diff options
Diffstat (limited to 'net/ipv4')
-rw-r--r-- | net/ipv4/netfilter/arp_tables.c | 5 | ||||
-rw-r--r-- | net/ipv4/netfilter/ip_tables.c | 5 |
2 files changed, 6 insertions, 4 deletions
diff --git a/net/ipv4/netfilter/arp_tables.c b/net/ipv4/netfilter/arp_tables.c index 71b76ade00..9aa22398b3 100644 --- a/net/ipv4/netfilter/arp_tables.c +++ b/net/ipv4/netfilter/arp_tables.c | |||
@@ -358,6 +358,7 @@ static int mark_source_chains(struct xt_table_info *newinfo, | |||
358 | for (;;) { | 358 | for (;;) { |
359 | struct arpt_standard_target *t | 359 | struct arpt_standard_target *t |
360 | = (void *)arpt_get_target(e); | 360 | = (void *)arpt_get_target(e); |
361 | int visited = e->comefrom & (1 << hook); | ||
361 | 362 | ||
362 | if (e->comefrom & (1 << NF_ARP_NUMHOOKS)) { | 363 | if (e->comefrom & (1 << NF_ARP_NUMHOOKS)) { |
363 | printk("arptables: loop hook %u pos %u %08X.\n", | 364 | printk("arptables: loop hook %u pos %u %08X.\n", |
@@ -368,11 +369,11 @@ static int mark_source_chains(struct xt_table_info *newinfo, | |||
368 | |= ((1 << hook) | (1 << NF_ARP_NUMHOOKS)); | 369 | |= ((1 << hook) | (1 << NF_ARP_NUMHOOKS)); |
369 | 370 | ||
370 | /* Unconditional return/END. */ | 371 | /* Unconditional return/END. */ |
371 | if (e->target_offset == sizeof(struct arpt_entry) | 372 | if ((e->target_offset == sizeof(struct arpt_entry) |
372 | && (strcmp(t->target.u.user.name, | 373 | && (strcmp(t->target.u.user.name, |
373 | ARPT_STANDARD_TARGET) == 0) | 374 | ARPT_STANDARD_TARGET) == 0) |
374 | && t->verdict < 0 | 375 | && t->verdict < 0 |
375 | && unconditional(&e->arp)) { | 376 | && unconditional(&e->arp)) || visited) { |
376 | unsigned int oldpos, size; | 377 | unsigned int oldpos, size; |
377 | 378 | ||
378 | if (t->verdict < -NF_MAX_VERDICT - 1) { | 379 | if (t->verdict < -NF_MAX_VERDICT - 1) { |
diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c index 83ebbeb80b..09696f16aa 100644 --- a/net/ipv4/netfilter/ip_tables.c +++ b/net/ipv4/netfilter/ip_tables.c | |||
@@ -384,6 +384,7 @@ mark_source_chains(struct xt_table_info *newinfo, | |||
384 | for (;;) { | 384 | for (;;) { |
385 | struct ipt_standard_target *t | 385 | struct ipt_standard_target *t |
386 | = (void *)ipt_get_target(e); | 386 | = (void *)ipt_get_target(e); |
387 | int visited = e->comefrom & (1 << hook); | ||
387 | 388 | ||
388 | if (e->comefrom & (1 << NF_IP_NUMHOOKS)) { | 389 | if (e->comefrom & (1 << NF_IP_NUMHOOKS)) { |
389 | printk("iptables: loop hook %u pos %u %08X.\n", | 390 | printk("iptables: loop hook %u pos %u %08X.\n", |
@@ -394,11 +395,11 @@ mark_source_chains(struct xt_table_info *newinfo, | |||
394 | |= ((1 << hook) | (1 << NF_IP_NUMHOOKS)); | 395 | |= ((1 << hook) | (1 << NF_IP_NUMHOOKS)); |
395 | 396 | ||
396 | /* Unconditional return/END. */ | 397 | /* Unconditional return/END. */ |
397 | if (e->target_offset == sizeof(struct ipt_entry) | 398 | if ((e->target_offset == sizeof(struct ipt_entry) |
398 | && (strcmp(t->target.u.user.name, | 399 | && (strcmp(t->target.u.user.name, |
399 | IPT_STANDARD_TARGET) == 0) | 400 | IPT_STANDARD_TARGET) == 0) |
400 | && t->verdict < 0 | 401 | && t->verdict < 0 |
401 | && unconditional(&e->ip)) { | 402 | && unconditional(&e->ip)) || visited) { |
402 | unsigned int oldpos, size; | 403 | unsigned int oldpos, size; |
403 | 404 | ||
404 | if (t->verdict < -NF_MAX_VERDICT - 1) { | 405 | if (t->verdict < -NF_MAX_VERDICT - 1) { |