diff options
author | Maciej enczykowski <maze@google.com> | 2019-05-13 12:43:46 -0700 |
---|---|---|
committer | android-build-merger <android-build-merger@google.com> | 2019-05-13 12:43:46 -0700 |
commit | f78f06e102717a0112ff033edb893abe958deaa4 (patch) | |
tree | 3a4ab27c9e349fcc036be7d4c7da4e42105e4f27 | |
parent | 3eb08189d47e1071ff1835758087b8b6e563577a (diff) | |
parent | ba25674f804bb4e1bcf9f130b076373d8cd97dde (diff) | |
download | platform_external_android-clat-f78f06e102717a0112ff033edb893abe958deaa4.tar.gz platform_external_android-clat-f78f06e102717a0112ff033edb893abe958deaa4.tar.bz2 platform_external_android-clat-f78f06e102717a0112ff033edb893abe958deaa4.zip |
Revert "clat - turn off spurious log messages caused by IPv6 packets"android-o-mr1-iot-release-1.0.13
am: ba25674f80
Change-Id: I69b00fa1c6b2b36f85705997cfb474202f137ef4
-rw-r--r-- | clatd.c | 5 |
1 files changed, 0 insertions, 5 deletions
@@ -417,11 +417,6 @@ void read_packet(int read_fd, int write_fd, int to_ipv6) { } uint16_t proto = ntohs(tun_header->proto); - if (proto == ETH_P_IPV6) { - // kernel IPv6 stack spams us with router/neighbour solication, - // multicast group joins, etc. which otherwise fills the log... - return; - } if (proto != ETH_P_IP) { logmsg(ANDROID_LOG_WARN, "%s: unknown packet type = 0x%x", __func__, proto); return; |