Home
last modified time | relevance | path

Searched refs:srh_state (Results 1 – 2 of 2) sorted by relevance

/linux/net/ipv6/
H A Dseg6_local.c1392 struct seg6_bpf_srh_state *srh_state = in seg6_bpf_has_valid_srh() local
1394 struct ipv6_sr_hdr *srh = srh_state->srh; in seg6_bpf_has_valid_srh()
1396 lockdep_assert_held(&srh_state->bh_lock); in seg6_bpf_has_valid_srh()
1400 if (unlikely(!srh_state->valid)) { in seg6_bpf_has_valid_srh()
1401 if ((srh_state->hdrlen & 7) != 0) in seg6_bpf_has_valid_srh()
1404 srh->hdrlen = (u8)(srh_state->hdrlen >> 3); in seg6_bpf_has_valid_srh()
1408 srh_state->valid = true; in seg6_bpf_has_valid_srh()
1417 struct seg6_bpf_srh_state *srh_state; in input_action_end_bpf() local
1428 /* The access to the per-CPU buffer srh_state is protected by running in input_action_end_bpf()
1435 srh_state in input_action_end_bpf()
[all...]
/linux/net/core/
H A Dfilter.c6576 struct seg6_bpf_srh_state *srh_state = in BPF_CALL_4() local
6578 struct ipv6_sr_hdr *srh = srh_state->srh; in BPF_CALL_4()
6582 lockdep_assert_held(&srh_state->bh_lock); in BPF_CALL_4()
6587 srh_end = (void *)((char *)srh + sizeof(*srh) + srh_state->hdrlen); in BPF_CALL_4()
6591 srh_state->valid = false; in BPF_CALL_4()
6600 srh_state->srh = (struct ipv6_sr_hdr *)(skb->data + srhoff); in BPF_CALL_4()
6618 struct seg6_bpf_srh_state *srh_state = in bpf_update_srh_state() local
6623 srh_state->srh = NULL; in bpf_update_srh_state()
6625 srh_state->srh = (struct ipv6_sr_hdr *)(skb->data + srhoff); in bpf_update_srh_state()
6626 srh_state in bpf_update_srh_state()
6634 struct seg6_bpf_srh_state *srh_state = BPF_CALL_4() local
6708 struct seg6_bpf_srh_state *srh_state = BPF_CALL_3() local
[all...]