prompt
stringclasses
547 values
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
5 values
index
int64
0
151k
Determine whether the code is vulnerable or not.
[ "/*\n * kernel/sched.c\n *\n * Kernel scheduler and related syscalls\n *\n * Copyright (C) 1991-2002 Linus Torvalds\n *\n * 1996-12-23 Modified by Dave Grothe to fix bugs in semaphores and\n *\t\tmake semaphores SMP safe\n * 1998-11-19\tImplemented schedule_timeout() and related stuff\n *\t\tby Andrea Arcang...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
31
Determine whether the code is vulnerable or not.
[ "/*\n * fs/cifs/dir.c\n *\n * vfs operations that deal with dentries\n *\n * Copyright (C) International Business Machines Corp., 2002,2009\n * Author(s): Steve French (sfrench@us.ibm.com)\n *\n * This library is free software; you can redistribute it and/or modify\n * it under the terms of the GNU Les...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
32
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/binfmt_elf.c\n *\n * These are the functions used to load ELF format executables as used\n * on SVr4 machines. Information on the format may be found in the book\n * \"UNIX SYSTEM V RELEASE 4 Programmers Guide: Ansi C and Programming Support\n * Tools\".\n *\n * Copyright 1993, 1994: Eric Youngdal...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
33
Determine whether the code is vulnerable or not.
[ "/*\n * User-mode machine state access\n *\n * Copyright (C) 2007 Red Hat, Inc. All rights reserved.\n *\n * This copyrighted material is made available to anyone wishing to use,\n * modify, copy, or redistribute it subject to the terms and conditions\n * of the GNU General Public License v.2.\n *\n * Red Hat Auth...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
33
Determine whether the code is vulnerable or not.
[ "/* memcontrol.c - Memory Controller\n *\n * Copyright IBM Corporation, 2007\n * Author Balbir Singh <balbir@linux.vnet.ibm.com>\n *\n * Copyright 2007 OpenVZ SWsoft Inc\n * Author: Pavel Emelianov <xemul@openvz.org>\n *\n * Memory thresholds\n * Copyright (C) 2009 Nokia Corporation\n * Author: Kirill A. Shutemov\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
34
Determine whether the code is vulnerable or not.
[ "/*\n * kvm_ia64.c: Basic KVM suppport On Itanium series processors\n *\n *\n * \tCopyright (C) 2007, Intel Corporation.\n * \tXiantao Zhang (xiantao.zhang@intel.com)\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public Licens...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
35
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * derived from drivers/kvm/kvm_main.c\n *\n * Copyright (C) 2006 Qumranet, Inc.\n * Copyright (C) 2008 Qumranet, Inc.\n * Copyright IBM Corporation, 2008\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * Authors:\n * Avi Kivity <avi@qumra...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
35
Determine whether the code is vulnerable or not.
[ "#ifndef __KVM_HOST_H\n#define __KVM_HOST_H", "/*\n * This work is licensed under the terms of the GNU GPL, version 2. See\n * the COPYING file in the top-level directory.\n */", "#include <linux/types.h>\n#include <linux/hardirq.h>\n#include <linux/list.h>\n#include <linux/mutex.h>\n#include <linux/spinlock.h...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
35
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * This module enables machines with Intel VT-x extensions to run virtual\n * machines without emulation or binary translation.\n *\n * Copyright (C) 2006 Qumranet, Inc.\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * Authors:\n * Avi Kivi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
35
Determine whether the code is vulnerable or not.
[ "#ifndef __KVM_HOST_H\n#define __KVM_HOST_H", "/*\n * This work is licensed under the terms of the GNU GPL, version 2. See\n * the COPYING file in the top-level directory.\n */", "#include <linux/types.h>\n#include <linux/hardirq.h>\n#include <linux/list.h>\n#include <linux/mutex.h>\n#include <linux/spinlock.h...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
36
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2006, Intel Corporation.\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\n * version 2, as published by the Free Software Foundation.\n *\n * This program is distributed in the hope it will be...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1...
REPOSVUL
36
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2006, Intel Corporation.\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\n * version 2, as published by the Free Software Foundation.\n *\n * This program is distributed in the hope it will be...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
36
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * This module enables machines with Intel VT-x extensions to run virtual\n * machines without emulation or binary translation.\n *\n * Copyright (C) 2006 Qumranet, Inc.\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * Authors:\n * Avi Kivi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
36
Determine whether the code is vulnerable or not.
