Update filter_udphdr to use bpf_dynptr_slice to read the packet headers
instead of accessing them directly.

The function previously returned a pointer to the UDP header, which
was then used to calculate Ethernet and IP header lengths by
subtracting xdp->data. Since this only works when the UDP header is in
the linear region, rework the function to return the total header
length instead of a pointer. Rename filter_udphdr() to check_udphdr()
to reflect the new behavior.

This makes the test viable for drivers that do not store any
packet data in the linear part when in multi-buffer mode.

Signed-off-by: Nimrod Oren <no...@nvidia.com>
Reviewed-by: Carolina Jubran <cjub...@nvidia.com>
Reviewed-by: Dragos Tatulea <dtatu...@nvidia.com>
---
 .../selftests/net/lib/xdp_native.bpf.c        | 80 +++++++------------
 1 file changed, 31 insertions(+), 49 deletions(-)

diff --git a/tools/testing/selftests/net/lib/xdp_native.bpf.c 
b/tools/testing/selftests/net/lib/xdp_native.bpf.c
index ff63f572552b..6df5164e3791 100644
--- a/tools/testing/selftests/net/lib/xdp_native.bpf.c
+++ b/tools/testing/selftests/net/lib/xdp_native.bpf.c
@@ -63,53 +63,49 @@ static void record_stats(struct xdp_md *ctx, __u32 
stat_type)
                __sync_fetch_and_add(count, 1);
 }
 
-static struct udphdr *filter_udphdr(struct xdp_md *ctx, __u16 port)
+static __u32 check_udphdr(struct xdp_md *ctx, __u16 port)
 {
-       void *data_end = (void *)(long)ctx->data_end;
-       void *data = (void *)(long)ctx->data;
        struct udphdr *udph = NULL;
-       struct ethhdr *eth = data;
+       struct ethhdr *eth = NULL;
+       struct bpf_dynptr ptr;
 
-       if (data + sizeof(*eth) > data_end)
-               return NULL;
+       bpf_dynptr_from_xdp(ctx, 0, &ptr);
+       eth = bpf_dynptr_slice(&ptr, 0, NULL, sizeof(*eth));
+       if (!eth)
+               return 0;
 
        if (eth->h_proto == bpf_htons(ETH_P_IP)) {
-               struct iphdr *iph = data + sizeof(*eth);
+               struct iphdr *iph = bpf_dynptr_slice(&ptr, sizeof(*eth),
+                                                    NULL, sizeof(*iph));
 
-               if (iph + 1 > (struct iphdr *)data_end ||
-                   iph->protocol != IPPROTO_UDP)
-                       return NULL;
+               if (!iph || iph->protocol != IPPROTO_UDP)
+                       return 0;
 
-               udph = (void *)eth + sizeof(*iph) + sizeof(*eth);
-       } else if (eth->h_proto  == bpf_htons(ETH_P_IPV6)) {
-               struct ipv6hdr *ipv6h = data + sizeof(*eth);
+               udph = bpf_dynptr_slice(&ptr, sizeof(*iph) + sizeof(*eth),
+                                       NULL, sizeof(*udph));
+       } else if (eth->h_proto == bpf_htons(ETH_P_IPV6)) {
+               struct ipv6hdr *ipv6h = bpf_dynptr_slice(&ptr, sizeof(*eth),
+                                                        NULL, sizeof(*ipv6h));
 
-               if (ipv6h + 1 > (struct ipv6hdr *)data_end ||
-                   ipv6h->nexthdr != IPPROTO_UDP)
-                       return NULL;
+               if (!ipv6h || ipv6h->nexthdr != IPPROTO_UDP)
+                       return 0;
 
-               udph = (void *)eth + sizeof(*ipv6h) + sizeof(*eth);
+               udph = bpf_dynptr_slice(&ptr, sizeof(*ipv6h) + sizeof(*eth),
+                                       NULL, sizeof(*udph));
        } else {
-               return NULL;
+               return 0;
        }
 
-       if (udph + 1 > (struct udphdr *)data_end)
-               return NULL;
-
-       if (udph->dest != bpf_htons(port))
-               return NULL;
+       if (!udph || udph->dest != bpf_htons(port))
+               return 0;
 
        record_stats(ctx, STATS_RX);
-
-       return udph;
+       return (void *)udph - (void *)eth + sizeof(*udph);
 }
 
 static int xdp_mode_pass(struct xdp_md *ctx, __u16 port)
 {
-       struct udphdr *udph = NULL;
-
-       udph = filter_udphdr(ctx, port);
-       if (!udph)
+       if (!check_udphdr(ctx, port))
                return XDP_PASS;
 
        record_stats(ctx, STATS_PASS);
@@ -119,10 +115,7 @@ static int xdp_mode_pass(struct xdp_md *ctx, __u16 port)
 
 static int xdp_mode_drop_handler(struct xdp_md *ctx, __u16 port)
 {
-       struct udphdr *udph = NULL;
-
-       udph = filter_udphdr(ctx, port);
-       if (!udph)
+       if (!check_udphdr(ctx, port))
                return XDP_PASS;
 
        record_stats(ctx, STATS_DROP);
@@ -363,19 +356,14 @@ static int xdp_adjst_tail_grow_data(struct xdp_md *ctx, 
__u16 offset)
 
 static int xdp_adjst_tail(struct xdp_md *ctx, __u16 port)
 {
-       void *data = (void *)(long)ctx->data;
-       struct udphdr *udph = NULL;
-       __s32 *adjust_offset, *val;
+       __s32 *adjust_offset;
        __u32 key, hdr_len;
-       void *offset_ptr;
-       __u8 tag;
        int ret;
 
-       udph = filter_udphdr(ctx, port);
-       if (!udph)
+       hdr_len = check_udphdr(ctx, port);
+       if (!hdr_len)
                return XDP_PASS;
 
-       hdr_len = (void *)udph - data + sizeof(struct udphdr);
        key = XDP_ADJST_OFFSET;
        adjust_offset = bpf_map_lookup_elem(&map_xdp_setup, &key);
        if (!adjust_offset)
@@ -504,20 +492,14 @@ static int xdp_adjst_head_grow_data(struct xdp_md *ctx, 
__u64 hdr_len,
 
 static int xdp_head_adjst(struct xdp_md *ctx, __u16 port)
 {
-       void *data_end = (void *)(long)ctx->data_end;
-       void *data = (void *)(long)ctx->data;
-       struct udphdr *udph_ptr = NULL;
        __u32 key, size, hdr_len;
        __s32 *val;
        int res;
 
-       /* Filter packets based on UDP port */
-       udph_ptr = filter_udphdr(ctx, port);
-       if (!udph_ptr)
+       hdr_len = check_udphdr(ctx, port);
+       if (!hdr_len)
                return XDP_PASS;
 
-       hdr_len = (void *)udph_ptr - data + sizeof(struct udphdr);
-
        key = XDP_ADJST_OFFSET;
        val = bpf_map_lookup_elem(&map_xdp_setup, &key);
        if (!val)
-- 
2.45.0


Reply via email to