Project

General

Profile

SonyEricssonJ120i » History » Version 3

fixeria, 11/27/2023 09:43 PM
add stock firmware notes

1 1 fixeria
{{>toc}}
2
3
h1. SonyEricssonJ120i
4
5
This is another ODM phone model based on TI Calypso. Not yet supported.
6
7
h2. Specifications
8
9
https://www.gsmarena.com/sony_ericsson_j120-1843.php
10
11
* GSM 900/1800
12
* 99 x 44 x 17 mm, 75g
13
* STN 65k, 96 x 64
14
* 900mAh Li-Ion battery (BST-37)
15
16
h2. Hardware
17
18
TODO
19
20
h3. Flash
21
22
* INTEL 28F320W18T (1.8 Volt Wireless Flash Memory, 4 MByte)
23
24
h4. Flash dumps
25
26
* https://people.osmocom.org/fixeria/dump/se_j120i/J120i_R1A007_CXC1250845_full.bin -- full flash, dumped using pstool
27
* https://people.osmocom.org/fixeria/dump/se_j120i/J120i-R1A007-CXC1250845-356325015955496-fc-full.bin -- full flash, dumped using fc-loadtool
28
** https://people.osmocom.org/fixeria/dump/se_j120i/fc_loadtools.patch
29
30
h3. Serial cable
31
32
J120i has the standard Sony Ericsson Fastport connector. Refer to [[SonyEricssonJ100i]] for more details.
33
34
h2. Bootloader
35
36 2 fixeria
Similarly to [[SonyEricssonK200i|Sony Ericsson K200i]] and unlike [[SonyEricssonJ100i|Sony Ericsson J100i]], J120i has the boot ROM (see [[CalypsoRomloader]]) enabled.
37 3 fixeria
38
h2. Stock firmware notes
39
40
Below are some notes related to the stock SE's firmware.
41
42
h3. AT Modem mode
43
44
It's not yet known how to get access to the AT command interpreter.
45
Some AT commands can be found by running strings on the firmware dump.
46
47
<pre>
48
$ strings J120i_R1A007_CXC1250845_Main.bin | grep "AT[*+]"
49
</pre>
50
51
h3. MMI codes
52
53
NOTE: for some codes you need to press the "green" (call) button.
54
55
* Standard SE codes:
56
** @-> * <- <- * <- *@ - service info and tests;
57
** @<- * * <-@ - lock status;
58
59
Found in the firmware dump:
60
61
<pre>
62
$ strings J120i_R1A007_CXC1250845_Main.bin | less
63
...
64
*#06#
65
F*#**837#
66
*#**785#
67
*#**664#
68
*###664#
69
*#**364#
70
*#**364*564#
71
*#**672#
72
*#**372#
73
*#**2263*0#  -- BAND?
74
*#**2263*1#
75
*#**2263*2#
76
*#**2263*3#
77
*#**2263*4#
78
*#**735*0#
79
*#**735*12#
80
*#**735*13#
81
*#**833*2#
82
*#**833*4#
83
*#**833*7#
84
*#**833*3#
85
*#**778377#
86
*#**464851#
87
*#**324#
88
*#**6360#
89
F*#**6361#
90
F*#**6362#
91
F*#**6363#
92
F*#**6364#
93
F*#**266*0#
94
*#**266*1#
95
*#**277378#  -- ASSERT?
96
*#**636#
97
*#**636*0#
98
*#**636*1#
99
*#**84637#
100
*#**767#
101
*#**3428*0#
102
*#**3428*1#
103
*#**3428*2#
104
*#**778337#
105
*#**25276#
106
*#**62683#
107
*#**3646633*0#
108
*#**3646633*1#
109
*#**678257#
110
*#**33284#  -- DEBUG
111
</pre>
112
113
https://www.dcode.fr/t9-cipher is quite useful for guessing the purpose.
Add picture from clipboard (Maximum size: 48.8 MB)