Module Name:    src
Committed By:   ozaki-r
Date:           Fri May 19 04:34:09 UTC 2017

Modified Files:
        src/sys/netipsec: ipsec.c ipsec.h ipsec_input.c ipsec_mbuf.c
            ipsec_output.c

Log Message:
Introduce IPSECLOG and replace ipseclog and DPRINTF with it


To generate a diff of this commit:
cvs rdiff -u -r1.91 -r1.92 src/sys/netipsec/ipsec.c
cvs rdiff -u -r1.47 -r1.48 src/sys/netipsec/ipsec.h \
    src/sys/netipsec/ipsec_output.c
cvs rdiff -u -r1.42 -r1.43 src/sys/netipsec/ipsec_input.c
cvs rdiff -u -r1.15 -r1.16 src/sys/netipsec/ipsec_mbuf.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netipsec/ipsec.c
diff -u src/sys/netipsec/ipsec.c:1.91 src/sys/netipsec/ipsec.c:1.92
--- src/sys/netipsec/ipsec.c:1.91	Tue May 16 07:25:57 2017
+++ src/sys/netipsec/ipsec.c	Fri May 19 04:34:09 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec.c,v 1.91 2017/05/16 07:25:57 ozaki-r Exp $	*/
+/*	$NetBSD: ipsec.c,v 1.92 2017/05/19 04:34:09 ozaki-r Exp $	*/
 /*	$FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $	*/
 /*	$KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $	*/
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.91 2017/05/16 07:25:57 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.92 2017/05/19 04:34:09 ozaki-r Exp $");
 
 /*
  * IPsec controller part.
@@ -389,8 +389,8 @@ key_allocsp_default(int af, const char *
 
 	if (sp->policy != IPSEC_POLICY_DISCARD &&
 		sp->policy != IPSEC_POLICY_NONE) {
-		ipseclog((LOG_INFO, "fixed system default policy: %d->%d\n",
-		    sp->policy, IPSEC_POLICY_NONE));
+		IPSECLOG(LOG_INFO, "fixed system default policy: %d->%d\n",
+		    sp->policy, IPSEC_POLICY_NONE);
 		sp->policy = IPSEC_POLICY_NONE;
 	}
 	sp->refcnt++;
@@ -525,8 +525,8 @@ ipsec_getpolicybysock(struct mbuf *m, u_
 			break;
 
 		default:
-			ipseclog((LOG_ERR, "%s: Invalid policy for PCB %d\n",
-			    __func__, currsp->policy));
+			IPSECLOG(LOG_ERR, "Invalid policy for PCB %d\n",
+			    currsp->policy);
 			*error = EINVAL;
 			return NULL;
 		}
@@ -535,9 +535,9 @@ ipsec_getpolicybysock(struct mbuf *m, u_
 		if (sp == NULL) {		/* no SP found */
 			switch (currsp->policy) {
 			case IPSEC_POLICY_BYPASS:
-				ipseclog((LOG_ERR, "%s: Illegal policy for "
-				    "non-priviliged defined %d\n", __func__,
-				    currsp->policy));
+				IPSECLOG(LOG_ERR, "Illegal policy for "
+				    "non-priviliged defined %d\n",
+				    currsp->policy);
 				*error = EINVAL;
 				return NULL;
 
@@ -551,8 +551,8 @@ ipsec_getpolicybysock(struct mbuf *m, u_
 				break;
 
