lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20230520000049.2226926-14-dhowells@redhat.com> Date: Sat, 20 May 2023 01:00:32 +0100 From: David Howells <dhowells@...hat.com> To: Jens Axboe <axboe@...nel.dk>, Al Viro <viro@...iv.linux.org.uk>, Christoph Hellwig <hch@...radead.org> Cc: David Howells <dhowells@...hat.com>, Matthew Wilcox <willy@...radead.org>, Jan Kara <jack@...e.cz>, Jeff Layton <jlayton@...nel.org>, David Hildenbrand <david@...hat.com>, Jason Gunthorpe <jgg@...dia.com>, Logan Gunthorpe <logang@...tatee.com>, Hillf Danton <hdanton@...a.com>, Christian Brauner <brauner@...nel.org>, Linus Torvalds <torvalds@...ux-foundation.org>, linux-fsdevel@...r.kernel.org, linux-block@...r.kernel.org, linux-kernel@...r.kernel.org, linux-mm@...ck.org, "David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, Christoph Hellwig <hch@....de>, netdev@...r.kernel.org Subject: [PATCH v21 13/30] net: Make sock_splice_read() use copy_splice_read() by default Make sock_splice_read() use copy_splice_read() by default as file_splice_read() will return immediately with 0 as a socket has no pagecache and is a zero-size file. Signed-off-by: David Howells <dhowells@...hat.com> cc: "David S. Miller" <davem@...emloft.net> cc: Eric Dumazet <edumazet@...gle.com> cc: Jakub Kicinski <kuba@...nel.org> cc: Paolo Abeni <pabeni@...hat.com> cc: Christoph Hellwig <hch@....de> cc: Al Viro <viro@...iv.linux.org.uk> cc: Jens Axboe <axboe@...nel.dk> cc: netdev@...r.kernel.org cc: linux-block@...r.kernel.org cc: linux-mm@...ck.org --- net/socket.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/socket.c b/net/socket.c index b7e01d0fe082..401778380195 100644 --- a/net/socket.c +++ b/net/socket.c @@ -1093,7 +1093,7 @@ static ssize_t sock_splice_read(struct file *file, loff_t *ppos, struct socket *sock = file->private_data; if (unlikely(!sock->ops->splice_read)) - return generic_file_splice_read(file, ppos, pipe, len, flags); + return copy_splice_read(file, ppos, pipe, len, flags); return sock->ops->splice_read(sock, ppos, pipe, len, flags); }
Powered by blists - more mailing lists