Re: divide error in usbtmc_generic_read

2019-08-20 Thread Oliver Neukum
Am Montag, den 19.08.2019, 17:40 +0200 schrieb Andrey Konovalov: > > This implies that we can differentiate between different crashes. We > can differentiate between different manifestations of crashes, but > those can be caused by the same bug. I think we can remove the word > "still" though, so

[PATCH] usbtmc: more sanity checking for packet size

2019-08-20 Thread Oliver Neukum
A malicious device can make the driver divide ny zero with a nonsense maximum packet size. V2: return a sensible error code SIgned-off-by: Oliver Neukum --- drivers/usb/class/usbtmc.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/usb/class/usbtmc.c b/drivers/usb/class/usbtmc.c

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread Oliver Neukum
Am Montag, den 19.08.2019, 17:50 -0700 schrieb syzbot: > syzbot has found a reproducer for the following crash on: Hi Bjørn, taking you into CC as you are affected. > HEAD commit:e06ce4da usb-fuzzer: main usb gadget fuzzer driver > git tree: https://github.com/google/kasan.git usb-fuzz

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread syzbot
Hello, syzbot has tested the proposed patch but the reproducer still triggered crash: INFO: task hung in wdm_flush INFO: task syz-executor.1:2841 blocked for more than 143 seconds. Not tainted 5.3.0-rc5+ #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-ex

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread Bjørn Mork
Oliver Neukum writes: > diff --git a/drivers/usb/class/cdc-wdm.c b/drivers/usb/class/cdc-wdm.c > index 1656f5155ab8..a341081a5f47 100644 > --- a/drivers/usb/class/cdc-wdm.c > +++ b/drivers/usb/class/cdc-wdm.c > @@ -588,14 +588,24 @@ static int wdm_flush(struct file *file, fl_owner_t id) > { >

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread Oliver Neukum
Am Montag, den 19.08.2019, 17:50 -0700 schrieb syzbot: > syzbot has found a reproducer for the following crash on: Hi Bjørn, taking you into CC as you are affected. V2: fix logic bug Regards Oliver > HEAD commit:e06ce4da usb-fuzzer: main usb gadget fuzzer driver > g

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread syzbot
Hello, syzbot has tested the proposed patch and the reproducer did not trigger crash: Reported-and-tested-by: syzbot+d232cca6ec42c2edb...@syzkaller.appspotmail.com Tested on: commit: e06ce4da usb-fuzzer: main usb gadget fuzzer driver git tree: https://github.com/google/kasa

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread Oliver Neukum
Am Dienstag, den 20.08.2019, 12:44 +0200 schrieb Bjørn Mork : > Oliver Neukum writes: > > > diff --git a/drivers/usb/class/cdc-wdm.c b/drivers/usb/class/cdc-wdm.c > > index 1656f5155ab8..a341081a5f47 100644 > > --- a/drivers/usb/class/cdc-wdm.c > > +++ b/drivers/usb/class/cdc-wdm.c > > @@ -588,14

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread Oliver Neukum
Am Montag, den 19.08.2019, 17:50 -0700 schrieb syzbot: > syzbot has found a reproducer for the following crash on: Hi Bjørn, taking you into CC as you are affected. V3: changes you suggested > HEAD commit:e06ce4da usb-fuzzer: main usb gadget fuzzer driver > git tree: https://github.com

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread syzbot
Hello, syzbot has tested the proposed patch and the reproducer did not trigger crash: Reported-and-tested-by: syzbot+d232cca6ec42c2edb...@syzkaller.appspotmail.com Tested on: commit: e06ce4da usb-fuzzer: main usb gadget fuzzer driver git tree: https://github.com/google/kasa

Re: WARNING in kmem_cache_alloc_trace

2019-08-20 Thread Oliver Neukum
Am Montag, den 19.08.2019, 18:59 +0200 schrieb Andrey Konovalov: > On Mon, Aug 19, 2019 at 6:18 PM syzbot > wrote: > > > > Hello, > > > > syzbot found the following crash on: > > > > HEAD commit:d0847550 usb-fuzzer: main usb gadget fuzzer driver > > git tree: https://github.com/google