 			default:
-				ipseclog((LOG_ERR, "%s: Invalid policy for "
-				    "PCB %d\n", __func__, currsp->policy));
+				IPSECLOG(LOG_ERR, "Invalid policy for "
+				    "PCB %d\n", currsp->policy);
 				*error = EINVAL;
 				return NULL;
 			}
@@ -592,8 +592,7 @@ ipsec_getpolicybyaddr(struct mbuf *m, u_
 	/* Make an index to look for a policy. */
 	*error = ipsec_setspidx(m, &spidx, (flag & IP_FORWARDING) ? 0 : 1);
 	if (*error != 0) {
-		DPRINTF(("%s: setpidx failed, dir %u flag %u\n", __func__,
-		    dir, flag));
+		IPSECLOG(LOG_DEBUG, "setpidx failed, dir %u flag %u\n", dir, flag);
 		memset(&spidx, 0, sizeof (spidx));
 		return NULL;
 	}
@@ -652,7 +651,7 @@ ipsec4_checkpolicy(struct mbuf *m, u_int
 	if (*error != 0) {
 		KEY_FREESP(&sp);
 		sp = NULL;
-		DPRINTF(("%s: done, error %d\n", __func__, *error));
+		IPSECLOG(LOG_DEBUG, "done, error %d\n", *error);
 	}
 	return sp;
 }
@@ -898,7 +897,7 @@ ipsec6_checkpolicy(struct mbuf *m, u_int
 	if (*error != 0) {
 		KEY_FREESP(&sp);
 		sp = NULL;
-		DPRINTF(("%s: done, error %d\n", __func__, *error));
+		IPSECLOG(LOG_DEBUG, "done, error %d\n", *error);
 	}
 	return sp;
 }
@@ -1279,7 +1278,7 @@ ipsec_init_policy(struct socket *so, str
 
 	new = kmem_intr_zalloc(sizeof(*new), KM_NOSLEEP);
 	if (new == NULL) {
-		ipseclog((LOG_DEBUG, "%s: No more memory.\n", __func__));
+		IPSECLOG(LOG_DEBUG, "No more memory.\n");
 		return ENOBUFS;
 	}
 
@@ -1458,7 +1457,7 @@ ipsec_get_policy(struct secpolicy *polic
 
 	*mp = key_sp2msg(policy);
 	if (!*mp) {
-		ipseclog((LOG_DEBUG, "%s: No more memory.\n", __func__));
+		IPSECLOG(LOG_DEBUG, "No more memory.\n");
 		return ENOBUFS;
 	}
 
@@ -1498,8 +1497,8 @@ ipsec4_set_policy(struct inpcb *inp, int
 		policy = &inp->inp_sp->sp_out;
 		break;
 	default:
-		ipseclog((LOG_ERR, "%s: invalid direction=%u\n", __func__,
-		    xpl->sadb_x_policy_dir));
+		IPSECLOG(LOG_ERR, "invalid direction=%u\n",
+		    xpl->sadb_x_policy_dir);
 		return EINVAL;
 	}
 
@@ -1530,8 +1529,8 @@ ipsec4_get_policy(struct inpcb *inp, con
 		policy = inp->inp_sp->sp_out;
 		break;
 	default:
-		ipseclog((LOG_ERR, "%s: invalid direction=%u\n", __func__,
-		    xpl->sadb_x_policy_dir));
+		IPSECLOG(LOG_ERR, "invalid direction=%u\n",
+		    xpl->sadb_x_policy_dir);
 		return EINVAL;
 	}
 
@@ -1588,8 +1587,8 @@ ipsec6_set_policy(struct in6pcb *in6p, i
 		policy = &in6p->in6p_sp->sp_out;
 		break;
 	default:
-		ipseclog((LOG_ERR, "%s: invalid direction=%u\n", __func__,
-		    xpl->sadb_x_policy_dir));
+		IPSECLOG(LOG_ERR, "invalid direction=%u\n",
+		    xpl->sadb_x_policy_dir);
 		return EINVAL;
 	}
 
@@ -1620,8 +1619,8 @@ ipsec6_get_policy(struct in6pcb *in6p, c
 		policy = in6p->in6p_sp->sp_out;
 		break;
 	default:
-		ipseclog((LOG_ERR, "%s: invalid direction=%u\n", __func__,
-		    xpl->sadb_x_policy_dir));
+		IPSECLOG(LOG_ERR, "invalid direction=%u\n",
+		    xpl->sadb_x_policy_dir);
 		return EINVAL;
 	}
 
@@ -1953,10 +1952,10 @@ ipsec_hdrsiz(const struct secpolicy *sp)
 				break;
 #endif
 			default:
-				ipseclog((LOG_ERR, "%s: unknown AF %d in "
-				    "IPsec tunnel SA\n", __func__,
+				IPSECLOG(LOG_ERR, "unknown AF %d in "
+				    "IPsec tunnel SA\n",
 				    ((const struct sockaddr *)&isr->saidx.dst)
-				    ->sa_family));
+				    ->sa_family);
 				break;
 			}
 		}
@@ -2185,8 +2184,8 @@ ok:
 		if ((sav->flags & SADB_X_EXT_CYCSEQ) == 0)
 			return 1;
 
