DUMP H.264 DVR model DVR-7804EN

Вопросы по восстановлению, настройке, апгрейду, прошивкам и т.п.
displays
Специалист
Сообщения: 176
Зарегистрирован: 09 май 2016, 08:30

DUMP H.264 DVR model DVR-7804EN

Сообщение displays » 17 ноя 2017, 14:07

Добрый день. Принесли видио регистратор H.264 DVR model DVR-7804EN с цветным матрасом. Прошил от дугова регистратора похожого дамп, регистратор ожил, но с одним окном, камеры подключать не пробовал.
Если есть дамп или прошивка пожалуйста поделитесь. Спасибо.

Прошивка с матрасом
https://cloud.mail.ru/public/6HND/t5Wjf6Qh7" onclick="window.open(this.href);return false;

Фото регистратора

https://cloud.mail.ru/public/MzPT/BAVvFtwM5" onclick="window.open(this.href);return false;

Аватара пользователя
VirtualLink
Специалист
Сообщения: 1846
Зарегистрирован: 09 апр 2016, 12:38

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение VirtualLink » 17 ноя 2017, 18:32

Дамп не от XM, а матрац там свой собственный в этом дампе.
Оригинальный нерабочий дамп где?

displays
Специалист
Сообщения: 176
Зарегистрирован: 09 май 2016, 08:30

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение displays » 17 ноя 2017, 19:09

Оригинал дамп в первом посту 7804en.zip выложен.

Вот еще раз выложел ссылку оригинал не рабочий дамп.
https://cloud.mail.ru/public/6HND/t5Wjf6Qh7" onclick="window.open(this.href);return false;

dede
Специалист
Сообщения: 1957
Зарегистрирован: 22 мар 2017, 15:02
Откуда: Луганск

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение dede » 17 ноя 2017, 21:54

А, так это ж, не помню чья хрень, с закосом под дахуа.

Оригинальный дамп выглядит очень живым, рекомендую его восстановить и всё. Либо переносите раздел encrypt в новый

Аватара пользователя
VirtualLink
Специалист
Сообщения: 1846
Зарегистрирован: 09 апр 2016, 12:38

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение VirtualLink » 17 ноя 2017, 22:13

Да эта хрень известно чья и дамп живым выглядит и матрац там свой.
Смутило вот что
[quote="displays"Прошил от дугова регистратора похожого дамп, регистратор ожил, но с одним окном, камеры подключать не пробовал.[/quote]
Вот и подумал!
TTL?

displays
Специалист
Сообщения: 176
Зарегистрирован: 09 май 2016, 08:30

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение displays » 17 ноя 2017, 22:21

Лог загрузки

U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Check spi flash controller v350...ww Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
In: serial
Out: serial
Err: serial
16384 KiB hi_sfc at 0:0 is now current device

### CRAMFS load complete: 864056 bytes loaded to 0x83500000
Hit any key to stop autoboot: 0
16384 KiB hi_sfc at 0:0 is now current device

## Booting kernel from Legacy Image at 82000000 ...
Image Name: Linux-3.0.8
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 2175268 Bytes = 2.1 MiB
Load Address: 80008000
Entry Point: 80008000
Loading Kernel Image ... OK
OK

Starting kernel ...

Uncompressing Linux... done, booting the kernel.
▒Auto login as root ...


BusyBox v1.16.1 (2013-07-22 10:28:16 CST) built-in shell (ash)
Enter 'help' for a list of built-in commands.

Welcome to HiLinux.
#

Просит приглашение Enter 'help' for a list of built-in commands. Welcome to HiLinux.#
Написал help


U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Check spi flash controller v350...ww Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
In: serial
Out: serial
Err: serial
16384 KiB hi_sfc at 0:0 is now current device

### CRAMFS load complete: 864056 bytes loaded to 0x83500000
Hit any key to stop autoboot: 0
16384 KiB hi_sfc at 0:0 is now current device

## Booting kernel from Legacy Image at 82000000 ...
Image Name: Linux-3.0.8
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 2175268 Bytes = 2.1 MiB
Load Address: 80008000
Entry Point: 80008000
Loading Kernel Image ... OK
OK

Starting kernel ...

Uncompressing Linux... done, booting the kernel.
▒Auto login as root ...


BusyBox v1.16.1 (2013-07-22 10:28:16 CST) built-in shell (ash)
Enter 'help' for a list of built-in commands.

Welcome to HiLinux.
# help
Built-in commands:
------------------
. : [ [[ alias bg break cd chdir command continue echo eval exec
exit export false fg getopts hash help jobs kill let local printf
pwd read readonly return set shift source test times trap true
type ulimit umask unalias unset wait

#

Аватара пользователя
VirtualLink
Специалист
Сообщения: 1846
Зарегистрирован: 09 апр 2016, 12:38

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение VirtualLink » 17 ноя 2017, 22:26

Побит архив с либами в cramfs разделе как минимум!
Как?

