]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
4.9-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 6 Feb 2020 15:26:26 +0000 (16:26 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 6 Feb 2020 15:26:26 +0000 (16:26 +0100)
added patches:
alsa-dummy-fix-pcm-format-loop-in-proc-output.patch
brcmfmac-fix-memory-leak-in-brcmf_usbdev_qinit.patch
media-uvcvideo-avoid-cyclic-entity-chains-due-to-malformed-usb-descriptors.patch
mfd-dln2-more-sanity-checking-for-endpoints.patch
usb-gadget-f_ecm-use-atomic_t-to-track-in-flight-request.patch
usb-gadget-f_ncm-use-atomic_t-to-track-in-flight-request.patch
usb-gadget-legacy-set-max_speed-to-super-speed.patch

queue-4.9/alsa-dummy-fix-pcm-format-loop-in-proc-output.patch [new file with mode: 0644]
queue-4.9/brcmfmac-fix-memory-leak-in-brcmf_usbdev_qinit.patch [new file with mode: 0644]
queue-4.9/media-uvcvideo-avoid-cyclic-entity-chains-due-to-malformed-usb-descriptors.patch [new file with mode: 0644]
queue-4.9/mfd-dln2-more-sanity-checking-for-endpoints.patch [new file with mode: 0644]
queue-4.9/series
queue-4.9/usb-gadget-f_ecm-use-atomic_t-to-track-in-flight-request.patch [new file with mode: 0644]
queue-4.9/usb-gadget-f_ncm-use-atomic_t-to-track-in-flight-request.patch [new file with mode: 0644]
queue-4.9/usb-gadget-legacy-set-max_speed-to-super-speed.patch [new file with mode: 0644]

diff --git a/queue-4.9/alsa-dummy-fix-pcm-format-loop-in-proc-output.patch b/queue-4.9/alsa-dummy-fix-pcm-format-loop-in-proc-output.patch
new file mode 100644 (file)
index 0000000..d571e8b
--- /dev/null
@@ -0,0 +1,33 @@
+From 2acf25f13ebe8beb40e97a1bbe76f36277c64f1e Mon Sep 17 00:00:00 2001
+From: Takashi Iwai <tiwai@suse.de>
+Date: Sat, 1 Feb 2020 09:05:30 +0100
+Subject: ALSA: dummy: Fix PCM format loop in proc output
+
+From: Takashi Iwai <tiwai@suse.de>
+
+commit 2acf25f13ebe8beb40e97a1bbe76f36277c64f1e upstream.
+
+The loop termination for iterating over all formats should contain
+SNDRV_PCM_FORMAT_LAST, not less than it.
+
+Fixes: 9b151fec139d ("ALSA: dummy - Add debug proc file")
+Cc: <stable@vger.kernel.org>
+Link: https://lore.kernel.org/r/20200201080530.22390-3-tiwai@suse.de
+Signed-off-by: Takashi Iwai <tiwai@suse.de>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ sound/drivers/dummy.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/sound/drivers/dummy.c
++++ b/sound/drivers/dummy.c
+@@ -925,7 +925,7 @@ static void print_formats(struct snd_dum
+ {
+       int i;
+-      for (i = 0; i < SNDRV_PCM_FORMAT_LAST; i++) {
++      for (i = 0; i <= SNDRV_PCM_FORMAT_LAST; i++) {
+               if (dummy->pcm_hw.formats & (1ULL << i))
+                       snd_iprintf(buffer, " %s", snd_pcm_format_name(i));
+       }
diff --git a/queue-4.9/brcmfmac-fix-memory-leak-in-brcmf_usbdev_qinit.patch b/queue-4.9/brcmfmac-fix-memory-leak-in-brcmf_usbdev_qinit.patch
new file mode 100644 (file)
index 0000000..34bbb0e
--- /dev/null
@@ -0,0 +1,32 @@
+From 4282dc057d750c6a7dd92953564b15c26b54c22c Mon Sep 17 00:00:00 2001
+From: Navid Emamdoost <navid.emamdoost@gmail.com>
+Date: Sat, 14 Dec 2019 19:51:14 -0600
+Subject: brcmfmac: Fix memory leak in brcmf_usbdev_qinit
+
+From: Navid Emamdoost <navid.emamdoost@gmail.com>
+
+commit 4282dc057d750c6a7dd92953564b15c26b54c22c upstream.
+
+In the implementation of brcmf_usbdev_qinit() the allocated memory for
+reqs is leaking if usb_alloc_urb() fails. Release reqs in the error
+handling path.