-		ipseclog((LOG_WARNING, "replay counter made %d cycle. %s\n",
-		    replay->overflow, ipsec_logsastr(sav, buf, sizeof(buf))));
+		IPSECLOG(LOG_WARNING, "replay counter made %d cycle. %s\n",
+		    replay->overflow, ipsec_logsastr(sav, buf, sizeof(buf)));
 	}
 
 	replay->count++;
@@ -2365,7 +2364,7 @@ ipsec6_input(struct mbuf *m)
 	} else {
 		/* XXX error stat??? */
 		error = EINVAL;
-		DPRINTF(("%s: no SP, packet discarded\n", __func__));/*XXX*/
+		IPSECLOG(LOG_DEBUG, "no SP, packet discarded\n");/*XXX*/
 	}
 	splx(s);
 
@@ -2403,7 +2402,7 @@ xform_init(struct secasvar *sav, int xft
 		if (xsp->xf_type == xftype)
 			return (*xsp->xf_init)(sav, xsp);
 
-	DPRINTF(("%s: no match for xform type %d\n", __func__, xftype));
+	IPSECLOG(LOG_DEBUG, "no match for xform type %d\n", xftype);
 	return EINVAL;
 }
 

Index: src/sys/netipsec/ipsec.h
diff -u src/sys/netipsec/ipsec.h:1.47 src/sys/netipsec/ipsec.h:1.48
--- src/sys/netipsec/ipsec.h:1.47	Thu May 11 05:55:14 2017
+++ src/sys/netipsec/ipsec.h	Fri May 19 04:34:09 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec.h,v 1.47 2017/05/11 05:55:14 ryo Exp $	*/
+/*	$NetBSD: ipsec.h,v 1.48 2017/05/19 04:34:09 ozaki-r Exp $	*/
 /*	$FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec.h,v 1.2.4.2 2004/02/14 22:23:23 bms Exp $	*/
 /*	$KAME: ipsec.h,v 1.53 2001/11/20 08:32:38 itojun Exp $	*/
 
@@ -242,10 +242,17 @@ extern int ip4_ipsec_ecn;
 extern int ip4_esp_randpad;
 extern int crypto_support;
 
+#include <sys/syslog.h>
 #define ipseclog(x)	do { if (ipsec_debug) log x; } while (0)
 /* for openbsd compatibility */
 #define	DPRINTF(x)	do { if (ipsec_debug) printf x; } while (0)
 
+#define IPSECLOG(level, fmt, args...) 					\
+	do {								\
+		if (ipsec_debug)					\
+			log(level, "%s: " fmt, __func__, ##args);	\
+	} while (0)
+
 void ipsec_pcbconn (struct inpcbpolicy *);
 void ipsec_pcbdisconn (struct inpcbpolicy *);
 void ipsec_invalpcbcacheall (void);
Index: src/sys/netipsec/ipsec_output.c
diff -u src/sys/netipsec/ipsec_output.c:1.47 src/sys/netipsec/ipsec_output.c:1.48
--- src/sys/netipsec/ipsec_output.c:1.47	Thu May 11 05:55:14 2017
+++ src/sys/netipsec/ipsec_output.c	Fri May 19 04:34:09 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_output.c,v 1.47 2017/05/11 05:55:14 ryo Exp $	*/
+/*	$NetBSD: ipsec_output.c,v 1.48 2017/05/19 04:34:09 ozaki-r Exp $	*/
 
 /*-
  * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
@@ -29,7 +29,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.47 2017/05/11 05:55:14 ryo Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.48 2017/05/19 04:34:09 ozaki-r Exp $");
 
