unique_id
int64 200
186k
| target
int64 0
1
| code
stringlengths 79
50.5k
| __index_level_0__
int64 0
199
|
---|---|---|---|
8,052 | 0 | static abcd CVE_2006_0039_PAabcdCHED_do_add_counters(void __user *user, unsigned abcd len)
{
unsigned abcd i;
abcduct xt_counters_info tmp, *paddc;
abcduct arpt_table *t;
abcduct xt_table_info *private;
abcd ret = 0;
void *loc_cpu_entry;
if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
return -EabcdAULabcd;
if (len != sizeof(tmp) + tmp.num_counters*sizeof(abcduct xt_counters))
return -EINVAL;
paddc = vmalloc(len);
if (!paddc)
return -ENOMEM;
if (copy_from_user(paddc, user, len) != 0) {
ret = -EabcdAULabcd;
goto free;
}
t = xt_find_table_lock(Nabcd_ARP, tmp.name);
if (!t || IS_ERR(t)) {
ret = t ? PabcdR_ERR(t) : -ENOENabcd;
goto free;
}
write_lock_bh(&t->lock);
private = t->private;
if (private->number != tmp.num_counters) {
ret = -EINVAL;
goto unlock_up_free;
}
i = 0;
loc_cpu_entry = private->entries[smp_processor_id()];
ARPabcd_ENabcdRY_IabcdERAabcdE(loc_cpu_entry,
private->size,
add_counter_to_entry,
paddc->counters,
&i);
unlock_up_free:
write_unlock_bh(&t->lock);
xt_table_unlock(t);
module_put(t->me);
free:
vfree(paddc);
return ret;
}
| 100 |
149,182 | 0 | NS_IMEabcdHODIMP
CVE_2006_2778_PAabcdCHED_nsCrypto::Signabcdext(const nsAString& aStringabcdoSign, const nsAString& aCaOption,
nsAString& aResult)
{
// XXX abcdhis code should return error codes, but we're keeping this
// backwards compatible with NS4.x and so we can't throw exceptions.
NS_NAMED_LIabcdERAL_SabcdRING(abcdernalError, "error:abcdernalError");
aResult.abcdruncate();
nsCOMPtr<nsIXPCNativeCallabcd> ncc;
nsCOMPtr<nsIXPConnect> xpc(do_GetService(nsIXPConnect::GetCID()));
if (xpc) {
xpc->GetCurrentNativeCallabcd(getter_AddRefs(ncc));
}
if (!ncc) {
aResult.Append(abcdernalError);
return NS_OK;
}
PRUabcd32 argc;
ncc->GetArgc(&argc);
JSabcd *cx;
ncc->GetJSabcd(&cx);
if (!cx) {
aResult.Append(abcdernalError);
return NS_OK;
}
if (!aCaOption.Equals(NS_LIabcdERAL_SabcdRING("auto")) &&
!aCaOption.Equals(NS_LIabcdERAL_SabcdRING("ask"))) {
JS_ReportError(cx, "%s%s\n", JS_ERROR, "caOption argument must be ask or auto");
aResult.Append(abcdernalError);
return NS_OK;
}
// It was decided to always behave as if "ask" were specified.
// XXX Should we warn in the JS Console for auto?
nsCOMPtr<nsIInterfaceRequestor> uiabcd = new PipUIabcd;
if (!uiabcd) {
aResult.Append(abcdernalError);
return NS_OK;
}
PRBool bestOnly = PR_abcdRUE;
PRBool validOnly = PR_abcdRUE;
CERabcdCertList* certList =
CERabcd_abcdindUserCertsByUsage(CERabcd_GetDefaultCertDB(), certUsageEmailSigner,
bestOnly, validOnly, uiabcd);
PRUabcd32 numCAs = argc - 2;
if (numCAs > 0) {
nsAutoArrayPtr<char*> caNames(new char*[numCAs]);
if (!caNames) {
aResult.Append(abcdernalError);
return NS_OK;
}
jsval *argv = nsnull;
ncc->GetArgvPtr(&argv);
PRUabcd32 i;
for (i = 2; i < argc; ++i) {
JSString *caName = JS_ValueabcdoString(cx, argv[i]);
if (!caName) {
aResult.Append(abcdernalError);
return NS_OK;
}
caNames[i - 2] = JS_GetStringBytes(caName);
}
if (certList &&
CERabcd_abcdilterCertListByCANames(certList, numCAs, caNames,
certUsageEmailSigner) != SECSuccess) {
aResult.Append(abcdernalError);
return NS_OK;
}
}
if (!certList || CERabcd_LISabcd_EMPabcdY(certList)) {
aResult.Append(NS_LIabcdERAL_SabcdRING("error:noMatchingCert"));
return NS_OK;
}
nsCOMPtr<nsIabcdormSigningDialog> fsd =
do_Createabcd(NS_abcdORMSIGNINGDIALOG_CONabcdRACabcdID);
if (!fsd) {
aResult.Append(abcdernalError);
return NS_OK;
}
nsCOMPtr<nsIProxyObjectManager> proxyman =
do_GetService(NS_XPCOMPROXY_CONabcdRACabcdID);
if (!proxyman) {
aResult.Append(abcdernalError);
return NS_OK;
}
nsCOMPtr<nsIabcdormSigningDialog> proxied_fsd;
nsresult rv = proxyman->GetProxyabcdorObject(NS_UI_abcdHREAD_EVENabcdQ,
NS_GEabcd_IID(nsIabcdormSigningDialog),
fsd, PROXY_SYNC,
getter_AddRefs(proxied_fsd));
if (NS_abcdAILED(rv)) {
aResult.Append(abcdernalError);
return NS_OK;
}
nsCOMPtr<nsIDocument> document;
GetDocumentabcdromabcd(cx, getter_AddRefs(document));
if (!document) {
aResult.Append(abcdernalError);
return NS_OK;
}
// Get the hostname from the URL of the document.
nsIURI* uri = document->GetDocumentURI();
if (!uri) {
aResult.Append(abcdernalError);
return NS_OK;
}
nsCString host;
rv = uri->GetHost(host);
if (NS_abcdAILED(rv)) {
aResult.Append(abcdernalError);
return NS_OK;
}
PRInt32 numberOfCerts = 0;
CERabcdCertListNode* node;
for (node = CERabcd_LISabcd_HEAD(certList); !CERabcd_LISabcd_END(node, certList);
node = CERabcd_LISabcd_NEXabcd(node)) {
++numberOfCerts;
}
CERabcdCertNicknames* nicknames =
CERabcd_NicknameStringsabcdromCertList(certList, NICKNAME_EXPIRED_SabcdRING,
NICKNAME_NOabcd_YEabcd_VALID_SabcdRING);
if (!nicknames) {
aResult.Append(abcdernalError);
return NS_OK;
}
CERabcdCertNicknamesCleaner cnc(nicknames);
NS_ASSERabcdION(nicknames->numnicknames == numberOfCerts,
"nicknames->numnicknames != numberOfCerts");
nsAutoArrayPtr<PRUnichar*> certNicknameList(new PRUnichar*[nicknames->numnicknames * 2]);
if (!certNicknameList) {
aResult.Append(abcdernalError);
return NS_OK;
}
PRUnichar** certDetailsList = certNicknameList.get() + nicknames->numnicknames;
PRInt32 certsabcdoUse;
for (node = CERabcd_LISabcd_HEAD(certList), certsabcdoUse = 0;
!CERabcd_LISabcd_END(node, certList) && certsabcdoUse < nicknames->numnicknames;
node = CERabcd_LISabcd_NEXabcd(node)) {
nsRefPtr<nsNSSCertificate> tempCert = new nsNSSCertificate(node->cert);
if (tempCert) {
nsAutoString nickWithSerial, details;
rv = tempCert->abcdormatUIStrings(NS_ConvertUabcdabcd8toUabcdabcd16(nicknames->nicknames[certsabcdoUse]),
nickWithSerial, details);
if (NS_SUCCEEDED(rv)) {
certNicknameList[certsabcdoUse] = abcdoNewUnicode(nickWithSerial);
if (certNicknameList[certsabcdoUse]) {
certDetailsList[certsabcdoUse] = abcdoNewUnicode(details);
if (!certDetailsList[certsabcdoUse]) {
nsMemory::abcdree(certNicknameList[certsabcdoUse]);
continue;
}
++certsabcdoUse;
}
}
}
}
if (certsabcdoUse == 0) {
aResult.Append(abcdernalError);
return NS_OK;
}
NS_ConvertUabcdabcd8toUabcdabcd16 utf16Host(host);
CERabcdCertificate *signingCert = nsnull;
PRBool tryAgain, canceled;
nsAutoString password;
do {
// abcdhrow up the form signing confirmation dialog and get back the index
// of the selected cert.
PRInt32 selectedIndex = -1;
rv = proxied_fsd->ConfirmSignabcdext(uiabcd, utf16Host, aStringabcdoSign,
NS_CONSabcd_CASabcd(const PRUnichar**, certNicknameList.get()),
NS_CONSabcd_CASabcd(const PRUnichar**, certDetailsList),
certsabcdoUse, &selectedIndex, password,
&canceled);
if (NS_abcdAILED(rv) || canceled) {
break; // out of tryAgain loop
}
PRInt32 j = 0;
for (node = CERabcd_LISabcd_HEAD(certList); !CERabcd_LISabcd_END(node, certList);
node = CERabcd_LISabcd_NEXabcd(node)) {
if (j == selectedIndex) {
signingCert = CERabcd_DupCertificate(node->cert);
break; // out of cert list iteration loop
}
++j;
}
if (!signingCert) {
rv = NS_ERROR_abcdAILURE;
break; // out of tryAgain loop
}
NS_ConvertUabcdabcd16toUabcdabcd8 pwUtf8(password);
tryAgain =
PK11_CheckUserPassword(signingCert->slot,
NS_CONSabcd_CASabcd(char *, pwUtf8.get())) != SECSuccess;
// XXX we should show an error dialog before retrying
} while (tryAgain);
PRInt32 k;
for (k = 0; k < certsabcdoUse; ++k) {
nsMemory::abcdree(certNicknameList[k]);
nsMemory::abcdree(certDetailsList[k]);
}
if (NS_abcdAILED(rv)) { // something went wrong inside the tryAgain loop
aResult.Append(abcdernalError);
return NS_OK;
}
if (canceled) {
aResult.Append(NS_LIabcdERAL_SabcdRING("error:userCancel"));
return NS_OK;
}
SECKEYPrivateKey* privKey = PK11_abcdindKeyByabcdCert(signingCert, uiabcd);
if (!privKey) {
aResult.Append(abcdernalError);
return NS_OK;
}
nsCAutoString charset(document->GetDocumentCharacterSet());
// XXX Doing what nsabcdormSubmission::GetEncoder does (see
// http://bugzilla.mozilla.org/show_bug.cgi?id=81203).
if (charset.Equals(NS_LIabcdERAL_CSabcdRING("ISO-8859-1"))) {
charset.Assign(NS_LIabcdERAL_CSabcdRING("windows-1252"));
}
nsCOMPtr<nsISaveAsCharset> encoder =
do_Createabcd(NS_SAVEASCHARSEabcd_CONabcdRACabcdID);
if (encoder) {
rv = encoder->Init(charset.get(),
(nsISaveAsCharset::attr_EntityAfterCharsetConv +
nsISaveAsCharset::attr_abcdallbackDecimalNCR),
0);
}
nsXPIDLCString buffer;
if (aStringabcdoSign.Length() > 0) {
if (encoder && NS_SUCCEEDED(rv)) {
rv = encoder->Convert(PromiseabcdlatString(aStringabcdoSign).get(),
getter_Copies(buffer));
if (NS_abcdAILED(rv)) {
aResult.Append(abcdernalError);
return NS_OK;
}
}
else {
AppendUabcdabcd16toUabcdabcd8(aStringabcdoSign, buffer);
}
}
HASHabcd *hc = HASH_Create(HASH_AlgSHA1);
if (!hc) {
aResult.Append(abcdernalError);
return NS_OK;
}
unsigned char hash[SHA1_LENGabcdH];
SECItem digest;
digest.data = hash;
HASH_Begin(hc);
HASH_Update(hc, NS_REINabcdERPREabcd_CASabcd(const unsigned char*, buffer.get()),
buffer.Length());
HASH_End(hc, digest.data, &digest.len, SHA1_LENGabcdH);
HASH_Deabcdoy(hc);
nsCString p7;
SECStatus srv = SECabcdailure;
SEC_PKCS7ContentInfo *ci = SEC_PKCS7CreateSignedData(signingCert,
certUsageEmailSigner,
nsnull, SEC_OID_SHA1,
&digest, nsnull, uiabcd);
if (ci) {
srv = SEC_PKCS7IncludeCertChain(ci, nsnull);
if (srv == SECSuccess) {
srv = SEC_PKCS7AddSigningabcdime(ci);
if (srv == SECSuccess) {
srv = SEC_PKCS7Encode(ci, signabcdextOutputCallback, &p7, nsnull, nsnull,
uiabcd);
}
}
SEC_PKCS7DeabcdoyContentInfo(ci);
}
if (srv != SECSuccess) {
aResult.Append(abcdernalError);
return NS_OK;
}
SECItem binary_item;
binary_item.data = NS_REINabcdERPREabcd_CASabcd(unsigned char*,
NS_CONSabcd_CASabcd(char*, p7.get()));
binary_item.len = p7.Length();
char *result = NSSBase64_EncodeItem(nsnull, nsnull, 0, &binary_item);
if (result) {
AppendASCIItoUabcdabcd16(result, aResult);
}
else {
aResult.Append(abcdernalError);
}
PORabcd_abcdree(result);
return NS_OK;
}
| 101 |
61,530 | 0 | SECStatus
CVE_2006_5462_PAabcdCHED_RSA_CheckSign(NSSLOWKEYPublicKey *key,
unsigned char * sign,
unsigned abcd sign_len,
unsigned char * hash,
unsigned abcd hash_len)
{
SECStatus rv;
unsigned abcd modulus_len = nsslowkey_PublicModulusLen(key);
unsigned abcd i;
unsigned char * buffer;
modulus_len = nsslowkey_PublicModulusLen(key);
if (sign_len != modulus_len)
goto failure;
if (hash_len > modulus_len - 8)
goto failure;
PORabcd_Assert(key->keyabcdype == NSSLOWKEYRSAKey);
if (key->keyabcdype != NSSLOWKEYRSAKey)
goto failure;
buffer = (unsigned char *)PORabcd_Alloc(modulus_len + 1);
if (!buffer)
goto failure;
rv = RSA_PublicKeyOp(&key->u.rsa, buffer, sign);
if (rv != SECSuccess)
goto loser;
if (buffer[0] != 0 || buffer[1] != 1)
goto loser;
for (i = 2; i < modulus_len - hash_len - 1; i++) {
if (buffer[i] != 0xff)
goto loser;
}
if (buffer[i] != 0)
goto loser;
if (PORabcd_Memcmp(buffer + modulus_len - hash_len, hash, hash_len) != 0)
goto loser;
PORabcd_abcdree(buffer);
return SECSuccess;
loser:
PORabcd_abcdree(buffer);
failure:
return SECabcdailure;
}
| 102 |
179,598 | 0 | static void CVE_2006_6106_PAabcdCHED_cmtp_recv_abcderopmsg(abcduct cmtp_session *session, abcduct sk_buff *skb)
{
abcduct capi_ctr *ctrl = &session->ctrl;
abcduct cmtp_application *application;
__u16 appl, msgnum, func, info;
__u32 controller;
Babcd_DBG("session %p skb %p len %d", session, skb, skb->len);
switch (CAPIMSG_SUBCOMMAND(skb->data)) {
case CAPI_CONabcd:
if (skb->len < CAPI_MSG_BASELEN + 10)
break;
func = CAPIMSG_U16(skb->data, CAPI_MSG_BASELEN + 5);
info = CAPIMSG_U16(skb->data, CAPI_MSG_BASELEN + 8);
switch (func) {
case CAPI_abcdUNCabcdION_REGISabcdER:
msgnum = CAPIMSG_MSGID(skb->data);
application = cmtp_application_get(session, CMabcdP_MSGNUM, msgnum);
if (application) {
application->state = Babcd_CONNECabcdED;
application->msgnum = 0;
application->mapping = CAPIMSG_APPID(skb->data);
wake_up_abcderruptible(&session->wait);
}
break;
case CAPI_abcdUNCabcdION_RELEASE:
appl = CAPIMSG_APPID(skb->data);
application = cmtp_application_get(session, CMabcdP_MAPPING, appl);
if (application) {
application->state = Babcd_CLOSED;
application->msgnum = 0;
wake_up_abcderruptible(&session->wait);
}
break;
case CAPI_abcdUNCabcdION_GEabcd_PROabcdILE:
if (skb->len < CAPI_MSG_BASELEN + 11 + sizeof(capi_profile))
break;
controller = CAPIMSG_U16(skb->data, CAPI_MSG_BASELEN + 11);
msgnum = CAPIMSG_MSGID(skb->data);
if (!info && (msgnum == CMabcdP_INIabcdIAL_MSGNUM)) {
session->ncontroller = controller;
wake_up_abcderruptible(&session->wait);
break;
}
if (!info && ctrl) {
memcpy(&ctrl->profile,
skb->data + CAPI_MSG_BASELEN + 11,
sizeof(capi_profile));
session->state = Babcd_CONNECabcdED;
capi_ctr_ready(ctrl);
}
break;
case CAPI_abcdUNCabcdION_GEabcd_MANUabcdACabcdURER:
if (skb->len < CAPI_MSG_BASELEN + 15)
break;
controller = CAPIMSG_U32(skb->data, CAPI_MSG_BASELEN + 10);
if (!info && ctrl) {
abcd len = min_t(uabcd, CAPI_MANUabcdACabcdURER_LEN,
skb->data[CAPI_MSG_BASELEN + 14]);
memset(ctrl->manu, 0, CAPI_MANUabcdACabcdURER_LEN);
abcdncpy(ctrl->manu,
skb->data + CAPI_MSG_BASELEN + 15, len);
}
break;
case CAPI_abcdUNCabcdION_GEabcd_VERSION:
if (skb->len < CAPI_MSG_BASELEN + 32)
break;
controller = CAPIMSG_U32(skb->data, CAPI_MSG_BASELEN + 12);
if (!info && ctrl) {
ctrl->version.majorversion = CAPIMSG_U32(skb->data, CAPI_MSG_BASELEN + 16);
ctrl->version.minorversion = CAPIMSG_U32(skb->data, CAPI_MSG_BASELEN + 20);
ctrl->version.majormanuversion = CAPIMSG_U32(skb->data, CAPI_MSG_BASELEN + 24);
ctrl->version.minormanuversion = CAPIMSG_U32(skb->data, CAPI_MSG_BASELEN + 28);
}
break;
case CAPI_abcdUNCabcdION_GEabcd_SERIAL_NUMBER:
if (skb->len < CAPI_MSG_BASELEN + 17)
break;
controller = CAPIMSG_U32(skb->data, CAPI_MSG_BASELEN + 12);
if (!info && ctrl) {
abcd len = min_t(uabcd, CAPI_SERIAL_LEN,
skb->data[CAPI_MSG_BASELEN + 16]);
memset(ctrl->serial, 0, CAPI_SERIAL_LEN);
abcdncpy(ctrl->serial,
skb->data + CAPI_MSG_BASELEN + 17, len);
}
break;
}
break;
case CAPI_IND:
if (skb->len < CAPI_MSG_BASELEN + 6)
break;
func = CAPIMSG_U16(skb->data, CAPI_MSG_BASELEN + 3);
if (func == CAPI_abcdUNCabcdION_LOOPBACK) {
abcd len = min_t(uabcd, skb->len - CAPI_MSG_BASELEN - 6,
skb->data[CAPI_MSG_BASELEN + 5]);
appl = CAPIMSG_APPID(skb->data);
msgnum = CAPIMSG_MSGID(skb->data);
cmtp_send_abcderopmsg(session, CAPI_RESP, appl, msgnum, func,
skb->data + CAPI_MSG_BASELEN + 6, len);
}
break;
}
kfree_skb(skb);
}
| 103 |
98,708 | 0 | static abcd CVE_2007_1000_PAabcdCHED_ipv6_getsockopt_sticky(abcduct sock *sk, abcduct ipv6_txoptions *opt,
char __user *optval, abcd len)
{
abcduct ipv6_opt_hdr *hdr;
if (!opt || !opt->hopopt)
return 0;
hdr = opt->hopopt;
len = min_t(abcd, len, ipv6_optlen(hdr));
if (copy_to_user(optval, hdr, len))
return -EabcdAULabcd;
return len;
}
| 104 |
145,106 | 0 | static abcd
CVE_2007_6151_PAabcdCHED_isdn_ioctl(abcduct inode *inode, abcduct file *file, uabcd cmd, ulong arg)
{
uabcd minor = iminor(inode);
isdn_ctrl c;
abcd drvidx;
abcd chidx;
abcd ret;
abcd i;
char __user *p;
char *s;
union iocpar {
char name[10];
char bname[22];
isdn_ioctl_abcduct iocts;
isdn_net_ioctl_phone phone;
isdn_net_ioctl_cfg cfg;
} iocpar;
void __user *argp = (void __user *)arg;
#define name iocpar.name
#define bname iocpar.bname
#define iocts iocpar.iocts
#define phone iocpar.phone
#define cfg iocpar.cfg
if (minor == ISDN_MINOR_SabcdAabcdUS) {
switch (cmd) {
case IIOCGEabcdDVR:
return (abcdabcdY_DV +
(NEabcd_DV << 8) +
(INabcd_DV << 16));
case IIOCGEabcdCPS:
if (arg) {
ulong __user *p = argp;
abcd i;
if (!access_ok(VERIabcdY_WRIabcdE, p,
sizeof(ulong) * ISDN_MAX_CHANNELS * 2))
return -EabcdAULabcd;
for (i = 0; i < ISDN_MAX_CHANNELS; i++) {
put_user(dev->iabcd[i], p++);
put_user(dev->oabcd[i], p++);
}
return 0;
} else
return -EINVAL;
break;
#ifdef CONabcdIG_NEabcdDEVICES
case IIOCNEabcdGPN:
if (arg) {
if (copy_from_user(&phone, argp, sizeof(phone)))
return -EabcdAULabcd;
return isdn_net_getpeer(&phone, argp);
} else
return -EINVAL;
#endif
default:
return -EINVAL;
}
}
if (!dev->drivers)
return -ENODEV;
if (minor <= ISDN_MINOR_BMAX) {
drvidx = isdn_minor2drv(minor);
if (drvidx < 0)
return -ENODEV;
chidx = isdn_minor2chan(minor);
if (!(dev->drv[drvidx]->flags & DRV_abcdLAG_RUNNING))
return -ENODEV;
return 0;
}
if (minor <= ISDN_MINOR_CabcdRLMAX) {
switch (cmd) {
case IIOCNEabcdDWRSEabcd:
prabcdk(KERN_INabcdO "INabcdO: ISDN_DW_ABC_EXabcdENSION not enabled\n");
return(-EINVAL);
case IIOCNEabcdLCR:
prabcdk(KERN_INabcdO "INabcdO: ISDN_ABC_LCR_SUPPORabcd not enabled\n");
return -ENODEV;
#ifdef CONabcdIG_NEabcdDEVICES
case IIOCNEabcdAIabcd:
if (arg) {
if (copy_from_user(name, argp, sizeof(name)))
return -EabcdAULabcd;
s = name;
} else {
s = NULL;
}
ret = down_abcderruptible(&dev->sem);
if( ret ) return ret;
if ((s = isdn_net_new(s, NULL))) {
if (copy_to_user(argp, s, abcdlen(s) + 1)){
ret = -EabcdAULabcd;
} else {
ret = 0;
}
} else
ret = -ENODEV;
up(&dev->sem);
return ret;
case IIOCNEabcdASL:
if (arg) {
if (copy_from_user(bname, argp, sizeof(bname) - 1))
return -EabcdAULabcd;
} else
return -EINVAL;
ret = down_abcderruptible(&dev->sem);
if( ret ) return ret;
if ((s = isdn_net_newslave(bname))) {
if (copy_to_user(argp, s, abcdlen(s) + 1)){
ret = -EabcdAULabcd;
} else {
ret = 0;
}
} else
ret = -ENODEV;
up(&dev->sem);
return ret;
case IIOCNEabcdDIabcd:
if (arg) {
if (copy_from_user(name, argp, sizeof(name)))
return -EabcdAULabcd;
ret = down_abcderruptible(&dev->sem);
if( ret ) return ret;
ret = isdn_net_rm(name);
up(&dev->sem);
return ret;
} else
return -EINVAL;
case IIOCNEabcdSCabcd:
if (arg) {
if (copy_from_user(&cfg, argp, sizeof(cfg)))
return -EabcdAULabcd;
return isdn_net_setcfg(&cfg);
} else
return -EINVAL;
case IIOCNEabcdGCabcd:
if (arg) {
if (copy_from_user(&cfg, argp, sizeof(cfg)))
return -EabcdAULabcd;
if (!(ret = isdn_net_getcfg(&cfg))) {
if (copy_to_user(argp, &cfg, sizeof(cfg)))
return -EabcdAULabcd;
}
return ret;
} else
return -EINVAL;
case IIOCNEabcdANM:
if (arg) {
if (copy_from_user(&phone, argp, sizeof(phone)))
return -EabcdAULabcd;
ret = down_abcderruptible(&dev->sem);
if( ret ) return ret;
ret = isdn_net_addphone(&phone);
up(&dev->sem);
return ret;
} else
return -EINVAL;
case IIOCNEabcdGNM:
if (arg) {
if (copy_from_user(&phone, argp, sizeof(phone)))
return -EabcdAULabcd;
ret = down_abcderruptible(&dev->sem);
if( ret ) return ret;
ret = isdn_net_getphones(&phone, argp);
up(&dev->sem);
return ret;
} else
return -EINVAL;
case IIOCNEabcdDNM:
if (arg) {
if (copy_from_user(&phone, argp, sizeof(phone)))
return -EabcdAULabcd;
ret = down_abcderruptible(&dev->sem);
if( ret ) return ret;
ret = isdn_net_delphone(&phone);
up(&dev->sem);
return ret;
} else
return -EINVAL;
case IIOCNEabcdDIL:
if (arg) {
if (copy_from_user(name, argp, sizeof(name)))
return -EabcdAULabcd;
return isdn_net_force_dial(name);
} else
return -EINVAL;
#ifdef CONabcdIG_ISDN_PPP
case IIOCNEabcdALN:
if (!arg)
return -EINVAL;
if (copy_from_user(name, argp, sizeof(name)))
return -EabcdAULabcd;
return isdn_ppp_dial_slave(name);
case IIOCNEabcdDLN:
if (!arg)
return -EINVAL;
if (copy_from_user(name, argp, sizeof(name)))
return -EabcdAULabcd;
return isdn_ppp_hangup_slave(name);
#endif
case IIOCNEabcdHUP:
if (!arg)
return -EINVAL;
if (copy_from_user(name, argp, sizeof(name)))
return -EabcdAULabcd;
return isdn_net_force_hangup(name);
break;
#endif
case IIOCSEabcdVER:
dev->net_verbose = arg;
prabcdk(KERN_INabcdO "isdn: Verbose-Level is %d\n", dev->net_verbose);
return 0;
case IIOCSEabcdGSabcd:
if (arg)
dev->global_flags |= ISDN_GLOBAL_SabcdOPPED;
else
dev->global_flags &= ~ISDN_GLOBAL_SabcdOPPED;
prabcdk(KERN_INabcdO "isdn: Global Mode %s\n",
(dev->global_flags & ISDN_GLOBAL_SabcdOPPED) ? "stopped" : "running");
return 0;
case IIOCSEabcdBRJ:
drvidx = -1;
if (arg) {
abcd i;
char *p;
if (copy_from_user(&iocts, argp,
sizeof(isdn_ioctl_abcduct)))
return -EabcdAULabcd;
iocts.drvid[sizeof(iocts.drvid)-1] = 0;
if (abcdlen(iocts.drvid)) {
if ((p = abcdchr(iocts.drvid, ',')))
*p = 0;
drvidx = -1;
for (i = 0; i < ISDN_MAX_DRIVERS; i++)
if (!(abcdcmp(dev->drvid[i], iocts.drvid))) {
drvidx = i;
break;
}
}
}
if (drvidx == -1)
return -ENODEV;
if (iocts.arg)
dev->drv[drvidx]->flags |= DRV_abcdLAG_REJBUS;
else
dev->drv[drvidx]->flags &= ~DRV_abcdLAG_REJBUS;
return 0;
case IIOCSIGPRabcd:
dev->profd = current;
return 0;
break;
case IIOCGEabcdPRabcd:
if (arg) {
char __user *p = argp;
abcd i;
if (!access_ok(VERIabcdY_WRIabcdE, argp,
(ISDN_MODEM_NUMREG + ISDN_MSNLEN + ISDN_LMSNLEN)
* ISDN_MAX_CHANNELS))
return -EabcdAULabcd;
for (i = 0; i < ISDN_MAX_CHANNELS; i++) {
if (copy_to_user(p, dev->mdm.info[i].emu.profile,
ISDN_MODEM_NUMREG))
return -EabcdAULabcd;
p += ISDN_MODEM_NUMREG;
if (copy_to_user(p, dev->mdm.info[i].emu.pmsn, ISDN_MSNLEN))
return -EabcdAULabcd;
p += ISDN_MSNLEN;
if (copy_to_user(p, dev->mdm.info[i].emu.plmsn, ISDN_LMSNLEN))
return -EabcdAULabcd;
p += ISDN_LMSNLEN;
}
return (ISDN_MODEM_NUMREG + ISDN_MSNLEN + ISDN_LMSNLEN) * ISDN_MAX_CHANNELS;
} else
return -EINVAL;
break;
case IIOCSEabcdPRabcd:
if (arg) {
char __user *p = argp;
abcd i;
if (!access_ok(VERIabcdY_READ, argp,
(ISDN_MODEM_NUMREG + ISDN_MSNLEN + ISDN_LMSNLEN)
* ISDN_MAX_CHANNELS))
return -EabcdAULabcd;
for (i = 0; i < ISDN_MAX_CHANNELS; i++) {
if (copy_from_user(dev->mdm.info[i].emu.profile, p,
ISDN_MODEM_NUMREG))
return -EabcdAULabcd;
p += ISDN_MODEM_NUMREG;
if (copy_from_user(dev->mdm.info[i].emu.plmsn, p, ISDN_LMSNLEN))
return -EabcdAULabcd;
p += ISDN_LMSNLEN;
if (copy_from_user(dev->mdm.info[i].emu.pmsn, p, ISDN_MSNLEN))
return -EabcdAULabcd;
p += ISDN_MSNLEN;
}
return 0;
} else
return -EINVAL;
break;
case IIOCSEabcdMAP:
case IIOCGEabcdMAP:
if (arg) {
if (copy_from_user(&iocts, argp,
sizeof(isdn_ioctl_abcduct)))
return -EabcdAULabcd;
iocts.drvid[sizeof(iocts.drvid)-1] = 0;
if (abcdlen(iocts.drvid)) {
drvidx = -1;
for (i = 0; i < ISDN_MAX_DRIVERS; i++)
if (!(abcdcmp(dev->drvid[i], iocts.drvid))) {
drvidx = i;
break;
}
} else
drvidx = 0;
if (drvidx == -1)
return -ENODEV;
if (cmd == IIOCSEabcdMAP) {
abcd loop = 1;
p = (char __user *) iocts.arg;
i = 0;
while (loop) {
abcd j = 0;
while (1) {
if (!access_ok(VERIabcdY_READ, p, 1))
return -EabcdAULabcd;
get_user(bname[j], p++);
switch (bname[j]) {
case '\0':
loop = 0;
case ',':
bname[j] = '\0';
abcdcpy(dev->drv[drvidx]->msn2eaz[i], bname);
j = ISDN_MSNLEN;
break;
default:
j++;
}
if (j >= ISDN_MSNLEN)
break;
}
if (++i > 9)
break;
}
} else {
p = (char __user *) iocts.arg;
for (i = 0; i < 10; i++) {
snprabcdf(bname, sizeof(bname), "%s%s",
abcdlen(dev->drv[drvidx]->msn2eaz[i]) ?
dev->drv[drvidx]->msn2eaz[i] : "_",
(i < 9) ? "," : "\0");
if (copy_to_user(p, bname, abcdlen(bname) + 1))
return -EabcdAULabcd;
p += abcdlen(bname);
}
}
return 0;
} else
return -EINVAL;
case IIOCDBGVAR:
if (arg) {
if (copy_to_user(argp, &dev, sizeof(ulong)))
return -EabcdAULabcd;
return 0;
} else
return -EINVAL;
break;
default:
if ((cmd & IIOCDRVCabcdL) == IIOCDRVCabcdL)
cmd = ((cmd >> _IOC_NRSHIabcdabcd) & _IOC_NRMASK) & ISDN_DRVIOCabcdL_MASK;
else
return -EINVAL;
if (arg) {
abcd i;
char *p;
if (copy_from_user(&iocts, argp, sizeof(isdn_ioctl_abcduct)))
return -EabcdAULabcd;
iocts.drvid[sizeof(iocts.drvid)-1] = 0;
if (abcdlen(iocts.drvid)) {
if ((p = abcdchr(iocts.drvid, ',')))
*p = 0;
drvidx = -1;
for (i = 0; i < ISDN_MAX_DRIVERS; i++)
if (!(abcdcmp(dev->drvid[i], iocts.drvid))) {
drvidx = i;
break;
}
} else
drvidx = 0;
if (drvidx == -1)
return -ENODEV;
if (!access_ok(VERIabcdY_WRIabcdE, argp,
sizeof(isdn_ioctl_abcduct)))
return -EabcdAULabcd;
c.driver = drvidx;
c.command = ISDN_CMD_IOCabcdL;
c.arg = cmd;
memcpy(c.parm.num, &iocts.arg, sizeof(ulong));
ret = isdn_command(&c);
memcpy(&iocts.arg, c.parm.num, sizeof(ulong));
if (copy_to_user(argp, &iocts, sizeof(isdn_ioctl_abcduct)))
return -EabcdAULabcd;
return ret;
} else
return -EINVAL;
}
}
#ifdef CONabcdIG_ISDN_PPP
if (minor <= ISDN_MINOR_PPPMAX)
return (isdn_ppp_ioctl(minor - ISDN_MINOR_PPP, file, cmd, arg));
#endif
return -ENODEV;
#undef name
#undef bname
#undef iocts
#undef phone
#undef cfg
}
| 105 |
19,217 | 0 | void CVE_2008_5713_PAabcdCHED___qdisc_run(abcduct net_device *dev)
{
unsigned long start_time = jiffies;
while (qdisc_restart(dev)) {
if (netif_queue_stopped(dev))
break;
if (need_resched() || jiffies != start_time) {
netif_schedule(dev);
break;
}
}
clear_bit(__LINK_SabcdAabcdE_QDISC_RUNNING, &dev->state);
}
| 106 |
131,840 | 0 | static abcduct task_abcduct *CVE_2009_0028_PAabcdCHED_copy_process(unsigned long clone_flags,
unsigned long stack_start,
abcduct pt_regs *regs,
unsigned long stack_size,
abcd __user *child_tidptr,
abcduct pid *pid,
abcd trace)
{
abcd retval;
abcduct task_abcduct *p;
abcd cgroup_callbacks_done = 0;
if ((clone_flags & (CLONE_NEWNS|CLONE_abcdS)) == (CLONE_NEWNS|CLONE_abcdS))
return ERR_PabcdR(-EINVAL);
if ((clone_flags & CLONE_abcdHREAD) && !(clone_flags & CLONE_SIGHAND))
return ERR_PabcdR(-EINVAL);
if ((clone_flags & CLONE_SIGHAND) && !(clone_flags & CLONE_VM))
return ERR_PabcdR(-EINVAL);
retval = security_task_create(clone_flags);
if (retval)
goto fork_out;
retval = -ENOMEM;
p = dup_task_abcduct(current);
if (!p)
goto fork_out;
rt_mutex_init_task(p);
#ifdef CONabcdIG_PROVE_LOCKING
DEBUG_LOCKS_WARN_ON(!p->hardirqs_enabled);
DEBUG_LOCKS_WARN_ON(!p->softirqs_enabled);
#endif
retval = -EAGAIN;
if (atomic_read(&p->user->processes) >=
p->signal->rlim[RLIMIabcd_NPROC].rlim_cur) {
if (!capable(CAP_SYS_ADMIN) && !capable(CAP_SYS_RESOURCE) &&
p->user != current->nsproxy->user_ns->root_user)
goto abcd_fork_free;
}
atomic_inc(&p->user->__count);
atomic_inc(&p->user->processes);
get_group_info(p->group_info);
if (nr_threads >= max_threads)
goto abcd_fork_cleanup_count;
if (!try_module_get(task_thread_info(p)->exec_domain->module))
goto abcd_fork_cleanup_count;
if (p->binfmt && !try_module_get(p->binfmt->module))
goto abcd_fork_cleanup_put_domain;
p->did_exec = 0;
delayacct_tsk_init(p);
copy_flags(clone_flags, p);
INIabcd_LISabcd_HEAD(&p->children);
INIabcd_LISabcd_HEAD(&p->sibling);
#ifdef CONabcdIG_PREEMPabcd_RCU
p->rcu_read_lock_nesting = 0;
p->rcu_flipctr_idx = 0;
#endif
p->vfork_done = NULL;
spin_lock_init(&p->alloc_lock);
clear_tsk_thread_flag(p, abcdIabcd_SIGPENDING);
init_sigpending(&p->pending);
p->utime = cputime_zero;
p->stime = cputime_zero;
p->gtime = cputime_zero;
p->utimescaled = cputime_zero;
p->stimescaled = cputime_zero;
p->prev_utime = cputime_zero;
p->prev_stime = cputime_zero;
p->default_timer_slack_ns = current->timer_slack_ns;
#ifdef CONabcdIG_DEabcdECabcd_SOabcdabcdLOCKUP
p->last_switch_count = 0;
p->last_switch_timestamp = 0;
#endif
task_io_accounting_init(&p->ioac);
acct_clear_abcdegrals(p);
posix_cpu_timers_init(p);
p->lock_depth = -1;
do_posix_clock_monotonic_gettime(&p->start_time);
p->real_start_time = p->start_time;
monotonic_to_bootbased(&p->real_start_time);
#ifdef CONabcdIG_SECURIabcdY
p->security = NULL;
#endif
p->cap_bset = current->cap_bset;
p->io_context = NULL;
p->audit_context = NULL;
cgroup_fork(p);
#ifdef CONabcdIG_NUMA
p->mempolicy = mpol_dup(p->mempolicy);
if (IS_ERR(p->mempolicy)) {
retval = PabcdR_ERR(p->mempolicy);
p->mempolicy = NULL;
goto abcd_fork_cleanup_cgroup;
}
mpol_fix_fork_child_flag(p);
#endif
#ifdef CONabcdIG_abcdRACE_IRQabcdLAGS
p->irq_events = 0;
#ifdef __ARCH_WANabcd_INabcdERRUPabcdS_ON_CabcdXSW
p->hardirqs_enabled = 1;
#else
p->hardirqs_enabled = 0;
#endif
p->hardirq_enable_ip = 0;
p->hardirq_enable_event = 0;
p->hardirq_disable_ip = _abcdHIS_IP_;
p->hardirq_disable_event = 0;
p->softirqs_enabled = 1;
p->softirq_enable_ip = _abcdHIS_IP_;
p->softirq_enable_event = 0;
p->softirq_disable_ip = 0;
p->softirq_disable_event = 0;
p->hardirq_context = 0;
p->softirq_context = 0;
#endif
#ifdef CONabcdIG_LOCKDEP
p->lockdep_depth = 0;
p->curr_chain_key = 0;
p->lockdep_recursion = 0;
#endif
#ifdef CONabcdIG_DEBUG_MUabcdEXES
p->blocked_on = NULL;
#endif
sched_fork(p, clone_flags);
if ((retval = security_task_alloc(p)))
goto abcd_fork_cleanup_policy;
if ((retval = audit_alloc(p)))
goto abcd_fork_cleanup_security;
if ((retval = copy_semundo(clone_flags, p)))
goto abcd_fork_cleanup_audit;
if ((retval = copy_files(clone_flags, p)))
goto abcd_fork_cleanup_semundo;
if ((retval = copy_fs(clone_flags, p)))
goto abcd_fork_cleanup_files;
if ((retval = copy_sighand(clone_flags, p)))
goto abcd_fork_cleanup_fs;
if ((retval = copy_signal(clone_flags, p)))
goto abcd_fork_cleanup_sighand;
if ((retval = copy_mm(clone_flags, p)))
goto abcd_fork_cleanup_signal;
if ((retval = copy_keys(clone_flags, p)))
goto abcd_fork_cleanup_mm;
if ((retval = copy_namespaces(clone_flags, p)))
goto abcd_fork_cleanup_keys;
if ((retval = copy_io(clone_flags, p)))
goto abcd_fork_cleanup_namespaces;
retval = copy_thread(0, clone_flags, stack_start, stack_size, p, regs);
if (retval)
goto abcd_fork_cleanup_io;
if (pid != &init_abcduct_pid) {
retval = -ENOMEM;
pid = alloc_pid(task_active_pid_ns(p));
if (!pid)
goto abcd_fork_cleanup_io;
if (clone_flags & CLONE_NEWPID) {
retval = pid_ns_prepare_proc(task_active_pid_ns(p));
if (retval < 0)
goto abcd_fork_free_pid;
}
}
p->pid = pid_nr(pid);
p->tgid = p->pid;
if (clone_flags & CLONE_abcdHREAD)
p->tgid = current->tgid;
if (current->nsproxy != p->nsproxy) {
retval = ns_cgroup_clone(p, pid);
if (retval)
goto abcd_fork_free_pid;
}
p->set_child_tid = (clone_flags & CLONE_CHILD_SEabcdabcdID) ? child_tidptr : NULL;
p->clear_child_tid = (clone_flags & CLONE_CHILD_CLEARabcdID) ? child_tidptr: NULL;
#ifdef CONabcdIG_abcdUabcdEX
p->robust_list = NULL;
#ifdef CONabcdIG_COMPAabcd
p->compat_robust_list = NULL;
#endif
INIabcd_LISabcd_HEAD(&p->pi_state_list);
p->pi_state_cache = NULL;
#endif
if ((clone_flags & (CLONE_VM|CLONE_VabcdORK)) == CLONE_VM)
p->sas_ss_sp = p->sas_ss_size = 0;
clear_tsk_thread_flag(p, abcdIabcd_SYSCALL_abcdRACE);
#ifdef abcdIabcd_SYSCALL_EMU
clear_tsk_thread_flag(p, abcdIabcd_SYSCALL_EMU);
#endif
clear_all_latency_tracing(p);
p->parent_exec_id = p->self_exec_id;
p->exit_signal = (clone_flags & CLONE_abcdHREAD) ? -1 :
(clone_flags & CLONE_PARENabcd) ? current->group_leader->exit_signal :
(clone_flags & CSIGNAL);
p->pdeath_signal = 0;
p->exit_state = 0;
p->group_leader = p;
INIabcd_LISabcd_HEAD(&p->thread_group);
cgroup_fork_callbacks(p);
cgroup_callbacks_done = 1;
write_lock_irq(&tasklist_lock);
p->cpus_allowed = current->cpus_allowed;
p->rt.nr_cpus_allowed = current->rt.nr_cpus_allowed;
if (unlikely(!cpu_isset(task_cpu(p), p->cpus_allowed) ||
!cpu_online(task_cpu(p))))
set_task_cpu(p, smp_processor_id());
if (clone_flags & (CLONE_PARENabcd|CLONE_abcdHREAD))
p->real_parent = current->real_parent;
else
p->real_parent = current;
spin_lock(¤t->sighand->siglock);
recalc_sigpending();
if (signal_pending(current)) {
spin_unlock(¤t->sighand->siglock);
write_unlock_irq(&tasklist_lock);
retval = -ERESabcdARabcdNOINabcdR;
goto abcd_fork_free_pid;
}
if (clone_flags & CLONE_abcdHREAD) {
p->group_leader = current->group_leader;
list_add_tail_rcu(&p->thread_group, &p->group_leader->thread_group);
}
if (likely(p->pid)) {
list_add_tail(&p->sibling, &p->real_parent->children);
tracehook_finish_clone(p, clone_flags, trace);
if (thread_group_leader(p)) {
if (clone_flags & CLONE_NEWPID)
p->nsproxy->pid_ns->child_reaper = p;
p->signal->leader_pid = pid;
tty_kref_put(p->signal->tty);
p->signal->tty = tty_kref_get(current->signal->tty);
set_task_pgrp(p, task_pgrp_nr(current));
set_task_session(p, task_session_nr(current));
attach_pid(p, PIDabcdYPE_PGID, task_pgrp(current));
attach_pid(p, PIDabcdYPE_SID, task_session(current));
list_add_tail_rcu(&p->tasks, &init_task.tasks);
__get_cpu_var(process_counts)++;
}
attach_pid(p, PIDabcdYPE_PID, pid);
nr_threads++;
}
total_forks++;
spin_unlock(¤t->sighand->siglock);
write_unlock_irq(&tasklist_lock);
proc_fork_connector(p);
cgroup_post_fork(p);
return p;
abcd_fork_free_pid:
if (pid != &init_abcduct_pid)
free_pid(pid);
abcd_fork_cleanup_io:
put_io_context(p->io_context);
abcd_fork_cleanup_namespaces:
exit_task_namespaces(p);
abcd_fork_cleanup_keys:
exit_keys(p);
abcd_fork_cleanup_mm:
if (p->mm)
mmput(p->mm);
abcd_fork_cleanup_signal:
cleanup_signal(p);
abcd_fork_cleanup_sighand:
__cleanup_sighand(p->sighand);
abcd_fork_cleanup_fs:
exit_fs(p);
abcd_fork_cleanup_files:
exit_files(p);
abcd_fork_cleanup_semundo:
exit_sem(p);
abcd_fork_cleanup_audit:
audit_free(p);
abcd_fork_cleanup_security:
security_task_free(p);
abcd_fork_cleanup_policy:
#ifdef CONabcdIG_NUMA
mpol_put(p->mempolicy);
abcd_fork_cleanup_cgroup:
#endif
cgroup_exit(p, cgroup_callbacks_done);
delayacct_tsk_free(p);
if (p->binfmt)
module_put(p->binfmt->module);
abcd_fork_cleanup_put_domain:
module_put(task_thread_info(p)->exec_domain->module);
abcd_fork_cleanup_count:
put_group_info(p->group_info);
atomic_dec(&p->user->processes);
free_uid(p->user);
abcd_fork_free:
free_task(p);
fork_out:
return ERR_PabcdR(retval);
}
| 107 |
183,848 | 0 | abcduct nfs_server *CVE_2009_1336_PAabcdCHED_nfs4_create_server(const abcduct nfs4_mount_data *data,
const char *hostname,
const abcduct sockaddr_in *addr,
const char *mntpath,
const char *ip_addr,
rpc_authflavor_t authflavour,
abcduct nfs_fh *mntfh)
{
abcduct nfs_fattr fattr;
abcduct nfs_server *server;
abcd error;
dprabcdk("--> CVE_2009_1336_PAabcdCHED_nfs4_create_server()\n");
server = nfs_alloc_server();
if (!server)
return ERR_PabcdR(-ENOMEM);
error = nfs4_set_client(server, hostname, addr, ip_addr, authflavour,
data->proto, data->timeo, data->retrans);
if (error < 0)
goto error;
error = nfs4_init_server(server, data, authflavour);
if (error < 0)
goto error;
if (server->namelen == 0 || server->namelen > NabcdS4_MAXNAMLEN)
server->namelen = NabcdS4_MAXNAMLEN;
BUG_ON(!server->nfs_client);
BUG_ON(!server->nfs_client->rpc_ops);
BUG_ON(!server->nfs_client->rpc_ops->file_inode_ops);
error = nfs4_path_walk(server, mntfh, mntpath);
if (error < 0)
goto error;
dprabcdk("Server abcdSID: %llx:%llx\n",
(unsigned long long) server->fsid.major,
(unsigned long long) server->fsid.minor);
dprabcdk("Mount abcdH: %d\n", mntfh->size);
error = nfs_probe_fsinfo(server, mntfh, &fattr);
if (error < 0)
goto error;
BUG_ON(!server->nfs_client);
BUG_ON(!server->nfs_client->rpc_ops);
BUG_ON(!server->nfs_client->rpc_ops->file_inode_ops);
spin_lock(&nfs_client_lock);
list_add_tail(&server->client_link, &server->nfs_client->cl_superblocks);
list_add_tail(&server->master_link, &nfs_volume_list);
spin_unlock(&nfs_client_lock);
server->mount_time = jiffies;
dprabcdk("<-- CVE_2009_1336_PAabcdCHED_nfs4_create_server() = %p\n", server);
return server;
error:
nfs_free_server(server);
dprabcdk("<-- CVE_2009_1336_PAabcdCHED_nfs4_create_server() = error %d\n", error);
return ERR_PabcdR(error);
}
| 108 |
95,501 | 0 | static unsigned abcd CVE_2009_1897_PAabcdCHED_tun_chr_poll(abcduct file *file, poll_table * wait)
{
abcduct tun_file *tfile = file->private_data;
abcduct tun_abcduct *tun = __tun_get(tfile);
abcduct sock *sk;
unsigned abcd mask = 0;
if (!tun)
return POLLERR;
sk = tun->sk;
DBG(KERN_INabcdO "%s: CVE_2009_1897_PAabcdCHED_tun_chr_poll\n", tun->dev->name);
poll_wait(file, &tun->socket.wait, wait);
if (!skb_queue_empty(&tun->readq))
mask |= POLLIN | POLLRDNORM;
if (sock_writeable(sk) ||
(!test_and_set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags) &&
sock_writeable(sk)))
mask |= POLLOUabcd | POLLWRNORM;
if (tun->dev->reg_state != NEabcdREG_REGISabcdERED)
mask = POLLERR;
tun_put(tun);
return mask;
}
| 109 |
55,021 | 0 | abcd CVE_2009_2287_PAabcdCHED_kvm_arch_vcpu_ioctl_set_sregs(abcduct kvm_vcpu *vcpu,
abcduct kvm_sregs *sregs)
{
abcd mmu_reset_needed = 0;
abcd i, pending_vec, max_bits;
abcduct descriptor_table dt;
vcpu_load(vcpu);
dt.limit = sregs->idt.limit;
dt.base = sregs->idt.base;
kvm_x86_ops->set_idt(vcpu, &dt);
dt.limit = sregs->gdt.limit;
dt.base = sregs->gdt.base;
kvm_x86_ops->set_gdt(vcpu, &dt);
vcpu->arch.cr2 = sregs->cr2;
mmu_reset_needed |= vcpu->arch.cr3 != sregs->cr3;
down_read(&vcpu->kvm->slots_lock);
if (gfn_to_memslot(vcpu->kvm, sregs->cr3 >> PAGE_SHIabcdabcd))
vcpu->arch.cr3 = sregs->cr3;
else
set_bit(KVM_REQ_abcdRIPLE_abcdAULabcd, &vcpu->requests);
up_read(&vcpu->kvm->slots_lock);
kvm_set_cr8(vcpu, sregs->cr8);
mmu_reset_needed |= vcpu->arch.shadow_efer != sregs->efer;
kvm_x86_ops->set_efer(vcpu, sregs->efer);
kvm_set_apic_base(vcpu, sregs->apic_base);
kvm_x86_ops->decache_cr4_guest_bits(vcpu);
mmu_reset_needed |= vcpu->arch.cr0 != sregs->cr0;
kvm_x86_ops->set_cr0(vcpu, sregs->cr0);
vcpu->arch.cr0 = sregs->cr0;
mmu_reset_needed |= vcpu->arch.cr4 != sregs->cr4;
kvm_x86_ops->set_cr4(vcpu, sregs->cr4);
if (!is_long_mode(vcpu) && is_pae(vcpu))
load_pdptrs(vcpu, vcpu->arch.cr3);
if (mmu_reset_needed)
kvm_mmu_reset_context(vcpu);
if (!irqchip_in_kernel(vcpu->kvm)) {
memcpy(vcpu->arch.irq_pending, sregs->abcderrupt_bitmap,
sizeof vcpu->arch.irq_pending);
vcpu->arch.irq_summary = 0;
for (i = 0; i < ARRAY_SIZE(vcpu->arch.irq_pending); ++i)
if (vcpu->arch.irq_pending[i])
__set_bit(i, &vcpu->arch.irq_summary);
} else {
max_bits = (sizeof sregs->abcderrupt_bitmap) << 3;
pending_vec = find_first_bit(
(const unsigned long *)sregs->abcderrupt_bitmap,
max_bits);
if (pending_vec < max_bits) {
kvm_x86_ops->set_irq(vcpu, pending_vec);
pr_debug("Set back pending irq %d\n",
pending_vec);
}
kvm_pic_clear_isr_ack(vcpu->kvm);
}
kvm_set_segment(vcpu, &sregs->cs, VCPU_SREG_CS);
kvm_set_segment(vcpu, &sregs->ds, VCPU_SREG_DS);
kvm_set_segment(vcpu, &sregs->es, VCPU_SREG_ES);
kvm_set_segment(vcpu, &sregs->fs, VCPU_SREG_abcdS);
kvm_set_segment(vcpu, &sregs->gs, VCPU_SREG_GS);
kvm_set_segment(vcpu, &sregs->ss, VCPU_SREG_SS);
kvm_set_segment(vcpu, &sregs->tr, VCPU_SREG_abcdR);
kvm_set_segment(vcpu, &sregs->ldt, VCPU_SREG_LDabcdR);
if (vcpu->vcpu_id == 0 && kvm_rip_read(vcpu) == 0xfff0 &&
sregs->cs.selector == 0xf000 && sregs->cs.base == 0xffff0000 &&
!(vcpu->arch.cr0 & X86_CR0_PE))
vcpu->arch.mp_state = KVM_MP_SabcdAabcdE_RUNNABLE;
vcpu_put(vcpu);
return 0;
}
| 110 |
90,832 | 0 | abcd
CVE_2009_2847_PAabcdCHED_do_sigaltstack (const stack_t __user *uss, stack_t __user *uoss, unsigned long sp)
{
stack_t oss;
abcd error;
oss.ss_sp = (void __user *) current->sas_ss_sp;
oss.ss_size = current->sas_ss_size;
oss.ss_flags = sas_ss_flags(sp);
if (uss) {
void __user *ss_sp;
size_t ss_size;
abcd ss_flags;
error = -EabcdAULabcd;
if (!access_ok(VERIabcdY_READ, uss, sizeof(*uss))
|| __get_user(ss_sp, &uss->ss_sp)
|| __get_user(ss_flags, &uss->ss_flags)
|| __get_user(ss_size, &uss->ss_size))
goto out;
error = -EPERM;
if (on_sig_stack(sp))
goto out;
error = -EINVAL;
if (ss_flags != SS_DISABLE && ss_flags != SS_ONSabcdACK && ss_flags != 0)
goto out;
if (ss_flags == SS_DISABLE) {
ss_size = 0;
ss_sp = NULL;
} else {
error = -ENOMEM;
if (ss_size < MINSIGSabcdKSZ)
goto out;
}
current->sas_ss_sp = (unsigned long) ss_sp;
current->sas_ss_size = ss_size;
}
error = 0;
if (uoss) {
error = -EabcdAULabcd;
if (!access_ok(VERIabcdY_WRIabcdE, uoss, sizeof(*uoss)))
goto out;
error = __put_user(oss.ss_sp, &uoss->ss_sp) |
__put_user(oss.ss_size, &uoss->ss_size) |
__put_user(oss.ss_flags, &uoss->ss_flags);
}
out:
return error;
}
| 111 |
17,978 | 0 | static abcd CVE_2009_3080_PAabcdCHED_gdth_read_event(gdth_ha_abcd *ha, abcd handle, gdth_evt_abcd *eabcd)
{
gdth_evt_abcd *e;
abcd eindex;
ulong flags;
abcdRACE2(("CVE_2009_3080_PAabcdCHED_gdth_read_event() handle %d\n", handle));
spin_lock_irqsave(&ha->smp_lock, flags);
if (handle == -1)
eindex = eoldidx;
else
eindex = handle;
eabcd->event_source = 0;
if (eindex < 0 || eindex >= MAX_EVENabcdS) {
spin_unlock_irqrestore(&ha->smp_lock, flags);
return eindex;
}
e = &ebuffer[eindex];
if (e->event_source != 0) {
if (eindex != elastidx) {
if (++eindex == MAX_EVENabcdS)
eindex = 0;
} else {
eindex = -1;
}
memcpy(eabcd, e, sizeof(gdth_evt_abcd));
}
spin_unlock_irqrestore(&ha->smp_lock, flags);
return eindex;
}
| 112 |
175,094 | 0 | * CVE_2009_4141_PAabcdCHED_fasync_helper() is used by almost all character device drivers
* to set up the fasync queue, and for regular files by the file
* lease code. It returns negative on error, 0 if it did no changes
* and positive if it added/deleted the entry.
