Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp4567208ybi; Tue, 30 Jul 2019 04:22:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqwUAvE0lh9KGIc+SWGzFG3YA1MRGB1N/2Z99N16DCGLg4Q4EVdCB7TOgxO9hr+NtvWuYkMs X-Received: by 2002:a65:52c5:: with SMTP id z5mr94558133pgp.118.1564485764763; Tue, 30 Jul 2019 04:22:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564485764; cv=none; d=google.com; s=arc-20160816; b=Nrwb7I9+QvP01Tr+kgNXnRAOnLQ/El5vY8hksVaG/QA6VUsmbeWXTyO06iGO0VpEo6 PSCgMkx4sXPIdmTqVSvgDvrKOSdsgblcrXQdyr+eTyextfRB5CrcM9Pv2dxqV8eBsJmG U45XwYP4oO9w7IrQquUPGSZ21/QGHOMVzASbPMrtxsqNRSJ9rUTMP3yylogrX9u5pZIR TvyOr4Df0mzBAYnwBz5Tm2Vp+FIlCm8mQZmVr3BXqbHQcQQydygjpbXeZIuYbgcwd7CS 7pjBIJoh4q7CBL1os/GVyRIfCjFu1FJ9hiBBbwpB6w5F+6DNB21WfvfnFGBp321jItyV CmlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version; bh=PwAv/r2T7odSIIt9sPiK9fyHMPp5bevxV17njd+H5fQ=; b=kjQumK6R/wu/6ViEAh9q96WOfx/YCZbf7pTSVtbuUqI41wqYs2HeDf8Q8JZBQbphMu fleBrFf5G7Z/z3zPxn3m50KmOD2wzRKyBMOpSc69+tdzVg85oIf0uA12qMRvKwaUkCnH MP4DiD72JyTYkuVn8qHvJhqh6mZcQTiArasNepkPlAjO8j3jTytS14xMgKWGSPUwwHdF TCSHd+zquodSooe2TwJxXbJokNVJ+ThIbf7Z/1aE3LpmvOkZ9YilcM5HFB4MMD8ULmxY d4SdvP8icGXwgaJRlJ40wRjAyej0QleftRXj9Uj4Pyp5ixmuHmUrz+Endxm7q0moKbkD nPgQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h25si30538290pfn.56.2019.07.30.04.22.30; Tue, 30 Jul 2019 04:22:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725877AbfG3JkB convert rfc822-to-8bit (ORCPT + 99 others); Tue, 30 Jul 2019 05:40:01 -0400 Received: from coyote.holtmann.net ([212.227.132.17]:48534 "EHLO mail.holtmann.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725784AbfG3JkA (ORCPT ); Tue, 30 Jul 2019 05:40:00 -0400 Received: from marcel-macbook.fritz.box (p5B3D2BA7.dip0.t-ipconnect.de [91.61.43.167]) by mail.holtmann.org (Postfix) with ESMTPSA id C2375CECFE; Tue, 30 Jul 2019 11:48:37 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: Yet another counterfeit CSR device? From: Marcel Holtmann In-Reply-To: Date: Tue, 30 Jul 2019 11:39:59 +0200 Cc: linux-bluetooth@vger.kernel.org Content-Transfer-Encoding: 8BIT Message-Id: References: To: Andrey Batyiev X-Mailer: Apple Mail (2.3445.104.11) Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Hi Andrey, > I have nontdescript usb bluetooth dongle with "V5.0" marking on it. > It claims to be CSR (0a12:0001) bluetooth dongle, but it has > nonfunctional "delete stored link key" command, so I think it is > counterfeit. > > Futhermore, Linux kernel doesn't detect it as counterfeit > (in`btusb_setup_csr`), because the dongle reports following: > > - From USB enumeration: > bcdDevice = 0x8891 > > - From Read Local Version HCI command: > Manufacturer = 0x000a (CSR) > HCI ver. = 4.0 > HCI rev. = 2064 > LMP ver. = 4.0 > LMP subver. = 4114 > > So, Linux kernel fails to power up this dongle. Ok, so I've hacked > `btusb_setup_csr` routine to include this device too (it powers up > now), however GATT communication doesn't work (btmon should nothing = > no ATT exchanges except MTU setup). > > Any ideas on what should I check to make this device work? please post a btmon -w trace.log from the init procedure. You might need to blacklist btusb.ko module and then manually load it to capture the whole sequence with btmon. Regards Marcel