Module Name:    src
Committed By:   maxv
Date:           Sat Apr 28 15:45:16 UTC 2018

Modified Files:
        src/sys/netipsec: ipsec.c ipsec_input.c ipsec_output.c ipsec_private.h
            key.c xform_ah.c xform_esp.c xform_ipcomp.c xform_ipip.c

Log Message:
Remove IPSEC_SPLASSERT_SOFTNET, it has always been a no-op.


To generate a diff of this commit:
cvs rdiff -u -r1.159 -r1.160 src/sys/netipsec/ipsec.c
cvs rdiff -u -r1.66 -r1.67 src/sys/netipsec/ipsec_input.c
cvs rdiff -u -r1.73 -r1.74 src/sys/netipsec/ipsec_output.c
cvs rdiff -u -r1.8 -r1.9 src/sys/netipsec/ipsec_private.h
cvs rdiff -u -r1.254 -r1.255 src/sys/netipsec/key.c
cvs rdiff -u -r1.94 -r1.95 src/sys/netipsec/xform_ah.c
cvs rdiff -u -r1.81 -r1.82 src/sys/netipsec/xform_esp.c
cvs rdiff -u -r1.62 -r1.63 src/sys/netipsec/xform_ipcomp.c
cvs rdiff -u -r1.68 -r1.69 src/sys/netipsec/xform_ipip.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netipsec/ipsec.c
diff -u src/sys/netipsec/ipsec.c:1.159 src/sys/netipsec/ipsec.c:1.160
--- src/sys/netipsec/ipsec.c:1.159	Sat Apr 28 14:21:03 2018
+++ src/sys/netipsec/ipsec.c	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: ipsec.c,v 1.159 2018/04/28 14:21:03 maxv Exp $ */
+/* $NetBSD: ipsec.c,v 1.160 2018/04/28 15:45:16 maxv Exp $ */
 /* $FreeBSD: ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $ */
 /* $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.159 2018/04/28 14:21:03 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.160 2018/04/28 15:45:16 maxv Exp $");
 
 /*
  * IPsec controller part.
@@ -1610,8 +1610,6 @@ ipsec_chkreplay(u_int32_t seq, const str
 	u_int32_t wsizeb;	/* constant: bits of window size */
 	int frlast;		/* constant: last frame */
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
-
 	KASSERT(sav != NULL);
 	KASSERT(sav->replay != NULL);
 
@@ -1668,8 +1666,6 @@ ipsec_updatereplay(u_int32_t seq, const 
 	u_int32_t wsizeb;	/* constant: bits of window size */
 	int frlast;		/* constant: last frame */
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
-
 	KASSERT(sav != NULL);
 	KASSERT(sav->replay != NULL);
 

Index: src/sys/netipsec/ipsec_input.c
diff -u src/sys/netipsec/ipsec_input.c:1.66 src/sys/netipsec/ipsec_input.c:1.67
--- src/sys/netipsec/ipsec_input.c:1.66	Thu Apr 19 08:27:38 2018
+++ src/sys/netipsec/ipsec_input.c	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_input.c,v 1.66 2018/04/19 08:27:38 maxv Exp $	*/
+/*	$NetBSD: ipsec_input.c,v 1.67 2018/04/28 15:45:16 maxv Exp $	*/
 /*	$FreeBSD: ipsec_input.c,v 1.2.4.2 2003/03/28 20:32:53 sam Exp $	*/
 /*	$OpenBSD: ipsec_input.c,v 1.63 2003/02/20 18:35:43 deraadt Exp $	*/
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.66 2018/04/19 08:27:38 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.67 2018/04/28 15:45:16 maxv Exp $");
 
 /*
  * IPsec input processing.
@@ -326,8 +326,6 @@ ipsec4_common_input_cb(struct mbuf *m, s
 	struct secasindex *saidx;
 	int error;
 
-	IPSEC_SPLASSERT_SOFTNET("ipsec4_common_input_cb");
-
 	if (__predict_false(m == NULL)) {
 		panic("%s: NULL mbuf", __func__);
 	}

Index: src/sys/netipsec/ipsec_output.c
diff -u src/sys/netipsec/ipsec_output.c:1.73 src/sys/netipsec/ipsec_output.c:1.74
--- src/sys/netipsec/ipsec_output.c:1.73	Thu Apr 19 08:27:38 2018
+++ src/sys/netipsec/ipsec_output.c	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_output.c,v 1.73 2018/04/19 08:27:38 maxv Exp $	*/
+/*	$NetBSD: ipsec_output.c,v 1.74 2018/04/28 15:45:16 maxv Exp $	*/
 
 /*
  * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
@@ -29,7 +29,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.73 2018/04/19 08:27:38 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.74 2018/04/28 15:45:16 maxv Exp $");
 
 #if defined(_KERNEL_OPT)
 #include "opt_inet.h"
@@ -154,8 +154,6 @@ ipsec_process_done(struct mbuf *m, const
 	uint64_t *data = NULL;
 	int hlen, roff;
 
-	IPSEC_SPLASSERT_SOFTNET("ipsec_process_done");
-
 	KASSERT(m != NULL);
 	KASSERT(isr != NULL);
 	KASSERT(sav != NULL);
@@ -376,7 +374,6 @@ do {									\
 	struct secasvar *sav = NULL;
 	struct secasindex saidx;
 
-	IPSEC_SPLASSERT_SOFTNET("ipsec_nextisr");
 	KASSERTMSG(af == AF_INET || af == AF_INET6,
 	    "invalid address family %u", af);
 again:

Index: src/sys/netipsec/ipsec_private.h
diff -u src/sys/netipsec/ipsec_private.h:1.8 src/sys/netipsec/ipsec_private.h:1.9
--- src/sys/netipsec/ipsec_private.h:1.8	Sat Apr 28 14:39:34 2018
+++ src/sys/netipsec/ipsec_private.h	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_private.h,v 1.8 2018/04/28 14:39:34 maxv Exp $	*/
+/*	$NetBSD: ipsec_private.h,v 1.9 2018/04/28 15:45:16 maxv Exp $	*/
 
 /*
  * Copyright (c) 2008 The NetBSD Foundation, Inc.
@@ -64,11 +64,6 @@ extern percpu_t *pfkeystat_percpu;
 #define	PFKEY_STATINC(x)	_NET_STATINC(pfkeystat_percpu, x)
 #define	PFKEY_STATADD(x, v)	_NET_STATADD(pfkeystat_percpu, x, v)
 
-/*
- * Remainings of ipsec_osdep.h
- */
-#define IPSEC_SPLASSERT_SOFTNET(msg)	do {} while (0)
-
 /* superuser opened socket? */
 #define IPSEC_PRIVILEGED_SO(so) ((so)->so_uidinfo->ui_uid == 0)
 

Index: src/sys/netipsec/key.c
diff -u src/sys/netipsec/key.c:1.254 src/sys/netipsec/key.c:1.255
--- src/sys/netipsec/key.c:1.254	Thu Apr 19 08:27:38 2018
+++ src/sys/netipsec/key.c	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: key.c,v 1.254 2018/04/19 08:27:38 maxv Exp $	*/
+/*	$NetBSD: key.c,v 1.255 2018/04/28 15:45:16 maxv Exp $	*/
 /*	$FreeBSD: key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $	*/
 /*	$KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $	*/
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.254 2018/04/19 08:27:38 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.255 2018/04/28 15:45:16 maxv Exp $");
 
 /*
  * This code is referred to RFC 2367
@@ -1078,7 +1078,6 @@ key_checkrequest(const struct ipsecreque
 	 * temporarily null out below.  Need to rethink how we
 	 * handle bundled SA's in the callback thread.
 	 */
-	IPSEC_SPLASSERT_SOFTNET("key_checkrequest");
 
 	sav = key_lookup_sa_bysaidx(saidx);
 	if (sav != NULL) {

Index: src/sys/netipsec/xform_ah.c
diff -u src/sys/netipsec/xform_ah.c:1.94 src/sys/netipsec/xform_ah.c:1.95
--- src/sys/netipsec/xform_ah.c:1.94	Tue Apr 24 08:07:06 2018
+++ src/sys/netipsec/xform_ah.c	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ah.c,v 1.94 2018/04/24 08:07:06 maxv Exp $	*/
+/*	$NetBSD: xform_ah.c,v 1.95 2018/04/28 15:45:16 maxv Exp $	*/
 /*	$FreeBSD: xform_ah.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$OpenBSD: ip_ah.c,v 1.63 2001/06/26 06:18:58 angelos Exp $ */
 /*
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.94 2018/04/24 08:07:06 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.95 2018/04/28 15:45:16 maxv Exp $");
 
 #if defined(_KERNEL_OPT)
 #include "opt_inet.h"
@@ -522,8 +522,6 @@ ah_input(struct mbuf *m, struct secasvar
 	bool pool_used;
 	uint8_t nxt;
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
-
 	KASSERT(sav != NULL);
 	KASSERT(sav->key_auth != NULL);
 	KASSERT(sav->tdb_authalgxform != NULL);
@@ -902,8 +900,6 @@ ah_output(struct mbuf *m, const struct i
 	size_t ipoffs;
 	bool pool_used;
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
-
 	KASSERT(sav != NULL);
 	KASSERT(sav->tdb_authalgxform != NULL);
 	ahx = sav->tdb_authalgxform;

