wireless-carplay-dongle-reverse-engineering
                                
                                
                                
                                    wireless-carplay-dongle-reverse-engineering copied to clipboard
                            
                            
                            
                        CPlay2Air / Carlinkit Wireless Apple CarPlay Dongle reverse engineering

Carlinkit / Carplay2Air Reverse Engineering
Hardware
| Hardware | Part | 
|---|---|
| Flash | Macronix 25L12835F (16MB) | 
| SoC | Freescale i.MX6 UltraLite | 
| CPU | ARM Cortex-A7 (ARMv7) | 
| RAM | Micron/SK hynix 1Gb (64x16) | 
| Wi-Fi/BT | Realtek RTL8822BS | 
Software
2021.03.09.0001 on CPLAY2Air:
$ cat /proc/cmdline
console=ttyLogFile0 root=/dev/mtdblock2 rootfstype=jffs2 mtdparts=21e0000.qspi:256k(uboot),3328K(kernel),12800K(rootfs) rootwait quiet rw
$ cat /proc/mtd
dev:    size   erasesize  name
mtd0: 00040000 00010000 "uboot"
mtd1: 00340000 00010000 "kernel"
mtd2: 00c80000 00010000 "rootfs"
$ df -T
Filesystem           Type       1K-blocks      Used Available Use% Mounted on
/dev/root            jffs2          12800     10940      1860  85% /
devtmpfs             devtmpfs       61632         0     61632   0% /dev
tmpfs                tmpfs          61732      6324     55408  10% /tmp
/dev/sda1            vfat        62498880     42304  62456576   0% /mnt/UPAN
u-boot compilation
apt-get install device-tree-compiler gcc-arm-linux-gnueabihf
export ARCH=arm
export CROSS_COMPILE=arm-linux-gnueabihf-
git clone https://github.com/ARM-software/u-boot.git
make mx6ull_14x14_evk_defconfig
make all
The device can be seen as "SP Blank 6ULL" when powered by USB-OTG but it is not possible to flash a custom u-boot using imx_usb because it is signed