Lines Matching full:tso
110 SYSCTL_INT(_net_inet_tcp, OID_AUTO, tso, CTLFLAG_VNET | CTLFLAG_RW,
156 struct tcpopt *to, uint32_t len, int tso) in hhook_run_tcp_est_out() argument
165 hhook_data.tso = tso; in hhook_run_tcp_est_out()
208 int tso, mtu; in tcp_default_output() local
275 tso = 0; in tcp_default_output()
520 * TSO may only be used if we are in a pure bulk sending state. The in tcp_default_output()
522 * retransmits prevent using TSO. With TSO the TCP header is the same in tcp_default_output()
535 * of IPsec that way and can actually decide if TSO is ok. in tcp_default_output()
568 tso = 1; in tcp_default_output()
582 * - We have a full segment (or more with TSO) in tcp_default_output()
908 if (tso) { in tcp_default_output()
913 /* extract TSO information */ in tcp_default_output()
919 * Limit a TSO burst to prevent it from in tcp_default_output()
924 ("%s: TSO can't do IP options", __func__)); in tcp_default_output()
931 /* compute maximum TSO length */ in tcp_default_output()
959 * don't use TSO: in tcp_default_output()
964 tso = 0; in tcp_default_output()
970 * We don't trust the TSO implementations in tcp_default_output()
997 tso = 0; in tcp_default_output()
1043 if (tso) { in tcp_default_output()
1104 * shorten it to no longer need tso. Lets in tcp_default_output()
1108 tso = 0; in tcp_default_output()
1401 * Enable TSO and specify the size of the segments. in tcp_default_output()
1404 if (tso) { in tcp_default_output()
1417 hhook_run_tcp_est_out(tp, th, &to, len, tso); in tcp_default_output()
1711 * If TSO was active we either got an interface in tcp_default_output()
1712 * without TSO capabilits or TSO was turned off. in tcp_default_output()
1716 if (tso) in tcp_default_output()
1966 * This is a copy of m_copym(), taking the TSO segment size/limit