Аватара пользователя
VirtualLink
Специалист
Сообщения: 1846
Зарегистрирован: 09 апр 2016, 12:38

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение VirtualLink » 17 ноя 2017, 22:28

Проси у продавца прошивку!

displays
Специалист
Сообщения: 176
Зарегистрирован: 09 май 2016, 08:30

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение displays » 17 ноя 2017, 22:30

Лог help и printenv




U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Check spi flash controller v350...ww Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
In: serial
Out: serial
Err: serial
16384 KiB hi_sfc at 0:0 is now current device

### CRAMFS load complete: 864056 bytes loaded to 0x83500000
Hit any key to stop autoboot: 0
hisilicon # help
? - alias for 'help'
base - print or set address offset
bootm - boot application image from memory
bootp - boot image via network using BOOTP/TFTP protocol
cmp - memory compare
cp - memory copy
cramfsload- cramfsload - load binary file from a filesystem image
cramfsls- cramfsls - list files in a directory (default /)
crc32 - checksum calculation
decjpg - jpgd - decode jpeg picture.

ext2load- load binary file from a Ext2 filesystem
ext2ls - list files in a directory (default /)
fatinfo - print information about filesystem
fatload - load binary file from a dos filesystem
fatls - list files in a directory (default /)
flwrite - flwrite - write data into FLASH memory

getinfo - print hardware information
go - start application at address 'addr'
help - print command description/usage
hwid - hwid - set hardware id and save to flash

lip - lip - set local ip address but not save to flash

loadb - load binary file over serial line (kermit mode)
loady - load binary file over serial line (ymodem mode)
loop - infinite loop on address range
mac - mac - set mac address and save to flash

md - memory display
mii - MII utility commands
mm - memory modify (auto-incrementing address)
mtest - simple RAM read/write test
mw - memory write (fill)
nm - memory modify (constant address)
ping - send ICMP ECHO_REQUEST to network host
printenv- print environment variables
rarpboot- boot image via network using RARP/TFTP protocol
reset - Perform RESET of the CPU
run - run commands in an environment variable
saveenv - save environment variables to persistent storage
setenv - set environment variables
setvobg - setvobg - set vo backgroud color.
- setvobg [dev color]
sf - SPI flash sub-system
sip - sip - set server ip address but not save to flash

startgx - startgx - open graphics layer.
- startgx [layer addr stride x y w h]

startvo - startvo - open interface of vo device.
- startvo [dev type sync]
stopgx - stopgx - close graphics layer.
- stopgx [layer]
stopvo - stopvo - close interface of vo device.
- stopvo [dev]
tftp - tftp - download or upload image via network using TFTP protocol
usb - USB sub-system
usbboot - boot from USB device
version - print monitor version
hisilicon # printenv
bootargs=mem=59M console=ttyAMA0,115200 root=/dev/mtdblock2 rootfstype=cramfs mtdparts=hi_sfc:512K(boot),2176K(kernel),1536K(rootfs),8704K(user),2304K(web),256K(logo),128K(custom),64K(tool),64K(encrypt),640K(config)
bootargs1=mem=59M root=/dev/mtdblock2 rootfstype=cramfs mtdparts=hi_sfc:512K(boot),2176K(kernel),1536K(rootfs),8704K(user),2304K(web),256K(logo),128K(custom),64K(tool),64K(encrypt),640K(config)
bootcmd=sf probe 0;sf read 0x82000000 0x80000 0x220000;bootm 0x82000000
bootdelay=3
baudrate=115200
ipaddr=192.168.1.10
serverip=192.168.1.2
netmask=255.255.254.0
bootfile="uImage"
xload=1
ID=000000000000000000
da=tftp 0x82000000 u-boot.bin.img;flwrite
dk=tftp 0x82000000 uImage.img;flwrite
dr=tftp 0x82000000 romfs-x.cramfs.img; flwrite
dc=tftp 0x82000000 custom-x.cramfs.img; flwrite
du=tftp 0x82000000 user-x.cramfs.img; flwrite
dw=tftp 0x82000000 web-x.cramfs.img; flwrite
dl=tftp 0x82000000 logo-x.cramfs.img; flwrite
up=tftp 0x82000000 update.img; flwrite
tk=tftp 0x82000000 uImage; bootm 0x82000000
ethaddr=e0:61:b2:18:fc:a3
stdin=serial
stdout=serial
stderr=serial
verify=n
cramfsaddr=0x83000000
filesize=d2f38
ver=U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Environment size: 0/131068 bytes
hisilicon #

displays
Специалист
Сообщения: 176
Зарегистрирован: 09 май 2016, 08:30

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение displays » 17 ноя 2017, 22:34

