Lines Matching refs:state

73  *					state ack error.
132 * Alan Cox : Kept the state trace facility since
155 * Alan Cox : Fixed the closing state machine to
171 * ack if state is TCP_CLOSED.
523 int state;
527 state = inet_sk_state_load(sk);
528 if (state == TCP_LISTEN)
532 * by poll logic and correct handling of state changes
554 * in state CLOSE_WAIT. One solution is evident --- to set EPOLLHUP
566 if (shutdown == SHUTDOWN_MASK || state == TCP_CLOSE)
572 if (state != TCP_SYN_SENT &&
573 (state != TCP_SYN_RECV || rcu_access_pointer(tp->fastopen_rsk))) {
605 } else if (state == TCP_SYN_SENT && inet_sk(sk)->defer_connect) {
1515 * blocking state of the socket.
1894 /* But if vm_insert_pages did fail, we have to unroll some state
2407 void tcp_set_state(struct sock *sk, int state)
2413 * following checks will detect if an internal state value ever
2433 tcp_call_bpf_2arg(sk, BPF_SOCK_OPS_STATE_CB, oldstate, state);
2435 switch (state) {
2455 /* Change state AFTER socket is unhashed to avoid closed
2458 inet_sk_state_store(sk, state);
2463 * State processing on a close. This implements the state shift for
2470 /* current state: new state: action: */
2510 /* If we've already sent a FIN, or it's a closed state, skip this. */
2565 int state;
2620 /* RED-PEN. Formally speaking, we have broken TCP state
2630 * F.e. "RFC state" is ESTABLISHED,
2631 * if Linux state is FIN-WAIT-1, but FIN is still not sent.
2634 * we enter time-wait state, when it is not required really
2651 state = sk->sk_state;
2663 if (state != TCP_CLOSE && sk->sk_state == TCP_CLOSE)
2745 static inline bool tcp_need_reset(int state)
2747 return (1 << state) &
3560 /* Return information about state of tcp endpoint in API format. */