -> prev2 - ( ( chd -> prev2 - current ) >> 2 ) ) ; output [ 1 ] = QT_8S_2_16S ( chd -> previous + current + ( ( chd -> prev2 - current ) >> 2 ) ) ; chd -> prev2 = chd -> previous ; chd -> previous = current ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
proto_item * parseSByte ( proto_tree * tree , tvbuff_t * tvb , packet_info * pinfo _U_ , gint * pOffset , int hfIndex ) { proto_item * item = proto_tree_add_item ( tree , hfIndex , tvb , * pOffset , 1 , ENC_LITTLE_ENDIAN ) ; * pOffset += 1 ; return item ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_pcp_message ( tvbuff_t * tvb , packet_info * pinfo , proto_tree * tree , void * data _U_ ) { proto_item * root_pcp_item ; proto_tree * pcp_tree ; conversation_t * conversation ; pcp_conv_info_t * pcp_conv_info ; guint32 packet_type ; gint32 err_bytes ; int offset = 0 ; col_set_str ( pinfo -> cinfo , COL_PROTOCOL , "PCP" ) ; col_clear ( pinfo -> cinfo , COL_INFO ) ; conversation = find_or_create_conversation ( pinfo ) ; pcp_conv_info = ( pcp_conv_info_t * ) conversation_get_proto_data ( conversation , proto_pcp ) ; if ( pcp_conv_info == NULL ) { pcp_conv_info = ( pcp_conv_info_t * ) wmem_alloc ( wmem_file_scope ( ) , sizeof ( pcp_conv_info_t ) ) ; conversation_add_proto_data ( conversation , proto_pcp , pcp_conv_info ) ; pcp_conv_info -> pmid_name_candidates = wmem_array_new ( wmem_file_scope ( ) , sizeof ( guint8 * ) ) ; pcp_conv_info -> pmid_to_name = wmem_map_new ( wmem_file_scope ( ) , g_direct_hash , g_direct_equal ) ; pcp_conv_info -> last_pmns_names_frame = 0 ; pcp_conv_info -> last_processed_pmns_names_frame = 0 ; } root_pcp_item = proto_tree_add_item ( tree , proto_pcp , tvb , 0 , - 1 , ENC_NA ) ; pcp_tree = proto_item_add_subtree ( root_pcp_item , ett_pcp ) ; packet_type = tvb_get_ntohl ( tvb , 4 ) ; if ( pinfo -> srcport == PCP_PORT || pinfo -> srcport == PMPROXY_PORT ) { col_set_str ( pinfo -> cinfo , COL_INFO , "Server > Client " ) ; } else { col_set_str ( pinfo -> cinfo , COL_INFO , "Client > Server " ) ; } proto_tree_add_item ( pcp_tree , hf_pcp_pdu_length , tvb , offset , 4 , ENC_BIG_ENDIAN ) ; offset += 4 ; proto_tree_add_item ( pcp_tree , hf_pcp_pdu_type , tvb , offset , 4 , ENC_BIG_ENDIAN ) ; offset += 4 ; proto_tree_add_item ( pcp_tree , hf_pcp_pdu_pid , tvb , offset , 4 , ENC_BIG_ENDIAN ) ; offset += 4 ; switch ( packet_type ) { case PCP_PDU_CREDS : dissect_pcp_message_creds ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_START_OR_ERROR : err_bytes = tvb_get_ntohl ( tvb , offset ) ; if ( err_bytes < 0 ) { dissect_pcp_message_error ( tvb , pinfo , pcp_tree , offset ) ; } else { dissect_pcp_message_start ( tvb , pinfo , pcp_tree , offset ) ; } break ; case PCP_PDU_PMNS_TRAVERSE : dissect_pcp_message_pmns_traverse ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_PMNS_NAMES : dissect_pcp_message_pmns_names ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_PMNS_CHILD : dissect_pcp_message_pmns_child ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_PMNS_IDS : dissect_pcp_message_pmns_ids ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_PROFILE : dissect_pcp_message_profile ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_FETCH : dissect_pcp_message_fetch ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_RESULT : dissect_pcp_message_result ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_DESC_REQ : dissect_pcp_message_desc_req ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_DESC : dissect_pcp_message_desc ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_INSTANCE_REQ : dissect_pcp_message_instance_req ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_INSTANCE : dissect_pcp_message_instance ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_TEXT_REQ : dissect_pcp_message_text_req ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_TEXT : dissect_pcp_message_text ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_USER_AUTH : dissect_pcp_message_user_auth ( tvb , pinfo , pcp_tree , offset ) ; break ; default : col_append_str ( pinfo -> cinfo , COL_INFO , "[UNIMPLEMENTED TYPE]" ) ; expert_add_info ( pinfo , pcp_tree , & ei_pcp_unimplemented_packet_type ) ; break ; } return tvb_captured_length ( tvb ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
xmlDeregisterNodeFunc xmlThrDefDeregisterNodeDefault ( xmlDeregisterNodeFunc func ) { xmlDeregisterNodeFunc old ; xmlMutexLock ( xmlThrDefMutex ) ; old = xmlDeregisterNodeDefaultValueThrDef ; __xmlRegisterCallbacks = 1 ; xmlDeregisterNodeDefaultValueThrDef = func ; xmlMutexUnlock ( xmlThrDefMutex ) ; return ( old ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static hb_bool_t hb_font_get_glyph_nil ( hb_font_t * font , void * font_data HB_UNUSED , hb_codepoint_t unicode , hb_codepoint_t variation_selector , hb_codepoint_t * glyph , void * user_data HB_UNUSED ) { if ( font -> parent ) return font -> parent -> get_glyph ( unicode , variation_selector , glyph ) ; * glyph = 0 ; return false ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void Type_ProfileSequenceDesc_Free ( struct _cms_typehandler_struct * self , void * Ptr ) { cmsFreeProfileSequenceDescription ( ( cmsSEQ * ) Ptr ) ; return ; cmsUNUSED_PARAMETER ( self ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int test_make_inputs ( xd3_stream * stream , xoff_t * ss_out , xoff_t * ts_out ) { usize_t ts = ( mt_random ( & static_mtrand ) % TEST_FILE_MEAN ) + TEST_FILE_MEAN / 2 ; usize_t ss = ( mt_random ( & static_mtrand ) % TEST_FILE_MEAN ) + TEST_FILE_MEAN / 2 ; uint8_t * buf = ( uint8_t * ) malloc ( ts + ss ) , * sbuf = buf , * tbuf = buf + ss ; usize_t sadd = 0 , sadd_max = ( usize_t ) ( ss * TEST_ADD_RATIO ) ; FILE * tf = NULL , * sf = NULL ; usize_t i , j ; int ret ; if ( buf == NULL ) { return ENOMEM ; } if ( ( tf = fopen ( TEST_TARGET_FILE , "w" ) ) == NULL || ( ss_out != NULL && ( sf = fopen ( TEST_SOURCE_FILE , "w" ) ) == NULL ) ) { stream -> msg = "write failed" ; ret = get_errno ( ) ; goto failure ; } if ( ss_out != NULL ) { for ( i = 0 ; i < ss ; ) { sbuf [ i ++ ] = ( uint8_t ) mt_random ( & static_mtrand ) ; } } for ( i = 0 ; i < ts ; ) { usize_t left = ts - i ; usize_t next = mt_exp_rand ( ( uint32_t ) TEST_ADD_MEAN , ( uint32_t ) TEST_ADD_MAX ) ; usize_t add_left = sadd_max - sadd ; double add_prob = ( left == 0 ) ? 0 : ( add_left / ( double ) left ) ; int do_copy ; next = min ( left , next ) ; do_copy = ( next > add_left || ( mt_random ( & static_mtrand ) / ( double ) USIZE_T_MAX ) >= add_prob ) ; if ( ss_out == NULL ) { do_copy &= ( i > 0 ) ; } else { do_copy &= ( ss - next ) > 0 ; } if ( do_copy ) { size_t offset = mt_random ( & static_mtrand ) % ( ( ss_out == NULL ) ? i : ( ss - next ) ) ; for ( j = 0 ; j < next ; j += 1 ) { char c = ( ( ss_out == NULL ) ? tbuf : sbuf ) [ offset + j ] ; tbuf [ i ++ ] = c ; } } else { for ( j = 0 ; j < next ; j += 1 ) { char c = ( char ) mt_random ( & static_mtrand ) ; tbuf [ i ++ ] = c ; } sadd += next ; } } if ( ( fwrite ( tbuf , 1 , ts , tf ) != ts ) || ( ss_out != NULL && ( fwrite ( sbuf , 1 , ss , sf ) != ss ) ) ) { stream -> msg = "write failed" ; ret = get_errno ( ) ; goto failure ; } if ( ( ret = fclose ( tf ) ) || ( ss_out != NULL && ( ret = fclose ( sf ) ) ) ) { stream -> msg = "close failed" ; ret = get_errno ( ) ; goto failure ; } if ( ts_out ) { ( * ts_out ) = ts ; } if ( ss_out ) { ( * ss_out ) = ss ; } failure : free ( buf ) ; return ret ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
int mem_get_bits_rectangle ( gx_device * dev , const gs_int_rect * prect , gs_get_bits_params_t * params , gs_int_rect * * unread ) { gx_device_memory * const mdev = ( gx_device_memory * ) dev ; gs_get_bits_options_t options = params -> options ; int x = prect -> p . x , w = prect -> q . x - x , y = prect -> p . y , h = prect -> q . y - y ; if ( options == 0 ) { params -> options = ( GB_ALIGN_STANDARD | GB_ALIGN_ANY ) | ( GB_RETURN_COPY | GB_RETURN_POINTER ) | ( GB_OFFSET_0 | GB_OFFSET_SPECIFIED | GB_OFFSET_ANY ) | ( GB_RASTER_STANDARD | GB_RASTER_SPECIFIED | GB_RASTER_ANY ) | GB_PACKING_CHUNKY | GB_COLORS_NATIVE | GB_ALPHA_NONE ; return_error ( gs_error_rangecheck ) ; } if ( ( w <= 0 ) | ( h <= 0 ) ) { if ( ( w | h ) < 0 ) return_error ( gs_error_rangecheck ) ; return 0 ; } if ( x < 0 || w > dev -> width - x || y < 0 || h > dev -> height - y ) return_error ( gs_error_rangecheck ) ; { gs_get_bits_params_t copy_params ; byte * * base = & scan_line_base ( mdev , y ) ; int code ; copy_params . options = GB_COLORS_NATIVE | GB_PACKING_CHUNKY | GB_ALPHA_NONE | ( mdev -> raster == bitmap_raster ( mdev -> width * mdev -> color_info . depth ) ? GB_RASTER_STANDARD : GB_RASTER_SPECIFIED ) ; copy_params . raster = mdev -> raster ; code = gx_get_bits_return_pointer ( dev , x , h , params , & copy_params , base ) ; if ( code >= 0 ) return code ; return gx_get_bits_copy ( dev , x , w , h , params , & copy_params , * base , gx_device_raster ( dev , true ) ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void generate ( ELG_secret_key * sk , unsigned int nbits , MPI * * ret_factors ) { MPI p ; MPI p_min1 ; MPI g ; MPI x ; MPI y ; MPI temp ; unsigned int qbits ; unsigned int xbits ; byte * rndbuf ; p_min1 = mpi_alloc ( mpi_nlimb_hint_from_nbits ( nbits ) ) ; temp = mpi_alloc ( mpi_nlimb_hint_from_nbits ( nbits ) ) ; qbits = wiener_map ( nbits ) ; if ( qbits & 1 ) qbits ++ ; g = mpi_alloc ( 1 ) ; p = generate_elg_prime ( 0 , nbits , qbits , g , ret_factors ) ; mpi_sub_ui ( p_min1 , p , 1 ) ; xbits = qbits * 3 / 2 ; if ( xbits >= nbits ) BUG ( ) ; x = mpi_alloc_secure ( mpi_nlimb_hint_from_nbits ( xbits ) ) ; if ( DBG_CIPHER ) log_debug ( "choosing a random x of size %u" , xbits ) ; rndbuf = NULL ; do { if ( DBG_CIPHER ) progress ( '.' ) ; if ( rndbuf ) { if ( xbits < 16 ) { xfree ( rndbuf ) ; rndbuf = get_random_bits ( xbits , 2 , 1 ) ; } else { char * r = get_random_bits ( 16 , 2 , 1 ) ; memcpy ( rndbuf , r , 16 / 8 ) ; xfree ( r ) ; } } else rndbuf = get_random_bits ( xbits , 2 , 1 ) ; mpi_set_buffer ( x , rndbuf , ( xbits + 7 ) / 8 , 0 ) ; mpi_clear_highbit ( x , xbits + 1 ) ; } while ( ! ( mpi_cmp_ui ( x , 0 ) > 0 && mpi_cmp ( x , p_min1 ) < 0 ) ) ; xfree ( rndbuf ) ; y = mpi_alloc ( mpi_nlimb_hint_from_nbits ( nbits ) ) ; mpi_powm ( y , g , x , p ) ; if ( DBG_CIPHER ) { progress ( '\n' ) ; log_mpidump ( "elg p= " , p ) ; log_mpidump ( "elg g= " , g ) ; log_mpidump ( "elg y= " , y ) ; log_mpidump ( "elg x= " , x ) ; } sk -> p = p ; sk -> g = g ; sk -> y = y ; sk -> x = x ; test_keys ( sk , nbits - 64 ) ; mpi_free ( p_min1 ) ; mpi_free ( temp ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int load_kernel ( const char * filename , uint8_t * addr , uint8_t * real_addr ) { int fd , size ; int setup_sects ; fd = open ( filename , O_RDONLY ) ; if ( fd < 0 ) return - 1 ; if ( read ( fd , real_addr , 512 ) != 512 ) goto fail ; setup_sects = real_addr [ 0x1F1 ] ; if ( ! setup_sects ) setup_sects = 4 ; if ( read ( fd , real_addr + 512 , setup_sects * 512 ) != setup_sects * 512 ) goto fail ; size = read ( fd , addr , 16 * 1024 * 1024 ) ; if ( size < 0 ) goto fail ; close ( fd ) ; return size ; fail : close ( fd ) ; return - 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void compute_precache_linear ( uint8_t * output ) { uint32_t v = 0 ; for ( v = 0 ; v < PRECACHE_OUTPUT_SIZE ; v ++ ) { output [ v ] = v / ( PRECACHE_OUTPUT_SIZE / 256 ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void xhci_stall_ep ( XHCITransfer * xfer ) { XHCIEPContext * epctx = xfer -> epctx ; XHCIState * xhci = epctx -> xhci ; uint32_t err ; XHCIStreamContext * sctx ; if ( epctx -> nr_pstreams ) { sctx = xhci_find_stream ( epctx , xfer -> streamid , & err ) ; if ( sctx == NULL ) { return ; } sctx -> ring . dequeue = xfer -> trbs [ 0 ] . addr ; sctx -> ring . ccs = xfer -> trbs [ 0 ] . ccs ; xhci_set_ep_state ( xhci , epctx , sctx , EP_HALTED ) ; } else { epctx -> ring . dequeue = xfer -> trbs [ 0 ] . addr ; epctx -> ring . ccs = xfer -> trbs [ 0 ] . ccs ; xhci_set_ep_state ( xhci , epctx , NULL , EP_HALTED ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_NOTIFY_INFO_DATA_job ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , proto_item * item , dcerpc_info * di , guint8 * drep , guint16 field ) { guint32 value1 ; proto_item * hidden_item ; switch ( field ) { case JOB_NOTIFY_PRINTER_NAME : case JOB_NOTIFY_MACHINE_NAME : case JOB_NOTIFY_PORT_NAME : case JOB_NOTIFY_USER_NAME : case JOB_NOTIFY_NOTIFY_NAME : case JOB_NOTIFY_DATATYPE : case JOB_NOTIFY_PRINT_PROCESSOR : case JOB_NOTIFY_PARAMETERS : case JOB_NOTIFY_DRIVER_NAME : case JOB_NOTIFY_STATUS_STRING : case JOB_NOTIFY_DOCUMENT : offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_notify_info_data_bufsize , & value1 ) ; offset = dissect_ndr_pointer_cb ( tvb , offset , pinfo , tree , di , drep , dissect_notify_info_data_buffer , NDR_POINTER_UNIQUE , "String" , hf_notify_info_data_buffer , cb_notify_str_postprocess , GINT_TO_POINTER ( job_notify_hf_index ( field ) ) ) ; break ; case JOB_NOTIFY_STATUS : offset = dissect_job_status ( tvb , offset , pinfo , tree , di , drep ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , NULL , di , drep , hf_notify_info_data_value2 , NULL ) ; break ; case JOB_NOTIFY_SUBMITTED : offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_notify_info_data_buffer_len , NULL ) ; offset = dissect_ndr_pointer_cb ( tvb , offset , pinfo , tree , di , drep , dissect_SYSTEM_TIME_ptr , NDR_POINTER_UNIQUE , "Time submitted" , - 1 , notify_job_time_cb , NULL ) ; break ; case JOB_NOTIFY_PRIORITY : case JOB_NOTIFY_POSITION : case JOB_NOTIFY_TOTAL_PAGES : case JOB_NOTIFY_PAGES_PRINTED : case JOB_NOTIFY_TOTAL_BYTES : case JOB_NOTIFY_BYTES_PRINTED : { guint32 value ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_notify_info_data_value1 , & value ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_notify_info_data_value2 , NULL ) ; proto_item_append_text ( item , ": %d" , value ) ; hidden_item = proto_tree_add_uint ( tree , job_notify_hf_index ( field ) , tvb , offset , 4 , value ) ; PROTO_ITEM_SET_HIDDEN ( hidden_item ) ; break ; } case JOB_NOTIFY_DEVMODE : offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_notify_info_data_bufsize , & value1 ) ; offset = dissect_ndr_pointer ( tvb , offset , pinfo , tree , di , drep , dissect_notify_info_data_buffer , NDR_POINTER_UNIQUE , "Buffer" , hf_notify_info_data_buffer ) ; break ; default : offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_notify_info_data_value1 , NULL ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_notify_info_data_value2 , NULL ) ; } return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void SSL_set_default_read_buffer_len ( SSL * s , size_t len ) { SSL3_BUFFER_set_default_len ( RECORD_LAYER_get_rbuf ( & s -> rlayer ) , len ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static __inline__ __u32 ethtool_cmd_speed ( const struct ethtool_cmd * ep ) { return ( ep -> speed_hi << 16 ) | ep -> speed ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_UseSpecifiedTransport ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h225_UseSpecifiedTransport , UseSpecifiedTransport_choice , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
gboolean proto_registrar_is_protocol ( const int n ) { header_field_info * hfinfo ; PROTO_REGISTRAR_GET_NTH ( n , hfinfo ) ; return ( ( ( hfinfo -> id != hf_text_only ) && ( hfinfo -> parent == - 1 ) ) ? TRUE : FALSE ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void h225_cleanup_routine ( void ) { int i ; for ( i = 0 ; i < 7 ; i ++ ) { g_hash_table_destroy ( ras_calls [ i ] ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int word_match ( const byte * uid , size_t uidlen , const byte * pattern ) { size_t wlen , n ; const byte * p ; const byte * s ; for ( s = pattern ; * s ; ) { do { while ( uidlen && ! word_match_chars [ * uid ] ) uid ++ , uidlen -- ; n = uidlen ; p = uid ; while ( n && word_match_chars [ * p ] ) p ++ , n -- ; wlen = p - uid ; for ( n = 0 , p = uid ; n < wlen && s [ n ] != ' ' && s [ n ] ; n ++ , p ++ ) { if ( word_match_chars [ * p ] != s [ n ] ) break ; } if ( n == wlen && ( s [ n ] == ' ' || ! s [ n ] ) ) break ; uid += wlen ; uidlen -= wlen ; } while ( uidlen ) ; if ( ! uidlen ) return - 1 ; for ( ; * s != ' ' && * s ; s ++ ) ; if ( * s ) s ++ ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void ohci_port_set_status ( OHCIState * ohci , int portnum , uint32_t val ) { uint32_t old_state ; OHCIPort * port ; port = & ohci -> rhport [ portnum ] ; old_state = port -> ctrl ; if ( val & OHCI_PORT_WTC ) port -> ctrl &= ~ ( val & OHCI_PORT_WTC ) ; if ( val & OHCI_PORT_CCS ) port -> ctrl &= ~ OHCI_PORT_PES ; ohci_port_set_if_connected ( ohci , portnum , val & OHCI_PORT_PES ) ; if ( ohci_port_set_if_connected ( ohci , portnum , val & OHCI_PORT_PSS ) ) { trace_usb_ohci_port_suspend ( portnum ) ; } if ( ohci_port_set_if_connected ( ohci , portnum , val & OHCI_PORT_PRS ) ) { trace_usb_ohci_port_reset ( portnum ) ; usb_device_reset ( port -> port . dev ) ; port -> ctrl &= ~ OHCI_PORT_PRS ; port -> ctrl |= OHCI_PORT_PES | OHCI_PORT_PRSC ; } if ( val & OHCI_PORT_LSDA ) ohci_port_power ( ohci , portnum , 0 ) ; if ( val & OHCI_PORT_PPS ) ohci_port_power ( ohci , portnum , 1 ) ; if ( old_state != port -> ctrl ) ohci_set_interrupt ( ohci , OHCI_INTR_RHSC ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void idct16 ( const int16_t * input , int16_t * output ) { int16_t step1 [ 16 ] , step2 [ 16 ] ; int temp1 , temp2 ; step1 [ 0 ] = input [ 0 / 2 ] ; step1 [ 1 ] = input [ 16 / 2 ] ; step1 [ 2 ] = input [ 8 / 2 ] ; step1 [ 3 ] = input [ 24 / 2 ] ; step1 [ 4 ] = input [ 4 / 2 ] ; step1 [ 5 ] = input [ 20 / 2 ] ; step1 [ 6 ] = input [ 12 / 2 ] ; step1 [ 7 ] = input [ 28 / 2 ] ; step1 [ 8 ] = input [ 2 / 2 ] ; step1 [ 9 ] = input [ 18 / 2 ] ; step1 [ 10 ] = input [ 10 / 2 ] ; step1 [ 11 ] = input [ 26 / 2 ] ; step1 [ 12 ] = input [ 6 / 2 ] ; step1 [ 13 ] = input [ 22 / 2 ] ; step1 [ 14 ] = input [ 14 / 2 ] ; step1 [ 15 ] = input [ 30 / 2 ] ; step2 [ 0 ] = step1 [ 0 ] ; step2 [ 1 ] = step1 [ 1 ] ; step2 [ 2 ] = step1 [ 2 ] ; step2 [ 3 ] = step1 [ 3 ] ; step2 [ 4 ] = step1 [ 4 ] ; step2 [ 5 ] = step1 [ 5 ] ; step2 [ 6 ] = step1 [ 6 ] ; step2 [ 7 ] = step1 [ 7 ] ; temp1 = step1 [ 8 ] * cospi_30_64 - step1 [ 15 ] * cospi_2_64 ; temp2 = step1 [ 8 ] * cospi_2_64 + step1 [ 15 ] * cospi_30_64 ; step2 [ 8 ] = dct_const_round_shift ( temp1 ) ; step2 [ 15 ] = dct_const_round_shift ( temp2 ) ; temp1 = step1 [ 9 ] * cospi_14_64 - step1 [ 14 ] * cospi_18_64 ; temp2 = step1 [ 9 ] * cospi_18_64 + step1 [ 14 ] * cospi_14_64 ; step2 [ 9 ] = dct_const_round_shift ( temp1 ) ; step2 [ 14 ] = dct_const_round_shift ( temp2 ) ; temp1 = step1 [ 10 ] * cospi_22_64 - step1 [ 13 ] * cospi_10_64 ; temp2 = step1 [ 10 ] * cospi_10_64 + step1 [ 13 ] * cospi_22_64 ; step2 [ 10 ] = dct_const_round_shift ( temp1 ) ; step2 [ 13 ] = dct_const_round_shift ( temp2 ) ; temp1 = step1 [ 11 ] * cospi_6_64 - step1 [ 12 ] * cospi_26_64 ; temp2 = step1 [ 11 ] * cospi_26_64 + step1 [ 12 ] * cospi_6_64 ; step2 [ 11 ] = dct_const_round_shift ( temp1 ) ; step2 [ 12 ] = dct_const_round_shift ( temp2 ) ; step1 [ 0 ] = step2 [ 0 ] ; step1 [ 1 ] = step2 [ 1 ] ; step1 [ 2 ] = step2 [ 2 ] ; step1 [ 3 ] = step2 [ 3 ] ; temp1 = step2 [ 4 ] * cospi_28_64 - step2 [ 7 ] * cospi_4_64 ; temp2 = step2 [ 4 ] * cospi_4_64 + step2 [ 7 ] * cospi_28_64 ; step1 [ 4 ] = dct_const_round_shift ( temp1 ) ; step1 [ 7 ] = dct_const_round_shift ( temp2 ) ; temp1 = step2 [ 5 ] * cospi_12_64 - step2 [ 6 ] * cospi_20_64 ; temp2 = step2 [ 5 ] * cospi_20_64 + step2 [ 6 ] * cospi_12_64 ; step1 [ 5 ] = dct_const_round_shift ( temp1 ) ; step1 [ 6 ] = dct_const_round_shift ( temp2 ) ; step1 [ 8 ] = step2 [ 8 ] + step2 [ 9 ] ; step1 [ 9 ] = step2 [ 8 ] - step2 [ 9 ] ; step1 [ 10 ] = - step2 [ 10 ] + step2 [ 11 ] ; step1 [ 11 ] = step2 [ 10 ] + step2 [ 11 ] ; step1 [ 12 ] = step2 [ 12 ] + step2 [ 13 ] ; step1 [ 13 ] = step2 [ 12 ] - step2 [ 13 ] ; step1 [ 14 ] = - step2 [ 14 ] + step2 [ 15 ] ; step1 [ 15 ] = step2 [ 14 ] + step2 [ 15 ] ; temp1 = ( step1 [ 0 ] + step1 [ 1 ] ) * cospi_16_64 ; temp2 = ( step1 [ 0 ] - step1 [ 1 ] ) * cospi_16_64 ; step2 [ 0 ] = dct_const_round_shift ( temp1 ) ; step2 [ 1 ] = dct_const_round_shift ( temp2 ) ; temp1 = step1 [ 2 ] * cospi_24_64 - step1 [ 3 ] * cospi_8_64 ; temp2 = step1 [ 2 ] * cospi_8_64 + step1 [ 3 ] * cospi_24_64 ; step2 [ 2 ] = dct_const_round_shift ( temp1 ) ; step2 [ 3 ] = dct_const_round_shift ( temp2 ) ; step2 [ 4 ] = step1 [ 4 ] + step1 [ 5 ] ; step2 [ 5 ] = step1 [ 4 ] - step1 [ 5 ] ; step2 [ 6 ] = - step1 [ 6 ] + step1 [ 7 ] ; step2 [ 7 ] = step1 [ 6 ] + step1 [ 7 ] ; step2 [ 8 ] = step1 [ 8 ] ; step2 [ 15 ] = step1 [ 15 ] ; temp1 = - step1 [ 9 ] * cospi_8_64 + step1 [ 14 ] * cospi_24_64 ; temp2 = step1 [ 9 ] * cospi_24_64 + step1 [ 14 ] * cospi_8_64 ; step2 [ 9 ] = dct_const_round_shift ( temp1 ) ; step2 [ 14 ] = dct_const_round_shift ( temp2 ) ; temp1 = - step1 [ 10 ] * cospi_24_64 - step1 [ 13 ] * cospi_8_64 ; temp2 = - step1 [ 10 ] * cospi_8_64 + step1 [ 13 ] * cospi_24_64 ; step2 [ 10 ] = dct_const_round_shift ( temp1 ) ; step2 [ 13 ] = dct_const_round_shift ( temp2 ) ; step2 [ 11 ] = step1 [ 11 ] ; step2 [ 12 ] = step1 [ 12 ] ; step1 [ 0 ] = step2 [ 0 ] + step2 [ 3 ] ; step1 [ 1 ] = step2 [ 1 ] + step2 [ 2 ] ; step1 [ 2 ] = step2 [ 1 ] - step2 [ 2 ] ; step1 [ 3 ] = step2 [ 0 ] - step2 [ 3 ] ; step1 [ 4 ] = step2 [ 4 ] ; temp1 = ( step2 [ 6 ] - step2 [ 5 ] ) * cospi_16_64 ; temp2 = ( step2 [ 5 ] + step2 [ 6 ] ) * cospi_16_64 ; step1 [ 5 ] = dct_const_round_shift ( temp1 ) ; step1 [ 6 ] = dct_const_round_shift ( temp2 ) ; step1 [ 7 ] = step2 [ 7 ] ; step1 [ 8 ] = step2 [ 8 ] + step2 [ 11 ] ; step1 [ 9 ] = step2 [ 9 ] + step2 [ 10 ] ; step1 [ 10 ] = step2 [ 9 ] - step2 [ 10 ] ; step1 [ 11 ] = step2 [ 8 ] - step2 [ 11 ] ; step1 [ 12 ] = - step2 [ 12 ] + step2 [ 15 ] ; step1 [ 13 ] = - step2 [ 13 ] + step2 [ 14 ] ; step1 [ 14 ] = step2 [ 13 ] + step2 [ 14 ] ; step1 [ 15 ] = step2 [ 12 ] + step2 [ 15 ] ; step2 [ 0 ] = step1 [ 0 ] + step1 [ 7 ] ; step2 [ 1 ] = step1 [ 1 ] + step1 [ 6 ] ; step2 [ 2 ] = step1 [ 2 ] + step1 [ 5 ] ; step2 [ 3 ] = step1 [ 3 ] + step1 [ 4 ] ; step2 [ 4 ] = step1 [ 3 ] - step1 [ 4 ] ; step2 [ 5 ] = step1 [ 2 ] - step1 [ 5 ] ; step2 [ 6 ] = step1 [ 1 ] - step1 [ 6 ] ; step2 [ 7 ] = step1 [ 0 ] - step1 [ 7 ] ; step2 [ 8 ] = step1 [ 8 ] ; step2 [ 9 ] = step1 [ 9 ] ; temp1 = ( - step1 [ 10 ] + step1 [ 13 ] ) * cospi_16_64 ; temp2 = ( step1 [ 10 ] + step1 [ 13 ] ) * cospi_16_64 ; step2 [ 10 ] = dct_const_round_shift ( temp1 ) ; step2 [ 13 ] = dct_const_round_shift ( temp2 ) ; temp1 = ( - step1 [ 11 ] + step1 [ 12 ] ) * cospi_16_64 ; temp2 = ( step1 [ 11 ] + step1 [ 12 ] ) * cospi_16_64 ; step2 [ 11 ] = dct_const_round_shift ( temp1 ) ; step2 [ 12 ] = dct_const_round_shift ( temp2 ) ; step2 [ 14 ] = step1 [ 14 ] ; step2 [ 15 ] = step1 [ 15 ] ; output [ 0 ] = step2 [ 0 ] + step2 [ 15 ] ; output [ 1 ] = step2 [ 1 ] + step2 [ 14 ] ; output [ 2 ] = step2 [ 2 ] + step2 [ 13 ] ; output [ 3 ] = step2 [ 3 ] + step2 [ 12 ] ; output [ 4 ] = step2 [ 4 ] + step2 [ 11 ] ; output [ 5 ] = step2 [ 5 ] + step2 [ 10 ] ; output [ 6 ] = step2 [ 6 ] + step2 [ 9 ] ; output [ 7 ] = step2 [ 7 ] + step2 [ 8 ] ; output [ 8 ] = step2 [ 7 ] - step2 [ 8 ] ; output [ 9 ] = step2 [ 6 ] - step2 [ 9 ] ; output [ 10 ] = step2 [ 5 ] - step2 [ 10 ] ; output [ 11 ] = step2 [ 4 ] - step2 [ 11 ] ; output [ 12 ] = step2 [ 3 ] - step2 [ 12 ] ; output [ 13 ] = step2 [ 2 ] - step2 [ 13 ] ; output [ 14 ] = step2 [ 1 ] - step2 [ 14 ] ; output [ 15 ] = step2 [ 0 ] - step2 [ 15 ] ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void decCopyFit ( decNumber * dest , const decNumber * src , decContext * set , Int * residue , uInt * status ) { dest -> bits = src -> bits ; dest -> exponent = src -> exponent ; decSetCoeff ( dest , set , src -> lsu , src -> digits , residue , status ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static hb_script_t hb_ot_new_tag_to_script ( hb_tag_t tag ) { switch ( tag ) { case HB_TAG ( 'b' , 'n' , 'g' , '2' ) : return HB_SCRIPT_BENGALI ; case HB_TAG ( 'd' , 'e' , 'v' , '2' ) : return HB_SCRIPT_DEVANAGARI ; case HB_TAG ( 'g' , 'j' , 'r' , '2' ) : return HB_SCRIPT_GUJARATI ; case HB_TAG ( 'g' , 'u' , 'r' , '2' ) : return HB_SCRIPT_GURMUKHI ; case HB_TAG ( 'k' , 'n' , 'd' , '2' ) : return HB_SCRIPT_KANNADA ; case HB_TAG ( 'm' , 'l' , 'm' , '2' ) : return HB_SCRIPT_MALAYALAM ; case HB_TAG ( 'o' , 'r' , 'y' , '2' ) : return HB_SCRIPT_ORIYA ; case HB_TAG ( 't' , 'm' , 'l' , '2' ) : return HB_SCRIPT_TAMIL ; case HB_TAG ( 't' , 'e' , 'l' , '2' ) : return HB_SCRIPT_TELUGU ; case HB_TAG ( 'm' , 'y' , 'm' , '2' ) : return HB_SCRIPT_MYANMAR ; } return HB_SCRIPT_UNKNOWN ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int com_nopager ( String * buffer __attribute__ ( ( unused ) ) , char * line __attribute__ ( ( unused ) ) ) { strmov ( pager , "stdout" ) ; opt_nopager = 1 ; PAGER = stdout ; tee_fprintf ( stdout , "PAGER set to stdout\n" ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_vm_enough_memory ( struct mm_struct * mm , long pages ) { int rc , cap_sys_admin = 0 ; rc = cred_has_capability ( current_cred ( ) , CAP_SYS_ADMIN , SECURITY_CAP_NOAUDIT , true ) ; if ( rc == 0 ) cap_sys_admin = 1 ; return cap_sys_admin ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static unsigned int dtls1_guess_mtu ( unsigned int curr_mtu ) { unsigned int i ; if ( curr_mtu == 0 ) return g_probable_mtu [ 0 ] ; for ( i = 0 ; i < sizeof ( g_probable_mtu ) / sizeof ( g_probable_mtu [ 0 ] ) ; i ++ ) if ( curr_mtu > g_probable_mtu [ i ] ) return g_probable_mtu [ i ] ; return curr_mtu ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void pdo_dbstmt_free_storage ( pdo_stmt_t * stmt TSRMLS_DC ) { php_pdo_stmt_delref ( stmt TSRMLS_CC ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int ttfcopyfile ( FILE * ttf , FILE * other , int pos , const char * tab_name ) { int ch ; int ret = 1 ; if ( ferror ( ttf ) || ferror ( other ) ) { IError ( "Disk error of some nature. Perhaps no space on device?\nGenerated font will be unusable" ) ; } else if ( pos != ftell ( ttf ) ) { IError ( "File Offset wrong for ttf table (%s), %d expected %d" , tab_name , ftell ( ttf ) , pos ) ; } rewind ( other ) ; while ( ( ch = getc ( other ) ) != EOF ) putc ( ch , ttf ) ; if ( ferror ( other ) ) ret = 0 ; if ( fclose ( other ) ) ret = 0 ; return ( ret ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void qcms_transform_module_clut_only ( struct qcms_modular_transform * transform , float * src , float * dest , size_t length ) { size_t i ; int xy_len = 1 ; int x_len = transform -> grid_size ; int len = x_len * x_len ; float * r_table = transform -> r_clut ; float * g_table = transform -> g_clut ; float * b_table = transform -> b_clut ; for ( i = 0 ; i < length ; i ++ ) { float linear_r = * src ++ ; float linear_g = * src ++ ; float linear_b = * src ++ ; int x = floor ( linear_r * ( transform -> grid_size - 1 ) ) ; int y = floor ( linear_g * ( transform -> grid_size - 1 ) ) ; int z = floor ( linear_b * ( transform -> grid_size - 1 ) ) ; int x_n = ceil ( linear_r * ( transform -> grid_size - 1 ) ) ; int y_n = ceil ( linear_g * ( transform -> grid_size - 1 ) ) ; int z_n = ceil ( linear_b * ( transform -> grid_size - 1 ) ) ; float x_d = linear_r * ( transform -> grid_size - 1 ) - x ; float y_d = linear_g * ( transform -> grid_size - 1 ) - y ; float z_d = linear_b * ( transform -> grid_size - 1 ) - z ; float r_x1 = lerp ( CLU ( r_table , x , y , z ) , CLU ( r_table , x_n , y , z ) , x_d ) ; float r_x2 = lerp ( CLU ( r_table , x , y_n , z ) , CLU ( r_table , x_n , y_n , z ) , x_d ) ; float r_y1 = lerp ( r_x1 , r_x2 , y_d ) ; float r_x3 = lerp ( CLU ( r_table , x , y , z_n ) , CLU ( r_table , x_n , y , z_n ) , x_d ) ; float r_x4 = lerp ( CLU ( r_table , x , y_n , z_n ) , CLU ( r_table , x_n , y_n , z_n ) , x_d ) ; float r_y2 = lerp ( r_x3 , r_x4 , y_d ) ; float clut_r = lerp ( r_y1 , r_y2 , z_d ) ; float g_x1 = lerp ( CLU ( g_table , x , y , z ) , CLU ( g_table , x_n , y , z ) , x_d ) ; float g_x2 = lerp ( CLU ( g_table , x , y_n , z ) , CLU ( g_table , x_n , y_n , z ) , x_d ) ; float g_y1 = lerp ( g_x1 , g_x2 , y_d ) ; float g_x3 = lerp ( CLU ( g_table , x , y , z_n ) , CLU ( g_table , x_n , y , z_n ) , x_d ) ; float g_x4 = lerp ( CLU ( g_table , x , y_n , z_n ) , CLU ( g_table , x_n , y_n , z_n ) , x_d ) ; float g_y2 = lerp ( g_x3 , g_x4 , y_d ) ; float clut_g = lerp ( g_y1 , g_y2 , z_d ) ; float b_x1 = lerp ( CLU ( b_table , x , y , z ) , CLU ( b_table , x_n , y , z ) , x_d ) ; float b_x2 = lerp ( CLU ( b_table , x , y_n , z ) , CLU ( b_table , x_n , y_n , z ) , x_d ) ; float b_y1 = lerp ( b_x1 , b_x2 , y_d ) ; float b_x3 = lerp ( CLU ( b_table , x , y , z_n ) , CLU ( b_table , x_n , y , z_n ) , x_d ) ; float b_x4 = lerp ( CLU ( b_table , x , y_n , z_n ) , CLU ( b_table , x_n , y_n , z_n ) , x_d ) ; float b_y2 = lerp ( b_x3 , b_x4 , y_d ) ; float clut_b = lerp ( b_y1 , b_y2 , z_d ) ; * dest ++ = clamp_float ( clut_r ) ; * dest ++ = clamp_float ( clut_g ) ; * dest ++ = clamp_float ( clut_b ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_T_mediaMode ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h245_T_mediaMode , T_mediaMode_choice , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int read_skip ( VP9_COMMON * cm , const MACROBLOCKD * xd , int segment_id , vp9_reader * r ) { if ( vp9_segfeature_active ( & cm -> seg , segment_id , SEG_LVL_SKIP ) ) { return 1 ; } else { const int ctx = vp9_get_skip_context ( xd ) ; const int skip = vp9_read ( r , cm -> fc . skip_probs [ ctx ] ) ; if ( ! cm -> frame_parallel_decoding_mode ) ++ cm -> counts . skip [ ctx ] [ skip ] ; return skip ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int isoent_cmp_key ( const struct archive_rb_node * n , const void * key ) { const struct isoent * e = ( const struct isoent * ) n ; return ( strcmp ( e -> file -> basename . s , ( const char * ) key ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static PQExpBuffer defaultGetLocalPQExpBuffer ( void ) { static PQExpBuffer id_return = NULL ; if ( id_return ) { resetPQExpBuffer ( id_return ) ; } else { id_return = createPQExpBuffer ( ) ; } return id_return ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int64_t vp9_rd_pick_inter_mode_sb ( VP9_COMP * cpi , MACROBLOCK * x , const TileInfo * const tile , int mi_row , int mi_col , int * returnrate , int64_t * returndistortion , BLOCK_SIZE bsize , PICK_MODE_CONTEXT * ctx , int64_t best_rd_so_far ) { VP9_COMMON * const cm = & cpi -> common ; RD_OPT * const rd_opt = & cpi -> rd ; MACROBLOCKD * const xd = & x -> e_mbd ; MB_MODE_INFO * const mbmi = & xd -> mi [ 0 ] -> mbmi ; const struct segmentation * const seg = & cm -> seg ; struct macroblockd_plane * const pd = xd -> plane ; PREDICTION_MODE this_mode ; MV_REFERENCE_FRAME ref_frame , second_ref_frame ; unsigned char segment_id = mbmi -> segment_id ; int comp_pred , i , k ; int_mv frame_mv [ MB_MODE_COUNT ] [ MAX_REF_FRAMES ] ; struct buf_2d yv12_mb [ 4 ] [ MAX_MB_PLANE ] ; int_mv single_newmv [ MAX_REF_FRAMES ] = { { 0 } } ; INTERP_FILTER single_inter_filter [ MB_MODE_COUNT ] [ MAX_REF_FRAMES ] ; int single_skippable [ MB_MODE_COUNT ] [ MAX_REF_FRAMES ] ; static const int flag_list [ 4 ] = { 0 , VP9_LAST_FLAG , VP9_GOLD_FLAG , VP9_ALT_FLAG } ; int64_t best_rd = best_rd_so_far ; int64_t best_tx_rd [ TX_MODES ] ; int64_t best_tx_diff [ TX_MODES ] ; int64_t best_pred_diff [ REFERENCE_MODES ] ; int64_t best_pred_rd [ REFERENCE_MODES ] ; int64_t best_filter_rd [ SWITCHABLE_FILTER_CONTEXTS ] ; int64_t best_filter_diff [ SWITCHABLE_FILTER_CONTEXTS ] ; MB_MODE_INFO best_mbmode ; int best_mode_skippable = 0 ; int mode_index , best_mode_index = - 1 ; unsigned int ref_costs_single [ MAX_REF_FRAMES ] , ref_costs_comp [ MAX_REF_FRAMES ] ; vp9_prob comp_mode_p ; int64_t best_intra_rd = INT64_MAX ; int64_t best_inter_rd = INT64_MAX ; PREDICTION_MODE best_intra_mode = DC_PRED ; MV_REFERENCE_FRAME best_inter_ref_frame = LAST_FRAME ; int rate_uv_intra [ TX_SIZES ] , rate_uv_tokenonly [ TX_SIZES ] ; int64_t dist_uv [ TX_SIZES ] ; int skip_uv [ TX_SIZES ] ; PREDICTION_MODE mode_uv [ TX_SIZES ] ; int intra_cost_penalty = 20 * vp9_dc_quant ( cm -> base_qindex , cm -> y_dc_delta_q ) ; int best_skip2 = 0 ; int mode_skip_mask = 0 ; int mode_skip_start = cpi -> sf . mode_skip_start + 1 ; const int * const rd_threshes = rd_opt -> threshes [ segment_id ] [ bsize ] ; const int * const rd_thresh_freq_fact = rd_opt -> thresh_freq_fact [ bsize ] ; const int mode_search_skip_flags = cpi -> sf . mode_search_skip_flags ; const int intra_y_mode_mask = cpi -> sf . intra_y_mode_mask [ max_txsize_lookup [ bsize ] ] ; int inter_mode_mask = cpi -> sf . inter_mode_mask [ bsize ] ; vp9_zero ( best_mbmode ) ; x -> skip_encode = cpi -> sf . skip_encode_frame && x -> q_index < QIDX_SKIP_THRESH ; estimate_ref_frame_costs ( cm , xd , segment_id , ref_costs_single , ref_costs_comp , & comp_mode_p ) ; for ( i = 0 ; i < REFERENCE_MODES ; ++ i ) best_pred_rd [ i ] = INT64_MAX ; for ( i = 0 ; i < TX_MODES ; i ++ ) best_tx_rd [ i ] = INT64_MAX ; for ( i = 0 ; i < SWITCHABLE_FILTER_CONTEXTS ; i ++ ) best_filter_rd [ i ] = INT64_MAX ; for ( i = 0 ; i < TX_SIZES ; i ++ ) rate_uv_intra [ i ] = INT_MAX ; for ( i = 0 ; i < MAX_REF_FRAMES ; ++ i ) x -> pred_sse [ i ] = INT_MAX ; for ( i = 0 ; i < MB_MODE_COUNT ; ++ i ) { for ( k = 0 ; k < MAX_REF_FRAMES ; ++ k ) { single_inter_filter [ i ] [ k ] = SWITCHABLE ; single_skippable [ i ] [ k ] = 0 ; } } * returnrate = INT_MAX ; for ( ref_frame = LAST_FRAME ; ref_frame <= ALTREF_FRAME ; ++ ref_frame ) { x -> pred_mv_sad [ ref_frame ] = INT_MAX ; if ( cpi -> ref_frame_flags & flag_list [ ref_frame ] ) { setup_buffer_inter ( cpi , x , tile , ref_frame , bsize , mi_row , mi_col , frame_mv [ NEARESTMV ] , frame_mv [ NEARMV ] , yv12_mb ) ; } frame_mv [ NEWMV ] [ ref_frame ] . as_int = INVALID_MV ; frame_mv [ ZEROMV ] [ ref_frame ] . as_int = 0 ; } for ( ref_frame = LAST_FRAME ; ref_frame <= ALTREF_FRAME ; ++ ref_frame ) { static const int ref_frame_mask_all [ ] = { 0x0 , 0x123291 , 0x25c444 , 0x39b722 } ; static const int ref_frame_mask_fixedmv [ ] = { 0x0 , 0x121281 , 0x24c404 , 0x080102 } ; if ( ! ( cpi -> ref_frame_flags & flag_list [ ref_frame ] ) ) { mode_skip_mask |= ref_frame_mask_all [ ref_frame ] ; } else if ( cpi -> sf . reference_masking ) { for ( i = LAST_FRAME ; i <= ALTREF_FRAME ; ++ i ) { if ( ( x -> pred_mv_sad [ ref_frame ] >> 2 ) > x -> pred_mv_sad [ i ] ) { mode_skip_mask |= ref_frame_mask_fixedmv [ ref_frame ] ; break ; } } } if ( vp9_segfeature_active ( seg , segment_id , SEG_LVL_REF_FRAME ) && vp9_get_segdata ( seg , segment_id , SEG_LVL_REF_FRAME ) != ( int ) ref_frame ) { mode_skip_mask |= ref_frame_mask_all [ ref_frame ] ; } } if ( ! vp9_segfeature_active ( seg , segment_id , SEG_LVL_REF_FRAME ) ) { if ( cpi -> rc . is_src_frame_alt_ref && ( cpi -> oxcf . arnr_max_frames == 0 ) ) { mode_skip_mask = ~ ( ( 1 << THR_NEARESTA ) | ( 1 << THR_NEARA ) | ( 1 << THR_ZEROA ) ) ; if ( frame_mv [ NEARMV ] [ ALTREF_FRAME ] . as_int != 0 ) mode_skip_mask |= ( 1 << THR_NEARA ) ; if ( frame_mv [ NEARESTMV ] [ ALTREF_FRAME ] . as_int != 0 ) mode_skip_mask |= ( 1 << THR_NEARESTA ) ; } } if ( bsize > cpi -> sf . max_intra_bsize ) { const int all_intra_modes = ( 1 << THR_DC ) | ( 1 << THR_TM ) | ( 1 << THR_H_PRED ) | ( 1 << THR_V_PRED ) | ( 1 << THR_D135_PRED ) | ( 1 << THR_D207_PRED ) | ( 1 << THR_D153_PRED ) | ( 1 << THR_D63_PRED ) | ( 1 << THR_D117_PRED ) | ( 1 << THR_D45_PRED ) ; mode_skip_mask |= all_intra_modes ; } for ( mode_index = 0 ; mode_index < MAX_MODES ; ++ mode_index ) { int mode_excluded = 0 ; int64_t this_rd = INT64_MAX ; int disable_skip = 0 ; int compmode_cost = 0 ; int rate2 = 0 , rate_y = 0 , rate_uv = 0 ; int64_t distortion2 = 0 , distortion_y = 0 , distortion_uv = 0 ; int skippable = 0 ; int64_t tx_cache [ TX_MODES ] ; int i ; int this_skip2 = 0 ; int64_t total_sse = INT64_MAX ; int early_term = 0 ; this_mode = vp9_mode_order [ mode_index ] . mode ; ref_frame = vp9_mode_order [ mode_index ] . ref_frame [ 0 ] ; if ( ref_frame != INTRA_FRAME && ! ( inter_mode_mask & ( 1 << this_mode ) ) ) continue ; second_ref_frame = vp9_mode_order [ mode_index ] . ref_frame [ 1 ] ; if ( mode_index == mode_skip_start && best_mode_index >= 0 ) { switch ( vp9_mode_order [ best_mode_index ] . ref_frame [ 0 ] ) { case INTRA_FRAME : break ; case LAST_FRAME : mode_skip_mask |= LAST_FRAME_MODE_MASK ; break ; case GOLDEN_FRAME : mode_skip_mask |= GOLDEN_FRAME_MODE_MASK ; break ; case ALTREF_FRAME : mode_skip_mask |= ALT_REF_MODE_MASK ; break ; case NONE : case MAX_REF_FRAMES : assert ( 0 && "Invalid Reference frame" ) ; break ; } } if ( cpi -> sf . alt_ref_search_fp && cpi -> rc . is_src_frame_alt_ref ) { mode_skip_mask = 0 ; if ( ! ( ref_frame == ALTREF_FRAME && second_ref_frame == NONE ) ) continue ; } if ( mode_skip_mask & ( 1 << mode_index ) ) continue ; if ( rd_less_than_thresh ( best_rd , rd_threshes [ mode_index ] , rd_thresh_freq_fact [ mode_index ] ) ) continue ; if ( cpi -> sf . motion_field_mode_search ) { const int mi_width = MIN ( num_8x8_blocks_wide_lookup [ bsize ] , tile -> mi_col_end - mi_col ) ; const int mi_height = MIN ( num_8x8_blocks_high_lookup [ bsize ] , tile -> mi_row_end - mi_row ) ; const int bsl = mi_width_log2 ( bsize ) ; int cb_partition_search_ctrl = ( ( ( mi_row + mi_col ) >> bsl ) + get_chessboard_index ( cm -> current_video_frame ) ) & 0x1 ; MB_MODE_INFO * ref_mbmi ; int const_motion = 1 ; int skip_ref_frame = ! cb_partition_search_ctrl ; MV_REFERENCE_FRAME rf = NONE ; int_mv ref_mv ; ref_mv . as_int = INVALID_MV ; if ( ( mi_row - 1 ) >= tile -> mi_row_start ) { ref_mv = xd -> mi [ - xd -> mi_stride ] -> mbmi . mv [ 0 ] ; rf = xd -> mi [ - xd -> mi_stride ] -> mbmi . ref_frame [ 0 ] ; for ( i = 0 ; i < mi_width ; ++ i ) { ref_mbmi = & xd -> mi [ - xd -> mi_stride + i ] -> mbmi ; const_motion &= ( ref_mv . as_int == ref_mbmi -> mv [ 0 ] . as_int ) && ( ref_frame == ref_mbmi -> ref_frame [ 0 ] ) ; skip_ref_frame &= ( rf == ref_mbmi -> ref_frame [ 0 ] ) ; } } if ( ( mi_col - 1 ) >= tile -> mi_col_start ) { if ( ref_mv . as_int == INVALID_MV ) ref_mv = xd -> mi [ - 1 ] -> mbmi . mv [ 0 ] ; if ( rf == NONE ) rf = xd -> mi [ - 1 ] -> mbmi . ref_frame [ 0 ] ; for ( i = 0 ; i < mi_height ; ++ i ) { ref_mbmi = & xd -> mi [ i * xd -> mi_stride - 1 ] -> mbmi ; const_motion &= ( ref_mv . as_int == ref_mbmi -> mv [ 0 ] . as_int ) && ( ref_frame == ref_mbmi -> ref_frame [ 0 ] ) ; skip_ref_frame &= ( rf == ref_mbmi -> ref_frame [ 0 ] ) ; } } if ( skip_ref_frame && this_mode != NEARESTMV && this_mode != NEWMV ) if ( rf > INTRA_FRAME ) if ( ref_frame != rf ) continue ; if ( const_motion ) if ( this_mode == NEARMV || this_mode == ZEROMV ) continue ; } comp_pred = second_ref_frame > INTRA_FRAME ; if ( comp_pred ) { if ( ! cm -> allow_comp_inter_inter ) continue ; if ( ( mode_search_skip_flags & FLAG_SKIP_COMP_BESTINTRA ) && best_mode_index >= 0 && vp9_mode_order [ best_mode_index ] . ref_frame [ 0 ] == INTRA_FRAME ) continue ; if ( ( mode_search_skip_flags & FLAG_SKIP_COMP_REFMISMATCH ) && ref_frame != best_inter_ref_frame && second_ref_frame != best_inter_ref_frame ) continue ; mode_excluded = cm -> reference_mode == SINGLE_REFERENCE ; } else { if ( ref_frame != INTRA_FRAME ) mode_excluded = cm -> reference_mode == COMPOUND_REFERENCE ; } if ( ref_frame == INTRA_FRAME ) { if ( cpi -> sf . adaptive_mode_search ) if ( ( x -> source_variance << num_pels_log2_lookup [ bsize ] ) > best_intra_rd ) continue ; if ( ! ( intra_y_mode_mask & ( 1 << this_mode ) ) ) continue ; if ( this_mode != DC_PRED ) { const unsigned int skip_intra_var_thresh = 64 ; if ( ( mode_search_skip_flags & FLAG_SKIP_INTRA_LOWVAR ) && x -> source_variance < skip_intra_var_thresh ) continue ; if ( ( mode_search_skip_flags & FLAG_SKIP_INTRA_BESTINTER ) && ( this_mode >= D45_PRED && this_mode <= TM_PRED ) ) { if ( best_mode_index >= 0 && vp9_mode_order [ best_mode_index ] . ref_frame [ 0 ] > INTRA_FRAME ) continue ; } if ( mode_search_skip_flags & FLAG_SKIP_INTRA_DIRMISMATCH ) { if ( conditional_skipintra ( this_mode , best_intra_mode ) ) continue ; } } } else { const MV_REFERENCE_FRAME ref_frames [ 2 ] = { ref_frame , second_ref_frame } ; if ( ! check_best_zero_mv ( cpi , mbmi -> mode_context , frame_mv , inter_mode_mask , this_mode , ref_frames ) ) continue ; } mbmi -> mode = this_mode ; mbmi -> uv_mode = DC_PRED ; mbmi -> ref_frame [ 0 ] = ref_frame ; mbmi -> ref_frame [ 1 ] = second_ref_frame ; mbmi -> interp_filter = cm -> interp_filter == SWITCHABLE ? EIGHTTAP : cm -> interp_filter ; mbmi -> mv [ 0 ] . as_int = mbmi -> mv [ 1 ] . as_int = 0 ; x -> skip = 0 ; set_ref_ptrs ( cm , xd , ref_frame , second_ref_frame ) ; for ( i = 0 ; i < MAX_MB_PLANE ; i ++ ) { xd -> plane [ i ] . pre [ 0 ] = yv12_mb [ ref_frame ] [ i ] ; if ( comp_pred ) xd -> plane [ i ] . pre [ 1 ] = yv12_mb [ second_ref_frame ] [ i ] ; } for ( i = 0 ; i < TX_MODES ; ++ i ) tx_cache [ i ] = INT64_MAX ; if ( ref_frame == INTRA_FRAME ) { TX_SIZE uv_tx ; super_block_yrd ( cpi , x , & rate_y , & distortion_y , & skippable , NULL , bsize , tx_cache , best_rd ) ; if ( rate_y == INT_MAX ) continue ; uv_tx = get_uv_tx_size_impl ( mbmi -> tx_size , bsize , pd [ 1 ] . subsampling_x , pd [ 1 ] . subsampling_y ) ; if ( rate_uv_intra [ uv_tx ] == INT_MAX ) { choose_intra_uv_mode ( cpi , ctx , bsize , uv_tx , & rate_uv_intra [ uv_tx ] , & rate_uv_tokenonly [ uv_tx ] , & dist_uv [ uv_tx ] , & skip_uv [ uv_tx ] , & mode_uv [ uv_tx ] ) ; } rate_uv = rate_uv_tokenonly [ uv_tx ] ; distortion_uv = dist_uv [ uv_tx ] ; skippable = skippable && skip_uv [ uv_tx ] ; mbmi -> uv_mode = mode_uv [ uv_tx ] ; rate2 = rate_y + cpi -> mbmode_cost [ mbmi -> mode ] + rate_uv_intra [ uv_tx ] ; if ( this_mode != DC_PRED && this_mode != TM_PRED ) rate2 += intra_cost_penalty ; distortion2 = distortion_y + distortion_uv ; } else { this_rd = handle_inter_mode ( cpi , x , bsize , tx_cache , & rate2 , & distortion2 , & skippable , & rate_y , & distortion_y , & rate_uv , & distortion_uv , & disable_skip , frame_mv , mi_row , mi_col , single_newmv , single_inter_filter , single_skippable , & total_sse , best_rd ) ; if ( this_rd == INT64_MAX ) continue ; compmode_cost = vp9_cost_bit ( comp_mode_p , comp_pred ) ; if ( cm -> reference_mode == REFERENCE_MODE_SELECT ) rate2 += compmode_cost ; } if ( comp_pred ) { rate2 += ref_costs_comp [ ref_frame ] ; } else { rate2 += ref_costs_single [ ref_frame ] ; } if ( ! disable_skip ) { if ( skippable ) { vp9_prob skip_prob = vp9_get_skip_prob ( cm , xd ) ; rate2 -= ( rate_y + rate_uv ) ; rate_uv = 0 ; if ( skip_prob ) { int prob_skip_cost = vp9_cost_bit ( skip_prob , 1 ) ; rate2 += prob_skip_cost ; } } else if ( ref_frame != INTRA_FRAME && ! xd -> lossless ) { if ( RDCOST ( x -> rdmult , x -> rddiv , rate_y + rate_uv , distortion2 ) < RDCOST ( x -> rdmult , x -> rddiv , 0 , total_sse ) ) { rate2 += vp9_cost_bit ( vp9_get_skip_prob ( cm , xd ) , 0 ) ; } else { rate2 += vp9_cost_bit ( vp9_get_skip_prob ( cm , xd ) , 1 ) ; distortion2 = total_sse ; assert ( total_sse >= 0 ) ; rate2 -= ( rate_y + rate_uv ) ; rate_y = 0 ; rate_uv = 0 ; this_skip2 = 1 ; } } else { rate2 += vp9_cost_bit ( vp9_get_skip_prob ( cm , xd ) , 0 ) ; } this_rd = RDCOST ( x -> rdmult , x -> rddiv , rate2 , distortion2 ) ; } if ( ref_frame == INTRA_FRAME ) { if ( this_rd < best_intra_rd ) { best_intra_rd = this_rd ; best_intra_mode = mbmi -> mode ; } } else { if ( ! comp_pred && ! mode_excluded && this_rd < best_inter_rd ) { best_inter_rd = this_rd ; best_inter_ref_frame = ref_frame ; } } if ( ! disable_skip && ref_frame == INTRA_FRAME ) { for ( i = 0 ; i < REFERENCE_MODES ; ++ i ) best_pred_rd [ i ] = MIN ( best_pred_rd [ i ] , this_rd ) ; for ( i = 0 ; i < SWITCHABLE_FILTER_CONTEXTS ; i ++ ) best_filter_rd [ i ] = MIN ( best_filter_rd [ i ] , this_rd ) ; } if ( this_rd < best_rd || x -> skip ) { int max_plane = MAX_MB_PLANE ; if ( ! mode_excluded ) { best_mode_index = mode_index ; if ( ref_frame == INTRA_FRAME ) { mbmi -> mv [ 0 ] . as_int = 0 ; max_plane = 1 ; } else { best_intra_rd = x -> pred_sse [ ref_frame ] ; } * returnrate = rate2 ; * returndistortion = distortion2 ; best_rd = this_rd ; best_mbmode = * mbmi ; best_skip2 = this_skip2 ; best_mode_skippable = skippable ; if ( ! x -> select_tx_size ) swap_block_ptr ( x , ctx , 1 , 0 , 0 , max_plane ) ; vpx_memcpy ( ctx -> zcoeff_blk , x -> zcoeff_blk [ mbmi -> tx_size ] , sizeof ( uint8_t ) * ctx -> num_4x4_blk ) ; if ( ( mode_search_skip_flags & FLAG_EARLY_TERMINATE ) && ( mode_index > MIN_EARLY_TERM_INDEX ) ) { const int qstep = xd -> plane [ 0 ] . dequant [ 1 ] ; int scale = 4 ; if ( x -> source_variance < UINT_MAX ) { const int var_adjust = ( x -> source_variance < 16 ) ; scale -= var_adjust ; } if ( ref_frame > INTRA_FRAME && distortion2 * scale < qstep * qstep ) { early_term = 1 ; } } } } if ( ! disable_skip && ref_frame != INTRA_FRAME ) { int64_t single_rd , hybrid_rd , single_rate , hybrid_rate ; if ( cm -> reference_mode == REFERENCE_MODE_SELECT ) { single_rate = rate2 - compmode_cost ; hybrid_rate = rate2 ; } else { single_rate = rate2 ; hybrid_rate = rate2 + compmode_cost ; } single_rd = RDCOST ( x -> rdmult , x -> rddiv , single_rate , distortion2 ) ; hybrid_rd = RDCOST ( x -> rdmult , x -> rddiv , hybrid_rate , distortion2 ) ; if ( ! comp_pred ) { if ( single_rd < best_pred_rd [ SINGLE_REFERENCE ] ) { best_pred_rd [ SINGLE_REFERENCE ] = single_rd ; } } else { if ( single_rd < best_pred_rd [ COMPOUND_REFERENCE ] ) { best_pred_rd [ COMPOUND_REFERENCE ] = single_rd ; } } if ( hybrid_rd < best_pred_rd [ REFERENCE_MODE_SELECT ] ) best_pred_rd [ REFERENCE_MODE_SELECT ] = hybrid_rd ; if ( ! mode_excluded && cm -> interp_filter != BILINEAR ) { int64_t ref = rd_opt -> filter_cache [ cm -> interp_filter == SWITCHABLE ? SWITCHABLE_FILTERS : cm -> interp_filter ] ; for ( i = 0 ; i < SWITCHABLE_FILTER_CONTEXTS ; i ++ ) { int64_t adj_rd ; if ( ref == INT64_MAX ) adj_rd = 0 ; else if ( rd_opt -> filter_cache [ i ] == INT64_MAX ) adj_rd = rd_opt -> mask_filter - ref + 10 ; else adj_rd = rd_opt -> filter_cache [ i ] - ref ; adj_rd += this_rd ; best_filter_rd [ i ] = MIN ( best_filter_rd [ i ] , adj_rd ) ; } } } if ( bsize < BLOCK_32X32 ) { if ( bsize < BLOCK_16X16 ) tx_cache [ ALLOW_16X16 ] = tx_cache [ ALLOW_8X8 ] ; tx_cache [ ALLOW_32X32 ] = tx_cache [ ALLOW_16X16 ] ; } if ( ! mode_excluded && this_rd != INT64_MAX ) { for ( i = 0 ; i < TX_MODES && tx_cache [ i ] < INT64_MAX ; i ++ ) { int64_t adj_rd = INT64_MAX ; adj_rd = this_rd + tx_cache [ i ] - tx_cache [ cm -> tx_mode ] ; if ( adj_rd < best_tx_rd [ i ] ) best_tx_rd [ i ] = adj_rd ; } } if ( early_term ) break ; if ( x -> skip && ! comp_pred ) break ; } if ( best_mbmode . mode == NEWMV ) { const MV_REFERENCE_FRAME refs [ 2 ] = { best_mbmode . ref_frame [ 0 ] , best_mbmode . ref_frame [ 1 ] } ; int comp_pred_mode = refs [ 1 ] > INTRA_FRAME ; if ( frame_mv [ NEARESTMV ] [ refs [ 0 ] ] . as_int == best_mbmode . mv [ 0 ] . as_int && ( ( comp_pred_mode && frame_mv [ NEARESTMV ] [ refs [ 1 ] ] . as_int == best_mbmode . mv [ 1 ] . as_int ) || ! comp_pred_mode ) ) best_mbmode . mode = NEARESTMV ; else if ( frame_mv [ NEARMV ] [ refs [ 0 ] ] . as_int == best_mbmode . mv [ 0 ] . as_int && ( ( comp_pred_mode && frame_mv [ NEARMV ] [ refs [ 1 ] ] . as_int == best_mbmode . mv [ 1 ] . as_int ) || ! comp_pred_mode ) ) best_mbmode . mode = NEARMV ; else if ( best_mbmode . mv [ 0 ] . as_int == 0 && ( ( comp_pred_mode && best_mbmode . mv [ 1 ] . as_int == 0 ) || ! comp_pred_mode ) ) best_mbmode . mode = ZEROMV ; } if ( best_mode_index < 0 || best_rd >= best_rd_so_far ) return INT64_MAX ; if ( cpi -> sf . use_uv_intra_rd_estimate ) { if ( vp9_mode_order [ best_mode_index ] . ref_frame [ 0 ] == INTRA_FRAME ) { TX_SIZE uv_tx_size ; * mbmi = best_mbmode ; uv_tx_size = get_uv_tx_size ( mbmi , & xd -> plane [ 1 ] ) ; rd_pick_intra_sbuv_mode ( cpi , x , ctx , & rate_uv_intra [ uv_tx_size ] , & rate_uv_tokenonly [ uv_tx_size ] , & dist_uv [ uv_tx_size ] , & skip_uv [ uv_tx_size ] , bsize < BLOCK_8X8 ? BLOCK_8X8 : bsize , uv_tx_size ) ; } } assert ( ( cm -> interp_filter == SWITCHABLE ) || ( cm -> interp_filter == best_mbmode . interp_filter ) || ! is_inter_block ( & best_mbmode ) ) ; update_rd_thresh_fact ( cpi , bsize , best_mode_index ) ; * mbmi = best_mbmode ; x -> skip |= best_skip2 ; for ( i = 0 ; i < REFERENCE_MODES ; ++ i ) { if ( best_pred_rd [ i ] == INT64_MAX ) best_pred_diff [ i ] = INT_MIN ; else best_pred_diff [ i ] = best_rd - best_pred_rd [ i ] ; } if ( ! x -> skip ) { for ( i = 0 ; i < SWITCHABLE_FILTER_CONTEXTS ; i ++ ) { if ( best_filter_rd [ i ] == INT64_MAX ) best_filter_diff [ i ] = 0 ; else best_filter_diff [ i ] = best_rd - best_filter_rd [ i ] ; } if ( cm -> interp_filter == SWITCHABLE ) assert ( best_filter_diff [ SWITCHABLE_FILTERS ] == 0 ) ; for ( i = 0 ; i < TX_MODES ; i ++ ) { if ( best_tx_rd [ i ] == INT64_MAX ) best_tx_diff [ i ] = 0 ; else best_tx_diff [ i ] = best_rd - best_tx_rd [ i ] ; } } else { vp9_zero ( best_filter_diff ) ; vp9_zero ( best_tx_diff ) ; } set_ref_ptrs ( cm , xd , mbmi -> ref_frame [ 0 ] , mbmi -> ref_frame [ 1 ] ) ; store_coding_context ( x , ctx , best_mode_index , best_pred_diff , best_tx_diff , best_filter_diff , best_mode_skippable ) ; return best_rd ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_OpenLogicalChannelRejectCause ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h245_OpenLogicalChannelRejectCause , OpenLogicalChannelRejectCause_choice , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void free_xargs ( xargs_t xargs ) { if ( xargs . dn ) free ( xargs . dn ) ; if ( xargs . linkdn ) free ( xargs . linkdn ) ; if ( xargs . containerdn ) free ( xargs . containerdn ) ; if ( xargs . tktpolicydn ) free ( xargs . tktpolicydn ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int main ( int argc , char * argv [ ] ) { const char * globfile [ ] = { "one" , "two" , "three" , NULL } ; char tmpdir [ 32 ] ; struct passwd * pw ; const char * cwd ; int test ; int fail = 0 ; int i ; struct test_case_struct ts ; if ( argc > 1 ) { command_line_test ( argv [ 1 ] ) ; return 0 ; } cwd = getcwd ( NULL , 0 ) ; tmpnam ( tmpdir ) ; if ( mkdir ( tmpdir , S_IRWXU ) || chdir ( tmpdir ) ) return - 1 ; else { int fd ; for ( i = 0 ; globfile [ i ] ; ++ i ) if ( ( fd = creat ( globfile [ i ] , S_IRUSR | S_IWUSR ) ) == - 1 || close ( fd ) ) return - 1 ; } for ( test = 0 ; test_case [ test ] . retval != - 1 ; test ++ ) if ( testit ( & test_case [ test ] ) ) ++ fail ; pw = getpwnam ( "root" ) ; if ( pw != NULL ) { ts . retval = 0 ; ts . env = NULL ; ts . words = "~root " ; ts . flags = 0 ; ts . wordc = 1 ; ts . wordv [ 0 ] = pw -> pw_dir ; ts . ifs = IFS ; if ( testit ( & ts ) ) ++ fail ; ts . retval = 0 ; ts . env = pw -> pw_dir ; ts . words = "${ var#~root} x" ; ts . flags = 0 ; ts . wordc = 1 ; ts . wordv [ 0 ] = "x" ; ts . ifs = IFS ; if ( testit ( & ts ) ) ++ fail ; } setenv ( "HOME" , "/dummy/home" , 1 ) ; ts . retval = 0 ; ts . env = NULL ; ts . words = "~ ~/foo" ; ts . flags = 0 ; ts . wordc = 2 ; ts . wordv [ 0 ] = "/dummy/home" ; ts . wordv [ 1 ] = "/dummy/home/foo" ; ts . ifs = IFS ; if ( testit ( & ts ) ) ++ fail ; pw = getpwuid ( getuid ( ) ) ; if ( pw != NULL ) { unsetenv ( "HOME" ) ; ts . retval = 0 ; ts . env = NULL ; ts . words = "~" ; ts . flags = 0 ; ts . wordc = 1 ; ts . wordv [ 0 ] = pw -> pw_dir ; ts . ifs = IFS ; if ( testit ( & ts ) ) ++ fail ; } puts ( "tests completed, now cleaning up" ) ; for ( i = 0 ; globfile [ i ] ; ++ i ) remove ( globfile [ i ] ) ; if ( cwd == NULL ) cwd = ".." ; chdir ( cwd ) ; rmdir ( tmpdir ) ; printf ( "tests failed: %d\n" , fail ) ; return fail != 0 ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
