prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"import xss from \"xss\";\nimport escape from \"discourse-common/lib/escape\";",
"function attr(name, value) {\n if (value) {\n return `${name}=\"${xss.escapeAttrValue(value)}\"`;\n }",
" return name;\n}",
"export { escape };",
"export function hrefAllowed(href, extraHrefMatchers) {\n // escape singl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [63, 138, 79], "buggy_code_start_loc": [19, 138, 78], "filenames": ["app/assets/javascripts/discourse/app/lib/d-popover.js", "app/assets/javascripts/discourse/tests/unit/lib/sanitizer-test.js", "app/assets/javascripts/pretty-text/addon/sanitizer.js"], "fixing_code_end_loc": [56, 144, 81], "fixing... | 813 |
Determine whether the {function_name} code is vulnerable or not. | [
"import xss from \"xss\";\nimport escape from \"discourse-common/lib/escape\";",
"function attr(name, value) {\n if (value) {\n return `${name}=\"${xss.escapeAttrValue(value)}\"`;\n }",
" return name;\n}",
"export { escape };",
"export function hrefAllowed(href, extraHrefMatchers) {\n // escape singl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [63, 138, 79], "buggy_code_start_loc": [19, 138, 78], "filenames": ["app/assets/javascripts/discourse/app/lib/d-popover.js", "app/assets/javascripts/discourse/tests/unit/lib/sanitizer-test.js", "app/assets/javascripts/pretty-text/addon/sanitizer.js"], "fixing_code_end_loc": [56, 144, 81], "fixing... | 813 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * algif_skcipher: User-space interface for skcipher algorithms\n *\n * This file provides the user-space API for symmetric key ciphers.\n *\n * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [822], "buggy_code_start_loc": [33], "filenames": ["crypto/algif_skcipher.c"], "fixing_code_end_loc": [856], "fixing_code_start_loc": [34], "message": "crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an... | 814 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * algif_skcipher: User-space interface for skcipher algorithms\n *\n * This file provides the user-space API for symmetric key ciphers.\n *\n * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [822], "buggy_code_start_loc": [33], "filenames": ["crypto/algif_skcipher.c"], "fixing_code_end_loc": [856], "fixing_code_start_loc": [34], "message": "crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an... | 814 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [100, 655], "buggy_code_start_loc": [83, 655], "filenames": ["tensorflow/lite/kernels/comparisons.cc", "tensorflow/lite/kernels/comparisons_test.cc"], "fixing_code_end_loc": [109, 676], "fixing_code_start_loc": [84, 656], "message": "TensorFlow is an open source platform for machine learning. Pri... | 815 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [100, 655], "buggy_code_start_loc": [83, 655], "filenames": ["tensorflow/lite/kernels/comparisons.cc", "tensorflow/lite/kernels/comparisons_test.cc"], "fixing_code_end_loc": [109, 676], "fixing_code_start_loc": [84, 656], "message": "TensorFlow is an open source platform for machine learning. Pri... | 815 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [100, 655], "buggy_code_start_loc": [83, 655], "filenames": ["tensorflow/lite/kernels/comparisons.cc", "tensorflow/lite/kernels/comparisons_test.cc"], "fixing_code_end_loc": [109, 676], "fixing_code_start_loc": [84, 656], "message": "TensorFlow is an open source platform for machine learning. Pri... | 815 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [100, 655], "buggy_code_start_loc": [83, 655], "filenames": ["tensorflow/lite/kernels/comparisons.cc", "tensorflow/lite/kernels/comparisons_test.cc"], "fixing_code_end_loc": [109, 676], "fixing_code_start_loc": [84, 656], "message": "TensorFlow is an open source platform for machine learning. Pri... | 815 |
Determine whether the {function_name} code is vulnerable or not. | [
"define( [\n\t\"../core\",\n\t\"../var/document\",\n\t\"../ajax\"\n], function( jQuery, document ) {",
"",
"\n// Install script dataType\njQuery.ajaxSetup( {\n\taccepts: {\n\t\tscript: \"text/javascript, application/javascript, \" +\n\t\t\t\"application/ecmascript, application/x-ecmascript\"\n\t},\n\tcontents: ... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 77], "buggy_code_start_loc": [5, 77], "filenames": ["src/ajax/script.js", "test/unit/ajax.js"], "fixing_code_end_loc": [13, 126], "fixing_code_start_loc": [6, 78], "message": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed... | 816 |
