aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/net_dropmonitor.py
diff options
context:
space:
mode:
authorJohan Hedberg <[email protected]>2014-07-02 09:36:21 +0300
committerMarcel Holtmann <[email protected]>2014-07-03 17:42:55 +0200
commite493150e363917bf7e86e8fa4316e915fc2cf40b (patch)
treea14cd3dbc55162e069cb312d23ae9535d56e43d5 /tools/perf/scripts/python/net_dropmonitor.py
parentabbaf50e3bccbb6c254c530ff1478acb56a6fed7 (diff)
Bluetooth: Centralize looking up blocked devices to l2cap_recv_frame
The ATT channel isn't the only one that we should ensure doesn't receive data from blocked devices. SMP is another, and in general we don't want data packets going to any of the various handlers. Therefore, add a single check to the l2cap_recv_frame function. The patch fixes at the same time the use of a correct address type. The blacklist stores the values with the user space facing triple type wheras hci_conn->dst_type uses the HCI address type (0x00 or 0x01). Signed-off-by: Johan Hedberg <[email protected]> Signed-off-by: Marcel Holtmann <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/net_dropmonitor.py')
0 files changed, 0 insertions, 0 deletions