Starting UML PATH/start.sh
spawn PATH single
Linux version XXXX
On node 0 totalpages: 8192
Kernel command line:
Calibrating delay loop... XXXX bogomips
Dentry-cache hash table entries: NUMBERS
Inode-cache hash table entries: NUMBERS
Mount-cache hash table entries: NUMBERS
Buffer-cache hash table entries: NUMBERS
Page-cache hash table entries: NUMEBRS
POSIX conformance testing by UNIFIX
Linux NET4.0 for Linux 2.4
Based upon Swansea University Computer Society NET3.039
Initializing RT netlink socket
Starting kswapd
VFS: Diskquotas version dquot_6.4.0 initialized
devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)
devfs: boot_options Q
pty: 256 Unix98 ptys configured
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
loop: loaded (max 8 devices)
PPP generic driver version VERSION
Universal TUN/TAP device driver VERSION
NET4: Linux TCP/IP 1.0 for NET4.0
IP Protocols: ICMP, UDP, TCP
IP: routing cache hash table of 512 buckets, 4Kbytes
TCP: Hash tables configured (established 2048 bind 2048)
IPv4 over IPv4 tunneling driver
GRE over IPv4 tunneling driver
NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
Mounted devfs on /dev
INIT: version 2.78 booting
Activating swap...
Calculating module dependancies
done.
Loading modules: LIST

Checking all file systems...
Parallelizing fsck version 1.18 (11-Nov-1999)
Setting kernel variables.
Mounting local filesystems...
/dev/shm on /tmp type tmpfs (rw)
/dev/shm on /var/run type tmpfs (rw)
devpts on /dev/pts type devpts (rw,mode=0622)
none on /usr/share type hostfs (ro)
Enabling packet forwarding: done.
Configuring network interfaces: done.
Cleaning: /tmp /var/lock /var/run.
Initializing random number generator... done.
Recovering nvi editor sessions... done.
Give root password for maintenance
(or type Control-D for normal startup): 
west:~#
 klogd -c 4 -x -f /tmp/klog.log
west:~#
 TZ=GMT export TZ
west:~#
 ipsec spi --clear
west:~#
 ipsec eroute --clear
west:~#
 enckey=0x4043434545464649494a4a4c4c4f4f515152525454575758
west:~#
 ipsec klipsdebug --set pfkey
west:~#
 ipsec klipsdebug --set rcv
west:~#
 ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto esp --src 192.1.2.23 --esp 3des-md5-96 --enckey $enckey --authkey 0x87658765876587658765876587658765
west:~#
 ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto tun --src 192.1.2.23 --dst 192.1.2.45 --ip4
west:~#
 ipsec spigrp inet 192.1.2.45 0x12345678 tun inet 192.1.2.45 0x12345678 esp 
west:~#
 ipsec tncfg --attach --virtual ipsec0 --physical eth1
west:~#
 ifconfig ipsec0 inet 192.1.2.45 netmask 0xffffff00 broadcast 192.1.2.255 up
west:~#
 ipsec look
west NOW
ipsec0->eth1 mtu=16260(1500)->1500
esp0x12345678@192.1.2.45 ESP_3DES_HMAC_MD5: dir=in  src=192.1.2.23 iv_bits=64bits iv=0xDEADF00DDEADF00D alen=128 aklen=128 eklen=192 life(c,s,h)= refcount=4 ref=4
tun0x12345678@192.1.2.45 IPIP: dir=in  src=192.1.2.23 life(c,s,h)= refcount=4 ref=5
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
west:~#
 route add -host 192.0.2.1 gw 192.1.2.23 dev ipsec0
west:~#
 kill `cat /var/run/klogd.pid`; cat /tmp/klog.log
klogd 1.3-3#33.1, log source = /proc/kmsg started.
west:~#
 halt
INIT: Switching to runlevel: 0
INIT: Sending processes the TERM signal
west:~#
 INIT: Sending processes the KILL signal
Stopping domain name service: named.
Stopping internet superserver: inetd.
Stopping portmap daemon: portmap.
ipsec_setup: Stopping FreeS/WAN IPsec...
ipsec_setup: stop ordered, but IPsec does not appear to be running!
ipsec_setup: doing cleanup anyway...
