this prevents a fd leak to child processes
return map_nt_error_from_unix_common(errno);
}
+ set_close_on_exec(sock->fd);
+
sock->backend_name = "ipv4";
sock->family = AF_INET;
return map_nt_error_from_unix_common(errno);
}
+ set_close_on_exec(sock->fd);
+
sock->backend_name = "ipv6";
sock->family = AF_INET6;
sock->backend_name = "unix";
+ set_close_on_exec(sock->fd);
+
return NT_STATUS_OK;
}
}
}
+ set_close_on_exec(new_fd);
+
(*new_sock) = talloc(NULL, struct socket_context);
if (!(*new_sock)) {
close(new_fd);