Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp4430770rwd; Sun, 4 Jun 2023 05:21:39 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6R98VetitnwDka4yoEKyn4/wdudgs+uStFD6mFpm20VFMRvg1uOhY7FjmVoHEBh6KqvXGQ X-Received: by 2002:a05:6a21:9996:b0:10b:d70d:f96b with SMTP id ve22-20020a056a21999600b0010bd70df96bmr1356999pzb.3.1685881299269; Sun, 04 Jun 2023 05:21:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685881299; cv=none; d=google.com; s=arc-20160816; b=zdqKcPn525ShxKjDLyMnxfV9UmiWPppbYMM6NRwGtNf0RRC8DL/dq0xwl5WgTHk8Fc /RmFnKqCdw41T1QAPC/2XxaRgNiWSg60VHT7JgW9lNnZCz044AAmwo3I9ZCdhPp48Z+b 8Bl0PTD4e8/8P/DaJuBNBgbpAjW9VzcLwinoNa2a6nHx4CsSlDGX6hyGSZ8o0Ju6yaFj /6veavcAINF50/Tbv+sT1tK0gJXWedIoPN8emMDD3vjCvxED9EtBzcjZIONPDLh4m9LX 7/0RWmoF+Wg39wgVSRFuRN7UFqkiSIXPJCN2V8hXEUZArEne+N9PkbTil8jos7VPWVP6 CMmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=PpbmbUkIAhTl3EBWJAlXdkdUdxbuqZowLv16O6wuDKc=; b=Pb4w8FjeM2a3JAZmKdJ9GKZWDUtziC/8+B28a6yErbPjK5fc7/azCZ19QwBrtj4Ufc jZ9dBbZ8JRvtTBKhhXupUqwi4tcrpy/RiMLhNmlNIwoUpP6ivagGUy1SO5ogCpVAnb5B BWyfIkDLjRDecIhe3B0gLQ1pR88cksrfYscBfdTpDJTO08xZjeM5kC6E1SCxMaJ5f5dN YkK4QQOfOchhop1D9TLM3Ztha7qPJzArXu+hF1lIHrx0ijhaIWvZ4GesTUC+g1m6050S VuMK+TECsRdweYtIhFE56c35mkAtgO4Waxfx0mQUQECd9VTPaVF5+V0PWJJPVtuc9WJj RfWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gQS7nn5b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i186-20020a6387c3000000b0053fc9f253basi4027022pge.403.2023.06.04.05.21.26; Sun, 04 Jun 2023 05:21:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gQS7nn5b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230494AbjFDMRJ (ORCPT + 99 others); Sun, 4 Jun 2023 08:17:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44962 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230237AbjFDMRI (ORCPT ); Sun, 4 Jun 2023 08:17:08 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E8432DA; Sun, 4 Jun 2023 05:17:05 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 7904561C54; Sun, 4 Jun 2023 12:17:02 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D5645C433D2; Sun, 4 Jun 2023 12:17:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1685881021; bh=/1HqXi4TSfWej43agQT+61s1sRoWQcpHBT+TRBBJJwE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=gQS7nn5bpR6TCVKUjWsJyJRYDOQN9n2zuN0jpExVeP22UmfXhVyhVx45fc8YAkS8n QQeKJkXe+nQ+vcVQPE6/fjuHkUDDUOtU8YDzX3vYI8JR5rupssU/w008zzU7GEYkLM AKdQmcGbupKccfqEGF9PhKhSPxtG7u3Odqra69Gma71MfErM/iva1pkYgtGMuhHA68 KSkapGRJ5q4Qjv8+40XRC+oOqFR20GOv6Zs8kSnYGgcXekRWJiLu3hhVHo0XOBQs4r 83KpT1WE1TFzT7xc0wqRFtL5kAtyr0B1Qx+Ero01vXIFph2doaBD3g+g9iX9Iyl+7i OKgQaCKZ/J6nw== Received: from johan by xi.lan with local (Exim 4.94.2) (envelope-from ) id 1q5mfc-00008R-30; Sun, 04 Jun 2023 14:17:16 +0200 Date: Sun, 4 Jun 2023 14:17:16 +0200 From: Johan Hovold To: Corey Minyard Cc: Craig Shelley , Linux Kernel , linux-usb@vger.kernel.org Subject: Re: Break doesn't work on a CP2105 Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 02, 2023 at 11:46:56AM -0500, Corey Minyard wrote: > On Fri, Jun 02, 2023 at 02:53:31PM +0200, Johan Hovold wrote: > > I just posted a patch series which does that. The USB serial drivers do > > not currently return any errors related to break signalling even though > > this has been possible since 2008. > > > > The same mechanism can be used to report that break signalling is not > > supported by a device or driver, but the USB serial drivers would be the > > first tty drivers that actually do this. If it turns out to cause any > > trouble we can still use this series to avoid the unnecessary wait. > > > > Care to give the series a try? > > > > https://lore.kernel.org/lkml/20230602124642.19076-1-johan@kernel.org > > I have tested this series. I can verify that one of the CP2105 ports > (ttyUSB0) does not return an error on sending the break, and the other > (ttyUSB1) does. This is the only USB serial device on the system. Thanks for testing. > However, the device hooked to the remote console (ttyUSB0), the one not > returning an error on sending a break, still doesn't send a break. So > my problem isn't fixed :-(. > > # ls -l /dev/serial/by-path > total 0 > lrwxrwxrwx 1 root root 13 Jun 2 15:28 pci-0000:00:1d.0-usb-0:1.1:1.0-port0 -> ../../ttyUSB0 > lrwxrwxrwx 1 root root 13 Jun 2 15:28 pci-0000:00:1d.0-usb-0:1.1:1.1-port0 -> ../../ttyUSB1 Ok, at least that matches what you found in schematics about this being the ECI (and thus first) port. I just verified break signalling on the first port of my CP2105 using a logic analyser and everything seems to work as expected. There's also no mention of any issue with break in the errata. Could you check which firmware revision you have by enabling debugging and reconnecting the device? For example: echo func cp210x_get_fw_version +p > /sys/kernel/debug/dynamic_debug/control Johan