Hi!

I'm trying to setup StrongSwan (oh, the pain...) to iked(8) IPsec.  When
trying to bring up the connection from the Linux end (ipsec up
<connection>), the iked(8) at the OpenBSD (5.3-stable) endpoint
segfaults. I'm trying to use certs and public keys for authentication
for this host-to-host ESP tunnel connection.
For the life of me I can not get a coredump from the ikev2 program, but
attaching gdb to its PID won't give me a bt either because it can't seem
to load the symbol table. I've recompiled iked from sources with
CFLAGS=-g and without stripping, but still, no luck.

The network looks like this:
[ Linux StrongSwan ] <--> [ NAT gw <remote_ip> ]O--Internetz--O[ <firefly_ip> ]
        |                                                             |
        `========================== IPsec IKEv2 ======================'

Here is the output of iked -dvv from the start until the sig11.
I'm sorry about the "anonimization", if it confuses the reader I'll
gladly elaborate.

# /sbin/iked -dvv
firefly_ip = "<firefly_ip>"

remote_ip = "<remote_ip>"

/etc/iked.conf: loaded 1 configuration rules
ca_reload: loaded ca file ecentrum_cacert.pem
ca_reload: /O=eCentrum/OU=eCentrum Root CA/emailAddress=leva [at] 
ecentrum.hu/L=Szekesfehervar/ST=Fejer/C=HU/CN=...
ca_reload: loaded 1 ca certificate
ca_reload: loaded cert file ipsec_firefly_cert.pem
ca_validate_cert: /C=HU/ST=Fejer/O=eCentrum/OU=IPsec 
IKEv2/CN=<firefly_host>/subjectAltName=<firefly_ip> ok
config_getpolicy: received policy
ikev2 "test-ikev2" passive esp inet from <firefly_ip> to <remote_ip> local 
<firefly_ip> peer <remote_ip> ikesa enc aes-256,aes-192,aes-128,3des prf 
hmac-sha2-256,hmac-sha1,hmac-md5 auth hmac-sha2-256,hmac-sha1,hmac-md5 group 
modp2048-256,modp2048,modp1536,modp1024 childsa enc aes-256,aes-192,aes-128 
auth hmac-sha2-256,hmac-sha1 lifetime 10800 bytes 536870912 rsa
config_getpfkey: received pfkey fd 4
config_getcompile: compilation done
config_getsocket: received socket fd 11
config_getsocket: received socket fd 12
ikev2_dispatch_cert: updated local CERTREQ signatures length 20
config_getsocket: received socket fd 14
config_getsocket: received socket fd 20
ikev2_recv: INFORMATIONAL from initiator <remote_ip>:4761 to <firefly_ip>:4500 
policy 'test-ikev2' id 2, 76 bytes
ikev2_recv: ispi 0x0943538bae4b0ba0 rspi 0xea2c1a40848ed222
ikev2_recv: IKE_SA_INIT from initiator <remote_ip>:443 to <firefly_ip>:500 
policy 'test-ikev2' id 0, 660 bytes
ikev2_recv: ispi 0x12412ae4e06726b8 rspi 0x0000000000000000
ikev2_policy2id: srcid FQDN/<firefly_host> length 23
ikev2_pld_parse: header ispi 0x12412ae4e06726b8 rspi 0x0000000000000000 
nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 660 
response 0
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 276
ikev2_pld_sa: more 2 reserved 0 length 44 proposal #1 protoid IKE spisize 0 
xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
ikev2_pld_ke: dh group MODP_2048 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_nat_detection: peer source 0x12412ae4e06726b8 0x0000000000000000 
<remote_ip>:443
ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT, enabling UDP 
encapsulation
ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_nat_detection: peer destination 0x12412ae4e06726b8 0x0000000000000000 
<firefly_ip>:500
sa_state: INIT -> SA_INIT
ikev2_sa_negotiate: score 16
sa_stateok: SA_INIT flags 0x00, require 0x00 
sa_stateflags: 0x00 -> 0x08 sa (required 0x00 )
ikev2_sa_keys: SKEYSEED with 20 bytes
ikev2_sa_keys: S with 80 bytes
ikev2_prfplus: T1 with 20 bytes
ikev2_prfplus: T2 with 20 bytes
ikev2_prfplus: T3 with 20 bytes
ikev2_prfplus: T4 with 20 bytes
ikev2_prfplus: T5 with 20 bytes
ikev2_prfplus: T6 with 20 bytes
