diff options
Diffstat (limited to 'net')
-rw-r--r-- | net/ipv4/netfilter/arp_tables.c | 5 | ||||
-rw-r--r-- | net/ipv4/netfilter/ip_tables.c | 5 | ||||
-rw-r--r-- | net/ipv6/netfilter/ip6_tables.c | 5 |
3 files changed, 9 insertions, 6 deletions
diff --git a/net/ipv4/netfilter/arp_tables.c b/net/ipv4/netfilter/arp_tables.c index 71b76ade00e1..9aa22398b3dc 100644 --- a/net/ipv4/netfilter/arp_tables.c +++ b/net/ipv4/netfilter/arp_tables.c | |||
@@ -358,6 +358,7 @@ static int mark_source_chains(struct xt_table_info *newinfo, | |||
358 | for (;;) { | 358 | for (;;) { |
359 | struct arpt_standard_target *t | 359 | struct arpt_standard_target *t |
360 | = (void *)arpt_get_target(e); | 360 | = (void *)arpt_get_target(e); |
361 | int visited = e->comefrom & (1 << hook); | ||
361 | 362 | ||
362 | if (e->comefrom & (1 << NF_ARP_NUMHOOKS)) { | 363 | if (e->comefrom & (1 << NF_ARP_NUMHOOKS)) { |
363 | printk("arptables: loop hook %u pos %u %08X.\n", | 364 | printk("arptables: loop hook %u pos %u %08X.\n", |
@@ -368,11 +369,11 @@ static int mark_source_chains(struct xt_table_info *newinfo, | |||
368 | |= ((1 << hook) | (1 << NF_ARP_NUMHOOKS)); | 369 | |= ((1 << hook) | (1 << NF_ARP_NUMHOOKS)); |
369 | 370 | ||
370 | /* Unconditional return/END. */ | 371 | /* Unconditional return/END. */ |
371 | if (e->target_offset == sizeof(struct arpt_entry) | 372 | if ((e->target_offset == sizeof(struct arpt_entry) |
372 | && (strcmp(t->target.u.user.name, | 373 | && (strcmp(t->target.u.user.name, |
373 | ARPT_STANDARD_TARGET) == 0) | 374 | ARPT_STANDARD_TARGET) == 0) |
374 | && t->verdict < 0 | 375 | && t->verdict < 0 |
375 | && unconditional(&e->arp)) { | 376 | && unconditional(&e->arp)) || visited) { |
376 | unsigned int oldpos, size; | 377 | unsigned int oldpos, size; |
377 | 378 | ||
378 | if (t->verdict < -NF_MAX_VERDICT - 1) { | 379 | if (t->verdict < -NF_MAX_VERDICT - 1) { |
diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c index 83ebbeb80b6e..09696f16aa95 100644 --- a/net/ipv4/netfilter/ip_tables.c +++ b/net/ipv4/netfilter/ip_tables.c | |||
@@ -384,6 +384,7 @@ mark_source_chains(struct xt_table_info *newinfo, | |||
384 | for (;;) { | 384 | for (;;) { |
385 | struct ipt_standard_target *t | 385 | struct ipt_standard_target *t |
386 | = (void *)ipt_get_target(e); | 386 | = (void *)ipt_get_target(e); |
387 | int visited = e->comefrom & (1 << hook); | ||
387 | 388 | ||
388 | if (e->comefrom & (1 << NF_IP_NUMHOOKS)) { | 389 | if (e->comefrom & (1 << NF_IP_NUMHOOKS)) { |
389 | printk("iptables: loop hook %u pos %u %08X.\n", | 390 | printk("iptables: loop hook %u pos %u %08X.\n", |
@@ -394,11 +395,11 @@ mark_source_chains(struct xt_table_info *newinfo, | |||
394 | |= ((1 << hook) | (1 << NF_IP_NUMHOOKS)); | 395 | |= ((1 << hook) | (1 << NF_IP_NUMHOOKS)); |
395 | 396 | ||
396 | /* Unconditional return/END. */ | 397 | /* Unconditional return/END. */ |
397 | if (e->target_offset == sizeof(struct ipt_entry) | 398 | if ((e->target_offset == sizeof(struct ipt_entry) |
398 | && (strcmp(t->target.u.user.name, | 399 | && (strcmp(t->target.u.user.name, |
399 | IPT_STANDARD_TARGET) == 0) | 400 | IPT_STANDARD_TARGET) == 0) |
400 | && t->verdict < 0 | 401 | && t->verdict < 0 |
401 | && unconditional(&e->ip)) { | 402 | && unconditional(&e->ip)) || visited) { |
402 | unsigned int oldpos, size; | 403 | unsigned int oldpos, size; |
403 | 404 | ||
404 | if (t->verdict < -NF_MAX_VERDICT - 1) { | 405 | if (t->verdict < -NF_MAX_VERDICT - 1) { |
diff --git a/net/ipv6/netfilter/ip6_tables.c b/net/ipv6/netfilter/ip6_tables.c index 4eec4b3988b8..99502c5da4c4 100644 --- a/net/ipv6/netfilter/ip6_tables.c +++ b/net/ipv6/netfilter/ip6_tables.c | |||
@@ -413,6 +413,7 @@ mark_source_chains(struct xt_table_info *newinfo, | |||
413 | unsigned int pos = newinfo->hook_entry[hook]; | 413 | unsigned int pos = newinfo->hook_entry[hook]; |
414 | struct ip6t_entry *e | 414 | struct ip6t_entry *e |
415 | = (struct ip6t_entry *)(entry0 + pos); | 415 | = (struct ip6t_entry *)(entry0 + pos); |
416 | int visited = e->comefrom & (1 << hook); | ||
416 | 417 | ||
417 | if (!(valid_hooks & (1 << hook))) | 418 | if (!(valid_hooks & (1 << hook))) |
418 | continue; | 419 | continue; |
@@ -433,11 +434,11 @@ mark_source_chains(struct xt_table_info *newinfo, | |||
433 | |= ((1 << hook) | (1 << NF_IP6_NUMHOOKS)); | 434 | |= ((1 << hook) | (1 << NF_IP6_NUMHOOKS)); |
434 | 435 | ||
435 | /* Unconditional return/END. */ | 436 | /* Unconditional return/END. */ |
436 | if (e->target_offset == sizeof(struct ip6t_entry) | 437 | if ((e->target_offset == sizeof(struct ip6t_entry) |
437 | && (strcmp(t->target.u.user.name, | 438 | && (strcmp(t->target.u.user.name, |
438 | IP6T_STANDARD_TARGET) == 0) | 439 | IP6T_STANDARD_TARGET) == 0) |
439 | && t->verdict < 0 | 440 | && t->verdict < 0 |
440 | && unconditional(&e->ipv6)) { | 441 | && unconditional(&e->ipv6)) || visited) { |
441 | unsigned int oldpos, size; | 442 | unsigned int oldpos, size; |
442 | 443 | ||
443 | if (t->verdict < -NF_MAX_VERDICT - 1) { | 444 | if (t->verdict < -NF_MAX_VERDICT - 1) { |