IPSEC EVENT: KLIPS device ipsec0 shut down.

Stopping system log daemon: klogd syslogd.
Sending all processes the TERM signal... done.
Sending all processes the KILL signal... done.
Unmounting remote filesystems... done.
Deactivating swap... done.
Unmounting local filesystems... done.
Power down.
klips_debug:pfkey_x_debug_process: set
klips_debug:pfkey_msg_interp: parsing message type 16(x-debug) with msg_parser 0pDEADF00D.
klips_debug:pfkey_x_msg_debug_parse: .
klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00D
klips_debug:pfkey_destroy_socket: .
klips_debug:pfkey_remove_socket: .
klips_debug:pfkey_remove_socket: succeeded.
klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.
klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.
klips_debug:pfkey_destroy_socket: destroyed.
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_release: succeeded.
klips_debug:pfkey_create: sock=0pDEADF00D type:3 state:1 flags:0 protocol:2
klips_debug:pfkey_create: sock->fasync_list=0pDEADF00D sk->sleep=0pDEADF00D.
klips_debug:pfkey_insert_socket: sk=0pDEADF00D
klips_debug:pfkey_list_insert_socket: allocating 8 bytes for socketp=0pDEADF00D
klips_debug:pfkey_create: Socket sock=0pDEADF00D sk=0pDEADF00D initialised.
klips_debug:pfkey_sendmsg: .
klips_debug:pfkey_sendmsg: allocating 72 bytes for downward message.
klips_debug:pfkey_sendmsg: msg sent for parsing.
klips_debug:pfkey_msg_interp: parsing message ver=2, type=16, errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_interp: allocated extr->ips=0pDEADF00D.
klips_debug:pfkey_msg_parse: parsing message ver=2, type=16(x-debug), errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_parse: remain=7 ext_type=25(X-set-debug) ext_len=7 parsing ext 0pDEADF00D with parser pfkey_x_ext_debug_parse.
klips_debug:pfkey_msg_parse: extensions permitted=02000001, seen=02000001, required=02000001.
klips_debug:pfkey_msg_interp: processing ext 25 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_x_debug_process: .
klips_debug:pfkey_x_debug_process: set
klips_debug:pfkey_msg_interp: parsing message type 16(x-debug) with msg_parser 0pDEADF00D.
klips_debug:pfkey_x_msg_debug_parse: .
klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00D
klips_debug:pfkey_destroy_socket: .
klips_debug:pfkey_remove_socket: .
klips_debug:pfkey_remove_socket: succeeded.
klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.
klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.
klips_debug:pfkey_destroy_socket: destroyed.
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_release: succeeded.
klips_debug:pfkey_create: sock=0pDEADF00D type:3 state:1 flags:0 protocol:2
klips_debug:pfkey_create: sock->fasync_list=0pDEADF00D sk->sleep=0pDEADF00D.
klips_debug:pfkey_insert_socket: sk=0pDEADF00D
klips_debug:pfkey_list_insert_socket: allocating 8 bytes for socketp=0pDEADF00D
klips_debug:pfkey_create: Socket sock=0pDEADF00D sk=0pDEADF00D initialised.
klips_debug:pfkey_sendmsg: .
klips_debug:pfkey_sendmsg: allocating 144 bytes for downward message.
klips_debug:pfkey_sendmsg: msg sent for parsing.
klips_debug:pfkey_msg_interp: parsing message ver=2, type=3, errno=0, satype=3(ESP), len=18, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_interp: allocated extr->ips=0pDEADF00D.
klips_debug:pfkey_msg_interp: satype 3 lookups to proto=50.
klips_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=18, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add).
klips_debug:pfkey_msg_parse: remain=16 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=1 auth=2 encrypt=3 flags=0 ref=-1.
klips_debug:pfkey_msg_parse: remain=13 ext_type=5(source-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=192.1.2.23 proto=0 port=0.
klips_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
klips_debug:pfkey_msg_parse: remain=7 ext_type=8(authentication-key) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_key_parse.
