__vfs_setxattr_noperm
Regular
4.4
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812328a0)
Location: fs/xattr.c:92
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812328a0-ffffffff81232a38: __vfs_setxattr_noperm (STB_GLOBAL)
4.8
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8125b060)
Location: fs/xattr.c:99
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8125b060-ffffffff8125b1fb: __vfs_setxattr_noperm (STB_GLOBAL)
4.10
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8126e600)
Location: fs/xattr.c:169
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8126e600-ffffffff8126e7a3: __vfs_setxattr_noperm (STB_GLOBAL)
4.13
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8127bdf0)
Location: fs/xattr.c:169
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8127bdf0-ffffffff8127bf90: __vfs_setxattr_noperm (STB_GLOBAL)
4.15
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8129e890)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8129e890-ffffffff8129ea30: __vfs_setxattr_noperm (STB_GLOBAL)
4.18
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812c5500)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812c5500-ffffffff812c56a3: __vfs_setxattr_noperm (STB_GLOBAL)
5.0
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812da700)
Location: fs/xattr.c:169
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812da700-ffffffff812da8a3: __vfs_setxattr_noperm (STB_GLOBAL)
5.3
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812f8cd0)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812f8cd0-ffffffff812f8e93: __vfs_setxattr_noperm (STB_GLOBAL)
5.4
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8130a900)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8130a900-ffffffff8130aac3: __vfs_setxattr_noperm (STB_GLOBAL)
5.8
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81343900)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_appraise_measurement
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81343900-ffffffff81343aa4: __vfs_setxattr_noperm (STB_GLOBAL)
5.11
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8134f950)
Location: fs/xattr.c:197
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_appraise_measurement
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8134f950-ffffffff8134fb41: __vfs_setxattr_noperm (STB_GLOBAL)
5.13
: ✅int __vfs_setxattr_noperm(struct user_namespace *mnt_userns, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81356480)
Location: fs/xattr.c:202
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81356480-ffffffff81356671: __vfs_setxattr_noperm (STB_GLOBAL)
5.15
: ✅int __vfs_setxattr_noperm(struct user_namespace *mnt_userns, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff813a49b0)
Location: fs/xattr.c:202
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff813a49b0-ffffffff813a4bc5: __vfs_setxattr_noperm (STB_GLOBAL)
5.19
: ✅int __vfs_setxattr_noperm(struct user_namespace *mnt_userns, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81428e60)
Location: fs/xattr.c:204
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81428e60-ffffffff81429042: __vfs_setxattr_noperm (STB_GLOBAL)
6.2
: ✅int __vfs_setxattr_noperm(struct user_namespace *mnt_userns, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff814b5260)
Location: fs/xattr.c:224
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff814b5260-ffffffff814b5442: __vfs_setxattr_noperm (STB_GLOBAL)
6.5
: ✅int __vfs_setxattr_noperm(struct mnt_idmap *idmap, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff814eaaa0)
Location: fs/xattr.c:223
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff814eaaa0-ffffffff814eac82: __vfs_setxattr_noperm (STB_GLOBAL)
6.8
: ✅int __vfs_setxattr_noperm(struct mnt_idmap *idmap, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8151e940)
Location: fs/xattr.c:223
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8151e940-ffffffff8151eb22: __vfs_setxattr_noperm (STB_GLOBAL)
arm64
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffff8000103bebd8)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffff8000103bebd8-ffff8000103bedc8: __vfs_setxattr_noperm (STB_GLOBAL)
armhf
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (c059b9f4)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
c059b9f4-c059bba8: __vfs_setxattr_noperm (STB_GLOBAL)
ppc64el
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (c0000000004bcea0)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
c0000000004bcea0-c0000000004bd1d8: __vfs_setxattr_noperm (STB_GLOBAL)
riscv64
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffe00027f58e)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffe00027f58e-ffffffe00027f6f2: __vfs_setxattr_noperm (STB_GLOBAL)
aws
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81302ee0)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81302ee0-ffffffff813030a3: __vfs_setxattr_noperm (STB_GLOBAL)
azure
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812f3b00)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812f3b00-ffffffff812f3cc3: __vfs_setxattr_noperm (STB_GLOBAL)
gcp
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81300cd0)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81300cd0-ffffffff81300e93: __vfs_setxattr_noperm (STB_GLOBAL)
lowlatency
: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81312010)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81312010-ffffffff813121d3: __vfs_setxattr_noperm (STB_GLOBAL)
Regular
4.4
and 4.8
✅
4.8
and 4.10
✅
4.10
and 4.13
✅
4.13
and 4.15
✅
4.15
and 4.18
✅
4.18
and 5.0
✅
5.0
and 5.3
✅
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
5.11
and 5.13
⚠️struct user_namespace *mnt_userns
dentry, name, value, size, flags
➡️ mnt_userns, dentry, name, value, size, flags
5.13
and 5.15
✅
5.15
and 5.19
✅
5.19
and 6.2
✅
6.2
and 6.5
⚠️struct mnt_idmap *idmap
struct user_namespace *mnt_userns
6.5
and 6.8
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