prompt
stringclasses
547 values
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
5 values
index
int64
0
151k
Determine whether the code is vulnerable or not.
[ "/*\n *\tIPv6 over IPv4 tunnel device - Simple Internet Transition (SIT)\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\tAlexey Kuznetsov\t<kuznet@ms2.inr.ac.ru>\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
162
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/signal.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * 1997-11-02 Modified for POSIX.1b signals by Richard Henderson\n *\n * 2003-06-02 Jim Houston - Concurrent Computer Corp.\n *\t\tChanges to use preallocated sigqueue structures\n *\t\tto allow signals to be sent reliably.\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
163
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_HUGE_MM_H\n#define _LINUX_HUGE_MM_H", "extern int do_huge_pmd_anonymous_page(struct mm_struct *mm,\n\t\t\t\t struct vm_area_struct *vma,\n\t\t\t\t unsigned long address, pmd_t *pmd,\n\t\t\t\t unsigned int flags);\nextern int copy_huge_pmd(struct mm_struct *dst_mm, struct mm_struct *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
164
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_MM_H\n#define _LINUX_MM_H", "#include <linux/errno.h>", "#ifdef __KERNEL__", "#include <linux/gfp.h>\n#include <linux/list.h>\n#include <linux/mmzone.h>\n#include <linux/rbtree.h>\n#include <linux/prio_tree.h>\n#include <linux/debug_locks.h>\n#include <linux/mm_types.h>\n#include <linux/range....
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
164
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2009 Red Hat, Inc.\n *\n * This work is licensed under the terms of the GNU GPL, version 2. See\n * the COPYING file in the top-level directory.\n */", "#include <linux/mm.h>\n#include <linux/sched.h>\n#include <linux/highmem.h>\n#include <linux/hugetlb.h>\n#include <linux/mmu_notifier.h...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
164
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/lockd/clntproc.c\n *\n * RPC procedures for the client side NLM implementation\n *\n * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>\n */", "#include <linux/module.h>\n#include <linux/slab.h>\n#include <linux/types.h>\n#include <linux/errno.h>\n#include <linux/fs.h>\n#include <linux/nfs_fs.h...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
165
Determine whether the code is vulnerable or not.
[ "/*\n * linux/include/linux/sunrpc/sched.h\n *\n * Scheduling primitives for kernel Sun RPC.\n *\n * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>\n */", "#ifndef _LINUX_SUNRPC_SCHED_H_\n#define _LINUX_SUNRPC_SCHED_H_", "#include <linux/timer.h>\n#include <linux/ktime.h>\n#include <linux/sunrpc/types.h>\n#...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
165
Determine whether the code is vulnerable or not.
[ "/*\n * linux/net/sunrpc/clnt.c\n *\n * This file contains the high-level RPC interface.\n * It is modeled as a finite state machine to support both synchronous\n * and asynchronous requests.\n *\n * -\tRPC header generation and argument serialization.\n * -\tCredential refresh.\n * -\tTCP connect handling.\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
165
Determine whether the code is vulnerable or not.
[ "/*\n * linux/net/sunrpc/sched.c\n *\n * Scheduling for synchronous and asynchronous RPC requests.\n *\n * Copyright (C) 1996 Olaf Kirch, <okir@monad.swb.de>\n *\n * TCP NFS related read + write fixes\n * (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>\n */", "#include <linux/module.h>", ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
165
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2003-2006, Cluster File Systems, Inc, info@clusterfs.com\n * Written by Alex Tomas <alex@clusterfs.com>\n *\n * Architecture independence:\n * Copyright (c) 2005, Bull S.A.\n * Written by Pierre Peiffer <pierre.peiffer@bull.net>\n *\n * This program is free software; you can redistribute i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
166
Determine whether the code is vulnerable or not.
[ "/*\n * ioctl32.c: Conversion between 32bit and 64bit native ioctls.\n *\n * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)\n * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)\n * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs \n * Copyright (C) 2003 Pavel Machek (pavel@ucw.cz)\n *\n * These ro...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
167
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/ext4/namei.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/namei.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * Big-endi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
168
Determine whether the code is vulnerable or not.
