Searched refs:syn (Results 1 – 21 of 21) sorted by relevance
61 u16 syn = 0, sngl; in dec_ecc_be_backend() local121 syn = chksyn; /* Low bank. */ in dec_ecc_be_backend()123 syn = chksyn >> 16; /* High bank. */ in dec_ecc_be_backend()125 if (!(syn & KN0X_ESR_VLDLO)) { in dec_ecc_be_backend()131 sngl = syn & KN0X_ESR_SNGLO; in dec_ecc_be_backend()132 syn &= KN0X_ESR_SYNLO; in dec_ecc_be_backend()139 if (syn == data_mbit[i]) in dec_ecc_be_backend()159 if (syn && syn == (syn & -syn)) { in dec_ecc_be_backend()160 if (syn == 0x01) { in dec_ecc_be_backend()170 i = syn >> 2; in dec_ecc_be_backend()[all …]
1073 long syn; in cia_decode_ecc_error() local1079 syn = cia->cia_syn & 0xff; in cia_decode_ecc_error()1080 if (syn == (syn & -syn)) { in cia_decode_ecc_error()1082 i = ffs(syn) - 1; in cia_decode_ecc_error()1104 if (data_bit[i] == syn) in cia_decode_ecc_error()1113 printk (fmt, syn, i); in cia_decode_ecc_error()
32 syn:1, member48 syn:1, member
151 else if (tcph->syn) return 0; in get_conntrack_index()193 && tcph->syn && tcph->ack) in tcp_packet()209 && tcph->ack && !tcph->syn in tcp_packet()
121 if (tcph->syn) in dump_packet()
411 int syn) in dump_packet() argument433 printk(" %s(#%d)\n", syn ? "SYN " : /* "PENANCE" */ "", count); in dump_packet()677 if(tcp->syn && !(tcp->ack || tcp->rst)) in ip_fw_check()
142 tcph->ack_seq = htonl(ntohl(otcph->seq) + otcph->syn + otcph->fin in send_reset()
405 if(!tcp->syn || !notcpack) in ip_fw_chk()
114 if (th->ece && !th->syn && (tp->ecn_flags&TCP_ECN_OK)) in TCP_ECN_rcv_ecn_echo()
2477 if (likely(!skb->h.th->syn)) in tcp_ack_update_window()2898 if(opsize==TCPOLEN_MSS && th->syn && !estab) { in tcp_parse_options()2908 if(opsize==TCPOLEN_WINDOW && th->syn && !estab) in tcp_parse_options()2932 if(opsize==TCPOLEN_SACK_PERM && th->syn && !estab) { in tcp_parse_options()3636 if (!skb->h.th->syn && !skb->h.th->fin && in tcp_collapse()3647 if (skb == tail || skb->h.th->syn || skb->h.th->fin) in tcp_collapse()3693 if (skb == tail || skb->h.th->syn || skb->h.th->fin) in tcp_collapse()4009 u32 ptr = tp->urg_seq - ntohl(th->seq) + (th->doff*4) - th->syn; in tcp_urg()4299 if (th->syn && !before(TCP_SKB_CB(skb)->seq, tp->rcv_nxt)) { in tcp_rcv_established()4379 if (!th->syn) in tcp_rcv_synsent_state_process()[all …]
157 if (th->syn && !before(TCP_SKB_CB(skb)->seq, tw->rcv_nxt)) in tcp_timewait_state_process()263 if (th->syn && !th->rst && !th->ack && !paws_reject && in tcp_timewait_state_process()
1178 rth.ack_seq = htonl(ntohl(th->seq) + th->syn + th->fin in tcp_v4_send_reset()1621 if (!th->rst && !th->syn && th->ack) in tcp_v4_hnd_req()1745 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin + in tcp_v4_rcv()
1393 if (skb->h.th->syn) in tcp_recv_skb()1539 if (skb->h.th->syn) in tcp_recvmsg()
1145 th->syn = 1; in tcp_make_synack()
248 if (tcph->syn) in dump_packet()
274 if(hlen > isize || th->syn || th->fin || th->rst || in slhc_compress()
499 if (th->syn) in vs_tcp_state_idx()567 th->syn? 'S' : '.', in vs_tcp_state()
1069 (h.th->syn || (iph->protocol!=IPPROTO_TCP)) && in ip_vs_in()
1000 t1->ack_seq = htonl(ntohl(th->seq) + th->syn + th->fin in tcp_v6_send_reset()1143 if (!th->rst && !th->syn && th->ack) in tcp_v6_hnd_req()1591 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin + in tcp_v6_rcv()
161 Send out syncookies when the syn backlog queue of a socket 162 overflows. This is to prevent against the common 'syn flood attack'
1210 syncookies when the syn backlog queue of a socket overflows. This is to ward1211 off the common 'syn flood attack'. Disabled by default.