Received: by 2002:a05:6358:f14:b0:e5:3b68:ec04 with SMTP id b20csp2122207rwj; Sat, 24 Dec 2022 09:04:11 -0800 (PST) X-Google-Smtp-Source: AMrXdXuo3Oe2X/ngl2Nt8Aj9tdrErFKxt3UnZ+EzA/8N+coHLkr9fz9P9PCoZ5OusWwzb7qmPIqp X-Received: by 2002:a17:902:a406:b0:18c:1bc5:bd58 with SMTP id p6-20020a170902a40600b0018c1bc5bd58mr15087360plq.9.1671901451491; Sat, 24 Dec 2022 09:04:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671901451; cv=none; d=google.com; s=arc-20160816; b=pmXg0rwCYPEVRp9sAHadC4IvIEQmDuUBmOCrT77RCLhSRO/7jjs0UMwJfr1IP8JFTo okneJaJ8kKh5b0wnSblThAG7AEHMieruc+i3GcilVMDtVGUmboSnOt7XSla6sxBJWfj2 PJvn1CZFnVd49VUTxUnvGESC/S+HOs6j+jD+j8yUFHeet8MJZxrzin0T0psn9MxlsUhq DjIgjwNJQb3wkKNkJpRsdDGi1K3RABqHqp0hziOhnn7b1SVgQj0LKMRBnNlQ1OaykfM0 HlfYCapbznJT9f5jRLssf7q79lVfAWjWksCzCRaISE8AXdo4Nn045Ov5YPb0W80oJESa 2axg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=nw83YWXMrMVmsMep9YogcVzbm09s5Dw1YdlvKFb/PYI=; b=S7/oCE9WTVi523kFbARNpsCKZYi4d2mGp9zvgu3DUFweSI5igHp0juKqBchQ9UoyCi 7USMg3CLwXL16OtWqE7FuaeHwDU5E7ktlxDHp13feiHS72ExJng4nhuH2nPLKCwpu5Iy yY0IanOF4GhqeICkXMsIc5/PIudXubAyIva3wbVsD8a5dsRswlXjj4ag/Hs5wZB+bhga r1WsY5gC4nX67eHhTpWhfIuFBuSEYLIQUi2tYNyb/1B25Qn8CSnazeTHxjzY5zXW7IAS qRVnpKcWmQSucfNZNyAvbmnu/0/miV5d8mH4WvuJA/IJ9103wmWydwUzoyD/Hg9vf5iM 3jqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mailo.com header.s=mailo header.b=PEQeobYk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mailo.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i12-20020a170902c94c00b001871e838ba9si7168204pla.344.2022.12.24.09.04.02; Sat, 24 Dec 2022 09:04:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@mailo.com header.s=mailo header.b=PEQeobYk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mailo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231293AbiLXQeJ (ORCPT + 66 others); Sat, 24 Dec 2022 11:34:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50440 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229688AbiLXQeH (ORCPT ); Sat, 24 Dec 2022 11:34:07 -0500 Received: from msg-1.mailo.com (msg-1.mailo.com [213.182.54.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 67242BC24; Sat, 24 Dec 2022 08:34:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=mailo.com; s=mailo; t=1671899635; bh=lZPFgAklaDMM/Nar0joqKweC5S5QgeTAOuf+S5eqA54=; h=X-EA-Auth:Date:From:To:Cc:Subject:Message-ID:References: MIME-Version:Content-Type:In-Reply-To; b=PEQeobYkPHBvsQf1uYxPjVZCr5MDrzYQbm30/dqzXCxDsDshfAYWe/8YKPTKh5r+H ML+EvdZCkgfCpFwY5UNGsY+Sm5hg36YyH9d++1KS7SAW+qArwjQWDBnQQ+NcoMZo9C 4U9QHm8dpR+tHec57wRWfIT1nfaQdI4Ts6+yKnTs= Received: by b-4.in.mailobj.net [192.168.90.14] with ESMTP via ip-206.mailobj.net [213.182.55.206] Sat, 24 Dec 2022 17:33:55 +0100 (CET) X-EA-Auth: KoErFyzIxepLC6/uiq781G29rTyZ7tEIEuiqF35jeYbUL5AI27FCTgRYKDO1jWYUk5i2hvlmx46SY09VhqDEcSR4FSyBbACE Date: Sat, 24 Dec 2022 22:03:48 +0530 From: Deepak R Varma To: "Maciej W. Rozycki" , Greg Kroah-Hartman , Jiri Slaby , linux-serial@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Saurabh Singh Sengar , Praveen Kumar , Deepak R Varma Subject: [PATCH v3 1/2] tty: serial: dz: convert atomic_* to refcount_* APIs for