klips_debug:pfkey_key_parse: success, found len=3 exttype=8(authentication-key) bits=128 reserved=0.
klips_debug:pfkey_msg_parse: remain=4 ext_type=9(cipher-key) ext_len=4 parsing ext 0pDEADF00D with parser pfkey_key_parse.
klips_debug:pfkey_key_parse: success, found len=4 exttype=9(cipher-key) bits=192 reserved=0.
klips_debug:pfkey_msg_parse: extensions permitted=00001ffb, seen=00000363, required=00000063.
klips_debug:pfkey_msg_interp: processing ext 1 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_sa_process: .
klips_debug:pfkey_msg_interp: processing ext 5 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_address_process:
klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.23.
klips_debug:pfkey_address_process: found src address.
klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
klips_debug:pfkey_address_process: successful.
klips_debug:pfkey_msg_interp: processing ext 6 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_address_process:
klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.45.
klips_debug:pfkey_address_process: found dst address.
klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
klips_debug:pfkey_address_process: ips_said.dst set to 192.1.2.45.
klips_debug:pfkey_address_process: successful.
klips_debug:pfkey_msg_interp: processing ext 8 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_key_process: .
klips_debug:pfkey_key_process: allocating 16 bytes for authkey.
klips_debug:pfkey_key_process: success.
klips_debug:pfkey_msg_interp: processing ext 9 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_key_process: .
klips_debug:pfkey_key_process: allocating 24 bytes for enckey.
klips_debug:pfkey_key_process: success.
klips_debug:pfkey_msg_interp: parsing message type 3(add) with msg_parser 0pDEADF00D.
klips_debug:pfkey_add_parse: .
klips_debug:pfkey_add_parse: existing ipsec_sa not found (this is good) for SAesp0x12345678@192.1.2.45, in-bound, allocating.
klips_debug:pfkey_ipsec_sa_init: (pfkey defined) called for SA:esp0x12345678@192.1.2.45
klips_debug:pfkey_ipsec_sa_init: calling init routine of ESP_3DES_HMAC_MD5
klips_debug:pfkey_msg_hdr_build:
klips_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0pDEADF00D pfkey_ext=0pDEADF00D *pfkey_ext=0pDEADF00D.
klips_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0pDEADF00D pfkey_ext=0pDEADF00D *pfkey_ext=0pDEADF00D.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_sa_build: spi=12345678 replay=0 sa_state=1 auth=2 encrypt=3 flags=1
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0
klips_debug:pfkey_address_build: found address family AF_INET.
klips_debug:pfkey_address_build: found address=192.1.2.23:0.
klips_debug:pfkey_address_build: successful.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0
klips_debug:pfkey_address_build: found address family AF_INET.
klips_debug:pfkey_address_build: found address=192.1.2.45:0.
klips_debug:pfkey_address_build: successful.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_msg_build: pfkey_msg=0pDEADF00D allocated 88 bytes, &(extensions[0])=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[1]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[5]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[6]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: extensions permitted=00001c7b, seen=00000063, required=00000063.
klips_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=11, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add).
klips_debug:pfkey_msg_parse: remain=9 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=1 auth=2 encrypt=3 flags=1 ref=4.
klips_debug:pfkey_msg_parse: remain=6 ext_type=5(source-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=192.1.2.23 proto=0 port=0.
klips_debug:pfkey_msg_parse: remain=3 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
klips_debug:pfkey_msg_parse: extensions permitted=00001c7b, seen=00000063, required=00000063.
klips_debug:pfkey_upmsg: allocating 88 bytes...
klips_debug:pfkey_upmsg: ...allocated at 0pDEADF00D.
klips_debug:pfkey_add_parse: sending up add reply message for satype=3(ESP) to socket=0pDEADF00D succeeded.
klips_debug:pfkey_add_parse: successful for SA: esp0x12345678@192.1.2.45
klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00D
klips_debug:pfkey_destroy_socket: .
klips_debug:pfkey_remove_socket: .
klips_debug:pfkey_remove_socket: succeeded.
klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.
klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.
klips_debug:pfkey_destroy_socket: skb=0pDEADF00D freed.
klips_debug:pfkey_destroy_socket: destroyed.
