From owner-freebsd-bugs@freebsd.org Tue May 23 15:03:31 2017 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id ED34ED7AB7F for ; Tue, 23 May 2017 15:03:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BDCDE19CB for ; Tue, 23 May 2017 15:03:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v4NF3Voh065548 for ; Tue, 23 May 2017 15:03:31 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 219453] tcpmd5 kernel module regression Date: Tue, 23 May 2017 15:03:31 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.0-STABLE X-Bugzilla-Keywords: regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: zarychtam@plan-b.pwste.edu.pl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 May 2017 15:03:32 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219453 --- Comment #6 from Marek Zarychta --- (In reply to Andrey V. Elsukov from comment #4) My previous reply was mistaken, so let me explain once again. SAs are set f= rom /etc/ipsec.conf and since the new IPSEC code was committed to STABLE I am following a branch. A couple of successful world updates has been provided. tcpmd5.ko module is loaded from /boot/loader.conf as well as some other modules:=20 # kldstat=20 Id Refs Address Size Name 1 38 0xffffffff80200000 1f32ac8 kernel 2 1 0xffffffff82134000 313338 zfs.ko 3 2 0xffffffff82448000 cb38 opensolaris.ko 4 1 0xffffffff82455000 12530 carp.ko 5 1 0xffffffff82468000 161c8 if_lagg.ko 6 1 0xffffffff8247f000 18d0 accf_dns.ko 7 1 0xffffffff82481000 66f0 ichwd.ko 8 1 0xffffffff82488000 40c0 tcpmd5.ko 9 1 0xffffffff8248d000 2af28 ipsec.ko 10 1 0xffffffff82621000 106c5 geom_eli.ko 11 1 0xffffffff82632000 58de fdescfs.ko 12 1 0xffffffff82638000 2839 pflog.ko 13 1 0xffffffff8263b000 34c2c pf.ko 14 1 0xffffffff82670000 a0d green_saver.ko 15 1 0xffffffff82671000 837a autofs.ko Kernel config is quite simple: include GENERIC ident MAXDATA options EM_MULTIQUEUE options IPSEC_SUPPORT nooptions IPSEC This is a production machine and updates will be stalled, at least till 11.1 will be released. --=20 You are receiving this mail because: You are the assignee for the bug.=