mcanoglu commited on
Commit
9d9912d
·
verified ·
1 Parent(s): c9c15df

Upload 3 files

Browse files
Files changed (3) hide show
  1. test.jsonl +0 -19
  2. train.jsonl +2 -2
  3. validation.jsonl +0 -0
test.jsonl CHANGED
@@ -7,11 +7,8 @@
7
  {"code": "\tfunction updateCommandCategorieInDB(){\n\t\tglobal $pearDB;\n\t\t\n\t\t$DBRESULT = $pearDB->query(\"UPDATE `command_categories` SET `category_name` = '\".$_POST[\"category_name\"].\"' , `category_alias` = '\".$_POST[\"category_alias\"].\"' , `category_order` = '\".$_POST[\"category_order\"].\"' WHERE `cmd_category_id` = '\".$_POST[\"cmd_category_id\"].\"'\");\n\t}", "label_name": "Base", "label": 1}
8
  {"code": "\tfunction testCommandCategorieExistence ($name = NULL)\t{\n\t\tglobal $pearDB, $form;\n\t\t$id = NULL;\n\t\t\n\t\tif (isset($form))\n\t\t\t$id = $form->getSubmitValue('cmd_category_id');\n\t\t\n\t\t$DBRESULT = $pearDB->query(\"SELECT `category_name`, `cmd_category_id` FROM `command_categories` WHERE `category_name` = '\".htmlentities($name, ENT_QUOTES, \"UTF-8\").\"'\");\n\t\t$cat = $DBRESULT->fetchRow();\n\t\t\n\t\tif ($DBRESULT->numRows() >= 1 && $cat[\"cmd_category_id\"] == $id)\n\t\t\treturn true;\n\t\telse if ($DBRESULT->numRows() >= 1 && $cat[\"cmd_category_id\"] != $id)\n\t\t\treturn false;\n\t\telse\n\t\t\treturn true;\n\t}", "label_name": "Base", "label": 1}
9
  {"code": "function getTypes($subtype=\"both\") {\n\t$types = array(\"users\" => array(),\n\t \"resources\" => array());\n\tif($subtype == \"users\" || $subtype == \"both\") {\n\t\t$query = \"SELECT id, name FROM userprivtype\";\n\t\t$qh = doQuery($query, 365);\n\t\twhile($row = mysql_fetch_assoc($qh)) {\n\t\t\tif($row[\"name\"] == \"block\" || $row[\"name\"] == \"cascade\")\n\t\t\t\tcontinue;\n\t\t\t$types[\"users\"][$row[\"id\"]] = $row[\"name\"];\n\t\t}\n\t}\n\tif($subtype == \"resources\" || $subtype == \"both\") {\n\t\t$query = \"SELECT id, name FROM resourcetype\";\n\t\t$qh = doQuery($query, 366);\n\t\twhile($row = mysql_fetch_assoc($qh)) {\n\t\t\tif($row[\"name\"] == \"block\" || $row[\"name\"] == \"cascade\")\n\t\t\t\tcontinue;\n\t\t\t$types[\"resources\"][$row[\"id\"]] = $row[\"name\"];\n\t\t}\n\t}\n\treturn $types;\n}", "label_name": "Class", "label": 2}
10
- {"code": "function getResourceGroups($type=\"\") {\n\t$return = array();\n\t$query = \"SELECT g.id AS id, \"\n\t . \"g.name AS name, \"\n\t . \"t.name AS type, \"\n\t . \"g.ownerusergroupid AS ownerid, \"\n\t . \"CONCAT(u.name, '@', a.name) AS owner \"\n\t . \"FROM resourcegroup g, \"\n\t . \"resourcetype t, \"\n\t . \"usergroup u, \"\n\t . \"affiliation a \"\n\t . \"WHERE g.resourcetypeid = t.id AND \"\n\t . \"g.ownerusergroupid = u.id AND \"\n\t . \"u.affiliationid = a.id \";\n\n\tif(! empty($type))\n\t\t$query .= \"AND t.name = '$type' \";\n\n\t$query .= \"ORDER BY t.name, g.name\";\n\t$qh = doQuery($query, 281);\n\twhile($row = mysql_fetch_assoc($qh)) {\n\t\tif(empty($type))\n\t\t\t$return[$row[\"id\"]][\"name\"] = $row[\"type\"] . \"/\" . $row[\"name\"];\n\t\telse\n\t\t\t$return[$row[\"id\"]][\"name\"] = $row[\"name\"];\n\t\t$return[$row[\"id\"]][\"ownerid\"] = $row[\"ownerid\"];\n\t\t$return[$row[\"id\"]][\"owner\"] = $row[\"owner\"];\n\t}\n\treturn $return;\n}", "label_name": "CWE-264", "label": "CWE-264"}
11
  {"code": "function XMLRPCtest($string) {\n\t$string = processInputData($string, ARG_STRING);\n\treturn array('status' => 'success',\n\t 'message' => 'RPC call worked successfully',\n\t 'string' => $string);\n}", "label_name": "Class", "label": 2}
12
  {"code": "function XMLRPCblockAllocation($imageid, $start, $end, $numMachines,\n $usergroupid, $ignoreprivileges=0) {\n\tglobal $user, $xmlrpcBlockAPIUsers;\n\tif(! in_array($user['id'], $xmlrpcBlockAPIUsers)) {\n\t\treturn array('status' => 'error',\n\t\t 'errorcode' => 34,\n\t\t 'errormsg' => 'access denied for managing block allocations');\n\t}\n\t$ownerid = getUserlistID('vclreload@Local');\n\t$name = \"API:$start\";\n\t$managementnodes = getManagementNodes('future');\n\tif(empty($managementnodes)) {\n\t\treturn array('status' => 'error',\n\t\t 'errorcode' => 12,\n\t\t 'errormsg' => 'could not allocate a management node to handle block allocation');\n\t}\n\t$mnid = array_rand($managementnodes);\n\t$query = \"INSERT INTO blockRequest \"\n\t . \"(name, \"\n\t . \"imageid, \"\n\t . \"numMachines, \"\n\t . \"groupid, \"\n\t . \"repeating, \"\n\t . \"ownerid, \"\n\t . \"admingroupid, \"\n\t . \"managementnodeid, \"\n\t . \"expireTime, \"\n\t . \"status) \"\n\t . \"VALUES \"\n\t . \"('$name', \"\n\t . \"$imageid, \"\n\t . \"$numMachines, \"\n\t . \"$usergroupid, \"\n\t . \"'list', \"\n\t . \"$ownerid, \"\n\t . \"0, \"\n\t . \"$mnid, \"\n\t . \"'$end', \"\n\t . \"'accepted')\";\n\tdoQuery($query, 101);\n\t$brid = dbLastInsertID();\n\t$query = \"INSERT INTO blockTimes \"\n\t . \"(blockRequestid, \"\n\t . \"start, \"\n\t . \"end) \"\n\t . \"VALUES \"\n\t . \"($brid, \"\n\t . \"'$start', \"\n\t . \"'$end')\";\n\tdoQuery($query, 101);\n\t$btid = dbLastInsertID();\n\t$return = XMLRPCprocessBlockTime($btid, $ignoreprivileges);\n\t$return['blockTimesid'] = $btid;\n\treturn $return;\n}", "label_name": "Class", "label": 2}
13
- {"code": " array_push($stack, $node);\n }\n }\n return array(\n 'status' => 'success',\n 'nodes' => $nodes);\n } else {\n return array(\n 'status' => 'error',\n 'errorcode' => 56,\n 'errormsg' => 'User cannot access node content');\n }\n}", "label_name": "CWE-264", "label": "CWE-264"}
14
- {"code": "function XMLRPCgetUserGroups($groupType=0, $affiliationid=0) {\n global $user;\n $groups = getUserGroups($groupType, $affiliationid);\n\n // Filter out any groups to which the user does not have access.\n $usergroups = array();\n foreach($groups as $id => $group){\n if($group['ownerid'] == $user['id'] || \n (array_key_exists(\"editgroupid\", $group) &&\n array_key_exists($group['editgroupid'], $user[\"groups\"])) || \n (array_key_exists($id, $user[\"groups\"]))){\n array_push($usergroups, $group);\n }\n }\n return array(\n \"status\" => \"success\",\n \"groups\" => $usergroups);\n}", "label_name": "CWE-264", "label": "CWE-264"}
15
  {"code": "function XMLRPCendRequest($requestid) {\n\tglobal $user;\n\t$requestid = processInputData($requestid, ARG_NUMERIC);\n\t$userRequests = getUserRequests('all', $user['id']);\n\t$found = 0;\n\tforeach($userRequests as $req) {\n\t\tif($req['id'] == $requestid) {\n\t\t\t$request = getRequestInfo($requestid);\n\t\t\t$found = 1;\n\t\t\tbreak;\n\t\t}\n\t}\n\tif(! $found)\n\t\treturn array('status' => 'error',\n\t\t 'errorcode' => 1,\n\t\t 'errormsg' => 'unknown requestid');\n\n\tdeleteRequest($request);\n\treturn array('status' => 'success');\n}", "label_name": "Class", "label": 2}
16
  {"code": " public function __construct($app = null)\n {\n if (is_object($app)) {\n $this->app = $app;\n } else {\n $this->app = mw();\n }\n\n $coupon_code = $this->app->user_manager->session_get('coupon_code');\n $this->coupon_data = coupon_get_by_code($coupon_code);\n }", "label_name": "NVD-CWE-Other", "label": "NVD-CWE-Other"}
17
  {"code": " public function edit(Request $request, $id) {\n\n return $this->view('product::admin.product.edit', [\n 'content_id'=>$id\n ]);\n }", "label_name": "Base", "label": 1}
@@ -1017,18 +1014,14 @@
1017
  {"code": "static int crypto_givcipher_report(struct sk_buff *skb, struct crypto_alg *alg)\n{\n\tstruct crypto_report_blkcipher rblkcipher;\n\n\tsnprintf(rblkcipher.type, CRYPTO_MAX_ALG_NAME, \"%s\", \"givcipher\");\n\tsnprintf(rblkcipher.geniv, CRYPTO_MAX_ALG_NAME, \"%s\",\n\t\t alg->cra_ablkcipher.geniv ?: \"<built-in>\");\n\n\trblkcipher.blocksize = alg->cra_blocksize;\n\trblkcipher.min_keysize = alg->cra_ablkcipher.min_keysize;\n\trblkcipher.max_keysize = alg->cra_ablkcipher.max_keysize;\n\trblkcipher.ivsize = alg->cra_ablkcipher.ivsize;\n\n\tif (nla_put(skb, CRYPTOCFGA_REPORT_BLKCIPHER,\n\t\t sizeof(struct crypto_report_blkcipher), &rblkcipher))\n\t\tgoto nla_put_failure;\n\treturn 0;\n\nnla_put_failure:\n\treturn -EMSGSIZE;\n}", "label_name": "CWE-310", "label": "CWE-310"}
1018
  {"code": "static int crypto_aead_report(struct sk_buff *skb, struct crypto_alg *alg)\n{\n\tstruct crypto_report_aead raead;\n\tstruct aead_alg *aead = &alg->cra_aead;\n\n\tsnprintf(raead.type, CRYPTO_MAX_ALG_NAME, \"%s\", \"aead\");\n\tsnprintf(raead.geniv, CRYPTO_MAX_ALG_NAME, \"%s\",\n\t\t aead->geniv ?: \"<built-in>\");\n\n\traead.blocksize = alg->cra_blocksize;\n\traead.maxauthsize = aead->maxauthsize;\n\traead.ivsize = aead->ivsize;\n\n\tif (nla_put(skb, CRYPTOCFGA_REPORT_AEAD,\n\t\t sizeof(struct crypto_report_aead), &raead))\n\t\tgoto nla_put_failure;\n\treturn 0;\n\nnla_put_failure:\n\treturn -EMSGSIZE;\n}", "label_name": "CWE-310", "label": "CWE-310"}
1019
  {"code": "static int crypto_ahash_report(struct sk_buff *skb, struct crypto_alg *alg)\n{\n\tstruct crypto_report_hash rhash;\n\n\tsnprintf(rhash.type, CRYPTO_MAX_ALG_NAME, \"%s\", \"ahash\");\n\n\trhash.blocksize = alg->cra_blocksize;\n\trhash.digestsize = __crypto_hash_alg_common(alg)->digestsize;\n\n\tif (nla_put(skb, CRYPTOCFGA_REPORT_HASH,\n\t\t sizeof(struct crypto_report_hash), &rhash))\n\t\tgoto nla_put_failure;\n\treturn 0;\n\nnla_put_failure:\n\treturn -EMSGSIZE;\n}", "label_name": "CWE-310", "label": "CWE-310"}
1020
- {"code": "static struct mnt_namespace *dup_mnt_ns(struct mnt_namespace *mnt_ns,\n\t\tstruct user_namespace *user_ns, struct fs_struct *fs)\n{\n\tstruct mnt_namespace *new_ns;\n\tstruct vfsmount *rootmnt = NULL, *pwdmnt = NULL;\n\tstruct mount *p, *q;\n\tstruct mount *old = mnt_ns->root;\n\tstruct mount *new;\n\tint copy_flags;\n\n\tnew_ns = alloc_mnt_ns(user_ns);\n\tif (IS_ERR(new_ns))\n\t\treturn new_ns;\n\n\tdown_write(&namespace_sem);\n\t/* First pass: copy the tree topology */\n\tcopy_flags = CL_COPY_ALL | CL_EXPIRE;\n\tif (user_ns != mnt_ns->user_ns)\n\t\tcopy_flags |= CL_SHARED_TO_SLAVE;\n\tnew = copy_tree(old, old->mnt.mnt_root, copy_flags);\n\tif (IS_ERR(new)) {\n\t\tup_write(&namespace_sem);\n\t\tfree_mnt_ns(new_ns);\n\t\treturn ERR_CAST(new);\n\t}\n\tnew_ns->root = new;\n\tbr_write_lock(&vfsmount_lock);\n\tlist_add_tail(&new_ns->list, &new->mnt_list);\n\tbr_write_unlock(&vfsmount_lock);\n\n\t/*\n\t * Second pass: switch the tsk->fs->* elements and mark new vfsmounts\n\t * as belonging to new namespace. We have already acquired a private\n\t * fs_struct, so tsk->fs->lock is not needed.\n\t */\n\tp = old;\n\tq = new;\n\twhile (p) {\n\t\tq->mnt_ns = new_ns;\n\t\tif (fs) {\n\t\t\tif (&p->mnt == fs->root.mnt) {\n\t\t\t\tfs->root.mnt = mntget(&q->mnt);\n\t\t\t\trootmnt = &p->mnt;\n\t\t\t}\n\t\t\tif (&p->mnt == fs->pwd.mnt) {\n\t\t\t\tfs->pwd.mnt = mntget(&q->mnt);\n\t\t\t\tpwdmnt = &p->mnt;\n\t\t\t}\n\t\t}\n\t\tp = next_mnt(p, old);\n\t\tq = next_mnt(q, new);\n\t}\n\tup_write(&namespace_sem);\n\n\tif (rootmnt)\n\t\tmntput(rootmnt);\n\tif (pwdmnt)\n\t\tmntput(pwdmnt);\n\n\treturn new_ns;\n}", "label_name": "CWE-264", "label": "CWE-264"}
1021
  {"code": "int bt_sock_recvmsg(struct kiocb *iocb, struct socket *sock,\n\t\t\t\tstruct msghdr *msg, size_t len, int flags)\n{\n\tint noblock = flags & MSG_DONTWAIT;\n\tstruct sock *sk = sock->sk;\n\tstruct sk_buff *skb;\n\tsize_t copied;\n\tint err;\n\n\tBT_DBG(\"sock %p sk %p len %zu\", sock, sk, len);\n\n\tif (flags & (MSG_OOB))\n\t\treturn -EOPNOTSUPP;\n\n\tskb = skb_recv_datagram(sk, flags, noblock, &err);\n\tif (!skb) {\n\t\tif (sk->sk_shutdown & RCV_SHUTDOWN)\n\t\t\treturn 0;\n\t\treturn err;\n\t}\n\n\tmsg->msg_namelen = 0;\n\n\tcopied = skb->len;\n\tif (len < copied) {\n\t\tmsg->msg_flags |= MSG_TRUNC;\n\t\tcopied = len;\n\t}\n\n\tskb_reset_transport_header(skb);\n\terr = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);\n\tif (err == 0)\n\t\tsock_recv_ts_and_drops(msg, sk, skb);\n\n\tskb_free_datagram(sk, skb);\n\n\treturn err ? : copied;\n}", "label_name": "Class", "label": 2}
1022
  {"code": "fb_mmap(struct file *file, struct vm_area_struct * vma)\n{\n\tstruct fb_info *info = file_fb_info(file);\n\tstruct fb_ops *fb;\n\tunsigned long off;\n\tunsigned long start;\n\tu32 len;\n\n\tif (!info)\n\t\treturn -ENODEV;\n\tif (vma->vm_pgoff > (~0UL >> PAGE_SHIFT))\n\t\treturn -EINVAL;\n\toff = vma->vm_pgoff << PAGE_SHIFT;\n\tfb = info->fbops;\n\tif (!fb)\n\t\treturn -ENODEV;\n\tmutex_lock(&info->mm_lock);\n\tif (fb->fb_mmap) {\n\t\tint res;\n\t\tres = fb->fb_mmap(info, vma);\n\t\tmutex_unlock(&info->mm_lock);\n\t\treturn res;\n\t}\n\n\t/* frame buffer memory */\n\tstart = info->fix.smem_start;\n\tlen = PAGE_ALIGN((start & ~PAGE_MASK) + info->fix.smem_len);\n\tif (off >= len) {\n\t\t/* memory mapped io */\n\t\toff -= len;\n\t\tif (info->var.accel_flags) {\n\t\t\tmutex_unlock(&info->mm_lock);\n\t\t\treturn -EINVAL;\n\t\t}\n\t\tstart = info->fix.mmio_start;\n\t\tlen = PAGE_ALIGN((start & ~PAGE_MASK) + info->fix.mmio_len);\n\t}\n\tmutex_unlock(&info->mm_lock);\n\tstart &= PAGE_MASK;\n\tif ((vma->vm_end - vma->vm_start + off) > len)\n\t\treturn -EINVAL;\n\toff += start;\n\tvma->vm_pgoff = off >> PAGE_SHIFT;\n\t/* VM_IO | VM_DONTEXPAND | VM_DONTDUMP are set by io_remap_pfn_range()*/\n\tvma->vm_page_prot = vm_get_page_prot(vma->vm_flags);\n\tfb_pgprotect(file, vma, off);\n\tif (io_remap_pfn_range(vma, vma->vm_start, off >> PAGE_SHIFT,\n\t\t\t vma->vm_end - vma->vm_start, vma->vm_page_prot))\n\t\treturn -EAGAIN;\n\treturn 0;\n}", "label_name": "CWE-189", "label": "CWE-189"}
1023
- {"code": "static int dccp_v6_send_response(const struct sock *sk, struct request_sock *req)\n{\n\tstruct inet_request_sock *ireq = inet_rsk(req);\n\tstruct ipv6_pinfo *np = inet6_sk(sk);\n\tstruct sk_buff *skb;\n\tstruct in6_addr *final_p, final;\n\tstruct flowi6 fl6;\n\tint err = -1;\n\tstruct dst_entry *dst;\n\n\tmemset(&fl6, 0, sizeof(fl6));\n\tfl6.flowi6_proto = IPPROTO_DCCP;\n\tfl6.daddr = ireq->ir_v6_rmt_addr;\n\tfl6.saddr = ireq->ir_v6_loc_addr;\n\tfl6.flowlabel = 0;\n\tfl6.flowi6_oif = ireq->ir_iif;\n\tfl6.fl6_dport = ireq->ir_rmt_port;\n\tfl6.fl6_sport = htons(ireq->ir_num);\n\tsecurity_req_classify_flow(req, flowi6_to_flowi(&fl6));\n\n\n\tfinal_p = fl6_update_dst(&fl6, np->opt, &final);\n\n\tdst = ip6_dst_lookup_flow(sk, &fl6, final_p);\n\tif (IS_ERR(dst)) {\n\t\terr = PTR_ERR(dst);\n\t\tdst = NULL;\n\t\tgoto done;\n\t}\n\n\tskb = dccp_make_response(sk, dst, req);\n\tif (skb != NULL) {\n\t\tstruct dccp_hdr *dh = dccp_hdr(skb);\n\n\t\tdh->dccph_checksum = dccp_v6_csum_finish(skb,\n\t\t\t\t\t\t\t &ireq->ir_v6_loc_addr,\n\t\t\t\t\t\t\t &ireq->ir_v6_rmt_addr);\n\t\tfl6.daddr = ireq->ir_v6_rmt_addr;\n\t\terr = ip6_xmit(sk, skb, &fl6, np->opt, np->tclass);\n\t\terr = net_xmit_eval(err);\n\t}\n\ndone:\n\tdst_release(dst);\n\treturn err;\n}", "label_name": "CWE-264", "label": "CWE-264"}
1024
- {"code": "struct ipv6_txoptions *ipv6_update_options(struct sock *sk,\n\t\t\t\t\t struct ipv6_txoptions *opt)\n{\n\tif (inet_sk(sk)->is_icsk) {\n\t\tif (opt &&\n\t\t !((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE)) &&\n\t\t inet_sk(sk)->inet_daddr != LOOPBACK4_IPV6) {\n\t\t\tstruct inet_connection_sock *icsk = inet_csk(sk);\n\t\t\ticsk->icsk_ext_hdr_len = opt->opt_flen + opt->opt_nflen;\n\t\t\ticsk->icsk_sync_mss(sk, icsk->icsk_pmtu_cookie);\n\t\t}\n\t}\n\topt = xchg(&inet6_sk(sk)->opt, opt);\n\tsk_dst_reset(sk);\n\n\treturn opt;\n}", "label_name": "CWE-264", "label": "CWE-264"}
1025
  {"code": "static int kvm_vm_ioctl_set_pit(struct kvm *kvm, struct kvm_pit_state *ps)\n{\n\tmutex_lock(&kvm->arch.vpit->pit_state.lock);\n\tmemcpy(&kvm->arch.vpit->pit_state, ps, sizeof(struct kvm_pit_state));\n\tkvm_pit_load_count(kvm, 0, ps->channels[0].count, 0);\n\tmutex_unlock(&kvm->arch.vpit->pit_state.lock);\n\treturn 0;\n}", "label_name": "Base", "label": 1}
1026
  {"code": "static int perf_swevent_add(struct perf_event *event, int flags)\n{\n\tstruct swevent_htable *swhash = this_cpu_ptr(&swevent_htable);\n\tstruct hw_perf_event *hwc = &event->hw;\n\tstruct hlist_head *head;\n\n\tif (is_sampling_event(event)) {\n\t\thwc->last_period = hwc->sample_period;\n\t\tperf_swevent_set_period(event);\n\t}\n\n\thwc->state = !(flags & PERF_EF_START);\n\n\thead = find_swevent_head(swhash, event);\n\tif (!head) {\n\t\t/*\n\t\t * We can race with cpu hotplug code. Do not\n\t\t * WARN if the cpu just got unplugged.\n\t\t */\n\t\tWARN_ON_ONCE(swhash->online);\n\t\treturn -EINVAL;\n\t}\n\n\thlist_add_head_rcu(&event->hlist_entry, head);\n\tperf_event_update_userpage(event);\n\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1027
  {"code": "void flush_tlb_page(struct vm_area_struct *vma, unsigned long start)\n{\n\tstruct mm_struct *mm = vma->vm_mm;\n\n\tpreempt_disable();\n\n\tif (current->active_mm == mm) {\n\t\tif (current->mm)\n\t\t\t__flush_tlb_one(start);\n\t\telse\n\t\t\tleave_mm(smp_processor_id());\n\t}\n\n\tif (cpumask_any_but(mm_cpumask(mm), smp_processor_id()) < nr_cpu_ids)\n\t\tflush_tlb_others(mm_cpumask(mm), mm, start, 0UL);\n\n\tpreempt_enable();\n}", "label_name": "Class", "label": 2}
1028
  {"code": "void flush_tlb_mm_range(struct mm_struct *mm, unsigned long start,\n\t\t\t\tunsigned long end, unsigned long vmflag)\n{\n\tunsigned long addr;\n\t/* do a global flush by default */\n\tunsigned long base_pages_to_flush = TLB_FLUSH_ALL;\n\n\tpreempt_disable();\n\tif (current->active_mm != mm)\n\t\tgoto out;\n\n\tif (!current->mm) {\n\t\tleave_mm(smp_processor_id());\n\t\tgoto out;\n\t}\n\n\tif ((end != TLB_FLUSH_ALL) && !(vmflag & VM_HUGETLB))\n\t\tbase_pages_to_flush = (end - start) >> PAGE_SHIFT;\n\n\tif (base_pages_to_flush > tlb_single_page_flush_ceiling) {\n\t\tbase_pages_to_flush = TLB_FLUSH_ALL;\n\t\tcount_vm_tlb_event(NR_TLB_LOCAL_FLUSH_ALL);\n\t\tlocal_flush_tlb();\n\t} else {\n\t\t/* flush range by one by one 'invlpg' */\n\t\tfor (addr = start; addr < end;\taddr += PAGE_SIZE) {\n\t\t\tcount_vm_tlb_event(NR_TLB_LOCAL_FLUSH_ONE);\n\t\t\t__flush_tlb_single(addr);\n\t\t}\n\t}\n\ttrace_tlb_flush(TLB_LOCAL_MM_SHOOTDOWN, base_pages_to_flush);\nout:\n\tif (base_pages_to_flush == TLB_FLUSH_ALL) {\n\t\tstart = 0UL;\n\t\tend = TLB_FLUSH_ALL;\n\t}\n\tif (cpumask_any_but(mm_cpumask(mm), smp_processor_id()) < nr_cpu_ids)\n\t\tflush_tlb_others(mm_cpumask(mm), mm, start, end);\n\tpreempt_enable();\n}", "label_name": "Class", "label": 2}
1029
  {"code": "static void *skcipher_bind(const char *name, u32 type, u32 mask)\n{\n\treturn crypto_alloc_skcipher(name, type, mask);\n}", "label_name": "Base", "label": 1}
1030
  {"code": "static inline int init_new_context(struct task_struct *tsk,\n\t\t\t\t struct mm_struct *mm)\n{\n\tcpumask_clear(&mm->context.cpu_attach_mask);\n\tatomic_set(&mm->context.attach_count, 0);\n\tmm->context.flush_mm = 0;\n\tmm->context.asce_bits = _ASCE_TABLE_LENGTH | _ASCE_USER_BITS;\n\tmm->context.asce_bits |= _ASCE_TYPE_REGION3;\n#ifdef CONFIG_PGSTE\n\tmm->context.alloc_pgste = page_table_allocate_pgste;\n\tmm->context.has_pgste = 0;\n\tmm->context.use_skey = 0;\n#endif\n\tmm->context.asce_limit = STACK_TOP_MAX;\n\tcrst_table_init((unsigned long *) mm->pgd, pgd_entry_type(mm));\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1031
- {"code": "static int ion_handle_put(struct ion_handle *handle)\n{\n\tstruct ion_client *client = handle->client;\n\tint ret;\n\n\tmutex_lock(&client->lock);\n\tret = kref_put(&handle->ref, ion_handle_destroy);\n\tmutex_unlock(&client->lock);\n\n\treturn ret;\n}", "label_name": "CWE-264", "label": "CWE-264"}
1032
  {"code": "static inline int check_entry_size_and_hooks(struct arpt_entry *e,\n\t\t\t\t\t struct xt_table_info *newinfo,\n\t\t\t\t\t const unsigned char *base,\n\t\t\t\t\t const unsigned char *limit,\n\t\t\t\t\t const unsigned int *hook_entries,\n\t\t\t\t\t const unsigned int *underflows,\n\t\t\t\t\t unsigned int valid_hooks)\n{\n\tunsigned int h;\n\tint err;\n\n\tif ((unsigned long)e % __alignof__(struct arpt_entry) != 0 ||\n\t (unsigned char *)e + sizeof(struct arpt_entry) >= limit) {\n\t\tduprintf(\"Bad offset %p\\n\", e);\n\t\treturn -EINVAL;\n\t}\n\n\tif (e->next_offset\n\t < sizeof(struct arpt_entry) + sizeof(struct xt_entry_target)) {\n\t\tduprintf(\"checking: element %p size %u\\n\",\n\t\t\t e, e->next_offset);\n\t\treturn -EINVAL;\n\t}\n\n\terr = check_entry(e);\n\tif (err)\n\t\treturn err;\n\n\t/* Check hooks & underflows */\n\tfor (h = 0; h < NF_ARP_NUMHOOKS; h++) {\n\t\tif (!(valid_hooks & (1 << h)))\n\t\t\tcontinue;\n\t\tif ((unsigned char *)e - base == hook_entries[h])\n\t\t\tnewinfo->hook_entry[h] = hook_entries[h];\n\t\tif ((unsigned char *)e - base == underflows[h]) {\n\t\t\tif (!check_underflow(e)) {\n\t\t\t\tpr_err(\"Underflows must be unconditional and \"\n\t\t\t\t \"use the STANDARD target with \"\n\t\t\t\t \"ACCEPT/DROP\\n\");\n\t\t\t\treturn -EINVAL;\n\t\t\t}\n\t\t\tnewinfo->underflow[h] = underflows[h];\n\t\t}\n\t}\n\n\t/* Clear counters and comefrom */\n\te->counters = ((struct xt_counters) { 0, 0 });\n\te->comefrom = 0;\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1033
  {"code": "get_chainname_rulenum(const struct ip6t_entry *s, const struct ip6t_entry *e,\n\t\t const char *hookname, const char **chainname,\n\t\t const char **comment, unsigned int *rulenum)\n{\n\tconst struct xt_standard_target *t = (void *)ip6t_get_target_c(s);\n\n\tif (strcmp(t->target.u.kernel.target->name, XT_ERROR_TARGET) == 0) {\n\t\t/* Head of user chain: ERROR target with chainname */\n\t\t*chainname = t->target.data;\n\t\t(*rulenum) = 0;\n\t} else if (s == e) {\n\t\t(*rulenum)++;\n\n\t\tif (s->target_offset == sizeof(struct ip6t_entry) &&\n\t\t strcmp(t->target.u.kernel.target->name,\n\t\t\t XT_STANDARD_TARGET) == 0 &&\n\t\t t->verdict < 0 &&\n\t\t unconditional(&s->ipv6)) {\n\t\t\t/* Tail of chains: STANDARD target (return/policy) */\n\t\t\t*comment = *chainname == hookname\n\t\t\t\t? comments[NF_IP6_TRACE_COMMENT_POLICY]\n\t\t\t\t: comments[NF_IP6_TRACE_COMMENT_RETURN];\n\t\t}\n\t\treturn 1;\n\t} else\n\t\t(*rulenum)++;\n\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1034
  {"code": "static inline bool unconditional(const struct ip6t_ip6 *ipv6)\n{\n\tstatic const struct ip6t_ip6 uncond;\n\n\treturn memcmp(ipv6, &uncond, sizeof(uncond)) == 0;\n}", "label_name": "Class", "label": 2}
@@ -1074,7 +1067,6 @@
1074
  {"code": "static int __init xfrm6_tunnel_spi_init(void)\n{\n\txfrm6_tunnel_spi_kmem = kmem_cache_create(\"xfrm6_tunnel_spi\",\n\t\t\t\t\t\t sizeof(struct xfrm6_tunnel_spi),\n\t\t\t\t\t\t 0, SLAB_HWCACHE_ALIGN,\n\t\t\t\t\t\t NULL);\n\tif (!xfrm6_tunnel_spi_kmem)\n\t\treturn -ENOMEM;\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1075
  {"code": "static int iscsi_add_notunderstood_response(\n\tchar *key,\n\tchar *value,\n\tstruct iscsi_param_list *param_list)\n{\n\tstruct iscsi_extra_response *extra_response;\n\n\tif (strlen(value) > VALUE_MAXLEN) {\n\t\tpr_err(\"Value for notunderstood key \\\"%s\\\" exceeds %d,\"\n\t\t\t\" protocol error.\\n\", key, VALUE_MAXLEN);\n\t\treturn -1;\n\t}\n\n\textra_response = kzalloc(sizeof(struct iscsi_extra_response), GFP_KERNEL);\n\tif (!extra_response) {\n\t\tpr_err(\"Unable to allocate memory for\"\n\t\t\t\" struct iscsi_extra_response.\\n\");\n\t\treturn -1;\n\t}\n\tINIT_LIST_HEAD(&extra_response->er_list);\n\n\tstrncpy(extra_response->key, key, strlen(key) + 1);\n\tstrncpy(extra_response->value, NOTUNDERSTOOD,\n\t\t\tstrlen(NOTUNDERSTOOD) + 1);\n\n\tlist_add_tail(&extra_response->er_list,\n\t\t\t&param_list->extra_response_list);\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1076
