Prevent Solo's debug serial port use by ModemManager
This Udev rule marks the device to be ignored by the MM. Otherwise using the CDC ACM serial port interface will not be possible, while its service is running. Tested on Fedora 29, with ModemManager enabled, using: $ solotool.py monitor /dev/solokey-serial Fixes https://github.com/solokeys/solo/issues/62 As provided by @yparitcher in: https://github.com/solokeys/solo/pull/60#issuecomment-452428432 Signed-off-by: Szczepan Zalega <szczepan@nitrokey.com>
This commit is contained in:
parent
4110434e33
commit
5806b25fd1
@ -1,3 +1,12 @@
|
|||||||
|
# Notify ModemManager this device should be ignored
|
||||||
|
ACTION!="add|change|move", GOTO="mm_usb_device_blacklist_end"
|
||||||
|
SUBSYSTEM!="usb", GOTO="mm_usb_device_blacklist_end"
|
||||||
|
ENV{DEVTYPE}!="usb_device", GOTO="mm_usb_device_blacklist_end"
|
||||||
|
|
||||||
|
ATTRS{idVendor}=="0483", ATTRS{idProduct}=="a2ca", ENV{ID_MM_DEVICE_IGNORE}="1"
|
||||||
|
|
||||||
|
LABEL="mm_usb_device_blacklist_end"
|
||||||
|
|
||||||
# Solo
|
# Solo
|
||||||
ATTRS{idVendor}=="0483", ATTRS{idProduct}=="a2ca", ATTRS{product}=="Solo", TAG+="uaccess", GROUP="plugdev", SYMLINK+="solokey"
|
ATTRS{idVendor}=="0483", ATTRS{idProduct}=="a2ca", ATTRS{product}=="Solo", TAG+="uaccess", GROUP="plugdev", SYMLINK+="solokey"
|
||||||
ATTRS{idVendor}=="0483", ATTRS{idProduct}=="a2ca", ATTRS{product}=="Solo HACKER (Unlocked)", TAG+="uaccess", GROUP="plugdev", SYMLINK+="solohacker"
|
ATTRS{idVendor}=="0483", ATTRS{idProduct}=="a2ca", ATTRS{product}=="Solo HACKER (Unlocked)", TAG+="uaccess", GROUP="plugdev", SYMLINK+="solohacker"
|
||||||
|
Loading…
x
Reference in New Issue
Block a user