Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2958187ybk; Tue, 12 May 2020 12:18:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7gYqUxFGfpvZbwClbeq/iBYhyAzALXW8b4AgpVUlsrahh4OE42Ql9P31dDWRZ/+4JpvOb X-Received: by 2002:a50:fb1a:: with SMTP id d26mr7062796edq.83.1589311127863; Tue, 12 May 2020 12:18:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589311127; cv=none; d=google.com; s=arc-20160816; b=dGcgjaIGx5taNClSaEBPg8JU3C0ewAltgmT3VN3UqLbuKF9iXq0lc1tbon/TfTwIaO 9QGCYX54W2Vy/PUfrGqAjadkVMBA26QZDiTKH1bmIlkzcMmB3AGQBC33JDHIeAg5VzuU W9X+HesWa5wogdS3M4nOoLGbMsgof64yh/yuJzSGTWgxRRtW4anKpSarIrNGMJBije6y Ob98RQmXI2DJRHQpi0dfv/uCyDB6lT5gVqmORSDh2mCuJ+PRjr/m7UHDS+Kfwkc+JqXw tFZaWllcXnL2vEZTXwMvTzT/IKAJb2BWwP3Zu7o3apxZ/QLHgORuAowS+Jk1e2o+HJ8v dNtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:cc; bh=d8xhA4qK5fjAHJuory/F9nuNi6SGtmVprprlMdIlMLo=; b=01x/6MtuhtyuUgvT1LOZilodWa0K1l3Z18zdERhEwYx481FCvp1kLcy4OB1JIfHjVx fyG506cKsH2iHZIKzvjQlL6a1GuTtwgHBfFOemFGBguSLe+/jgTsP07lgr6o4eq0KIIt AhWizXJGiAPnQVhUOOhdNrKsEyUs5Gs95YVmeJo2iwMpA3zwxAT+px6/D/qkDsBpNO0I PrzfxIaay5bzzpAkxM1a5M3ImOMWNj1F5iEThPMJOd5+5FzroMz/5N18j7XR9IgiXM5B N+SpA0htSsdkTW4sI6KEU8kPhranUr3vdwodRp1a/kSdkhChxUeVK8ax4OT4beGSqA8s s0/g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f4si6449529ejb.362.2020.05.12.12.18.16; Tue, 12 May 2020 12:18:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725938AbgELTSP (ORCPT + 99 others); Tue, 12 May 2020 15:18:15 -0400 Received: from stargate.chelsio.com ([12.32.117.8]:19119 "EHLO stargate.chelsio.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727825AbgELTSP (ORCPT ); Tue, 12 May 2020 15:18:15 -0400 Received: from [10.193.177.158] (venkateshellapu.asicdesigners.com [10.193.177.158] (may be forged)) by stargate.chelsio.com (8.13.8/8.13.8) with ESMTP id 04CJHlot018430; Tue, 12 May 2020 12:17:48 -0700 Cc: ayush.sawal@asicdesigners.com, Vinay Kumar Yadav , Rohit Maheshwari , Herbert Xu , "David S. Miller" , linux-crypto@vger.kernel.org, kernel-janitors@vger.kernel.org Subject: Re: [PATCH] Crypto/chcr: drop refcount on error path in chcr_aead_op() To: Dan Carpenter , Devulapally Shiva Krishna References: <20200512083723.GB251760@mwanda> From: Ayush Sawal Message-ID: <20d2f5c2-d9f0-0016-b33a-5c417dfe9558@chelsio.com> Date: Wed, 13 May 2020 00:48:40 +0530 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <20200512083723.GB251760@mwanda> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 5/12/2020 2:07 PM, Dan Carpenter wrote: > We need to drop inflight counter before returning on this error path. > > Fixes: d91a3159e8d9 ("Crypto/chcr: fix gcm-aes and rfc4106-gcm failed tests") > Signed-off-by: Dan Carpenter > --- > drivers/crypto/chelsio/chcr_algo.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/drivers/crypto/chelsio/chcr_algo.c b/drivers/crypto/chelsio/chcr_algo.c > index 83ddc2b39490e..e05998a1c0148 100644 > --- a/drivers/crypto/chelsio/chcr_algo.c > +++ b/drivers/crypto/chelsio/chcr_algo.c > @@ -3744,6 +3744,7 @@ static int chcr_aead_op(struct aead_request *req, > crypto_ipsec_check_assoclen(req->assoclen) != 0) { > pr_err("RFC4106: Invalid value of assoclen %d\n", > req->assoclen); > + chcr_dec_wrcount(cdev); > return -EINVAL; > } > Looks good. Thanks a lot.