  {"code": "static long vhost_net_set_backend(struct vhost_net *n, unsigned index, int fd)\n{\n\tstruct socket *sock, *oldsock;\n\tstruct vhost_virtqueue *vq;\n\tstruct vhost_net_virtqueue *nvq;\n\tstruct vhost_net_ubuf_ref *ubufs, *oldubufs = NULL;\n\tint r;\n\n\tmutex_lock(&n->dev.mutex);\n\tr = vhost_dev_check_owner(&n->dev);\n\tif (r)\n\t\tgoto err;\n\n\tif (index >= VHOST_NET_VQ_MAX) {\n\t\tr = -ENOBUFS;\n\t\tgoto err;\n\t}\n\tvq = &n->vqs[index].vq;\n\tnvq = &n->vqs[index];\n\tmutex_lock(&vq->mutex);\n\n\t/* Verify that ring has been setup correctly. */\n\tif (!vhost_vq_access_ok(vq)) {\n\t\tr = -EFAULT;\n\t\tgoto err_vq;\n\t}\n\tsock = get_socket(fd);\n\tif (IS_ERR(sock)) {\n\t\tr = PTR_ERR(sock);\n\t\tgoto err_vq;\n\t}\n\n\t/* start polling new socket */\n\toldsock = rcu_dereference_protected(vq->private_data,\n\t\t\t\t\t lockdep_is_held(&vq->mutex));\n\tif (sock != oldsock) {\n\t\tubufs = vhost_net_ubuf_alloc(vq,\n\t\t\t\t\t sock && vhost_sock_zcopy(sock));\n\t\tif (IS_ERR(ubufs)) {\n\t\t\tr = PTR_ERR(ubufs);\n\t\t\tgoto err_ubufs;\n\t\t}\n\n\t\tvhost_net_disable_vq(n, vq);\n\t\trcu_assign_pointer(vq->private_data, sock);\n\t\tr = vhost_init_used(vq);\n\t\tif (r)\n\t\t\tgoto err_used;\n\t\tr = vhost_net_enable_vq(n, vq);\n\t\tif (r)\n\t\t\tgoto err_used;\n\n\t\toldubufs = nvq->ubufs;\n\t\tnvq->ubufs = ubufs;\n\n\t\tn->tx_packets = 0;\n\t\tn->tx_zcopy_err = 0;\n\t\tn->tx_flush = false;\n\t}\n\n\tmutex_unlock(&vq->mutex);\n\n\tif (oldubufs) {\n\t\tvhost_net_ubuf_put_and_wait(oldubufs);\n\t\tmutex_lock(&vq->mutex);\n\t\tvhost_zerocopy_signal_used(n, vq);\n\t\tmutex_unlock(&vq->mutex);\n\t}\n\n\tif (oldsock) {\n\t\tvhost_net_flush_vq(n, index);\n\t\tfput(oldsock->file);\n\t}\n\n\tmutex_unlock(&n->dev.mutex);\n\treturn 0;\n\nerr_used:\n\trcu_assign_pointer(vq->private_data, oldsock);\n\tvhost_net_enable_vq(n, vq);\n\tif (ubufs)\n\t\tvhost_net_ubuf_put_and_wait(ubufs);\nerr_ubufs:\n\tfput(sock->file);\nerr_vq:\n\tmutex_unlock(&vq->mutex);\nerr:\n\tmutex_unlock(&n->dev.mutex);\n\treturn r;\n}", "label_name": "CWE-399", "label": "CWE-399"}
1077
- {"code": "void *arm_dma_alloc(struct device *dev, size_t size, dma_addr_t *handle,\n\t\t gfp_t gfp, struct dma_attrs *attrs)\n{\n\tpgprot_t prot = __get_dma_pgprot(attrs, pgprot_kernel);\n\tvoid *memory;\n\n\tif (dma_alloc_from_coherent(dev, size, handle, &memory))\n\t\treturn memory;\n\n\treturn __dma_alloc(dev, size, handle, gfp, prot, false,\n\t\t\t __builtin_return_address(0));\n}", "label_name": "CWE-264", "label": "CWE-264"}
1078
  {"code": "static int uio_mmap_physical(struct vm_area_struct *vma)\n{\n\tstruct uio_device *idev = vma->vm_private_data;\n\tint mi = uio_find_mem_index(vma);\n\tif (mi < 0)\n\t\treturn -EINVAL;\n\n\tvma->vm_ops = &uio_physical_vm_ops;\n\n\tvma->vm_page_prot = pgprot_noncached(vma->vm_page_prot);\n\n\treturn remap_pfn_range(vma,\n\t\t\t vma->vm_start,\n\t\t\t idev->info->mem[mi].addr >> PAGE_SHIFT,\n\t\t\t vma->vm_end - vma->vm_start,\n\t\t\t vma->vm_page_prot);\n}", "label_name": "CWE-189", "label": "CWE-189"}
1079
  {"code": "void fput(struct file *file)\n{\n\tif (atomic_long_dec_and_test(&file->f_count)) {\n\t\tstruct task_struct *task = current;\n\n\t\tfile_sb_list_del(file);\n\t\tif (likely(!in_interrupt() && !(task->flags & PF_KTHREAD))) {\n\t\t\tinit_task_work(&file->f_u.fu_rcuhead, ____fput);\n\t\t\tif (!task_work_add(task, &file->f_u.fu_rcuhead, true))\n\t\t\t\treturn;\n\t\t\t/*\n\t\t\t * After this task has run exit_task_work(),\n\t\t\t * task_work_add() will fail. Fall through to delayed\n\t\t\t * fput to avoid leaking *file.\n\t\t\t */\n\t\t}\n\n\t\tif (llist_add(&file->f_u.fu_llist, &delayed_fput_list))\n\t\t\tschedule_work(&delayed_fput_work);\n\t}\n}", "label_name": "CWE-17", "label": "CWE-17"}
1080
  {"code": "void __init files_init(unsigned long mempages)\n{ \n\tunsigned long n;\n\n\tfilp_cachep = kmem_cache_create(\"filp\", sizeof(struct file), 0,\n\t\t\tSLAB_HWCACHE_ALIGN | SLAB_PANIC, NULL);\n\n\t/*\n\t * One file with associated inode and dcache is very roughly 1K.\n\t * Per default don't use more than 10% of our memory for files. \n\t */ \n\n\tn = (mempages * (PAGE_SIZE / 1024)) / 10;\n\tfiles_stat.max_files = max_t(unsigned long, n, NR_FILE);\n\tfiles_defer_init();\n\tlg_lock_init(&files_lglock, \"files_lglock\");\n\tpercpu_counter_init(&nr_files, 0);\n} ", "label_name": "CWE-17", "label": "CWE-17"}
@@ -1098,7 +1090,6 @@
1098
  {"code": "static int rds_ib_laddr_check(__be32 addr)\n{\n\tint ret;\n\tstruct rdma_cm_id *cm_id;\n\tstruct sockaddr_in sin;\n\n\t/* Create a CMA ID and try to bind it. This catches both\n\t * IB and iWARP capable NICs.\n\t */\n\tcm_id = rdma_create_id(NULL, NULL, RDMA_PS_TCP, IB_QPT_RC);\n\tif (IS_ERR(cm_id))\n\t\treturn PTR_ERR(cm_id);\n\n\tmemset(&sin, 0, sizeof(sin));\n\tsin.sin_family = AF_INET;\n\tsin.sin_addr.s_addr = addr;\n\n\t/* rdma_bind_addr will only succeed for IB & iWARP devices */\n\tret = rdma_bind_addr(cm_id, (struct sockaddr *)&sin);\n\t/* due to this, we will claim to support iWARP devices unless we\n\t check node_type. */\n\tif (ret || cm_id->device->node_type != RDMA_NODE_IB_CA)\n\t\tret = -EADDRNOTAVAIL;\n\n\trdsdebug(\"addr %pI4 ret %d node type %d\\n\",\n\t\t&addr, ret,\n\t\tcm_id->device ? cm_id->device->node_type : -1);\n\n\trdma_destroy_id(cm_id);\n\n\treturn ret;\n}", "label_name": "Base", "label": 1}
1099
  {"code": "static int sched_read_attr(struct sched_attr __user *uattr,\n\t\t\t struct sched_attr *attr,\n\t\t\t unsigned int usize)\n{\n\tint ret;\n\n\tif (!access_ok(VERIFY_WRITE, uattr, usize))\n\t\treturn -EFAULT;\n\n\t/*\n\t * If we're handed a smaller struct than we know of,\n\t * ensure all the unknown bits are 0 - i.e. old\n\t * user-space does not get uncomplete information.\n\t */\n\tif (usize < sizeof(*attr)) {\n\t\tunsigned char *addr;\n\t\tunsigned char *end;\n\n\t\taddr = (void *)attr + usize;\n\t\tend = (void *)attr + sizeof(*attr);\n\n\t\tfor (; addr < end; addr++) {\n\t\t\tif (*addr)\n\t\t\t\tgoto err_size;\n\t\t}\n\n\t\tattr->size = usize;\n\t}\n\n\tret = copy_to_user(uattr, attr, usize);\n\tif (ret)\n\t\treturn -EFAULT;\n\nout:\n\treturn ret;\n\nerr_size:\n\tret = -E2BIG;\n\tgoto out;\n}", "label_name": "Class", "label": 2}
1100
  {"code": "static void __net_random_once_deferred(struct work_struct *w)\n{\n\tstruct __net_random_once_work *work =\n\t\tcontainer_of(w, struct __net_random_once_work, work);\n\tif (!static_key_enabled(work->key))\n\t\tstatic_key_slow_inc(work->key);\n\tkfree(work);\n}", "label_name": "Class", "label": 2}
1101
- {"code": "int inode_change_ok(const struct inode *inode, struct iattr *attr)\n{\n\tunsigned int ia_valid = attr->ia_valid;\n\n\t/*\n\t * First check size constraints. These can't be overriden using\n\t * ATTR_FORCE.\n\t */\n\tif (ia_valid & ATTR_SIZE) {\n\t\tint error = inode_newsize_ok(inode, attr->ia_size);\n\t\tif (error)\n\t\t\treturn error;\n\t}\n\n\t/* If force is set do it anyway. */\n\tif (ia_valid & ATTR_FORCE)\n\t\treturn 0;\n\n\t/* Make sure a caller can chown. */\n\tif ((ia_valid & ATTR_UID) &&\n\t (!uid_eq(current_fsuid(), inode->i_uid) ||\n\t !uid_eq(attr->ia_uid, inode->i_uid)) &&\n\t !inode_capable(inode, CAP_CHOWN))\n\t\treturn -EPERM;\n\n\t/* Make sure caller can chgrp. */\n\tif ((ia_valid & ATTR_GID) &&\n\t (!uid_eq(current_fsuid(), inode->i_uid) ||\n\t (!in_group_p(attr->ia_gid) && !gid_eq(attr->ia_gid, inode->i_gid))) &&\n\t !inode_capable(inode, CAP_CHOWN))\n\t\treturn -EPERM;\n\n\t/* Make sure a caller can chmod. */\n\tif (ia_valid & ATTR_MODE) {\n\t\tif (!inode_owner_or_capable(inode))\n\t\t\treturn -EPERM;\n\t\t/* Also check the setgid bit! */\n\t\tif (!in_group_p((ia_valid & ATTR_GID) ? attr->ia_gid :\n\t\t\t\tinode->i_gid) &&\n\t\t !inode_capable(inode, CAP_FSETID))\n\t\t\tattr->ia_mode &= ~S_ISGID;\n\t}\n\n\t/* Check for setting the inode time. */\n\tif (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET | ATTR_TIMES_SET)) {\n\t\tif (!inode_owner_or_capable(inode))\n\t\t\treturn -EPERM;\n\t}\n\n\treturn 0;\n}", "label_name": "CWE-264", "label": "CWE-264"}
1102
  {"code": "mountpoint_last(struct nameidata *nd, struct path *path)\n{\n\tint error = 0;\n\tstruct dentry *dentry;\n\tstruct dentry *dir = nd->path.dentry;\n\n\t/* If we're in rcuwalk, drop out of it to handle last component */\n\tif (nd->flags & LOOKUP_RCU) {\n\t\tif (unlazy_walk(nd, NULL)) {\n\t\t\terror = -ECHILD;\n\t\t\tgoto out;\n\t\t}\n\t}\n\n\tnd->flags &= ~LOOKUP_PARENT;\n\n\tif (unlikely(nd->last_type != LAST_NORM)) {\n\t\terror = handle_dots(nd, nd->last_type);\n\t\tif (error)\n\t\t\tgoto out;\n\t\tdentry = dget(nd->path.dentry);\n\t\tgoto done;\n\t}\n\n\tmutex_lock(&dir->d_inode->i_mutex);\n\tdentry = d_lookup(dir, &nd->last);\n\tif (!dentry) {\n\t\t/*\n\t\t * No cached dentry. Mounted dentries are pinned in the cache,\n\t\t * so that means that this dentry is probably a symlink or the\n\t\t * path doesn't actually point to a mounted dentry.\n\t\t */\n\t\tdentry = d_alloc(dir, &nd->last);\n\t\tif (!dentry) {\n\t\t\terror = -ENOMEM;\n\t\t\tmutex_unlock(&dir->d_inode->i_mutex);\n\t\t\tgoto out;\n\t\t}\n\t\tdentry = lookup_real(dir->d_inode, dentry, nd->flags);\n\t\terror = PTR_ERR(dentry);\n\t\tif (IS_ERR(dentry)) {\n\t\t\tmutex_unlock(&dir->d_inode->i_mutex);\n\t\t\tgoto out;\n\t\t}\n\t}\n\tmutex_unlock(&dir->d_inode->i_mutex);\n\ndone:\n\tif (!dentry->d_inode || d_is_negative(dentry)) {\n\t\terror = -ENOENT;\n\t\tdput(dentry);\n\t\tgoto out;\n\t}\n\tpath->dentry = dentry;\n\tpath->mnt = mntget(nd->path.mnt);\n\tif (should_follow_link(dentry, nd->flags & LOOKUP_FOLLOW))\n\t\treturn 1;\n\tfollow_mount(path);\n\terror = 0;\nout:\n\tterminate_walk(nd);\n\treturn error;\n}", "label_name": "Base", "label": 1}
1103
  {"code": "static int do_new_mount(struct path *path, const char *fstype, int flags,\n\t\t\tint mnt_flags, const char *name, void *data)\n{\n\tstruct file_system_type *type;\n\tstruct user_namespace *user_ns = current->nsproxy->mnt_ns->user_ns;\n\tstruct vfsmount *mnt;\n\tint err;\n\n\tif (!fstype)\n\t\treturn -EINVAL;\n\n\ttype = get_fs_type(fstype);\n\tif (!type)\n\t\treturn -ENODEV;\n\n\tif (user_ns != &init_user_ns) {\n\t\tif (!(type->fs_flags & FS_USERNS_MOUNT)) {\n\t\t\tput_filesystem(type);\n\t\t\treturn -EPERM;\n\t\t}\n\t\t/* Only in special cases allow devices from mounts\n\t\t * created outside the initial user namespace.\n\t\t */\n\t\tif (!(type->fs_flags & FS_USERNS_DEV_MOUNT)) {\n\t\t\tflags |= MS_NODEV;\n\t\t\tmnt_flags |= MNT_NODEV;\n\t\t}\n\t}\n\n\tmnt = vfs_kern_mount(type, flags, name, data);\n\tif (!IS_ERR(mnt) && (type->fs_flags & FS_HAS_SUBTYPE) &&\n\t !mnt->mnt_sb->s_subtype)\n\t\tmnt = fs_set_subtype(mnt, fstype);\n\n\tput_filesystem(type);\n\tif (IS_ERR(mnt))\n\t\treturn PTR_ERR(mnt);\n\n\terr = do_add_mount(real_mount(mnt), path, mnt_flags);\n\tif (err)\n\t\tmntput(mnt);\n\treturn err;\n}", "label_name": "Class", "label": 2}
1104
  {"code": "static struct mount *clone_mnt(struct mount *old, struct dentry *root,\n\t\t\t\t\tint flag)\n{\n\tstruct super_block *sb = old->mnt.mnt_sb;\n\tstruct mount *mnt;\n\tint err;\n\n\tmnt = alloc_vfsmnt(old->mnt_devname);\n\tif (!mnt)\n\t\treturn ERR_PTR(-ENOMEM);\n\n\tif (flag & (CL_SLAVE | CL_PRIVATE | CL_SHARED_TO_SLAVE))\n\t\tmnt->mnt_group_id = 0; /* not a peer of original */\n\telse\n\t\tmnt->mnt_group_id = old->mnt_group_id;\n\n\tif ((flag & CL_MAKE_SHARED) && !mnt->mnt_group_id) {\n\t\terr = mnt_alloc_group_id(mnt);\n\t\tif (err)\n\t\t\tgoto out_free;\n\t}\n\n\tmnt->mnt.mnt_flags = old->mnt.mnt_flags & ~(MNT_WRITE_HOLD|MNT_MARKED);\n\t/* Don't allow unprivileged users to change mount flags */\n\tif ((flag & CL_UNPRIVILEGED) && (mnt->mnt.mnt_flags & MNT_READONLY))\n\t\tmnt->mnt.mnt_flags |= MNT_LOCK_READONLY;\n\n\t/* Don't allow unprivileged users to reveal what is under a mount */\n\tif ((flag & CL_UNPRIVILEGED) && list_empty(&old->mnt_expire))\n\t\tmnt->mnt.mnt_flags |= MNT_LOCKED;\n\n\tatomic_inc(&sb->s_active);\n\tmnt->mnt.mnt_sb = sb;\n\tmnt->mnt.mnt_root = dget(root);\n\tmnt->mnt_mountpoint = mnt->mnt.mnt_root;\n\tmnt->mnt_parent = mnt;\n\tlock_mount_hash();\n\tlist_add_tail(&mnt->mnt_instance, &sb->s_mounts);\n\tunlock_mount_hash();\n\n\tif ((flag & CL_SLAVE) ||\n\t ((flag & CL_SHARED_TO_SLAVE) && IS_MNT_SHARED(old))) {\n\t\tlist_add(&mnt->mnt_slave, &old->mnt_slave_list);\n\t\tmnt->mnt_master = old;\n\t\tCLEAR_MNT_SHARED(mnt);\n\t} else if (!(flag & CL_PRIVATE)) {\n\t\tif ((flag & CL_MAKE_SHARED) || IS_MNT_SHARED(old))\n\t\t\tlist_add(&mnt->mnt_share, &old->mnt_share);\n\t\tif (IS_MNT_SLAVE(old))\n\t\t\tlist_add(&mnt->mnt_slave, &old->mnt_slave);\n\t\tmnt->mnt_master = old->mnt_master;\n\t}\n\tif (flag & CL_MAKE_SHARED)\n\t\tset_mnt_shared(mnt);\n\n\t/* stick the duplicate mount on the same expiry list\n\t * as the original if that was on one */\n\tif (flag & CL_EXPIRE) {\n\t\tif (!list_empty(&old->mnt_expire))\n\t\t\tlist_add(&mnt->mnt_expire, &old->mnt_expire);\n\t}\n\n\treturn mnt;\n\n out_free:\n\tmnt_free_id(mnt);\n\tfree_vfsmnt(mnt);\n\treturn ERR_PTR(err);\n}", "label_name": "Class", "label": 2}
@@ -1206,7 +1197,6 @@
1206
  {"code": "static void test_show_object(struct object *object,\n\t\t\t struct strbuf *path,\n\t\t\t const char *last, void *data)\n{\n\tstruct bitmap_test_data *tdata = data;\n\tint bitmap_pos;\n\n\tbitmap_pos = bitmap_position(object->oid.hash);\n\tif (bitmap_pos < 0)\n\t\tdie(\"Object not in bitmap: %s\\n\", oid_to_hex(&object->oid));\n\n\tbitmap_set(tdata->base, bitmap_pos);\n\tdisplay_progress(tdata->prg, ++tdata->seen);\n}", "label_name": "Class", "label": 2}
1207
  {"code": "static void mark_commit(struct commit *c, void *data)\n{\n\tmark_object(&c->object, NULL, NULL, data);\n}", "label_name": "Class", "label": 2}
1208
  {"code": "static void mark_object(struct object *obj, struct strbuf *path,\n\t\t\tconst char *name, void *data)\n{\n\tupdate_progress(data);\n}", "label_name": "Class", "label": 2}
1209
- {"code": "int cg_write(const char *path, const char *buf, size_t size, off_t offset,\n\t struct fuse_file_info *fi)\n{\n\tstruct fuse_context *fc = fuse_get_context();\n\tchar *localbuf = NULL;\n\tstruct cgfs_files *k = NULL;\n\tstruct file_info *f = (struct file_info *)fi->fh;\n\tbool r;\n\n\tif (f->type != LXC_TYPE_CGFILE) {\n\t\tfprintf(stderr, \"Internal error: directory cache info used in cg_write\\n\");\n\t\treturn -EIO;\n\t}\n\n\tif (offset)\n\t\treturn 0;\n\n\tif (!fc)\n\t\treturn -EIO;\n\n\tlocalbuf = alloca(size+1);\n\tlocalbuf[size] = '\\0';\n\tmemcpy(localbuf, buf, size);\n\n\tif ((k = cgfs_get_key(f->controller, f->cgroup, f->file)) == NULL) {\n\t\tsize = -EINVAL;\n\t\tgoto out;\n\t}\n\n\tif (!fc_may_access(fc, f->controller, f->cgroup, f->file, O_WRONLY)) {\n\t\tsize = -EACCES;\n\t\tgoto out;\n\t}\n\n\tif (strcmp(f->file, \"tasks\") == 0 ||\n\t\t\tstrcmp(f->file, \"/tasks\") == 0 ||\n\t\t\tstrcmp(f->file, \"/cgroup.procs\") == 0 ||\n\t\t\tstrcmp(f->file, \"cgroup.procs\") == 0)\n\t\t// special case - we have to translate the pids\n\t\tr = do_write_pids(fc->pid, f->controller, f->cgroup, f->file, localbuf);\n\telse\n\t\tr = cgfs_set_value(f->controller, f->cgroup, f->file, localbuf);\n\n\tif (!r)\n\t\tsize = -EINVAL;\n\nout:\n\tfree_key(k);\n\treturn size;\n}", "label_name": "CWE-264", "label": "CWE-264"}
1210
  {"code": "static void start_auth_request(PgSocket *client, const char *username)\n{\n\tint res;\n\tPktBuf *buf;\n\n\tclient->auth_user = client->db->auth_user;\n\t/* have to fetch user info from db */\n\tclient->pool = get_pool(client->db, client->db->auth_user);\n\tif (!find_server(client)) {\n\t\tclient->wait_for_user_conn = true;\n\t\treturn;\n\t}\n\tslog_noise(client, \"Doing auth_conn query\");\n\tclient->wait_for_user_conn = false;\n\tclient->wait_for_user = true;\n\tif (!sbuf_pause(&client->sbuf)) {\n\t\trelease_server(client->link);\n\t\tdisconnect_client(client, true, \"pause failed\");\n\t\treturn;\n\t}\n\tclient->link->ready = 0;\n\n\tres = 0;\n\tbuf = pktbuf_dynamic(512);\n\tif (buf) {\n\t\tpktbuf_write_ExtQuery(buf, cf_auth_query, 1, username);\n\t\tres = pktbuf_send_immediate(buf, client->link);\n\t\tpktbuf_free(buf);\n\t\t/*\n\t\t * Should do instead:\n\t\t * res = pktbuf_send_queued(buf, client->link);\n\t\t * but that needs better integration with SBuf.\n\t\t */\n\t}\n\tif (!res)\n\t\tdisconnect_server(client->link, false, \"unable to send login query\");\n}", "label_name": "Class", "label": 2}
1211
  {"code": "static int parse_exports_table(long long *table_start)\n{\n\tint res;\n\tint indexes = SQUASHFS_LOOKUP_BLOCKS(sBlk.s.inodes);\n\tlong long export_index_table[indexes];\n\n\tres = read_fs_bytes(fd, sBlk.s.lookup_table_start,\n\t\tSQUASHFS_LOOKUP_BLOCK_BYTES(sBlk.s.inodes), export_index_table);\n\tif(res == FALSE) {\n\t\tERROR(\"parse_exports_table: failed to read export index table\\n\");\n\t\treturn FALSE;\n\t}\n\tSQUASHFS_INSWAP_LOOKUP_BLOCKS(export_index_table, indexes);\n\n\t/*\n\t * export_index_table[0] stores the start of the compressed export blocks.\n\t * This by definition is also the end of the previous filesystem\n\t * table - the fragment table.\n\t */\n\t*table_start = export_index_table[0];\n\n\treturn TRUE;\n}", "label_name": "Base", "label": 1}
1212
  {"code": "static int jas_iccgetuint(jas_stream_t *in, int n, ulonglong *val)\n{\n\tint i;\n\tint c;\n\tulonglong v;\n\tv = 0;\n\tfor (i = n; i > 0; --i) {\n\t\tif ((c = jas_stream_getc(in)) == EOF)\n\t\t\treturn -1;\n\t\tv = (v << 8) | c;\n\t}\n\t*val = v;\n\treturn 0;\n}", "label_name": "Base", "label": 1}
@@ -1214,7 +1204,6 @@
1214
  {"code": "static int pgx_gethdr(jas_stream_t *in, pgx_hdr_t *hdr)\n{\n\tint c;\n\tuchar buf[2];\n\n\tif ((c = jas_stream_getc(in)) == EOF) {\n\t\tgoto error;\n\t}\n\tbuf[0] = c;\n\tif ((c = jas_stream_getc(in)) == EOF) {\n\t\tgoto error;\n\t}\n\tbuf[1] = c;\n\thdr->magic = buf[0] << 8 | buf[1];\n\tif (hdr->magic != PGX_MAGIC) {\n\t\tjas_eprintf(\"invalid PGX signature\\n\");\n\t\tgoto error;\n\t}\n\tif ((c = pgx_getc(in)) == EOF || !isspace(c)) {\n\t\tgoto error;\n\t}\n\tif (pgx_getbyteorder(in, &hdr->bigendian)) {\n\t\tjas_eprintf(\"cannot get byte order\\n\");\n\t\tgoto error;\n\t}\n\tif (pgx_getsgnd(in, &hdr->sgnd)) {\n\t\tjas_eprintf(\"cannot get signedness\\n\");\n\t\tgoto error;\n\t}\n\tif (pgx_getuint32(in, &hdr->prec)) {\n\t\tjas_eprintf(\"cannot get precision\\n\");\n\t\tgoto error;\n\t}\n\tif (pgx_getuint32(in, &hdr->width)) {\n\t\tjas_eprintf(\"cannot get width\\n\");\n\t\tgoto error;\n\t}\n\tif (pgx_getuint32(in, &hdr->height)) {\n\t\tjas_eprintf(\"cannot get height\\n\");\n\t\tgoto error;\n\t}\n\treturn 0;\n\nerror:\n\treturn -1;\n}", "label_name": "Class", "label": 2}
1215
  {"code": "jp2_box_t *jp2_box_create(int type)\n{\n\tjp2_box_t *box;\n\tjp2_boxinfo_t *boxinfo;\n\n\tif (!(box = jas_malloc(sizeof(jp2_box_t)))) {\n\t\treturn 0;\n\t}\n\tmemset(box, 0, sizeof(jp2_box_t));\n\tbox->type = type;\n\tbox->len = 0;\n\tif (!(boxinfo = jp2_boxinfolookup(type))) {\n\t\treturn 0;\n\t}\n\tbox->info = boxinfo;\n\tbox->ops = &boxinfo->ops;\n\treturn box;\n}", "label_name": "Base", "label": 1}
1216
  {"code": "int jp2_box_put(jp2_box_t *box, jas_stream_t *out)\n{\n\tjas_stream_t *tmpstream;\n\tbool extlen;\n\tbool dataflag;\n\n\ttmpstream = 0;\n\n\tdataflag = !(box->info->flags & (JP2_BOX_SUPER | JP2_BOX_NODATA));\n\n\tif (dataflag) {\n\t\tif (!(tmpstream = jas_stream_memopen(0, 0))) {\n\t\t\tgoto error;\n\t\t}\n\t\tif (box->ops->putdata) {\n\t\t\tif ((*box->ops->putdata)(box, tmpstream)) {\n\t\t\t\tgoto error;\n\t\t\t}\n\t\t}\n\t\tbox->len = jas_stream_tell(tmpstream) + JP2_BOX_HDRLEN(false);\n\t\tjas_stream_rewind(tmpstream);\n\t}\n\textlen = (box->len >= (((uint_fast64_t)1) << 32)) != 0;\n\tif (jp2_putuint32(out, extlen ? 1 : box->len)) {\n\t\tgoto error;\n\t}\n\tif (jp2_putuint32(out, box->type)) {\n\t\tgoto error;\n\t}\n\tif (extlen) {\n\t\tif (jp2_putuint64(out, box->len)) {\n\t\t\tgoto error;\n\t\t}\n\t}\n\n\tif (dataflag) {\n\t\tif (jas_stream_copy(out, tmpstream, box->len - JP2_BOX_HDRLEN(false))) {\n\t\t\tgoto error;\n\t\t}\n\t\tjas_stream_close(tmpstream);\n\t}\n\n\treturn 0;\n\nerror:\n\n\tif (tmpstream) {\n\t\tjas_stream_close(tmpstream);\n\t}\n\treturn -1;\n}", "label_name": "Base", "label": 1}
1217
- {"code": "static int timer_start(Unit *u) {\n Timer *t = TIMER(u);\n TimerValue *v;\n\n assert(t);\n assert(t->state == TIMER_DEAD || t->state == TIMER_FAILED);\n\n if (UNIT_TRIGGER(u)->load_state != UNIT_LOADED)\n return -ENOENT;\n\n t->last_trigger = DUAL_TIMESTAMP_NULL;\n\n /* Reenable all timers that depend on unit activation time */\n LIST_FOREACH(value, v, t->values)\n if (v->base == TIMER_ACTIVE)\n v->disabled = false;\n\n if (t->stamp_path) {\n struct stat st;\n\n if (stat(t->stamp_path, &st) >= 0)\n t->last_trigger.realtime = timespec_load(&st.st_atim);\n else if (errno == ENOENT)\n /* The timer has never run before,\n * make sure a stamp file exists.\n */\n touch_file(t->stamp_path, true, USEC_INFINITY, UID_INVALID, GID_INVALID, 0);\n }\n\n t->result = TIMER_SUCCESS;\n timer_enter_waiting(t, true);\n return 1;\n}", "label_name": "CWE-264", "label": "CWE-264"}
1218
  {"code": "void set_fat(DOS_FS * fs, uint32_t cluster, int32_t new)\n{\n unsigned char *data = NULL;\n int size;\n loff_t offs;\n\n if (new == -1)\n\tnew = FAT_EOF(fs);\n else if ((long)new == -2)\n\tnew = FAT_BAD(fs);\n switch (fs->fat_bits) {\n case 12:\n\tdata = fs->fat + cluster * 3 / 2;\n\toffs = fs->fat_start + cluster * 3 / 2;\n\tif (cluster & 1) {\n\t FAT_ENTRY prevEntry;\n\t get_fat(&prevEntry, fs->fat, cluster - 1, fs);\n\t data[0] = ((new & 0xf) << 4) | (prevEntry.value >> 8);\n\t data[1] = new >> 4;\n\t} else {\n\t FAT_ENTRY subseqEntry;\n\t if (cluster != fs->clusters - 1)\n\t\tget_fat(&subseqEntry, fs->fat, cluster + 1, fs);\n\t else\n\t\tsubseqEntry.value = 0;\n\t data[0] = new & 0xff;\n\t data[1] = (new >> 8) | ((0xff & subseqEntry.value) << 4);\n\t}\n\tsize = 2;\n\tbreak;\n case 16:\n\tdata = fs->fat + cluster * 2;\n\toffs = fs->fat_start + cluster * 2;\n\t*(unsigned short *)data = htole16(new);\n\tsize = 2;\n\tbreak;\n case 32:\n\t{\n\t FAT_ENTRY curEntry;\n\t get_fat(&curEntry, fs->fat, cluster, fs);\n\n\t data = fs->fat + cluster * 4;\n\t offs = fs->fat_start + cluster * 4;\n\t /* According to M$, the high 4 bits of a FAT32 entry are reserved and\n\t * are not part of the cluster number. So we never touch them. */\n\t *(uint32_t *)data = htole32((new & 0xfffffff) |\n\t\t\t\t\t (curEntry.reserved << 28));\n\t size = 4;\n\t}\n\tbreak;\n default:\n\tdie(\"Bad FAT entry size: %d bits.\", fs->fat_bits);\n }\n fs_write(offs, size, data);\n if (fs->nfats > 1) {\n\tfs_write(offs + fs->fat_size, size, data);\n }\n}", "label_name": "CWE-189", "label": "CWE-189"}
1219
