Lines Matching defs:state
169 * each socket state is protected by separate spin lock.
525 int state;
529 /* Clear state */
536 state = sk->sk_state;
565 if (state == TCP_LISTEN)
849 sock->state = SS_UNCONNECTED;
1194 * 1003.1g breaking connected state with AF_UNSPEC
1275 If we will make it after state is locked,
1297 /* Latch state of peer */
1327 /* Latch our state.
1329 It is tricky place. We need to grab our state lock and cannot
1333 state. other is TCP_LISTEN, if sk is TCP_LISTEN we
1336 Well, and we have to recheck the state after socket locked.
1406 sock->state = SS_CONNECTED;
1452 socka->state = SS_CONNECTED;
1453 sockb->state = SS_CONNECTED;
1483 /* If socket state is TCP_LISTEN it cannot change (for now...),
1501 newsock->state = SS_CONNECTED;
2311 static int unix_stream_read_generic(struct unix_stream_read_state *state,
2315 struct socket *sock = state->socket;
2319 int flags = state->flags;
2326 size_t size = state->size;
2426 if (state->msg && state->msg->msg_name) {
2428 state->msg->msg_name);
2429 unix_copy_addr(state->msg, skb->sk);
2435 chunk = state->recv_actor(skb, skip, chunk, state);
2502 if (state->msg)
2503 scm_recv(sock, state->msg, &scm, flags);
2512 struct unix_stream_read_state *state)
2517 state->msg, chunk);
2524 struct unix_stream_read_state state = {
2532 return unix_stream_read_generic(&state, true);
2537 struct unix_stream_read_state *state)
2539 return skb_splice_bits(skb, state->socket->sk,
2541 state->pipe, chunk, state->splice_flags);
2548 struct unix_stream_read_state state = {
2561 state.flags = MSG_DONTWAIT;
2563 return unix_stream_read_generic(&state, false);