diff options
author | Maciej Żenczykowski <maze@google.com> | 2020-05-06 14:17:07 -0700 |
---|---|---|
committer | Maciej Żenczykowski <maze@google.com> | 2020-05-08 22:34:37 -0700 |
commit | 39c26d63cda25247f9c0422a71b0c297c2da2052 (patch) | |
tree | ea53c5f7d3dac485b2bc3848fdabe567d20652b3 /libnetutils | |
parent | 0129aaae86be64d293eb64e25c6acb1a57cbd588 (diff) | |
download | core-39c26d63cda25247f9c0422a71b0c297c2da2052.tar.gz |
libnetutils/packet.c - create socket with close-on-exec
This prevents fork/exec leaking sockets to child processes.
Test: builds, atest
Bug: 155297277
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I57cb2003dd75b0bc5528978fd131730273e37a43
Diffstat (limited to 'libnetutils')
-rw-r--r-- | libnetutils/packet.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/libnetutils/packet.c b/libnetutils/packet.c index b3fa90902..64de00e4b 100644 --- a/libnetutils/packet.c +++ b/libnetutils/packet.c @@ -40,7 +40,7 @@ int fatal(const char*); int open_raw_socket(const char* ifname __unused, uint8_t hwaddr[ETH_ALEN], int if_index) { - int s = socket(PF_PACKET, SOCK_DGRAM, 0); + int s = socket(PF_PACKET, SOCK_DGRAM | SOCK_CLOEXEC, 0); if (s < 0) return fatal("socket(PF_PACKET)"); struct sockaddr_ll bindaddr = { |