Lines Matching defs:state
588 * map state of *map_fd*. Write operations from eBPF programs
819 * for that path will trigger the iterator to read kernel state
1847 * pseudo-random internal state, and cannot be used to infer the
3020 * * **BPF_SOCK_OPS_STATE_CB_FLAG** (TCP state change)
3175 * Retrieve the XFRM state (IP transform framework, see also
3789 * Return a **struct bpf_sock** pointer in **TCP_LISTEN** state.
4307 * state (TCP listening or UDP unconnected).
6228 __u32 state;
6656 __u32 state;
6809 BPF_SOCK_OPS_STATE_CB, /* Called when TCP changes state.
6814 * socket transition to LISTEN state.
6893 BPF_TCP_CLOSING, /* Now a valid state */
7347 /* BPF numbers iterator state */
7349 /* opaque iterator state; having __u64 here allows to preserve correct