From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_PASS,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2C9A8C282C3 for ; Thu, 24 Jan 2019 20:08:03 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id ECC5A21855 for ; Thu, 24 Jan 2019 20:08:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548360483; bh=X41XnYhpa9TkM+ItDRfo4X8BxEuUX0nPbnLfPJxjVmE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=IH6Cy8exrJLZDbsyEyM1KhQ3c3+Sb8x0tgnZnltO8icyA0AvA4mcsbEPU26r7uOe4 cEksvZmg6K3AJvGGyszPFgByAArS17htaLXlwlgbEwngUjR6yvcdT1KMxcc6+V0gKQ TFEBZ4t8Q7V29gwHEgBf/6W7Cgvnd1MjwrCSpMMs= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727943AbfAXUH5 (ORCPT ); Thu, 24 Jan 2019 15:07:57 -0500 Received: from mail.kernel.org ([198.145.29.99]:56688 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731201AbfAXT33 (ORCPT ); Thu, 24 Jan 2019 14:29:29 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9DD67218E2; Thu, 24 Jan 2019 19:29:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548358168; bh=X41XnYhpa9TkM+ItDRfo4X8BxEuUX0nPbnLfPJxjVmE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HL0XoAF5jGgLCJyywmkcFMzJ46x3/C/Fo0KHc5AisSIROPpmPF1/iwJRjMeFa+kYl paJ31ZN1eAMTV5AaWpih1i7ecmYX6ao2ECvpdZntkPYKLnzRBFy9RUymKAcWaq/zCu 7wmQ45Z8DRuzsqpZ/rUC4uzs5UZ5CoSWyOvxbG0Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, yupeng , "David S. Miller" , Sasha Levin Subject: [PATCH 4.9 18/39] net: call sk_dst_reset when set SO_DONTROUTE Date: Thu, 24 Jan 2019 20:20:21 +0100 Message-Id: <20190124190448.887875651@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190124190448.232316246@linuxfoundation.org> References: <20190124190448.232316246@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 0fbe82e628c817e292ff588cd5847fc935e025f2 ] after set SO_DONTROUTE to 1, the IP layer should not route packets if the dest IP address is not in link scope. But if the socket has cached the dst_entry, such packets would be routed until the sk_dst_cache expires. So we should clean the sk_dst_cache when a user set SO_DONTROUTE option. Below are server/client python scripts which could reprodue this issue: server side code: ========================================================================== import socket import struct import time s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('0.0.0.0', 9000)) s.listen(1) sock, addr = s.accept() sock.setsockopt(socket.SOL_SOCKET, socket.SO_DONTROUTE, struct.pack('i', 1)) while True: sock.send(b'foo') time.sleep(1) ========================================================================== client side code: ========================================================================== import socket import time s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(('server_address', 9000)) while True: data = s.recv(1024) print(data) ========================================================================== Signed-off-by: yupeng Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/core/sock.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/core/sock.c b/net/core/sock.c index 68c831e1a5c0..3041aa6df602 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -699,6 +699,7 @@ int sock_setsockopt(struct socket *sock, int level, int optname, break; case SO_DONTROUTE: sock_valbool_flag(sk, SOCK_LOCALROUTE, valbool); + sk_dst_reset(sk); break; case SO_BROADCAST: sock_valbool_flag(sk, SOCK_BROADCAST, valbool); -- 2.19.1