Date: Fri, 2 Nov 2018 20:24:25 +0100 From: Marek Zarychta <zarychtam@plan-b.pwste.edu.pl> To: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net> Cc: freebsd-current@freebsd.org Subject: Re: 12.0-BETA1 vnet with pf firewall Message-ID: <20181102192425.GB32569@plan-b.pwste.edu.pl> In-Reply-To: <EDE5C386-53DA-4105-BB61-120F6DFEFBFA@lists.zabbadoz.net> References: <201810282139.w9SLdO58054096@pdx.rh.CN85.dnsmgr.net> <113f7b4f-0a72-7f0f-afe0-f9f9885011e6@plan-b.pwste.edu.pl> <EDE5C386-53DA-4105-BB61-120F6DFEFBFA@lists.zabbadoz.net>
index | next in thread | previous in thread | raw e-mail
[-- Attachment #1 --] On Fri, Nov 02, 2018 at 02:20:53PM +0000, Bjoern A. Zeeb wrote: > On 28 Oct 2018, at 22:07, Marek Zarychta wrote: > > > Some time ago I submitted a PR about this, but I was unaware that the > > case of failure during loading ipsec.ko is caused by the presence of > > already loaded pf.ko > > > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=228854 > > > This bug and the current report should be fixed in stable/11, stable/12 > (including the upcoming BETA3), and HEAD. > > If you continue to experience this problem, please re-open the bug > report and follow-up there! > > > Thanks a lot for your reports and testings. > Thank you for resolving this non-trivial issue, applying the quick fix and expedited MFC. -- Marek Zarychta [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- iQEzBAABCAAdFiEEMOqvKm6wKvS1/ZeCdZ/s//1SjSwFAlvcpGUACgkQdZ/s//1S jSzJrAf8Cqh1M/73Vl3bh9PYrN9/6LGHQ9D9ABY5OZolztfL/UIZSm/+QKb2WIRf g37vilp7it/ZwFYQtr9k3nX2cgSa4ZE45xx9Nqt4sCROjIAE4XCFtiep9gDUUDIs 9tIWIvXNTn/dOerXYAWPdHlRx4LSa9PqwHe1Wx7RjOVoYlL2J4tWOJfjAYhK4jYM o/qzadpy9r5wgZ+bc4pKlYvZ99z785V27fTJwzmsni41nTKXfefDmpFFzFFRCPSO NkUcW6aiRS6tPrFyRUILwj4MzXO238W6p+aHaH7IppBWdMrbOFvSvQfuZbH28+kZ Uk1IMkjwj6h1Vff9rdLruoRtJzpOtA== =k2ch -----END PGP SIGNATURE-----help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20181102192425.GB32569>
