1. 13 2月, 2012 15 次提交
  2. 23 12月, 2011 1 次提交
    • J
      Bluetooth: Add support for BCM20702A0 [0a5c:21e3] · c0190925
      Jesse Sung 提交于
      Add another vendor specific ID for BCM20702A0.
      
      output of usb-devices:
      T: Bus=06 Lev=01 Prnt=01 Port=00 Cnt=01 Dev#= 4 Spd=12 MxCh= 0
      D: Ver= 2.00 Cls=ff(vend.) Sub=01 Prot=01 MxPS=64 #Cfgs= 1
      P: Vendor=0a5c ProdID=21e3 Rev=01.12
      S: Manufacturer=Broadcom Corp
      S: Product=BCM20702A0
      S: SerialNumber=9439E5CBF66C
      C: #Ifs= 4 Cfg#= 1 Atr=e0 MxPwr=0mA
      I: If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
      I: If#= 1 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=01 Prot=01 Driver=(none)
      I: If#= 2 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)
      I: If#= 3 Alt= 0 #EPs= 0 Cls=fe(app. ) Sub=01 Prot=01 Driver=(none)
      Signed-off-by: NWen-chien Jesse Sung <jesse.sung@canonical.com>
      Acked-by: NMarcel Holtmann <marcel@holtmann.org>
      Signed-off-by: NGustavo F. Padovan <padovan@profusion.mobi>
      c0190925
  3. 21 12月, 2011 1 次提交
  4. 03 12月, 2011 1 次提交
    • C
      btusb: fix a memory leak in btusb_send_frame() · 54a8a79c
      Cong Wang 提交于
      This patch fixes the following memory leak reported by kmemleak:
      
      unreferenced object 0xffff880060a53840 (size 192):
        comm "softirq", pid 0, jiffies 4320571771 (age 1406.569s)
        hex dump (first 32 bytes):
          01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
          00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
        backtrace:
          [<ffffffff81138a1c>] create_object+0x187/0x28b
          [<ffffffff814be12e>] kmemleak_alloc+0x73/0x98
          [<ffffffff811289d3>] __kmalloc+0xfc/0x123
          [<ffffffff81386546>] usb_alloc_urb+0x1e/0x48
          [<ffffffffa0130274>] btusb_send_frame+0x86/0x385 [btusb]
          [<ffffffffa02d8230>] hci_send_frame+0xa0/0xa5 [bluetooth]
          [<ffffffffa02d8a4e>] hci_cmd_task+0xa0/0xfb [bluetooth]
          [<ffffffff81058548>] tasklet_action+0x8f/0xef
          [<ffffffff81058a4c>] __do_softirq+0xf4/0x1db
          [<ffffffff81058bb7>] run_ksoftirqd+0x84/0x129
          [<ffffffff8106f1c4>] kthread+0xa0/0xa8
          [<ffffffff814dd144>] kernel_thread_helper+0x4/0x10
          [<ffffffffffffffff>] 0xffffffffffffffff
      
      The problem is that when inc_tx() returns non-zero, we forgot
      to call usb_free_urb().
      
      Cc: Marcel Holtmann <marcel@holtmann.org>
      Cc: "Gustavo F. Padovan" <padovan@profusion.mobi>
      Signed-off-by: NWANG Cong <amwang@redhat.com>
      Acked-by: NMarcel Holtmann <marcel@holtmann.org>
      Signed-off-by: NGustavo F. Padovan <padovan@profusion.mobi>
      54a8a79c
  5. 22 11月, 2011 1 次提交
  6. 21 11月, 2011 1 次提交
  7. 19 11月, 2011 1 次提交
  8. 17 11月, 2011 1 次提交
  9. 08 11月, 2011 8 次提交
  10. 01 11月, 2011 5 次提交
  11. 11 10月, 2011 2 次提交
  12. 05 10月, 2011 1 次提交
  13. 30 9月, 2011 1 次提交
  14. 28 9月, 2011 1 次提交
    • P
      Bluetooth: Allow ACL packets over USB in HCI_RAW mode · 9fd481e0
      Peter Hurley 提交于
      Removed tests which prevent transmission of ACL packets
      when the device is in HCI_RAW mode. These tests verified that
      there are ACL or LE links currently tracked by the HCI
      connection manager. However, a HCI_RAW mode device does not
      use the connection manager. In these circumstances, the connection
      counts will be zero, and thus, transmitted ACL packets dropped.
      
      The acl_num test is actually a vestige of a previous bulk URB
      scheme that is no longer used by this driver (bulk URBs were not
      started until at least one ACL connection was created). This was
      incompatible with some endpoint implementations and was dropped -
      see commit 43c2e57f.
      
      The utility of these tests is marginal - currently, the hci tx
      scheduler cannot send an ACL or LE packet for an untracked connection
      (except if the device is in HCI_RAW mode).
      
      Lastly, no other transport layer driver enforces these same tests.
      Signed-off-by: NPeter Hurley <peter@hurleysoftware.com>
      Acked-by: NAcked-by: Marcel Holtmann <marcel@holtmann.org>
      Signed-off-by: NGustavo F. Padovan <padovan@profusion.mobi>
      9fd481e0