Project

General

Profile

SonyEricssonJ120i » History » Version 5

fixeria, 11/27/2023 09:49 PM

1 1 fixeria
{{>toc}}
2
3
h1. SonyEricssonJ120i
4
5 4 fixeria
This is another ODM phone model based on TI Calypso. *Not yet supported.*
6 1 fixeria
7
h2. Specifications
8
9
https://www.gsmarena.com/sony_ericsson_j120-1843.php
10
11
* GSM 900/1800
12
* 99 x 44 x 17 mm, 75g
13
* STN 65k, 96 x 64
14
* 900mAh Li-Ion battery (BST-37)
15
16
h2. Hardware
17
18
TODO
19
20
h3. Flash
21
22
* INTEL 28F320W18T (1.8 Volt Wireless Flash Memory, 4 MByte)
23
24
h4. Flash dumps
25
26 5 fixeria
* https://people.osmocom.org/fixeria/dump/se_j120i/J120i_R1A007_CXC1250845_Main.bin -- firmware, dumped using pstool
27 1 fixeria
* https://people.osmocom.org/fixeria/dump/se_j120i/J120i_R1A007_CXC1250845_full.bin -- full flash, dumped using pstool
28
* https://people.osmocom.org/fixeria/dump/se_j120i/J120i-R1A007-CXC1250845-356325015955496-fc-full.bin -- full flash, dumped using fc-loadtool
29
** https://people.osmocom.org/fixeria/dump/se_j120i/fc_loadtools.patch
30
31
h3. Serial cable
32
33
J120i has the standard Sony Ericsson Fastport connector. Refer to [[SonyEricssonJ100i]] for more details.
34
35
h2. Bootloader
36
37 2 fixeria
Similarly to [[SonyEricssonK200i|Sony Ericsson K200i]] and unlike [[SonyEricssonJ100i|Sony Ericsson J100i]], J120i has the boot ROM (see [[CalypsoRomloader]]) enabled.
38 3 fixeria
39
h2. Stock firmware notes
40
41
Below are some notes related to the stock SE's firmware.
42
43
h3. AT Modem mode
44
45
It's not yet known how to get access to the AT command interpreter.
46
Some AT commands can be found by running strings on the firmware dump.
47
48
<pre>
49
$ strings J120i_R1A007_CXC1250845_Main.bin | grep "AT[*+]"
50
</pre>
51
52
h3. MMI codes
53
54
NOTE: for some codes you need to press the "green" (call) button.
55
56
* Standard SE codes:
57
** @-> * <- <- * <- *@ - service info and tests;
58
** @<- * * <-@ - lock status;
59
60
Found in the firmware dump:
61
62
<pre>
63
$ strings J120i_R1A007_CXC1250845_Main.bin | less
64
...
65
*#06#
66
F*#**837#
67
*#**785#
68
*#**664#
69
*###664#
70
*#**364#
71
*#**364*564#
72
*#**672#
73
*#**372#
74
*#**2263*0#  -- BAND?
75
*#**2263*1#
76
*#**2263*2#
77
*#**2263*3#
78
*#**2263*4#
79
*#**735*0#
80
*#**735*12#
81
*#**735*13#
82
*#**833*2#
83
*#**833*4#
84
*#**833*7#
85
*#**833*3#
86
*#**778377#
87
*#**464851#
88
*#**324#
89
*#**6360#
90
F*#**6361#
91
F*#**6362#
92
F*#**6363#
93
F*#**6364#
94
F*#**266*0#
95
*#**266*1#
96
*#**277378#  -- ASSERT?
97
*#**636#
98
*#**636*0#
99
*#**636*1#
100
*#**84637#
101
*#**767#
102
*#**3428*0#
103
*#**3428*1#
104
*#**3428*2#
105
*#**778337#
106
*#**25276#
107
*#**62683#
108
*#**3646633*0#
109
*#**3646633*1#
110
*#**678257#
111
*#**33284#  -- DEBUG
112
</pre>
113
114
https://www.dcode.fr/t9-cipher is quite useful for guessing the purpose.
Add picture from clipboard (Maximum size: 48.8 MB)