|
@@ -700,8 +700,7 @@ static void l2cap_do_start(struct l2cap_chan *chan)
|
|
|
conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
|
|
|
conn->info_ident = l2cap_get_ident(conn);
|
|
|
|
|
|
- schedule_delayed_work(&conn->info_timer,
|
|
|
- msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
|
|
|
+ schedule_delayed_work(&conn->info_timer, L2CAP_INFO_TIMEOUT);
|
|
|
|
|
|
l2cap_send_cmd(conn, conn->info_ident,
|
|
|
L2CAP_INFO_REQ, sizeof(req), &req);
|
|
@@ -2741,8 +2740,7 @@ sendresp:
|
|
|
conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
|
|
|
conn->info_ident = l2cap_get_ident(conn);
|
|
|
|
|
|
- schedule_delayed_work(&conn->info_timer,
|
|
|
- msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
|
|
|
+ schedule_delayed_work(&conn->info_timer, L2CAP_INFO_TIMEOUT);
|
|
|
|
|
|
l2cap_send_cmd(conn, conn->info_ident,
|
|
|
L2CAP_INFO_REQ, sizeof(info), &info);
|
|
@@ -3028,8 +3026,7 @@ static inline int l2cap_config_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr
|
|
|
default:
|
|
|
l2cap_chan_set_err(chan, ECONNRESET);
|
|
|
|
|
|
- __set_chan_timer(chan,
|
|
|
- msecs_to_jiffies(L2CAP_DISC_REJ_TIMEOUT));
|
|
|
+ __set_chan_timer(chan, L2CAP_DISC_REJ_TIMEOUT);
|
|
|
l2cap_send_disconn_req(conn, chan, ECONNRESET);
|
|
|
goto done;
|
|
|
}
|
|
@@ -4539,8 +4536,7 @@ static inline void l2cap_check_encryption(struct l2cap_chan *chan, u8 encrypt)
|
|
|
if (encrypt == 0x00) {
|
|
|
if (chan->sec_level == BT_SECURITY_MEDIUM) {
|
|
|
__clear_chan_timer(chan);
|
|
|
- __set_chan_timer(chan,
|
|
|
- msecs_to_jiffies(L2CAP_ENC_TIMEOUT));
|
|
|
+ __set_chan_timer(chan, L2CAP_ENC_TIMEOUT);
|
|
|
} else if (chan->sec_level == BT_SECURITY_HIGH)
|
|
|
l2cap_chan_close(chan, ECONNREFUSED);
|
|
|
} else {
|
|
@@ -4598,8 +4594,7 @@ int l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt)
|
|
|
l2cap_send_conn_req(chan);
|
|
|
} else {
|
|
|
__clear_chan_timer(chan);
|
|
|
- __set_chan_timer(chan,
|
|
|
- msecs_to_jiffies(L2CAP_DISC_TIMEOUT));
|
|
|
+ __set_chan_timer(chan, L2CAP_DISC_TIMEOUT);
|
|
|
}
|
|
|
} else if (chan->state == BT_CONNECT2) {
|
|
|
struct sock *sk = chan->sk;
|
|
@@ -4622,8 +4617,7 @@ int l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt)
|
|
|
}
|
|
|
} else {
|
|
|
__l2cap_state_change(chan, BT_DISCONN);
|
|
|
- __set_chan_timer(chan,
|
|
|
- msecs_to_jiffies(L2CAP_DISC_TIMEOUT));
|
|
|
+ __set_chan_timer(chan, L2CAP_DISC_TIMEOUT);
|
|
|
res = L2CAP_CR_SEC_BLOCK;
|
|
|
stat = L2CAP_CS_NO_INFO;
|
|
|
}
|