Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3153428yba; Sat, 18 May 2019 10:19:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqxmJkNbXfzcYPRfKCqQlijcxWZUcRAHGddFEhI32Ll2IVCLtqnCH83MbmxHEVdJvOflVkcv X-Received: by 2002:a17:902:b581:: with SMTP id a1mr63972719pls.206.1558199969419; Sat, 18 May 2019 10:19:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558199969; cv=none; d=google.com; s=arc-20160816; b=hJ7B2JrlE0GY/zXh+jDpsL63RF+alu6hUkjzmw4aOOxGW738Nmc6+ATkazaPBfFpqQ fq50LxKW7GZQ/xbPgsu7NrOflKk4+ErllRO3muPsRjk8fmLmvclFWwcQ+m+jQiTX1X45 ahwRAVQ9/cYRYa25o2I+RV5AdqGByhu0Gw2kqdqVhXrzpCb2xcz4/ciSPhsoee1niEtZ DNCNnTgAkfiG68qiSg2wiYS3Kc0toG8bG7GA0TRkMfvTd6mczXIzFArjFw97v9+AnvRD 8xtoIKd+vJ6HljwRlbUc/Fe/A9LeXd5bjWHXAVmXj0LXVcoRsA1zejhP8I33KukYJSfe Zbrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=d1K9vw6RUV0f1WDbV1U2uTXR4wPNCaUs43gDZPPCYPc=; b=mkY7yy0jzewAEw8gagoTA/ACb7zBYzhNvylQfwaukCbGcMKgpW/h8HklEuxyvFi6OX VeOVhNfpeCc1gXp28VLbcFVhaI8rxtEwJSHtEvGSAeIrfxSn7+n/VNlJJywehrGTIEBc yhUwCM9SaMWnd7zWqj+43X1ysw6Db185YqLaUYXDgURr9Am4sQKSN1TGi5K2leC3tFDY mji1MROaMka2Vd1q1HLK+kpqombnzDLUl7kIQwZD9hMjpa6to/bF3sq+ekdLDF51D18z sfvtrr3cCjGD5l59fcNQHDtJmTAnMcVZnSKMy46Q4R/AIoeuw4XjABjWruzPhXFE6IF7 1TtA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZSR6KQ31; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v1si12705573plb.210.2019.05.18.10.19.02; Sat, 18 May 2019 10:19:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZSR6KQ31; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728528AbfERRGD (ORCPT + 99 others); Sat, 18 May 2019 13:06:03 -0400 Received: from mail-pf1-f182.google.com ([209.85.210.182]:42626 "EHLO mail-pf1-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727260AbfERRGD (ORCPT ); Sat, 18 May 2019 13:06:03 -0400 Received: by mail-pf1-f182.google.com with SMTP id 13so5170219pfw.9 for ; Sat, 18 May 2019 10:06:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:mail-followup-to:references :mime-version:content-disposition:in-reply-to:user-agent; bh=d1K9vw6RUV0f1WDbV1U2uTXR4wPNCaUs43gDZPPCYPc=; b=ZSR6KQ31Nqly2QKDQlOyandrLtJKU8X7xn2+m5omJsDqH5W9f67iqc5/RFQqt5oZS2 q7Ift0Z0A/OtSYhZ15AeePxN5CTeKgAz91GzHyvJJG5vKcp0CXOftfm8TO00DbpWKwtg ciIofzlj1IXmZLHLAy2w5Ibjg0AA6JAKCcY6GqMlT13oew5z5Gywtdl2E4g5zRkAhgwb oobMtCud6Kdj1wwaXKKiBnEtl1LFwzQWQk6bPslDJcWBzTLaS9u4WbjgJnPiSQNpmcMP 5c1n8h3mEbim+6QQLBR3yRW5mxU7+ixfVboqNz/DiQZK1/U7xQIW9CJU5KIKnFz5jzNT s1AA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :in-reply-to:user-agent; bh=d1K9vw6RUV0f1WDbV1U2uTXR4wPNCaUs43gDZPPCYPc=; b=BZixAUenZLhiRSDtK2BOD9lZaR77yUZCo7BlZU975JE6PLN8K9pDNd3/VaoABxtgA/ 5vGs1U8Q5PVhHRDsAPEscnAF9FCmaJLi/TRipeYMAjo9d4d6lrwTe1adbfCYaEP0xybp 71ZooVSclH9d5yDUV5/IKd7NoOAcFL3VRqqdWsssTA8/IUVQg1+t7zBwRujNej5mzYTV eAewMshPgIRdRAXGB6qpcTU6ciJWw6v7+TtSV0sA88KXCRUznGNl6hiv82hpw74Dtstx rQE7Ix7zwsQ/wGwHEYJKeRD2QRkAEa3JovmA2iYy7b1QlA4GE/KhIt9hTvDQbYx2BYx8 unRw== X-Gm-Message-State: APjAAAUHbBIGUAal9CbcQRH7Wkk1yeYd53c9345lGb9SteQcYgbj974X tDMpoglbOGUMd6HGYEKoXHQ= X-Received: by 2002:a65:5785:: with SMTP id b5mr28378744pgr.252.1558199162099; Sat, 18 May 2019 10:06:02 -0700 (PDT) Received: from localhost ([192.55.54.45]) by smtp.gmail.com with ESMTPSA id 135sm22352961pfb.97.2019.05.18.10.06.00 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 18 May 2019 10:06:01 -0700 (PDT) Date: Sat, 18 May 2019 20:05:57 +0300 From: Johan Hedberg To: Alexandre Pereira Nunes Cc: "linux-bluetooth@vger.kernel.org" Subject: Re: After kernel update: connect/disconnect forever while attempting to auto-reconnect Message-ID: <20190518170557.GA79055@canella-mobl.ger.corp.intel.com> Mail-Followup-To: Alexandre Pereira Nunes , "linux-bluetooth@vger.kernel.org" References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Hi, The HCI log below seems to indicate an issue with the mouse: On Sat, May 18, 2019, Alexandre Pereira Nunes wrote: > > HCI Event: Connect Complete (0x03) plen 