Home
last modified time | relevance | path

Searched refs:SYN (Results 1 – 14 of 14) sorted by relevance

/Linux-v5.15/Documentation/networking/
Dsnmp_counter.rst275 it excludes the retransmitted packets. But it includes the SYN, ACK
286 It means the TCP layer sends a SYN, and come into the SYN-SENT
296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into
297 the SYN-RCVD state.
320 retransmission but including data-in-SYN). This counter is different from
329 TCPSynRetrans: number of SYN and SYN/ACK retransmits to break down
330 retransmissions into SYN, fast-retransmits, timeout retransmits, etc.
337 TCPFastOpenActiveFail: Fast Open attempts (SYN/data) failed because
344 When kernel receives a SYN from a client, and if the TCP accept queue
345 is full, kernel will drop the SYN and add 1 to TcpExtListenOverflows.
[all …]
Dip-sysctl.rst355 TCP SYN and SYNACK messages usually advertise an ADVMSS option,
444 the incoming SYN packet. This will cause all packets on that connection
742 overflows. This is to prevent against the common 'SYN flood attack'
747 against legal connection rate. If you see SYN flood warnings
757 SYN flood warnings in logs not being really flooded, your server
766 the initial SYN packet is received during the three-way handshake.
782 B, and only B has TCP_SAVE_SYN enabled. B cannot read SYN data from
791 SYN packet.
795 rather than connect() to send data in SYN.
805 0x1 (client) enables sending data in the opening SYN on the client.
[all …]
Dipvs-sysctl.rst109 the SYN-RECV/SYNACK state, which should be effective against
/Linux-v5.15/Documentation/driver-api/surface_aggregator/
Dssh.rst8 .. |SYN| replace:: ``SYN`` substdef
92 * - |SYN|
96 A message consists of |SYN|, followed by the frame (|TYPE|, |LEN|, |SEQ| and
139 Each exchange begins with |SYN|, followed by a |DATA_SEQ|- or
164 tx: -- SYN FRAME(D) CRC(F) PAYLOAD CRC(P) -----------------------------
165 rx: ------------------------------------- SYN FRAME(A) CRC(F) CRC(P) --
174 tx: -- SYN FRAME(D) CRC(F) PAYLOAD CRC(P) -----------------------------
175 rx: ------------------------------------- SYN FRAME(N) CRC(F) CRC(P) --
183 tx: -- SYN FRAME(DATA_NSQ) CRC(F) PAYLOAD CRC(P) ----------------------
/Linux-v5.15/tools/testing/selftests/bpf/prog_tests/
Dcls_redirect.c182 SYN, enumerator
230 if (test->flags == SYN) in test_str()
240 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, SYN },
339 if (test->flags == SYN) in build_input()
/Linux-v5.15/tools/perf/trace/beauty/
Dmsg_flags.c46 P_MSG_FLAG(SYN); in syscall_arg__scnprintf_msg_flags()
/Linux-v5.15/net/ipv4/
DKconfig271 Normal TCP/IP networking is open to an attack known as "SYN
277 SYN cookies provide protection against this type of attack. If you
279 protocol known as "SYN cookies" to enable legitimate users to
282 SYN cookies work transparently to them. For technical information
283 about SYN cookies, check out <https://cr.yp.to/syncookies.html>.
285 If you are SYN flooded, the source address reported by the kernel is
290 SYN cookies may prevent correct error reporting on clients when the
294 If you say Y here, you can disable SYN cookies at run time by
/Linux-v5.15/tools/testing/selftests/bpf/progs/
Dtest_cls_redirect.c80 SYN, enumerator
827 return SYN; in process_tcp()
1056 case SYN: in cls_redirect()
/Linux-v5.15/net/netfilter/
DKconfig669 during SYN-flood attacks.
1113 MSS value of TCP SYN packets, to control the maximum size for that
1129 iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN \
1456 analyzing incoming TCP SYN packets.
1616 MSS value of TCP SYN packets, which control the maximum packet size
/Linux-v5.15/net/ipv6/netfilter/
DKconfig225 during SYN-flood attacks.
/Linux-v5.15/net/ipv4/netfilter/
DKconfig212 during SYN-flood attacks.
/Linux-v5.15/Documentation/networking/devlink/
Ddevlink-trap.rst460 This could include TCP checksum errors, improper combination of SYN, FIN
/Linux-v5.15/drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/
Dphy_n.c38 write_radio_reg(pi, radio_type##_##SYN##_##reg_name, value)
/Linux-v5.15/
DMAINTAINERS9279 K: \b(ABS|SYN)_MT_