> On Jul 14, 2025, at 03:24, Timo Rothenpieler wrote:
>
> There is no sensible way to handle this otherwise anyway, one just has
> to loop over this function until it succeeds.
> ---
> libavformat/tls_openssl.c | 18 --
> 1 file changed, 12 insertions(+), 6 deletions(-)
>
> diff
From: Zhao Zhili
Fix assert failure.
Fix #11666.
---
libavformat/mxfenc.c | 43 ---
1 file changed, 36 insertions(+), 7 deletions(-)
diff --git a/libavformat/mxfenc.c b/libavformat/mxfenc.c
index d12ccfd739..fbfa49693b 100644
--- a/libavformat/mxfenc.c
++
> -Original Message-
> From: ffmpeg-devel On Behalf Of
> Martin Storsjö
> Sent: Dienstag, 15. Juli 2025 20:09
> To: FFmpeg development discussions and patches de...@ffmpeg.org>
> Subject: Re: [FFmpeg-devel] [POLL] [VOTE] code.ffmpeg.org
>
[..]
> like a reasonable way to me. But the
On 7/12/25 12:52, Michael Niedermayer wrote:
On Fri, Jul 11, 2025 at 11:54:29AM +0200, Nicolas Gaullier wrote:
Remove unused USAC/ADTS code: ff_adts_header_parse() parse the
object_type from a 2 bits field.
See also 696ea1c2236842572df88d573e24a39be3f19c98.
Use ff_adts_header_parse_buf() wrappe
From: Zhao Zhili
Fix #9195
---
It looks like vf_vibrance.c is similar to
https://github.com/zachsaw/RenderScripts/blob/master/RenderScripts/ImageProcessingShaders/SweetFX/Vibrance.hlsl
and
https://github.com/kevinlekiller/kwin-effect-shaders_shaders/blob/main/Vibrance.frag
Originall written by C
From: daichengrong
On Banana PI F3(256-bit vectors):
hevc_idct_32x32_8_c:119103.4 ( 1.00x)
hevc_idct_32x32_8_rvv_i64:5233.3 (22.76x)
Changes in v8:
Remove VLEN related code and scale execution by VL
Chan
From: Niklas Haas
If the image data is not at the start of the buffer allocation, such as
when the buffer has padding before the image data, this function maps too
much memory, since src_data + src_buf->size exceeds the buffer size.
Fix this by subtracting the difference between the buffer start
I intend to push this series soon-ish.
So if you intended to review it, please let me know and I can wait.
___
ffmpeg-devel mailing list
ffmpeg-devel@ffmpeg.org
https://ffmpeg.org/mailman/listinfo/ffmpeg-devel
To unsubscribe, visit link above, or email
On 15/07/2025 19:51, Niklas Haas wrote:
From: Niklas Haas
If the image data is not at the start of the buffer allocation, such as
when the buffer has padding before the image data, this function maps too
much memory, since src_data + src_buf->size exceeds the buffer size.
Fix this by subtracti
On 7/14/2025 6:18 AM, Dawid Kozinski wrote:
- Changes in mov_write_video_tag function to handle APV elementary stream
- Provided structure APVDecoderConfigurationRecord that specifies the decoder
configuration information for APV video content
Signed-off-by: Dawid Kozinski
---
libavcodec/cbs
From: Bernat Arlandis
---
libavcodec/libtheoraenc.c | 11 +++
1 file changed, 11 insertions(+)
diff --git a/libavcodec/libtheoraenc.c b/libavcodec/libtheoraenc.c
index eb94458639..ac6653fac8 100644
--- a/libavcodec/libtheoraenc.c
+++ b/libavcodec/libtheoraenc.c
@@ -244,6 +244,17 @@ stat
Fixes: applying zero offset to null pointer
Fixes:
429330004/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_JPEG2000_DEC_fuzzer-4733213845291008
Found-by: continuous fuzzing process
https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signed-off-by: Michael Niedermayer
---
libavco
The true problem happens in several previous get_vlc_symbol()
but checking that is more expensive (involving FFABS())
here its just a simple check between 2 variables we have.
