Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp41475rdb; Mon, 4 Dec 2023 19:40:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IHckmw8VR2S1XSdRy7WQVNZ/+xmXu5Ua2Quj8RI8p69ZMRBhXvfEaqMymm6qzMKKAnRPU3Y X-Received: by 2002:a05:6e02:2185:b0:35d:7284:af3d with SMTP id j5-20020a056e02218500b0035d7284af3dmr2887501ila.73.1701747648854; Mon, 04 Dec 2023 19:40:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701747648; cv=none; d=google.com; s=arc-20160816; b=I2QFO+qw7dZisZQXd69DvApjzrB5bs4GFqLayY7H+xLE7nAQiivZXu3Jgqoxk88gTF fxt+6kq3Fc0z3vdlxwBLs/v9rwcsV9zAGP8L7mqk2dKpAZmme7VLSVaa2qL6DT0enWC0 Nx+Au/8pvw03svc+9FpXtp8F1UuHxVcfjCwWFCIelCqD53Zt/ILWcSFTjiqBTEVs1wgm WzCrMdMbvV5u/7qi3M/0rMsG9ZlF4uI0QS4gEHvHFOj2BZQ2n59vGRm4K+BRh6EKYLQs dfScyJgXZT2gjQHV9I5fLDVGKV0GK1Cqrd6zJnsdfyKWHa6wzD4yMzzvjvG07msAlLzJ tzxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:in-reply-to:references:date:message-id:from:subject :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=yhkenj/hSVcy7KJVr7qUTNlGVbKMpl637bT87IH6sdY=; fh=rDlu6HD/Sk/CcXEjg1yFjWw2vHe2soUrbLV+hl8kY/M=; b=UTK4PfexprAhIiG7YNxenLdF0ROLXyxXCd2mL25n5GhchqdyS377roni+3kSh8LHGL wwDM0meoEVKcw0jgatU1uGUSKqfVWJfEOTQGxQV3K/9nJ7aW7h3X1qXtoarSaCbxk81a W9E+bJoU6qGDUaXU78m47qs8YKSXOA5S+opnt0O0BcGMgfK9aCv/hV7H1F9Yp1CxLmrU x5zjDiVAmbvB0iIwr5P31kv78GP5Z+cQOB5cN/ba6t8yz8a+OMd4UE/uQW30idrkWQgf OaSA4BeA+4eRTEJbCL+6IHQemwtEumEUqIeeelWHXsOwA+Z6xhUAH7LfOPmqrDhGUP5K 5OiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@kernel.org header.s=k20201202 header.b=NG4dKKxd; spf=pass (google.com: domain of linux-bluetooth+bounces-392-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-bluetooth+bounces-392-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id x17-20020a17090ab01100b00286d6caba8esi861207pjq.95.2023.12.04.19.40.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Dec 2023 19:40:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-bluetooth+bounces-392-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=fail header.i=@kernel.org header.s=k20201202 header.b=NG4dKKxd; spf=pass (google.com: domain of linux-bluetooth+bounces-392-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-bluetooth+bounces-392-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 30DF7B20D1E for ; Tue, 5 Dec 2023 03:40:42 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6C598CA56; Tue, 5 Dec 2023 03:40:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="NG4dKKxd" X-Original-To: linux-bluetooth@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 97F528F56 for ; Tue, 5 Dec 2023 03:40:27 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPS id 2D7ECC433CC; Tue, 5 Dec 2023 03:40:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701747627; bh=e7Xt5fxqFqPXDQ1iNjlfjfhIF4XKAaA3TRPZAFdrFS8=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=NG4dKKxdsqdqLqRzK9X9KpJKBti+/p9nlbKyTyipeCvkF6H8RagHi4pUf3AsAtmKn mspeuVBrtH6CGtlIw/yV4YHx68WWCTEYv7AJaqIvyjswLK7co/acdZNG2YdcqwBAuv hfAlHVVIrEQDM83XSk5waIG1QuX/Jkz+uE0oPxNH3FXhuYOogtCzWLINWtl9mzVCnI yWXqGNl+dw/wk/hsVS6ZdlYWFluh5z4fk+TPCZdlnyKrpZ+pl8Qh3mMOL5fmXaC+2n uiJcfSOUYAlzo6ln/gFQpNI3MxmURR0YMOF4B9naLSWQT82fcyJ8mMHzpFb9O9lCQw fukKhnjUn7k3g== Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id 1524DDD4EEE; Tue, 5 Dec 2023 03:40:27 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Precedence: bulk X-Mailing-List: linux-bluetooth@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH BlueZ] adapter: Enable SSP after enabling BREDR From: patchwork-bot+bluetooth@kernel.org Message-Id: <170174762708.12231.8519747865289795903.git-patchwork-notify@kernel.org> Date: Tue, 05 Dec 2023 03:40:27 +0000 References: <20231129101627.1742015-1-pwaago@cisco.com> In-Reply-To: <20231129101627.1742015-1-pwaago@cisco.com> To: =?utf-8?b?UGVyIFdhYWfDuCA8cHdhYWdvQGNpc2NvLmNvbT4=?=@codeaurora.org Cc: linux-bluetooth@vger.kernel.org Hello: This patch was applied to bluetooth/bluez.git (master) by Luiz Augusto von Dentz : On Wed, 29 Nov 2023 11:16:27 +0100 you wrote: > When enabling Secure Simple Pairing, the kernel first checks if > BREDR is enabled. If it's not, enabling SSP fails. Therefore, it > is necessary to make sure that BREDR is enabled before enabling > SSP. > > Without this fix, bluetoothd would start without SSP enabled if > started in dual or bredr mode after it had been run in le mode. > > [...] Here is the summary with links: - [BlueZ] adapter: Enable SSP after enabling BREDR https://git.kernel.org/pub/scm/bluetooth/bluez.git/?id=227e16f5c987 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html