aboutsummaryrefslogtreecommitdiffstats
path: root/net/ipv6
diff options
context:
space:
mode:
authorJan Engelhardt <jengelh@medozas.de>2010-04-19 10:07:47 -0400
committerPatrick McHardy <kaber@trash.net>2010-04-19 10:07:47 -0400
commit5b775eb1c04c2ef33f5e17035e368214214ef9c2 (patch)
treeebc631a1f1212aacdcceb629537ed273f32732b0 /net/ipv6
parentcd58bcd9787ef4c16ab6e442c4f1bf3539b3ab39 (diff)
netfilter: xtables: remove old comments about reentrancy
Signed-off-by: Jan Engelhardt <jengelh@medozas.de> Signed-off-by: Patrick McHardy <kaber@trash.net>
Diffstat (limited to 'net/ipv6')
-rw-r--r--net/ipv6/netfilter/ip6_tables.c2
-rw-r--r--net/ipv6/netfilter/ip6t_REJECT.c3
2 files changed, 0 insertions, 5 deletions
diff --git a/net/ipv6/netfilter/ip6_tables.c b/net/ipv6/netfilter/ip6_tables.c
index 2a2770bcd640..7afa11773164 100644
--- a/net/ipv6/netfilter/ip6_tables.c
+++ b/net/ipv6/netfilter/ip6_tables.c
@@ -451,8 +451,6 @@ ip6t_do_table(struct sk_buff *skb,
451 continue; 451 continue;
452 } 452 }
453 453
454 /* Targets which reenter must return
455 abs. verdicts */
456 tgpar.target = t->u.kernel.target; 454 tgpar.target = t->u.kernel.target;
457 tgpar.targinfo = t->data; 455 tgpar.targinfo = t->data;
458 456
diff --git a/net/ipv6/netfilter/ip6t_REJECT.c b/net/ipv6/netfilter/ip6t_REJECT.c
index 55b9b2da1340..dad97622ed72 100644
--- a/net/ipv6/netfilter/ip6t_REJECT.c
+++ b/net/ipv6/netfilter/ip6t_REJECT.c
@@ -179,9 +179,6 @@ reject_tg6(struct sk_buff *skb, const struct xt_target_param *par)
179 struct net *net = dev_net((par->in != NULL) ? par->in : par->out); 179 struct net *net = dev_net((par->in != NULL) ? par->in : par->out);
180 180
181 pr_debug("%s: medium point\n", __func__); 181 pr_debug("%s: medium point\n", __func__);
182 /* WARNING: This code causes reentry within ip6tables.
183 This means that the ip6tables jump stack is now crap. We
184 must return an absolute verdict. --RR */
185 switch (reject->with) { 182 switch (reject->with) {
186 case IP6T_ICMP6_NO_ROUTE: 183 case IP6T_ICMP6_NO_ROUTE:
187 send_unreach(net, skb, ICMPV6_NOROUTE, par->hooknum); 184 send_unreach(net, skb, ICMPV6_NOROUTE, par->hooknum);