 /*
  * IPsec output processing.
@@ -98,7 +98,7 @@ ipsec_register_done(struct mbuf *m, int 
 
 	mtag = m_tag_get(PACKET_TAG_IPSEC_OUT_DONE, 0, M_NOWAIT);
 	if (mtag == NULL) {
-		DPRINTF(("ipsec_register_done: could not get packet tag\n"));
+		IPSECLOG(LOG_DEBUG, "could not get packet tag\n");
 		*error = ENOMEM;
 		return -1;
 	}
@@ -178,10 +178,10 @@ ipsec_process_done(struct mbuf *m, struc
 		mo = m_makespace(m, sizeof(struct ip), hlen, &roff);
 		if (mo == NULL) {
 			char buf[IPSEC_ADDRSTRLEN];
-			DPRINTF(("ipsec_process_done : failed to inject"
-			    "%u byte UDP for SA %s/%08lx\n",
+			IPSECLOG(LOG_DEBUG,
+			    "failed to inject %u byte UDP for SA %s/%08lx\n",
 			    hlen, ipsec_address(&saidx->dst, buf, sizeof(buf)),
-			    (u_long) ntohl(sav->spi)));
+			    (u_long) ntohl(sav->spi));
 			error = ENOBUFS;
 			goto bad;
 		}
@@ -231,8 +231,8 @@ ipsec_process_done(struct mbuf *m, struc
 		break;
 #endif /* INET6 */
 	default:
-		DPRINTF(("ipsec_process_done: unknown protocol family %u\n",
-		    saidx->dst.sa.sa_family));
+		IPSECLOG(LOG_DEBUG, "unknown protocol family %u\n",
+		    saidx->dst.sa.sa_family);
 		error = ENXIO;
 		goto bad;
 	}
@@ -258,8 +258,8 @@ ipsec_process_done(struct mbuf *m, struc
 			return ipsec6_process_packet(m,isr->next);
 #endif /* INET6 */
 		default :
-			DPRINTF(("ipsec_process_done: unknown protocol family %u\n",
-			       saidx->dst.sa.sa_family));
+			IPSECLOG(LOG_DEBUG, "unknown protocol family %u\n",
+			    saidx->dst.sa.sa_family);
 			error = ENXIO;
 			goto bad;
 		}
@@ -417,8 +417,8 @@ again:
 	if ((isr->saidx.proto == IPPROTO_ESP && !esp_enable) ||
 	    (isr->saidx.proto == IPPROTO_AH && !ah_enable) ||
 	    (isr->saidx.proto == IPPROTO_IPCOMP && !ipcomp_enable)) {
-		DPRINTF(("ipsec_nextisr: IPsec outbound packet dropped due"
-			" to policy (check your sysctls)\n"));
+		IPSECLOG(LOG_DEBUG, "IPsec outbound packet dropped due"
+		    " to policy (check your sysctls)\n");
 		IPSEC_OSTAT(ESP_STAT_PDROPS, AH_STAT_PDROPS,
 		    IPCOMP_STAT_PDROPS);
 		*error = EHOSTUNREACH;
@@ -430,7 +430,7 @@ again:
 	 * before they invoke the xform output method.
 	 */
 	if (sav->tdb_xform == NULL) {
-		DPRINTF(("ipsec_nextisr: no transform for SA\n"));
+		IPSECLOG(LOG_DEBUG, "no transform for SA\n");
 		IPSEC_OSTAT(ESP_STAT_NOXFORM, AH_STAT_NOXFORM,
 		    IPCOMP_STAT_NOXFORM);
 		*error = EHOSTUNREACH;
@@ -531,8 +531,8 @@ ipsec4_process_packet(struct mbuf *m, st
 		error = ipip_output(m, isr, &mp, 0, 0);
 		if (mp == NULL && !error) {
 			/* Should never happen. */
-			DPRINTF(("ipsec4_process_packet: ipip_output "
-				"returns no mbuf and no error!"));
+			IPSECLOG(LOG_DEBUG,
+			    "ipip_output returns no mbuf and no error!");
 			error = EFAULT;
 		}
 		if (error) {
@@ -739,8 +739,8 @@ ipsec6_process_packet(
 		error = ipip_output(m, isr, &mp, 0, 0);
 		if (mp == NULL && !error) {
 			/* Should never happen. */
-			DPRINTF(("ipsec6_process_packet: ipip_output "
-				 "returns no mbuf and no error!"));
+			IPSECLOG(LOG_DEBUG,
+			    "ipip_output returns no mbuf and no error!");
 			error = EFAULT;
 		}
 