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread Bjørn Mork
Oliver Neukum writes: > + wait_event(desc->wait, > + /* > + * needs both flags. We cannot do with one > + * because resetting it would cause a race > + * with write() yet we need to signal > +

Re: WARNING in kmem_cache_alloc_trace

2019-08-20 Thread syzbot
Hello, syzbot tried to test the proposed patch but build/boot failed: rs/staging/uwb/lc-dev.o CC drivers/staging/uwb/lc-rc.o CC drivers/staging/uwb/neh.o CC drivers/video/fbdev/core/cfbfillrect.o AR drivers/staging/wlan-ng/built-in.a CC drivers/video/fbdev/core

Re: WARNING in kmem_cache_alloc_trace

2019-08-20 Thread Oliver Neukum
Am Montag, den 19.08.2019, 18:59 +0200 schrieb Andrey Konovalov: > On Mon, Aug 19, 2019 at 6:18 PM syzbot > wrote: > > > > Hello, > > > > syzbot found the following crash on: > > > > HEAD commit:d0847550 usb-fuzzer: main usb gadget fuzzer driver > > git tree: https://github.com/google

Re: WARNING in kmem_cache_alloc_trace

2019-08-20 Thread syzbot
Hello, syzbot has tested the proposed patch but the reproducer still triggered crash: WARNING in yurex_write/usb_submit_urb [ cut here ] URB 52a92140 submitted while active WARNING: CPU: 1 PID: 3052 at drivers/usb/core/urb.c:362 usb_submit_urb+0x10c1/0x13b0 d

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread Oliver Neukum
Am Dienstag, den 20.08.2019, 15:13 +0200 schrieb Bjørn Mork : > Oliver Neukum writes: > > > + wait_event(desc->wait, > > + /* > > +* needs both flags. We cannot do with one > > +* because resetting it would cause a race > > +

[PATCH AUTOSEL 5.2 28/44] usb: gadget: composite: Clear "suspended" on reset/disconnect

2019-08-20 Thread Sasha Levin
From: Benjamin Herrenschmidt [ Upstream commit 602fda17c7356bb7ae98467d93549057481d11dd ] In some cases, one can get out of suspend with a reset or a disconnect followed by a reconnect. Previously we would leave a stale suspended flag set. Signed-off-by: Benjamin Herrenschmidt Signed-off-by: F

[PATCH AUTOSEL 5.2 29/44] usb: gadget: mass_storage: Fix races between fsg_disable and fsg_set_alt

2019-08-20 Thread Sasha Levin
From: Benjamin Herrenschmidt [ Upstream commit 4a56a478a525d6427be90753451c40e1327caa1a ] If fsg_disable() and fsg_set_alt() are called too closely to each other (for example due to a quick reset/reconnect), what can happen is that fsg_set_alt sets common->new_fsg from an interrupt while handle_

[PATCH AUTOSEL 4.14 06/12] usb: gadget: mass_storage: Fix races between fsg_disable and fsg_set_alt

2019-08-20 Thread Sasha Levin
From: Benjamin Herrenschmidt [ Upstream commit 4a56a478a525d6427be90753451c40e1327caa1a ] If fsg_disable() and fsg_set_alt() are called too closely to each other (for example due to a quick reset/reconnect), what can happen is that fsg_set_alt sets common->new_fsg from an interrupt while handle_

[PATCH AUTOSEL 4.14 11/12] usb: host: fotg2: restart hcd after port reset

2019-08-20 Thread Sasha Levin
From: Hans Ulli Kroll [ Upstream commit 5ffe59ef754cc39ab2f275dc277732f4 ] On the Gemini SoC the FOTG2 stalls after port reset so restart the HCD after each port reset. Signed-off-by: Hans Ulli Kroll Signed-off-by: Linus Walleij Link: https://lore.kernel.org/r/20190810150458.817-1-lin

[PATCH AUTOSEL 4.4 2/4] usb: gadget: composite: Clear "suspended" on reset/disconnect