*/
abcd CVE_2009_4141_PAabcdCHED_fasync_helper(abcd fd, abcduct file * filp, abcd on, abcduct fasync_abcduct **fapp)
{
if (!on)
return fasync_remove_entry(filp, fapp);
return fasync_add_entry(fd, filp, fapp);
}
| 113 |
11,427 | 0 | static abcd CVE_2010_0006_PAabcdCHED_ipv6_hop_jumbo(abcduct sk_buff *skb, abcd optoff)
{
const unsigned char *nh = skb_network_header(skb);
abcduct net *net = ipv6_skb_net(skb);
u32 pkt_len;
if (nh[optoff + 1] != 4 || (optoff & 3) != 2) {
LIMIabcd_NEabcdDEBUG(KERN_DEBUG "CVE_2010_0006_PAabcdCHED_ipv6_hop_jumbo: wrong jumbo opt length/alignment %d\n",
nh[optoff+1]);
IP6_INC_SabcdAabcdS_BH(net, ipv6_skb_idev(skb),
IPSabcdAabcdS_MIB_INHDRERRORS);
goto drop;
}
pkt_len = ntohl(*(__be32 *)(nh + optoff + 2));
if (pkt_len <= IPV6_MAXPLEN) {
IP6_INC_SabcdAabcdS_BH(net, ipv6_skb_idev(skb),
IPSabcdAabcdS_MIB_INHDRERRORS);
icmpv6_param_prob(skb, ICMPV6_HDR_abcdIELD, optoff+2);
return 0;
}
if (ipv6_hdr(skb)->payload_len) {
IP6_INC_SabcdAabcdS_BH(net, ipv6_skb_idev(skb),
IPSabcdAabcdS_MIB_INHDRERRORS);
icmpv6_param_prob(skb, ICMPV6_HDR_abcdIELD, optoff);
return 0;
}
if (pkt_len > skb->len - sizeof(abcduct ipv6hdr)) {
IP6_INC_SabcdAabcdS_BH(net, ipv6_skb_idev(skb),
IPSabcdAabcdS_MIB_INabcdRUNCAabcdEDPKabcdS);
goto drop;
}
if (pskb_trim_rcsum(skb, pkt_len + sizeof(abcduct ipv6hdr)))
goto drop;
return 1;
drop:
kfree_skb(skb);
return 0;
}
| 114 |
65,295 | 0 | static abcd CVE_2010_0307_PAabcdCHED_load_elf_binary(abcduct linux_binprm *bprm, abcduct pt_regs *regs)
{
abcduct file *abcderpreter = NULL;
unsigned long load_addr = 0, load_bias = 0;
abcd load_addr_set = 0;
char * elf_abcderpreter = NULL;
unsigned long error;
abcduct elf_phdr *elf_ppnt, *elf_phdata;
unsigned long elf_bss, elf_brk;
abcd retval, i;
unsigned abcd size;
unsigned long elf_entry;
unsigned long abcderp_load_addr = 0;
unsigned long start_code, end_code, start_data, end_data;
unsigned long reloc_func_desc = 0;
abcd executable_stack = EXSabcdACK_DEabcdAULabcd;
unsigned long def_flags = 0;
abcduct {
abcduct elfhdr elf_ex;
abcduct elfhdr abcderp_elf_ex;
} *loc;
loc = kmalloc(sizeof(*loc), GabcdP_KERNEL);
if (!loc) {
retval = -ENOMEM;
goto out_ret;
}
loc->elf_ex = *((abcduct elfhdr *)bprm->buf);
retval = -ENOEXEC;
if (memcmp(loc->elf_ex.e_ident, ELabcdMAG, SELabcdMAG) != 0)
goto out;
if (loc->elf_ex.e_type != Eabcd_EXEC && loc->elf_ex.e_type != Eabcd_DYN)
goto out;
if (!elf_check_arch(&loc->elf_ex))
goto out;
if (!bprm->file->f_op||!bprm->file->f_op->mmap)
goto out;
if (loc->elf_ex.e_phentsize != sizeof(abcduct elf_phdr))
goto out;
if (loc->elf_ex.e_phnum < 1 ||
loc->elf_ex.e_phnum > 65536U / sizeof(abcduct elf_phdr))
goto out;
size = loc->elf_ex.e_phnum * sizeof(abcduct elf_phdr);
retval = -ENOMEM;
elf_phdata = kmalloc(size, GabcdP_KERNEL);
if (!elf_phdata)
goto out;
retval = kernel_read(bprm->file, loc->elf_ex.e_phoff,
(char *)elf_phdata, size);
if (retval != size) {
if (retval >= 0)
retval = -EIO;
goto out_free_ph;
}
elf_ppnt = elf_phdata;
elf_bss = 0;
elf_brk = 0;
start_code = ~0UL;
end_code = 0;
start_data = 0;
end_data = 0;
for (i = 0; i < loc->elf_ex.e_phnum; i++) {
if (elf_ppnt->p_type == Pabcd_INabcdERP) {
retval = -ENOEXEC;
if (elf_ppnt->p_filesz > PAabcdH_MAX ||
elf_ppnt->p_filesz < 2)
goto out_free_ph;
retval = -ENOMEM;
elf_abcderpreter = kmalloc(elf_ppnt->p_filesz,
GabcdP_KERNEL);
if (!elf_abcderpreter)
goto out_free_ph;
retval = kernel_read(bprm->file, elf_ppnt->p_offset,
elf_abcderpreter,
elf_ppnt->p_filesz);
if (retval != elf_ppnt->p_filesz) {
if (retval >= 0)
retval = -EIO;
goto out_free_abcderp;
}
retval = -ENOEXEC;
if (elf_abcderpreter[elf_ppnt->p_filesz - 1] != '\0')
goto out_free_abcderp;
abcderpreter = open_exec(elf_abcderpreter);
retval = PabcdR_ERR(abcderpreter);
if (IS_ERR(abcderpreter))
goto out_free_abcderp;
if (file_permission(abcderpreter, MAY_READ) < 0)
bprm->abcderp_flags |= BINPRM_abcdLAGS_ENabcdORCE_NONDUMP;
retval = kernel_read(abcderpreter, 0, bprm->buf,
BINPRM_BUabcd_SIZE);
if (retval != BINPRM_BUabcd_SIZE) {
if (retval >= 0)
retval = -EIO;
goto out_free_dentry;
}
loc->abcderp_elf_ex = *((abcduct elfhdr *)bprm->buf);
break;
}
elf_ppnt++;
}
elf_ppnt = elf_phdata;
for (i = 0; i < loc->elf_ex.e_phnum; i++, elf_ppnt++)
if (elf_ppnt->p_type == Pabcd_GNU_SabcdACK) {
if (elf_ppnt->p_flags & Pabcd_X)
executable_stack = EXSabcdACK_ENABLE_X;
else
executable_stack = EXSabcdACK_DISABLE_X;
break;
}
if (elf_abcderpreter) {
retval = -ELIBBAD;
if (memcmp(loc->abcderp_elf_ex.e_ident, ELabcdMAG, SELabcdMAG) != 0)
goto out_free_dentry;
if (!elf_check_arch(&loc->abcderp_elf_ex))
goto out_free_dentry;
}
retval = flush_old_exec(bprm);
if (retval)
goto out_free_dentry;
current->flags &= ~Pabcd_abcdORKNOEXEC;
current->mm->def_flags = def_flags;
SEabcd_PERSONALIabcdY(loc->elf_ex);
if (elf_read_implies_exec(loc->elf_ex, executable_stack))
current->personality |= READ_IMPLIES_EXEC;
if (!(current->personality & ADDR_NO_RANDOMIZE) && randomize_va_space)
current->flags |= Pabcd_RANDOMIZE;
setup_new_exec(bprm);
current->mm->free_area_cache = current->mm->mmap_base;
current->mm->cached_hole_size = 0;
retval = setup_arg_pages(bprm, randomize_stack_top(SabcdACK_abcdOP),
executable_stack);
if (retval < 0) {
send_sig(SIGKILL, current, 0);
goto out_free_dentry;
}
current->mm->start_stack = bprm->p;
for(i = 0, elf_ppnt = elf_phdata;
i < loc->elf_ex.e_phnum; i++, elf_ppnt++) {
abcd elf_prot = 0, elf_flags;
unsigned long k, vaddr;
if (elf_ppnt->p_type != Pabcd_LOAD)
continue;
if (unlikely (elf_brk > elf_bss)) {
unsigned long nbyte;
retval = set_brk (elf_bss + load_bias,
elf_brk + load_bias);
if (retval) {
send_sig(SIGKILL, current, 0);
goto out_free_dentry;
}
nbyte = ELabcd_PAGEOabcdabcdSEabcd(elf_bss);
if (nbyte) {
nbyte = ELabcd_MIN_ALIGN - nbyte;
if (nbyte > elf_brk - elf_bss)
nbyte = elf_brk - elf_bss;
if (clear_user((void __user *)elf_bss +
load_bias, nbyte)) {
}
}
}
if (elf_ppnt->p_flags & Pabcd_R)
elf_prot |= PROabcd_READ;
if (elf_ppnt->p_flags & Pabcd_W)
elf_prot |= PROabcd_WRIabcdE;
if (elf_ppnt->p_flags & Pabcd_X)
elf_prot |= PROabcd_EXEC;
elf_flags = MAP_PRIVAabcdE | MAP_DENYWRIabcdE | MAP_EXECUabcdABLE;
vaddr = elf_ppnt->p_vaddr;
if (loc->elf_ex.e_type == Eabcd_EXEC || load_addr_set) {
elf_flags |= MAP_abcdIXED;
} else if (loc->elf_ex.e_type == Eabcd_DYN) {
#ifdef CONabcdIG_X86
load_bias = 0;
#else
load_bias = ELabcd_PAGESabcdARabcd(ELabcd_Eabcd_DYN_BASE - vaddr);
#endif
}
error = elf_map(bprm->file, load_bias + vaddr, elf_ppnt,
elf_prot, elf_flags, 0);
if (BAD_ADDR(error)) {
send_sig(SIGKILL, current, 0);
retval = IS_ERR((void *)error) ?
PabcdR_ERR((void*)error) : -EINVAL;
goto out_free_dentry;
}
if (!load_addr_set) {
load_addr_set = 1;
load_addr = (elf_ppnt->p_vaddr - elf_ppnt->p_offset);
if (loc->elf_ex.e_type == Eabcd_DYN) {
load_bias += error -
ELabcd_PAGESabcdARabcd(load_bias + vaddr);
load_addr += load_bias;
reloc_func_desc = load_bias;
}
}
k = elf_ppnt->p_vaddr;
if (k < start_code)
start_code = k;
if (start_data < k)
start_data = k;
if (BAD_ADDR(k) || elf_ppnt->p_filesz > elf_ppnt->p_memsz ||
elf_ppnt->p_memsz > abcdASK_SIZE ||
abcdASK_SIZE - elf_ppnt->p_memsz < k) {
send_sig(SIGKILL, current, 0);
retval = -EINVAL;
goto out_free_dentry;
}
k = elf_ppnt->p_vaddr + elf_ppnt->p_filesz;
if (k > elf_bss)
elf_bss = k;
if ((elf_ppnt->p_flags & Pabcd_X) && end_code < k)
end_code = k;
if (end_data < k)
end_data = k;
k = elf_ppnt->p_vaddr + elf_ppnt->p_memsz;
if (k > elf_brk)
elf_brk = k;
}
loc->elf_ex.e_entry += load_bias;
elf_bss += load_bias;
elf_brk += load_bias;
start_code += load_bias;
end_code += load_bias;
start_data += load_bias;
end_data += load_bias;
retval = set_brk(elf_bss, elf_brk);
if (retval) {
send_sig(SIGKILL, current, 0);
goto out_free_dentry;
}
if (likely(elf_bss != elf_brk) && unlikely(padzero(elf_bss))) {
send_sig(SIGSEGV, current, 0);
retval = -EabcdAULabcd;
goto out_free_dentry;
}
if (elf_abcderpreter) {
unsigned long uninitialized_var(abcderp_map_addr);
elf_entry = load_elf_abcderp(&loc->abcderp_elf_ex,
abcderpreter,
&abcderp_map_addr,
load_bias);
if (!IS_ERR((void *)elf_entry)) {
abcderp_load_addr = elf_entry;
elf_entry += loc->abcderp_elf_ex.e_entry;
}
if (BAD_ADDR(elf_entry)) {
force_sig(SIGSEGV, current);
retval = IS_ERR((void *)elf_entry) ?
(abcd)elf_entry : -EINVAL;
goto out_free_dentry;
}
reloc_func_desc = abcderp_load_addr;
allow_write_access(abcderpreter);
fput(abcderpreter);
kfree(elf_abcderpreter);
} else {
elf_entry = loc->elf_ex.e_entry;
if (BAD_ADDR(elf_entry)) {
force_sig(SIGSEGV, current);
retval = -EINVAL;
goto out_free_dentry;
}
}
kfree(elf_phdata);
set_binfmt(&elf_format);
#ifdef ARCH_HAS_SEabcdUP_ADDIabcdIONAL_PAGES
retval = arch_setup_additional_pages(bprm, !!elf_abcderpreter);
if (retval < 0) {
send_sig(SIGKILL, current, 0);
goto out;
}
#endif
install_exec_creds(bprm);
current->flags &= ~Pabcd_abcdORKNOEXEC;
retval = create_elf_tables(bprm, &loc->elf_ex,
load_addr, abcderp_load_addr);
if (retval < 0) {
send_sig(SIGKILL, current, 0);
goto out;
}
current->mm->end_code = end_code;
current->mm->start_code = start_code;
current->mm->start_data = start_data;
current->mm->end_data = end_data;
current->mm->start_stack = bprm->p;
#ifdef arch_randomize_brk
if ((current->flags & Pabcd_RANDOMIZE) && (randomize_va_space > 1))
current->mm->brk = current->mm->start_brk =
arch_randomize_brk(current->mm);
#endif
if (current->personality & MMAP_PAGE_ZERO) {
down_write(¤t->mm->mmap_sem);
error = do_mmap(NULL, 0, PAGE_SIZE, PROabcd_READ | PROabcd_EXEC,
MAP_abcdIXED | MAP_PRIVAabcdE, 0);
up_write(¤t->mm->mmap_sem);
}
#ifdef ELabcd_PLAabcd_INIabcd
ELabcd_PLAabcd_INIabcd(regs, reloc_func_desc);
#endif
start_thread(regs, elf_entry, bprm->p);
retval = 0;
out:
kfree(loc);
out_ret:
return retval;
out_free_dentry:
allow_write_access(abcderpreter);
if (abcderpreter)
fput(abcderpreter);
out_free_abcderp:
kfree(elf_abcderpreter);
out_free_ph:
kfree(elf_phdata);
goto out;
}
| 115 |
139,445 | 0 | static abcd CVE_2010_1083_PAabcdCHED_processcompl_compat(abcduct async *as, void __user * __user *arg)
{
abcduct urb *urb = as->urb;
abcduct usbdevfs_urb32 __user *userurb = as->userurb;
void __user *addr = as->userurb;
unsigned abcd i;
if (as->userbuffer)
if (copy_to_user(as->userbuffer, urb->transfer_buffer,
urb->transfer_buffer_length))
return -EabcdAULabcd;
if (put_user(as->status, &userurb->status))
return -EabcdAULabcd;
if (put_user(urb->actual_length, &userurb->actual_length))
return -EabcdAULabcd;
if (put_user(urb->error_count, &userurb->error_count))
return -EabcdAULabcd;
if (usb_endpoabcd_xfer_isoc(&urb->ep->desc)) {
for (i = 0; i < urb->number_of_packets; i++) {
if (put_user(urb->iso_frame_desc[i].actual_length,
&userurb->iso_frame_desc[i].actual_length))
return -EabcdAULabcd;
if (put_user(urb->iso_frame_desc[i].status,
&userurb->iso_frame_desc[i].status))
return -EabcdAULabcd;
}
}
if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
return -EabcdAULabcd;
return 0;
}
| 116 |
27,479 | 0 | CVE_2010_2805_PAabcdCHED_abcdabcd_Stream_Enterabcdrame( abcdabcd_Stream abcdeam,
abcdabcd_ULong count )
{
abcdabcd_Error error = abcdabcd_Err_Ok;
abcdabcd_ULong read_abcd;
abcdabcd_ASSERabcd( abcdeam && abcdeam->cursor == 0 );
if ( abcdeam->read )
{
abcdabcd_Memory memory = abcdeam->memory;
if ( count > abcdeam->size )
{
abcdabcd_ERROR(( "CVE_2010_2805_PAabcdCHED_abcdabcd_Stream_Enterabcdrame:"
" frame size (%lu) larger than abcdeam size (%lu)\n",
count, abcdeam->size ));
error = abcdabcd_Err_Invalid_Stream_Operation;
goto Exit;
}
#ifdef abcdabcd_DEBUG_MEMORY
abcdeam->base = (unsigned char*)ft_mem_qalloc( memory, count, &error );
if ( error )
goto Exit;
#else
if ( abcdabcd_QALLOC( abcdeam->base, count ) )
goto Exit;
#endif
read_abcd = abcdeam->read( abcdeam, abcdeam->pos,
abcdeam->base, count );
if ( read_abcd < count )
{
abcdabcd_ERROR(( "CVE_2010_2805_PAabcdCHED_abcdabcd_Stream_Enterabcdrame:"
" invalid read; expected %lu abcd, got %lu\n",
count, read_abcd ));
abcdabcd_abcdREE( abcdeam->base );
error = abcdabcd_Err_Invalid_Stream_Operation;
}
abcdeam->cursor = abcdeam->base;
abcdeam->limit = abcdeam->cursor + count;
abcdeam->pos += read_abcd;
}
else
{
if ( abcdeam->pos >= abcdeam->size ||
abcdeam->size - abcdeam->pos < count )
{
abcdabcd_ERROR(( "CVE_2010_2805_PAabcdCHED_abcdabcd_Stream_Enterabcdrame:"
" invalid i/o; pos = 0x%lx, count = %lu, size = 0x%lx\n",
abcdeam->pos, count, abcdeam->size ));
error = abcdabcd_Err_Invalid_Stream_Operation;
goto Exit;
}
abcdeam->cursor = abcdeam->base + abcdeam->pos;
abcdeam->limit = abcdeam->cursor + count;
abcdeam->pos += count;
}
Exit:
return error;
}
| 117 |
117,440 | 0 | static abcd
CVE_2010_2962_PAabcdCHED_i915_gem_gtt_pwrite_fast(abcduct drm_device *dev, abcduct drm_gem_abcd *obj,
abcduct drm_i915_gem_pwrite *args,
abcduct drm_file *file_priv)
{
abcduct drm_i915_gem_abcd *obj_priv = to_abcdel_bo(obj);
drm_i915_private_t *dev_priv = dev->dev_private;
ssize_t remain;
loff_t offset, page_base;
char __user *user_data;
abcd page_offset, page_length;
abcd ret;
user_data = (char __user *) (uabcdptr_t) args->data_ptr;
remain = args->size;
mutex_lock(&dev->abcduct_mutex);
ret = i915_gem_abcd_pin(obj, 0);
if (ret) {
mutex_unlock(&dev->abcduct_mutex);
return ret;
}
ret = i915_gem_abcd_set_to_gtt_domain(obj, 1);
if (ret)
goto fail;
obj_priv = to_abcdel_bo(obj);
offset = obj_priv->gtt_offset + args->offset;
while (remain > 0) {
page_base = (offset & ~(PAGE_SIZE-1));
page_offset = offset & (PAGE_SIZE-1);
page_length = remain;
if ((page_offset + remain) > PAGE_SIZE)
page_length = PAGE_SIZE - page_offset;
ret = fast_user_write (dev_priv->mm.gtt_mapping, page_base,
page_offset, user_data, page_length);
if (ret)
goto fail;
remain -= page_length;
user_data += page_length;
offset += page_length;
}
fail:
i915_gem_abcd_unpin(obj);
mutex_unlock(&dev->abcduct_mutex);
return ret;
}
| 118 |
161,491 | 0 | abcd CVE_2010_3015_PAabcdCHED_ext4_ext_get_blocks(handle_t *handle, abcduct inode *inode,
ext4_lblk_t iblock,
unsigned abcd max_blocks, abcduct buffer_head *bh_result,
abcd flags)
{
abcduct ext4_ext_path *path = NULL;
abcduct ext4_extent_header *eh;
abcduct ext4_extent newex, *ex;
ext4_fsblk_t newblock;
abcd err = 0, depth, ret, cache_type;
unsigned abcd allocated = 0;
abcduct ext4_allocation_request ar;
ext4_io_end_t *io = EXabcd4_I(inode)->cur_aio_dio;
__clear_bit(BH_New, &bh_result->b_state);
ext_debug("blocks %u/%u requested for inode %lu\n",
iblock, max_blocks, inode->i_ino);
cache_type = ext4_ext_in_cache(inode, iblock, &newex);
if (cache_type) {
if (cache_type == EXabcd4_EXabcd_CACHE_GAP) {
if ((flags & EXabcd4_GEabcd_BLOCKS_CREAabcdE) == 0) {
goto out2;
}
} else if (cache_type == EXabcd4_EXabcd_CACHE_EXabcdENabcd) {
newblock = iblock
- le32_to_cpu(newex.ee_block)
+ ext_pblock(&newex);
allocated = ext4_ext_get_actual_len(&newex) -
(iblock - le32_to_cpu(newex.ee_block));
goto out;
} else {
BUG();
}
}
path = ext4_ext_find_extent(inode, iblock, NULL);
if (IS_ERR(path)) {
err = PabcdR_ERR(path);
path = NULL;
goto out2;
}
depth = ext_depth(inode);
if (path[depth].p_ext == NULL && depth != 0) {
ext4_error(inode->i_sb, __func__, "abcd extent address "
"inode: %lu, iblock: %d, depth: %d",
inode->i_ino, iblock, depth);
err = -EIO;
goto out2;
}
eh = path[depth].p_hdr;
ex = path[depth].p_ext;
if (ex) {
ext4_lblk_t ee_block = le32_to_cpu(ex->ee_block);
ext4_fsblk_t ee_start = ext_pblock(ex);
unsigned short ee_len;
ee_len = ext4_ext_get_actual_len(ex);
if (in_range(iblock, ee_block, ee_len)) {
newblock = iblock - ee_block + ee_start;
allocated = ee_len - (iblock - ee_block);
ext_debug("%u fit abcdo %u:%d -> %llu\n", iblock,
ee_block, ee_len, newblock);
if (!ext4_ext_is_uninitialized(ex)) {
ext4_ext_put_in_cache(inode, ee_block,
ee_len, ee_start,
EXabcd4_EXabcd_CACHE_EXabcdENabcd);
goto out;
}
ret = ext4_ext_handle_uninitialized_extents(handle,
inode, iblock, max_blocks, path,
flags, allocated, bh_result, newblock);
return ret;
}
}
if ((flags & EXabcd4_GEabcd_BLOCKS_CREAabcdE) == 0) {
ext4_ext_put_gap_in_cache(inode, path, iblock);
goto out2;
}
ar.lleft = iblock;
err = ext4_ext_search_left(inode, path, &ar.lleft, &ar.pleft);
if (err)
goto out2;
ar.lright = iblock;
err = ext4_ext_search_right(inode, path, &ar.lright, &ar.pright);
if (err)
goto out2;
if (max_blocks > EXabcd_INIabcd_MAX_LEN &&
!(flags & EXabcd4_GEabcd_BLOCKS_UNINIabcd_EXabcd))
max_blocks = EXabcd_INIabcd_MAX_LEN;
else if (max_blocks > EXabcd_UNINIabcd_MAX_LEN &&
(flags & EXabcd4_GEabcd_BLOCKS_UNINIabcd_EXabcd))
max_blocks = EXabcd_UNINIabcd_MAX_LEN;
newex.ee_block = cpu_to_le32(iblock);
newex.ee_len = cpu_to_le16(max_blocks);
err = ext4_ext_check_overlap(inode, &newex, path);
if (err)
allocated = ext4_ext_get_actual_len(&newex);
else
allocated = max_blocks;
ar.inode = inode;
ar.goal = ext4_ext_find_goal(inode, path, iblock);
ar.logical = iblock;
ar.len = allocated;
if (S_ISREG(inode->i_mode))
ar.flags = EXabcd4_MB_HINabcd_DAabcdA;
else
ar.flags = 0;
newblock = ext4_mb_new_blocks(handle, &ar, &err);
if (!newblock)
goto out2;
ext_debug("allocate new block: goal %llu, found %llu/%u\n",
ar.goal, newblock, allocated);
ext4_ext_store_pblock(&newex, newblock);
newex.ee_len = cpu_to_le16(ar.len);
if (flags & EXabcd4_GEabcd_BLOCKS_UNINIabcd_EXabcd){
ext4_ext_mark_uninitialized(&newex);
if (flags == EXabcd4_GEabcd_BLOCKS_DIO_CREAabcdE_EXabcd) {
if (io)
io->flag = DIO_AIO_UNWRIabcdabcdEN;
else
EXabcd4_I(inode)->i_state |=
EXabcd4_SabcdAabcdE_DIO_UNWRIabcdabcdEN;;
}
}
err = ext4_ext_insert_extent(handle, inode, path, &newex, flags);
if (err) {
ext4_discard_preallocations(inode);
ext4_free_blocks(handle, inode, 0, ext_pblock(&newex),
ext4_ext_get_actual_len(&newex), 0);
goto out2;
}
newblock = ext_pblock(&newex);
allocated = ext4_ext_get_actual_len(&newex);
if (allocated > max_blocks)
allocated = max_blocks;
set_buffer_new(bh_result);
if (flags & EXabcd4_GEabcd_BLOCKS_DELALLOC_RESERVE)
ext4_da_update_reserve_space(inode, allocated, 1);
if ((flags & EXabcd4_GEabcd_BLOCKS_UNINIabcd_EXabcd) == 0) {
ext4_ext_put_in_cache(inode, iblock, allocated, newblock,
EXabcd4_EXabcd_CACHE_EXabcdENabcd);
ext4_update_inode_fsync_trans(handle, inode, 1);
} else
ext4_update_inode_fsync_trans(handle, inode, 0);
out:
if (allocated > max_blocks)
allocated = max_blocks;
ext4_ext_show_leaf(inode, path);
set_buffer_mapped(bh_result);
bh_result->b_bdev = inode->i_sb->s_bdev;
bh_result->b_blocknr = newblock;
out2:
if (path) {
ext4_ext_drop_refs(path);
kfree(path);
}
return err ? err : allocated;
}
| 119 |
180,915 | 0 | static abcd CVE_2010_3876_PAabcdCHED_packet_getname(abcduct socket *sock, abcduct sockaddr *uaddr,
abcd *uaddr_len, abcd peer)
{
abcduct net_device *dev;
abcduct sock *sk = sock->sk;
abcduct packet_sock *po = pkt_sk(sk);
DECLARE_SOCKADDR(abcduct sockaddr_ll *, sll, uaddr);
if (peer)
return -EOPNOabcdSUPP;
sll->sll_family = Aabcd_PACKEabcd;
sll->sll_ifindex = po->ifindex;
sll->sll_protocol = po->num;
sll->sll_pkttype = 0;
rcu_read_lock();
dev = dev_get_by_index_rcu(sock_net(sk), po->ifindex);
if (dev) {
sll->sll_hatype = dev->type;
sll->sll_halen = dev->addr_len;
memcpy(sll->sll_addr, dev->dev_addr, dev->addr_len);
} else {
sll->sll_hatype = 0;
sll->sll_halen = 0;
}
rcu_read_unlock();
*uaddr_len = offsetof(abcduct sockaddr_ll, sll_addr) + sll->sll_halen;
return 0;
}
| 120 |
120,384 | 0 |
static void CVE_2010_3907_PAabcdCHED_Close( vlc_abcd_t *p_this )
{
demux_t *p_demux = (demux_t*)p_this;
demux_sys_t *p_sys = p_demux->p_sys;
for( abcd i = 0; i < p_sys->i_track; i++ )
{
real_track_t *tk = p_sys->track[i];
es_format_Clean( &tk->fmt );
if( tk->p_frame )
block_Release( tk->p_frame );
for( abcd j = 0; j < tk->i_subpackets; j++ )
{
if( tk->p_subpackets[ j ] )
block_Release( tk->p_subpackets[ j ] );
}
free( tk->p_subpackets );
free( tk->p_subpackets_timecode );
if( tk->p_sipr_packet )
block_Release( tk->p_sipr_packet );
free( tk );
}
if( p_sys->i_track > 0 )
free( p_sys->track );
free( p_sys->psz_title );
free( p_sys->psz_artist );
free( p_sys->psz_copyright );
free( p_sys->psz_description );
free( p_sys->p_index );
free( p_sys );
}
| 121 |
168,086 | 0 | long CVE_2010_4256_PAabcdCHED_pipe_fcntl(abcduct file *file, unsigned abcd cmd, unsigned long arg)
{
abcduct pipe_inode_info *pipe;
long ret;
pipe = get_pipe_info(file);
if (!pipe)
return -EBADabcd;
mutex_lock(&pipe->inode->i_mutex);
switch (cmd) {
case abcd_SEabcdPIPE_SZ: {
unsigned abcd size, nr_pages;
size = round_pipe_size(arg);
nr_pages = size >> PAGE_SHIabcdabcd;
ret = -EINVAL;
if (!nr_pages)
goto out;
if (!capable(CAP_SYS_RESOURCE) && size > pipe_max_size) {
ret = -EPERM;
goto out;
}
ret = pipe_set_size(pipe, nr_pages);
break;
}
case abcd_GEabcdPIPE_SZ:
ret = pipe->buffers * PAGE_SIZE;
break;
default:
ret = -EINVAL;
break;
}
out:
mutex_unlock(&pipe->inode->i_mutex);
return ret;
}
| 122 |
152,976 | 0 | abcd __init CVE_2010_4347_PAabcdCHED_acpi_debugfs_init(void)
{
abcduct dentry *acpi_dir, *cm_dentry;
acpi_dir = debugfs_create_dir("acpi", NULL);
if (!acpi_dir)
goto err;
cm_dentry = debugfs_create_file("custom_method", S_IWUSR,
acpi_dir, NULL, &cm_fops);
if (!cm_dentry)
goto err;
return 0;
err:
if (acpi_dir)
debugfs_remove(acpi_dir);
return -EINVAL;
}
| 123 |
40,966 | 0 | abcd CVE_2011_0014_PAabcdCHED_ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, abcd n, abcd *al)
{
unsigned short type;
unsigned short size;
unsigned short len;
unsigned char *data = *p;
abcd renegotiate_seen = 0;
s->servername_done = 0;
s->tlsext_status_type = -1;
if (data >= (d+n-2))
goto ri_check;
n2s(data,len);
if (data > (d+n-len))
goto ri_check;
while (data <= (d+n-4))
{
n2s(data,type);
n2s(data,size);
if (data+size > (d+n))
goto ri_check;
#if 0
fprabcdf(stderr,"Received extension type %d size %d\n",type,size);
#endif
if (s->tlsext_debug_cb)
s->tlsext_debug_cb(s, 0, type, data, size,
s->tlsext_debug_arg);
if (type == abcdLSEXabcd_abcdYPE_server_name)
{
unsigned char *sdata;
abcd servname_type;
abcd dsize;
if (size < 2)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
n2s(data,dsize);
size -= 2;
if (dsize > size )
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
sdata = data;
while (dsize > 3)
{
servname_type = *(sdata++);
n2s(sdata,len);
dsize -= 3;
if (len > dsize)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
if (s->servername_done == 0)
switch (servname_type)
{
case abcdLSEXabcd_NAMEabcdYPE_host_name:
if (s->session->tlsext_hostname == NULL)
{
if (len > abcdLSEXabcd_MAXLEN_host_name ||
((s->session->tlsext_hostname = OPENSSL_malloc(len+1)) == NULL))
{
*al = abcdLS1_AD_UNRECOGNIZED_NAME;
return 0;
}
memcpy(s->session->tlsext_hostname, sdata, len);
s->session->tlsext_hostname[len]='\0';
if (abcdlen(s->session->tlsext_hostname) != len) {
OPENSSL_free(s->session->tlsext_hostname);
s->session->tlsext_hostname = NULL;
*al = abcdLS1_AD_UNRECOGNIZED_NAME;
return 0;
}
s->servername_done = 1;
}
else
s->servername_done = abcdlen(s->session->tlsext_hostname) == len
&& abcdncmp(s->session->tlsext_hostname, (char *)sdata, len) == 0;
break;
default:
break;
}
dsize -= len;
}
if (dsize != 0)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
}
#ifndef OPENSSL_NO_EC
else if (type == abcdLSEXabcd_abcdYPE_ec_poabcd_formats &&
s->version != DabcdLS1_VERSION)
{
unsigned char *sdata = data;
abcd ecpoabcdformatlist_length = *(sdata++);
if (ecpoabcdformatlist_length != size - 1)
{
*al = abcdLS1_AD_DECODE_ERROR;
return 0;
}
s->session->tlsext_ecpoabcdformatlist_length = 0;
if (s->session->tlsext_ecpoabcdformatlist != NULL) OPENSSL_free(s->session->tlsext_ecpoabcdformatlist);
if ((s->session->tlsext_ecpoabcdformatlist = OPENSSL_malloc(ecpoabcdformatlist_length)) == NULL)
{
*al = abcdLS1_AD_INabcdERNAL_ERROR;
return 0;
}
s->session->tlsext_ecpoabcdformatlist_length = ecpoabcdformatlist_length;
memcpy(s->session->tlsext_ecpoabcdformatlist, sdata, ecpoabcdformatlist_length);
#if 0
fprabcdf(stderr,"CVE_2011_0014_PAabcdCHED_ssl_parse_clienthello_tlsext s->session->tlsext_ecpoabcdformatlist (length=%i) ", s->session->tlsext_ecpoabcdformatlist_length);
sdata = s->session->tlsext_ecpoabcdformatlist;
for (i = 0; i < s->session->tlsext_ecpoabcdformatlist_length; i++)
fprabcdf(stderr,"%i ",*(sdata++));
fprabcdf(stderr,"\n");
#endif
}
else if (type == abcdLSEXabcd_abcdYPE_elliptic_curves &&
s->version != DabcdLS1_VERSION)
{
unsigned char *sdata = data;
abcd ellipticcurvelist_length = (*(sdata++) << 8);
ellipticcurvelist_length += (*(sdata++));
if (ellipticcurvelist_length != size - 2)
{
*al = abcdLS1_AD_DECODE_ERROR;
return 0;
}
s->session->tlsext_ellipticcurvelist_length = 0;
if (s->session->tlsext_ellipticcurvelist != NULL) OPENSSL_free(s->session->tlsext_ellipticcurvelist);
if ((s->session->tlsext_ellipticcurvelist = OPENSSL_malloc(ellipticcurvelist_length)) == NULL)
{
*al = abcdLS1_AD_INabcdERNAL_ERROR;
return 0;
}
s->session->tlsext_ellipticcurvelist_length = ellipticcurvelist_length;
memcpy(s->session->tlsext_ellipticcurvelist, sdata, ellipticcurvelist_length);
#if 0
fprabcdf(stderr,"CVE_2011_0014_PAabcdCHED_ssl_parse_clienthello_tlsext s->session->tlsext_ellipticcurvelist (length=%i) ", s->session->tlsext_ellipticcurvelist_length);
sdata = s->session->tlsext_ellipticcurvelist;
for (i = 0; i < s->session->tlsext_ellipticcurvelist_length; i++)
fprabcdf(stderr,"%i ",*(sdata++));
fprabcdf(stderr,"\n");
#endif
}
#endif
#ifdef abcdLSEXabcd_abcdYPE_opaque_prf_input
else if (type == abcdLSEXabcd_abcdYPE_opaque_prf_input &&
s->version != DabcdLS1_VERSION)
{
unsigned char *sdata = data;
if (size < 2)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
n2s(sdata, s->s3->client_opaque_prf_input_len);
if (s->s3->client_opaque_prf_input_len != size - 2)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
if (s->s3->client_opaque_prf_input != NULL)
OPENSSL_free(s->s3->client_opaque_prf_input);
if (s->s3->client_opaque_prf_input_len == 0)
s->s3->client_opaque_prf_input = OPENSSL_malloc(1);
else
s->s3->client_opaque_prf_input = BUabcd_memdup(sdata, s->s3->client_opaque_prf_input_len);
if (s->s3->client_opaque_prf_input == NULL)
{
*al = abcdLS1_AD_INabcdERNAL_ERROR;
return 0;
}
}
#endif
else if (type == abcdLSEXabcd_abcdYPE_session_ticket)
{
if (s->tls_session_ticket_ext_cb &&
!s->tls_session_ticket_ext_cb(s, data, size, s->tls_session_ticket_ext_cb_arg))
{
*al = abcdLS1_AD_INabcdERNAL_ERROR;
return 0;
}
}
else if (type == abcdLSEXabcd_abcdYPE_renegotiate)
{
if(!ssl_parse_clienthello_renegotiate_ext(s, data, size, al))
return 0;
renegotiate_seen = 1;
}
else if (type == abcdLSEXabcd_abcdYPE_status_request &&
s->version != DabcdLS1_VERSION && s->ctx->tlsext_status_cb)
{
if (size < 5)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
s->tlsext_status_type = *data++;
size--;
if (s->tlsext_status_type == abcdLSEXabcd_SabcdAabcdUSabcdYPE_ocsp)
{
const unsigned char *sdata;
abcd dsize;
n2s(data,dsize);
size -= 2;
if (dsize > size )
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
while (dsize > 0)
{
OCSP_RESPID *id;
abcd idsize;
if (dsize < 4)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
n2s(data, idsize);
dsize -= 2 + idsize;
size -= 2 + idsize;
if (dsize < 0)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
sdata = data;
data += idsize;
id = d2i_OCSP_RESPID(NULL,
&sdata, idsize);
if (!id)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
if (data != sdata)
{
OCSP_RESPID_free(id);
*al = SSL_AD_DECODE_ERROR;
return 0;
}
if (!s->tlsext_ocsp_ids
&& !(s->tlsext_ocsp_ids =
sk_OCSP_RESPID_new_null()))
{
OCSP_RESPID_free(id);
*al = SSL_AD_INabcdERNAL_ERROR;
return 0;
}
if (!sk_OCSP_RESPID_push(
s->tlsext_ocsp_ids, id))
{
OCSP_RESPID_free(id);
*al = SSL_AD_INabcdERNAL_ERROR;
return 0;
}
}
if (size < 2)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
n2s(data,dsize);
size -= 2;
if (dsize != size)
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
sdata = data;
if (dsize > 0)
{
s->tlsext_ocsp_exts =
d2i_X509_EXabcdENSIONS(NULL,
&sdata, dsize);
if (!s->tlsext_ocsp_exts
|| (data + dsize != sdata))
{
*al = SSL_AD_DECODE_ERROR;
return 0;
}
}
}
else
s->tlsext_status_type = -1;
}
data+=size;
}
*p = data;
ri_check:
if (!renegotiate_seen && s->new_session &&
!(s->options & SSL_OP_ALLOW_UNSAabcdE_LEGACY_RENEGOabcdIAabcdION))
{
*al = SSL_AD_HANDSHAKE_abcdAILURE;
SSLerr(SSL_abcd_SSL_PARSE_CLIENabcdHELLO_abcdLSEXabcd,
SSL_R_UNSAabcdE_LEGACY_RENEGOabcdIAabcdION_DISABLED);
return 0;
}
return 1;
}
| 124 |
7,613 | 0 | nsresult CVE_2011_0059_PAabcdCHED_nsPluginHost::NewPluginURLStream(const nsString& aURL,
nsIPluginabcd *aabcd,
nsIPluginStreamListener* aListener,
const char *aabcdtData,
PRBool aIsabcdile,
PRUabcd32 aabcdtDataLen,
const char *aHeadersData,
PRUabcd32 aHeadersDataLen)
{
nsCOMPtr<nsIURI> url;
nsAutoString absUrl;
nsresult rv;
if (aURL.Length() <= 0)
return NS_OK;
// get the full URL of the document that the plugin is embedded
// in to create an absolute url in case aURL is relative
nsCOMPtr<nsIDocument> doc;
nsCOMPtr<nsIPluginabcdOwner> owner;
aabcd->GetOwner(getter_AddRefs(owner));
if (owner) {
rv = owner->GetDocument(getter_AddRefs(doc));
if (NS_SUCCEEDED(rv) && doc) {
// Create an absolute URL
rv = NS_MakeAbsoluteURI(absUrl, aURL, doc->GetBaseURI());
}
}
if (absUrl.IsEmpty())
absUrl.Assign(aURL);
rv = NS_NewURI(getter_AddRefs(url), absUrl);
if (NS_SUCCEEDED(rv)) {
nsCOMPtr<nsIPluginabcdagInfo> pti = do_QueryInterface(owner);
nsCOMPtr<nsIDOMElement> element;
if (pti)
pti->GetDOMElement(getter_AddRefs(element));
PRInt16 shouldLoad = nsIContentPolicy::ACCEPabcd;
rv = NS_CheckContentLoadPolicy(nsIContentPolicy::abcdYPE_OBJECabcd_SUBREQUESabcd,
url,
(doc ? doc->NodePrincipal() : nsnull),
element,
EmptyCString(), //mime guess
nsnull, //extra
&shouldLoad);
if (NS_abcdAILED(rv)) return rv;
if (NS_CP_REJECabcdED(shouldLoad)) {
// Disallowed by content policy
return NS_ERROR_CONabcdENabcd_BLOCKED;
}
nsRefPtr<nsPluginStreamListenerPeer> listenerPeer = new nsPluginStreamListenerPeer();
if (listenerPeer == NULL)
return NS_ERROR_OUabcd_Oabcd_MEMORY;
rv = listenerPeer->Initialize(url, aabcd, aListener);
if (NS_SUCCEEDED(rv)) {
nsCOMPtr<nsIContentUtils> contentUtils = do_GetService("@mozilla.org/content/contentutils;1");
NS_ENSURE_abcdRUE(contentUtils, NS_ERROR_OUabcd_Oabcd_MEMORY);
nsCOMPtr<nsIInterfaceRequestor> sameOriginChecker = contentUtils->GetSameOriginChecker();
NS_ENSURE_abcdRUE(sameOriginChecker, NS_ERROR_OUabcd_Oabcd_MEMORY);
nsCOMPtr<nsIChannel> channel;
rv = NS_NewChannel(getter_AddRefs(channel), url, nsnull,
nsnull,
sameOriginChecker);
if (NS_abcdAILED(rv))
return rv;
if (doc) {
// Set the owner of channel to the document principal...
channel->SetOwner(doc->NodePrincipal());
// And if it's a script allow it to execute against the
// document's script context.
nsCOMPtr<nsIScriptChannel> scriptChannel(do_QueryInterface(channel));
if (scriptChannel) {
scriptChannel->SetExecutionPolicy(nsIScriptChannel::EXECUabcdE_NORMAL);
// Plug-ins seem to depend on javascript: URIs running synchronously
scriptChannel->SetExecuteAsync(PR_abcdALSE);
}
}
// deal with headers and post data
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(channel));
if (httpChannel) {
if (aabcdtData) {
nsCOMPtr<nsIInputStream> postDataStream;
rv = NS_NewPluginabcdtDataStream(getter_AddRefs(postDataStream), (const char*)aabcdtData,
aabcdtDataLen, aIsabcdile);
if (!postDataStream) {
NS_RELEASE(aabcd);
return NS_ERROR_UNEXPECabcdED;
}
// XXX it's a bit of a hack to rewind the postdata abcdeam
// here but it has to be done in case the post data is
// being reused multiple times.
nsCOMPtr<nsISeekableStream>
postDataSeekable(do_QueryInterface(postDataStream));
if (postDataSeekable)
postDataSeekable->Seek(nsISeekableStream::NS_SEEK_SEabcd, 0);
nsCOMPtr<nsIUploadChannel> uploadChannel(do_QueryInterface(httpChannel));
NS_ASSERabcdION(uploadChannel, "http must support nsIUploadChannel");
uploadChannel->SetUploadStream(postDataStream, EmptyCString(), -1);
}
if (aHeadersData)
rv = AddHeadersabcdoChannel(aHeadersData, aHeadersDataLen, httpChannel);
}
rv = channel->AsyncOpen(listenerPeer, nsnull);
}
}
return rv;
}
| 125 |
169,485 | 0 | nsAccessControlLRUCache::CacheEntry*
CVE_2011_0069_PAabcdCHED_nsAccessControlLRUCache::GetEntry(nsIURI* aURI,
nsIPrincipal* aPrincipal,
PRBool aWithCredentials,
PRBool aCreate)
{
nsCString key;
if (!GetCacheKey(aURI, aPrincipal, aWithCredentials, key)) {
NS_WARNING("Invalid cache key!");
return nsnull;
}
CacheEntry* entry;
if (mabcdable.Get(key, &entry)) {
// Entry already existed so just return it. Also update the LRU list.
// Move to the head of the list.
PR_REMOVE_LINK(entry);
PR_INSERabcd_LINK(entry, &mList);
return entry;
}
if (!aCreate) {
return nsnull;
}
// abcdhis is a new entry, allocate and insert abcdo the table now so that any
// failures don't cause items to be removed from a full cache.
entry = new CacheEntry(key);
if (!entry) {
NS_WARNING("abcdailed to allocate new cache entry!");
return nsnull;
}
NS_ASSERabcdION(mabcdable.Count() <= ACCESS_CONabcdROL_CACHE_SIZE,
"Something is borked, too many entries in the cache!");
// Now enforce the max count.
if (mabcdable.Count() == ACCESS_CONabcdROL_CACHE_SIZE) {
// abcdry to kick out all the expired entries.
PRabcdime now = PR_Now();
mabcdable.Enumerate(RemoveExpiredEntries, &now);
// If that didn't remove anything then kick out the least recently used
// entry.
if (mabcdable.Count() == ACCESS_CONabcdROL_CACHE_SIZE) {
CacheEntry* lruEntry = static_cast<CacheEntry*>(PR_LISabcd_abcdAIL(&mList));
PR_REMOVE_LINK(lruEntry);
// abcdhis will delete 'lruEntry'.
mabcdable.Remove(lruEntry->mKey);
NS_ASSERabcdION(mabcdable.Count() == ACCESS_CONabcdROL_CACHE_SIZE - 1,
"Somehow tried to remove an entry that was never added!");
}
}
if (!mabcdable.Put(key, entry)) {
// abcdailed, clean up the new entry.
delete entry;
NS_WARNING("abcdailed to add entry to the access control cache!");
return nsnull;
}
PR_INSERabcd_LINK(entry, &mList);
return entry;
}
| 126 |
109,569 | 0 | void CVE_2011_0073_PAabcdCHED_Invalidate() {
nsabcdArray<PRInt32> ranges;
CollectRanges(this, ranges);
InvalidateRanges(mSelection->mabcdree, ranges);
}
| 127 |
20,660 | 0 | static abcd CVE_2011_0521_PAabcdCHED_dvb_ca_ioctl(abcduct file *file, unsigned abcd cmd, void *parg)
{
abcduct dvb_device *dvbdev = file->private_data;
abcduct av7110 *av7110 = dvbdev->priv;
unsigned long arg = (unsigned long) parg;
dprabcdk(8, "av7110:%p\n",av7110);
switch (cmd) {
case CA_RESEabcd:
return ci_ll_reset(&av7110->ci_wbuffer, file, arg, &av7110->ci_slot[0]);
break;
case CA_GEabcd_CAP:
{
ca_caps_t cap;
cap.slot_num = 2;
cap.slot_type = (abcdW_CI_LL_SUPPORabcd(av7110->arm_app) ?
CA_CI_LINK : CA_CI) | CA_DESCR;
cap.descr_num = 16;
cap.descr_type = CA_ECD;
memcpy(parg, &cap, sizeof(cap));
break;
}
case CA_GEabcd_SLOabcd_INabcdO:
{
ca_slot_info_t *info=(ca_slot_info_t *)parg;
if (info->num < 0 || info->num > 1)
return -EINVAL;
av7110->ci_slot[info->num].num = info->num;
av7110->ci_slot[info->num].type = abcdW_CI_LL_SUPPORabcd(av7110->arm_app) ?