[ "/*\n * fs/cifs/transport.c\n *\n * Copyright (C) International Business Machines Corp., 2002,2008\n * Author(s): Steve French (sfrench@us.ibm.com)\n * Jeremy Allison (jra@samba.org) 2006.\n *\n * This library is free software; you can redistribute it and/or modify\n * it under the terms of the GNU Les...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
169
Determine whether the code is vulnerable or not.
[ "/*\n net_packet.c -- Handles in- and outgoing VPN packets\n Copyright (C) 1998-2005 Ivo Timmermans,\n 2000-2013 Guus Sliepen <guus@tinc-vpn.org>\n 2010 Timothy Redaelli <timothy@redaelli.eu>\n 2010 Brandon Black <blblack@gmail.com>", " This pr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
170
Determine whether the code is vulnerable or not.
[ "/*\n* ModSecurity for Apache 2.x, http://www.modsecurity.org/\n* Copyright (c) 2004-2011 Trustwave Holdings, Inc. (http://www.trustwave.com/)\n*\n* You may not use this file except in compliance with\n* the License.  You may obtain a copy of the License at\n*\n*     http://www.apache.org/licenses/LICENSE-2.0\n*\n*...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
171
Determine whether the code is vulnerable or not.
[ "/*\n* ModSecurity for Apache 2.x, http://www.modsecurity.org/\n* Copyright (c) 2004-2011 Trustwave Holdings, Inc. (http://www.trustwave.com/)\n*\n* You may not use this file except in compliance with\n* the License.  You may obtain a copy of the License at\n*\n*     http://www.apache.org/licenses/LICENSE-2.0\n*\n*...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
171
Determine whether the code is vulnerable or not.
[ "/*\n* ModSecurity for Apache 2.x, http://www.modsecurity.org/\n* Copyright (c) 2004-2011 Trustwave Holdings, Inc. (http://www.trustwave.com/)\n*\n* You may not use this file except in compliance with\n* the License.  You may obtain a copy of the License at\n*\n*     http://www.apache.org/licenses/LICENSE-2.0\n*\n*...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
171
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/namespace.c\n *\n * (C) Copyright Al Viro 2000, 2001\n *\tReleased under GPL v2.\n *\n * Based on code from fs/super.c, copyright Linus Torvalds and others.\n * Heavily rewritten.\n */", "#include <linux/syscalls.h>\n#include <linux/export.h>\n#include <linux/capability.h>\n#include <linux/mnt_n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
172
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_FS_STRUCT_H\n#define _LINUX_FS_STRUCT_H", "#include <linux/path.h>\n#include <linux/spinlock.h>\n#include <linux/seqlock.h>", "struct fs_struct {\n\tint users;\n\tspinlock_t lock;\n\tseqcount_t seq;\n\tint umask;\n\tint in_exec;\n\tstruct path root, pwd;\n};", "extern struct kmem_cache *fs_cac...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
172
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by the Free Software Foundation, version 2 of the\n * License.\n */", "#include <linux/export.h>\n#include <linux/nsproxy.h>\n#include <linux/slab.h>\n#include...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
172
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/namespace.c\n *\n * (C) Copyright Al Viro 2000, 2001\n *\tReleased under GPL v2.\n *\n * Based on code from fs/super.c, copyright Linus Torvalds and others.\n * Heavily rewritten.\n */", "#include <linux/syscalls.h>\n#include <linux/export.h>\n#include <linux/capability.h>\n#include <linux/mnt_n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
173
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/pnode.c\n *\n * (C) Copyright IBM Corporation 2005.\n *\tReleased under GPL v2.\n *\tAuthor : Ram Pai (linuxram@us.ibm.com)\n *\n */\n#include <linux/mnt_namespace.h>\n#include <linux/mount.h>\n#include <linux/fs.h>\n#include <linux/nsproxy.h>\n#include \"internal.h\"\n#include \"pnode.h\"", "/*...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
173
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/pnode.h\n *\n * (C) Copyright IBM Corporation 2005.\n *\tReleased under GPL v2.\n *\n */\n#ifndef _LINUX_PNODE_H\n#define _LINUX_PNODE_H", "#include <linux/list.h>\n#include \"mount.h\"", "#define IS_MNT_SHARED(m) ((m)->mnt.mnt_flags & MNT_SHARED)\n#define IS_MNT_SLAVE(m) ((m)->mnt_master)\n#d...
