Skip to content

liker292/wireless-carplay-dongle-reverse-engineering

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Carplay2Air Reverse Engineering

CPU: ARMv7 Processor [410fc075] revision 5 (ARMv7), cr=10c53c7d

Machine model: Freescale i.MX6 UltraLite 14x14 EVK Board

Kernel command line: root=/dev/mtdblock3 rootfstype=jffs2 mtdparts=21e0000.qspi:1M(uboot),5056K(kernel),64K(dtb),10M(rootfs) rootwait rw

--

Flash type: Macronix 25L12835F

WIFI chip: RTL8822BS

--

u-boot compilation

apt-get install device-tree-compiler gcc-arm-linux-gnueabihf
export ARCH=arm
export CROSS_COMPILE=arm-linux-gnueabihf-
git clone https://github.com/ARM-software/u-boot.git
make mx6ull_14x14_evk_defconfig
make all

The device can be seen as "SP Blank 6ULL" when powered by USB-OTG but it is not possible to flash a custom u-boot using imx_usb because it is signed

About

Carplay2Air / Carlinkit Wireless Carplay Dongle reverse engineering

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 57.8%
  • HTML 40.5%
  • PHP 1.7%