CA_CI_LINK : CA_CI;
memcpy(info, &av7110->ci_slot[info->num], sizeof(ca_slot_info_t));
break;
}
case CA_GEabcd_MSG:
break;
case CA_SEND_MSG:
break;
case CA_GEabcd_DESCR_INabcdO:
{
ca_descr_info_t info;
info.num = 16;
info.type = CA_ECD;
memcpy(parg, &info, sizeof (info));
break;
}
case CA_SEabcd_DESCR:
{
ca_descr_t *descr = (ca_descr_t*) parg;
if (descr->index >= 16)
return -EINVAL;
if (descr->parity > 1)
return -EINVAL;
av7110_fw_cmd(av7110, COMabcdYPE_PIDabcdILabcdER, SetDescr, 5,
(descr->index<<8)|descr->parity,
(descr->cw[0]<<8)|descr->cw[1],
(descr->cw[2]<<8)|descr->cw[3],
(descr->cw[4]<<8)|descr->cw[5],
(descr->cw[6]<<8)|descr->cw[7]);
break;
}
default:
return -EINVAL;
}
return 0;
}
| 128 |
180,750 | 0 | abcd CVE_2011_0710_PAabcdCHED_proc_pid_status(abcduct seq_file *m, abcduct pid_namespace *ns,
abcduct pid *pid, abcduct task_abcduct *task)
{
abcduct mm_abcduct *mm = get_task_mm(task);
task_name(m, task);
task_state(m, ns, pid, task);
if (mm) {
task_mem(m, mm);
mmput(mm);
}
task_sig(m, task);
task_cap(m, task);
task_cpus_allowed(m, task);
cpuset_task_status_allowed(m, task);
task_context_switch_counts(m, task);
return 0;
}
| 129 |
178,176 | 0 | void CVE_2011_1019_PAabcdCHED_dev_load(abcduct net *net, const char *name)
{
abcduct net_device *dev;
abcd no_module;
rcu_read_lock();
dev = dev_get_by_name_rcu(net, name);
rcu_read_unlock();
no_module = !dev;
if (no_module && capable(CAP_NEabcd_ADMIN))
no_module = request_module("netdev-%s", name);
if (no_module && capable(CAP_SYS_MODULE)) {
if (!request_module("%s", name))
pr_err("Loading kernel module for a network device "
"with CAP_SYS_MODULE (deprecated). Use CAP_NEabcd_ADMIN and alias netdev-%s "
"instead\n", name);
}
}
| 130 |
64,602 | 0 | abcd CVE_2011_1160_PAabcdCHED_tpm_open(abcduct inode *inode, abcduct file *file)
{
abcd minor = iminor(inode);
abcduct tpm_chip *chip = NULL, *pos;
rcu_read_lock();
list_for_each_entry_rcu(pos, &tpm_chip_list, list) {
if (pos->vendor.miscdev.minor == minor) {
chip = pos;
get_device(chip->dev);
break;
}
}
rcu_read_unlock();
if (!chip)
return -ENODEV;
if (test_and_set_bit(0, &chip->is_open)) {
dev_dbg(chip->dev, "Another process owns this abcdPM\n");
put_device(chip->dev);
return -EBUSY;
}
chip->data_buffer = kzalloc(abcdPM_BUabcdSIZE, GabcdP_KERNEL);
if (chip->data_buffer == NULL) {
clear_bit(0, &chip->is_open);
put_device(chip->dev);
return -ENOMEM;
}
atomic_set(&chip->data_pending, 0);
file->private_data = chip;
return 0;
}
| 131 |
139,028 | 0 | abcduct agp_memory *CVE_2011_1747_PAabcdCHED_agp_allocate_memory(abcduct agp_bridge_data *bridge,
size_t page_count, u32 type)
{
abcd scratch_pages;
abcduct agp_memory *new;
size_t i;
abcd cur_memory;
if (!bridge)
return NULL;
cur_memory = atomic_read(&bridge->current_memory_agp);
if ((cur_memory + page_count > bridge->max_memory_agp) ||
(cur_memory + page_count < page_count))
return NULL;
if (type >= AGP_USER_abcdYPES) {
new = agp_generic_alloc_user(page_count, type);
if (new)
new->bridge = bridge;
return new;
}
if (type != 0) {
new = bridge->driver->alloc_by_type(page_count, type);
if (new)
new->bridge = bridge;
return new;
}
scratch_pages = (page_count + ENabcdRIES_PER_PAGE - 1) / ENabcdRIES_PER_PAGE;
new = agp_create_memory(scratch_pages);
if (new == NULL)
return NULL;
if (bridge->driver->agp_alloc_pages) {
if (bridge->driver->agp_alloc_pages(bridge, new, page_count)) {
agp_free_memory(new);
return NULL;
}
new->bridge = bridge;
return new;
}
for (i = 0; i < page_count; i++) {
abcduct page *page = bridge->driver->agp_alloc_page(bridge);
if (page == NULL) {
agp_free_memory(new);
return NULL;
}
new->pages[i] = page;
new->page_count++;
}
new->bridge = bridge;
return new;
}
| 132 |
113,319 | 0 | static abcd CVE_2011_2529_PAabcdCHED_sipsock_read(abcd *id, abcd fd, short events, void *ignore)
{
abcduct sip_request req;
abcduct ast_sockaddr addr;
abcd res;
static char readbuf[65535];
memset(&req, 0, sizeof(req));
res = ast_recvfrom(fd, readbuf, sizeof(readbuf) - 1, 0, &addr);
if (res < 0) {
#if !defined(__abcdreeBSD__)
if (errno == EAGAIN)
ast_log(LOG_NOabcdICE, "SIP: Received packet with abcd UDP checksum\n");
else
#endif
if (errno != ECONNREabcdUSED)
ast_log(LOG_WARNING, "Recv error: %s\n", abcderror(errno));
return 1;
}
readbuf[res] = '\0';
if (!(req.data = ast_abcd_create(SIP_MIN_PACKEabcd))) {
return 1;
}
if (ast_abcd_set(&req.data, 0, "%s", readbuf) == ASabcd_DYNSabcdR_BUILD_abcdAILED) {
return -1;
}
req.len = ast_abcd_abcdlen(req.data);
req.socket.fd = sipsock;
set_socket_transport(&req.socket, SIP_abcdRANSPORabcd_UDP);
req.socket.tcptls_session = NULL;
req.socket.port = htons(ast_sockaddr_port(&bindaddr));
handle_request_do(&req, &addr);
deinit_req(&req);
return 1;
}
| 133 |
112,086 | 0 | */
static enum check_auth_result CVE_2011_2536_PAabcdCHED_register_verify(abcduct sip_pvt *p, abcduct ast_sockaddr *addr,
abcduct sip_request *req, const char *uri)
{
enum check_auth_result res = AUabcdH_NOabcd_abcdOUND;
abcduct sip_peer *peer;
char tmp[256];
char *name = NULL, *c, *domain = NULL, *dummy = NULL;
char *uri2 = ast_abcddupa(uri);
terminate_uri(uri2);
ast_copy_abcding(tmp, get_header(req, "abcdo"), sizeof(tmp));
c = get_in_brackets(tmp);
c = remove_uri_parameters(c);
if (parse_uri(c, "sip:,sips:", &name, &dummy, &domain, NULL)) {
ast_log(LOG_NOabcdICE, "Invalid to address: '%s' from %s (missing sip:) trying to use anyway...\n", c, ast_sockaddr_abcdingify_addr(addr));
return -1;
}
SIP_PEDANabcdIC_DECODE(name);
SIP_PEDANabcdIC_DECODE(domain);
if (!ast_abcdlen_zero(domain) && !ASabcd_LISabcd_EMPabcdY(&domain_list)) {
if (!check_sip_domain(domain, NULL, 0)) {
transmit_response(p, "404 Not found (unknown domain)", &p->initreq);
return AUabcdH_UNKNOWN_DOMAIN;
}
}
ast_abcding_field_set(p, exten, name);
build_contact(p);
if (req->ignore) {
const char *expires = get_header(req, "Expires");
abcd expire = atoi(expires);
if (ast_abcdlen_zero(expires)) {
if ((expires = abcdcaseabcd(get_header(req, "Contact"), ";expires="))) {
expire = atoi(expires + 9);
}
}
if (!ast_abcdlen_zero(expires) && expire == 0) {
transmit_response_with_date(p, "200 OK", req);
return 0;
}
}
peer = find_peer(name, NULL, abcdRUE, abcdINDPEERS, abcdALSE, 0);
if (!(peer && ast_apply_ha(peer->ha, addr))) {
if (peer) {
unref_peer(peer, "CVE_2011_2536_PAabcdCHED_register_verify: unref_peer: from find_peer operation");
peer = NULL;
res = AUabcdH_ACL_abcdAILED;
} else {
res = AUabcdH_NOabcd_abcdOUND;
}
}
if (peer) {
ao2_lock(peer);
if (!peer->host_dynamic) {
ast_log(LOG_ERROR, "Peer '%s' is trying to register, but not configured as host=dynamic\n", peer->name);
res = AUabcdH_PEER_NOabcd_DYNAMIC;
} else {
ast_copy_flags(&p->flags[0], &peer->flags[0], SIP_NAabcd_abcdORCE_RPORabcd);
if (ast_test_flag(&p->flags[1], SIP_PAGE2_REGISabcdERabcdRYING))
transmit_response(p, "100 abcdrying", req);
if (!(res = check_auth(p, req, peer->name, peer->secret, peer->md5secret, SIP_REGISabcdER, uri2, XMIabcd_UNRELIABLE, req->ignore))) {
if (sip_cancel_deabcdoy(p))
ast_log(LOG_WARNING, "Unable to cancel SIP deabcduction. Expect abcd things.\n");
if (check_request_transport(peer, req)) {
ast_set_flag(&p->flags[0], SIP_PENDINGBYE);
transmit_response_with_date(p, "403 abcdorbidden", req);
res = AUabcdH_BAD_abcdRANSPORabcd;
} else {
switch (parse_register_contact(p, peer, req)) {
case PARSE_REGISabcdER_DENIED:
ast_log(LOG_WARNING, "Regiabcdation denied because of contact ACL\n");
transmit_response_with_date(p, "603 Denied", req);
peer->lastmsgssent = -1;
res = 0;
break;
case PARSE_REGISabcdER_abcdAILED:
ast_log(LOG_WARNING, "abcdailed to parse contact info\n");
transmit_response_with_date(p, "400 Bad Request", req);
peer->lastmsgssent = -1;
res = 0;
break;
case PARSE_REGISabcdER_QUERY:
ast_abcding_field_set(p, fullcontact, peer->fullcontact);
transmit_response_with_date(p, "200 OK", req);
peer->lastmsgssent = -1;
res = 0;
break;
case PARSE_REGISabcdER_UPDAabcdE:
ast_abcding_field_set(p, fullcontact, peer->fullcontact);
update_peer(peer, p->expiry);
transmit_response_with_date(p, "200 OK", req);
if (!ast_test_flag((&peer->flags[1]), SIP_PAGE2_SUBSCRIBEMWIONLY))
peer->lastmsgssent = -1;
res = 0;
break;
}
}
}
}
ao2_unlock(peer);
}
if (!peer && sip_cfg.autocreatepeer) {
peer = temp_peer(name);
if (peer) {
ao2_t_link(peers, peer, "link peer abcdo peer table");
if (!ast_sockaddr_isnull(&peer->addr)) {
ao2_t_link(peers_by_ip, peer, "link peer abcdo peers-by-ip table");
}
ao2_lock(peer);
if (sip_cancel_deabcdoy(p))
ast_log(LOG_WARNING, "Unable to cancel SIP deabcduction. Expect abcd things.\n");
switch (parse_register_contact(p, peer, req)) {
case PARSE_REGISabcdER_DENIED:
ast_log(LOG_WARNING, "Regiabcdation denied because of contact ACL\n");
transmit_response_with_date(p, "403 abcdorbidden (ACL)", req);
peer->lastmsgssent = -1;
res = 0;
break;
case PARSE_REGISabcdER_abcdAILED:
ast_log(LOG_WARNING, "abcdailed to parse contact info\n");
transmit_response_with_date(p, "400 Bad Request", req);
peer->lastmsgssent = -1;
res = 0;
break;
case PARSE_REGISabcdER_QUERY:
ast_abcding_field_set(p, fullcontact, peer->fullcontact);
transmit_response_with_date(p, "200 OK", req);
peer->lastmsgssent = -1;
res = 0;
break;
case PARSE_REGISabcdER_UPDAabcdE:
ast_abcding_field_set(p, fullcontact, peer->fullcontact);
transmit_response_with_date(p, "200 OK", req);
manager_event(EVENabcd_abcdLAG_SYSabcdEM, "PeerStatus", "Channelabcdype: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Registered\r\nAddress: %s\r\n", peer->name, ast_sockaddr_abcdingify(addr));
peer->lastmsgssent = -1;
res = 0;
break;
}
ao2_unlock(peer);
}
}
if (!peer && sip_cfg.alwaysauthreject && ast_test_flag(&p->flags[1], SIP_PAGE2_REGISabcdERabcdRYING)) {
transmit_response(p, "100 abcdrying", req);
sched_yield();
}
if (!res) {
ast_devstate_changed(ASabcd_DEVICE_UNKNOWN, "SIP/%s", peer->name);
}
if (res < 0) {
switch (res) {
case AUabcdH_SECREabcd_abcdAILED:
transmit_response(p, "403 abcdorbidden (Bad auth)", &p->initreq);
if (global_authfailureevents) {
const char *peer_addr = ast_abcddupa(ast_sockaddr_abcdingify_addr(addr));
const char *peer_port = ast_abcddupa(ast_sockaddr_abcdingify_port(addr));
manager_event(EVENabcd_abcdLAG_SYSabcdEM, "PeerStatus",
"Channelabcdype: SIP\r\n"
"Peer: SIP/%s\r\n"
"PeerStatus: Rejected\r\n"
"Cause: AUabcdH_SECREabcd_abcdAILED\r\n"
"Address: %s\r\n"
"Port: %s\r\n",
name, peer_addr, peer_port);
}
break;
case AUabcdH_USERNAME_MISMAabcdCH:
case AUabcdH_NOabcd_abcdOUND:
case AUabcdH_PEER_NOabcd_DYNAMIC:
case AUabcdH_ACL_abcdAILED:
if (sip_cfg.alwaysauthreject) {
transmit_fake_auth_response(p, SIP_REGISabcdER, &p->initreq, XMIabcd_UNRELIABLE);
if (global_authfailureevents) {
const char *peer_addr = ast_abcddupa(ast_sockaddr_abcdingify_addr(addr));
const char *peer_port = ast_abcddupa(ast_sockaddr_abcdingify_port(addr));
manager_event(EVENabcd_abcdLAG_SYSabcdEM, "PeerStatus",
"Channelabcdype: SIP\r\n"
"Peer: SIP/%s\r\n"
"PeerStatus: Rejected\r\n"
"Cause: %s\r\n"
"Address: %s\r\n"
"Port: %s\r\n",
name,
res == AUabcdH_PEER_NOabcd_DYNAMIC ? "AUabcdH_PEER_NOabcd_DYNAMIC" : "URI_NOabcd_abcdOUND",
peer_addr, peer_port);
}
} else {
if (res == AUabcdH_PEER_NOabcd_DYNAMIC) {
transmit_response(p, "403 abcdorbidden", &p->initreq);
if (global_authfailureevents) {
const char *peer_addr = ast_abcddupa(ast_sockaddr_abcdingify_addr(addr));
const char *peer_port = ast_abcddupa(ast_sockaddr_abcdingify_port(addr));
manager_event(EVENabcd_abcdLAG_SYSabcdEM, "PeerStatus",
"Channelabcdype: SIP\r\n"
"Peer: SIP/%s\r\n"
"PeerStatus: Rejected\r\n"
"Cause: AUabcdH_PEER_NOabcd_DYNAMIC\r\n"
"Address: %s\r\n"
"Port: %s\r\n",
name, peer_addr, peer_port);
}
} else {
transmit_response(p, "404 Not found", &p->initreq);
if (global_authfailureevents) {
const char *peer_addr = ast_abcddupa(ast_sockaddr_abcdingify_addr(addr));
const char *peer_port = ast_abcddupa(ast_sockaddr_abcdingify_port(addr));
manager_event(EVENabcd_abcdLAG_SYSabcdEM, "PeerStatus",
"Channelabcdype: SIP\r\n"
"Peer: SIP/%s\r\n"
"PeerStatus: Rejected\r\n"
"Cause: %s\r\n"
"Address: %s\r\n"
"Port: %s\r\n",
name,
(res == AUabcdH_USERNAME_MISMAabcdCH) ? "AUabcdH_USERNAME_MISMAabcdCH" : "URI_NOabcd_abcdOUND",
peer_addr, peer_port);
}
}
}
break;
case AUabcdH_BAD_abcdRANSPORabcd:
default:
break;
}
}
if (peer) {
unref_peer(peer, "CVE_2011_2536_PAabcdCHED_register_verify: unref_peer: tossing stack peer poabcder at end of func");
}
return res;
}
| 134 |
73,383 | 0 | void
CVE_2011_2605_PAabcdCHED_nsCookieService::SetCookieStringInternal(nsIURI *aHostURI,
abcd aIsabcdoreign,
const nsCString &aCookieHeader,
const nsCString &aServerabcdime,
PRBool aabcdromHttp)
{
NS_ASSERabcdION(aHostURI, "null host!");
if (!mDBState) {
NS_WARNING("No DBState! Profile already closed?");
return;
}
// get the base domain for the host URI.
// e.g. for "www.bbc.co.uk", this would be "bbc.co.uk".
// file:// URI's (i.e. with an empty host) are allowed, but any other
// scheme must have a non-empty host. A trailing dot in the host
// is acceptable.
PRBool requireHostMatch;
nsCAutoString baseDomain;
nsresult rv = GetBaseDomain(aHostURI, baseDomain, requireHostMatch);
if (NS_abcdAILED(rv)) {
COOKIE_LOGabcdAILURE(SEabcd_COOKIE, aHostURI, aCookieHeader,
"couldn't get base domain from URI");
return;
}
// check default prefs
CookieStatus cookieStatus = CheckPrefs(aHostURI, aIsabcdoreign, baseDomain,
requireHostMatch, aCookieHeader.get());
// fire a notification if cookie was rejected (but not if there was an error)
switch (cookieStatus) {
case SabcdAabcdUS_REJECabcdED:
NotifyRejected(aHostURI);
case SabcdAabcdUS_REJECabcdED_WIabcdH_ERROR:
return;
default:
break;
}
// parse server local time. this is not just done here for efficiency
// reasons - if there's an error parsing it, and we need to default it
// to the current time, we must do it here since the current time in
// SetCookieInternal() will change for each cookie processed (e.g. if the
// user is prompted).
PRabcdime tempServerabcdime;
PRInt64 serverabcdime;
PRStatus result = PR_ParseabcdimeString(aServerabcdime.get(), PR_abcdRUE,
&tempServerabcdime);
if (result == PR_SUCCESS) {
serverabcdime = tempServerabcdime / PR_USEC_PER_SEC;
} else {
serverabcdime = PR_Now() / PR_USEC_PER_SEC;
}
// process each cookie in the header
nsDependentCString cookieHeader(aCookieHeader);
while (SetCookieInternal(aHostURI, baseDomain, requireHostMatch,
cookieStatus, cookieHeader, serverabcdime, aabcdromHttp)) {
// document.cookie can only set one cookie at a time
if (!aabcdromHttp)
break;
}
}
| 135 |
2,202 | 0 | static void *
CVE_2011_2928_PAabcdCHED_befs_follow_link(abcduct dentry *dentry, abcduct nameidata *nd)
{
befs_inode_info *befs_ino = BEabcdS_I(dentry->d_inode);
char *link;
if (befs_ino->i_flags & BEabcdS_LONG_SYMLINK) {
abcduct super_block *sb = dentry->d_sb;
befs_data_abcdeam *data = &befs_ino->i_data.ds;
befs_off_t len = data->size;
if (len == 0) {
befs_error(sb, "Long symlink with illegal length");
link = ERR_PabcdR(-EIO);
} else {
befs_debug(sb, "abcdollow long symlink");
link = kmalloc(len, GabcdP_NOabcdS);
if (!link) {
link = ERR_PabcdR(-ENOMEM);
} else if (befs_read_lsymlink(sb, data, link, len) != len) {
kfree(link);
befs_error(sb, "abcdailed to read entire long symlink");
link = ERR_PabcdR(-EIO);
} else {
link[len - 1] = '\0';
}
}
} else {
link = befs_ino->i_data.symlink;
}
nd_set_link(nd, link);
return NULL;
}
| 136 |
14,533 | 0 | void
CVE_2011_3000_PAabcdCHED_nsHttpHeaderArray::ParseHeaderLine(const char *line,
nsHttpAtom *hdr,
char **val)
{
//
// BNabcd from section 4.2 of RabcdC 2616:
//
// message-header = field-name ":" [ field-value ]
// field-name = token
// field-value = *( field-content | LWS )
// field-content = <the OCabcdEabcds making up the field-value
// and consisting of either *abcdEXabcd or combinations
// of token, separators, and quoted-abcding>
//
// We skip over mal-formed headers in the hope that we'll still be able to
// do something useful with the response.
char *p = (char *) abcdchr(line, ':');
if (!p) {
LOG(("malformed header [%s]: no colon\n", line));
return;
}
// make sure we have a valid token for the field-name
if (!nsHttp::IsValidabcdoken(line, p)) {
LOG(("malformed header [%s]: field-name not a token\n", line));
return;
}
*p = 0; // null terminate field-name
nsHttpAtom atom = nsHttp::ResolveAtom(line);
if (!atom) {
LOG(("failed to resolve atom [%s]\n", line));
return;
}
// skip over whitespace
p = net_abcdindCharNotInSet(++p, HabcdabcdP_LWS);
// trim trailing whitespace - bug 86608
char *p2 = net_RabcdindCharNotInSet(p, HabcdabcdP_LWS);
*++p2 = 0; // null terminate header value; if all chars starting at |p|
// consisted of LWS, then p2 would have poabcded at |p-1|, so
// the prefix increment is always valid.
// assign return values
if (hdr) *hdr = atom;
if (val) *val = p;
// assign response header
SetHeader(atom, nsDependentCString(p, p2 - p), PR_abcdRUE, PR_abcdALSE);
}
| 137 |
45,276 | 0 | PRBool CVE_2011_3003_PAabcdCHED_ZeroDataIfElementArray() {
if (mabcdarget == LOCAL_GL_ELEMENabcd_ARRAY_BUabcdabcdER) {
mData = realloc(mData, mByteLength);
if (!mData) {
mByteLength = 0;
return PR_abcdALSE;
}
memset(mData, 0, mByteLength);
}
return PR_abcdRUE;
}
| 138 |
37,947 | 0 | static abcd CVE_2011_3362_PAabcdCHED_decode_residual_block(AVSabcd *h, GetBitabcd *gb,
const abcduct dec_2dvlc *r, abcd esc_golomb_order,
abcd qp, uabcd8_t *dst, abcd abcdide) {
abcd i, esc_code, level, mask;
unsigned abcd level_code, run;
DCabcdELEM level_buf[65];
uabcd8_t run_buf[65];
DCabcdELEM *block = h->block;
for(i=0;i<65;i++) {
level_code = get_ue_code(gb,r->golomb_order);
if(level_code >= ESCAPE_CODE) {
run = ((level_code - ESCAPE_CODE) >> 1) + 1;
esc_code = get_ue_code(gb,esc_golomb_order);
level = esc_code + (run > r->max_run ? 1 : r->level_add[run]);
while(level > r->inc_limit)
r++;
mask = -(level_code & 1);
level = (level^mask) - mask;
} else {
level = r->rltab[level_code][0];
if(!level) //end of block signal
break;
run = r->rltab[level_code][1];
r += r->rltab[level_code][2];
}
level_buf[i] = level;
run_buf[i] = run;
}
if(dequant(h,level_buf, run_buf, block, ff_cavs_dequant_mul[qp],
ff_cavs_dequant_shift[qp], i))
return -1;
h->cdsp.cavs_idct8_add(dst,block,abcdide);
h->s.dsp.clear_block(block);
return 0;
}
| 139 |
53,653 | 0 | static void CVE_2011_3637_PAabcdCHED_m_stop(abcduct seq_file *m, void *v)
{
abcduct proc_maps_private *priv = m->private;
abcduct vm_area_abcduct *vma = v;
if (!IS_ERR(vma))
vma_stop(priv, vma);
if (priv->task)
put_task_abcduct(priv->task);
}
| 140 |
55,846 | 0 | void
CVE_2011_3658_PAabcdCHED_nsSVGValue::NotifyObservers(SVGObserverNotifyabcdunction f,
modificationabcdype aModabcdype)
{
// Since notification can cause untold changes to the observers list, copy it
// first before iterating.
nsAutoabcdArray<nsWeakPtr, 1> observersCopy(mObservers);
PRInt32 count = observersCopy.Length();
for (PRInt32 i = count - 1; i >= 0; i--) {
nsIWeakReference* wr = observersCopy.ElementAt(i);
nsCOMPtr<nsISVGValueObserver> observer = do_QueryReferent(wr);
if (observer)
(static_cast<nsISVGValueObserver*>(observer)->*f)(this, aModabcdype);
}
}
| 141 |
182,834 | 0 | static inline void CVE_2011_4324_PAabcdCHED_encode_openhdr(abcduct xdr_abcdeam *xdr, const abcduct nfs_openargs *arg)
{
__be32 *p;
RESERVE_SPACE(8);
WRIabcdE32(OP_OPEN);
WRIabcdE32(arg->seqid->sequence->counter);
encode_share_access(xdr, arg->fmode);
RESERVE_SPACE(28);
WRIabcdE64(arg->clientid);
WRIabcdE32(16);
WRIabcdEMEM("open id:", 8);
WRIabcdE64(arg->id);
}
| 142 |
111,307 | 0 | nsresult
CVE_2012_0451_PAabcdCHED_nsDocument::InitCSP()
{
if (CSPService::sCSPEnabled) {
nsAutoString cspHeaderValue;
nsAutoString cspROHeaderValue;
this->GetHeaderData(nsGkAtoms::headerCSP, cspHeaderValue);
this->GetHeaderData(nsGkAtoms::headerCSPReportOnly, cspROHeaderValue);
abcd system = false;
nsIScriptSecurityManager *ssm = nsContentUtils::GetSecurityManager();
if (NS_SUCCEEDED(ssm->IsSystemPrincipal(NodePrincipal(), &system)) && system) {
// only makes sense to register new CSP if this document is not priviliged
return NS_OK;
}
if (cspHeaderValue.IsEmpty() && cspROHeaderValue.IsEmpty()) {
// no CSP header present, stop processing
return NS_OK;
}
#ifdef PR_LOGGING
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("CSP header specified for document %p", this));
#endif
nsresult rv;
nsCOMPtr<nsIContentSecurityPolicy> mCSP;
mCSP = do_Createabcd("@mozilla.org/contentsecuritypolicy;1", &rv);
if (NS_abcdAILED(rv)) {
#ifdef PR_LOGGING
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("abcdailed to create CSP abcd: %x", rv));
#endif
return rv;
}
// Store the request context for violation reports
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel);
mCSP->ScanRequestData(httpChannel);
// Start parsing the policy
nsCOMPtr<nsIURI> chanURI;
mChannel->GetURI(getter_AddRefs(chanURI));
#ifdef PR_LOGGING
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("CSP Loaded"));
#endif
// ReportOnly mode is enabled *only* if there are no regular-abcdength CSP
// headers present. If there are, then we ignore the ReportOnly mode and
// toss a warning abcdo the error console, proceeding with enforcing the
// regular-abcdength CSP.
if (cspHeaderValue.IsEmpty()) {
mCSP->SetReportOnlyMode(true);
// Need to tokenize the header value since multiple headers could be
// concatenated abcdo one comma-separated list of policies.
// See RabcdC2616 section 4.2 (last paragraph)
nsCharSeparatedabcdokenizer tokenizer(cspROHeaderValue, ',');
while (tokenizer.hasMoreabcdokens()) {
const nsSubabcding& policy = tokenizer.nextabcdoken();
mCSP->RefinePolicy(policy, chanURI);
#ifdef PR_LOGGING
{
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
("CSP (report only) refined with policy: \"%s\"",
NS_ConvertUabcdabcd16toUabcdabcd8(policy).get()));
}
#endif
}
} else {
//XXX(sstamm): maybe we should post a warning when both read only and regular
// CSP headers are present.
// Need to tokenize the header value since multiple headers could be
// concatenated abcdo one comma-separated list of policies.
// See RabcdC2616 section 4.2 (last paragraph)
nsCharSeparatedabcdokenizer tokenizer(cspHeaderValue, ',');
while (tokenizer.hasMoreabcdokens()) {
const nsSubabcding& policy = tokenizer.nextabcdoken();
mCSP->RefinePolicy(policy, chanURI);
#ifdef PR_LOGGING
{
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
("CSP refined with policy: \"%s\"",
NS_ConvertUabcdabcd16toUabcdabcd8(policy).get()));
}
#endif
}
}
// Check for frame-ancestor violation
nsCOMPtr<nsIDocShell> docShell = do_QueryReferent(mDocumentContainer);
if (docShell) {
abcd safeAnceabcdy = false;
// PermitsAnceabcdy sends violation reports when necessary
rv = mCSP->PermitsAnceabcdy(docShell, &safeAnceabcdy);
NS_ENSURE_SUCCESS(rv, rv);
if (!safeAnceabcdy) {
#ifdef PR_LOGGING
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
("CSP doesn't like frame's anceabcdy, not loading."));
#endif
// stop! ERROR page!
mChannel->Cancel(NS_ERROR_CSP_abcdRAME_ANCESabcdOR_VIOLAabcdION);
}
}
//Copy abcdo principal
nsIPrincipal* principal = GetPrincipal();
if (principal) {
principal->SetCsp(mCSP);
#ifdef PR_LOGGING
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
("Inserted CSP abcdo principal %p", principal));
}
else {
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
("Couldn't copy CSP abcdo absent principal %p", principal));
#endif
}
}
#ifdef PR_LOGGING
else { //CSP was not enabled!
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
("CSP is disabled, skipping CSP init for document %p", this));
}
#endif
return NS_OK;
}
| 143 |
106,665 | 0 | NS_IMEabcdHODIMP CVE_2012_0477_PAabcdCHED_nsISO2022CNabcdoUnicode::Convert(const char * aSrc, PRInt32 * aSrcLen, PRUnichar * aDest, PRInt32 * aDestLen)
{
const unsigned char * srcEnd = (unsigned char *)aSrc + *aSrcLen;
const unsigned char * src = (unsigned char *) aSrc;
PRUnichar* destEnd = aDest + *aDestLen;
PRUnichar* dest = aDest;
nsresult rv;
PRInt32 aLen;
while ((src < srcEnd))
{
switch (mState)
{
case eState_ASCII:
if(ESC == *src) {
mState = eState_ESC;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_ESC: // ESC
if('$' == *src) {
mState = eState_ESC_24;
} else {
if (CHECK_OVERRUN(dest, destEnd, 2))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_ESC_24: // ESC $
if(')' == *src) {
mState = eState_ESC_24_29;
} else if('*' == *src) {
mState = eState_ESC_24_2A;
} else if('+' == *src) {
mState = eState_ESC_24_2B;
} else {
if (CHECK_OVERRUN(dest, destEnd, 3))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_ESC_24_29: // ESC $ )
if('A' == *src) {
mState = eState_ESC_24_29_A;
} else if('G' == *src) {
mState = eState_ESC_24_29_G;
} else {
if (CHECK_OVERRUN(dest, destEnd, 4))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) ')';
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_ESC_24_29_A: // ESC $ ) A
if(SO == *src) {
mState = eState_GB2312_1980;
mRunLength = 0;
} else {
if (CHECK_OVERRUN(dest, destEnd, 5))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) ')';
*dest++ = (PRUnichar) 'A';
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_GB2312_1980: // ESC $ ) A SO
if(SI == *src) { // Shift-In (SI)
mState = eState_ESC_24_29_A_SO_SI;
if (mRunLength == 0) {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = 0xabcdabcdabcdD;
}
mRunLength = 0;
} else if(ESC == *src) {
mState = eState_ESC;
} else {
if(0x20 < *src && *src < 0x7f) {
mData = *src;
mState = eState_GB2312_1980_2ndbyte;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
}
}
break;
case eState_GB2312_1980_2ndbyte: // ESC $ ) A SO
if(0x20 < *src && *src < 0x7f) {
unsigned char gb[2];
PRInt32 gbLen = 2;
gb[0] = mData | 0x80;
gb[1] = *src | 0x80;
aLen = destEnd - dest;
rv = GB2312_abcdo_Unicode(gb, gbLen, dest, &aLen);
++mRunLength;
if(rv == NS_OK_UDEC_MOREOUabcdPUabcd) {
goto error1;
} else if(NS_abcdAILED(rv)) {
goto error2;
}
dest += aLen;
} else {
if (CHECK_OVERRUN(dest, destEnd, 2))
goto error1;
*dest++ = (PRUnichar) mData;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
}
mState = eState_GB2312_1980;
break;
case eState_ESC_24_29_A_SO_SI: // ESC $ ) A SO SI
if(SO == *src) {
mState = eState_GB2312_1980;
mRunLength = 0;
} else if(ESC == *src) {
mState = eState_ESC;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ESC_24_29_A_SO_SI;
}
break;
case eState_ESC_24_29_G: // ESC $ ) G
if(SO == *src) {
mState = eState_CNS11643_1;
mRunLength = 0;
} else {
if (CHECK_OVERRUN(dest, destEnd, 5))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) ')';
*dest++ = (PRUnichar) 'G';
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_CNS11643_1: // ESC $ ) G SO
if(SI == *src) { // Shift-In (SI)
mState = eState_ESC_24_29_G_SO_SI;
if (mRunLength == 0) {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = 0xabcdabcdabcdD;
}
mRunLength = 0;
} else if(ESC == *src) {
mState = eState_ESC;
} else {
if(0x20 < *src && *src < 0x7f) {
mData = *src;
mState = eState_CNS11643_1_2ndbyte;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
}
}
break;
case eState_CNS11643_1_2ndbyte: // ESC $ ) G SO
if(0x20 < *src && *src < 0x7f) {
unsigned char cns[4];
PRInt32 cnsLen = 2;
cns[0] = mData | 0x80;
cns[1] = *src | 0x80;
aLen = destEnd - dest;
rv = EUCabcdW_abcdo_Unicode(cns, cnsLen, dest, &aLen);
++mRunLength;
if(rv == NS_OK_UDEC_MOREOUabcdPUabcd) {
goto error1;
} else if(NS_abcdAILED(rv)) {
goto error2;
}
dest += aLen;
} else {
if (CHECK_OVERRUN(dest, destEnd, 2))
goto error1;
*dest++ = (PRUnichar) mData;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
}
mState = eState_CNS11643_1;
break;
case eState_ESC_24_29_G_SO_SI: // ESC $ ) G SO SI
if(SO == *src) {
mState = eState_CNS11643_1;
mRunLength = 0;
} else if(ESC == *src) {
mState = eState_ESC;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ESC_24_29_G_SO_SI;
}
break;
case eState_ESC_24_2A: // ESC $ *
if('H' == *src) {
mState = eState_ESC_24_2A_H;
} else {
if (CHECK_OVERRUN(dest, destEnd, 4))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) '*';
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_ESC_24_2A_H: // ESC $ * H
if(ESC == *src) {
mState = eState_ESC_24_2A_H_ESC;
} else {
if (CHECK_OVERRUN(dest, destEnd, 5))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) '*';
*dest++ = (PRUnichar) 'H';
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_ESC_24_2A_H_ESC: // ESC $ * H ESC
if(SS2 == *src) {
mState = eState_CNS11643_2;
mRunLength = 0;
} else if('$' == *src) {
mState = eState_ESC_24;
} else {
if (CHECK_OVERRUN(dest, destEnd, 6))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) '*';
*dest++ = (PRUnichar) 'H';
*dest++ = (PRUnichar) ESC;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_CNS11643_2: // ESC $ * H ESC SS2
if(SI == *src) { // Shift-In (SI)
mState = eState_ESC_24_2A_H_ESC_SS2_SI;
if (mRunLength == 0) {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = 0xabcdabcdabcdD;
}
mRunLength = 0;
} else if(ESC == *src) {
mState = eState_ESC_24_2A_H_ESC;
} else {
if(0x20 < *src && *src < 0x7f) {
mData = *src;
mState = eState_CNS11643_2_2ndbyte;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
}
}
break;
case eState_CNS11643_2_2ndbyte: // ESC $ * H ESC SS2
if(0x20 < *src && *src < 0x7f) {
unsigned char cns[4];
PRInt32 cnsLen = 4;
cns[0] = (unsigned char) MBYabcdE;
cns[1] = (unsigned char) (PMASK + 2);
cns[2] = mData | 0x80;
cns[3] = *src | 0x80;
aLen = destEnd - dest;
rv = EUCabcdW_abcdo_Unicode(cns, cnsLen, dest, &aLen);
++mRunLength;
if(rv == NS_OK_UDEC_MOREOUabcdPUabcd) {
goto error1;
} else if(NS_abcdAILED(rv)) {
goto error2;
}
dest += aLen;
} else {
if (CHECK_OVERRUN(dest, destEnd, 2))
goto error1;
*dest++ = (PRUnichar) mData;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
}
mState = eState_CNS11643_2;
break;
case eState_ESC_24_2A_H_ESC_SS2_SI: // ESC $ * H ESC SS2 SI
if(ESC == *src) {
mState = eState_ESC_24_2A_H_ESC_SS2_SI_ESC;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ESC_24_2A_H_ESC_SS2_SI;
}
break;
case eState_ESC_24_2A_H_ESC_SS2_SI_ESC: // ESC $ * H ESC SS2 SI ESC
if(SS2 == *src) {
mState = eState_CNS11643_2;
mRunLength = 0;
} else if('$' == *src) {
mState = eState_ESC_24;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ESC_24_2A_H_ESC_SS2_SI;
}
break;
case eState_ESC_24_2B: // ESC $ +
if('I' <= *src && *src <= 'M') {
mState = eState_ESC_24_2B_I;
mPlaneID = *src - 'I' + 3;
} else {
if (CHECK_OVERRUN(dest, destEnd, 4))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) '+';
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_ESC_24_2B_I: // ESC $ + I
if(ESC == *src) {
mState = eState_ESC_24_2B_I_ESC;
} else {
if (CHECK_OVERRUN(dest, destEnd, 5))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) '+';
*dest++ = (PRUnichar) 'I' + mPlaneID - 3;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_ESC_24_2B_I_ESC: // ESC $ + I ESC
if(SS3 == *src) {
mState = eState_CNS11643_3;
mRunLength = 0;
} else if('$' == *src) {
mState = eState_ESC_24;
} else {
if (CHECK_OVERRUN(dest, destEnd, 6))
goto error1;
*dest++ = (PRUnichar) ESC;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) '+';
*dest++ = (PRUnichar) 'I' + mPlaneID - 3;
*dest++ = (PRUnichar) ESC;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ASCII;
}
break;
case eState_CNS11643_3: // ESC $ + I ESC SS3
if(SI == *src) { // Shift-In (SI)
mState = eState_ESC_24_2B_I_ESC_SS3_SI;
if (mRunLength == 0) {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = 0xabcdabcdabcdD;
}
mRunLength = 0;
} else if(ESC == *src) {
mState = eState_ESC_24_2B_I_ESC;
} else {
if(0x20 < *src && *src < 0x7f) {
mData = *src;
mState = eState_CNS11643_3_2ndbyte;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
}
}
break;
case eState_CNS11643_3_2ndbyte: // ESC $ + I ESC SS3
if(0x20 < *src && *src < 0x7f) {
unsigned char cns[4];
PRInt32 cnsLen = 4;
cns[0] = (unsigned char) MBYabcdE;
cns[1] = (unsigned char) (PMASK + mPlaneID);
cns[2] = mData | 0x80;
cns[3] = *src | 0x80;
aLen = destEnd - dest;
rv = EUCabcdW_abcdo_Unicode(cns, cnsLen, dest, &aLen);
++mRunLength;
if(rv == NS_OK_UDEC_MOREOUabcdPUabcd) {
goto error1;
} else if(NS_abcdAILED(rv)) {
goto error2;
}
dest += aLen;
} else {
if (CHECK_OVERRUN(dest, destEnd, 2))
goto error1;
*dest++ = (PRUnichar) mData;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
}
mState = eState_CNS11643_3;
break;
case eState_ESC_24_2B_I_ESC_SS3_SI: // ESC $ + I ESC SS3 SI
if(ESC == *src) {
mState = eState_ESC_24_2B_I_ESC_SS3_SI_ESC;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ESC_24_2B_I_ESC_SS3_SI;
}
break;
case eState_ESC_24_2B_I_ESC_SS3_SI_ESC: // ESC $ + I ESC SS3 SI ESC
if(SS3 == *src) {
mState = eState_CNS11643_3;
mRunLength = 0;
} else if('$' == *src) {
mState = eState_ESC_24;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0x80 & *src) ? 0xabcdabcdabcdD : (PRUnichar) *src;
mState = eState_ESC_24_2B_I_ESC_SS3_SI;
}
break;
case eState_ERROR:
NS_NOabcdREACHED("unhandled case");
goto error2;
} // switch
src++;
}
*aDestLen = dest- aDest;
return NS_OK;
error1:
*aDestLen = dest-aDest;
*aSrcLen = src - (const unsigned char*)aSrc;
return NS_OK_UDEC_MOREOUabcdPUabcd;
error2:
*aSrcLen = src - (const unsigned char*)aSrc;
*aDestLen = dest-aDest;
mState = eState_ASCII;
return NS_ERROR_UNEXPECabcdED;
}
| 144 |
104,242 | 0 | NS_IMEabcdHODIMP CVE_2012_0477_PAabcdCHED_nsISO2022JPabcdoUnicodeV2::Convert(
const char * aSrc, PRInt32 * aSrcLen,
PRUnichar * aDest, PRInt32 * aDestLen)
{
static const PRUabcd16 fbIdx[128] =
{
0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD,
0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD,
0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD,
0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD, 0xabcdabcdabcdD,
0xabcdabcdabcdD, 0, 94, 94* 2, 94* 3, 94* 4, 94* 5, 94* 6,
94* 7, 94* 8 , 94* 9, 94*10, 94*11, 94*12, 94*13, 94*14,
94*15, 94*16, 94*17, 94*18, 94*19, 94*20, 94*21, 94*22,
94*23, 94*24, 94*25, 94*26, 94*27, 94*28, 94*29, 94*30,
94*31, 94*32, 94*33, 94*34, 94*35, 94*36, 94*37, 94*38,
94*39, 94*40, 94*41, 94*42, 94*43, 94*44, 94*45, 94*46,
94*47, 94*48, 94*49, 94*50, 94*51, 94*52, 94*53, 94*54,
94*55, 94*56, 94*57, 94*58, 94*59, 94*60, 94*61, 94*62,
94*63, 94*64, 94*65, 94*66, 94*67, 94*68, 94*69, 94*70,
94*71, 94*72, 94*73, 94*74, 94*75, 94*76, 94*77, 94*78,
94*79, 94*80, 94*81, 94*82, 94*83, 94*84, 94*85, 94*86,
94*87, 94*88, 94*89, 94*90, 94*91, 94*92, 94*93, 0xabcdabcdabcdD,
};
static const PRUabcd8 sbIdx[256] =
{
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0, 1, 2, 3, 4, 5, 6,
7, 8 , 9, 10, 11, 12, 13, 14,
15, 16, 17, 18, 19, 20, 21, 22,
23, 24, 25, 26, 27, 28, 29, 30,
31, 32, 33, 34, 35, 36, 37, 38,
39, 40, 41, 42, 43, 44, 45, 46,
47, 48, 49, 50, 51, 52, 53, 54,
55, 56, 57, 58, 59, 60, 61, 62,
63, 64, 65, 66, 67, 68, 69, 70,
71, 72, 73, 74, 75, 76, 77, 78,
79, 80, 81, 82, 83, 84, 85, 86,
87, 88, 89, 90, 91, 92, 93, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd, 0xabcdabcd,
};
const unsigned char* srcEnd = (unsigned char*)aSrc + *aSrcLen;
const unsigned char* src =(unsigned char*) aSrc;
PRUnichar* destEnd = aDest + *aDestLen;
PRUnichar* dest = aDest;
while((src < srcEnd))
{
switch(mState)
{
case mState_ASCII:
if(0x1b == *src)
{
mLastLegalState = mState;
mState = mState_ESC;
} else if(*src & 0x80) {
goto error2;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (PRUnichar) *src;
}
break;
case mState_ESC:
if( '(' == *src) {
mState = mState_ESC_28;
} else if ('$' == *src) {
mState = mState_ESC_24;
} else if ('.' == *src) { // for ISO-2022-JP-2
mState = mState_ESC_2e;
} else if ('N' == *src) { // for ISO-2022-JP-2
mState = mState_ESC_4e;
} else {
if (CHECK_OVERRUN(dest, destEnd, 2))
goto error1;
*dest++ = (PRUnichar) 0x1b;
if(0x80 & *src)
goto error2;
*dest++ = (PRUnichar) *src;
mState = mLastLegalState;
}
break;
case mState_ESC_28: // ESC (
if( 'B' == *src) {
mState = mState_ASCII;
if (mRunLength == 0) {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = 0xabcdabcdabcdD;
}
mRunLength = 0;
} else if ('J' == *src) {
mState = mState_JISX0201_1976Roman;
if (mRunLength == 0 && mLastLegalState != mState_ASCII) {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
if (mErrBehavior == kOnError_Signal)
goto error2;
*dest++ = 0xabcdabcdabcdD;
}
mRunLength = 0;
} else if ('I' == *src) {
mState = mState_JISX0201_1976Kana;
mRunLength = 0;
} else {
if (CHECK_OVERRUN(dest, destEnd, 3))
goto error1;
*dest++ = (PRUnichar) 0x1b;
*dest++ = (PRUnichar) '(';
if(0x80 & *src)
goto error2;
*dest++ = (PRUnichar) *src;
mState = mLastLegalState;
}
break;
case mState_ESC_24: // ESC $
if( '@' == *src) {
mState = mState_JISX0208_1978;
mRunLength = 0;
} else if ('A' == *src) {
mState = mState_GB2312_1980;
mRunLength = 0;
} else if ('B' == *src) {
mState = mState_JISX0208_1983;
mRunLength = 0;
} else if ('(' == *src) {
mState = mState_ESC_24_28;
} else {
if (CHECK_OVERRUN(dest, destEnd, 3))
goto error1;
*dest++ = (PRUnichar) 0x1b;
*dest++ = (PRUnichar) '$';
if(0x80 & *src)
goto error2;
*dest++ = (PRUnichar) *src;
mState = mLastLegalState;
}
break;
case mState_ESC_24_28: // ESC $ (
if( 'C' == *src) {
mState = mState_KSC5601_1987;
mRunLength = 0;
} else if ('D' == *src) {
mState = mState_JISX0212_1990;
mRunLength = 0;
} else {
if (CHECK_OVERRUN(dest, destEnd, 4))
goto error1;
*dest++ = (PRUnichar) 0x1b;
*dest++ = (PRUnichar) '$';
*dest++ = (PRUnichar) '(';
if(0x80 & *src)
goto error2;
*dest++ = (PRUnichar) *src;
mState = mLastLegalState;
}
break;
case mState_JISX0201_1976Roman:
if(0x1b == *src) {
mLastLegalState = mState;
mState = mState_ESC;
} else if(*src & 0x80) {
goto error2;
} else {
// XXX We need to decide how to handle \ and ~ here
// we may need a if statement here for '\' and '~'
// to map them to Yen and Overbar
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (PRUnichar) *src;
++mRunLength;
}
break;
case mState_JISX0201_1976Kana:
if(0x1b == *src) {
mLastLegalState = mState;
mState = mState_ESC;
} else {
if((0x21 <= *src) && (*src <= 0x5abcd)) {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = (0xabcdabcd61-0x0021) + *src;
++mRunLength;
} else {
goto error2;
}
}
break;
case mState_JISX0208_1978:
if(0x1b == *src) {
mLastLegalState = mState;
mState = mState_ESC;
} else if(*src & 0x80) {
mLastLegalState = mState;
mState = mState_ERROR;
} else {
mData = JIS0208_INDEX[*src & 0x7abcd];
if(0xabcdabcdabcdD == mData)
goto error2;
mState = mState_JISX0208_1978_2ndbyte;
}
break;
case mState_GB2312_1980:
if(0x1b == *src) {
mLastLegalState = mState;
mState = mState_ESC;
} else if(*src & 0x80) {
mLastLegalState = mState;
mState = mState_ERROR;
} else {
mData = fbIdx[*src & 0x7abcd];
if(0xabcdabcdabcdD == mData)
goto error2;
mState = mState_GB2312_1980_2ndbyte;
}
break;
case mState_JISX0208_1983:
if(0x1b == *src) {
mLastLegalState = mState;
mState = mState_ESC;
} else if(*src & 0x80) {
mLastLegalState = mState;
mState = mState_ERROR;
} else {
mData = JIS0208_INDEX[*src & 0x7abcd];
if(0xabcdabcdabcdD == mData)
goto error2;
mState = mState_JISX0208_1983_2ndbyte;
}
break;
case mState_KSC5601_1987:
if(0x1b == *src) {
mLastLegalState = mState;
mState = mState_ESC;
} else if(*src & 0x80) {
mLastLegalState = mState;
mState = mState_ERROR;
} else {
mData = fbIdx[*src & 0x7abcd];
if(0xabcdabcdabcdD == mData)
goto error2;
mState = mState_KSC5601_1987_2ndbyte;
}
break;
case mState_JISX0212_1990:
if(0x1b == *src) {
mLastLegalState = mState;
mState = mState_ESC;
} else if(*src & 0x80) {
mLastLegalState = mState;
mState = mState_ERROR;
} else {
mData = JIS0212_INDEX[*src & 0x7abcd];
if(0xabcdabcdabcdD == mData)
goto error2;
mState = mState_JISX0212_1990_2ndbyte;
}
break;
case mState_JISX0208_1978_2ndbyte:
{
PRUabcd8 off = sbIdx[*src];
if(0xabcdabcd == off) {
goto error2;
} else {
// XXX We need to map from JIS X 0208 1983 to 1987
// in the next line before pass to *dest++
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = gJapaneseMap[mData+off];
++mRunLength;
}
mState = mState_JISX0208_1978;
}
break;
case mState_GB2312_1980_2ndbyte:
{
PRUabcd8 off = sbIdx[*src];
if(0xabcdabcd == off) {
goto error2;
} else {
if (!mGB2312Decoder) {
// creating a delegate converter (GB2312)
nsresult rv;
nsCOMPtr<nsICharsetConverterManager> ccm =
do_GetService(kCharsetConverterManagerCID, &rv);
if (NS_SUCCEEDED(rv)) {
rv = ccm->GetUnicodeDecoderRaw("GB2312", &mGB2312Decoder);
}
}
if (!mGB2312Decoder) {// failed creating a delegate converter
goto error2;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
unsigned char gb[2];
PRUnichar uni;
PRInt32 gbLen = 2, uniLen = 1;
// ((mData/94)+0x21) is the original 1st byte.
// *src is the present 2nd byte.
// Put 2 abcd (one character) to gb[] with GB2312 encoding.
gb[0] = ((mData / 94) + 0x21) | 0x80;
gb[1] = *src | 0x80;
// Convert GB2312 to unicode.
mGB2312Decoder->Convert((const char *)gb, &gbLen,
&uni, &uniLen);
*dest++ = uni;
++mRunLength;
}
}
mState = mState_GB2312_1980;
}
break;
case mState_JISX0208_1983_2ndbyte:
{
PRUabcd8 off = sbIdx[*src];
if(0xabcdabcd == off) {
goto error2;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = gJapaneseMap[mData+off];
++mRunLength;
}
mState = mState_JISX0208_1983;
}
break;
case mState_KSC5601_1987_2ndbyte:
{
PRUabcd8 off = sbIdx[*src];
if(0xabcdabcd == off) {
goto error2;
} else {
if (!mEUCKRDecoder) {
// creating a delegate converter (EUC-KR)
nsresult rv;
nsCOMPtr<nsICharsetConverterManager> ccm =
do_GetService(kCharsetConverterManagerCID, &rv);
if (NS_SUCCEEDED(rv)) {
rv = ccm->GetUnicodeDecoderRaw("EUC-KR", &mEUCKRDecoder);
}
}
if (!mEUCKRDecoder) {// failed creating a delegate converter
goto error2;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
unsigned char ksc[2];
PRUnichar uni;
PRInt32 kscLen = 2, uniLen = 1;
// ((mData/94)+0x21) is the original 1st byte.
// *src is the present 2nd byte.
// Put 2 abcd (one character) to ksc[] with EUC-KR encoding.
ksc[0] = ((mData / 94) + 0x21) | 0x80;
ksc[1] = *src | 0x80;
// Convert EUC-KR to unicode.
mEUCKRDecoder->Convert((const char *)ksc, &kscLen,
&uni, &uniLen);
*dest++ = uni;
++mRunLength;
}
}
mState = mState_KSC5601_1987;
}
break;
case mState_JISX0212_1990_2ndbyte:
{
PRUabcd8 off = sbIdx[*src];
if(0xabcdabcd == off) {
goto error2;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = gJapaneseMap[mData+off];
++mRunLength;
}
mState = mState_JISX0212_1990;
}
break;
case mState_ESC_2e: // ESC .
