public inbox for netdev@vger.kernel.org
 help / color / mirror / Atom feed
From: Sabrina Dubroca <sd@queasysnail.net>
To: Antony Antony <antony@phenome.org>
Cc: Antony Antony <antony.antony@secunet.com>,
	Steffen Klassert <steffen.klassert@secunet.com>,
	Herbert Xu <herbert@gondor.apana.org.au>,
	netdev@vger.kernel.org, "David S . Miller" <davem@davemloft.net>,
	Eric Dumazet <edumazet@google.com>,
	Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>,
	Chiachang Wang <chiachangwang@google.com>,
	Yan Yan <evitayan@google.com>,
	devel@linux-ipsec.org, Simon Horman <horms@kernel.org>,
	linux-kernel@vger.kernel.org
Subject: Re: [devel-ipsec] Re: [PATCH ipsec-next v5 7/8] xfrm: add error messages to state migration
Date: Thu, 26 Feb 2026 17:59:52 +0100	[thread overview]
Message-ID: <aaB8CL1uZ8_PzyLA@krikkit> (raw)
In-Reply-To: <aaBqGgkGWfjPdJRv@Antony2201.local>

2026-02-26, 16:43:22 +0100, Antony Antony wrote:
> On Fri, Jan 30, 2026 at 01:14:39PM +0100, Sabrina Dubroca via Devel wrote:
> > 2026-01-27, 11:43:42 +0100, Antony Antony wrote:
> > > Add descriptive(extack) error messages for all error paths
> > > in state migration. This improves diagnostics by
> > > providing clear feedback when migration fails.
> > > 
> > > Signed-off-by: Antony Antony <antony.antony@secunet.com>
> > > ---
> > > v4->v5: - added this patch
> > > ---
> > >  net/xfrm/xfrm_state.c | 13 ++++++++++---
> > >  1 file changed, 10 insertions(+), 3 deletions(-)
> > > 
> > > diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
> > > index 88a362e46972..2e03871ae872 100644
> > > --- a/net/xfrm/xfrm_state.c
> > > +++ b/net/xfrm/xfrm_state.c
> > > @@ -2129,15 +2129,21 @@ struct xfrm_state *xfrm_state_migrate_create(struct xfrm_state *x,
> > >  	struct xfrm_state *xc;
> > > 
> > >  	xc = xfrm_state_clone_and_setup(x, encap, m);
> > > -	if (!xc)
> > > +	if (!xc) {
> > > +		NL_SET_ERR_MSG(extack, "Failed to clone and setup state");
> > 
> > When xfrm_state_clone_and_setup fails it's because some allocation
> > failed and the user won't be able to do much about this, right? I
> > don't feel extack in those situations is super helpful.
> 
> I felt it was usefaul to know, and to log this happened. May not a great 
> idea.

I don't have a super strong opinion. IIRC that was the approach I
picked when I added extack (no extack for kernel events that the user
can't do anything about and don't result from an invalid netlink
message), but maybe that kind of stuff deserves an extack too.

Also, I thought that something that ends up returning ENOMEM to
userspace is explicit enough, without adding a string "failed to
allocate memory for $object" in extack. But I don't work on *swan, so
maybe it's more useful than I think.

(Steffen has the final word, and you're closer to him than I am :))


> > >  		return NULL;
> > > +	}
> > > 
> > > -	if (xfrm_init_state(xc) < 0)
> > > +	if (xfrm_init_state(xc) < 0) {
> > > +		NL_SET_ERR_MSG(extack, "Failed to initialize migrated state");
> > 
> > xfrm_init_state itself doesn't handle extack, but it's just a wrapper
> > around functions that do. Maybe better to make xfrm_init_state
> > propagate extack?
> 
> That is a great idea. May be in a future patch set. For now, I will drop 
> this patch from this series. To move forward quickly.

Ok. Or keep the patch with just the fixup right below this, I'm not
NACKing it.