void vp9_iht4x4_16_add_c ( const tran_low_t * input , uint8_t * dest , int stride , int tx_type ) { const transform_2d IHT_4 [ ] = { { idct4 , idct4 } , { iadst4 , idct4 } , { idct4 , iadst4 } , { iadst4 , iadst4 } } ; int i , j ; tran_low_t out [ 4 * 4 ] ; tran_low_t * outptr = out ; tran_low_t temp_in [ 4 ] , temp_out [ 4 ] ; for ( i = 0 ; i < 4 ; ++ i ) { IHT_4 [ tx_type ] . rows ( input , outptr ) ; input += 4 ; outptr += 4 ; } for ( i = 0 ; i < 4 ; ++ i ) { for ( j = 0 ; j < 4 ; ++ j ) temp_in [ j ] = out [ j * 4 + i ] ; IHT_4 [ tx_type ] . cols ( temp_in , temp_out ) ; for ( j = 0 ; j < 4 ; ++ j ) dest [ j * stride + i ] = clip_pixel ( ROUND_POWER_OF_TWO ( temp_out [ j ] , 4 ) + dest [ j * stride + i ] ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
void hb_blob_destroy ( hb_blob_t * blob ) { if ( ! hb_object_destroy ( blob ) ) return ; _hb_blob_destroy_user_data ( blob ) ; free ( blob ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void xmlHashScan ( xmlHashTablePtr table , xmlHashScanner f , void * data ) { stubData stubdata ; stubdata . data = data ; stubdata . hashscanner = f ; xmlHashScanFull ( table , stubHashScannerFull , & stubdata ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void virtio_net_get_config ( VirtIODevice * vdev , uint8_t * config ) { VirtIONet * n = to_virtio_net ( vdev ) ; struct virtio_net_config netcfg ; stw_p ( & netcfg . status , n -> status ) ; memcpy ( netcfg . mac , n -> mac , ETH_ALEN ) ; memcpy ( config , & netcfg , sizeof ( netcfg ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void handle_lockprop_ctx ( struct xml_ctx * ctx , int tag_closed ) { int * lock_flags = ( int * ) ctx -> userData ; if ( tag_closed ) { if ( ! strcmp ( ctx -> name , DAV_CTX_LOCKENTRY ) ) { if ( ( * lock_flags & DAV_PROP_LOCKEX ) && ( * lock_flags & DAV_PROP_LOCKWR ) ) { * lock_flags |= DAV_LOCK_OK ; } * lock_flags &= DAV_LOCK_OK ; } else if ( ! strcmp ( ctx -> name , DAV_CTX_LOCKTYPE_WRITE ) ) { * lock_flags |= DAV_PROP_LOCKWR ; } else if ( ! strcmp ( ctx -> name , DAV_CTX_LOCKTYPE_EXCLUSIVE ) ) { * lock_flags |= DAV_PROP_LOCKEX ; } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int vp9_full_search_sadx8 ( const MACROBLOCK * x , const MV * ref_mv , int sad_per_bit , int distance , const vp9_variance_fn_ptr_t * fn_ptr , const MV * center_mv , MV * best_mv ) { int r ; const MACROBLOCKD * const xd = & x -> e_mbd ; const struct buf_2d * const what = & x -> plane [ 0 ] . src ; const struct buf_2d * const in_what = & xd -> plane [ 0 ] . pre [ 0 ] ; const int row_min = MAX ( ref_mv -> row - distance , x -> mv_row_min ) ; const int row_max = MIN ( ref_mv -> row + distance , x -> mv_row_max ) ; const int col_min = MAX ( ref_mv -> col - distance , x -> mv_col_min ) ; const int col_max = MIN ( ref_mv -> col + distance , x -> mv_col_max ) ; const MV fcenter_mv = { center_mv -> row >> 3 , center_mv -> col >> 3 } ; unsigned int best_sad = fn_ptr -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , ref_mv ) , in_what -> stride ) + mvsad_err_cost ( x , ref_mv , & fcenter_mv , sad_per_bit ) ; * best_mv = * ref_mv ; for ( r = row_min ; r < row_max ; ++ r ) { int c = col_min ; const uint8_t * check_here = & in_what -> buf [ r * in_what -> stride + c ] ; if ( fn_ptr -> sdx8f != NULL ) { while ( ( c + 7 ) < col_max ) { int i ; unsigned int sads [ 8 ] ; fn_ptr -> sdx8f ( what -> buf , what -> stride , check_here , in_what -> stride , sads ) ; for ( i = 0 ; i < 8 ; ++ i ) { unsigned int sad = sads [ i ] ; if ( sad < best_sad ) { const MV mv = { r , c } ; sad += mvsad_err_cost ( x , & mv , & fcenter_mv , sad_per_bit ) ; if ( sad < best_sad ) { best_sad = sad ; * best_mv = mv ; } } ++ check_here ; ++ c ; } } } if ( fn_ptr -> sdx3f != NULL ) { while ( ( c + 2 ) < col_max ) { int i ; unsigned int sads [ 3 ] ; fn_ptr -> sdx3f ( what -> buf , what -> stride , check_here , in_what -> stride , sads ) ; for ( i = 0 ; i < 3 ; ++ i ) { unsigned int sad = sads [ i ] ; if ( sad < best_sad ) { const MV mv = { r , c } ; sad += mvsad_err_cost ( x , & mv , & fcenter_mv , sad_per_bit ) ; if ( sad < best_sad ) { best_sad = sad ; * best_mv = mv ; } } ++ check_here ; ++ c ; } } } while ( c < col_max ) { unsigned int sad = fn_ptr -> sdf ( what -> buf , what -> stride , check_here , in_what -> stride ) ; if ( sad < best_sad ) { const MV mv = { r , c } ; sad += mvsad_err_cost ( x , & mv , & fcenter_mv , sad_per_bit ) ; if ( sad < best_sad ) { best_sad = sad ; * best_mv = mv ; } } ++ check_here ; ++ c ; } } return best_sad ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void wm_writecb ( struct bufferevent * bev , void * arg ) { if ( EVBUFFER_LENGTH ( bev -> output ) == 0 ) test_ok ++ ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int ipvideo_decode_block_opcode_0x7 ( IpvideoContext * s , AVFrame * frame ) { int x , y ; unsigned char P [ 2 ] ; unsigned int flags ; P [ 0 ] = bytestream2_get_byte ( & s -> stream_ptr ) ; P [ 1 ] = bytestream2_get_byte ( & s -> stream_ptr ) ; if ( P [ 0 ] <= P [ 1 ] ) { for ( y = 0 ; y < 8 ; y ++ ) { flags = bytestream2_get_byte ( & s -> stream_ptr ) | 0x100 ; for ( ; flags != 1 ; flags >>= 1 ) * s -> pixel_ptr ++ = P [ flags & 1 ] ; s -> pixel_ptr += s -> line_inc ; } } else { flags = bytestream2_get_le16 ( & s -> stream_ptr ) ; for ( y = 0 ; y < 8 ; y += 2 ) { for ( x = 0 ; x < 8 ; x += 2 , flags >>= 1 ) { s -> pixel_ptr [ x ] = s -> pixel_ptr [ x + 1 ] = s -> pixel_ptr [ x + s -> stride ] = s -> pixel_ptr [ x + 1 + s -> stride ] = P [ flags & 1 ] ; } s -> pixel_ptr += s -> stride * 2 ; } } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
METHOD ( x509_t , get_constraint , u_int , private_x509_cert_t * this , x509_constraint_t type ) { switch ( type ) { case X509_PATH_LEN : return this -> pathLenConstraint ; case X509_REQUIRE_EXPLICIT_POLICY : return this -> require_explicit ; case X509_INHIBIT_POLICY_MAPPING : return this -> inhibit_mapping ; case X509_INHIBIT_ANY_POLICY : return this -> inhibit_any ; default : return X509_NO_CONSTRAINT ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int qemuMonitorJSONCreateSnapshot ( qemuMonitorPtr mon , const char * name ) { int ret ; virJSONValuePtr cmd ; virJSONValuePtr reply = NULL ; cmd = qemuMonitorJSONMakeCommand ( "savevm" , "s:name" , name , NULL ) ; if ( ! cmd ) return - 1 ; if ( ( ret = qemuMonitorJSONCommand ( mon , cmd , & reply ) ) < 0 ) goto cleanup ; if ( qemuMonitorJSONHasError ( reply , "CommandNotFound" ) && qemuMonitorCheckHMP ( mon , "savevm" ) ) { VIR_DEBUG ( "savevm command not found, trying HMP" ) ; ret = qemuMonitorTextCreateSnapshot ( mon , name ) ; goto cleanup ; } ret = qemuMonitorJSONCheckError ( cmd , reply ) ; cleanup : virJSONValueFree ( cmd ) ; virJSONValueFree ( reply ) ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static timelib_ull timelib_get_unsigned_nr ( char * * ptr , int max_length ) { timelib_ull dir = 1 ; while ( ( ( * * ptr < '0' ) || ( * * ptr > '9' ) ) && ( * * ptr != '+' ) && ( * * ptr != '-' ) ) { if ( * * ptr == '\0' ) { return TIMELIB_UNSET ; } ++ * ptr ; } while ( * * ptr == '+' || * * ptr == '-' ) { if ( * * ptr == '-' ) { dir *= - 1 ; } ++ * ptr ; } return dir * timelib_get_nr ( ptr , max_length ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( FramebustBlockBrowserTest , AllowRadioButtonSelected ) { const GURL url = embedded_test_server ( ) -> GetURL ( "/iframe.html" ) ; ui_test_utils : : NavigateToURL ( browser ( ) , url ) ; auto * helper = GetFramebustTabHelper ( ) ; helper -> AddBlockedUrl ( url , base : : BindOnce ( & FramebustBlockBrowserTest : : OnClick , base : : Unretained ( this ) ) ) ; EXPECT_TRUE ( helper -> HasBlockedUrls ( ) ) ; HostContentSettingsMap * settings_map = HostContentSettingsMapFactory : : GetForProfile ( browser ( ) -> profile ( ) ) ; EXPECT_EQ ( CONTENT_SETTING_BLOCK , settings_map -> GetContentSetting ( url , GURL ( ) , CONTENT_SETTINGS_TYPE_POPUPS , std : : string ( ) ) ) ; { ContentSettingFramebustBlockBubbleModel framebust_block_bubble_model ( browser ( ) -> content_setting_bubble_model_delegate ( ) , GetWebContents ( ) , browser ( ) -> profile ( ) ) ; framebust_block_bubble_model . OnRadioClicked ( kAllowRadioButtonIndex ) ; } EXPECT_EQ ( CONTENT_SETTING_ALLOW , settings_map -> GetContentSetting ( url , GURL ( ) , CONTENT_SETTINGS_TYPE_POPUPS , std : : string ( ) ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_T_h245Route ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence_of ( tvb , offset , actx , tree , hf_index , ett_h225_T_h245Route , T_h245Route_sequence_of ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int qemuMonitorTextRemoveNetdev ( qemuMonitorPtr mon , const char * alias ) { char * cmd ; char * reply = NULL ; int ret = - 1 ; if ( virAsprintf ( & cmd , "netdev_del %s" , alias ) < 0 ) { virReportOOMError ( ) ; return - 1 ; } if ( qemuMonitorHMPCommand ( mon , cmd , & reply ) < 0 ) { qemuReportError ( VIR_ERR_OPERATION_FAILED , _ ( "failed to remove netdev in qemu with '%s'" ) , cmd ) ; goto cleanup ; } ret = 0 ; cleanup : VIR_FREE ( cmd ) ; VIR_FREE ( reply ) ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
