Clicking on the link, you take the page with code highlighted.
There are a lot of the suspicious code snippets and show 5 among them.
Recommend that split your tests or adde new tests.
plausible patch diff info
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.211483601 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 7;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.147482651 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 0;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.175483067 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 2;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.187483245 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 3;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.203483482 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 6;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.215483660 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 8;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.171483007 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 250;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.199483423 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 5;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.195483364 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 4;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
--- __backup0 2022-11-18 01:15:57.215334551 +0000
+++ parser.c 2022-11-18 01:20:44.163482888 +0000
@@ -6706,7 +6706,11 @@
SKIP(9);
if (!IS_BLANK_CH(CUR)) {
+ {
xmlFatalErrMsg(ctxt, XML_ERR_SPACE_REQUIRED, "Space required after 'ELEMENT'\n");
+ if ((1))
+ return 1;
+}
}
SKIP_BLANKS;
name = xmlParseName(ctxt);
This issue is generated by Vulcan for commit: 6d9d32f
Coverage: 40.15 percent
Click here for a list of target sources
dict.c
nanoftp.c
c14n.c
HTMLparser.c
HTMLtree.c
doc/examples/trionan.c
threads.c
xmlunicode.c
doc/examples/timsort.h
chvalid.c
xmlIO.c
xmlschemastypes.c
entities.c
usr/include/x86_64-linux-gnu/bits/poll2.h
parserInternals.c
usr/include/pthread.h
valid.c
usr/include/x86_64-linux-gnu/bits/byteswap.h
usr/include/x86_64-linux-gnu/bits/string_fortified.h
usr/include/x86_64-linux-gnu/bits/stdio2.h
doc/examples/tree.c
xmlmodule.c
xmlreader.c
parser.c
xlink.c
pattern.c
list.c
SAX2.c
catalog.c
legacy.c
xmlmemory.c
xmlschemas.c
SAX.c
encoding.c
xmlsave.c
xinclude.c
xpointer.c
globals.c
xmlstring.c
usr/include/x86_64-linux-gnu/bits/fcntl2.h
xmlwriter.c
xmlregexp.c
usr/include/x86_64-linux-gnu/sys/stat.h
buf.c
nanohttp.c
schematron.c
doc/examples/xpath.c
usr/include/x86_64-linux-gnu/bits/unistd.h
relaxng.c
usr/include/x86_64-linux-gnu/bits/socket2.h
error.c
debugXML.c
hash.c
uri.c
There is(are) 1/16 failed test(s)
Click here for the failed test commands
Clicking on the link, you take the page with code highlighted.
There are a lot of the suspicious code snippets and show 5 among them.
Recommend that split your tests or adde new tests.
Click here for FL information
Suspicious score: 1.00
Vulcan-Demo-Basic/parser.c
Line 221 in 6d9d32f
Suspicious score: 1.00
Vulcan-Demo-Basic/parser.c
Line 222 in 6d9d32f
Suspicious score: 1.00
Vulcan-Demo-Basic/parser.c
Line 223 in 6d9d32f
Suspicious score: 1.00
Vulcan-Demo-Basic/parser.c
Line 378 in 6d9d32f
Suspicious score: 1.00
Vulcan-Demo-Basic/parser.c
Line 379 in 6d9d32f
15 patch(es) generaetd by vulcan
plausible patch diff info