Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

usb-storage: ignore ZTE MF 823 card reader in mode 0x1225

This device automatically switches itself to another mode (0x1405)
unless the specific access pattern of Windows is followed in its
initial mode. That makes a dirty unmount of the internal storage
devices inevitable if they are mounted. So the card reader of
such a device should be ignored, lest an unclean removal become
inevitable.

This replaces an earlier patch that ignored all LUNs of this device.
That patch was overly broad.

Signed-off-by: Oliver Neukum <oneukum@suse.com>
CC: stable@vger.kernel.org
Reviewed-by: Lars Melin <larsm17@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

authored by

Oliver Neukum and committed by
Greg Kroah-Hartman
5fb2c782 7d8021c9

+12
+12
drivers/usb/storage/unusual_devs.h
··· 2065 2065 USB_SC_DEVICE, USB_PR_DEVICE, NULL, 2066 2066 US_FL_NO_READ_DISC_INFO ), 2067 2067 2068 + /* Reported by Oliver Neukum <oneukum@suse.com> 2069 + * This device morphes spontaneously into another device if the access 2070 + * pattern of Windows isn't followed. Thus writable media would be dirty 2071 + * if the initial instance is used. So the device is limited to its 2072 + * virtual CD. 2073 + * And yes, the concept that BCD goes up to 9 is not heeded */ 2074 + UNUSUAL_DEV( 0x19d2, 0x1225, 0x0000, 0xffff, 2075 + "ZTE,Incorporated", 2076 + "ZTE WCDMA Technologies MSM", 2077 + USB_SC_DEVICE, USB_PR_DEVICE, NULL, 2078 + US_FL_SINGLE_LUN ), 2079 + 2068 2080 /* Reported by Sven Geggus <sven-usbst@geggus.net> 2069 2081 * This encrypted pen drive returns bogus data for the initial READ(10). 2070 2082 */