prompt
stringclasses
547 values
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
5 values
index
int64
0
151k
Determine whether the code is vulnerable or not.
[ "/*\n * arch/arm/kernel/sys_oabi-compat.c\n *\n * Compatibility wrappers for syscalls that are used from\n * old ABI user space binaries with an EABI kernel.\n *\n * Author:\tNicolas Pitre\n * Created:\tOct 7, 2005\n * Copyright:\tMontaVista Software, Inc.\n *\n * This program is free software; you can redis...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
75
Determine whether the code is vulnerable or not.
[ "/*\n *\tLinux NET3:\tIP/IP protocol decoder.\n *\n *\tAuthors:\n *\t\tSam Lantinga (slouken@cs.ucdavis.edu) 02/01/95\n *\n *\tFixes:\n *\t\tAlan Cox\t:\tMerged and made usable non modular (its so tiny its silly as\n *\t\t\t\t\ta module taking up 2 pages).\n *\t\tAlan Cox\t: \tFixed bug with 1.3.18 and IPIP not wo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
76
Determine whether the code is vulnerable or not.
[ "/*\n *\tIPv6 tunneling device\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tVille Nuorvala\t\t<vnuorval@tcs.hut.fi>\n *\tYasuyuki Kozakai\t<kozakai@linux-ipv6.org>\n *\n * Based on:\n * linux/net/ipv6/sit.c and linux/net/ipv4/ipip.c\n *\n * RFC 2473\n *\n *\tThis program is free software; y...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
76
Determine whether the code is vulnerable or not.
[ "/*\n *\tIPv6 over IPv4 tunnel device - Simple Internet Transition (SIT)\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\tAlexey Kuznetsov\t<kuznet@ms2.inr.ac.ru>\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
76
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C)2003,2004 USAGI/WIDE Project\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
76
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright 1988, 1989 Hans-J. Boehm, Alan J. Demers\n * Copyright (c) 1991-1994 by Xerox Corporation. All rights reserved.\n * Copyright (c) 1999-2004 Hewlett-Packard Development Company, L.P.\n *\n * THIS MATERIAL IS PROVIDED AS IS, WITH ABSOLUTELY NO WARRANTY EXPRESSED\n * OR IMPLIED. ANY USE IS AT YOUR ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
77
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright 1988, 1989 Hans-J. Boehm, Alan J. Demers\n * Copyright (c) 1991-1994 by Xerox Corporation. All rights reserved.\n * Copyright (c) 1999-2004 Hewlett-Packard Development Company, L.P.\n *\n * THIS MATERIAL IS PROVIDED AS IS, WITH ABSOLUTELY NO WARRANTY EXPRESSED\n * OR IMPLIED. ANY USE IS AT YOUR ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
78
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright 1988, 1989 Hans-J. Boehm, Alan J. Demers\n * Copyright (c) 1991-1994 by Xerox Corporation. All rights reserved.\n * Copyright (c) 1999-2004 Hewlett-Packard Development Company, L.P.\n *\n * THIS MATERIAL IS PROVIDED AS IS, WITH ABSOLUTELY NO WARRANTY EXPRESSED\n * OR IMPLIED. ANY USE IS AT YOUR ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
79
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright 1988, 1989 Hans-J. Boehm, Alan J. Demers\n * Copyright (c) 1991-1994 by Xerox Corporation. All rights reserved.\n * Copyright (c) 1999-2004 Hewlett-Packard Development Company, L.P.\n *\n * THIS MATERIAL IS PROVIDED AS IS, WITH ABSOLUTELY NO WARRANTY EXPRESSED\n * OR IMPLIED. ANY USE IS AT YOUR ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
80
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright 1988, 1989 Hans-J. Boehm, Alan J. Demers\n * Copyright (c) 1991-1994 by Xerox Corporation. All rights reserved.\n * Copyright (c) 1996 by Silicon Graphics. All rights reserved.\n * Copyright (c) 2000 by Hewlett-Packard Company. All rights reserved.\n *\n * THIS MATERIAL IS PROVIDED AS IS, WITH ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
80
Determine whether the code is vulnerable or not.