Determine whether the {function_name} code is vulnerable or not. | [
"define( [\n\t\"../core\",\n\t\"../var/document\",\n\t\"../ajax\"\n], function( jQuery, document ) {",
"\n// Prevent auto-execution of scripts when no explicit dataType was provided (See gh-2432)\njQuery.ajaxPrefilter( function( s ) {\n if ( s.crossDomain ) {\n s.contents.script = false;\n }\n} );",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 77], "buggy_code_start_loc": [5, 77], "filenames": ["src/ajax/script.js", "test/unit/ajax.js"], "fixing_code_end_loc": [13, 126], "fixing_code_start_loc": [6, 78], "message": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed... | 816 |
Determine whether the {function_name} code is vulnerable or not. | [
"var isIE8 = /msie 8\\.0/i.test( window.navigator.userAgent );",
"QUnit.module( \"ajax\", {\n\tsetup: function() {\n\t\tif ( !isIE8 ) {\n\t\t\treturn;\n\t\t}",
"\t\tvar jsonpCallback = this.jsonpCallback = jQuery.ajaxSettings.jsonpCallback;\n\t\tjQuery.ajaxSettings.jsonpCallback = function() {\n\t\t\tvar callba... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5, 77], "buggy_code_start_loc": [5, 77], "filenames": ["src/ajax/script.js", "test/unit/ajax.js"], "fixing_code_end_loc": [13, 126], "fixing_code_start_loc": [6, 78], "message": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed... | 816 |
Determine whether the {function_name} code is vulnerable or not. | [
"var isIE8 = /msie 8\\.0/i.test( window.navigator.userAgent );",
"QUnit.module( \"ajax\", {\n\tsetup: function() {\n\t\tif ( !isIE8 ) {\n\t\t\treturn;\n\t\t}",
"\t\tvar jsonpCallback = this.jsonpCallback = jQuery.ajaxSettings.jsonpCallback;\n\t\tjQuery.ajaxSettings.jsonpCallback = function() {\n\t\t\tvar callba... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5, 77], "buggy_code_start_loc": [5, 77], "filenames": ["src/ajax/script.js", "test/unit/ajax.js"], "fixing_code_end_loc": [13, 126], "fixing_code_start_loc": [6, 78], "message": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed... | 816 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* pam_tacplus.c - PAM interface for TACACS+ protocol.\n *\n * Copyright (C) 2010, Pawel Krawczyk <pawel.krawczyk@hush.com> and\n * Jeroen Nijhof <jeroen@jeroennijhof.nl>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as publish... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [518], "buggy_code_start_loc": [518], "filenames": ["pam_tacplus.c"], "fixing_code_end_loc": [520], "fixing_code_start_loc": [519], "message": "In pam_tacplus.c in pam_tacplus before 1.4.1, pam_sm_acct_mgmt does not zero out the arep data structure.", "other": {"cve": {"cisaActionDue": null, "cis... | 817 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* pam_tacplus.c - PAM interface for TACACS+ protocol.\n *\n * Copyright (C) 2010, Pawel Krawczyk <pawel.krawczyk@hush.com> and\n * Jeroen Nijhof <jeroen@jeroennijhof.nl>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as publish... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [518], "buggy_code_start_loc": [518], "filenames": ["pam_tacplus.c"], "fixing_code_end_loc": [520], "fixing_code_start_loc": [519], "message": "In pam_tacplus.c in pam_tacplus before 1.4.1, pam_sm_acct_mgmt does not zero out the arep data structure.", "other": {"cve": {"cisaActionDue": null, "cis... | 817 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Apache 2.0 - Copyright 2007-2022 - pancake and dso\n class.c rewrite: Adam Pridgen <dso@rice.edu || adam.pridgen@thecoverofnight.com>\n */\n#include <stdio.h>\n#include <string.h>\n#include <stdlib.h>\n#include <stdarg.h>\n#include <r_types.h>\n#include <r_util.h>\n#include <r_bin.h>\n#include <math.h>\n#incl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [7085], "buggy_code_start_loc": [1960], "filenames": ["shlr/java/class.c"], "fixing_code_end_loc": [7089], "fixing_code_start_loc": [1960], "message": "Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the progr... | 818 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Apache 2.0 - Copyright 2007-2022 - pancake and dso\n class.c rewrite: Adam Pridgen <dso@rice.edu || adam.pridgen@thecoverofnight.com>\n */\n#include <stdio.h>\n#include <string.h>\n#include <stdlib.h>\n#include <stdarg.h>\n#include <r_types.h>\n#include <r_util.h>\n#include <r_bin.h>\n#include <math.h>\n#incl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [7085], "buggy_code_start_loc": [1960], "filenames": ["shlr/java/class.c"], "fixing_code_end_loc": [7089], "fixing_code_start_loc": [1960], "message": "Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the progr... | 818 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Hardware performance events for the Alpha.