Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp5927214pxb; Mon, 14 Feb 2022 10:53:45 -0800 (PST) X-Google-Smtp-Source: ABdhPJw8g0EdrlUtgZQtwqpd06Z/cOvcXLikXxxKOUyeeZKexiSeYYVAJ/IH8IoALGndCV8d2cjS X-Received: by 2002:a62:1b06:: with SMTP id b6mr250489pfb.38.1644864824825; Mon, 14 Feb 2022 10:53:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644864824; cv=none; d=google.com; s=arc-20160816; b=Ed5/KujFVtN9D/E8hrIH2uoL2e8ln9lJFNk4xK0iN7IGD7q9HNxhGmAud3BXd5eskd DwcBXJjLu0mbCDKpP88EsSx6il8abjtH7aBJ6TUvkId9W4FoZmizpn9aA56SY9oFlTjC fSgKA0pYhnzfhkqRR4LNBEyb0meD2aU3MHUig7jNSUCYt6UENTZV9xwoy8VvQZDIt5xY K9IJGODSY/hL5SlfgYe3OipBwQKPav0ZjnK386r2ptvsxH/RA4AlhogBmXCS9qLiqr9B nqo0l7xr5q7EBk+XqzZ7IunBApyCsLCTa4fJHtg7NMb9Fg3UIz2sYoVbqDwriqYJkPLO AypQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=I6WAymZTH+mb9a5//PjA+Hqsft0HvmofZFFwmWMInHY=; b=A8iQh+sJNeVenQhQOabnSOuJMNhFsBlPDbuK+yf9x9IQl7+RYy51jGoPMo9LaT+eu0 2H3BHAEwDK/48ctOtxbqo5JvEa4eAlOhYg7oMFGt2rS4M5j0UTB1laOsgzeiyes/cNEt rCUkt1cGHPwlMj69iTGG/lb+tq4m5541p5LzxgYF2I55lmp+iw0VATD7PCd6KelfaUql 8wyDrAT+bulFFE0kPev0AWbBIjUABjYYSGx4yM1EhjbMSoSoO/SbP5LkIcQo7kki3boP 8zD4tKodFQrJN3zCbFiK+hnqxulB0GMphvJb71SCkZELg0oUlZPySeF+PLuH7owZhKuQ VLiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wxURlLd8; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id s29si398178pgo.648.2022.02.14.10.53.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 14 Feb 2022 10:53:44 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wxURlLd8; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id D76CB98F7D; Mon, 14 Feb 2022 10:52:48 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344128AbiBNJ7i (ORCPT + 99 others); Mon, 14 Feb 2022 04:59:38 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:43466 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343967AbiBNJzV (ORCPT ); Mon, 14 Feb 2022 04:55:21 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 581BA7D2B3; Mon, 14 Feb 2022 01:44:12 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 0BE61B80DC4; Mon, 14 Feb 2022 09:44:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 427DCC340E9; Mon, 14 Feb 2022 09:44:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1644831849; bh=9vxZ2UxSC/BPL5u/hZd6/MrObK1934bk0SauZ5RvZs8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wxURlLd8WMuembnkRlROBZfSdg8UsGg/Fc0dmq+0Fbngum2Ipk8Clp6C4SNvGGJgk EYoR3/HFqTVuG9EFH7THjM64rWb92QcuNZ8dM4qeDf06BuI305Iv3VIzBr6N5+s0sz 9aGwVmQ67MTBsuhMy5rFiR7s56PCJx7O0Mi54Cag= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stephan Brunner , Johan Hovold Subject: [PATCH 5.10 104/116] USB: serial: ch341: add support for GW Instek USB2.0-Serial devices Date: Mon, 14 Feb 2022 10:26:43 +0100 Message-Id: <20220214092502.378070617@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220214092458.668376521@linuxfoundation.org> References: <20220214092458.668376521@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stephan Brunner commit fa77ce201f7f2d823b07753575122d1ae5597fbe upstream. Programmable lab power supplies made by GW Instek, such as the GPP-2323, have a USB port exposing a serial port to control the device. Stringing the supplied Windows driver, references to the ch341 chip are found. Binding the existing ch341 driver to the VID/PID of the GPP-2323 ("GW Instek USB2.0-Serial" as per the USB product name) works out of the box, communication and control is now possible. This patch should work with any GPP series power supply due to similarities in the product line. Signed-off-by: Stephan Brunner Link: https://lore.kernel.org/r/4a47b864-0816-6f6a-efee-aa20e74bcdc6@stephan-brunner.net Cc: stable@vger.kernel.org Signed-off-by: Johan Hovold Signed-off-by: Greg Kroah-Hartman --- drivers/usb/serial/ch341.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/usb/serial/ch341.c +++ b/drivers/usb/serial/ch341.c @@ -85,6 +85,7 @@ static const struct usb_device_id id_tab { USB_DEVICE(0x1a86, 0x5523) }, { USB_DEVICE(0x1a86, 0x7522) }, { USB_DEVICE(0x1a86, 0x7523) }, + { USB_DEVICE(0x2184, 0x0057) }, { USB_DEVICE(0x4348, 0x5523) }, { USB_DEVICE(0x9986, 0x7523) }, { },