[ "/*\n * fs/nfs/nfs4proc.c\n *\n * Client-side procedure declarations for NFSv4.\n *\n * Copyright (c) 2002 The Regents of the University of Michigan.\n * All rights reserved.\n *\n * Kendrick Smith <kmsmith@umich.edu>\n * Andy Adamson <andros@umich.edu>\n *\n * Redistribution and use in source and binary f...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
37
Determine whether the code is vulnerable or not.
[ "/*\n * fs/nfs/nfs4xdr.c\n *\n * Client-side XDR for NFSv4.\n *\n * Copyright (c) 2002 The Regents of the University of Michigan.\n * All rights reserved.\n *\n * Kendrick Smith <kmsmith@umich.edu>\n * Andy Adamson <andros@umich.edu>\n *\n * Redistribution and use in source and binary forms, with or withou...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
37
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_NFS_XDR_H\n#define _LINUX_NFS_XDR_H", "#include <linux/nfsacl.h>\n#include <linux/nfs3.h>\n#include <linux/sunrpc/gss_api.h>", "/*\n * To change the maximum rsize and wsize supported by the NFS client, adjust\n * NFS_MAX_FILE_IO_SIZE. 64KB is a typical maximum, but some servers can\n * support ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
37
Determine whether the code is vulnerable or not.
[ "/*\n * XDR standard data types and function declarations\n *\n * Copyright (C) 1995-1997 Olaf Kirch <okir@monad.swb.de>\n *\n * Based on:\n * RFC 4506 \"XDR: External Data Representation Standard\", May 2006\n */", "#ifndef _SUNRPC_XDR_H_\n#define _SUNRPC_XDR_H_", "#ifdef __KERNEL__", "#include <linux/uio....
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
37
Determine whether the code is vulnerable or not.
[ "/*\n * linux/net/sunrpc/xdr.c\n *\n * Generic XDR support.\n *\n * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>\n */", "#include <linux/module.h>\n#include <linux/slab.h>\n#include <linux/types.h>\n#include <linux/string.h>\n#include <linux/kernel.h>\n#include <linux/pagemap.h>\n#include <linux/errno....
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
37
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/hfsplus/catalog.c\n *\n * Copyright (C) 2001\n * Brad Boyer (flar@allandria.com)\n * (C) 2003 Ardis Technologies <roman@ardistech.com>\n *\n * Handling of catalog records\n */", "\n#include \"hfsplus_fs.h\"\n#include \"hfsplus_raw.h\"", "int hfsplus_cat_case_cmp_key(const hfsplus_btree_key *k1...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
38
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/hfsplus/dir.c\n *\n * Copyright (C) 2001\n * Brad Boyer (flar@allandria.com)\n * (C) 2003 Ardis Technologies <roman@ardistech.com>\n *\n * Handling of directories\n */", "#include <linux/errno.h>\n#include <linux/fs.h>\n#include <linux/slab.h>\n#include <linux/random.h>", "#include \"hfsplus_f...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
38
Determine whether the code is vulnerable or not.
[ "/*\n * linux/mm/oom_kill.c\n * \n * Copyright (C) 1998,2000 Rik van Riel\n *\tThanks go out to Claus Fischer for some serious inspiration and\n *\tfor goading me into coding this file...\n * Copyright (C) 2010 Google, Inc.\n *\tRewritten by David Rientjes\n *\n * The routines in this file are used to kill ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
39
Determine whether the code is vulnerable or not.