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_release: succeeded.
klips_debug:pfkey_create: sock=0pDEADF00D type:3 state:1 flags:0 protocol:2
klips_debug:pfkey_create: sock->fasync_list=0pDEADF00D sk->sleep=0pDEADF00D.
klips_debug:pfkey_insert_socket: sk=0pDEADF00D
klips_debug:pfkey_list_insert_socket: allocating 8 bytes for socketp=0pDEADF00D
klips_debug:pfkey_create: Socket sock=0pDEADF00D sk=0pDEADF00D initialised.
klips_debug:pfkey_sendmsg: .
klips_debug:pfkey_sendmsg: allocating 88 bytes for downward message.
klips_debug:pfkey_sendmsg: msg sent for parsing.
klips_debug:pfkey_msg_interp: parsing message ver=2, type=3, errno=0, satype=9(IPIP), len=11, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_interp: allocated extr->ips=0pDEADF00D.
klips_debug:pfkey_msg_interp: satype 9 lookups to proto=4.
klips_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=11, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add).
klips_debug:pfkey_msg_parse: remain=9 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=1 auth=0 encrypt=0 flags=0 ref=-1.
klips_debug:pfkey_msg_parse: remain=6 ext_type=5(source-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=192.1.2.23 proto=0 port=0.
klips_debug:pfkey_msg_parse: remain=3 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
klips_debug:pfkey_msg_parse: extensions permitted=00001ffb, seen=00000063, required=00000063.
klips_debug:pfkey_msg_interp: processing ext 1 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_sa_process: .
klips_debug:pfkey_msg_interp: processing ext 5 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_address_process:
klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.23.
klips_debug:pfkey_address_process: found src address.
klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
klips_debug:pfkey_address_process: successful.
klips_debug:pfkey_msg_interp: processing ext 6 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_address_process:
klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.45.
klips_debug:pfkey_address_process: found dst address.
klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
klips_debug:pfkey_address_process: ips_said.dst set to 192.1.2.45.
klips_debug:pfkey_address_process: successful.
klips_debug:pfkey_msg_interp: parsing message type 3(add) with msg_parser 0pDEADF00D.
klips_debug:pfkey_add_parse: .
klips_debug:pfkey_add_parse: existing ipsec_sa not found (this is good) for SAtun0x12345678@192.1.2.45, in-bound, allocating.
klips_debug:pfkey_ipsec_sa_init: (pfkey defined) called for SA:tun0x12345678@192.1.2.45
klips_debug:pfkey_ipsec_sa_init: calling init routine of IPIP
klips_debug:pfkey_ipsec_sa_init: (pfkey defined) IPIP ipsec_sa set for 192.1.2.23->192.1.2.45.
klips_debug:pfkey_msg_hdr_build:
klips_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0pDEADF00D pfkey_ext=0pDEADF00D *pfkey_ext=0pDEADF00D.
klips_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0pDEADF00D pfkey_ext=0pDEADF00D *pfkey_ext=0pDEADF00D.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_sa_build: spi=12345678 replay=0 sa_state=1 auth=0 encrypt=0 flags=1
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0
klips_debug:pfkey_address_build: found address family AF_INET.
klips_debug:pfkey_address_build: found address=192.1.2.23:0.
klips_debug:pfkey_address_build: successful.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0
klips_debug:pfkey_address_build: found address family AF_INET.
klips_debug:pfkey_address_build: found address=192.1.2.45:0.
klips_debug:pfkey_address_build: successful.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_msg_build: pfkey_msg=0pDEADF00D allocated 88 bytes, &(extensions[0])=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[1]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[5]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[6]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: extensions permitted=00001c7b, seen=00000063, required=00000063.
klips_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=11, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add).
klips_debug:pfkey_msg_parse: remain=9 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=1 auth=0 encrypt=0 flags=1 ref=5.
klips_debug:pfkey_msg_parse: remain=6 ext_type=5(source-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=192.1.2.23 proto=0 port=0.
klips_debug:pfkey_msg_parse: remain=3 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
klips_debug:pfkey_msg_parse: extensions permitted=00001c7b, seen=00000063, required=00000063.
