/openbmc/linux/Documentation/translations/zh_CN/userspace-api/ |
H A D | no_new_privs.rst | 42 适当权限的任务仍然可以调用 ``setuid(2)`` 并接收 SCM_RIGHTS 数据报。
|
H A D | seccomp_filter.rst | 166 成功情况下会返回一个对过滤器监听的文件描述符,然后可以通过 ``SCM_RIGHTS`` 或类似
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/breakpad/breakpad/ |
H A D | 0001-Turn-off-sign-compare-for-musl-libc.patch | 38 if (hdr->cmsg_type == SCM_RIGHTS) {
|
/openbmc/linux/net/core/ |
H A D | scm.c | 162 case SCM_RIGHTS: in __scm_send() 338 err = put_user(SCM_RIGHTS, &cm->cmsg_type); in scm_detach_fds()
|
/openbmc/linux/arch/um/os-Linux/drivers/ |
H A D | tuntap_user.c | 118 (cmsg->cmsg_type != SCM_RIGHTS)) { in tuntap_open_tramp()
|
/openbmc/qemu/tests/qtest/ |
H A D | libqmp.c | 121 cmsg->cmsg_type = SCM_RIGHTS; in socket_send_fds()
|
/openbmc/linux/tools/testing/selftests/landlock/ |
H A D | common.h | 252 cmsg->cmsg_type = SCM_RIGHTS; in send_fd()
|
/openbmc/linux/arch/um/os-Linux/ |
H A D | file.c | 536 (cmsg->cmsg_type != SCM_RIGHTS)) { in os_rcv_fd() 671 cmsg->cmsg_type = SCM_RIGHTS; in os_sendmsg_fds()
|
/openbmc/linux/samples/seccomp/ |
H A D | user-trap.c | 48 cmsg->cmsg_type = SCM_RIGHTS; in send_fd()
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | no_new_privs.rst | 43 ``setuid(2)`` and receive SCM_RIGHTS datagrams.
|
/openbmc/qemu/ |
H A D | qemu-bridge-helper.c | 197 cmsg->cmsg_type = SCM_RIGHTS; in send_fd()
|
/openbmc/qemu/io/ |
H A D | channel-socket.c | 469 cmsg->cmsg_type != SCM_RIGHTS) { in qio_channel_socket_copy_fds() 589 cmsg->cmsg_type = SCM_RIGHTS; in qio_channel_socket_writev()
|
/openbmc/qemu/contrib/ivshmem-client/ |
H A D | ivshmem-client.c | 64 cmsg->cmsg_type != SCM_RIGHTS) { in ivshmem_client_read_one_msg()
|
/openbmc/linux/tools/perf/trace/beauty/include/linux/ |
H A D | socket.h | 177 #define SCM_RIGHTS 0x01 /* rw: access rights (array of int) */ macro
|
/openbmc/linux/include/linux/ |
H A D | socket.h | 177 #define SCM_RIGHTS 0x01 /* rw: access rights (array of int) */ macro
|
/openbmc/qemu/contrib/ivshmem-server/ |
H A D | ivshmem-server.c | 58 cmsg->cmsg_type = SCM_RIGHTS; in ivshmem_server_send_one_msg()
|
/openbmc/qemu/python/qemu/qmp/ |
H A D | qmp_client.py | 654 [(socket.SOL_SOCKET, socket.SCM_RIGHTS, struct.pack('@i', fd))]
|
/openbmc/openbmc/poky/bitbake/lib/bb/server/ |
H A D | process.py | 757 sock.sendmsg([msg], [(socket.SOL_SOCKET, socket.SCM_RIGHTS, fds)]) 772 cmsg_type == socket.SCM_RIGHTS):
|
/openbmc/linux/net/ |
H A D | compat.c | 310 err = put_user(SCM_RIGHTS, &cm->cmsg_type); in scm_detach_fds_compat()
|
/openbmc/qemu/docs/specs/ |
H A D | rapl-msr.rst | 135 socket can be passed via SCM_RIGHTS by libvirt, or its permissions can be
|
H A D | ivshmem-spec.rst | 181 and may be accompanied by a file descriptor via SCM_RIGHTS. Both
|
/openbmc/qemu/fsdev/ |
H A D | virtfs-proxy-helper.c | 229 cmsg->cmsg_type = SCM_RIGHTS; in send_fd()
|
/openbmc/qemu/qapi/ |
H A D | misc.json | 15 # devices to be passed in to QEMU via SCM_RIGHTS.
|
/openbmc/qemu/net/ |
H A D | tap.c | 456 cmsg->cmsg_type = SCM_RIGHTS; in recv_fd()
|
/openbmc/qemu/subprojects/libvhost-user/ |
H A D | libvhost-user.c | 568 if (cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_RIGHTS) { in vu_message_read_default() 631 cmsg->cmsg_type = SCM_RIGHTS; in vu_message_write()
|