[ "/*\n * hugetlbpage-backed filesystem. Based on ramfs.\n *\n * William Irwin, 2002\n *\n * Copyright (C) 2002 Linus Torvalds.\n */", "#include <linux/module.h>\n#include <linux/thread_info.h>\n#include <asm/current.h>\n#include <linux/sched.h>\t\t/* remove ASAP */\n#include <linux/fs.h>\n#include <linux/mount.h>...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
81
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_HUGETLB_H\n#define _LINUX_HUGETLB_H", "#include <linux/mm_types.h>\n#include <linux/fs.h>\n#include <linux/hugetlb_inline.h>", "struct ctl_table;\nstruct user_struct;", "#ifdef CONFIG_HUGETLB_PAGE", "#include <linux/mempolicy.h>\n#include <linux/shm.h>\n#include <asm/tlbflush.h>", "struct ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
81
Determine whether the code is vulnerable or not.
[ "/*\n * Generic hugetlb support.\n * (C) William Irwin, April 2004\n */\n#include <linux/list.h>\n#include <linux/init.h>\n#include <linux/module.h>\n#include <linux/mm.h>\n#include <linux/seq_file.h>\n#include <linux/sysctl.h>\n#include <linux/highmem.h>\n#include <linux/mmu_notifier.h>\n#include <linux/nodemask.h...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
81
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/ext4/super.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * Big-endi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
82
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/jbd2/transaction.c\n *\n * Written by Stephen C. Tweedie <sct@redhat.com>, 1998\n *\n * Copyright 1998 Red Hat corp --- All Rights Reserved\n *\n * This file is part of the Linux kernel and is made available under\n * the terms of the GNU General Public License, version 2, or at your\n * option, an...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
83
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2003 Sistina Software (UK) Limited.\n * Copyright (C) 2004, 2010-2011 Red Hat, Inc. All rights reserved.\n *\n * This file is released under the GPL.\n */", "#include <linux/device-mapper.h>", "#include <linux/module.h>\n#include <linux/init.h>\n#include <linux/blkdev.h>\n#include <linux/b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
84
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2001-2003 Sistina Software (UK) Limited.\n *\n * This file is released under the GPL.\n */", "#include \"dm.h\"\n#include <linux/module.h>\n#include <linux/init.h>\n#include <linux/blkdev.h>\n#include <linux/bio.h>\n#include <linux/slab.h>\n#include <linux/device-mapper.h>", "#define DM_MS...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
84
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2003 Sistina Software Limited.\n * Copyright (C) 2004-2005 Red Hat, Inc. All rights reserved.\n *\n * This file is released under the GPL.\n */", "#include <linux/device-mapper.h>", "#include \"dm-path-selector.h\"\n#include \"dm-uevent.h\"", "#include <linux/ctype.h>\n#include <linux/in...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
84
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2001 Jens Axboe <axboe@suse.de>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be usef...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
85
Determine whether the code is vulnerable or not.
[ "/*\n * sd.c Copyright (C) 1992 Drew Eckhardt\n * Copyright (C) 1993, 1994, 1995, 1999 Eric Youngdale\n *\n * Linux scsi disk driver\n * Initial versions: Drew Eckhardt\n * Subsequent revisions: Eric Youngdale\n *\tModification history:\n * - Drew Eckhardt <drew@c...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
85
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_BLKDEV_H\n#define _LINUX_BLKDEV_H", "#ifdef CONFIG_BLOCK", "#include <linux/sched.h>\n#include <linux/major.h>\n#include <linux/genhd.h>\n#include <linux/list.h>\n#include <linux/timer.h>\n#include <linux/workqueue.h>\n#include <linux/pagemap.h>\n#include <linux/backing-dev.h>\n#include <linux/w...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
85
Determine whether the code is vulnerable or not.
[ "/*\n * jabberd - Jabber Open Source Server\n * Copyright (c) 2002 Jeremie Miller, Thomas Muldowney,\n * Ryan Eatmon, Robert Norris\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free So...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
86
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tGeneric socket support routines. Memory allocators, socket lock/release\n *\t\thandler for p...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
87
Determine whether the code is vulnerable or not.
[ "#ifndef _ASM_X86_PGTABLE_3LEVEL_H\n#define _ASM_X86_PGTABLE_3LEVEL_H", "/*\n * Intel Physical Address Extension (PAE) Mode - three-level page\n * tables on PPro+ CPUs.\n *\n * Copyright (C) 1999 Ingo Molnar <mingo@redhat.com>\n */", "#define pte_ERROR(e)\t\t\t\t\t\t\t\\\n\tprintk(\"%s:%d: bad pte %p(%08lx%08lx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
88
Determine whether the code is vulnerable or not.
[ "#ifndef _ASM_GENERIC_PGTABLE_H\n#define _ASM_GENERIC_PGTABLE_H", "#ifndef __ASSEMBLY__\n#ifdef CONFIG_MMU", "#include <linux/mm_types.h>\n#include <linux/bug.h>", "#ifndef __HAVE_ARCH_PTEP_SET_ACCESS_FLAGS\nextern int ptep_set_access_flags(struct vm_area_struct *vma,\n\t\t\t\t unsigned long address, pte_t *p...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
88
Determine whether the code is vulnerable or not.
[ "/* Task credentials management - see Documentation/security/credentials.txt\n *\n * Copyright (C) 2008 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
89
Determine whether the code is vulnerable or not.
[ "/*\n * NET\t\tAn implementation of the SOCKET network access protocol.\n *\n * Version:\t@(#)socket.c\t1.1.93\t18/02/95\n *\n * Authors:\tOrest Zborowski, <obz@Kodak.COM>\n *\t\tRoss Biro\n *\t\tFred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>\n *\n * Fixes:\n *\t\tAnonymous\t:\tNOTSOCK/BADF cleanup. Error fix in\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
90
Determine whether the code is vulnerable or not.
[ "/*\n * super.c\n *\n * PURPOSE\n * Super block routines for the OSTA-UDF(tm) filesystem.\n *\n * DESCRIPTION\n * OSTA-UDF(tm) = Optical Storage Technology Association\n * Universal Disk Format.\n *\n * This code is based on version 2.00 of the UDF specification,\n * and revision 3 of the ECMA 167 standard [eq...
[ 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
91
Determine whether the code is vulnerable or not.
[ "/*\n * super.c\n *\n * PURPOSE\n * Super block routines for the OSTA-UDF(tm) filesystem.\n *\n * DESCRIPTION\n * OSTA-UDF(tm) = Optical Storage Technology Association\n * Universal Disk Format.\n *\n * This code is based on version 2.00 of the UDF specification,\n * and revision 3 of the ECMA 167 standard [eq...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
91
Determine whether the code is vulnerable or not.
[ "/*\n * super.c\n *\n * PURPOSE\n * Super block routines for the OSTA-UDF(tm) filesystem.\n *\n * DESCRIPTION\n * OSTA-UDF(tm) = Optical Storage Technology Association\n * Universal Disk Format.\n *\n * This code is based on version 2.00 of the UDF specification,\n * and revision 3 of the ECMA 167 standard [eq...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
92
Determine whether the code is vulnerable or not.
[ "/****************************************************************************\n * Driver for Solarflare Solarstorm network controllers and boards\n * Copyright 2005-2006 Fen Systems Ltd.\n * Copyright 2005-2011 Solarflare Communications Inc.\n *\n * This program is free software; you can redistribute it and/or mod...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
93
Determine whether the code is vulnerable or not.
[ "/****************************************************************************\n * Driver for Solarflare Solarstorm network controllers and boards\n * Copyright 2005-2006 Fen Systems Ltd.\n * Copyright 2006-2010 Solarflare Communications Inc.\n *\n * This program is free software; you can redistribute it and/or mod...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
93
Determine whether the code is vulnerable or not.
