summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRussell King <rmk@dyn-67.arm.linux.org.uk>2006-01-21 22:54:06 +0000
committerRussell King <rmk+kernel@arm.linux.org.uk>2006-01-21 22:54:06 +0000
commit27ae7a7435634820e7f7e2b922d8119f79cfc6e4 (patch)
tree53d72fc79e386a437da5681dfe33d67d83b66092
parent747c8a55946ed037bf7d62454c3c599c02af2262 (diff)
downloadlinux-3.10-27ae7a7435634820e7f7e2b922d8119f79cfc6e4.tar.gz
linux-3.10-27ae7a7435634820e7f7e2b922d8119f79cfc6e4.tar.bz2
linux-3.10-27ae7a7435634820e7f7e2b922d8119f79cfc6e4.zip
[SERIAL] Fix UPF_ flag usage with uart_info->flags
The previous change found a bug in the serial SAK handling - because we were looking for UPF_SAK set in uart_info->flags, we would never raise a SAK condition. UPF_SAK is in uart_port->flags. Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
-rw-r--r--include/linux/serial_core.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/include/linux/serial_core.h b/include/linux/serial_core.h
index 90f681789a6..1a8cd0169c9 100644
--- a/include/linux/serial_core.h
+++ b/include/linux/serial_core.h
@@ -430,7 +430,7 @@ static inline int uart_handle_break(struct uart_port *port)
port->sysrq = 0;
}
#endif
- if (info->flags & UPF_SAK)
+ if (port->flags & UPF_SAK)
do_SAK(info->tty);
return 0;
}