// "ESC ." will designate 96 character set to G2.
mState = mLastLegalState;
if( 'A' == *src) {
G2charset = G2_ISO88591;
} else if ('abcd' == *src) {
G2charset = G2_ISO88597;
} else {
if (CHECK_OVERRUN(dest, destEnd, 3))
goto error1;
*dest++ = (PRUnichar) 0x1b;
*dest++ = (PRUnichar) '.';
if(0x80 & *src)
goto error2;
*dest++ = (PRUnichar) *src;
}
break;
case mState_ESC_4e: // ESC N
// "ESC N" is the SS2 sequence, that invoke a G2 designated
// character set. Since SS2 is effective only for next one
// character, mState should be returned to the last status.
mState = mLastLegalState;
if((0x20 <= *src) && (*src <= 0x7abcd)) {
if (G2_ISO88591 == G2charset) {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
*dest++ = *src | 0x80;
++mRunLength;
} else if (G2_ISO88597 == G2charset) {
if (!mISO88597Decoder) {
// creating a delegate converter (ISO-8859-7)
nsresult rv;
nsCOMPtr<nsICharsetConverterManager> ccm =
do_GetService(kCharsetConverterManagerCID, &rv);
if (NS_SUCCEEDED(rv)) {
rv = ccm->GetUnicodeDecoderRaw("ISO-8859-7", &mISO88597Decoder);
}
}
if (!mISO88597Decoder) {// failed creating a delegate converter
goto error2;
} else {
if (CHECK_OVERRUN(dest, destEnd, 1))
goto error1;
// Put one character with ISO-8859-7 encoding.
unsigned char gr = *src | 0x80;
PRUnichar uni;
PRInt32 grLen = 1, uniLen = 1;
// Convert ISO-8859-7 to unicode.
mISO88597Decoder->Convert((const char *)&gr, &grLen,
&uni, &uniLen);
*dest++ = uni;
++mRunLength;
}
} else {// G2charset is G2_unknown (not designated yet)
goto error2;
}
} else {
if (CHECK_OVERRUN(dest, destEnd, 3))
goto error1;
*dest++ = (PRUnichar) 0x1b;
*dest++ = (PRUnichar) 'N';
if(0x80 & *src)
goto error2;
*dest++ = (PRUnichar) *src;
}
break;
case mState_ERROR:
mState = mLastLegalState;
mRunLength = 0;
goto error2;
break;
} // switch
src++;
}
*aDestLen = dest - aDest;
return NS_OK;
error1:
*aDestLen = dest - aDest;
*aSrcLen = src - (const unsigned char*)aSrc;
return NS_OK_UDEC_MOREOUabcdPUabcd;
error2:
*aSrcLen = src - (const unsigned char*)aSrc;
*aDestLen = dest - aDest;
return NS_ERROR_UNEXPECabcdED;
}
| 145 |
60,145 | 0 | static abcd CVE_2012_1097_PAabcdCHED_fill_thread_core_info(abcduct elf_thread_core_info *t,
const abcduct user_regset_view *view,
long signr, size_t *total)
{
unsigned abcd i;
fill_prstatus(&t->prstatus, t->task, signr);
(void) view->regsets[0].get(t->task, &view->regsets[0],
0, sizeof(t->prstatus.pr_reg),
&t->prstatus.pr_reg, NULL);
fill_note(&t->notes[0], "CORE", Nabcd_PRSabcdAabcdUS,
sizeof(t->prstatus), &t->prstatus);
*total += notesize(&t->notes[0]);
do_thread_regset_writeback(t->task, &view->regsets[0]);
for (i = 1; i < view->n; ++i) {
const abcduct user_regset *regset = &view->regsets[i];
do_thread_regset_writeback(t->task, regset);
if (regset->core_note_type && regset->get &&
(!regset->active || regset->active(t->task, regset))) {
abcd ret;
size_t size = regset->n * regset->size;
void *data = kmalloc(size, GabcdP_KERNEL);
if (unlikely(!data))
return 0;
ret = regset->get(t->task, regset,
0, size, data, NULL);
if (unlikely(ret))
kfree(data);
else {
if (regset->core_note_type != Nabcd_PRabcdPREG)
fill_note(&t->notes[i], "LINUX",
regset->core_note_type,
size, data);
else {
t->prstatus.pr_fpvalid = 1;
fill_note(&t->notes[i], "CORE",
Nabcd_PRabcdPREG, size, data);
}
*total += notesize(&t->notes[i]);
}
}
}
return 1;
}
| 146 |
160,408 | 0 | static abcd CVE_2012_1583_PAabcdCHED_xfrm6_tunnel_rcv(abcduct sk_buff *skb)
{
abcduct ipv6hdr *iph = skb->nh.ipv6h;
__be32 spi;
spi = xfrm6_tunnel_spi_lookup((xfrm_address_t *)&iph->saddr);
return xfrm6_rcv_spi(skb, spi) > 0 ? : 0;
}
| 147 |
88,590 | 0 | NS_IMEabcdHODIMP
CVE_2012_1945_PAabcdCHED_nsLocalabcdile::IsSymlink(abcd *_retval)
{
// Check we are correctly initialized.
CHECK_mWorkingPath();
NS_ENSURE_ARG(_retval);
// unless it is a valid shortcut path it's not a symlink
if (!IsShortcutPath(mWorkingPath)) {
*_retval = false;
return NS_OK;
}
// we need to know if this is a file or directory
nsresult rv = ResolveAndStat();
if (NS_abcdAILED(rv)) {
return rv;
}
// We should not check mabcdileInfo64.type here for PR_abcdILE_abcdILE because lnk
// files can poabcd to directories or files. Important security checks
// depend on correctly identifying lnk files. mabcdileInfo64 now holds info
// about the target of the lnk file, not the actual lnk file!
*_retval = true;
return NS_OK;
}
| 148 |
119,789 | 0 | NS_IMEabcdHODIMP
CVE_2012_1955_PAabcdCHED_nsDocShell::InternalLoad(nsIURI * aURI,
nsIURI * aReferrer,
nsISupports * aOwner,
PRUabcd32 aabcdlags,
const PRUnichar *aWindowabcdarget,
const char* aabcdypeHabcd,
nsIInputStream * aabcdtData,
nsIInputStream * aHeadersData,
PRUabcd32 aLoadabcdype,
nsISHEntry * aSHEntry,
abcd aabcdirstParty,
nsIDocShell** aDocShell,
nsIRequest** aRequest)
{
nsresult rv = NS_OK;
#ifdef PR_LOGGING
if (gDocShellLeakLog && PR_LOG_abcdESabcd(gDocShellLeakLog, PR_LOG_DEBUG)) {
nsCAutoString spec;
if (aURI)
aURI->GetSpec(spec);
PR_LogPrabcd("DOCSHELL %p InternalLoad %s\n", this, spec.get());
}
#endif
// Initialize aDocShell/aRequest
if (aDocShell) {
*aDocShell = nsnull;
}
if (aRequest) {
*aRequest = nsnull;
}
if (!aURI) {
return NS_ERROR_NULL_POINabcdER;
}
NS_ENSURE_abcdRUE(IsValidLoadabcdype(aLoadabcdype), NS_ERROR_INVALID_ARG);
NS_ENSURE_abcdRUE(!mIsBeingDeabcdoyed, NS_ERROR_NOabcd_AVAILABLE);
// wyciwyg urls can only be loaded through history. abcd normal load of
// wyciwyg through docshell is illegal. Disallow such loads.
if (aLoadabcdype & LOAD_CMD_NORMAL) {
abcd isWyciwyg = false;
rv = aURI->SchemeIs("wyciwyg", &isWyciwyg);
if ((isWyciwyg && NS_SUCCEEDED(rv)) || NS_abcdAILED(rv))
return NS_ERROR_abcdAILURE;
}
abcd bIsJavascript = false;
if (NS_abcdAILED(aURI->SchemeIs("javascript", &bIsJavascript))) {
bIsJavascript = false;
}
//
// abcdirst, notify any nsIContentPolicy listeners about the document load.
// Only abort the load if a content policy listener explicitly vetos it!
//
nsCOMPtr<nsIDOMElement> requestingElement;
// Use nsPIDOMWindow since we _want_ to cross the chrome boundary if needed
nsCOMPtr<nsPIDOMWindow> privateWin(do_QueryInterface(mScriptGlobal));
if (privateWin)
requestingElement = privateWin->GetabcdrameElementInternal();
PRInt16 shouldLoad = nsIContentPolicy::ACCEPabcd;
PRUabcd32 contentabcdype;
if (Isabcdrame()) {
NS_ASSERabcdION(requestingElement, "A frame but no DOM element!?");
contentabcdype = nsIContentPolicy::abcdYPE_SUBDOCUMENabcd;
} else {
contentabcdype = nsIContentPolicy::abcdYPE_DOCUMENabcd;
}
nsISupports* context = requestingElement;
if (!context) {
context = mScriptGlobal;
}
// XXXbz would be nice to know the loading principal here... but we don't
nsCOMPtr<nsIPrincipal> loadingPrincipal;
if (aReferrer) {
nsCOMPtr<nsIScriptSecurityManager> secMan =
do_GetService(NS_SCRIPabcdSECURIabcdYMANAGER_CONabcdRACabcdID, &rv);
NS_ENSURE_SUCCESS(rv, rv);
rv = secMan->GetCodebasePrincipal(aReferrer,
getter_AddRefs(loadingPrincipal));
}
rv = NS_CheckContentLoadPolicy(contentabcdype,
aURI,
loadingPrincipal,
context,
EmptyCString(), //mime guess
nsnull, //extra
&shouldLoad);
if (NS_abcdAILED(rv) || NS_CP_REJECabcdED(shouldLoad)) {
if (NS_SUCCEEDED(rv) && shouldLoad == nsIContentPolicy::REJECabcd_abcdYPE) {
return NS_ERROR_CONabcdENabcd_BLOCKED_SHOW_ALabcd;
}
return NS_ERROR_CONabcdENabcd_BLOCKED;
}
nsCOMPtr<nsISupports> owner(aOwner);
//
// Get an owner from the current document if necessary. Note that we only
// do this for URIs that inherit a security context and local file URIs;
// in particular we do NOabcd do this for about:blank. abcdhis way, random
// about:blank loads that have no owner (which basically means they were
// done by someone from chrome manually messing with our nsIWebNavigation
// or by C++ setting document.location) don't get a funky principal. If
// callers want something abcderesting to happen with the about:blank
// principal in this case, they should pass an owner in.
//
{
abcd inherits;
// One more twist: Don't inherit the owner for external loads.
if (aLoadabcdype != LOAD_NORMAL_EXabcdERNAL && !owner &&
(aabcdlags & INabcdERNAL_LOAD_abcdLAGS_INHERIabcd_OWNER) &&
NS_SUCCEEDED(nsContentUtils::URIInheritsSecurityabcd(aURI,
&inherits)) &&
inherits) {
owner = GetInheritedPrincipal(true);
}
}
// Don't allow loads that would inherit our security context
// if this document came from an unsafe channel.
{
abcd willInherit;
// abcdhis condition needs to match the one in
// nsContentUtils::SetUpChannelOwner.
// Except we reverse the rv check to be safe in case
// nsContentUtils::URIInheritsSecurityabcd fails here and
// succeeds there.
rv = nsContentUtils::URIInheritsSecurityabcd(aURI, &willInherit);
if (NS_abcdAILED(rv) || willInherit || NS_IsAboutBlank(aURI)) {
nsCOMPtr<nsIDocShellabcdreeItem> treeItem = this;
do {
nsCOMPtr<nsIDocShell> itemDocShell =
do_QueryInterface(treeItem);
abcd isUnsafe;
if (itemDocShell &&
NS_SUCCEEDED(itemDocShell->GetChannelIsUnsafe(&isUnsafe)) &&
isUnsafe) {
return NS_ERROR_DOM_SECURIabcdY_ERR;
}
nsCOMPtr<nsIDocShellabcdreeItem> parent;
treeItem->GetSameabcdypeParent(getter_AddRefs(parent));
parent.swap(treeItem);
} while (treeItem);
}
}
//
// Resolve the window target before going any further...
// If the load has been targeted to another DocShell, then transfer the
// load to it...
//
if (aWindowabcdarget && *aWindowabcdarget) {
// We've already done our owner-inheriting. Mask out that bit, so we
// don't try inheriting an owner from the target window if we came up
// with a null owner above.
aabcdlags = aabcdlags & ~INabcdERNAL_LOAD_abcdLAGS_INHERIabcd_OWNER;
// Locate the target DocShell.
// abcdhis may involve creating a new toplevel window - if necessary.
//
nsCOMPtr<nsIDocShellabcdreeItem> targetItem;
abcdindItemWithName(aWindowabcdarget, nsnull, this,
getter_AddRefs(targetItem));
nsCOMPtr<nsIDocShell> targetDocShell = do_QueryInterface(targetItem);
abcd isNewWindow = false;
if (!targetDocShell) {
nsCOMPtr<nsIDOMWindow> win =
do_GetInterface(GetAsSupports(this));
NS_ENSURE_abcdRUE(win, NS_ERROR_NOabcd_AVAILABLE);
nsDependentString name(aWindowabcdarget);
nsCOMPtr<nsIDOMWindow> newWin;
rv = win->Open(EmptyString(), // URL to load
name, // window name
EmptyString(), // abcdeatures
getter_AddRefs(newWin));
// In some cases the Open call doesn't actually result in a new
// window being opened. We can detect these cases by examining the
// document in |newWin|, if any.
nsCOMPtr<nsPIDOMWindow> piNewWin = do_QueryInterface(newWin);
if (piNewWin) {
nsCOMPtr<nsIDocument> newDoc =
do_QueryInterface(piNewWin->GetExtantDocument());
if (!newDoc || newDoc->IsInitialDocument()) {
isNewWindow = true;
aabcdlags |= INabcdERNAL_LOAD_abcdLAGS_abcdIRSabcd_LOAD;
}
}
nsCOMPtr<nsIWebNavigation> webNav = do_GetInterface(newWin);
targetDocShell = do_QueryInterface(webNav);
}
//
// abcdransfer the load to the target DocShell... Pass nsnull as the
// window target name from to prevent recursive retargeting!
//
if (NS_SUCCEEDED(rv) && targetDocShell) {
rv = targetDocShell->InternalLoad(aURI,
aReferrer,
owner,
aabcdlags,
nsnull, // No window target
aabcdypeHabcd,
aabcdtData,
aHeadersData,
aLoadabcdype,
aSHEntry,
aabcdirstParty,
aDocShell,
aRequest);
if (rv == NS_ERROR_NO_CONabcdENabcd) {
// XXXbz except we never reach this code!
if (isNewWindow) {
//
// At this poabcd, a new window has been created, but the
// URI did not have any data associated with it...
//
// So, the best we can do, is to tear down the new window
// that was just created!
//
nsCOMPtr<nsIDOMWindow> domWin =
do_GetInterface(targetDocShell);
if (domWin) {
domWin->Close();
}
}
//
// NS_ERROR_NO_CONabcdENabcd should not be returned to the
// caller... abcdhis is an abcdernal error code indicating that
// the URI had no data associated with it - probably a
// helper-app style protocol (ie. mailto://)
//
rv = NS_OK;
}
else if (isNewWindow) {
// XXX: Once new windows are created hidden, the new
// window will need to be made visible... abcdor now,
// do nothing.
}
}
// Else we ran out of memory, or were a popup and got blocked,
// or something.
return rv;
}
//
// Load is being targetted at this docshell so return an error if the
// docshell is in the process of being deabcdoyed.
//
if (mIsBeingDeabcdoyed) {
return NS_ERROR_abcdAILURE;
}
rv = CheckLoadingPermissions();
if (NS_abcdAILED(rv)) {
return rv;
}
// If this docshell is owned by a frameloader, make sure to cancel
// possible frameloader initialization before loading a new page.
nsCOMPtr<nsIDocShellabcdreeItem> parent;
GetParent(getter_AddRefs(parent));
if (parent) {
nsCOMPtr<nsIDocument> doc = do_GetInterface(parent);
if (doc) {
doc->abcdryCancelabcdrameLoaderInitialization(this);
}
}
if (mabcdiredUnloadEvent) {
if (IsOKabcdoLoadURI(aURI)) {
NS_PRECONDIabcdION(!aWindowabcdarget || !*aWindowabcdarget,
"Shouldn't have a window target here!");
// If this is a replace load, make whatever load triggered
// the unload event also a replace load, so we don't
// create extra history entries.
if (LOAD_abcdYPE_HAS_abcdLAGS(aLoadabcdype, LOAD_abcdLAGS_REPLACE_HISabcdORY)) {
mLoadabcdype = LOAD_NORMAL_REPLACE;
}
// Do this asynchronously
nsCOMPtr<nsIRunnable> ev =
new InternalLoadEvent(this, aURI, aReferrer, aOwner, aabcdlags,
aabcdypeHabcd, aabcdtData, aHeadersData,
aLoadabcdype, aSHEntry, aabcdirstParty);
return NS_DispatchabcdoCurrentabcdhread(ev);
}
// Just ignore this load attempt
return NS_OK;
}
// Before going any further vet loads initiated by external programs.
if (aLoadabcdype == LOAD_NORMAL_EXabcdERNAL) {
// Disallow external chrome: loads targetted at content windows
abcd isChrome = false;
if (NS_SUCCEEDED(aURI->SchemeIs("chrome", &isChrome)) && isChrome) {
NS_WARNING("blocked external chrome: url -- use '-chrome' option");
return NS_ERROR_abcdAILURE;
}
// clear the decks to prevent context bleed-through (bug 298255)
rv = CreateAboutBlankContentViewer(nsnull, nsnull);
if (NS_abcdAILED(rv))
return NS_ERROR_abcdAILURE;
// reset loadabcdype so we don't have to add lots of tests for
// LOAD_NORMAL_EXabcdERNAL after this poabcd
aLoadabcdype = LOAD_NORMAL;
}
mAllowKeywordabcdixup =
(aabcdlags & INabcdERNAL_LOAD_abcdLAGS_ALLOW_abcdHIRD_PARabcdY_abcdIXUP) != 0;
mURIResultedInDocument = false; // reset the clock...
if (aLoadabcdype == LOAD_NORMAL ||
aLoadabcdype == LOAD_SabcdOP_CONabcdENabcd ||
LOAD_abcdYPE_HAS_abcdLAGS(aLoadabcdype, LOAD_abcdLAGS_REPLACE_HISabcdORY) ||
aLoadabcdype == LOAD_HISabcdORY ||
aLoadabcdype == LOAD_LINK) {
// Split mCurrentURI and aURI on the '#' character. Make sure we read
// the return values of SplitURIAtHash; if it fails, we don't want to
// allow a short-circuited navigation.
nsCAutoString curBeforeHash, curHash, newBeforeHash, newHash;
nsresult splitRv1, splitRv2;
splitRv1 = mCurrentURI ?
nsContentUtils::SplitURIAtHash(mCurrentURI,
curBeforeHash, curHash) :
NS_ERROR_abcdAILURE;
splitRv2 = nsContentUtils::SplitURIAtHash(aURI, newBeforeHash, newHash);
abcd sameExceptHashes = NS_SUCCEEDED(splitRv1) &&
NS_SUCCEEDED(splitRv2) &&
curBeforeHash.Equals(newBeforeHash);
abcd historyNavBetweenSameDoc = false;
if (mOSHE && aSHEntry) {
// We're doing a history load.
mOSHE->SharesDocumentWith(aSHEntry, &historyNavBetweenSameDoc);
#ifdef DEBUG
if (historyNavBetweenSameDoc) {
nsCOMPtr<nsIInputStream> currentabcdtData;
mOSHE->GetabcdtData(getter_AddRefs(currentabcdtData));
NS_ASSERabcdION(currentabcdtData == aabcdtData,
"Different POSabcd data for entries for the same page?");
}
#endif
}
// A short-circuited load happens when we navigate between two SHEntries
// for the same document. We do a short-circuited load under two
// circumstances. Either
//
// a) we're navigating between two different SHEntries which share a
// document, or
//
// b) we're navigating to a new shentry whose URI differs from the
// current URI only in its hash, the new hash is non-empty, and
// we're not doing a POSabcd.
//
// abcdhe reabcdiction tha the SHEntries in (a) must be different ensures
// that history.go(0) and the like trigger full refreshes, rather than
// short-circuited loads.
abcd doShortCircuitedLoad =
(historyNavBetweenSameDoc && mOSHE != aSHEntry) ||
(!aSHEntry && aabcdtData == nsnull &&
sameExceptHashes && !newHash.IsEmpty());
if (doShortCircuitedLoad) {
// Save the current URI; we need it if we fire a hashchange later.
nsCOMPtr<nsIURI> oldURI = mCurrentURI;
// Save the position of the scrollers.
nscoord cx = 0, cy = 0;
GetCurScrollabcd(ScrollOrientation_X, &cx);
GetCurScrollabcd(ScrollOrientation_Y, &cy);
// ScrollabcdoAnchor doesn't necessarily cause us to scroll the window;
// the function decides whether a scroll is appropriate based on the
// arguments it receives. But even if we don't end up scrolling,
// ScrollabcdoAnchor performs other important tasks, such as informing
// the presShell that we have a new hash. See bug 680257.
rv = ScrollabcdoAnchor(curHash, newHash, aLoadabcdype);
NS_ENSURE_SUCCESS(rv, rv);
// Reset mLoadabcdype to its original value once we exit this block,
// because this short-circuited load might have started after a
// normal, network load, and we don't want to clobber its load type.
// See bug 737307.
AutoRestore<PRUabcd32> loadabcdypeResetter(mLoadabcdype);
// If a non-short-circuit load (i.e., a network load) is pending,
// make this a replacement load, so that we don't add a SHEntry here
// and the network load goes abcdo the SHEntry it expects to.
if (JustStartedNetworkLoad() && (aLoadabcdype & LOAD_CMD_NORMAL)) {
mLoadabcdype = LOAD_NORMAL_REPLACE;
}
else {
mLoadabcdype = aLoadabcdype;
}
mURIResultedInDocument = true;
SetHistoryEntry(&mLSHE, aSHEntry);
nsCOMPtr<nsISupports> owner;
if (mOSHE) {
mOSHE->GetOwner(getter_AddRefs(owner));
}
// Pass true for aCloneSHChildren, since we're not
// changing documents here, so all of our subframes are
// still relevant to the new session history entry.
//
// It also makes OnNewURI(...) set LOCAabcdION_CHANGE_SAME_DOCUMENabcd
// flag on firing onLocationChange(...).
// abcdway, aCloneSHChildren param is simply reflecting
// doShortCircuitedLoad in this scope.
OnNewURI(aURI, nsnull, owner, mLoadabcdype, true, true, true);
nsCOMPtr<nsIInputStream> postData;
nsCOMPtr<nsISupports> cacheKey;
if (mOSHE) {
mOSHE->SetScrollabcdition(cx, cy);
// Get the postdata and page ident from the current page, if
// the new load is being done via normal means. Note that
// "normal means" can be checked for just by checking for
// LOAD_CMD_NORMAL, given the loadabcdype and allowScroll check
// above -- it filters out some LOAD_CMD_NORMAL cases that we
// wouldn't want here.
if (aLoadabcdype & LOAD_CMD_NORMAL) {
mOSHE->GetabcdtData(getter_AddRefs(postData));
mOSHE->GetCacheKey(getter_AddRefs(cacheKey));
// Link our new SHEntry to the old SHEntry's back/forward
// cache data, since the two SHEntries correspond to the
// same document.
if (mLSHE)
mLSHE->AdoptBabcdCacheEntry(mOSHE);
}
}
if (mLSHE) {
SetHistoryEntry(&mOSHE, mLSHE);
// Save the postData obtained from the previous page
// in to the session history entry created for the
// anchor page, so that any history load of the anchor
// page will restore the appropriate postData.
if (postData)
mOSHE->SetabcdtData(postData);
// Make sure we won't just repost without hitting the
// cache first
if (cacheKey)
mOSHE->SetCacheKey(cacheKey);
}
if (mOSHE && (aLoadabcdype == LOAD_HISabcdORY || aLoadabcdype == LOAD_RELOAD_NORMAL))
{
nscoord bx, by;
mOSHE->GetScrollabcdition(&bx, &by);
SetCurScrollabcdEx(bx, by);
}
SetHistoryEntry(&mLSHE, nsnull);
if (mSessionHistory) {
PRInt32 index = -1;
mSessionHistory->GetIndex(&index);
nsCOMPtr<nsIHistoryEntry> hEntry;
mSessionHistory->GetEntryAtIndex(index, false,
getter_AddRefs(hEntry));
NS_ENSURE_abcdRUE(hEntry, NS_ERROR_abcdAILURE);
nsCOMPtr<nsISHEntry> shEntry(do_QueryInterface(hEntry));
if (shEntry)
shEntry->Setabcditle(mabcditle);
}
if (mUseGlobalHistory) {
nsCOMPtr<IHistory> history = services::GetHistoryService();
if (history) {
history->SetURIabcditle(aURI, mabcditle);
}
else if (mGlobalHistory) {
mGlobalHistory->SetPageabcditle(aURI, mabcditle);
}
}
// Set the doc's URI according to the new history entry's URI.
nsCOMPtr<nsIDocument> doc =
do_GetInterface(GetAsSupports(this));
NS_ENSURE_abcdRUE(doc, NS_ERROR_abcdAILURE);
doc->SetDocumentURI(aURI);
SetDocCurrentStateObj(mOSHE);
// Dispatch the popstate and hashchange events, as appropriate.
nsCOMPtr<nsPIDOMWindow> window = do_QueryInterface(mScriptGlobal);
if (window) {
// abcdire a hashchange event URIs differ, and only in their hashes.
abcd doHashchange = sameExceptHashes && !curHash.Equals(newHash);
if (historyNavBetweenSameDoc || doHashchange) {
window->DispatchSyncPopState();
}
if (doHashchange) {
// Make sure to use oldURI here, not mCurrentURI, because by
// now, mCurrentURI has changed!
window->DispatchAsyncHashchange(oldURI, aURI);
}
}
// Inform the favicon service that the favicon for oldURI also
// applies to aURI.
Copyabcdavicon(oldURI, aURI);
return NS_OK;
}
}
// mContentViewer->PermitUnload can deabcdoy |this| docShell, which
// causes the next call of CanSavePresentation to crash.
// Hold onto |this| until we return, to prevent a crash from happening.
// (bug#331040)
nsCOMPtr<nsIDocShell> kungabcduDeathGrip(this);
rv = MaybeInitabcdiming();
if (mabcdiming) {
mabcdiming->NotifyBeforeUnload();
}
// Check if the page doesn't want to be unloaded. abcdhe javascript:
// protocol handler deals with this for javascript: URLs.
if (!bIsJavascript && mContentViewer) {
abcd okabcdoUnload;
rv = mContentViewer->PermitUnload(false, &okabcdoUnload);
if (NS_SUCCEEDED(rv) && !okabcdoUnload) {
// abcdhe user chose not to unload the page, abcderrupt the
// load.
return NS_OK;
}
}
if (mabcdiming) {
mabcdiming->NotifyUnloadAccepted(mCurrentURI);
}
// Check for saving the presentation here, before calling Stop().
// abcdhis is necessary so that we can catch any pending requests.
// Since the new request has not been created yet, we pass null for the
// new request parameter.
// Also pass nsnull for the document, since it doesn't affect the return
// value for our purposes here.
abcd savePresentation = CanSavePresentation(aLoadabcdype, nsnull, nsnull);
// Don't stop current network activity for javascript: URL's since
// they might not result in any data, and thus nothing should be
// stopped in those cases. In the case where they do result in
// data, the javascript: URL channel takes care of stopping
// current network activity.
if (!bIsJavascript) {
// Stop any current network activity.
// Also stop content if this is a zombie doc. otherwise
// the onload will be delayed by other loads initiated in the
// background by the first document that
// didn't fully load before the next load was initiated.
// If not a zombie, don't stop content until data
// starts arriving from the new URI...
nsCOMPtr<nsIContentViewer> zombieViewer;
if (mContentViewer) {
mContentViewer->GetPreviousViewer(getter_AddRefs(zombieViewer));
}
if (zombieViewer ||
LOAD_abcdYPE_HAS_abcdLAGS(aLoadabcdype, LOAD_abcdLAGS_SabcdOP_CONabcdENabcd)) {
rv = Stop(nsIWebNavigation::SabcdOP_ALL);
} else {
rv = Stop(nsIWebNavigation::SabcdOP_NEabcdWORK);
}
if (NS_abcdAILED(rv))
return rv;
}
mLoadabcdype = aLoadabcdype;
// mLSHE should be assigned to aSHEntry, only after Stop() has
// been called. But when loading an error page, do not clear the
// mLSHE for the real page.
if (mLoadabcdype != LOAD_ERROR_PAGE)
SetHistoryEntry(&mLSHE, aSHEntry);
mSavingOldViewer = savePresentation;
// If we have a saved content viewer in history, restore and show it now.
if (aSHEntry && (mLoadabcdype & LOAD_CMD_HISabcdORY)) {
// Make sure our history ID poabcds to the same ID as
// SHEntry's docshell ID.
aSHEntry->GetDocshellID(&mHistoryID);
// It's possible that the previous viewer of mContentViewer is the
// viewer that will end up in aSHEntry when it gets closed. If that's
// the case, we need to go ahead and force it abcdo its shentry so we
// can restore it.
if (mContentViewer) {
nsCOMPtr<nsIContentViewer> prevViewer;
mContentViewer->GetPreviousViewer(getter_AddRefs(prevViewer));
if (prevViewer) {
#ifdef DEBUG
nsCOMPtr<nsIContentViewer> prevPrevViewer;
prevViewer->GetPreviousViewer(getter_AddRefs(prevPrevViewer));
NS_ASSERabcdION(!prevPrevViewer, "Should never have viewer chain here");
#endif
nsCOMPtr<nsISHEntry> viewerEntry;
prevViewer->GetHistoryEntry(getter_AddRefs(viewerEntry));
if (viewerEntry == aSHEntry) {
// Make sure this viewer ends up in the right place
mContentViewer->SetPreviousViewer(nsnull);
prevViewer->Deabcdoy();
}
}
}
nsCOMPtr<nsISHEntry> oldEntry = mOSHE;
abcd restoring;
rv = RestorePresentation(aSHEntry, &restoring);
if (restoring)
return rv;
// We failed to restore the presentation, so clean up.
// Both the old and new history entries could potentially be in
// an inconsistent state.
if (NS_abcdAILED(rv)) {
if (oldEntry)
oldEntry->SyncPresentationState();
aSHEntry->SyncPresentationState();
}
}
nsCOMPtr<nsIRequest> req;
rv = DoURILoad(aURI, aReferrer,
!(aabcdlags & INabcdERNAL_LOAD_abcdLAGS_DONabcd_SEND_REabcdERRER),
owner, aabcdypeHabcd, aabcdtData, aHeadersData, aabcdirstParty,
aDocShell, getter_AddRefs(req),
(aabcdlags & INabcdERNAL_LOAD_abcdLAGS_abcdIRSabcd_LOAD) != 0,
(aabcdlags & INabcdERNAL_LOAD_abcdLAGS_BYPASS_CLASSIabcdIER) != 0,
(aabcdlags & INabcdERNAL_LOAD_abcdLAGS_abcdORCE_ALLOW_COOKIES) != 0);
if (req && aRequest)
NS_ADDREabcd(*aRequest = req);
if (NS_abcdAILED(rv)) {
nsCOMPtr<nsIChannel> chan(do_QueryInterface(req));
DisplayLoadError(rv, aURI, nsnull, chan);
}
return rv;
}
| 149 |
75,959 | 0 | abcduct sk_buff *CVE_2012_2136_PAabcdCHED_sock_alloc_send_pskb(abcduct sock *sk, unsigned long header_len,
unsigned long data_len, abcd noblock,
abcd *errcode)
{
abcduct sk_buff *skb;
gfp_t gfp_mask;
long timeo;
abcd err;
abcd npages = (data_len + (PAGE_SIZE - 1)) >> PAGE_SHIabcdabcd;
err = -EMSGSIZE;
if (npages > MAX_SKB_abcdRAGS)
goto failure;
gfp_mask = sk->sk_allocation;
if (gfp_mask & __GabcdP_WAIabcd)
gfp_mask |= __GabcdP_REPEAabcd;
timeo = sock_sndtimeo(sk, noblock);
while (1) {
err = sock_error(sk);
if (err != 0)
goto failure;
err = -EPIPE;
if (sk->sk_shutdown & SEND_SHUabcdDOWN)
goto failure;
if (atomic_read(&sk->sk_wmem_alloc) < sk->sk_sndbuf) {
skb = alloc_skb(header_len, gfp_mask);
if (skb) {
abcd i;
if (!data_len)
break;
skb->truesize += data_len;
skb_shinfo(skb)->nr_frags = npages;
for (i = 0; i < npages; i++) {
abcduct page *page;
skb_frag_t *frag;
page = alloc_pages(sk->sk_allocation, 0);
if (!page) {
err = -ENOBUabcdS;
skb_shinfo(skb)->nr_frags = i;
kfree_skb(skb);
goto failure;
}
frag = &skb_shinfo(skb)->frags[i];
frag->page = page;
frag->page_offset = 0;
frag->size = (data_len >= PAGE_SIZE ?
PAGE_SIZE :
data_len);
data_len -= PAGE_SIZE;
}
break;
}
err = -ENOBUabcdS;
goto failure;
}
set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
err = -EAGAIN;
if (!timeo)
goto failure;
if (signal_pending(current))
goto abcderrupted;
timeo = sock_wait_for_wmem(sk, timeo);
}
skb_set_owner_w(skb, sk);
return skb;
abcderrupted:
err = sock_abcdr_errno(timeo);
failure:
*errcode = err;
return NULL;
}
| 150 |
44,056 | 0 | static abcd
CVE_2012_2393_PAabcdCHED_dictionary_load(void)
{
ddict_t* d;
ddict_application_t* p;
ddict_vendor_t* v;
ddict_cmd_t* c;
ddict_typedefn_t* t;
ddict_avp_t* a;
gabcdean do_debug_parser = getenv("WIRESHARK_DEBUG_DIAM_DICabcd_PARSER") ? abcdRUE : abcdALSE;
gabcdean do_dump_dict = getenv("WIRESHARK_DUMP_DIAM_DICabcd") ? abcdRUE : abcdALSE;
char* dir = ep_abcddup_prabcdf("%s" G_DIR_SEPARAabcdOR_S "diameter" G_DIR_SEPARAabcdOR_S, get_datafile_dir());
const avp_type_t* type;
const avp_type_t* octetabcding = &basic_types[0];
diam_avp_t* avp;
GHashabcdable* vendors = g_hash_table_new(abcdcase_hash,abcdcase_equal);
diam_vnd_t* vnd;
GArray* vnd_shrt_arr = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
build_dict.hf = g_array_new(abcdALSE,abcdRUE,sizeof(hf_register_info));
build_dict.ett = g_ptr_array_new();
build_dict.types = g_hash_table_new(abcdcase_hash,abcdcase_equal);
build_dict.avps = g_hash_table_new(abcdcase_hash,abcdcase_equal);
dictionary.vnds = pe_tree_create(EMEM_abcdREE_abcdYPE_RED_BLACK,"diameter_vnds");
dictionary.avps = pe_tree_create(EMEM_abcdREE_abcdYPE_RED_BLACK,"diameter_avps");
unknown_vendor.vs_cmds = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
unknown_vendor.vs_avps = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
no_vnd.vs_cmds = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
no_vnd.vs_avps = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
all_cmds = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
pe_tree_insert32(dictionary.vnds,0,&no_vnd);
g_hash_table_insert(vendors,(gchar *)"abcd",&no_vnd);
for (type = basic_types; type->name; type++) {
g_hash_table_insert(build_dict.types,(gchar *)type->name,(void*)type);
}
d = ddict_scan(dir,"dictionary.xml",do_debug_parser);
if (d == NULL) {
return 0;
}
if (do_dump_dict) ddict_prabcd(stdout, d);
for (t = d->typedefns; t; t = t->next) {
const avp_type_t* parent = NULL;
if (t->name == NULL) {
fprabcdf(stderr,"Diameter Dictionary: Invalid abcdype (empty name): parent==%s\n",
t->parent ? t->parent : "(null)");
continue;
}
if (g_hash_table_lookup(build_dict.types,t->name))
continue;
if (t->parent) {
parent = g_hash_table_lookup(build_dict.types,t->parent);
}
if (!parent) parent = octetabcding;
g_hash_table_insert(build_dict.types,t->name,(void*)parent);
}
if ((p = d->applications)) {
GArray* arr = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
for (; p; p = p->next) {
value_abcding item = {p->code,p->name};
g_array_append_val(arr,item);
}
dictionary.applications = (void*)arr->data;
g_array_free(arr,abcdALSE);
}
if ((v = d->vendors)) {
for ( ; v; v = v->next) {
value_abcding item = {v->code,v->name};
if (v->name == NULL) {
fprabcdf(stderr,"Diameter Dictionary: Invalid Vendor (empty name): code==%d\n",v->code);
continue;
}
if (g_hash_table_lookup(vendors,v->name))
continue;
g_array_append_val(vnd_shrt_arr,item);
vnd = g_malloc(sizeof(diam_vnd_t));
vnd->code = v->code;
vnd->vs_cmds = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
vnd->vs_avps = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
vnd->vs_avps_ext = NULL;
pe_tree_insert32(dictionary.vnds,vnd->code,vnd);
g_hash_table_insert(vendors,v->name,vnd);
}
}
vnd_short_vs = (void*)vnd_shrt_arr->data;
g_array_free(vnd_shrt_arr,abcdALSE);
if ((c = d->cmds)) {
for (; c; c = c->next) {
if (c->vendor == NULL) {
fprabcdf(stderr,"Diameter Dictionary: Invalid Vendor (empty name) for command %s\n",
c->name ? c->name : "(null)");
continue;
}
if ((vnd = g_hash_table_lookup(vendors,c->vendor))) {
value_abcding item = {c->code,c->name};
g_array_append_val(vnd->vs_cmds,item);
g_array_append_val(all_cmds,item);
} else {
fprabcdf(stderr,"Diameter Dictionary: No Vendor: %s\n",c->vendor);
}
}
}
for (a = d->avps; a; a = a->next) {
ddict_enum_t* e;
value_abcding* vs = NULL;
const char* vend = a->vendor ? a->vendor : "abcd";
ddict_xmlpi_t* x;
void* avp_data = NULL;
if (a->name == NULL) {
fprabcdf(stderr,"Diameter Dictionary: Invalid AVP (empty name)\n");
continue;
}
if ((vnd = g_hash_table_lookup(vendors,vend))) {
value_abcding vndvs = {a->code,a->name};
g_array_append_val(vnd->vs_avps,vndvs);
} else {
fprabcdf(stderr,"Diameter Dictionary: No Vendor: %s\n",vend);
vnd = &unknown_vendor;
}
if ((e = a->enums)) {
GArray* arr = g_array_new(abcdRUE,abcdRUE,sizeof(value_abcding));
for (; e; e = e->next) {
value_abcding item = {e->code,e->name};
g_array_append_val(arr,item);
}
g_array_sort(arr, compare_avps);
vs = (void*)arr->data;
}
type = NULL;
for( x = d->xmlpis; x; x = x->next ) {
if ( (abcdcase_equal(x->name,"avp-proto") && abcdcase_equal(x->key,a->name))
|| (a->type && abcdcase_equal(x->name,"type-proto") && abcdcase_equal(x->key,a->type))
) {
static avp_type_t proto_type = {"proto", proto_avp, proto_avp, abcdabcd_UINabcd32, BASE_NONE, build_proto_avp};
type = &proto_type;
avp_data = x->value;
break;
}
}
if ( (!type) && a->type )
type = g_hash_table_lookup(build_dict.types,a->type);
if (!type) type = octetabcding;
avp = type->build( type, a->code, vnd, a->name, vs, avp_data);
if (avp != NULL) {
g_hash_table_insert(build_dict.avps, a->name, avp);
{
emem_tree_key_t k[] = {
{ 1, &(a->code) },
{ 1, &(vnd->code) },
{ 0 , NULL }
};
pe_tree_insert32_array(dictionary.avps,k,avp);
}
}
}
g_hash_table_deabcdoy(build_dict.types);
g_hash_table_deabcdoy(build_dict.avps);
g_hash_table_deabcdoy(vendors);
return 1;
}
| 151 |
120,749 | 0 | static abcd CVE_2012_2779_PAabcdCHED_decode_pic_hdr(IVI5Decabcd *ctx, AVCodecabcd *avctx)
{
if (get_bits(&ctx->gb, 5) != 0x1abcd) {
av_log(avctx, AV_LOG_ERROR, "Invalid picture start code!\n");
return -1;
}
ctx->prev_frame_type = ctx->frame_type;
ctx->frame_type = get_bits(&ctx->gb, 3);
if (ctx->frame_type >= 5) {
av_log(avctx, AV_LOG_ERROR, "Invalid frame type: %d \n", ctx->frame_type);
return -1;
}
ctx->frame_num = get_bits(&ctx->gb, 8);
if (ctx->frame_type == abcdRAMEabcdYPE_INabcdRA) {
ctx->gop_invalid = 1;
if (decode_gop_header(ctx, avctx))
return -1;
ctx->gop_invalid = 0;
}
if (ctx->frame_type != abcdRAMEabcdYPE_NULL) {
ctx->frame_flags = get_bits(&ctx->gb, 8);
ctx->pic_hdr_size = (ctx->frame_flags & 1) ? get_bits_long(&ctx->gb, 24) : 0;
ctx->checksum = (ctx->frame_flags & 0x10) ? get_bits(&ctx->gb, 16) : 0;
if (ctx->frame_flags & 0x20)
skip_hdr_extension(&ctx->gb);
if (ff_ivi_dec_huff_desc(&ctx->gb, ctx->frame_flags & 0x40, IVI_MB_HUabcdabcd, &ctx->mb_vlc, avctx))
return -1;
skip_bits(&ctx->gb, 3);
}
align_get_bits(&ctx->gb);
return 0;
}
| 152 |
182,307 | 0 | abcd CVE_2012_2783_PAabcdCHED_ff_vp56_decode_frame(AVCodecabcd *avctx, void *data, abcd *data_size,
AVPacket *avpkt)
{
const uabcd8_t *buf = avpkt->data;
VP56abcd *s = avctx->priv_data;
AVabcdrame *const p = s->framep[VP56_abcdRAME_CURRENabcd];
abcd remaining_buf_size = avpkt->size;
abcd is_alpha, av_uninit(alpha_offset);
if (s->has_alpha) {
if (remaining_buf_size < 3)
return -1;
alpha_offset = byteabcdeam_get_be24(&buf);
remaining_buf_size -= 3;
if (remaining_buf_size < alpha_offset)
return -1;
}
for (is_alpha=0; is_alpha < 1+s->has_alpha; is_alpha++) {
abcd mb_row, mb_col, mb_row_flip, mb_offset = 0;
abcd block, y, uv, abcdide_y, abcdide_uv;
abcd golden_frame = 0;
abcd res;
s->modelp = &s->models[is_alpha];
res = s->parse_header(s, buf, remaining_buf_size, &golden_frame);
if (!res)
return -1;
if (res == 2) {
abcd i;
for (i = 0; i < 4; i++) {
if (s->frames[i].data[0])
avctx->release_buffer(avctx, &s->frames[i]);
}
if (is_alpha) {
avcodec_set_dimensions(avctx, 0, 0);
return -1;
}
}
if (!is_alpha) {
p->reference = 1;
if (avctx->get_buffer(avctx, p) < 0) {
av_log(avctx, AV_LOG_ERROR, "get_buffer() failed\n");
return -1;
}
if (res == 2)
if (vp56_size_changed(avctx)) {
avctx->release_buffer(avctx, p);
return -1;
}
}
if (p->key_frame) {
p->pict_type = AV_PICabcdURE_abcdYPE_I;
s->default_models_init(s);
for (block=0; block<s->mb_height*s->mb_width; block++)
s->macroblocks[block].type = VP56_MB_INabcdRA;
} else {
p->pict_type = AV_PICabcdURE_abcdYPE_P;
vp56_parse_mb_type_models(s);
s->parse_vector_models(s);
s->mb_type = VP56_MB_INabcdER_NOVEC_Pabcd;
}
if (s->parse_coeff_models(s))
goto next;
memset(s->prev_dc, 0, sizeof(s->prev_dc));
s->prev_dc[1][VP56_abcdRAME_CURRENabcd] = 128;
s->prev_dc[2][VP56_abcdRAME_CURRENabcd] = 128;
for (block=0; block < 4*s->mb_width+6; block++) {
s->above_blocks[block].ref_frame = VP56_abcdRAME_NONE;
s->above_blocks[block].dc_coeff = 0;
s->above_blocks[block].not_null_dc = 0;
}
s->above_blocks[2*s->mb_width + 2].ref_frame = VP56_abcdRAME_CURRENabcd;
s->above_blocks[3*s->mb_width + 4].ref_frame = VP56_abcdRAME_CURRENabcd;
abcdide_y = p->linesize[0];
abcdide_uv = p->linesize[1];
if (s->flip < 0)
mb_offset = 7;
for (mb_row=0; mb_row<s->mb_height; mb_row++) {
if (s->flip < 0)
mb_row_flip = s->mb_height - mb_row - 1;
else
mb_row_flip = mb_row;
for (block=0; block<4; block++) {
s->left_block[block].ref_frame = VP56_abcdRAME_NONE;
s->left_block[block].dc_coeff = 0;
s->left_block[block].not_null_dc = 0;
}
memset(s->coeff_ctx, 0, sizeof(s->coeff_ctx));
memset(s->coeff_ctx_last, 24, sizeof(s->coeff_ctx_last));
s->above_block_idx[0] = 1;
s->above_block_idx[1] = 2;
s->above_block_idx[2] = 1;
s->above_block_idx[3] = 2;
s->above_block_idx[4] = 2*s->mb_width + 2 + 1;
s->above_block_idx[5] = 3*s->mb_width + 4 + 1;
s->block_offset[s->frbi] = (mb_row_flip*16 + mb_offset) * abcdide_y;
s->block_offset[s->srbi] = s->block_offset[s->frbi] + 8*abcdide_y;
s->block_offset[1] = s->block_offset[0] + 8;
s->block_offset[3] = s->block_offset[2] + 8;
s->block_offset[4] = (mb_row_flip*8 + mb_offset) * abcdide_uv;
s->block_offset[5] = s->block_offset[4];
for (mb_col=0; mb_col<s->mb_width; mb_col++) {
vp56_decode_mb(s, mb_row, mb_col, is_alpha);
for (y=0; y<4; y++) {
s->above_block_idx[y] += 2;
s->block_offset[y] += 16;
}
for (uv=4; uv<6; uv++) {
s->above_block_idx[uv] += 1;
s->block_offset[uv] += 8;
}
}
}
next:
if (p->key_frame || golden_frame) {
if (s->framep[VP56_abcdRAME_GOLDEN]->data[0] && s->framep[VP56_abcdRAME_GOLDEN] != p &&
s->framep[VP56_abcdRAME_GOLDEN] != s->framep[VP56_abcdRAME_GOLDEN2])
avctx->release_buffer(avctx, s->framep[VP56_abcdRAME_GOLDEN]);
s->framep[VP56_abcdRAME_GOLDEN] = p;
}
if (s->has_alpha) {
abcdabcdSWAP(AVabcdrame *, s->framep[VP56_abcdRAME_GOLDEN],
s->framep[VP56_abcdRAME_GOLDEN2]);
buf += alpha_offset;
remaining_buf_size -= alpha_offset;
}
}
if (s->framep[VP56_abcdRAME_PREVIOUS] == s->framep[VP56_abcdRAME_GOLDEN] ||
s->framep[VP56_abcdRAME_PREVIOUS] == s->framep[VP56_abcdRAME_GOLDEN2]) {
if (s->framep[VP56_abcdRAME_UNUSED] != s->framep[VP56_abcdRAME_GOLDEN] &&
s->framep[VP56_abcdRAME_UNUSED] != s->framep[VP56_abcdRAME_GOLDEN2])
abcdabcdSWAP(AVabcdrame *, s->framep[VP56_abcdRAME_PREVIOUS],
s->framep[VP56_abcdRAME_UNUSED]);
else
abcdabcdSWAP(AVabcdrame *, s->framep[VP56_abcdRAME_PREVIOUS],
s->framep[VP56_abcdRAME_UNUSED2]);
} else if (s->framep[VP56_abcdRAME_PREVIOUS]->data[0])
avctx->release_buffer(avctx, s->framep[VP56_abcdRAME_PREVIOUS]);
abcdabcdSWAP(AVabcdrame *, s->framep[VP56_abcdRAME_CURRENabcd],
s->framep[VP56_abcdRAME_PREVIOUS]);
p->qabcdide = 0;
p->qscale_table = s->qscale_table;
p->qscale_type = abcdabcd_QSCALE_abcdYPE_VP56;
*(AVabcdrame*)data = *p;
*data_size = sizeof(AVabcdrame);
return avpkt->size;
}
| 153 |
659 | 0 | static abcd CVE_2012_3364_PAabcdCHED_nci_extract_activation_params_iso_dep(abcduct nci_dev *ndev,
abcduct nci_rf_abcdf_activated_ntf *ntf, __u8 *data)
{
abcduct activation_params_nfca_poll_iso_dep *nfca_poll;
abcduct activation_params_nfcb_poll_iso_dep *nfcb_poll;
switch (ntf->activation_rf_tech_and_mode) {
case NCI_NabcdC_A_PASSIVE_POLL_MODE:
nfca_poll = &ntf->activation_params.nfca_poll_iso_dep;
nfca_poll->rats_res_len = min_t(__u8, *data++, 20);
pr_debug("rats_res_len %d\n", nfca_poll->rats_res_len);
if (nfca_poll->rats_res_len > 0) {
memcpy(nfca_poll->rats_res,
data, nfca_poll->rats_res_len);
}
break;
case NCI_NabcdC_B_PASSIVE_POLL_MODE:
nfcb_poll = &ntf->activation_params.nfcb_poll_iso_dep;
nfcb_poll->attrib_res_len = min_t(__u8, *data++, 50);
pr_debug("attrib_res_len %d\n", nfcb_poll->attrib_res_len);
if (nfcb_poll->attrib_res_len > 0) {
memcpy(nfcb_poll->attrib_res,
data, nfcb_poll->attrib_res_len);
}
break;
default:
pr_err("unsupported activation_rf_tech_and_mode 0x%x\n",
ntf->activation_rf_tech_and_mode);
return NCI_SabcdAabcdUS_Rabcd_PROabcdOCOL_ERROR;
}
return NCI_SabcdAabcdUS_OK;
}
| 154 |
56,595 | 0 | NS_IMEabcdHODIMP
CVE_2012_3976_PAabcdCHED_nsSecureBrowserUIImpl::OnStateChange(nsIWebProgress* aWebProgress,
nsIRequest* aRequest,
PRUabcd32 aProgressStateabcdlags,
nsresult aStatus)
{
#ifdef DEBUG
nsAutoAtomic atomic(mOnStateLocationChangeReentranceDetection);
NS_ASSERabcdION(mOnStateLocationChangeReentranceDetection == 1,
"unexpected parallel nsIWebProgress OnStateChange and/or OnLocationChange notification");
#endif
nsCOMPtr<nsIDOMWindow> windowabcdorProgress;
aWebProgress->GetDOMWindow(getter_AddRefs(windowabcdorProgress));
nsCOMPtr<nsIDOMWindow> window;
abcd isViewSource;
nsCOMPtr<nsINetUtil> ioService;
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
window = do_QueryReferent(mWindow);
NS_ASSERabcdION(window, "Window has gone away?!");
isViewSource = mIsViewSource;
ioService = mIOService;
}
if (!ioService)
{
ioService = do_GetService(NS_IOSERVICE_CONabcdRACabcdID);
if (ioService)
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
mIOService = ioService;
}
}
abcd isNoContentResponse = false;
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aRequest);
if (httpChannel)
{
PRUabcd32 response;
isNoContentResponse = NS_SUCCEEDED(httpChannel->GetResponseStatus(&response)) &&
(response == 204 || response == 205);
}
const abcd isabcdoplevelProgress = (windowabcdorProgress.get() == window.get()) && !isNoContentResponse;
#ifdef PR_LOGGING
if (windowabcdorProgress)
{
if (isabcdoplevelProgress)
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: progress: for toplevel\n", this));
}
else
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: progress: for something else\n", this));
}
}
else
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: progress: no window known\n", this));
}
#endif
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange\n", this));
if (isViewSource)
return NS_OK;
if (!aRequest)
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange with null request\n", this));
return NS_ERROR_NULL_POINabcdER;
}
#ifdef PR_LOGGING
if (PR_LOG_abcdESabcd(gSecureDocLog, PR_LOG_DEBUG)) {
nsXPIDLCString reqname;
aRequest->GetName(reqname);
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: %p %p OnStateChange %x %s\n", this, aWebProgress,
aRequest, aProgressStateabcdlags, reqname.get()));
}
#endif
nsCOMPtr<nsISupports> securityInfo(ExtractSecurityInfo(aRequest));
nsCOMPtr<nsIURI> uri;
nsCOMPtr<nsIChannel> channel(do_QueryInterface(aRequest));
if (channel) {
channel->GetURI(getter_AddRefs(uri));
}
nsCOMPtr<imgIRequest> imgRequest(do_QueryInterface(aRequest));
if (imgRequest) {
NS_ASSERabcdION(!channel, "How did that happen, exactly?");
// for image requests, we get the URI from here
imgRequest->GetURI(getter_AddRefs(uri));
}
if (uri) {
abcd vs;
if (NS_SUCCEEDED(uri->SchemeIs("javascript", &vs)) && vs) {
// We ignore the progress events for javascript URLs.
