|
@@ -402,8 +402,6 @@ static void tcp_ecn_send(struct sock *sk, struct sk_buff *skb,
|
|
|
*/
|
|
|
static void tcp_init_nondata_skb(struct sk_buff *skb, u32 seq, u8 flags)
|
|
|
{
|
|
|
- struct skb_shared_info *shinfo = skb_shinfo(skb);
|
|
|
-
|
|
|
skb->ip_summed = CHECKSUM_PARTIAL;
|
|
|
skb->csum = 0;
|
|
|
|
|
@@ -411,7 +409,6 @@ static void tcp_init_nondata_skb(struct sk_buff *skb, u32 seq, u8 flags)
|
|
|
TCP_SKB_CB(skb)->sacked = 0;
|
|
|
|
|
|
tcp_skb_pcount_set(skb, 1);
|
|
|
- shinfo->gso_size = 0;
|
|
|
|
|
|
TCP_SKB_CB(skb)->seq = seq;
|
|
|
if (flags & (TCPHDR_SYN | TCPHDR_FIN))
|
|
@@ -1028,8 +1025,9 @@ static int tcp_transmit_skb(struct sock *sk, struct sk_buff *skb, int clone_it,
|
|
|
tcp_skb_pcount(skb));
|
|
|
|
|
|
tp->segs_out += tcp_skb_pcount(skb);
|
|
|
- /* OK, its time to fill skb_shinfo(skb)->gso_segs */
|
|
|
+ /* OK, its time to fill skb_shinfo(skb)->gso_{segs|size} */
|
|
|
skb_shinfo(skb)->gso_segs = tcp_skb_pcount(skb);
|
|
|
+ skb_shinfo(skb)->gso_size = tcp_skb_mss(skb);
|
|
|
|
|
|
/* Our usage of tstamp should remain private */
|
|
|
skb->tstamp.tv64 = 0;
|
|
@@ -1068,8 +1066,6 @@ static void tcp_queue_skb(struct sock *sk, struct sk_buff *skb)
|
|
|
/* Initialize TSO segments for a packet. */
|
|
|
static void tcp_set_skb_tso_segs(struct sk_buff *skb, unsigned int mss_now)
|
|
|
{
|
|
|
- struct skb_shared_info *shinfo = skb_shinfo(skb);
|
|
|
-
|
|
|
/* Make sure we own this skb before messing gso_size/gso_segs */
|
|
|
WARN_ON_ONCE(skb_cloned(skb));
|
|
|
|
|
@@ -1078,10 +1074,10 @@ static void tcp_set_skb_tso_segs(struct sk_buff *skb, unsigned int mss_now)
|
|
|
* non-TSO case.
|
|
|
*/
|
|
|
tcp_skb_pcount_set(skb, 1);
|
|
|
- shinfo->gso_size = 0;
|
|
|
+ TCP_SKB_CB(skb)->tcp_gso_size = 0;
|
|
|
} else {
|
|
|
tcp_skb_pcount_set(skb, DIV_ROUND_UP(skb->len, mss_now));
|
|
|
- shinfo->gso_size = mss_now;
|
|
|
+ TCP_SKB_CB(skb)->tcp_gso_size = mss_now;
|
|
|
}
|
|
|
}
|
|
|
|