Project

General

Profile

Actions

CalypsoRomloader » History » Revision 7

« Previous | Revision 7/11 (diff) | Next »
Anonymous, 02/19/2016 10:48 PM
fix typo


PageOutline = CalypsoRomloader =

The Romloader is a serial bootloader inside the maskrom of the Calypso/lite/plus DBB.

It can be mapped to the reset-vector (0x000000) on the Calypso by pulling the nIBOOT pin to low, or via the EXTRA_CONF register, and if activated, it checks both UARTs (MODEM and IRDA) for incoming activation commands for a certain amount of time, if nothing is received, it checks if the powerbutton is still pressed, if yes it jumps to the application code in the flash memory.BR
If the flash-memory is unprogrammed (checks a few flash locations for that), it stays activated and waits for incoming commands.

So even on devices which use their own bootloader stored inside the flash, it could be activated by pulling nIBOOT low (but which is inaccessible on most phones).

We have implemented support for interfacing this loader from our [wiki:osmocon] program.

There are currently 3 known variants:

"non-secure"-Romloader on Calypso/lite

The "non-secure" variant, which is used on the Calypso/Calypso lite and which we support with osmocon.
It doesn't require a "key".

It is known to be used by the Motorola W220, BenQ Siemens A38, the OpenMoko devices (Neo 1973 & Freerunner), as well as on many other Calypso phones (LG, Bird).

"secure"-Romloader on Calypso/lite

This one ~seems to be used on some newer Calypso batches~, and is known to be used on the Alcatel VLE5 series.
In order to activate it, you have to send a "key" (which seems to be the first block stored inside the flash).
Basic reverse engineering is done, but nothing working yet, at least we know the "key" for the Alcatel VLE5 phones.BR
'''Update:''' As it turned out, there is no secure loader on the Calypso sitting in the bootrom - Alcatel just put a slightly
modified version of the Calypso plus secure loader in the flash. Thus, it's possible to load code when pulĺing nIBOOT to low, since then the regular romloader becomes active.

"secure"-Romloader on Calypso plus

This variant is very similar to the one on the Calypso, it requires a key, too, and has some different structure of the branch address.
It also seems to cooperate in some way with a second loader stored inside the flash.
We know the key for the Motorola C261 (which is manufactured by Compal).

Romloader support in osmocon

For downloading code to a romloader target, connect your serial cable as with the Compal devices, start osmocon with the "-m romload" switch, and push the power button shortly.
Osmocon will activate the loader, download the code in blocks, submit a checksum and send a branch command to 0x820000.

For anyone who wants to try this out on an OpenMoko device, use {{{
$ echo 0 >/sys/bus/platform/devices/neo1973-pm-gsm.0/power_on
$ echo 1 >/sys/bus/platform/devices/neo1973-pm-gsm.0/power_on
}}}

to control the GSM Module. (We now have dedicated binaries for the OpenMoko devices)

{{{
$ ./osmocon -p /dev/ttyUSB0 -m romload ../../target/firmware/board/gta0x/loader.osmoload.bin
}}} * Push the power-on button of your phone (short push, not like a regular phone boot!) * Observe output resembling the following {{{
Sending beacon...
Sending beacon...
Sending beacon...
Sending beacon...
got 1 bytes from modem, data looks like: 3e
got 1 bytes from modem, data looks like: 69
Received ident ack from phone, sending parameter sequence
read_file(../../target/firmware/board/gta0x/loader.osmoload.bin): file_size=14580, hdr_len=0, dnload_len=14583
Received parameter ack from phone, starting download
Used blocksize for download is 1024 bytes
Preparing block 1, block checksum is 0x93
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 1 finished
Received block ack from phone
Preparing block 2, block checksum is 0x3b
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 2 finished
Received block ack from phone
Preparing block 3, block checksum is 0x79
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 3 finished
Received block ack from phone
Preparing block 4, block checksum is 0x83
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 4 finished
Received block ack from phone
Preparing block 5, block checksum is 0xe5
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 5 finished
Received block ack from phone
Preparing block 6, block checksum is 0x6a
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 6 finished
Received block ack from phone
Preparing block 7, block checksum is 0x98
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 7 finished
Received block ack from phone
Preparing block 8, block checksum is 0x86
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 8 finished
Received block ack from phone
Preparing block 9, block checksum is 0x0f
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 9 finished
Received block ack from phone
Preparing block 10, block checksum is 0xa1
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 10 finished
Received block ack from phone
Preparing block 11, block checksum is 0x07
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 11 finished
Received block ack from phone
Preparing block 12, block checksum is 0x5c
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 12 finished
Received block ack from phone
Preparing block 13, block checksum is 0x68
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 13 finished
Received block ack from phone
Preparing block 14, block checksum is 0x1c
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 14 finished
Received block ack from phone
Preparing the last block, filling 630 bytes, block checksum is 0x54
handle_write_block(): 1024 bytes (1024/1024)
handle_write_block(): Block 15 finished
Finished, sent 15 blocks in total
Received block ack from phone
Sending checksum: 0xdd
Checksum on phone side matches, let's branch to your code
Branching to 0x00820000
Received branch ack, your code is running now!

OSMOCOM Calypso loader (revision 7025e5c-modified) ======================================================================
Running on gta0x in environment osmoload

}}}

Note on OpenMoko and SHR

There is slight difference in device naming in SHR running on Neo Freerunner and Calypso chip might be more timing-sensitive so commands should be adjusted as follows: {{{
$ ./osmocon -i 13 -m romload -p /dev/ttySAC0 ../../target/firmware/board/gta0x/layer1.highram.bin
}}}
and {{{
echo 0 >/sys/bus/platform/devices/gta02-pm-gsm.0/power_on
echo 1 >/sys/bus/platform/devices/gta02-pm-gsm.0/power_on
}}}

N. B. Make sure to check that nothing uses modem before executing commands above by running {{{
fuser /dev/ttySAC0
}}}
AND
disable ogsmd, ousaged, ophoned via /etc/frameworkd.conf

fsogsmd could be prevented from accessing modem by commenting following variables in /etc/freesmartphone/conf/GTA02/fsogsmd.conf {{{
device_port
modem_access
}}}

Files (0)

Updated by about 8 years ago · 7 revisions

Add picture from clipboard (Maximum size: 48.8 MB)