Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp508382rdb; Tue, 19 Sep 2023 02:00:18 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHYAjlwoX5YRxXnXKgTceMCtGcJBLkaqUEBNBRsyJBBgGhV/Xsm3H9TC+0FqmQ88rPCF09z X-Received: by 2002:a05:6a00:1a8d:b0:68f:da2a:637b with SMTP id e13-20020a056a001a8d00b0068fda2a637bmr10770074pfv.19.1695114017984; Tue, 19 Sep 2023 02:00:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695114017; cv=none; d=google.com; s=arc-20160816; b=Li6Dn+igFhBgKV0BbSmYoeDMbOkSmlqDkHM6gt1r2GZ4U2mFLLXL+EZJ9RPl0xcGuG s8UiBbokoqilsGSSxn3fGuuC5466dyhqTTRET8HBJx15hfibQ8SiXYnBZUzRq/DluQi6 sBHX3OI6kwehCph/819treg7kk2QlTnONludCYzffQOYBYHaZWex1/rz6SEkoDT31luW c4ngZmKIFPp2jC/b+MdCtn97VIcOvbmNT/OJN7wBGuUKKkh2vbxXcrqcVXBVr/79J4Vs 52kg8RM0iJe4DO61L/pgE26/sg8RE3mkzdjPyhNWbIBSrZEpiU5A2Rmxos0IL+PVjP6J ml1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=aKuCV6/TUmNs7gp5znGhsGwVd7+E+bpjI4EK/fv9HK4=; fh=1YNwm5KBWetjB3qGkhgLqh/dZnCTsWuqRk83JW6hjgE=; b=mXu8LZOJkjoqohvCwbKw1+YoSC8dQBdST5QbWdLu62hvW9ZKgm4ERS/pFcdSV06uaf TIYF04sxM9EUoEKgRz4FnqbCyNhZoACSzuBIBu/MfhPeJJfU63A54J1vDOilhvcXXKPc RoSjsL4Xj6F6gefBZLqyHMJ46272qagt20e/+Nbrd1GmPree1Cf5gVU2MtDprVr6j6ny SESSxGhps/u21iQLwp6QMeREQ3/5Iy50YqEooKs27VKlMh6nI+M7Wknyd+JbZLvyBmYR 1I/co7leZwgHEBI0S1qnYS0T1dB7TJ+7AL2PpyoQDGnaRcTn1fSfsOjpAWglUpREBii5 Hf/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LYkkm6up; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id g7-20020a056a0023c700b0068bf645ac9bsi9513684pfc.238.2023.09.19.02.00.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Sep 2023 02:00:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LYkkm6up; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 0D4578024A28; Tue, 19 Sep 2023 01:53:24 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231225AbjISIxY (ORCPT + 99 others); Tue, 19 Sep 2023 04:53:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39666 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231360AbjISIwe (ORCPT ); Tue, 19 Sep 2023 04:52:34 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CB114CD4; Tue, 19 Sep 2023 01:52:19 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 11F4EC433CA; Tue, 19 Sep 2023 08:52:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1695113539; bh=sBYy4MCg26JYrXy0gwZ0Nr1JdsECrLQpru6I38p6zcI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=LYkkm6up1ylExFiI7/fEXdVEtiLaRZAtvTfHMM0jUnd54djsYGgh/j0kY71BgBuM+ CufdJShWc8N/K0MQgl1iJPbZ02JXEE7Dc/r35sUQdAfIIcFdSjyfWM6do/yUUGlt+8 nh6xYujPTbU36RYph2odRjjhlIuU67bR4WmzVOfVo+Uzc50r0OpS2fme3JCn/7pTA4 d1vzjRb3yIbdN7BfRdhT+oNYYNlT24PN3BTvt1x8vqFc3ncTaL6tmD1cfc99eYXVHf zAj+YvGrMje156QwQv5vW8wDPJDvZC3DaGmVSsmSSicrotN6BnlAzC5m/Tf9s9+7j8 C2aCGHM3Vb+dA== From: "Jiri Slaby (SUSE)" To: gregkh@linuxfoundation.org Cc: linux-serial@vger.kernel.org, linux-kernel@vger.kernel.org, "Jiri Slaby (SUSE)" Subject: [PATCH 13/15] tty: early return from send_break() on TTY_DRIVER_HARDWARE_BREAK Date: Tue, 19 Sep 2023 10:51:54 +0200 Message-ID: <20230919085156.1578-14-jirislaby@kernel.org> X-Mailer: git-send-email 2.42.0 In-Reply-To: <20230919085156.1578-1-jirislaby@kernel.org> References: <20230919085156.1578-1-jirislaby@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Tue, 19 Sep 2023 01:53:25 -0700 (PDT) If the driver sets TTY_DRIVER_HARDWARE_BREAK, we leave ops->break_ctl() to the driver and return from send_break(). But we do it using a local variable and keep the code flowing through the end of the function. Instead, do 'return' immediately with the ops->break_ctl()'s return value. This way, we don't have to stuff the 'else' branch of the 'if' with the software break handling. And we can re-indent the function too. Signed-off-by: Jiri Slaby (SUSE) --- drivers/tty/tty_io.c | 32 +++++++++++++++++--------------- 1 file changed, 17 insertions(+), 15 deletions(-) diff --git a/drivers/tty/tty_io.c b/drivers/tty/tty_io.c index 2ed12ca7c832..87bb5094e0bb 100644 --- a/drivers/tty/tty_io.c +++ b/drivers/tty/tty_io.c @@ -2475,22 +2475,24 @@ static int send_break(struct tty_struct *tty, unsigned int duration) return 0; if (tty->driver->flags & TTY_DRIVER_HARDWARE_BREAK) - retval = tty->ops->break_ctl(tty, duration); - else { - /* Do the work ourselves */ - if (tty_write_lock(tty, false) < 0) - return -EINTR; - retval = tty->ops->break_ctl(tty, -1); - if (retval) - goto out; - if (!signal_pending(current)) - msleep_interruptible(duration); - retval = tty->ops->break_ctl(tty, 0); + return tty->ops->break_ctl(tty, duration); + + /* Do the work ourselves */ + if (tty_write_lock(tty, false) < 0) + return -EINTR; + + retval = tty->ops->break_ctl(tty, -1); + if (retval) + goto out; + if (!signal_pending(current)) + msleep_interruptible(duration); + retval = tty->ops->break_ctl(tty, 0); out: - tty_write_unlock(tty); - if (signal_pending(current)) - retval = -EINTR; - } + tty_write_unlock(tty); + + if (signal_pending(current)) + retval = -EINTR; + return retval; } -- 2.42.0