2019-08-20 Thread Sasha Levin
From: Benjamin Herrenschmidt [ Upstream commit 602fda17c7356bb7ae98467d93549057481d11dd ] In some cases, one can get out of suspend with a reset or a disconnect followed by a reconnect. Previously we would leave a stale suspended flag set. Signed-off-by: Benjamin Herrenschmidt Signed-off-by: F

[PATCH AUTOSEL 4.4 3/4] usb: host: fotg2: restart hcd after port reset

2019-08-20 Thread Sasha Levin
From: Hans Ulli Kroll [ Upstream commit 5ffe59ef754cc39ab2f275dc277732f4 ] On the Gemini SoC the FOTG2 stalls after port reset so restart the HCD after each port reset. Signed-off-by: Hans Ulli Kroll Signed-off-by: Linus Walleij Link: https://lore.kernel.org/r/20190810150458.817-1-lin

[PATCH AUTOSEL 4.9 6/7] usb: host: fotg2: restart hcd after port reset

2019-08-20 Thread Sasha Levin
From: Hans Ulli Kroll [ Upstream commit 5ffe59ef754cc39ab2f275dc277732f4 ] On the Gemini SoC the FOTG2 stalls after port reset so restart the HCD after each port reset. Signed-off-by: Hans Ulli Kroll Signed-off-by: Linus Walleij Link: https://lore.kernel.org/r/20190810150458.817-1-lin

[PATCH AUTOSEL 4.9 3/7] usb: gadget: composite: Clear "suspended" on reset/disconnect

2019-08-20 Thread Sasha Levin
From: Benjamin Herrenschmidt [ Upstream commit 602fda17c7356bb7ae98467d93549057481d11dd ] In some cases, one can get out of suspend with a reset or a disconnect followed by a reconnect. Previously we would leave a stale suspended flag set. Signed-off-by: Benjamin Herrenschmidt Signed-off-by: F

[PATCH AUTOSEL 4.14 05/12] usb: gadget: composite: Clear "suspended" on reset/disconnect

2019-08-20 Thread Sasha Levin
From: Benjamin Herrenschmidt [ Upstream commit 602fda17c7356bb7ae98467d93549057481d11dd ] In some cases, one can get out of suspend with a reset or a disconnect followed by a reconnect. Previously we would leave a stale suspended flag set. Signed-off-by: Benjamin Herrenschmidt Signed-off-by: F

[PATCH AUTOSEL 4.19 25/27] usb: host: fotg2: restart hcd after port reset

2019-08-20 Thread Sasha Levin
From: Hans Ulli Kroll [ Upstream commit 5ffe59ef754cc39ab2f275dc277732f4 ] On the Gemini SoC the FOTG2 stalls after port reset so restart the HCD after each port reset. Signed-off-by: Hans Ulli Kroll Signed-off-by: Linus Walleij Link: https://lore.kernel.org/r/20190810150458.817-1-lin

[PATCH AUTOSEL 4.19 18/27] usb: gadget: composite: Clear "suspended" on reset/disconnect

2019-08-20 Thread Sasha Levin
From: Benjamin Herrenschmidt [ Upstream commit 602fda17c7356bb7ae98467d93549057481d11dd ] In some cases, one can get out of suspend with a reset or a disconnect followed by a reconnect. Previously we would leave a stale suspended flag set. Signed-off-by: Benjamin Herrenschmidt Signed-off-by: F

[PATCH AUTOSEL 4.19 19/27] usb: gadget: mass_storage: Fix races between fsg_disable and fsg_set_alt

2019-08-20 Thread Sasha Levin
From: Benjamin Herrenschmidt [ Upstream commit 4a56a478a525d6427be90753451c40e1327caa1a ] If fsg_disable() and fsg_set_alt() are called too closely to each other (for example due to a quick reset/reconnect), what can happen is that fsg_set_alt sets common->new_fsg from an interrupt while handle_

[PATCH AUTOSEL 5.2 42/44] usb: host: fotg2: restart hcd after port reset

2019-08-20 Thread Sasha Levin
From: Hans Ulli Kroll [ Upstream commit 5ffe59ef754cc39ab2f275dc277732f4 ] On the Gemini SoC the FOTG2 stalls after port reset so restart the HCD after each port reset. Signed-off-by: Hans Ulli Kroll Signed-off-by: Linus Walleij Link: https://lore.kernel.org/r/20190810150458.817-1-lin