ikev2_prfplus: T7 with 20 bytes
ikev2_prfplus: Tn with 140 bytes
ikev2_sa_keys: SK_d with 20 bytes
ikev2_sa_keys: SK_ai with 20 bytes
ikev2_sa_keys: SK_ar with 20 bytes
ikev2_sa_keys: SK_ei with 16 bytes
ikev2_sa_keys: SK_er with 16 bytes
ikev2_sa_keys: SK_pi with 20 bytes
ikev2_sa_keys: SK_pr with 20 bytes
ikev2_add_proposals: length 44
ikev2_next_payload: length 48 nextpayload KE
ikev2_next_payload: length 264 nextpayload NONCE
ikev2_next_payload: length 36 nextpayload NOTIFY
ikev2_nat_detection: local source 0x12412ae4e06726b8 0xe5db467165bf35cb 
<firefly_ip>:500
ikev2_next_payload: length 28 nextpayload NOTIFY
ikev2_nat_detection: local destination 0x12412ae4e06726b8 0xe5db467165bf35cb 
<remote_ip>:443
ikev2_next_payload: length 28 nextpayload CERTREQ
ikev2_next_payload: length 25 nextpayload NONE
ikev2_pld_parse: header ispi 0x12412ae4e06726b8 rspi 0xe5db467165bf35cb 
nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 457 
response 1
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 
xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
ikev2_pld_ke: dh group MODP_2048 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 25
ikev2_pld_certreq: type X509_CERT signatures length 20
ikev2_msg_send: IKE_SA_INIT from <firefly_ip>:500 to <remote_ip>:443, 457 bytes
config_free_proposals: free 0x8659ad40
ikev2_recv: IKE_AUTH from initiator <remote_ip>:4761 to <firefly_ip>:4500 
policy 'test-ikev2' id 1, 1516 bytes
ikev2_recv: ispi 0x12412ae4e06726b8 rspi 0xe5db467165bf35cb
ikev2_recv: updated SA to peer <remote_ip>:4761 local <firefly_ip>:4500
ikev2_pld_parse: header ispi 0x12412ae4e06726b8 rspi 0xe5db467165bf35cb 
nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1516 
response 0
ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 1488
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 1456
ikev2_msg_decrypt: integrity checksum length 12
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 1456/1456 padding 16
ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00 length 
22
ikev2_pld_id: id FQDN/<remote_host> length 18
ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ critical 0x00 
length 853
ikev2_pld_cert: type X509_CERT length 848
ikev2_pld_payloads: decrypted payload CERTREQ nextpayload IDr critical 0x00 
length 25
ikev2_pld_certreq: type X509_CERT signatures length 20
ikev2_policy2id: srcid FQDN/<firefly_host> length 23
ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical 0x00 length 
27
ikev2_pld_id: id FQDN/<firefly_host> length 23
ikev2_pld_id: unexpected id payload
ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 
264
ikev2_pld_auth: method RSA_SIG length 256
sa_state: SA_INIT -> AUTH_REQUEST
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 
180
ikev2_pld_sa: more 2 reserved 0 length 40 proposal #1 protoid ESP spisize 4 
xforms 3 spi 0xc5eb9108
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 
24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start <internal_ip> end <internal_ip>
ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 
length 24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start <firefly_ip> end <firefly_ip>
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 
length 8
ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 
length 12
ikev2_pld_notify: protoid NONE spisize 0 type ADDITIONAL_IP4_ADDRESS
ikev2_resp_recv: NAT-T message received, updated SA
sa_stateok: SA_INIT flags 0x00, require 0x00 
ikev2_msg_auth: responder auth data length 509
ca_setauth: auth length 509
ikev2_msg_auth: initiator auth data length 712
ikev2_msg_authverify: method RSA_SIG keylen 848 type X509_CERT
ikev2_msg_authverify: authentication successful
sa_state: AUTH_REQUEST -> AUTH_SUCCESS
