On 3/25/26 5:59 AM, Martin KaFai Lau wrote:
On 3/23/26 3:54 AM, Jiayuan Chen wrote:
+void test_tcp_custom_syncookie_protocol_check(void)
+{
+    struct test_tcp_custom_syncookie *skel;
+    struct sockaddr_in tcp_addr, udp_addr;
+    socklen_t addr_len = sizeof(tcp_addr);
+    int tcp_server = -1, udp_client = -1;
+    char buf[32] = "test";
+    int ret;
+
+    if (setup_netns())
+        return;
+
+    skel = test_tcp_custom_syncookie__open_and_load();
+    if (!ASSERT_OK_PTR(skel, "open_and_load"))
+        return;
  +    /* Create a TCP listener so the BPF can find a LISTEN socket */
+    tcp_server = start_server(AF_INET, SOCK_STREAM, "127.0.0.1", 0, 0);
+    if (!ASSERT_NEQ(tcp_server, -1, "start tcp_server"))
+        goto destroy_skel;
+
+    ret = getsockname(tcp_server, (struct sockaddr *)&tcp_addr, &addr_len);
+    if (!ASSERT_OK(ret, "getsockname"))
+        goto close_tcp;
+
+    skel->bss->tcp_listener_port = ntohs(tcp_addr.sin_port);
+    skel->bss->udp_test_port = 9999;
+
+    ret = bpf_program__fd(skel->progs.tcp_custom_syncookie_badproto);
+    if (setup_tc(ret))
+        goto close_tcp;
+
+    udp_client = socket(AF_INET, SOCK_DGRAM, 0);
+    if (!ASSERT_NEQ(udp_client, -1, "udp socket"))
+        goto cleanup_tc;
+
+    memset(&udp_addr, 0, sizeof(udp_addr));
+    udp_addr.sin_family = AF_INET;
+    udp_addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
+    udp_addr.sin_port = htons(9999);
+
+    ret = sendto(udp_client, buf, sizeof(buf), 0,
+             (struct sockaddr *)&udp_addr, sizeof(udp_addr));
+    ASSERT_EQ(ret, sizeof(buf), "sendto udp");
+
+    /* Wait for TC ingress BPF to process the skb. */
+    kern_sync_rcu();

hmm... is it guaranteed to work? Regardless, it checks the error returned from bpf_sk_assign_tcp_reqsk(). Maybe bpf_prog_test_run is simpler?

pw-bot: cr



Hi Martin,

Thanks for your suggestion.

The intent of using the real network stack was to demonstrate the
actual null-ptr-deref panic, so reviewers can better understand the
issue. Once we agree the root cause is the missing protocol check in
bpf_sk_assign_tcp_reqsk(), switching to bpf_prog_test_run to just
validate the return value makes sense.



Reply via email to