klips_debug:pfkey_upmsg: allocating 88 bytes...
klips_debug:pfkey_upmsg: ...allocated at 0pDEADF00D.
klips_debug:pfkey_add_parse: sending up add reply message for satype=9(IPIP) to socket=0pDEADF00D succeeded.
klips_debug:pfkey_add_parse: successful for SA: tun0x12345678@192.1.2.45
klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00D
klips_debug:pfkey_destroy_socket: .
klips_debug:pfkey_remove_socket: .
klips_debug:pfkey_remove_socket: succeeded.
klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.
klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.
klips_debug:pfkey_destroy_socket: skb=0pDEADF00D freed.
klips_debug:pfkey_destroy_socket: destroyed.
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_release: succeeded.
klips_debug:pfkey_create: sock=0pDEADF00D type:3 state:1 flags:0 protocol:2
klips_debug:pfkey_create: sock->fasync_list=0pDEADF00D sk->sleep=0pDEADF00D.
klips_debug:pfkey_insert_socket: sk=0pDEADF00D
klips_debug:pfkey_list_insert_socket: allocating 8 bytes for socketp=0pDEADF00D
klips_debug:pfkey_create: Socket sock=0pDEADF00D sk=0pDEADF00D initialised.
klips_debug:pfkey_sendmsg: .
klips_debug:pfkey_sendmsg: allocating 120 bytes for downward message.
klips_debug:pfkey_sendmsg: msg sent for parsing.
klips_debug:pfkey_msg_interp: parsing message ver=2, type=13, errno=0, satype=9(IPIP), len=15, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_interp: allocated extr->ips=0pDEADF00D.
klips_debug:pfkey_msg_interp: satype 9 lookups to proto=4.
klips_debug:pfkey_msg_parse: parsing message ver=2, type=13(x-groupsa), errno=0, satype=9(IPIP), len=15, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 13(x-groupsa).
klips_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1.
klips_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
klips_debug:pfkey_msg_parse: remain=7 ext_type=18(X-satype2) ext_len=1 parsing ext 0pDEADF00D with parser pfkey_x_satype_parse.
klips_debug:pfkey_x_satype_parse: len=1 ext=18(X-satype2) satype=3(ESP) res=0,0,0.
klips_debug:pfkey_msg_parse: remain=6 ext_type=19(X-security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
klips_debug:pfkey_sa_parse: successfully found len=3 exttype=19(X-security-association) spi=12345678 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1.
klips_debug:pfkey_msg_parse: remain=3 ext_type=20(X-destination-address2) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=20(X-destination-address2) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
klips_debug:pfkey_msg_parse: extensions permitted=001c0043, seen=001c0043, required=00000043.
klips_debug:pfkey_msg_interp: processing ext 1 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_sa_process: .
klips_debug:pfkey_msg_interp: processing ext 6 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_address_process:
klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.45.
klips_debug:pfkey_address_process: found dst address.
klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
klips_debug:pfkey_address_process: ips_said.dst set to 192.1.2.45.
klips_debug:pfkey_address_process: successful.
klips_debug:pfkey_msg_interp: processing ext 18 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_x_satype_process: .
klips_debug:pfkey_x_satype_process: protocol==50 decoded from satype==3(ESP).
klips_debug:pfkey_msg_interp: processing ext 19 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_sa_process: .
klips_debug:pfkey_msg_interp: processing ext 20 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_address_process:
klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.45.
klips_debug:pfkey_address_process: found 2nd dst address.
klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
klips_debug:pfkey_address_process: ips_said.dst set to 192.1.2.45.
klips_debug:pfkey_address_process: successful.
klips_debug:pfkey_msg_interp: parsing message type 13(x-groupsa) with msg_parser 0pDEADF00D.
klips_debug:pfkey_x_grpsa_parse: .
klips_debug:pfkey_x_grpsa_parse: linking ipsec_sa SA: tun0x12345678@192.1.2.45 with esp0x12345678@192.1.2.45.
