I'm trying to debug my UWP Central app, which interacts with our device based on nRF52/s132. What I think I'm seeing with my packet sniffer (the nRF51 sniffer, incidentally) is that the BLE stack on my Windows machine (an Intel stack) is misbehaving at the Link Layer, specifically in its use of SN/NESN bits.
Eventually, the stack appears to send a SN/NESN combination that is different from both the next expected combination (which happens normally) and the one from its previously transmitted packet (happens in the common case of re-transmitting a single packet). In this case, the s132 appears to continue to increment the SN/NESN, but it keeps the packet payload the same for several packets, and eventually, connection events cease without a disconnection event.
This itself isn't necessarily a "bug" in s132, since I doubt the BT spec specifies how to deal with this. What I would like, though, is that the s132 handle it more intelligently, at least by throwing an error to the application, or flushing the transmit buffer, or maybe even disconnecting. Right now, I can't tell what's going on from the Peripheral alone.
Will post some sniffer files once I can produce a minimal example.