From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.2 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id BDE1DC31E47 for ; Wed, 12 Jun 2019 07:07:08 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 88D64205ED for ; Wed, 12 Jun 2019 07:07:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560323228; bh=GtigtzkEAHr+VEjATWqUUDT5Nt8U4B4G0dSmvG/CfD4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=Egx820WsGjQ3Ry3PeBv92VTZ9tpxiw8tzCvxiOJHmEz2FekG5LssMTAcrXXJBS0w2 9BoPSztFjlVj80ELXLd3Luo4DvfVENi5vwZ9hpHIXcOpGUWf0vk3iljUl0uL62q9z+ 9y6LbQ5vpsmItDF/GkzL+yDA+1j4mVM45WUKyqlc= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2407960AbfFLHHH (ORCPT ); Wed, 12 Jun 2019 03:07:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:42018 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2407185AbfFLHHF (ORCPT ); Wed, 12 Jun 2019 03:07:05 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CCD5B205ED; Wed, 12 Jun 2019 07:07:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560323224; bh=GtigtzkEAHr+VEjATWqUUDT5Nt8U4B4G0dSmvG/CfD4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Y9ZY+szQVuDeeYvSNyGaG6WXfZrwHvAkiNTdcNhJCvGNtkQZy7XsIlOzYpumLZxBa SmhNYffk8n3TlA8fYmSael5PHZyDaHygbZTycIRZRD9z+cpBHZFwYSO0zFJBKRMzow s1Gf4jbf7iY1fEGuyBkzQJrYjZ3h9uBRk2fZqx98= Date: Wed, 12 Jun 2019 09:07:01 +0200 From: Greg Kroah-Hartman To: Marcel Holtmann Cc: Vasily Khoruzhick , Johan Hedberg , "David S. Miller" , "open list:BLUETOOTH DRIVERS" , netdev , linux-kernel , stable@vger.kernel.org Subject: Re: [PATCH] Revert "Bluetooth: Align minimum encryption key size for LE and BR/EDR connections" Message-ID: <20190612070701.GA13320@kroah.com> References: <20190522052002.10411-1-anarsoul@gmail.com> <6BD1D3F7-E2F2-4B2D-9479-06E27049133C@holtmann.org> <7B7F362B-6C8B-4112-8772-FB6BC708ABF5@holtmann.org> <723142BB-8217-4A01-A2B9-F527174FDC0F@holtmann.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <723142BB-8217-4A01-A2B9-F527174FDC0F@holtmann.org> User-Agent: Mutt/1.12.0 (2019-05-25) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 11, 2019 at 11:36:26PM +0200, Marcel Holtmann wrote: > Hi Vasily, > > > Can we get this revert merged into stable branches? Bluetooth HID has > > been broken for many devices for quite a while now and RFC patch that > > fixes the breakage hasn't seen any movement for almost a month. > > lets send the RFC patch upstream since it got enough feedback that it fixes the issue. According to Hans, the workaround did not work. So can we just get this reverted so that people's machines go back to working? thanks, greg k-h