Fixes: Assertion log >= k failed at libavcodec/golomb.h:406
Fixes:
429296194/clusterfuzz-testcase-minimized-ffmpeg_AV_COD
Fixes: shift exponent -1 is negative
Fixes:
429011224/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_INDEO5_fuzzer-5031059358285824
Found-by: continuous fuzzing process
https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signed-off-by: Michael Niedermayer
---
libavcodec/ivi.c | 8
Fixes: OOM
Fixes:
428760799/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_CFHD_DEC_fuzzer-5685176435015680
Found-by: continuous fuzzing process
https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signed-off-by: Michael Niedermayer
---
libavcodec/cfhd.c | 4
1 file changed,
Fixes: memleak (of vlc)
Fixes:
430343927/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_SMACKAUD_fuzzer-5265858979233792
Found-by: continuous fuzzing process
https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signed-off-by: Michael Niedermayer
---
libavcodec/smacker.c | 2 +-
1
On 7/13/25 07:43, Michael Niedermayer wrote:
Hi all
Do people want Forgejo or Gitlab on code.ffmpeg.org for testing?
F. code.ffmpeg.org should run Forgejo
G. code.ffmpeg.org should run Gitlab
F.
My reasons are mostly that every Gitlab instance I've used as a
developer (e.g. videolan, fre
Fixes: libavcodec/motion_est.c:94:31: runtime error: applying zero offset to
null pointer
Signed-off-by: James Almer
---
libavcodec/motion_est.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/libavcodec/motion_est.c b/libavcodec/motion_est.c
index 93be712cc0..3273451f9
If a frame size is absolutely massive, this can spin the parser as it
attempts to decode a permuted TOC. We add a sanity check here for eight
times the size of the image for an internal frame to prevent malicious
bitstreams from slowing the parser down to a crawl.
Signed-off-by: Leo Izen
Reported
On Sun, 13 Jul 2025, Michael Niedermayer wrote:
Hi all
Do people want Forgejo or Gitlab on code.ffmpeg.org for testing?
F. code.ffmpeg.org should run Forgejo
G. code.ffmpeg.org should run Gitlab
No strong opinion between the two. I have a lot of experience with Gitlab
(which I find quite wo
On 15/07/2025 03:09, Martin Storsjö wrote:
> On Sun, 13 Jul 2025, Michael Niedermayer wrote:
>
>> Hi all
>>
>> Do people want Forgejo or Gitlab on code.ffmpeg.org for testing?
>>
>> F. code.ffmpeg.org should run Forgejo
>> G. code.ffmpeg.org should run Gitlab
>
> No strong opinion between the t
Signed-off-by: Frank Plowman
---
libavcodec/vvc/ctu.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/libavcodec/vvc/ctu.c b/libavcodec/vvc/ctu.c
index cf7edccb8b..35c18e78f6 100644
--- a/libavcodec/vvc/ctu.c
+++ b/libavcodec/vvc/ctu.c
@@ -2118,9 +2118,12 @@ static int
Prior to this patch, kth_order_egk_decode could read arbitrarily
large values which then overflowed and caused various issues.
Patch fixes this by making kth_order_egk_decode falliable,
requiring the caller to specify an upper bound and returning an
error if the read value would exceed that bound.
On 14/07/2025 13:43, Nuo Mi wrote:
> Hi Frank,
> thank you for the patch
Thank you very much for your review. Responses inline.
> On Sat, Jul 12, 2025 at 6:41 PM Frank Plowman wrote:
>
>> Prior to this patch, kth_order_egk_decode could read arbitrarily
>> large values which then overflowed and
> > +@item gpu_device
> > +The GPU device to use.
> > +Default value: @code{"0"}
>
> is this always a number ?
> if so the documenattion could say that
Yes, it is the device index.
> > +@item destination
> > +If set, the transcription output will be sent to the specified file or URL
> > +(use one
> > This part is still not acceptable. You blindly set a flag based on
> > what you need, if special flags on the context are needed they should
> > be negotiated between the different components, guided by the users
> > use-case and input, and not hardcoded based on an arbitrary condition
> > of a
> > This part is still not acceptable. You blindly set a flag based on
> > what you need, if special flags on the context are needed they should
> > be negotiated between the different components, guided by the users
> > use-case and input, and not hardcoded based on an arbitrary condition
> > of a
27 matches
Mail list logo