[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4CBF78B6.90002@genband.com>
Date: Wed, 20 Oct 2010 17:18:14 -0600
From: Chris Friesen <chris.friesen@...band.com>
To: netdev@...r.kernel.org,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: [BUG] problems with "ip xfrm" on 32-bit userspace with 64-bit kernel
We've run into a 32/64 compatibility problem with iproute2. The "ip
xfrm monitor acquire" command doesn't work properly due to struct size
mismatches between kernel and userspace.
If I modify include/linux/xfrm.h to pack all the structures and rebuild
the kernel and userspace, this message is displayed properly. However,
this shouldn't be necessary and might not work on all architectures.
Anyone got any ideas that are less drastic?
Thanks,
Chris
Details:
iproute2-2.6.35.tar.bz2 package (the "ip" binary reports a version of
iproute2-ss100804)
2.6.27.18 kernel, ARCH is x86, kernel is 64-bit, userspace is 32-bit.
To reproduce:
1. Find a src and dst IP address that normally passes a ping test
ping -I 172.25.0.4 172.25.132.1
2. Setup a single outgoing IPsec policy that will require an IPsec SA
on the next ping packet.
setkey -c << EOF
spdadd 172.24.132.4/32[any] 172.24.136.0/32[any] any -P out ipsec
esp/transport//unique:1;
EOF
3. In a separate window/terminal, launch the following command to
monitor Netlink messages from the kernel
ip xfrm monitor acquire
4. Send a ping packet (this command will block, or fail depending on
your kernel config)
ping -I 172.25.0.4 172.25.132.1
5. The "ip xfrm monitor acquire" command displays something similar to
this:
!!!Deficit 72, rta_len=1
acquire proto esp
sel src 172.25.0.4/32 dst 172.25.132.1/32 proto udp sport 44136 dport 1025
policy src 172.25.0.4/32 dst 172.25.132.1/32
dir out priority 2147483648 ptype main
6. The "!!!Deficit 72, rta_len=1" string at the beginning of the
message is complaining about mismatches between the total reported
length of the Netlink message and the useable length detected. Also,
the ACQUIRE message is incomplete as shown--there are attributes such as
the reqId value that are not displayed.
7. Now clean up after yourself and take down the ipsec policy:
setkey -c << EOF
spddelete 172.24.132.4/32[any] 172.24.136.0/32[any] any -P out ipsec
esp/transport//unique:1;
EOF
--
Chris Friesen
Software Developer
GENBAND
chris.friesen@...band.com
www.genband.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists