From: Antony Antony <antony@phenome.org>
To: Dan Carpenter <dan.carpenter@linaro.org>
Cc: oe-kbuild@lists.linux.dev,
Antony Antony <antony.antony@secunet.com>,
Steffen Klassert <steffen.klassert@secunet.com>,
Herbert Xu <herbert@gondor.apana.org.au>,
netdev@vger.kernel.org, lkp@intel.com,
oe-kbuild-all@lists.linux.dev,
"David S . Miller" <davem@davemloft.net>,
Eric Dumazet <edumazet@google.com>,
Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>,
Chiachang Wang <chiachangwang@google.com>,
Yan Yan <evitayan@google.com>,
devel@linux-ipsec.org, Simon Horman <horms@kernel.org>,
Paul Moore <paul@paul-moore.com>,
Stephen Smalley <stephen.smalley.work@gmail.com>,
Ondrej Mosnacek <omosnace@redhat.com>,
linux-kernel@vger.kernel.org, selinux@vger.kernel.org
Subject: Re: [devel-ipsec] Re: [PATCH ipsec-next v2 4/4] xfrm: add XFRM_MSG_MIGRATE_STATE for single SA migration
Date: Mon, 19 Jan 2026 09:21:51 +0100 [thread overview]
Message-ID: <aW3pnybMNWNlIRH7@Antony2201.local> (raw)
In-Reply-To: <202601190605.ZVkgcUYl-lkp@intel.com>
Hi Dan,
On Mon, Jan 19, 2026 at 08:27:25AM +0300, Dan Carpenter via Devel wrote:
> Hi Antony,
>
> kernel test robot noticed the following build warnings:
>
> https://git-scm.com/docs/git-format-patch#_base_tree_information]
>
> url: https://github.com/intel-lab-lkp/linux/commits/Antony-Antony/xfrm-remove-redundant-assignments/20260118-041031
> base: https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git master
> patch link: https://lore.kernel.org/r/951cb30ac3866c6075bc7359d0997dbffc3ce6da.1768679141.git.antony.antony%40secunet.com
> patch subject: [PATCH ipsec-next v2 4/4] xfrm: add XFRM_MSG_MIGRATE_STATE for single SA migration
> config: hexagon-randconfig-r072-20260118 (https://download.01.org/0day-ci/archive/20260119/202601190605.ZVkgcUYl-lkp@intel.com/config)
> compiler: clang version 22.0.0git (https://github.com/llvm/llvm-project 9b8addffa70cee5b2acc5454712d9cf78ce45710)
> smatch version: v0.5.0-8985-g2614ff1a
>
> If you fix the issue in a separate patch/commit (i.e. not just a new version of
> the same patch/commit), kindly add following tags
> | Reported-by: kernel test robot <lkp@intel.com>
> | Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
> | Closes: https://lore.kernel.org/r/202601190605.ZVkgcUYl-lkp@intel.com/
>
> New smatch warnings:
> net/xfrm/xfrm_user.c:3299 xfrm_do_migrate_state() warn: missing error code? 'err'
Looking at this more closely, xfrm_user_state_lookup() always sets *errp
when it returns NULL.
> Old smatch warnings:
> net/xfrm/xfrm_user.c:1024 xfrm_add_sa() warn: missing error code? 'err'
> net/xfrm/xfrm_user.c:2248 xfrm_add_policy() warn: missing error code? 'err'
> net/xfrm/xfrm_user.c:3018 xfrm_add_acquire() warn: missing error code 'err'
Also, as the "Old smatch warnings" show, this same pattern exists elsewhere
in the file, most of the calls to xfrm_user_state_lookup().
I'm inclined to leave it as is rather than change a pattern that's
consistent throughout the file. Does smatch follow the code doing
cross-function analysis? In this case, look into xfrm_user_state_lookup()
and further down to see that *errp is set when NULL is returned?