> > >  		goto error;
> > > +	}
> > > 
> > >  	/* configure the hardware if offload is requested */
> > > -	if (xuo && xfrm_dev_state_add(net, xc, xuo, extack))
> > > +	if (xuo && xfrm_dev_state_add(net, xc, xuo, extack)) {
> > > +		NL_SET_ERR_MSG(extack, "Failed to initialize state offload");
> > 
> > We already set an extack in xfrm_dev_state_add, this chunk should be
> > dropped to avoid overwriting the more specific info we got.
> > 
> > >  		goto error;
> > > +	}
> > > 
> > >  	return xc;
> > >  error:
> > > @@ -2161,6 +2167,7 @@ int xfrm_state_migrate_install(const struct xfrm_state *x,
> > >  		xfrm_state_insert(xc);
> > >  	} else {
> > >  		if (xfrm_state_add(xc) < 0) {
> > > +			NL_SET_ERR_MSG(extack, "Failed to add migrated state");
> > 
> > Not a strong objection, but this case would be the EEXIST situation
> > from xfrm_state_add, and there's not much the user can do about this?
> 
> Fair point, but logging it still has value too, userspace can track these
> over time and adapt. Let's revisit when we add extack to xfrm_init_state.

Ok.

> > >  			if (xuo)
> > >  				xfrm_dev_state_delete(xc);
> > >  			xc->km.state = XFRM_STATE_DEAD;
> > 

-- 
Sabrina

  reply	other threads:[~2026-02-26 16:59 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-27 10:41 [PATCH ipsec-next v5 0/8] xfrm: XFRM_MSG_MIGRATE_STATE new netlink message Antony Antony
2026-01-27 10:42 ` [PATCH ipsec-next v5 1/8] xfrm: add missing __rcu annotation to nlsk Antony Antony
2026-02-26 17:07   ` Sabrina Dubroca
2026-03-05  7:46     ` [devel-ipsec] " Antony Antony
2026-01-27 10:42 ` [PATCH ipsec-next v5 2/8] xfrm: remove redundant assignments Antony Antony
2026-01-27 10:42 ` [PATCH ipsec-next v5 3/8] xfrm: allow migration from UDP encapsulated to non-encapsulated ESP Antony Antony
2026-01-30 11:28   ` Sabrina Dubroca
2026-02-02 12:57     ` Antony Antony
     [not found]       ` <CADhJOfbkUFaPfxTBrmOnrEh2JvxPKpkxaRrSdJHZGxeoQsQTcw@mail.gmail.com>
2026-02-02 19:38         ` [devel-ipsec] " Antony Antony
2026-02-24  3:28           ` Yan Yan
2026-02-26 15:41             ` Antony Antony
2026-03-06  2:49               ` Yan Yan
2026-01-27 10:42 ` [PATCH ipsec-next v5 4/8] xfrm: rename reqid in xfrm_migrate Antony Antony
2026-01-27 10:43 ` [PATCH ipsec-next v5 5/8] xfrm: split xfrm_state_migrate into create and install functions Antony Antony
2026-01-27 10:43 ` [PATCH ipsec-next v5 7/8] xfrm: add error messages to state migration Antony Antony
2026-01-30 12:14   ` Sabrina Dubroca
2026-02-26 15:43     ` [devel-ipsec] " Antony Antony
2026-02-26 16:59       ` Sabrina Dubroca [this message]
2026-03-02 14:06         ` Antony Antony
2026-01-27 10:44 ` [PATCH ipsec-next v5 8/8] xfrm: add XFRM_MSG_MIGRATE_STATE for single SA migration Antony Antony
2026-02-03 21:25   ` Sabrina Dubroca
2026-02-26 15:46     ` Antony Antony
2026-02-26 18:05       ` Sabrina Dubroca
2026-03-02 14:21         ` [devel-ipsec] " Antony Antony
2026-02-27  1:44   ` Yan Yan
2026-02-27 11:26     ` [devel-ipsec] " Sabrina Dubroca
2026-02-27 23:14       ` Yan Yan
2026-03-08 14:42         ` Antony Antony
2026-03-10 11:09           ` Sabrina Dubroca
2026-03-10 16:52             ` Antony Antony
2026-03-14  0:32               ` Yan Yan
2026-03-05  7:51     ` Antony Antony
2026-01-27 10:50 ` [PATCH ipsec-next v5 6/8] xfrm: add state synchronization after migration Antony Antony

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=aaB8CL1uZ8_PzyLA@krikkit \
    --to=sd@queasysnail.net \
    --cc=antony.antony@secunet.com \
    --cc=antony@phenome.org \
    --cc=chiachangwang@google.com \
    --cc=davem@davemloft.net \
    --cc=devel@linux-ipsec.org \
    --cc=edumazet@google.com \
    --cc=evitayan@google.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=horms@kernel.org \
    --cc=kuba@kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    --cc=steffen.klassert@secunet.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox