Searched refs:srh_state (Results 1 – 2 of 2) sorted by relevance
1392 struct seg6_bpf_srh_state *srh_state = in seg6_bpf_has_valid_srh() local 1394 struct ipv6_sr_hdr *srh = srh_state->srh; in seg6_bpf_has_valid_srh() 1396 lockdep_assert_held(&srh_state->bh_lock); in seg6_bpf_has_valid_srh() 1400 if (unlikely(!srh_state->valid)) { in seg6_bpf_has_valid_srh() 1401 if ((srh_state->hdrlen & 7) != 0) in seg6_bpf_has_valid_srh() 1404 srh->hdrlen = (u8)(srh_state->hdrlen >> 3); in seg6_bpf_has_valid_srh() 1408 srh_state->valid = true; in seg6_bpf_has_valid_srh() 1417 struct seg6_bpf_srh_state *srh_state; in input_action_end_bpf() local 1428 /* The access to the per-CPU buffer srh_state is protected by running in input_action_end_bpf() 1435 srh_state in input_action_end_bpf() [all...]
6576 struct seg6_bpf_srh_state *srh_state = in BPF_CALL_4() local 6578 struct ipv6_sr_hdr *srh = srh_state->srh; in BPF_CALL_4() 6582 lockdep_assert_held(&srh_state->bh_lock); in BPF_CALL_4() 6587 srh_end = (void *)((char *)srh + sizeof(*srh) + srh_state->hdrlen); in BPF_CALL_4() 6591 srh_state->valid = false; in BPF_CALL_4() 6600 srh_state->srh = (struct ipv6_sr_hdr *)(skb->data + srhoff); in BPF_CALL_4() 6618 struct seg6_bpf_srh_state *srh_state = in bpf_update_srh_state() local 6623 srh_state->srh = NULL; in bpf_update_srh_state() 6625 srh_state->srh = (struct ipv6_sr_hdr *)(skb->data + srhoff); in bpf_update_srh_state() 6626 srh_state in bpf_update_srh_state() 6634 struct seg6_bpf_srh_state *srh_state = BPF_CALL_4() local 6708 struct seg6_bpf_srh_state *srh_state = BPF_CALL_3() local [all...]