| .. title:: clang-tidy - android-cloexec-accept4 | |
| android-cloexec-accept4 | |
| ======================= | |
| ``accept4()`` should include ``SOCK_CLOEXEC`` in its type argument to avoid the | |
| file descriptor leakage. Without this flag, an opened sensitive file would | |
| remain open across a fork+exec to a lower-privileged SELinux domain. | |
| Examples: | |
| .. code-block:: c++ | |
| accept4(sockfd, addr, addrlen, SOCK_NONBLOCK); | |
| // becomes | |
| accept4(sockfd, addr, addrlen, SOCK_NONBLOCK | SOCK_CLOEXEC); |