Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp5729282ybi; Wed, 12 Jun 2019 07:30:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqzbZXls2+otnmtuDs5SewFyVXA0F4yT9vyVr+IO2uwEpdVw9ZgqV/yvnPyYRaGRTWxoq2m1 X-Received: by 2002:a65:638a:: with SMTP id h10mr26122729pgv.64.1560349848816; Wed, 12 Jun 2019 07:30:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560349848; cv=none; d=google.com; s=arc-20160816; b=M6TfVuXuCtVb7d+jrhSaJt+rIosduVmOfl19K9XhJT9DCg+RnuWiFRNhahxOTHbl9s X+A9oneOkolMzItpkDglI0jEfLQ3cLoerWBoMGV1ZJt1BG9diCBQEJMTBA8UIRMDh+Co KFfw84ETyUr33tx07rOb8GeQBzuQpvc4vaHGMD0qqtl4/x+59+ZjKw6PgNbeGUcv2HWf JA47CTBRg+v/jhWf9rVgB4Djz9TGQKa0/swFrR3cnryRICSXwogFXQINjrc7azZLEMnN OMBZSl3wPCfXdVe+4aE73pVogo61GPMszio01VovQGBVRNro0J+ZEFiOpU8W3LSdbZPA vETA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature; bh=gcDvik9+KpaYGNhLdOFj21bkRuHqN/0qSRW+OLH4t8o=; b=FqYz3/9nsoGKUts+k4SgFsQ71P4wAFgFZ4BQwwdHT6UY1c6GY+aqi6yd2zAi7LjAcd wV3ITLs2IPV2dBw7QSLsP8IohvhiJibQGMhVzG/DMHxB3nXa6p13HoPMmQCV3/fQXrbr PFtYxpNKJpCdGr0+BKHv7GiyfVCjhIcWvGN3r+a516tj5N48tkLMDCPkO6B2w4wZGbeA /lADC/CZWT6wVGe1EU0URJNcoZlRGaF0IiV0Qj9U2JA2192qclqXG2m11180bvJF/GsL snki/VXg5QRwP0GMVEzD4J8cINF0bc5hOY/e8ssD4vwMWPfeiwz3tPqHH2re6Tp0GaHV Gngw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HhM7yhZ7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v2si29802pjk.105.2019.06.12.07.29.49; Wed, 12 Jun 2019 07:30:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HhM7yhZ7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437815AbfFLKFE (ORCPT + 99 others); Wed, 12 Jun 2019 06:05:04 -0400 Received: from mail-pl1-f194.google.com ([209.85.214.194]:41892 "EHLO mail-pl1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731837AbfFLKFE (ORCPT ); Wed, 12 Jun 2019 06:05:04 -0400 Received: by mail-pl1-f194.google.com with SMTP id s24so6423070plr.8; Wed, 12 Jun 2019 03:05:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=gcDvik9+KpaYGNhLdOFj21bkRuHqN/0qSRW+OLH4t8o=; b=HhM7yhZ7ia7xDPhEU1Jv5AWvfd0HzaBZjuY4Oc7cNiazWjv16Aa1UmpMsj9yT+rC2R cCuDSTK9xesfChyiZyV9D2yihvd52pNjgjo6vQX0BdoBUEp0ON5mQRguueGM/7Fb6DwI zrvjysyFn1N2Gmz+ojP/7pirWleYt5PwmnWc4Zl0CaxGIhBRVWkb2Hq98R2dfmqJhFU2 cBCcYNlUAiX2CFKHo2zF6RcO2dIrWfjRzRYiZubVgOgOlhC4y/f8jYQdzUFLdYQzI2x/ LMUjuatuN69pf2dXmPu02dyGXndwyovHUMKLzVOIsWmrriB5thmKkEHdo5/H7E8hH+X2 HumA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=gcDvik9+KpaYGNhLdOFj21bkRuHqN/0qSRW+OLH4t8o=; b=lON6ufAOVWXUY50LvAfxfBhO9nrmj/+5x9HuKLhR7T7Fwy3bW0QIfsjndnOTdCnm3o hWJqwW6OHnvnizWegGua1krNc0OB2S3FxxxK5OBXivpYzRLZwUD0GBMOz3mqY6xYJQtA TIpfjscn5gfouYEVvd7q5A4/eepM/SkhEQhy4s/n/rr70EHqXqfvjzMYIoDr1dl5ePmC icGLwxMaeGqp9bXa+z6tSSwDFtjOKk5It4i7kqCYl+jYrCw3z0w3/irL8w4OEdHu0zV/ Ic6Qv2E0Xej6sMU7PPJORLT2t254drEIZWfmhFeblvIdfjj7aD5RPKqYkgSHfoOzEVhU SqYg== X-Gm-Message-State: APjAAAWVXmIPexPMyGIh/OMxpxdswKFfuqwV8XvABv/wt3HUcdqzAKu8 GY1OOM2mVWaYZEovcqWRhEBEl8eHQE792w== X-Received: by 2002:a17:902:2926:: with SMTP id g35mr35288254plb.269.1560333903409; Wed, 12 Jun 2019 03:05:03 -0700 (PDT) Received: from jhedberg-mac01.fi.intel.com ([192.55.54.42]) by smtp.gmail.com with ESMTPSA id p2sm14958413pfb.118.2019.06.12.03.04.59 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 12 Jun 2019 03:05:02 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: [PATCH] Revert "Bluetooth: Align minimum encryption key size for LE and BR/EDR connections" From: Johan Hedberg In-Reply-To: <9ad95905975e09646f0f2aa967140881cbbe3477.camel@hadess.net> Date: Wed, 12 Jun 2019 13:04:57 +0300 Cc: Greg Kroah-Hartman , Marcel Holtmann , Vasily Khoruzhick , "David S. Miller" , "open list:BLUETOOTH DRIVERS" , netdev , linux-kernel , stable@vger.kernel.org Content-Transfer-Encoding: quoted-printable Message-Id: <77E07614-6F68-4661-BC6D-2BD610DBD62A@gmail.com> References: <20190522052002.10411-1-anarsoul@gmail.com> <6BD1D3F7-E2F2-4B2D-9479-06E27049133C@holtmann.org> <7B7F362B-6C8B-4112-8772-FB6BC708ABF5@holtmann.org> <723142BB-8217-4A01-A2B9-F527174FDC0F@holtmann.org> <20190612070701.GA13320@kroah.com> <9ad95905975e09646f0f2aa967140881cbbe3477.camel@hadess.net> To: Bastien Nocera X-Mailer: Apple Mail (2.3445.104.11) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 12 Jun 2019, at 12.38, Bastien Nocera wrote: >=20 > On Wed, 2019-06-12 at 09:07 +0200, Greg Kroah-Hartman wrote: >> On Tue, Jun 11, 2019 at 11:36:26PM +0200, Marcel Holtmann wrote: >>> Hi Vasily, >>>=20 >>>> Can we get this revert merged into stable branches? Bluetooth HID >>>> has >>>> been broken for many devices for quite a while now and RFC patch >>>> that >>>> fixes the breakage hasn't seen any movement for almost a month. >>>=20 >>> lets send the RFC patch upstream since it got enough feedback that >>> it fixes the issue. >>=20 >> According to Hans, the workaround did not work. >=20 > Is it possible that those folks were running Fedora, and using a > version of bluetoothd without a fix for using dbus-broker as the D-Bus > daemon implementation? >=20 > I backported the fix in an update last week: > https://bugzilla.redhat.com/show_bug.cgi?id=3D1711594 I don=E2=80=99t know if that=E2=80=99s the case, but at least based on = the comment here: https://bugzilla.kernel.org/show_bug.cgi?id=3D203643#c10 it looks like there=E2=80=99s still a race with controllers that do = support reading the encryption key size. The peer device may send an = L2CAP Connect Request before we=E2=80=99ve completed reading the key = size, in which case we=E2=80=99d still reject the request. For making = this work again I=E2=80=99m not aware of any other quick solution than a = revert. Johan