11 #6 [hci0] 5.703492 > Status: Success (0x00) > Handle: 512 > Address: 20:14:12:09:18:BD (OUI 20-14-12) > Link type: ACL (0x01) > Encryption: Disabled (0x00) > < HCI Command: Read Remote Supported.. (0x01|0x001b) plen 2 #7 [hci0] 5.703737 > Handle: 512 > > HCI Event: Command Status (0x0f) plen 4 #8 [hci0] 5.704439 > Read Remote Supported Features (0x01|0x001b) ncmd 1 > Status: Success (0x00) > > HCI Event: Link Supervision Timeout Changed (0x38) plen 4 #9 [hci0] 5.707467 > Handle: 512 > Timeout: 2000.000 msec (0x0c80) > > HCI Event: Read Remote Supported Features (0x0b) plen 11 #10 [hci0] 5.714448 > Status: Success (0x00) > Handle: 512 > Features: 0xfc 0x02 0x04 0x38 0x18 0x18 0x19 0x83 > Encryption > Slot offset > Timing accuracy > Role switch > Hold mode > Sniff mode > Power control requests > Power control > Enhanced inquiry scan > Interlaced inquiry scan > Interlaced page scan > AFH capable slave > AFH classification slave > AFH capable master > AFH classification master > Extended Inquiry Response > Secure Simple Pairing > Encapsulated PDU > Link Supervision Timeout Changed Event > Inquiry TX Power Level > Extended features > < HCI Command: Read Remote Extended.. (0x01|0x001c) plen 3 #11 [hci0] 5.714535 > Handle: 512 > Page: 1 > > HCI Event: Command Status (0x0f) plen 4 #12 [hci0] 5.715445 > Read Remote Extended Features (0x01|0x001c) ncmd 1 > Status: Success (0x00) > > HCI Event: Read Remote Extended Features (0x23) plen 13 #13 [hci0] 5.728475 > Status: Success (0x00) > Handle: 512 > Page: 1/0 > Features: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 > < HCI Command: Remote Name Request (0x01|0x0019) plen 10 #14 [hci0] 5.728565 > Address: 20:14:12:09:18:BD (OUI 20-14-12) > Page scan repetition mode: R2 (0x02) > Page scan mode: Mandatory (0x00) > Clock offset: 0x0000 > < ACL Data TX: Handle 512 flags 0x00 dlen 10 #15 [hci0] 5.728582 > L2CAP: Information Request (0x0a) ident 1 len 2 > Type: Extended features supported (0x0002) > > HCI Event: Command Status (0x0f) plen 4 #16 [hci0] 5.729447 > Remote Name Request (0x01|0x0019) ncmd 1 > Status: Success (0x00) > > HCI Event: Number of Completed Packets (0x13) plen 5 #17 [hci0] 5.740495 > Num handles: 1 > Handle: 512 > Count: 1 > > ACL Data RX: Handle 512 flags 0x02 dlen 16 #18 [hci0] 5.746576 > L2CAP: Information Response (0x0b) ident 1 len 8 > Type: Extended features supported (0x0002) > Result: Success (0x0000) > Features: 0x00000000 > > HCI Event: Remote Name Req Complete (0x07) plen 255 #19 [hci0] 5.781389 > Status: Success (0x00) > Address: 20:14:12:09:18:BD (OUI 20-14-12) > Name: Bluetooth Mouse > @ MGMT Event: Device Connected (0x000b) plen 35 {0x0001} [hci0] 5.781439 > BR/EDR Address: 20:14:12:09:18:BD (OUI 20-14-12) > Flags: 0x00000000 > Data length: 22 > Name (complete): Bluetooth Mouse > Class: 0x002580 > Major class: Peripheral (mouse, joystick, keyboards) > Minor class: 0x20 > Limited Discoverable Mode > > HCI Event: Role Change (0x12) plen 8 #20 [hci0] 6.058251 > Status: Success (0x00) > Address: 20:14:12:09:18:BD (OUI 20-14-12) > Role: Master (0x00) > > ACL Data RX: Handle 512 flags 0x02 dlen 12 #21 [hci0] 6.088229 > L2CAP: Connection Request (0x02) ident 1 len 4 > PSM: 17 (0x0011) > Source CID: 65 > < ACL Data TX: Handle 512 flags 0x00 dlen 16 #22 [hci0] 6.088298 > L2CAP: Connection Response (0x03) ident 1 len 8 > Destination CID: 0 > Source CID: 65 > Result: Connection refused - security block (0x0003) > Status: No further information available (0x0000) From the above it looks like the mouse is initiating an L2CAP Connection Request to a non-SDP PSM (17 in this case), which is prohibited by the spec whenever both sides support Secure Simple Pairing (SSP), and the kernel is correctly responding with a security block error. So to me the above looks like misbehavior by the mouse. Could you also post the same log using a kernel that's working for you? Johan