/openbmc/linux/tools/testing/selftests/net/ |
H A D | txtimestamp.c | 132 static void validate_key(int tskey, int tstype) in validate_key() argument 145 if (tskey != saved_tskey + stepsize) { in validate_key() 147 tskey, saved_tskey + stepsize); in validate_key() 151 saved_tskey = tskey; in validate_key() 214 int tskey, int payload_len) in print_timestamp() argument 218 validate_key(tskey, tstype); in print_timestamp() 240 __print_timestamp(tsname, &tss->ts[0], tskey, payload_len); in print_timestamp()
|
/openbmc/linux/net/can/j1939/ |
H A D | j1939-priv.h | 161 u32 tskey; member 261 u32 tskey; member
|
H A D | main.c | 72 skcb->tskey = iskcb->tskey; in j1939_can_recv()
|
H A D | transport.c | 546 session->tskey == skcb->tskey && session->sk == skb->sk) in j1939_session_get_simple() 1653 session->tskey = priv->rx_tskey++; in j1939_xtp_rx_rts_session_new() 2037 skcb->tskey = atomic_inc_return(&session->sk->sk_tskey) - 1; in j1939_tp_send() 2038 session->tskey = skcb->tskey; in j1939_tp_send()
|
H A D | socket.c | 1074 serr->ee.ee_data = session->tskey; in __j1939_sk_errqueue() 1077 __func__, session, session->tskey, state); in __j1939_sk_errqueue()
|
/openbmc/linux/net/ipv4/ |
H A D | tcp_offload.c | 22 skb_shinfo(skb)->tskey = ts_seq; in tcp_gso_tstamp() 124 tcp_gso_tstamp(segs, skb_shinfo(gso_skb)->tskey, seq, mss); in tcp_gso_segment()
|
H A D | ip_output.c | 977 u32 tskey = 0; in __ip_append_data() local 1054 tskey = atomic_inc_return(&sk->sk_tskey) - 1; in __ip_append_data() 1183 skb_shinfo(skb)->tskey = tskey; in __ip_append_data() 1184 tskey = 0; in __ip_append_data()
|
H A D | udp_offload.c | 339 skb_shinfo(seg)->tskey = skb_shinfo(gso_skb)->tskey; in __udp_gso_segment()
|
H A D | tcp_output.c | 1512 !before(shinfo->tskey, TCP_SKB_CB(skb2)->seq)) { in tcp_fragment_tstamp() 1518 swap(shinfo->tskey, shinfo2->tskey); in tcp_fragment_tstamp() 3148 shinfo->tskey = next_shinfo->tskey; in tcp_skb_collapse_tstamp()
|
H A D | tcp_input.c | 3318 if (!before(shinfo->tskey, prior_snd_una) && in tcp_ack_tstamp() 3319 before(shinfo->tskey, tcp_sk(sk)->snd_una)) { in tcp_ack_tstamp()
|
H A D | tcp.c | 479 shinfo->tskey = TCP_SKB_CB(skb)->seq + skb->len - 1; in tcp_tx_timestamp()
|
/openbmc/linux/net/ipv6/ |
H A D | ip6_output.c | 1502 u32 tskey = 0; in __ip6_append_data() local 1619 tskey = atomic_inc_return(&sk->sk_tskey) - 1; in __ip6_append_data() 1780 skb_shinfo(skb)->tskey = tskey; in __ip6_append_data() 1781 tskey = 0; in __ip6_append_data()
|
/openbmc/linux/include/net/ |
H A D | sock.h | 2780 * @tskey: filled in with next sk_tskey (not for TCP, which uses seqno) in _sock_tx_timestamp() 2785 __u8 *tx_flags, __u32 *tskey) in _sock_tx_timestamp() 2789 if (tsflags & SOF_TIMESTAMPING_OPT_ID && tskey && in _sock_tx_timestamp() 2791 *tskey = atomic_inc_return(&sk->sk_tskey) - 1; in sock_tx_timestamp() 2806 &skb_shinfo(skb)->tskey); in sk_is_inet() 2779 _sock_tx_timestamp(struct sock * sk,__u16 tsflags,__u8 * tx_flags,__u32 * tskey) _sock_tx_timestamp() argument
|
/openbmc/linux/drivers/net/arcnet/ |
H A D | arcnet.c | 456 serr->ee.ee_data = skb_shinfo(skb)->tskey; in arcnet_reply_tasklet()
|
/openbmc/linux/drivers/net/ethernet/freescale/dpaa/ |
H A D | dpaa_eth.c | 2185 skb_shinfo(new_skb)->tskey = skb_shinfo(skb)->tskey; in dpaa_a050385_wa_skb()
|
/openbmc/linux/net/core/ |
H A D | skbuff.c | 5238 serr->ee.ee_data = skb_shinfo(skb)->tskey; in __skb_complete_tx_timestamp() 5331 skb_shinfo(skb)->tskey = skb_shinfo(orig_skb)->tskey; in __skb_tstamp_tx()
|
/openbmc/linux/Documentation/networking/ |
H A D | timestamping.rst | 351 relevant sequence number in skb_shinfo(skb)->tskey. Because an skbuff
|
/openbmc/linux/include/linux/ |
H A D | skbuff.h | 583 u32 tskey; member
|