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread Oliver Neukum
Am Montag, den 19.08.2019, 17:50 -0700 schrieb syzbot: > syzbot has found a reproducer for the following crash on: Hi Bjørn, taking you into CC as you are affected. V4: > HEAD commit:e06ce4da usb-fuzzer: main usb gadget fuzzer driver > git tree: https://github.com/google/kasan.git usb

Re: WARNING in wdm_write/usb_submit_urb

2019-08-20 Thread syzbot
Hello, syzbot has tested the proposed patch and the reproducer did not trigger crash: Reported-and-tested-by: syzbot+d232cca6ec42c2edb...@syzkaller.appspotmail.com Tested on: commit: e06ce4da usb-fuzzer: main usb gadget fuzzer driver git tree: https://github.com/google/kasa

Re: KASAN: use-after-free Read in iowarrior_disconnect

2019-08-20 Thread Alan Stern
On Mon, 19 Aug 2019, Oliver Neukum wrote: > Am Montag, den 19.08.2019, 07:48 -0700 schrieb syzbot: > > Hello, > > > > syzbot found the following crash on: > > > > HEAD commit:d0847550 usb-fuzzer: main usb gadget fuzzer driver > > git tree: https://github.com/google/kasan.git usb-fuzzer

Re: KASAN: use-after-free Read in iowarrior_disconnect

2019-08-20 Thread Alan Stern
Oops, I replied to the wrong email message -- sorry. This was intended to be about the problem with the yurex driver, not the iowarrior driver. Alan Stern On Tue, 20 Aug 2019, Alan Stern wrote: > On Mon, 19 Aug 2019, Oliver Neukum wrote: > > > Am Montag, den 19.08.2019, 07:48 -0700 schrieb sy

Re: WARNING in kmem_cache_alloc_trace

2019-08-20 Thread Oliver Neukum
Am Dienstag, den 20.08.2019, 06:40 -0700 schrieb syzbot: > Hello, > > syzbot has tested the proposed patch but the reproducer still triggered > crash: > WARNING in yurex_write/usb_submit_urb It looks to me like we have two issues here. The driver is simply not ready to deal with concurrent writ

Re: Duplicated code in hiddev_open()

2019-08-20 Thread Oliver Neukum
Am Montag, den 19.08.2019, 10:17 -0400 schrieb Alan Stern: > On Mon, 19 Aug 2019, Oliver Neukum wrote: > > > Am Freitag, den 16.08.2019, 13:10 -0400 schrieb Alan Stern: > > > Oliver and Jiri: > > > > > > Why is there duplicated code in > > > drivers/hid/usbhid/hiddev.c:hiddev_open()? > > > > > >

Re: KASAN: use-after-free Read in iowarrior_disconnect

2019-08-20 Thread Oliver Neukum
Am Dienstag, den 20.08.2019, 10:18 -0400 schrieb Alan Stern: > On Mon, 19 Aug 2019, Oliver Neukum wrote: > > > Am Montag, den 19.08.2019, 07:48 -0700 schrieb syzbot: > > > Hello, > > > > > > syzbot found the following crash on: > > > > > > HEAD commit:d0847550 usb-fuzzer: main usb gadget fuz

Re: KASAN: use-after-free Read in iowarrior_disconnect

2019-08-20 Thread Oliver Neukum
Am Dienstag, den 20.08.2019, 16:38 +0200 schrieb Oliver Neukum: > Am Dienstag, den 20.08.2019, 10:18 -0400 schrieb Alan Stern: > > On Mon, 19 Aug 2019, Oliver Neukum wrote: > > > > > Am Montag, den 19.08.2019, 07:48 -0700 schrieb syzbot: > > > > Hello, > > > > > > > > syzbot found the following c