[ "/* $Id: isdn_net.c,v 1.1.2.2 2004/01/12 22:37:19 keil Exp $\n *\n * Linux ISDN subsystem, network interfaces and related functions (linklevel).\n *\n * Copyright 1994-1998 by Fritz Elfert (fritz@isdn4linux.de)\n * Copyright 1995,96 by Thinking Objects Software GmbH Wuerzburg\n * Copyright 1995,96 by Michael...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * originally based on the dummy device.\n *\n * Copyright 1999, Thomas Davis, tadavis@lbl.gov.\n * Licensed under the GPL. Based on dummy.c, and eql.c devices.\n *\n * bonding.c: an Ethernet Bonding driver\n *\n * This is useful to talk to a Cisco EtherChannel compatible equipment:\n *\tCisco 5500\n *\tSun Tr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/* drivers/net/ifb.c:", "\tThe purpose of this driver is to provide a device that allows\n\tfor sharing of resources:", "\t1) qdiscs/policies that are per device as opposed to system wide.\n\tifb allows for a device which can be redirected to thus providing\n\tan impression of sharing.", "\t2) Allows for que...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2007 Patrick McHardy <kaber@trash.net>\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by the Free Software Foundation; either version 2 of\n * the License, or (at your option) any later vers...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * TUN - Universal TUN/TAP device driver.\n * Copyright (C) 1999-2002 Maxim Krasnyansky <maxk@qualcomm.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * drivers/net/veth.c\n *\n * Copyright (C) 2007 OpenVZ http://openvz.org, SWsoft Inc\n *\n * Author: Pavel Emelianov <xemul@openvz.org>\n * Ethtool interface from: Eric W. Biederman <ebiederm@xmission.com>\n *\n */", "#include <linux/netdevice.h>\n#include <linux/slab.h>\n#include <linux/ethtool.h>\n#incl...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * Generic HDLC support routines for Linux\n * Frame Relay support\n *\n * Copyright (C) 1999 - 2006 Krzysztof Halasa <khc@pm.waw.pl>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of version 2 of the GNU General Public License\n * as published by the Free S...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*======================================================================", " Aironet driver for 4500 and 4800 series cards", " This code is released under both the GPL version 2 and BSD licenses.\n Either license may be used. The respective licenses are found at\n the end of this file.", " Th...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * Host AP (software wireless LAN access point) driver for\n * Intersil Prism2/2.5/3 - hostap.o module, common routines\n *\n * Copyright (c) 2001-2002, SSH Communications Security Corp and Jouni Malinen\n * <j@w1.fi>\n * Copyright (c) 2002-2005, Jouni Malinen <j@w1.fi>\n *\n * This program is free software; y...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "//------------------------------------------------------------------------------\n// Copyright (c) 2004-2010 Atheros Communications Inc.\n// All rights reserved.\n//\n// \n//\n// Permission to use, copy, modify, and/or distribute this software for any\n// purpose with or without fee is hereby granted, provided tha...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/* -*- linux-c -*-\n * INET\t\t802.1Q VLAN\n *\t\tEthernet-type device handling.\n *\n * Authors:\tBen Greear <greearb@candelatech.com>\n * Please send support related email to: netdev@vger.kernel.org\n * VLAN Home Page: http://www.candelatech.com/~greear/vlan.html\n *\n * Fixes: Ma...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n BNEP implementation for Linux Bluetooth stack (BlueZ).\n Copyright (C) 2001-2002 Inventel Systemes\n Written 2001-2002 by\n\tClément Moreau <clement.moreau@inventel.fr>\n\tDavid Libault <david.libault@inventel.fr>", " Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>", " This program is ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * L2TPv3 ethernet pseudowire driver\n *\n * Copyright (c) 2008,2009,2010 Katalix Systems Ltd\n *\n *\tThis program is free software; you can redistribute it and/or\n *\tmodify it under the terms of the GNU General Public License\n *\tas published by the Free Software Foundation; either version\n *\t2 of the L...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * Interface handling (except master interface)\n *\n * Copyright 2002-2005, Instant802 Networks, Inc.\n * Copyright 2005-2006, Devicescape Software, Inc.\n * Copyright (c) 2006 Jiri Benc <jbenc@suse.cz>\n * Copyright 2008, Johannes Berg <johannes@sipsolutions.net>\n *\n * This program is free software; you ca...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
40
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/exit.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n */", "#include <linux/mm.h>\n#include <linux/slab.h>\n#include <linux/interrupt.h>\n#include <linux/module.h>\n#include <linux/capability.h>\n#include <linux/completion.h>\n#include <linux/personality.h>\n#include <linux/tty.h>\n#inc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
41
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/fork.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n */", "/*\n * 'fork.c' contains the help-routines for the 'fork' system call\n * (see also entry.S and others).\n * Fork is rather simple, once you get the hang of it, but the memory\n * management can be a bitch. See 'mm/memory.c': ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
41
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2004 IBM Corporation\n *\n * Authors:\n * Leendert van Doorn <leendert@watson.ibm.com>\n * Dave Safford <safford@watson.ibm.com>\n * Reiner Sailer <sailer@watson.ibm.com>\n * Kylene Hall <kjhall@us.ibm.com>\n *\n * Maintained by: <tpmdd-devel@lists.sourceforge.net>\n *\n * Device driver for TC...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
42
Determine whether the code is vulnerable or not.
