return log_radv_errno(ra, SYNTHETIC_ERRNO(EBADMSG),
"Too small to be a router solicit, ignoring.");
- const struct nd_router_solicit *a = (const struct nd_router_solicit*) rs->packet->raw_packet;
- assert_se(a);
- assert_se(a->nd_rs_type == ND_ROUTER_SOLICIT);
- assert_se(a->nd_rs_code == 0);
+ _unused_ const struct nd_router_solicit *a = (const struct nd_router_solicit*) rs->packet->raw_packet;
+ assert(a);
+ assert(a->nd_rs_type == ND_ROUTER_SOLICIT);
+ assert(a->nd_rs_code == 0);
r = ndisc_parse_options(rs->packet, &rs->options);
if (r < 0)
sd_bus_error *error) {
_cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
- bool multiple_sessions, blocked, interactive, error_or_denial = false;
+ bool multiple_sessions, blocked, interactive;
+ _unused_ bool error_or_denial = false;
Inhibitor *offending = NULL;
uid_t uid;
int r;
* to catch. In any case, it also means that the payload guarded by
* these polkit calls should never be executed, and hence we should
* never reach this point. */
- assert_se(!error_or_denial);
+ assert(!error_or_denial);
return 0;
}
InhibitMode mm;
InhibitWhat w;
uid_t uid;
- bool error_or_denial = false;
+ _unused_ bool error_or_denial = false;
int r;
assert(message);
* to catch. In any case, it also means that the payload guarded by
* these polkit calls should never be executed, and hence we should
* never reach this point. */
- assert_se(!error_or_denial);
+ assert(!error_or_denial);
r = sd_bus_query_sender_creds(message, SD_BUS_CREDS_EUID|SD_BUS_CREDS_PID|SD_BUS_CREDS_PIDFD, &creds);
if (r < 0)
if (!info)
return log_oom_debug();
- void *end = mempcpy(mempcpy(stpcpy(info, label) + 1, context_u, context_u_size), context_v, context_v_size);
+ _unused_ void *end = mempcpy(mempcpy(stpcpy(info, label) + 1, context_u, context_u_size),
+ context_v, context_v_size);
/* assert we copied exactly the right amount that we allocated */
- assert_se(end > info && (uintptr_t) end - (uintptr_t) info == info_len);
+ assert(end > info && (uintptr_t) end - (uintptr_t) info == info_len);
_cleanup_free_ void *buf = NULL;
r = kdf_ss_derive(