ikev2_sa_negotiate: score 13
sa_stateflags: 0x08 -> 0x08 sa (required 0x0f cert,valid,auth,sa)
config_free_proposals: free 0x8659a000
ca_getreq: found CA /O=eCentrum/OU=eCentrum Root CA/emailAddress=leva [at] 
ecentrum.hu/L=Szekesfehervar/ST=Fejer/C=HU/CN=...
ca_x509_subjectaltname: FQDN/<firefly_host>
ca_getreq: found local certificate /C=HU/ST=Fejer/O=eCentrum/OU=IPsec 
IKEv2/CN=<firefly_host>/subjectAltName=<firefly_ip>
ca_setauth: auth length 256
ca_validate_pubkey: looking up fqdn/<remote_host>
ca_x509_subjectaltname: FQDN/<remote_host>
ca_validate_cert: /C=HU/ST=Pest/O=eCentrum/OU=IPsec 
IKEv2/CN=<remote_host>/subjectAltName=<remote_ip> ok
ikev2_getimsgdata: imsg 18 rspi 0xe5db467165bf35cb ispi 0x12412ae4e06726b8 
initiator 0 sa valid type 4 data length 859
ikev2_dispatch_cert: cert type 4 length 859
sa_stateflags: 0x08 -> 0x09 cert,sa (required 0x0f cert,valid,auth,sa)
ikev2_getimsgdata: imsg 21 rspi 0xe5db467165bf35cb ispi 0x12412ae4e06726b8 
initiator 0 sa valid type 1 data length 256
ikev2_dispatch_cert: AUTH type 1 len 256
sa_stateflags: 0x09 -> 0x0d cert,auth,sa (required 0x0f cert,valid,auth,sa)
ikev2_dispatch_cert: peer certificate is valid
sa_stateflags: 0x0d -> 0x0f cert,valid,auth,sa (required 0x0f 
cert,valid,auth,sa)
sa_state: AUTH_SUCCESS -> VALID
sa_stateok: VALID flags 0x0f, require 0x0f cert,valid,auth,sa
sa_stateok: VALID flags 0x0f, require 0x0f cert,valid,auth,sa
ikev2_sa_tag:  (0)
ikev2_childsa_negotiate: proposal 1
ikev2_childsa_negotiate: key material length 72
ikev2_prfplus: T1 with 20 bytes
ikev2_prfplus: T2 with 20 bytes
ikev2_prfplus: T3 with 20 bytes
ikev2_prfplus: T4 with 20 bytes
ikev2_prfplus: Tn with 80 bytes
pfkey_sa_getspi: spi 0xfa48f5b7
pfkey_sa_init: new spi 0xfa48f5b7
sa_stateok: VALID flags 0x0f, require 0x0f cert,valid,auth,sa
ikev2_next_payload: length 27 nextpayload CERT
ikev2_next_payload: length 864 nextpayload AUTH
ikev2_next_payload: length 264 nextpayload SA
ikev2_add_proposals: length 40
ikev2_next_payload: length 44 nextpayload TSi
ikev2_next_payload: length 24 nextpayload TSr
ikev2_next_payload: length 24 nextpayload NONE
ikev2_msg_encrypt: decrypted length 1247
ikev2_msg_encrypt: padded length 1248
ikev2_msg_encrypt: length 1248, padding 0, output length 1276
ikev2_next_payload: length 1280 nextpayload IDr
ikev2_msg_integr: message length 1308
ikev2_msg_integr: integrity checksum length 12
ikev2_pld_parse: header ispi 0x12412ae4e06726b8 rspi 0xe5db467165bf35cb 
nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1308 
response 1
ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1280
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 1248
ikev2_msg_decrypt: integrity checksum length 12
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 1248/1248 padding 0
ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00 length 
27
ikev2_pld_id: id FQDN/<firefly_host> length 23
ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical 0x00 
length 864
ikev2_pld_cert: type X509_CERT length 859
ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 
264
ikev2_pld_auth: method RSA_SIG length 256
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44
ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4 
xforms 3 spi 0xfa48f5b7
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 
24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start <remote_ip> end <remote_ip>
ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 
24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start <firefly_ip> end <firefly_ip>
ikev2_msg_send: IKE_AUTH from <firefly_ip>:4500 to <remote_ip>:4761, 1308 
bytes, NAT-T
ca exiting
lost child: ikev2 terminated; signal 11
ikev1 exiting
parent terminating


iked.conf:
ikev2 "test-ikev2" from <firefly_ip> to <remote_ip>


The StrongSwan setup:
$ ipsec --version
Linux strongSwan U4.3.5/K3.9.11-smp

ipsec.conf:
------------------------------8<------------------------------
config setup
        charondebug=all

conn ecentrum
        auto=add
        keyexchange=ikev2
        left=%defaultroute
        leftcert=ipsec_teszt_ikev2_cert.pem
        leftid=@<remote_host>
        leftfirewall=yes
        right=<firefly_ip>
        rightcert=ipsec_firefly_cert.pem
        rightid=@<firefly_host>
------------------------------8<------------------------------

Anyone got any idea what could be going on?

Thanks,
Daniel


dmesg:
OpenBSD 5.3-stable (GENERIC) #0: Thu Jun 13 14:02:23 CEST 2013
    dani...@openbsd-stable.my.domain:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Intel(R) Pentium(R) 4 CPU 2.40GHz ("GenuineIntel" 686-class) 2.41 GHz
cpu0: 
FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,DS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE,CNXT-ID,xTPR,PERF
real mem  = 1064103936 (1014MB)
avail mem = 1035730944 (987MB)
mainbus0 at root
bios0 at mainbus0: AT/286+ BIOS, date 02/26/03, BIOS32 rev. 0 @ 0xf0010, SMBIOS 
rev. 2.3 @ 0xfbfb0 (68 entries)
bios0: vendor Intel Corp. version "RG84510A.86A.0028.P15.0302260937" date 
02/26/2003
bios0: Intel Corporation D845GEBV2
acpi0 at bios0: rev 0
acpi0: sleep states S0 S1 S4 S5
acpi0: tables DSDT FACP APIC ASF!
acpi0: wakeup devices P0P1(S4) UAR1(S4) USB0(S4) USB1(S4) USB2(S4) USB3(S4) 
AC97(S4) SLPB(S4)
acpitimer0 at acpi0: 3579545 Hz, 24 bits
acpimadt0 at acpi0 addr 0xfee00000: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: apic clock running at 133MHz
ioapic0 at mainbus0: apid 1 pa 0xfec00000, version 20, 24 pins
acpiprt0 at acpi0: bus 0 (PCI0)
acpiprt1 at acpi0: bus 1 (P0P1)
acpicpu0 at acpi0
acpipwrres0 at acpi0: URP1
acpipwrres1 at acpi0: FDDP
acpipwrres2 at acpi0: LPTP
acpibtn0 at acpi0: SLPB
bios0: ROM list: 0xc0000/0xb200! 0xcb800/0x4800 0xd0000/0x1000 0xd1000/0x1000
pci0 at mainbus0 bus 0: configuration mode 1 (bios)
pchb0 at pci0 dev 0 function 0 "Intel 82845G Host" rev 0x03
vga1 at pci0 dev 2 function 0 "Intel 82845G Video" rev 0x03
wsdisplay0 at vga1 mux 1: console (80x25, vt100 emulation)
wsdisplay0: screen 1-5 added (80x25, vt100 emulation)
intagp0 at vga1
agp0 at intagp0: aperture at 0xf0000000, size 0x8000000
inteldrm0 at vga1: apic 1 int 16
drm0 at inteldrm0
uhci0 at pci0 dev 29 function 0 "Intel 82801DB USB" rev 0x02: apic 1 int 16
uhci1 at pci0 dev 29 function 1 "Intel 82801DB USB" rev 0x02: apic 1 int 19
uhci2 at pci0 dev 29 function 2 "Intel 82801DB USB" rev 0x02: apic 1 int 18