\n *\n * We implement HW counts on the EV67 and subsequent CPUs only.\n *\n * (C) 2010 Michael J. Cree\n *\n * Somewhat based on the Sparc code, and to a lesser extent the PowerPC and\n * ARM code, which are copyright by their respective authors.\n */",
"#include ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Hardware performance events for the Alpha.\n *\n * We implement HW counts on the EV67 and subsequent CPUs only.\n *\n * (C) 2010 Michael J. Cree\n *\n * Somewhat based on the Sparc code, and to a lesser extent the PowerPC and\n * ARM code, which are copyright by their respective authors.\n */",
"#include ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * ARMv6 Performance counter handling code.\n *\n * Copyright (C) 2009 picoChip Designs, Ltd., Jamie Iles\n *\n * ARMv6 has 2 configurable performance counters and a single cycle counter.\n * They all share a single reset bit but can be written to zero so we can use\n * that for a reset.\n *\n * The counters c... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * ARMv6 Performance counter handling code.\n *\n * Copyright (C) 2009 picoChip Designs, Ltd., Jamie Iles\n *\n * ARMv6 has 2 configurable performance counters and a single cycle counter.\n * They all share a single reset bit but can be written to zero so we can use\n * that for a reset.\n *\n * The counters c... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * ARMv7 Cortex-A8 and Cortex-A9 Performance Events handling code.\n *\n * ARMv7 support: Jean Pihet <jpihet@mvista.com>\n * 2010 (c) MontaVista Software, LLC.\n *\n * Copied from ARMv6 code, with the low level code inspired\n * by the ARMv7 Oprofile code.\n *\n * Cortex-A8 has up to 4 configurable performanc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * ARMv7 Cortex-A8 and Cortex-A9 Performance Events handling code.\n *\n * ARMv7 support: Jean Pihet <jpihet@mvista.com>\n * 2010 (c) MontaVista Software, LLC.\n *\n * Copied from ARMv6 code, with the low level code inspired\n * by the ARMv7 Oprofile code.\n *\n * Cortex-A8 has up to 4 configurable performanc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * ARMv5 [xscale] Performance counter handling code.\n *\n * Copyright (C) 2010, ARM Ltd., Will Deacon <will.deacon@arm.com>\n *\n * Based on the previous xscale OProfile code.\n *\n * There are two variants of the xscale PMU that we support:\n * \t- xscale1pmu: 2 event counters and a cycle counter\n * \t- xsc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * ARMv5 [xscale] Performance counter handling code.\n *\n * Copyright (C) 2010, ARM Ltd., Will Deacon <will.deacon@arm.com>\n *\n * Based on the previous xscale OProfile code.\n *\n * There are two variants of the xscale PMU that we support:\n * \t- xscale1pmu: 2 event counters and a cycle counter\n * \t- xsc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/arch/arm/kernel/ptrace.c\n *\n * By Ross Biro 1/23/92\n * edited by Linus Torvalds\n * ARM modifications Copyright (C) 2000 Russell King\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/arch/arm/kernel/ptrace.c\n *\n * By Ross Biro 1/23/92\n * edited by Linus Torvalds\n * ARM modifications Copyright (C) 2000 Russell King\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/arch/arm/kernel/swp_emulate.c\n *\n * Copyright (C) 2009 ARM Limited\n * __user_* functions adapted from include/asm/uaccess.h\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/arch/arm/kernel/swp_emulate.c\n *\n * Copyright (C) 2009 ARM Limited\n * __user_* functions adapted from include/asm/uaccess.h\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/arch/arm/mm/fault.c\n *\n * Copyright (C) 1995 Linus Torvalds\n * Modifications for ARM processor (c) 1995-2004 Russell King\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/arch/arm/mm/fault.c\n *\n * Copyright (C) 1995 Linus Torvalds\n * Modifications for ARM processor (c) 1995-2004 Russell King\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Linux performance counter support for MIPS.