Re: KASAN: use-after-free Read in iowarrior_disconnect

2019-08-20 Thread Alan Stern
On Tue, 20 Aug 2019, Oliver Neukum wrote: > Am Dienstag, den 20.08.2019, 10:18 -0400 schrieb Alan Stern: > > On Mon, 19 Aug 2019, Oliver Neukum wrote: > > > > > Am Montag, den 19.08.2019, 07:48 -0700 schrieb syzbot: > > > > Hello, > > > > > > > > syzbot found the following crash on: > > > > > >

Re: Slow I/O on USB media after commit f664a3cc17b7d0a2bc3b3ab96181e1029b0ec0e6

2019-08-20 Thread Alan Stern
On Mon, 19 Aug 2019, Andrea Vai wrote: > Hi Alan, > I attach the two traces, collected as follows: > > - start the trace; > - wait 10 seconds; > - plug the drive; > - wait 5 seconds; > - mount the drive; > - wait 5 seconds; > - copy a 500 byte file; > - wait 5 seconds; > - unmount the drive; >

USB: gadget: f_midi: fixing a possible double-free in f_midi

2019-08-20 Thread Mark Salyzyn
From: "Yavuz, Tuba" cherry pick from commit 7fafcfdf6377b18b2a726ea554d6e593ba44349f ("USB: gadget: f_midi: fixing a possible double-free in f_midi") Removing 'return err;' from conflict. It looks like there is a possibility of a double-free vulnerability on an error path of the f_midi_set_alt f

[PATCH] HID: USB: Fix general protection fault caused by Logitech driver

2019-08-20 Thread Alan Stern
The syzbot fuzzer found a general protection fault in the HID subsystem: kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: [#1] SMP KASAN CPU: 0 PID: 3715 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #15 Hardware nam

Re: USB: gadget: f_midi: fixing a possible double-free in f_midi

2019-08-20 Thread Greg Kroah-Hartman
On Tue, Aug 20, 2019 at 10:45:13AM -0700, Mark Salyzyn wrote: > From: "Yavuz, Tuba" > > cherry pick from commit 7fafcfdf6377b18b2a726ea554d6e593ba44349f > ("USB: gadget: f_midi: fixing a possible double-free in f_midi") > Removing 'return err;' from conflict. > > It looks like there is a possibi

Re: USB: gadget: f_midi: fixing a possible double-free in f_midi

2019-08-20 Thread Mark Salyzyn
On 8/20/19 1:15 PM, Greg Kroah-Hartman wrote: No signed-off-by from you? Anyway, this is already in the 4.4.y queue and will be in the next release. thanks, greg k-h Ok, thanks! I will stand down. -- Mark

[RFC 0/4] Add support into cdc_ncm for MAC address pass through

2019-08-20 Thread Charles.Hyde
In recent testing of a Dell Universal Dock D6000, I found that MAC address pass through is not supported in the Linux drivers. However, this same device is supported in Windows 10 (Pro) on my personal computer, in as much as I was able to tell Windows to assign a new MAC address of my choosing,

[RFC 1/4] Add usb_get_address and usb_set_address support

2019-08-20 Thread Charles.Hyde
The core USB driver message.c is missing get/set address functionality that stops ifconfig from being able to push MAC addresses out to USB based ethernet devices. Without this functionality, some USB devices stop responding to ethernet packets when using ifconfig to change MAC addresses. This ha

[RFC 2/4] Allow cdc_ncm to set MAC address in hardware

2019-08-20 Thread Charles.Hyde
This patch adds support for pushing a MAC address out to USB based ethernet controllers driven by cdc_ncm. With this change, ifconfig can now set the device's MAC address. For example, the Dell Universal Dock D6000 is driven by cdc_ncm. The D6000 can now have its MAC address set by ifconfig, as

[RFC 3/4] Move ACPI functionality out of r8152 driver

2019-08-20 Thread Charles.Hyde
This change moves ACPI functionality out of the Realtek r8152 driver to its own source and header file, making it available to other drivers as needed now and into the future. At the time this ACPI snippet was introduced in 2016, only the Realtek driver made use of it in support of Dell's enterpri