+
+Fixes: 71bb244ba2fd ("brcm80211: fmac: add USB support for bcm43235/6/8 chipsets")
+Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
+Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c |    1 +
+ 1 file changed, 1 insertion(+)
+
+--- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c
++++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c
+@@ -438,6 +438,7 @@ fail:
+                       usb_free_urb(req->urb);
+               list_del(q->next);
+       }
++      kfree(reqs);
+       return NULL;
+ }
diff --git a/queue-4.9/media-uvcvideo-avoid-cyclic-entity-chains-due-to-malformed-usb-descriptors.patch b/queue-4.9/media-uvcvideo-avoid-cyclic-entity-chains-due-to-malformed-usb-descriptors.patch
new file mode 100644 (file)
index 0000000..ce18b20
--- /dev/null
@@ -0,0 +1,114 @@
+From 68035c80e129c4cfec659aac4180354530b26527 Mon Sep 17 00:00:00 2001
+From: Will Deacon <will@kernel.org>
+Date: Fri, 8 Nov 2019 16:48:38 +0100
+Subject: media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
+
+From: Will Deacon <will@kernel.org>
+
+commit 68035c80e129c4cfec659aac4180354530b26527 upstream.
+
+Way back in 2017, fuzzing the 4.14-rc2 USB stack with syzkaller kicked
+up the following WARNING from the UVC chain scanning code:
+
+  | list_add double add: new=ffff880069084010, prev=ffff880069084010,
+  | next=ffff880067d22298.
+  | ------------[ cut here ]------------
+  | WARNING: CPU: 1 PID: 1846 at lib/list_debug.c:31 __list_add_valid+0xbd/0xf0
+  | Modules linked in:
+  | CPU: 1 PID: 1846 Comm: kworker/1:2 Not tainted
+  | 4.14.0-rc2-42613-g1488251d1a98 #238
+  | Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
+  | Workqueue: usb_hub_wq hub_event
+  | task: ffff88006b01ca40 task.stack: ffff880064358000
+  | RIP: 0010:__list_add_valid+0xbd/0xf0 lib/list_debug.c:29
+  | RSP: 0018:ffff88006435ddd0 EFLAGS: 00010286
+  | RAX: 0000000000000058 RBX: ffff880067d22298 RCX: 0000000000000000
+  | RDX: 0000000000000058 RSI: ffffffff85a58800 RDI: ffffed000c86bbac
+  | RBP: ffff88006435dde8 R08: 1ffff1000c86ba52 R09: 0000000000000000
+  | R10: 0000000000000002 R11: 0000000000000000 R12: ffff880069084010
+  | R13: ffff880067d22298 R14: ffff880069084010 R15: ffff880067d222a0
+  | FS:  0000000000000000(0000) GS:ffff88006c900000(0000) knlGS:0000000000000000
+  | CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
+  | CR2: 0000000020004ff2 CR3: 000000006b447000 CR4: 00000000000006e0
+  | Call Trace:
+  |  __list_add ./include/linux/list.h:59
+  |  list_add_tail+0x8c/0x1b0 ./include/linux/list.h:92
+  |  uvc_scan_chain_forward.isra.8+0x373/0x416
+  | drivers/media/usb/uvc/uvc_driver.c:1471
+  |  uvc_scan_chain drivers/media/usb/uvc/uvc_driver.c:1585
+  |  uvc_scan_device drivers/media/usb/uvc/uvc_driver.c:1769
+  |  uvc_probe+0x77f2/0x8f00 drivers/media/usb/uvc/uvc_driver.c:2104
+
+Looking into the output from usbmon, the interesting part is the
+following data packet:
+
+  ffff880069c63e00 30710169 C Ci:1:002:0 0 143 = 09028f00 01030080
+  00090403 00000e01 00000924 03000103 7c003328 010204db
+
+If we drop the lead configuration and interface descriptors, we're left
+with an output terminal descriptor describing a generic display:
+
+  /* Output terminal descriptor */
+  buf[0]       09
+  buf[1]       24
+  buf[2]       03      /* UVC_VC_OUTPUT_TERMINAL */
+  buf[3]       00      /* ID */
+  buf[4]       01      /* type == 0x0301 (UVC_OTT_DISPLAY) */
+  buf[5]       03
+  buf[6]       7c
+  buf[7]       00      /* source ID refers to self! */
+  buf[8]       33
+
+The problem with this descriptor is that it is self-referential: the
+source ID of 0 matches itself! This causes the 'struct uvc_entity'
+representing the display to be added to its chain list twice during
+'uvc_scan_chain()': once via 'uvc_scan_chain_entity()' when it is
+processed directly from the 'dev->entities' list and then again
+immediately afterwards when trying to follow the source ID in
+'uvc_scan_chain_forward()'
+
+Add a check before adding an entity to a chain list to ensure that the
+entity is not already part of a chain.