Thanks
-antony
> vim +/err +3299 net/xfrm/xfrm_user.c
>
> d3019c1db87425 Antony Antony 2026-01-17 3240 static int xfrm_do_migrate_state(struct sk_buff *skb, struct nlmsghdr *nlh,
> d3019c1db87425 Antony Antony 2026-01-17 3241 struct nlattr **attrs, struct netlink_ext_ack *extack)
> d3019c1db87425 Antony Antony 2026-01-17 3242 {
> d3019c1db87425 Antony Antony 2026-01-17 3243 int err = -ESRCH;
> d3019c1db87425 Antony Antony 2026-01-17 3244 struct xfrm_state *x;
> d3019c1db87425 Antony Antony 2026-01-17 3245 struct net *net = sock_net(skb->sk);
> d3019c1db87425 Antony Antony 2026-01-17 3246 struct xfrm_encap_tmpl *encap = NULL;
> d3019c1db87425 Antony Antony 2026-01-17 3247 struct xfrm_user_offload *xuo = NULL;
> d3019c1db87425 Antony Antony 2026-01-17 3248 struct xfrm_migrate m = { .old_saddr.a4 = 0,};
> d3019c1db87425 Antony Antony 2026-01-17 3249 struct xfrm_user_migrate_state *um = nlmsg_data(nlh);
> d3019c1db87425 Antony Antony 2026-01-17 3250
> d3019c1db87425 Antony Antony 2026-01-17 3251 if (!um->id.spi) {
> d3019c1db87425 Antony Antony 2026-01-17 3252 NL_SET_ERR_MSG(extack, "Invalid SPI 0x0");
> d3019c1db87425 Antony Antony 2026-01-17 3253 return -EINVAL;
> d3019c1db87425 Antony Antony 2026-01-17 3254 }
> d3019c1db87425 Antony Antony 2026-01-17 3255
> d3019c1db87425 Antony Antony 2026-01-17 3256 err = copy_from_user_migrate_state(&m, um);
> d3019c1db87425 Antony Antony 2026-01-17 3257 if (err)
> d3019c1db87425 Antony Antony 2026-01-17 3258 return err;
> d3019c1db87425 Antony Antony 2026-01-17 3259
> d3019c1db87425 Antony Antony 2026-01-17 3260 x = xfrm_user_state_lookup(net, &um->id, attrs, &err);
> d3019c1db87425 Antony Antony 2026-01-17 3261
> d3019c1db87425 Antony Antony 2026-01-17 3262 if (x) {
> d3019c1db87425 Antony Antony 2026-01-17 3263 struct xfrm_state *xc;
> d3019c1db87425 Antony Antony 2026-01-17 3264
> d3019c1db87425 Antony Antony 2026-01-17 3265 if (!x->dir) {
> d3019c1db87425 Antony Antony 2026-01-17 3266 NL_SET_ERR_MSG(extack, "State direction is invalid");
> d3019c1db87425 Antony Antony 2026-01-17 3267 err = -EINVAL;
> d3019c1db87425 Antony Antony 2026-01-17 3268 goto error;
> d3019c1db87425 Antony Antony 2026-01-17 3269 }
> d3019c1db87425 Antony Antony 2026-01-17 3270
> d3019c1db87425 Antony Antony 2026-01-17 3271 if (attrs[XFRMA_ENCAP]) {
> d3019c1db87425 Antony Antony 2026-01-17 3272 encap = kmemdup(nla_data(attrs[XFRMA_ENCAP]),
> d3019c1db87425 Antony Antony 2026-01-17 3273 sizeof(*encap), GFP_KERNEL);
> d3019c1db87425 Antony Antony 2026-01-17 3274 if (!encap) {
> d3019c1db87425 Antony Antony 2026-01-17 3275 err = -ENOMEM;
> d3019c1db87425 Antony Antony 2026-01-17 3276 goto error;
> d3019c1db87425 Antony Antony 2026-01-17 3277 }
> d3019c1db87425 Antony Antony 2026-01-17 3278 }
> d3019c1db87425 Antony Antony 2026-01-17 3279 if (attrs[XFRMA_OFFLOAD_DEV]) {
> d3019c1db87425 Antony Antony 2026-01-17 3280 xuo = kmemdup(nla_data(attrs[XFRMA_OFFLOAD_DEV]),
> d3019c1db87425 Antony Antony 2026-01-17 3281 sizeof(*xuo), GFP_KERNEL);
> d3019c1db87425 Antony Antony 2026-01-17 3282 if (!xuo) {
> d3019c1db87425 Antony Antony 2026-01-17 3283 err = -ENOMEM;
> d3019c1db87425 Antony Antony 2026-01-17 3284 goto error;
> d3019c1db87425 Antony Antony 2026-01-17 3285 }
