summaryrefslogtreecommitdiffstats
path: root/examples/rtnl-link-dump3.c
diff options
context:
space:
mode:
authorPablo Neira Ayuso <pablo@netfilter.org>2010-04-04 02:32:35 +0200
committerPablo Neira Ayuso <pablo@netfilter.org>2010-04-04 15:58:54 +0200
commit117f033c413820739e6679c926a39a5b3f45ff79 (patch)
treefd8ed9da15216992570be27ee55eafb235457fcb /examples/rtnl-link-dump3.c
parent8ce5d4ca70884654988eb86734cb3022e0b71995 (diff)
check source of the netlink message and fix sequence tracking logic
This patch changes the callback handlers to include netlink portID checking. Thus, we avoid that any malicious process can spoof messages. If portid, sequence number of the message is != 0, we check if the message is what we expect. This allows to use the same netlink channel for dumps (portid, seq != 0) and event-based notifications (portid, seq == 0). Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'examples/rtnl-link-dump3.c')
-rw-r--r--examples/rtnl-link-dump3.c5
1 files changed, 3 insertions, 2 deletions
diff --git a/examples/rtnl-link-dump3.c b/examples/rtnl-link-dump3.c
index d5e4458..ce59f9f 100644
--- a/examples/rtnl-link-dump3.c
+++ b/examples/rtnl-link-dump3.c
@@ -58,7 +58,7 @@ int main()
struct nlmsghdr *nlh;
struct rtgenmsg *rt;
int ret;
- unsigned int seq;
+ unsigned int seq, portid;
nlh = mnl_nlmsg_put_header(buf);
nlh->nlmsg_type = RTM_GETLINK;
@@ -77,6 +77,7 @@ int main()
perror("mnl_socket_bind");
exit(EXIT_FAILURE);
}
+ portid = mnl_socket_get_portid(nl);
if (mnl_socket_sendto(nl, nlh, mnl_nlmsg_get_len(nlh)) < 0) {
perror("mnl_socket_send");
@@ -85,7 +86,7 @@ int main()
ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
while (ret > 0) {
- ret = mnl_cb_run(buf, ret, seq, data_cb, NULL);
+ ret = mnl_cb_run(buf, ret, seq, portid, data_cb, NULL);
if (ret <= MNL_CB_STOP)
break;
ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));