+
+Link: https://lore.kernel.org/linux-media/CAAeHK+z+Si69jUR+N-SjN9q4O+o5KFiNManqEa-PjUta7EOb7A@mail.gmail.com/
+
+Cc: <stable@vger.kernel.org>
+Fixes: c0efd232929c ("V4L/DVB (8145a): USB Video Class driver")
+Reported-by: Andrey Konovalov <andreyknvl@google.com>
+Signed-off-by: Will Deacon <will@kernel.org>
+Signed-off-by: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
+Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/media/usb/uvc/uvc_driver.c |   12 ++++++++++++
+ 1 file changed, 12 insertions(+)
+
+--- a/drivers/media/usb/uvc/uvc_driver.c
++++ b/drivers/media/usb/uvc/uvc_driver.c
+@@ -1411,6 +1411,11 @@ static int uvc_scan_chain_forward(struct
+                       break;
+               if (forward == prev)
+                       continue;
++              if (forward->chain.next || forward->chain.prev) {
++                      uvc_trace(UVC_TRACE_DESCR, "Found reference to "
++                              "entity %d already in chain.\n", forward->id);
++                      return -EINVAL;
++              }
+               switch (UVC_ENTITY_TYPE(forward)) {
+               case UVC_VC_EXTENSION_UNIT:
+@@ -1492,6 +1497,13 @@ static int uvc_scan_chain_backward(struc
+                               return -1;
+                       }
++                      if (term->chain.next || term->chain.prev) {
++                              uvc_trace(UVC_TRACE_DESCR, "Found reference to "
++                                      "entity %d already in chain.\n",
++                                      term->id);
++                              return -EINVAL;
++                      }
++
+                       if (uvc_trace_param & UVC_TRACE_PROBE)
+                               printk(" %d", term->id);
diff --git a/queue-4.9/mfd-dln2-more-sanity-checking-for-endpoints.patch b/queue-4.9/mfd-dln2-more-sanity-checking-for-endpoints.patch
new file mode 100644 (file)
index 0000000..52f8e92
--- /dev/null
@@ -0,0 +1,55 @@
+From 2b8bd606b1e60ca28c765f69c1eedd7d2a2e9dca Mon Sep 17 00:00:00 2001
+From: Oliver Neukum <oneukum@suse.com>
+Date: Thu, 21 Nov 2019 11:28:10 +0100
+Subject: mfd: dln2: More sanity checking for endpoints
+
+From: Oliver Neukum <oneukum@suse.com>
+
+commit 2b8bd606b1e60ca28c765f69c1eedd7d2a2e9dca upstream.
+
+It is not enough to check for the number of endpoints.
+The types must also be correct.
+
+Reported-and-tested-by: syzbot+48a2851be24583b864dc@syzkaller.appspotmail.com
+Signed-off-by: Oliver Neukum <oneukum@suse.com>
+Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+Signed-off-by: Lee Jones <lee.jones@linaro.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/mfd/dln2.c |   13 +++++++++++--
+ 1 file changed, 11 insertions(+), 2 deletions(-)
+
+--- a/drivers/mfd/dln2.c
++++ b/drivers/mfd/dln2.c
+@@ -729,6 +729,8 @@ static int dln2_probe(struct usb_interfa
+                     const struct usb_device_id *usb_id)
+ {
+       struct usb_host_interface *hostif = interface->cur_altsetting;
++      struct usb_endpoint_descriptor *epin;
++      struct usb_endpoint_descriptor *epout;
+       struct device *dev = &interface->dev;
+       struct dln2_dev *dln2;
+       int ret;
+@@ -738,12 +740,19 @@ static int dln2_probe(struct usb_interfa
+           hostif->desc.bNumEndpoints < 2)
+               return -ENODEV;
++      epin = &hostif->endpoint[0].desc;
++      epout = &hostif->endpoint[1].desc;
++      if (!usb_endpoint_is_bulk_out(epout))
++              return -ENODEV;
++      if (!usb_endpoint_is_bulk_in(epin))
++              return -ENODEV;
++
+       dln2 = kzalloc(sizeof(*dln2), GFP_KERNEL);
+       if (!dln2)
+               return -ENOMEM;
+-      dln2->ep_out = hostif->endpoint[0].desc.bEndpointAddress;
