is_access_to_paths_allowed
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: Absent ⚠️
4.18
: Absent ⚠️
5.0
: Absent ⚠️
5.3
: Absent ⚠️
5.4
: Absent ⚠️
5.8
: Absent ⚠️
5.11
: Absent ⚠️
5.13
: Absent ⚠️
5.15
: Absent ⚠️
5.19
: Absent ⚠️
6.2
: Transformation ⚠️bool is_access_to_paths_allowed(const const struct landlock_ruleset * domain, const const struct path * path, const access_mask_t access_request_parent1, const layer_mask_t[15] * layer_masks_parent1, const const struct dentry * dentry_child1, const access_mask_t access_request_parent2, const layer_mask_t[15] * layer_masks_parent2, const const struct dentry * dentry_child2);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In security/landlock/fs.c (0)
Location: security/landlock/fs.c:485
Inline: False
Direct callers:
- security/landlock/fs.c:hook_file_open
- security/landlock/fs.c:hook_path_truncate
- security/landlock/fs.c:hook_path_rmdir
- security/landlock/fs.c:hook_path_unlink
- security/landlock/fs.c:hook_path_symlink
- security/landlock/fs.c:hook_path_mknod
- security/landlock/fs.c:hook_path_mkdir
- security/landlock/fs.c:current_check_refer_path
- security/landlock/fs.c:current_check_refer_path
Symbols:
ffffffff816f1190-ffffffff816f233e: is_access_to_paths_allowed (STB_LOCAL)
ffffffff82074f99-ffffffff820750c9: is_access_to_paths_allowed.cold (STB_LOCAL)
6.5
: Transformation ⚠️bool is_access_to_paths_allowed(const const struct landlock_ruleset * domain, const const struct path * path, const access_mask_t access_request_parent1, const layer_mask_t[15] * layer_masks_parent1, const const struct dentry * dentry_child1, const access_mask_t access_request_parent2, const layer_mask_t[15] * layer_masks_parent2, const const struct dentry * dentry_child2);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In security/landlock/fs.c (0)
Location: security/landlock/fs.c:485
Inline: False
Direct callers:
- security/landlock/fs.c:hook_file_open
- security/landlock/fs.c:hook_path_truncate
- security/landlock/fs.c:hook_path_rmdir
- security/landlock/fs.c:hook_path_unlink
- security/landlock/fs.c:hook_path_symlink
- security/landlock/fs.c:hook_path_mknod
- security/landlock/fs.c:hook_path_mkdir
- security/landlock/fs.c:current_check_refer_path
- security/landlock/fs.c:current_check_refer_path
Symbols:
ffffffff8172b600-ffffffff8172c787: is_access_to_paths_allowed (STB_LOCAL)
ffffffff820f4b63-ffffffff820f4c87: is_access_to_paths_allowed.cold (STB_LOCAL)
6.8
: ✅bool is_access_to_paths_allowed(const const struct landlock_ruleset * domain, const const struct path * path, const access_mask_t access_request_parent1, const layer_mask_t[15] * layer_masks_parent1, const const struct dentry * dentry_child1, const access_mask_t access_request_parent2, const layer_mask_t[15] * layer_masks_parent2, const const struct dentry * dentry_child2);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In security/landlock/fs.c (ffffffff8176cdb0)
Location: security/landlock/fs.c:396
Inline: False
Direct callers:
- security/landlock/fs.c:hook_file_open
- security/landlock/fs.c:hook_file_open
- security/landlock/fs.c:current_check_refer_path
- security/landlock/fs.c:current_check_refer_path
- security/landlock/fs.c:check_access_path
Symbols:
ffffffff8176cdb0-ffffffff8176d4cb: is_access_to_paths_allowed (STB_LOCAL)
arm64
: Absent ⚠️
armhf
: Absent ⚠️
ppc64el
: Absent ⚠️
riscv64
: Absent ⚠️
aws
: Absent ⚠️
azure
: Absent ⚠️
gcp
: Absent ⚠️
lowlatency
: Absent ⚠️
Regular
6.2
and 6.5
✅
6.5
and 6.8
✅