Thanks for the input. I tore into the device and got the datasheet out, and it turns out it uses the Phison PS2231. The datasheet is woefully lacking any "insiders secrets", but does indicate it has a lot more features available than what is included in the stick I have.
I checked the solder joints, even going so far as reflowing with a hot air gun (which you have to be REALLY careful with since there are parts on both sides), but it performed the same. For a minute I thought I had it since there were a few solder flakes running around under the parts, but it made no difference by removing them.
I watched the signals on the scope, and the write protect pin is in fact driven by the controller to write-protect the device. I cannot override it however since even though I could tie it high, there is no bus activity. The controller is intercepting the activity and preventing access to the memory. This is a clear indicator this controller device has or works with a "hidden" sector for security like encryption keys and options, and this sector must have been hit somehow by XP. I would be willing to bet I could pop the memory devices off and erase them and get my functionality back, but then I would run the risk of destroying the PCB in the process. I am still being granted an RMA by the manufacturer so I will send it back now. They have hinted, though not admitted, that they use a utility to initialize these devices, but it may require an ICT to get the device in the correct mode to do it easily.
One last thing, I am looking for a U3 recovery package that can tickle this secure page, and perhaps get things going again.
-Mark
|