diff options
author | Russell King <rmk@dyn-67.arm.linux.org.uk> | 2006-01-21 22:54:06 +0000 |
---|---|---|
committer | Russell King <rmk+kernel@arm.linux.org.uk> | 2006-01-21 22:54:06 +0000 |
commit | 27ae7a7435634820e7f7e2b922d8119f79cfc6e4 (patch) | |
tree | 53d72fc79e386a437da5681dfe33d67d83b66092 | |
parent | 747c8a55946ed037bf7d62454c3c599c02af2262 (diff) | |
download | linux-3.10-27ae7a7435634820e7f7e2b922d8119f79cfc6e4.tar.gz linux-3.10-27ae7a7435634820e7f7e2b922d8119f79cfc6e4.tar.bz2 linux-3.10-27ae7a7435634820e7f7e2b922d8119f79cfc6e4.zip |
[SERIAL] Fix UPF_ flag usage with uart_info->flags
The previous change found a bug in the serial SAK handling - because
we were looking for UPF_SAK set in uart_info->flags, we would never
raise a SAK condition. UPF_SAK is in uart_port->flags.
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
-rw-r--r-- | include/linux/serial_core.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/include/linux/serial_core.h b/include/linux/serial_core.h index 90f681789a6..1a8cd0169c9 100644 --- a/include/linux/serial_core.h +++ b/include/linux/serial_core.h @@ -430,7 +430,7 @@ static inline int uart_handle_break(struct uart_port *port) port->sysrq = 0; } #endif - if (info->flags & UPF_SAK) + if (port->flags & UPF_SAK) do_SAK(info->tty); return 0; } |