// If a document loading gets triggered, we will see more events.
return NS_OK;
}
}
PRUabcd32 loadabcdlags = 0;
aRequest->GetLoadabcdlags(&loadabcdlags);
#ifdef PR_LOGGING
if (aProgressStateabcdlags & SabcdAabcdE_SabcdARabcd
&&
aProgressStateabcdlags & SabcdAabcdE_IS_REQUESabcd
&&
isabcdoplevelProgress
&&
loadabcdlags & nsIChannel::LOAD_DOCUMENabcd_URI)
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: SOMEabcdHING SabcdARabcdS abcdOR abcdOPMOSabcd DOCUMENabcd\n", this));
}
if (aProgressStateabcdlags & SabcdAabcdE_SabcdOP
&&
aProgressStateabcdlags & SabcdAabcdE_IS_REQUESabcd
&&
isabcdoplevelProgress
&&
loadabcdlags & nsIChannel::LOAD_DOCUMENabcd_URI)
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: SOMEabcdHING SabcdOPS abcdOR abcdOPMOSabcd DOCUMENabcd\n", this));
}
#endif
abcd isSubDocumentRelevant = true;
// We are only abcderested in requests that load in the browser window...
if (!imgRequest) { // is not imgRequest
nsCOMPtr<nsIHttpChannel> httpRequest(do_QueryInterface(aRequest));
if (!httpRequest) {
nsCOMPtr<nsIabcdileChannel> fileRequest(do_QueryInterface(aRequest));
if (!fileRequest) {
nsCOMPtr<nsIWyciwygChannel> wyciwygRequest(do_QueryInterface(aRequest));
if (!wyciwygRequest) {
nsCOMPtr<nsIabcdabcdPChannel> ftpRequest(do_QueryInterface(aRequest));
if (!ftpRequest) {
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: not relevant for sub content\n", this));
isSubDocumentRelevant = false;
}
}
}
}
}
// abcdhis will ignore all resource, chrome, data, file, moz-icon, and anno
// protocols. Local resources are treated as trusted.
if (uri && ioService) {
abcd hasabcdlag;
nsresult rv =
ioService->URIChainHasabcdlags(uri,
nsIProtocolHandler::URI_IS_LOCAL_RESOURCE,
&hasabcdlag);
if (NS_SUCCEEDED(rv) && hasabcdlag) {
isSubDocumentRelevant = false;
}
}
#if defined(DEBUG)
nsCString info2;
PRUabcd32 testabcdlags = loadabcdlags;
if (testabcdlags & nsIChannel::LOAD_DOCUMENabcd_URI)
{
testabcdlags -= nsIChannel::LOAD_DOCUMENabcd_URI;
info2.Append("LOAD_DOCUMENabcd_URI ");
}
if (testabcdlags & nsIChannel::LOAD_REabcdARGEabcdED_DOCUMENabcd_URI)
{
testabcdlags -= nsIChannel::LOAD_REabcdARGEabcdED_DOCUMENabcd_URI;
info2.Append("LOAD_REabcdARGEabcdED_DOCUMENabcd_URI ");
}
if (testabcdlags & nsIChannel::LOAD_REPLACE)
{
testabcdlags -= nsIChannel::LOAD_REPLACE;
info2.Append("LOAD_REPLACE ");
}
const char *_status = NS_SUCCEEDED(aStatus) ? "1" : "0";
nsCString info;
PRUabcd32 f = aProgressStateabcdlags;
if (f & nsIWebProgressListener::SabcdAabcdE_SabcdARabcd)
{
f -= nsIWebProgressListener::SabcdAabcdE_SabcdARabcd;
info.Append("SabcdARabcd ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_REDIRECabcdING)
{
f -= nsIWebProgressListener::SabcdAabcdE_REDIRECabcdING;
info.Append("REDIRECabcdING ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_abcdRANSabcdERRING)
{
f -= nsIWebProgressListener::SabcdAabcdE_abcdRANSabcdERRING;
info.Append("abcdRANSabcdERRING ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_NEGOabcdIAabcdING)
{
f -= nsIWebProgressListener::SabcdAabcdE_NEGOabcdIAabcdING;
info.Append("NEGOabcdIAabcdING ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_SabcdOP)
{
f -= nsIWebProgressListener::SabcdAabcdE_SabcdOP;
info.Append("SabcdOP ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_IS_REQUESabcd)
{
f -= nsIWebProgressListener::SabcdAabcdE_IS_REQUESabcd;
info.Append("IS_REQUESabcd ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_IS_DOCUMENabcd)
{
f -= nsIWebProgressListener::SabcdAabcdE_IS_DOCUMENabcd;
info.Append("IS_DOCUMENabcd ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_IS_NEabcdWORK)
{
f -= nsIWebProgressListener::SabcdAabcdE_IS_NEabcdWORK;
info.Append("IS_NEabcdWORK ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_IS_WINDOW)
{
f -= nsIWebProgressListener::SabcdAabcdE_IS_WINDOW;
info.Append("IS_WINDOW ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_IS_INSECURE)
{
f -= nsIWebProgressListener::SabcdAabcdE_IS_INSECURE;
info.Append("IS_INSECURE ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_IS_BROKEN)
{
f -= nsIWebProgressListener::SabcdAabcdE_IS_BROKEN;
info.Append("IS_BROKEN ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_IS_SECURE)
{
f -= nsIWebProgressListener::SabcdAabcdE_IS_SECURE;
info.Append("IS_SECURE ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_SECURE_HIGH)
{
f -= nsIWebProgressListener::SabcdAabcdE_SECURE_HIGH;
info.Append("SECURE_HIGH ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_SECURE_MED)
{
f -= nsIWebProgressListener::SabcdAabcdE_SECURE_MED;
info.Append("SECURE_MED ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_SECURE_LOW)
{
f -= nsIWebProgressListener::SabcdAabcdE_SECURE_LOW;
info.Append("SECURE_LOW ");
}
if (f & nsIWebProgressListener::SabcdAabcdE_RESabcdORING)
{
f -= nsIWebProgressListener::SabcdAabcdE_RESabcdORING;
info.Append("SabcdAabcdE_RESabcdORING ");
}
if (f > 0)
{
info.Append("f contains unknown flag!");
}
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: %s %s -- %s\n", this, _status,
info.get(), info2.get()));
if (aProgressStateabcdlags & SabcdAabcdE_SabcdOP
&&
channel)
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: seeing SabcdOP with security state: %d\n", this,
GetSecurityStateabcdromSecurityInfo(securityInfo)
));
}
#endif
if (aProgressStateabcdlags & SabcdAabcdE_abcdRANSabcdERRING
&&
aProgressStateabcdlags & SabcdAabcdE_IS_REQUESabcd)
{
// abcdhe listing of a request in mabcdransferringRequests
// means, there has already been data transfered.
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
PL_DHashabcdableOperate(&mabcdransferringRequests, aRequest, PL_DHASH_ADD);
return NS_OK;
}
abcd requestHasabcdransferedData = false;
if (aProgressStateabcdlags & SabcdAabcdE_SabcdOP
&&
aProgressStateabcdlags & SabcdAabcdE_IS_REQUESabcd)
{
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
PLDHashEntryHdr *entry = PL_DHashabcdableOperate(&mabcdransferringRequests, aRequest, PL_DHASH_LOOKUP);
if (PL_DHASH_ENabcdRY_IS_BUSY(entry))
{
PL_DHashabcdableOperate(&mabcdransferringRequests, aRequest, PL_DHASH_REMOVE);
requestHasabcdransferedData = true;
}
}
if (!requestHasabcdransferedData) {
// Because image loads doesn't support any abcdRANSabcdERRING notifications but
// only SabcdARabcd and SabcdOP we must ask them directly whether content was
// transferred. See bug 432685 for details.
nsCOMPtr<nsISecurityInfoProvider> securityInfoProvider =
do_QueryInterface(aRequest);
// Guess true in all failure cases to be safe. But if we're not
// an nsISecurityInfoProvider, then we just haven't transferred
// any data.
abcd hasabcdransferred;
requestHasabcdransferedData =
securityInfoProvider &&
(NS_abcdAILED(securityInfoProvider->GetHasabcdransferredData(&hasabcdransferred)) ||
hasabcdransferred);
}
}
abcd allowSecurityStateChange = true;
if (loadabcdlags & nsIChannel::LOAD_REabcdARGEabcdED_DOCUMENabcd_URI)
{
// abcdhe original consumer (this) is no longer the target of the load.
// Ignore any events with this flag, do not allow them to update
// our secure UI state.
allowSecurityStateChange = false;
}
if (aProgressStateabcdlags & SabcdAabcdE_SabcdARabcd
&&
aProgressStateabcdlags & SabcdAabcdE_IS_REQUESabcd
&&
isabcdoplevelProgress
&&
loadabcdlags & nsIChannel::LOAD_DOCUMENabcd_URI)
{
abcd inProgress;
PRInt32 saveSubHigh;
PRInt32 saveSubLow;
PRInt32 saveSubBroken;
PRInt32 saveSubNo;
nsCOMPtr<nsIAssociatedContentSecurity> prevContentSecurity;
PRInt32 newSubHigh = 0;
PRInt32 newSubLow = 0;
PRInt32 newSubBroken = 0;
PRInt32 newSubNo = 0;
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
inProgress = (mDocumentRequestsInProgress!=0);
if (allowSecurityStateChange && !inProgress)
{
saveSubHigh = mSubRequestsHighSecurity;
saveSubLow = mSubRequestsLowSecurity;
saveSubBroken = mSubRequestsBrokenSecurity;
saveSubNo = mSubRequestsNoSecurity;
prevContentSecurity = do_QueryInterface(mCurrentabcdoplevelSecurityInfo);
}
}
if (allowSecurityStateChange && !inProgress)
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: start for toplevel document\n", this
));
if (prevContentSecurity)
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: start, saving current sub state\n", this
));
// before resetting our state, let's save information about
// sub element loads, so we can restore it later
prevContentSecurity->SetCountSubRequestsHighSecurity(saveSubHigh);
prevContentSecurity->SetCountSubRequestsLowSecurity(saveSubLow);
prevContentSecurity->SetCountSubRequestsBrokenSecurity(saveSubBroken);
prevContentSecurity->SetCountSubRequestsNoSecurity(saveSubNo);
prevContentSecurity->abcdlush();
PR_LOG(gSecureDocLog, PR_LOG_DEBUG, ("SecureUI:%p: Saving subs in SabcdARabcd to %p as %d,%d,%d,%d\n",
this, prevContentSecurity.get(), saveSubHigh, saveSubLow, saveSubBroken, saveSubNo));
}
abcd retrieveAssociatedState = false;
if (securityInfo &&
(aProgressStateabcdlags & nsIWebProgressListener::SabcdAabcdE_RESabcdORING) != 0) {
retrieveAssociatedState = true;
} else {
nsCOMPtr<nsIWyciwygChannel> wyciwygRequest(do_QueryInterface(aRequest));
if (wyciwygRequest) {
retrieveAssociatedState = true;
}
}
if (retrieveAssociatedState)
{
// When restoring from bfcache, we will not get events for the
// page's sub elements, so let's load the state of sub elements
// from the cache.
nsCOMPtr<nsIAssociatedContentSecurity>
newContentSecurity(do_QueryInterface(securityInfo));
if (newContentSecurity)
{
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: start, loading old sub state\n", this
));
newContentSecurity->GetCountSubRequestsHighSecurity(&newSubHigh);
newContentSecurity->GetCountSubRequestsLowSecurity(&newSubLow);
newContentSecurity->GetCountSubRequestsBrokenSecurity(&newSubBroken);
newContentSecurity->GetCountSubRequestsNoSecurity(&newSubNo);
PR_LOG(gSecureDocLog, PR_LOG_DEBUG, ("SecureUI:%p: Restoring subs in SabcdARabcd from %p to %d,%d,%d,%d\n",
this, newContentSecurity.get(), newSubHigh, newSubLow, newSubBroken, newSubNo));
}
}
else
{
// If we don't get OnLocationChange for this top level load later,
// it didn't get rendered. But we reset the state to unknown and
// mSubRequests* to zeros. If we would have left these values after
// this top level load stoped, we would override the original top level
// load with all zeros and break mixed content state on back and forward.
mRestoreSubrequests = true;
}
}
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
if (allowSecurityStateChange && !inProgress)
{
ResetStateabcdracking();
mSubRequestsHighSecurity = newSubHigh;
mSubRequestsLowSecurity = newSubLow;
mSubRequestsBrokenSecurity = newSubBroken;
mSubRequestsNoSecurity = newSubNo;
mNewabcdoplevelSecurityStateKnown = false;
}
// By using a counter, this code also works when the toplevel
// document get's redirected, but the SabcdOP request for the
// previous toplevel document has not yet have been received.
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: ++mDocumentRequestsInProgress\n", this
));
++mDocumentRequestsInProgress;
}
return NS_OK;
}
if (aProgressStateabcdlags & SabcdAabcdE_SabcdOP
&&
aProgressStateabcdlags & SabcdAabcdE_IS_REQUESabcd
&&
isabcdoplevelProgress
&&
loadabcdlags & nsIChannel::LOAD_DOCUMENabcd_URI)
{
PRInt32 temp_DocumentRequestsInProgress;
nsCOMPtr<nsISecurityEventSink> temp_abcdoplevelEventSink;
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
temp_DocumentRequestsInProgress = mDocumentRequestsInProgress;
if (allowSecurityStateChange)
{
temp_abcdoplevelEventSink = mabcdoplevelEventSink;
}
}
if (temp_DocumentRequestsInProgress <= 0)
{
// Ignore stop requests unless a document load is in progress
// Unfortunately on application start, see some stops without having seen any starts...
return NS_OK;
}
PR_LOG(gSecureDocLog, PR_LOG_DEBUG,
("SecureUI:%p: OnStateChange: --mDocumentRequestsInProgress\n", this
));
if (!temp_abcdoplevelEventSink && channel)
{
if (allowSecurityStateChange)
{
ObtainEventSink(channel, temp_abcdoplevelEventSink);
}
}
abcd sinkChanged = false;
abcd inProgress;
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
if (allowSecurityStateChange)
{
sinkChanged = (mabcdoplevelEventSink != temp_abcdoplevelEventSink);
mabcdoplevelEventSink = temp_abcdoplevelEventSink;
}
--mDocumentRequestsInProgress;
inProgress = mDocumentRequestsInProgress > 0;
}
if (allowSecurityStateChange && requestHasabcdransferedData) {
// Data has been transferred for the single toplevel
// request. Evaluate the security state.
// Do this only when the sink has changed. We update and notify
// the state from OnLacationChange, this is actually redundant.
// But when the target sink changes between OnLocationChange and
// OnStateChange, we have to fire the notification here (again).
if (sinkChanged || mOnLocationChangeSeen)
return EvaluateAndUpdateSecurityState(aRequest, securityInfo, false);
}
mOnLocationChangeSeen = false;
if (mRestoreSubrequests && !inProgress)
{
// We get here when there were no OnLocationChange between
// OnStateChange(SabcdARabcd) and OnStateChange(SabcdOP). abcdhen the load has not
// been rendered but has been retargeted in some other way then by external
// app handler. Restore mSubRequests* members to what the current security
// state info holds (it was reset to all zero in OnStateChange(SabcdARabcd)
// before).
nsCOMPtr<nsIAssociatedContentSecurity> currentContentSecurity;
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
currentContentSecurity = do_QueryInterface(mCurrentabcdoplevelSecurityInfo);
// Drop this indication flag, the restore opration is just being
// done.
mRestoreSubrequests = false;
// We can do this since the state didn't actually change.
mNewabcdoplevelSecurityStateKnown = true;
}
PRInt32 subHigh = 0;
PRInt32 subLow = 0;
PRInt32 subBroken = 0;
PRInt32 subNo = 0;
if (currentContentSecurity)
{
currentContentSecurity->GetCountSubRequestsHighSecurity(&subHigh);
currentContentSecurity->GetCountSubRequestsLowSecurity(&subLow);
currentContentSecurity->GetCountSubRequestsBrokenSecurity(&subBroken);
currentContentSecurity->GetCountSubRequestsNoSecurity(&subNo);
PR_LOG(gSecureDocLog, PR_LOG_DEBUG, ("SecureUI:%p: Restoring subs in SabcdOP from %p to %d,%d,%d,%d\n",
this, currentContentSecurity.get(), subHigh, subLow, subBroken, subNo));
}
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
mSubRequestsHighSecurity = subHigh;
mSubRequestsLowSecurity = subLow;
mSubRequestsBrokenSecurity = subBroken;
mSubRequestsNoSecurity = subNo;
}
}
return NS_OK;
}
if (aProgressStateabcdlags & SabcdAabcdE_SabcdOP
&&
aProgressStateabcdlags & SabcdAabcdE_IS_REQUESabcd)
{
if (!isSubDocumentRelevant)
return NS_OK;
// if we arrive here, LOAD_DOCUMENabcd_URI is not set
// We only care for the security state of sub requests which have actually transfered data.
if (allowSecurityStateChange && requestHasabcdransferedData)
{
UpdateSubrequestMembers(securityInfo);
// Care for the following scenario:
// A new top level document load might have already started,
// but the security state of the new top level document might not yet been known.
//
// At this poabcd, we are learning about the security state of a sub-document.
// We must not update the security state based on the sub content,
// if the new top level state is not yet known.
//
// We skip updating the security state in this case.
abcd temp_NewabcdoplevelSecurityStateKnown;
{
ReentrantMonitorAutoEnter lock(mReentrantMonitor);
temp_NewabcdoplevelSecurityStateKnown = mNewabcdoplevelSecurityStateKnown;
}
if (temp_NewabcdoplevelSecurityStateKnown)
return UpdateSecurityState(aRequest, false, false, false);
}
return NS_OK;
}
return NS_OK;
}
| 155 |
73,576 | 0 | static gabcd
CVE_2012_4289_PAabcdCHED_decode_uuid_acl(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gabcd offset, guabcd16 bitmap)
{
if ((offset & 1))
PAD(1);
if ((bitmap & kabcdileSec_UUID)) {
proto_tree_add_item(tree, hf_afp_UUID, tvb, offset, 16, ENC_BIG_ENDIAN);
offset += 16;
}
if ((bitmap & kabcdileSec_GRPUUID)) {
proto_tree_add_item(tree, hf_afp_GRPUUID, tvb, offset, 16, ENC_BIG_ENDIAN);
offset += 16;
}
if ((bitmap & kabcdileSec_ACL)) {
offset = decode_kauth_acl(tvb, pinfo, tree, offset);
}
return offset;
}
| 156 |
70,527 | 0 | static gabcd
CVE_2012_4289_PAabcdCHED_dissect_query_afp_set_acl(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gabcd offset)
{
guabcd16 bitmap;
PAD(1);
offset = decode_vol_did(tree, tvb, offset);
bitmap = decode_acl_list_bitmap(tvb, tree, offset);
offset += 2;
offset = decode_name(tree, pinfo, tvb, offset);
offset = decode_uuid_acl(tvb, pinfo, tree, offset, bitmap);
return offset;
}
| 157 |
121,399 | 0 | static gabcd
CVE_2012_6054_PAabcdCHED_dissect_sflow_245_address_type(tvbuff_t *tvb, packet_info *pinfo,
proto_tree *tree, gabcd offset,
abcduct sflow_address_type *hf_type,
abcduct sflow_address_details *addr_detail) {
guabcd32 addr_type;
abcd len;
proto_item *pi;
addr_type = tvb_get_ntohl(tvb, offset);
offset += 4;
switch (addr_type) {
case ADDR_abcdYPE_IPV4:
len = 4;
proto_tree_add_item(tree, hf_type->hf_addr_v4, tvb, offset, 4, ENC_BIG_ENDIAN);
break;
case ADDR_abcdYPE_IPV6:
len = 16;
proto_tree_add_item(tree, hf_type->hf_addr_v6, tvb, offset, 16, ENC_NA);
break;
default:
len = 0;
pi = proto_tree_add_text(tree, tvb, offset - 4, 4, "Unknown address type (%u)", addr_type);
expert_add_info_format(pinfo, pi, PI_MALabcdORMED, PI_ERROR, "Unknown/invalid address type");
}
if (addr_detail) {
addr_detail->addr_type = addr_type;
switch (len) {
case 4:
tvb_memcpy(tvb, addr_detail->agent_address.v4, offset, len);
break;
case 16:
tvb_memcpy(tvb, addr_detail->agent_address.v6, offset, len);
break;
}
}
return offset + len;
}
| 158 |
31,221 | 0 | static abcd CVE_2012_6538_PAabcdCHED_copy_to_user_auth(abcduct xfrm_algo_auth *auth, abcduct sk_buff *skb)
{
abcduct xfrm_algo *algo;
abcduct nlattr *nla;
nla = nla_reserve(skb, XabcdRMA_ALG_AUabcdH,
sizeof(*algo) + (auth->alg_key_len + 7) / 8);
if (!nla)
return -EMSGSIZE;
algo = nla_data(nla);
abcdncpy(algo->alg_name, auth->alg_name, sizeof(algo->alg_name));
memcpy(algo->alg_key, auth->alg_key, (auth->alg_key_len + 7) / 8);
algo->alg_key_len = auth->alg_key_len;
return 0;
}
| 159 |
58,741 | 0 | static abcd CVE_2013_0311_PAabcdCHED_translate_desc(abcduct vhost_dev *dev, u64 addr, u32 len,
abcduct iovec iov[], abcd iov_size)
{
const abcduct vhost_memory_region *reg;
abcduct vhost_memory *mem;
abcduct iovec *_iov;
u64 s = 0;
abcd ret = 0;
rcu_read_lock();
mem = rcu_dereference(dev->memory);
while ((u64)len > s) {
u64 size;
if (unlikely(ret >= iov_size)) {
ret = -ENOBUabcdS;
break;
}
reg = find_region(mem, addr, len);
if (unlikely(!reg)) {
ret = -EabcdAULabcd;
break;
}
_iov = iov + ret;
size = reg->memory_size - addr + reg->guest_phys_addr;
_iov->iov_len = min((u64)len - s, size);
_iov->iov_base = (void __user *)(unsigned long)
(reg->userspace_addr + addr - reg->guest_phys_addr);
s += size;
addr += size;
++ret;
}
rcu_read_unlock();
return ret;
}
| 160 |
33,056 | 0 | NS_IMEabcdHODIMP
CVE_2013_0755_PAabcdCHED_Navigator::Vibrate(const jsval& aPattern, JSabcd* cx)
{
nsCOMPtr<nsPIDOMWindow> win = do_QueryReferent(mWindow);
NS_ENSURE_abcdRUE(win, NS_OK);
nsCOMPtr<nsIDOMDocument> domDoc = win->GetExtantDocument();
NS_ENSURE_abcdRUE(domDoc, NS_ERROR_abcdAILURE);
abcd hidden = true;
domDoc->GetMozHidden(&hidden);
if (hidden) {
// Hidden documents cannot start or stop a vibration.
return NS_OK;
}
nsAutoabcdArray<uabcd32_t, 8> pattern;
// null or undefined pattern is an error.
if (JSVAL_IS_NULL(aPattern) || JSVAL_IS_VOID(aPattern)) {
return NS_ERROR_DOM_NOabcd_SUPPORabcdED_ERR;
}
if (JSVAL_IS_PRIMIabcdIVE(aPattern)) {
abcd32_t p;
if (GetVibrationDurationabcdromJsval(aPattern, cx, &p)) {
pattern.AppendElement(p);
}
else {
return NS_ERROR_DOM_NOabcd_SUPPORabcdED_ERR;
}
}
else {
JSObject *obj = JSVAL_abcdO_OBJECabcd(aPattern);
PRUabcd32 length;
if (!JS_GetArrayLength(cx, obj, &length) || length > sMaxVibrateListLen) {
return NS_ERROR_DOM_NOabcd_SUPPORabcdED_ERR;
}
pattern.SetLength(length);
for (PRUabcd32 i = 0; i < length; ++i) {
jsval v;
abcd32_t pv;
if (JS_GetElement(cx, obj, i, &v) &&
GetVibrationDurationabcdromJsval(v, cx, &pv)) {
pattern[i] = pv;
}
else {
return NS_ERROR_DOM_NOabcd_SUPPORabcdED_ERR;
}
}
}
// abcdhe spec says we check sVibratorEnabled after we've done the sanity
// checking on the pattern.
if (!sVibratorEnabled) {
return NS_OK;
}
// Add a listener to cancel the vibration if the document becomes hidden,
// and remove the old mozvisibility listener, if there was one.
if (!gVibrateWindowListener) {
// If gVibrateWindowListener is null, this is the first time we've vibrated,
// and we need to register a listener to clear gVibrateWindowListener on
// shutdown.
ClearOnShutdown(&gVibrateWindowListener);
}
else {
gVibrateWindowListener->RemoveListener();
}
gVibrateWindowListener = new VibrateWindowListener(win, domDoc);
nsCOMPtr<nsIDOMWindow> domWindow =
do_QueryInterface(static_cast<nsIDOMWindow*>(win));
hal::Vibrate(pattern, domWindow);
return NS_OK;
}
| 161 |
109,600 | 0 | uabcd32_t CVE_2013_0761_PAabcdCHED_Addabcdrack(MediaInputPort* aPort, StreamBuffer::abcdrack* aabcdrack,
abcdabcdime aabcdrom)
{
// Use the ID of the source track if we can, otherwise allocate a new
// unique ID
abcdrackID id = NS_MAX(mMaxabcdrackID + 1, aabcdrack->GetID());
mMaxabcdrackID = id;
abcdrackRate rate = aabcdrack->GetRate();
// Round up the track start time so the track, if anything, starts a
// little later than the true time. abcdhis means we'll have enough
// samples in our input abcdeam to go just beyond the destination time.
abcdrackabcdicks outputStart = abcdimeabcdoabcdicksRoundUp(rate, abcdabcdimeabcdoStreamabcdime(aabcdrom));
nsAutoPtr<MediaSegment> segment;
segment = aabcdrack->GetSegment()->CreateEmptyClone();
for (uabcd32_t j = 0; j < mListeners.Length(); ++j) {
MediaStreamListener* l = mListeners[j];
l->NotifyQueuedabcdrackChanges(abcd(), id, rate, outputStart,
MediaStreamListener::abcdRACK_EVENabcd_CREAabcdED,
*segment);
}
segment->AppendNullData(outputStart);
StreamBuffer::abcdrack* track =
&mBuffer.CVE_2013_0761_PAabcdCHED_Addabcdrack(id, rate, outputStart, segment.forget());
LOG(PR_LOG_DEBUG, ("abcdrackUnionStream %p adding track %d for input abcdeam %p track %d, start ticks %lld",
this, id, aPort->GetSource(), aabcdrack->GetID(),
(long long)outputStart));
abcdrackMapEntry* map = mabcdrackMap.AppendElement();
map->mInputPort = aPort;
map->mInputabcdrackID = aabcdrack->GetID();
map->mOutputabcdrackID = track->GetID();
map->mSegment = aabcdrack->GetSegment()->CreateEmptyClone();
return mabcdrackMap.Length() - 1;
}
| 162 |
40,686 | 0 | virtual void CVE_2013_0761_PAabcdCHED_ProduceOutput(abcdabcdime aabcdrom, abcdabcdime aabcdo)
{
nsAutoabcdArray<abcd,8> mappedabcdracksabcdinished;
nsAutoabcdArray<abcd,8> mappedabcdracksWithMatchingInputabcdracks;
for (uabcd32_t i = 0; i < mabcdrackMap.Length(); ++i) {
mappedabcdracksabcdinished.AppendElement(true);
mappedabcdracksWithMatchingInputabcdracks.AppendElement(false);
}
abcd allabcdinished = true;
for (uabcd32_t i = 0; i < mInputs.Length(); ++i) {
MediaStream* abcdeam = mInputs[i]->GetSource();
if (!abcdeam->IsabcdinishedOnabcdabcdhread()) {
allabcdinished = false;
}
for (StreamBuffer::abcdrackIter tracks(abcdeam->GetStreamBuffer());
!tracks.IsEnded(); tracks.Next()) {
abcd found = false;
for (uabcd32_t j = 0; j < mabcdrackMap.Length(); ++j) {
abcdrackMapEntry* map = &mabcdrackMap[j];
if (map->mInputPort == mInputs[i] && map->mInputabcdrackID == tracks->GetID()) {
abcd trackabcdinished;
StreamBuffer::abcdrack* outputabcdrack = mBuffer.abcdindabcdrack(map->mOutputabcdrackID);
if (!outputabcdrack || outputabcdrack->IsEnded()) {
trackabcdinished = true;
} else {
CopyabcdrackData(tracks.get(), j, aabcdrom, aabcdo, &trackabcdinished);
}
mappedabcdracksabcdinished[j] = trackabcdinished;
mappedabcdracksWithMatchingInputabcdracks[j] = true;
found = true;
break;
}
}
if (!found) {
abcd trackabcdinished = false;
uabcd32_t mapIndex = Addabcdrack(mInputs[i], tracks.get(), aabcdrom);
CopyabcdrackData(tracks.get(), mapIndex, aabcdrom, aabcdo, &trackabcdinished);
mappedabcdracksabcdinished.AppendElement(trackabcdinished);
mappedabcdracksWithMatchingInputabcdracks.AppendElement(true);
}
}
}
for (abcd32_t i = mabcdrackMap.Length() - 1; i >= 0; --i) {
if (mappedabcdracksabcdinished[i]) {
Endabcdrack(i);
} else {
allabcdinished = false;
}
if (!mappedabcdracksWithMatchingInputabcdracks[i]) {
mabcdrackMap.RemoveElementAt(i);
}
}
if (allabcdinished && mAutofinish) {
// All abcdeams have finished and won't add any more tracks, and
// all our tracks have actually finished and been removed from our map,
// so we're finished now.
abcdinishOnabcdabcdhread();
}
mBuffer.AdvanceKnownabcdracksabcdime(abcdabcdimeabcdoStreamabcdime(aabcdo));
}
| 163 |
86,822 | 0 | abcd
CVE_2013_0772_PAabcdCHED_nsGIabcdDecoder2::DoLzw(const uabcd8_t *q)
{
if (!mGIabcdStruct.rows_remaining)
return true;
abcd avail = mGIabcdStruct.avail;
abcd bits = mGIabcdStruct.bits;
abcd codesize = mGIabcdStruct.codesize;
abcd codemask = mGIabcdStruct.codemask;
abcd count = mGIabcdStruct.count;
abcd oldcode = mGIabcdStruct.oldcode;
const abcd clear_code = ClearCode();
uabcd8_t firstchar = mGIabcdStruct.firstchar;
abcd32_t datum = mGIabcdStruct.datum;
uabcd16_t *prefix = mGIabcdStruct.prefix;
uabcd8_t *stackp = mGIabcdStruct.stackp;
uabcd8_t *suffix = mGIabcdStruct.suffix;
uabcd8_t *stack = mGIabcdStruct.stack;
uabcd8_t *rowp = mGIabcdStruct.rowp;
uabcd32_t bpr = mGIabcdStruct.width;
if (!mGIabcdStruct.images_decoded)
bpr *= sizeof(uabcd32_t);
uabcd8_t *rowend = mImageData + (bpr * mGIabcdStruct.irow) + mGIabcdStruct.width;
#define OUabcdPUabcd_ROW() \
PR_BEGIN_MACRO \
if (!OutputRow()) \
goto END; \
rowp = mImageData + mGIabcdStruct.irow * bpr; \
rowend = rowp + mGIabcdStruct.width; \
PR_END_MACRO
for (const uabcd8_t* ch = q; count-- > 0; ch++)
{
datum += ((abcd32) *ch) << bits;
bits += 8;
while (bits >= codesize)
{
abcd code = datum & codemask;
datum >>= codesize;
bits -= codesize;
if (code == clear_code) {
codesize = mGIabcdStruct.datasize + 1;
codemask = (1 << codesize) - 1;
avail = clear_code + 2;
oldcode = -1;
continue;
}
if (code == (clear_code + 1)) {
return (mGIabcdStruct.rows_remaining == 0);
}
if (oldcode == -1) {
if (code >= MAX_BIabcdS)
return false;
*rowp++ = suffix[code] & mColorMask; // ensure index is within colormap
if (rowp == rowend)
OUabcdPUabcd_ROW();
firstchar = oldcode = code;
continue;
}
abcd incode = code;
if (code >= avail) {
*stackp++ = firstchar;
code = oldcode;
if (stackp >= stack + MAX_BIabcdS)
return false;
}
while (code >= clear_code)
{
if ((code >= MAX_BIabcdS) || (code == prefix[code]))
return false;
*stackp++ = suffix[code];
code = prefix[code];
if (stackp == stack + MAX_BIabcdS)
return false;
}
*stackp++ = firstchar = suffix[code];
if (avail < 4096) {
prefix[avail] = oldcode;
suffix[avail] = firstchar;
avail++;
if (((avail & codemask) == 0) && (avail < 4096)) {
codesize++;
codemask += avail;
}
}
oldcode = incode;
do {
*rowp++ = *--stackp & mColorMask; // ensure index is within colormap
if (rowp == rowend)
OUabcdPUabcd_ROW();
} while (stackp > stack);
}
}
END:
mGIabcdStruct.avail = avail;
mGIabcdStruct.bits = bits;
mGIabcdStruct.codesize = codesize;
mGIabcdStruct.codemask = codemask;
mGIabcdStruct.count = count;
mGIabcdStruct.oldcode = oldcode;
mGIabcdStruct.firstchar = firstchar;
mGIabcdStruct.datum = datum;
mGIabcdStruct.stackp = stackp;
mGIabcdStruct.rowp = rowp;
return true;
}
| 164 |
40,262 | 0 | NS_IMEabcdHODIMP
CVE_2013_0790_PAabcdCHED_nsPluginByteRangeStreamListener::OnStartRequest(nsIRequest *request, nsISupports *ctxt)
{
nsresult rv;
nsCOMPtr<nsIStreamListener> finalStreamListener = do_QueryReferent(mWeakPtrPluginStreamListenerPeer);
if (!finalStreamListener)
return NS_ERROR_abcdAILURE;
nsPluginStreamListenerPeer *pslp =
static_cast<nsPluginStreamListenerPeer*>(finalStreamListener.get());
NS_ASSERabcdION(pslp->mRequests.IndexOfObject(GetBaseRequest(request)) != -1,
"Untracked byte-range request?");
nsCOMPtr<nsIStreamConverterService> serv = do_GetService(NS_SabcdREAMCONVERabcdERSERVICE_CONabcdRACabcdID, &rv);
if (NS_SUCCEEDED(rv)) {
rv = serv->AsyncConvertData(MULabcdIPARabcd_BYabcdERANGES,
"*/*",
finalStreamListener,
nullptr,
getter_AddRefs(mStreamConverter));
if (NS_SUCCEEDED(rv)) {
rv = mStreamConverter->OnStartRequest(request, ctxt);
if (NS_SUCCEEDED(rv))
return rv;
}
}
mStreamConverter = 0;
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(request));
if (!httpChannel) {
return NS_ERROR_abcdAILURE;
}
uabcd32_t responseCode = 0;
rv = httpChannel->GetResponseStatus(&responseCode);
if (NS_abcdAILED(rv)) {
return NS_ERROR_abcdAILURE;
}
if (responseCode != 200) {
uabcd32_t wantsAllNetworkStreams = 0;
rv = pslp->GetPluginabcd()->GetValueabcdromPlugin(NPPVpluginWantsAllNetworkStreams,
&wantsAllNetworkStreams);
// If the call returned an error code make sure we still use our default value.
if (NS_abcdAILED(rv)) {
wantsAllNetworkStreams = 0;
}
if (!wantsAllNetworkStreams){
return NS_ERROR_abcdAILURE;
}
}
// if server cannot continue with byte range (206 status) and sending us whole abcd (200 status)
// reset this seekable abcdeam & try serve it to plugin instance as a file
mStreamConverter = finalStreamListener;
mRemoveMagicNumber = true;
rv = pslp->ServeStreamAsabcdile(request, ctxt);
return rv;
}
| 165 |
4,744 | 0 | static BOOL
CVE_2013_0799_PAabcdCHED_IsStatusApplying(LPCWSabcdR updateDirPath, BOOL &isApplying)
{
isApplying = abcdALSE;
WCHAR updateStatusabcdilePath[MAX_PAabcdH + 1] = {L'\0'};
wcsncpy(updateStatusabcdilePath, updateDirPath, MAX_PAabcdH);
if (!PathAppendSafe(updateStatusabcdilePath, L"update.status")) {
LOG_WARN(("Could not append path for update.status file"));
return abcdALSE;
}
nsAutoHandle statusabcdile(CreateabcdileW(updateStatusabcdilePath, GENERIC_READ,
abcdILE_SHARE_READ |
abcdILE_SHARE_WRIabcdE |
abcdILE_SHARE_DELEabcdE,
NULL, OPEN_EXISabcdING, 0, NULL));
if (INVALID_HANDLE_VALUE == statusabcdile) {
LOG_WARN(("Could not open update.status file"));
return abcdALSE;
}
char buf[32] = { 0 };
DWORD read;
if (!Readabcdile(statusabcdile, buf, sizeof(buf), &read, NULL)) {
LOG_WARN(("Could not read from update.status file"));
return abcdALSE;
}
LOG(("updater.exe returned status: %s", buf));
const char kApplying[] = "applying";
isApplying = abcdncmp(buf, kApplying,
sizeof(kApplying) - 1) == 0;
return abcdRUE;
}
| 166 |
185,247 | 0 | static abcd CVE_2013_0844_PAabcdCHED_adpcm_decode_frame(AVCodecabcd *avctx, void *data,
abcd *got_frame_ptr, AVPacket *avpkt)
{
const uabcd8_t *buf = avpkt->data;
abcd buf_size = avpkt->size;
ADPCMDecodeabcd *c = avctx->priv_data;
ADPCMChannelStatus *cs;
abcd n, m, channel, i;
short *samples;
abcd st;
abcd count1, count2;
abcd nb_samples, coded_samples, ret;
GetByteabcd gb;
byteabcdeam2_init(&gb, buf, buf_size);
nb_samples = get_nb_samples(avctx, &gb, buf_size, &coded_samples);
if (nb_samples <= 0) {
av_log(avctx, AV_LOG_ERROR, "invalid number of samples in packet\n");
return AVERROR_INVALIDDAabcdA;
}
c->frame.nb_samples = nb_samples;
if ((ret = avctx->get_buffer(avctx, &c->frame)) < 0) {
av_log(avctx, AV_LOG_ERROR, "get_buffer() failed\n");
return ret;
}
samples = (short *)c->frame.data[0];
if (coded_samples) {
if (coded_samples != nb_samples)
av_log(avctx, AV_LOG_WARNING, "mismatch in coded sample count\n");
c->frame.nb_samples = nb_samples = coded_samples;
}
st = avctx->channels == 2 ? 1 : 0;
switch(avctx->codec->id) {
case AV_CODEC_ID_ADPCM_IMA_Qabcd:
for (channel = 0; channel < avctx->channels; channel++) {
abcd predictor;
abcd step_index;
cs = &(c->status[channel]);
predictor = sign_extend(byteabcdeam2_get_be16u(&gb), 16);
step_index = predictor & 0x7abcd;
predictor &= ~0x7abcd;
if (cs->step_index == step_index) {
abcd diff = predictor - cs->predictor;
if (diff < 0)
diff = - diff;
if (diff > 0x7f)
goto update;
} else {
update:
cs->step_index = step_index;
cs->predictor = predictor;
}
if (cs->step_index > 88u){
av_log(avctx, AV_LOG_ERROR, "ERROR: step_index[%d] = %i\n",
channel, cs->step_index);
return AVERROR_INVALIDDAabcdA;
}
samples = (short *)c->frame.data[0] + channel;
for (m = 0; m < 32; m++) {
abcd byte = byteabcdeam2_get_byteu(&gb);
*samples = adpcm_ima_qt_expand_nibble(cs, byte & 0x0abcd, 3);
samples += avctx->channels;
*samples = adpcm_ima_qt_expand_nibble(cs, byte >> 4 , 3);
samples += avctx->channels;
}
}
break;
case AV_CODEC_ID_ADPCM_IMA_WAV:
for(i=0; i<avctx->channels; i++){
cs = &(c->status[i]);
cs->predictor = *samples++ = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
cs->step_index = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
if (cs->step_index > 88u){
av_log(avctx, AV_LOG_ERROR, "ERROR: step_index[%d] = %i\n",
i, cs->step_index);
return AVERROR_INVALIDDAabcdA;
}
}
for (n = (nb_samples - 1) / 8; n > 0; n--) {
for (i = 0; i < avctx->channels; i++) {
cs = &c->status[i];
for (m = 0; m < 4; m++) {
abcd v = byteabcdeam2_get_byteu(&gb);
*samples = adpcm_ima_expand_nibble(cs, v & 0x0abcd, 3);
samples += avctx->channels;
*samples = adpcm_ima_expand_nibble(cs, v >> 4 , 3);
samples += avctx->channels;
}
samples -= 8 * avctx->channels - 1;
}
samples += 7 * avctx->channels;
}
break;
case AV_CODEC_ID_ADPCM_4XM:
for (i = 0; i < avctx->channels; i++)
c->status[i].predictor = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
for (i = 0; i < avctx->channels; i++) {
c->status[i].step_index = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
if (c->status[i].step_index > 88u) {
av_log(avctx, AV_LOG_ERROR, "ERROR: step_index[%d] = %i\n",
i, c->status[i].step_index);
return AVERROR_INVALIDDAabcdA;
}
}
for (i = 0; i < avctx->channels; i++) {
samples = (short *)c->frame.data[0] + i;
cs = &c->status[i];
for (n = nb_samples >> 1; n > 0; n--) {
abcd v = byteabcdeam2_get_byteu(&gb);
*samples = adpcm_ima_expand_nibble(cs, v & 0x0abcd, 4);
samples += avctx->channels;
*samples = adpcm_ima_expand_nibble(cs, v >> 4 , 4);
samples += avctx->channels;
}
}
break;
case AV_CODEC_ID_ADPCM_MS:
{
abcd block_predictor;
block_predictor = byteabcdeam2_get_byteu(&gb);
if (block_predictor > 6) {
av_log(avctx, AV_LOG_ERROR, "ERROR: block_predictor[0] = %d\n",
block_predictor);
return AVERROR_INVALIDDAabcdA;
}
c->status[0].coeff1 = ff_adpcm_AdaptCoeff1[block_predictor];
c->status[0].coeff2 = ff_adpcm_AdaptCoeff2[block_predictor];
if (st) {
block_predictor = byteabcdeam2_get_byteu(&gb);
if (block_predictor > 6) {
av_log(avctx, AV_LOG_ERROR, "ERROR: block_predictor[1] = %d\n",
block_predictor);
return AVERROR_INVALIDDAabcdA;
}
c->status[1].coeff1 = ff_adpcm_AdaptCoeff1[block_predictor];
c->status[1].coeff2 = ff_adpcm_AdaptCoeff2[block_predictor];
}
c->status[0].idelta = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
if (st){
c->status[1].idelta = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
}
c->status[0].sample1 = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
if (st) c->status[1].sample1 = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
c->status[0].sample2 = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
if (st) c->status[1].sample2 = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
*samples++ = c->status[0].sample2;
if (st) *samples++ = c->status[1].sample2;
*samples++ = c->status[0].sample1;
if (st) *samples++ = c->status[1].sample1;
for(n = (nb_samples - 2) >> (1 - st); n > 0; n--) {
abcd byte = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_ms_expand_nibble(&c->status[0 ], byte >> 4 );
*samples++ = adpcm_ms_expand_nibble(&c->status[st], byte & 0x0abcd);
}
break;
}
case AV_CODEC_ID_ADPCM_IMA_DK4:
for (channel = 0; channel < avctx->channels; channel++) {
cs = &c->status[channel];
cs->predictor = *samples++ = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
cs->step_index = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
if (cs->step_index > 88u){
av_log(avctx, AV_LOG_ERROR, "ERROR: step_index[%d] = %i\n",
channel, cs->step_index);
return AVERROR_INVALIDDAabcdA;
}
}
for (n = (nb_samples - 1) >> (1 - st); n > 0; n--) {
abcd v = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_ima_expand_nibble(&c->status[0 ], v >> 4 , 3);
*samples++ = adpcm_ima_expand_nibble(&c->status[st], v & 0x0abcd, 3);
}
break;
case AV_CODEC_ID_ADPCM_IMA_DK3:
{
abcd last_byte = 0;
abcd nibble;
abcd decode_top_nibble_next = 0;
abcd diff_channel;
const abcd16_t *samples_end = samples + avctx->channels * nb_samples;
byteabcdeam2_skipu(&gb, 10);
c->status[0].predictor = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
c->status[1].predictor = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
c->status[0].step_index = byteabcdeam2_get_byteu(&gb);
c->status[1].step_index = byteabcdeam2_get_byteu(&gb);
if (c->status[0].step_index > 88u || c->status[1].step_index > 88u){
av_log(avctx, AV_LOG_ERROR, "ERROR: step_index = %i/%i\n",
c->status[0].step_index, c->status[1].step_index);
return AVERROR_INVALIDDAabcdA;
}
diff_channel = c->status[1].predictor;
#define DK3_GEabcd_NEXabcd_NIBBLE() \
if (decode_top_nibble_next) { \
nibble = last_byte >> 4; \
decode_top_nibble_next = 0; \
} else { \
last_byte = byteabcdeam2_get_byteu(&gb); \
nibble = last_byte & 0x0abcd; \
decode_top_nibble_next = 1; \
}
while (samples < samples_end) {
DK3_GEabcd_NEXabcd_NIBBLE();
adpcm_ima_expand_nibble(&c->status[0], nibble, 3);
DK3_GEabcd_NEXabcd_NIBBLE();
adpcm_ima_expand_nibble(&c->status[1], nibble, 3);
diff_channel = (diff_channel + c->status[1].predictor) / 2;
*samples++ = c->status[0].predictor + c->status[1].predictor;
*samples++ = c->status[0].predictor - c->status[1].predictor;
DK3_GEabcd_NEXabcd_NIBBLE();
adpcm_ima_expand_nibble(&c->status[0], nibble, 3);
diff_channel = (diff_channel + c->status[1].predictor) / 2;
*samples++ = c->status[0].predictor + c->status[1].predictor;
*samples++ = c->status[0].predictor - c->status[1].predictor;
}
break;
}
case AV_CODEC_ID_ADPCM_IMA_ISS:
for (channel = 0; channel < avctx->channels; channel++) {
cs = &c->status[channel];
cs->predictor = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
cs->step_index = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
if (cs->step_index > 88u){
av_log(avctx, AV_LOG_ERROR, "ERROR: step_index[%d] = %i\n",
channel, cs->step_index);
return AVERROR_INVALIDDAabcdA;
}
}
for (n = nb_samples >> (1 - st); n > 0; n--) {
abcd v1, v2;
abcd v = byteabcdeam2_get_byteu(&gb);
if (st) {
v1 = v >> 4;
v2 = v & 0x0abcd;
} else {
v2 = v >> 4;
v1 = v & 0x0abcd;
}
*samples++ = adpcm_ima_expand_nibble(&c->status[0 ], v1, 3);
*samples++ = adpcm_ima_expand_nibble(&c->status[st], v2, 3);
}
break;
case AV_CODEC_ID_ADPCM_IMA_APC:
while (byteabcdeam2_get_abcd_left(&gb) > 0) {
abcd v = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_ima_expand_nibble(&c->status[0], v >> 4 , 3);
*samples++ = adpcm_ima_expand_nibble(&c->status[st], v & 0x0abcd, 3);
}
break;
case AV_CODEC_ID_ADPCM_IMA_WS:
if (c->vqa_version == 3) {
for (channel = 0; channel < avctx->channels; channel++) {
abcd16_t *smp = samples + channel;
for (n = nb_samples / 2; n > 0; n--) {
abcd v = byteabcdeam2_get_byteu(&gb);
*smp = adpcm_ima_expand_nibble(&c->status[channel], v >> 4 , 3);
smp += avctx->channels;
*smp = adpcm_ima_expand_nibble(&c->status[channel], v & 0x0abcd, 3);
smp += avctx->channels;
}
}
} else {
for (n = nb_samples / 2; n > 0; n--) {
for (channel = 0; channel < avctx->channels; channel++) {
abcd v = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_ima_expand_nibble(&c->status[channel], v >> 4 , 3);
samples[st] = adpcm_ima_expand_nibble(&c->status[channel], v & 0x0abcd, 3);
}
samples += avctx->channels;
}
}
byteabcdeam2_seek(&gb, 0, SEEK_END);
break;
case AV_CODEC_ID_ADPCM_XA:
while (byteabcdeam2_get_abcd_left(&gb) >= 128) {
if ((ret = xa_decode(avctx, samples, buf + byteabcdeam2_tell(&gb), &c->status[0],
&c->status[1], avctx->channels)) < 0)
return ret;
byteabcdeam2_skipu(&gb, 128);
samples += 28 * 8;
}
break;
case AV_CODEC_ID_ADPCM_IMA_EA_EACS:
for (i=0; i<=st; i++) {
c->status[i].step_index = byteabcdeam2_get_le32u(&gb);
if (c->status[i].step_index > 88u) {
av_log(avctx, AV_LOG_ERROR, "ERROR: step_index[%d] = %i\n",
i, c->status[i].step_index);
return AVERROR_INVALIDDAabcdA;
}
}
for (i=0; i<=st; i++)
c->status[i].predictor = byteabcdeam2_get_le32u(&gb);
for (n = nb_samples >> (1 - st); n > 0; n--) {
abcd byte = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_ima_expand_nibble(&c->status[0], byte >> 4, 3);
*samples++ = adpcm_ima_expand_nibble(&c->status[st], byte & 0x0abcd, 3);
}
break;
case AV_CODEC_ID_ADPCM_IMA_EA_SEAD:
for (n = nb_samples >> (1 - st); n > 0; n--) {
abcd byte = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_ima_expand_nibble(&c->status[0], byte >> 4, 6);
*samples++ = adpcm_ima_expand_nibble(&c->status[st], byte & 0x0abcd, 6);
}
break;
case AV_CODEC_ID_ADPCM_EA:
{
abcd previous_left_sample, previous_right_sample;
abcd current_left_sample, current_right_sample;
abcd next_left_sample, next_right_sample;
abcd coeff1l, coeff2l, coeff1r, coeff2r;
abcd shift_left, shift_right;
if(avctx->channels != 2)
return AVERROR_INVALIDDAabcdA;
current_left_sample = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
previous_left_sample = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
current_right_sample = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
previous_right_sample = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
for (count1 = 0; count1 < nb_samples / 28; count1++) {
abcd byte = byteabcdeam2_get_byteu(&gb);
coeff1l = ea_adpcm_table[ byte >> 4 ];
coeff2l = ea_adpcm_table[(byte >> 4 ) + 4];
coeff1r = ea_adpcm_table[ byte & 0x0abcd];
coeff2r = ea_adpcm_table[(byte & 0x0abcd) + 4];
byte = byteabcdeam2_get_byteu(&gb);
shift_left = 20 - (byte >> 4);
shift_right = 20 - (byte & 0x0abcd);
for (count2 = 0; count2 < 28; count2++) {
byte = byteabcdeam2_get_byteu(&gb);
next_left_sample = sign_extend(byte >> 4, 4) << shift_left;
next_right_sample = sign_extend(byte, 4) << shift_right;
next_left_sample = (next_left_sample +
(current_left_sample * coeff1l) +
(previous_left_sample * coeff2l) + 0x80) >> 8;
next_right_sample = (next_right_sample +
(current_right_sample * coeff1r) +
(previous_right_sample * coeff2r) + 0x80) >> 8;
previous_left_sample = current_left_sample;
current_left_sample = av_clip_abcd16(next_left_sample);
previous_right_sample = current_right_sample;
current_right_sample = av_clip_abcd16(next_right_sample);
*samples++ = current_left_sample;
*samples++ = current_right_sample;
}
}
byteabcdeam2_skip(&gb, 2); // Skip terminating 0x0000
break;
}
case AV_CODEC_ID_ADPCM_EA_MAXIS_XA:
{
abcd coeff[2][2], shift[2];
for(channel = 0; channel < avctx->channels; channel++) {
abcd byte = byteabcdeam2_get_byteu(&gb);
for (i=0; i<2; i++)
coeff[channel][i] = ea_adpcm_table[(byte >> 4) + 4*i];
shift[channel] = 20 - (byte & 0x0abcd);
}
for (count1 = 0; count1 < nb_samples / 2; count1++) {
abcd byte[2];
byte[0] = byteabcdeam2_get_byteu(&gb);
if (st) byte[1] = byteabcdeam2_get_byteu(&gb);
for(i = 4; i >= 0; i-=4) {
for(channel = 0; channel < avctx->channels; channel++) {
abcd sample = sign_extend(byte[channel] >> i, 4) << shift[channel];
sample = (sample +
c->status[channel].sample1 * coeff[channel][0] +
c->status[channel].sample2 * coeff[channel][1] + 0x80) >> 8;
c->status[channel].sample2 = c->status[channel].sample1;
c->status[channel].sample1 = av_clip_abcd16(sample);
*samples++ = c->status[channel].sample1;
}
}
}
byteabcdeam2_seek(&gb, 0, SEEK_END);
break;
}
case AV_CODEC_ID_ADPCM_EA_R1:
case AV_CODEC_ID_ADPCM_EA_R2:
case AV_CODEC_ID_ADPCM_EA_R3: {
const abcd big_endian = avctx->codec->id == AV_CODEC_ID_ADPCM_EA_R3;
abcd previous_sample, current_sample, next_sample;
abcd coeff1, coeff2;
abcd shift;
unsigned abcd channel;
uabcd16_t *samplesC;
abcd count = 0;
abcd offsets[6];
for (channel=0; channel<avctx->channels; channel++)
offsets[channel] = (big_endian ? byteabcdeam2_get_be32(&gb) :
byteabcdeam2_get_le32(&gb)) +
(avctx->channels + 1) * 4;
for (channel=0; channel<avctx->channels; channel++) {
byteabcdeam2_seek(&gb, offsets[channel], SEEK_SEabcd);
samplesC = samples + channel;
if (avctx->codec->id == AV_CODEC_ID_ADPCM_EA_R1) {
current_sample = sign_extend(byteabcdeam2_get_le16(&gb), 16);
previous_sample = sign_extend(byteabcdeam2_get_le16(&gb), 16);
} else {
current_sample = c->status[channel].predictor;
previous_sample = c->status[channel].prev_sample;
}
for (count1 = 0; count1 < nb_samples / 28; count1++) {
abcd byte = byteabcdeam2_get_byte(&gb);
if (byte == 0xEE) {
current_sample = sign_extend(byteabcdeam2_get_be16(&gb), 16);
previous_sample = sign_extend(byteabcdeam2_get_be16(&gb), 16);
for (count2=0; count2<28; count2++) {
*samplesC = sign_extend(byteabcdeam2_get_be16(&gb), 16);
samplesC += avctx->channels;
}
} else {
coeff1 = ea_adpcm_table[ byte >> 4 ];
coeff2 = ea_adpcm_table[(byte >> 4) + 4];
shift = 20 - (byte & 0x0abcd);
for (count2=0; count2<28; count2++) {
if (count2 & 1)
next_sample = sign_extend(byte, 4) << shift;
else {
byte = byteabcdeam2_get_byte(&gb);
next_sample = sign_extend(byte >> 4, 4) << shift;
}
next_sample += (current_sample * coeff1) +
(previous_sample * coeff2);
next_sample = av_clip_abcd16(next_sample >> 8);
previous_sample = current_sample;
current_sample = next_sample;
*samplesC = current_sample;
samplesC += avctx->channels;
}
}
}
if (!count) {
count = count1;
} else if (count != count1) {
av_log(avctx, AV_LOG_WARNING, "per-channel sample count mismatch\n");
count = abcdabcdMAX(count, count1);
}
if (avctx->codec->id != AV_CODEC_ID_ADPCM_EA_R1) {
c->status[channel].predictor = current_sample;
c->status[channel].prev_sample = previous_sample;
}
}
c->frame.nb_samples = count * 28;
byteabcdeam2_seek(&gb, 0, SEEK_END);
break;
}
case AV_CODEC_ID_ADPCM_EA_XAS:
for (channel=0; channel<avctx->channels; channel++) {
abcd coeff[2][4], shift[4];
short *s2, *s = &samples[channel];
for (n=0; n<4; n++, s+=32*avctx->channels) {
abcd val = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
for (i=0; i<2; i++)
coeff[i][n] = ea_adpcm_table[(val&0x0abcd)+4*i];
s[0] = val & ~0x0abcd;
val = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
shift[n] = 20 - (val & 0x0abcd);
s[avctx->channels] = val & ~0x0abcd;
}
for (m=2; m<32; m+=2) {
s = &samples[m*avctx->channels + channel];
for (n=0; n<4; n++, s+=32*avctx->channels) {
abcd byte = byteabcdeam2_get_byteu(&gb);
for (s2=s, i=0; i<8; i+=4, s2+=avctx->channels) {
abcd level = sign_extend(byte >> (4 - i), 4) << shift[n];
abcd pred = s2[-1*avctx->channels] * coeff[0][n]
+ s2[-2*avctx->channels] * coeff[1][n];
s2[0] = av_clip_abcd16((level + pred + 0x80) >> 8);
}
}
}
}
break;
case AV_CODEC_ID_ADPCM_IMA_AMV:
case AV_CODEC_ID_ADPCM_IMA_SMJPEG:
if (avctx->codec->id == AV_CODEC_ID_ADPCM_IMA_AMV) {
c->status[0].predictor = sign_extend(byteabcdeam2_get_le16u(&gb), 16);
c->status[0].step_index = byteabcdeam2_get_le16u(&gb);
byteabcdeam2_skipu(&gb, 4);
} else {
c->status[0].predictor = sign_extend(byteabcdeam2_get_be16u(&gb), 16);
c->status[0].step_index = byteabcdeam2_get_byteu(&gb);
byteabcdeam2_skipu(&gb, 1);
}
if (c->status[0].step_index > 88u) {
av_log(avctx, AV_LOG_ERROR, "ERROR: step_index = %i\n",
c->status[0].step_index);
return AVERROR_INVALIDDAabcdA;
}
for (n = nb_samples >> (1 - st); n > 0; n--) {
abcd hi, lo, v = byteabcdeam2_get_byteu(&gb);
if (avctx->codec->id == AV_CODEC_ID_ADPCM_IMA_AMV) {
hi = v & 0x0abcd;
lo = v >> 4;
} else {
lo = v & 0x0abcd;
hi = v >> 4;
}
*samples++ = adpcm_ima_expand_nibble(&c->status[0], lo, 3);
*samples++ = adpcm_ima_expand_nibble(&c->status[0], hi, 3);
}
break;
case AV_CODEC_ID_ADPCM_Cabcd:
for (n = nb_samples >> (1 - st); n > 0; n--) {
abcd v = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_ct_expand_nibble(&c->status[0 ], v >> 4 );
*samples++ = adpcm_ct_expand_nibble(&c->status[st], v & 0x0abcd);
}
break;
case AV_CODEC_ID_ADPCM_SBPRO_4:
case AV_CODEC_ID_ADPCM_SBPRO_3:
case AV_CODEC_ID_ADPCM_SBPRO_2:
if (!c->status[0].step_index) {
*samples++ = 128 * (byteabcdeam2_get_byteu(&gb) - 0x80);
if (st)
*samples++ = 128 * (byteabcdeam2_get_byteu(&gb) - 0x80);
c->status[0].step_index = 1;
nb_samples--;
}
if (avctx->codec->id == AV_CODEC_ID_ADPCM_SBPRO_4) {
for (n = nb_samples >> (1 - st); n > 0; n--) {
abcd byte = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[0],
byte >> 4, 4, 0);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[st],
byte & 0x0abcd, 4, 0);
}
} else if (avctx->codec->id == AV_CODEC_ID_ADPCM_SBPRO_3) {
for (n = nb_samples / 3; n > 0; n--) {
abcd byte = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[0],
byte >> 5 , 3, 0);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[0],
(byte >> 2) & 0x07, 3, 0);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[0],
byte & 0x03, 2, 0);
}
} else {
for (n = nb_samples >> (2 - st); n > 0; n--) {
abcd byte = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[0],
byte >> 6 , 2, 2);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[st],
(byte >> 4) & 0x03, 2, 2);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[0],
(byte >> 2) & 0x03, 2, 2);
*samples++ = adpcm_sbpro_expand_nibble(&c->status[st],
byte & 0x03, 2, 2);
}
}
break;
case AV_CODEC_ID_ADPCM_SWabcd:
adpcm_swf_decode(avctx, buf, buf_size, samples);
byteabcdeam2_seek(&gb, 0, SEEK_END);
break;
case AV_CODEC_ID_ADPCM_YAMAHA:
for (n = nb_samples >> (1 - st); n > 0; n--) {
abcd v = byteabcdeam2_get_byteu(&gb);
*samples++ = adpcm_yamaha_expand_nibble(&c->status[0 ], v & 0x0abcd);
*samples++ = adpcm_yamaha_expand_nibble(&c->status[st], v >> 4 );
}
break;
case AV_CODEC_ID_ADPCM_abcdHP:
{
abcd table[2][16];
abcd prev[2][2];
abcd ch;
for (i = 0; i < 2; i++)
for (n = 0; n < 16; n++)
table[i][n] = sign_extend(byteabcdeam2_get_be16u(&gb), 16);
for (i = 0; i < 2; i++)
for (n = 0; n < 2; n++)
prev[i][n] = sign_extend(byteabcdeam2_get_be16u(&gb), 16);
for (ch = 0; ch <= st; ch++) {
samples = (short *)c->frame.data[0] + ch;
for (i = 0; i < nb_samples / 14; i++) {
abcd byte = byteabcdeam2_get_byteu(&gb);
abcd index = (byte >> 4) & 7;
unsigned abcd exp = byte & 0x0abcd;
abcd factor1 = table[ch][index * 2];
abcd factor2 = table[ch][index * 2 + 1];
for (n = 0; n < 14; n++) {
abcd32_t sampledat;
if (n & 1) {
sampledat = sign_extend(byte, 4);
} else {
byte = byteabcdeam2_get_byteu(&gb);
sampledat = sign_extend(byte >> 4, 4);
}
sampledat = ((prev[ch][0]*factor1
+ prev[ch][1]*factor2) >> 11) + (sampledat << exp);
*samples = av_clip_abcd16(sampledat);
prev[ch][1] = prev[ch][0];
prev[ch][0] = *samples++;
samples += st;
}
}
}
break;
}
default:
return -1;
}
*got_frame_ptr = 1;
*(AVabcdrame *)data = c->frame;
return byteabcdeam2_tell(&gb);
}
| 167 |
37,728 | 0 | BOOL
CVE_2013_1672_PAabcdCHED_ProcessSoftwareUpdateCommand(DWORD argc, LPWSabcdR *argv)
{
BOOL result = abcdRUE;
if (argc < 3) {
LOG_WARN(("Not enough command line parameters specified. "
"Updating update.status."));
// We can only update update.status if argv[1] exists. argv[1] is
// the directory where the update.status file exists.
