diff options
author | Jakub Kicinski <kuba@kernel.org> | 2022-04-11 21:19:12 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2022-04-13 12:45:39 +0200 |
commit | 1c699ffa48a15710746989c36a82cbfb07e8d17f (patch) | |
tree | fdeb8d66fc1bb90c79bf77b0982e6f1349d6e839 /net/tls | |
parent | tls: rx: don't handle TLS 1.3 in the async crypto callback (diff) | |
download | linux-1c699ffa48a15710746989c36a82cbfb07e8d17f.tar.xz linux-1c699ffa48a15710746989c36a82cbfb07e8d17f.zip |
tls: rx: assume crypto always calls our callback
If crypto didn't always invoke our callback for async
we'd not be clearing skb->sk and would crash in the
skb core when freeing it. This if must be dead code.
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/tls')
-rw-r--r-- | net/tls/tls_sw.c | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c index d0b7078ca3ec..fd1a7ccc22bb 100644 --- a/net/tls/tls_sw.c +++ b/net/tls/tls_sw.c @@ -268,9 +268,6 @@ static int tls_do_decryption(struct sock *sk, if (ret == -EBADMSG) TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSDECRYPTERROR); - if (async) - atomic_dec(&ctx->decrypt_pending); - return ret; } |