Этому регистратору минимум 5-6 лет. Продавца не знаю, мне на ремонт притащил клиент.

dede
Специалист
Сообщения: 1957
Зарегистрирован: 22 мар 2017, 15:02
Откуда: Луганск

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение dede » 17 ноя 2017, 22:36

Тут просто ядро в тихом режиме грузится, возможно там банальные ошибки в jffs2, но вылазят они еще до того, как консоль становится активна

displays
Специалист
Сообщения: 176
Зарегистрирован: 09 май 2016, 08:30

Re: DUMP H.264 DVR model DVR-7804EN

Сообщение displays » 17 ноя 2017, 22:45

Прошил с другой регистратора дамп рег ожил но с одним окном почему то.




U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Check spi flash controller v350...ww Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
In: serial
Out: serial
Err: serial
16384 KiB hi_sfc at 0:0 is now current device

### CRAMFS load complete: 864056 bytes loaded to 0x83500000
Hit any key to stop autoboot: 0
hisilicon # help
? - alias for 'help'
base - print or set address offset
bootm - boot application image from memory
bootp - boot image via network using BOOTP/TFTP protocol
cmp - memory compare
cp - memory copy
cramfsload- cramfsload - load binary file from a filesystem image
cramfsls- cramfsls - list files in a directory (default /)
crc32 - checksum calculation
decjpg - jpgd - decode jpeg picture.

ext2load- load binary file from a Ext2 filesystem
ext2ls - list files in a directory (default /)
fatinfo - print information about filesystem
fatload - load binary file from a dos filesystem
fatls - list files in a directory (default /)
flwrite - flwrite - write data into FLASH memory

getinfo - print hardware information
go - start application at address 'addr'
help - print command description/usage
hwid - hwid - set hardware id and save to flash

lip - lip - set local ip address but not save to flash

loadb - load binary file over serial line (kermit mode)
loady - load binary file over serial line (ymodem mode)
loop - infinite loop on address range
mac - mac - set mac address and save to flash

md - memory display
mii - MII utility commands
mm - memory modify (auto-incrementing address)
mtest - simple RAM read/write test
mw - memory write (fill)
nm - memory modify (constant address)
ping - send ICMP ECHO_REQUEST to network host
printenv- print environment variables
rarpboot- boot image via network using RARP/TFTP protocol
reset - Perform RESET of the CPU
run - run commands in an environment variable
saveenv - save environment variables to persistent storage
setenv - set environment variables
setvobg - setvobg - set vo backgroud color.
- setvobg [dev color]
sf - SPI flash sub-system
sip - sip - set server ip address but not save to flash

startgx - startgx - open graphics layer.
- startgx [layer addr stride x y w h]

startvo - startvo - open interface of vo device.
- startvo [dev type sync]
stopgx - stopgx - close graphics layer.
- stopgx [layer]
stopvo - stopvo - close interface of vo device.
- stopvo [dev]
tftp - tftp - download or upload image via network using TFTP protocol
usb - USB sub-system
usbboot - boot from USB device
version - print monitor version
hisilicon # printenv
bootargs=mem=59M console=ttyAMA0,115200 root=/dev/mtdblock2 rootfstype=cramfs mtdparts=hi_sfc:512K(boot),2176K(kernel),1536K(rootfs),8704K(user),2304K(web),256K(logo),128K(custom),64K(tool),64K(encrypt),640K(config)
bootargs1=mem=59M root=/dev/mtdblock2 rootfstype=cramfs mtdparts=hi_sfc:512K(boot),2176K(kernel),1536K(rootfs),8704K(user),2304K(web),256K(logo),128K(custom),64K(tool),64K(encrypt),640K(config)
bootcmd=sf probe 0;sf read 0x82000000 0x80000 0x220000;bootm 0x82000000
bootdelay=3
baudrate=115200
ipaddr=192.168.1.10
serverip=192.168.1.2
netmask=255.255.254.0
bootfile="uImage"
xload=1
ID=000000000000000000
da=tftp 0x82000000 u-boot.bin.img;flwrite
dk=tftp 0x82000000 uImage.img;flwrite
dr=tftp 0x82000000 romfs-x.cramfs.img; flwrite
dc=tftp 0x82000000 custom-x.cramfs.img; flwrite
du=tftp 0x82000000 user-x.cramfs.img; flwrite
dw=tftp 0x82000000 web-x.cramfs.img; flwrite
dl=tftp 0x82000000 logo-x.cramfs.img; flwrite
up=tftp 0x82000000 update.img; flwrite
tk=tftp 0x82000000 uImage; bootm 0x82000000
ethaddr=e0:61:b2:18:fc:a3
stdin=serial
stdout=serial
stderr=serial
verify=n
cramfsaddr=0x83000000
filesize=d2f38
ver=U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Environment size: 0/131068 bytes
hisilicon #


