Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4117003rdb; Mon, 11 Dec 2023 09:15:42 -0800 (PST) X-Google-Smtp-Source: AGHT+IFtlylFE7+xIWkA3ECnxgebfEItsvU/ShO7/DPuzo9qA4tf10D7xe9erHj/FA4pZeNbSbwW X-Received: by 2002:a05:6871:3316:b0:1fa:fb70:63c5 with SMTP id nf22-20020a056871331600b001fafb7063c5mr2430762oac.25.1702314942735; Mon, 11 Dec 2023 09:15:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702314942; cv=none; d=google.com; s=arc-20160816; b=tqkUFDQvDS9v54VHODWTDuHp3oAz0truquUNIAPc4+Zewht8p8VGU5TKkWkWf5/fJh 0lb6BmBDi3w7ONT8Z0hd1fz/k5z5bWaS3Mj5JgCEncTehtRarXCUDzeEpXQV7MEemr4U SVduJB0VDk6IG9VV9GPJAD+MrhgGEjJXPtOxRyoWg/0FZarLKIMXghuQbtwurVwRanw3 gncujq5GQjTrRp90KQRHlv053J2cxsOHK9B32xoF/5JtIy2UZwk7cdWvb1eH6wVI7Th9 gnKCxZyFc2ZqsuTeQegOB8LkhNxejGH8Rjvcer6um1vJNDkBn6Fx3/t4R/P1HVA0AZib X3TQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=ZvU18zxJ01tnUh/eX/o4VKN//pQQRdx4hSQuFFMwHLk=; fh=H7DxMfm/ATiu3tVyPItSY0FvYxA7aN+5BobM5v06lgo=; b=Vnk9raOJXuGzx87sXk/CL+kOa/ed7Zzb82daEg68PQ6pBvWKTPbuDhUfoZJi7UBDC+ MJfHiH9t31bDtZlmhCR1IrNZ7mLXVtZYRYrPbfpjHYKxngfSdorTh43hSLXgOrVRdk11 I4SG9oJGUwtmfxff/WXj0EsxYSeDBBitchtylov51sNK3bcXB5InnCPfLyVzlPo6Wl9A Da1vfv6YisIxXn5uEd9fEq4k7jKtE7u2MzS8IjtC9xV8kJOmVknUWxajvkd/3Lj1gM7d 9XvKwuuKa6qdqpu6/8V8LBHjBrfNYYSCafihYUnyr4EGx6h2onK4bgMhbqNXTNh2ggYW OmOw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=jOnPPeyL; spf=pass (google.com: domain of linux-crypto+bounces-700-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-crypto+bounces-700-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id f11-20020a05620a20cb00b0077f2f3f3b53si8195307qka.774.2023.12.11.09.15.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 09:15:42 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-700-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=jOnPPeyL; spf=pass (google.com: domain of linux-crypto+bounces-700-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-crypto+bounces-700-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 73D071C2127E for ; Mon, 11 Dec 2023 17:15:42 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C96BC4D582; Mon, 11 Dec 2023 17:15:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="jOnPPeyL" X-Original-To: linux-crypto@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 746324D124; Mon, 11 Dec 2023 17:15:37 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 30C41C433C8; Mon, 11 Dec 2023 17:15:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1702314937; bh=MJ+00uPzODpLjfEGtn7k64AAHGSiP2ouDU3nlnvb6R8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jOnPPeyLYo/dg5XoNlHDtZMHSS8PR802ejt4+UH6tfeqjSE4Mx8d4W0UXEUJzUdER R4SpDa3vl42ckZiGyA2KJob4C5hryA563Uv3qtmBGcJrBvxpQ0LoHDvLAbhFd2qOJk yMsjGWN2QXtD2bJOBNhx1PWkcbUNN/GeYjQKvPcYXXxUaOyFl0410alb1mRoqj3C88 dH/qX0RugVmtoYj6q7LAVAxfjNMip8FgSb7pA66DbYU+ANgRV5+mXte8ifkVN2NAx6 /iDNh0K0wDpzMFrUpywU1Rc6KOYjDDdAUI9dwcmUXjQD+TMNOis1qkJboFRlZyAIZL FnZ1pBbr87Xpg== Date: Mon, 11 Dec 2023 17:15:30 +0000 From: Simon Horman To: Srujana Challa Cc: herbert@gondor.apana.org.au, davem@davemloft.net, kuba@kernel.org, linux-crypto@vger.kernel.org, netdev@vger.kernel.org, linux-doc@vger.kernel.org, bbrezillon@kernel.org, arno@natisbad.org, pabeni@redhat.com, edumazet@google.com, corbet@lwn.net, sgoutham@marvell.com, bbhushan2@marvell.com, jerinj@marvell.com, sbhatta@marvell.com, hkelam@marvell.com, lcherian@marvell.com, gakula@marvell.com, ndabilpuram@marvell.com Subject: Re: [PATCH net-next v1 09/10] crypto/octeontx2: register error interrupts for inline cptlf Message-ID: <20231211171530.GP5817@kernel.org> References: <20231211071913.151225-1-schalla@marvell.com> <20231211071913.151225-10-schalla@marvell.com> Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231211071913.151225-10-schalla@marvell.com> On Mon, Dec 11, 2023 at 12:49:12PM +0530, Srujana Challa wrote: > From: Nithin Dabilpuram > > Register errors interrupts for inline cptlf attached to PF driver > so that SMMU faults and other errors can be reported. > > Signed-off-by: Nithin Dabilpuram ... > diff --git a/drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c b/drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c > index 7d44b54659bf..79afa3a451a7 100644 > --- a/drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c > +++ b/drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c > @@ -725,7 +725,7 @@ static int otx2_cptpf_probe(struct pci_dev *pdev, > { > struct device *dev = &pdev->dev; > struct otx2_cptpf_dev *cptpf; > - int err; > + int err, num_vec; > > cptpf = devm_kzalloc(dev, sizeof(*cptpf), GFP_KERNEL); > if (!cptpf) > @@ -760,8 +760,11 @@ static int otx2_cptpf_probe(struct pci_dev *pdev, > if (err) > goto clear_drvdata; > > - err = pci_alloc_irq_vectors(pdev, RVU_PF_INT_VEC_CNT, > - RVU_PF_INT_VEC_CNT, PCI_IRQ_MSIX); > + num_vec = pci_msix_vec_count(cptpf->pdev); > + if (num_vec <= 0) > + goto clear_drvdata; Hi Srujana and Nithin, This goto will result in the function returning err. However, err is 0 here. Perhaps it should be set to a negative error value instead? Flagged by Smatch. > + > + err = pci_alloc_irq_vectors(pdev, num_vec, num_vec, PCI_IRQ_MSIX); > if (err < 0) { > dev_err(dev, "Request for %d msix vectors failed\n", > RVU_PF_INT_VEC_CNT); ...