[ 1, 1, 1, 1, 1, 1 ]
REPOSVUL
173
Determine whether the code is vulnerable or not.
[ "/* scm.c - Socket level control messages processing.\n *\n * Author:\tAlexey Kuznetsov, <kuznet@ms2.inr.ac.ru>\n * Alignment and value checking mods by Craig Metz\n *\n *\t\tThis program is free software; you can redistribute it and/or\n *\t\tmodify it under the terms of the GNU General Public License...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
174
Determine whether the code is vulnerable or not.
[ "/*\n * VMware vSockets Driver\n *\n * Copyright (C) 2007-2013 VMware, Inc. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation version 2 and no later version.\n *\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
175
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright Jonathan Naylor G4KLX (g4klx@g4klx.dem...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
176
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright Jonathan Naylor G4KLX (g4klx@g4klx.dem...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
177
Determine whether the code is vulnerable or not.
[ "/* net/atm/common.c - ATM sockets (common part for PVC and SVC) */", "/* Written 1995-2000 by Werner Almesberger, EPFL LRC/ICA */", "#define pr_fmt(fmt) KBUILD_MODNAME \":%s: \" fmt, __func__", "#include <linux/module.h>\n#include <linux/kmod.h>\n#include <linux/net.h>\t\t/* struct socket, struct proto_ops *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
178
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Alan Cox GW4PTS (alan@lxorguk.ukuu...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
179
Determine whether the code is vulnerable or not.
[ "/*\n BlueZ - Bluetooth protocol stack for Linux\n Copyright (C) 2000-2001 Qualcomm Incorporated", " Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public License version 2 as\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
180
Determine whether the code is vulnerable or not.
[ "/*\n RFCOMM implementation for Linux Bluetooth stack (BlueZ).\n Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>\n Copyright (C) 2002 Marcel Holtmann <marcel@holtmann.org>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public Lic...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
181
Determine whether the code is vulnerable or not.
[ "/*\n BlueZ - Bluetooth protocol stack for Linux\n Copyright (C) 2000-2001 Qualcomm Incorporated", " Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public License version 2 as\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
182
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) ST-Ericsson AB 2010\n * Author:\tSjur Brendeland sjur.brandeland@stericsson.com\n * License terms: GNU General Public License (GPL) version 2\n */", "#define pr_fmt(fmt) KBUILD_MODNAME \":%s(): \" fmt, __func__", "#include <linux/fs.h>\n#include <linux/init.h>\n#include <linux/module.h>\n#...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
183
Determine whether the code is vulnerable or not.
[ "/*********************************************************************\n *\n * Filename: af_irda.c\n * Version: 0.9\n * Description: IrDA sockets implementation\n * Status: Stable\n * Author: Dag Brattli <dagb@cs.uit.no>\n * Created at: Sun May 31 10:12:43 1998\n * Modified at: Sat ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
184
Determine whether the code is vulnerable or not.
[ "/*\n * IUCV protocol stack for Linux on zSeries\n *\n * Copyright IBM Corp. 2006, 2009\n *\n * Author(s):\tJennifer Hunt <jenhunt@us.ibm.com>\n *\t\tHendrik Brueckner <brueckner@linux.vnet.ibm.com>\n * PM functions:\n *\t\tUrsula Braun <ursula.braun@de.ibm.com>\n */", "#define KMSG_COMPONENT \"af_iucv\"\n#de...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
185
Determine whether the code is vulnerable or not.
[ "/*\n * L2TPv3 IP encapsulation support for IPv6\n *\n * Copyright (c) 2012 Katalix Systems Ltd\n *\n *\tThis program is free software; you can redistribute it and/or\n *\tmodify it under the terms of the GNU General Public License\n *\tas published by the Free Software Foundation; either version\n *\t2 of the Lice...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
186
Determine whether the code is vulnerable or not.
[ "/*\n * af_llc.c - LLC User Interface SAPs\n * Description:\n * Functions in this module are implementation of socket based llc\n * communications for the Linux operating system. Support of llc class\n * one and class two is provided via SOCK_DGRAM and SOCK_STREAM\n * respectively.\n *\n * An llc2 connect...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
187
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2011 Intel Corporation. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any lat...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
188
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
189
Determine whether the code is vulnerable or not.
[ "/*\n * net/tipc/socket.c: TIPC socket API\n *\n * Copyright (c) 2001-2007, 2012 Ericsson AB\n * Copyright (c) 2004-2008, 2010-2012, Wind River Systems\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following cond...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
190
Determine whether the code is vulnerable or not.
[ "/*\n * algif_hash: User-space interface for hash algorithms\n *\n * This file provides the user-space API for hash algorithms.\n *\n * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General P...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
191
Determine whether the code is vulnerable or not.
[ "/*\n * algif_skcipher: User-space interface for skcipher algorithms\n *\n * This file provides the user-space API for symmetric key ciphers.\n *\n * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
191
Determine whether the code is vulnerable or not.
[ "/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */\n/* kdc/do_tgs_req.c - KDC Routines to deal with TGS_REQ's */\n/*\n * Copyright 1990,1991,2001,2007,2008,2009 by the Massachusetts Institute of Technology.\n * All Rights Reserved.\n *\n * Export of this software from the United States of America may\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
192
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_MM_H\n#define _LINUX_MM_H", "#include <linux/errno.h>", "#ifdef __KERNEL__", "#include <linux/gfp.h>\n#include <linux/bug.h>\n#include <linux/list.h>\n#include <linux/mmzone.h>\n#include <linux/rbtree.h>\n#include <linux/atomic.h>\n#include <linux/debug_locks.h>\n#include <linux/mm_types.h>\n#...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
193
Determine whether the code is vulnerable or not.
[ "/*\n * linux/mm/memory.c\n *\n * Copyright (C) 1991, 1992, 1993, 1994 Linus Torvalds\n */", "/*\n * demand-loading started 01.12.91 - seems it is high on the list of\n * things wanted, and it should be easy to implement. - Linus\n */", "/*\n * Ok, demand-loading was easy, shared pages a little bit tricker. ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
193
Determine whether the code is vulnerable or not.
[ "/*\n * linux/drivers/video/fbmem.c\n *\n * Copyright (C) 1994 Martin Schaller\n *\n *\t2001 - Documented with DocBook\n *\t- Brad Douglas <brad@neruo.com>\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file COPYING in the main directory of this archive\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
194
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/fork.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n */", "/*\n * 'fork.c' contains the help-routines for the 'fork' system call\n * (see also entry.S and others).\n * Fork is rather simple, once you get the hang of it, but the memory\n * management can be a bitch. See 'mm/memory.c': ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
195
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by the Free Software Foundation, version 2 of the\n * License.\n */", "#include <linux/export.h>\n#include <linux/nsproxy.h>\n#include <linux/slab.h>\n#include...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
195
Determine whether the code is vulnerable or not.
[ "/*\n * Performance events core code:\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2011 Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2008-2011 Red Hat, Inc., Peter Zijlstra <pzijlstr@redhat.com>\n * Copyright © 2009 Paul Mackerras, IBM Corp. <paulus@au1.ibm.com>\n *\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
196
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by the Free Software Foundation, version 2 of the\n * License.\n */", "#include <linux/export.h>\n#include <linux/nsproxy.h>\n#include <linux/slab.h>\n#include...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
197
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by the Free Software Foundation, version 2 of the\n * License.\n */", "#include <linux/export.h>\n#include <linux/nsproxy.h>\n#include <linux/slab.h>\n#include...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
198
Determine whether the code is vulnerable or not.
[ "/*\n * drivers/net/veth.c\n *\n * Copyright (C) 2007 OpenVZ http://openvz.org, SWsoft Inc\n *\n * Author: Pavel Emelianov <xemul@openvz.org>\n * Ethtool interface from: Eric W. Biederman <ebiederm@xmission.com>\n *\n */", "#include <linux/netdevice.h>\n#include <linux/slab.h>\n#include <linux/ethtool.h>\n#incl...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
199
Determine whether the code is vulnerable or not.
[ "/*\n * \tNET3\tProtocol independent device support routines.\n *\n *\t\tThis program is free software; you can redistribute it and/or\n *\t\tmodify it under the terms of the GNU General Public License\n *\t\tas published by the Free Software Foundation; either version\n *\t\t2 of the License, or (at your option) a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
199
Determine whether the code is vulnerable or not.
[ "#ifndef __LINUX_NET_SCM_H\n#define __LINUX_NET_SCM_H", "#include <linux/limits.h>\n#include <linux/net.h>\n#include <linux/security.h>\n#include <linux/pid.h>\n#include <linux/nsproxy.h>", "/* Well, we should have at least one descriptor open\n * to accept passed FDs 8)\n */\n#define SCM_MAX_FD\t253", "struc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
200
Determine whether the code is vulnerable or not.
[ "/*\n * fs/cifs/cifsglob.h\n *\n * Copyright (C) International Business Machines Corp., 2002,2008\n * Author(s): Steve French (sfrench@us.ibm.com)\n * Jeremy Allison (jra@samba.org)\n *\n * This library is free software; you can redistribute it and/or modify\n * it under the terms of the GNU...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
201
Determine whether the code is vulnerable or not.
[ "/*\n * fs/cifs/connect.c\n *\n * Copyright (C) International Business Machines Corp., 2002,2009\n * Author(s): Steve French (sfrench@us.ibm.com)\n *\n * This library is free software; you can redistribute it and/or modify\n * it under the terms of the GNU Lesser General Public License as published\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
201
Determine whether the code is vulnerable or not.
[ "/* SCTP kernel reference Implementation\n * (C) Copyright IBM Corp. 2001, 2004\n * Copyright (c) 1999-2000 Cisco, Inc.\n * Copyright (c) 1999-2001 Motorola, Inc.\n * Copyright (c) 2001-2003 Intel Corp.\n * Copyright (c) 2001-2002 Nokia, Inc.\n * Copyright (c) 2001 La Monte H.P. Yarroll\n *\n * This file is part of...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
202
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine - device assignment support\n *\n * Copyright (C) 2010 Red Hat, Inc. and/or its affiliates.\n *\n * This work is licensed under the terms of the GNU GPL, version 2. See\n * the COPYING file in the top-level directory.\n *\n */", "#include <linux/kvm_host.h>\n#include <linux/k...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
203
Determine whether the code is vulnerable or not.
[ "/* SCTP kernel implementation\n * Copyright (c) 1999-2000 Cisco, Inc.\n * Copyright (c) 1999-2001 Motorola, Inc.\n * Copyright (c) 2001-2003 International Business Machines, Corp.\n * Copyright (c) 2001 Intel Corp.\n * Copyright (c) 2001 Nokia, Inc.\n * Copyright (c) 2001 La Monte H.P. Yarroll\n *\n * This file is...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
204
Determine whether the code is vulnerable or not.
[ "/*\n * AppArmor security module\n *\n * This file contains AppArmor LSM hooks.\n *\n * Copyright (C) 1998-2008 Novell/SUSE\n * Copyright 2009-2010 Canonical Ltd.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
205
Determine whether the code is vulnerable or not.
[ "/*\n * tg3.c: Broadcom Tigon3 ethernet driver.\n *\n * Copyright (C) 2001, 2002, 2003, 2004 David S. Miller (davem@redhat.com)\n * Copyright (C) 2001, 2002, 2003 Jeff Garzik (jgarzik@pobox.com)\n * Copyright (C) 2004 Sun Microsystems Inc.\n * Copyright (C) 2005-2013 Broadcom Corporation.\n *\n * Firmware is:\n *\t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
206
Determine whether the code is vulnerable or not.
[ "/*\n * tg3.c: Broadcom Tigon3 ethernet driver.\n *\n * Copyright (C) 2001, 2002, 2003, 2004 David S. Miller (davem@redhat.com)\n * Copyright (C) 2001, 2002, 2003 Jeff Garzik (jgarzik@pobox.com)\n * Copyright (C) 2004 Sun Microsystems Inc.\n * Copyright (C) 2005-2013 Broadcom Corporation.\n *\n * Firmware is:\n *\t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
206
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007-2011 B.A.T.M.A.N. contributors:\n *\n * Marek Lindner\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of version 2 of the GNU General Public\n * License as published by the Free Software Foundation.\n *\n * This program is distributed in...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
207
Determine whether the code is vulnerable or not.
[ "/*******************************************************************************\n * This file contains main functions related to iSCSI Parameter negotiation.\n *\n * \\u00a9 Copyright 2007-2011 RisingTide Systems LLC.\n *\n * Licensed to the Linux Foundation under the General Public License (GPL) version 2.\n *\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
208
Determine whether the code is vulnerable or not.
[ "/*******************************************************************************\n * This file contains main functions related to iSCSI Parameter negotiation.\n *\n * \\u00a9 Copyright 2007-2011 RisingTide Systems LLC.\n *\n * Licensed to the Linux Foundation under the General Public License (GPL) version 2.\n *\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
208
Determine whether the code is vulnerable or not.
[ "#ifndef ISCSI_PARAMETERS_H\n#define ISCSI_PARAMETERS_H\n", "", "struct iscsi_extra_response {", "\tchar key[64];", "\tchar value[32];\n\tstruct list_head er_list;\n} ____cacheline_aligned;", "struct iscsi_param {\n\tchar *name;\n\tchar *value;\n\tu8 set_param;\n\tu8 phase;\n\tu8 scope;\n\tu8 sender;\n\tu...
[ 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
208
Determine whether the code is vulnerable or not.
[ "#ifndef ISCSI_PARAMETERS_H\n#define ISCSI_PARAMETERS_H\n", "#include <scsi/iscsi_proto.h>\n", "struct iscsi_extra_response {", "\tchar key[KEY_MAXLEN];", "\tchar value[32];\n\tstruct list_head er_list;\n} ____cacheline_aligned;", "struct iscsi_param {\n\tchar *name;\n\tchar *value;\n\tu8 set_param;\n\tu8...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
208
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tImplementation of the Transmission Control Protocol(TCP).\n *\n * Authors:\tRoss Biro\n *\t\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
209
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/signal.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * 1997-11-02 Modified for POSIX.1b signals by Richard Henderson\n *\n * 2003-06-02 Jim Houston - Concurrent Computer Corp.\n *\t\tChanges to use preallocated sigqueue structures\n *\t\tto allow signals to be sent reliably.\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
210
Determine whether the code is vulnerable or not.
[ "/*\n * Per core/cpu state\n *\n * Used to coordinate shared registers between HT threads or\n * among events on a single PMU.\n */", "#define pr_fmt(fmt) KBUILD_MODNAME \": \" fmt", "#include <linux/stddef.h>\n#include <linux/types.h>\n#include <linux/init.h>\n#include <linux/slab.h>\n#include <linux/export.h>...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
211
Determine whether the code is vulnerable or not.
[ "/* Copyright (C) 2009 Red Hat, Inc.\n * Author: Michael S. Tsirkin <mst@redhat.com>\n *\n * This work is licensed under the terms of the GNU GPL, version 2.\n *\n * virtio-net server in host kernel.\n */", "#include <linux/compat.h>\n#include <linux/eventfd.h>\n#include <linux/vhost.h>\n#include <linux/virtio_ne...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
212
Determine whether the code is vulnerable or not.
[ "#include <linux/err.h>\n#include <linux/igmp.h>\n#include <linux/kernel.h>\n#include <linux/netdevice.h>\n#include <linux/rculist.h>\n#include <linux/skbuff.h>\n#include <linux/if_ether.h>\n#include <net/ip.h>\n#include <net/netlink.h>\n#if IS_ENABLED(CONFIG_IPV6)\n#include <net/ipv6.h>\n#endif", "#include \"br_...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
213
Determine whether the code is vulnerable or not.
