Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1241004imm; Wed, 20 Jun 2018 14:14:07 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLxeXS/oaOCTMCjGQ7QCPB0Hrjo8YwIuhluxegxEb0ecs+CqhaSE2SQFuV8Le3B5ORAL5EW X-Received: by 2002:aa7:8345:: with SMTP id z5-v6mr24801562pfm.251.1529529247056; Wed, 20 Jun 2018 14:14:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529529247; cv=none; d=google.com; s=arc-20160816; b=NT2gIGGdDmuX4QcQ4pF8Y5sPLQRtkZ5daj//l8nSfwfYZ7yNgyeL97KmSMGwzJ4q5E e5K/qhtfG5ZVuI9usbxHbvhybGL3uMNjWxmKa5gW6pZCx7SYTTLHJSOon0Bsix+L/vF7 7H1raAcXfbcSeEJyhuePoCb15TRnJjoX5snbhUb58JinV3LoBuK4JzXCAt4Wk8b4WEoT CjdOggo9s7dGqWml6DsN1ZpbEyO8fqtr17QsgX0uwecoBmMDGP/hnvARTw5yzeq5Qxh8 xYNtZgUuhuWmvyzz/67/gQ6pM1eoAGVfN7fIjX9caIWZTY4B1je1HwYURuYBMH8Zx69b 1z1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :from:references:cc:to:subject:arc-authentication-results; bh=jiCVgCPSzN2V6qmAbhL9nz8NEG9OvzzKXkSkRIC0h0E=; b=Oun1wQ+uJWR8mALKsc5VEEaiLk2M1Pz3JRqrh0MZzeji8i8rZg2Aj9B+qp5KWAw3gM WOJcx62s5EBK5HqDlxPSeW+CDilIUnJhWCb4TX1cjP4YksrwXD4Yykf22CHFXv6RXaiN oz9zjuO4uLANHDrVbHjhLTqes4aVwsDsa2h0XednJU/PlajeIfY/YA5ERTFuZWzx9Niq 4Qyvym0yrVzw3KRRDiLR+a7OLDbU+8ELyPsmUEZF2xZCCecb++WPpILHDDRgySig5x3M 9KotLK6qx0/M0e+j8Moz+GYbIPWmmtHj4JJChYnhg7yQwTHODyhU7HRIh28AcyhLLs8y qNlQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o24-v6si3181180pfk.276.2018.06.20.14.13.52; Wed, 20 Jun 2018 14:14:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933384AbeFTVNI (ORCPT + 99 others); Wed, 20 Jun 2018 17:13:08 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:36290 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932996AbeFTVNG (ORCPT ); Wed, 20 Jun 2018 17:13:06 -0400 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5KKs2b7034855 for ; Wed, 20 Jun 2018 17:13:06 -0400 Received: from e15.ny.us.ibm.com (e15.ny.us.ibm.com [129.33.205.205]) by mx0a-001b2d01.pphosted.com with ESMTP id 2jqx1xs8xw-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 20 Jun 2018 17:13:06 -0400 Received: from localhost by e15.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 20 Jun 2018 17:13:04 -0400 Received: from b01cxnp22033.gho.pok.ibm.com (9.57.198.23) by e15.ny.us.ibm.com (146.89.104.202) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 20 Jun 2018 17:13:02 -0400 Received: from b01ledav004.gho.pok.ibm.com (b01ledav004.gho.pok.ibm.com [9.57.199.109]) by b01cxnp22033.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w5KLD1E211600180 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 20 Jun 2018 21:13:01 GMT Received: from b01ledav004.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DE8A3112064; Wed, 20 Jun 2018 17:12:58 -0400 (EDT) Received: from b01ledav004.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id C5263112062; Wed, 20 Jun 2018 17:12:58 -0400 (EDT) Received: from sbct-3.pok.ibm.com (unknown [9.47.158.153]) by b01ledav004.gho.pok.ibm.com (Postfix) with ESMTP; Wed, 20 Jun 2018 17:12:58 -0400 (EDT) Subject: Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems To: Jason Gunthorpe Cc: linux-integrity@vger.kernel.org, jarkko.sakkinen@linux.intel.com, zohar@linux.vnet.ibm.com, linux-kernel@vger.kernel.org References: <20180620204236.1572523-1-stefanb@linux.vnet.ibm.com> <20180620204236.1572523-2-stefanb@linux.vnet.ibm.com> <20180620205004.GG27445@ziepe.ca> From: Stefan Berger Date: Wed, 20 Jun 2018 17:13:01 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <20180620205004.GG27445@ziepe.ca> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-MW X-TM-AS-GCONF: 00 x-cbid: 18062021-0068-0000-0000-0000030BF239 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009229; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000265; SDB=6.01049879; UDB=6.00537992; IPR=6.00828852; MB=3.00021765; MTD=3.00000008; XFM=3.00000015; UTC=2018-06-20 21:13:04 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18062021-0069-0000-0000-000044C0DBB6 Message-Id: <5acee904-ede6-d33f-33b7-3ad94fce9850@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-06-20_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1805220000 definitions=main-1806200227 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/20/2018 04:50 PM, Jason Gunthorpe wrote: > On Wed, Jun 20, 2018 at 04:42:33PM -0400, Stefan Berger wrote: >> Implement tpm_chip_find() for other subsystems to find a TPM chip and >> get a reference to that chip. Once done with using the chip, the reference >> is released using tpm_chip_put(). >> >> Signed-off-by: Stefan Berger >> drivers/char/tpm/tpm-chip.c | 37 +++++++++++++++++++++++++++++++++++++ >> include/linux/tpm.h | 9 +++++++++ >> 2 files changed, 46 insertions(+) >> >> diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c >> index 0a62c19937b6..eaaf41ce73d8 100644 >> +++ b/drivers/char/tpm/tpm-chip.c >> @@ -81,6 +81,43 @@ void tpm_put_ops(struct tpm_chip *chip) >> EXPORT_SYMBOL_GPL(tpm_put_ops); >> >> /** >> + * tpm_chip_put() - Release a ref to the tpm_chip >> + * @chip: Chip to put >> + */ >> +void tpm_chip_put(struct tpm_chip *chip) >> +{ >> + if (chip) >> + put_device(&chip->dev); > Rarely like to see those if's inside a put function.. Does it actually > help anything? Following put_device() 'pattern' here which also checks using 'if (dev)'.     Stefan