• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/netfilter/

Lines Matching refs:seen

128  * we haven't seen.
137 * SYN_SENT: SYN-only packet seen
138 * SYN_RECV: SYN-ACK packet seen
139 * ESTABLISHED: ACK packet seen
140 * FIN_WAIT: FIN packet seen
141 * CLOSE_WAIT: ACK seen (after FIN)
142 * LAST_ACK: FIN seen (after FIN)
143 * TIME_WAIT: last ACK seen
194 * sFW -> sLA FIN seen in both directions, waiting for
206 * sSS -> sIV ACK is invalid: we haven't seen a SYN/ACK yet.
252 * sFW -> sLA FIN seen in both directions.
343 td_maxend = max(sack + max(win,1)) seen in reply packets
344 td_maxwin = max(max(win, 1)) + (sack - ack) seen in sent packets
347 td_end = max(seq + len) seen in sent packets
502 struct ip_ct_tcp_state *sender = &state->seen[dir];
503 struct ip_ct_tcp_state *receiver = &state->seen[!dir];
687 : "ACK is over the upper bound (ACKed data not seen yet)"
711 struct ip_ct_tcp_state *sender = &conntrack->proto.tcp.seen[dir];
712 struct ip_ct_tcp_state *receiver = &conntrack->proto.tcp.seen[!dir];
721 if (after(end, conntrack->proto.tcp.seen[dir].td_end))
722 conntrack->proto.tcp.seen[dir].td_end = end;
888 if ((conntrack->proto.tcp.seen[dir].flags &
891 conntrack->proto.tcp.seen[dir].td_end)) {
963 conntrack->proto.tcp.seen[dir].flags |= IP_CT_TCP_FLAG_CLOSE_INIT;
1007 struct ip_ct_tcp_state *sender = &conntrack->proto.tcp.seen[0];
1008 struct ip_ct_tcp_state *receiver = &conntrack->proto.tcp.seen[1];
1027 conntrack->proto.tcp.seen[0].td_end =
1030 conntrack->proto.tcp.seen[0].td_maxwin = ntohs(th->window);
1031 if (conntrack->proto.tcp.seen[0].td_maxwin == 0)
1032 conntrack->proto.tcp.seen[0].td_maxwin = 1;
1033 conntrack->proto.tcp.seen[0].td_maxend =
1034 conntrack->proto.tcp.seen[0].td_end;
1036 tcp_options(skb, dataoff, th, &conntrack->proto.tcp.seen[0]);
1037 conntrack->proto.tcp.seen[1].flags = 0;
1047 conntrack->proto.tcp.seen[0].td_end =
1050 conntrack->proto.tcp.seen[0].td_maxwin = ntohs(th->window);
1051 if (conntrack->proto.tcp.seen[0].td_maxwin == 0)
1052 conntrack->proto.tcp.seen[0].td_maxwin = 1;
1053 conntrack->proto.tcp.seen[0].td_maxend =
1054 conntrack->proto.tcp.seen[0].td_end +
1055 conntrack->proto.tcp.seen[0].td_maxwin;
1056 conntrack->proto.tcp.seen[0].td_scale = 0;
1060 conntrack->proto.tcp.seen[0].flags =
1061 conntrack->proto.tcp.seen[1].flags = IP_CT_TCP_FLAG_SACK_PERM |
1065 conntrack->proto.tcp.seen[1].td_end = 0;
1066 conntrack->proto.tcp.seen[1].td_maxend = 0;
1067 conntrack->proto.tcp.seen[1].td_maxwin = 1;
1068 conntrack->proto.tcp.seen[1].td_scale = 0;
1100 &ct->proto.tcp.seen[0].td_scale);
1103 &ct->proto.tcp.seen[1].td_scale);
1105 tmp.flags = ct->proto.tcp.seen[0].flags;
1109 tmp.flags = ct->proto.tcp.seen[1].flags;
1156 ct->proto.tcp.seen[0].flags &= ~attr->mask;
1157 ct->proto.tcp.seen[0].flags |= attr->flags & attr->mask;
1163 ct->proto.tcp.seen[1].flags &= ~attr->mask;
1164 ct->proto.tcp.seen[1].flags |= attr->flags & attr->mask;
1169 ct->proto.tcp.seen[0].flags & IP_CT_TCP_FLAG_WINDOW_SCALE &&
1170 ct->proto.tcp.seen[1].flags & IP_CT_TCP_FLAG_WINDOW_SCALE) {
1171 ct->proto.tcp.seen[0].td_scale = *(u_int8_t *)
1173 ct->proto.tcp.seen[1].td_scale = *(u_int8_t *)