Index: src/sys/netipsec/ipsec_input.c
diff -u src/sys/netipsec/ipsec_input.c:1.42 src/sys/netipsec/ipsec_input.c:1.43
--- src/sys/netipsec/ipsec_input.c:1.42	Thu May 11 05:55:14 2017
+++ src/sys/netipsec/ipsec_input.c	Fri May 19 04:34:09 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_input.c,v 1.42 2017/05/11 05:55:14 ryo Exp $	*/
+/*	$NetBSD: ipsec_input.c,v 1.43 2017/05/19 04:34:09 ozaki-r Exp $	*/
 /*	$FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec_input.c,v 1.2.4.2 2003/03/28 20:32:53 sam Exp $	*/
 /*	$OpenBSD: ipsec_input.c,v 1.63 2003/02/20 18:35:43 deraadt Exp $	*/
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.42 2017/05/11 05:55:14 ryo Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.43 2017/05/19 04:34:09 ozaki-r Exp $");
 
 /*
  * IPsec input processing.
@@ -148,7 +148,7 @@ ipsec_common_input(struct mbuf *m, int s
 		m_freem(m);
 		IPSEC_ISTAT(sproto, ESP_STAT_HDROPS, AH_STAT_HDROPS,
 		    IPCOMP_STAT_HDROPS);
-		DPRINTF(("ipsec_common_input: packet too small\n"));
+		IPSECLOG(LOG_DEBUG, "packet too small\n");
 		return EINVAL;
 	}
 
@@ -199,8 +199,7 @@ ipsec_common_input(struct mbuf *m, int s
 		break;
 #endif /* INET6 */
 	default:
-		DPRINTF(("ipsec_common_input: unsupported protocol "
-			"family %u\n", af));
+		IPSECLOG(LOG_DEBUG, "unsupported protocol family %u\n", af);
 		m_freem(m);
 		IPSEC_ISTAT(sproto, ESP_STAT_NOPF, AH_STAT_NOPF,
 		    IPCOMP_STAT_NOPF);
@@ -212,10 +211,10 @@ ipsec_common_input(struct mbuf *m, int s
 	/* NB: only pass dst since key_allocsa follows RFC2401 */
 	sav = KEY_ALLOCSA(&dst_address, sproto, spi, sport, dport);
 	if (sav == NULL) {
-		DPRINTF(("ipsec_common_input: no key association found for"
-			  " SA %s/%08lx/%u/%u\n",
-			  ipsec_address(&dst_address, buf, sizeof(buf)),
-			  (u_long) ntohl(spi), sproto, ntohs(dport)));
+		IPSECLOG(LOG_DEBUG,
+		    "no key association found for SA %s/%08lx/%u/%u\n",
+		    ipsec_address(&dst_address, buf, sizeof(buf)),
+		    (u_long) ntohl(spi), sproto, ntohs(dport));
 		IPSEC_ISTAT(sproto, ESP_STAT_NOTDB, AH_STAT_NOTDB,
 		    IPCOMP_STAT_NOTDB);
 		splx(s);
@@ -224,10 +223,10 @@ ipsec_common_input(struct mbuf *m, int s
 	}
 
 	if (sav->tdb_xform == NULL) {
-		DPRINTF(("ipsec_common_input: attempted to use uninitialized"
-			 " SA %s/%08lx/%u\n",
-			 ipsec_address(&dst_address, buf, sizeof(buf)),
-			 (u_long) ntohl(spi), sproto));
+		IPSECLOG(LOG_DEBUG,
+		    "attempted to use uninitialized SA %s/%08lx/%u\n",
+		    ipsec_address(&dst_address, buf, sizeof(buf)),
+		    (u_long) ntohl(spi), sproto);
 		IPSEC_ISTAT(sproto, ESP_STAT_NOXFORM, AH_STAT_NOXFORM,
 		    IPCOMP_STAT_NOXFORM);
 		KEY_FREESAV(&sav);
@@ -297,7 +296,7 @@ ipsec4_common_input_cb(struct mbuf *m, s
 
