1. 18 Nov, 2014 1 commit
    • Andre Eisenbach's avatar
      DO NOT MERGE Remove overflow rate limiting when reading A2DP frames · a59f47f2
      Andre Eisenbach authored
      A2DP now supports adjusting the number of A2DP frames sent per timer
      tick to adjust for timer drift and missed media task ticks. When the
      signal to the headset/speakers becomes interrupted, the number of
      packets to be read can queue up and rate limiting will not allow for the
      queue to be cleared.
      
      The overflow mechanism introduced in commit 4aebca46 will cause the media
      task to stop sending packets completely, which can underflow the jutter
      buffer on the remote device and lead to audio drop-outs.
      
      This patch removes the overflow mechanism and also adds code do discard
      audio frames that could not be sent to the remote device (weak signal
      etc) to allow the device to stay in sync and not build up audio delays.
      
      Also added additional debug logging and changed the UIPC flush mechanism
      to address an issue where reading byte by byte causes an endless flush
      loop if remote UIPC producer writes data faster than the flush loop
      consumes it.
      
      Bug: 18244205
      Change-Id: I9a424984806bb2a464877399804b3355b2c439c3
      (cherry picked from commit c5916e97)
      a59f47f2
  2. 05 Nov, 2014 1 commit
  3. 04 Nov, 2014 2 commits
    • Andre Eisenbach's avatar
      am f37767a1: HOGP: Do not remove device from whitelist on encryption failure · 2933de99
      Andre Eisenbach authored
      * commit 'f37767a1':
        HOGP: Do not remove device from whitelist on encryption failure
      2933de99
    • Andre Eisenbach's avatar
      HOGP: Do not remove device from whitelist on encryption failure · f37767a1
      Andre Eisenbach authored
      If the encryption times out during the re-connect process for a HOGP
      device, the device is removed from the whitelist and thus will not
      reconnect until it is added back to the list. On platforms that do not
      have a way to reconnect to a device manually, this means the device will
      never reconnect again until the stack is restarted.
      
      This patch checks the reason for the encryption failure and does not
      remove the device from the whitelist if the encryption failed to a non
      authentication/key related error.
      
      Bug: 18233442
      Change-Id: Ifaec4a9224ff9281956715b38d34c2d7c3fecb01
      f37767a1
  4. 03 Nov, 2014 10 commits
  5. 28 Oct, 2014 3 commits
  6. 23 Oct, 2014 1 commit
    • Prerepa Viswanadham's avatar
      Don't starve a BT ACL link with 0 xmit quota · 472c2a7b
      Prerepa Viswanadham authored
      With new link management of controller buffers between
      different ACL connections, it is possible that a ACL
      conn would get 0 buffers - thus no profile can run.
      This affects classic and LE ACL connections.
      
      This work around allows a floor of 1 buffer as the
      floor for all connection, irrespective of controller
      capability.
      
      Bug: 17976311
      Change-Id: I7cd0d34af47c441c5ea7f2b836b591a4fec62ad1
      472c2a7b
  7. 22 Oct, 2014 2 commits
  8. 21 Oct, 2014 3 commits
  9. 20 Oct, 2014 1 commit
    • Chaojing Sun's avatar
      Cache HOGP HID report map · 433fe016
      Chaojing Sun authored
      HID reports from a bonded device can be missed when Bluetooth is
      restarted HOGP report discovery is still active. Caching the
      report information and loading it back when the stack resets
      will ensure incoming HID reports can be processed immediately.
      
      Bug: 17999991
      Change-Id: I4608935f8749537d6b05625b894445a21f844ee0
      433fe016
  10. 18 Oct, 2014 2 commits
  11. 17 Oct, 2014 1 commit
    • Andre Eisenbach's avatar
      A2DP: Lowering maximum PCM frame limit to avoid audio breaks · 01d102b3
      Andre Eisenbach authored
      Some car kits (notably Renesas car kits used in Nissan/Infiniti models)
      will throttle incoming A2DP frames if too many frames are sent at once.
      This patch lowers the maximum number of frames sent per tick to not
      overwhelm the remote device.
      
      Bug: 17880920
      Change-Id: I7bfbba625405c96159d1c94eebd8dc498f100daa
      01d102b3
  12. 16 Oct, 2014 6 commits
  13. 15 Oct, 2014 7 commits