File strongswan_modprobe_syslog.patch of Package strongswan.import4235

--- src/starter/klips.c
+++ src/starter/klips.c	2010/03/02 16:43:05
@@ -34,7 +34,7 @@ starter_klips_init(void)
 		/* ipsec module makes the pf_key proc interface visible */
 		if (stat(PROC_MODULES, &stb) == 0)
 		{
-			ignore_result(system("modprobe -qv ipsec"));
+			ignore_result(system("modprobe -s ipsec"));
 		}
 
 		/* now test again */
@@ -48,9 +48,9 @@ starter_klips_init(void)
 	}
 
 	/* load crypto algorithm modules */
-	ignore_result(system("modprobe -qv ipsec_aes"));
-	ignore_result(system("modprobe -qv ipsec_blowfish"));
-	ignore_result(system("modprobe -qv ipsec_sha2"));
+	ignore_result(system("modprobe -s ipsec_aes"));
+	ignore_result(system("modprobe -s ipsec_blowfish"));
+	ignore_result(system("modprobe -s ipsec_sha2"));
 
 	DBG(DBG_CONTROL,
 		DBG_log("Found KLIPS IPsec stack")
--- src/starter/netkey.c
+++ src/starter/netkey.c	2010/03/02 16:43:05
@@ -34,7 +34,7 @@ starter_netkey_init(void)
 		/* af_key module makes the netkey proc interface visible */
 		if (stat(PROC_MODULES, &stb) == 0)
 		{
-			ignore_result(system("modprobe -qv af_key"));
+			ignore_result(system("modprobe -s af_key"));
 		}
 
 		/* now test again */
@@ -50,11 +50,11 @@ starter_netkey_init(void)
 	/* make sure that all required IPsec modules are loaded */
 	if (stat(PROC_MODULES, &stb) == 0)
 	{
-		ignore_result(system("modprobe -qv ah4"));
-		ignore_result(system("modprobe -qv esp4"));
-		ignore_result(system("modprobe -qv ipcomp"));
-		ignore_result(system("modprobe -qv xfrm4_tunnel"));
-		ignore_result(system("modprobe -qv xfrm_user"));
+		ignore_result(system("modprobe -s ah4"));
+		ignore_result(system("modprobe -s esp4"));
+		ignore_result(system("modprobe -s ipcomp"));
+		ignore_result(system("modprobe -s xfrm4_tunnel"));
+		ignore_result(system("modprobe -s xfrm_user"));
 	}
 
 	DBG(DBG_CONTROL,