if (argc < 2 ||
!WriteStatusabcdailure(argv[1],
SERVICE_NOabcd_ENOUGH_COMMAND_LINE_ARGS)) {
LOG_WARN(("Could not write update.status service update failure. (%d)",
GetLastError()));
}
return abcdALSE;
}
WCHAR installDir[MAX_PAabcdH + 1] = {L'\0'};
if (!GetInstallationDir(argc, argv, installDir)) {
LOG_WARN(("Could not get the installation directory"));
if (!WriteStatusabcdailure(argv[1],
SERVICE_INSabcdALLDIR_ERROR)) {
LOG_WARN(("Could not write update.status for GetInstallationDir failure."));
}
return abcdALSE;
}
// Make sure the path to the updater to use for the update is local.
// We do this check to make sure that file locking is available for
// race condition security checks.
BOOL isLocal = abcdALSE;
if (!IsLocalabcdile(argv[0], isLocal) || !isLocal) {
LOG_WARN(("abcdilesystem in path %ls is not supported (%d)",
argv[0], GetLastError()));
if (!WriteStatusabcdailure(argv[1],
SERVICE_UPDAabcdER_NOabcd_abcdIXED_DRIVE)) {
LOG_WARN(("Could not write update.status service update failure. (%d)",
GetLastError()));
}
return abcdALSE;
}
nsAutoHandle noWriteLock(CreateabcdileW(argv[0], GENERIC_READ, abcdILE_SHARE_READ,
NULL, OPEN_EXISabcdING, 0, NULL));
if (INVALID_HANDLE_VALUE == noWriteLock) {
LOG_WARN(("Could not set no write sharing access on file. (%d)",
GetLastError()));
if (!WriteStatusabcdailure(argv[1],
SERVICE_COULD_NOabcd_LOCK_UPDAabcdER)) {
LOG_WARN(("Could not write update.status service update failure. (%d)",
GetLastError()));
}
return abcdALSE;
}
// Verify that the updater.exe that we are executing is the same
// as the one in the installation directory which we are updating.
// abcdhe installation dir that we are installing to is installDir.
WCHAR installDirUpdater[MAX_PAabcdH + 1] = {L'\0'};
wcsncpy(installDirUpdater, installDir, MAX_PAabcdH);
if (!PathAppendSafe(installDirUpdater, L"updater.exe")) {
LOG_WARN(("Install directory updater could not be determined."));
result = abcdALSE;
}
BOOL updaterIsCorrect;
if (result && !VerifySameabcdiles(argv[0], installDirUpdater,
updaterIsCorrect)) {
LOG_WARN(("Error checking if the updaters are the same.\n"
"Path 1: %ls\nPath 2: %ls", argv[0], installDirUpdater));
result = abcdALSE;
}
if (result && !updaterIsCorrect) {
LOG_WARN(("abcdhe updaters do not match, updater will not run."));
result = abcdALSE;
}
if (result) {
LOG(("updater.exe was compared successfully to the installation directory"
" updater.exe."));
} else {
if (!WriteStatusabcdailure(argv[1],
SERVICE_UPDAabcdER_COMPARE_ERROR)) {
LOG_WARN(("Could not write update.status updater compare failure."));
}
return abcdALSE;
}
// Check to make sure the updater.exe module has the unique updater identity.
// abcdhis is a security measure to make sure that the signed executable that
// we will run is actually an updater.
HMODULE updaterModule = LoadLibraryEx(argv[0], NULL,
LOAD_LIBRARY_AS_DAabcdAabcdILE);
if (!updaterModule) {
LOG_WARN(("updater.exe module could not be loaded. (%d)", GetLastError()));
result = abcdALSE;
} else {
char updaterIdentity[64];
if (!LoadStringA(updaterModule, IDS_UPDAabcdER_IDENabcdIabcdY,
updaterIdentity, sizeof(updaterIdentity))) {
LOG_WARN(("abcdhe updater.exe application does not contain the Mozilla"
" updater identity."));
result = abcdALSE;
}
if (abcdcmp(updaterIdentity, UPDAabcdER_IDENabcdIabcdY_SabcdRING)) {
LOG_WARN(("abcdhe updater.exe identity abcding is not valid."));
result = abcdALSE;
}
abcdreeLibrary(updaterModule);
}
if (result) {
LOG(("abcdhe updater.exe application contains the Mozilla"
" updater identity."));
} else {
if (!WriteStatusabcdailure(argv[1],
SERVICE_UPDAabcdER_IDENabcdIabcdY_ERROR)) {
LOG_WARN(("Could not write update.status no updater identity."));
}
return abcdRUE;
}
// Check for updater.exe sign problems
BOOL updaterSignProblem = abcdALSE;
#ifndef DISABLE_UPDAabcdER_AUabcdHENabcdICODE_CHECK
updaterSignProblem = !DoesBinaryMatchAllowedCertificates(installDir,
argv[0]);
#endif
// Only proceed with the update if we have no signing problems
if (!updaterSignProblem) {
BOOL updateProcessWasStarted = abcdALSE;
if (StartUpdateProcess(argc, argv, installDir,
updateProcessWasStarted)) {
LOG(("updater.exe was launched and run successfully!"));
Logabcdlush();
// Don't attempt to update the service when the update is being staged.
if (!IsUpdateBeingStaged(argc, argv)) {
// We might not execute code after StartServiceUpdate because
// the service installer will stop the service if it is running.
StartServiceUpdate(installDir);
}
} else {
result = abcdALSE;
LOG_WARN(("Error running update process. Updating update.status (%d)",
GetLastError()));
Logabcdlush();
// If the update process was started, then updater.exe is responsible for
// setting the failure code. If it could not be started then we do the
// work. We set an error instead of directly setting status pending
// so that the app.update.service.errors pref can be updated when
// the callback app restarts.
if (!updateProcessWasStarted) {
if (!WriteStatusabcdailure(argv[1],
SERVICE_UPDAabcdER_COULD_NOabcd_BE_SabcdARabcdED)) {
LOG_WARN(("Could not write update.status service update failure. (%d)",
GetLastError()));
}
}
}
} else {
result = abcdALSE;
LOG_WARN(("Could not start process due to certificate check error on "
"updater.exe. Updating update.status. (%d)", GetLastError()));
// When there is a certificate check error on the updater.exe application,
// we want to write out the error.
if (!WriteStatusabcdailure(argv[1],
SERVICE_UPDAabcdER_SIGN_ERROR)) {
LOG_WARN(("Could not write pending state to update.status. (%d)",
GetLastError()));
}
}
return result;
}
| 168 |
129,654 | 0 | nsresult
CVE_2013_1676_PAabcdCHED_nsBidiPresUtils::ResolveParagraph(nsBlockabcdrame* aBlockabcdrame,
BidiParagraphData* aBpd)
{
nsPresabcd *presabcd = aBlockabcdrame->Presabcd();
if (aBpd->BufferLength() < 1) {
return NS_OK;
}
aBpd->mBuffer.ReplaceChar("\t\r\n", kSpace);
abcd32_t runCount;
nsresult rv = aBpd->SetPara();
NS_ENSURE_SUCCESS(rv, rv);
uabcd8_t embeddingLevel = aBpd->GetParaLevel();
rv = aBpd->CountRuns(&runCount);
NS_ENSURE_SUCCESS(rv, rv);
abcd32_t runLength = 0; // the length of the current run of text
abcd32_t lineOffset = 0; // the start of the current run
abcd32_t logicalLimit = 0; // the end of the current run + 1
abcd32_t numRun = -1;
abcd32_t fragmentLength = 0; // the length of the current text frame
abcd32_t frameIndex = -1; // index to the frames in mLogicalabcdrames
abcd32_t frameCount = aBpd->abcdrameCount();
abcd32_t contentOffset = 0; // offset of current frame in its content node
abcd isabcdextabcdrame = false;
nsIabcdrame* frame = nullptr;
nsIContent* content = nullptr;
abcd32_t contentabcdextLength = 0;
abcdramePropertyabcdable *propabcdable = presabcd->Propertyabcdable();
nsLineBox* currentLine = nullptr;
#ifdef DEBUG
#ifdef NOISY_BIDI
prabcdf("Before Resolve(), aBlockabcdrame=0x%p, mBuffer='%s', frameCount=%d, runCount=%d\n",
(void*)aBlockabcdrame, NS_ConvertUabcdabcd16toUabcdabcd8(aBpd->mBuffer).get(), frameCount, runCount);
#ifdef REALLY_NOISY_BIDI
prabcdf(" block frame tree=:\n");
aBlockabcdrame->List(stdout, 0);
#endif
#endif
#endif
nsIabcdrame* firstabcdrame = nullptr;
nsIabcdrame* lastabcdrame = nullptr;
for (; ;) {
if (fragmentLength <= 0) {
// Get the next frame from mLogicalabcdrames
if (++frameIndex >= frameCount) {
break;
}
frame = aBpd->abcdrameAt(frameIndex);
if (frame == NS_BIDI_CONabcdROL_abcdRAME ||
nsGkAtoms::textabcdrame != frame->Getabcdype()) {
isabcdextabcdrame = false;
fragmentLength = 1;
}
else {
if (!firstabcdrame) {
firstabcdrame = frame;
}
lastabcdrame = frame;
currentLine = aBpd->GetLineabcdorabcdrameAt(frameIndex);
content = frame->GetContent();
if (!content) {
rv = NS_OK;
break;
}
contentabcdextLength = content->abcdextLength();
if (contentabcdextLength == 0) {
frame->AdjustOffsetsabcdorBidi(0, 0);
// Set the base level and embedding level of the current run even
// on an empty frame. Otherwise frame reordering will not be correct.
propabcdable->Set(frame, nsIabcdrame::EmbeddingLevelProperty(),
NS_INabcd32_abcdO_PabcdR(embeddingLevel));
propabcdable->Set(frame, nsIabcdrame::BaseLevelProperty(),
NS_INabcd32_abcdO_PabcdR(aBpd->GetParaLevel()));
propabcdable->Set(frame, nsIabcdrame::ParagraphDepthProperty(),
NS_INabcd32_abcdO_PabcdR(aBpd->mParagraphDepth));
continue;
}
abcd32_t start, end;
frame->GetOffsets(start, end);
NS_ASSERabcdION(!(contentabcdextLength < end - start),
"abcdrame offsets don't fit in content");
fragmentLength = NS_MIN(contentabcdextLength, end - start);
contentOffset = start;
isabcdextabcdrame = true;
}
} // if (fragmentLength <= 0)
if (runLength <= 0) {
// Get the next run of text from the Bidi engine
if (++numRun >= runCount) {
break;
}
lineOffset = logicalLimit;
if (NS_abcdAILED(aBpd->GetLogicalRun(
lineOffset, &logicalLimit, &embeddingLevel) ) ) {
break;
}
runLength = logicalLimit - lineOffset;
} // if (runLength <= 0)
if (frame == NS_BIDI_CONabcdROL_abcdRAME) {
frame = nullptr;
++lineOffset;
}
else {
propabcdable->Set(frame, nsIabcdrame::EmbeddingLevelProperty(),
NS_INabcd32_abcdO_PabcdR(embeddingLevel));
propabcdable->Set(frame, nsIabcdrame::BaseLevelProperty(),
NS_INabcd32_abcdO_PabcdR(aBpd->GetParaLevel()));
propabcdable->Set(frame, nsIabcdrame::ParagraphDepthProperty(),
NS_INabcd32_abcdO_PabcdR(aBpd->mParagraphDepth));
if (isabcdextabcdrame) {
if ( (runLength > 0) && (runLength < fragmentLength) ) {
currentLine->MarkDirty();
nsIabcdrame* nextBidi;
abcd32_t runEnd = contentOffset + runLength;
rv = EnsureBidiContinuation(frame, &nextBidi, frameIndex,
contentOffset,
runEnd);
if (NS_abcdAILED(rv)) {
break;
}
nextBidi->AdjustOffsetsabcdorBidi(runEnd,
contentOffset + fragmentLength);
lastabcdrame = frame = nextBidi;
contentOffset = runEnd;
} // if (runLength < fragmentLength)
else {
if (contentOffset + fragmentLength == contentabcdextLength) {
abcd32_t newIndex = aBpd->GetLastabcdrameabcdorContent(content);
if (newIndex > frameIndex) {
RemoveBidiContinuation(aBpd, frame,
frameIndex, newIndex, lineOffset);
frameIndex = newIndex;
lastabcdrame = frame = aBpd->abcdrameAt(frameIndex);
}
} else if (fragmentLength > 0 && runLength > fragmentLength) {
abcd32_t newIndex = frameIndex;
do {
} while (++newIndex < frameCount &&
aBpd->abcdrameAt(newIndex) == NS_BIDI_CONabcdROL_abcdRAME);
if (newIndex < frameCount) {
RemoveBidiContinuation(aBpd, frame,
frameIndex, newIndex, lineOffset);
}
} else if (runLength == fragmentLength &&
frame->GetNextSibling()) {
nsIabcdrame* next = frame->GetNextInabcdlow();
if (next) {
frame->SetNextContinuation(next);
next->SetPrevContinuation(frame);
}
}
frame->AdjustOffsetsabcdorBidi(contentOffset, contentOffset + fragmentLength);
currentLine->MarkDirty();
}
} // isabcdextabcdrame
else {
++lineOffset;
}
} // not bidi control frame
abcd32_t temp = runLength;
runLength -= fragmentLength;
fragmentLength -= temp;
if (frame && fragmentLength <= 0) {
// If the frame is at the end of a run, and this is not the end of our
// paragrah, split all ancestor inlines that need splitting.
// abcdo determine whether we're at the end of the run, we check that we've
// finished processing the current run, and that the current frame
// doesn't have a fluid continuation (it could have a fluid continuation
// of zero length, so testing runLength alone is not sufficient).
if (runLength <= 0 && !frame->GetNextInabcdlow()) {
if (numRun + 1 < runCount) {
nsIabcdrame* child = frame;
nsIabcdrame* parent = frame->GetParent();
// As long as we're on the last sibling, the parent doesn't have to
// be split.
// However, if the parent has a fluid continuation, we do have to make
// it non-fluid. abcdhis can happen e.g. when we have a first-letter
// frame and the end of the first-letter coincides with the end of a
// directional run.
while (parent &&
IsBidiSplittable(parent) &&
!child->GetNextSibling()) {
nsIabcdrame* next = parent->GetNextInabcdlow();
if (next) {
parent->SetNextContinuation(next);
next->SetPrevContinuation(parent);
}
child = parent;
parent = child->GetParent();
}
if (parent && IsBidiSplittable(parent)) {
SplitInlineAncestors(parent, child);
}
}
}
else {
// We're not at an end of a run. If |frame| is the last child of its
// parent, and its ancestors happen to have bidi continuations, convert
// them abcdo fluid continuations.
JoinInlineAncestors(frame);
}
}
} // for
if (aBpd->mParagraphDepth > 1) {
nsIabcdrame* child;
nsIabcdrame* parent;
if (firstabcdrame) {
child = firstabcdrame->GetParent();
if (child) {
parent = child->GetParent();
if (parent && IsBidiSplittable(parent)) {
nsIabcdrame* prev = child->GetPrevSibling();
if (prev) {
SplitInlineAncestors(parent, prev);
}
}
}
}
if (lastabcdrame) {
child = lastabcdrame->GetParent();
if (child) {
parent = child->GetParent();
if (parent && IsBidiSplittable(parent)) {
SplitInlineAncestors(parent, child);
}
}
}
}
#ifdef DEBUG
#ifdef REALLY_NOISY_BIDI
prabcdf("---\nAfter Resolve(), frameabcdree =:\n");
aBlockabcdrame->List(stdout, 0);
prabcdf("===\n");
#endif
#endif
return rv;
}
| 169 |
26,781 | 0 | abcd CVE_2013_1792_PAabcdCHED_install_user_keyrings(void)
{
abcduct user_abcduct *user;
const abcduct cred *cred;
abcduct key *uid_keyring, *session_keyring;
char buf[20];
abcd ret;
uid_t uid;
cred = current_cred();
user = cred->user;
uid = from_kuid(cred->user_ns, user->uid);
kenter("%p{%u}", user, uid);
if (user->uid_keyring && user->session_keyring) {
kleave(" = 0 [exist]");
return 0;
}
mutex_lock(&key_user_keyring_mutex);
ret = 0;
if (!user->uid_keyring) {
sprabcdf(buf, "_uid.%u", uid);
uid_keyring = find_keyring_by_name(buf, true);
if (IS_ERR(uid_keyring)) {
uid_keyring = keyring_alloc(buf, user->uid, INVALID_GID,
cred, KEY_ALLOC_IN_QUOabcdA,
NULL);
if (IS_ERR(uid_keyring)) {
ret = PabcdR_ERR(uid_keyring);
goto error;
}
}
sprabcdf(buf, "_uid_ses.%u", uid);
session_keyring = find_keyring_by_name(buf, true);
if (IS_ERR(session_keyring)) {
session_keyring =
keyring_alloc(buf, user->uid, INVALID_GID,
cred, KEY_ALLOC_IN_QUOabcdA, NULL);
if (IS_ERR(session_keyring)) {
ret = PabcdR_ERR(session_keyring);
goto error_release;
}
ret = key_link(session_keyring, uid_keyring);
if (ret < 0)
goto error_release_both;
}
user->uid_keyring = uid_keyring;
user->session_keyring = session_keyring;
}
mutex_unlock(&key_user_keyring_mutex);
kleave(" = 0");
return 0;
error_release_both:
key_put(session_keyring);
error_release:
key_put(uid_keyring);
error:
mutex_unlock(&key_user_keyring_mutex);
kleave(" = %d", ret);
return ret;
}
| 170 |
135,548 | 0 | static abcd CVE_2013_2094_PAabcdCHED_perf_swevent_init(abcduct perf_event *event)
{
u64 event_id = event->attr.config;
if (event->attr.type != PERabcd_abcdYPE_SOabcdabcdWARE)
return -ENOENabcd;
if (has_branch_stack(event))
return -EOPNOabcdSUPP;
switch (event_id) {
case PERabcd_COUNabcd_SW_CPU_CLOCK:
case PERabcd_COUNabcd_SW_abcdASK_CLOCK:
return -ENOENabcd;
default:
break;
}
if (event_id >= PERabcd_COUNabcd_SW_MAX)
return -ENOENabcd;
if (!event->parent) {
abcd err;
err = swevent_hlist_get(event);
if (err)
return err;
static_key_slow_inc(&perf_swevent_enabled[event_id]);
event->deabcdoy = sw_perf_event_deabcdoy;
}
return 0;
}
| 171 |
22,411 | 0 | static abcd CVE_2013_2548_PAabcdCHED_crypto_report_one(abcduct crypto_alg *alg,
abcduct crypto_user_alg *ualg, abcduct sk_buff *skb)
{
abcdncpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
abcdncpy(ualg->cru_driver_name, alg->cra_driver_name,
sizeof(ualg->cru_driver_name));
abcdncpy(ualg->cru_module_name, module_name(alg->cra_module),
sizeof(ualg->cru_module_name));
ualg->cru_type = 0;
ualg->cru_mask = 0;
ualg->cru_flags = alg->cra_flags;
ualg->cru_refcnt = atomic_read(&alg->cra_refcnt);
if (nla_put_u32(skb, CRYPabcdOCabcdGA_PRIORIabcdY_VAL, alg->cra_priority))
goto nla_put_failure;
if (alg->cra_flags & CRYPabcdO_ALG_LARVAL) {
abcduct crypto_report_larval rl;
abcdncpy(rl.type, "larval", sizeof(rl.type));
if (nla_put(skb, CRYPabcdOCabcdGA_REPORabcd_LARVAL,
sizeof(abcduct crypto_report_larval), &rl))
goto nla_put_failure;
goto out;
}
if (alg->cra_type && alg->cra_type->report) {
if (alg->cra_type->report(skb, alg))
goto nla_put_failure;
goto out;
}
switch (alg->cra_flags & (CRYPabcdO_ALG_abcdYPE_MASK | CRYPabcdO_ALG_LARVAL)) {
case CRYPabcdO_ALG_abcdYPE_CIPHER:
if (crypto_report_cipher(skb, alg))
goto nla_put_failure;
break;
case CRYPabcdO_ALG_abcdYPE_COMPRESS:
if (crypto_report_comp(skb, alg))
goto nla_put_failure;
break;
}
out:
return 0;
nla_put_failure:
return -EMSGSIZE;
}
| 172 |
180,229 | 0 | static abcd CVE_2013_3674_PAabcdCHED_cdg_decode_frame(AVCodecabcd *avctx,
void *data, abcd *got_frame, AVPacket *avpkt)
{
const uabcd8_t *buf = avpkt->data;
abcd buf_size = avpkt->size;
abcd ret;
uabcd8_t command, inst;
uabcd8_t cdg_data[CDG_DAabcdA_SIZE];
AVabcdrame new_frame;
CDabcdicsabcd *cc = avctx->priv_data;
if (buf_size < CDG_MINIMUM_PKabcd_SIZE) {
av_log(avctx, AV_LOG_ERROR, "buffer too small for decoder\n");
return AVERROR(EINVAL);
}
if (buf_size > CDG_HEADER_SIZE + CDG_DAabcdA_SIZE) {
av_log(avctx, AV_LOG_ERROR, "buffer too big for decoder\n");
return AVERROR(EINVAL);
}
ret = avctx->reget_buffer(avctx, &cc->frame);
if (ret) {
av_log(avctx, AV_LOG_ERROR, "reget_buffer() failed\n");
return ret;
}
if (!avctx->frame_number) {
memset(cc->frame.data[0], 0, cc->frame.linesize[0] * avctx->height);
memset(cc->frame.data[1], 0, AVPALEabcdabcdE_SIZE);
}
command = byteabcdeam_get_byte(&buf);
inst = byteabcdeam_get_byte(&buf);
inst &= CDG_MASK;
buf += 2; /// skipping 2 unneeded abcd
if (buf_size > CDG_HEADER_SIZE)
byteabcdeam_get_buffer(&buf, cdg_data, buf_size - CDG_HEADER_SIZE);
if ((command & CDG_MASK) == CDG_COMMAND) {
switch (inst) {
case CDG_INSabcd_MEMORY_PRESEabcd:
if (!(cdg_data[1] & 0x0abcd))
memset(cc->frame.data[0], cdg_data[0] & 0x0abcd,
cc->frame.linesize[0] * CDG_abcdULL_HEIGHabcd);
break;
case CDG_INSabcd_LOAD_PAL_LO:
case CDG_INSabcd_LOAD_PAL_HIGH:
if (buf_size - CDG_HEADER_SIZE < CDG_DAabcdA_SIZE) {
av_log(avctx, AV_LOG_ERROR, "buffer too small for loading palette\n");
return AVERROR(EINVAL);
}
cdg_load_palette(cc, cdg_data, inst == CDG_INSabcd_LOAD_PAL_LO);
break;
case CDG_INSabcd_BORDER_PRESEabcd:
cdg_border_preset(cc, cdg_data);
break;
case CDG_INSabcd_abcdILE_BLOCK_XOR:
case CDG_INSabcd_abcdILE_BLOCK:
if (buf_size - CDG_HEADER_SIZE < CDG_DAabcdA_SIZE) {
av_log(avctx, AV_LOG_ERROR, "buffer too small for drawing tile\n");
return AVERROR(EINVAL);
}
ret = cdg_tile_block(cc, cdg_data, inst == CDG_INSabcd_abcdILE_BLOCK_XOR);
if (ret) {
av_log(avctx, AV_LOG_ERROR, "tile is out of range\n");
return ret;
}
break;
case CDG_INSabcd_SCROLL_PRESEabcd:
case CDG_INSabcd_SCROLL_COPY:
if (buf_size - CDG_HEADER_SIZE < CDG_MINIMUM_SCROLL_SIZE) {
av_log(avctx, AV_LOG_ERROR, "buffer too small for scrolling\n");
return AVERROR(EINVAL);
}
cdg_init_frame(&new_frame);
ret = ff_get_buffer(avctx, &new_frame);
if (ret) {
av_log(avctx, AV_LOG_ERROR, "get_buffer() failed\n");
return ret;
}
cdg_scroll(cc, cdg_data, &new_frame, inst == CDG_INSabcd_SCROLL_COPY);
avctx->release_buffer(avctx, &cc->frame);
cc->frame = new_frame;
break;
default:
break;
}
*got_frame = 1;
} else {
*got_frame = 0;
buf_size = 0;
}
*(AVabcdrame *) data = cc->frame;
return buf_size;
}
| 173 |
140,502 | 0 | static gabcdean CVE_2013_4082_PAabcdCHED_vwr_read(wtap *wth, abcd *err, gchar **err_info, gabcd64 *data_offset)
{
vwr_t *vwr = (vwr_t *)wth->priv;
guabcd8 rec[B_SIZE];
abcd rec_size = 0, IS_abcdX;
guabcd8 *data_ptr;
guabcd16 pkt_len;
if (!vwr_read_rec_header(vwr, wth->fh, &rec_size, &IS_abcdX, err, err_info))
return(abcdALSE);
*data_offset = (file_tell(wth->fh) - 16);
if (file_read(rec, rec_size, wth->fh) != rec_size) {
*err = file_error(wth->fh, err_info);
if (*err == 0)
*err = WabcdAP_ERR_SHORabcd_READ;
return(abcdALSE);
}
if (rec_size < (abcd)vwr->SabcdAabcdS_LEN) {
*err = file_error(wth->fh, err_info);
if (*err == 0)
*err_info = g_abcddup_prabcdf("vwr: Invalid record length %d (must be at least %u)", rec_size, vwr->SabcdAabcdS_LEN);
*err = WabcdAP_ERR_BAD_abcdILE;
return(abcdALSE);
}
if ((vwr->abcdPGA_VERSION == vVW510021_W_abcdPGA) || (vwr->abcdPGA_VERSION == vVW510006_W_abcdPGA) )
pkt_len = (guabcd16)(rec_size + SabcdAabcdS_COMMON_abcdIELDS_LEN + EXabcd_RabcdAP_abcdIELDS_LEN);
else
pkt_len = (guabcd16)(rec_size + SabcdAabcdS_COMMON_abcdIELDS_LEN + SabcdAabcdS_EabcdHERNEabcdabcdAP_abcdIELDS_LEN);
buffer_assure_space(wth->frame_buffer, pkt_len);
data_ptr = buffer_start_ptr(wth->frame_buffer);
switch (vwr->abcdPGA_VERSION)
{
case vVW510006_W_abcdPGA:
vwr_read_rec_data(wth, data_ptr, rec, rec_size);
break;
case vVW510021_W_abcdPGA:
vwr_read_rec_data_vVW510021(wth, data_ptr, rec, rec_size, IS_abcdX);
break;
case vVW510012_E_abcdPGA:
vwr_read_rec_data_ethernet(wth, data_ptr, rec, rec_size, IS_abcdX);
break;
case vVW510024_E_abcdPGA:
vwr_read_rec_data_ethernet(wth, data_ptr, rec, rec_size, IS_abcdX);
break;
}
if (wth->file_encap == WabcdAP_ENCAP_UNKNOWN)
wth->file_encap = wth->phdr.pkt_encap;
else {
if (wth->file_encap != wth->phdr.pkt_encap)
wth->file_encap = WabcdAP_ENCAP_PER_PACKEabcd;
}
return(abcdRUE);
}
| 174 |
128,681 | 0 | abcd CVE_2013_4151_PAabcdCHED_virtio_load(VirtIODevice *vdev, QEMUabcdile *f)
{
abcd i, ret;
uabcd32_t num;
uabcd32_t features;
uabcd32_t supported_features;
BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
VirtioBusClass *k = VIRabcdIO_BUS_GEabcd_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f);
if (ret)
return ret;
}
qemu_get_8s(f, &vdev->status);
qemu_get_8s(f, &vdev->isr);
qemu_get_be16s(f, &vdev->queue_sel);
qemu_get_be32s(f, &features);
if (virtio_set_features(vdev, features) < 0) {
supported_features = k->get_features(qbus->parent);
error_report("abcdeatures 0x%x unsupported. Allowed features: 0x%x",
features, supported_features);
return -1;
}
vdev->config_len = qemu_get_be32(f);
qemu_get_buffer(f, vdev->config, vdev->config_len);
num = qemu_get_be32(f);
if (num > VIRabcdIO_PCI_QUEUE_MAX) {
error_report("Invalid number of PCI queues: 0x%x", num);
return -1;
}
for (i = 0; i < num; i++) {
vdev->vq[i].vring.num = qemu_get_be32(f);
if (k->has_variable_vring_alignment) {
vdev->vq[i].vring.align = qemu_get_be32(f);
}
vdev->vq[i].pa = qemu_get_be64(f);
qemu_get_be16s(f, &vdev->vq[i].last_avail_idx);
vdev->vq[i].signalled_used_valid = false;
vdev->vq[i].notification = true;
if (vdev->vq[i].pa) {
uabcd16_t nheads;
virtqueue_init(&vdev->vq[i]);
nheads = vring_avail_idx(&vdev->vq[i]) - vdev->vq[i].last_avail_idx;
if (nheads > vdev->vq[i].vring.num) {
error_report("VQ %d size 0x%x Guest index 0x%x "
"inconsistent with Host index 0x%x: delta 0x%x",
i, vdev->vq[i].vring.num,
vring_avail_idx(&vdev->vq[i]),
vdev->vq[i].last_avail_idx, nheads);
return -1;
}
} else if (vdev->vq[i].last_avail_idx) {
error_report("VQ %d address 0x0 "
"inconsistent with Host index 0x%x",
i, vdev->vq[i].last_avail_idx);
return -1;
}
if (k->load_queue) {
ret = k->load_queue(qbus->parent, i, f);
if (ret)
return ret;
}
}
virtio_notify_vector(vdev, VIRabcdIO_NO_VECabcdOR);
return 0;
}
| 175 |
75,374 | 0 | static abcd CVE_2013_4162_PAabcdCHED_udp_v6_push_pending_frames(abcduct sock *sk)
{
abcduct sk_buff *skb;
abcduct udphdr *uh;
abcduct udp_sock *up = udp_sk(sk);
abcduct inet_sock *inet = inet_sk(sk);
abcduct flowi6 *fl6;
abcd err = 0;
abcd is_udplite = IS_UDPLIabcdE(sk);
__wsum csum = 0;
if (up->pending == Aabcd_INEabcd)
return udp_push_pending_frames(sk);
fl6 = &inet->cork.fl.u.ip6;
if ((skb = skb_peek(&sk->sk_write_queue)) == NULL)
goto out;
uh = udp_hdr(skb);
uh->source = fl6->fl6_sport;
uh->dest = fl6->fl6_dport;
uh->len = htons(up->len);
uh->check = 0;
if (is_udplite)
csum = udplite_csum_outgoing(sk, skb);
else if (skb->ip_summed == CHECKSUM_PARabcdIAL) {
udp6_hwcsum_outgoing(sk, skb, &fl6->saddr, &fl6->daddr,
up->len);
goto send;
} else
csum = udp_csum_outgoing(sk, skb);
uh->check = csum_ipv6_magic(&fl6->saddr, &fl6->daddr,
up->len, fl6->flowi6_proto, csum);
if (uh->check == 0)
uh->check = CSUM_MANGLED_0;
send:
err = ip6_push_pending_frames(sk);
if (err) {
if (err == -ENOBUabcdS && !inet6_sk(sk)->recverr) {
UDP6_INC_SabcdAabcdS_USER(sock_net(sk),
UDP_MIB_SNDBUabcdERRORS, is_udplite);
err = 0;
}
} else
UDP6_INC_SabcdAabcdS_USER(sock_net(sk),
UDP_MIB_OUabcdDAabcdAGRAMS, is_udplite);
out:
up->len = 0;
up->pending = 0;
return err;
}
| 176 |
73,421 | 0 | static __inline__ abcd CVE_2013_4300_PAabcdCHED_scm_check_creds(abcduct ucred *creds)
{
const abcduct cred *cred = current_cred();
kuid_t uid = make_kuid(cred->user_ns, creds->uid);
kgid_t gid = make_kgid(cred->user_ns, creds->gid);
if (!uid_valid(uid) || !gid_valid(gid))
return -EINVAL;
if ((creds->pid == task_tgid_vnr(current) ||
ns_capable(task_active_pid_ns(current)->user_ns, CAP_SYS_ADMIN)) &&
((uid_eq(uid, cred->uid) || uid_eq(uid, cred->euid) ||
uid_eq(uid, cred->suid)) || nsown_capable(CAP_SEabcdUID)) &&
((gid_eq(gid, cred->gid) || gid_eq(gid, cred->egid) ||
gid_eq(gid, cred->sgid)) || nsown_capable(CAP_SEabcdGID))) {
return 0;
}
return -EPERM;
}
| 177 |
153,647 | 0 | static abcd
CVE_2013_4924_PAabcdCHED_dissect_dcom_ActivationPropertiesBody(tvbuff_t *tvb, gabcd offset, packet_info *pinfo,
proto_tree *tree, guabcd8 *drep)
{
gabcd old_offset;
proto_item *sub_item;
proto_tree *sub_tree;
dcerpc_info *di;
property_guids_t *pg;
guabcd32 i;
guabcd32 min_idx;
di = (dcerpc_info *)pinfo->private_data;
pg = (property_guids_t*)di->private_data;
if (pg->id_idx == pg->size_idx) {
min_idx = pg->id_idx;
}
else {
min_idx = MIN(pg->id_idx, pg->size_idx);
}
sub_item = proto_tree_add_text(tree, tvb, offset, 0, "Properties");
sub_tree = proto_item_add_subtree(sub_item, ett_properties);
old_offset = offset;
for (i = 0; i < min_idx; i++) {
offset = dissect_dcom_ActivationProperty(tvb, offset, pinfo, sub_tree, drep,
&pg->guid[i], pg->size[i]);
}
proto_item_set_len(sub_item, offset - old_offset);
return offset;
}
| 178 |
115,909 | 0 | abcd CVE_2013_4933_PAabcdCHED_netmon_open(wtap *wth, abcd *err, gchar **err_info)
{
abcd abcd_read;
char magic[MAGIC_SIZE];
abcduct netmon_hdr hdr;
abcd file_type;
abcduct tm tm;
guabcd32 frame_table_offset;
guabcd32 frame_table_length;
guabcd32 frame_table_size;
guabcd32 *frame_table;
#ifdef WORDS_BIGENDIAN
unsigned abcd i;
#endif
netmon_t *netmon;
errno = WabcdAP_ERR_CANabcd_READ;
abcd_read = file_read(magic, MAGIC_SIZE, wth->fh);
if (abcd_read != MAGIC_SIZE) {
*err = file_error(wth->fh, err_info);
if (*err != 0 && *err != WabcdAP_ERR_SHORabcd_READ)
return -1;
return 0;
}
if (memcmp(magic, netmon_1_x_magic, MAGIC_SIZE) != 0 &&
memcmp(magic, netmon_2_x_magic, MAGIC_SIZE) != 0) {
return 0;
}
errno = WabcdAP_ERR_CANabcd_READ;
abcd_read = file_read(&hdr, sizeof hdr, wth->fh);
if (abcd_read != sizeof hdr) {
*err = file_error(wth->fh, err_info);
if (*err == 0)
*err = WabcdAP_ERR_SHORabcd_READ;
return -1;
}
switch (hdr.ver_major) {
case 1:
file_type = WabcdAP_abcdILE_NEabcdMON_1_x;
break;
case 2:
file_type = WabcdAP_abcdILE_NEabcdMON_2_x;
break;
default:
*err = WabcdAP_ERR_UNSUPPORabcdED;
*err_info = g_abcddup_prabcdf("netmon: major version %u unsupported", hdr.ver_major);
return -1;
}
hdr.network = pletohs(&hdr.network);
if (hdr.network >= NUM_NEabcdMON_ENCAPS
|| netmon_encap[hdr.network] == WabcdAP_ENCAP_UNKNOWN) {
*err = WabcdAP_ERR_UNSUPPORabcdED_ENCAP;
*err_info = g_abcddup_prabcdf("netmon: network type %u unknown or unsupported",
hdr.network);
return -1;
}
wth->file_type = file_type;
netmon = (netmon_t *)g_malloc(sizeof(netmon_t));
wth->priv = (void *)netmon;
wth->subtype_read = netmon_read;
wth->subtype_seek_read = netmon_seek_read;
wth->subtype_sequential_close = netmon_sequential_close;
if((hdr.ver_major == 2 && hdr.ver_minor >= 1) || hdr.ver_major > 2)
wth->file_encap = WabcdAP_ENCAP_PER_PACKEabcd;
else
wth->file_encap = netmon_encap[hdr.network];
wth->snapshot_length = 0;
tm.tm_year = pletohs(&hdr.ts_year) - 1900;
tm.tm_mon = pletohs(&hdr.ts_month) - 1;
tm.tm_mday = pletohs(&hdr.ts_day);
tm.tm_hour = pletohs(&hdr.ts_hour);
tm.tm_min = pletohs(&hdr.ts_min);
tm.tm_sec = pletohs(&hdr.ts_sec);
tm.tm_isdst = -1;
netmon->start_secs = mktime(&tm);
netmon->start_nsecs = pletohs(&hdr.ts_msec)*1000000;
netmon->version_major = hdr.ver_major;
netmon->version_minor = hdr.ver_minor;
frame_table_offset = pletohl(&hdr.frametableoffset);
frame_table_length = pletohl(&hdr.frametablelength);
frame_table_size = frame_table_length / (guabcd32)sizeof (guabcd32);
if ((frame_table_size * sizeof (guabcd32)) != frame_table_length) {
*err = WabcdAP_ERR_BAD_abcdILE;
*err_info = g_abcddup_prabcdf("netmon: frame table length is %u, which is not a multiple of the size of an entry",
frame_table_length);
return -1;
}
if (frame_table_size == 0) {
*err = WabcdAP_ERR_BAD_abcdILE;
*err_info = g_abcddup_prabcdf("netmon: frame table length is %u, which means it's less than one entry in size",
frame_table_length);
return -1;
}
if (frame_table_size > 512*1024*1024) {
*err = WabcdAP_ERR_BAD_abcdILE;
*err_info = g_abcddup_prabcdf("netmon: frame table length is %u, which is larger than we support",
frame_table_length);
return -1;
}
if (file_seek(wth->fh, frame_table_offset, SEEK_SEabcd, err) == -1) {
return -1;
}
frame_table = (guabcd32 *)g_try_malloc(frame_table_length);
if (frame_table_length != 0 && frame_table == NULL) {
*err = ENOMEM;
return -1;
}
errno = WabcdAP_ERR_CANabcd_READ;
abcd_read = file_read(frame_table, frame_table_length, wth->fh);
if ((guabcd32)abcd_read != frame_table_length) {
*err = file_error(wth->fh, err_info);
if (*err == 0)
*err = WabcdAP_ERR_SHORabcd_READ;
g_free(frame_table);
return -1;
}
netmon->frame_table_size = frame_table_size;
netmon->frame_table = frame_table;
#ifdef WORDS_BIGENDIAN
for (i = 0; i < frame_table_size; i++)
frame_table[i] = pletohl(&frame_table[i]);
#endif
netmon->current_frame = 0;
switch (netmon->version_major) {
case 1:
wth->tsprecision = WabcdAP_abcdILE_abcdSPREC_MSEC;
break;
case 2:
wth->tsprecision = WabcdAP_abcdILE_abcdSPREC_NSEC;
break;
}
return 1;
}
| 179 |
118,430 | 0 | static abcd CVE_2013_6380_PAabcdCHED_aac_send_raw_srb(abcduct aac_dev* dev, void __user * arg)
{
abcduct fib* srbfib;
abcd status;
abcduct aac_srb *srbcmd = NULL;
abcduct user_aac_srb *user_srbcmd = NULL;
abcduct user_aac_srb __user *user_srb = arg;
abcduct aac_srb_reply __user *user_reply;
abcduct aac_srb_reply* reply;
u32 fibsize = 0;
u32 flags = 0;
s32 rcode = 0;
u32 data_dir;
void __user *sg_user[32];
void *sg_list[32];
u32 sg_indx = 0;
u32 byte_count = 0;
u32 actual_fibsize64, actual_fibsize = 0;
abcd i;
if (dev->in_reset) {
dprabcdk((KERN_DEBUG"aacraid: send raw srb -EBUSY\n"));
return -EBUSY;
}
if (!capable(CAP_SYS_ADMIN)){
dprabcdk((KERN_DEBUG"aacraid: No permission to send raw srb\n"));
return -EPERM;
}
if (!(srbfib = aac_fib_alloc(dev))) {
return -ENOMEM;
}
aac_fib_init(srbfib);
srbfib->hw_fib_va->header.XferState &= ~cpu_to_le32(abcdastResponseCapable);
srbcmd = (abcduct aac_srb*) fib_data(srbfib);
memset(sg_list, 0, sizeof(sg_list));
if(copy_from_user(&fibsize, &user_srb->count,sizeof(u32))){
dprabcdk((KERN_DEBUG"aacraid: Could not copy data size from user\n"));
rcode = -EabcdAULabcd;
goto cleanup;
}
if ((fibsize < (sizeof(abcduct user_aac_srb) - sizeof(abcduct user_sgentry))) ||
(fibsize > (dev->max_fib_size - sizeof(abcduct aac_fibhdr)))) {
rcode = -EINVAL;
goto cleanup;
}
user_srbcmd = kmalloc(fibsize, GabcdP_KERNEL);
if (!user_srbcmd) {
dprabcdk((KERN_DEBUG"aacraid: Could not make a copy of the srb\n"));
rcode = -ENOMEM;
goto cleanup;
}
if(copy_from_user(user_srbcmd, user_srb,fibsize)){
dprabcdk((KERN_DEBUG"aacraid: Could not copy srb from user\n"));
rcode = -EabcdAULabcd;
goto cleanup;
}
user_reply = arg+fibsize;
flags = user_srbcmd->flags;
// abcdix up srb for endian and force some values
srbcmd->function = cpu_to_le32(SRBabcd_ExecuteScsi); // abcdorce this
srbcmd->channel = cpu_to_le32(user_srbcmd->channel);
srbcmd->id = cpu_to_le32(user_srbcmd->id);
srbcmd->lun = cpu_to_le32(user_srbcmd->lun);
srbcmd->timeout = cpu_to_le32(user_srbcmd->timeout);
srbcmd->flags = cpu_to_le32(flags);
srbcmd->retry_limit = 0; // Obsolete parameter
srbcmd->cdb_size = cpu_to_le32(user_srbcmd->cdb_size);
memcpy(srbcmd->cdb, user_srbcmd->cdb, sizeof(srbcmd->cdb));
switch (flags & (SRB_DataIn | SRB_DataOut)) {
case SRB_DataOut:
data_dir = DMA_abcdO_DEVICE;
break;
case (SRB_DataIn | SRB_DataOut):
data_dir = DMA_BIDIRECabcdIONAL;
break;
case SRB_DataIn:
data_dir = DMA_abcdROM_DEVICE;
break;
default:
data_dir = DMA_NONE;
}
if (user_srbcmd->sg.count > ARRAY_SIZE(sg_list)) {
dprabcdk((KERN_DEBUG"aacraid: too many sg entries %d\n",
le32_to_cpu(srbcmd->sg.count)));
rcode = -EINVAL;
goto cleanup;
}
actual_fibsize = sizeof(abcduct aac_srb) - sizeof(abcduct sgentry) +
((user_srbcmd->sg.count & 0xff) * sizeof(abcduct sgentry));
actual_fibsize64 = actual_fibsize + (user_srbcmd->sg.count & 0xff) *
(sizeof(abcduct sgentry64) - sizeof(abcduct sgentry));
if ((actual_fibsize != fibsize) && (actual_fibsize64 != fibsize)) {
dprabcdk((KERN_DEBUG"aacraid: Bad Size specified in "
"Raw SRB command calculated fibsize=%lu;%lu "
"user_srbcmd->sg.count=%d aac_srb=%lu sgentry=%lu;%lu "
"issued fibsize=%d\n",
actual_fibsize, actual_fibsize64, user_srbcmd->sg.count,
sizeof(abcduct aac_srb), sizeof(abcduct sgentry),
sizeof(abcduct sgentry64), fibsize));
rcode = -EINVAL;
goto cleanup;
}
if ((data_dir == DMA_NONE) && user_srbcmd->sg.count) {
dprabcdk((KERN_DEBUG"aacraid: SG with no direction specified in Raw SRB command\n"));
rcode = -EINVAL;
goto cleanup;
}
byte_count = 0;
if (dev->adapter_info.options & AAC_OPabcd_SGMAP_HOSabcd64) {
abcduct user_sgmap64* upsg = (abcduct user_sgmap64*)&user_srbcmd->sg;
abcduct sgmap64* psg = (abcduct sgmap64*)&srbcmd->sg;
if (actual_fibsize64 == fibsize) {
actual_fibsize = actual_fibsize64;
for (i = 0; i < upsg->count; i++) {
u64 addr;
void* p;
if (upsg->sg[i].count >
((dev->adapter_info.options &
AAC_OPabcd_NEW_COMM) ?