  {"code": "static void add_password(AUTH_HDR *request, unsigned char type, CONST char *password, char *secret)\n{\n\tMD5_CTX md5_secret, my_md5;\n\tunsigned char misc[AUTH_VECTOR_LEN];\n\tint i;\n\tint length = strlen(password);\n\tunsigned char hashed[256 + AUTH_PASS_LEN];\t/* can't be longer than this */\n\tunsigned char *vector;\n\tattribute_t *attr;\n\n\tif (length > MAXPASS) {\t\t\t\t/* shorten the password for now */\n\t\tlength = MAXPASS;\n\t}\n\n\tif (length == 0) {\n\t\tlength = AUTH_PASS_LEN;\t\t\t/* 0 maps to 16 */\n\t} if ((length & (AUTH_PASS_LEN - 1)) != 0) {\n\t\tlength += (AUTH_PASS_LEN - 1);\t\t/* round it up */\n\t\tlength &= ~(AUTH_PASS_LEN - 1);\t\t/* chop it off */\n\t}\t\t\t\t\t\t/* 16*N maps to itself */\n\n\tmemset(hashed, 0, length);\n\tmemcpy(hashed, password, strlen(password));\n\n\tattr = find_attribute(request, PW_PASSWORD);\n\n\tif (type == PW_PASSWORD) {\n\t\tvector = request->vector;\n\t} else {\n\t\tvector = attr->data;\t\t\t/* attr CANNOT be NULL here. */\n\t}\n\n\t/* ************************************************************ */\n\t/* encrypt the password */\n\t/* password : e[0] = p[0] ^ MD5(secret + vector) */\n\tMD5Init(&md5_secret);\n\tMD5Update(&md5_secret, (unsigned char *) secret, strlen(secret));\n\tmy_md5 = md5_secret;\t\t\t\t/* so we won't re-do the hash later */\n\tMD5Update(&my_md5, vector, AUTH_VECTOR_LEN);\n\tMD5Final(misc, &my_md5);\t\t\t/* set the final vector */\n\txor(hashed, misc, AUTH_PASS_LEN);\n\n\t/* For each step through, e[i] = p[i] ^ MD5(secret + e[i-1]) */\n\tfor (i = 1; i < (length >> 4); i++) {\n\t\tmy_md5 = md5_secret;\t\t\t/* grab old value of the hash */\n\t\tMD5Update(&my_md5, &hashed[(i-1) * AUTH_PASS_LEN], AUTH_PASS_LEN);\n\t\tMD5Final(misc, &my_md5);\t\t\t/* set the final vector */\n\t\txor(&hashed[i * AUTH_PASS_LEN], misc, AUTH_PASS_LEN);\n\t}\n\n\tif (type == PW_OLD_PASSWORD) {\n\t\tattr = find_attribute(request, PW_OLD_PASSWORD);\n\t}\n\n\tif (!attr) {\n\t\tadd_attribute(request, type, hashed, length);\n\t} else {\n\t\tmemcpy(attr->data, hashed, length); /* overwrite the packet */\n\t}\n}", "label_name": "Base", "label": 1}
1220
  {"code": "ssh_packet_set_postauth(struct ssh *ssh)\n{\n\tstruct sshcomp *comp;\n\tint r, mode;\n\n\tdebug(\"%s: called\", __func__);\n\t/* This was set in net child, but is not visible in user child */\n\tssh->state->after_authentication = 1;\n\tssh->state->rekeying = 0;\n\tfor (mode = 0; mode < MODE_MAX; mode++) {\n\t\tif (ssh->state->newkeys[mode] == NULL)\n\t\t\tcontinue;\n\t\tcomp = &ssh->state->newkeys[mode]->comp;\n\t\tif (comp && comp->enabled &&\n\t\t (r = ssh_packet_init_compression(ssh)) != 0)\n\t\t\treturn r;\n\t}\n\treturn 0;\n}", "label_name": "Class", "label": 2}
@@ -1390,8 +1379,6 @@
1390
  {"code": " def get_mime_for_format(self, format):\n \"\"\"\n Given a format, attempts to determine the correct MIME type.\n \n If not available on the current ``Serializer``, returns\n ``application/json`` by default.\n \"\"\"\n try:\n return self.content_types[format]\n except KeyError:\n return 'application/json'", "label_name": "Class", "label": 2}
1391
  {"code": " def format_datetime(self, data):\n \"\"\"\n A hook to control how datetimes are formatted.\n \n Can be overridden at the ``Serializer`` level (``datetime_formatting``)\n or globally (via ``settings.TASTYPIE_DATETIME_FORMATTING``).\n \n Default is ``iso-8601``, which looks like \"2010-12-16T03:02:14\".\n \"\"\"\n if self.datetime_formatting == 'rfc-2822':\n return format_datetime(data)\n \n return data.isoformat()", "label_name": "Class", "label": 2}
1392
  {"code": " def _download_file(bucket, filename, local_dir):\n key = bucket.get_key(filename)\n local_filename = os.path.join(local_dir, filename)\n key.get_contents_to_filename(local_filename)\n return local_filename", "label_name": "Base", "label": 1}
1393
- {"code": " def test_quotas_update_as_user(self):\n body = {'quota_class_set': {'instances': 50, 'cores': 50,\n 'ram': 51200, 'volumes': 10,\n 'gigabytes': 1000, 'floating_ips': 10,\n 'metadata_items': 128, 'injected_files': 5,\n 'injected_file_content_bytes': 10240}}\n\n req = fakes.HTTPRequest.blank(\n '/v2/fake4/os-quota-class-sets/test_class')\n self.assertRaises(webob.exc.HTTPForbidden, self.controller.update,\n req, 'test_class', body)", "label_name": "CWE-264", "label": "CWE-264"}
1394
- {"code": "def _inject_key_into_fs(key, fs, execute=None):\n \"\"\"Add the given public ssh key to root's authorized_keys.\n\n key is an ssh key string.\n fs is the path to the base of the filesystem into which to inject the key.\n \"\"\"\n sshdir = os.path.join(fs, 'root', '.ssh')\n utils.execute('mkdir', '-p', sshdir, run_as_root=True)\n utils.execute('chown', 'root', sshdir, run_as_root=True)\n utils.execute('chmod', '700', sshdir, run_as_root=True)\n keyfile = os.path.join(sshdir, 'authorized_keys')\n key_data = [\n '\\n',\n '# The following ssh key was injected by Nova',\n '\\n',\n key.strip(),\n '\\n',\n ]\n utils.execute('tee', '-a', keyfile,\n process_input=''.join(key_data), run_as_root=True)", "label_name": "CWE-264", "label": "CWE-264"}
1395
  {"code": " def host_passes(self, host_state, filter_properties):\n context = filter_properties['context']\n scheduler_hints = filter_properties.get('scheduler_hints') or {}\n me = host_state.host\n\n affinity_uuids = scheduler_hints.get('different_host', [])\n if isinstance(affinity_uuids, basestring):\n affinity_uuids = [affinity_uuids]\n if affinity_uuids:\n return not any([i for i in affinity_uuids\n if self._affinity_host(context, i) == me])\n # With no different_host key\n return True", "label_name": "Class", "label": 2}
1396
  {"code": "def logout(request):\n \"\"\" Clears the session and logs the current user out. \"\"\"\n request.session.clear()\n # FIXME(gabriel): we don't ship a view named splash\n return shortcuts.redirect('splash')", "label_name": "NVD-CWE-Other", "label": "NVD-CWE-Other"}
1397
  {"code": " def get_multi(self, keys, server_key):\n \"\"\"\n Gets multiple values from memcache for the given keys.\n\n :param keys: keys for values to be retrieved from memcache\n :param servery_key: key to use in determining which server in the ring\n is used\n :returns: list of values\n \"\"\"\n server_key = md5hash(server_key)\n keys = [md5hash(key) for key in keys]\n for (server, fp, sock) in self._get_conns(server_key):\n try:\n sock.sendall('get %s\\r\\n' % ' '.join(keys))\n line = fp.readline().strip().split()\n responses = {}\n while line[0].upper() != 'END':\n if line[0].upper() == 'VALUE':\n size = int(line[3])\n value = fp.read(size)\n if int(line[2]) & PICKLE_FLAG:\n value = pickle.loads(value)\n responses[line[1]] = value\n fp.readline()\n line = fp.readline().strip().split()\n values = []\n for key in keys:\n if key in responses:\n values.append(responses[key])\n else:\n values.append(None)\n self._return_conn(server, fp, sock)\n return values\n except Exception, e:\n self._exception_occurred(server, e)", "label_name": "Base", "label": 1}
@@ -1522,8 +1509,6 @@
1522
  {"code": "def format_errormsg(message: str) -> str:\n \"\"\"Match account names in error messages and insert HTML links for them.\"\"\"\n match = re.search(ACCOUNT_RE, message)\n if not match:\n return message\n account = match.group()\n url = flask.url_for(\"account\", name=account)\n return (\n message.replace(account, f'<a href=\"{url}\">{account}</a>')\n .replace(\"for '\", \"for \")\n .replace(\"': \", \": \")\n )", "label_name": "Base", "label": 1}
1523
  {"code": "def _get_obj_absolute_path(obj_path):\n return os.path.join(DATAROOT, obj_path)", "label_name": "Base", "label": 1}
1524
  {"code": "def get_object_src_http(dataset, rel_path):\n path = _get_obj_abosolute_path(dataset, rel_path)\n response = send_file(path,\n cache_timeout=datetime.timedelta(\n days=365).total_seconds(),\n add_etags=True,\n conditional=True)\n return response", "label_name": "Base", "label": 1}
1525
- {"code": " public SAXParser newSAXParser() throws ParserConfigurationException {\n final SAXParser ret;\n try {\n ret = new XercesJAXPSAXParser(this, features, validating, handleXInclude);\n } catch (final SAXException se) {\n // Translate to ParserConfigurationException\n throw new OXFException(se); // so we see a decent stack trace!\n// throw new ParserConfigurationException(se.getMessage());\n }\n return ret;\n }", "label_name": "CWE-264", "label": "CWE-264"}
1526
- {"code": "\tpublic Template getTemplate(\n\t\tString templateId, String templateContent, String errorTemplateId,\n\t\tString errorTemplateContent, TemplateContextType templateContextType) {\n\n\t\tif (templateContextType.equals(TemplateContextType.EMPTY)) {\n\t\t\treturn new FreeMarkerTemplate(\n\t\t\t\t\ttemplateId, templateContent, errorTemplateId,\n\t\t\t\t\terrorTemplateContent, null, _configuration,\n\t\t\t\t\t_templateContextHelper, _stringTemplateLoader);\n\t\t}\n\t\telse if (templateContextType.equals(TemplateContextType.RESTRICTED)) {\n\t\t\treturn new RestrictedTemplate(\n\t\t\t\tnew FreeMarkerTemplate(\n\t\t\t\t\ttemplateId, templateContent, errorTemplateId,\n\t\t\t\t\terrorTemplateContent, _restrictedHelperUtilities,\n\t\t\t\t\t_configuration, _templateContextHelper,\n\t\t\t\t\t_stringTemplateLoader),\n\t\t\t\t_templateContextHelper.getRestrictedVariables());\n\t\t}\n\t\telse if (templateContextType.equals(TemplateContextType.STANDARD)) {\n\t\t\treturn new FreeMarkerTemplate(\n\t\t\t\ttemplateId, templateContent, errorTemplateId,\n\t\t\t\terrorTemplateContent, _standardHelperUtilities, _configuration,\n\t\t\t\t_templateContextHelper, _stringTemplateLoader);\n\t\t}\n\n\t\treturn null;\n\t}", "label_name": "CWE-264", "label": "CWE-264"}
1527
  {"code": " private SecretKey getKey() {\n try {\n if (secret==null) {\n synchronized (this) {\n if (secret==null) {\n byte[] payload = load();\n if (payload==null) {\n payload = ConfidentialStore.get().randomBytes(256);\n store(payload);\n }\n // Due to the stupid US export restriction JDK only ships 128bit version.\n secret = new SecretKeySpec(payload,0,128/8, ALGORITHM);\n }\n }\n }\n return secret;\n } catch (IOException e) {\n throw new Error(\"Failed to load the key: \"+getId(),e);\n }\n }", "label_name": "Class", "label": 2}
1528
  {"code": " private boolean exractAndLoad(ArrayList<String> errors, String version, String customPath, String resourcePath) {\n URL resource = classLoader.getResource(resourcePath);\n if( resource !=null ) {\n \n String libName = name + \"-\" + getBitModel();\n if( version !=null) {\n libName += \"-\" + version;\n }\n \n if( customPath!=null ) {\n // Try to extract it to the custom path...\n File target = file(customPath, map(libName));\n if( extract(errors, resource, target) ) {\n if( load(errors, target) ) {\n return true;\n }\n }\n }\n \n // Fall back to extracting to the tmp dir\n customPath = System.getProperty(\"java.io.tmpdir\");\n File target = file(customPath, map(libName));\n if( extract(errors, resource, target) ) {\n if( load(errors, target) ) {\n return true;\n }\n }\n }\n return false;\n }", "label_name": "Base", "label": 1}
1529
  {"code": " public void onSubmit()\n {\n final String sessionCsrfToken = getCsrfSessionToken();\n final String postedCsrfToken = this.csrfTokenField.getInput();\n if (StringUtils.equals(sessionCsrfToken, postedCsrfToken) == false) {\n log.error(\"Cross site request forgery alert. csrf token doesn't match! session csrf token=\"\n + sessionCsrfToken\n + \", posted csrf token=\"\n + postedCsrfToken);\n throw new InternalErrorException(\"errorpage.csrfError\");\n }\n }", "label_name": "Compound", "label": 4}
@@ -1533,7 +1518,6 @@
1533
  {"code": " private static int findNonWhitespace(AppendableCharSequence sb, int offset, boolean validateOWS) {\n for (int result = offset; result < sb.length(); ++result) {\n char c = sb.charAtUnsafe(result);\n if (!Character.isWhitespace(c)) {\n return result;\n } else if (validateOWS && !isOWS(c)) {\n // Only OWS is supported for whitespace\n throw new IllegalArgumentException(\"Invalid separator, only a single space or horizontal tab allowed,\" +\n \" but received a '\" + c + \"' (0x\" + Integer.toHexString(c) + \")\");\n }\n }\n return sb.length();\n }", "label_name": "Base", "label": 1}
1534
  {"code": " private static void testInvalidHeaders0(String requestStr) {\n EmbeddedChannel channel = new EmbeddedChannel(new HttpRequestDecoder());\n assertTrue(channel.writeInbound(Unpooled.copiedBuffer(requestStr, CharsetUtil.US_ASCII)));\n HttpRequest request = channel.readInbound();\n assertTrue(request.decoderResult().isFailure());\n assertTrue(request.decoderResult().cause() instanceof IllegalArgumentException);\n assertFalse(channel.finish());\n }", "label_name": "Base", "label": 1}
1535
  {"code": " protected final String constructValidationUrl(final String ticket, final String serviceUrl) {\n final Map<String, String> urlParameters = new HashMap<String, String>();\n\n logger.debug(\"Placing URL parameters in map.\");\n urlParameters.put(\"ticket\", ticket);\n urlParameters.put(\"service\", encodeUrl(serviceUrl));\n\n if (this.renew) {\n urlParameters.put(\"renew\", \"true\");\n }\n\n logger.debug(\"Calling template URL attribute map.\");\n populateUrlAttributeMap(urlParameters);\n\n logger.debug(\"Loading custom parameters from configuration.\");\n if (this.customParameters != null) {\n urlParameters.putAll(this.customParameters);\n }\n\n final String suffix = getUrlSuffix();\n final StringBuilder buffer = new StringBuilder(urlParameters.size() * 10 + this.casServerUrlPrefix.length()\n + suffix.length() + 1);\n\n int i = 0;\n\n buffer.append(this.casServerUrlPrefix);\n if (!this.casServerUrlPrefix.endsWith(\"/\")) {\n buffer.append(\"/\");\n }\n buffer.append(suffix);\n\n for (Map.Entry<String, String> entry : urlParameters.entrySet()) {\n final String key = entry.getKey();\n final String value = entry.getValue();\n\n if (value != null) {\n buffer.append(i++ == 0 ? \"?\" : \"&\");\n buffer.append(key);\n buffer.append(\"=\");\n buffer.append(value);\n }\n }\n\n return buffer.toString();\n\n }", "label_name": "Class", "label": 2}
1536
- {"code": " private ServletFileUpload getServletFileUpload() {\n FileItemFactory factory = new DiskFileItemFactory();\n ServletFileUpload upload = new ServletFileUpload(factory);\n upload.setHeaderEncoding(\"UTF-8\");\n return upload;\n }", "label_name": "CWE-264", "label": "CWE-264"}
1537
  {"code": " protected OHttpSessionManager() {\r\n expirationTime = OGlobalConfiguration.NETWORK_HTTP_SESSION_EXPIRE_TIMEOUT.getValueAsInteger() * 1000;\r\n\r\n Orient.instance().scheduleTask(new TimerTask() {\r\n @Override\r\n public void run() {\r\n final int expired = checkSessionsValidity();\r\n if (expired > 0)\r\n OLogManager.instance().debug(this, \"Removed %d session because expired\", expired);\r\n }\r\n }, expirationTime, expirationTime);\r\n }\r", "label_name": "Class", "label": 2}
1538
  {"code": " public int getExpirationTime() {\r\n return expirationTime;\r\n }\r", "label_name": "Class", "label": 2}
1539
  {"code": " protected boolean isProbablePrime(BigInteger x, int iterations)\n {\n /*\n * Primes class for FIPS 186-4 C.3 primality checking\n */\n return !Primes.hasAnySmallFactors(x) && Primes.isMRProbablePrime(x, param.getRandom(), iterations);\n }", "label_name": "Class", "label": 2}
@@ -1780,11 +1764,9 @@
1780
  {"code": " it \"should raise a warning (and keep parsing) on having an incorrectly formatted header\" do\n STDERR.should_receive(:puts).with(\"WARNING: Could not parse (and so ignoring) 'quite Delivered-To: [email protected]'\")\n Mail.read(fixture('emails', 'plain_emails', 'raw_email_incorrect_header.eml'))\n end", "label_name": "Base", "label": 1}
1781
  {"code": " def match?(name, ip)\n ip? ? pattern.include?(IPAddr.new(ip)) : matchname?(name)\n end", "label_name": "Class", "label": 2}
1782
  {"code": " def split_path(request)\n # Reparse the configuration if necessary.\n readconfig\n\n mount_name, path = request.key.split(File::Separator, 2)\n\n raise(ArgumentError, \"Cannot find file: Invalid path '#{mount_name}'\") unless mount_name =~ %r{^[-\\w]+$}\n\n return nil unless mount = find_mount(mount_name, request.environment)\n if mount.name == \"modules\" and mount_name != \"modules\"\n # yay backward-compatibility\n path = \"#{mount_name}/#{path}\"\n end\n\n if path == \"\"\n path = nil\n elsif path\n # Remove any double slashes that might have occurred\n path = path.gsub(/\\/+/, \"/\")\n end\n\n return mount, path\n end", "label_name": "Class", "label": 2}
1783
- {"code": " it \"should pass the provided CSR as the CSR\" do\n Puppet::SSL::CertificateFactory.expects(:build).with do |*args|\n args[1] == @request\n end.returns \"my real cert\"\n @ca.sign(@name, :ca, @request)\n end", "label_name": "CWE-264", "label": "CWE-264"}
1784
  {"code": " def test_update_valid\n Domain.any_instance.stubs(:valid?).returns(true)\n put :update, {:id => Domain.first.to_param, :domain => {:name => Domain.first.name }}, set_session_user\n assert_redirected_to domains_url\n end", "label_name": "Class", "label": 2}
1785
  {"code": " def test_clone\n get :clone, {:id => Hostgroup.first}, set_session_user\n assert_template 'new'\n end", "label_name": "Class", "label": 2}
1786
  {"code": " def test_update_valid\n Realm.any_instance.stubs(:valid?).returns(true)\n put :update, {:id => Realm.first.name,\n :realm => { :realm_proxy_id => SmartProxy.first.id } }, set_session_user\n assert_equal SmartProxy.first.id, Realm.first.realm_proxy_id\n assert_redirected_to realms_url\n end", "label_name": "Class", "label": 2}
1787
- {"code": " it 'should handle yaml automatically' do\n yaml = \"books: \\n book: \\n name: Foo Bar!\\n id: \\\"1234\\\"\\n\"\n @request.options[:format] = :yaml\n @request.send(:parse_response, yaml).should == {'books' => {'book' => {'id' => '1234', 'name' => 'Foo Bar!'}}}\n end", "label_name": "CWE-264", "label": "CWE-264"}
1788
  {"code": " def self.generate_key_pair(key_base_name, recipient, real_name)\n public_key_file_name = \"#{key_base_name}.pub\"\n private_key_file_name = \"#{key_base_name}.sec\"\n script = generate_key_script(public_key_file_name, private_key_file_name, recipient, real_name)\n script_file = Tempfile.new('gpg-script')\n begin\n script_file.write(script)\n script_file.close\n result = system(\"gpg --batch --gen-key #{script_file.path}\")\n raise RuntimeError.new('gpg failed') unless result\n ensure\n script_file.close\n script_file.unlink\n end\n end", "label_name": "Base", "label": 1}
1789
  {"code": " it \"should find a user by first name or last name\" do\n @cur_user.stub(:pref).and_return(:activity_user => 'Billy')\n controller.instance_variable_set(:@current_user, @cur_user)\n User.should_receive(:where).with(\"upper(first_name) LIKE upper('%Billy%') OR upper(last_name) LIKE upper('%Billy%')\").and_return([@user])\n controller.send(:activity_user).should == 1\n end", "label_name": "Base", "label": 1}
1790
  {"code": " def tmp_dir\n ENV['TMPDIR'] || ENV['TEMP'] || '/tmp'\n end", "label_name": "CWE-310", "label": "CWE-310"}
@@ -1873,7 +1855,6 @@
1873
  {"code": " it \"should return a 403 if a user attempts to get at the _diagnostics path\" do\n get \"/message-bus/_diagnostics\"\n last_response.status.must_equal 403\n end", "label_name": "Base", "label": 1}
1874
  {"code": " def resolve_target_path(target, reader)\n return target if target_uri? target\n\n # Include file is resolved relative to dir of the current include,\n # or base_dir if within original docfile.\n path = reader.document.normalize_system_path(target, reader.dir, nil,\n target_name: 'include file')\n path if ::File.file?(path)\n end", "label_name": "Base", "label": 1}
1875
  {"code": "func canonicalMIMEHeaderKey(a []byte) string {\n\tupper := true\n\tfor i, c := range a {\n\t\t// Canonicalize: first letter upper case\n\t\t// and upper case after each dash.\n\t\t// (Host, User-Agent, If-Modified-Since).\n\t\t// MIME headers are ASCII only, so no Unicode issues.\n\t\tif c == ' ' {\n\t\t\tc = '-'\n\t\t} else if upper && 'a' <= c && c <= 'z' {\n\t\t\tc -= toLower\n\t\t} else if !upper && 'A' <= c && c <= 'Z' {\n\t\t\tc += toLower\n\t\t}\n\t\ta[i] = c\n\t\tupper = c == '-' // for next time\n\t}\n\t// The compiler recognizes m[string(byteSlice)] as a special\n\t// case, so a copy of a's bytes into a new string does not\n\t// happen in this map lookup:\n\tif v := commonHeader[string(a)]; v != \"\" {\n\t\treturn v\n\t}\n\treturn string(a)\n}", "label_name": "Base", "label": 1}
1876
- {"code": "\tusers, err := ParsePasswdFilter(passwd, func(u User) bool {\n\t\tif userArg == \"\" {\n\t\t\treturn u.Uid == user.Uid\n\t\t}\n\t\treturn u.Name == userArg || strconv.Itoa(u.Uid) == userArg\n\t})", "label_name": "CWE-264", "label": "CWE-264"}
1877
  {"code": "func (c *linuxContainer) newSetnsProcess(p *Process, cmd *exec.Cmd, messageSockPair, logFilePair filePair) (*setnsProcess, error) {\n\tcmd.Env = append(cmd.Env, \"_LIBCONTAINER_INITTYPE=\"+string(initSetns))\n\tstate, err := c.currentState()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to get container state: %w\", err)\n\t}\n\t// for setns process, we don't have to set cloneflags as the process namespaces\n\t// will only be set via setns syscall\n\tdata, err := c.bootstrapData(0, state.NamespacePaths)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tproc := &setnsProcess{\n\t\tcmd: cmd,\n\t\tcgroupPaths: state.CgroupPaths,\n\t\trootlessCgroups: c.config.RootlessCgroups,\n\t\tintelRdtPath: state.IntelRdtPath,\n\t\tmessageSockPair: messageSockPair,\n\t\tlogFilePair: logFilePair,\n\t\tmanager: c.cgroupManager,\n\t\tconfig: c.newInitConfig(p),\n\t\tprocess: p,\n\t\tbootstrapData: data,\n\t\tinitProcessPid: state.InitProcessPid,\n\t}\n\tif len(p.SubCgroupPaths) > 0 {\n\t\tif add, ok := p.SubCgroupPaths[\"\"]; ok {\n\t\t\t// cgroup v1: using the same path for all controllers.\n\t\t\t// cgroup v2: the only possible way.\n\t\t\tfor k := range proc.cgroupPaths {\n\t\t\t\tproc.cgroupPaths[k] = path.Join(proc.cgroupPaths[k], add)\n\t\t\t}\n\t\t\t// cgroup v2: do not try to join init process's cgroup\n\t\t\t// as a fallback (see (*setnsProcess).start).\n\t\t\tproc.initProcessPid = 0\n\t\t} else {\n\t\t\t// Per-controller paths.\n\t\t\tfor ctrl, add := range p.SubCgroupPaths {\n\t\t\t\tif val, ok := proc.cgroupPaths[ctrl]; ok {\n\t\t\t\t\tproc.cgroupPaths[ctrl] = path.Join(val, add)\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, fmt.Errorf(\"unknown controller %s in SubCgroupPaths\", ctrl)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn proc, nil\n}", "label_name": "Base", "label": 1}
1878
  {"code": "func TestTruncatedCiphertext(t *testing.T) {\n\tkey := make([]byte, 32)\n\tnonce := make([]byte, 16)\n\tdata := make([]byte, 32)\n\n\tio.ReadFull(rand.Reader, key)\n\tio.ReadFull(rand.Reader, nonce)\n\n\taead, err := NewCBCHMAC(key, aes.NewCipher)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tctx := aead.(*cbcAEAD)\n\tct := aead.Seal(nil, nonce, data, nil)\n\n\t// Truncated ciphertext, but with correct auth tag\n\ttruncated, tail := resize(ct[:len(ct)-ctx.authtagBytes-2], len(ct)-2)\n\tcopy(tail, ctx.computeAuthTag(nil, nonce, truncated[:len(truncated)-ctx.authtagBytes]))\n\n\t// Open should fail\n\t_, err = aead.Open(nil, nonce, truncated, nil)\n\tif err == nil {\n\t\tt.Error(\"open on truncated ciphertext should fail\")\n\t}\n}", "label_name": "Base", "label": 1}
1879
  {"code": "func (cs chunkState) String() string {\n\tstateString := \"\"\n\tswitch cs {\n\tcase readChunkHeader:\n\t\tstateString = \"readChunkHeader\"\n\tcase readChunkTrailer:\n\t\tstateString = \"readChunkTrailer\"\n\tcase readChunk:\n\t\tstateString = \"readChunk\"\n\tcase verifyChunk:\n\t\tstateString = \"verifyChunk\"\n\tcase eofChunk:\n\t\tstateString = \"eofChunk\"\n\n\t}\n\treturn stateString\n}", "label_name": "Base", "label": 1}
 