Index: src/sys/netipsec/xform_esp.c
diff -u src/sys/netipsec/xform_esp.c:1.81 src/sys/netipsec/xform_esp.c:1.82
--- src/sys/netipsec/xform_esp.c:1.81	Thu Apr 19 08:27:39 2018
+++ src/sys/netipsec/xform_esp.c	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_esp.c,v 1.81 2018/04/19 08:27:39 maxv Exp $	*/
+/*	$NetBSD: xform_esp.c,v 1.82 2018/04/28 15:45:16 maxv Exp $	*/
 /*	$FreeBSD: xform_esp.c,v 1.2.2.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$OpenBSD: ip_esp.c,v 1.69 2001/06/26 06:18:59 angelos Exp $ */
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.81 2018/04/19 08:27:39 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.82 2018/04/28 15:45:16 maxv Exp $");
 
 #if defined(_KERNEL_OPT)
 #include "opt_inet.h"
@@ -303,8 +303,6 @@ esp_input(struct mbuf *m, struct secasva
 	struct cryptodesc *crde;
 	struct cryptop *crp;
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
-
 	KASSERT(sav != NULL);
 	KASSERT(sav->tdb_encalgxform != NULL);
 	KASSERTMSG((skip&3) == 0 && (m->m_pkthdr.len&3) == 0,
@@ -706,8 +704,6 @@ esp_output(struct mbuf *m, const struct 
 	struct cryptodesc *crde = NULL, *crda = NULL;
 	struct cryptop *crp;
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
-
 	esph = sav->tdb_authalgxform;
 	KASSERT(sav->tdb_encalgxform != NULL);
 	espx = sav->tdb_encalgxform;

Index: src/sys/netipsec/xform_ipcomp.c
diff -u src/sys/netipsec/xform_ipcomp.c:1.62 src/sys/netipsec/xform_ipcomp.c:1.63
--- src/sys/netipsec/xform_ipcomp.c:1.62	Thu Apr 19 08:27:39 2018
+++ src/sys/netipsec/xform_ipcomp.c	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ipcomp.c,v 1.62 2018/04/19 08:27:39 maxv Exp $	*/
+/*	$NetBSD: xform_ipcomp.c,v 1.63 2018/04/28 15:45:16 maxv Exp $	*/
 /*	$FreeBSD: xform_ipcomp.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $	*/
 /* $OpenBSD: ip_ipcomp.c,v 1.1 2001/07/05 12:08:52 jjbg Exp $ */
 
@@ -30,7 +30,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.62 2018/04/19 08:27:39 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.63 2018/04/28 15:45:16 maxv Exp $");
 
 /* IP payload compression protocol (IPComp), see RFC 2393 */
 #if defined(_KERNEL_OPT)
@@ -146,7 +146,6 @@ ipcomp_input(struct mbuf *m, struct seca
 	struct cryptop *crp;
 	int error, hlen = IPCOMP_HLENGTH, stat = IPCOMP_STAT_CRYPTO;
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
 	KASSERT(skip + hlen <= m->m_pkthdr.len);
 
 	/* Get crypto descriptors */
@@ -382,7 +381,6 @@ ipcomp_output(struct mbuf *m, const stru
 	struct cryptop *crp;
 	struct tdb_crypto *tc;
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
 	KASSERT(sav != NULL);
 	KASSERT(sav->tdb_compalgxform != NULL);
 	ipcompx = sav->tdb_compalgxform;

Index: src/sys/netipsec/xform_ipip.c
diff -u src/sys/netipsec/xform_ipip.c:1.68 src/sys/netipsec/xform_ipip.c:1.69
--- src/sys/netipsec/xform_ipip.c:1.68	Tue Apr 24 08:07:06 2018
+++ src/sys/netipsec/xform_ipip.c	Sat Apr 28 15:45:16 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ipip.c,v 1.68 2018/04/24 08:07:06 maxv Exp $	*/
+/*	$NetBSD: xform_ipip.c,v 1.69 2018/04/28 15:45:16 maxv Exp $	*/
 /*	$FreeBSD: xform_ipip.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$OpenBSD: ip_ipip.c,v 1.25 2002/06/10 18:04:55 itojun Exp $ */
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.68 2018/04/24 08:07:06 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.69 2018/04/28 15:45:16 maxv Exp $");
 
 /*
  * IP-inside-IP processing
@@ -333,7 +333,6 @@ ipip_output(struct mbuf *m, const struct
 	struct ip6_hdr *ip6, *ip6o;
 #endif
 
-	IPSEC_SPLASSERT_SOFTNET(__func__);
 	KASSERT(sav != NULL);
 
 	/* XXX Deal with empty TDB source/destination addresses. */

Reply via email to