Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp1164850pxu; Fri, 16 Oct 2020 05:40:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyOTREsquG7uyBXMl22uw0unBTReyNh0BtDMu3tkVMk14TYQXszXE5+YVeYlsXS0Lc9Yca9 X-Received: by 2002:a17:906:4a4c:: with SMTP id a12mr3433843ejv.392.1602852011700; Fri, 16 Oct 2020 05:40:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602852011; cv=none; d=google.com; s=arc-20160816; b=OTdfKGk6DirzuwgqxxDQzYy2Nz5jY6VPnhO17W2lB9Z3QLaoykUN1f9ry/Vjx6w9dY XdXtct72LgwNTMNTawSeogJsIoAa+rpoCvbDWEFKGQ1STGIUX+QzFp1x1nthzHhe4L8v ASHDlfDRd/3Zws9Mr97FQg3/VCh99LpTNKNSRxsRBw502j9PzIqv5JU2VsLU8SOdzvBh NOlny5LfeXg/xHOsiTQ/CyaPPPGkYhLJUu7WKMQLTH9Qr5djfukR8RBk8KTSHWV5j3bN BzxpRChE/YaykezplhlBxC5vUFFp4KwBc4f2mL+lhZWNXvKre/TH2jf4JKso8IW7mmlr RgNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6u0cyINahVv6XBBarJq4ts2Zvb9TfHBZe6vykL6ECxI=; b=ONTXZh2vlcnpWO80+XPZ2Lmm0tAgi2zk/TlNc2cf/R6Unz6X0o3OwNaxBy8eRzaL96 HOBAPiXHOl/m7idxu7zI/3jUzkqFWKwt6Fzd8PuZ6HtkjvNL0Qi/cZI+EpSTcsYgymj1 bTQ2kvK5Zch4En63aIt0YKTPoD+A6f32lAMDhG6rnj3JQpIYdEJYsJjSx7QorqSTiy72 HGfXEez/pIv8LeNXh/iZR2egrvo1u9qhF+FBJOyJ0pdriRjRye6I5bSa30NTNQvIhc6W acwemIhzpaJgz4xHtZk2jkOFekND7fyrdiPGwySxm3A+M4DDhz84wbnHFAaSVAv/GC/n NPXw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RuTwztvk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l19si1608042ejz.222.2020.10.16.05.39.49; Fri, 16 Oct 2020 05:40:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RuTwztvk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405798AbgJPJOd (ORCPT + 99 others); Fri, 16 Oct 2020 05:14:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:38952 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2394309AbgJPJJ7 (ORCPT ); Fri, 16 Oct 2020 05:09:59 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7490E20878; Fri, 16 Oct 2020 09:09:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1602839399; bh=0bxhwK+WBdHdh0kJ5s/LGYwIn3ijEEAXqpwc05p9ThI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RuTwztvkqUfdPnTnNwZdcjgzKbUWQKfpt4awe4z6zFuv2a7LqqdppH8UhbuVJlLTr /Y3BfTnafyp5eiRG2Z2oGI7zBiA7A5euLgqtfOIEb8ie5TvCdF7pPhBwbJgEvXuLSH EWG6hMSiC62SE/J0PXUYnb8IwxSX93v1NXV+KKGk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Patrick Steinhardt , Luiz Augusto von Dentz , Marcel Holtmann Subject: [PATCH 5.4 10/22] Bluetooth: Fix update of connection state in `hci_encrypt_cfm` Date: Fri, 16 Oct 2020 11:07:38 +0200 Message-Id: <20201016090437.822409472@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201016090437.308349327@linuxfoundation.org> References: <20201016090437.308349327@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Patrick Steinhardt commit 339ddaa626995bc6218972ca241471f3717cc5f4 upstream. Starting with the upgrade to v5.8-rc3, I've noticed I wasn't able to connect to my Bluetooth headset properly anymore. While connecting to the device would eventually succeed, bluetoothd seemed to be confused about the current connection state where the state was flapping hence and forth. Bisecting this issue led to commit 3ca44c16b0dc (Bluetooth: Consolidate encryption handling in hci_encrypt_cfm, 2020-05-19), which refactored `hci_encrypt_cfm` to also handle updating the connection state. The commit in question changed the code to call `hci_connect_cfm` inside `hci_encrypt_cfm` and to change the connection state. But with the conversion, we now only update the connection state if a status was set already. In fact, the reverse should be true: the status should be updated if no status is yet set. So let's fix the isuse by reversing the condition. Fixes: 3ca44c16b0dc ("Bluetooth: Consolidate encryption handling in hci_encrypt_cfm") Signed-off-by: Patrick Steinhardt Acked-by: Luiz Augusto von Dentz Signed-off-by: Marcel Holtmann Signed-off-by: Greg Kroah-Hartman --- include/net/bluetooth/hci_core.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/include/net/bluetooth/hci_core.h +++ b/include/net/bluetooth/hci_core.h @@ -1314,7 +1314,7 @@ static inline void hci_encrypt_cfm(struc __u8 encrypt; if (conn->state == BT_CONFIG) { - if (status) + if (!status) conn->state = BT_CONNECTED; hci_connect_cfm(conn, status);