struct archive_string * archive_string_ensure ( struct archive_string * as , size_t s ) { char * p ; size_t new_length ; if ( as -> s && ( s <= as -> buffer_length ) ) return ( as ) ; if ( as -> buffer_length < 32 ) new_length = 32 ; else if ( as -> buffer_length < 8192 ) new_length = as -> buffer_length + as -> buffer_length ; else { new_length = as -> buffer_length + as -> buffer_length / 4 ; if ( new_length < as -> buffer_length ) { archive_string_free ( as ) ; errno = ENOMEM ; return ( NULL ) ; } } if ( new_length < s ) new_length = s ; p = ( char * ) realloc ( as -> s , new_length ) ; if ( p == NULL ) { archive_string_free ( as ) ; errno = ENOMEM ; return ( NULL ) ; } as -> s = p ; as -> buffer_length = new_length ; return ( as ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void typhoon_alarm_timer ( void * opaque ) { TyphoonState * s = ( TyphoonState * ) ( ( uintptr_t ) opaque & ~ 3 ) ; int cpu = ( uintptr_t ) opaque & 3 ; s -> cchip . misc |= 1 << ( cpu + 4 ) ; cpu_interrupt ( CPU ( s -> cchip . cpu [ cpu ] ) , CPU_INTERRUPT_TIMER ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
gboolean logcat_binary_dump_open ( wtap_dumper * wdh , int * err ) { wdh -> subtype_write = logcat_binary_dump ; wdh -> subtype_close = NULL ; switch ( wdh -> encap ) { case WTAP_ENCAP_LOGCAT : wdh -> tsprecision = WTAP_FILE_TSPREC_USEC ; break ; default : * err = WTAP_ERR_UNSUPPORTED_FILE_TYPE ; return FALSE ; } return TRUE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void decode_exp_lsp ( WMACodecContext * s , int ch ) { float lsp_coefs [ NB_LSP_COEFS ] ; int val , i ; for ( i = 0 ; i < NB_LSP_COEFS ; i ++ ) { if ( i == 0 || i >= 8 ) val = get_bits ( & s -> gb , 3 ) ; else val = get_bits ( & s -> gb , 4 ) ; lsp_coefs [ i ] = ff_wma_lsp_codebook [ i ] [ val ] ; } wma_lsp_to_curve ( s , s -> exponents [ ch ] , & s -> max_exponent [ ch ] , s -> block_len , lsp_coefs ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_msg_queue_msgrcv ( struct msg_queue * msq , struct msg_msg * msg , struct task_struct * target , long type , int mode ) { struct ipc_security_struct * isec ; struct msg_security_struct * msec ; struct common_audit_data ad ; u32 sid = task_sid ( target ) ; int rc ; isec = msq -> q_perm . security ; msec = msg -> security ; ad . type = LSM_AUDIT_DATA_IPC ; ad . u . ipc_id = msq -> q_perm . key ; rc = avc_has_perm ( sid , isec -> sid , SECCLASS_MSGQ , MSGQ__READ , & ad ) ; if ( ! rc ) rc = avc_has_perm ( sid , msec -> sid , SECCLASS_MSG , MSG__RECEIVE , & ad ) ; return rc ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int ossl_x509name_cmp0 ( VALUE self , VALUE other ) { X509_NAME * name1 , * name2 ; GetX509Name ( self , name1 ) ; SafeGetX509Name ( other , name2 ) ; return X509_NAME_cmp ( name1 , name2 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int virLogFormatString ( char * * msg , int linenr , const char * funcname , virLogPriority priority , const char * str ) { int ret ; if ( ( funcname != NULL ) ) { ret = virAsprintfQuiet ( msg , "%llu: %s : %s:%d : %s\n" , virThreadSelfID ( ) , virLogPriorityString ( priority ) , funcname , linenr , str ) ; } else { ret = virAsprintfQuiet ( msg , "%llu: %s : %s\n" , virThreadSelfID ( ) , virLogPriorityString ( priority ) , str ) ; } return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int qemuMonitorTextSavePhysicalMemory ( qemuMonitorPtr mon , unsigned long long offset , size_t length , const char * path ) { return qemuMonitorTextSaveMemory ( mon , "pmemsave" , offset , length , path ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_s_validator_coordination_conn_inst ( packet_info * pinfo , proto_tree * tree , proto_item * item , tvbuff_t * tvb , int offset , int total_len ) { int i , size ; proto_tree_add_item ( tree , hf_cip_svalidator_coordination_conn_inst_size , tvb , offset , 1 , ENC_LITTLE_ENDIAN ) ; size = tvb_get_guint8 ( tvb , offset ) * 2 ; if ( total_len < size + 1 ) { expert_add_info ( pinfo , item , & ei_mal_svalidator_coordination_conn_inst ) ; return total_len ; } for ( i = 0 ; i < size ; i += 2 ) { proto_tree_add_item ( tree , hf_cip_svalidator_coordination_conn_inst_item , tvb , offset + 1 + i , 2 , ENC_LITTLE_ENDIAN ) ; } return ( size + 1 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_EnumeratedParameter ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { # line 830 "./asn1/h225/h225.cnf" gef_ctx_t * parent_gefx ; parent_gefx = gef_ctx_get ( actx -> private_data ) ; actx -> private_data = gef_ctx_alloc ( parent_gefx , NULL ) ; offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_EnumeratedParameter , EnumeratedParameter_sequence ) ; # line 835 "./asn1/h225/h225.cnf" actx -> private_data = parent_gefx ; return offset ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
int archive_mstring_copy_wcs_len ( struct archive_mstring * aes , const wchar_t * wcs , size_t len ) { if ( wcs == NULL ) { aes -> aes_set = 0 ; } aes -> aes_set = AES_SET_WCS ; archive_string_empty ( & ( aes -> aes_mbs ) ) ; archive_string_empty ( & ( aes -> aes_utf8 ) ) ; archive_wstrncpy ( & ( aes -> aes_wcs ) , wcs , len ) ; return ( 0 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_rc_update_framerate ( VP9_COMP * cpi ) { const VP9_COMMON * const cm = & cpi -> common ; const VP9EncoderConfig * const oxcf = & cpi -> oxcf ; RATE_CONTROL * const rc = & cpi -> rc ; int vbr_max_bits ; rc -> avg_frame_bandwidth = ( int ) ( oxcf -> target_bandwidth / cpi -> framerate ) ; rc -> min_frame_bandwidth = ( int ) ( rc -> avg_frame_bandwidth * oxcf -> two_pass_vbrmin_section / 100 ) ; rc -> min_frame_bandwidth = MAX ( rc -> min_frame_bandwidth , FRAME_OVERHEAD_BITS ) ; vbr_max_bits = ( int ) ( ( ( int64_t ) rc -> avg_frame_bandwidth * oxcf -> two_pass_vbrmax_section ) / 100 ) ; rc -> max_frame_bandwidth = MAX ( MAX ( ( cm -> MBs * MAX_MB_RATE ) , MAXRATE_1080P ) , vbr_max_bits ) ; vp9_rc_set_gf_max_interval ( cpi , rc ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExternalProtocolHandlerTest , TestGetBlockStateLocalDontBlockCopiedAsIsToProfilePref ) { base : : DictionaryValue prefs_local ; prefs_local . SetBoolean ( "tel" , false ) ; local_state_ -> Set ( prefs : : kExcludedSchemes , prefs_local ) ; ExternalProtocolHandler : : BlockState block_state = ExternalProtocolHandler : : GetBlockState ( "tel" , profile_ . get ( ) ) ; EXPECT_EQ ( ExternalProtocolHandler : : DONT_BLOCK , block_state ) ; EXPECT_TRUE ( local_state_ -> GetDictionary ( prefs : : kExcludedSchemes ) -> empty ( ) ) ; EXPECT_FALSE ( profile_ -> GetPrefs ( ) -> GetDictionary ( prefs : : kExcludedSchemes ) -> empty ( ) ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( MimeHandlerViewTest , DataUrl ) { const char * kDataUrlCsv = "data:text/csv; base64,Y29udGVudCB0byByZWFkCg==" ; RunTestWithUrl ( GURL ( kDataUrlCsv ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_Password ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_octet_string ( tvb , offset , actx , tree , hf_index , 1 , 32 , FALSE , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const guint8 * composite_get_ptr ( tvbuff_t * tvb , guint abs_offset , guint abs_length ) { struct tvb_composite * composite_tvb = ( struct tvb_composite * ) tvb ; guint i , num_members ; tvb_comp_t * composite ; tvbuff_t * member_tvb = NULL ; guint member_offset ; GSList * slist ; composite = & composite_tvb -> composite ; num_members = g_slist_length ( composite -> tvbs ) ; for ( i = 0 ; i < num_members ; i ++ ) { if ( abs_offset <= composite -> end_offsets [ i ] ) { slist = g_slist_nth ( composite -> tvbs , i ) ; member_tvb = ( tvbuff_t * ) slist -> data ; break ; } } if ( ! member_tvb ) { DISSECTOR_ASSERT ( abs_offset == tvb -> length && abs_length == 0 ) ; return "" ; } member_offset = abs_offset - composite -> start_offsets [ i ] ; if ( tvb_bytes_exist ( member_tvb , member_offset , abs_length ) ) { DISSECTOR_ASSERT ( ! tvb -> real_data ) ; return tvb_get_ptr ( member_tvb , member_offset , abs_length ) ; } else { void * real_data = g_malloc ( tvb -> length ) ; tvb_memcpy ( tvb , real_data , 0 , tvb -> length ) ; tvb -> real_data = ( const guint8 * ) real_data ; return tvb -> real_data + abs_offset ; } DISSECTOR_ASSERT_NOT_REACHED ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void or_bits ( REP_SET * to , REP_SET * from ) { reg1 uint i ; for ( i = 0 ; i < to -> size_of_bits ; i ++ ) to -> bits [ i ] |= from -> bits [ i ] ; return ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void spl_dllist_it_helper_move_forward ( spl_ptr_llist_element * * traverse_pointer_ptr , int * traverse_position_ptr , spl_ptr_llist * llist , int flags TSRMLS_DC ) { if ( * traverse_pointer_ptr ) { spl_ptr_llist_element * old = * traverse_pointer_ptr ; if ( flags & SPL_DLLIST_IT_LIFO ) { * traverse_pointer_ptr = old -> prev ; ( * traverse_position_ptr ) -- ; if ( flags & SPL_DLLIST_IT_DELETE ) { zval * prev = ( zval * ) spl_ptr_llist_pop ( llist TSRMLS_CC ) ; if ( prev ) { zval_ptr_dtor ( ( zval * * ) & prev ) ; } } } else { * traverse_pointer_ptr = old -> next ; if ( flags & SPL_DLLIST_IT_DELETE ) { zval * prev = ( zval * ) spl_ptr_llist_shift ( llist TSRMLS_CC ) ; if ( prev ) { zval_ptr_dtor ( ( zval * * ) & prev ) ; } } else { ( * traverse_position_ptr ) ++ ; } } SPL_LLIST_DELREF ( old ) ; SPL_LLIST_CHECK_ADDREF ( * traverse_pointer_ptr ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