 	/* Sanity check */
 	if (m == NULL) {
-		DPRINTF(("ipsec4_common_input_cb: null mbuf"));
+		IPSECLOG(LOG_DEBUG, "null mbuf");
 		IPSEC_ISTAT(sproto, ESP_STAT_BADKCR, AH_STAT_BADKCR,
 		    IPCOMP_STAT_BADKCR);
 		KEY_FREESAV(&sav);
@@ -307,10 +306,9 @@ ipsec4_common_input_cb(struct mbuf *m, s
 	/* Fix IPv4 header */
 	if (m->m_len < skip && (m = m_pullup(m, skip)) == NULL) {
 		char buf[IPSEC_ADDRSTRLEN];
-		DPRINTF(("ipsec4_common_input_cb: processing failed "
-		    "for SA %s/%08lx\n",
+		IPSECLOG(LOG_DEBUG, "processing failed for SA %s/%08lx\n",
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		IPSEC_ISTAT(sproto, ESP_STAT_HDROPS, AH_STAT_HDROPS,
 		    IPCOMP_STAT_HDROPS);
 		error = ENOBUFS;
@@ -343,13 +341,13 @@ ipsec4_common_input_cb(struct mbuf *m, s
 			saidx->proxy.sa.sa_family != 0)) {
 
 			char ipbuf[INET_ADDRSTRLEN];
-			DPRINTF(("ipsec4_common_input_cb: inner "
-			    "source address %s doesn't correspond to "
+			IPSECLOG(LOG_DEBUG,
+			    "inner source address %s doesn't correspond to "
 			    "expected proxy source %s, SA %s/%08lx\n",
 			    IN_PRINT(ipbuf, ipn.ip_src),
 			    ipsp_address(saidx->proxy),
 			    ipsp_address(saidx->dst),
-			    (u_long) ntohl(sav->spi)));
+			    (u_long) ntohl(sav->spi));
 
 			IPSEC_ISTAT(sproto, ESP_STAT_PDROPS,
 			    AH_STAT_PDROPS,
@@ -381,13 +379,13 @@ ipsec4_common_input_cb(struct mbuf *m, s
 
 			char ip6buf[INET6_ADDRSTRLEN];
 			char pbuf[IPSEC_ADDRSTRLEN], dbuf[IPSEC_ADDRSTRLEN];
-			DPRINTF(("ipsec4_common_input_cb: inner "
-			    "source address %s doesn't correspond to "
+			IPSECLOG(LOG_DEBUG,
+			    "inner source address %s doesn't correspond to "
 			    "expected proxy source %s, SA %s/%08lx\n",
 			    ip6_sprintf(ip6buf, &ip6n.ip6_src),
 			    ipsec_address(&saidx->proxy, pbuf, sizeof(pbuf)),
 			    ipsec_address(&saidx->dst, dbuf, sizeof(dbuf)),
-			    (u_long) ntohl(sav->spi)));
+			    (u_long) ntohl(sav->spi));
 
 			IPSEC_ISTAT(sproto, ESP_STAT_PDROPS,
 			    AH_STAT_PDROPS,
@@ -411,7 +409,7 @@ ipsec4_common_input_cb(struct mbuf *m, s
 		mtag = m_tag_get(PACKET_TAG_IPSEC_IN_DONE,
 		    sizeof(struct tdb_ident), M_NOWAIT);
 		if (mtag == NULL) {
-			DPRINTF(("ipsec4_common_input_cb: failed to get tag\n"));
+			IPSECLOG(LOG_DEBUG, "failed to get tag\n");
 			IPSEC_ISTAT(sproto, ESP_STAT_HDROPS,
 			    AH_STAT_HDROPS, IPCOMP_STAT_HDROPS);
 			error = ENOMEM;
@@ -455,7 +453,7 @@ ipsec6_common_input(struct mbuf **mp, in
 	struct ip6_ext ip6e;
 
 	if (*offp < sizeof(struct ip6_hdr)) {
-		DPRINTF(("ipsec6_common_input: bad offset %u\n", *offp));
+		IPSECLOG(LOG_DEBUG, "bad offset %u\n", *offp);
 		IPSEC_ISTAT(proto, ESP_STAT_HDROPS, AH_STAT_HDROPS,
 			    IPCOMP_STAT_HDROPS);
 		m_freem(*mp);
@@ -482,8 +480,8 @@ ipsec6_common_input(struct mbuf **mp, in
 