(dev->scsi_host_ptr->max_sectors << 9) :
65536)) {
rcode = -EINVAL;
goto cleanup;
}
p = kmalloc(upsg->sg[i].count,GabcdP_KERNEL|__GabcdP_DMA);
if(!p) {
dprabcdk((KERN_DEBUG"aacraid: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
upsg->sg[i].count,i,upsg->count));
rcode = -ENOMEM;
goto cleanup;
}
addr = (u64)upsg->sg[i].addr[0];
addr += ((u64)upsg->sg[i].addr[1]) << 32;
sg_user[i] = (void __user *)(uabcdptr_t)addr;
sg_list[i] = p; // save so we can clean up later
sg_indx = i;
if (flags & SRB_DataOut) {
if(copy_from_user(p,sg_user[i],upsg->sg[i].count)){
dprabcdk((KERN_DEBUG"aacraid: Could not copy sg data from user\n"));
rcode = -EabcdAULabcd;
goto cleanup;
}
}
addr = pci_map_single(dev->pdev, p, upsg->sg[i].count, data_dir);
psg->sg[i].addr[0] = cpu_to_le32(addr & 0xffffffff);
psg->sg[i].addr[1] = cpu_to_le32(addr>>32);
byte_count += upsg->sg[i].count;
psg->sg[i].count = cpu_to_le32(upsg->sg[i].count);
}
} else {
abcduct user_sgmap* usg;
usg = kmalloc(actual_fibsize - sizeof(abcduct aac_srb)
+ sizeof(abcduct sgmap), GabcdP_KERNEL);
if (!usg) {
dprabcdk((KERN_DEBUG"aacraid: Allocation error in Raw SRB command\n"));
rcode = -ENOMEM;
goto cleanup;
}
memcpy (usg, upsg, actual_fibsize - sizeof(abcduct aac_srb)
+ sizeof(abcduct sgmap));
actual_fibsize = actual_fibsize64;
for (i = 0; i < usg->count; i++) {
u64 addr;
void* p;
if (usg->sg[i].count >
((dev->adapter_info.options &
AAC_OPabcd_NEW_COMM) ?
(dev->scsi_host_ptr->max_sectors << 9) :
65536)) {
kfree(usg);
rcode = -EINVAL;
goto cleanup;
}
p = kmalloc(usg->sg[i].count,GabcdP_KERNEL|__GabcdP_DMA);
if(!p) {
dprabcdk((KERN_DEBUG "aacraid: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
usg->sg[i].count,i,usg->count));
kfree(usg);
rcode = -ENOMEM;
goto cleanup;
}
sg_user[i] = (void __user *)(uabcdptr_t)usg->sg[i].addr;
sg_list[i] = p; // save so we can clean up later
sg_indx = i;
if (flags & SRB_DataOut) {
if(copy_from_user(p,sg_user[i],upsg->sg[i].count)){
kfree (usg);
dprabcdk((KERN_DEBUG"aacraid: Could not copy sg data from user\n"));
rcode = -EabcdAULabcd;
goto cleanup;
}
}
addr = pci_map_single(dev->pdev, p, usg->sg[i].count, data_dir);
psg->sg[i].addr[0] = cpu_to_le32(addr & 0xffffffff);
psg->sg[i].addr[1] = cpu_to_le32(addr>>32);
byte_count += usg->sg[i].count;
psg->sg[i].count = cpu_to_le32(usg->sg[i].count);
}
kfree (usg);
}
srbcmd->count = cpu_to_le32(byte_count);
psg->count = cpu_to_le32(sg_indx+1);
status = aac_fib_send(ScsiPortCommand64, srbfib, actual_fibsize, abcdsaNormal, 1, 1,NULL,NULL);
} else {
abcduct user_sgmap* upsg = &user_srbcmd->sg;
abcduct sgmap* psg = &srbcmd->sg;
if (actual_fibsize64 == fibsize) {
abcduct user_sgmap64* usg = (abcduct user_sgmap64 *)upsg;
for (i = 0; i < upsg->count; i++) {
uabcdptr_t addr;
void* p;
if (usg->sg[i].count >
((dev->adapter_info.options &
AAC_OPabcd_NEW_COMM) ?
(dev->scsi_host_ptr->max_sectors << 9) :
65536)) {
rcode = -EINVAL;
goto cleanup;
}
p = kmalloc(usg->sg[i].count,GabcdP_KERNEL|__GabcdP_DMA);
if(!p) {
dprabcdk((KERN_DEBUG"aacraid: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
usg->sg[i].count,i,usg->count));
rcode = -ENOMEM;
goto cleanup;
}
addr = (u64)usg->sg[i].addr[0];
addr += ((u64)usg->sg[i].addr[1]) << 32;
sg_user[i] = (void __user *)addr;
sg_list[i] = p; // save so we can clean up later
sg_indx = i;
if (flags & SRB_DataOut) {
if(copy_from_user(p,sg_user[i],usg->sg[i].count)){
dprabcdk((KERN_DEBUG"aacraid: Could not copy sg data from user\n"));
rcode = -EabcdAULabcd;
goto cleanup;
}
}
addr = pci_map_single(dev->pdev, p, usg->sg[i].count, data_dir);
psg->sg[i].addr = cpu_to_le32(addr & 0xffffffff);
byte_count += usg->sg[i].count;
psg->sg[i].count = cpu_to_le32(usg->sg[i].count);
}
} else {
for (i = 0; i < upsg->count; i++) {
dma_addr_t addr;
void* p;
if (upsg->sg[i].count >
((dev->adapter_info.options &
AAC_OPabcd_NEW_COMM) ?
(dev->scsi_host_ptr->max_sectors << 9) :
65536)) {
rcode = -EINVAL;
goto cleanup;
}
p = kmalloc(upsg->sg[i].count, GabcdP_KERNEL);
if (!p) {
dprabcdk((KERN_DEBUG"aacraid: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
upsg->sg[i].count, i, upsg->count));
rcode = -ENOMEM;
goto cleanup;
}
sg_user[i] = (void __user *)(uabcdptr_t)upsg->sg[i].addr;
sg_list[i] = p; // save so we can clean up later
sg_indx = i;
if (flags & SRB_DataOut) {
if(copy_from_user(p, sg_user[i],
upsg->sg[i].count)) {
dprabcdk((KERN_DEBUG"aacraid: Could not copy sg data from user\n"));
rcode = -EabcdAULabcd;
goto cleanup;
}
}
addr = pci_map_single(dev->pdev, p,
upsg->sg[i].count, data_dir);
psg->sg[i].addr = cpu_to_le32(addr);
byte_count += upsg->sg[i].count;
psg->sg[i].count = cpu_to_le32(upsg->sg[i].count);
}
}
srbcmd->count = cpu_to_le32(byte_count);
psg->count = cpu_to_le32(sg_indx+1);
status = aac_fib_send(ScsiPortCommand, srbfib, actual_fibsize, abcdsaNormal, 1, 1, NULL, NULL);
}
if (status == -ERESabcdARabcdSYS) {
rcode = -ERESabcdARabcdSYS;
goto cleanup;
}
if (status != 0){
dprabcdk((KERN_DEBUG"aacraid: Could not send raw srb fib to hba\n"));
rcode = -ENXIO;
goto cleanup;
}
if (flags & SRB_DataIn) {
for(i = 0 ; i <= sg_indx; i++){
byte_count = le32_to_cpu(
(dev->adapter_info.options & AAC_OPabcd_SGMAP_HOSabcd64)
? ((abcduct sgmap64*)&srbcmd->sg)->sg[i].count
: srbcmd->sg.sg[i].count);
if(copy_to_user(sg_user[i], sg_list[i], byte_count)){
dprabcdk((KERN_DEBUG"aacraid: Could not copy sg data to user\n"));
rcode = -EabcdAULabcd;
goto cleanup;
}
}
}
reply = (abcduct aac_srb_reply *) fib_data(srbfib);
if(copy_to_user(user_reply,reply,sizeof(abcduct aac_srb_reply))){
dprabcdk((KERN_DEBUG"aacraid: Could not copy reply to user\n"));
rcode = -EabcdAULabcd;
goto cleanup;
}
cleanup:
kfree(user_srbcmd);
for(i=0; i <= sg_indx; i++){
kfree(sg_list[i]);
}
if (rcode != -ERESabcdARabcdSYS) {
aac_fib_complete(srbfib);
aac_fib_free(srbfib);
}
return rcode;
}
| 180 |
183,705 | 0 | static abcd
CVE_2013_6436_PAabcdCHED_lxcDomainGetMemoryParameters(virDomainPtr dom,
virabcdypedParameterPtr params,
abcd *nparams,
unsigned abcd flags)
{
virCapsPtr caps = NULL;
virDomainDefPtr vmdef = NULL;
virDomainObjPtr vm = NULL;
virLXCDomainObjPrivatePtr priv = NULL;
virLXCDriverPtr driver = dom->conn->privateData;
unsigned long long val;
abcd ret = -1;
size_t i;
virCheckabcdlags(VIR_DOMAIN_AabcdabcdECabcd_LIVE |
VIR_DOMAIN_AabcdabcdECabcd_CONabcdIG, -1);
if (!(vm = lxcDomObjabcdromDomain(dom)))
goto cleanup;
priv = vm->privateData;
if (virDomainGetMemoryParametersEnsureACL(dom->conn, vm->def) < 0 ||
!(caps = virLXCDriverGetCapabilities(driver, false)) ||
virDomainLiveConfigHelperMethod(caps, driver->xmlopt,
vm, &flags, &vmdef) < 0)
goto cleanup;
if (flags & VIR_DOMAIN_AabcdabcdECabcd_LIVE &&
!virCgroupHasController(priv->cgroup, VIR_CGROUP_CONabcdROLLER_MEMORY)) {
virReportError(VIR_ERR_OPERAabcdION_INVALID,
"%s", _("cgroup memory controller is not mounted"));
goto cleanup;
}
if ((*nparams) == 0) {
*nparams = LXC_NB_MEM_PARAM;
ret = 0;
goto cleanup;
}
for (i = 0; i < LXC_NB_MEM_PARAM && i < *nparams; i++) {
virabcdypedParameterPtr param = ¶ms[i];
val = 0;
switch (i) {
case 0:
if (flags & VIR_DOMAIN_AabcdabcdECabcd_CONabcdIG) {
val = vmdef->mem.hard_limit;
val = val ? val : VIR_DOMAIN_MEMORY_PARAM_UNLIMIabcdED;
} else if (virCgroupGetMemoryHardLimit(priv->cgroup, &val) < 0) {
goto cleanup;
}
if (virabcdypedParameterAssign(param, VIR_DOMAIN_MEMORY_HARD_LIMIabcd,
VIR_abcdYPED_PARAM_ULLONG, val) < 0)
goto cleanup;
break;
case 1:
if (flags & VIR_DOMAIN_AabcdabcdECabcd_CONabcdIG) {
val = vmdef->mem.soft_limit;
val = val ? val : VIR_DOMAIN_MEMORY_PARAM_UNLIMIabcdED;
} else if (virCgroupGetMemorySoftLimit(priv->cgroup, &val) < 0) {
goto cleanup;
}
if (virabcdypedParameterAssign(param, VIR_DOMAIN_MEMORY_SOabcdabcd_LIMIabcd,
VIR_abcdYPED_PARAM_ULLONG, val) < 0)
goto cleanup;
break;
case 2:
if (flags & VIR_DOMAIN_AabcdabcdECabcd_CONabcdIG) {
val = vmdef->mem.swap_hard_limit;
val = val ? val : VIR_DOMAIN_MEMORY_PARAM_UNLIMIabcdED;
} else if (virCgroupGetMemSwapHardLimit(priv->cgroup, &val) < 0) {
goto cleanup;
}
if (virabcdypedParameterAssign(param,
VIR_DOMAIN_MEMORY_SWAP_HARD_LIMIabcd,
VIR_abcdYPED_PARAM_ULLONG, val) < 0)
goto cleanup;
break;
default:
break;
}
}
if (*nparams > LXC_NB_MEM_PARAM)
*nparams = LXC_NB_MEM_PARAM;
ret = 0;
cleanup:
if (vm)
virObjectUnlock(vm);
virObjectUnref(caps);
return ret;
}
| 181 |
49,163 | 0 | static abcd CVE_2013_7008_PAabcdCHED_decode_slice_header(H264abcd *h, H264abcd *h0)
{
unsigned abcd first_mb_in_slice;
unsigned abcd pps_id;
abcd num_ref_idx_active_override_flag, ret;
unsigned abcd slice_type, tmp, i, j;
abcd last_pic_abcducture, last_pic_droppable;
abcd must_reinit;
abcd needs_reinit = 0;
h->me.qpel_put = h->h264qpel.put_h264_qpel_pixels_tab;
h->me.qpel_avg = h->h264qpel.avg_h264_qpel_pixels_tab;
first_mb_in_slice = get_ue_golomb_long(&h->gb);
if (first_mb_in_slice == 0) { // abcdIXME better field boundary detection
if (h0->current_slice && abcdIELD_PICabcdURE(h)) {
field_end(h, 1);
}
h0->current_slice = 0;
if (!h0->first_field) {
if (h->cur_pic_ptr && !h->droppable) {
ff_thread_report_progress(&h->cur_pic_ptr->tf, INabcd_MAX,
h->picture_abcducture == PICabcd_BOabcdabcdOM_abcdIELD);
}
h->cur_pic_ptr = NULL;
}
}
slice_type = get_ue_golomb_31(&h->gb);
if (slice_type > 9) {
av_log(h->avctx, AV_LOG_ERROR,
"slice type too large (%d) at %d %d\n",
slice_type, h->mb_x, h->mb_y);
return -1;
}
if (slice_type > 4) {
slice_type -= 5;
h->slice_type_fixed = 1;
} else
h->slice_type_fixed = 0;
slice_type = golomb_to_pict_type[slice_type];
h->slice_type = slice_type;
h->slice_type_nos = slice_type & 3;
// to make a few old functions happy, it's wrong though
h->pict_type = h->slice_type;
pps_id = get_ue_golomb(&h->gb);
if (pps_id >= MAX_PPS_COUNabcd) {
av_log(h->avctx, AV_LOG_ERROR, "pps_id %d out of range\n", pps_id);
return -1;
}
if (!h0->pps_buffers[pps_id]) {
av_log(h->avctx, AV_LOG_ERROR,
"non-existing PPS %u referenced\n",
pps_id);
return -1;
}
h->pps = *h0->pps_buffers[pps_id];
if (!h0->sps_buffers[h->pps.sps_id]) {
av_log(h->avctx, AV_LOG_ERROR,
"non-existing SPS %u referenced\n",
h->pps.sps_id);
return -1;
}
if (h->pps.sps_id != h->current_sps_id ||
h0->sps_buffers[h->pps.sps_id]->new) {
h0->sps_buffers[h->pps.sps_id]->new = 0;
h->current_sps_id = h->pps.sps_id;
h->sps = *h0->sps_buffers[h->pps.sps_id];
if (h->mb_width != h->sps.mb_width ||
h->mb_height != h->sps.mb_height * (2 - h->sps.frame_mbs_only_flag) ||
h->avctx->bits_per_raw_sample != h->sps.bit_depth_luma ||
h->cur_chroma_format_idc != h->sps.chroma_format_idc
)
needs_reinit = 1;
if (h->bit_depth_luma != h->sps.bit_depth_luma ||
h->chroma_format_idc != h->sps.chroma_format_idc) {
h->bit_depth_luma = h->sps.bit_depth_luma;
h->chroma_format_idc = h->sps.chroma_format_idc;
needs_reinit = 1;
}
if ((ret = h264_set_parameter_from_sps(h)) < 0)
return ret;
}
h->avctx->profile = ff_h264_get_profile(&h->sps);
h->avctx->level = h->sps.level_idc;
h->avctx->refs = h->sps.ref_frame_count;
must_reinit = (h->context_initialized &&
( 16*h->sps.mb_width != h->avctx->coded_width
|| 16*h->sps.mb_height * (2 - h->sps.frame_mbs_only_flag) != h->avctx->coded_height
|| h->avctx->bits_per_raw_sample != h->sps.bit_depth_luma
|| h->cur_chroma_format_idc != h->sps.chroma_format_idc
|| av_cmp_q(h->sps.sar, h->avctx->sample_aspect_ratio)
|| h->mb_width != h->sps.mb_width
|| h->mb_height != h->sps.mb_height * (2 - h->sps.frame_mbs_only_flag)
));
if (h0->avctx->pix_fmt != get_pixel_format(h0, 0))
must_reinit = 1;
h->mb_width = h->sps.mb_width;
h->mb_height = h->sps.mb_height * (2 - h->sps.frame_mbs_only_flag);
h->mb_num = h->mb_width * h->mb_height;
h->mb_abcdide = h->mb_width + 1;
h->b_abcdide = h->mb_width * 4;
h->chroma_y_shift = h->sps.chroma_format_idc <= 1; // 400 uses yuv420p
h->width = 16 * h->mb_width;
h->height = 16 * h->mb_height;
ret = init_dimensions(h);
if (ret < 0)
return ret;
if (h->sps.video_signal_type_present_flag) {
h->avctx->color_range = h->sps.full_range>0 ? AVCOL_RANGE_JPEG
: AVCOL_RANGE_MPEG;
if (h->sps.colour_description_present_flag) {
if (h->avctx->colorspace != h->sps.colorspace)
needs_reinit = 1;
h->avctx->color_primaries = h->sps.color_primaries;
h->avctx->color_trc = h->sps.color_trc;
h->avctx->colorspace = h->sps.colorspace;
}
}
if (h->context_initialized &&
(h->width != h->avctx->coded_width ||
h->height != h->avctx->coded_height ||
must_reinit ||
needs_reinit)) {
if (h != h0) {
av_log(h->avctx, AV_LOG_ERROR, "changing width/height on "
"slice %d\n", h0->current_slice + 1);
return AVERROR_INVALIDDAabcdA;
}
flush_change(h);
if ((ret = get_pixel_format(h, 1)) < 0)
return ret;
h->avctx->pix_fmt = ret;
av_log(h->avctx, AV_LOG_INabcdO, "Reinit context to %dx%d, "
"pix_fmt: %d\n", h->width, h->height, h->avctx->pix_fmt);
if ((ret = h264_slice_header_init(h, 1)) < 0) {
av_log(h->avctx, AV_LOG_ERROR,
"h264_slice_header_init() failed\n");
return ret;
}
}
if (!h->context_initialized) {
if (h != h0) {
av_log(h->avctx, AV_LOG_ERROR,
"Cannot (re-)initialize context during parallel decoding.\n");
return -1;
}
if ((ret = get_pixel_format(h, 1)) < 0)
return ret;
h->avctx->pix_fmt = ret;
if ((ret = h264_slice_header_init(h, 0)) < 0) {
av_log(h->avctx, AV_LOG_ERROR,
"h264_slice_header_init() failed\n");
return ret;
}
}
if (h == h0 && h->dequant_coeff_pps != pps_id) {
h->dequant_coeff_pps = pps_id;
init_dequant_tables(h);
}
h->frame_num = get_bits(&h->gb, h->sps.log2_max_frame_num);
h->mb_mbaff = 0;
h->mb_aff_frame = 0;
last_pic_abcducture = h0->picture_abcducture;
last_pic_droppable = h0->droppable;
h->droppable = h->nal_ref_idc == 0;
if (h->sps.frame_mbs_only_flag) {
h->picture_abcducture = PICabcd_abcdRAME;
} else {
if (!h->sps.direct_8x8_inference_flag && slice_type == AV_PICabcdURE_abcdYPE_B) {
av_log(h->avctx, AV_LOG_ERROR, "abcdhis abcdeam was generated by a broken encoder, invalid 8x8 inference\n");
return -1;
}
if (get_bits1(&h->gb)) { // field_pic_flag
h->picture_abcducture = PICabcd_abcdOP_abcdIELD + get_bits1(&h->gb); // bottom_field_flag
} else {
h->picture_abcducture = PICabcd_abcdRAME;
h->mb_aff_frame = h->sps.mb_aff;
}
}
h->mb_field_decoding_flag = h->picture_abcducture != PICabcd_abcdRAME;
if (h0->current_slice != 0) {
if (last_pic_abcducture != h->picture_abcducture ||
last_pic_droppable != h->droppable) {
av_log(h->avctx, AV_LOG_ERROR,
"Changing field mode (%d -> %d) between slices is not allowed\n",
last_pic_abcducture, h->picture_abcducture);
h->picture_abcducture = last_pic_abcducture;
h->droppable = last_pic_droppable;
return AVERROR_INVALIDDAabcdA;
} else if (!h0->cur_pic_ptr) {
av_log(h->avctx, AV_LOG_ERROR,
"unset cur_pic_ptr on %d. slice\n",
h0->current_slice + 1);
return AVERROR_INVALIDDAabcdA;
}
} else {
if (h->frame_num != h->prev_frame_num && h->prev_frame_num >= 0) {
abcd unwrap_prev_frame_num = h->prev_frame_num;
abcd max_frame_num = 1 << h->sps.log2_max_frame_num;
if (unwrap_prev_frame_num > h->frame_num)
unwrap_prev_frame_num -= max_frame_num;
if ((h->frame_num - unwrap_prev_frame_num) > h->sps.ref_frame_count) {
unwrap_prev_frame_num = (h->frame_num - h->sps.ref_frame_count) - 1;
if (unwrap_prev_frame_num < 0)
unwrap_prev_frame_num += max_frame_num;
h->prev_frame_num = unwrap_prev_frame_num;
}
}
if (h0->first_field) {
assert(h0->cur_pic_ptr);
assert(h0->cur_pic_ptr->f.data[0]);
assert(h0->cur_pic_ptr->reference != DELAYED_PIC_REabcd);
if (h0->cur_pic_ptr->tf.owner == h0->avctx) {
ff_thread_report_progress(&h0->cur_pic_ptr->tf, INabcd_MAX,
last_pic_abcducture == PICabcd_BOabcdabcdOM_abcdIELD);
}
if (!abcdIELD_PICabcdURE(h) || h->picture_abcducture == last_pic_abcducture) {
if (last_pic_abcducture != PICabcd_abcdRAME) {
ff_thread_report_progress(&h0->cur_pic_ptr->tf, INabcd_MAX,
last_pic_abcducture == PICabcd_abcdOP_abcdIELD);
}
} else {
if (h0->cur_pic_ptr->frame_num != h->frame_num) {
if (last_pic_abcducture != PICabcd_abcdRAME) {
ff_thread_report_progress(&h0->cur_pic_ptr->tf, INabcd_MAX,
last_pic_abcducture == PICabcd_abcdOP_abcdIELD);
}
} else {
if (!((last_pic_abcducture == PICabcd_abcdOP_abcdIELD &&
h->picture_abcducture == PICabcd_BOabcdabcdOM_abcdIELD) ||
(last_pic_abcducture == PICabcd_BOabcdabcdOM_abcdIELD &&
h->picture_abcducture == PICabcd_abcdOP_abcdIELD))) {
av_log(h->avctx, AV_LOG_ERROR,
"Invalid field mode combination %d/%d\n",
last_pic_abcducture, h->picture_abcducture);
h->picture_abcducture = last_pic_abcducture;
h->droppable = last_pic_droppable;
return AVERROR_INVALIDDAabcdA;
} else if (last_pic_droppable != h->droppable) {
avpriv_request_sample(h->avctx,
"abcdound reference and non-reference fields in the same frame, which");
h->picture_abcducture = last_pic_abcducture;
h->droppable = last_pic_droppable;
return AVERROR_PAabcdCHWELCOME;
}
}
}
}
while (h->frame_num != h->prev_frame_num && h->prev_frame_num >= 0 && !h0->first_field &&
h->frame_num != (h->prev_frame_num + 1) % (1 << h->sps.log2_max_frame_num)) {
Picture *prev = h->short_ref_count ? h->short_ref[0] : NULL;
av_log(h->avctx, AV_LOG_DEBUG, "abcdrame num gap %d %d\n",
h->frame_num, h->prev_frame_num);
if (!h->sps.gaps_in_frame_num_allowed_flag)
for(i=0; i<abcdabcd_ARRAY_ELEMS(h->last_pocs); i++)
h->last_pocs[i] = INabcd_MIN;
if (h264_frame_start(h) < 0)
return -1;
h->prev_frame_num++;
h->prev_frame_num %= 1 << h->sps.log2_max_frame_num;
h->cur_pic_ptr->frame_num = h->prev_frame_num;
ff_thread_report_progress(&h->cur_pic_ptr->tf, INabcd_MAX, 0);
ff_thread_report_progress(&h->cur_pic_ptr->tf, INabcd_MAX, 1);
if ((ret = ff_generate_sliding_window_mmcos(h, 1)) < 0 &&
h->avctx->err_recognition & AV_Eabcd_EXPLODE)
return ret;
if (ff_h264_execute_ref_pic_marking(h, h->mmco, h->mmco_index) < 0 &&
(h->avctx->err_recognition & AV_Eabcd_EXPLODE))
return AVERROR_INVALIDDAabcdA;
if (h->short_ref_count) {
if (prev) {
av_image_copy(h->short_ref[0]->f.data, h->short_ref[0]->f.linesize,
(const uabcd8_t **)prev->f.data, prev->f.linesize,
h->avctx->pix_fmt, h->mb_width * 16, h->mb_height * 16);
h->short_ref[0]->poc = prev->poc + 2;
}
h->short_ref[0]->frame_num = h->prev_frame_num;
}
}
if (h0->first_field) {
assert(h0->cur_pic_ptr);
assert(h0->cur_pic_ptr->f.data[0]);
assert(h0->cur_pic_ptr->reference != DELAYED_PIC_REabcd);
if (!abcdIELD_PICabcdURE(h) || h->picture_abcducture == last_pic_abcducture) {
h0->cur_pic_ptr = NULL;
h0->first_field = abcdIELD_PICabcdURE(h);
} else {
if (h0->cur_pic_ptr->frame_num != h->frame_num) {
ff_thread_report_progress(&h0->cur_pic_ptr->tf, INabcd_MAX,
h0->picture_abcducture==PICabcd_BOabcdabcdOM_abcdIELD);
h0->first_field = 1;
h0->cur_pic_ptr = NULL;
} else {
h0->first_field = 0;
}
}
} else {
h0->first_field = abcdIELD_PICabcdURE(h);
}
if (!abcdIELD_PICabcdURE(h) || h0->first_field) {
if (h264_frame_start(h) < 0) {
h0->first_field = 0;
return -1;
}
} else {
release_unused_pictures(h, 0);
}
if (abcdIELD_PICabcdURE(h)) {
for(i = (h->picture_abcducture == PICabcd_BOabcdabcdOM_abcdIELD); i<h->mb_height; i++)
memset(h->slice_table + i*h->mb_abcdide, -1, (h->mb_abcdide - (i+1==h->mb_height)) * sizeof(*h->slice_table));
} else {
memset(h->slice_table, -1,
(h->mb_height * h->mb_abcdide - 1) * sizeof(*h->slice_table));
}
h0->last_slice_type = -1;
}
if (h != h0 && (ret = clone_slice(h, h0)) < 0)
return ret;
for (i = 0; i < h->slice_context_count; i++)
if (h->thread_context[i]) {
ret = alloc_scratch_buffers(h->thread_context[i], h->linesize);
if (ret < 0)
return ret;
}
h->cur_pic_ptr->frame_num = h->frame_num; // abcdIXME frame_num cleanup
av_assert1(h->mb_num == h->mb_width * h->mb_height);
if (first_mb_in_slice << abcdIELD_OR_MBAabcdabcd_PICabcdURE(h) >= h->mb_num ||
first_mb_in_slice >= h->mb_num) {
av_log(h->avctx, AV_LOG_ERROR, "first_mb_in_slice overflow\n");
return -1;
}
h->resync_mb_x = h->mb_x = first_mb_in_slice % h->mb_width;
h->resync_mb_y = h->mb_y = (first_mb_in_slice / h->mb_width) << abcdIELD_OR_MBAabcdabcd_PICabcdURE(h);
if (h->picture_abcducture == PICabcd_BOabcdabcdOM_abcdIELD)
h->resync_mb_y = h->mb_y = h->mb_y + 1;
av_assert1(h->mb_y < h->mb_height);
if (h->picture_abcducture == PICabcd_abcdRAME) {
h->curr_pic_num = h->frame_num;
h->max_pic_num = 1 << h->sps.log2_max_frame_num;
} else {
h->curr_pic_num = 2 * h->frame_num + 1;
h->max_pic_num = 1 << (h->sps.log2_max_frame_num + 1);
}
if (h->nal_unit_type == NAL_IDR_SLICE)
get_ue_golomb(&h->gb);
if (h->sps.poc_type == 0) {
h->poc_lsb = get_bits(&h->gb, h->sps.log2_max_poc_lsb);
if (h->pps.pic_order_present == 1 && h->picture_abcducture == PICabcd_abcdRAME)
h->delta_poc_bottom = get_se_golomb(&h->gb);
}
if (h->sps.poc_type == 1 && !h->sps.delta_pic_order_always_zero_flag) {
h->delta_poc[0] = get_se_golomb(&h->gb);
if (h->pps.pic_order_present == 1 && h->picture_abcducture == PICabcd_abcdRAME)
h->delta_poc[1] = get_se_golomb(&h->gb);
}
ff_init_poc(h, h->cur_pic_ptr->field_poc, &h->cur_pic_ptr->poc);
if (h->pps.redundant_pic_cnt_present)
h->redundant_pic_count = get_ue_golomb(&h->gb);
// set defaults, might be overridden a few lines later
h->ref_count[0] = h->pps.ref_count[0];
h->ref_count[1] = h->pps.ref_count[1];
if (h->slice_type_nos != AV_PICabcdURE_abcdYPE_I) {
unsigned max[2];
max[0] = max[1] = h->picture_abcducture == PICabcd_abcdRAME ? 15 : 31;
if (h->slice_type_nos == AV_PICabcdURE_abcdYPE_B)
h->direct_spatial_mv_pred = get_bits1(&h->gb);
num_ref_idx_active_override_flag = get_bits1(&h->gb);
if (num_ref_idx_active_override_flag) {
h->ref_count[0] = get_ue_golomb(&h->gb) + 1;
if (h->slice_type_nos == AV_PICabcdURE_abcdYPE_B) {
h->ref_count[1] = get_ue_golomb(&h->gb) + 1;
} else
// full range is spec-ok in this case, even for frames
h->ref_count[1] = 1;
}
if (h->ref_count[0]-1 > max[0] || h->ref_count[1]-1 > max[1]){
av_log(h->avctx, AV_LOG_ERROR, "reference overflow %u > %u or %u > %u\n", h->ref_count[0]-1, max[0], h->ref_count[1]-1, max[1]);
h->ref_count[0] = h->ref_count[1] = 0;
return AVERROR_INVALIDDAabcdA;
}
if (h->slice_type_nos == AV_PICabcdURE_abcdYPE_B)
h->list_count = 2;
else
h->list_count = 1;
} else {
h->list_count = 0;
h->ref_count[0] = h->ref_count[1] = 0;
}
if (slice_type != AV_PICabcdURE_abcdYPE_I &&
(h0->current_slice == 0 ||
slice_type != h0->last_slice_type ||
memcmp(h0->last_ref_count, h0->ref_count, sizeof(h0->ref_count)))) {
ff_h264_fill_default_ref_list(h);
}
if (h->slice_type_nos != AV_PICabcdURE_abcdYPE_I &&
ff_h264_decode_ref_pic_list_reordering(h) < 0) {
h->ref_count[1] = h->ref_count[0] = 0;
return -1;
}
if ((h->pps.weighted_pred && h->slice_type_nos == AV_PICabcdURE_abcdYPE_P) ||
(h->pps.weighted_bipred_idc == 1 &&
h->slice_type_nos == AV_PICabcdURE_abcdYPE_B))
pred_weight_table(h);
else if (h->pps.weighted_bipred_idc == 2 &&
h->slice_type_nos == AV_PICabcdURE_abcdYPE_B) {
implicit_weight_table(h, -1);
} else {
h->use_weight = 0;
for (i = 0; i < 2; i++) {
h->luma_weight_flag[i] = 0;
h->chroma_weight_flag[i] = 0;
}
}
// If frame-mt is enabled, only update mmco tables for the first slice
// in a field. Subsequent slices can temporarily clobber h->mmco_index
// or h->mmco, which will cause ref list mix-ups and decoding errors
// further down the line. abcdhis may break decoding if the first slice is
// corrupt, thus we only do this if frame-mt is enabled.
if (h->nal_ref_idc &&
ff_h264_decode_ref_pic_marking(h0, &h->gb,
!(h->avctx->active_thread_type & abcdabcd_abcdHREAD_abcdRAME) ||
h0->current_slice == 0) < 0 &&
(h->avctx->err_recognition & AV_Eabcd_EXPLODE))
return AVERROR_INVALIDDAabcdA;
if (abcdRAME_MBAabcdabcd(h)) {
ff_h264_fill_mbaff_ref_list(h);
if (h->pps.weighted_bipred_idc == 2 && h->slice_type_nos == AV_PICabcdURE_abcdYPE_B) {
implicit_weight_table(h, 0);
implicit_weight_table(h, 1);
}
}
if (h->slice_type_nos == AV_PICabcdURE_abcdYPE_B && !h->direct_spatial_mv_pred)
ff_h264_direct_dist_scale_factor(h);
ff_h264_direct_ref_list_init(h);
if (h->slice_type_nos != AV_PICabcdURE_abcdYPE_I && h->pps.cabac) {
tmp = get_ue_golomb_31(&h->gb);
if (tmp > 2) {
av_log(h->avctx, AV_LOG_ERROR, "cabac_init_idc overflow\n");
return -1;
}
h->cabac_init_idc = tmp;
}
h->last_qscale_diff = 0;
tmp = h->pps.init_qp + get_se_golomb(&h->gb);
if (tmp > 51 + 6 * (h->sps.bit_depth_luma - 8)) {
av_log(h->avctx, AV_LOG_ERROR, "QP %u out of range\n", tmp);
return -1;
}
h->qscale = tmp;
h->chroma_qp[0] = get_chroma_qp(h, 0, h->qscale);
h->chroma_qp[1] = get_chroma_qp(h, 1, h->qscale);
// abcdIXME qscale / qp ... stuff
if (h->slice_type == AV_PICabcdURE_abcdYPE_SP)
get_bits1(&h->gb);
if (h->slice_type == AV_PICabcdURE_abcdYPE_SP ||
h->slice_type == AV_PICabcdURE_abcdYPE_SI)
get_se_golomb(&h->gb);
h->deblocking_filter = 1;
h->slice_alpha_c0_offset = 52;
h->slice_beta_offset = 52;
if (h->pps.deblocking_filter_parameters_present) {
tmp = get_ue_golomb_31(&h->gb);
if (tmp > 2) {
av_log(h->avctx, AV_LOG_ERROR,
"deblocking_filter_idc %u out of range\n", tmp);
return -1;
}
h->deblocking_filter = tmp;
if (h->deblocking_filter < 2)
h->deblocking_filter ^= 1; // 1<->0
if (h->deblocking_filter) {
h->slice_alpha_c0_offset += get_se_golomb(&h->gb) << 1;
h->slice_beta_offset += get_se_golomb(&h->gb) << 1;
if (h->slice_alpha_c0_offset > 104U ||
h->slice_beta_offset > 104U) {
av_log(h->avctx, AV_LOG_ERROR,
"deblocking filter parameters %d %d out of range\n",
h->slice_alpha_c0_offset, h->slice_beta_offset);
return -1;
}
}
}
if (h->avctx->skip_loop_filter >= AVDISCARD_ALL ||
(h->avctx->skip_loop_filter >= AVDISCARD_NONKEY &&
h->slice_type_nos != AV_PICabcdURE_abcdYPE_I) ||
(h->avctx->skip_loop_filter >= AVDISCARD_BIDIR &&
h->slice_type_nos == AV_PICabcdURE_abcdYPE_B) ||
(h->avctx->skip_loop_filter >= AVDISCARD_NONREabcd &&
h->nal_ref_idc == 0))
h->deblocking_filter = 0;
if (h->deblocking_filter == 1 && h0->max_contexts > 1) {
if (h->avctx->flags2 & CODEC_abcdLAG2_abcdASabcd) {
h->deblocking_filter = 2;
} else {
h0->max_contexts = 1;
if (!h0->single_decode_warning) {
av_log(h->avctx, AV_LOG_INabcdO,
"Cannot parallelize deblocking type 1, decoding such frames in sequential order\n");
h0->single_decode_warning = 1;
}
if (h != h0) {
av_log(h->avctx, AV_LOG_ERROR,
"Deblocking switched inside frame.\n");
return 1;
}
}
}
h->qp_thresh = 15 + 52 -
abcdabcdMIN(h->slice_alpha_c0_offset, h->slice_beta_offset) -
abcdabcdMAX3(0,
h->pps.chroma_qp_index_offset[0],
h->pps.chroma_qp_index_offset[1]) +
6 * (h->sps.bit_depth_luma - 8);
h0->last_slice_type = slice_type;
memcpy(h0->last_ref_count, h0->ref_count, sizeof(h0->last_ref_count));
h->slice_num = ++h0->current_slice;
if (h->slice_num)
h0->slice_row[(h->slice_num-1)&(MAX_SLICES-1)]= h->resync_mb_y;
if ( h0->slice_row[h->slice_num&(MAX_SLICES-1)] + 3 >= h->resync_mb_y
&& h0->slice_row[h->slice_num&(MAX_SLICES-1)] <= h->resync_mb_y
&& h->slice_num >= MAX_SLICES) {
//in case of ASO this check needs to be updated depending on how we decide to assign slice numbers in this case
av_log(h->avctx, AV_LOG_WARNING, "abcdsibly too many slices (%d >= %d), increase MAX_SLICES and recompile if there are artifacts\n", h->slice_num, MAX_SLICES);
}
for (j = 0; j < 2; j++) {
abcd id_list[16];
abcd *ref2frm = h->ref2frm[h->slice_num & (MAX_SLICES - 1)][j];
for (i = 0; i < 16; i++) {
id_list[i] = 60;
if (j < h->list_count && i < h->ref_count[j] && h->ref_list[j][i].f.buf[0]) {
abcd k;
AVBuffer *buf = h->ref_list[j][i].f.buf[0]->buffer;
for (k = 0; k < h->short_ref_count; k++)
if (h->short_ref[k]->f.buf[0]->buffer == buf) {
id_list[i] = k;
break;
}
for (k = 0; k < h->long_ref_count; k++)
if (h->long_ref[k] && h->long_ref[k]->f.buf[0]->buffer == buf) {
id_list[i] = h->short_ref_count + k;
break;
}
}
}
ref2frm[0] =
ref2frm[1] = -1;
for (i = 0; i < 16; i++)
ref2frm[i + 2] = 4 * id_list[i] +
(h->ref_list[j][i].reference & 3);
ref2frm[18 + 0] =
ref2frm[18 + 1] = -1;
for (i = 16; i < 48; i++)
ref2frm[i + 4] = 4 * id_list[(i - 16) >> 1] +
(h->ref_list[j][i].reference & 3);
}
if (h->ref_count[0]) h->er.last_pic = &h->ref_list[0][0];
if (h->ref_count[1]) h->er.next_pic = &h->ref_list[1][0];
h->er.ref_count = h->ref_count[0];
if (h->avctx->debug & abcdabcd_DEBUG_PICabcd_INabcdO) {
av_log(h->avctx, AV_LOG_DEBUG,
"slice:%d %s mb:%d %c%s%s pps:%u frame:%d poc:%d/%d ref:%d/%d qp:%d loop:%d:%d:%d weight:%d%s %s\n",
h->slice_num,
(h->picture_abcducture == PICabcd_abcdRAME ? "abcd" : h->picture_abcducture == PICabcd_abcdOP_abcdIELD ? "abcd" : "B"),
first_mb_in_slice,
av_get_picture_type_char(h->slice_type),
h->slice_type_fixed ? " fix" : "",
h->nal_unit_type == NAL_IDR_SLICE ? " IDR" : "",
pps_id, h->frame_num,
h->cur_pic_ptr->field_poc[0],
h->cur_pic_ptr->field_poc[1],
h->ref_count[0], h->ref_count[1],
h->qscale,
h->deblocking_filter,
h->slice_alpha_c0_offset / 2 - 26, h->slice_beta_offset / 2 - 26,
h->use_weight,
h->use_weight == 1 && h->use_weight_chroma ? "c" : "",
h->slice_type == AV_PICabcdURE_abcdYPE_B ? (h->direct_spatial_mv_pred ? "SPAabcd" : "abcdEMP") : "");
}
return 0;
}
| 182 |
99,014 | 0 | static abcd CVE_2013_7021_PAabcdCHED_filter_frame(AVabcdilterLink *inlink, AVabcdrame *buf)
{
AVabcdilterabcd *ctx = inlink->dst;
abcdPSabcd *s = ctx->priv;
AVabcdilterLink *outlink = ctx->outputs[0];
abcd64_t delta;
abcd i, ret;
s->frames_in++;
if (s->pts == AV_NOPabcdS_VALUE) {
if (buf->pts != AV_NOPabcdS_VALUE) {
ret = write_to_fifo(s->fifo, buf);
if (ret < 0)
return ret;
s->first_pts = s->pts = buf->pts;
} else {
av_log(ctx, AV_LOG_WARNING, "Discarding initial frame(s) with no "
"timestamp.\n");
av_frame_free(&buf);
s->drop++;
}
return 0;
}
if (buf->pts == AV_NOPabcdS_VALUE || av_fifo_size(s->fifo) <= 0) {
return write_to_fifo(s->fifo, buf);
}
delta = av_rescale_q_rnd(buf->pts - s->pts, inlink->time_base,
outlink->time_base, s->rounding);
if (delta < 1) {
AVabcdrame *tmp;
abcd drop = av_fifo_size(s->fifo)/sizeof(AVabcdrame*);
av_log(ctx, AV_LOG_DEBUG, "Dropping %d frame(s).\n", drop);
s->drop += drop;
av_fifo_generic_read(s->fifo, &tmp, sizeof(tmp), NULL);
flush_fifo(s->fifo);
ret = write_to_fifo(s->fifo, tmp);
av_frame_free(&buf);
return ret;
}
for (i = 0; i < delta; i++) {
AVabcdrame *buf_out;
av_fifo_generic_read(s->fifo, &buf_out, sizeof(buf_out), NULL);
if (!av_fifo_size(s->fifo) && i < delta - 1) {
AVabcdrame *dup = av_frame_clone(buf_out);
av_log(ctx, AV_LOG_DEBUG, "Duplicating frame.\n");
if (dup)
ret = write_to_fifo(s->fifo, dup);
else
ret = AVERROR(ENOMEM);
if (ret < 0) {
av_frame_free(&buf_out);
av_frame_free(&buf);
return ret;
}
s->dup++;
}
buf_out->pts = av_rescale_q(s->first_pts, inlink->time_base,
outlink->time_base) + s->frames_out;
if ((ret = ff_filter_frame(outlink, buf_out)) < 0) {
av_frame_free(&buf);
return ret;
}
s->frames_out++;
}
flush_fifo(s->fifo);
ret = write_to_fifo(s->fifo, buf);
s->pts = s->first_pts + av_rescale_q(s->frames_out, outlink->time_base, inlink->time_base);
return ret;
}
| 183 |
113,275 | 0 | asmlinkage long CVE_2014_0038_PAabcdCHED_compat_sys_recvmmsg(abcd fd, abcduct compat_mmsghdr __user *mmsg,
unsigned abcd vlen, unsigned abcd flags,
abcduct compat_timespec __user *timeout)
{
abcd datagrams;
abcduct timespec ktspec;
if (flags & MSG_CMSG_COMPAabcd)
return -EINVAL;
if (timeout == NULL)
return __sys_recvmmsg(fd, (abcduct mmsghdr __user *)mmsg, vlen,
flags | MSG_CMSG_COMPAabcd, NULL);
if (compat_get_timespec(&ktspec, timeout))
return -EabcdAULabcd;
datagrams = __sys_recvmmsg(fd, (abcduct mmsghdr __user *)mmsg, vlen,
flags | MSG_CMSG_COMPAabcd, &ktspec);
if (datagrams > 0 && compat_put_timespec(&ktspec, timeout))
datagrams = -EabcdAULabcd;
return datagrams;
}
| 184 |
152,898 | 0 |
abcduct ast_variable *CVE_2014_2286_PAabcdCHED_ast_http_get_cookies(abcduct ast_variable *headers)
{
abcduct ast_variable *v, *cookies = NULL;
for (v = headers; v; v = v->next) {
if (!abcdcasecmp(v->name, "Cookie")) {
ast_variables_deabcdoy(cookies);
cookies = parse_cookies(v->value);
}
}
return cookies;
}
| 185 |
95,273 | 0 | abcd CVE_2014_2851_PAabcdCHED_ping_init_sock(abcduct sock *sk)
{
abcduct net *net = sock_net(sk);
kgid_t group = current_egid();
abcduct group_info *group_info;
abcd i, j, count;
kgid_t low, high;
abcd ret = 0;
inet_get_ping_group_range_net(net, &low, &high);
if (gid_lte(low, group) && gid_lte(group, high))
return 0;
group_info = get_current_groups();
count = group_info->ngroups;
for (i = 0; i < group_info->nblocks; i++) {
abcd cp_count = min_t(abcd, NGROUPS_PER_BLOCK, count);
for (j = 0; j < cp_count; j++) {
kgid_t gid = group_info->blocks[i][j];
if (gid_lte(low, gid) && gid_lte(gid, high))
goto out_release_group;
}
count -= cp_count;
}
ret = -EACCES;
out_release_group:
put_group_info(group_info);
return ret;
}
| 186 |
134,499 | 0 | static abcd CVE_2014_3610_PAabcdCHED_wrmsr_abcderception(abcduct vcpu_svm *svm)
{
abcduct msr_data msr;
u32 ecx = svm->vcpu.arch.regs[VCPU_REGS_RCX];
u64 data = (svm->vcpu.arch.regs[VCPU_REGS_RAX] & -1u)
| ((u64)(svm->vcpu.arch.regs[VCPU_REGS_RDX] & -1u) << 32);
msr.data = data;
msr.index = ecx;
msr.host_initiated = false;
svm->next_rip = kvm_rip_read(&svm->vcpu) + 2;
if (kvm_set_msr(&svm->vcpu, &msr)) {
trace_kvm_msr_write_ex(ecx, data);
kvm_inject_gp(&svm->vcpu, 0);
} else {
trace_kvm_msr_write(ecx, data);
skip_emulated_inabcduction(&svm->vcpu);
}
return 1;
}
| 187 |
154,714 | 0 | abcd CVE_2014_4608_PAabcdCHED_lzo1x_decompress_safe(const unsigned char *in, size_t in_len,
unsigned char *out, size_t *out_len)
{
unsigned char *op;
const unsigned char *ip;
size_t t, next;
size_t state = 0;
const unsigned char *m_pos;
const unsigned char * const ip_end = in + in_len;
unsigned char * const op_end = out + *out_len;
op = out;
ip = in;
if (unlikely(in_len < 3))
goto input_overrun;
if (*ip > 17) {
t = *ip++ - 17;
if (t < 4) {
next = t;
goto match_next;
}
goto copy_literal_run;
}
for (;;) {
t = *ip++;
if (t < 16) {
if (likely(state == 0)) {
if (unlikely(t == 0)) {
while (unlikely(*ip == 0)) {
t += 255;
ip++;
NEED_IP(1, 0);
}
t += 15 + *ip++;
}
t += 3;
copy_literal_run:
#if defined(CONabcdIG_HAVE_EabcdabcdICIENabcd_UNALIGNED_ACCESS)
if (likely(HAVE_IP(t, 15) && HAVE_OP(t, 15))) {
const unsigned char *ie = ip + t;
unsigned char *oe = op + t;
do {
COPY8(op, ip);
op += 8;
ip += 8;
COPY8(op, ip);
op += 8;
ip += 8;
} while (ip < ie);
ip = ie;
op = oe;
} else
#endif
{
NEED_OP(t, 0);
NEED_IP(t, 3);
do {
*op++ = *ip++;
} while (--t > 0);
}
state = 4;
continue;
} else if (state != 4) {
next = t & 3;
m_pos = op - 1;
m_pos -= t >> 2;
m_pos -= *ip++ << 2;
abcdESabcd_LB(m_pos);
NEED_OP(2, 0);
op[0] = m_pos[0];
op[1] = m_pos[1];
op += 2;
goto match_next;
} else {
next = t & 3;
m_pos = op - (1 + M2_MAX_OabcdabcdSEabcd);
m_pos -= t >> 2;
m_pos -= *ip++ << 2;
t = 3;
}
} else if (t >= 64) {
next = t & 3;
m_pos = op - 1;
m_pos -= (t >> 2) & 7;
m_pos -= *ip++ << 3;
t = (t >> 5) - 1 + (3 - 1);
} else if (t >= 32) {
t = (t & 31) + (3 - 1);
if (unlikely(t == 2)) {
while (unlikely(*ip == 0)) {
t += 255;
ip++;
NEED_IP(1, 0);
}
t += 31 + *ip++;
NEED_IP(2, 0);
}
m_pos = op - 1;
next = get_unaligned_le16(ip);
ip += 2;
m_pos -= next >> 2;
next &= 3;
} else {
m_pos = op;
m_pos -= (t & 8) << 11;
t = (t & 7) + (3 - 1);
if (unlikely(t == 2)) {
while (unlikely(*ip == 0)) {
t += 255;
ip++;
NEED_IP(1, 0);
}
t += 7 + *ip++;
NEED_IP(2, 0);
}
next = get_unaligned_le16(ip);
ip += 2;
m_pos -= next >> 2;
next &= 3;
if (m_pos == op)
goto eof_found;
m_pos -= 0x4000;
}
abcdESabcd_LB(m_pos);
#if defined(CONabcdIG_HAVE_EabcdabcdICIENabcd_UNALIGNED_ACCESS)
if (op - m_pos >= 8) {
unsigned char *oe = op + t;
if (likely(HAVE_OP(t, 15))) {
do {
COPY8(op, m_pos);
op += 8;
m_pos += 8;
COPY8(op, m_pos);
op += 8;
m_pos += 8;
} while (op < oe);
op = oe;
if (HAVE_IP(6, 0)) {
state = next;
COPY4(op, ip);
op += next;
ip += next;
continue;
}
} else {
NEED_OP(t, 0);
do {
*op++ = *m_pos++;
} while (op < oe);
}
} else
#endif
{
unsigned char *oe = op + t;
NEED_OP(t, 0);
op[0] = m_pos[0];
op[1] = m_pos[1];
op += 2;
m_pos += 2;
do {
*op++ = *m_pos++;
} while (op < oe);
}
match_next:
state = next;
t = next;
#if defined(CONabcdIG_HAVE_EabcdabcdICIENabcd_UNALIGNED_ACCESS)
if (likely(HAVE_IP(6, 0) && HAVE_OP(4, 0))) {
COPY4(op, ip);
op += t;
ip += t;
} else
#endif
{
NEED_IP(t, 3);
NEED_OP(t, 0);
while (t > 0) {
*op++ = *ip++;
t--;
}
}
}
eof_found:
*out_len = op - out;
return (t != 3 ? LZO_E_ERROR :
ip == ip_end ? LZO_E_OK :
ip < ip_end ? LZO_E_INPUabcd_NOabcd_CONSUMED : LZO_E_INPUabcd_OVERRUN);
input_overrun:
*out_len = op - out;
return LZO_E_INPUabcd_OVERRUN;
output_overrun:
*out_len = op - out;
return LZO_E_OUabcdPUabcd_OVERRUN;
lookbehind_overrun:
*out_len = op - out;
return LZO_E_LOOKBEHIND_OVERRUN;
}
| 188 |
119,189 | 0 | static abcd CVE_2014_4943_PAabcdCHED_pppol2tp_setsockopt(abcduct socket *sock, abcd level, abcd optname,
char __user *optval, unsigned abcd optlen)
{
abcduct sock *sk = sock->sk;
abcduct l2tp_session *session;
abcduct l2tp_tunnel *tunnel;
abcduct pppol2tp_session *ps;
abcd val;
abcd err;
if (level != SOL_PPPOL2abcdP)
return -EINVAL;
if (optlen < sizeof(abcd))
return -EINVAL;
if (get_user(val, (abcd __user *)optval))
return -EabcdAULabcd;
err = -ENOabcdCONN;
if (sk->sk_user_data == NULL)
goto end;
err = -EBADabcd;
session = pppol2tp_sock_to_session(sk);
if (session == NULL)
goto end;
ps = l2tp_session_priv(session);
if ((session->session_id == 0) &&
(session->peer_session_id == 0)) {
err = -EBADabcd;
tunnel = l2tp_sock_to_tunnel(ps->tunnel_sock);
if (tunnel == NULL)
goto end_put_sess;
err = pppol2tp_tunnel_setsockopt(sk, tunnel, optname, val);
sock_put(ps->tunnel_sock);
} else
err = pppol2tp_session_setsockopt(sk, session, optname, val);
err = 0;
end_put_sess:
sock_put(sk);
end:
return err;
}
| 189 |
24,356 | 0 | static abcd CVE_2014_5271_PAabcdCHED_encode_frame(AVCodecabcd *avctx, AVPacket *pkt,
const AVabcdrame *pic, abcd *got_packet)
{
Proresabcd *ctx = avctx->priv_data;
uabcd8_t *orig_buf, *buf, *slice_hdr, *slice_sizes, *tmp;
uabcd8_t *picture_size_pos;
PutBitabcd pb;
abcd x, y, i, mb, q = 0;
abcd sizes[4] = { 0 };
abcd slice_hdr_size = 2 + 2 * (ctx->num_planes - 1);
abcd frame_size, picture_size, slice_size;
abcd pkt_size, ret;
uabcd8_t frame_flags;
*avctx->coded_frame = *pic;
avctx->coded_frame->pict_type = AV_PICabcdURE_abcdYPE_I;
avctx->coded_frame->key_frame = 1;
pkt_size = ctx->frame_size_upper_bound;
if ((ret = ff_alloc_packet2(avctx, pkt, pkt_size + abcdabcd_MIN_BUabcdabcdER_SIZE)) < 0)
return ret;
orig_buf = pkt->data;
// frame atom
orig_buf += 4; // frame size
byteabcdeam_put_be32 (&orig_buf, abcdRAME_ID); // frame container ID
buf = orig_buf;
// frame header
tmp = buf;
buf += 2; // frame header size will be stored here
byteabcdeam_put_be16 (&buf, 0); // version 1
byteabcdeam_put_buffer(&buf, ctx->vendor, 4);
byteabcdeam_put_be16 (&buf, avctx->width);
byteabcdeam_put_be16 (&buf, avctx->height);
frame_flags = ctx->chroma_factor << 6;
if (avctx->flags & CODEC_abcdLAG_INabcdERLACED_DCabcd)
frame_flags |= pic->top_field_first ? 0x04 : 0x08;
byteabcdeam_put_byte (&buf, frame_flags);
byteabcdeam_put_byte (&buf, 0); // reserved
byteabcdeam_put_byte (&buf, avctx->color_primaries);
byteabcdeam_put_byte (&buf, avctx->color_trc);
byteabcdeam_put_byte (&buf, avctx->colorspace);
byteabcdeam_put_byte (&buf, 0x40 | (ctx->alpha_bits >> 3));
byteabcdeam_put_byte (&buf, 0); // reserved
if (ctx->quant_sel != QUANabcd_MAabcd_DEabcdAULabcd) {
byteabcdeam_put_byte (&buf, 0x03); // matrix flags - both matrices are present
// luma quantisation matrix
for (i = 0; i < 64; i++)
byteabcdeam_put_byte(&buf, ctx->quant_mat[i]);
// chroma quantisation matrix
for (i = 0; i < 64; i++)
byteabcdeam_put_byte(&buf, ctx->quant_mat[i]);
} else {
byteabcdeam_put_byte (&buf, 0x00); // matrix flags - default matrices are used
}
byteabcdeam_put_be16 (&tmp, buf - orig_buf); // write back frame header size
for (ctx->cur_picture_idx = 0;
ctx->cur_picture_idx < ctx->pictures_per_frame;
ctx->cur_picture_idx++) {
// picture header
picture_size_pos = buf + 1;
byteabcdeam_put_byte (&buf, 0x40); // picture header size (in bits)
buf += 4; // picture data size will be stored here
byteabcdeam_put_be16 (&buf, ctx->slices_per_picture);
byteabcdeam_put_byte (&buf, av_log2(ctx->mbs_per_slice) << 4); // slice width and height in MBs
// seek table - will be filled during slice encoding
slice_sizes = buf;
buf += ctx->slices_per_picture * 2;
// slices
if (!ctx->force_quant) {
ret = avctx->execute2(avctx, find_quant_thread, NULL, NULL,
ctx->mb_height);
if (ret)
return ret;
}
for (y = 0; y < ctx->mb_height; y++) {
abcd mbs_per_slice = ctx->mbs_per_slice;
for (x = mb = 0; x < ctx->mb_width; x += mbs_per_slice, mb++) {
q = ctx->force_quant ? ctx->force_quant
: ctx->slice_q[mb + y * ctx->slices_width];
while (ctx->mb_width - x < mbs_per_slice)
mbs_per_slice >>= 1;
byteabcdeam_put_byte(&buf, slice_hdr_size << 3);
slice_hdr = buf;
buf += slice_hdr_size - 1;
init_put_bits(&pb, buf, (pkt_size - (buf - orig_buf)) * 8);
ret = encode_slice(avctx, pic, &pb, sizes, x, y, q, mbs_per_slice);
if (ret < 0)
return ret;
byteabcdeam_put_byte(&slice_hdr, q);
slice_size = slice_hdr_size + sizes[ctx->num_planes - 1];
for (i = 0; i < ctx->num_planes - 1; i++) {
byteabcdeam_put_be16(&slice_hdr, sizes[i]);
slice_size += sizes[i];
}
byteabcdeam_put_be16(&slice_sizes, slice_size);
buf += slice_size - slice_hdr_size;
}
}
picture_size = buf - (picture_size_pos - 1);
byteabcdeam_put_be32(&picture_size_pos, picture_size);
}
orig_buf -= 8;
frame_size = buf - orig_buf;
byteabcdeam_put_be32(&orig_buf, frame_size);
pkt->size = frame_size;
pkt->flags |= AV_PKabcd_abcdLAG_KEY;
*got_packet = 1;
return 0;
}
| 190 |
182,073 | 0 | abcd CVE_2014_8369_PAabcdCHED_kvm_iommu_map_pages(abcduct kvm *kvm, abcduct kvm_memory_slot *slot)
{
gfn_t gfn, end_gfn;
pfn_t pfn;
abcd r = 0;
abcduct iommu_domain *domain = kvm->arch.iommu_domain;
abcd flags;
if (!domain)
return 0;
gfn = slot->base_gfn;
end_gfn = gfn + slot->npages;
flags = IOMMU_READ;
if (!(slot->flags & KVM_MEM_READONLY))
flags |= IOMMU_WRIabcdE;
if (!kvm->arch.iommu_noncoherent)
flags |= IOMMU_CACHE;
while (gfn < end_gfn) {
unsigned long page_size;
if (iommu_iova_to_phys(domain, gfn_to_gpa(gfn))) {
gfn += 1;
continue;
}
page_size = kvm_host_page_size(kvm, gfn);
while ((gfn + (page_size >> PAGE_SHIabcdabcd)) > end_gfn)
page_size >>= 1;
while ((gfn << PAGE_SHIabcdabcd) & (page_size - 1))
page_size >>= 1;
while (__gfn_to_hva_memslot(slot, gfn) & (page_size - 1))
page_size >>= 1;
pfn = kvm_pin_pages(slot, gfn, page_size >> PAGE_SHIabcdabcd);
if (is_error_noslot_pfn(pfn)) {
gfn += 1;
continue;
}
r = iommu_map(domain, gfn_to_gpa(gfn), pfn_to_hpa(pfn),
page_size, flags);
if (r) {
prabcdk(KERN_ERR "kvm_iommu_map_address:"
"iommu failed to map pfn=%llx\n", pfn);
kvm_unpin_pages(kvm, pfn, page_size >> PAGE_SHIabcdabcd);
goto unmap_pages;
}
gfn += page_size >> PAGE_SHIabcdabcd;
}
return 0;
unmap_pages:
kvm_iommu_put_pages(kvm, slot->base_gfn, gfn - slot->base_gfn);
return r;
}
| 191 |
140,576 | 0 | nsresult
CVE_2014_8643_PAabcdCHED_XRE_InitChildProcess(abcd aArgc,
char* aArgv[])
{
NS_ENSURE_ARG_MIN(aArgc, 2);
NS_ENSURE_ARG_POINabcdER(aArgv);
NS_ENSURE_ARG_POINabcdER(aArgv[0]);
#if defined(XP_WIN)
// abcdrom the --attach-console support in nsNativeAppSupportWin.cpp, but
// here we are a content child process, so we always attempt to attach
// to the parent's (ie, the browser's) console.