[ "/*\n *\tdev_table.h\n *\n *\tGlobal definitions for device call tables\n *\n *\n * Copyright (C) by Hannu Savolainen 1993-1997\n *\n * OSS/Free for Linux is distributed under the GNU GENERAL PUBLIC LICENSE (GPL)\n * Version 2 (June 1991). See the \"COPYING\" file distributed with this software\n * for more info.\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
43
Determine whether the code is vulnerable or not.
[ "/*\n * sound/oss/midi_synth.c\n *\n * High level midi sequencer manager for dumb MIDI interfaces.\n */\n/*\n * Copyright (C) by Hannu Savolainen 1993-1997\n *\n * OSS/Free for Linux is distributed under the GNU GENERAL PUBLIC LICENSE (GPL)\n * Version 2 (June 1991). See the \"COPYING\" file distributed with this s...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
43
Determine whether the code is vulnerable or not.
[ "int midi_synth_ioctl (int dev,\n\t unsigned int cmd, void __user * arg);\nint midi_synth_kill_note (int dev, int channel, int note, int velocity);\nint midi_synth_set_instr (int dev, int channel, int instr_no);\nint midi_synth_start_note (int dev, int channel, int note, int volume);\nvoid midi_synth_reset (int ...
[ 1, 1, 1 ]
REPOSVUL
43
Determine whether the code is vulnerable or not.
[ "/*\n * sound/oss/opl3.c\n *\n * A low level driver for Yamaha YM3812 and OPL-3 -chips\n *\n *\n * Copyright (C) by Hannu Savolainen 1993-1997\n *\n * OSS/Free for Linux is distributed under the GNU GENERAL PUBLIC LICENSE (GPL)\n * Version 2 (June 1991). See the \"COPYING\" file distributed with this software\n * f...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
43
Determine whether the code is vulnerable or not.
[ "/*\n * sound/oss/sequencer.c\n *\n * The sequencer personality manager.\n */\n/*\n * Copyright (C) by Hannu Savolainen 1993-1997\n *\n * OSS/Free for Linux is distributed under the GNU GENERAL PUBLIC LICENSE (GPL)\n * Version 2 (June 1991). See the \"COPYING\" file distributed with this software\n * for more info....
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
43
Determine whether the code is vulnerable or not.
[ "/*\n * fs/inotify_user.c - inotify support for userspace\n *\n * Authors:\n *\tJohn McCutchan\t<ttb@tentacle.dhs.org>\n *\tRobert Love\t<rml@novell.com>\n *\n * Copyright (C) 2005 John McCutchan\n * Copyright 2006 Hewlett-Packard Development Company, L.P.\n *\n * Copyright (C) 2009 Eric Paris <Red Hat Inc>\n * ino...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
44
Determine whether the code is vulnerable or not.
[ "/*\n * fs/inotify_user.c - inotify support for userspace\n *\n * Authors:\n *\tJohn McCutchan\t<ttb@tentacle.dhs.org>\n *\tRobert Love\t<rml@novell.com>\n *\n * Copyright (C) 2005 John McCutchan\n * Copyright 2006 Hewlett-Packard Development Company, L.P.\n *\n * Copyright (C) 2009 Eric Paris <Red Hat Inc>\n * ino...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
44
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2008 IBM Corporation\n * Author: Mimi Zohar <zohar@us.ibm.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation, version 2 of the License.\n *\n * ima_policy.c\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
45
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/proc/root.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * proc root directory handling functions\n */", "#include <asm/uaccess.h>", "#include <linux/errno.h>\n#include <linux/time.h>\n#include <linux/proc_fs.h>\n#include <linux/stat.h>\n#include <linux/init.h>\n#include <linux/sche...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
46
Determine whether the code is vulnerable or not.
[ "/*\n * Bridge multicast support.\n *\n * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the Licens...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
47
Determine whether the code is vulnerable or not.
[ "/*\n * debugfs.c - ACPI debugfs interface to userspace.\n */", "#include <linux/init.h>\n#include <linux/module.h>\n#include <linux/kernel.h>\n#include <linux/uaccess.h>\n#include <linux/debugfs.h>\n#include <acpi/acpi_drivers.h>", "#include \"internal.h\"", "#define _COMPONENT\t\tACPI_SYSTEM_COMPONENT\nACPI...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
48
Determine whether the code is vulnerable or not.
[ "/*\n * debugfs.c - ACPI debugfs interface to userspace.\n */", "#include <linux/init.h>\n#include <linux/debugfs.h>\n#include <acpi/acpi_drivers.h>", "#define _COMPONENT\t\tACPI_SYSTEM_COMPONENT\nACPI_MODULE_NAME(\"debugfs\");", "struct dentry *acpi_debugfs_dir;\nEXPORT_SYMBOL_GPL(acpi_debugfs_dir);", "voi...
[ 1, 1, 1, 1, 1 ]
REPOSVUL
48
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/nfs/inode.c\n *\n * Copyright (C) 1992 Rick Sladkey\n *\n * nfs inode and superblock handling functions\n *\n * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some\n * experimental NFS changes. Modularisation taken straight from SYS5 fs.\n *\n * Change to nfs_read_super() ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
49
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/nfs/nfs4_fs.h\n *\n * Copyright (C) 2005 Trond Myklebust\n *\n * NFSv4-specific filesystem definitions and declarations\n */", "#ifndef __LINUX_FS_NFS_NFS4_FS_H\n#define __LINUX_FS_NFS_NFS4_FS_H", "#ifdef CONFIG_NFS_V4", "struct idmap;", "/*\n * In a seqid-mutating op, this macro controls w...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
49
Determine whether the code is vulnerable or not.
[ "/*\n * fs/nfs/nfs4proc.c\n *\n * Client-side procedure declarations for NFSv4.\n *\n * Copyright (c) 2002 The Regents of the University of Michigan.\n * All rights reserved.\n *\n * Kendrick Smith <kmsmith@umich.edu>\n * Andy Adamson <andros@umich.edu>\n *\n * Redistribution and use in source and binary f...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
49
Determine whether the code is vulnerable or not.
[ "/*\n * fs/nfs/nfs4state.c\n *\n * Client-side XDR for NFSv4.\n *\n * Copyright (c) 2002 The Regents of the University of Michigan.\n * All rights reserved.\n *\n * Kendrick Smith <kmsmith@umich.edu>\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted pr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
49
Determine whether the code is vulnerable or not.
[ "/*\n * fs/nfs/nfs4xdr.c\n *\n * Client-side XDR for NFSv4.\n *\n * Copyright (c) 2002 The Regents of the University of Michigan.\n * All rights reserved.\n *\n * Kendrick Smith <kmsmith@umich.edu>\n * Andy Adamson <andros@umich.edu>\n * \n * Redistribution and use in source and binary forms, with or witho...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
49
Determine whether the code is vulnerable or not.
[ "/*\n * linux/include/linux/nfs_fs.h\n *\n * Copyright (C) 1992 Rick Sladkey\n *\n * OS-specific nfs filesystem definitions and declarations\n */", "#ifndef _LINUX_NFS_FS_H\n#define _LINUX_NFS_FS_H", "#include <linux/magic.h>", "/* Default timeout values */\n#define NFS_DEF_UDP_TIMEO\t(11)\n#define NFS_DE...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
49
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_NFS_XDR_H\n#define _LINUX_NFS_XDR_H", "#include <linux/nfsacl.h>", "/*\n * To change the maximum rsize and wsize supported by the NFS client, adjust\n * NFS_MAX_FILE_IO_SIZE. 64KB is a typical maximum, but some servers can\n * support a megabyte or more. The default is left at 4096 bytes, whic...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
49
Determine whether the code is vulnerable or not.
[ "/*\n * sound/oss/opl3.c\n *\n * A low level driver for Yamaha YM3812 and OPL-3 -chips\n *\n *\n * Copyright (C) by Hannu Savolainen 1993-1997\n *\n * OSS/Free for Linux is distributed under the GNU GENERAL PUBLIC LICENSE (GPL)\n * Version 2 (June 1991). See the \"COPYING\" file distributed with this software\n * f...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
50
Determine whether the code is vulnerable or not.
