SonyEricssonJ120i » History » Revision 5
Revision 4 (fixeria, 11/27/2023 09:47 PM) → Revision 5/12 (fixeria, 11/27/2023 09:49 PM)
{{>toc}} h1. SonyEricssonJ120i This is another ODM phone model based on TI Calypso. *Not yet supported.* h2. Specifications https://www.gsmarena.com/sony_ericsson_j120-1843.php * GSM 900/1800 * 99 x 44 x 17 mm, 75g * STN 65k, 96 x 64 * 900mAh Li-Ion battery (BST-37) h2. Hardware TODO h3. Flash * INTEL 28F320W18T (1.8 Volt Wireless Flash Memory, 4 MByte) h4. Flash dumps * https://people.osmocom.org/fixeria/dump/se_j120i/J120i_R1A007_CXC1250845_Main.bin -- firmware, dumped using pstool * https://people.osmocom.org/fixeria/dump/se_j120i/J120i_R1A007_CXC1250845_full.bin -- full flash, dumped using pstool * https://people.osmocom.org/fixeria/dump/se_j120i/J120i-R1A007-CXC1250845-356325015955496-fc-full.bin -- full flash, dumped using fc-loadtool ** https://people.osmocom.org/fixeria/dump/se_j120i/fc_loadtools.patch h3. Serial cable J120i has the standard Sony Ericsson Fastport connector. Refer to [[SonyEricssonJ100i]] for more details. h2. Bootloader Similarly to [[SonyEricssonK200i|Sony Ericsson K200i]] and unlike [[SonyEricssonJ100i|Sony Ericsson J100i]], J120i has the boot ROM (see [[CalypsoRomloader]]) enabled. h2. Stock firmware notes Below are some notes related to the stock SE's firmware. h3. AT Modem mode It's not yet known how to get access to the AT command interpreter. Some AT commands can be found by running strings on the firmware dump. <pre> $ strings J120i_R1A007_CXC1250845_Main.bin | grep "AT[*+]" </pre> h3. MMI codes NOTE: for some codes you need to press the "green" (call) button. * Standard SE codes: ** @-> * <- <- * <- *@ - service info and tests; ** @<- * * <-@ - lock status; Found in the firmware dump: <pre> $ strings J120i_R1A007_CXC1250845_Main.bin | less ... *#06# F*#**837# *#**785# *#**664# *###664# *#**364# *#**364*564# *#**672# *#**372# *#**2263*0# -- BAND? *#**2263*1# *#**2263*2# *#**2263*3# *#**2263*4# *#**735*0# *#**735*12# *#**735*13# *#**833*2# *#**833*4# *#**833*7# *#**833*3# *#**778377# *#**464851# *#**324# *#**6360# F*#**6361# F*#**6362# F*#**6363# F*#**6364# F*#**266*0# *#**266*1# *#**277378# -- ASSERT? *#**636# *#**636*0# *#**636*1# *#**84637# *#**767# *#**3428*0# *#**3428*1# *#**3428*2# *#**778337# *#**25276# *#**62683# *#**3646633*0# *#**3646633*1# *#**678257# *#**33284# -- DEBUG </pre> https://www.dcode.fr/t9-cipher is quite useful for guessing the purpose.