aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/net_dropmonitor.py
diff options
context:
space:
mode:
authorSean Young <[email protected]>2020-05-27 11:22:16 +0200
committerMauro Carvalho Chehab <[email protected]>2020-06-23 15:07:40 +0200
commit6eeb775a8606a828d235221d84a15eefb05c3978 (patch)
tree9db7313aa782e77c226c348e142e6c96a577e622 /tools/perf/scripts/python/net_dropmonitor.py
parent261463dbc34ff0acafe4d84df04535b48a15afea (diff)
media: USB: cdc-acm: blacklist IR Droid / IR Toy device
The IR Droid / IR Toy device used custom protocol over serial line, so it is presenting itself as CDC ACM device. Now that we have proper in-kernel driver for it we need to black-list the device in cdc-acm driver. http://dangerousprototypes.com/docs/USB_Infrared_Toy https://www.irdroid.com/irdroid-usb-ir-transceiver/ Acked-by: Greg Kroah-Hartman <[email protected]> Signed-off-by: Sean Young <[email protected]> Signed-off-by: Mauro Carvalho Chehab <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/net_dropmonitor.py')
0 files changed, 0 insertions, 0 deletions