Fairphone

Aus Wiki
Wechseln zu: Navigation, Suche

Inhaltsverzeichnis

Links

Hardware

  • Mediatek MT6589 SoC
    • 4x ARM Cortex-A7 1.2GHz CPU
    • 1x PowerVR SGX544 Graphics Accelerator
    • 1x ARM Cortex-R4 Modem MCU
  • Flash memory: SanDisk 16 GB NAND
  • Mediatek MT6320: Phone peripheral controller
  • InvenSense MPU-3050: Triple Axis Gyroscope with Embedded Digital Motion Processor
  • RFMD RF3236 WEDGE (Linear) Transmit Module
  • AzureWave AW-NH520
    • probably similar to the AW-NH580 802.11 b/g/n WLAN, Bluetooth, GPS and FM Combo Module IC
  • MediaTek MT6167A: WCDMA Transceiver
  • Skyworks SKY77768-1 SkyHi Power Amplifier Module for WCDMA/ HSDPA/ HSUPA/ HSPA+/ LTE – Band VIII (880–915 MHz)
  • Skyworks SKY77761 SkyHi Power Amplifier Module for CDMA / WCDMA / HSDPA / HSUPA / HSPA+ / LTE – Band I (1920–1980 MHz)

Debug port

A 2x3-pad port is accessible on the display-side of the motherboard. Pads are marked

UTXD1
URXD1
UTXD4
URXD4

Those are two UART ports of the MT6589. Probably the bootloader(s) can be accessed via these ports. I can imagine, that application processors (quad-core Cortex-A7) on the one hand and modem MCU (Cortex-R4) on the other are each using one of those UARTs e.g. for bootloader and/or debugging output or firmware input.

Unfortunately, soldering wires to those pads is not an option (as long as you still intend to use the phone productively), because in the assembled state the top speaker covers those pads. Even leaving solder on the pads would risk a short-circuit, because the speaker has a metal (conductive) back-side.

Pad layout as suggested in https://forum.xda-developers.com/showthread.php?t=2362172&page=73 :

GND TXD4
VCC RXD4
TXD1 RXD1

JTAG port

The MT6589 does feature a JTAG port. It has yet to be checked, whether the pins are available on the PCB. I couldn't find them at a first glance, at least not without removing the RF shieldings. Even if they are discovered and the pad layout is reverse-engineered, it would still be unknown how to communicate with the SoC via JTAG.

Firmware

mount

  • with microSD card
rootfs / rootfs ro,relatime 0 0
tmpfs /dev tmpfs rw,nosuid,relatime,mode=755 0 0
devpts /dev/pts devpts rw,relatime,mode=600 0 0
proc /proc proc rw,relatime 0 0
sysfs /sys sysfs rw,relatime 0 0
none /acct cgroup rw,relatime,cpuacct 0 0
tmpfs /mnt/secure tmpfs rw,relatime,mode=700 0 0
tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0
tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0
none /dev/cpuctl cgroup rw,relatime,cpu 0 0
/emmc@android /system ext4 ro,noatime,noauto_da_alloc,commit=1,data=ordered 0 0
/emmc@usrdata /data ext4 rw,nosuid,nodev,noatime,discard,noauto_da_alloc,data=ordered 0 0
/emmc@cache /cache ext4 rw,nosuid,nodev,noatime,discard,noauto_da_alloc,data=ordered 0 0
/dev/block/loop0 /mnt/cd-rom iso9660 ro,relatime 0 0
/emmc@protect_f /protect_f ext4 rw,nosuid,nodev,noatime,nodelalloc,noauto_da_alloc,commit=1,data=ordered 0 0
/emmc@protect_s /protect_s ext4 rw,nosuid,nodev,noatime,nodelalloc,noauto_da_alloc,commit=1,data=ordered 0 0
/dev/block/vold/179:8 /storage/sdcard0 vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
/dev/block/vold/179:8 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
tmpfs /storage/sdcard0/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0
/dev/block/vold/179:97 /storage/sdcard1 vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
Meine Werkzeuge
Namensräume
Varianten
Aktionen
Navigation
Werkzeuge