klips_debug:pfkey_msg_hdr_build:
klips_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0pDEADF00D pfkey_ext=0pDEADF00D *pfkey_ext=0pDEADF00D.
klips_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0pDEADF00D pfkey_ext=0pDEADF00D *pfkey_ext=0pDEADF00D.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_sa_build: spi=12345678 replay=0 sa_state=0 auth=0 encrypt=0 flags=0
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0
klips_debug:pfkey_address_build: found address family AF_INET.
klips_debug:pfkey_address_build: found address=192.1.2.45:0.
klips_debug:pfkey_address_build: successful.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_x_satype_build:
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_sa_build: spi=12345678 replay=0 sa_state=0 auth=0 encrypt=0 flags=0
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_address_build: exttype=20 proto=0 prefixlen=0
klips_debug:pfkey_address_build: found address family AF_INET.
klips_debug:pfkey_address_build: found address=192.1.2.45:0.
klips_debug:pfkey_address_build: successful.
klips_debug:pfkey_safe_build: error=0
klips_debug:pfkey_safe_build:success.
klips_debug:pfkey_msg_build: pfkey_msg=0pDEADF00D allocated 120 bytes, &(extensions[0])=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[1]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[6]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: copying 8 bytes from extensions[18]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[19]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: copying 24 bytes from extensions[20]=0pDEADF00D to=0pDEADF00D
klips_debug:pfkey_msg_build: extensions permitted=001c0043, seen=001c0043, required=00000043.
klips_debug:pfkey_msg_parse: parsing message ver=2, type=13(x-groupsa), errno=0, satype=9(IPIP), len=15, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 13(x-groupsa).
klips_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=6.
klips_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
klips_debug:pfkey_msg_parse: remain=7 ext_type=18(X-satype2) ext_len=1 parsing ext 0pDEADF00D with parser pfkey_x_satype_parse.
klips_debug:pfkey_x_satype_parse: len=1 ext=18(X-satype2) satype=3(ESP) res=0,0,0.
klips_debug:pfkey_msg_parse: remain=6 ext_type=19(X-security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
klips_debug:pfkey_sa_parse: successfully found len=3 exttype=19(X-security-association) spi=12345678 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=7.
klips_debug:pfkey_msg_parse: remain=3 ext_type=20(X-destination-address2) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
klips_debug:pfkey_address_parse: found exttype=20(X-destination-address2) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
klips_debug:pfkey_msg_parse: extensions permitted=001c0043, seen=001c0043, required=00000043.
klips_debug:pfkey_upmsg: allocating 120 bytes...
klips_debug:pfkey_upmsg: ...allocated at 0pDEADF00D.
klips_debug:pfkey_x_grpsa_parse: sending up x_grpsa reply message for satype=9(IPIP) to socket=0pDEADF00D succeeded.
klips_debug:pfkey_x_grpsa_parse: succeeded in sending x_grpsa reply message.
klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00D
klips_debug:pfkey_destroy_socket: .
klips_debug:pfkey_remove_socket: .
klips_debug:pfkey_remove_socket: succeeded.
klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.
klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.
klips_debug:pfkey_destroy_socket: skb=0pDEADF00D freed.
klips_debug:pfkey_destroy_socket: destroyed.
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00D
klips_debug:pfkey_release: succeeded.
klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65383 frag_off:0 ttl:64 proto:50 chk:63125 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.
klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=1 (iv)=0x4c20452f3cb09211 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45
klips_debug:ipsec_rcv: encalg = 3, authalg = 2.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2
klips_debug:ipsec_rcv: trimming to 104.
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:65383 frag_off:0 ttl:64 proto:4 chk:63203 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.
klips_debug:ipsec_rcv: netif_rx() called.
klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65384 frag_off:0 ttl:64 proto:50 chk:63124 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.
klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=2 (iv)=0x1a7041e3dc9176e8 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45
klips_debug:ipsec_rcv: encalg = 3, authalg = 2.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2
klips_debug:ipsec_rcv: trimming to 104.
