1. 24 9月, 2014 1 次提交
  2. 15 9月, 2014 1 次提交
  3. 03 7月, 2014 1 次提交
  4. 13 2月, 2014 1 次提交
    • M
      Bluetooth: Introduce requirements for security level 4 · 7b5a9241
      Marcel Holtmann 提交于
      The security level 4 is a new strong security requirement that is based
      around 128-bit equivalent strength for link and encryption keys required
      using FIPS approved algorithms. Which means that E0, SAFER+ and P-192
      are not allowed. Only connections created with P-256 resulting from
      using Secure Connections support are allowed.
      
      This security level needs to be enforced when Secure Connection Only
      mode is enabled for a controller or a service requires FIPS compliant
      strong security. Currently it is not possible to enable either of
      these two cases. This patch just puts in the foundation for being
      able to handle security level 4 in the future.
      
      It should be noted that devices or services with security level 4
      requirement can only communicate using Bluetooth 4.1 controllers
      with support for Secure Connections. There is no backward compatibilty
      if used with older hardware.
      Signed-off-by: NMarcel Holtmann <marcel@holtmann.org>
      Signed-off-by: NJohan Hedberg <johan.hedberg@intel.com>
      7b5a9241
  5. 05 12月, 2013 1 次提交
  6. 22 10月, 2013 1 次提交
  7. 14 10月, 2013 3 次提交
  8. 02 10月, 2013 1 次提交
  9. 24 9月, 2013 1 次提交
  10. 19 9月, 2013 1 次提交
  11. 21 8月, 2013 1 次提交
  12. 17 4月, 2013 1 次提交
  13. 10 4月, 2013 2 次提交
  14. 05 4月, 2013 1 次提交
    • J
      Bluetooth: Add support for custom event terminated commands · 02350a72
      Johan Hedberg 提交于
      This patch adds support for having commands within HCI requests that do
      not result in a command complete but some other event. This is at least
      needed for some vendor specific commands to be issued in the
      hdev->setup() procecure, but might also be useful for other commands.
      
      The way that the support is implemented is by extending the skb control
      buffer to have a field to indicate that the command is expected to
      terminate with a special event. After sending the command each received
      event can then be compared against this field through hdev->sent_cmd.
      Signed-off-by: NJohan Hedberg <johan.hedberg@intel.com>
      Acked-by: NMarcel Holtmann <marcel@holtmann.org>
      02350a72
  15. 08 3月, 2013 2 次提交
  16. 23 1月, 2013 1 次提交
  17. 28 9月, 2012 1 次提交
  18. 07 8月, 2012 1 次提交
    • M
      Bluetooth: /proc/net/ entries for bluetooth protocols · 256a06c8
      Masatake YAMATO 提交于
      lsof command can tell the type of socket processes are using.
      Internal lsof uses inode numbers on socket fs to resolve the type of
      sockets. Files under /proc/net/, such as tcp, udp, unix, etc provides
      such inode information.
      
      Unfortunately bluetooth related protocols don't provide such inode
      information. This patch series introduces /proc/net files for the protocols.
      
      This patch against af_bluetooth.c provides facility to the implementation
      of protocols. This patch extends bt_sock_list and introduces two exported
      function bt_procfs_init, bt_procfs_cleanup.
      
      The type bt_sock_list is already used in some of implementation of
      protocols. bt_procfs_init prepare seq_operations which converts
      protocol own bt_sock_list data to protocol own proc entry when the
      entry is accessed.
      
      What I, lsof user, need is just inode number of bluetooth
      socket. However, people may want more information. The bt_procfs_init
      takes a function pointer for customizing the show handler of
      seq_operations.
      
      In v4 patch, __acquires and __releases attributes are added to suppress
      sparse warning. Suggested by Andrei Emeltchenko.
      
      In v5 patch, linux/proc_fs.h is included to use PDE. Build error is
      reported by Fengguang Wu.
      Signed-off-by: NMasatake YAMATO <yamato@redhat.com>
      Signed-off-by: NGustavo Padovan <gustavo.padovan@collabora.co.uk>
      256a06c8
  19. 05 6月, 2012 3 次提交
  20. 17 5月, 2012 2 次提交
  21. 15 5月, 2012 1 次提交
  22. 09 5月, 2012 4 次提交
  23. 20 2月, 2012 1 次提交
  24. 17 2月, 2012 2 次提交
  25. 15 2月, 2012 1 次提交
    • O
      Bluetooth: silence lockdep warning · b5a30dda
      Octavian Purdila 提交于
      Since bluetooth uses multiple protocols types, to avoid lockdep
      warnings, we need to use different lockdep classes (one for each
      protocol type).
      
