1. 02 10月, 2014 5 次提交
  2. 29 9月, 2014 3 次提交
  3. 25 9月, 2014 2 次提交
  4. 24 9月, 2014 4 次提交
    • S
      ieee802154: 6lowpan: ensure header compression does not corrupt ipv6 header · f19f4f95
      Simon Vincent 提交于
      The 6lowpan ipv6 header compression was causing problems for other interfaces
      that expected a ipv6 header to still be in place, as we were replacing the
      ipv6 header with a compressed version. This happened if you sent a packet to a
      multicast address as the packet would be output on 802.15.4, ethernet, and also
      be sent to the loopback interface. The skb data was shared between these
      interfaces so all interfaces ended up with a compressed ipv6 header.
      
      The solution is to ensure that before we do any header compression we are not
      sharing the skb or skb data with any other interface. If we are then we must
      take a copy of the skb and skb data before modifying the ipv6 header.
      The only place we can copy the skb is inside the xmit function so we don't
      leave dangling references to skb.
      
      This patch moves all the header compression to inside the xmit function. Very
      little code has been changed it has mostly been moved from lowpan_header_create
      to lowpan_xmit. At the top of the xmit function we now check if the skb is
      shared and if so copy it. In lowpan_header_create all we do now is store the
      source and destination addresses for use later when we compress the header.
      Signed-off-by: NSimon Vincent <simon.vincent@xsilon.com>
      Signed-off-by: NAlexander Aring <alex.aring@gmail.com>
      Signed-off-by: NMarcel Holtmann <marcel@holtmann.org>
      f19f4f95
    • J
      Bluetooth: Fix reason code used for rejecting SCO connections · d41c15cf
      Johan Hedberg 提交于
      The core specification defines valid values for the
      HCI_Reject_Synchronous_Connection_Request command to be 0x0D-0x0F. So
      far the code has been using HCI_ERROR_REMOTE_USER_TERM (0x13) which is
      not a valid value and is therefore being rejected by some controllers:
      
       > HCI Event: Connect Request (0x04) plen 10
      	bdaddr 40:6F:2A:6A:E5:E0 class 0x000000 type eSCO
       < HCI Command: Reject Synchronous Connection (0x01|0x002a) plen 7
      	bdaddr 40:6F:2A:6A:E5:E0 reason 0x13
      	Reason: Remote User Terminated Connection
       > HCI Event: Command Status (0x0f) plen 4
      	Reject Synchronous Connection (0x01|0x002a) status 0x12 ncmd 1
      	Error: Invalid HCI Command Parameters
      
      This patch introduces a new define for a value from the valid range
      (0x0d == Connection Rejected Due To Limited Resources) and uses it
      instead for rejecting incoming connections.
      Signed-off-by: NJohan Hedberg <johan.hedberg@intel.com>
      Signed-off-by: NMarcel Holtmann <marcel@holtmann.org>
      d41c15cf
    • J
      Bluetooth: Convert bt_<level> logging functions to return void · 2b0bf6c8
      Joe Perches 提交于
      No caller or macro uses the return value so make all
      the functions return void.
      Signed-off-by: NJoe Perches <joe@perches.com>
      Signed-off-by: NMarcel Holtmann <marcel@holtmann.org>
      2b0bf6c8
    • C
      NFC: nci: Add support for proprietary RF Protocols · 9e87f9a9
      Christophe Ricard 提交于
      In NFC Forum NCI specification, some RF Protocol values are
      reserved for proprietary use (from 0x80 to 0xfe).
      Some CLF vendor may need to use one value within this range
      for specific technology.
      Furthermore, some CLF may not becompliant with NFC Froum NCI
      specification 2.0 and therefore will not support RF Protocol
      value 0x06 for PROTOCOL_T5T as mention in a draft specification
      and in a recent push.
      
      Adding get_rf_protocol handle to the nci_ops structure will
      help to set the correct technology to target.
      Signed-off-by: NChristophe Ricard <christophe-h.ricard@st.com>
      Signed-off-by: NSamuel Ortiz <sameo@linux.intel.com>
      9e87f9a9
  5. 23 9月, 2014 1 次提交
  6. 18 9月, 2014 1 次提交
    • J
      Bluetooth: Fix setting correct security level when initiating SMP · 5eb596f5
      Johan Hedberg 提交于
      We can only determine the final security level when both pairing request
      and response have been exchanged. When initiating pairing the starting
      target security level is set to MEDIUM unless explicitly specified to be
      HIGH, so that we can still perform pairing even if the remote doesn't
      have MITM capabilities. However, once we've received the pairing
      response we should re-consult the remote and local IO capabilities and
      upgrade the target security level if necessary.
      
      Without this patch the resulting Long Term Key will occasionally be
      reported to be unauthenticated when it in reality is an authenticated
      one.
      Signed-off-by: NJohan Hedberg <johan.hedberg@intel.com>
      Signed-off-by: NMarcel Holtmann <marcel@holtmann.org>
      Cc: stable@vger.kernel.org
      5eb596f5
  7. 17 9月, 2014 1 次提交
  8. 15 9月, 2014 2 次提交
  9. 13 9月, 2014 1 次提交
  10. 11 9月, 2014 20 次提交