|
@@ -39,12 +39,6 @@ MODULE_LICENSE("GPL");
|
|
|
MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>");
|
|
|
MODULE_DESCRIPTION("IPv6 packet filter");
|
|
|
|
|
|
-#ifdef CONFIG_NETFILTER_DEBUG
|
|
|
-#define IP_NF_ASSERT(x) WARN_ON(!(x))
|
|
|
-#else
|
|
|
-#define IP_NF_ASSERT(x)
|
|
|
-#endif
|
|
|
-
|
|
|
void *ip6t_alloc_initial_table(const struct xt_table *info)
|
|
|
{
|
|
|
return xt_alloc_initial_table(ip6t, IP6T);
|
|
@@ -284,7 +278,7 @@ ip6t_do_table(struct sk_buff *skb,
|
|
|
acpar.hotdrop = false;
|
|
|
acpar.state = state;
|
|
|
|
|
|
- IP_NF_ASSERT(table->valid_hooks & (1 << hook));
|
|
|
+ WARN_ON(!(table->valid_hooks & (1 << hook)));
|
|
|
|
|
|
local_bh_disable();
|
|
|
addend = xt_write_recseq_begin();
|
|
@@ -315,7 +309,7 @@ ip6t_do_table(struct sk_buff *skb,
|
|
|
const struct xt_entry_match *ematch;
|
|
|
struct xt_counters *counter;
|
|
|
|
|
|
- IP_NF_ASSERT(e);
|
|
|
+ WARN_ON(!e);
|
|
|
acpar.thoff = 0;
|
|
|
if (!ip6_packet_match(skb, indev, outdev, &e->ipv6,
|
|
|
&acpar.thoff, &acpar.fragoff, &acpar.hotdrop)) {
|
|
@@ -335,7 +329,7 @@ ip6t_do_table(struct sk_buff *skb,
|
|
|
ADD_COUNTER(*counter, skb->len, 1);
|
|
|
|
|
|
t = ip6t_get_target_c(e);
|
|
|
- IP_NF_ASSERT(t->u.kernel.target);
|
|
|
+ WARN_ON(!t->u.kernel.target);
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_NETFILTER_XT_TARGET_TRACE)
|
|
|
/* The packet is traced: log it */
|