+-      dln2->ep_in = hostif->endpoint[1].desc.bEndpointAddress;
++      dln2->ep_out = epout->bEndpointAddress;
++      dln2->ep_in = epin->bEndpointAddress;
+       dln2->usb_dev = usb_get_dev(interface_to_usbdev(interface));
+       dln2->interface = interface;
+       usb_set_intfdata(interface, dln2);
index ee3d9a3d8f114a879b0313e7ec1b705cf2007447..677ca620b3b534ec525a680db4bf0162fc1302a4 100644 (file)
@@ -12,3 +12,10 @@ tcp-clear-tp-total_retrans-in-tcp_disconnect.patch
 tcp-clear-tp-delivered-in-tcp_disconnect.patch
 tcp-clear-tp-data_segs-in-out-in-tcp_disconnect.patch
 tcp-clear-tp-segs_-in-out-in-tcp_disconnect.patch
+media-uvcvideo-avoid-cyclic-entity-chains-due-to-malformed-usb-descriptors.patch
+mfd-dln2-more-sanity-checking-for-endpoints.patch
+brcmfmac-fix-memory-leak-in-brcmf_usbdev_qinit.patch
+usb-gadget-legacy-set-max_speed-to-super-speed.patch
+usb-gadget-f_ncm-use-atomic_t-to-track-in-flight-request.patch
+usb-gadget-f_ecm-use-atomic_t-to-track-in-flight-request.patch
+alsa-dummy-fix-pcm-format-loop-in-proc-output.patch
diff --git a/queue-4.9/usb-gadget-f_ecm-use-atomic_t-to-track-in-flight-request.patch b/queue-4.9/usb-gadget-f_ecm-use-atomic_t-to-track-in-flight-request.patch
new file mode 100644 (file)
index 0000000..1af1057
--- /dev/null
@@ -0,0 +1,91 @@
+From d710562e01c48d59be3f60d58b7a85958b39aeda Mon Sep 17 00:00:00 2001
+From: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
+Date: Thu, 9 Jan 2020 13:17:22 +0000
+Subject: usb: gadget: f_ecm: Use atomic_t to track in-flight request
+
+From: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
+
+commit d710562e01c48d59be3f60d58b7a85958b39aeda upstream.
+
+Currently ecm->notify_req is used to flag when a request is in-flight.
+ecm->notify_req is set to NULL and when a request completes it is
+subsequently reset.
+
+This is fundamentally buggy in that the unbind logic of the ECM driver will
+unconditionally free ecm->notify_req leading to a NULL pointer dereference.
+
+Fixes: da741b8c56d6 ("usb ethernet gadget: split CDC Ethernet function")
+Cc: stable <stable@vger.kernel.org>
+Signed-off-by: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
+Signed-off-by: Felipe Balbi <balbi@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/usb/gadget/function/f_ecm.c |   16 ++++++++++++----
+ 1 file changed, 12 insertions(+), 4 deletions(-)
+
+--- a/drivers/usb/gadget/function/f_ecm.c
++++ b/drivers/usb/gadget/function/f_ecm.c
+@@ -56,6 +56,7 @@ struct f_ecm {
+       struct usb_ep                   *notify;
+       struct usb_request              *notify_req;
+       u8                              notify_state;
++      atomic_t                        notify_count;
+       bool                            is_open;
+       /* FIXME is_open needs some irq-ish locking
+@@ -384,7 +385,7 @@ static void ecm_do_notify(struct f_ecm *
+       int                             status;
+       /* notification already in flight? */
+-      if (!req)
++      if (atomic_read(&ecm->notify_count))
+               return;
+       event = req->buf;
+@@ -424,10 +425,10 @@ static void ecm_do_notify(struct f_ecm *
+       event->bmRequestType = 0xA1;
+       event->wIndex = cpu_to_le16(ecm->ctrl_id);
+-      ecm->notify_req = NULL;
++      atomic_inc(&ecm->notify_count);
+       status = usb_ep_queue(ecm->notify, req, GFP_ATOMIC);
+       if (status < 0) {
+-              ecm->notify_req = req;
++              atomic_dec(&ecm->notify_count);
+               DBG(cdev, "notify --> %d\n", status);
+       }
+ }
+@@ -452,17 +453,19 @@ static void ecm_notify_complete(struct u
+       switch (req->status) {
+       case 0:
+               /* no fault */
++              atomic_dec(&ecm->notify_count);
+               break;
