Skip to content

Commit

Permalink
ipv4: Implement IP_TRANSPARENT socket option
Browse files Browse the repository at this point in the history
This patch introduces the IP_TRANSPARENT socket option: enabling that
will make the IPv4 routing omit the non-local source address check on
output. Setting IP_TRANSPARENT requires NET_ADMIN capability.

Signed-off-by: KOVACS Krisztian <hidden@sch.bme.hu>
Signed-off-by: David S. Miller <davem@davemloft.net>
  • Loading branch information
kkovaacs authored and davem330 committed Oct 1, 2008
1 parent a210d01 commit f5715ae
Show file tree
Hide file tree
Showing 5 changed files with 20 additions and 3 deletions.
1 change: 1 addition & 0 deletions include/linux/in.h
Expand Up @@ -75,6 +75,7 @@ struct in_addr {
#define IP_IPSEC_POLICY 16
#define IP_XFRM_POLICY 17
#define IP_PASSSEC 18
#define IP_TRANSPARENT 19

/* BSD compatibility */
#define IP_RECVRETOPTS IP_RETOPTS
Expand Down
3 changes: 2 additions & 1 deletion include/net/inet_sock.h
Expand Up @@ -129,7 +129,8 @@ struct inet_sock {
is_icsk:1,
freebind:1,
hdrincl:1,
mc_loop:1;
mc_loop:1,
transparent:1;
int mc_index;
__be32 mc_addr;
struct ip_mc_socklist *mc_list;
Expand Down
3 changes: 2 additions & 1 deletion include/net/inet_timewait_sock.h
Expand Up @@ -128,7 +128,8 @@ struct inet_timewait_sock {
__be16 tw_dport;
__u16 tw_num;
/* And these are ours. */
__u8 tw_ipv6only:1;
__u8 tw_ipv6only:1,
tw_transparent:1;
/* 15 bits hole, try to pack */
__u16 tw_ipv6_offset;
unsigned long tw_ttd;
Expand Down
1 change: 1 addition & 0 deletions net/ipv4/inet_timewait_sock.c
Expand Up @@ -126,6 +126,7 @@ struct inet_timewait_sock *inet_twsk_alloc(const struct sock *sk, const int stat
tw->tw_reuse = sk->sk_reuse;
tw->tw_hash = sk->sk_hash;
tw->tw_ipv6only = 0;
tw->tw_transparent = inet->transparent;
tw->tw_prot = sk->sk_prot_creator;
twsk_net_set(tw, hold_net(sock_net(sk)));
atomic_set(&tw->tw_refcnt, 1);
Expand Down
15 changes: 14 additions & 1 deletion net/ipv4/ip_sockglue.c
Expand Up @@ -419,7 +419,7 @@ static int do_ip_setsockopt(struct sock *sk, int level,
(1<<IP_TTL) | (1<<IP_HDRINCL) |
(1<<IP_MTU_DISCOVER) | (1<<IP_RECVERR) |
(1<<IP_ROUTER_ALERT) | (1<<IP_FREEBIND) |
(1<<IP_PASSSEC))) ||
(1<<IP_PASSSEC) | (1<<IP_TRANSPARENT))) ||
optname == IP_MULTICAST_TTL ||
optname == IP_MULTICAST_LOOP) {
if (optlen >= sizeof(int)) {
Expand Down Expand Up @@ -878,6 +878,16 @@ static int do_ip_setsockopt(struct sock *sk, int level,
err = xfrm_user_policy(sk, optname, optval, optlen);
break;

case IP_TRANSPARENT:
if (!capable(CAP_NET_ADMIN)) {
err = -EPERM;
break;
}
if (optlen < 1)
goto e_inval;
inet->transparent = !!val;
break;

default:
err = -ENOPROTOOPT;
break;
Expand Down Expand Up @@ -1130,6 +1140,9 @@ static int do_ip_getsockopt(struct sock *sk, int level, int optname,
case IP_FREEBIND:
val = inet->freebind;
break;
case IP_TRANSPARENT:
val = inet->transparent;
break;
default:
release_sock(sk);
return -ENOPROTOOPT;
Expand Down

0 comments on commit f5715ae

Please sign in to comment.