From patchwork Fri Nov 19 09:42:33 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "K, Kiran" X-Patchwork-Id: 518224 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 949DCC433F5 for ; Fri, 19 Nov 2021 09:37:13 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 7D3F361B04 for ; Fri, 19 Nov 2021 09:37:13 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234255AbhKSJkO (ORCPT ); Fri, 19 Nov 2021 04:40:14 -0500 Received: from mga07.intel.com ([134.134.136.100]:62588 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234197AbhKSJkN (ORCPT ); Fri, 19 Nov 2021 04:40:13 -0500 X-IronPort-AV: E=McAfee;i="6200,9189,10172"; a="297804853" X-IronPort-AV: E=Sophos;i="5.87,246,1631602800"; d="scan'208";a="297804853" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Nov 2021 01:37:12 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.87,246,1631602800"; d="scan'208";a="594179409" Received: from intel-lenovo-legion-y540-15irh-pg0.iind.intel.com ([10.224.186.95]) by fmsmga002.fm.intel.com with ESMTP; 19 Nov 2021 01:37:10 -0800 From: Kiran K To: linux-bluetooth@vger.kernel.org Cc: ravishankar.srivatsa@intel.com, chethan.tumkur.narayan@intel.com, luiz.von.dentz@intel.com, Kiran K Subject: [PATCH v2 7/9] avdtp: Add support for MSFT offload start command Date: Fri, 19 Nov 2021 15:12:33 +0530 Message-Id: <20211119094235.2432-7-kiran.k@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20211119094235.2432-1-kiran.k@intel.com> References: <20211119094235.2432-1-kiran.k@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Send MSFT avdtp start command to trigger a2dp offload streaming after sending remote AVDTP start command. --- profiles/audio/avdtp.c | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/profiles/audio/avdtp.c b/profiles/audio/avdtp.c index 6a56bd4507c4..72a5e9c5a82a 100644 --- a/profiles/audio/avdtp.c +++ b/profiles/audio/avdtp.c @@ -2907,6 +2907,24 @@ static gboolean avdtp_open_resp(struct avdtp *session, struct avdtp_stream *stre return TRUE; } +static gboolean msft_avdtp_start(struct avdtp_stream *stream) +{ + int sock; + struct bt_msft cmd; + + if (!stream->io) + return FALSE; + + sock = g_io_channel_unix_get_fd(stream->io); + + cmd.sub_opcode = 0x09; + + if (setsockopt(sock, SOL_BLUETOOTH, BT_MSFT, &cmd, 1)) + return FALSE; + + return TRUE; +} + static gboolean avdtp_start_resp(struct avdtp *session, struct avdtp_stream *stream, struct seid_rej *resp, int size) @@ -2921,6 +2939,9 @@ static gboolean avdtp_start_resp(struct avdtp *session, if (sep->state != AVDTP_STATE_STREAMING) avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING); + if (session->use_offload) + msft_avdtp_start(stream); + return TRUE; }