7
  {"code": "\tfunction updateCommandCategorieInDB(){\n\t\tglobal $pearDB;\n\t\t\n\t\t$DBRESULT = $pearDB->query(\"UPDATE `command_categories` SET `category_name` = '\".$_POST[\"category_name\"].\"' , `category_alias` = '\".$_POST[\"category_alias\"].\"' , `category_order` = '\".$_POST[\"category_order\"].\"' WHERE `cmd_category_id` = '\".$_POST[\"cmd_category_id\"].\"'\");\n\t}", "label_name": "Base", "label": 1}
8
  {"code": "\tfunction testCommandCategorieExistence ($name = NULL)\t{\n\t\tglobal $pearDB, $form;\n\t\t$id = NULL;\n\t\t\n\t\tif (isset($form))\n\t\t\t$id = $form->getSubmitValue('cmd_category_id');\n\t\t\n\t\t$DBRESULT = $pearDB->query(\"SELECT `category_name`, `cmd_category_id` FROM `command_categories` WHERE `category_name` = '\".htmlentities($name, ENT_QUOTES, \"UTF-8\").\"'\");\n\t\t$cat = $DBRESULT->fetchRow();\n\t\t\n\t\tif ($DBRESULT->numRows() >= 1 && $cat[\"cmd_category_id\"] == $id)\n\t\t\treturn true;\n\t\telse if ($DBRESULT->numRows() >= 1 && $cat[\"cmd_category_id\"] != $id)\n\t\t\treturn false;\n\t\telse\n\t\t\treturn true;\n\t}", "label_name": "Base", "label": 1}
9
  {"code": "function getTypes($subtype=\"both\") {\n\t$types = array(\"users\" => array(),\n\t \"resources\" => array());\n\tif($subtype == \"users\" || $subtype == \"both\") {\n\t\t$query = \"SELECT id, name FROM userprivtype\";\n\t\t$qh = doQuery($query, 365);\n\t\twhile($row = mysql_fetch_assoc($qh)) {\n\t\t\tif($row[\"name\"] == \"block\" || $row[\"name\"] == \"cascade\")\n\t\t\t\tcontinue;\n\t\t\t$types[\"users\"][$row[\"id\"]] = $row[\"name\"];\n\t\t}\n\t}\n\tif($subtype == \"resources\" || $subtype == \"both\") {\n\t\t$query = \"SELECT id, name FROM resourcetype\";\n\t\t$qh = doQuery($query, 366);\n\t\twhile($row = mysql_fetch_assoc($qh)) {\n\t\t\tif($row[\"name\"] == \"block\" || $row[\"name\"] == \"cascade\")\n\t\t\t\tcontinue;\n\t\t\t$types[\"resources\"][$row[\"id\"]] = $row[\"name\"];\n\t\t}\n\t}\n\treturn $types;\n}", "label_name": "Class", "label": 2}
 
