> Предлагаю перейти к отладке с помощью dtrace :)

Вот что получается.

# ./ipsec.d
dtrace: script './ipsec.d' matched 3 probes
CPU     ID                    FUNCTION:NAME
  0  50792               ipsec_filter:entry 10.7.0.12->10.7.0.41
  0  50793              ipsec_filter:return 10.7.0.12->10.7.0.41
  0  50792               ipsec_filter:entry 192.168.44.1->192.168.58.1
  0  50793              ipsec_filter:return 192.168.44.1->192.168.58.1
  0  50792               ipsec_filter:entry 10.7.0.12->10.7.0.41
  0  50793              ipsec_filter:return 10.7.0.12->10.7.0.41
  0  50792               ipsec_filter:entry 192.168.44.1->192.168.58.1
  0  50793              ipsec_filter:return 192.168.44.1->192.168.58.1
  0  50792               ipsec_filter:entry 10.7.0.12->10.7.0.41
  0  50793              ipsec_filter:return 10.7.0.12->10.7.0.41
  0  50792               ipsec_filter:entry 192.168.44.1->192.168.58.1
  0  50793              ipsec_filter:return 192.168.44.1->192.168.58.1
  0  50792               ipsec_filter:entry 10.7.0.12->10.7.0.41
  0  50793              ipsec_filter:return 10.7.0.12->10.7.0.41
  0  50792               ipsec_filter:entry 192.168.44.1->192.168.58.1
  0  50793              ipsec_filter:return 192.168.44.1->192.168.58.1
  0  50792               ipsec_filter:entry 10.7.0.12->10.7.0.41
  0  50793              ipsec_filter:return 10.7.0.12->10.7.0.41
  0  50792               ipsec_filter:entry 192.168.44.1->192.168.58.1
  0  50793              ipsec_filter:return 192.168.44.1->192.168.58.1




Ответить