15 Jul, 2011

1 commit


11 Jul, 2011

1 commit

  • There can 3 reasons for the "command reject" reply produced
    by the stack. Each such reply should be accompanied by the
    relevand data ( as defined in spec. ). Currently there is one
    instance of "command reject" reply with reason "invalid cid"
    wich is fixed. Also, added clean-up definitions related to the
    "command reject" replies.

    Signed-off-by: Ilia Kolomisnky
    Signed-off-by: Gustavo F. Padovan

    Ilia Kolomisnky
     

09 Jul, 2011

6 commits


08 Jul, 2011

2 commits

  • The ERTM receive buffer is now handled in a way that does not require
    the busy queue and the associated polling code.

    Signed-off-by: Mat Martineau
    Signed-off-by: Gustavo F. Padovan

    Mat Martineau
     
  • This change moves most L2CAP ERTM receive buffer handling out of the
    L2CAP core and in to the socket code. It's up to the higher layer
    (the socket code, in this case) to tell the core when its buffer is
    full or has space available. The recv op should always accept
    incoming ERTM data or else the connection will go down.

    Within the socket layer, an skb that does not fit in the socket
    receive buffer will be temporarily stored. When the socket is read
    from, that skb will be placed in the receive buffer if possible. Once
    adequate buffer space becomes available, the L2CAP core is informed
    and the ERTM local busy state is cleared.

    Receive buffer management for non-ERTM modes is unchanged.

    Signed-off-by: Mat Martineau
    Signed-off-by: Gustavo F. Padovan

    Mat Martineau
     

07 Jul, 2011

4 commits


02 Jul, 2011

1 commit


01 Jul, 2011

2 commits

  • Add a local logging function to emit bluetooth specific
    messages. Using vsprintf extension %pV saves code/text
    space.

    Convert the current BT_INFO and BT_ERR macros to use bt_printk.
    Remove __func__ from BT_ERR macro (and the uses).
    Prefix "Bluetooth: " to BT_ERR
    Remove __func__ from BT_DBG as function can be prefixed when
    using dynamic_debug.

    With allyesconfig:

    text data bss dec hex filename
    129956 8632 36096 174684 2aa5c drivers/bluetooth/built-in.o.new2
    134402 8632 36064 179098 2bb9a drivers/bluetooth/built-in.o.old
    14778 1012 3408 19198 4afe net/bluetooth/bnep/built-in.o.new2
    15067 1012 3408 19487 4c1f net/bluetooth/bnep/built-in.o.old
    346595 19163 86080 451838 6e4fe net/bluetooth/built-in.o.new2
    353751 19163 86064 458978 700e2 net/bluetooth/built-in.o.old
    18483 1172 4264 23919 5d6f net/bluetooth/cmtp/built-in.o.new2
    18927 1172 4264 24363 5f2b net/bluetooth/cmtp/built-in.o.old
    19237 1172 5152 25561 63d9 net/bluetooth/hidp/built-in.o.new2
    19581 1172 5152 25905 6531 net/bluetooth/hidp/built-in.o.old
    59461 3884 14464 77809 12ff1 net/bluetooth/rfcomm/built-in.o.new2
    61206 3884 14464 79554 136c2 net/bluetooth/rfcomm/built-in.o.old

    with x86 defconfig (and just bluetooth):

    $ size net/bluetooth/built-in.o.defconfig.*
    text data bss dec hex filename
    66358 933 100 67391 1073f net/bluetooth/built-in.o.defconfig.new
    66643 933 100 67676 1085c net/bluetooth/built-in.o.defconfig.old

    Signed-off-by: Joe Perches
    Signed-off-by: Gustavo F. Padovan

    Joe Perches
     
  • Make it easier to use more normal logging styles later.

    Signed-off-by: Joe Perches
    Signed-off-by: Gustavo F. Padovan

    Joe Perches
     

25 Jun, 2011

1 commit


17 Jun, 2011

4 commits


15 Jun, 2011

2 commits

  • This patch implements a check in smp cmd pairing request and pairing
    response to verify if encryption key maximum size is compatible in both
    slave and master when SMP Pairing is requested. Keys are also masked to
    the correct negotiated size.

    Signed-off-by: Vinicius Costa Gomes
    Signed-off-by: Anderson Briglia
    Signed-off-by: Gustavo F. Padovan

    Vinicius Costa Gomes
     
  • This patch adds support for disconnecting the link when SMP procedure
    takes more than 30 seconds.

    SMP begins when either the Pairing Request command is sent or the
    Pairing Response is received, and it ends when the link is encrypted
    (or terminated). Vol 3, Part H Section 3.4.

    Signed-off-by: Vinicius Costa Gomes
    Signed-off-by: Gustavo F. Padovan

    Vinicius Costa Gomes
     

14 Jun, 2011

14 commits


10 Jun, 2011

1 commit


09 Jun, 2011

1 commit

  • Add BT_POWER socket option used to control the power
    characteristics of the underlying ACL link. When the remote end
    has put the link in sniff mode and the host stack wants to send
    data we need need to explicitly exit sniff mode to work well with
    certain devices (For example, A2DP on Plantronics Voyager 855).
    However, this causes problems with HID devices.

    Hence, moving into active mode when sending data, irrespective
    of who set the sniff mode has been made as a socket option. By
    default, we will move into active mode. HID devices can set the
    L2CAP socket option to prevent this from happening.

    Currently, this has been implemented for L2CAP sockets. This has been
    tested with incoming and outgoing L2CAP sockets for HID and A2DP.

    Based on discussions on linux-bluetooth and patches submitted by
    Andrei Emeltchenko.

    Signed-off-by: Jaikumar Ganesh
    Signed-off-by: Gustavo F. Padovan

    Jaikumar Ganesh