10
  {"code": "function XMLRPCtest($string) {\n\t$string = processInputData($string, ARG_STRING);\n\treturn array('status' => 'success',\n\t 'message' => 'RPC call worked successfully',\n\t 'string' => $string);\n}", "label_name": "Class", "label": 2}
11
  {"code": "function XMLRPCblockAllocation($imageid, $start, $end, $numMachines,\n $usergroupid, $ignoreprivileges=0) {\n\tglobal $user, $xmlrpcBlockAPIUsers;\n\tif(! in_array($user['id'], $xmlrpcBlockAPIUsers)) {\n\t\treturn array('status' => 'error',\n\t\t 'errorcode' => 34,\n\t\t 'errormsg' => 'access denied for managing block allocations');\n\t}\n\t$ownerid = getUserlistID('vclreload@Local');\n\t$name = \"API:$start\";\n\t$managementnodes = getManagementNodes('future');\n\tif(empty($managementnodes)) {\n\t\treturn array('status' => 'error',\n\t\t 'errorcode' => 12,\n\t\t 'errormsg' => 'could not allocate a management node to handle block allocation');\n\t}\n\t$mnid = array_rand($managementnodes);\n\t$query = \"INSERT INTO blockRequest \"\n\t . \"(name, \"\n\t . \"imageid, \"\n\t . \"numMachines, \"\n\t . \"groupid, \"\n\t . \"repeating, \"\n\t . \"ownerid, \"\n\t . \"admingroupid, \"\n\t . \"managementnodeid, \"\n\t . \"expireTime, \"\n\t . \"status) \"\n\t . \"VALUES \"\n\t . \"('$name', \"\n\t . \"$imageid, \"\n\t . \"$numMachines, \"\n\t . \"$usergroupid, \"\n\t . \"'list', \"\n\t . \"$ownerid, \"\n\t . \"0, \"\n\t . \"$mnid, \"\n\t . \"'$end', \"\n\t . \"'accepted')\";\n\tdoQuery($query, 101);\n\t$brid = dbLastInsertID();\n\t$query = \"INSERT INTO blockTimes \"\n\t . \"(blockRequestid, \"\n\t . \"start, \"\n\t . \"end) \"\n\t . \"VALUES \"\n\t . \"($brid, \"\n\t . \"'$start', \"\n\t . \"'$end')\";\n\tdoQuery($query, 101);\n\t$btid = dbLastInsertID();\n\t$return = XMLRPCprocessBlockTime($btid, $ignoreprivileges);\n\t$return['blockTimesid'] = $btid;\n\treturn $return;\n}", "label_name": "Class", "label": 2}
 
 
12
  {"code": "function XMLRPCendRequest($requestid) {\n\tglobal $user;\n\t$requestid = processInputData($requestid, ARG_NUMERIC);\n\t$userRequests = getUserRequests('all', $user['id']);\n\t$found = 0;\n\tforeach($userRequests as $req) {\n\t\tif($req['id'] == $requestid) {\n\t\t\t$request = getRequestInfo($requestid);\n\t\t\t$found = 1;\n\t\t\tbreak;\n\t\t}\n\t}\n\tif(! $found)\n\t\treturn array('status' => 'error',\n\t\t 'errorcode' => 1,\n\t\t 'errormsg' => 'unknown requestid');\n\n\tdeleteRequest($request);\n\treturn array('status' => 'success');\n}", "label_name": "Class", "label": 2}
13
  {"code": " public function __construct($app = null)\n {\n if (is_object($app)) {\n $this->app = $app;\n } else {\n $this->app = mw();\n }\n\n $coupon_code = $this->app->user_manager->session_get('coupon_code');\n $this->coupon_data = coupon_get_by_code($coupon_code);\n }", "label_name": "NVD-CWE-Other", "label": "NVD-CWE-Other"}
14
  {"code": " public function edit(Request $request, $id) {\n\n return $this->view('product::admin.product.edit', [\n 'content_id'=>$id\n ]);\n }", "label_name": "Base", "label": 1}
 
1014
  {"code": "static int crypto_givcipher_report(struct sk_buff *skb, struct crypto_alg *alg)\n{\n\tstruct crypto_report_blkcipher rblkcipher;\n\n\tsnprintf(rblkcipher.type, CRYPTO_MAX_ALG_NAME, \"%s\", \"givcipher\");\n\tsnprintf(rblkcipher.geniv, CRYPTO_MAX_ALG_NAME, \"%s\",\n\t\t alg->cra_ablkcipher.geniv ?: \"<built-in>\");\n\n\trblkcipher.blocksize = alg->cra_blocksize;\n\trblkcipher.min_keysize = alg->cra_ablkcipher.min_keysize;\n\trblkcipher.max_keysize = alg->cra_ablkcipher.max_keysize;\n\trblkcipher.ivsize = alg->cra_ablkcipher.ivsize;\n\n\tif (nla_put(skb, CRYPTOCFGA_REPORT_BLKCIPHER,\n\t\t sizeof(struct crypto_report_blkcipher), &rblkcipher))\n\t\tgoto nla_put_failure;\n\treturn 0;\n\nnla_put_failure:\n\treturn -EMSGSIZE;\n}", "label_name": "CWE-310", "label": "CWE-310"}
1015
  {"code": "static int crypto_aead_report(struct sk_buff *skb, struct crypto_alg *alg)\n{\n\tstruct crypto_report_aead raead;\n\tstruct aead_alg *aead = &alg->cra_aead;\n\n\tsnprintf(raead.type, CRYPTO_MAX_ALG_NAME, \"%s\", \"aead\");\n\tsnprintf(raead.geniv, CRYPTO_MAX_ALG_NAME, \"%s\",\n\t\t aead->geniv ?: \"<built-in>\");\n\n\traead.blocksize = alg->cra_blocksize;\n\traead.maxauthsize = aead->maxauthsize;\n\traead.ivsize = aead->ivsize;\n\n\tif (nla_put(skb, CRYPTOCFGA_REPORT_AEAD,\n\t\t sizeof(struct crypto_report_aead), &raead))\n\t\tgoto nla_put_failure;\n\treturn 0;\n\nnla_put_failure:\n\treturn -EMSGSIZE;\n}", "label_name": "CWE-310", "label": "CWE-310"}
1016
  {"code": "static int crypto_ahash_report(struct sk_buff *skb, struct crypto_alg *alg)\n{\n\tstruct crypto_report_hash rhash;\n\n\tsnprintf(rhash.type, CRYPTO_MAX_ALG_NAME, \"%s\", \"ahash\");\n\n\trhash.blocksize = alg->cra_blocksize;\n\trhash.digestsize = __crypto_hash_alg_common(alg)->digestsize;\n\n\tif (nla_put(skb, CRYPTOCFGA_REPORT_HASH,\n\t\t sizeof(struct crypto_report_hash), &rhash))\n\t\tgoto nla_put_failure;\n\treturn 0;\n\nnla_put_failure:\n\treturn -EMSGSIZE;\n}", "label_name": "CWE-310", "label": "CWE-310"}
 