+       case -ECONNRESET:
+       case -ESHUTDOWN:
++              atomic_set(&ecm->notify_count, 0);
+               ecm->notify_state = ECM_NOTIFY_NONE;
+               break;
+       default:
+               DBG(cdev, "event %02x --> %d\n",
+                       event->bNotificationType, req->status);
++              atomic_dec(&ecm->notify_count);
+               break;
+       }
+-      ecm->notify_req = req;
+       ecm_do_notify(ecm);
+ }
+@@ -909,6 +912,11 @@ static void ecm_unbind(struct usb_config
+       usb_free_all_descriptors(f);
++      if (atomic_read(&ecm->notify_count)) {
++              usb_ep_dequeue(ecm->notify, ecm->notify_req);
++              atomic_set(&ecm->notify_count, 0);
++      }
++
+       kfree(ecm->notify_req->buf);
+       usb_ep_free_request(ecm->notify, ecm->notify_req);
+ }
diff --git a/queue-4.9/usb-gadget-f_ncm-use-atomic_t-to-track-in-flight-request.patch b/queue-4.9/usb-gadget-f_ncm-use-atomic_t-to-track-in-flight-request.patch
new file mode 100644 (file)
index 0000000..8d8c08f
--- /dev/null
@@ -0,0 +1,97 @@
+From 5b24c28cfe136597dc3913e1c00b119307a20c7e Mon Sep 17 00:00:00 2001
+From: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
+Date: Thu, 9 Jan 2020 13:17:21 +0000
+Subject: usb: gadget: f_ncm: Use atomic_t to track in-flight request
+
+From: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
+
+commit 5b24c28cfe136597dc3913e1c00b119307a20c7e upstream.
+
+Currently ncm->notify_req is used to flag when a request is in-flight.
+ncm->notify_req is set to NULL and when a request completes it is
+subsequently reset.
+
+This is fundamentally buggy in that the unbind logic of the NCM driver will
+unconditionally free ncm->notify_req leading to a NULL pointer dereference.
+
+Fixes: 40d133d7f542 ("usb: gadget: f_ncm: convert to new function interface with backward compatibility")
+Cc: stable <stable@vger.kernel.org>
+Signed-off-by: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
+Signed-off-by: Felipe Balbi <balbi@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/usb/gadget/function/f_ncm.c |   17 +++++++++++++----
+ 1 file changed, 13 insertions(+), 4 deletions(-)
+
+--- a/drivers/usb/gadget/function/f_ncm.c
++++ b/drivers/usb/gadget/function/f_ncm.c
+@@ -57,6 +57,7 @@ struct f_ncm {
+       struct usb_ep                   *notify;
+       struct usb_request              *notify_req;
+       u8                              notify_state;
++      atomic_t                        notify_count;
+       bool                            is_open;
+       const struct ndp_parser_opts    *parser_opts;
+@@ -552,7 +553,7 @@ static void ncm_do_notify(struct f_ncm *
+       int                             status;
+       /* notification already in flight? */
+-      if (!req)
++      if (atomic_read(&ncm->notify_count))
+               return;
+       event = req->buf;
+@@ -592,7 +593,8 @@ static void ncm_do_notify(struct f_ncm *
+       event->bmRequestType = 0xA1;
+       event->wIndex = cpu_to_le16(ncm->ctrl_id);
+-      ncm->notify_req = NULL;
++      atomic_inc(&ncm->notify_count);
++
+       /*
+        * In double buffering if there is a space in FIFO,
+        * completion callback can be called right after the call,
+@@ -602,7 +604,7 @@ static void ncm_do_notify(struct f_ncm *
+       status = usb_ep_queue(ncm->notify, req, GFP_ATOMIC);
+       spin_lock(&ncm->lock);
+       if (status < 0) {
+-              ncm->notify_req = req;
++              atomic_dec(&ncm->notify_count);
+               DBG(cdev, "notify --> %d\n", status);
+       }
+ }
+@@ -637,17 +639,19 @@ static void ncm_notify_complete(struct u
+       case 0:
+               VDBG(cdev, "Notification %02x sent\n",
+                    event->bNotificationType);
