Lines Matching +full:8 +full:th
92 __be32 daddr, __be32 saddr, const struct tcphdr *th);
482 * it's just the icmp type << 8 | icmp code. After adjustment
483 * header points to the first 8 bytes of the tcp header. We need
497 struct tcphdr *th = (struct tcphdr *)(skb->data + (iph->ihl << 2)); in tcp_v4_err() local
508 iph->daddr, th->dest, iph->saddr, in tcp_v4_err()
509 ntohs(th->source), inet_iif(skb), 0); in tcp_v4_err()
520 seq = ntohl(th->seq); in tcp_v4_err()
623 ip_icmp_error(sk, skb, err, th->dest, info, (u8 *)th); in tcp_v4_err()
664 struct tcphdr *th = tcp_hdr(skb); in __tcp_v4_send_check() local
666 th->check = ~tcp_v4_check(skb->len, saddr, daddr, 0); in __tcp_v4_send_check()
705 (aoh->rnext_keyid << 8) | keyid); in tcp_v4_ao_sign_reset()
742 const struct tcphdr *th = tcp_hdr(skb); in tcp_v4_send_reset() local
744 struct tcphdr th; in tcp_v4_send_reset() member
762 if (th->rst) in tcp_v4_send_reset()
773 rep.th.dest = th->source; in tcp_v4_send_reset()
774 rep.th.source = th->dest; in tcp_v4_send_reset()
775 rep.th.doff = sizeof(struct tcphdr) / 4; in tcp_v4_send_reset()
776 rep.th.rst = 1; in tcp_v4_send_reset()
778 if (th->ack) { in tcp_v4_send_reset()
779 rep.th.seq = th->ack_seq; in tcp_v4_send_reset()
781 rep.th.ack = 1; in tcp_v4_send_reset()
782 rep.th.ack_seq = htonl(ntohl(th->seq) + th->syn + th->fin + in tcp_v4_send_reset()
783 skb->len - (th->doff << 2)); in tcp_v4_send_reset()
788 arg.iov[0].iov_len = sizeof(rep.th); in tcp_v4_send_reset()
796 if (aoh && tcp_v4_ao_sign_reset(sk, skb, aoh, &arg, &rep.th, rep.opt)) in tcp_v4_send_reset()
826 th->source, ip_hdr(skb)->daddr, in tcp_v4_send_reset()
827 ntohs(th->source), dif, sdif); in tcp_v4_send_reset()
851 (TCPOPT_MD5SIG << 8) | in tcp_v4_send_reset()
855 rep.th.doff = arg.iov[0].iov_len / 4; in tcp_v4_send_reset()
859 ip_hdr(skb)->daddr, &rep.th); in tcp_v4_send_reset()
869 rep.th.doff = arg.iov[0].iov_len / 4; in tcp_v4_send_reset()
941 const struct tcphdr *th = tcp_hdr(skb); in tcp_v4_send_ack() local
943 struct tcphdr th; in tcp_v4_send_ack() member
951 memset(&rep.th, 0, sizeof(struct tcphdr)); in tcp_v4_send_ack()
955 arg.iov[0].iov_len = sizeof(rep.th); in tcp_v4_send_ack()
958 (TCPOPT_TIMESTAMP << 8) | in tcp_v4_send_ack()
966 rep.th.dest = th->source; in tcp_v4_send_ack()
967 rep.th.source = th->dest; in tcp_v4_send_ack()
968 rep.th.doff = arg.iov[0].iov_len / 4; in tcp_v4_send_ack()
969 rep.th.seq = htonl(seq); in tcp_v4_send_ack()
970 rep.th.ack_seq = htonl(ack); in tcp_v4_send_ack()
971 rep.th.ack = 1; in tcp_v4_send_ack()
972 rep.th.window = htons(win); in tcp_v4_send_ack()
980 (TCPOPT_MD5SIG << 8) | in tcp_v4_send_ack()
983 rep.th.doff = arg.iov[0].iov_len/4; in tcp_v4_send_ack()
