Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2397649imu; Thu, 24 Jan 2019 12:04:33 -0800 (PST) X-Google-Smtp-Source: ALg8bN7l0zbz7GFOSyu43zjs22riXAklVnvn8V9n0q0BQV2omQhUg+5Aan5psR+iGDYvN4oP0poA X-Received: by 2002:a63:d157:: with SMTP id c23mr7154945pgj.170.1548360273380; Thu, 24 Jan 2019 12:04:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548360273; cv=none; d=google.com; s=arc-20160816; b=hpJXD3Fzt+dokv6Ut8/6/RVggVyA6651S8phj+Z1Tv/rqd/fcQrBR/7Icg8jnSJPYh 8UF7cCUlrVaYjI3od54auBNvf3Pfd617pT4CPtbzGTbboBWUdR1a0LiLf6fbzz3WmMtO KLJR6RfXl71P/9MT4Wlutga1foKfrBiS7Wardxq0mnKbUC9KBnxxGHQgN7/e1xU4wn51 sBV7f4YW5Xxpd+5HnsnyNUFS1BnWO6Yq82NNtH6knl9LXx1O6uV6qyw9xGwT+ZhXaYQH uuY/34wqmZHRN/JJYrTQ6WtCzoU9PzqiKxDHwtDdOEAx7FYQuj2LYw/VXxUW+iYgkwqk GByg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ad9NGfv1WJbl7pPY/Z4XP8ki5Hs538N2gDjh64gT/V8=; b=q6Ru5Pd6LAqCSPClP0+aQ1vi9Etis24A10NvvCPTWo/J4USe42KOO2sEoKxNY0gxQS 5wYzWdzS047vEbBQRQ2IOpeKjiuh+G8Ga0SDAzD72TDFi5sLRYEOlz9ZCSJMfK0rqcI1 Y8ICYWgBRuurMSAWZKEc45h3QQL3DzzlnVuI71F2PPWZiphWCqKjY8Kwhsh7KhtlcC7f /ZRVhPoFc5jndOnji0/CBSCmv47NfFKaahQ+fHD1yj1UwCuEgsCFu67DSj2cZFL6onKT KO6HQ3eznm7hq2ExVLnKwLnhMO3gXu2f842cTffJdf9KySlpID152fCbi7n7W+8Xaqe/ Vh2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2iyGK6pW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z86si14047656pfl.209.2019.01.24.12.04.18; Thu, 24 Jan 2019 12:04:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2iyGK6pW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731739AbfAXTb4 (ORCPT + 99 others); Thu, 24 Jan 2019 14:31:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:59726 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731732AbfAXTby (ORCPT ); Thu, 24 Jan 2019 14:31:54 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DB6ED218D4; Thu, 24 Jan 2019 19:31:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548358313; bh=DOBcEBFoJVh4kKGn+NStpKAlbj6nM+XYLNtIn+Prfgo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2iyGK6pWcOaJtuP4BLzVDhli01wvPzF5kfbk0b2j/+uFqZFHReHG876HB/0PAs6Rw VP82H+6x9z2FzkPVFW+qIjZHDXsJEi9GOJRDy2G7jAoPYyl7/deLDu4WPY43ZZIoEW 0Xj61OUR5yrg9JgDpU1S5H1I+RWGXV0o3oYRMC1w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, yupeng , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 28/63] net: call sk_dst_reset when set SO_DONTROUTE Date: Thu, 24 Jan 2019 20:20:17 +0100 Message-Id: <20190124190158.304665219@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190124190155.176570028@linuxfoundation.org> References: <20190124190155.176570028@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 0fbe82e628c817e292ff588cd5847fc935e025f2 ] after set SO_DONTROUTE to 1, the IP layer should not route packets if the dest IP address is not in link scope. But if the socket has cached the dst_entry, such packets would be routed until the sk_dst_cache expires. So we should clean the sk_dst_cache when a user set SO_DONTROUTE option. Below are server/client python scripts which could reprodue this issue: server side code: ========================================================================== import socket import struct import time s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('0.0.0.0', 9000)) s.listen(1) sock, addr = s.accept() sock.setsockopt(socket.SOL_SOCKET, socket.SO_DONTROUTE, struct.pack('i', 1)) while True: sock.send(b'foo') time.sleep(1) ========================================================================== client side code: ========================================================================== import socket import time s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(('server_address', 9000)) while True: data = s.recv(1024) print(data) ========================================================================== Signed-off-by: yupeng Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/core/sock.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/core/sock.c b/net/core/sock.c index 01cae48d6eef..a88579589946 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -735,6 +735,7 @@ int sock_setsockopt(struct socket *sock, int level, int optname, break; case SO_DONTROUTE: sock_valbool_flag(sk, SOCK_LOCALROUTE, valbool); + sk_dst_reset(sk); break; case SO_BROADCAST: sock_valbool_flag(sk, SOCK_BROADCAST, valbool); -- 2.19.1