diff options
author | Sam Leffler <sam@FreeBSD.org> | 2003-09-29 22:57:43 +0000 |
---|---|---|
committer | Sam Leffler <sam@FreeBSD.org> | 2003-09-29 22:57:43 +0000 |
commit | 9ffa96777e7ffbd3565a956780e930023e71cadb (patch) | |
tree | 8a7531562577bbc1732a8f3b1aa8301245449cab /sys/netipsec/keysock.c | |
parent | 1a920b1142064fb0b9dc7974f9e90748f5f8925d (diff) | |
download | src-9ffa96777e7ffbd3565a956780e930023e71cadb.tar.gz src-9ffa96777e7ffbd3565a956780e930023e71cadb.zip |
MFp4: portability work, general cleanup, locking fixes
change 38496
o add ipsec_osdep.h that holds os-specific definitions for portability
o s/KASSERT/IPSEC_ASSERT/ for portability
o s/SPLASSERT/IPSEC_SPLASSERT/ for portability
o remove function names from ASSERT strings since line#+file pinpints
the location
o use __func__ uniformly to reduce string storage
o convert some random #ifdef DIAGNOSTIC code to assertions
o remove some debuggging assertions no longer needed
change 38498
o replace numerous bogus panic's with equally bogus assertions
that at least go away on a production system
change 38502 + 38530
o change explicit mtx operations to #defines to simplify
future changes to a different lock type
change 38531
o hookup ipv4 ctlinput paths to a noop routine; we should be
handling path mtu changes at least
o correct potential null pointer deref in ipsec4_common_input_cb
chnage 38685
o fix locking for bundled SA's and for when key exchange is required
change 38770
o eliminate recursion on the SAHTREE lock
change 38804
o cleanup some types: long -> time_t
o remove refrence to dead #define
change 38805
o correct some types: long -> time_t
o add scan generation # to secpolicy to deal with locking issues
change 38806
o use LIST_FOREACH_SAFE instead of handrolled code
o change key_flush_spd to drop the sptree lock before purging
an entry to avoid lock recursion and to avoid holding the lock
over a long-running operation
o misc cleanups of tangled and twisty code
There is still much to do here but for now things look to be
working again.
Supported by: FreeBSD Foundation
Notes
Notes:
svn path=/head/; revision=120585
Diffstat (limited to 'sys/netipsec/keysock.c')
-rw-r--r-- | sys/netipsec/keysock.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/sys/netipsec/keysock.c b/sys/netipsec/keysock.c index 4b587f437535..b78a3075d98d 100644 --- a/sys/netipsec/keysock.c +++ b/sys/netipsec/keysock.c @@ -94,7 +94,7 @@ key_output(m, va_alist) va_end(ap); if (m == 0) - panic("key_output: NULL pointer was passed.\n"); + panic("%s: NULL pointer was passed.\n", __func__); pfkeystat.out_total++; pfkeystat.out_bytes += m->m_pkthdr.len; @@ -195,10 +195,10 @@ key_sendup(so, msg, len, target) /* sanity check */ if (so == 0 || msg == 0) - panic("key_sendup: NULL pointer was passed.\n"); + panic("%s: NULL pointer was passed.\n", __func__); KEYDEBUG(KEYDEBUG_KEY_DUMP, - printf("key_sendup: \n"); + printf("%s: \n", __func__); kdebug_sadb(msg)); /* @@ -283,7 +283,7 @@ key_sendup_mbuf(so, m, target) if (m == NULL) panic("key_sendup_mbuf: NULL pointer was passed.\n"); if (so == NULL && target == KEY_SENDUP_ONE) - panic("key_sendup_mbuf: NULL pointer was passed.\n"); + panic("%s: NULL pointer was passed.\n", __func__); pfkeystat.in_total++; pfkeystat.in_bytes += m->m_pkthdr.len; |