From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.2 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_MUTT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 38DCCC31E47 for ; Wed, 12 Jun 2019 07:07:14 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id EF84F20896 for ; Wed, 12 Jun 2019 07:07:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560323234; bh=GtigtzkEAHr+VEjATWqUUDT5Nt8U4B4G0dSmvG/CfD4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=OQ/XGDocfxFarR8phNu6sfNom5uL+yxNB8eHsEDRdbP49Dj+3PMoSNN+bzAjKczZT O8xL53mPBOMIZ4c6WYW9ypsp7LqZFjuXwOvwlZdrzXuzbD5IVah8iTmiTC+uZ7UWNl Iu2cTr9/VTpSOc5rmdnyGzMu585XE9IsgLxxA+9I= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2407912AbfFLHHG (ORCPT ); Wed, 12 Jun 2019 03:07:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:42018 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2407185AbfFLHHF (ORCPT ); Wed, 12 Jun 2019 03:07:05 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CCD5B205ED; Wed, 12 Jun 2019 07:07:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560323224; bh=GtigtzkEAHr+VEjATWqUUDT5Nt8U4B4G0dSmvG/CfD4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Y9ZY+szQVuDeeYvSNyGaG6WXfZrwHvAkiNTdcNhJCvGNtkQZy7XsIlOzYpumLZxBa SmhNYffk8n3TlA8fYmSael5PHZyDaHygbZTycIRZRD9z+cpBHZFwYSO0zFJBKRMzow s1Gf4jbf7iY1fEGuyBkzQJrYjZ3h9uBRk2fZqx98= Date: Wed, 12 Jun 2019 09:07:01 +0200 From: Greg Kroah-Hartman To: Marcel Holtmann Cc: Vasily Khoruzhick , Johan Hedberg , "David S. Miller" , "open list:BLUETOOTH DRIVERS" , netdev , linux-kernel , stable@vger.kernel.org Subject: Re: [PATCH] Revert "Bluetooth: Align minimum encryption key size for LE and BR/EDR connections" Message-ID: <20190612070701.GA13320@kroah.com> References: <20190522052002.10411-1-anarsoul@gmail.com> <6BD1D3F7-E2F2-4B2D-9479-06E27049133C@holtmann.org> <7B7F362B-6C8B-4112-8772-FB6BC708ABF5@holtmann.org> <723142BB-8217-4A01-A2B9-F527174FDC0F@holtmann.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <723142BB-8217-4A01-A2B9-F527174FDC0F@holtmann.org> User-Agent: Mutt/1.12.0 (2019-05-25) Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Tue, Jun 11, 2019 at 11:36:26PM +0200, Marcel Holtmann wrote: > Hi Vasily, > > > Can we get this revert merged into stable branches? Bluetooth HID has > > been broken for many devices for quite a while now and RFC patch that > > fixes the breakage hasn't seen any movement for almost a month. > > lets send the RFC patch upstream since it got enough feedback that it fixes the issue. According to Hans, the workaround did not work. So can we just get this reverted so that people's machines go back to working? thanks, greg k-h