Lines Matching defs:window

38  *		David S. Miller	:	Don't allow zero congestion window.
90 #define FLAG_WIN_UPDATE 0x02 /* Incoming ACK was a window update. */
97 #define FLAG_SLOWPATH 0x100 /* Do not skip RFC checks for window update.*/
409 /* Buffer size and advertised window tuning.
446 /* 2. Tuning advertised window (window_clamp, rcv_ssthresh)
449 * forward and advertised in receiver window (tp->rcv_wnd) and
452 * window_clamp is maximal advertised window. It can be less than
464 * of receiver window. Check #2.
467 * window and then starts to feed us spaghetti. But it should work
478 int window = tcp_win_from_space(sk, READ_ONCE(sock_net(sk)->ipv4.sysctl_tcp_rmem[2])) >> 1;
480 while (tp->rcv_ssthresh <= window) {
485 window >>= 1;
522 /* Check #2. Increase window, if skb with such overhead
577 /* 4. Recalculate window clamp after socket hit its memory bounds. */
726 * copied = bytes received in previous RTT, our base window
739 /* minimal window to cope with packet losses, assuming
759 /* Make the window clamp follow along. */
812 * restart window, so that we send ACKs quickly.
993 * - DSACKed sequence range is larger than maximum receiver's window.
1221 /* In outstanding window? ...This is valid exit for D-SACKs too.
2145 /* Reduce ssthresh if it has not yet been made inside this window. */
2214 * but when e.g. out-of-window ACKs or packet duplication occurs,
2310 * window reduction and abort recovery phase. This logic is hidden
2315 * and enter Recovery phase, reducing congestion window.
2427 * window. It would seem that it is trivially available for us in
2770 /* Don't muck with the congestion window here.
3089 * left edge of the send window.
3436 /* Was it a usable window open? */
3501 /* Check that window update is acceptable.
3533 /* Update our send window.
3543 u32 nwin = ntohs(tcp_hdr(skb)->window);
3600 /* Return true if we're currently rate-limiting out-of-window ACKs and
3602 * response to out-of-window SYNs or ACKs to mitigate ACK loops or DoS
3605 * endpoint is sending out-of-window SYNs or pure ACKs at a high rate.
3812 * is in window.
3861 * the congestion window, it SHOULD set the CWR bit only on the first
3920 /* If this ack opens up a zero window, clear backoff. It was
4077 net_info_ratelimited("%s: Illegal window scaling value %d > %u received\n",
4235 * It is not fatal. If this ACK does _not_ change critical state (seqs, window)
4239 * second order effects, if we apply some small "replay" window (~RTO)
4252 * OK, let's give it small replay window. If peer clock is even 1hz, it is safe
4269 /* 3. ... and does not update window. */
4270 !tcp_may_update_window(tp, ack, seq, ntohs(th->window) << tp->rx_opt.snd_wscale) &&
4272 /* 4. ... and sits in replay window. */
4288 * fits to the window after truncation to the window. Acceptability
4821 /* For non sack flows, do not grow window to force DUPACK
4909 /* For non sack flows, do not grow window to force DUPACK
5029 /* Ok. In sequence. In window. */
5081 /* Out of window. F.e. zero window probe. */
5089 /* If window is closed, drop tail of packet. But after
5425 /* If we filled the congestion window, do not expand. */
5485 /* ... and right edge of window advances far enough.
5782 * - A zero window was announced from us - zero window probing
5787 * - Unexpected TCP flags/window values/header lengths are received
5806 /* TCP congestion window tracking */
5868 /* Predicted packet is in window by definition.
5903 /* Predicted packet is in window by definition.
5989 /* Initialize the congestion window to start the transfer.
6210 /* RFC1323: The window in SYN & SYN/ACK segments is
6213 tp->snd_wnd = ntohs(th->window);
6314 /* RFC1323: The window in SYN & SYN/ACK segments is
6317 tp->snd_wnd = ntohs(th->window);
6511 tp->snd_wnd = ntohs(th->window) << tp->rx_opt.snd_wscale;