summaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorOndrej Kozina <okozina@redhat.com>2014-08-25 11:49:54 +0200
committerHerbert Xu <herbert@gondor.apana.org.au>2014-09-04 15:07:10 +0800
commite5b8ea0402e3099960b8e27e11596a0d34bb6103 (patch)
tree31908549863d75e2a0ac6af2166e65c0dafc8822 /crypto
parentbbda03707cf8fbf6851b7990e0e33485c774df07 (diff)
downloadlinux-crypto-e5b8ea0402e3099960b8e27e11596a0d34bb6103.tar.gz
linux-crypto-e5b8ea0402e3099960b8e27e11596a0d34bb6103.zip
crypto: algif - avoid excessive use of socket buffer in skcipher
On archs with PAGE_SIZE >= 64 KiB the function skcipher_alloc_sgl() fails with -ENOMEM no matter what user space actually requested. This is caused by the fact sock_kmalloc call inside the function tried to allocate more memory than allowed by the default kernel socket buffer size (kernel param net.core.optmem_max). Signed-off-by: Ondrej Kozina <okozina@redhat.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/algif_skcipher.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
index a19c027b..83187f49 100644
--- a/crypto/algif_skcipher.c
+++ b/crypto/algif_skcipher.c
@@ -49,7 +49,7 @@ struct skcipher_ctx {
struct ablkcipher_request req;
};
-#define MAX_SGL_ENTS ((PAGE_SIZE - sizeof(struct skcipher_sg_list)) / \
+#define MAX_SGL_ENTS ((4096 - sizeof(struct skcipher_sg_list)) / \
sizeof(struct scatterlist) - 1)
static inline int skcipher_sndbuf(struct sock *sk)