• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/

Lines Matching refs:seen

119  * we haven't seen.
128 * SYN_SENT: SYN-only packet seen
129 * SYN_SENT2: SYN-only packet seen from reply dir, simultaneous open
130 * SYN_RECV: SYN-ACK packet seen
131 * ESTABLISHED: ACK packet seen
132 * FIN_WAIT: FIN packet seen
133 * CLOSE_WAIT: ACK seen (after FIN)
134 * LAST_ACK: FIN seen (after FIN)
135 * TIME_WAIT: last ACK seen
192 * sFW -> sLA FIN seen in both directions, waiting for
204 * sSS -> sIV ACK is invalid: we haven't seen a SYN/ACK yet.
254 * sFW -> sLA FIN seen in both directions.
345 td_maxend = max(sack + max(win,1)) seen in reply packets
346 td_maxwin = max(max(win, 1)) + (sack - ack) seen in sent packets
349 td_end = max(seq + len) seen in sent packets
522 struct ip_ct_tcp_state *sender = &state->seen[dir];
523 struct ip_ct_tcp_state *receiver = &state->seen[!dir];
594 * We haven't seen traffic in the other direction yet
736 : "ACK is over the upper bound (ACKed data not seen yet)"
861 if (((ct->proto.tcp.seen[dir].flags
862 | ct->proto.tcp.seen[!dir].flags)
905 ct->proto.tcp.seen[ct->proto.tcp.last_dir].td_end =
907 ct->proto.tcp.seen[ct->proto.tcp.last_dir].td_maxend =
909 ct->proto.tcp.seen[ct->proto.tcp.last_dir].td_maxwin =
912 ct->proto.tcp.seen[ct->proto.tcp.last_dir].td_scale =
914 ct->proto.tcp.seen[ct->proto.tcp.last_dir].flags =
916 memset(&ct->proto.tcp.seen[dir], 0,
933 struct ip_ct_tcp_state seen = {};
937 tcp_options(skb, dataoff, th, &seen);
938 if (seen.flags & IP_CT_TCP_FLAG_WINDOW_SCALE) {
941 ct->proto.tcp.last_wscale = seen.td_scale;
943 if (seen.flags & IP_CT_TCP_FLAG_SACK_PERM) {
964 && (ct->proto.tcp.seen[!dir].flags & IP_CT_TCP_FLAG_MAXACK_SET)
965 && before(ntohl(th->seq), ct->proto.tcp.seen[!dir].td_maxack)) {
1028 ct->proto.tcp.seen[dir].flags |= IP_CT_TCP_FLAG_CLOSE_INIT;
1033 else if ((ct->proto.tcp.seen[0].flags | ct->proto.tcp.seen[1].flags) &
1075 const struct ip_ct_tcp_state *sender = &ct->proto.tcp.seen[0];
1076 const struct ip_ct_tcp_state *receiver = &ct->proto.tcp.seen[1];
1094 ct->proto.tcp.seen[0].td_end =
1097 ct->proto.tcp.seen[0].td_maxwin = ntohs(th->window);
1098 if (ct->proto.tcp.seen[0].td_maxwin == 0)
1099 ct->proto.tcp.seen[0].td_maxwin = 1;
1100 ct->proto.tcp.seen[0].td_maxend =
1101 ct->proto.tcp.seen[0].td_end;
1103 tcp_options(skb, dataoff, th, &ct->proto.tcp.seen[0]);
1104 ct->proto.tcp.seen[1].flags = 0;
1114 ct->proto.tcp.seen[0].td_end =
1117 ct->proto.tcp.seen[0].td_maxwin = ntohs(th->window);
1118 if (ct->proto.tcp.seen[0].td_maxwin == 0)
1119 ct->proto.tcp.seen[0].td_maxwin = 1;
1120 ct->proto.tcp.seen[0].td_maxend =
1121 ct->proto.tcp.seen[0].td_end +
1122 ct->proto.tcp.seen[0].td_maxwin;
1123 ct->proto.tcp.seen[0].td_scale = 0;
1127 ct->proto.tcp.seen[0].flags =
1128 ct->proto.tcp.seen[1].flags = IP_CT_TCP_FLAG_SACK_PERM |
1132 ct->proto.tcp.seen[1].td_end = 0;
1133 ct->proto.tcp.seen[1].td_maxend = 0;
1134 ct->proto.tcp.seen[1].td_maxwin = 0;
1135 ct->proto.tcp.seen[1].td_scale = 0;
1169 ct->proto.tcp.seen[0].td_scale);
1172 ct->proto.tcp.seen[1].td_scale);
1174 tmp.flags = ct->proto.tcp.seen[0].flags;
1178 tmp.flags = ct->proto.tcp.seen[1].flags;
1226 ct->proto.tcp.seen[0].flags &= ~attr->mask;
1227 ct->proto.tcp.seen[0].flags |= attr->flags & attr->mask;
1233 ct->proto.tcp.seen[1].flags &= ~attr->mask;
1234 ct->proto.tcp.seen[1].flags |= attr->flags & attr->mask;
1239 ct->proto.tcp.seen[0].flags & IP_CT_TCP_FLAG_WINDOW_SCALE &&
1240 ct->proto.tcp.seen[1].flags & IP_CT_TCP_FLAG_WINDOW_SCALE) {
1241 ct->proto.tcp.seen[0].td_scale =
1243 ct->proto.tcp.seen[1].td_scale =