| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | snmp_counter.rst | 275 it excludes the retransmitted packets. But it includes the SYN, ACK 286 It means the TCP layer sends a SYN, and come into the SYN-SENT 296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into 297 the SYN-RCVD state. 320 retransmission but including data-in-SYN). This counter is different from 329 TCPSynRetrans: number of SYN and SYN/ACK retransmits to break down 330 retransmissions into SYN, fast-retransmits, timeout retransmits, etc. 337 TCPFastOpenActiveFail: Fast Open attempts (SYN/data) failed because 344 When kernel receives a SYN from a client, and if the TCP accept queue 345 is full, kernel will drop the SYN and add 1 to TcpExtListenOverflows. [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/prog_tests/ |
| H A D | cls_redirect.c | 181 SYN, enumerator 229 if (test->flags == SYN) in test_str() 239 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, SYN }, 338 if (test->flags == SYN) in build_input()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/share/i18n/charmaps/ |
| HD | JIS_C6229-1984-B-ADD.gz | 1<code_set_name> JIS_C6229-1984-B-ADD
2<comment_char> %
3<escape_char ... |
| HD | JIS_C6229-1984-HAND-ADD.gz | 1<code_set_name> JIS_C6229-1984-HAND-ADD
2<comment_char> %
3<escape_char ... |
| HD | JIS_C6229-1984-KANA.gz | 1<code_set_name> JIS_C6229-1984-KANA
2<comment_char> %
3<escape_char> /
... |
| HD | JIS_C6229-1984-A.gz | 1<code_set_name> JIS_C6229-1984-A
2<comment_char> %
3<escape_char> /
... |
| HD | JIS_C6229-1984-HAND.gz | |
| HD | JIS_C6220-1969-JP.gz | 1<code_set_name> JIS_C6220-1969-JP
2<comment_char> %
3<escape_char> /
... |
| HD | NATS-DANO-ADD.gz | 1<code_set_name> NATS-DANO-ADD
2<comment_char> %
3<escape_char> /
... |
| HD | NATS-SEFI-ADD.gz | 1<code_set_name> NATS-SEFI-ADD
2<comment_char> %
3<escape_char> /
... |
| HD | ISO_2033-1983.gz | 1<code_set_name> ISO_2033-1983
2<comment_char> %
3<escape_char> /
4% ... |
| HD | INIS-8.gz | 1<code_set_name> INIS-8
2<comment_char> %
3<escape_char> /
4% ... |
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/share/i18n/charmaps/ |
| HD | JIS_C6229-1984-HAND-ADD.gz | 1<code_set_name> JIS_C6229-1984-HAND-ADD
2<comment_char> %
3<escape_char ... |
| HD | JIS_C6229-1984-B-ADD.gz | 1<code_set_name> JIS_C6229-1984-B-ADD
2<comment_char> %
3<escape_char ... |
| HD | JIS_C6229-1984-HAND.gz | |
| HD | JIS_C6229-1984-KANA.gz | |
| HD | JIS_C6229-1984-A.gz | 1<code_set_name> JIS_C6229-1984-A
2<comment_char> %
3<escape_char> /
... |
| HD | JIS_C6220-1969-JP.gz | 1<code_set_name> JIS_C6220-1969-JP
2<comment_char> %
3<escape_char> /
... |
| HD | NATS-DANO-ADD.gz | 1<code_set_name> NATS-DANO-ADD
2<comment_char> %
3<escape_char> /
... |
| HD | NATS-SEFI-ADD.gz | 1<code_set_name> NATS-SEFI-ADD
2<comment_char> %
3<escape_char> /
... |
| HD | ISO_2033-1983.gz | 1<code_set_name> ISO_2033-1983
2<comment_char> %
3<escape_char> /
4% ... |
| HD | INIS-8.gz | 1<code_set_name> INIS-8
2<comment_char> %
3<escape_char> /
4% ... |
| /OK3568_Linux_fs/kernel/tools/perf/trace/beauty/ |
| H A D | msg_flags.c | 46 P_MSG_FLAG(SYN); in syscall_arg__scnprintf_msg_flags()
|
| /OK3568_Linux_fs/kernel/net/ipv4/ |
| H A D | Kconfig | 271 Normal TCP/IP networking is open to an attack known as "SYN 277 SYN cookies provide protection against this type of attack. If you 279 protocol known as "SYN cookies" to enable legitimate users to 282 SYN cookies work transparently to them. For technical information 283 about SYN cookies, check out <https://cr.yp.to/syncookies.html>. 285 If you are SYN flooded, the source address reported by the kernel is 290 SYN cookies may prevent correct error reporting on clients when the 294 If you say Y here, you can disable SYN cookies at run time by
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/progs/ |
| H A D | test_cls_redirect.c | 79 SYN, enumerator 820 return SYN; in process_tcp() 1049 case SYN: in cls_redirect()
|