[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CADHa2dChQ=4UVY5X5Ad=jryGRCBPQ37Z_Sw60-6h6h_EcUFG9g@mail.gmail.com>
Date: Wed, 28 Jan 2026 16:43:06 +0800
From: Yan Yan <evitayan@...gle.com>
To: netdev@...r.kernel.org
Cc: Steffen Klassert <steffen.klassert@...unet.com>, Herbert Xu <herbert@...dor.apana.org.au>,
antony.antony@...unet.com, "David S . Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, pabeni@...hat.com,
horms@...nel.org, saakashkumar@...vell.com, akamluddin@...vell.com,
Nathan Harold <nharold@...gle.com>, greg@...ah.com
Subject: [REGRESSION] Discussion on "xfrm: Duplicate SPI Handling"
Hi all,
I am writing because unfortunately commit: 94f39804d891 ("xfrm:
Duplicate SPI Handling") has caused a regression in the Android OS, so
we would like to gain some context to help determine next steps. The
issue is caused by the new requirement for global SPI uniqueness
during allocation. Based on our review of RFC 4301 and the previous
review history, we would like to highlight a few concerns:
1. Regression on Android:
This change breaks production behavior in Android, which uses
XFRM_MSG_ALLOCSPI to create larval SAs for both directions. Since RFC
4301 allows duplicate outbound SPIs, and larval SAs are often created
before direction or selectors are finalized, the allocator must remain
permissive (at least in our current design).
This also aligns with a concern Herbert Xu raised during the initial
review regarding compatibility:
> "It's also dangerous to unilaterally do this since existing deployments
> could rely on the old behaviour. You'd need to add a toggle for
> compatibility."
2. Inbound SPI uniqueness should not be a hard requirement:
The justification for enforcing global SPI uniqueness often cites the
statement in RFC 4301, Section 4.1, that for unicast traffic, the SPI
"by itself suffices to specify an SA." However, we don’t think this
means inbound SPI uniqueness is a hard requirement because of the two
following reasons:
– Another statement implies that SPI uniqueness is just an
implementation choice:
> "Each entry in the SA Database (SAD) MUST
> indicate whether the SA lookup makes use of the destination IP address, or the
> destination and source IP addresses, in addition to the SPI."
– There is a "Longest Match" mandate which makes SPI uniqueness unnecessary:
> "For each inbound, IPsec-protected packet, an implementation MUST
> conduct its search of the SAD such that it finds the entry that
> matches the 'longest' SA identifier. In this context, if two or more
> SAD entries match based on the SPI value, then the entry that also
> matches based on destination address... is the 'longest' match."
3. Further clarification on the specific problem being addressed would
be helpful. The "real-world" problem this commit intends to fix
remains unclear. The patch mentions:
> "This behavior causes inconsistencies during SPI lookups for inbound packets.
> Since the lookup may return an arbitrary SA among those with the same SPI,
> packet processing can fail, resulting in packet drops."
However, Linux kernel lookups using the triplet (SPI, Protocol, Daddr)
are deterministic. The lookup will not return an "arbitrary" SA
because the destination address is used to disambiguate the state.
As Antony suggested, this change may cater to SPI-only hardware
indexing. If that is the case, we are concerned about applying such
hardware-specific limits to the software stack, especially if the
behavior is not opt-in, as it appears to require an overly-narrow
reading of the RFC 4301.
Given these concerns, would it be possible to discuss a revert or,
alternatively, could further context be provided regarding the
specific real-world problem this commit was intended to address? Once
the underlying issue is clearly defined, we can work together to find
a backward-compatible solution that satisfies all requirements.
Review threads are attached for easy reference:
https://lore.kernel.org/netdev/aDQhZ_ikHEt_pLn_@gondor.apana.org.au/T/#r45c1786651ce5af730f757aca7438474d494a323
https://lore.kernel.org/netdev/20250616100621.837472-1-saakashkumar@marvell.com/T/#u
Best regards,
Yan (on behalf of the Android IPsec team)
Powered by blists - more mailing lists