|
@@ -1172,7 +1172,7 @@ int tcp_fragment(struct sock *sk, struct sk_buff *skb, u32 len,
|
|
|
return -ENOMEM;
|
|
|
|
|
|
/* Get a new skb... force flag on. */
|
|
|
- buff = sk_stream_alloc_skb(sk, nsize, gfp);
|
|
|
+ buff = sk_stream_alloc_skb(sk, nsize, gfp, true);
|
|
|
if (!buff)
|
|
|
return -ENOMEM; /* We'll just try again later. */
|
|
|
|
|
@@ -1731,7 +1731,7 @@ static int tso_fragment(struct sock *sk, struct sk_buff *skb, unsigned int len,
|
|
|
if (skb->len != skb->data_len)
|
|
|
return tcp_fragment(sk, skb, len, mss_now, gfp);
|
|
|
|
|
|
- buff = sk_stream_alloc_skb(sk, 0, gfp);
|
|
|
+ buff = sk_stream_alloc_skb(sk, 0, gfp, true);
|
|
|
if (unlikely(!buff))
|
|
|
return -ENOMEM;
|
|
|
|
|
@@ -1950,7 +1950,7 @@ static int tcp_mtu_probe(struct sock *sk)
|
|
|
}
|
|
|
|
|
|
/* We're allowed to probe. Build it now. */
|
|
|
- nskb = sk_stream_alloc_skb(sk, probe_size, GFP_ATOMIC);
|
|
|
+ nskb = sk_stream_alloc_skb(sk, probe_size, GFP_ATOMIC, false);
|
|
|
if (!nskb)
|
|
|
return -1;
|
|
|
sk->sk_wmem_queued += nskb->truesize;
|
|
@@ -3190,7 +3190,7 @@ static int tcp_send_syn_data(struct sock *sk, struct sk_buff *syn)
|
|
|
/* limit to order-0 allocations */
|
|
|
space = min_t(size_t, space, SKB_MAX_HEAD(MAX_TCP_HEADER));
|
|
|
|
|
|
- syn_data = sk_stream_alloc_skb(sk, space, sk->sk_allocation);
|
|
|
+ syn_data = sk_stream_alloc_skb(sk, space, sk->sk_allocation, false);
|
|
|
if (!syn_data)
|
|
|
goto fallback;
|
|
|
syn_data->ip_summed = CHECKSUM_PARTIAL;
|
|
@@ -3256,7 +3256,7 @@ int tcp_connect(struct sock *sk)
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
|
- buff = sk_stream_alloc_skb(sk, 0, sk->sk_allocation);
|
|
|
+ buff = sk_stream_alloc_skb(sk, 0, sk->sk_allocation, true);
|
|
|
if (unlikely(!buff))
|
|
|
return -ENOBUFS;
|
|
|
|