|
@@ -47,11 +47,6 @@
|
|
|
#include <linux/netdevice.h>
|
|
|
#include <linux/socket.h>
|
|
|
|
|
|
-/* This rwlock protects the main hash table, protocol/helper/expected
|
|
|
- registrations, conntrack timers*/
|
|
|
-#define ASSERT_READ_LOCK(x)
|
|
|
-#define ASSERT_WRITE_LOCK(x)
|
|
|
-
|
|
|
#include <net/netfilter/nf_conntrack.h>
|
|
|
#include <net/netfilter/nf_conntrack_l3proto.h>
|
|
|
#include <net/netfilter/nf_conntrack_l4proto.h>
|
|
@@ -292,7 +287,6 @@ static void
|
|
|
clean_from_lists(struct nf_conn *ct)
|
|
|
{
|
|
|
DEBUGP("clean_from_lists(%p)\n", ct);
|
|
|
- ASSERT_WRITE_LOCK(&nf_conntrack_lock);
|
|
|
list_del(&ct->tuplehash[IP_CT_DIR_ORIGINAL].list);
|
|
|
list_del(&ct->tuplehash[IP_CT_DIR_REPLY].list);
|
|
|
|
|
@@ -371,7 +365,6 @@ __nf_conntrack_find(const struct nf_conntrack_tuple *tuple,
|
|
|
struct nf_conntrack_tuple_hash *h;
|
|
|
unsigned int hash = hash_conntrack(tuple);
|
|
|
|
|
|
- ASSERT_READ_LOCK(&nf_conntrack_lock);
|
|
|
list_for_each_entry(h, &nf_conntrack_hash[hash], list) {
|
|
|
if (nf_ct_tuplehash_to_ctrack(h) != ignored_conntrack &&
|
|
|
nf_ct_tuple_equal(tuple, &h->tuple)) {
|