\n *\n * Copyright (C) 2010 MIPS Technologies, Inc.\n * Author: Deng-Cheng Zhu\n *\n * This code is based on the implementation for ARM, which is in turn\n * based on the sparc64 perf event code and the x86 code. Performance\n * counter access is based on the MIPS ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Linux performance counter support for MIPS.\n *\n * Copyright (C) 2010 MIPS Technologies, Inc.\n * Author: Deng-Cheng Zhu\n *\n * This code is based on the implementation for ARM, which is in turn\n * based on the sparc64 perf event code and the x86 code. Performance\n * counter access is based on the MIPS ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n *\n * Copyright (C) 1994 - 1999, 2000, 01, 06 Ralf Baechle\n * Copyright (C) 1995, 1996 Paul M. Antoine\n * Copyright (C) 1998 Ulf C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n *\n * Copyright (C) 1994 - 1999, 2000, 01, 06 Ralf Baechle\n * Copyright (C) 1995, 1996 Paul M. Antoine\n * Copyright (C) 1998 Ulf C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Handle unaligned accesses by emulation.\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n *\n * Copyright (C) 1996, 1998, 1999, 2002 by Ralf Baechle\n * Copyright (C) 1999 Si... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Handle unaligned accesses by emulation.\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n *\n * Copyright (C) 1996, 1998, 1999, 2002 by Ralf Baechle\n * Copyright (C) 1999 Si... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * cp1emu.c: a MIPS coprocessor 1 (fpu) instruction emulator\n *\n * MIPS floating point support\n * Copyright (C) 1994-2000 Algorithmics Ltd.\n *\n * Kevin D. Kissell, kevink@mips.com and Carsten Langgaard, carstenl@mips.com\n * Copyright (C) 2000 MIPS Technologies, Inc.\n *\n * This program is free softwar... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * cp1emu.c: a MIPS coprocessor 1 (fpu) instruction emulator\n *\n * MIPS floating point support\n * Copyright (C) 1994-2000 Algorithmics Ltd.\n *\n * Kevin D. Kissell, kevink@mips.com and Carsten Langgaard, carstenl@mips.com\n * Copyright (C) 2000 MIPS Technologies, Inc.\n *\n * This program is free softwar... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n *\n * Copyright (C) 1995 - 2000 by Ralf Baechle\n */\n#include <linux/signal.h>\n#include <linux/sched.h>\n#include <linux/interrupt... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n *\n * Copyright (C) 1995 - 2000 by Ralf Baechle\n */\n#include <linux/signal.h>\n#include <linux/sched.h>\n#include <linux/interrupt... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2007 Sony Corporation\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; version 2 of the License.\n *\n * This program is distributed in the hope that it will ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2007 Sony Corporation\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; version 2 of the License.\n *\n * This program is distributed in the hope that it will ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance event support - powerpc architecture code\n *\n * Copyright 2008-2009 Paul Mackerras, IBM Corporation.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free Software Foundation; either ve... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance event support - powerpc architecture code\n *\n * Copyright 2008-2009 Paul Mackerras, IBM Corporation.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free Software Foundation; either ve... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance event support - Freescale Embedded Performance Monitor\n *\n * Copyright 2008-2009 Paul Mackerras, IBM Corporation.\n * Copyright 2010 Freescale Semiconductor, Inc.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public Licen... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance event support - Freescale Embedded Performance Monitor\n *\n * Copyright 2008-2009 Paul Mackerras, IBM Corporation.\n * Copyright 2010 Freescale Semiconductor, Inc.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public Licen... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * PowerPC version\n * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)\n *\n * Derived from \"arch/m68k/kernel/ptrace.c\"\n * Copyright (C) 1994 by Hamish Macdonald\n * Taken from linux/kernel/ptrace.c and modified for M680x0.