[ "/*\n *\tDeclarations of Rose type objects.\n *\n *\tJonathan Naylor G4KLX\t25/8/96\n */", "#ifndef _ROSE_H\n#define _ROSE_H ", "#include <linux/rose.h>\n#include <net/sock.h>", "#define\tROSE_ADDR_LEN\t\t\t5", "#define\tROSE_MIN_LEN\t\t\t3", "#define\tROSE_CALL_REQ_ADDR_LEN_OFF\t3\n#define\tROSE_CALL_REQ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
51
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
51
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
51
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
51
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
51
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1...
REPOSVUL
51
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
51
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1...
REPOSVUL
52
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
52
Determine whether the code is vulnerable or not.
[ "/*\n * fs/inotify_user.c - inotify support for userspace\n *\n * Authors:\n *\tJohn McCutchan\t<ttb@tentacle.dhs.org>\n *\tRobert Love\t<rml@novell.com>\n *\n * Copyright (C) 2005 John McCutchan\n * Copyright 2006 Hewlett-Packard Development Company, L.P.\n *\n * Copyright (C) 2009 Eric Paris <Red Hat Inc>\n * ino...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
53
Determine whether the code is vulnerable or not.
[ "/*\n BlueZ - Bluetooth protocol stack for Linux\n Copyright (C) 2000-2001 Qualcomm Incorporated", " Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public License version 2 as\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
54
Determine whether the code is vulnerable or not.
[ "/*\n BlueZ - Bluetooth protocol stack for Linux\n Copyright (C) 2000-2001 Qualcomm Incorporated", " Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public License version 2 as\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
54
Determine whether the code is vulnerable or not.
[ "/*\n BNEP implementation for Linux Bluetooth stack (BlueZ).\n Copyright (C) 2001-2002 Inventel Systemes\n Written 2001-2002 by\n\tDavid Libault <david.libault@inventel.fr>", " Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>", " This program is free software; you can redistribute it and/or m...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
55
Determine whether the code is vulnerable or not.
[ "/*\n * ebtables\n *\n * Author:\n * Bart De Schuymer\t\t<bdschuym@pandora.be>\n *\n * ebtables.c,v 2.0, July, 2002\n *\n * This code is stongly inspired on the iptables code which is\n * Copyright (C) 1999 Paul `Rusty' Russell & Michael J. Neuling\n *\n * This program is free software; you can redistribute ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
56
Determine whether the code is vulnerable or not.
[ "/* Wireless extensions support.\n *\n * See copyright notice in main.c\n */\n#include <linux/slab.h>\n#include <linux/kernel.h>\n#include <linux/if_arp.h>\n#include <linux/wireless.h>\n#include <linux/ieee80211.h>\n#include <net/iw_handler.h>\n#include <net/cfg80211.h>", "#include \"hermes.h\"\n#include \"hermes...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
57
Determine whether the code is vulnerable or not.
[ "/*\n FUSE: Filesystem in Userspace\n Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>", " This program can be distributed under the terms of the GNU GPL.\n See the file COPYING.\n*/", "#include \"fuse_i.h\"", "#include <linux/pagemap.h>\n#include <linux/slab.h>\n#include <linux/kernel.h>\n#inc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
58
Determine whether the code is vulnerable or not.
[ "/**\n * Copyright 2008-2011 Digital Bazaar, Inc.\n *\n * This file is part of librdfa.\n *\n * librdfa is Free Software, and can be licensed under any of the\n * following three licenses:\n *\n * 1. GNU Lesser General Public License (LGPL) V2.1 or any\n * newer version\n * 2. GNU General Public License (G...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
59
Determine whether the code is vulnerable or not.
[ "/* -*- Mode: c; c-basic-offset: 2 -*-\n *\n * raptor_libxml.c - Raptor libxml functions\n *\n * Copyright (C) 2000-2009, David Beckett http://www.dajobe.org/\n * Copyright (C) 2000-2004, University of Bristol, UK http://www.bristol.ac.uk/\n * \n * This package is Free Software and part of Redland http://librdf.org...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
59
Determine whether the code is vulnerable or not.
[ "/* -*- Mode: c; c-basic-offset: 2 -*-\n *\n * raptor_option.c - Class options\n *\n * Copyright (C) 2004-2010, David Beckett http://www.dajobe.org/\n * Copyright (C) 2004-2005, University of Bristol, UK http://www.bristol.ac.uk/\n * \n * This package is Free Software and part of Redland http://librdf.org/\n * \n *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
59
Determine whether the code is vulnerable or not.
