Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp1165382pxu; Fri, 16 Oct 2020 05:40:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJE1XsrgzFEKejfuJMlouZ/7HOovcNkxzfeyZt91DayEBJNLgPIQZeZ4hM3olqVLqojWw2 X-Received: by 2002:a17:906:c095:: with SMTP id f21mr3684958ejz.108.1602852056862; Fri, 16 Oct 2020 05:40:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602852056; cv=none; d=google.com; s=arc-20160816; b=ck6zqMWJgoE+63+DdC95KZFwm3QOntcD4HL4yqAmz2zOZFoLneP8F01ZhUC2RBlB0r y1ajer28RDKEbv2lmPtSfAYAm4ICeYJYBalPlqhQVGlDjaqBtGqWHL2fCwlbP7S3Qe8g DSQ150oQdyP745dvTghYPcC3bhqO7iUoMZNtvUCme7Y3G2gHvNoXmMAksUNTtzDfZlYn babKvkUQuTh8zuAy3nKiVp36YFxm7gbIn0sTz3rqPZ2nGVywc3kuF2hQSuh0J969KPmC juPExUPDf7dnzrf6uU+eTaa0Q4aMZsEnljMnKr8u8ie6PSpdRML48+UHoRBz7+oEuyYL g7jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Kr3oct5IUBFu5MX6sYZCBONktc6TXUlQZgE4Ikk3+0I=; b=C2+b2GyzXyDWYpM+IM+3mk0AqIqg+E0AmBuiirwmT2SJfKMjqJAZoYisSr9B79WqMw 7a5EHnBIEGS8P1UBijeuNWWj3EhdG1AcfUulkS919fzxmrschh7MOcQPrlDBnpYyXjrW 76OFJCcN9zUMyuiJRKSKRhsI7mKoEK7dGMA0pHHQdjG14/chcoH5Pzt+ovaHtVJ5Ym1p 5UGnxoioXcNuvUm33OGwi36y51DPk6t1lRbxkMuVf4lqbH8gdzhenWb4SMDQDx40gB+3 HDVMM+Q9kOpMQCMVy/h0c//zVKsRwcjNjl3lMb2MHFhXe9RXRcGtr6AAskB7y2PkiBjp BvDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZfiZICdu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cn6si1473716edb.428.2020.10.16.05.40.34; Fri, 16 Oct 2020 05:40:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZfiZICdu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2406129AbgJPJPO (ORCPT + 99 others); Fri, 16 Oct 2020 05:15:14 -0400 Received: from mail.kernel.org ([198.145.29.99]:38226 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2405528AbgJPJJ3 (ORCPT ); Fri, 16 Oct 2020 05:09:29 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3CF9B20789; Fri, 16 Oct 2020 09:09:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1602839368; bh=XURXdGmSy2e6Hda4uB8yy5Bdorf+pQC92dCzziKAdgE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZfiZICduKpL1qi8xmHv8z1gqWVMW64dp37THeRZVoMlPQGWHipWclUxDCFQEmHRog fCxbzczlnKj9/U7uMTUC1ToLK6ZI1Wx2KAYzwOd3Ws39O9TNzhgIbpHDv8rL5b/KgW 9USOLLBWvpXaHI6v7GZn3rzbd+NaMzssaxN6k56Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Patrick Steinhardt , Luiz Augusto von Dentz , Marcel Holtmann Subject: [PATCH 4.19 09/21] Bluetooth: Fix update of connection state in `hci_encrypt_cfm` Date: Fri, 16 Oct 2020 11:07:28 +0200 Message-Id: <20201016090437.768160833@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201016090437.301376476@linuxfoundation.org> References: <20201016090437.301376476@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Patrick Steinhardt commit 339ddaa626995bc6218972ca241471f3717cc5f4 upstream. Starting with the upgrade to v5.8-rc3, I've noticed I wasn't able to connect to my Bluetooth headset properly anymore. While connecting to the device would eventually succeed, bluetoothd seemed to be confused about the current connection state where the state was flapping hence and forth. Bisecting this issue led to commit 3ca44c16b0dc (Bluetooth: Consolidate encryption handling in hci_encrypt_cfm, 2020-05-19), which refactored `hci_encrypt_cfm` to also handle updating the connection state. The commit in question changed the code to call `hci_connect_cfm` inside `hci_encrypt_cfm` and to change the connection state. But with the conversion, we now only update the connection state if a status was set already. In fact, the reverse should be true: the status should be updated if no status is yet set. So let's fix the isuse by reversing the condition. Fixes: 3ca44c16b0dc ("Bluetooth: Consolidate encryption handling in hci_encrypt_cfm") Signed-off-by: Patrick Steinhardt Acked-by: Luiz Augusto von Dentz Signed-off-by: Marcel Holtmann Signed-off-by: Greg Kroah-Hartman --- include/net/bluetooth/hci_core.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/include/net/bluetooth/hci_core.h +++ b/include/net/bluetooth/hci_core.h @@ -1293,7 +1293,7 @@ static inline void hci_encrypt_cfm(struc __u8 encrypt; if (conn->state == BT_CONFIG) { - if (status) + if (!status) conn->state = BT_CONNECTED; hci_connect_cfm(conn, status);