Hi Marcel, On Tue, Apr 12, 2011 at 6:59 AM, Marcel Holtmann <marcel@xxxxxxxxxxxx> wrote: >> One thing to consider is that there are a couple of MTU checks along >> the L2CAP code. The issue which originated this patch is code such as: >> >> /* Check outgoing MTU */ >> if (len > pi->omtu) { >> err = -EMSGSIZE; >> goto done; >> } >> >> We understood that just letting omtu/imtu values on kernel reflect the >> current connection MTU settings was the cleanest solution. What do you >> propose? Bypassing these checks for LE? > > this does not look clean to me. And we might have an internal MTU > variable as part of L2CAP, but the way how it gets set and thus its > semantic differs clearly between BR/EDR and LE. So shoehorning an > existing socket option this is clearly a bad idea. Sure. What to do then if: 1) LE links have MTU (omtu specifically) hard-coded to 23 on kernel. 2) the kernel rejects sending data longer than omtu. (this is the current situation) This clearly needs some fix on kernel side, otherwise we can't send PDUs longer than the LE default MTU (23), *even* if the peer device supports a bigger MTU. Suggestions are welcome regarding how to best approach this, without affecting current BR/EDR MTU semantics. Regards, -- Anderson Lizardo Instituto Nokia de Tecnologia - INdT Manaus - Brazil -- To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html