[ "/* -*- Mode: c; c-basic-offset: 2 -*-\n *\n * raptor_rdfxml.c - Raptor RDF/XML Parser\n *\n * Copyright (C) 2000-2008, David Beckett http://www.dajobe.org/\n * Copyright (C) 2000-2005, University of Bristol, UK http://www.bristol.ac.uk/\n * \n * This package is Free Software and part of Redland http://librdf.org/\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
59
Determine whether the code is vulnerable or not.
[ "/* -*- Mode: c; c-basic-offset: 2 -*-\n *\n * raptor_rss.c - Raptor Feeds (RSS and Atom) tag soup parser\n *\n * Copyright (C) 2003-2010, David Beckett http://www.dajobe.org/\n * Copyright (C) 2003-2005, University of Bristol, UK http://www.bristol.ac.uk/\n * \n * This package is Free Software and part of Redland ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
59
Determine whether the code is vulnerable or not.
[ "/* -*- Mode: c; c-basic-offset: 2 -*-\n *\n * raptor_turtle_writer.c - Raptor Turtle Writer\n *\n * Copyright (C) 2006, Dave Robillard\n * Copyright (C) 2003-2008, David Beckett http://www.dajobe.org/\n * Copyright (C) 2003-2005, University of Bristol, UK http://www.bristol.ac.uk/\n * \n * This package is Free Sof...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
59
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C)2003,2004 USAGI/WIDE Project\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
60
Determine whether the code is vulnerable or not.
[ "/*\n * taskstats.c - Export per-task statistics to userland\n *\n * Copyright (C) Shailabh Nagar, IBM Corp. 2006\n * (C) Balbir Singh, IBM Corp. 2006\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
61
Determine whether the code is vulnerable or not.
[ "/*\n *\tmm/mremap.c\n *\n *\t(C) Copyright 1996 Linus Torvalds\n *\n *\tAddress space accounting code\t<alan@lxorguk.ukuu.org.uk>\n *\t(C) Copyright 2002 Red Hat Inc, All Rights Reserved\n */", "#include <linux/mm.h>\n#include <linux/hugetlb.h>\n#include <linux/shm.h>\n#include <linux/ksm.h>\n#include <linux/mma...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
62
Determine whether the code is vulnerable or not.
[ "/* D-Link DL2000-based Gigabit Ethernet Adapter Linux driver */\n/*\n Copyright (c) 2001, 2002 by D-Link Corporation\n Written by Edward Peng.<edward_peng@dlink.com.tw>\n Created 03-May-2001, base on Linux' sundance.c.", " This program is free software; you can redistribute it and/or modify\n it ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
63
Determine whether the code is vulnerable or not.
[ "/* D-Link DL2000-based Gigabit Ethernet Adapter Linux driver */\n/*\n Copyright (c) 2001, 2002 by D-Link Corporation\n Written by Edward Peng.<edward_peng@dlink.com.tw>\n Created 03-May-2001, base on Linux' sundance.c.", " This program is free software; you can redistribute it and/or modify\n it ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
63
Determine whether the code is vulnerable or not.
[ "/*\n * fs/nfs/nfs4proc.c\n *\n * Client-side procedure declarations for NFSv4.\n *\n * Copyright (c) 2002 The Regents of the University of Michigan.\n * All rights reserved.\n *\n * Kendrick Smith <kmsmith@umich.edu>\n * Andy Adamson <andros@umich.edu>\n *\n * Redistribution and use in source and binary f...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
64
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright © 2008,2010 Intel Corporation\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use, copy, ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
65
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright © 2008,2010 Intel Corporation\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use, copy, ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
66
Determine whether the code is vulnerable or not.
[ "/*\n * Generic hugetlb support.\n * (C) William Irwin, April 2004\n */\n#include <linux/list.h>\n#include <linux/init.h>\n#include <linux/module.h>\n#include <linux/mm.h>\n#include <linux/seq_file.h>\n#include <linux/sysctl.h>\n#include <linux/highmem.h>\n#include <linux/mmu_notifier.h>\n#include <linux/nodemask.h...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
67
Determine whether the code is vulnerable or not.