[RFC 4/4] net: cdc_ncm: Add ACPI MAC address pass through functionality

2019-08-20 Thread Charles.Hyde
This change adds support to cdc_ncm for ACPI MAC address pass through functionality that also exists in the Realtek r8152 driver. This is in support of Dell's Universal Dock D6000, to give it the same feature capability as is currently available in Windows and advertized on Dell's product web site

Re: [RFC 1/4] Add usb_get_address and usb_set_address support

2019-08-20 Thread Greg KH
On Tue, Aug 20, 2019 at 10:18:42PM +, charles.h...@dellteam.com wrote: > The core USB driver message.c is missing get/set address functionality > that stops ifconfig from being able to push MAC addresses out to USB > based ethernet devices. Without this functionality, some USB devices > stop r

Re: [RFC 1/4] Add usb_get_address and usb_set_address support

2019-08-20 Thread Greg KH
On Tue, Aug 20, 2019 at 10:18:42PM +, charles.h...@dellteam.com wrote: > +int usb_get_address(struct usb_device *dev, unsigned char * mac) > +{ > + int ret = -ENOMEM; > + unsigned char *tbuf = kmalloc(256, GFP_NOIO); On a technical level, why are you asking for 256 bytes here, and in t

Re: [RFC 1/4] Add usb_get_address and usb_set_address support

2019-08-20 Thread Andrew Lunn
On Tue, Aug 20, 2019 at 10:18:42PM +, charles.h...@dellteam.com wrote: > The core USB driver message.c is missing get/set address functionality > that stops ifconfig from being able to push MAC addresses out to USB > based ethernet devices. Without this functionality, some USB devices > stop r

Re: [RFC 3/4] Move ACPI functionality out of r8152 driver

2019-08-20 Thread Andrew Lunn
On Tue, Aug 20, 2019 at 10:22:18PM +, charles.h...@dellteam.com wrote: > This change moves ACPI functionality out of the Realtek r8152 driver to > its own source and header file, making it available to other drivers as > needed now and into the future. At the time this ACPI snippet was > intro

[PATCH] usb: udc: lpc32xx: silence fall-through warning

2019-08-20 Thread Gustavo A. R. Silva
Silence the following fall-through warning by adding a break statement: drivers/usb/gadget/udc/lpc32xx_udc.c:2230:3: warning: this statement may fall through [-Wimplicit-fallthrough=] Signed-off-by: Gustavo A. R. Silva --- drivers/usb/gadget/udc/lpc32xx_udc.c | 2 +- 1 file changed, 1 insertion

[PATCH 1/1] usb: xhci: avoid VBus glitch during controller reset operation

2019-08-20 Thread Peter Chen
According to xHCI 1.1 CH4.19.4 Port Power: While Chip Hardware Reset or HCRST is asserted, the value of PP is undefined. If the xHC supports power switches (PPC = ‘1’) then VBus may be deasserted during this time. PP (and VBus) shall be enabled immediately up

f_mass_storage vs drivers/target

2019-08-20 Thread Benjamin Herrenschmidt
Hi folks ! It seems that f_mass_storage duplicates (well maybe predates too..) a lot of what's in drivers/target. Anybody working on implementing a new version of f_mass_storage that is layered upon drivers/target instead ? That would bring quite a lot of additional functionality. If not, I migh

Re: reeze while write on external usb 3.0 hard disk [Bug 204095]

2019-08-20 Thread Christoph Hellwig
On Mon, Aug 19, 2019 at 10:14:25AM -0400, Alan Stern wrote: > Let's bring this to the attention of some more people. > > It looks like the bug that was supposed to be fixed by commit > d74ffae8b8dd ("usb-storage: Add a limitation for > blk_queue_max_hw_sectors()"), which is part of 5.2.5, but appa

Re: reeze while write on external usb 3.0 hard disk [Bug 204095]

2019-08-20 Thread Piergiorgio Sartor
On Tue, Aug 20, 2019 at 09:23:26AM +0200, Christoph Hellwig wrote: > On Mon, Aug 19, 2019 at 10:14:25AM -0400, Alan Stern wrote: > > Let's bring this to the attention of some more people. > > > > It looks like the bug that was supposed to be fixed by commit > > d74ffae8b8dd ("usb-storage: Add a li