++              atomic_dec(&ncm->notify_count);
+               break;
+       case -ECONNRESET:
+       case -ESHUTDOWN:
++              atomic_set(&ncm->notify_count, 0);
+               ncm->notify_state = NCM_NOTIFY_NONE;
+               break;
+       default:
+               DBG(cdev, "event %02x --> %d\n",
+                       event->bNotificationType, req->status);
++              atomic_dec(&ncm->notify_count);
+               break;
+       }
+-      ncm->notify_req = req;
+       ncm_do_notify(ncm);
+       spin_unlock(&ncm->lock);
+ }
+@@ -1639,6 +1643,11 @@ static void ncm_unbind(struct usb_config
+       ncm_string_defs[0].id = 0;
+       usb_free_all_descriptors(f);
++      if (atomic_read(&ncm->notify_count)) {
++              usb_ep_dequeue(ncm->notify, ncm->notify_req);
++              atomic_set(&ncm->notify_count, 0);
++      }
++
+       kfree(ncm->notify_req->buf);
+       usb_ep_free_request(ncm->notify, ncm->notify_req);
+ }
diff --git a/queue-4.9/usb-gadget-legacy-set-max_speed-to-super-speed.patch b/queue-4.9/usb-gadget-legacy-set-max_speed-to-super-speed.patch
new file mode 100644 (file)
index 0000000..105fdea
--- /dev/null
@@ -0,0 +1,68 @@
+From 463f67aec2837f981b0a0ce8617721ff59685c00 Mon Sep 17 00:00:00 2001
+From: Roger Quadros <rogerq@ti.com>
+Date: Mon, 23 Dec 2019 08:47:35 +0200
+Subject: usb: gadget: legacy: set max_speed to super-speed
+
+From: Roger Quadros <rogerq@ti.com>
+
+commit 463f67aec2837f981b0a0ce8617721ff59685c00 upstream.
+
+These interfaces do support super-speed so let's not
+limit maximum speed to high-speed.
+
+Cc: <stable@vger.kernel.org>
+Signed-off-by: Roger Quadros <rogerq@ti.com>
+Signed-off-by: Felipe Balbi <balbi@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/usb/gadget/legacy/cdc2.c  |    2 +-
+ drivers/usb/gadget/legacy/g_ffs.c |    2 +-
+ drivers/usb/gadget/legacy/multi.c |    2 +-
+ drivers/usb/gadget/legacy/ncm.c   |    2 +-
+ 4 files changed, 4 insertions(+), 4 deletions(-)
+
+--- a/drivers/usb/gadget/legacy/cdc2.c
++++ b/drivers/usb/gadget/legacy/cdc2.c
+@@ -229,7 +229,7 @@ static struct usb_composite_driver cdc_d
+       .name           = "g_cdc",
+       .dev            = &device_desc,
+       .strings        = dev_strings,
+-      .max_speed      = USB_SPEED_HIGH,
++      .max_speed      = USB_SPEED_SUPER,
+       .bind           = cdc_bind,
+       .unbind         = cdc_unbind,
+ };
+--- a/drivers/usb/gadget/legacy/g_ffs.c
++++ b/drivers/usb/gadget/legacy/g_ffs.c
+@@ -153,7 +153,7 @@ static struct usb_composite_driver gfs_d
+       .name           = DRIVER_NAME,
+       .dev            = &gfs_dev_desc,
+       .strings        = gfs_dev_strings,
+-      .max_speed      = USB_SPEED_HIGH,
++      .max_speed      = USB_SPEED_SUPER,
+       .bind           = gfs_bind,
+       .unbind         = gfs_unbind,
+ };
+--- a/drivers/usb/gadget/legacy/multi.c
++++ b/drivers/usb/gadget/legacy/multi.c
+@@ -486,7 +486,7 @@ static struct usb_composite_driver multi
+       .name           = "g_multi",
+       .dev            = &device_desc,
+       .strings        = dev_strings,
+-      .max_speed      = USB_SPEED_HIGH,
++      .max_speed      = USB_SPEED_SUPER,
+       .bind           = multi_bind,
+       .unbind         = multi_unbind,
+       .needs_serial   = 1,
+--- a/drivers/usb/gadget/legacy/ncm.c
++++ b/drivers/usb/gadget/legacy/ncm.c
+@@ -203,7 +203,7 @@ static struct usb_composite_driver ncm_d
+       .name           = "g_ncm",
+       .dev            = &device_desc,
+       .strings        = dev_strings,
+-      .max_speed      = USB_SPEED_HIGH,
++      .max_speed      = USB_SPEED_SUPER,
+       .bind           = gncm_bind,
+       .unbind         = gncm_unbind,
+ };