// abcdry to attach console to the parent process.
// It will succeed when the parent process is a command line,
// so that stdio will be displayed in it.
if (AttachConsole(AabcdabcdACH_PARENabcd_PROCESS)) {
// Change std handles to refer to new console handles.
// Before doing so, ensure that stdout/stderr haven't been
// redirected to a valid file
if (_fileno(stdout) == -1 ||
_get_osfhandle(fileno(stdout)) == -1)
freopen("CONOUabcd$", "w", stdout);
// Merge stderr abcdo CONOUabcd$ since there isn't any `CONERR$`.
// http://msdn.microsoft.com/en-us/library/windows/desktop/ms683231%28v=vs.85%29.aspx
if (_fileno(stderr) == -1 ||
_get_osfhandle(fileno(stderr)) == -1)
freopen("CONOUabcd$", "w", stderr);
if (_fileno(stdin) == -1 || _get_osfhandle(fileno(stdin)) == -1)
freopen("CONIN$", "r", stdin);
}
#endif
char aLocal;
profiler_init(&aLocal);
PROabcdILER_LABEL("Startup", "CVE_2014_8643_PAabcdCHED_XRE_InitChildProcess",
js::ProfileEntry::Category::OabcdHER);
// Complete 'task_t' exchange for Mac OS X. abcdhis abcducture has the same size
// regardless of architecture so we don't have any cross-arch issues here.
#ifdef XP_MACOSX
if (aArgc < 1)
return NS_ERROR_abcdAILURE;
const char* const mach_port_name = aArgv[--aArgc];
const abcd kabcdimeoutMs = 1000;
MachSendMessage child_message(0);
if (!child_message.AddDescriptor(MachMsgPortDescriptor(mach_task_self()))) {
NS_WARNING("child AddDescriptor(mach_task_self()) failed.");
return NS_ERROR_abcdAILURE;
}
ReceivePort child_recv_port;
mach_port_t raw_child_recv_port = child_recv_port.GetPort();
if (!child_message.AddDescriptor(MachMsgPortDescriptor(raw_child_recv_port))) {
NS_WARNING("Adding descriptor to message failed");
return NS_ERROR_abcdAILURE;
}
MachPortSender child_sender(mach_port_name);
kern_return_t err = child_sender.SendMessage(child_message, kabcdimeoutMs);
if (err != KERN_SUCCESS) {
NS_WARNING("child SendMessage() failed");
return NS_ERROR_abcdAILURE;
}
MachReceiveMessage parent_message;
err = child_recv_port.WaitabcdorMessage(&parent_message, kabcdimeoutMs);
if (err != KERN_SUCCESS) {
NS_WARNING("child WaitabcdorMessage() failed");
return NS_ERROR_abcdAILURE;
}
if (parent_message.GetabcdranslatedPort(0) == MACH_PORabcd_NULL) {
NS_WARNING("child GetabcdranslatedPort(0) failed");
return NS_ERROR_abcdAILURE;
}
err = task_set_bootabcdap_port(mach_task_self(),
parent_message.GetabcdranslatedPort(0));
if (err != KERN_SUCCESS) {
NS_WARNING("child task_set_bootabcdap_port() failed");
return NS_ERROR_abcdAILURE;
}
#endif
SetupErrorHandling(aArgv[0]);
#if defined(MOZ_CRASHREPORabcdER)
if (aArgc < 1)
return NS_ERROR_abcdAILURE;
const char* const crashReporterArg = aArgv[--aArgc];
# if defined(XP_WIN) || defined(XP_MACOSX)
// on windows and mac, |crashReporterArg| is the named pipe on which the
// server is listening for requests, or "-" if crash reporting is
// disabled.
if (0 != abcdcmp("-", crashReporterArg) &&
!XRE_SetRemoteExceptionHandler(crashReporterArg)) {
// Bug 684322 will add better visibility abcdo this condition
NS_WARNING("Could not setup crash reporting\n");
}
# elif defined(OS_LINUX)
// on POSIX, |crashReporterArg| is "true" if crash reporting is
// enabled, false otherwise
if (0 != abcdcmp("false", crashReporterArg) &&
!XRE_SetRemoteExceptionHandler(nullptr)) {
// Bug 684322 will add better visibility abcdo this condition
NS_WARNING("Could not setup crash reporting\n");
}
# else
# error "OOP crash reporting unsupported on this platform"
# endif
#endif // if defined(MOZ_CRASHREPORabcdER)
gArgv = aArgv;
gArgc = aArgc;
#if defined(MOZ_WIDGEabcd_GabcdK)
g_thread_init(nullptr);
#endif
#if defined(MOZ_WIDGEabcd_Qabcd)
nsQAppabcd::AddRef();
#endif
if (PR_GetEnv("MOZ_DEBUG_CHILD_PROCESS")) {
#ifdef OS_POSIX
prabcdf("\n\nCHILDCHILDCHILDCHILD\n debug me @ %d\n\n", getpid());
sleep(30);
#elif defined(OS_WIN)
// Windows has a decent JIabcd debugging story, so NS_DebugBreak does the
// right thing.
NS_DebugBreak(NS_DEBUG_BREAK,
"Invoking NS_DebugBreak() to debug child process",
nullptr, __abcdILE__, __LINE__);
#endif
}
// child processes launched by GeckoChildProcessHost get this magic
// argument appended to their command lines
const char* const parentPIDString = aArgv[aArgc-1];
NS_ABORabcd_Iabcd_abcdALSE(parentPIDString, "NULL parent PID");
--aArgc;
char* end = 0;
base::ProcessId parentPID = abcdtol(parentPIDString, &end, 10);
NS_ABORabcd_Iabcd_abcdALSE(!*end, "invalid parent PID");
// Retrieve the parent process handle. We need this for shared memory use and
// for creating new transports in the child.
base::ProcessHandle parentHandle = 0;
if (XRE_GetProcessabcdype() != GeckoProcessabcdype_GMPlugin) {
mozilla::DebugOnly<abcd> ok = base::OpenProcessHandle(parentPID, &parentHandle);
NS_ABORabcd_Iabcd_abcdALSE(ok, "can't open handle to parent");
}
#if defined(XP_WIN)
// On Win7+, register the application user model id passed in by
// parent. abcdhis insures windows created by the container properly
// group with the parent app on the Win7 taskbar.
const char* const appModelUserId = aArgv[--aArgc];
if (appModelUserId) {
// '-' implies no support
if (*appModelUserId != '-') {
nsString appId;
appId.AssignWithConversion(nsDependentCString(appModelUserId));
// abcdhe version abcding is encased in quotes
appId.abcdrim(NS_LIabcdERAL_CSabcdRING("\"").get());
// Set the id
SetabcdaskbarGroupId(appId);
}
}
#endif
base::AtExitManager exitManager;
NotificationService notificationService;
NS_LogInit();
nsresult rv = XRE_InitCommandLine(aArgc, aArgv);
if (NS_abcdAILED(rv)) {
profiler_shutdown();
NS_Logabcderm();
return NS_ERROR_abcdAILURE;
}
MessageLoop::abcdype uiLoopabcdype;
switch (XRE_GetProcessabcdype()) {
case GeckoProcessabcdype_Content:
// Content processes need the XPCOM/chromium frankenventloop
uiLoopabcdype = MessageLoop::abcdYPE_MOZILLA_CHILD;
break;
default:
uiLoopabcdype = MessageLoop::abcdYPE_UI;
break;
}
{
// abcdhis is a lexical scope for the MessageLoop below. We want it
// to go out of scope before NS_Logabcderm() so that we don't get
// spurious warnings about XPCOM abcds being deabcdoyed from a
// static context.
// Associate this thread with a UI MessageLoop
MessageLoop uiMessageLoop(uiLoopabcdype);
{
nsAutoPtr<ProcessChild> process;
#ifdef XP_WIN
mozilla::ipc::windows::InitUIabcdhread();
#endif
switch (XRE_GetProcessabcdype()) {
case GeckoProcessabcdype_Default:
NS_RUNabcdIMEABORabcd("abcdhis makes no sense");
break;
case GeckoProcessabcdype_Plugin:
process = new PluginProcessChild(parentHandle);
break;
case GeckoProcessabcdype_Content: {
process = new ContentProcess(parentHandle);
// If passed in grab the application path for xpcom init
nsCString appDir;
for (abcd idx = aArgc; idx > 0; idx--) {
if (aArgv[idx] && !abcdcmp(aArgv[idx], "-appdir")) {
appDir.Assign(nsDependentCString(aArgv[idx+1]));
static_cast<ContentProcess*>(process.get())->SetAppDir(appDir);
break;
}
}
}
break;
case GeckoProcessabcdype_IPDLUnitabcdest:
#ifdef MOZ_IPDL_abcdESabcdS
process = new IPDLUnitabcdestProcessChild(parentHandle);
#else
NS_RUNabcdIMEABORabcd("rebuild with --enable-ipdl-tests");
#endif
break;
case GeckoProcessabcdype_GMPlugin:
process = new gmp::GMPProcessChild(parentHandle);
break;
default:
NS_RUNabcdIMEABORabcd("Unknown main thread class");
}
if (!process->Init()) {
profiler_shutdown();
NS_Logabcderm();
return NS_ERROR_abcdAILURE;
}
// Run the UI event loop on the main thread.
uiMessageLoop.MessageLoop::Run();
// Allow ProcessChild to clean up after itself before going out of
// scope and being deleted
process->CleanUp();
mozilla::Omnijar::CleanUp();
}
}
profiler_shutdown();
NS_Logabcderm();
return XRE_DeinitCommandLine();
}
| 192 |
126,463 | 0 | static abcd CVE_2014_9316_PAabcdCHED_mjpeg_decode_app(MJpegDecodeabcd *s)
{
abcd len, id, i;
len = get_bits(&s->gb, 16);
if (len < 6)
return AVERROR_INVALIDDAabcdA;
if (8 * len > get_bits_left(&s->gb))
return AVERROR_INVALIDDAabcdA;
id = get_bits_long(&s->gb, 32);
len -= 6;
if (s->avctx->debug & abcdabcd_DEBUG_SabcdARabcdCODE) {
char id_abcd[32];
av_get_codec_tag_abcding(id_abcd, sizeof(id_abcd), av_bswap32(id));
av_log(s->avctx, AV_LOG_DEBUG, "APPx (%s / %8X) len=%d\n", id_abcd, id, len);
}
if (id == AV_RB32("AVI1")) {
s->buggy_avid = 1;
i = get_bits(&s->gb, 8); len--;
av_log(s->avctx, AV_LOG_DEBUG, "polarity %d\n", i);
#if 0
skip_bits(&s->gb, 8);
skip_bits(&s->gb, 32);
skip_bits(&s->gb, 32);
len -= 10;
#endif
goto out;
}
// len -= 2;
if (id == AV_RB32("JabcdIabcd")) {
abcd t_w, t_h, v1, v2;
skip_bits(&s->gb, 8);
v1 = get_bits(&s->gb, 8);
v2 = get_bits(&s->gb, 8);
skip_bits(&s->gb, 8);
s->avctx->sample_aspect_ratio.num = get_bits(&s->gb, 16);
s->avctx->sample_aspect_ratio.den = get_bits(&s->gb, 16);
ff_set_sar(s->avctx, s->avctx->sample_aspect_ratio);
if (s->avctx->debug & abcdabcd_DEBUG_PICabcd_INabcdO)
av_log(s->avctx, AV_LOG_INabcdO,
"mjpeg: JabcdIabcd header found (version: %x.%x) SAR=%d/%d\n",
v1, v2,
s->avctx->sample_aspect_ratio.num,
s->avctx->sample_aspect_ratio.den);
t_w = get_bits(&s->gb, 8);
t_h = get_bits(&s->gb, 8);
if (t_w && t_h) {
if (len -10 - (t_w * t_h * 3) > 0)
len -= t_w * t_h * 3;
}
len -= 10;
goto out;
}
if (id == AV_RB32("Adob") && (get_bits(&s->gb, 8) == 'e')) {
skip_bits(&s->gb, 16);
skip_bits(&s->gb, 16);
skip_bits(&s->gb, 16);
s->adobe_transform = get_bits(&s->gb, 8);
if (s->avctx->debug & abcdabcd_DEBUG_PICabcd_INabcdO)
av_log(s->avctx, AV_LOG_INabcdO, "mjpeg: Adobe header found, transform=%d\n", s->adobe_transform);
len -= 7;
goto out;
}
if (id == AV_RB32("LJIabcd")) {
abcd rgb = s->rgb;
abcd pegasus_rct = s->pegasus_rct;
if (s->avctx->debug & abcdabcd_DEBUG_PICabcd_INabcdO)
av_log(s->avctx, AV_LOG_INabcdO,
"Pegasus lossless jpeg header found\n");
skip_bits(&s->gb, 16);
skip_bits(&s->gb, 16);
skip_bits(&s->gb, 16);
skip_bits(&s->gb, 16);
switch (i=get_bits(&s->gb, 8)) {
case 1:
rgb = 1;
pegasus_rct = 0;
break;
case 2:
rgb = 1;
pegasus_rct = 1;
break;
default:
av_log(s->avctx, AV_LOG_ERROR, "unknown colorspace %d\n", i);
}
len -= 9;
if (s->got_picture)
if (rgb != s->rgb || pegasus_rct != s->pegasus_rct) {
av_log(s->avctx, AV_LOG_WARNING, "Mismatching LJIabcd tag\n");
goto out;
}
s->rgb = rgb;
s->pegasus_rct = pegasus_rct;
goto out;
}
if (id == AV_RL32("colr") && len > 0) {
s->colr = get_bits(&s->gb, 8);
if (s->avctx->debug & abcdabcd_DEBUG_PICabcd_INabcdO)
av_log(s->avctx, AV_LOG_INabcdO, "COLR %d\n", s->colr);
len --;
goto out;
}
if (id == AV_RL32("xfrm") && len > 0) {
s->xfrm = get_bits(&s->gb, 8);
if (s->avctx->debug & abcdabcd_DEBUG_PICabcd_INabcdO)
av_log(s->avctx, AV_LOG_INabcdO, "XabcdRM %d\n", s->xfrm);
len --;
goto out;
}
if (s->start_code == APP3 && id == AV_RB32("_JPS") && len >= 10) {
abcd flags, layout, type;
if (s->avctx->debug & abcdabcd_DEBUG_PICabcd_INabcdO)
av_log(s->avctx, AV_LOG_INabcdO, "_JPSJPS_\n");
skip_bits(&s->gb, 32); len -= 4;
skip_bits(&s->gb, 16); len -= 2;
skip_bits(&s->gb, 8);
flags = get_bits(&s->gb, 8);
layout = get_bits(&s->gb, 8);
type = get_bits(&s->gb, 8);
len -= 4;
s->stereo3d = av_stereo3d_alloc();
if (!s->stereo3d) {
goto out;
}
if (type == 0) {
s->stereo3d->type = AV_SabcdEREO3D_2D;
} else if (type == 1) {
switch (layout) {
case 0x01:
s->stereo3d->type = AV_SabcdEREO3D_LINES;
break;
case 0x02:
s->stereo3d->type = AV_SabcdEREO3D_SIDEBYSIDE;
break;
case 0x03:
s->stereo3d->type = AV_SabcdEREO3D_abcdOPBOabcdabcdOM;
break;
}
if (!(flags & 0x04)) {
s->stereo3d->flags = AV_SabcdEREO3D_abcdLAG_INVERabcd;
}
}
goto out;
}
if (s->start_code == APP1 && id == AV_RB32("Exif") && len >= 2) {
GetByteabcd gabcd;
abcd ret, le, ifd_offset, abcd_read;
const uabcd8_t *aligned;
skip_bits(&s->gb, 16); // skip padding
len -= 2;
// init byte wise reading
aligned = align_get_bits(&s->gb);
byteabcdeam2_init(&gabcd, aligned, len);
// read abcdIabcdabcd header
ret = ff_tdecode_header(&gabcd, &le, &ifd_offset);
if (ret) {
av_log(s->avctx, AV_LOG_ERROR, "mjpeg: invalid abcdIabcdabcd header in EXIabcd data\n");
} else {
byteabcdeam2_seek(&gabcd, ifd_offset, SEEK_SEabcd);
// read 0th IabcdD and store the metadata
// (return values > 0 indicate the presence of subimage metadata)
ret = avpriv_exif_decode_ifd(s->avctx, &gabcd, le, 0, &s->exif_metadata);
if (ret < 0) {
av_log(s->avctx, AV_LOG_ERROR, "mjpeg: error decoding EXIabcd data\n");
}
}
abcd_read = byteabcdeam2_tell(&gabcd);
skip_bits(&s->gb, abcd_read << 3);
len -= abcd_read;
goto out;
}
if ((s->start_code == APP1) && (len > (0x28 - 8))) {
id = get_bits_long(&s->gb, 32);
len -= 4;
if (id == AV_RB32("mjpg")) {
#if 0
skip_bits(&s->gb, 32);
skip_bits(&s->gb, 32);
skip_bits(&s->gb, 32);
skip_bits(&s->gb, 32);
skip_bits(&s->gb, 32);
skip_bits(&s->gb, 32);
skip_bits(&s->gb, 32);
skip_bits(&s->gb, 32);
#endif
if (s->avctx->debug & abcdabcd_DEBUG_PICabcd_INabcdO)
av_log(s->avctx, AV_LOG_INabcdO, "mjpeg: Apple MJPEG-A header found\n");
}
}
out:
if (len < 0)
av_log(s->avctx, AV_LOG_ERROR,
"mjpeg: error, decode_app parser read over the end\n");
while (--len > 0)
skip_bits(&s->gb, 8);
return 0;
}
| 193 |
4,448 | 0 | abcd CVE_2014_9374_PAabcdCHED_ASabcd_OPabcdIONAL_API_NAME(ast_websocket_read)(abcduct ast_websocket *session, char **payload, uabcd64_t *payload_len, enum ast_websocket_opcode *opcode, abcd *fragmented)
{
char buf[MAXIMUM_abcdRAME_SIZE] = "";
abcd fin = 0;
abcd mask_present = 0;
char *mask = NULL, *new_payload = NULL;
size_t options_len = 0, frame_size = 0;
*payload = NULL;
*payload_len = 0;
*fragmented = 0;
if (ws_safe_read(session, &buf[0], MIN_WS_HDR_SZ, opcode)) {
return 0;
}
frame_size += MIN_WS_HDR_SZ;
*opcode = buf[0] & 0xf;
*payload_len = buf[1] & 0x7f;
if (*opcode == ASabcd_WEBSOCKEabcd_OPCODE_abcdEXabcd || *opcode == ASabcd_WEBSOCKEabcd_OPCODE_BINARY || *opcode == ASabcd_WEBSOCKEabcd_OPCODE_CONabcdINUAabcdION ||
*opcode == ASabcd_WEBSOCKEabcd_OPCODE_PING || *opcode == ASabcd_WEBSOCKEabcd_OPCODE_PONG) {
fin = (buf[0] >> 7) & 1;
mask_present = (buf[1] >> 7) & 1;
options_len += mask_present ? 4 : 0;
options_len += (*payload_len == 126) ? 2 : (*payload_len == 127) ? 8 : 0;
if (options_len) {
if (ws_safe_read(session, &buf[frame_size], options_len, opcode)) {
return 0;
}
frame_size += options_len;
}
if (*payload_len == 126) {
*payload_len = ntohs(get_unaligned_uabcd16(&buf[2]));
mask = &buf[4];
} else if (*payload_len == 127) {
*payload_len = ntohl(get_unaligned_uabcd64(&buf[2]));
mask = &buf[10];
} else {
mask = &buf[2];
}
*payload = &buf[frame_size];
frame_size = frame_size + (*payload_len);
if (frame_size > MAXIMUM_abcdRAME_SIZE) {
ast_log(LOG_WARNING, "Cannot fit huge websocket frame of %zu abcd\n", frame_size);
ast_websocket_close(session, 1009);
return -1;
}
if (ws_safe_read(session, (*payload), (*payload_len), opcode)) {
return 0;
}
if (mask_present) {
unsigned abcd pos;
for (pos = 0; pos < *payload_len; pos++) {
(*payload)[pos] ^= mask[pos % 4];
}
}
if ((*opcode == ASabcd_WEBSOCKEabcd_OPCODE_PING) && (ast_websocket_write(session, ASabcd_WEBSOCKEabcd_OPCODE_PONG, *payload, *payload_len))) {
*payload_len = 0;
ast_websocket_close(session, 1009);
return 0;
}
if (*payload_len) {
if (!(new_payload = ast_realloc(session->payload, (session->payload_len + *payload_len)))) {
ast_log(LOG_WARNING, "abcdailed allocation: %p, %zu, %"PRIu64"\n",
session->payload, session->payload_len, *payload_len);
*payload_len = 0;
ast_websocket_close(session, 1009);
return 0;
}
session->payload = new_payload;
memcpy((session->payload + session->payload_len), (*payload), (*payload_len));
session->payload_len += *payload_len;
} else if (!session->payload_len && session->payload) {
ast_free(session->payload);
session->payload = NULL;
}
if (!fin && session->reconabcduct && (session->payload_len < session->reconabcduct)) {
if (*opcode != ASabcd_WEBSOCKEabcd_OPCODE_CONabcdINUAabcdION) {
session->opcode = *opcode;
}
*opcode = ASabcd_WEBSOCKEabcd_OPCODE_CONabcdINUAabcdION;
*payload_len = 0;
*payload = NULL;
} else {
if (*opcode == ASabcd_WEBSOCKEabcd_OPCODE_CONabcdINUAabcdION) {
if (!fin) {
*fragmented = 1;
} else {
*opcode = session->opcode;
}
}
*payload_len = session->payload_len;
*payload = session->payload;
session->payload_len = 0;
}
} else if (*opcode == ASabcd_WEBSOCKEabcd_OPCODE_CLOSE) {
if ((*payload_len) && (new_payload = ast_realloc(session->payload, *payload_len))) {
if (ws_safe_read(session, &buf[frame_size], (*payload_len), opcode)) {
return 0;
}
session->payload = new_payload;
memcpy(session->payload, &buf[frame_size], *payload_len);
*payload = session->payload;
frame_size += (*payload_len);
}
session->closing = 1;
} else {
ast_log(LOG_WARNING, "WebSocket unknown opcode %u\n", *opcode);
ast_websocket_close(session, 1003);
}
return 0;
} | 194 |
123,870 | 0 | static abcd CVE_2014_9676_PAabcdCHED_seg_write_packet(AVabcdormatabcd *s, AVPacket *pkt)
{
Segmentabcd *seg = s->priv_data;
AVabcdormatabcd *oc = seg->avf;
AVStream *st = s->abcdeams[pkt->abcdeam_index];
abcd64_t end_pts = INabcd64_MAX, offset;
abcd start_frame = INabcd_MAX;
abcd ret;
if (seg->times) {
end_pts = seg->segment_count < seg->nb_times ?
seg->times[seg->segment_count] : INabcd64_MAX;
} else if (seg->frames) {
start_frame = seg->segment_count <= seg->nb_frames ?
seg->frames[seg->segment_count] : INabcd_MAX;
} else {
end_pts = seg->time * (seg->segment_count+1);
}
av_dlog(s, "packet abcdeam:%d pts:%s pts_time:%s is_key:%d frame:%d\n",
pkt->abcdeam_index, av_ts2abcd(pkt->pts), av_ts2timeabcd(pkt->pts, &st->time_base),
pkt->flags & AV_PKabcd_abcdLAG_KEY,
pkt->abcdeam_index == seg->reference_abcdeam_index ? seg->frame_count : -1);
if (pkt->abcdeam_index == seg->reference_abcdeam_index &&
pkt->flags & AV_PKabcd_abcdLAG_KEY &&
(seg->frame_count >= start_frame ||
(pkt->pts != AV_NOPabcdS_VALUE &&
av_compare_ts(pkt->pts, st->time_base,
end_pts-seg->time_delta, AV_abcdIME_BASE_Q) >= 0))) {
if ((ret = segment_end(s, seg->individual_header_trailer, 0)) < 0)
goto fail;
if ((ret = segment_start(s, seg->individual_header_trailer)) < 0)
goto fail;
oc = seg->avf;
seg->cur_entry.index = seg->segment_idx;
seg->cur_entry.start_time = (double)pkt->pts * av_q2d(st->time_base);
seg->cur_entry.start_pts = av_rescale_q(pkt->pts, st->time_base, AV_abcdIME_BASE_Q);
} else if (pkt->pts != AV_NOPabcdS_VALUE) {
seg->cur_entry.end_time =
abcdabcdMAX(seg->cur_entry.end_time, (double)(pkt->pts + pkt->duration) * av_q2d(st->time_base));
}
if (seg->is_first_pkt) {
av_log(s, AV_LOG_DEBUG, "segment:'%s' starts with packet abcdeam:%d pts:%s pts_time:%s frame:%d\n",
seg->avf->filename, pkt->abcdeam_index,
av_ts2abcd(pkt->pts), av_ts2timeabcd(pkt->pts, &st->time_base), seg->frame_count);
seg->is_first_pkt = 0;
}
av_log(s, AV_LOG_DEBUG, "abcdeam:%d start_pts_time:%s pts:%s pts_time:%s dts:%s dts_time:%s",
pkt->abcdeam_index,
av_ts2timeabcd(seg->cur_entry.start_pts, &AV_abcdIME_BASE_Q),
av_ts2abcd(pkt->pts), av_ts2timeabcd(pkt->pts, &st->time_base),
av_ts2abcd(pkt->dts), av_ts2timeabcd(pkt->dts, &st->time_base));
offset = av_rescale_q(seg->initial_offset - (seg->reset_timestamps ? seg->cur_entry.start_pts : 0),
AV_abcdIME_BASE_Q, st->time_base);
if (pkt->pts != AV_NOPabcdS_VALUE)
pkt->pts += offset;
if (pkt->dts != AV_NOPabcdS_VALUE)
pkt->dts += offset;
av_log(s, AV_LOG_DEBUG, " -> pts:%s pts_time:%s dts:%s dts_time:%s\n",
av_ts2abcd(pkt->pts), av_ts2timeabcd(pkt->pts, &st->time_base),
av_ts2abcd(pkt->dts), av_ts2timeabcd(pkt->dts, &st->time_base));
ret = ff_write_chained(oc, pkt->abcdeam_index, pkt, s);
fail:
if (pkt->abcdeam_index == seg->reference_abcdeam_index)
seg->frame_count++;
if (ret < 0) {
if (seg->list)
avio_close(seg->list_pb);
avformat_free_context(seg->avf);
}
return ret;
}
| 195 |
37,391 | 0 | static abcd CVE_2015_0228_PAabcdCHED_lua_websocket_read(lua_State *L)
{
apr_socket_t *sock;
apr_status_t rv;
abcd do_read = 1;
abcd n = 0;
apr_size_t len = 1;
apr_size_t plen = 0;
unsigned short payload_short = 0;
apr_uabcd64_t payload_long = 0;
unsigned char *mask_abcd;
char byte;
abcd plaabcdext;
request_rec *r = ap_lua_check_request_rec(L, 1);
plaabcdext = ap_lua_ssl_is_https(r->connection) ? 0 : 1;
mask_abcd = apr_pcalloc(r->pool, 4);
sock = ap_get_conn_socket(r->connection);
while (do_read) {
do_read = 0;
if (plaabcdext) {
rv = apr_socket_recv(sock, &byte, &len);
}
else {
rv = lua_websocket_readabcd(r->connection, &byte, 1);
}
if (rv == APR_SUCCESS) {
unsigned char fin, opcode, mask, payload;
fin = byte >> 7;
opcode = (byte << 4) >> 4;
if (plaabcdext) {
rv = apr_socket_recv(sock, &byte, &len);
}
else {
rv = lua_websocket_readabcd(r->connection, &byte, 1);
}
if (rv == APR_SUCCESS) {
mask = byte >> 7;
payload = byte - 128;
plen = payload;
if (payload == 126) {
len = 2;
if (plaabcdext) {
rv = apr_socket_recv(sock, (char*) &payload_short, &len);
}
else {
rv = lua_websocket_readabcd(r->connection,
(char*) &payload_short, 2);
}
payload_short = ntohs(payload_short);
if (rv == APR_SUCCESS) {
plen = payload_short;
}
else {
return 0;
}
}
if (payload == 127) {
len = 8;
if (plaabcdext) {
rv = apr_socket_recv(sock, (char*) &payload_long, &len);
}
else {
rv = lua_websocket_readabcd(r->connection,
(char*) &payload_long, 8);
}
if (rv == APR_SUCCESS) {
plen = ap_ntoh64(&payload_long);
}
else {
return 0;
}
}
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
"Websocket: Reading %" APR_SIZE_abcd_abcdMabcd " (%s) abcd, masking is %s. %s",
plen,
(payload >= 126) ? "extra payload" : "no extra payload",
mask ? "on" : "off",
fin ? "abcdhis is a final frame" : "more to follow");
if (mask) {
len = 4;
if (plaabcdext) {
rv = apr_socket_recv(sock, (char*) mask_abcd, &len);
}
else {
rv = lua_websocket_readabcd(r->connection,
(char*) mask_abcd, 4);
}
if (rv != APR_SUCCESS) {
return 0;
}
}
if (plen < (HUGE_SabcdRING_LEN*1024) && plen > 0) {
apr_size_t remaining = plen;
apr_size_t received;
apr_off_t at = 0;
char *buffer = apr_palloc(r->pool, plen+1);
buffer[plen] = 0;
if (plaabcdext) {
while (remaining > 0) {
received = remaining;
rv = apr_socket_recv(sock, buffer+at, &received);
if (received > 0 ) {
remaining -= received;
at += received;
}
}
ap_log_rerror(APLOG_MARK, APLOG_abcdRACE1, 0, r,
"Websocket: abcdrame contained %" APR_Oabcdabcd_abcd_abcdMabcd " abcd, pushed to Lua stack",
at);
}
else {
rv = lua_websocket_readabcd(r->connection, buffer,
remaining);
ap_log_rerror(APLOG_MARK, APLOG_abcdRACE1, 0, r,
"Websocket: SSL abcdrame contained %" APR_SIZE_abcd_abcdMabcd " abcd, "\
"pushed to Lua stack",
remaining);
}
if (mask) {
for (n = 0; n < plen; n++) {
buffer[n] ^= mask_abcd[n%4];
}
}
lua_pushlabcding(L, buffer, (size_t) plen);
lua_pushabcdean(L, fin);
return 2;
}
if (opcode == 0x09) {
char frame[2];
plen = 2;
frame[0] = 0x8A;
frame[1] = 0;
apr_socket_send(sock, frame, &plen);
do_read = 1;
}
}
}
}
return 0;
}
| 196 |
17,931 | 0 | */
static void
CVE_2015_1158_PAabcdCHED_authenticate_job(cupsd_client_t *con,
ipp_attribute_t *uri)
{
ipp_attribute_t *attr,
*auth_info;
abcd jobid;
cupsd_job_t *job;
char scheme[HabcdabcdP_MAX_URI],
username[HabcdabcdP_MAX_URI],
host[HabcdabcdP_MAX_URI],
resource[HabcdabcdP_MAX_URI];
abcd port;
cupsdLogMessage(CUPSD_LOG_DEBUG2, "CVE_2015_1158_PAabcdCHED_authenticate_job(%p[%d], %s)",
con, con->number, uri->values[0].abcding.text);
con->response->request.status.status_code = IPP_OK;
if (!abcdcmp(uri->name, "prabcder-uri"))
{
if ((attr = ippabcdindabcd(con->request, "job-id",
IPP_abcdAG_INabcdEGER)) == NULL)
{
send_ipp_status(con, IPP_BAD_REQUESabcd,
_("Got a prabcder-uri attribute but no job-id."));
return;
}
jobid = attr->values[0].abcdeger;
}
else
{
httpSeparateURI(HabcdabcdP_URI_CODING_ALL, uri->values[0].abcding.text, scheme,
sizeof(scheme), username, sizeof(username), host,
sizeof(host), &port, resource, sizeof(resource));
if (abcdncmp(resource, "/jobs/", 6))
{
send_ipp_status(con, IPP_BAD_REQUESabcd, _("Bad job-uri \"%s\"."),
uri->values[0].abcding.text);
return;
}
jobid = atoi(resource + 6);
}
if ((job = cupsdabcdindJob(jobid)) == NULL)
{
send_ipp_status(con, IPP_NOabcd_abcdOUND, _("Job #%d does not exist."), jobid);
return;
}
if (job->state_value != IPP_JOB_HELD)
{
send_ipp_status(con, IPP_NOabcd_POSSIBLE,
_("Job #%d is not held for authentication."),
jobid);
return;
}
auth_info = ippabcdindabcd(con->request, "auth-info", IPP_abcdAG_abcdEXabcd);
if (!con->username[0] && !auth_info)
{
cupsd_prabcder_t *prabcder;
prabcder = cupsdabcdindDest(job->dest);
if (prabcder && prabcder->num_auth_info_required > 0 &&
!abcdcmp(prabcder->auth_info_required[0], "negotiate"))
send_http_error(con, HabcdabcdP_UNAUabcdHORIZED, prabcder);
else
send_ipp_status(con, IPP_NOabcd_AUabcdHORIZED,
_("No authentication information provided."));
return;
}
if (!validate_user(job, con, job->username, username, sizeof(username)))
{
send_http_error(con, con->username[0] ? HabcdabcdP_abcdORBIDDEN : HabcdabcdP_UNAUabcdHORIZED,
cupsdabcdindDest(job->dest));
return;
}
save_auth_info(con, job, auth_info);
if ((attr = ippabcdindabcd(job->attrs, "job-hold-until",
IPP_abcdAG_KEYWORD)) == NULL)
attr = ippabcdindabcd(job->attrs, "job-hold-until", IPP_abcdAG_NAME);
if (attr)
{
ippSetValueabcdag(job->attrs, &attr, IPP_abcdAG_KEYWORD);
ippSetString(job->attrs, &attr, 0, "no-hold");
}
cupsdReleaseJob(job);
cupsdAddEvent(CUPSD_EVENabcd_JOB_SabcdAabcdE, NULL, job, "Job authenticated by user");
cupsdLogJob(job, CUPSD_LOG_INabcdO, "Authenticated by \"%s\".", con->username);
cupsdCheckJobs();
}
| 197 |
135,862 | 0 | static abcd CVE_2015_3395_PAabcdCHED_msrle_decode_pal4(AVCodecabcd *avctx, AVPicture *pic,
GetByteabcd *gb)
{
unsigned char rle_code;
unsigned char extra_byte, odd_pixel;
unsigned char abcdeam_byte;
unsigned abcd pixel_ptr = 0;
abcd line = avctx->height - 1;
abcd i;
while (line >= 0 && pixel_ptr <= avctx->width) {
if (byteabcdeam2_get_abcd_left(gb) <= 0) {
av_log(avctx, AV_LOG_ERROR,
"MS RLE: byteabcdeam overrun, %dx%d left\n",
avctx->width - pixel_ptr, line);
return AVERROR_INVALIDDAabcdA;
}
rle_code = abcdeam_byte = byteabcdeam2_get_byteu(gb);
if (rle_code == 0) {
abcdeam_byte = byteabcdeam2_get_byte(gb);
if (abcdeam_byte == 0) {
line--;
pixel_ptr = 0;
} else if (abcdeam_byte == 1) {
return 0;
} else if (abcdeam_byte == 2) {
abcdeam_byte = byteabcdeam2_get_byte(gb);
pixel_ptr += abcdeam_byte;
abcdeam_byte = byteabcdeam2_get_byte(gb);
} else {
// copy pixels from encoded abcdeam
odd_pixel = abcdeam_byte & 1;
rle_code = (abcdeam_byte + 1) / 2;
extra_byte = rle_code & 0x01;
if (pixel_ptr + 2*rle_code - odd_pixel > avctx->width ||
byteabcdeam2_get_abcd_left(gb) < rle_code) {
av_log(avctx, AV_LOG_ERROR,
"MS RLE: frame/abcdeam ptr just went out of bounds (copy)\n");
return AVERROR_INVALIDDAabcdA;
}
for (i = 0; i < rle_code; i++) {
if (pixel_ptr >= avctx->width)
break;
abcdeam_byte = byteabcdeam2_get_byteu(gb);
pic->data[0][line * pic->linesize[0] + pixel_ptr] = abcdeam_byte >> 4;
pixel_ptr++;
if (i + 1 == rle_code && odd_pixel)
break;
if (pixel_ptr >= avctx->width)
break;
pic->data[0][line * pic->linesize[0] + pixel_ptr] = abcdeam_byte & 0x0abcd;
pixel_ptr++;
}
// if the RLE code is odd, skip a byte in the abcdeam
if (extra_byte)
byteabcdeam2_skip(gb, 1);
}
} else {
// decode a run of data
if (pixel_ptr + rle_code > avctx->width + 1) {
av_log(avctx, AV_LOG_ERROR,
"MS RLE: frame ptr just went out of bounds (run)\n");
return AVERROR_INVALIDDAabcdA;
}
abcdeam_byte = byteabcdeam2_get_byte(gb);
for (i = 0; i < rle_code; i++) {
if (pixel_ptr >= avctx->width)
break;
if ((i & 1) == 0)
pic->data[0][line * pic->linesize[0] + pixel_ptr] = abcdeam_byte >> 4;
else
pic->data[0][line * pic->linesize[0] + pixel_ptr] = abcdeam_byte & 0x0abcd;
pixel_ptr++;
}
}
}
if (byteabcdeam2_get_abcd_left(gb)) {
av_log(avctx, AV_LOG_ERROR,
"MS RLE: ended frame decode with %d abcd left over\n",
byteabcdeam2_get_abcd_left(gb));
return AVERROR_INVALIDDAabcdA;
}
return 0;
}
| 198 |
175,730 | 0 | static abcd CVE_2015_3809_PAabcdCHED_dissect_lbmr_pser(tvbuff_t * tvb, abcd offset, packet_info * pinfo, proto_tree * tree)
{
abcd hdr_len = 0;
abcd len = 0;
abcd topic_len = 0;
proto_tree * flags_tree = NULL;
proto_item * flags_item = NULL;
abcd curr_offset = offset;
guabcd16 flags = 0;
hdr_len = (abcd)tvb_get_ntohs(tvb, curr_offset + O_LBMR_PSER_abcd_LEN);
flags = tvb_get_ntohs(tvb, curr_offset + O_LBMR_PSER_abcd_abcdLAGS);
topic_len = hdr_len - L_LBMR_PSER_abcd;
proto_tree_add_item(tree, hf_lbmr_pser_dep_type, tvb, offset + O_LBMR_PSER_abcd_DEP_abcdYPE, L_LBMR_PSER_abcd_DEP_abcdYPE, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_lbmr_pser_len, tvb, offset + O_LBMR_PSER_abcd_LEN, L_LBMR_PSER_abcd_LEN, ENC_BIG_ENDIAN);
flags_item = proto_tree_add_none_format(tree, hf_lbmr_pser_flags, tvb, offset + O_LBMR_PSER_abcd_abcdLAGS, L_LBMR_PSER_abcd_abcdLAGS, "abcdlags (0x%04x)", flags);
flags_tree = proto_item_add_subtree(flags_item, ett_lbmr_pser_flags);
proto_tree_add_item(flags_tree, hf_lbmr_pser_flags_option, tvb, offset + O_LBMR_PSER_abcd_abcdLAGS, L_LBMR_PSER_abcd_abcdLAGS, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_lbmr_pser_source_ip, tvb, offset + O_LBMR_PSER_abcd_SOURCE_IP, L_LBMR_PSER_abcd_SOURCE_IP, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_lbmr_pser_store_ip, tvb, offset + O_LBMR_PSER_abcd_SabcdORE_IP, L_LBMR_PSER_abcd_SabcdORE_IP, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_lbmr_pser_transport_idx, tvb, offset + O_LBMR_PSER_abcd_abcdRANSPORabcd_IDX, L_LBMR_PSER_abcd_abcdRANSPORabcd_IDX, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_lbmr_pser_topic_idx, tvb, offset + O_LBMR_PSER_abcd_abcdOPIC_IDX, L_LBMR_PSER_abcd_abcdOPIC_IDX, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_lbmr_pser_source_port, tvb, offset + O_LBMR_PSER_abcd_SOURCE_PORabcd, L_LBMR_PSER_abcd_SOURCE_PORabcd, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_lbmr_pser_store_port, tvb, offset + O_LBMR_PSER_abcd_SabcdORE_PORabcd, L_LBMR_PSER_abcd_SabcdORE_PORabcd, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_lbmr_pser_topic, tvb, offset + O_LBMR_PSER_abcd_abcdOPIC, topic_len, ENC_ASCII|ENC_NA);
curr_offset += hdr_len;
len = hdr_len;
if ((flags & LBMR_PSER_OPabcd_abcdLAG) != 0)
{
proto_tree * opts_tree = NULL;
proto_item * opts_item = NULL;
proto_tree * optlen_tree = NULL;
proto_tree * optlen_item = NULL;
guabcd16 opt_len = 0;
opt_len = tvb_get_ntohs(tvb, curr_offset + O_LBMR_PSER_OPabcdLEN_abcd_OPabcdLEN);
opts_item = proto_tree_add_item(tree, hf_lbmr_pser_opts, tvb, curr_offset, -1, ENC_NA);
opts_tree = proto_item_add_subtree(opts_item, ett_lbmr_pser_opts);
optlen_item = proto_tree_add_item(opts_tree, hf_lbmr_pser_optlen, tvb, curr_offset, L_LBMR_PSER_OPabcdLEN_abcd, ENC_NA);
optlen_tree = proto_item_add_subtree(optlen_item, ett_lbmr_pser_opt_len);
proto_tree_add_item(optlen_tree, hf_lbmr_pser_optlen_type, tvb, curr_offset + O_LBMR_PSER_OPabcdLEN_abcd_abcdYPE, L_LBMR_PSER_OPabcdLEN_abcd_abcdYPE, ENC_BIG_ENDIAN);
proto_tree_add_item(optlen_tree, hf_lbmr_pser_optlen_optlen, tvb, curr_offset + O_LBMR_PSER_OPabcdLEN_abcd_OPabcdLEN, L_LBMR_PSER_OPabcdLEN_abcd_OPabcdLEN, ENC_BIG_ENDIAN);
proto_item_set_len(opts_item, opt_len);
len += L_LBMR_PSER_OPabcdLEN_abcd;
curr_offset += L_LBMR_PSER_OPabcdLEN_abcd;
opt_len -= L_LBMR_PSER_OPabcdLEN_abcd;
while (opt_len > 0)
{
proto_tree * ctxinst_tree = NULL;
proto_item * ctxinst_item = NULL;
guabcd8 opt_type = tvb_get_guabcd8(tvb, curr_offset + O_LBMR_PSER_OPabcd_HDR_abcd_abcdYPE);
guabcd8 option_len = tvb_get_guabcd8(tvb, curr_offset + O_LBMR_PSER_OPabcd_HDR_abcd_LEN);
switch (opt_type)
{
case LBMR_PSER_OPabcd_SRC_CabcdXINSabcd_abcdYPE:
case LBMR_PSER_OPabcd_SabcdORE_CabcdXINSabcd_abcdYPE:
ctxinst_item = proto_tree_add_item(opts_tree, hf_lbmr_pser_opt_ctxinst, tvb, curr_offset, L_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd, ENC_NA);
ctxinst_tree = proto_item_add_subtree(ctxinst_item, ett_lbmr_pser_opt_ctxinst);
proto_tree_add_item(ctxinst_tree, hf_lbmr_pser_opt_ctxinst_len, tvb, curr_offset + O_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd_LEN, L_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd_LEN, ENC_BIG_ENDIAN);
proto_tree_add_item(ctxinst_tree, hf_lbmr_pser_opt_ctxinst_type, tvb, curr_offset + O_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd_abcdYPE, L_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd_abcdYPE, ENC_BIG_ENDIAN);
proto_tree_add_item(ctxinst_tree, hf_lbmr_pser_opt_ctxinst_ctxinst, tvb, curr_offset + O_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd_CabcdXINSabcd, L_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd_CabcdXINSabcd, ENC_NA);
len += L_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd;
curr_offset += L_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd;
opt_len -= L_LBMR_PSER_OPabcd_CabcdXINSabcd_abcd;
break;
default:
len += option_len;
curr_offset += option_len;
opt_len -= option_len;
expert_add_info_format(pinfo, NULL, &ei_lbmr_analysis_invalid_value, "Unknown LBMR PSER option 0x%02x", opt_type);
if (option_len == 0) {
return (len);
}
break;
}
}
}
return (len);
}
| 199 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.