summaryrefslogtreecommitdiff
path: root/net/tls
diff options
context:
space:
mode:
authorJim Ma <majinjing3@gmail.com>2021-05-12 12:00:11 +0300
committerDavid S. Miller <davem@davemloft.net>2021-05-13 00:31:30 +0300
commitd8654f4f9300e5e7cf8d5e7885978541cf61326b (patch)
treee69f746a8afc01f0e4b3c415b9646a7a9edaca77 /net/tls
parent34e7434ba4e97f4b85c1423a59b2922ba7dff2ea (diff)
downloadlinux-d8654f4f9300e5e7cf8d5e7885978541cf61326b.tar.xz
tls splice: remove inappropriate flags checking for MSG_PEEK
In function tls_sw_splice_read, before call tls_sw_advance_skb it checks likely(!(flags & MSG_PEEK)), while MSG_PEEK is used for recvmsg, splice supports SPLICE_F_NONBLOCK, SPLICE_F_MOVE, SPLICE_F_MORE, should remove this checking. Signed-off-by: Jim Ma <majinjing3@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/tls')
-rw-r--r--net/tls/tls_sw.c3
1 files changed, 1 insertions, 2 deletions
diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c
index 1dcb34dfd56b..7b59ec9a24c5 100644
--- a/net/tls/tls_sw.c
+++ b/net/tls/tls_sw.c
@@ -2018,8 +2018,7 @@ ssize_t tls_sw_splice_read(struct socket *sock, loff_t *ppos,
if (copied < 0)
goto splice_read_end;
- if (likely(!(flags & MSG_PEEK)))
- tls_sw_advance_skb(sk, skb, copied);
+ tls_sw_advance_skb(sk, skb, copied);
splice_read_end:
release_sock(sk);