\n * linux/kernel/ptrace.c is by Ross Biro 1/23/92, edited by Linus To... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * PowerPC version\n * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)\n *\n * Derived from \"arch/m68k/kernel/ptrace.c\"\n * Copyright (C) 1994 by Hamish Macdonald\n * Taken from linux/kernel/ptrace.c and modified for M680x0.\n * linux/kernel/ptrace.c is by Ross Biro 1/23/92, edited by Linus To... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * PowerPC version\n * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)\n *\n * Derived from \"arch/i386/mm/fault.c\"\n * Copyright (C) 1991, 1992, 1993, 1994 Linus Torvalds\n *\n * Modified by Cort Dougan and Paul Mackerras.\n *\n * Modified for PPC64 by Dave Engebretsen (engebret@ibm.com)\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * PowerPC version\n * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)\n *\n * Derived from \"arch/i386/mm/fault.c\"\n * Copyright (C) 1991, 1992, 1993, 1994 Linus Torvalds\n *\n * Modified by Cort Dougan and Paul Mackerras.\n *\n * Modified for PPC64 by Dave Engebretsen (engebret@ibm.com)\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/s390/mm/fault.c\n *\n * S390 version\n * Copyright (C) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation\n * Author(s): Hartmut Penner (hp@de.ibm.com)\n * Ulrich Weigand (uweigand@de.ibm.com)\n *\n * Derived from \"arch/i386/mm/fault.c\"\n * Copyright (C) 1995 Linus Torv... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/s390/mm/fault.c\n *\n * S390 version\n * Copyright (C) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation\n * Author(s): Hartmut Penner (hp@de.ibm.com)\n * Ulrich Weigand (uweigand@de.ibm.com)\n *\n * Derived from \"arch/i386/mm/fault.c\"\n * Copyright (C) 1995 Linus Torv... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * SuperH process tracing\n *\n * Copyright (C) 1999, 2000 Kaz Kojima & Niibe Yutaka\n * Copyright (C) 2002 - 2009 Paul Mundt\n *\n * Audit support by Yuichi Nakamura <ynakam@hitachisoft.jp>\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYIN... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * SuperH process tracing\n *\n * Copyright (C) 1999, 2000 Kaz Kojima & Niibe Yutaka\n * Copyright (C) 2002 - 2009 Paul Mundt\n *\n * Audit support by Yuichi Nakamura <ynakam@hitachisoft.jp>\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYIN... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * 'traps.c' handles hardware traps and faults after we have saved some\n * state in 'entry.S'.\n *\n * SuperH version: Copyright (C) 1999 Niibe Yutaka\n * Copyright (C) 2000 Philipp Rumpf\n * Copyright (C) 2000 David Howells\n * Copyright (C) 2002 - 2010 Pau... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * 'traps.c' handles hardware traps and faults after we have saved some\n * state in 'entry.S'.\n *\n * SuperH version: Copyright (C) 1999 Niibe Yutaka\n * Copyright (C) 2000 Philipp Rumpf\n * Copyright (C) 2000 David Howells\n * Copyright (C) 2002 - 2010 Pau... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sh/kernel/traps_64.c\n *\n * Copyright (C) 2000, 2001 Paolo Alberelli\n * Copyright (C) 2003, 2004 Paul Mundt\n * Copyright (C) 2003, 2004 Richard Curnow\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sh/kernel/traps_64.c\n *\n * Copyright (C) 2000, 2001 Paolo Alberelli\n * Copyright (C) 2003, 2004 Paul Mundt\n * Copyright (C) 2003, 2004 Richard Curnow\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sh/math-emu/math.c\n *\n * Copyright (C) 2006 Takashi YOSHII <takasi-y@ops.dti.ne.jp>\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n */\n#include <linux/kernel.h>\n#i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sh/math-emu/math.c\n *\n * Copyright (C) 2006 Takashi YOSHII <takasi-y@ops.dti.ne.jp>\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the main directory of this archive\n * for more details.\n */\n#include <linux/kernel.h>\n#i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Page fault handler for SH with an MMU.\n *\n * Copyright (C) 1999 Niibe Yutaka\n * Copyright (C) 2003 - 2009 Paul Mundt\n *\n * Based on linux/arch/i386/mm/fault.c:\n * Copyright (C) 1995 Linus Torvalds\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Page fault handler for SH with an MMU.