[Bug 104011] SMP Security check breaks formerly working bluetooth mouse connection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.kernel.org/show_bug.cgi?id=104011

--- Comment #12 from ngoonee.talk@xxxxxxxxx ---
zcat /proc/config.gz | grep UHID
CONFIG_UHID=m

Currently on 4.6.5 it is able to connect (seems better than the first time),
but after a reboot it remains paired but does not reconnect. bluetoothd gives
the error
'sap-server: Operation not permitted (1)'

Running bluetoothctl and trying to run a 'connect' to the paired device gives
these errors for bluetoothd
'ATT bt_io_connect(<address here>): connect: No route to host (113)'

Unpairing and repairing the mouse makes it work, but bluetoothd gives these
errors:-
'bt_uhid_send: Invalid argument (22)'

-- 
You are receiving this mail because:
You are the assignee for the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Bluez Devel]     [Linux Wireless Networking]     [Linux Wireless Personal Area Networking]     [Linux ATH6KL]     [Linux USB Devel]     [Linux Media Drivers]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Big List of Linux Books]

  Powered by Linux