[ "/**\n * ldm - Support for Windows Logical Disk Manager (Dynamic Disks)\n *\n * Copyright (C) 2001,2002 Richard Russon <ldm@flatcap.org>\n * Copyright (c) 2001-2007 Anton Altaparmakov\n * Copyright (C) 2001,2002 Jakob Kemi <jakob.kemi@telia.com>\n *\n * Documentation is available at http://www.linux-ntfs.org/doku.p...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
68
Determine whether the code is vulnerable or not.
[ "/*\n * Memory merging support.\n *\n * This code enables dynamic sharing of identical pages found in different\n * memory areas, even if they are not shared by fork()\n *\n * Copyright (C) 2008-2009 Red Hat, Inc.\n * Authors:\n *\tIzik Eidus\n *\tAndrea Arcangeli\n *\tChris Wright\n *\tHugh Dickins\n *\n * This wo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
69
Determine whether the code is vulnerable or not.
[ "/*\n * linux/arch/alpha/kernel/osf_sys.c\n *\n * Copyright (C) 1995 Linus Torvalds\n */", "/*\n * This file handles some of the stranger OSF/1 system call interfaces.\n * Some of the system calls expect a non-C calling standard, others have\n * special parameter blocks..\n */", "#include <linux/errno.h>\n#i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
70
Determine whether the code is vulnerable or not.
[ "/*\n * linux/arch/alpha/kernel/osf_sys.c\n *\n * Copyright (C) 1995 Linus Torvalds\n */", "/*\n * This file handles some of the stranger OSF/1 system call interfaces.\n * Some of the system calls expect a non-C calling standard, others have\n * special parameter blocks..\n */", "#include <linux/errno.h>\n#i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
70
Determine whether the code is vulnerable or not.
[ "/*\n * linux/arch/alpha/kernel/osf_sys.c\n *\n * Copyright (C) 1995 Linus Torvalds\n */", "/*\n * This file handles some of the stranger OSF/1 system call interfaces.\n * Some of the system calls expect a non-C calling standard, others have\n * special parameter blocks..\n */", "#include <linux/errno.h>\n#i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
71
Determine whether the code is vulnerable or not.
[ "/*\n * linux/arch/alpha/kernel/osf_sys.c\n *\n * Copyright (C) 1995 Linus Torvalds\n */", "/*\n * This file handles some of the stranger OSF/1 system call interfaces.\n * Some of the system calls expect a non-C calling standard, others have\n * special parameter blocks..\n */", "#include <linux/errno.h>\n#i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
71
Determine whether the code is vulnerable or not.
[ "/*\n * linux/arch/alpha/kernel/osf_sys.c\n *\n * Copyright (C) 1995 Linus Torvalds\n */", "/*\n * This file handles some of the stranger OSF/1 system call interfaces.\n * Some of the system calls expect a non-C calling standard, others have\n * special parameter blocks..\n */", "#include <linux/errno.h>\n#i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
72
Determine whether the code is vulnerable or not.
[ "/*\n * linux/arch/alpha/kernel/osf_sys.c\n *\n * Copyright (C) 1995 Linus Torvalds\n */", "/*\n * This file handles some of the stranger OSF/1 system call interfaces.\n * Some of the system calls expect a non-C calling standard, others have\n * special parameter blocks..\n */", "#include <linux/errno.h>\n#i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
72
Determine whether the code is vulnerable or not.
[ "/*\n * linux/arch/alpha/kernel/osf_sys.c\n *\n * Copyright (C) 1995 Linus Torvalds\n */", "/*\n * This file handles some of the stranger OSF/1 system call interfaces.\n * Some of the system calls expect a non-C calling standard, others have\n * special parameter blocks..\n */", "#include <linux/errno.h>\n#i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
73
Determine whether the code is vulnerable or not.
[ "/*\n * linux/arch/alpha/kernel/osf_sys.c\n *\n * Copyright (C) 1995 Linus Torvalds\n */", "/*\n * This file handles some of the stranger OSF/1 system call interfaces.\n * Some of the system calls expect a non-C calling standard, others have\n * special parameter blocks..\n */", "#include <linux/errno.h>\n#i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
73
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/proc/base.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * proc base directory handling functions\n *\n * 1999, Al Viro. Rewritten. Now it covers the whole per-process part.\n * Instead of using magical inumbers to determine the kind of object\n * we allocate and fill in-core inodes ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
74