Rockbox Development > New Ports

Sandisk C100 series

(1/10) > >>

saioke:
hey everyone... im just wondering if rockbox plans on supporting the sandisk c140 model?

tarsius:
For a while I have been looking for a copy of the Sansa c140 firmware so I could observe the updating process and hopefully do something simple such as swap two characters in a menu string to see if it would produce the desired result.  No luck (until today) finding the firmware because there have been no updates released on the SanDisk website.

I've also attempted to open my c140, but it was not a simple matter of unscrewing.  In the past I was afraid of breaking it, but now I am prepared to flush the investment down the toilet if something goes wrong... I'll chalk it up to an educational expense.

Now that I have the firmware, I'd like to start a port to the Sansa c100 series, but this will be my first reverse engineering project.  I have a background in software, computer engineering, and to a lesser extent, electrical engineering, so this will hopefully be a do-able task if time permits.  I'll follow the NewPort wiki page--hopefully I'll post hardware photos soon.

Question:  Does anyone already know what CPU is inside the c100 series?  I've searched everywhere to no avail, but hopefully we'll know very soon...

Steve

tarsius:
Answer:  The c100 series uses the Telechips TCC76x or TCC77x (http://www.rockbox.org/twiki/bin/view/Main/TelechipsInfo)

skaos:
From http://www.experts-exchange.com/Other/Miscellaneous/Q_22591475.html:

Finally I was able to dissasemble the MP3 Player. The first part that needs to be removed is the front cover, it has like 3 plastic snaps on each side. Ones this was removed there were 4 screws to remove and that was it. It's pretty simple once you know what piece to remove first.

Bagder:
It being a Telechips, it should be worthwhile to check what particular chip it is and then see if you can do the usb-boot "trick" with tcctool as discussed in the cowon d2 thread in this forum.

We also know how to generate the checksums for the firmware images etc, and they are otherwise unencrypted so they usually are rather "easy" to disassemble. If you have the firmware image in a file that is.

Navigation

[0] Message Index

[#] Next page

Go to full version