Revert "clat - turn off spurious log messages caused by IPv6 packets"

This reverts commit 4e1601e533b4b34d38e4eed229180257a385181b.

This would reintroduce log lines of the form:
  W clatd   : read_packet: unknown packet type = 0x86dd

if not for the fact that with the movement of the creation of the tun
device to netd, it now has sufficient privileges to simply turn off IPv6
on the device, and thus we no longer require this temporary hack.

Test: we *continue* to not get clatd complaints about unknown packets
Bug: 129305844
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Iafafe27495d1e674afd0185bea6efc305a9e65ce
diff --git a/clatd.c b/clatd.c
index d332e1e..019ce7c 100644
--- a/clatd.c
+++ b/clatd.c
@@ -417,11 +417,6 @@
   }
 
   uint16_t proto = ntohs(tun_header->proto);
-  if (proto == ETH_P_IPV6) {
-    // kernel IPv6 stack spams us with router/neighbour solication,
-    // multicast group joins, etc. which otherwise fills the log...
-    return;
-  }
   if (proto != ETH_P_IP) {
     logmsg(ANDROID_LOG_WARN, "%s: unknown packet type = 0x%x", __func__, proto);
     return;