summaryrefslogtreecommitdiff
path: root/net/bluetooth/hci_conn.c
diff options
context:
space:
mode:
authorIlia Kolomisnky <ilia.kolominsky@gmail.com>2011-06-15 07:52:26 +0400
committerGustavo F. Padovan <padovan@profusion.mobi>2011-06-15 22:03:37 +0400
commit330605423ca6eafafb8dcc27502bce1c585d1b06 (patch)
tree86f7e31cddff8a1553b95d42998848039af6a379 /net/bluetooth/hci_conn.c
parentdf3c3931ec58cca3409c71b18ad6da0cd71fe163 (diff)
downloadlinux-330605423ca6eafafb8dcc27502bce1c585d1b06.tar.xz
Bluetooth: Fix L2CAP connection establishment
In hci_conn_security ( which is used during L2CAP connection establishment ) test for HCI_CONN_ENCRYPT_PEND state also sets this state, which is bogus and leads to connection time-out on L2CAP sockets in certain situations (especially when using non-ssp devices ) Signed-off-by: Ilia Kolomisnky <iliak@ti.com> Signed-off-by: Gustavo F. Padovan <padovan@profusion.mobi>
Diffstat (limited to 'net/bluetooth/hci_conn.c')
-rw-r--r--net/bluetooth/hci_conn.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/net/bluetooth/hci_conn.c b/net/bluetooth/hci_conn.c
index b9aa9862d14b..d3a05b9ade7a 100644
--- a/net/bluetooth/hci_conn.c
+++ b/net/bluetooth/hci_conn.c
@@ -608,7 +608,7 @@ int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
goto encrypt;
auth:
- if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &conn->pend))
+ if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->pend))
return 0;
if (!hci_conn_auth(conn, sec_level, auth_type))