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:65384 frag_off:0 ttl:64 proto:4 chk:63202 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.
klips_debug:ipsec_rcv: netif_rx() called.
klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65385 frag_off:0 ttl:64 proto:50 chk:63123 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.
klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=3 (iv)=0x5df8cd51ba5e0c01 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45
klips_debug:ipsec_rcv: encalg = 3, authalg = 2.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2
klips_debug:ipsec_rcv: trimming to 104.
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:65385 frag_off:0 ttl:64 proto:4 chk:63201 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.
klips_debug:ipsec_rcv: netif_rx() called.
klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65386 frag_off:0 ttl:64 proto:50 chk:63122 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.
klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=4 (iv)=0xab6606983f572fbd iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45
klips_debug:ipsec_rcv: encalg = 3, authalg = 2.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2
klips_debug:ipsec_rcv: trimming to 104.
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:65386 frag_off:0 ttl:64 proto:4 chk:63200 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.
klips_debug:ipsec_rcv: netif_rx() called.
klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65387 frag_off:0 ttl:64 proto:50 chk:63121 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.
klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=5 (iv)=0x6eeafbc6f1a5c54a iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45
klips_debug:ipsec_rcv: encalg = 3, authalg = 2.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2
klips_debug:ipsec_rcv: trimming to 104.
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:65387 frag_off:0 ttl:64 proto:4 chk:63199 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.
klips_debug:ipsec_rcv: netif_rx() called.
klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65388 frag_off:0 ttl:64 proto:50 chk:63120 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.
klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=6 (iv)=0xb4cfb47d779633a7 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45
klips_debug:ipsec_rcv: encalg = 3, authalg = 2.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2
klips_debug:ipsec_rcv: trimming to 104.
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:65388 frag_off:0 ttl:64 proto:4 chk:63198 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.
klips_debug:ipsec_rcv: netif_rx() called.
klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65389 frag_off:0 ttl:64 proto:50 chk:63119 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.
klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=7 (iv)=0xe5af03df09bb1909 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45
klips_debug:ipsec_rcv: encalg = 3, authalg = 2.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2
klips_debug:ipsec_rcv: trimming to 104.
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:65389 frag_off:0 ttl:64 proto:4 chk:63197 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.
klips_debug:ipsec_rcv: netif_rx() called.
klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65390 frag_off:0 ttl:64 proto:50 chk:63118 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.
klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=8 (iv)=0xd3a77702bc8788c0 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45
klips_debug:ipsec_rcv: encalg = 3, authalg = 2.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2
klips_debug:ipsec_rcv: trimming to 104.
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:65390 frag_off:0 ttl:64 proto:4 chk:63196 saddr:192.1.2.23 daddr:192.1.2.45
klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.
klips_debug:ipsec_rcv: netif_rx() called.
klips_debug:pfkey_create: sock=0pDEADF00D type:3 state:1 flags:0 protocol:2
klips_debug:pfkey_create: sock->fasync_list=0pDEADF00D sk->sleep=0pDEADF00D.
klips_debug:pfkey_insert_socket: sk=0pDEADF00D
klips_debug:pfkey_list_insert_socket: allocating 8 bytes for socketp=0pDEADF00D
klips_debug:pfkey_create: Socket sock=0pDEADF00D sk=0pDEADF00D initialised.
klips_debug:pfkey_sendmsg: .
klips_debug:pfkey_sendmsg: allocating 72 bytes for downward message.
klips_debug:pfkey_sendmsg: msg sent for parsing.
klips_debug:pfkey_msg_interp: parsing message ver=2, type=16, errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_interp: allocated extr->ips=0pDEADF00D.
klips_debug:pfkey_msg_parse: parsing message ver=2, type=16(x-debug), errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987.
klips_debug:pfkey_msg_parse: remain=7 ext_type=25(X-set-debug) ext_len=7 parsing ext 0pDEADF00D with parser pfkey_x_ext_debug_parse.
klips_debug:pfkey_msg_parse: extensions permitted=02000001, seen=02000001, required=02000001.
klips_debug:pfkey_msg_interp: processing ext 25 0pDEADF00D with processor 0pDEADF00D.
klips_debug:pfkey_x_debug_process: .
klips_debug:pfkey_x_debug_process: unset

