Skip to content

ntah/wireless-carplay-dongle-reverse-engineering

 
 

Repository files navigation

Carlinkit V2

Carlinkit / Carplay2Air Reverse Engineering

Hardware

Hardware Part
Flash Macronix 25L12835F (16MB)
SoC Freescale i.MX6 UltraLite
CPU ARM Cortex-A7 (ARMv7)
RAM Micron/SK hynix 1Gb (64x16)
Wi-Fi/BT Realtek RTL8822BS

Software

2021.03.09.0001 on CPLAY2Air:

$ cat /proc/cmdline
console=ttyLogFile0 root=/dev/mtdblock2 rootfstype=jffs2 mtdparts=21e0000.qspi:256k(uboot),3328K(kernel),12800K(rootfs) rootwait quiet rw

$ cat /proc/mtd
dev:    size   erasesize  name
mtd0: 00040000 00010000 "uboot"
mtd1: 00340000 00010000 "kernel"
mtd2: 00c80000 00010000 "rootfs"

$ df -T
Filesystem           Type       1K-blocks      Used Available Use% Mounted on
/dev/root            jffs2          12800     10940      1860  85% /
devtmpfs             devtmpfs       61632         0     61632   0% /dev
tmpfs                tmpfs          61732      6324     55408  10% /tmp
/dev/sda1            vfat        62498880     42304  62456576   0% /mnt/UPAN

u-boot compilation

apt-get install device-tree-compiler gcc-arm-linux-gnueabihf
export ARCH=arm
export CROSS_COMPILE=arm-linux-gnueabihf-
git clone https://github.com/ARM-software/u-boot.git
make mx6ull_14x14_evk_defconfig
make all

The device can be seen as "SP Blank 6ULL" when powered by USB-OTG but it is not possible to flash a custom u-boot using imx_usb because it is signed

About

CPlay2Air / Carlinkit Wireless Apple CarPlay Dongle reverse engineering

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 65.7%
  • HTML 26.5%
  • JavaScript 5.2%
  • PHP 0.8%
  • Python 0.7%
  • CSS 0.6%
  • Clojure 0.5%