Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3103431ybb; Mon, 6 Apr 2020 02:04:24 -0700 (PDT) X-Google-Smtp-Source: APiQypLCJpWHC1NDAuds9fUwKkg0dOkL2m+UPGm84q008bbhOkbEUwoJsM16a9d19a0URT9GVH3m X-Received: by 2002:a54:448a:: with SMTP id v10mr12182707oiv.49.1586163864829; Mon, 06 Apr 2020 02:04:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586163864; cv=none; d=google.com; s=arc-20160816; b=zB4BV/A67fildL7cuH4Vg4qYKOR+FQPHcZ+m2iw6JEOYEO2avAmwrsGcpv8xOJbFOz mdqhJkf40IRP95lGfmhEEFpBru6HWViSHpimcfRL9sfD9lA5D7+GaxBxp0pqA9XjN3mY GhPuOf6BPHi9zN46QUzk5X6JkFwM3OllKejz4YKGK95JYvYdkbxMagPERERdDW8wiCCm 6zgx1C4+qzfJzcjWKkC9BFtS7/q7K2Ul1Jt9ZwrRbplH5pPcwYKirLRqXedxBDj4IzuG bhadH6A+sSYYtIrf/zFaEALcWtLBPJlAG7fQTZmIHo1ZBryY/V5GUaT7t24sA21UF6NT NsHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=PUps25PaR0TC94XAWwS0uhdX0tq7E7/5FzaevV7Oi9I=; b=SdOz2vTIuyYrU4czr1PntQCnwCaNV+tVXiFoqa90XXYMZ4RDJ8WMFzK4zf0xV/W9Nf ZinLNaoHuVHatkUjuPKViqpOcDQPJdqQvFuYlzM4W/GR/r6Pua5mjkgiC+2izcPeFgge V9bhKXtK0NvAon73mUxauMRvkNCFC4/OaK8VMuq+2HfXwIG5iPr1fwdDpXnoGwI3X4mq TybAjf0ApYOHDn0GkYjCeue29CY3R+81zD+BQRAiGH7MQbw9N2sLbM9try2f1cwl1dk7 ky8WOPhsYejZYZjEcFp5KJklf4cqbpYhvRi45jrfJW/jRHjiU6onzArkxY+NKJHcd40X E0Pw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z78si7206638oia.200.2020.04.06.02.04.04; Mon, 06 Apr 2020 02:04:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726795AbgDFJDb (ORCPT + 99 others); Mon, 6 Apr 2020 05:03:31 -0400 Received: from a.mx.secunet.com ([62.96.220.36]:43986 "EHLO a.mx.secunet.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726533AbgDFJDa (ORCPT ); Mon, 6 Apr 2020 05:03:30 -0400 Received: from localhost (localhost [127.0.0.1]) by a.mx.secunet.com (Postfix) with ESMTP id A047820523; Mon, 6 Apr 2020 11:03:28 +0200 (CEST) X-Virus-Scanned: by secunet Received: from a.mx.secunet.com ([127.0.0.1]) by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3hYAfdPan_2n; Mon, 6 Apr 2020 11:03:28 +0200 (CEST) Received: from cas-essen-01.secunet.de (201.40.53.10.in-addr.arpa [10.53.40.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by a.mx.secunet.com (Postfix) with ESMTPS id 3730D2051F; Mon, 6 Apr 2020 11:03:28 +0200 (CEST) Received: from gauss2.secunet.de (10.182.7.193) by cas-essen-01.secunet.de (10.53.40.201) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1979.3; Mon, 6 Apr 2020 11:03:28 +0200 Received: by gauss2.secunet.de (Postfix, from userid 1000) id 9DCB53180093; Mon, 6 Apr 2020 11:03:27 +0200 (CEST) Date: Mon, 6 Apr 2020 11:03:27 +0200 From: Steffen Klassert To: Yuehaibing CC: , , , , Subject: Re: [PATCH net-next] xfrm: policy: Remove obsolete WARN while xfrm policy inserting Message-ID: <20200406090327.GF13121@gauss3.secunet.de> References: <20200327123443.12408-1-yuehaibing@huawei.com> <20200328112302.GA13121@gauss3.secunet.de> <1d3596fb-c7e3-16c9-f48f-fe58e9a2569a@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1d3596fb-c7e3-16c9-f48f-fe58e9a2569a@huawei.com> User-Agent: Mutt/1.9.4 (2018-02-28) X-ClientProxiedBy: cas-essen-01.secunet.de (10.53.40.201) To cas-essen-01.secunet.de (10.53.40.201) X-EXCLAIMER-MD-CONFIG: 2c86f778-e09b-4440-8b15-867914633a10 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 30, 2020 at 10:05:32PM +0800, Yuehaibing wrote: > On 2020/3/28 19:23, Steffen Klassert wrote: > > On Fri, Mar 27, 2020 at 08:34:43PM +0800, YueHaibing wrote: > >> Since commit 7cb8a93968e3 ("xfrm: Allow inserting policies with matching > >> mark and different priorities"), we allow duplicate policies with > >> different priority, this WARN is not needed any more. > > > > Can you please describe a bit more detailed why this warning > > can't trigger anymore? > > No, this warning is triggered while detect a duplicate entry in the policy list > > regardless of the priority. If we insert policy like this: > > policy A (mark.v = 3475289, mark.m = 0, priority = 1) //A is inserted > policy B (mark.v = 0, mark.m = 0, priority = 0) //B is inserted > policy C (mark.v = 3475289, mark.m = 0, priority = 0) //C is inserted and B is deleted The codepath that replaces a policy by another should just trigger on policy updates (XFRM_MSG_UPDPOLICY). Is that the case in your test? It should not be possible to add policy C with XFRM_MSG_NEWPOLICY as long as you have policy B inserted. The update replaces an old policy by a new one, the lookup keys of the old policy must match the lookup keys of the new one. But policy B has not the same lookup keys as C, the mark is different. So B should not be replaced with C. > policy D (mark.v = 3475289, mark.m = 0, priority = 1) > > while finding delpol in xfrm_policy_insert_list, > first round delpol is matched C, whose priority is less than D, so contiue the loop, > then A is matched, WARN_ON is triggered. It seems the WARN is useless. Looks like the warning is usefull, it found a bug.