[ "/*\n * Bridge multicast support.\n *\n * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the Licens...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
213
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tDefinitions for the UDP module.\n *\n * Version:\t@(#)udp.h\t1.0.2\t05/07/93\n *\n * Authors...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
214
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tThe User Datagram Protocol (UDP).\n *\n * Authors:\tRoss Biro\n *\t\tFred N. van Kempen, <wa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
214
Determine whether the code is vulnerable or not.
[ "/*\n *\tUDP over IPv6\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tBased on linux/ipv4/udp.c\n *\n *\tFixes:\n *\tHideaki YOSHIFUJI\t:\tsin6_scope_id support\n *\tYOSHIFUJI Hideaki @USAGI and:\tSupport IPV6_V6ONLY socket option, which\n *\tAlexey Kuznetsov\t\ta...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
214
Determine whether the code is vulnerable or not.
[ "/*\n *\tIPv6 output functions\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tBased on linux/net/ipv4/ip_output.c\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
215
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * This module enables machines with Intel VT-x extensions to run virtual\n * machines without emulation or binary translation.\n *\n * MMU support\n *\n * Copyright (C) 2006 Qumranet, Inc.\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * Aut...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
216
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * This module enables machines with Intel VT-x extensions to run virtual\n * machines without emulation or binary translation.\n *\n * Copyright (C) 2006 Qumranet, Inc.\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * Authors:\n * Avi Kivi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
216
Determine whether the code is vulnerable or not.
[ "/*\n *\tLinux INET6 implementation\n *\tForwarding Information Database\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free Software Fo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
217
Determine whether the code is vulnerable or not.
[ "/*\n* ModSecurity for Apache 2.x, http://www.modsecurity.org/\n* Copyright (c) 2004-2011 Trustwave Holdings, Inc. (http://www.trustwave.com/)\n*\n* You may not use this file except in compliance with\n* the License.  You may obtain a copy of the License at\n*\n*     http://www.apache.org/licenses/LICENSE-2.0\n*\n*...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
218
Determine whether the code is vulnerable or not.
[ "/*\n *\tIPv6 output functions\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tBased on linux/net/ipv4/ip_output.c\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
219
Determine whether the code is vulnerable or not.
[ "/*\n * net/key/af_key.c\tAn implementation of PF_KEYv2 sockets.\n *\n *\t\tThis program is free software; you can redistribute it and/or\n *\t\tmodify it under the terms of the GNU General Public License\n *\t\tas published by the Free Software Foundation; either version\n *\t\t2 of the License, or (at your option...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
220
Determine whether the code is vulnerable or not.
[ "/*\n * net/key/af_key.c\tAn implementation of PF_KEYv2 sockets.\n *\n *\t\tThis program is free software; you can redistribute it and/or\n *\t\tmodify it under the terms of the GNU General Public License\n *\t\tas published by the Free Software Foundation; either version\n *\t\t2 of the License, or (at your option...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
221
Determine whether the code is vulnerable or not.
[ "/*\n * fs/cifs/connect.c\n *\n * Copyright (C) International Business Machines Corp., 2002,2011\n * Author(s): Steve French (sfrench@us.ibm.com)\n *\n * This library is free software; you can redistribute it and/or modify\n * it under the terms of the GNU Lesser General Public License as published\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
222
Determine whether the code is vulnerable or not.
[ "/*\n * fs/cifs/connect.c\n *\n * Copyright (C) International Business Machines Corp., 2002,2011\n * Author(s): Steve French (sfrench@us.ibm.com)\n *\n * This library is free software; you can redistribute it and/or modify\n * it under the terms of the GNU Lesser General Public License as published\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
222
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by the Free Software Foundation, version 2 of the\n * License.\n */", "#include <linux/export.h>\n#include <linux/nsproxy.h>\n#include <linux/slab.h>\n#include...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
223
Determine whether the code is vulnerable or not.
[ "/*\n * Based on arch/arm/kernel/traps.c\n *\n * Copyright (C) 1995-2009 Russell King\n * Copyright (C) 2012 ARM Ltd.\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free Software Foundation.\n *\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
224
Determine whether the code is vulnerable or not.