\n *\n * Copyright (C) 1999 Niibe Yutaka\n * Copyright (C) 2003 - 2009 Paul Mundt\n *\n * Based on linux/arch/i386/mm/fault.c:\n * Copyright (C) 1995 Linus Torvalds\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sh/mm/tlb-flush_64.c\n *\n * Copyright (C) 2000, 2001 Paolo Alberelli\n * Copyright (C) 2003 Richard Curnow (/proc/tlb, bug fixes)\n * Copyright (C) 2003 - 2009 Paul Mundt\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sh/mm/tlb-flush_64.c\n *\n * Copyright (C) 2000, 2001 Paolo Alberelli\n * Copyright (C) 2003 Richard Curnow (/proc/tlb, bug fixes)\n * Copyright (C) 2003 - 2009 Paul Mundt\n *\n * This file is subject to the terms and conditions of the GNU General Public\n * License. See the file \"COPYING\" in the ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Performance event support for sparc64.\n *\n * Copyright (C) 2009, 2010 David S. Miller <davem@davemloft.net>\n *\n * This code is based almost entirely upon the x86 perf event\n * code, which is:\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2009 Red Hat, Inc., Ingo M... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Performance event support for sparc64.\n *\n * Copyright (C) 2009, 2010 David S. Miller <davem@davemloft.net>\n *\n * This code is based almost entirely upon the x86 perf event\n * code, which is:\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2009 Red Hat, Inc., Ingo M... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * unaligned.c: Unaligned load/store trap handling with special\n * cases for the kernel to do them more quickly.\n *\n * Copyright (C) 1996 David S. Miller (davem@caip.rutgers.edu)\n * Copyright (C) 1996 Jakub Jelinek (jj@sunsite.mff.cuni.cz)\n */",
"\n#include <linux/kernel.h>\n#include <linux... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * unaligned.c: Unaligned load/store trap handling with special\n * cases for the kernel to do them more quickly.\n *\n * Copyright (C) 1996 David S. Miller (davem@caip.rutgers.edu)\n * Copyright (C) 1996 Jakub Jelinek (jj@sunsite.mff.cuni.cz)\n */",
"\n#include <linux/kernel.h>\n#include <linux... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * unaligned.c: Unaligned load/store trap handling with special\n * cases for the kernel to do them more quickly.\n *\n * Copyright (C) 1996,2008 David S. Miller (davem@davemloft.net)\n * Copyright (C) 1996,1997 Jakub Jelinek (jj@sunsite.mff.cuni.cz)\n */",
"\n#include <linux/jiffies.h>\n#includ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * unaligned.c: Unaligned load/store trap handling with special\n * cases for the kernel to do them more quickly.\n *\n * Copyright (C) 1996,2008 David S. Miller (davem@davemloft.net)\n * Copyright (C) 1996,1997 Jakub Jelinek (jj@sunsite.mff.cuni.cz)\n */",
"\n#include <linux/jiffies.h>\n#includ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* visemul.c: Emulation of VIS instructions.\n *\n * Copyright (C) 2006 David S. Miller (davem@davemloft.net)\n */\n#include <linux/kernel.h>\n#include <linux/errno.h>\n#include <linux/thread_info.h>\n#include <linux/perf_event.h>",
"#include <asm/ptrace.h>\n#include <asm/pstate.h>\n#include <asm/system.h>\n#inc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* visemul.c: Emulation of VIS instructions.\n *\n * Copyright (C) 2006 David S. Miller (davem@davemloft.net)\n */\n#include <linux/kernel.h>\n#include <linux/errno.h>\n#include <linux/thread_info.h>\n#include <linux/perf_event.h>",
"#include <asm/ptrace.h>\n#include <asm/pstate.h>\n#include <asm/system.h>\n#inc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sparc/math-emu/math.c\n *\n * Copyright (C) 1998 Peter Maydell (pmaydell@chiark.greenend.org.uk)\n * Copyright (C) 1997, 1999 Jakub Jelinek (jj@ultra.linux.cz)\n * Copyright (C) 1999 David S. Miller (davem@redhat.com)\n *\n * This is a good place to start if you're trying to understand the\n * emulatio... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sparc/math-emu/math.c\n *\n * Copyright (C) 1998 Peter Maydell (pmaydell@chiark.greenend.org.uk)\n * Copyright (C) 1997, 1999 Jakub Jelinek (jj@ultra.linux.cz)\n * Copyright (C) 1999 David S. Miller (davem@redhat.com)\n *\n * This is a good place to start if you're trying to understand the\n * emulatio... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sparc64/math-emu/math.c\n *\n * Copyright (C) 1997,1999 Jakub Jelinek (jj@ultra.linux.cz)\n * Copyright (C) 1999 David S. Miller (davem@redhat.com)\n *\n * Emulation routines originate from soft-fp package, which is part\n * of glibc and has appropriate copyrights in it.\n */",
