Upgrading my Chumby 8 kernel part 11: SD/CF card reader
Doug Brown discusses upgrading the Chumby 8 kernel, addressing an SD/CF card reader issue by modifying the USB storage driver and implementing a userspace daemon to manage the device effectively.
Read original articleIn his blog post, Doug Brown discusses his project to upgrade the Chumby 8 kernel and addresses an issue with the SD/CF card reader creating an empty /dev/sda device even when no cards were inserted. He delves into the technical details of the card reader IC, Alcor Micro AU6350, and the detection pins used to identify inserted cards. Brown explains his solution involving modifying the USB storage driver's probe function and adding GPIO interrupts on card detect pins to manage the device in userspace. He implements a strategy using the usb-storage driver's quirks parameter to ignore the device based on its USB vendor and product ID. Additionally, he develops a userspace daemon to handle card detect GPIO pins, remove the quirk, and connect/disconnect the card reader device accordingly. Brown's approach involves modifying the kernel command line in U-Boot and utilizing sysfs for device management, ultimately resolving the issue without major complications.
Related
Spending 3 months investigating a 7-year old bug and fixing it in 1 line of code
A developer fixed a seven-year-old bug in an iPad accessory causing missed MIDI messages by optimizing a modulo operation. The bug's resolution improved the audio processor's efficiency significantly.
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
ThinkPad 701C with a Framework brain transplant
A project merges Thinkpad 701C with modern tech: Framework mainboard, iPad 7 display, original keyboard/trackpoint, USB-A/C, GigE ports. Custom adaptations, new components designed. Positive community feedback received.
Vulnerability in Popular PC and Server Firmware
Eclypsium found a critical vulnerability (CVE-2024-0762) in Intel Core processors' Phoenix SecureCore UEFI firmware, potentially enabling privilege escalation and persistent attacks. Lenovo issued BIOS updates, emphasizing the significance of supply chain security.
A 10-cent microcontroller deserves a 10-cent devboard: RISC-V CH32V003
The article details a low-cost development board for the CH32V003 RISC V microcontroller, assembled with inexpensive components. Step-by-step instructions for assembly and firmware uploading are provided, focusing on simplicity and accessibility.
Related
Spending 3 months investigating a 7-year old bug and fixing it in 1 line of code
A developer fixed a seven-year-old bug in an iPad accessory causing missed MIDI messages by optimizing a modulo operation. The bug's resolution improved the audio processor's efficiency significantly.
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
ThinkPad 701C with a Framework brain transplant
A project merges Thinkpad 701C with modern tech: Framework mainboard, iPad 7 display, original keyboard/trackpoint, USB-A/C, GigE ports. Custom adaptations, new components designed. Positive community feedback received.
Vulnerability in Popular PC and Server Firmware
Eclypsium found a critical vulnerability (CVE-2024-0762) in Intel Core processors' Phoenix SecureCore UEFI firmware, potentially enabling privilege escalation and persistent attacks. Lenovo issued BIOS updates, emphasizing the significance of supply chain security.
A 10-cent microcontroller deserves a 10-cent devboard: RISC-V CH32V003
The article details a low-cost development board for the CH32V003 RISC V microcontroller, assembled with inexpensive components. Step-by-step instructions for assembly and firmware uploading are provided, focusing on simplicity and accessibility.