      This is already done in bt_sock_create but it misses a couple of cases
      when new connections are created. This patch corrects that to fix the
      following warning:
      
      <4>[ 1864.732366] =======================================================
      <4>[ 1864.733030] [ INFO: possible circular locking dependency detected ]
      <4>[ 1864.733544] 3.0.16-mid3-00007-gc9a0f62 #3
      <4>[ 1864.733883] -------------------------------------------------------
      <4>[ 1864.734408] t.android.btclc/4204 is trying to acquire lock:
      <4>[ 1864.734869]  (rfcomm_mutex){+.+.+.}, at: [<c14970ea>] rfcomm_dlc_close+0x15/0x30
      <4>[ 1864.735541]
      <4>[ 1864.735549] but task is already holding lock:
      <4>[ 1864.736045]  (sk_lock-AF_BLUETOOTH){+.+.+.}, at: [<c1498bf7>] lock_sock+0xa/0xc
      <4>[ 1864.736732]
      <4>[ 1864.736740] which lock already depends on the new lock.
      <4>[ 1864.736750]
      <4>[ 1864.737428]
      <4>[ 1864.737437] the existing dependency chain (in reverse order) is:
      <4>[ 1864.738016]
      <4>[ 1864.738023] -> #1 (sk_lock-AF_BLUETOOTH){+.+.+.}:
      <4>[ 1864.738549]        [<c1062273>] lock_acquire+0x104/0x140
      <4>[ 1864.738977]        [<c13d35c1>] lock_sock_nested+0x58/0x68
      <4>[ 1864.739411]        [<c1493c33>] l2cap_sock_sendmsg+0x3e/0x76
      <4>[ 1864.739858]        [<c13d06c3>] __sock_sendmsg+0x50/0x59
      <4>[ 1864.740279]        [<c13d0ea2>] sock_sendmsg+0x94/0xa8
      <4>[ 1864.740687]        [<c13d0ede>] kernel_sendmsg+0x28/0x37
      <4>[ 1864.741106]        [<c14969ca>] rfcomm_send_frame+0x30/0x38
      <4>[ 1864.741542]        [<c1496a2a>] rfcomm_send_ua+0x58/0x5a
      <4>[ 1864.741959]        [<c1498447>] rfcomm_run+0x441/0xb52
      <4>[ 1864.742365]        [<c104f095>] kthread+0x63/0x68
      <4>[ 1864.742742]        [<c14d5182>] kernel_thread_helper+0x6/0xd
      <4>[ 1864.743187]
      <4>[ 1864.743193] -> #0 (rfcomm_mutex){+.+.+.}:
      <4>[ 1864.743667]        [<c1061ada>] __lock_acquire+0x988/0xc00
      <4>[ 1864.744100]        [<c1062273>] lock_acquire+0x104/0x140
      <4>[ 1864.744519]        [<c14d2c70>] __mutex_lock_common+0x3b/0x33f
      <4>[ 1864.744975]        [<c14d303e>] mutex_lock_nested+0x2d/0x36
      <4>[ 1864.745412]        [<c14970ea>] rfcomm_dlc_close+0x15/0x30
      <4>[ 1864.745842]        [<c14990d9>] __rfcomm_sock_close+0x5f/0x6b
      <4>[ 1864.746288]        [<c1499114>] rfcomm_sock_shutdown+0x2f/0x62
      <4>[ 1864.746737]        [<c13d275d>] sys_socketcall+0x1db/0x422
      <4>[ 1864.747165]        [<c14d42f0>] syscall_call+0x7/0xb
      Signed-off-by: NOctavian Purdila <octavian.purdila@intel.com>
      Acked-by: NMarcel Holtmann <marcel@holtmann.org>
      Signed-off-by: NJohan Hedberg <johan.hedberg@intel.com>
      b5a30dda
  26. 13 2月, 2012 1 次提交
    • O
      Bluetooth: silence lockdep warning · d22015aa
      Octavian Purdila 提交于
      Since bluetooth uses multiple protocols types, to avoid lockdep
      warnings, we need to use different lockdep classes (one for each
      protocol type).
      
      This is already done in bt_sock_create but it misses a couple of cases
      when new connections are created. This patch corrects that to fix the
      following warning:
      
      <4>[ 1864.732366] =======================================================
      <4>[ 1864.733030] [ INFO: possible circular locking dependency detected ]
      <4>[ 1864.733544] 3.0.16-mid3-00007-gc9a0f62 #3
      <4>[ 1864.733883] -------------------------------------------------------
      <4>[ 1864.734408] t.android.btclc/4204 is trying to acquire lock:
      <4>[ 1864.734869]  (rfcomm_mutex){+.+.+.}, at: [<c14970ea>] rfcomm_dlc_close+0x15/0x30
      <4>[ 1864.735541]
      <4>[ 1864.735549] but task is already holding lock:
      <4>[ 1864.736045]  (sk_lock-AF_BLUETOOTH){+.+.+.}, at: [<c1498bf7>] lock_sock+0xa/0xc
      <4>[ 1864.736732]
      <4>[ 1864.736740] which lock already depends on the new lock.
      <4>[ 1864.736750]
      <4>[ 1864.737428]
      <4>[ 1864.737437] the existing dependency chain (in reverse order) is:
      <4>[ 1864.738016]
      <4>[ 1864.738023] -> #1 (sk_lock-AF_BLUETOOTH){+.+.+.}:
      <4>[ 1864.738549]        [<c1062273>] lock_acquire+0x104/0x140
      <4>[ 1864.738977]        [<c13d35c1>] lock_sock_nested+0x58/0x68
      <4>[ 1864.739411]        [<c1493c33>] l2cap_sock_sendmsg+0x3e/0x76
      <4>[ 1864.739858]        [<c13d06c3>] __sock_sendmsg+0x50/0x59
      <4>[ 1864.740279]        [<c13d0ea2>] sock_sendmsg+0x94/0xa8
      <4>[ 1864.740687]        [<c13d0ede>] kernel_sendmsg+0x28/0x37
      <4>[ 1864.741106]        [<c14969ca>] rfcomm_send_frame+0x30/0x38
      <4>[ 1864.741542]        [<c1496a2a>] rfcomm_send_ua+0x58/0x5a
      <4>[ 1864.741959]        [<c1498447>] rfcomm_run+0x441/0xb52
      <4>[ 1864.742365]        [<c104f095>] kthread+0x63/0x68
      <4>[ 1864.742742]        [<c14d5182>] kernel_thread_helper+0x6/0xd
      <4>[ 1864.743187]
      <4>[ 1864.743193] -> #0 (rfcomm_mutex){+.+.+.}:
      <4>[ 1864.743667]        [<c1061ada>] __lock_acquire+0x988/0xc00
      <4>[ 1864.744100]        [<c1062273>] lock_acquire+0x104/0x140
      <4>[ 1864.744519]        [<c14d2c70>] __mutex_lock_common+0x3b/0x33f
      <4>[ 1864.744975]        [<c14d303e>] mutex_lock_nested+0x2d/0x36
      <4>[ 1864.745412]        [<c14970ea>] rfcomm_dlc_close+0x15/0x30
      <4>[ 1864.745842]        [<c14990d9>] __rfcomm_sock_close+0x5f/0x6b
      <4>[ 1864.746288]        [<c1499114>] rfcomm_sock_shutdown+0x2f/0x62
      <4>[ 1864.746737]        [<c13d275d>] sys_socketcall+0x1db/0x422
      <4>[ 1864.747165]        [<c14d42f0>] syscall_call+0x7/0xb
      Signed-off-by: NOctavian Purdila <octavian.purdila@intel.com>
      Acked-by: NMarcel Holtmann <marcel@holtmann.org>
      Signed-off-by: NJohan Hedberg <johan.hedberg@intel.com>
      d22015aa
  27. 21 12月, 2011 1 次提交
  28. 03 12月, 2011 1 次提交
  29. 08 11月, 2011 1 次提交