"#include <linux/types... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sparc64/math-emu/math.c\n *\n * Copyright (C) 1997,1999 Jakub Jelinek (jj@ultra.linux.cz)\n * Copyright (C) 1999 David S. Miller (davem@redhat.com)\n *\n * Emulation routines originate from soft-fp package, which is part\n * of glibc and has appropriate copyrights in it.\n */",
"#include <linux/types... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * fault.c: Page fault handlers for the Sparc.\n *\n * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu)\n * Copyright (C) 1996 Eddie C. Dost (ecd@skynet.be)\n * Copyright (C) 1997 Jakub Jelinek (jj@sunsite.mff.cuni.cz)\n */",
"#include <asm/head.h>",
"#include <linux/string.h>\n#include <linux/... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * fault.c: Page fault handlers for the Sparc.\n *\n * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu)\n * Copyright (C) 1996 Eddie C. Dost (ecd@skynet.be)\n * Copyright (C) 1997 Jakub Jelinek (jj@sunsite.mff.cuni.cz)\n */",
"#include <asm/head.h>",
"#include <linux/string.h>\n#include <linux/... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sparc64/mm/fault.c: Page fault handlers for the 64-bit Sparc.\n *\n * Copyright (C) 1996, 2008 David S. Miller (davem@davemloft.net)\n * Copyright (C) 1997, 1999 Jakub Jelinek (jj@ultra.linux.cz)\n */",
"#include <asm/head.h>",
"#include <linux/string.h>\n#include <linux/types.h>\n#include <linux/s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * arch/sparc64/mm/fault.c: Page fault handlers for the 64-bit Sparc.\n *\n * Copyright (C) 1996, 2008 David S. Miller (davem@davemloft.net)\n * Copyright (C) 1997, 1999 Jakub Jelinek (jj@ultra.linux.cz)\n */",
"#include <asm/head.h>",
"#include <linux/string.h>\n#include <linux/types.h>\n#include <linux/s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance events x86 architecture code\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2009 Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2009 Jaswinder Singh Rajput\n * Copyright (C) 2009 Advanced Micro Devices, Inc., Robert Richter\n * Copyright (C) 2008-2009 R... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance events x86 architecture code\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2009 Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2009 Jaswinder Singh Rajput\n * Copyright (C) 2009 Advanced Micro Devices, Inc., Robert Richter\n * Copyright (C) 2008-2009 R... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifdef CONFIG_CPU_SUP_INTEL",
"#define MAX_EXTRA_REGS 2",
"/*\n * Per register state.\n */\nstruct er_account {\n\tint\t\t\tref;\t\t/* reference count */\n\tunsigned int\t\textra_reg;\t/* extra MSR number */\n\tu64\t\t\textra_config;\t/* extra MSR config */\n};",
"/*\n * Per core state\n * This used to coord... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifdef CONFIG_CPU_SUP_INTEL",
"#define MAX_EXTRA_REGS 2",
"/*\n * Per register state.\n */\nstruct er_account {\n\tint\t\t\tref;\t\t/* reference count */\n\tunsigned int\t\textra_reg;\t/* extra MSR number */\n\tu64\t\t\textra_config;\t/* extra MSR config */\n};",
"/*\n * Per core state\n * This used to coord... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifdef CONFIG_CPU_SUP_INTEL",
"/* The maximal number of PEBS events: */\n#define MAX_PEBS_EVENTS\t\t4",
"/* The size of a BTS record in bytes: */\n#define BTS_RECORD_SIZE\t\t24",
"#define BTS_BUFFER_SIZE\t\t(PAGE_SIZE << 4)\n#define PEBS_BUFFER_SIZE\tPAGE_SIZE",
"/*\n * pebs_record_32 for p4 and core not s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifdef CONFIG_CPU_SUP_INTEL",
"/* The maximal number of PEBS events: */\n#define MAX_PEBS_EVENTS\t\t4",
"/* The size of a BTS record in bytes: */\n#define BTS_RECORD_SIZE\t\t24",
"#define BTS_BUFFER_SIZE\t\t(PAGE_SIZE << 4)\n#define PEBS_BUFFER_SIZE\tPAGE_SIZE",
"/*\n * pebs_record_32 for p4 and core not s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Netburst Performance Events (P4, old Xeon)\n *\n * Copyright (C) 2010 Parallels, Inc., Cyrill Gorcunov <gorcunov@openvz.org>\n * Copyright (C) 2010 Intel Corporation, Lin Ming <ming.m.lin@intel.com>\n *\n * For licencing details see kernel-base/COPYING\n */",
"#ifdef CONFIG_CPU_SUP_INTEL",
