diff options
author | David Rientjes <rientjes@google.com> | 2010-08-23 13:35:09 +0200 |
---|---|---|
committer | Jens Axboe <jaxboe@fusionio.com> | 2010-08-23 13:36:58 +0200 |
commit | 72f465033702ebfe20db8f50edaad59f0f38b0f5 (patch) | |
tree | 34c65345dbc40568414c5ff7317bccb655766455 | |
parent | 5e00d1b5b4c10fb839afd5ce61db8e24339454b0 (diff) | |
download | linux-72f465033702ebfe20db8f50edaad59f0f38b0f5.tar.gz linux-72f465033702ebfe20db8f50edaad59f0f38b0f5.tar.bz2 linux-72f465033702ebfe20db8f50edaad59f0f38b0f5.zip |
bio-integrity.c: remove dependency on __GFP_NOFAIL
The kmalloc() in bio_integrity_prep() is failable, so remove __GFP_NOFAIL
from its mask.
Signed-off-by: David Rientjes <rientjes@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Jens Axboe <jaxboe@fusionio.com>
-rw-r--r-- | fs/bio-integrity.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/bio-integrity.c b/fs/bio-integrity.c index 612a5c38d3c1..a8f4cc679983 100644 --- a/fs/bio-integrity.c +++ b/fs/bio-integrity.c @@ -413,7 +413,7 @@ int bio_integrity_prep(struct bio *bio) /* Allocate kernel buffer for protection data */ len = sectors * blk_integrity_tuple_size(bi); - buf = kmalloc(len, GFP_NOIO | __GFP_NOFAIL | q->bounce_gfp); + buf = kmalloc(len, GFP_NOIO | q->bounce_gfp); if (unlikely(buf == NULL)) { printk(KERN_ERR "could not allocate integrity buffer\n"); return -EIO; |