crypto: algif - avoid excessive use of socket buffer in skcipher
authorOndrej Kozina <okozina@redhat.com>
Mon, 25 Aug 2014 09:49:54 +0000 (11:49 +0200)
committerBen Hutchings <ben@decadent.org.uk>
Sun, 14 Dec 2014 16:24:01 +0000 (16:24 +0000)
commit3308bdcc24f3591ace96289137c9411bc2181602
tree1d57db215ce4f1a9b5616c3bfc09581ea16b9e34
parent607d8297d5d78dc84dc8257a60f2c0a5863a07d6
crypto: algif - avoid excessive use of socket buffer in skcipher

commit e2cffb5f493a8b431dc87124388ea59b79f0bccb upstream.

On archs with PAGE_SIZE >= 64 KiB the function skcipher_alloc_sgl()
fails with -ENOMEM no matter what user space actually requested.
This is caused by the fact sock_kmalloc call inside the function tried
to allocate more memory than allowed by the default kernel socket buffer
size (kernel param net.core.optmem_max).

Signed-off-by: Ondrej Kozina <okozina@redhat.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
crypto/algif_skcipher.c