Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3526301pxk; Mon, 5 Oct 2020 12:00:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxPqYClg8nLl9I8pk5Ku+9+BlhmaLc0QvZV+hYx7h1QInGgvwoU0iGq78sJjEnOCj2xRIGE X-Received: by 2002:a05:6402:10c7:: with SMTP id p7mr1229458edu.34.1601924401511; Mon, 05 Oct 2020 12:00:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601924401; cv=none; d=google.com; s=arc-20160816; b=x8TtLYiIby4/mdHY3ekt4N6UV9nx5+pkCO2Xm6Xn1bA8oSgpmeg7iitAzkHZCrzf7/ wjeb6S5+zzjmeLEd1MUHiqke+e7p31LcYmyn/u8yE23+6iHrQuWY05xxeILpqeTxl1lR N66AxQnrvo1M8eLoy5GKg54rhLWv5WIrQ9gdZkeqmKUyLaXfc86kfS+Kp53JDSrOuyB4 zcxm+7E4gFaNF3GhpN/pD9Keu2NdR5UqqIP6kGERo3cCyV6ODQwUOZwcgnsjgucY+2Ms GUXt+rDoh9zMlP3jO/cwuqk3urCQr039QJ6sXcYi4CLBwICy6pn54HLbuJTRxemd+1XD 5Oww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version; bh=FCL/xdxNtvRNQ6PC8LIMPXPlVX144zdXgkM3fIkMc6w=; b=PK7+sJb+Dj7FMlqco+SdhUWgHPTMmCqzJeu6n47G3P7C++xCXDYPf/+zyb2ItzX8z+ zNAdIBVYzZuuowVt6Jr/yOn3lsi9YAFuWbny494lsgJ+FpZaONYOh0Bc/5WxYwwzTACd vAWER8XRLtQUezszrWHTNL1wHUls4rfUUX2cWdVzlwayGqtmZETneyKeXZlBAt4msZp0 xYkx5JCE2ZCPKOBvTxKef3zLFaBQsqNJYGF18CRTkUKezDcT9Y5Q34f0wEeAmWznNcv3 iDfIOP/L+76/XlfC7MzPPb9JefHOL9u638Kh6eJahVi4gRJVT4KIKfrMEDq5biw8d959 zpVg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c17si310425ejr.574.2020.10.05.11.59.20; Mon, 05 Oct 2020 12:00:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726657AbgJES6g convert rfc822-to-8bit (ORCPT + 99 others); Mon, 5 Oct 2020 14:58:36 -0400 Received: from coyote.holtmann.net ([212.227.132.17]:44173 "EHLO mail.holtmann.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728082AbgJES6g (ORCPT ); Mon, 5 Oct 2020 14:58:36 -0400 Received: from marcel-macbook.fritz.box (p4fefc7f4.dip0.t-ipconnect.de [79.239.199.244]) by mail.holtmann.org (Postfix) with ESMTPSA id BEA8DCED29; Mon, 5 Oct 2020 21:05:34 +0200 (CEST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\)) Subject: Re: [PATCH] Revert "Bluetooth: Update resolving list when updating whitelist" From: Marcel Holtmann In-Reply-To: <20201005180208.GA2739@kroah.com> Date: Mon, 5 Oct 2020 20:58:33 +0200 Cc: Johan Hedberg , Sathish Narsimman , "David S. Miller" , Jakub Kicinski , linux-bluetooth , "open list:NETWORKING [GENERAL]" , linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8BIT Message-Id: References: <20201004105124.GA2429@kroah.com> <3F7BDD50-DEA3-4CB0-A9A0-69E7EE2923D5@holtmann.org> <20201005083624.GA2442@kroah.com> <220D3B4E-D73E-43AD-8FF8-887D1A628235@holtmann.org> <20201005124018.GA800868@kroah.com> <824BC92C-5035-4B80-80E7-298508E4ADD7@holtmann.org> <20201005161149.GA2378402@kroah.com> <0C92E812-BF43-46A6-A069-3F7F3278FBB4@holtmann.org> <20201005173835.GB2388217@kroah.com> <20201005180208.GA2739@kroah.com> To: Greg Kroah-Hartman X-Mailer: Apple Mail (2.3608.120.23.2.1) Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Hi Greg, >>>>>>>>>>>>>> This reverts commit 0eee35bdfa3b472cc986ecc6ad76293fdcda59e2 as it >>>>>>>>>>>>>> breaks all bluetooth connections on my machine. >>>>>>>>>>>>>> >>>>>>>>>>>>>> Cc: Marcel Holtmann >>>>>>>>>>>>>> Cc: Sathish Narsimman >>>>>>>>>>>>>> Fixes: 0eee35bdfa3b ("Bluetooth: Update resolving list when updating whitelist") >>>>>>>>>>>>>> Signed-off-by: Greg Kroah-Hartman >>>>>>>>>>>>>> --- >>>>>>>>>>>>>> net/bluetooth/hci_request.c | 41 ++----------------------------------- >>>>>>>>>>>>>> 1 file changed, 2 insertions(+), 39 deletions(-) >>>>>>>>>>>>>> >>>>>>>>>>>>>> This has been bugging me for since 5.9-rc1, when all bluetooth devices >>>>>>>>>>>>>> stopped working on my desktop system. I finally got the time to do >>>>>>>>>>>>>> bisection today, and it came down to this patch. Reverting it on top of >>>>>>>>>>>>>> 5.9-rc7 restored bluetooth devices and now my input devices properly >>>>>>>>>>>>>> work. >>>>>>>>>>>>>> >>>>>>>>>>>>>> As it's almost 5.9-final, any chance this can be merged now to fix the >>>>>>>>>>>>>> issue? >>>>>>>>>>>>> >>>>>>>>>>>>> can you be specific what breaks since our guys and I also think the >>>>>>>>>>>>> ChromeOS guys have been testing these series of patches heavily. >>>>>>>>>>>> >>>>>>>>>>>> My bluetooth trackball does not connect at all. With this reverted, it >>>>>>>>>>>> all "just works". >>>>>>>>>>>> >>>>>>>>>>>> Same I think for a Bluetooth headset, can check that again if you really >>>>>>>>>>>> need me to, but the trackball is reliable here. >>>>>>>>>>>> >>>>>>>>>>>>> When you run btmon does it indicate any errors? >>>>>>>>>>>> >>>>>>>>>>>> How do I run it and where are the errors displayed? >>>>>>>>>>> >>>>>>>>>>> you can do btmon -w trace.log and just let it run like tcdpump. >>>>>>>>>> >>>>>>>>>> Ok, attached. >>>>>>>>>> >>>>>>>>>> The device is not connecting, and then I open the gnome bluetooth dialog >>>>>>>>>> and it scans for devices in the area, but does not connect to my >>>>>>>>>> existing devices at all. >>>>>>>>>> >>>>>>>>>> Any ideas? >>>>>>>>> >>>>>>>>> the trace file is from -rc7 or from -rc7 with this patch reverted? >>>>>>>>> >>>>>>>>> I asked, because I see no hint that anything goes wrong. However I have a suspicion if you bisected it to this patch. >>>>>>>>> >>>>>>>>> diff --git a/net/bluetooth/hci_request.c b/net/bluetooth/hci_request.c >>>>>>>>> index e0269192f2e5..94c0daa9f28d 100644 >>>>>>>>> --- a/net/bluetooth/hci_request.c >>>>>>>>> +++ b/net/bluetooth/hci_request.c >>>>>>>>> @@ -732,7 +732,7 @@ static int add_to_white_list(struct hci_request *req, >>>>>>>>> return -1; >>>>>>>>> >>>>>>>>> /* White list can not be used with RPAs */ >>>>>>>>> - if (!allow_rpa && !use_ll_privacy(hdev) && >>>>>>>>> + if (!allow_rpa && >>>>>>>>> hci_find_irk_by_addr(hdev, ¶ms->addr, params->addr_type)) { >>>>>>>>> return -1; >>>>>>>>> } >>>>>>>>> @@ -812,7 +812,7 @@ static u8 update_white_list(struct hci_request *req) >>>>>>>>> } >>>>>>>>> >>>>>>>>> /* White list can not be used with RPAs */ >>>>>>>>> - if (!allow_rpa && !use_ll_privacy(hdev) && >>>>>>>>> + if (!allow_rpa && >>>>>>>>> hci_find_irk_by_addr(hdev, &b->bdaddr, b->bdaddr_type)) { >>>>>>>>> return 0x00; >>>>>>>>> } >>>>>>>>> >>>>>>>>> >>>>>>>>> If you just do the above, does thing work for you again? >>>>>>>> >>>>>>>> Corrupted white-space issues aside, yes, it works! >>>>>>> >>>>>>> I just pasted it from a different terminal ;) >>>>>>> >>>>>>>> I am running 5.9-rc8 with just this change on it and my tracball works >>>>>>>> just fine. >>>>>>>> >>>>>>>>> My suspicion is that the use_ll_privacy check is the wrong one here. It only checks if hardware feature is available, not if it is also enabled. >>>>>>>> >>>>>>>> How would one go about enabling such a hardware feature if they wanted >>>>>>>> to? :) >>>>>>> >>>>>>> I need to understand what is going wrong for you. I have a suspicion, >>>>>>> but first I need to understand what kind of device you have. I hope >>>>>>> the trace file is enough. >>>>>> >>>>>> If you need any other information, just let me know, this is a USB >>>>>> Bluetooth controller from Intel: >>>>>> >>>>>> $ lsusb | grep Blue >>>>>> Bus 009 Device 002: ID 8087:0029 Intel Corp. AX200 Bluetooth >>>>>> >>>>>> And the output of usb-devices for it: >>>>>> T: Bus=09 Lev=01 Prnt=01 Port=04 Cnt=01 Dev#= 2 Spd=12 MxCh= 0 >>>>>> D: Ver= 2.01 Cls=e0(wlcon) Sub=01 Prot=01 MxPS=64 #Cfgs= 1 >>>>>> P: Vendor=8087 ProdID=0029 Rev=00.01 >>>>>> C: #Ifs= 2 Cfg#= 1 Atr=e0 MxPwr=100mA >>>>>> I: If#=0x0 Alt= 0 #EPs= 3 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb >>>>>> I: If#=0x1 Alt= 0 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb >>>>> >>>>> I already figured out that it is one of our controllers. The trace file gives it away. >>>>> >>>>> So my suspicion is that the device you want to connect to uses RPA (aka random addresses). And we added support for resolving them in the firmware. Your hardware does support that, but the host side is not fully utilizing it and thus your device is filtered out. >>>> >>>> Dude, get an email client that line-wraps :) >>>> >>>>> If I am not mistaken, then the use_ll_privacy() check in these two specific places need to be replaced with LL Privacy Enabled check. And then the allow_rpa condition will do its job as expected. >>>>> >>>>> We can confirm this if you send me a trace with the patch applied. >>>> >>>> Want me to disconnect the device and then reconnect it using >>>> bluetootctl? I'll go do that now... >>>> >>>> Ok, it's attached, I did: >>>> >>>> $ bluetoothctl disconnect F1:85:91:79:73:70 >>>> Attempting to disconnect from F1:85:91:79:73:70 >>>> [CHG] Device F1:85:91:79:73:70 ServicesResolved: no >>>> Successful disconnected >>>> >>>> And then the gnome bluetooth daemon (or whatever it has) reconnected it >>>> automatically, so you can see the connection happen, and some movements >>>> in the log. >>>> >>>> If there's anything else you need, just let me know. >>> >>> so the trace file indicates that you are using static addresses and not RPAs. Now I am confused. >>> >>> What is the content of /sys/kernel/debug/bluetooth/hci0/identity_resolving_keys? >> >> f1:85:91:79:73:70 (type 1) f02567096e8537e5dac1cadf548fa750 00:00:00:00:00:00 > > I rebooted, and the same value was there. > >>> The only way I can explain this if you have an entry in that file, but the device is not using it. >>> >>> If you have btmgmt (from bluez.git) you can try "./tools/btmgmt irks” to clear that list and try again. >> >> Ok, I did that, and reconnected, this is still with the kernel that has >> the patch. Want me to reboot to a "clean" 5.9-rc8? > > I rebooted into a clean 5.9-rc8 and the device does not connect. > > So I did the following to trace this: > > $ sudo btmgmt irks > Identity Resolving Keys successfully loaded > $ sudo cat /sys/kernel/debug/bluetooth/hci0/identity_resolving_keys > $ bluetoothctl connect F1:85:91:79:73:70 > Attempting to connect to F1:85:91:79:73:70 > Failed to connect: org.bluez.Error.Failed > > and ran another btmon session to see this, it is attached. this is confusing and makes no sense :( What is the content of debug/bluetooth/hci0/whitelist and debug/bluetooth/hci0/device_list? The only way I can explain this is that somehow the whitelist filter doesn’t get programmed correctly and thus the scan will not find your device. Why this points to use_ll_privacy() is totally unclear to me. Btw. reboots won’t help since bluetoothd will restore from settings. You need to go into the files in /var/lib/bluetooth/ and look for an entry of IdentityResolvingKey for your device and remove it and then restart bluetoothd. You can run btmon and will even show you what bluetoothd loads during start. Can you try to do systemctl stop bluetooth, then start btmon and then systemctl start bluetooth. It should reprogram the controller and I could see the complete trace on how it sets up your hardware. If this really breaks for your, it should have been broken for weeks for everybody. So this is the part that is confusing to me. And my original suspicion turned out to be wrong. Regards Marcel