Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5101119imu; Tue, 8 Jan 2019 11:30:59 -0800 (PST) X-Google-Smtp-Source: ALg8bN6T09vUI1l1/i6F0H1q8/3eOHKDpPRTXAapzxCj9I/+UezHDiJYdRJK1l+fMBKnRx6CuD07 X-Received: by 2002:a17:902:3283:: with SMTP id z3mr3101061plb.76.1546975859260; Tue, 08 Jan 2019 11:30:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546975859; cv=none; d=google.com; s=arc-20160816; b=EzprSr+aiSooKBCMr32uRvZvX0J0ifnn6Vca64/YQ6VNkDf8TZ/dcIkAVzTU9TCDWf scX32ATi+30U7jBzB7fEB2K70DSWN+srn1M7xGSMjINXVjq9NlRXN6EbL+l7DfC1/SWU /p02L7UGZBBhubS/1CVPyVzrteR8AHZUFb20LktZRgLiM7fFIMeMcdbp+i8lceEAlRrO Q0nC9nZELFYhxtaEXA9AvTNOEXCjhxtevSmbnfCxLWnkRfePT1OIp4JwKUYC1LX+G5Qr oV4W/tmIe6ny5Rjeq8WaZFsGOgnHrQvbao9OqXQDQG8Y7dCFwTTHBk9uOPIrtxPm+WQL bG6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Z17MI2O81jeDrNE2xLBRzZcpIxlAZor/oN4myHAYTQM=; b=qoF3bPUmjXrQFE2/8yAENvV0Xj92+8W2c2PhRuVF+OJerHom3KN6/mF3t/6QzkPLQD qyiZoA1IjUPaepaKxHmwKE6C7E9QcSZe3sywq7FhZZHGuXNsLrIPyZOc/mS2LxFdVGru 7Cl5Lh+wRf9RDn5UsYK/GRqghMSjB2+uTeQIHHowRbLXBPN+heJHnVoe2C7jAHLZwJwY PHHKV00yrlF45tb34J1YgICXhxTPBizJLOalROacG8qvbzA4GiE5ey16u3eqijZY/h++ Z+DFvtXFc+RrYzBVkpETSSRmn41L4IPRgWXNdV/IdRBHZt3Q2+MaArMa/zk/Lzi7Qgya JEcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CuYui3UX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d5si63785721pla.361.2019.01.08.11.30.44; Tue, 08 Jan 2019 11:30:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CuYui3UX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729954AbfAHT2O (ORCPT + 99 others); Tue, 8 Jan 2019 14:28:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:35052 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729324AbfAHT2M (ORCPT ); Tue, 8 Jan 2019 14:28:12 -0500 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BF33120645; Tue, 8 Jan 2019 19:28:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546975691; bh=MzHoI7j5VQTWlShsqqtxtoqIkeY13Qg78dnGh9UvX9Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CuYui3UXP10R3ocekrmdcMBMG0cGed7RsaSU5bLsiQsxX2DKvPLqjUvlhH5QMdie4 PZp+PEyVK3fMjbhJ1aYU69m7hHsGqOTrCt5zN8IruBBp31+k9ess36ExSVQN/+nyAf YCyyJvtNJdZY0mULqjuaZbQxQxSg4X2jbwua4edw= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: yupeng , "David S . Miller" , Sasha Levin , netdev@vger.kernel.org Subject: [PATCH AUTOSEL 4.20 057/117] net: call sk_dst_reset when set SO_DONTROUTE Date: Tue, 8 Jan 2019 14:25:25 -0500 Message-Id: <20190108192628.121270-57-sashal@kernel.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190108192628.121270-1-sashal@kernel.org> References: <20190108192628.121270-1-sashal@kernel.org> MIME-Version: 1.0 X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: yupeng [ Upstream commit 0fbe82e628c817e292ff588cd5847fc935e025f2 ] after set SO_DONTROUTE to 1, the IP layer should not route packets if the dest IP address is not in link scope. But if the socket has cached the dst_entry, such packets would be routed until the sk_dst_cache expires. So we should clean the sk_dst_cache when a user set SO_DONTROUTE option. Below are server/client python scripts which could reprodue this issue: server side code: ========================================================================== import socket import struct import time s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('0.0.0.0', 9000)) s.listen(1) sock, addr = s.accept() sock.setsockopt(socket.SOL_SOCKET, socket.SO_DONTROUTE, struct.pack('i', 1)) while True: sock.send(b'foo') time.sleep(1) ========================================================================== client side code: ========================================================================== import socket import time s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(('server_address', 9000)) while True: data = s.recv(1024) print(data) ========================================================================== Signed-off-by: yupeng Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/core/sock.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/core/sock.c b/net/core/sock.c index 080a880a1761..1d0e5ba366a9 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -698,6 +698,7 @@ int sock_setsockopt(struct socket *sock, int level, int optname, break; case SO_DONTROUTE: sock_valbool_flag(sk, SOCK_LOCALROUTE, valbool); + sk_dst_reset(sk); break; case SO_BROADCAST: sock_valbool_flag(sk, SOCK_BROADCAST, valbool); -- 2.19.1