Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2403161imu; Thu, 24 Jan 2019 12:09:33 -0800 (PST) X-Google-Smtp-Source: ALg8bN5/fwlAAZ8mJNlUZVTrIluqUNoNjyrppoiazVzEfm8v2GXGlwUGZjKtJf2uI9CAEIa3kjQT X-Received: by 2002:a17:902:6acc:: with SMTP id i12mr7755453plt.148.1548360573704; Thu, 24 Jan 2019 12:09:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548360573; cv=none; d=google.com; s=arc-20160816; b=HNBFp++Zf9W/2esaBf/cAAneg/kBCTSyr13DqOpIFeHEBrSa/6HnVAvCBVUmBrh8wp k/LUa40lh7+5YxZG92z/aVHZtEdgvoYq6/rXT8k+3N2mp1Xr3tk4eam7AhjK9IEW/dyx YpkVQX2/PhrjqVcLVKvkMDkoa/ZNDU4hMO7kEM6s/bKVMcSeVmrDNZq+abNMQwSMl7dX UOeATUeugR4cJNgGQjdpEnzD1uJrZK8BqbwJVyhM+eiMPghfvIJ+Hydzie4fwkBt6IuV kBgl/eqg9woP5DAkgSFAkU5RVrvktuc/HD6Tyr3WVMWASasBDtf1MPvknG4yEFeO9lei JF1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=g5jr6NBaXVXEpbQNO/iGBOlzDeLU+BrQBKEmMU899oc=; b=qGpwz4EjVSKdEdPKbMdpTjC/ATsK1DQhlZ488ucDyZDH//aABjMZ2cX3nDp5OMz/Le jSGJ29CbQgQp/Lf/3Udfsxpr53YowHthCT5RuOlGwOsU20DI2JgkOe5arvkui3abXpdV vlVdT/yU9QwX2TFGQAb13axQ0HMECbPZla36RZ9BLPjfcgochTPgK5FJRSZMomvcpwjN xl/uzszgT/6QupDealS+ZbDiUABEsDTFSAY1tzwWnOmy4CV/uTHyJg50ksyMfoN6wjeK saACjKHe9VRY/ThhKcoPNYUV3ujuU7jujiNOB0Ig1v0TRlSYLUVx5RK55Kz8UDo8Igt3 fWBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HL0XoAF5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t3si23234047pgl.108.2019.01.24.12.09.18; Thu, 24 Jan 2019 12:09:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HL0XoAF5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729088AbfAXUH5 (ORCPT + 99 others); Thu, 24 Jan 2019 15:07:57 -0500 Received: from mail.kernel.org ([198.145.29.99]:56688 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731201AbfAXT33 (ORCPT ); Thu, 24 Jan 2019 14:29:29 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9DD67218E2; Thu, 24 Jan 2019 19:29:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548358168; bh=X41XnYhpa9TkM+ItDRfo4X8BxEuUX0nPbnLfPJxjVmE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HL0XoAF5jGgLCJyywmkcFMzJ46x3/C/Fo0KHc5AisSIROPpmPF1/iwJRjMeFa+kYl paJ31ZN1eAMTV5AaWpih1i7ecmYX6ao2ECvpdZntkPYKLnzRBFy9RUymKAcWaq/zCu 7wmQ45Z8DRuzsqpZ/rUC4uzs5UZ5CoSWyOvxbG0Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, yupeng , "David S. Miller" , Sasha Levin Subject: [PATCH 4.9 18/39] net: call sk_dst_reset when set SO_DONTROUTE Date: Thu, 24 Jan 2019 20:20:21 +0100 Message-Id: <20190124190448.887875651@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190124190448.232316246@linuxfoundation.org> References: <20190124190448.232316246@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 0fbe82e628c817e292ff588cd5847fc935e025f2 ] after set SO_DONTROUTE to 1, the IP layer should not route packets if the dest IP address is not in link scope. But if the socket has cached the dst_entry, such packets would be routed until the sk_dst_cache expires. So we should clean the sk_dst_cache when a user set SO_DONTROUTE option. Below are server/client python scripts which could reprodue this issue: server side code: ========================================================================== import socket import struct import time s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('0.0.0.0', 9000)) s.listen(1) sock, addr = s.accept() sock.setsockopt(socket.SOL_SOCKET, socket.SO_DONTROUTE, struct.pack('i', 1)) while True: sock.send(b'foo') time.sleep(1) ========================================================================== client side code: ========================================================================== import socket import time s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(('server_address', 9000)) while True: data = s.recv(1024) print(data) ========================================================================== Signed-off-by: yupeng Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/core/sock.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/core/sock.c b/net/core/sock.c index 68c831e1a5c0..3041aa6df602 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -699,6 +699,7 @@ int sock_setsockopt(struct socket *sock, int level, int optname, break; case SO_DONTROUTE: sock_valbool_flag(sk, SOCK_LOCALROUTE, valbool); + sk_dst_reset(sk); break; case SO_BROADCAST: sock_valbool_flag(sk, SOCK_BROADCAST, valbool); -- 2.19.1