__vfs_setxattr_nopermRegular
4.4: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812328a0)
Location: fs/xattr.c:92
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812328a0-ffffffff81232a38: __vfs_setxattr_noperm (STB_GLOBAL)
4.8: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8125b060)
Location: fs/xattr.c:99
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8125b060-ffffffff8125b1fb: __vfs_setxattr_noperm (STB_GLOBAL)
4.10: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8126e600)
Location: fs/xattr.c:169
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8126e600-ffffffff8126e7a3: __vfs_setxattr_noperm (STB_GLOBAL)
4.13: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8127bdf0)
Location: fs/xattr.c:169
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8127bdf0-ffffffff8127bf90: __vfs_setxattr_noperm (STB_GLOBAL)
4.15: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8129e890)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8129e890-ffffffff8129ea30: __vfs_setxattr_noperm (STB_GLOBAL)
4.18: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812c5500)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812c5500-ffffffff812c56a3: __vfs_setxattr_noperm (STB_GLOBAL)
5.0: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812da700)
Location: fs/xattr.c:169
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812da700-ffffffff812da8a3: __vfs_setxattr_noperm (STB_GLOBAL)
5.3: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812f8cd0)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812f8cd0-ffffffff812f8e93: __vfs_setxattr_noperm (STB_GLOBAL)
5.4: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8130a900)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8130a900-ffffffff8130aac3: __vfs_setxattr_noperm (STB_GLOBAL)
5.8: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81343900)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_appraise_measurement
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81343900-ffffffff81343aa4: __vfs_setxattr_noperm (STB_GLOBAL)
5.11: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8134f950)
Location: fs/xattr.c:197
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_appraise_measurement
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8134f950-ffffffff8134fb41: __vfs_setxattr_noperm (STB_GLOBAL)
5.13: ✅int __vfs_setxattr_noperm(struct user_namespace *mnt_userns, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81356480)
Location: fs/xattr.c:202
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81356480-ffffffff81356671: __vfs_setxattr_noperm (STB_GLOBAL)
5.15: ✅int __vfs_setxattr_noperm(struct user_namespace *mnt_userns, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff813a49b0)
Location: fs/xattr.c:202
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff813a49b0-ffffffff813a4bc5: __vfs_setxattr_noperm (STB_GLOBAL)
5.19: ✅int __vfs_setxattr_noperm(struct user_namespace *mnt_userns, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81428e60)
Location: fs/xattr.c:204
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81428e60-ffffffff81429042: __vfs_setxattr_noperm (STB_GLOBAL)
6.2: ✅int __vfs_setxattr_noperm(struct user_namespace *mnt_userns, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff814b5260)
Location: fs/xattr.c:224
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff814b5260-ffffffff814b5442: __vfs_setxattr_noperm (STB_GLOBAL)
6.5: ✅int __vfs_setxattr_noperm(struct mnt_idmap *idmap, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff814eaaa0)
Location: fs/xattr.c:223
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff814eaaa0-ffffffff814eac82: __vfs_setxattr_noperm (STB_GLOBAL)
6.8: ✅int __vfs_setxattr_noperm(struct mnt_idmap *idmap, struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff8151e940)
Location: fs/xattr.c:223
Inline: False
Direct callers:
- fs/xattr.c:__vfs_setxattr_locked
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff8151e940-ffffffff8151eb22: __vfs_setxattr_noperm (STB_GLOBAL)
arm64: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffff8000103bebd8)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffff8000103bebd8-ffff8000103bedc8: __vfs_setxattr_noperm (STB_GLOBAL)
armhf: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (c059b9f4)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
c059b9f4-c059bba8: __vfs_setxattr_noperm (STB_GLOBAL)
ppc64el: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (c0000000004bcea0)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
c0000000004bcea0-c0000000004bd1d8: __vfs_setxattr_noperm (STB_GLOBAL)
riscv64: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffe00027f58e)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/ima/ima_appraise.c:ima_fix_xattr
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffe00027f58e-ffffffe00027f6f2: __vfs_setxattr_noperm (STB_GLOBAL)
aws: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81302ee0)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81302ee0-ffffffff813030a3: __vfs_setxattr_noperm (STB_GLOBAL)
azure: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff812f3b00)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff812f3b00-ffffffff812f3cc3: __vfs_setxattr_noperm (STB_GLOBAL)
gcp: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81300cd0)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81300cd0-ffffffff81300e93: __vfs_setxattr_noperm (STB_GLOBAL)
lowlatency: ✅int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, const void *value, size_t size, int flags);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In fs/xattr.c (ffffffff81312010)
Location: fs/xattr.c:170
Inline: False
Direct callers:
- fs/xattr.c:vfs_setxattr
- security/selinux/hooks.c:selinux_inode_setsecctx
- security/smack/smack_lsm.c:smack_inode_setsecctx
- security/integrity/evm/evm_crypto.c:evm_update_evmxattr
Symbols:
ffffffff81312010-ffffffff813121d3: __vfs_setxattr_noperm (STB_GLOBAL)
Regular
4.4 and 4.8 ✅
4.8 and 4.10 ✅
4.10 and 4.13 ✅
4.13 and 4.15 ✅
4.15 and 4.18 ✅
4.18 and 5.0 ✅
5.0 and 5.3 ✅
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ⚠️struct user_namespace *mnt_userns
dentry, name, value, size, flags ➡️ mnt_userns, dentry, name, value, size, flags
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ⚠️struct mnt_idmap *idmap
struct user_namespace *mnt_userns
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