> d3019c1db87425 Antony Antony 2026-01-17 3286 }
> d3019c1db87425 Antony Antony 2026-01-17 3287 xc = xfrm_state_migrate(x, &m, encap, net, xuo, extack);
> d3019c1db87425 Antony Antony 2026-01-17 3288 if (xc) {
> d3019c1db87425 Antony Antony 2026-01-17 3289 xfrm_state_delete(x);
> d3019c1db87425 Antony Antony 2026-01-17 3290 xfrm_send_migrate_state(um, encap, xuo);
> d3019c1db87425 Antony Antony 2026-01-17 3291 err = 0;
> d3019c1db87425 Antony Antony 2026-01-17 3292 } else {
> d3019c1db87425 Antony Antony 2026-01-17 3293 if (extack && !extack->_msg)
> d3019c1db87425 Antony Antony 2026-01-17 3294 NL_SET_ERR_MSG(extack, "State migration clone failed");
> d3019c1db87425 Antony Antony 2026-01-17 3295 err = -EINVAL;
> d3019c1db87425 Antony Antony 2026-01-17 3296 }
> d3019c1db87425 Antony Antony 2026-01-17 3297 } else {
> d3019c1db87425 Antony Antony 2026-01-17 3298 NL_SET_ERR_MSG(extack, "Can not find state");
> d3019c1db87425 Antony Antony 2026-01-17 @3299 return err;
>
> s/err/-ESRCH/. err is zero/success here.
>
> d3019c1db87425 Antony Antony 2026-01-17 3300 }
> d3019c1db87425 Antony Antony 2026-01-17 3301 error:
> d3019c1db87425 Antony Antony 2026-01-17 3302 xfrm_state_put(x);
> d3019c1db87425 Antony Antony 2026-01-17 3303 kfree(encap);
> d3019c1db87425 Antony Antony 2026-01-17 3304 kfree(xuo);
> d3019c1db87425 Antony Antony 2026-01-17 3305 return err;
> d3019c1db87425 Antony Antony 2026-01-17 3306 }
>
> --
> 0-DAY CI Kernel Test Service
> https://github.com/intel/lkp-tests/wiki
>
> --
> Devel mailing list -- devel@lists.linux-ipsec.org
> To unsubscribe send an email to devel-leave@lists.linux-ipsec.org
next prev parent reply other threads:[~2026-01-19 8:22 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-17 20:04 [PATCH ipsec-next v2 0/4] xfrm: XFRM_MSG_MIGRATE_STATE new netlink message Antony Antony
2026-01-17 19:58 ` [PATCH ipsec-next v2 1/4] xfrm: remove redundant assignments Antony Antony
2026-01-17 19:59 ` Antony Antony
2026-01-17 20:06 ` Antony Antony
2026-01-17 20:06 ` [PATCH ipsec-next v2 2/4] xfrm: allow migration from UDP encapsulated to non-encapsulated ESP Antony Antony
2026-01-17 20:07 ` [PATCH ipsec-next v2 3/4] xfrm: rename reqid in xfrm_migrate Antony Antony
2026-01-17 20:07 ` [PATCH ipsec-next v2 4/4] xfrm: add XFRM_MSG_MIGRATE_STATE for single SA migration Antony Antony
2026-01-19 5:27 ` Dan Carpenter
2026-01-19 8:21 ` Antony Antony [this message]
2026-01-19 8:55 ` [devel-ipsec] " Dan Carpenter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aW3pnybMNWNlIRH7@Antony2201.local \
--to=antony@phenome.org \
--cc=antony.antony@secunet.com \
--cc=chiachangwang@google.com \
--cc=dan.carpenter@linaro.org \
--cc=davem@davemloft.net \
--cc=devel@linux-ipsec.org \
--cc=edumazet@google.com \
--cc=evitayan@google.com \
--cc=herbert@gondor.apana.org.au \
--cc=horms@kernel.org \
--cc=kuba@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=lkp@intel.com \
--cc=netdev@vger.kernel.org \
--cc=oe-kbuild-all@lists.linux.dev \
--cc=oe-kbuild@lists.linux.dev \
--cc=omosnace@redhat.com \
--cc=pabeni@redhat.com \
--cc=paul@paul-moore.com \
--cc=selinux@vger.kernel.org \
--cc=steffen.klassert@secunet.com \
--cc=stephen.smalley.work@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox