Received: by 2002:a05:7412:bbc7:b0:fc:a2b0:25d7 with SMTP id kh7csp3356443rdb; Tue, 6 Feb 2024 15:33:35 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCU2cZmlt3Y5/1hCWYNbr1KGNUDPGtwbV8+V4+ye19nVK+RJe7EyXgVIMhTBrrPJHBMmKgjy770uHPz1OGFta4QBa6K1nJUHjIiB3q1mow== X-Google-Smtp-Source: AGHT+IEiyfcFYLOLL//3let2rU75N+lj6whEErLvGsGx+A4r6cIRVS9V8lpcx/waoogtHMcJijOU X-Received: by 2002:ac8:5a16:0:b0:42c:3c7b:3f37 with SMTP id n22-20020ac85a16000000b0042c3c7b3f37mr1350013qta.31.1707262415026; Tue, 06 Feb 2024 15:33:35 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707262415; cv=pass; d=google.com; s=arc-20160816; b=nkz0qW2GRDjPtrIbfIk0vUL7d/9twJiFbBClgxv32dHtyqXrKtax7Mf95kyFrqbPS0 Ufl3n5UM+RVWiu8+TD6vtjgGhNucAsDJ3/+HquuLsFonFlUfannq5ooO/PKlQAtVWLQf 9nTQNHnsF/yFFC9raR8B/lOxHYdPvmNog0j9F20xrMU4neBuXTD+EEsNMMlsI+zmbUI+ Xr8ILv5TdOMDxNzvK5LYXnSGFYEy1Fx5ePT31z9P39OTs866OKSIUI4uSgjIIubNC3JF zERGWJX8T7btRER8tkG03reS1tQ5Z1ZTWU4LVMAUAtRxsMQnh/TWCu6pG5RgJTlxRPaP tLaA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id; bh=WuWFSxCOPmbt4xYry4oTVRwimtfcc7wsXZvdClV6awo=; fh=LbOdpo+dWHaDnsscZuqbIzB0Kqn4/eRxwnUN0GdTQMs=; b=Fh1RCanGar2psVCxyEHLaUJJBYLZp4Vw0EpQnUnGP8uzmoY6LNoK6ga6prNYVELK20 3hEYYYA/RwS5iulk7Ph67oabgRmbX4Z2O58CR/AhvRcRFpv9J8uG6UdysbWRDse9y673 B0/nbF8oDRoMLvWUkeHOu+IOCZ4bReRi16ts1lDub/GAvSDBn1Y9SdvGy0+yQ3/0+a1R kfVXixYdUFm2ZzyvQWNbukHEElnaspq2PjoBqXpkFHaV+B5Th0XEVqxxOtrA+FMP0Tsc xpCsPBoOnnYVuBP8DJ6jcaNk+gVQ3qZikmvUQzuapFvJWb+O2QkazqcfUGCZkzV0eiJj RLjw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=v0yd.nl); spf=pass (google.com: domain of linux-bluetooth+bounces-1652-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-bluetooth+bounces-1652-linux.lists.archive=gmail.com@vger.kernel.org" X-Forwarded-Encrypted: i=1; AJvYcCV3yjd26LCFt209K0yOeKCO16rC5qDj1lRu6JL+KHUq7rgyPk3Yjfw+lylVm2dQOSnM77Pl6R/48A3/+QtsIo6pj+sPkVSgy1QGKUMKsg== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id j13-20020ac85f8d000000b0042c3ebcbb40si393121qta.429.2024.02.06.15.33.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 06 Feb 2024 15:33:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-bluetooth+bounces-1652-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=v0yd.nl); spf=pass (google.com: domain of linux-bluetooth+bounces-1652-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-bluetooth+bounces-1652-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id B87251C22165 for ; Tue, 6 Feb 2024 23:33:34 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7F4A31CD27; Tue, 6 Feb 2024 23:33:25 +0000 (UTC) X-Original-To: linux-bluetooth@vger.kernel.org Received: from mout-p-102.mailbox.org (mout-p-102.mailbox.org [80.241.56.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 833B11CD1B; Tue, 6 Feb 2024 23:33:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=80.241.56.152 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707262405; cv=none; b=aupVQrbeRRGdZaU3y4Sl2imzlPJYuUGvL05tvj/mG7+KT1eKflz3sN4sP5ca23JfDe60a5cyYX1I2NANxpTUUZrD/8r0AFhF4LrawC8/4JltNmqmSHaNWcK3U/PhgHc9l8/U/Tb3aI+/3z6yB0wNafSXsTEWyJM97XaYjWWUvto= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707262405; c=relaxed/simple; bh=jnKwKyBLwfWp6fRdpiJAMuzoCw4XPssRIE3TQikj8BE=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=MYzVSU+rvdDYHNFvFkehw45K+j86XybqiHtk8Th6EMWDTyEGH77LJCCcR+5NDUknZ82PHVObxTzrf6LEQ+ulD34wR8Gh7URH5z6W5AHOvE1ndYM+F3PiWBXx75pMVnbh/kWp+Z/Us0suippAhbR6aYX/ng7SQoP2Tuu2U+JUSN4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=v0yd.nl; spf=pass smtp.mailfrom=v0yd.nl; arc=none smtp.client-ip=80.241.56.152 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=v0yd.nl Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=v0yd.nl Received: from smtp2.mailbox.org (smtp2.mailbox.org [IPv6:2001:67c:2050:b231:465::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-102.mailbox.org (Postfix) with ESMTPS id 4TTzvD1XQGz9sdS; Wed, 7 Feb 2024 00:28:08 +0100 (CET) Message-ID: <13f5b50e-94b7-42ea-a47b-7d6270105d1d@v0yd.nl> Date: Wed, 7 Feb 2024 00:28:06 +0100 Precedence: bulk X-Mailing-List: linux-bluetooth@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Subject: Re: [PATCH v4 0/2] Bluetooth: Improve retrying of connection attempts To: Luiz Augusto von Dentz Cc: Marcel Holtmann , Johan Hedberg , linux-bluetooth@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org References: <20240206110816.74995-1-verdre@v0yd.nl> Content-Language: en-US From: =?UTF-8?Q?Jonas_Dre=C3=9Fler?= In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 4TTzvD1XQGz9sdS Hi Luiz, On 06.02.24 23:22, Luiz Augusto von Dentz wrote: > Hi Jonas, > > On Tue, Feb 6, 2024 at 6:08 AM Jonas Dreßler wrote: >> >> Since commit 4c67bc74f016 ("[Bluetooth] Support concurrent connect >> requests"), the kernel supports trying to connect again in case the >> bluetooth card is busy and fails to connect. >> >> The logic that should handle this became a bit spotty over time, and also >> cards these days appear to fail with more errors than just "Command >> Disallowed". >> >> This series refactores the handling of concurrent connection requests >> by serializing all "Create Connection" commands for ACL connections >> similar to how we do it for LE connections. >> >> --- >> >> v1: https://lore.kernel.org/linux-bluetooth/20240102185933.64179-1-verdre@v0yd.nl/ >> v2: https://lore.kernel.org/linux-bluetooth/20240108183938.468426-1-verdre@v0yd.nl/ >> v3: https://lore.kernel.org/linux-bluetooth/20240108224614.56900-1-verdre@v0yd.nl/ >> v4: >> - Removed first two commits since they are already applied >> - Removed a BT_DBG() message in the acl_create_connection() function >> while moving to hci_sync because it seemed out of place in hci_sync >> - Added a mention of the test failure in mgmt-tester to commit message >> >> Jonas Dreßler (2): >> Bluetooth: hci_conn: Only do ACL connections sequentially >> Bluetooth: Remove pending ACL connection attempts >> >> include/net/bluetooth/hci.h | 1 + >> include/net/bluetooth/hci_core.h | 1 - >> include/net/bluetooth/hci_sync.h | 3 ++ >> net/bluetooth/hci_conn.c | 83 +++----------------------------- >> net/bluetooth/hci_event.c | 21 ++------ >> net/bluetooth/hci_sync.c | 70 +++++++++++++++++++++++++++ >> 6 files changed, 86 insertions(+), 93 deletions(-) >> >> -- >> 2.43.0 > > > Doesn't seem to work with the new test: > > Sequential connect - setup complete > Sequential connect - run > Create connection finished > Connect failed for Pair Device > Create connection finished > Sequential connect - test timed out > Sequential connect - teardown > Oh you're right, it's because of the increased delay to 5.12 seconds for sending the page timeout. We're actually waiting for connections to fail, so the test will now take at least 5.12s * 3 instead of 2s * 3, which means test timeout needs to be increased from 7 to more like 16 seconds. Sorry for not catching this one, should've run the test before submitting the patch... Cheers, Jonas