1017
  {"code": "int bt_sock_recvmsg(struct kiocb *iocb, struct socket *sock,\n\t\t\t\tstruct msghdr *msg, size_t len, int flags)\n{\n\tint noblock = flags & MSG_DONTWAIT;\n\tstruct sock *sk = sock->sk;\n\tstruct sk_buff *skb;\n\tsize_t copied;\n\tint err;\n\n\tBT_DBG(\"sock %p sk %p len %zu\", sock, sk, len);\n\n\tif (flags & (MSG_OOB))\n\t\treturn -EOPNOTSUPP;\n\n\tskb = skb_recv_datagram(sk, flags, noblock, &err);\n\tif (!skb) {\n\t\tif (sk->sk_shutdown & RCV_SHUTDOWN)\n\t\t\treturn 0;\n\t\treturn err;\n\t}\n\n\tmsg->msg_namelen = 0;\n\n\tcopied = skb->len;\n\tif (len < copied) {\n\t\tmsg->msg_flags |= MSG_TRUNC;\n\t\tcopied = len;\n\t}\n\n\tskb_reset_transport_header(skb);\n\terr = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);\n\tif (err == 0)\n\t\tsock_recv_ts_and_drops(msg, sk, skb);\n\n\tskb_free_datagram(sk, skb);\n\n\treturn err ? : copied;\n}", "label_name": "Class", "label": 2}
1018
  {"code": "fb_mmap(struct file *file, struct vm_area_struct * vma)\n{\n\tstruct fb_info *info = file_fb_info(file);\n\tstruct fb_ops *fb;\n\tunsigned long off;\n\tunsigned long start;\n\tu32 len;\n\n\tif (!info)\n\t\treturn -ENODEV;\n\tif (vma->vm_pgoff > (~0UL >> PAGE_SHIFT))\n\t\treturn -EINVAL;\n\toff = vma->vm_pgoff << PAGE_SHIFT;\n\tfb = info->fbops;\n\tif (!fb)\n\t\treturn -ENODEV;\n\tmutex_lock(&info->mm_lock);\n\tif (fb->fb_mmap) {\n\t\tint res;\n\t\tres = fb->fb_mmap(info, vma);\n\t\tmutex_unlock(&info->mm_lock);\n\t\treturn res;\n\t}\n\n\t/* frame buffer memory */\n\tstart = info->fix.smem_start;\n\tlen = PAGE_ALIGN((start & ~PAGE_MASK) + info->fix.smem_len);\n\tif (off >= len) {\n\t\t/* memory mapped io */\n\t\toff -= len;\n\t\tif (info->var.accel_flags) {\n\t\t\tmutex_unlock(&info->mm_lock);\n\t\t\treturn -EINVAL;\n\t\t}\n\t\tstart = info->fix.mmio_start;\n\t\tlen = PAGE_ALIGN((start & ~PAGE_MASK) + info->fix.mmio_len);\n\t}\n\tmutex_unlock(&info->mm_lock);\n\tstart &= PAGE_MASK;\n\tif ((vma->vm_end - vma->vm_start + off) > len)\n\t\treturn -EINVAL;\n\toff += start;\n\tvma->vm_pgoff = off >> PAGE_SHIFT;\n\t/* VM_IO | VM_DONTEXPAND | VM_DONTDUMP are set by io_remap_pfn_range()*/\n\tvma->vm_page_prot = vm_get_page_prot(vma->vm_flags);\n\tfb_pgprotect(file, vma, off);\n\tif (io_remap_pfn_range(vma, vma->vm_start, off >> PAGE_SHIFT,\n\t\t\t vma->vm_end - vma->vm_start, vma->vm_page_prot))\n\t\treturn -EAGAIN;\n\treturn 0;\n}", "label_name": "CWE-189", "label": "CWE-189"}
 
 
1019
  {"code": "static int kvm_vm_ioctl_set_pit(struct kvm *kvm, struct kvm_pit_state *ps)\n{\n\tmutex_lock(&kvm->arch.vpit->pit_state.lock);\n\tmemcpy(&kvm->arch.vpit->pit_state, ps, sizeof(struct kvm_pit_state));\n\tkvm_pit_load_count(kvm, 0, ps->channels[0].count, 0);\n\tmutex_unlock(&kvm->arch.vpit->pit_state.lock);\n\treturn 0;\n}", "label_name": "Base", "label": 1}
1020
  {"code": "static int perf_swevent_add(struct perf_event *event, int flags)\n{\n\tstruct swevent_htable *swhash = this_cpu_ptr(&swevent_htable);\n\tstruct hw_perf_event *hwc = &event->hw;\n\tstruct hlist_head *head;\n\n\tif (is_sampling_event(event)) {\n\t\thwc->last_period = hwc->sample_period;\n\t\tperf_swevent_set_period(event);\n\t}\n\n\thwc->state = !(flags & PERF_EF_START);\n\n\thead = find_swevent_head(swhash, event);\n\tif (!head) {\n\t\t/*\n\t\t * We can race with cpu hotplug code. Do not\n\t\t * WARN if the cpu just got unplugged.\n\t\t */\n\t\tWARN_ON_ONCE(swhash->online);\n\t\treturn -EINVAL;\n\t}\n\n\thlist_add_head_rcu(&event->hlist_entry, head);\n\tperf_event_update_userpage(event);\n\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1021
  {"code": "void flush_tlb_page(struct vm_area_struct *vma, unsigned long start)\n{\n\tstruct mm_struct *mm = vma->vm_mm;\n\n\tpreempt_disable();\n\n\tif (current->active_mm == mm) {\n\t\tif (current->mm)\n\t\t\t__flush_tlb_one(start);\n\t\telse\n\t\t\tleave_mm(smp_processor_id());\n\t}\n\n\tif (cpumask_any_but(mm_cpumask(mm), smp_processor_id()) < nr_cpu_ids)\n\t\tflush_tlb_others(mm_cpumask(mm), mm, start, 0UL);\n\n\tpreempt_enable();\n}", "label_name": "Class", "label": 2}
1022
  {"code": "void flush_tlb_mm_range(struct mm_struct *mm, unsigned long start,\n\t\t\t\tunsigned long end, unsigned long vmflag)\n{\n\tunsigned long addr;\n\t/* do a global flush by default */\n\tunsigned long base_pages_to_flush = TLB_FLUSH_ALL;\n\n\tpreempt_disable();\n\tif (current->active_mm != mm)\n\t\tgoto out;\n\n\tif (!current->mm) {\n\t\tleave_mm(smp_processor_id());\n\t\tgoto out;\n\t}\n\n\tif ((end != TLB_FLUSH_ALL) && !(vmflag & VM_HUGETLB))\n\t\tbase_pages_to_flush = (end - start) >> PAGE_SHIFT;\n\n\tif (base_pages_to_flush > tlb_single_page_flush_ceiling) {\n\t\tbase_pages_to_flush = TLB_FLUSH_ALL;\n\t\tcount_vm_tlb_event(NR_TLB_LOCAL_FLUSH_ALL);\n\t\tlocal_flush_tlb();\n\t} else {\n\t\t/* flush range by one by one 'invlpg' */\n\t\tfor (addr = start; addr < end;\taddr += PAGE_SIZE) {\n\t\t\tcount_vm_tlb_event(NR_TLB_LOCAL_FLUSH_ONE);\n\t\t\t__flush_tlb_single(addr);\n\t\t}\n\t}\n\ttrace_tlb_flush(TLB_LOCAL_MM_SHOOTDOWN, base_pages_to_flush);\nout:\n\tif (base_pages_to_flush == TLB_FLUSH_ALL) {\n\t\tstart = 0UL;\n\t\tend = TLB_FLUSH_ALL;\n\t}\n\tif (cpumask_any_but(mm_cpumask(mm), smp_processor_id()) < nr_cpu_ids)\n\t\tflush_tlb_others(mm_cpumask(mm), mm, start, end);\n\tpreempt_enable();\n}", "label_name": "Class", "label": 2}
1023
  {"code": "static void *skcipher_bind(const char *name, u32 type, u32 mask)\n{\n\treturn crypto_alloc_skcipher(name, type, mask);\n}", "label_name": "Base", "label": 1}
1024
  {"code": "static inline int init_new_context(struct task_struct *tsk,\n\t\t\t\t struct mm_struct *mm)\n{\n\tcpumask_clear(&mm->context.cpu_attach_mask);\n\tatomic_set(&mm->context.attach_count, 0);\n\tmm->context.flush_mm = 0;\n\tmm->context.asce_bits = _ASCE_TABLE_LENGTH | _ASCE_USER_BITS;\n\tmm->context.asce_bits |= _ASCE_TYPE_REGION3;\n#ifdef CONFIG_PGSTE\n\tmm->context.alloc_pgste = page_table_allocate_pgste;\n\tmm->context.has_pgste = 0;\n\tmm->context.use_skey = 0;\n#endif\n\tmm->context.asce_limit = STACK_TOP_MAX;\n\tcrst_table_init((unsigned long *) mm->pgd, pgd_entry_type(mm));\n\treturn 0;\n}", "label_name": "Class", "label": 2}
 
1025
  {"code": "static inline int check_entry_size_and_hooks(struct arpt_entry *e,\n\t\t\t\t\t struct xt_table_info *newinfo,\n\t\t\t\t\t const unsigned char *base,\n\t\t\t\t\t const unsigned char *limit,\n\t\t\t\t\t const unsigned int *hook_entries,\n\t\t\t\t\t const unsigned int *underflows,\n\t\t\t\t\t unsigned int valid_hooks)\n{\n\tunsigned int h;\n\tint err;\n\n\tif ((unsigned long)e % __alignof__(struct arpt_entry) != 0 ||\n\t (unsigned char *)e + sizeof(struct arpt_entry) >= limit) {\n\t\tduprintf(\"Bad offset %p\\n\", e);\n\t\treturn -EINVAL;\n\t}\n\n\tif (e->next_offset\n\t < sizeof(struct arpt_entry) + sizeof(struct xt_entry_target)) {\n\t\tduprintf(\"checking: element %p size %u\\n\",\n\t\t\t e, e->next_offset);\n\t\treturn -EINVAL;\n\t}\n\n\terr = check_entry(e);\n\tif (err)\n\t\treturn err;\n\n\t/* Check hooks & underflows */\n\tfor (h = 0; h < NF_ARP_NUMHOOKS; h++) {\n\t\tif (!(valid_hooks & (1 << h)))\n\t\t\tcontinue;\n\t\tif ((unsigned char *)e - base == hook_entries[h])\n\t\t\tnewinfo->hook_entry[h] = hook_entries[h];\n\t\tif ((unsigned char *)e - base == underflows[h]) {\n\t\t\tif (!check_underflow(e)) {\n\t\t\t\tpr_err(\"Underflows must be unconditional and \"\n\t\t\t\t \"use the STANDARD target with \"\n\t\t\t\t \"ACCEPT/DROP\\n\");\n\t\t\t\treturn -EINVAL;\n\t\t\t}\n\t\t\tnewinfo->underflow[h] = underflows[h];\n\t\t}\n\t}\n\n\t/* Clear counters and comefrom */\n\te->counters = ((struct xt_counters) { 0, 0 });\n\te->comefrom = 0;\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1026
  {"code": "get_chainname_rulenum(const struct ip6t_entry *s, const struct ip6t_entry *e,\n\t\t const char *hookname, const char **chainname,\n\t\t const char **comment, unsigned int *rulenum)\n{\n\tconst struct xt_standard_target *t = (void *)ip6t_get_target_c(s);\n\n\tif (strcmp(t->target.u.kernel.target->name, XT_ERROR_TARGET) == 0) {\n\t\t/* Head of user chain: ERROR target with chainname */\n\t\t*chainname = t->target.data;\n\t\t(*rulenum) = 0;\n\t} else if (s == e) {\n\t\t(*rulenum)++;\n\n\t\tif (s->target_offset == sizeof(struct ip6t_entry) &&\n\t\t strcmp(t->target.u.kernel.target->name,\n\t\t\t XT_STANDARD_TARGET) == 0 &&\n\t\t t->verdict < 0 &&\n\t\t unconditional(&s->ipv6)) {\n\t\t\t/* Tail of chains: STANDARD target (return/policy) */\n\t\t\t*comment = *chainname == hookname\n\t\t\t\t? comments[NF_IP6_TRACE_COMMENT_POLICY]\n\t\t\t\t: comments[NF_IP6_TRACE_COMMENT_RETURN];\n\t\t}\n\t\treturn 1;\n\t} else\n\t\t(*rulenum)++;\n\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1027
  {"code": "static inline bool unconditional(const struct ip6t_ip6 *ipv6)\n{\n\tstatic const struct ip6t_ip6 uncond;\n\n\treturn memcmp(ipv6, &uncond, sizeof(uncond)) == 0;\n}", "label_name": "Class", "label": 2}
 
1067
  {"code": "static int __init xfrm6_tunnel_spi_init(void)\n{\n\txfrm6_tunnel_spi_kmem = kmem_cache_create(\"xfrm6_tunnel_spi\",\n\t\t\t\t\t\t sizeof(struct xfrm6_tunnel_spi),\n\t\t\t\t\t\t 0, SLAB_HWCACHE_ALIGN,\n\t\t\t\t\t\t NULL);\n\tif (!xfrm6_tunnel_spi_kmem)\n\t\treturn -ENOMEM;\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1068
  {"code": "static int iscsi_add_notunderstood_response(\n\tchar *key,\n\tchar *value,\n\tstruct iscsi_param_list *param_list)\n{\n\tstruct iscsi_extra_response *extra_response;\n\n\tif (strlen(value) > VALUE_MAXLEN) {\n\t\tpr_err(\"Value for notunderstood key \\\"%s\\\" exceeds %d,\"\n\t\t\t\" protocol error.\\n\", key, VALUE_MAXLEN);\n\t\treturn -1;\n\t}\n\n\textra_response = kzalloc(sizeof(struct iscsi_extra_response), GFP_KERNEL);\n\tif (!extra_response) {\n\t\tpr_err(\"Unable to allocate memory for\"\n\t\t\t\" struct iscsi_extra_response.\\n\");\n\t\treturn -1;\n\t}\n\tINIT_LIST_HEAD(&extra_response->er_list);\n\n\tstrncpy(extra_response->key, key, strlen(key) + 1);\n\tstrncpy(extra_response->value, NOTUNDERSTOOD,\n\t\t\tstrlen(NOTUNDERSTOOD) + 1);\n\n\tlist_add_tail(&extra_response->er_list,\n\t\t\t&param_list->extra_response_list);\n\treturn 0;\n}", "label_name": "Class", "label": 2}
1069
  {"code": "static long vhost_net_set_backend(struct vhost_net *n, unsigned index, int fd)\n{\n\tstruct socket *sock, *oldsock;\n\tstruct vhost_virtqueue *vq;\n\tstruct vhost_net_virtqueue *nvq;\n\tstruct vhost_net_ubuf_ref *ubufs, *oldubufs = NULL;\n\tint r;\n\n\tmutex_lock(&n->dev.mutex);\n\tr = vhost_dev_check_owner(&n->dev);\n\tif (r)\n\t\tgoto err;\n\n\tif (index >= VHOST_NET_VQ_MAX) {\n\t\tr = -ENOBUFS;\n\t\tgoto err;\n\t}\n\tvq = &n->vqs[index].vq;\n\tnvq = &n->vqs[index];\n\tmutex_lock(&vq->mutex);\n\n\t/* Verify that ring has been setup correctly. */\n\tif (!vhost_vq_access_ok(vq)) {\n\t\tr = -EFAULT;\n\t\tgoto err_vq;\n\t}\n\tsock = get_socket(fd);\n\tif (IS_ERR(sock)) {\n\t\tr = PTR_ERR(sock);\n\t\tgoto err_vq;\n\t}\n\n\t/* start polling new socket */\n\toldsock = rcu_dereference_protected(vq->private_data,\n\t\t\t\t\t lockdep_is_held(&vq->mutex));\n\tif (sock != oldsock) {\n\t\tubufs = vhost_net_ubuf_alloc(vq,\n\t\t\t\t\t sock && vhost_sock_zcopy(sock));\n\t\tif (IS_ERR(ubufs)) {\n\t\t\tr = PTR_ERR(ubufs);\n\t\t\tgoto err_ubufs;\n\t\t}\n\n\t\tvhost_net_disable_vq(n, vq);\n\t\trcu_assign_pointer(vq->private_data, sock);\n\t\tr = vhost_init_used(vq);\n\t\tif (r)\n\t\t\tgoto err_used;\n\t\tr = vhost_net_enable_vq(n, vq);\n\t\tif (r)\n\t\t\tgoto err_used;\n\n\t\toldubufs = nvq->ubufs;\n\t\tnvq->ubufs = ubufs;\n\n\t\tn->tx_packets = 0;\n\t\tn->tx_zcopy_err = 0;\n\t\tn->tx_flush = false;\n\t}\n\n\tmutex_unlock(&vq->mutex);\n\n\tif (oldubufs) {\n\t\tvhost_net_ubuf_put_and_wait(oldubufs);\n\t\tmutex_lock(&vq->mutex);\n\t\tvhost_zerocopy_signal_used(n, vq);\n\t\tmutex_unlock(&vq->mutex);\n\t}\n\n\tif (oldsock) {\n\t\tvhost_net_flush_vq(n, index);\n\t\tfput(oldsock->file);\n\t}\n\n\tmutex_unlock(&n->dev.mutex);\n\treturn 0;\n\nerr_used:\n\trcu_assign_pointer(vq->private_data, oldsock);\n\tvhost_net_enable_vq(n, vq);\n\tif (ubufs)\n\t\tvhost_net_ubuf_put_and_wait(ubufs);\nerr_ubufs:\n\tfput(sock->file);\nerr_vq:\n\tmutex_unlock(&vq->mutex);\nerr:\n\tmutex_unlock(&n->dev.mutex);\n\treturn r;\n}", "label_name": "CWE-399", "label": "CWE-399"}
 
1070
  {"code": "static int uio_mmap_physical(struct vm_area_struct *vma)\n{\n\tstruct uio_device *idev = vma->vm_private_data;\n\tint mi = uio_find_mem_index(vma);\n\tif (mi < 0)\n\t\treturn -EINVAL;\n\n\tvma->vm_ops = &uio_physical_vm_ops;\n\n\tvma->vm_page_prot = pgprot_noncached(vma->vm_page_prot);\n\n\treturn remap_pfn_range(vma,\n\t\t\t vma->vm_start,\n\t\t\t idev->info->mem[mi].addr >> PAGE_SHIFT,\n\t\t\t vma->vm_end - vma->vm_start,\n\t\t\t vma->vm_page_prot);\n}", "label_name": "CWE-189", "label": "CWE-189"}
1071
  {"code": "void fput(struct file *file)\n{\n\tif (atomic_long_dec_and_test(&file->f_count)) {\n\t\tstruct task_struct *task = current;\n\n\t\tfile_sb_list_del(file);\n\t\tif (likely(!in_interrupt() && !(task->flags & PF_KTHREAD))) {\n\t\t\tinit_task_work(&file->f_u.fu_rcuhead, ____fput);\n\t\t\tif (!task_work_add(task, &file->f_u.fu_rcuhead, true))\n\t\t\t\treturn;\n\t\t\t/*\n\t\t\t * After this task has run exit_task_work(),\n\t\t\t * task_work_add() will fail. Fall through to delayed\n\t\t\t * fput to avoid leaking *file.\n\t\t\t */\n\t\t}\n\n\t\tif (llist_add(&file->f_u.fu_llist, &delayed_fput_list))\n\t\t\tschedule_work(&delayed_fput_work);\n\t}\n}", "label_name": "CWE-17", "label": "CWE-17"}
1072
  {"code": "void __init files_init(unsigned long mempages)\n{ \n\tunsigned long n;\n\n\tfilp_cachep = kmem_cache_create(\"filp\", sizeof(struct file), 0,\n\t\t\tSLAB_HWCACHE_ALIGN | SLAB_PANIC, NULL);\n\n\t/*\n\t * One file with associated inode and dcache is very roughly 1K.\n\t * Per default don't use more than 10% of our memory for files. \n\t */ \n\n\tn = (mempages * (PAGE_SIZE / 1024)) / 10;\n\tfiles_stat.max_files = max_t(unsigned long, n, NR_FILE);\n\tfiles_defer_init();\n\tlg_lock_init(&files_lglock, \"files_lglock\");\n\tpercpu_counter_init(&nr_files, 0);\n} ", "label_name": "CWE-17", "label": "CWE-17"}
 
1090
  {"code": "static int rds_ib_laddr_check(__be32 addr)\n{\n\tint ret;\n\tstruct rdma_cm_id *cm_id;\n\tstruct sockaddr_in sin;\n\n\t/* Create a CMA ID and try to bind it. This catches both\n\t * IB and iWARP capable NICs.\n\t */\n\tcm_id = rdma_create_id(NULL, NULL, RDMA_PS_TCP, IB_QPT_RC);\n\tif (IS_ERR(cm_id))\n\t\treturn PTR_ERR(cm_id);\n\n\tmemset(&sin, 0, sizeof(sin));\n\tsin.sin_family = AF_INET;\n\tsin.sin_addr.s_addr = addr;\n\n\t/* rdma_bind_addr will only succeed for IB & iWARP devices */\n\tret = rdma_bind_addr(cm_id, (struct sockaddr *)&sin);\n\t/* due to this, we will claim to support iWARP devices unless we\n\t check node_type. */\n\tif (ret || cm_id->device->node_type != RDMA_NODE_IB_CA)\n\t\tret = -EADDRNOTAVAIL;\n\n\trdsdebug(\"addr %pI4 ret %d node type %d\\n\",\n\t\t&addr, ret,\n\t\tcm_id->device ? cm_id->device->node_type : -1);\n\n\trdma_destroy_id(cm_id);\n\n\treturn ret;\n}", "label_name": "Base", "label": 1}
1091
  {"code": "static int sched_read_attr(struct sched_attr __user *uattr,\n\t\t\t struct sched_attr *attr,\n\t\t\t unsigned int usize)\n{\n\tint ret;\n\n\tif (!access_ok(VERIFY_WRITE, uattr, usize))\n\t\treturn -EFAULT;\n\n\t/*\n\t * If we're handed a smaller struct than we know of,\n\t * ensure all the unknown bits are 0 - i.e. old\n\t * user-space does not get uncomplete information.\n\t */\n\tif (usize < sizeof(*attr)) {\n\t\tunsigned char *addr;\n\t\tunsigned char *end;\n\n\t\taddr = (void *)attr + usize;\n\t\tend = (void *)attr + sizeof(*attr);\n\n\t\tfor (; addr < end; addr++) {\n\t\t\tif (*addr)\n\t\t\t\tgoto err_size;\n\t\t}\n\n\t\tattr->size = usize;\n\t}\n\n\tret = copy_to_user(uattr, attr, usize);\n\tif (ret)\n\t\treturn -EFAULT;\n\nout:\n\treturn ret;\n\nerr_size:\n\tret = -E2BIG;\n\tgoto out;\n}", "label_name": "Class", "label": 2}
1092
  {"code": "static void __net_random_once_deferred(struct work_struct *w)\n{\n\tstruct __net_random_once_work *work =\n\t\tcontainer_of(w, struct __net_random_once_work, work);\n\tif (!static_key_enabled(work->key))\n\t\tstatic_key_slow_inc(work->key);\n\tkfree(work);\n}", "label_name": "Class", "label": 2}
 