[ "/****************************************************************************\n * Driver for Solarflare Solarstorm network controllers and boards\n * Copyright 2005-2006 Fen Systems Ltd.\n * Copyright 2006-2010 Solarflare Communications Inc.\n *\n * This program is free software; you can redistribute it and/or mod...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
93
Determine whether the code is vulnerable or not.
[ "/****************************************************************************\n * Driver for Solarflare Solarstorm network controllers and boards\n * Copyright 2005-2006 Fen Systems Ltd.\n * Copyright 2006-2011 Solarflare Communications Inc.\n *\n * This program is free software; you can redistribute it and/or mod...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
93
Determine whether the code is vulnerable or not.
[ "/****************************************************************************\n * Driver for Solarflare Solarstorm network controllers and boards\n * Copyright 2005-2006 Fen Systems Ltd.\n * Copyright 2005-2010 Solarflare Communications Inc.\n *\n * This program is free software; you can redistribute it and/or mod...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
93
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2006 Oracle. All rights reserved.\n *\n * This software is available to you under a choice of one of two\n * licenses. You may choose to be licensed under the terms of the GNU\n * General Public License (GPL) Version 2, available from the file\n * COPYING in the main directory of this source...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
94
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2006 Oracle. All rights reserved.\n *\n * This software is available to you under a choice of one of two\n * licenses. You may choose to be licensed under the terms of the GNU\n * General Public License (GPL) Version 2, available from the file\n * COPYING in the main directory of this source...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
94
Determine whether the code is vulnerable or not.
[ "/*\n * tsacct.c - System accounting over taskstats interface\n *\n * Copyright (C) Jay Lan,\t<jlan@sgi.com>\n *\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
95
Determine whether the code is vulnerable or not.
[ "/*\n *\tlinux/mm/madvise.c\n *\n * Copyright (C) 1999 Linus Torvalds\n * Copyright (C) 2002 Christoph Hellwig\n */", "#include <linux/mman.h>\n#include <linux/pagemap.h>\n#include <linux/syscalls.h>\n#include <linux/mempolicy.h>\n#include <linux/page-isolation.h>\n#include <linux/hugetlb.h>\n#include <linux/fa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
96
Determine whether the code is vulnerable or not.
[ "#ifndef __LINUX_NET_SCM_H\n#define __LINUX_NET_SCM_H", "#include <linux/limits.h>\n#include <linux/net.h>\n#include <linux/security.h>\n#include <linux/pid.h>\n#include <linux/nsproxy.h>", "/* Well, we should have at least one descriptor open\n * to accept passed FDs 8)\n */\n#define SCM_MAX_FD\t253", "struc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
97
Determine whether the code is vulnerable or not.
[ "#ifndef __LINUX_NET_SCM_H\n#define __LINUX_NET_SCM_H", "#include <linux/limits.h>\n#include <linux/net.h>\n#include <linux/security.h>\n#include <linux/pid.h>\n#include <linux/nsproxy.h>", "/* Well, we should have at least one descriptor open\n * to accept passed FDs 8)\n */\n#define SCM_MAX_FD\t253", "struc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
97
Determine whether the code is vulnerable or not.
[ "/*\n * NETLINK Kernel-user communication protocol.\n *\n * \t\tAuthors:\tAlan Cox <alan@lxorguk.ukuu.org.uk>\n * \t\t\t\tAlexey Kuznetsov <kuznet@ms2.inr.ac.ru>\n *\n *\t\tThis program is free software; you can redistribute it and/or\n *\t\tmodify it under the terms of the GNU General Public License\n *\t\tas...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
97
Determine whether the code is vulnerable or not.
