lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAM1L+iBqypLJi2qD3Ncs_L+Lyi=ozRSciZvhBL5OzqjPFGfprg@mail.gmail.com>
Date:	Wed, 19 Aug 2015 23:41:14 +0530
From:	tej parkash <parkash.tej@...il.com>
To:	netdev@...r.kernel.org
Cc:	davem@...emloft.net, eric.dumazet@...il.com
Subject: netlink_route kernel data dump size increased

All,

We are running application on Linux Kernel 3.10 to collect network
interface information using  NETLINK_ROUTE protocol. earlier (kernel
2.6.32) we were having 8K buffer allocated to collect all data but
with new kernel (3.10) we are seeing read socket error, as buffer size
is not sufficient for all network dump data.

We want to understand that if the userspace buffer limit increased to
16K or we need some other mechanism to collect the data in 8K chuck.
or Is there any other way application can use NETLINK_ROUTE  protocol,
so that it will not break the application if data size gets increased
in future.

I did some some browsing and found some link but they were not very conclusive.
http://www.spinics.net/lists/netdev/msg162185.html

Appreciate for any kind of help or pointers here


Thanks
Tej
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