From patchwork Mon Nov 9 12:15:51 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Peter Hurley X-Patchwork-Id: 541745 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id B40D51402C8 for ; Mon, 9 Nov 2015 23:17:08 +1100 (AEDT) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=hurleysoftware_com.20150623.gappssmtp.com header.i=@hurleysoftware_com.20150623.gappssmtp.com header.b=Uiq0htpu; dkim-atps=neutral Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751638AbbKIMRE (ORCPT ); Mon, 9 Nov 2015 07:17:04 -0500 Received: from mail-io0-f173.google.com ([209.85.223.173]:33985 "EHLO mail-io0-f173.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751612AbbKIMQi (ORCPT ); Mon, 9 Nov 2015 07:16:38 -0500 Received: by iody8 with SMTP id y8so183203482iod.1 for ; Mon, 09 Nov 2015 04:16:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hurleysoftware_com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=FLkh9GFtAJCQjP/a4LdAwCu5k7IRJjD+26f0zP02HMI=; b=Uiq0htpuI49llCKKpqu5M9wIYxctS30eYUYRPJHRBdT4rKdD6yS6aQKb1S7N+M/x2i dSql4DBqOct2PIFqVhCuGWjJIFe3nA2oZAGnGZpH85H+oFbQd3XpkK2Fppb7PE3IFMYk UAJFgXDF5HbsJB0NBG1eAlkWIEpE/BVM/npxVLOt80zV6I93NGfMnmfo1nVNSNtpB5Ci EVsoKG+s+KRA9HdLWyRJSSSS0ZSXosiLXCaABNPz9VxbFzQu+nRCIKGw8H22YCTbue5H C7gfeohsmjlT/KtQMdmm0jWjrDbXP55itV7ajyEiD1g5To+CBYuta2gSxG+lQ+wjsbMb TdeQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=FLkh9GFtAJCQjP/a4LdAwCu5k7IRJjD+26f0zP02HMI=; b=BVQ2+icYZDsNREUPZIuuY4X+pUQmk8oMWiXNoDhP0c9Jo7vB8yGxsQV6zWR/AeAD1T pJbDKswyGuSnxFoiKeUNdQcO/+bAk5oPPlIriwLU5wNIQZUPnNMpkXkxGMH1I4V2vcQQ TYcKfm4waASAI0Dle4YWEI2/pqE+We1/aW5mRZQfdCEcvCK+NpMSIWbnXmA4C4Fz/POZ TdH2knrfCnPRqKbcb5NWDWmhGIylJAQs/0YlKcYJLLa85VPz9BDV+fKnhpfH07njMdwj gH6cCRi57vQHIZ71OJ/Do29rnEpxlaDP5kaijk0C/L3HgJdm5aRQpu1+UP14k+e8V03e lK4g== X-Gm-Message-State: ALoCoQkWw6rhSHSFkywr8IDtkMMzmr7pKMPGyr9Pvl2VCCYCQN1s8cS9Fs7mP1vntlBFFSC+NlJC X-Received: by 10.107.156.81 with SMTP id f78mr29899665ioe.107.1447071396475; Mon, 09 Nov 2015 04:16:36 -0800 (PST) Received: from thor.lan (cpe-76-190-194-55.neo.res.rr.com. [76.190.194.55]) by smtp.gmail.com with ESMTPSA id z6sm1355203ign.1.2015.11.09.04.16.34 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 09 Nov 2015 04:16:35 -0800 (PST) From: Peter Hurley To: Greg Kroah-Hartman Cc: Jiri Slaby , linux-kernel@vger.kernel.org, linux-serial@vger.kernel.org, netdev@vger.kernel.org, Johannes Stezenbach , Karsten Keil , Martin Schwidefsky , Heiko Carstens , Jesper Nilsson , Mikael Starvik , Jiri Kosina , David Sterba , Mark Hounschell , Peter Hurley Subject: [PATCH v2 2/4] n_tty: Ignore all read data when closing Date: Mon, 9 Nov 2015 07:15:51 -0500 Message-Id: <1447071353-2961-3-git-send-email-peter@hurleysoftware.com> X-Mailer: git-send-email 2.6.3 In-Reply-To: <1447071353-2961-1-git-send-email-peter@hurleysoftware.com> References: <1447020173-32207-1-git-send-email-peter@hurleysoftware.com> <1447071353-2961-1-git-send-email-peter@hurleysoftware.com> Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On final port close (and thus final tty close), only output flow control requests in the input data should be processed. Ignore all other input data, including parity errors, overruns and breaks. Signed-off-by: Peter Hurley --- drivers/tty/n_tty.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/tty/n_tty.c b/drivers/tty/n_tty.c index bc613b8..2de0283 100644 --- a/drivers/tty/n_tty.c +++ b/drivers/tty/n_tty.c @@ -1564,8 +1564,6 @@ n_tty_receive_buf_closing(struct tty_struct *tty, const unsigned char *cp, flag = *fp++; if (likely(flag == TTY_NORMAL)) n_tty_receive_char_closing(tty, *cp++); - else - n_tty_receive_char_flagged(tty, *cp++, flag); } }