• Nick Kralevich's avatar
    Avoid leaking file descriptors · 53ea9cad
    Nick Kralevich authored
    Add O_CLOEXEC on open() calls, and SOCK_CLOEXEC on socket calls.
    This avoids leaking file descriptors across execs.
    
    Addresses the following SELinux denial:
    
      audit(1422740213.283:8): avc: denied { read write } for pid=2597 comm="clatd" path="socket:[6709]" dev="sockfs" ino=6709 scontext=u:r:clatd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket
    
    and allows the removal of some other SELinux rules which were
    inappropriately added because of leaking file descriptors.
    
    Change-Id: I9c180488ea1969d610e488f967a7276a672bb477
    53ea9cad
NetlinkManager.cpp 5.87 KB