 		/* Malformed packet check */
 		if (protoff + l != *offp) {
-			DPRINTF(("ipsec6_common_input: bad packet header chain, "
-				"protoff %u, l %u, off %u\n", protoff, l, *offp));
+			IPSECLOG(LOG_DEBUG, "bad packet header chain, "
+			    "protoff %u, l %u, off %u\n", protoff, l, *offp);
 			IPSEC_ISTAT(proto, ESP_STAT_HDROPS,
 				    AH_STAT_HDROPS,
 				    IPCOMP_STAT_HDROPS);
@@ -530,7 +528,7 @@ ipsec6_common_input_cb(struct mbuf *m, s
 
 	/* Sanity check */
 	if (m == NULL) {
-		DPRINTF(("ipsec6_common_input_cb: null mbuf"));
+		IPSECLOG(LOG_DEBUG, "null mbuf");
 		IPSEC_ISTAT(sproto, ESP_STAT_BADKCR, AH_STAT_BADKCR,
 		    IPCOMP_STAT_BADKCR);
 		error = EINVAL;
@@ -542,9 +540,9 @@ ipsec6_common_input_cb(struct mbuf *m, s
 	    (m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) {
 
 		char buf[IPSEC_ADDRSTRLEN];
-		DPRINTF(("ipsec6_common_input_cb: processing failed "
-		    "for SA %s/%08lx\n", ipsec_address(&sav->sah->saidx.dst,
-		    buf, sizeof(buf)), (u_long) ntohl(sav->spi)));
+		IPSECLOG(LOG_DEBUG, "processing failed for SA %s/%08lx\n",
+		    ipsec_address(&sav->sah->saidx.dst,
+		    buf, sizeof(buf)), (u_long) ntohl(sav->spi));
 
 		IPSEC_ISTAT(sproto, ESP_STAT_HDROPS, AH_STAT_HDROPS,
 		    IPCOMP_STAT_HDROPS);
@@ -579,13 +577,13 @@ ipsec6_common_input_cb(struct mbuf *m, s
 
 			char ipbuf[INET_ADDRSTRLEN];
 			char pbuf[IPSEC_ADDRSTRLEN], dbuf[IPSEC_ADDRSTRLEN];
-			DPRINTF(("ipsec6_common_input_cb: inner "
-			    "source address %s doesn't correspond to "
+			IPSECLOG(LOG_DEBUG,
+			    "inner source address %s doesn't correspond to "
 			    "expected proxy source %s, SA %s/%08lx\n",
 			    IN_PRINT(ipbuf, ipn.ip_src),
 			    ipsec_address(&saidx->proxy, pbuf, sizeof(pbuf)),
 			    ipsec_address(&saidx->dst, dbuf, sizeof(dbuf)),
-			    (u_long) ntohl(sav->spi)));
+			    (u_long) ntohl(sav->spi));
 
 			IPSEC_ISTAT(sproto, ESP_STAT_PDROPS,
 			    AH_STAT_PDROPS, IPCOMP_STAT_PDROPS);
@@ -617,13 +615,13 @@ ipsec6_common_input_cb(struct mbuf *m, s
 
 			char ip6buf[INET6_ADDRSTRLEN];
 			char pbuf[IPSEC_ADDRSTRLEN], dbuf[IPSEC_ADDRSTRLEN];
-			DPRINTF(("ipsec6_common_input_cb: inner "
-			    "source address %s doesn't correspond to "
+			IPSECLOG(LOG_DEBUG,
+			    "inner source address %s doesn't correspond to "
 			    "expected proxy source %s, SA %s/%08lx\n",
 			    ip6_sprintf(ip6buf, &ip6n.ip6_src),
 			    ipsec_address(&saidx->proxy, pbuf, sizeof(pbuf)),
 			    ipsec_address(&saidx->dst, dbuf, sizeof(dbuf)),
-			    (u_long) ntohl(sav->spi)));
+			    (u_long) ntohl(sav->spi));
 
