Lines Matching defs:tp
76 struct sctp_transport *tp = packet->transport;
77 struct sctp_association *asoc = tp->asoc;
89 packet->max_size = tp->pathmtu;
102 if (!sctp_transport_dst_check(tp)) {
103 sctp_transport_route(tp, NULL, sp);
106 } else if (!sctp_transport_pl_enabled(tp) &&
108 if (!sctp_transport_pmtu_check(tp))
128 if (!tp->dst)
133 if (__sk_dst_get(sk) != tp->dst) {
134 dst_hold(tp->dst);
135 sk_setup_caps(sk, tp->dst);
137 packet->max_size = sk_can_gso(sk) ? min(READ_ONCE(tp->dst->dev->gso_max_size),
439 struct sctp_transport *tp = packet->transport;
466 tp->pathmtu)
468 else if (pkt_size + padded > tp->pathmtu)
486 !tp->rto_pending) {
488 tp->rto_pending = 1;
520 sctp_auth_calculate_hmac(tp->asoc, nskb, auth,
547 if (!(tp->dst->dev->features & NETIF_F_SCTP_CRC) ||
548 dst_xfrm(tp->dst) || packet->ipfragok || tp->encap_port) {
571 struct sctp_transport *tp = packet->transport;
572 struct sctp_association *asoc = tp->asoc;
585 if (packet->size > tp->pathmtu && !packet->ipfragok && !chunk->pmtu_probe) {
586 if (tp->pl.state == SCTP_PL_ERROR) { /* do IP fragmentation if in Error state */
614 if (!tp->dst) {
641 tp->af_specific->ecn_capable(sk);
644 if (asoc->peer.last_sent_to != tp)
645 asoc->peer.last_sent_to = tp;
648 if (tp->dst_pending_confirm)
653 if (tp->af_specific->sctp_xmit(head, tp) >= 0 &&
654 tp->dst_pending_confirm)
655 tp->dst_pending_confirm = 0;