> Предлагаю перейти к отладке с помощью dtrace :)
Вот что получается. # ./ipsec.d dtrace: script './ipsec.d' matched 3 probes CPU ID FUNCTION:NAME 0 50792 ipsec_filter:entry 10.7.0.12->10.7.0.41 0 50793 ipsec_filter:return 10.7.0.12->10.7.0.41 0 50792 ipsec_filter:entry 192.168.44.1->192.168.58.1 0 50793 ipsec_filter:return 192.168.44.1->192.168.58.1 0 50792 ipsec_filter:entry 10.7.0.12->10.7.0.41 0 50793 ipsec_filter:return 10.7.0.12->10.7.0.41 0 50792 ipsec_filter:entry 192.168.44.1->192.168.58.1 0 50793 ipsec_filter:return 192.168.44.1->192.168.58.1 0 50792 ipsec_filter:entry 10.7.0.12->10.7.0.41 0 50793 ipsec_filter:return 10.7.0.12->10.7.0.41 0 50792 ipsec_filter:entry 192.168.44.1->192.168.58.1 0 50793 ipsec_filter:return 192.168.44.1->192.168.58.1 0 50792 ipsec_filter:entry 10.7.0.12->10.7.0.41 0 50793 ipsec_filter:return 10.7.0.12->10.7.0.41 0 50792 ipsec_filter:entry 192.168.44.1->192.168.58.1 0 50793 ipsec_filter:return 192.168.44.1->192.168.58.1 0 50792 ipsec_filter:entry 10.7.0.12->10.7.0.41 0 50793 ipsec_filter:return 10.7.0.12->10.7.0.41 0 50792 ipsec_filter:entry 192.168.44.1->192.168.58.1 0 50793 ipsec_filter:return 192.168.44.1->192.168.58.1