987 ip_hdr(skb)->daddr, &rep.th); in tcp_v4_send_ack()
996 (key->ao_key->sndid << 8) | in tcp_v4_send_ack()
999 rep.th.doff = arg.iov[0].iov_len / 4; in tcp_v4_send_ack()
1005 &rep.th, key->sne); in tcp_v4_send_ack()
1580 const struct tcphdr *th, int nbytes) argument
1594 memcpy(_th, th, sizeof(*th));
1597 sg_init_one(&sg, bp, sizeof(*bp) + sizeof(*th));
1599 sizeof(*bp) + sizeof(*th));
1604 __be32 daddr, __be32 saddr, const struct tcphdr *th) argument
1613 if (tcp_v4_md5_hash_headers(&hp, daddr, saddr, th, th->doff << 2))
1635 const struct tcphdr *th = tcp_hdr(skb); local
1654 if (tcp_v4_md5_hash_headers(&hp, daddr, saddr, th, skb->len))
1656 if (tcp_sigpool_hash_skb_data(&hp, skb, th->doff << 2))
1871 const struct tcphdr *th = tcp_hdr(skb); local
1873 if (!th->syn)
1880 struct tcphdr *th, u32 *cookie) argument
1885 &tcp_request_sock_ipv4_ops, sk, th);
1887 *cookie = __cookie_v4_init_sequence(iph, th, &mss);
1979 const struct tcphdr *th; local
1989 th = tcp_hdr(skb);
1991 if (th->doff < sizeof(struct tcphdr) / 4)
1995 iph->saddr, th->source,
1996 iph->daddr, ntohs(th->dest),
2019 const struct tcphdr *th; local
2052 th = (const struct tcphdr *)skb->data;
2053 hdrlen = th->doff * 4;
2070 thtail->doff != th->doff ||
2071 memcmp(thtail + 1, th + 1, hdrlen - sizeof(*th)))
2089 thtail->window = th->window;
2100 thtail->fin |= th->fin;
2150 struct tcphdr *th = (struct tcphdr *)skb->data; local
2152 return sk_filter_trim_cap(sk, skb, th->doff * 4);
2163 const struct tcphdr *th) argument
2172 TCP_SKB_CB(skb)->seq = ntohl(th->seq);
2173 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin +
2174 skb->len - th->doff * 4);
2175 TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq);
2176 TCP_SKB_CB(skb)->tcp_flags = tcp_flags_ntohs(th);
2195 const struct tcphdr *th; local
2211 th = (const struct tcphdr *)skb->data;
2213 if (unlikely(th->doff < sizeof(struct tcphdr) / 4)) {
2217 if (!pskb_may_pull(skb, th->doff * 4))
2222 * provided case of th->doff==0 is eliminated.
2228 th = (const struct tcphdr *)skb->data;
2232 skb, __tcp_hdrlen(th), th->source,
2233 th->dest, sdif, &refcounted);
2280 th = (const struct tcphdr *)skb->data;
2282 tcp_v4_fill_cb(skb, iph, th);
2346 th = (const struct tcphdr *)skb->data;
2348 tcp_v4_fill_cb(skb, iph, th);
2381 tcp_v4_fill_cb(skb, iph, th);
2413 tcp_v4_fill_cb(skb, iph, th);
2420 tw_status = tcp_timewait_state_process(inet_twsk(sk), skb, th, &isn);
2425 skb, __tcp_hdrlen(th),
2426 iph->saddr, th->source,
2427 iph->daddr, th->dest,
2886 " %02X %08X:%08X %02X:%08lX %08X %5u %8d %u %d %pK",
2949 "%08X %5u %8d %lu %d %pK %lu %lu %u %u %d",
2982 " %02X %08X:%08X %02X:%08lX %08X %5d %8d %d %d %pK",
3028 uid_t uid __aligned(8);