uint get_errcode_from_name ( const char * error_name , const char * error_end ) { uint tmp ; if ( ( tmp = get_errcode_from_name ( error_name , error_end , global_error_names ) ) ) return tmp ; if ( ( tmp = get_errcode_from_name ( error_name , error_end , handler_error_names ) ) ) return tmp ; die ( "Unknown SQL error name '%s'" , error_name ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline size_t size_code_gen_buffer ( size_t tb_size ) { if ( tb_size == 0 ) { # ifdef USE_STATIC_CODE_GEN_BUFFER tb_size = DEFAULT_CODE_GEN_BUFFER_SIZE ; # else tb_size = ( unsigned long ) ( ram_size / 4 ) ; # endif } if ( tb_size < MIN_CODE_GEN_BUFFER_SIZE ) { tb_size = MIN_CODE_GEN_BUFFER_SIZE ; } if ( tb_size > MAX_CODE_GEN_BUFFER_SIZE ) { tb_size = MAX_CODE_GEN_BUFFER_SIZE ; } tcg_ctx . code_gen_buffer_size = tb_size ; return tb_size ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static FileConflictResponse * handle_copy_move_conflict ( CommonJob * job , GFile * src , GFile * dest , GFile * dest_dir ) { FileConflictResponse * response ; g_timer_stop ( job -> time ) ; nautilus_progress_info_pause ( job -> progress ) ; response = copy_move_conflict_ask_user_action ( job -> parent_window , src , dest , dest_dir ) ; nautilus_progress_info_resume ( job -> progress ) ; g_timer_continue ( job -> time ) ; return response ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void ff_h263_update_motion_val ( MpegEncContext * s ) { const int mb_xy = s -> mb_y * s -> mb_stride + s -> mb_x ; const int wrap = s -> b8_stride ; const int xy = s -> block_index [ 0 ] ; s -> current_picture . f . mbskip_table [ mb_xy ] = s -> mb_skipped ; if ( s -> mv_type != MV_TYPE_8X8 ) { int motion_x , motion_y ; if ( s -> mb_intra ) { motion_x = 0 ; motion_y = 0 ; } else if ( s -> mv_type == MV_TYPE_16X16 ) { motion_x = s -> mv [ 0 ] [ 0 ] [ 0 ] ; motion_y = s -> mv [ 0 ] [ 0 ] [ 1 ] ; } else { int i ; motion_x = s -> mv [ 0 ] [ 0 ] [ 0 ] + s -> mv [ 0 ] [ 1 ] [ 0 ] ; motion_y = s -> mv [ 0 ] [ 0 ] [ 1 ] + s -> mv [ 0 ] [ 1 ] [ 1 ] ; motion_x = ( motion_x >> 1 ) | ( motion_x & 1 ) ; for ( i = 0 ; i < 2 ; i ++ ) { s -> p_field_mv_table [ i ] [ 0 ] [ mb_xy ] [ 0 ] = s -> mv [ 0 ] [ i ] [ 0 ] ; s -> p_field_mv_table [ i ] [ 0 ] [ mb_xy ] [ 1 ] = s -> mv [ 0 ] [ i ] [ 1 ] ; } s -> current_picture . f . ref_index [ 0 ] [ 4 * mb_xy ] = s -> current_picture . f . ref_index [ 0 ] [ 4 * mb_xy + 1 ] = s -> field_select [ 0 ] [ 0 ] ; s -> current_picture . f . ref_index [ 0 ] [ 4 * mb_xy + 2 ] = s -> current_picture . f . ref_index [ 0 ] [ 4 * mb_xy + 3 ] = s -> field_select [ 0 ] [ 1 ] ; } s -> current_picture . f . motion_val [ 0 ] [ xy ] [ 0 ] = motion_x ; s -> current_picture . f . motion_val [ 0 ] [ xy ] [ 1 ] = motion_y ; s -> current_picture . f . motion_val [ 0 ] [ xy + 1 ] [ 0 ] = motion_x ; s -> current_picture . f . motion_val [ 0 ] [ xy + 1 ] [ 1 ] = motion_y ; s -> current_picture . f . motion_val [ 0 ] [ xy + wrap ] [ 0 ] = motion_x ; s -> current_picture . f . motion_val [ 0 ] [ xy + wrap ] [ 1 ] = motion_y ; s -> current_picture . f . motion_val [ 0 ] [ xy + 1 + wrap ] [ 0 ] = motion_x ; s -> current_picture . f . motion_val [ 0 ] [ xy + 1 + wrap ] [ 1 ] = motion_y ; } if ( s -> encoding ) { if ( s -> mv_type == MV_TYPE_8X8 ) s -> current_picture . f . mb_type [ mb_xy ] = MB_TYPE_L0 | MB_TYPE_8x8 ; else if ( s -> mb_intra ) s -> current_picture . f . mb_type [ mb_xy ] = MB_TYPE_INTRA ; else s -> current_picture . f . mb_type [ mb_xy ] = MB_TYPE_L0 | MB_TYPE_16x16 ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void full_to_model_counts ( vp9_coeff_count_model * model_count , vp9_coeff_count * full_count ) { int i , j , k , l ; for ( i = 0 ; i < PLANE_TYPES ; ++ i ) for ( j = 0 ; j < REF_TYPES ; ++ j ) for ( k = 0 ; k < COEF_BANDS ; ++ k ) for ( l = 0 ; l < BAND_COEFF_CONTEXTS ( k ) ; ++ l ) full_to_model_count ( model_count [ i ] [ j ] [ k ] [ l ] , full_count [ i ] [ j ] [ k ] [ l ] ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static VALUE cState_space_set ( VALUE self , VALUE space ) { unsigned long len ; GET_STATE ( self ) ; Check_Type ( space , T_STRING ) ; len = RSTRING_LEN ( space ) ; if ( len == 0 ) { if ( state -> space ) { ruby_xfree ( state -> space ) ; state -> space = NULL ; state -> space_len = 0 ; } } else { if ( state -> space ) ruby_xfree ( state -> space ) ; state -> space = fstrndup ( RSTRING_PTR ( space ) , len ) ; state -> space_len = len ; } return Qnil ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static bool find_cgroup_subsystems ( char * * * kernel_subsystems ) { FILE * proc_cgroups ; bool bret = false ; char * line = NULL ; size_t sz = 0 ; size_t kernel_subsystems_count = 0 ; size_t kernel_subsystems_capacity = 0 ; int r ; proc_cgroups = fopen_cloexec ( "/proc/cgroups" , "r" ) ; if ( ! proc_cgroups ) return false ; while ( getline ( & line , & sz , proc_cgroups ) != - 1 ) { char * tab1 ; char * tab2 ; int hierarchy_number ; if ( line [ 0 ] == '#' ) continue ; if ( ! line [ 0 ] ) continue ; tab1 = strchr ( line , '\t' ) ; if ( ! tab1 ) continue ; * tab1 ++ = '\0' ; tab2 = strchr ( tab1 , '\t' ) ; if ( ! tab2 ) continue ; * tab2 = '\0' ; tab2 = NULL ; hierarchy_number = strtoul ( tab1 , & tab2 , 10 ) ; if ( ! tab2 || * tab2 ) continue ; ( void ) hierarchy_number ; r = lxc_grow_array ( ( void * * * ) kernel_subsystems , & kernel_subsystems_capacity , kernel_subsystems_count + 1 , 12 ) ; if ( r < 0 ) goto out ; ( * kernel_subsystems ) [ kernel_subsystems_count ] = strdup ( line ) ; if ( ! ( * kernel_subsystems ) [ kernel_subsystems_count ] ) goto out ; kernel_subsystems_count ++ ; } bret = true ; out : fclose ( proc_cgroups ) ; free ( line ) ; return bret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void examine_variable ( PlannerInfo * root , Node * node , int varRelid , VariableStatData * vardata ) { Node * basenode ; Relids varnos ; RelOptInfo * onerel ; MemSet ( vardata , 0 , sizeof ( VariableStatData ) ) ; vardata -> vartype = exprType ( node ) ; if ( IsA ( node , RelabelType ) ) basenode = ( Node * ) ( ( RelabelType * ) node ) -> arg ; else basenode = node ; if ( IsA ( basenode , Var ) && ( varRelid == 0 || varRelid == ( ( Var * ) basenode ) -> varno ) ) { Var * var = ( Var * ) basenode ; vardata -> var = basenode ; vardata -> rel = find_base_rel ( root , var -> varno ) ; vardata -> atttype = var -> vartype ; vardata -> atttypmod = var -> vartypmod ; vardata -> isunique = has_unique_index ( vardata -> rel , var -> varattno ) ; examine_simple_variable ( root , var , vardata ) ; return ; } varnos = pull_varnos ( basenode ) ; onerel = NULL ; switch ( bms_membership ( varnos ) ) { case BMS_EMPTY_SET : break ; case BMS_SINGLETON : if ( varRelid == 0 || bms_is_member ( varRelid , varnos ) ) { onerel = find_base_rel ( root , ( varRelid ? varRelid : bms_singleton_member ( varnos ) ) ) ; vardata -> rel = onerel ; node = basenode ; } break ; case BMS_MULTIPLE : if ( varRelid == 0 ) { vardata -> rel = find_join_rel ( root , varnos ) ; node = basenode ; } else if ( bms_is_member ( varRelid , varnos ) ) { vardata -> rel = find_base_rel ( root , varRelid ) ; node = basenode ; } break ; } bms_free ( varnos ) ; vardata -> var = node ; vardata -> atttype = exprType ( node ) ; vardata -> atttypmod = exprTypmod ( node ) ; if ( onerel ) { ListCell * ilist ; foreach ( ilist , onerel -> indexlist ) { IndexOptInfo * index = ( IndexOptInfo * ) lfirst ( ilist ) ; ListCell * indexpr_item ; int pos ; indexpr_item = list_head ( index -> indexprs ) ; if ( indexpr_item == NULL ) continue ; for ( pos = 0 ; pos < index -> ncolumns ; pos ++ ) { if ( index -> indexkeys [ pos ] == 0 ) { Node * indexkey ; if ( indexpr_item == NULL ) elog ( ERROR , "too few entries in indexprs list" ) ; indexkey = ( Node * ) lfirst ( indexpr_item ) ; if ( indexkey && IsA ( indexkey , RelabelType ) ) indexkey = ( Node * ) ( ( RelabelType * ) indexkey ) -> arg ; if ( equal ( node , indexkey ) ) { if ( index -> unique && index -> ncolumns == 1 && ( index -> indpred == NIL || index -> predOK ) ) vardata -> isunique = true ; if ( get_index_stats_hook && ( * get_index_stats_hook ) ( root , index -> indexoid , pos + 1 , vardata ) ) { if ( HeapTupleIsValid ( vardata -> statsTuple ) && ! vardata -> freefunc ) elog ( ERROR , "no function provided to release variable stats with" ) ; } else if ( index -> indpred == NIL ) { vardata -> statsTuple = SearchSysCache3 ( STATRELATTINH , ObjectIdGetDatum ( index -> indexoid ) , Int16GetDatum ( pos + 1 ) , BoolGetDatum ( false ) ) ; vardata -> freefunc = ReleaseSysCache ; if ( HeapTupleIsValid ( vardata -> statsTuple ) ) { RangeTblEntry * rte ; rte = planner_rt_fetch ( index -> rel -> relid , root ) ; Assert ( rte -> rtekind == RTE_RELATION ) ; vardata -> acl_ok = ( pg_class_aclcheck ( rte -> relid , GetUserId ( ) , ACL_SELECT ) == ACLCHECK_OK ) ; } else { vardata -> acl_ok = true ; } } if ( vardata -> statsTuple ) break ; } indexpr_item = lnext ( indexpr_item ) ; } } if ( vardata -> statsTuple ) break ; } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int parse_usbdevfs_streams ( struct usb_dev_state * ps , struct usbdevfs_streams __user * streams , unsigned int * num_streams_ret , unsigned int * num_eps_ret , struct usb_host_endpoint * * * eps_ret , struct usb_interface * * intf_ret ) { unsigned int i , num_streams , num_eps ; struct usb_host_endpoint * * eps ; struct usb_interface * intf = NULL ; unsigned char ep ; int ifnum , ret ; if ( get_user ( num_streams , & streams -> num_streams ) || get_user ( num_eps , & streams -> num_eps ) ) return - EFAULT ; if ( num_eps < 1 || num_eps > USB_MAXENDPOINTS ) return - EINVAL ; if ( num_streams_ret && ( num_streams < 2 || num_streams > 65536 ) ) return - EINVAL ; eps = kmalloc ( num_eps * sizeof ( * eps ) , GFP_KERNEL ) ; if ( ! eps ) return - ENOMEM ; for ( i = 0 ; i < num_eps ; i ++ ) { if ( get_user ( ep , & streams -> eps [ i ] ) ) { ret = - EFAULT ; goto error ; } eps [ i ] = ep_to_host_endpoint ( ps -> dev , ep ) ; if ( ! eps [ i ] ) { ret = - EINVAL ; goto error ; } ifnum = findintfep ( ps -> dev , ep ) ; if ( ifnum < 0 ) { ret = ifnum ; goto error ; } if ( i == 0 ) { ret = checkintf ( ps , ifnum ) ; if ( ret < 0 ) goto error ; intf = usb_ifnum_to_if ( ps -> dev , ifnum ) ; } else { if ( ifnum != intf -> altsetting -> desc . bInterfaceNumber ) { ret = - EINVAL ; goto error ; } } } if ( num_streams_ret ) * num_streams_ret = num_streams ; * num_eps_ret = num_eps ; * eps_ret = eps ; * intf_ret = intf ; return 0 ; error : kfree ( eps ) ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void request_submit ( struct request * const req ) { if ( req -> ns ) { evdns_request_insert ( req , & req_head ) ; global_requests_inflight ++ ; evdns_request_transmit ( req ) ; } else { evdns_request_insert ( req , & req_waiting_head ) ; global_requests_waiting ++ ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int xhci_fire_transfer ( XHCIState * xhci , XHCITransfer * xfer , XHCIEPContext * epctx ) { trace_usb_xhci_xfer_start ( xfer , xfer -> epctx -> slotid , xfer -> epctx -> epid , xfer -> streamid ) ; return xhci_submit ( xhci , xfer , epctx ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static USBEndpoint * xhci_epid_to_usbep ( XHCIEPContext * epctx ) { USBPort * uport ; uint32_t token ; if ( ! epctx ) { return NULL ; } uport = epctx -> xhci -> slots [ epctx -> slotid - 1 ] . uport ; token = ( epctx -> epid & 1 ) ? USB_TOKEN_IN : USB_TOKEN_OUT ; if ( ! uport ) { return NULL ; } return usb_ep_get ( uport -> dev , token , epctx -> epid >> 1 ) ; }
0False