.. title:: clang-tidy - android-cloexec-accept4 | |
android-cloexec-accept4 | |
======================= | |
``accept4()`` should include ``SOCK_CLOEXEC`` in its type argument to avoid the | |
file descriptor leakage. Without this flag, an opened sensitive file would | |
remain open across a fork+exec to a lower-privileged SELinux domain. | |
Examples: | |
.. code-block:: c++ | |
accept4(sockfd, addr, addrlen, SOCK_NONBLOCK); | |
// becomes | |
accept4(sockfd, addr, addrlen, SOCK_NONBLOCK | SOCK_CLOEXEC); |