map_guard Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The refcount_* APIs are designed to address known issues with the atomic_t APIs for reference counting. They provide following distinct advantages - protect the reference counters from overflow/underflow - avoid use-after-free errors - provide improved memory ordering guarantee schemes - neater and safer. Hence, replace the atomic_* APIs by their equivalent refcount_t API functions. This patch proposal address the following warnings generated by the atomic_as_refcounter.cocci coccinelle script atomic_add_return(-1, ...) Signed-off-by: Deepak R Varma --- Please Note: 1. The patch is compile tested using dec_station.defconfig for MIPS architecture. 2. This patch should be applied before patch 2/2 of this series due to dependency. Changes in v3: 1. Include the individual patches in a series and highlight dependency. Feedback provided by gregkh@linuxfoundation.org Changes in v2: 1. Separate the combined change into one variable per patch as suggested by gregkh@linuxfoundation.org 2. There was additional feedback on validating the change as it appeared to modify the existing logic. However, I found that the logic does not change with the proposed refcount_* APIs used in this change. Hence that feedback is not applied in this version. drivers/tty/serial/dz.c | 23 +++++++++-------------- 1 file changed, 9 insertions(+), 14 deletions(-) diff --git a/drivers/tty/serial/dz.c b/drivers/tty/serial/dz.c index 6b7ed7f2f3ca..b70edc248f8b 100644 --- a/drivers/tty/serial/dz.c +++ b/drivers/tty/serial/dz.c @@ -47,6 +47,7 @@ #include #include +#include #include #include @@ -75,7 +76,7 @@ struct dz_port { struct dz_mux { struct dz_port dport[DZ_NB_PORT]; - atomic_t map_guard; + refcount_t map_guard; atomic_t irq_guard; int initialised; }; @@ -662,13 +663,11 @@ static const char *dz_type(struct uart_port *uport) static void dz_release_port(struct uart_port *uport) { struct dz_mux *mux = to_dport(uport)->mux; - int map_guard; iounmap(uport->membase); uport->membase = NULL; - map_guard = atomic_add_return(-1, &mux->map_guard); - if (!map_guard) + if (refcount_dec_and_test(&mux->map_guard)) release_mem_region(uport->mapbase, dec_kn_slot_size); } @@ -687,23 +686,19 @@ static int dz_map_port(struct uart_port *uport) static int dz_request_port(struct uart_port *uport) { struct dz_mux *mux = to_dport(uport)->mux; - int map_guard; int ret; - map_guard = atomic_add_return(1, &mux->map_guard); - if (map_guard == 1) { - if (!request_mem_region(uport->mapbase, dec_kn_slot_size, - "dz")) { - atomic_add(-1, &mux->map_guard); - printk(KERN_ERR - "dz: Unable to reserve MMIO resource\n"); + refcount_inc(&mux->map_guard); + if (refcount_read(&mux->map_guard) == 1) { + if (!request_mem_region(uport->mapbase, dec_kn_slot_size, "dz")) { + refcount_dec(&mux->map_guard); + printk(KERN_ERR "dz: Unable to reserve MMIO resource\n"); return -EBUSY; } } ret = dz_map_port(uport); if (ret) { - map_guard = atomic_add_return(-1, &mux->map_guard); - if (!map_guard) + if (refcount_dec_and_test(&mux->map_guard)) release_mem_region(uport->mapbase, dec_kn_slot_size); return ret; } -- 2.34.1