[ "/*\n * NET4:\tImplementation of BSD Unix domain sockets.\n *\n * Authors:\tAlan Cox, <alan@lxorguk.ukuu.org.uk>\n *\n *\t\tThis program is free software; you can redistribute it and/or\n *\t\tmodify it under the terms of the GNU General Public License\n *\t\tas published by the Free Software Foundation; either ver...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
97
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tDefinitions for inet_sock\n *\n * Authors:\tMany, reorganised here by\n * \t\tArnaldo Carval...
[ 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tDefinitions for inet_sock\n *\n * Authors:\tMany, reorganised here by\n * \t\tArnaldo Carval...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tDefinitions for the IP module.\n *\n * Version:\t@(#)ip.h\t1.0.2\t05/07/93\n *\n * Authors:\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * net/dccp/ipv4.c\n *\n * An implementation of the DCCP protocol\n * Arnaldo Carvalho de Melo <acme@conectiva.com.br>\n *\n *\tThis program is free software; you can redistribute it and/or\n *\tmodify it under the terms of the GNU General Public License\n *\tas published by the Free Software Foundation; ei...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n *\tDCCP over IPv6\n *\tLinux INET6 implementation\n *\n *\tBased on net/dccp6/ipv6.c\n *\n *\tArnaldo Carvalho de Melo <acme@ghostprotocols.net>\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tPF_INET protocol family socket handler.\n *\n * Authors:\tRoss Biro\n *\t\tFred N. van Kempe...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * CIPSO - Commercial IP Security Option\n *\n * This is an implementation of the CIPSO 2.2 protocol as specified in\n * draft-ietf-cipso-ipsecurity-01.txt with additional tag types as found in\n * FIPS-188. While CIPSO never became a full IETF RFC standard many vendors\n * have chosen to adopt the protocol a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * CIPSO - Commercial IP Security Option\n *\n * This is an implementation of the CIPSO 2.2 protocol as specified in\n * draft-ietf-cipso-ipsecurity-01.txt with additional tag types as found in\n * FIPS-188. While CIPSO never became a full IETF RFC standard many vendors\n * have chosen to adopt the protocol a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n *\tNET3:\tImplementation of the ICMP protocol layer.\n *\n *\t\tAlan Cox, <alan@lxorguk.ukuu.org.uk>\n *\n *\tThis program is free software; you can redistribute it and/or\n *\tmodify it under the terms of the GNU General Public License\n *\tas published by the Free Software Foundation; either version\n *\t2 ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n *\tNET3:\tImplementation of the ICMP protocol layer.\n *\n *\t\tAlan Cox, <alan@lxorguk.ukuu.org.uk>\n *\n *\tThis program is free software; you can redistribute it and/or\n *\tmodify it under the terms of the GNU General Public License\n *\tas published by the Free Software Foundation; either version\n *\t2 ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tSupport for INET connection oriented protocols.\n *\n * Authors:\tSee the TCP sources\n *\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tThe options processing module for ip.c\n *\n * Authors:\tA.N.Kuznetsov\n *\n */", "#includ...
[ 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tThe options processing module for ip.c\n *\n * Authors:\tA.N.Kuznetsov\n *\n */", "#includ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tThe Internet Protocol (IP) output module.\n *\n * Authors:\tRoss Biro\n *\t\tFred N. van Kem...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 0...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tThe Internet Protocol (IP) output module.\n *\n * Authors:\tRoss Biro\n *\t\tFred N. van Kem...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tThe IP to API glue.\n *\n * Authors:\tsee ip.c\n *\n * Fixes:\n *\t\tMany\t\t:\tSplit from i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tThe IP to API glue.\n *\n * Authors:\tsee ip.c\n *\n * Fixes:\n *\t\tMany\t\t:\tSplit from i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tRAW - implementation of IP \"raw\" sockets.\n *\n * Authors:\tRoss Biro\n *\t\tFred N. van K...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * Syncookies implementation for the Linux kernel\n *\n * Copyright (C) 1997 Andi Kleen\n * Based on ideas by D.J.Bernstein and Eric Schenk.\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by th...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tImplementation of the Transmission Control Protocol(TCP).\n *\n *\t\tIPv4 specific functions...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tThe User Datagram Protocol (UDP).\n *\n * Authors:\tRoss Biro\n *\t\tFred N. van Kempen, <wa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n *\tTCP over IPv6\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tBased on:\n *\tlinux/net/ipv4/tcp.c\n *\tlinux/net/ipv4/tcp_input.c\n *\tlinux/net/ipv4/tcp_output.c\n *\n *\tFixes:\n *\tHideaki YOSHIFUJI\t:\tsin6_scope_id support\n *\tYOSHIFUJI Hideaki @USAG...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * L2TPv3 IP encapsulation support\n *\n * Copyright (c) 2008,2009,2010 Katalix Systems Ltd\n *\n *\tThis program is free software; you can redistribute it and/or\n *\tmodify it under the terms of the GNU General Public License\n *\tas published by the Free Software Foundation; either version\n *\t2 of the Lic...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
98
Determine whether the code is vulnerable or not.
[ "/*\n * Support for n32 Linux/MIPS ELF binaries.\n *\n * Copyright (C) 1999, 2001 Ralf Baechle\n * Copyright (C) 1999, 2001 Silicon Graphics, Inc.\n *\n * Heavily inspired by the 32-bit Sparc compat code which is\n * Copyright (C) 1995, 1996, 1997, 1998 David S. Miller (davem@redhat.com)\n * Copyright (C) 1995, 199...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "/*\n * Support for o32 Linux/MIPS ELF binaries.\n *\n * Copyright (C) 1999, 2001 Ralf Baechle\n * Copyright (C) 1999, 2001 Silicon Graphics, Inc.\n *\n * Heavily inspired by the 32-bit Sparc compat code which is\n * Copyright (C) 1995, 1996, 1997, 1998 David S. Miller (davem@redhat.com)\n * Copyright (C) 1995, 199...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "/*\n * Timer device implementation for SGI SN platforms.\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n *\n * Copyright (c) 2001-2006 Silicon Graphics, Inc. All rights reserved....
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "#ifndef _ASM_X86_DIV64_H\n#define _ASM_X86_DIV64_H", "#ifdef CONFIG_X86_32", "#include <linux/types.h>", "/*\n * do_div() is NOT a C function. It wants to return\n * two values (the quotient and the remainder), but\n * since that doesn't work very well in C, what it\n * does is:\n *\n * - modifies the 64-bit...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_CALC64_H\n#define _LINUX_CALC64_H", "#include <linux/types.h>\n#include <asm/div64.h>", "/*\n * This is a generic macro which is used when the architecture\n * specific div64.h does not provide a optimized one.\n *\n * The 64bit dividend is divided by the divisor (data type long), the\n * result...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_JIFFIES_H\n#define _LINUX_JIFFIES_H", "#include <linux/math64.h>\n#include <linux/kernel.h>\n#include <linux/types.h>\n#include <linux/time.h>\n#include <linux/timex.h>\n#include <asm/param.h>\t\t\t/* for HZ */", "/*\n * The following defines establish the engineering parameters of the PLL\n * m...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "/*\n * Implement CPU time clocks for the POSIX clock interface.\n */", "#include <linux/sched.h>\n#include <linux/posix-timers.h>\n#include <linux/errno.h>\n#include <linux/math64.h>\n#include <asm/uaccess.h>", "static int check_clock(const clockid_t which_clock)\n{\n\tint error = 0;\n\tstruct task_struct *p;\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/time.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * This file contains the interface functions for the various\n * time related system calls: time, stime, gettimeofday, settimeofday,\n *\t\t\t adjtime\n */\n/*\n * Modification history kernel/time.c\n *\n * 1993-09-02 Ph...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/time/ntp.c\n *\n * NTP state machine interfaces and logic.\n *\n * This code was mainly moved from kernel/timer.c and kernel/time.c\n * Please see those files for relevant copyright info and historical\n * changelogs.\n */", "#include <linux/mm.h>\n#include <linux/time.h>\n#include <linux/tim...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "/*\n * SLUB: A slab allocator that limits cache line use instead of queuing\n * objects in per cpu and per node lists.\n *\n * The allocator synchronizes using per slab locks and only\n * uses a centralized lock to manage a pool of partial slabs.\n *\n * (C) 2007 SGI, Christoph Lameter <clameter@sgi.com>\n */", ...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "/*\n * SLUB: A slab allocator that limits cache line use instead of queuing\n * objects in per cpu and per node lists.\n *\n * The allocator synchronizes using per slab locks and only\n * uses a centralized lock to manage a pool of partial slabs.\n *\n * (C) 2007 SGI, Christoph Lameter <clameter@sgi.com>\n */", ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
99
Determine whether the code is vulnerable or not.
[ "/**\n * eCryptfs: Linux filesystem encryption layer\n *\n * Copyright (C) 1997-2003 Erez Zadok\n * Copyright (C) 2001-2003 Stony Brook University\n * Copyright (C) 2004-2007 International Business Machines Corp.\n * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com>\n * Michael C. Thompson <mcthomp...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
100
Determine whether the code is vulnerable or not.
[ "/*\n * npw-rpc.c - Remote Procedure Calls (NPAPI specialisation)\n *\n * nspluginwrapper (C) 2005-2009 Gwenole Beauchesne\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; eith...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
101
Determine whether the code is vulnerable or not.
[ "/*\n * npw-viewer.c - Target plugin loader and viewer\n *\n * nspluginwrapper (C) 2005-2009 Gwenole Beauchesne\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
101
Determine whether the code is vulnerable or not.
[ "/*\n * utils.c - Utility functions\n *\n * nspluginwrapper (C) 2005-2009 Gwenole Beauchesne\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
101
Determine whether the code is vulnerable or not.
[ "/*\n * An implementation of key value pair (KVP) functionality for Linux.\n *\n *\n * Copyright (C) 2010, Novell, Inc.\n * Author : K. Y. Srinivasan <ksrinivasan@novell.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License version...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
102
Determine whether the code is vulnerable or not.
[ "/*\n * An implementation of key value pair (KVP) functionality for Linux.\n *\n *\n * Copyright (C) 2010, Novell, Inc.\n * Author : K. Y. Srinivasan <ksrinivasan@novell.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License version...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
103
Determine whether the code is vulnerable or not.
[ "/*\n * An implementation of key value pair (KVP) functionality for Linux.\n *\n *\n * Copyright (C) 2010, Novell, Inc.\n * Author : K. Y. Srinivasan <ksrinivasan@novell.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License version...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
103
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/sys.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n */", "#include <linux/export.h>\n#include <linux/mm.h>\n#include <linux/utsname.h>\n#include <linux/mman.h>\n#include <linux/reboot.h>\n#include <linux/prctl.h>\n#include <linux/highuid.h>\n#include <linux/fs.h>\n#include <linux/kmod....
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
104
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/sys.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n */", "#include <linux/export.h>\n#include <linux/mm.h>\n#include <linux/utsname.h>\n#include <linux/mman.h>\n#include <linux/reboot.h>\n#include <linux/prctl.h>\n#include <linux/highuid.h>\n#include <linux/fs.h>\n#include <linux/kmod....
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
104
Determine whether the code is vulnerable or not.
[ "/*\n *\tIPv6 fragment reassembly\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tBased on: net/ipv4/ip_fragment.c\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
105
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2003-2006, Cluster File Systems, Inc, info@clusterfs.com\n * Written by Alex Tomas <alex@clusterfs.com>\n *\n * Architecture independence:\n * Copyright (c) 2005, Bull S.A.\n * Written by Pierre Peiffer <pierre.peiffer@bull.net>\n *\n * This program is free software; you can redistribute i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
106
Determine whether the code is vulnerable or not.