"#include ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Netburst Performance Events (P4, old Xeon)\n *\n * Copyright (C) 2010 Parallels, Inc., Cyrill Gorcunov <gorcunov@openvz.org>\n * Copyright (C) 2010 Intel Corporation, Lin Ming <ming.m.lin@intel.com>\n *\n * For licencing details see kernel-base/COPYING\n */",
"#ifdef CONFIG_CPU_SUP_INTEL",
"#include ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the\n * Free Software Foundation; either version 2, or (at your option) any\n * later version.\n *\n * This program is distributed in the hope that it will be useful,... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the\n * Free Software Foundation; either version 2, or (at your option) any\n * later version.\n *\n * This program is distributed in the hope that it will be useful,... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* By Ross Biro 1/23/92 */\n/*\n * Pentium III FXSR, SSE support\n *\tGareth Hughes <gareth@valinux.com>, May 2000\n */",
"#include <linux/kernel.h>\n#include <linux/sched.h>\n#include <linux/mm.h>\n#include <linux/smp.h>\n#include <linux/errno.h>\n#include <linux/slab.h>\n#include <linux/ptrace.h>\n#include <li... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* By Ross Biro 1/23/92 */\n/*\n * Pentium III FXSR, SSE support\n *\tGareth Hughes <gareth@valinux.com>, May 2000\n */",
"#include <linux/kernel.h>\n#include <linux/sched.h>\n#include <linux/mm.h>\n#include <linux/smp.h>\n#include <linux/errno.h>\n#include <linux/slab.h>\n#include <linux/ptrace.h>\n#include <li... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 1995 Linus Torvalds\n * Copyright (C) 2001, 2002 Andi Kleen, SuSE Labs.\n * Copyright (C) 2008-2009, Red Hat Inc., Ingo Molnar\n */\n#include <linux/magic.h>\t\t/* STACK_END_MAGIC\t\t*/\n#include <linux/sched.h>\t\t/* test_thread_flag(), ...\t*/\n#include <linux/kdebug.h>\t\t/* oops_begin/... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 1995 Linus Torvalds\n * Copyright (C) 2001, 2002 Andi Kleen, SuSE Labs.\n * Copyright (C) 2008-2009, Red Hat Inc., Ingo Molnar\n */\n#include <linux/magic.h>\t\t/* STACK_END_MAGIC\t\t*/\n#include <linux/sched.h>\t\t/* test_thread_flag(), ...\t*/\n#include <linux/kdebug.h>\t\t/* oops_begin/... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance events:\n *\n * Copyright (C) 2008-2009, Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2011, Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2008-2011, Red Hat, Inc., Peter Zijlstra\n *\n * Data type definitions, declarations, prototypes.\n *\n * Started by: Thomas Gleixne... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance events:\n *\n * Copyright (C) 2008-2009, Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2011, Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2008-2011, Red Hat, Inc., Peter Zijlstra\n *\n * Data type definitions, declarations, prototypes.\n *\n * Started by: Thomas Gleixne... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance events core code:\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2011 Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2008-2011 Red Hat, Inc., Peter Zijlstra <pzijlstr@redhat.com>\n * Copyright � 2009 Paul Mackerras, IBM Corp. <paulus@au1.ibm.com>\n *\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Performance events core code:\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2011 Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2008-2011 Red Hat, Inc., Peter Zijlstra <pzijlstr@redhat.com>\n * Copyright � 2009 Paul Mackerras, IBM Corp. <paulus@au1.ibm.com>\n *\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifndef _KERNEL_EVENTS_INTERNAL_H\n#define _KERNEL_EVENTS_INTERNAL_H",
"#define RING_BUFFER_WRITABLE\t\t0x01",
"struct ring_buffer {\n\tatomic_t\t\t\trefcount;\n\tstruct rcu_head\t\t\trcu_head;\n#ifdef CONFIG_PERF_USE_VMALLOC\n\tstruct work_struct\t\twork;\n\tint\t\t\t\tpage_order;\t/* allocation order */\n#e... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifndef _KERNEL_EVENTS_INTERNAL_H\n#define _KERNEL_EVENTS_INTERNAL_H",
"#define RING_BUFFER_WRITABLE\t\t0x01",
"struct ring_buffer {\n\tatomic_t\t\t\trefcount;\n\tstruct rcu_head\t\t\trcu_head;\n#ifdef CONFIG_PERF_USE_VMALLOC\n\tstruct work_struct\t\twork;\n\tint\t\t\t\tpage_order;\t/* allocation order */\n#e... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5... | 819 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.