1093
  {"code": "mountpoint_last(struct nameidata *nd, struct path *path)\n{\n\tint error = 0;\n\tstruct dentry *dentry;\n\tstruct dentry *dir = nd->path.dentry;\n\n\t/* If we're in rcuwalk, drop out of it to handle last component */\n\tif (nd->flags & LOOKUP_RCU) {\n\t\tif (unlazy_walk(nd, NULL)) {\n\t\t\terror = -ECHILD;\n\t\t\tgoto out;\n\t\t}\n\t}\n\n\tnd->flags &= ~LOOKUP_PARENT;\n\n\tif (unlikely(nd->last_type != LAST_NORM)) {\n\t\terror = handle_dots(nd, nd->last_type);\n\t\tif (error)\n\t\t\tgoto out;\n\t\tdentry = dget(nd->path.dentry);\n\t\tgoto done;\n\t}\n\n\tmutex_lock(&dir->d_inode->i_mutex);\n\tdentry = d_lookup(dir, &nd->last);\n\tif (!dentry) {\n\t\t/*\n\t\t * No cached dentry. Mounted dentries are pinned in the cache,\n\t\t * so that means that this dentry is probably a symlink or the\n\t\t * path doesn't actually point to a mounted dentry.\n\t\t */\n\t\tdentry = d_alloc(dir, &nd->last);\n\t\tif (!dentry) {\n\t\t\terror = -ENOMEM;\n\t\t\tmutex_unlock(&dir->d_inode->i_mutex);\n\t\t\tgoto out;\n\t\t}\n\t\tdentry = lookup_real(dir->d_inode, dentry, nd->flags);\n\t\terror = PTR_ERR(dentry);\n\t\tif (IS_ERR(dentry)) {\n\t\t\tmutex_unlock(&dir->d_inode->i_mutex);\n\t\t\tgoto out;\n\t\t}\n\t}\n\tmutex_unlock(&dir->d_inode->i_mutex);\n\ndone:\n\tif (!dentry->d_inode || d_is_negative(dentry)) {\n\t\terror = -ENOENT;\n\t\tdput(dentry);\n\t\tgoto out;\n\t}\n\tpath->dentry = dentry;\n\tpath->mnt = mntget(nd->path.mnt);\n\tif (should_follow_link(dentry, nd->flags & LOOKUP_FOLLOW))\n\t\treturn 1;\n\tfollow_mount(path);\n\terror = 0;\nout:\n\tterminate_walk(nd);\n\treturn error;\n}", "label_name": "Base", "label": 1}
1094
  {"code": "static int do_new_mount(struct path *path, const char *fstype, int flags,\n\t\t\tint mnt_flags, const char *name, void *data)\n{\n\tstruct file_system_type *type;\n\tstruct user_namespace *user_ns = current->nsproxy->mnt_ns->user_ns;\n\tstruct vfsmount *mnt;\n\tint err;\n\n\tif (!fstype)\n\t\treturn -EINVAL;\n\n\ttype = get_fs_type(fstype);\n\tif (!type)\n\t\treturn -ENODEV;\n\n\tif (user_ns != &init_user_ns) {\n\t\tif (!(type->fs_flags & FS_USERNS_MOUNT)) {\n\t\t\tput_filesystem(type);\n\t\t\treturn -EPERM;\n\t\t}\n\t\t/* Only in special cases allow devices from mounts\n\t\t * created outside the initial user namespace.\n\t\t */\n\t\tif (!(type->fs_flags & FS_USERNS_DEV_MOUNT)) {\n\t\t\tflags |= MS_NODEV;\n\t\t\tmnt_flags |= MNT_NODEV;\n\t\t}\n\t}\n\n\tmnt = vfs_kern_mount(type, flags, name, data);\n\tif (!IS_ERR(mnt) && (type->fs_flags & FS_HAS_SUBTYPE) &&\n\t !mnt->mnt_sb->s_subtype)\n\t\tmnt = fs_set_subtype(mnt, fstype);\n\n\tput_filesystem(type);\n\tif (IS_ERR(mnt))\n\t\treturn PTR_ERR(mnt);\n\n\terr = do_add_mount(real_mount(mnt), path, mnt_flags);\n\tif (err)\n\t\tmntput(mnt);\n\treturn err;\n}", "label_name": "Class", "label": 2}
1095
  {"code": "static struct mount *clone_mnt(struct mount *old, struct dentry *root,\n\t\t\t\t\tint flag)\n{\n\tstruct super_block *sb = old->mnt.mnt_sb;\n\tstruct mount *mnt;\n\tint err;\n\n\tmnt = alloc_vfsmnt(old->mnt_devname);\n\tif (!mnt)\n\t\treturn ERR_PTR(-ENOMEM);\n\n\tif (flag & (CL_SLAVE | CL_PRIVATE | CL_SHARED_TO_SLAVE))\n\t\tmnt->mnt_group_id = 0; /* not a peer of original */\n\telse\n\t\tmnt->mnt_group_id = old->mnt_group_id;\n\n\tif ((flag & CL_MAKE_SHARED) && !mnt->mnt_group_id) {\n\t\terr = mnt_alloc_group_id(mnt);\n\t\tif (err)\n\t\t\tgoto out_free;\n\t}\n\n\tmnt->mnt.mnt_flags = old->mnt.mnt_flags & ~(MNT_WRITE_HOLD|MNT_MARKED);\n\t/* Don't allow unprivileged users to change mount flags */\n\tif ((flag & CL_UNPRIVILEGED) && (mnt->mnt.mnt_flags & MNT_READONLY))\n\t\tmnt->mnt.mnt_flags |= MNT_LOCK_READONLY;\n\n\t/* Don't allow unprivileged users to reveal what is under a mount */\n\tif ((flag & CL_UNPRIVILEGED) && list_empty(&old->mnt_expire))\n\t\tmnt->mnt.mnt_flags |= MNT_LOCKED;\n\n\tatomic_inc(&sb->s_active);\n\tmnt->mnt.mnt_sb = sb;\n\tmnt->mnt.mnt_root = dget(root);\n\tmnt->mnt_mountpoint = mnt->mnt.mnt_root;\n\tmnt->mnt_parent = mnt;\n\tlock_mount_hash();\n\tlist_add_tail(&mnt->mnt_instance, &sb->s_mounts);\n\tunlock_mount_hash();\n\n\tif ((flag & CL_SLAVE) ||\n\t ((flag & CL_SHARED_TO_SLAVE) && IS_MNT_SHARED(old))) {\n\t\tlist_add(&mnt->mnt_slave, &old->mnt_slave_list);\n\t\tmnt->mnt_master = old;\n\t\tCLEAR_MNT_SHARED(mnt);\n\t} else if (!(flag & CL_PRIVATE)) {\n\t\tif ((flag & CL_MAKE_SHARED) || IS_MNT_SHARED(old))\n\t\t\tlist_add(&mnt->mnt_share, &old->mnt_share);\n\t\tif (IS_MNT_SLAVE(old))\n\t\t\tlist_add(&mnt->mnt_slave, &old->mnt_slave);\n\t\tmnt->mnt_master = old->mnt_master;\n\t}\n\tif (flag & CL_MAKE_SHARED)\n\t\tset_mnt_shared(mnt);\n\n\t/* stick the duplicate mount on the same expiry list\n\t * as the original if that was on one */\n\tif (flag & CL_EXPIRE) {\n\t\tif (!list_empty(&old->mnt_expire))\n\t\t\tlist_add(&mnt->mnt_expire, &old->mnt_expire);\n\t}\n\n\treturn mnt;\n\n out_free:\n\tmnt_free_id(mnt);\n\tfree_vfsmnt(mnt);\n\treturn ERR_PTR(err);\n}", "label_name": "Class", "label": 2}
 
1197
  {"code": "static void test_show_object(struct object *object,\n\t\t\t struct strbuf *path,\n\t\t\t const char *last, void *data)\n{\n\tstruct bitmap_test_data *tdata = data;\n\tint bitmap_pos;\n\n\tbitmap_pos = bitmap_position(object->oid.hash);\n\tif (bitmap_pos < 0)\n\t\tdie(\"Object not in bitmap: %s\\n\", oid_to_hex(&object->oid));\n\n\tbitmap_set(tdata->base, bitmap_pos);\n\tdisplay_progress(tdata->prg, ++tdata->seen);\n}", "label_name": "Class", "label": 2}
1198
  {"code": "static void mark_commit(struct commit *c, void *data)\n{\n\tmark_object(&c->object, NULL, NULL, data);\n}", "label_name": "Class", "label": 2}
1199
  {"code": "static void mark_object(struct object *obj, struct strbuf *path,\n\t\t\tconst char *name, void *data)\n{\n\tupdate_progress(data);\n}", "label_name": "Class", "label": 2}
 
1200
  {"code": "static void start_auth_request(PgSocket *client, const char *username)\n{\n\tint res;\n\tPktBuf *buf;\n\n\tclient->auth_user = client->db->auth_user;\n\t/* have to fetch user info from db */\n\tclient->pool = get_pool(client->db, client->db->auth_user);\n\tif (!find_server(client)) {\n\t\tclient->wait_for_user_conn = true;\n\t\treturn;\n\t}\n\tslog_noise(client, \"Doing auth_conn query\");\n\tclient->wait_for_user_conn = false;\n\tclient->wait_for_user = true;\n\tif (!sbuf_pause(&client->sbuf)) {\n\t\trelease_server(client->link);\n\t\tdisconnect_client(client, true, \"pause failed\");\n\t\treturn;\n\t}\n\tclient->link->ready = 0;\n\n\tres = 0;\n\tbuf = pktbuf_dynamic(512);\n\tif (buf) {\n\t\tpktbuf_write_ExtQuery(buf, cf_auth_query, 1, username);\n\t\tres = pktbuf_send_immediate(buf, client->link);\n\t\tpktbuf_free(buf);\n\t\t/*\n\t\t * Should do instead:\n\t\t * res = pktbuf_send_queued(buf, client->link);\n\t\t * but that needs better integration with SBuf.\n\t\t */\n\t}\n\tif (!res)\n\t\tdisconnect_server(client->link, false, \"unable to send login query\");\n}", "label_name": "Class", "label": 2}
1201
  {"code": "static int parse_exports_table(long long *table_start)\n{\n\tint res;\n\tint indexes = SQUASHFS_LOOKUP_BLOCKS(sBlk.s.inodes);\n\tlong long export_index_table[indexes];\n\n\tres = read_fs_bytes(fd, sBlk.s.lookup_table_start,\n\t\tSQUASHFS_LOOKUP_BLOCK_BYTES(sBlk.s.inodes), export_index_table);\n\tif(res == FALSE) {\n\t\tERROR(\"parse_exports_table: failed to read export index table\\n\");\n\t\treturn FALSE;\n\t}\n\tSQUASHFS_INSWAP_LOOKUP_BLOCKS(export_index_table, indexes);\n\n\t/*\n\t * export_index_table[0] stores the start of the compressed export blocks.\n\t * This by definition is also the end of the previous filesystem\n\t * table - the fragment table.\n\t */\n\t*table_start = export_index_table[0];\n\n\treturn TRUE;\n}", "label_name": "Base", "label": 1}
1202
  {"code": "static int jas_iccgetuint(jas_stream_t *in, int n, ulonglong *val)\n{\n\tint i;\n\tint c;\n\tulonglong v;\n\tv = 0;\n\tfor (i = n; i > 0; --i) {\n\t\tif ((c = jas_stream_getc(in)) == EOF)\n\t\t\treturn -1;\n\t\tv = (v << 8) | c;\n\t}\n\t*val = v;\n\treturn 0;\n}", "label_name": "Base", "label": 1}
 
1204
  {"code": "static int pgx_gethdr(jas_stream_t *in, pgx_hdr_t *hdr)\n{\n\tint c;\n\tuchar buf[2];\n\n\tif ((c = jas_stream_getc(in)) == EOF) {\n\t\tgoto error;\n\t}\n\tbuf[0] = c;\n\tif ((c = jas_stream_getc(in)) == EOF) {\n\t\tgoto error;\n\t}\n\tbuf[1] = c;\n\thdr->magic = buf[0] << 8 | buf[1];\n\tif (hdr->magic != PGX_MAGIC) {\n\t\tjas_eprintf(\"invalid PGX signature\\n\");\n\t\tgoto error;\n\t}\n\tif ((c = pgx_getc(in)) == EOF || !isspace(c)) {\n\t\tgoto error;\n\t}\n\tif (pgx_getbyteorder(in, &hdr->bigendian)) {\n\t\tjas_eprintf(\"cannot get byte order\\n\");\n\t\tgoto error;\n\t}\n\tif (pgx_getsgnd(in, &hdr->sgnd)) {\n\t\tjas_eprintf(\"cannot get signedness\\n\");\n\t\tgoto error;\n\t}\n\tif (pgx_getuint32(in, &hdr->prec)) {\n\t\tjas_eprintf(\"cannot get precision\\n\");\n\t\tgoto error;\n\t}\n\tif (pgx_getuint32(in, &hdr->width)) {\n\t\tjas_eprintf(\"cannot get width\\n\");\n\t\tgoto error;\n\t}\n\tif (pgx_getuint32(in, &hdr->height)) {\n\t\tjas_eprintf(\"cannot get height\\n\");\n\t\tgoto error;\n\t}\n\treturn 0;\n\nerror:\n\treturn -1;\n}", "label_name": "Class", "label": 2}
1205
  {"code": "jp2_box_t *jp2_box_create(int type)\n{\n\tjp2_box_t *box;\n\tjp2_boxinfo_t *boxinfo;\n\n\tif (!(box = jas_malloc(sizeof(jp2_box_t)))) {\n\t\treturn 0;\n\t}\n\tmemset(box, 0, sizeof(jp2_box_t));\n\tbox->type = type;\n\tbox->len = 0;\n\tif (!(boxinfo = jp2_boxinfolookup(type))) {\n\t\treturn 0;\n\t}\n\tbox->info = boxinfo;\n\tbox->ops = &boxinfo->ops;\n\treturn box;\n}", "label_name": "Base", "label": 1}
1206
  {"code": "int jp2_box_put(jp2_box_t *box, jas_stream_t *out)\n{\n\tjas_stream_t *tmpstream;\n\tbool extlen;\n\tbool dataflag;\n\n\ttmpstream = 0;\n\n\tdataflag = !(box->info->flags & (JP2_BOX_SUPER | JP2_BOX_NODATA));\n\n\tif (dataflag) {\n\t\tif (!(tmpstream = jas_stream_memopen(0, 0))) {\n\t\t\tgoto error;\n\t\t}\n\t\tif (box->ops->putdata) {\n\t\t\tif ((*box->ops->putdata)(box, tmpstream)) {\n\t\t\t\tgoto error;\n\t\t\t}\n\t\t}\n\t\tbox->len = jas_stream_tell(tmpstream) + JP2_BOX_HDRLEN(false);\n\t\tjas_stream_rewind(tmpstream);\n\t}\n\textlen = (box->len >= (((uint_fast64_t)1) << 32)) != 0;\n\tif (jp2_putuint32(out, extlen ? 1 : box->len)) {\n\t\tgoto error;\n\t}\n\tif (jp2_putuint32(out, box->type)) {\n\t\tgoto error;\n\t}\n\tif (extlen) {\n\t\tif (jp2_putuint64(out, box->len)) {\n\t\t\tgoto error;\n\t\t}\n\t}\n\n\tif (dataflag) {\n\t\tif (jas_stream_copy(out, tmpstream, box->len - JP2_BOX_HDRLEN(false))) {\n\t\t\tgoto error;\n\t\t}\n\t\tjas_stream_close(tmpstream);\n\t}\n\n\treturn 0;\n\nerror:\n\n\tif (tmpstream) {\n\t\tjas_stream_close(tmpstream);\n\t}\n\treturn -1;\n}", "label_name": "Base", "label": 1}
 
1207
  {"code": "void set_fat(DOS_FS * fs, uint32_t cluster, int32_t new)\n{\n unsigned char *data = NULL;\n int size;\n loff_t offs;\n\n if (new == -1)\n\tnew = FAT_EOF(fs);\n else if ((long)new == -2)\n\tnew = FAT_BAD(fs);\n switch (fs->fat_bits) {\n case 12:\n\tdata = fs->fat + cluster * 3 / 2;\n\toffs = fs->fat_start + cluster * 3 / 2;\n\tif (cluster & 1) {\n\t FAT_ENTRY prevEntry;\n\t get_fat(&prevEntry, fs->fat, cluster - 1, fs);\n\t data[0] = ((new & 0xf) << 4) | (prevEntry.value >> 8);\n\t data[1] = new >> 4;\n\t} else {\n\t FAT_ENTRY subseqEntry;\n\t if (cluster != fs->clusters - 1)\n\t\tget_fat(&subseqEntry, fs->fat, cluster + 1, fs);\n\t else\n\t\tsubseqEntry.value = 0;\n\t data[0] = new & 0xff;\n\t data[1] = (new >> 8) | ((0xff & subseqEntry.value) << 4);\n\t}\n\tsize = 2;\n\tbreak;\n case 16:\n\tdata = fs->fat + cluster * 2;\n\toffs = fs->fat_start + cluster * 2;\n\t*(unsigned short *)data = htole16(new);\n\tsize = 2;\n\tbreak;\n case 32:\n\t{\n\t FAT_ENTRY curEntry;\n\t get_fat(&curEntry, fs->fat, cluster, fs);\n\n\t data = fs->fat + cluster * 4;\n\t offs = fs->fat_start + cluster * 4;\n\t /* According to M$, the high 4 bits of a FAT32 entry are reserved and\n\t * are not part of the cluster number. So we never touch them. */\n\t *(uint32_t *)data = htole32((new & 0xfffffff) |\n\t\t\t\t\t (curEntry.reserved << 28));\n\t size = 4;\n\t}\n\tbreak;\n default:\n\tdie(\"Bad FAT entry size: %d bits.\", fs->fat_bits);\n }\n fs_write(offs, size, data);\n if (fs->nfats > 1) {\n\tfs_write(offs + fs->fat_size, size, data);\n }\n}", "label_name": "CWE-189", "label": "CWE-189"}
1208
  {"code": "static void add_password(AUTH_HDR *request, unsigned char type, CONST char *password, char *secret)\n{\n\tMD5_CTX md5_secret, my_md5;\n\tunsigned char misc[AUTH_VECTOR_LEN];\n\tint i;\n\tint length = strlen(password);\n\tunsigned char hashed[256 + AUTH_PASS_LEN];\t/* can't be longer than this */\n\tunsigned char *vector;\n\tattribute_t *attr;\n\n\tif (length > MAXPASS) {\t\t\t\t/* shorten the password for now */\n\t\tlength = MAXPASS;\n\t}\n\n\tif (length == 0) {\n\t\tlength = AUTH_PASS_LEN;\t\t\t/* 0 maps to 16 */\n\t} if ((length & (AUTH_PASS_LEN - 1)) != 0) {\n\t\tlength += (AUTH_PASS_LEN - 1);\t\t/* round it up */\n\t\tlength &= ~(AUTH_PASS_LEN - 1);\t\t/* chop it off */\n\t}\t\t\t\t\t\t/* 16*N maps to itself */\n\n\tmemset(hashed, 0, length);\n\tmemcpy(hashed, password, strlen(password));\n\n\tattr = find_attribute(request, PW_PASSWORD);\n\n\tif (type == PW_PASSWORD) {\n\t\tvector = request->vector;\n\t} else {\n\t\tvector = attr->data;\t\t\t/* attr CANNOT be NULL here. */\n\t}\n\n\t/* ************************************************************ */\n\t/* encrypt the password */\n\t/* password : e[0] = p[0] ^ MD5(secret + vector) */\n\tMD5Init(&md5_secret);\n\tMD5Update(&md5_secret, (unsigned char *) secret, strlen(secret));\n\tmy_md5 = md5_secret;\t\t\t\t/* so we won't re-do the hash later */\n\tMD5Update(&my_md5, vector, AUTH_VECTOR_LEN);\n\tMD5Final(misc, &my_md5);\t\t\t/* set the final vector */\n\txor(hashed, misc, AUTH_PASS_LEN);\n\n\t/* For each step through, e[i] = p[i] ^ MD5(secret + e[i-1]) */\n\tfor (i = 1; i < (length >> 4); i++) {\n\t\tmy_md5 = md5_secret;\t\t\t/* grab old value of the hash */\n\t\tMD5Update(&my_md5, &hashed[(i-1) * AUTH_PASS_LEN], AUTH_PASS_LEN);\n\t\tMD5Final(misc, &my_md5);\t\t\t/* set the final vector */\n\t\txor(&hashed[i * AUTH_PASS_LEN], misc, AUTH_PASS_LEN);\n\t}\n\n\tif (type == PW_OLD_PASSWORD) {\n\t\tattr = find_attribute(request, PW_OLD_PASSWORD);\n\t}\n\n\tif (!attr) {\n\t\tadd_attribute(request, type, hashed, length);\n\t} else {\n\t\tmemcpy(attr->data, hashed, length); /* overwrite the packet */\n\t}\n}", "label_name": "Base", "label": 1}
1209
  {"code": "ssh_packet_set_postauth(struct ssh *ssh)\n{\n\tstruct sshcomp *comp;\n\tint r, mode;\n\n\tdebug(\"%s: called\", __func__);\n\t/* This was set in net child, but is not visible in user child */\n\tssh->state->after_authentication = 1;\n\tssh->state->rekeying = 0;\n\tfor (mode = 0; mode < MODE_MAX; mode++) {\n\t\tif (ssh->state->newkeys[mode] == NULL)\n\t\t\tcontinue;\n\t\tcomp = &ssh->state->newkeys[mode]->comp;\n\t\tif (comp && comp->enabled &&\n\t\t (r = ssh_packet_init_compression(ssh)) != 0)\n\t\t\treturn r;\n\t}\n\treturn 0;\n}", "label_name": "Class", "label": 2}
 
