- My blog
- My CANHack toolkit for demonstrating protocol attacks on CAN bus
- My can2 CAN protocol decoder for logic analyzers
- Canis Automotive Labs hardware
Recent blog posts
I’ve written before about priority inversion, how it happened on Mars, and how it happens on CAN bus if the CAN controller and drivers aren’t designed carefully. But I got bitten by priority inversion myself while writing code for the new Raspberry Pi Pico so I thought I’d write about it again - because the consequences can be just as severe as they were on Mars.
My start-up Canis Automotive Labs has three CAN boards in the pipeline and with luck we should be announcing availability in a few weeks, so I’ve produced a sneak preview of those boards.
I’ve put together a short video showing the PulseView logic analyzer UI with my can2 protocol decoder. The video shows how to set PulseView up to record CAN traces, how to navigate around those traces, and how it shows unusual events on CAN (I use the CANHack toolkit to inject CAN overload frames in a loop).
The Raspberry Pi Pico doesn’t have a CAN controller built-in but that’s no barrier: we can send CAN frames in software!
subscribe via RSS