U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Check spi flash controller v350...ww Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
In: serial
Out: serial
Err: serial



U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Check spi flash controller v350...ww Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
In: serial
Out: serial
Err: serial
16384 KiB hi_sfc at 0:0 is now current device

### CRAMFS load complete: 864056 bytes loaded to 0x83500000
Hit any key to stop autoboot: 0
hisilicon # printenv
bootargs=mem=59M console=ttyAMA0,115200 root=/dev/mtdblock2 rootfstype=cramfs mtdparts=hi_sfc:512K(boot),2176K(kernel),1536K(rootfs),8704K(user),2304K(web),256K(logo),128K(custom),64K(tool),64K(encrypt),640K(config)
bootargs1=mem=59M root=/dev/mtdblock2 rootfstype=cramfs mtdparts=hi_sfc:512K(boot),2176K(kernel),1536K(rootfs),8704K(user),2304K(web),256K(logo),128K(custom),64K(tool),64K(encrypt),640K(config)
bootcmd=sf probe 0;sf read 0x82000000 0x80000 0x220000;bootm 0x82000000
bootdelay=3
baudrate=115200
ipaddr=192.168.1.10
serverip=192.168.1.2
netmask=255.255.254.0
bootfile="uImage"
xload=1
ID=000000000000000000
da=tftp 0x82000000 u-boot.bin.img;flwrite
dk=tftp 0x82000000 uImage.img;flwrite
dr=tftp 0x82000000 romfs-x.cramfs.img; flwrite
dc=tftp 0x82000000 custom-x.cramfs.img; flwrite
du=tftp 0x82000000 user-x.cramfs.img; flwrite
dw=tftp 0x82000000 web-x.cramfs.img; flwrite
dl=tftp 0x82000000 logo-x.cramfs.img; flwrite
up=tftp 0x82000000 update.img; flwrite
tk=tftp 0x82000000 uImage; bootm 0x82000000
ethaddr=e0:61:b2:18:fc:a3
stdin=serial
stdout=serial
stderr=serial
verify=n
cramfsaddr=0x83000000
filesize=d2f38
ver=U-Boot 2010.06 (Dec 16 2013 - 16:57:02)

Environment size: 0/131068 bytes
hisilicon # mw.b 82000000 ff 1000000
hisilicon # tftp 82000000 8104.bin
Hisilicon ETH net controler
MAC: E0-61-B2-18-FC-A3
UP_PORT : phy status change : LINK=DOWN : DUPLEX=FULL : SPEED=100M
UP_PORT : phy status change : LINK=UP : DUPLEX=FULL : SPEED=100M
TFTP from server 192.168.1.2; our IP address is 192.168.1.10
Download Filename '8104.bin'.
Download to address: 0x82000000
Downloading: *
ARP Retry count exceeded; starting again
TFTP from server 192.168.1.2; our IP address is 192.168.1.10
Download Filename '8104.bin'.
Download to address: 0x82000000
Downloading: #################################################
done
Bytes transferred = 16777216 (1000000 hex)
hisilicon # sf probe 0
16384 KiB hi_sfc at 0:0 is now current device
hisilicon # sf erase 0 1000000
Erasing at 0x1000000 -- 100% complete.
hisilicon # sf write 82000000 0 1000000
Writing at 0x1000000 -- 100% complete.
hisilicon # reset
resetting ...



U-Boot 2010.06-svn109 (May 20 2013 - 09:16:41)

DRAM: 256 MiB
Check spi flash controller v350... Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
envcrc 0xdb61674c
ENV_SIZE = 0x3fffc
In: serial
Out: serial
Err: serial
Hisilicon ETH net controler
Press CTRL-C to abort autoboot in 0 seconds16384 KiB hi_sfc at 0:0 is now current device

CFG_BOOT_ADDR:0x58080000
0ff:0x84000000
### boot load complete: 2798560 bytes loaded to 0x82000000
### SAVE TO 80008000 !
## Booting kernel from Legacy Image at 82000000 ...
Image Name: linux
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 2798496 Bytes = 2.7 MiB
Load Address: 80008000
Entry Point: 80008000
Loading Kernel Image ... OK
OK

Starting kernel ...

Uncompressing Linux... done, booting the kernel.

Ответить

Вернуться в «Восстановление и настройка»