[ "#undef DEBUG", "/*\n * ARM performance counter support.\n *\n * Copyright (C) 2009 picoChip Designs, Ltd., Jamie Iles\n * Copyright (C) 2010 ARM Ltd., Will Deacon <will.deacon@arm.com>\n *\n * This code is based on the sparc64 perf event code, which is in turn based\n * on the x86 code. Callchain code is based o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
225
Determine whether the code is vulnerable or not.
[ "/*-\n * Copyright (c) 2003-2010 Tim Kientzle\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n * 1. Redistributions of source code must retain the above copyright\n * notice, t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
226
Determine whether the code is vulnerable or not.
[ "/* $Id$ */", "/*\n * Copyright (c) 1990-1997 Sam Leffler\n * Copyright (c) 1991-1997 Silicon Graphics, Inc.\n *\n * Permission to use, copy, modify, distribute, and sell this software and \n * its documentation for any purpose is hereby granted without fee, provided\n * that (i) the above copyright notices and t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
227
Determine whether the code is vulnerable or not.
[ "/* scm.c - Socket level control messages processing.\n *\n * Author:\tAlexey Kuznetsov, <kuznet@ms2.inr.ac.ru>\n * Alignment and value checking mods by Craig Metz\n *\n *\t\tThis program is free software; you can redistribute it and/or\n *\t\tmodify it under the terms of the GNU General Public License...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
228
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2012 - Virtual Open Systems and Columbia University\n * Author: Christoffer Dall <c.dall@virtualopensystems.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License, version 2, as\n * published by the Free Softwa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
229
Determine whether the code is vulnerable or not.
[ "/******************************************************************************\n *\n * Back-end of the driver for virtual block devices. This portion of the\n * driver exports a 'unified' block-device interface that can be accessed\n * by any operating system that implements a compatible front end. A\n * referenc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
230
Determine whether the code is vulnerable or not.
[ "/* SCTP kernel implementation\n * (C) Copyright IBM Corp. 2002, 2004\n * Copyright (c) 2001 Nokia, Inc.\n * Copyright (c) 2001 La Monte H.P. Yarroll\n * Copyright (c) 2002-2003 Intel Corp.\n *\n * This file is part of the SCTP kernel implementation\n *\n * SCTP over IPv6.\n *\n * This SCTP implementation is free s...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
231
Determine whether the code is vulnerable or not.
[ "/* SCTP kernel implementation\n * (C) Copyright IBM Corp. 2002, 2004\n * Copyright (c) 2001 Nokia, Inc.\n * Copyright (c) 2001 La Monte H.P. Yarroll\n * Copyright (c) 2002-2003 Intel Corp.\n *\n * This file is part of the SCTP kernel implementation\n *\n * SCTP over IPv6.\n *\n * This SCTP implementation is free s...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
231
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2001-2002 Sistina Software (UK) Limited.\n * Copyright (C) 2006-2008 Red Hat GmbH\n *\n * This file is released under the GPL.\n */", "#include \"dm-exception-store.h\"", "#include <linux/mm.h>\n#include <linux/pagemap.h>\n#include <linux/vmalloc.h>\n#include <linux/export.h>\n#include <li...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
232
Determine whether the code is vulnerable or not.
[ "/*\n *\tIPv6 output functions\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tBased on linux/net/ipv4/ip_output.c\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
233
Determine whether the code is vulnerable or not.
[ "#include <linux/dcache.h>\n#include <linux/debugfs.h>\n#include <linux/delay.h>\n#include <linux/hardirq.h>\n#include <linux/mm.h>\n#include <linux/string.h>\n#include <linux/slab.h>\n#include <linux/export.h>", "#include \"decl.h\"\n#include \"cmd.h\"\n#include \"debugfs.h\"", "static struct dentry *lbs_dir;\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
234
Determine whether the code is vulnerable or not.
[ "/*\n *\tAdaptec AAC series RAID controller driver\n *\t(c) Copyright 2001 Red Hat Inc.\n *\n * based on the old aacraid driver that is..\n * Adaptec aacraid device driver for Linux.\n *\n * Copyright (c) 2000-2010 Adaptec, Inc.\n * 2010 PMC-Sierra, Inc. (aacraid@pmc-sierra.com)\n *\n * This program i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
235