1379
  {"code": " def get_mime_for_format(self, format):\n \"\"\"\n Given a format, attempts to determine the correct MIME type.\n \n If not available on the current ``Serializer``, returns\n ``application/json`` by default.\n \"\"\"\n try:\n return self.content_types[format]\n except KeyError:\n return 'application/json'", "label_name": "Class", "label": 2}
1380
  {"code": " def format_datetime(self, data):\n \"\"\"\n A hook to control how datetimes are formatted.\n \n Can be overridden at the ``Serializer`` level (``datetime_formatting``)\n or globally (via ``settings.TASTYPIE_DATETIME_FORMATTING``).\n \n Default is ``iso-8601``, which looks like \"2010-12-16T03:02:14\".\n \"\"\"\n if self.datetime_formatting == 'rfc-2822':\n return format_datetime(data)\n \n return data.isoformat()", "label_name": "Class", "label": 2}
1381
  {"code": " def _download_file(bucket, filename, local_dir):\n key = bucket.get_key(filename)\n local_filename = os.path.join(local_dir, filename)\n key.get_contents_to_filename(local_filename)\n return local_filename", "label_name": "Base", "label": 1}
 
 
1382
  {"code": " def host_passes(self, host_state, filter_properties):\n context = filter_properties['context']\n scheduler_hints = filter_properties.get('scheduler_hints') or {}\n me = host_state.host\n\n affinity_uuids = scheduler_hints.get('different_host', [])\n if isinstance(affinity_uuids, basestring):\n affinity_uuids = [affinity_uuids]\n if affinity_uuids:\n return not any([i for i in affinity_uuids\n if self._affinity_host(context, i) == me])\n # With no different_host key\n return True", "label_name": "Class", "label": 2}
1383
  {"code": "def logout(request):\n \"\"\" Clears the session and logs the current user out. \"\"\"\n request.session.clear()\n # FIXME(gabriel): we don't ship a view named splash\n return shortcuts.redirect('splash')", "label_name": "NVD-CWE-Other", "label": "NVD-CWE-Other"}
1384
  {"code": " def get_multi(self, keys, server_key):\n \"\"\"\n Gets multiple values from memcache for the given keys.\n\n :param keys: keys for values to be retrieved from memcache\n :param servery_key: key to use in determining which server in the ring\n is used\n :returns: list of values\n \"\"\"\n server_key = md5hash(server_key)\n keys = [md5hash(key) for key in keys]\n for (server, fp, sock) in self._get_conns(server_key):\n try:\n sock.sendall('get %s\\r\\n' % ' '.join(keys))\n line = fp.readline().strip().split()\n responses = {}\n while line[0].upper() != 'END':\n if line[0].upper() == 'VALUE':\n size = int(line[3])\n value = fp.read(size)\n if int(line[2]) & PICKLE_FLAG:\n value = pickle.loads(value)\n responses[line[1]] = value\n fp.readline()\n line = fp.readline().strip().split()\n values = []\n for key in keys:\n if key in responses:\n values.append(responses[key])\n else:\n values.append(None)\n self._return_conn(server, fp, sock)\n return values\n except Exception, e:\n self._exception_occurred(server, e)", "label_name": "Base", "label": 1}
 
1509
  {"code": "def format_errormsg(message: str) -> str:\n \"\"\"Match account names in error messages and insert HTML links for them.\"\"\"\n match = re.search(ACCOUNT_RE, message)\n if not match:\n return message\n account = match.group()\n url = flask.url_for(\"account\", name=account)\n return (\n message.replace(account, f'<a href=\"{url}\">{account}</a>')\n .replace(\"for '\", \"for \")\n .replace(\"': \", \": \")\n )", "label_name": "Base", "label": 1}
1510
  {"code": "def _get_obj_absolute_path(obj_path):\n return os.path.join(DATAROOT, obj_path)", "label_name": "Base", "label": 1}
1511
  {"code": "def get_object_src_http(dataset, rel_path):\n path = _get_obj_abosolute_path(dataset, rel_path)\n response = send_file(path,\n cache_timeout=datetime.timedelta(\n days=365).total_seconds(),\n add_etags=True,\n conditional=True)\n return response", "label_name": "Base", "label": 1}
 
 
1512
  {"code": " private SecretKey getKey() {\n try {\n if (secret==null) {\n synchronized (this) {\n if (secret==null) {\n byte[] payload = load();\n if (payload==null) {\n payload = ConfidentialStore.get().randomBytes(256);\n store(payload);\n }\n // Due to the stupid US export restriction JDK only ships 128bit version.\n secret = new SecretKeySpec(payload,0,128/8, ALGORITHM);\n }\n }\n }\n return secret;\n } catch (IOException e) {\n throw new Error(\"Failed to load the key: \"+getId(),e);\n }\n }", "label_name": "Class", "label": 2}
1513
  {"code": " private boolean exractAndLoad(ArrayList<String> errors, String version, String customPath, String resourcePath) {\n URL resource = classLoader.getResource(resourcePath);\n if( resource !=null ) {\n \n String libName = name + \"-\" + getBitModel();\n if( version !=null) {\n libName += \"-\" + version;\n }\n \n if( customPath!=null ) {\n // Try to extract it to the custom path...\n File target = file(customPath, map(libName));\n if( extract(errors, resource, target) ) {\n if( load(errors, target) ) {\n return true;\n }\n }\n }\n \n // Fall back to extracting to the tmp dir\n customPath = System.getProperty(\"java.io.tmpdir\");\n File target = file(customPath, map(libName));\n if( extract(errors, resource, target) ) {\n if( load(errors, target) ) {\n return true;\n }\n }\n }\n return false;\n }", "label_name": "Base", "label": 1}
1514
  {"code": " public void onSubmit()\n {\n final String sessionCsrfToken = getCsrfSessionToken();\n final String postedCsrfToken = this.csrfTokenField.getInput();\n if (StringUtils.equals(sessionCsrfToken, postedCsrfToken) == false) {\n log.error(\"Cross site request forgery alert. csrf token doesn't match! session csrf token=\"\n + sessionCsrfToken\n + \", posted csrf token=\"\n + postedCsrfToken);\n throw new InternalErrorException(\"errorpage.csrfError\");\n }\n }", "label_name": "Compound", "label": 4}
 
1518
  {"code": " private static int findNonWhitespace(AppendableCharSequence sb, int offset, boolean validateOWS) {\n for (int result = offset; result < sb.length(); ++result) {\n char c = sb.charAtUnsafe(result);\n if (!Character.isWhitespace(c)) {\n return result;\n } else if (validateOWS && !isOWS(c)) {\n // Only OWS is supported for whitespace\n throw new IllegalArgumentException(\"Invalid separator, only a single space or horizontal tab allowed,\" +\n \" but received a '\" + c + \"' (0x\" + Integer.toHexString(c) + \")\");\n }\n }\n return sb.length();\n }", "label_name": "Base", "label": 1}
1519
  {"code": " private static void testInvalidHeaders0(String requestStr) {\n EmbeddedChannel channel = new EmbeddedChannel(new HttpRequestDecoder());\n assertTrue(channel.writeInbound(Unpooled.copiedBuffer(requestStr, CharsetUtil.US_ASCII)));\n HttpRequest request = channel.readInbound();\n assertTrue(request.decoderResult().isFailure());\n assertTrue(request.decoderResult().cause() instanceof IllegalArgumentException);\n assertFalse(channel.finish());\n }", "label_name": "Base", "label": 1}
1520
  {"code": " protected final String constructValidationUrl(final String ticket, final String serviceUrl) {\n final Map<String, String> urlParameters = new HashMap<String, String>();\n\n logger.debug(\"Placing URL parameters in map.\");\n urlParameters.put(\"ticket\", ticket);\n urlParameters.put(\"service\", encodeUrl(serviceUrl));\n\n if (this.renew) {\n urlParameters.put(\"renew\", \"true\");\n }\n\n logger.debug(\"Calling template URL attribute map.\");\n populateUrlAttributeMap(urlParameters);\n\n logger.debug(\"Loading custom parameters from configuration.\");\n if (this.customParameters != null) {\n urlParameters.putAll(this.customParameters);\n }\n\n final String suffix = getUrlSuffix();\n final StringBuilder buffer = new StringBuilder(urlParameters.size() * 10 + this.casServerUrlPrefix.length()\n + suffix.length() + 1);\n\n int i = 0;\n\n buffer.append(this.casServerUrlPrefix);\n if (!this.casServerUrlPrefix.endsWith(\"/\")) {\n buffer.append(\"/\");\n }\n buffer.append(suffix);\n\n for (Map.Entry<String, String> entry : urlParameters.entrySet()) {\n final String key = entry.getKey();\n final String value = entry.getValue();\n\n if (value != null) {\n buffer.append(i++ == 0 ? \"?\" : \"&\");\n buffer.append(key);\n buffer.append(\"=\");\n buffer.append(value);\n }\n }\n\n return buffer.toString();\n\n }", "label_name": "Class", "label": 2}
 
1521
  {"code": " protected OHttpSessionManager() {\r\n expirationTime = OGlobalConfiguration.NETWORK_HTTP_SESSION_EXPIRE_TIMEOUT.getValueAsInteger() * 1000;\r\n\r\n Orient.instance().scheduleTask(new TimerTask() {\r\n @Override\r\n public void run() {\r\n final int expired = checkSessionsValidity();\r\n if (expired > 0)\r\n OLogManager.instance().debug(this, \"Removed %d session because expired\", expired);\r\n }\r\n }, expirationTime, expirationTime);\r\n }\r", "label_name": "Class", "label": 2}
1522
  {"code": " public int getExpirationTime() {\r\n return expirationTime;\r\n }\r", "label_name": "Class", "label": 2}
1523
  {"code": " protected boolean isProbablePrime(BigInteger x, int iterations)\n {\n /*\n * Primes class for FIPS 186-4 C.3 primality checking\n */\n return !Primes.hasAnySmallFactors(x) && Primes.isMRProbablePrime(x, param.getRandom(), iterations);\n }", "label_name": "Class", "label": 2}
 
1764
  {"code": " it \"should raise a warning (and keep parsing) on having an incorrectly formatted header\" do\n STDERR.should_receive(:puts).with(\"WARNING: Could not parse (and so ignoring) 'quite Delivered-To: [email protected]'\")\n Mail.read(fixture('emails', 'plain_emails', 'raw_email_incorrect_header.eml'))\n end", "label_name": "Base", "label": 1}
1765
  {"code": " def match?(name, ip)\n ip? ? pattern.include?(IPAddr.new(ip)) : matchname?(name)\n end", "label_name": "Class", "label": 2}
1766
  {"code": " def split_path(request)\n # Reparse the configuration if necessary.\n readconfig\n\n mount_name, path = request.key.split(File::Separator, 2)\n\n raise(ArgumentError, \"Cannot find file: Invalid path '#{mount_name}'\") unless mount_name =~ %r{^[-\\w]+$}\n\n return nil unless mount = find_mount(mount_name, request.environment)\n if mount.name == \"modules\" and mount_name != \"modules\"\n # yay backward-compatibility\n path = \"#{mount_name}/#{path}\"\n end\n\n if path == \"\"\n path = nil\n elsif path\n # Remove any double slashes that might have occurred\n path = path.gsub(/\\/+/, \"/\")\n end\n\n return mount, path\n end", "label_name": "Class", "label": 2}
 
1767
  {"code": " def test_update_valid\n Domain.any_instance.stubs(:valid?).returns(true)\n put :update, {:id => Domain.first.to_param, :domain => {:name => Domain.first.name }}, set_session_user\n assert_redirected_to domains_url\n end", "label_name": "Class", "label": 2}
1768
  {"code": " def test_clone\n get :clone, {:id => Hostgroup.first}, set_session_user\n assert_template 'new'\n end", "label_name": "Class", "label": 2}
1769
  {"code": " def test_update_valid\n Realm.any_instance.stubs(:valid?).returns(true)\n put :update, {:id => Realm.first.name,\n :realm => { :realm_proxy_id => SmartProxy.first.id } }, set_session_user\n assert_equal SmartProxy.first.id, Realm.first.realm_proxy_id\n assert_redirected_to realms_url\n end", "label_name": "Class", "label": 2}
 
1770
  {"code": " def self.generate_key_pair(key_base_name, recipient, real_name)\n public_key_file_name = \"#{key_base_name}.pub\"\n private_key_file_name = \"#{key_base_name}.sec\"\n script = generate_key_script(public_key_file_name, private_key_file_name, recipient, real_name)\n script_file = Tempfile.new('gpg-script')\n begin\n script_file.write(script)\n script_file.close\n result = system(\"gpg --batch --gen-key #{script_file.path}\")\n raise RuntimeError.new('gpg failed') unless result\n ensure\n script_file.close\n script_file.unlink\n end\n end", "label_name": "Base", "label": 1}
1771
  {"code": " it \"should find a user by first name or last name\" do\n @cur_user.stub(:pref).and_return(:activity_user => 'Billy')\n controller.instance_variable_set(:@current_user, @cur_user)\n User.should_receive(:where).with(\"upper(first_name) LIKE upper('%Billy%') OR upper(last_name) LIKE upper('%Billy%')\").and_return([@user])\n controller.send(:activity_user).should == 1\n end", "label_name": "Base", "label": 1}
1772
  {"code": " def tmp_dir\n ENV['TMPDIR'] || ENV['TEMP'] || '/tmp'\n end", "label_name": "CWE-310", "label": "CWE-310"}
 
1855
  {"code": " it \"should return a 403 if a user attempts to get at the _diagnostics path\" do\n get \"/message-bus/_diagnostics\"\n last_response.status.must_equal 403\n end", "label_name": "Base", "label": 1}
1856
  {"code": " def resolve_target_path(target, reader)\n return target if target_uri? target\n\n # Include file is resolved relative to dir of the current include,\n # or base_dir if within original docfile.\n path = reader.document.normalize_system_path(target, reader.dir, nil,\n target_name: 'include file')\n path if ::File.file?(path)\n end", "label_name": "Base", "label": 1}
1857
  {"code": "func canonicalMIMEHeaderKey(a []byte) string {\n\tupper := true\n\tfor i, c := range a {\n\t\t// Canonicalize: first letter upper case\n\t\t// and upper case after each dash.\n\t\t// (Host, User-Agent, If-Modified-Since).\n\t\t// MIME headers are ASCII only, so no Unicode issues.\n\t\tif c == ' ' {\n\t\t\tc = '-'\n\t\t} else if upper && 'a' <= c && c <= 'z' {\n\t\t\tc -= toLower\n\t\t} else if !upper && 'A' <= c && c <= 'Z' {\n\t\t\tc += toLower\n\t\t}\n\t\ta[i] = c\n\t\tupper = c == '-' // for next time\n\t}\n\t// The compiler recognizes m[string(byteSlice)] as a special\n\t// case, so a copy of a's bytes into a new string does not\n\t// happen in this map lookup:\n\tif v := commonHeader[string(a)]; v != \"\" {\n\t\treturn v\n\t}\n\treturn string(a)\n}", "label_name": "Base", "label": 1}
 
1858
  {"code": "func (c *linuxContainer) newSetnsProcess(p *Process, cmd *exec.Cmd, messageSockPair, logFilePair filePair) (*setnsProcess, error) {\n\tcmd.Env = append(cmd.Env, \"_LIBCONTAINER_INITTYPE=\"+string(initSetns))\n\tstate, err := c.currentState()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to get container state: %w\", err)\n\t}\n\t// for setns process, we don't have to set cloneflags as the process namespaces\n\t// will only be set via setns syscall\n\tdata, err := c.bootstrapData(0, state.NamespacePaths)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tproc := &setnsProcess{\n\t\tcmd: cmd,\n\t\tcgroupPaths: state.CgroupPaths,\n\t\trootlessCgroups: c.config.RootlessCgroups,\n\t\tintelRdtPath: state.IntelRdtPath,\n\t\tmessageSockPair: messageSockPair,\n\t\tlogFilePair: logFilePair,\n\t\tmanager: c.cgroupManager,\n\t\tconfig: c.newInitConfig(p),\n\t\tprocess: p,\n\t\tbootstrapData: data,\n\t\tinitProcessPid: state.InitProcessPid,\n\t}\n\tif len(p.SubCgroupPaths) > 0 {\n\t\tif add, ok := p.SubCgroupPaths[\"\"]; ok {\n\t\t\t// cgroup v1: using the same path for all controllers.\n\t\t\t// cgroup v2: the only possible way.\n\t\t\tfor k := range proc.cgroupPaths {\n\t\t\t\tproc.cgroupPaths[k] = path.Join(proc.cgroupPaths[k], add)\n\t\t\t}\n\t\t\t// cgroup v2: do not try to join init process's cgroup\n\t\t\t// as a fallback (see (*setnsProcess).start).\n\t\t\tproc.initProcessPid = 0\n\t\t} else {\n\t\t\t// Per-controller paths.\n\t\t\tfor ctrl, add := range p.SubCgroupPaths {\n\t\t\t\tif val, ok := proc.cgroupPaths[ctrl]; ok {\n\t\t\t\t\tproc.cgroupPaths[ctrl] = path.Join(val, add)\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, fmt.Errorf(\"unknown controller %s in SubCgroupPaths\", ctrl)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn proc, nil\n}", "label_name": "Base", "label": 1}
1859
  {"code": "func TestTruncatedCiphertext(t *testing.T) {\n\tkey := make([]byte, 32)\n\tnonce := make([]byte, 16)\n\tdata := make([]byte, 32)\n\n\tio.ReadFull(rand.Reader, key)\n\tio.ReadFull(rand.Reader, nonce)\n\n\taead, err := NewCBCHMAC(key, aes.NewCipher)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tctx := aead.(*cbcAEAD)\n\tct := aead.Seal(nil, nonce, data, nil)\n\n\t// Truncated ciphertext, but with correct auth tag\n\ttruncated, tail := resize(ct[:len(ct)-ctx.authtagBytes-2], len(ct)-2)\n\tcopy(tail, ctx.computeAuthTag(nil, nonce, truncated[:len(truncated)-ctx.authtagBytes]))\n\n\t// Open should fail\n\t_, err = aead.Open(nil, nonce, truncated, nil)\n\tif err == nil {\n\t\tt.Error(\"open on truncated ciphertext should fail\")\n\t}\n}", "label_name": "Base", "label": 1}
1860
  {"code": "func (cs chunkState) String() string {\n\tstateString := \"\"\n\tswitch cs {\n\tcase readChunkHeader:\n\t\tstateString = \"readChunkHeader\"\n\tcase readChunkTrailer:\n\t\tstateString = \"readChunkTrailer\"\n\tcase readChunk:\n\t\tstateString = \"readChunk\"\n\tcase verifyChunk:\n\t\tstateString = \"verifyChunk\"\n\tcase eofChunk:\n\t\tstateString = \"eofChunk\"\n\n\t}\n\treturn stateString\n}", "label_name": "Base", "label": 1}
train.jsonl CHANGED
@@ -1,3 +1,3 @@
1
  version https://git-lfs.github.com/spec/v1
2
- oid sha256:a2847d411e9ecdcf3c2f1b811748cc1a57545856ae76df4ed8b4e1c9969228da
3
- size 12610512
 
1
  version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4f9741c3cbbf3e38f25ff7d37349f939f25efc7e9c3d79bf6fe99d1648fbf76d
3
+ size 12453437
validation.jsonl CHANGED
The diff for this file is too large to render. See raw diff