summaryrefslogtreecommitdiff
path: root/libnetutils
diff options
context:
space:
mode:
authorMaciej Żenczykowski <maze@google.com>2020-05-06 14:17:07 -0700
committerMaciej Żenczykowski <maze@google.com>2020-05-08 22:34:37 -0700
commit39c26d63cda25247f9c0422a71b0c297c2da2052 (patch)
treeea53c5f7d3dac485b2bc3848fdabe567d20652b3 /libnetutils
parent0129aaae86be64d293eb64e25c6acb1a57cbd588 (diff)
downloadcore-39c26d63cda25247f9c0422a71b0c297c2da2052.tar.gz
libnetutils/packet.c - create socket with close-on-exec
This prevents fork/exec leaking sockets to child processes. Test: builds, atest Bug: 155297277 Signed-off-by: Maciej Żenczykowski <maze@google.com> Change-Id: I57cb2003dd75b0bc5528978fd131730273e37a43
Diffstat (limited to 'libnetutils')
-rw-r--r--libnetutils/packet.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/libnetutils/packet.c b/libnetutils/packet.c
index b3fa90902..64de00e4b 100644
--- a/libnetutils/packet.c
+++ b/libnetutils/packet.c
@@ -40,7 +40,7 @@
int fatal(const char*);
int open_raw_socket(const char* ifname __unused, uint8_t hwaddr[ETH_ALEN], int if_index) {
- int s = socket(PF_PACKET, SOCK_DGRAM, 0);
+ int s = socket(PF_PACKET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
if (s < 0) return fatal("socket(PF_PACKET)");
struct sockaddr_ll bindaddr = {