 			IPSEC_ISTAT(sproto, ESP_STAT_PDROPS,
 			    AH_STAT_PDROPS, IPCOMP_STAT_PDROPS);
@@ -645,8 +643,7 @@ ipsec6_common_input_cb(struct mbuf *m, s
 		mtag = m_tag_get(PACKET_TAG_IPSEC_IN_DONE,
 		    sizeof(struct tdb_ident), M_NOWAIT);
 		if (mtag == NULL) {
-			DPRINTF(("ipsec_common_input_cb: failed to "
-			    "get tag\n"));
+			IPSECLOG(LOG_DEBUG, "failed to get tag\n");
 			IPSEC_ISTAT(sproto, ESP_STAT_HDROPS,
 			    AH_STAT_HDROPS, IPCOMP_STAT_HDROPS);
 			error = ENOMEM;

Index: src/sys/netipsec/ipsec_mbuf.c
diff -u src/sys/netipsec/ipsec_mbuf.c:1.15 src/sys/netipsec/ipsec_mbuf.c:1.16
--- src/sys/netipsec/ipsec_mbuf.c:1.15	Wed Apr 19 03:39:14 2017
+++ src/sys/netipsec/ipsec_mbuf.c	Fri May 19 04:34:09 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_mbuf.c,v 1.15 2017/04/19 03:39:14 ozaki-r Exp $	*/
+/*	$NetBSD: ipsec_mbuf.c,v 1.16 2017/05/19 04:34:09 ozaki-r Exp $	*/
 /*-
  * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
  * All rights reserved.
@@ -28,7 +28,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec_mbuf.c,v 1.15 2017/04/19 03:39:14 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec_mbuf.c,v 1.16 2017/05/19 04:34:09 ozaki-r Exp $");
 
 /*
  * IPsec-specific mbuf routines.
@@ -321,7 +321,7 @@ m_pad(struct mbuf *m, int n)
 	void *retval;
 
 	if (n <= 0) {  /* No stupid arguments. */
-		DPRINTF(("m_pad: pad length invalid (%d)\n", n));
+		IPSECLOG(LOG_DEBUG, "pad length invalid (%d)\n", n);
 		m_freem(m);
 		return NULL;
 	}
@@ -338,8 +338,9 @@ m_pad(struct mbuf *m, int n)
 	}
 
 	if (m0->m_len != len) {
-		DPRINTF(("m_pad: length mismatch (should be %d instead of %d)\n",
-		    m->m_pkthdr.len, m->m_pkthdr.len + m0->m_len - len));
+		IPSECLOG(LOG_DEBUG,
+		    "length mismatch (should be %d instead of %d)\n",
+		    m->m_pkthdr.len, m->m_pkthdr.len + m0->m_len - len);
 
 		m_freem(m);
 		return NULL;
@@ -348,10 +349,10 @@ m_pad(struct mbuf *m, int n)
 	/* Check for zero-length trailing mbufs, and find the last one. */
 	for (m1 = m0; m1->m_next; m1 = m1->m_next) {
 		if (m1->m_next->m_len != 0) {
-			DPRINTF(("m_pad: length mismatch (should be %d "
-			    "instead of %d)\n",
+			IPSECLOG(LOG_DEBUG,
+			    "length mismatch (should be %d instead of %d)\n",
 			    m->m_pkthdr.len,
-			    m->m_pkthdr.len + m1->m_next->m_len));
+			    m->m_pkthdr.len + m1->m_next->m_len);
 
 			m_freem(m);
 			return NULL;
@@ -365,7 +366,7 @@ m_pad(struct mbuf *m, int n)
 		MGET(m1, M_DONTWAIT, MT_DATA);
 		if (m1 == 0) {
 			m_freem(m0);
-			DPRINTF(("m_pad: unable to get extra mbuf\n"));
+			IPSECLOG(LOG_DEBUG, "unable to get extra mbuf\n");
 			return NULL;
 		}
 

Reply via email to