ehci0 at pci0 dev 29 function 7 "Intel 82801DB USB" rev 0x02: apic 1 int 23
usb0 at ehci0: USB revision 2.0
uhub0 at usb0 "Intel EHCI root hub" rev 2.00/1.00 addr 1
ppb0 at pci0 dev 30 function 0 "Intel 82801BA Hub-to-PCI" rev 0x82
pci1 at ppb0 bus 1
pciide0 at pci1 dev 2 function 0 "CMD Technology SiI3512 SATA" rev 0x01: DMA
pciide0: using apic 1 int 18 for native-PCI interrupt
pciide0: port 0: device present, speed: 1.5Gb/s
wd0 at pciide0 channel 0 drive 0: <ST3250310AS>
wd0: 16-sector PIO, LBA48, 238475MB, 488397168 sectors
wd0(pciide0:0:0): using BIOS timings, Ultra-DMA mode 5
pciide0: port 1: device present, speed: 1.5Gb/s
wd1 at pciide0 channel 1 drive 0: <SAMSUNG HD501LJ>
wd1: 16-sector PIO, LBA48, 476940MB, 976773168 sectors
wd1(pciide0:1:0): using BIOS timings, Ultra-DMA mode 7
em0 at pci1 dev 5 function 0 "Intel PRO/1000GT (82541GI)" rev 0x05: apic 1 int 
18, address
fxp0 at pci1 dev 8 function 0 "Intel PRO/100 VE" rev 0x82, i82562: apic 1 int 
20, address
inphy0 at fxp0 phy 1: i82562ET 10/100 PHY, rev. 0
ichpcib0 at pci0 dev 31 function 0 "Intel 82801DB LPC" rev 0x02
pciide1 at pci0 dev 31 function 1 "Intel 82801DB IDE" rev 0x02: DMA, channel 0 
configured to compatibility, channel 1 configured to compatibility
pciide1: channel 0 ignored (disabled)
pciide1: channel 1 ignored (disabled)
ichiic0 at pci0 dev 31 function 3 "Intel 82801DB SMBus" rev 0x02: apic 1 int 17
iic0 at ichiic0
adt0 at iic0 addr 0x2e: lm85 rev 0x62
spdmem0 at iic0 addr 0x50: 1GB DDR SDRAM non-parity PC3200CL3.0
auich0 at pci0 dev 31 function 5 "Intel 82801DB AC97" rev 0x02: apic 1 int 17, 
ICH4 AC97
ac97: codec id 0x41445374 (Analog Devices AD1981B)
ac97: codec features headphone, 20 bit DAC, No 3D Stereo
audio0 at auich0
usb1 at uhci0: USB revision 1.0
uhub1 at usb1 "Intel UHCI root hub" rev 1.00/1.00 addr 1
usb2 at uhci1: USB revision 1.0
uhub2 at usb2 "Intel UHCI root hub" rev 1.00/1.00 addr 1
usb3 at uhci2: USB revision 1.0
uhub3 at usb3 "Intel UHCI root hub" rev 1.00/1.00 addr 1
isa0 at ichpcib0
isadma0 at isa0
com0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0: console keyboard, using wsdisplay0
pcppi0 at isa0 port 0x61
spkr0 at pcppi0
lpt0 at isa0 port 0x378/4 irq 7
npx0 at isa0 port 0xf0/16: reported by CPUID; using exception 16
mtrr: Pentium Pro MTRR support
vscsi0 at root
scsibus0 at vscsi0: 256 targets
softraid0 at root
scsibus1 at softraid0: 256 targets
root on wd0a (69dbc259cb64de66.a) swap on wd0b dump on wd0b

-- 
LÉVAI Dániel
PGP key ID = 0x83B63A8F
Key fingerprint = DBEC C66B A47A DFA2 792D  650C C69B BE4C 83B6 3A8F

Reply via email to