[ "/*\n * TCP Illinois congestion control.\n * Home page:\n *\thttp://www.ews.uiuc.edu/~shaoliu/tcpillinois/index.html\n *\n * The algorithm is described in:\n * \"TCP-Illinois: A Loss and Delay-Based Congestion Control Algorithm\n * for High-Speed Networks\"\n * http://www.ifp.illinois.edu/~srikant/Papers/liubassri...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
107
Determine whether the code is vulnerable or not.
[ "#include <linux/etherdevice.h>\n#include <linux/if_macvlan.h>\n#include <linux/interrupt.h>\n#include <linux/nsproxy.h>\n#include <linux/compat.h>\n#include <linux/if_tun.h>\n#include <linux/module.h>\n#include <linux/skbuff.h>\n#include <linux/cache.h>\n#include <linux/sched.h>\n#include <linux/types.h>\n#include...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
108
Determine whether the code is vulnerable or not.
[ "/*\n * The NFC Controller Interface is the communication protocol between an\n * NFC Controller (NFCC) and a Device Host (DH).\n *\n * Copyright (C) 2011 Texas Instruments, Inc.\n *\n * Written by Ilan Elias <ilane@ti.com>\n *\n * Acknowledgements:\n * This file is based on hci_event.c, which was written\n *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
109
Determine whether the code is vulnerable or not.
[ "/*\n * The NFC Controller Interface is the communication protocol between an\n * NFC Controller (NFCC) and a Device Host (DH).\n *\n * Copyright (C) 2011 Texas Instruments, Inc.\n *\n * Written by Ilan Elias <ilane@ti.com>\n *\n * Acknowledgements:\n * This file is based on hci_event.c, which was written\n *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
109
Determine whether the code is vulnerable or not.
[ "#include <linux/mutex.h>\n#include <linux/socket.h>\n#include <linux/skbuff.h>\n#include <net/netlink.h>\n#include <net/net_namespace.h>\n#include <linux/module.h>\n#include <net/sock.h>", "#include <linux/inet_diag.h>\n#include <linux/sock_diag.h>", "static const struct sock_diag_handler *sock_diag_handlers[A...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
110
Determine whether the code is vulnerable or not.
[ "/*\n HIDP implementation for Linux Bluetooth stack (BlueZ).\n Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public License version 2 as\n published by the Free Software Found...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
111
Determine whether the code is vulnerable or not.
[ "/*\n HIDP implementation for Linux Bluetooth stack (BlueZ).\n Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public License version 2 as\n published by the Free Software Found...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
111
Determine whether the code is vulnerable or not.
[ "/*\n * Resizable virtual memory filesystem for Linux.\n *\n * Copyright (C) 2000 Linus Torvalds.\n *\t\t 2000 Transmeta Corp.\n *\t\t 2000-2001 Christoph Rohland\n *\t\t 2000-2001 SAP AG\n *\t\t 2002 Red Hat Inc.\n * Copyright (C) 2002-2011 Hugh Dickins.\n * Copyright (C) 2011 Google Inc.\n * Copyright (C) 2002-20...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
112
Determine whether the code is vulnerable or not.
[ "/* Syslog internals\n *\n * Copyright 2010 Canonical, Ltd.\n * Author: Kees Cook <kees.cook@canonical.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2, ...
[ 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
113
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/printk.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * Modified to make sys_syslog() more flexible: added commands to\n * return the last 4k of kernel messages, regardless of whether\n * they've been read or not. Added option to suppress kernel printk's\n * to the console. Added ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
113
Determine whether the code is vulnerable or not.
[ "/*\n * An implementation of key value pair (KVP) functionality for Linux.\n *\n *\n * Copyright (C) 2010, Novell, Inc.\n * Author : K. Y. Srinivasan <ksrinivasan@novell.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License version...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
114
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/vfat/namei.c\n *\n * Written 1992,1993 by Werner Almesberger\n *\n * Windows95/Windows NT compatible extended MSDOS filesystem\n * by Gordon Chaffee Copyright (C) 1995. Send bug reports for the\n * VFAT filesystem to <chaffee@cs.berkeley.edu>. Specify\n * what file operation caused yo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
114