diff options
author | Kumar Kartikeya Dwivedi <memxor@gmail.com> | 2021-03-17 17:28:58 +0530 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2021-03-18 00:50:21 +0100 |
commit | 58bfd95b554f1a23d01228672f86bb489bdbf4ba (patch) | |
tree | 1e62f2aa641a6d19717b5ae4fd6a7becde548892 /tools | |
parent | 8f3f5792f2940c16ab63c614b26494c8689c9c1e (diff) | |
download | linux-stable-58bfd95b554f1a23d01228672f86bb489bdbf4ba.tar.gz linux-stable-58bfd95b554f1a23d01228672f86bb489bdbf4ba.tar.bz2 linux-stable-58bfd95b554f1a23d01228672f86bb489bdbf4ba.zip |
libbpf: Use SOCK_CLOEXEC when opening the netlink socket
Otherwise, there exists a small window between the opening and closing
of the socket fd where it may leak into processes launched by some other
thread.
Fixes: 949abbe88436 ("libbpf: add function to setup XDP")
Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Toke Høiland-Jørgensen <toke@redhat.com>
Link: https://lore.kernel.org/bpf/20210317115857.6536-1-memxor@gmail.com
Diffstat (limited to 'tools')
-rw-r--r-- | tools/lib/bpf/netlink.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/tools/lib/bpf/netlink.c b/tools/lib/bpf/netlink.c index 4dd73de00b6f..d2cb28e9ef52 100644 --- a/tools/lib/bpf/netlink.c +++ b/tools/lib/bpf/netlink.c @@ -40,7 +40,7 @@ static int libbpf_netlink_open(__u32 *nl_pid) memset(&sa, 0, sizeof(sa)); sa.nl_family = AF_NETLINK; - sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); + sock = socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, NETLINK_ROUTE); if (sock < 0) return -errno; |