Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5022689ybl; Tue, 14 Jan 2020 02:08:29 -0800 (PST) X-Google-Smtp-Source: APXvYqzqLOpC1DD5fk/lVEnR/hGTrgv6ReU7IisNoC4N66DhHo1jcTxA5THworNjWN+a2VargUUp X-Received: by 2002:a9d:784b:: with SMTP id c11mr15458316otm.246.1578996509607; Tue, 14 Jan 2020 02:08:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578996509; cv=none; d=google.com; s=arc-20160816; b=okbYwCBMjM61zS6su8pnU3c5iaMQ2gLN7uHTLx45E/DWDwnVL71EosKi3Vo4RpDBbl r0Y7flKJ3AgqeoSJ7MQ70siJb/rFBor6cgzbjVwVLtmg88OctO7o3MAiojOrsRzCgI70 vFdyfoaZKPK7z9omGLPzs3H14XTP+eegWEXhENYrDbcwq/OLV9LWmPZpW0Vja0iYmBzu ouobZKHyW3aqWTi874ODdETB3TRWwri/tWk1ExgI5U+0aMryrogPwkFWTZcd205RhFCd /AwNJBpfFxHSlk53BkvW9HpxE6ET9YQnwIwNYOSsuTy3zShzzFBTtmrr5xycD6w3iMZu YIrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Jnjq6Y3F3KVV9+jOwryjDmJ2U9MXtG7htn+UctFwwfE=; b=vev98Y075zDIR7HlL9DiaMdXTeifsdww8wfRvu2hKM1DgXG8GgIO+7zHyo0ZvdlltA tRhxshXgzL1Aax6iHorZh9b5WeNnp1YcMUdwASs2OYal8iY4lLTiTWkGjcLVPMYeYKDu DaxmzfP+msbcV6zmuDGGx0YVhdp8BuiIcw2nHZSQqAGBKrn07O0PEvC0zkKUlxC+GscB TiUyB7/6IbTo4RPXHbO81wier+fmh76wMyb2XYA8qU06Li7wH12rTy4+e5FmUn0ZhX8e TPtRJFBbkXv6LA94y5hWqNzEo3xo2beDdTi3elW3eyVse4bR8uCv40je5Qwo2Q6ZXjX9 c59w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=S729PkJU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u12si8327417otq.51.2020.01.14.02.08.19; Tue, 14 Jan 2020 02:08:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=S729PkJU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730325AbgANKGM (ORCPT + 99 others); Tue, 14 Jan 2020 05:06:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:35002 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729654AbgANKGK (ORCPT ); Tue, 14 Jan 2020 05:06:10 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 257CA2467A; Tue, 14 Jan 2020 10:06:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578996370; bh=+PI48K9XTvgjwsMAYb2zfC9iKKt9NZ6/WaU3LZy+OyI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=S729PkJU6iy3Rqi4jeCXbfDpA53C5GimcIMSf2Ju0iXfFwG3TATHn5AOZbSHJmdRI NvlZa0Jbjdld1BkFEkJFtm373Q7VwBW7/wjJxsxBl7DQDnE5+lqsMbTVgJ2Nl7kNSY RU5SsKVkJa9lqQwBMXQKDRalDXBFHP96e0RIclK4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alan Stern , Laurent Pinchart , Roger Whittaker Subject: [PATCH 5.4 73/78] USB: Fix: Dont skip endpoint descriptors with maxpacket=0 Date: Tue, 14 Jan 2020 11:01:47 +0100 Message-Id: <20200114094403.165941697@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200114094352.428808181@linuxfoundation.org> References: <20200114094352.428808181@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alan Stern commit 2548288b4fb059b2da9ceada172ef763077e8a59 upstream. It turns out that even though endpoints with a maxpacket length of 0 aren't useful for data transfer, the descriptors do serve other purposes. In particular, skipping them will also skip over other class-specific descriptors for classes such as UVC. This unexpected side effect has caused some UVC cameras to stop working. In addition, the USB spec requires that when isochronous endpoint descriptors are present in an interface's altsetting 0 (which is true on some devices), the maxpacket size _must_ be set to 0. Warning about such things seems like a bad idea. This patch updates an earlier commit which would log a warning and skip these endpoint descriptors. Now we only log a warning, and we don't even do that for isochronous endpoints in altsetting 0. We don't need to worry about preventing endpoints with maxpacket = 0 from ever being used for data transfers; usb_submit_urb() already checks for this. Reported-and-tested-by: Roger Whittaker Fixes: d482c7bb0541 ("USB: Skip endpoints with 0 maxpacket length") Signed-off-by: Alan Stern CC: Laurent Pinchart Link: https://marc.info/?l=linux-usb&m=157790377329882&w=2 Link: https://lore.kernel.org/r/Pine.LNX.4.44L0.2001061040270.1514-100000@iolanthe.rowland.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/core/config.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) --- a/drivers/usb/core/config.c +++ b/drivers/usb/core/config.c @@ -392,12 +392,16 @@ static int usb_parse_endpoint(struct dev endpoint->desc.wMaxPacketSize = cpu_to_le16(8); } - /* Validate the wMaxPacketSize field */ + /* + * Validate the wMaxPacketSize field. + * Some devices have isochronous endpoints in altsetting 0; + * the USB-2 spec requires such endpoints to have wMaxPacketSize = 0 + * (see the end of section 5.6.3), so don't warn about them. + */ maxp = usb_endpoint_maxp(&endpoint->desc); - if (maxp == 0) { - dev_warn(ddev, "config %d interface %d altsetting %d endpoint 0x%X has wMaxPacketSize 0, skipping\n", + if (maxp == 0 && !(usb_endpoint_xfer_isoc(d) && asnum == 0)) { + dev_warn(ddev, "config %d interface %d altsetting %d endpoint 0x%X has invalid wMaxPacketSize 0\n", cfgno, inum, asnum, d->bEndpointAddress); - goto skip_to_next_endpoint_or_interface_descriptor; } /* Find the highest legal maxpacket size for this endpoint */