Lines Matching full:tso
110 SYSCTL_INT(_net_inet_tcp, OID_AUTO, tso, CTLFLAG_VNET | CTLFLAG_RW,
156 struct tcpopt *to, uint32_t len, int tso)
165 hhook_data.tso = tso;
208 int tso, mtu;
275 tso = 0;
520 * TSO may only be used if we are in a pure bulk sending state. The
522 * retransmits prevent using TSO. With TSO the TCP header is the same
535 * of IPsec that way and can actually decide if TSO is ok.
568 tso = 1;
582 * - We have a full segment (or more with TSO)
908 if (tso) {
913 /* extract TSO information */
919 * Limit a TSO burst to prevent it from
924 ("%s: TSO can't do IP options", __func__));
931 /* compute maximum TSO length */
959 * don't use TSO:
964 tso = 0;
970 * We don't trust the TSO implementations
997 tso = 0;
1043 if (tso) {
1104 * shorten it to no longer need tso. Lets
1108 tso = 0;
1401 * Enable TSO and specify the size of the segments.
1404 if (tso) {
1417 hhook_run_tcp_est_out(tp, th, &to, len, tso);
1711 * If TSO was active we either got an interface
1712 * without TSO capabilits or TSO was turned off.
1716 if (tso)
1966 * This is a copy of m_copym(), taking the TSO segment size/limit