* [Bug 219571] New: Previous handle short-transfer fix for fake CSR controllers does not account for other fake devices
@ 2024-12-07 9:41 bugzilla-daemon
2024-12-07 9:44 ` [Bug 219571] " bugzilla-daemon
0 siblings, 1 reply; 2+ messages in thread
From: bugzilla-daemon @ 2024-12-07 9:41 UTC (permalink / raw)
To: linux-bluetooth
https://bugzilla.kernel.org/show_bug.cgi?id=219571
Bug ID: 219571
Summary: Previous handle short-transfer fix for fake CSR
controllers does not account for other fake devices
Product: Drivers
Version: 2.5
Hardware: AMD
OS: Linux
Status: NEW
Severity: high
Priority: P3
Component: Bluetooth
Assignee: linux-bluetooth@vger.kernel.org
Reporter: sohailsameja@gmail.com
Regression: Yes
Bisected 2c1dda2acc4192d826e84008d963b528e24d12bc
commit-id:
[ +9.730469] usb 1-1: new full-speed USB device number 10 using xhci_hcd
[ +3.071646] usb 1-2: new full-speed USB device number 11 using xhci_hcd
[ +0.374696] usb 1-2: New USB device found, idVendor=10d7, idProduct=b012,
bcdDevice=88.91
[ +0.000009] usb 1-2: New USB device strings: Mfr=0, Product=2, SerialNumber=0
[ +0.000003] usb 1-2: Product: CSR8510 A10
[ +0.017967] Bluetooth: hci0: HCI Read Default Erroneous Data Reporting
command is advertised, but not supported.
[ +0.000007] Bluetooth: hci0: HCI Read Transmit Power Level command is
advertised, but not supported.
[ +0.000002] Bluetooth: hci0: HCI LE Set Random Private Address Timeout
command is advertised, but not supported.
Some fake CSR controllers can also be identified as "Actions Semiconductor
ATS2851 based devices" i.e. 0x10d7, 0xb012 as seen above.
The previous fix should also account for such devices as well.
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 2+ messages in thread
* [Bug 219571] Previous handle short-transfer fix for fake CSR controllers does not account for other fake devices
2024-12-07 9:41 [Bug 219571] New: Previous handle short-transfer fix for fake CSR controllers does not account for other fake devices bugzilla-daemon
@ 2024-12-07 9:44 ` bugzilla-daemon
0 siblings, 0 replies; 2+ messages in thread
From: bugzilla-daemon @ 2024-12-07 9:44 UTC (permalink / raw)
To: linux-bluetooth
https://bugzilla.kernel.org/show_bug.cgi?id=219571
--- Comment #1 from Mohamed Sohail (sohailsameja@gmail.com) ---
[ +2.061002] Bluetooth: hci0: Opcode 0x1004 failed: -110
[ +0.000003] Bluetooth: hci0: command 0x1004 tx timeout
Forgot the above lines. Either reverting to the old code size handling code i.e
size = le16_to_cpu(data->intr_ep->wMaxPacketSize); or changing the
device identifier to match 0x10d7, 0xb012 fixes this.
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2024-12-07 9:44 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-12-07 9:41 [Bug 219571] New: Previous handle short-transfer fix for fake CSR controllers does not account for other fake devices bugzilla-daemon
2024-12-07 9:44 ` [Bug 219571] " bugzilla-daemon
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).