From patchwork Mon Sep 27 13:31:00 2010 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ulrich Weber X-Patchwork-Id: 65850 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 307B7B70A9 for ; Mon, 27 Sep 2010 23:31:13 +1000 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755570Ab0I0NbI (ORCPT ); Mon, 27 Sep 2010 09:31:08 -0400 Received: from dhost002-22.dex002.intermedia.net ([64.78.21.93]:46613 "EHLO dhost002-22.dex002.intermedia.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750745Ab0I0NbH (ORCPT ); Mon, 27 Sep 2010 09:31:07 -0400 Received: from MISD002-2.dex002.intermedia.net ([64.78.61.47]) by dhost002-22.dex002.intermedia.net with Microsoft SMTPSVC(6.0.3790.4675); Mon, 27 Sep 2010 06:31:06 -0700 Received: from babylon ([213.144.15.3]) by MISD002-2.dex002.intermedia.net over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675); Mon, 27 Sep 2010 06:31:05 -0700 Date: Mon, 27 Sep 2010 15:31:00 +0200 From: Ulrich Weber To: davem@davemloft.net Cc: netdev@vger.kernel.org Subject: [PATCH] tproxy: check for transparent flag in ip_route_newports Message-ID: <20100927133100.GB8916@babylon> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.20 (2009-06-14) X-OriginalArrivalTime: 27 Sep 2010 13:31:06.0271 (UTC) FILETIME=[3CE862F0:01CB5E48] Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org as done in ip_route_connect() Signed-off-by: Ulrich Weber --- include/net/route.h | 2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/include/net/route.h b/include/net/route.h index bd732d6..7e5e73b 100644 --- a/include/net/route.h +++ b/include/net/route.h @@ -199,6 +199,8 @@ static inline int ip_route_newports(struct rtable **rp, u8 protocol, fl.fl_ip_sport = sport; fl.fl_ip_dport = dport; fl.proto = protocol; + if (inet_sk(sk)->transparent) + fl.flags |= FLOWI_FLAG_ANYSRC; ip_rt_put(*rp); *rp = NULL; security_sk_classify_flow(sk, &fl);