NVR-24 после вируса
NVR-24 после вируса
Добрый день, плата NBD7000T_HI3535 пытаюсь восстановить, залил слитый дамп, все равно не запускается.
U-Boot 2010.06-svn344 (Jan 21 2016 - 18:23:38)
Check spi flash controller v350... Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
Set lock level: 3, start of bottom address
Spi is locked. lock address[0x0 => 0x40000]
In: serial
Out: serial
Err: serial
USB: scanning bus for devices... 1 USB Device(s) found
0 Storage Device(s) found
PHY 0x02: OUI = 0x01F0, Model = 0x0F, Rev = 0x01
change register for 8710
CONFIG MII
MAC: 00-0B-3F-00-00-01
Press CTRL-C to abort autoboot in 0 seconds16384 KiB hi_sfc at 0:0 is now current device
CFG_BOOT_ADDR:0x0
### /UbootLogo UbootLogoload complete: 21986 bytes loaded to 0x8e800000
jpeg decoding ...
<<addr=0x8e800000, size=0xb85f9, vobuf=0x8e800000>>
<<imgwidth=800, imgheight=600, linebytes=1600>>
decode success!!!!
decode jpeg success.
decode jpeg!
CFG_BOOT_ADDR:0x58050000
### boot load complete: 2808640 bytes loaded to 0x82000000
### SAVE TO 80008000 !
## Booting kernel from Legacy Image at 82000000 ...
Image Name: linux
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 2808576 Bytes = 2.7 MiB
Load Address: 80008000
Entry Point: 80008000
Loading Kernel Image ... OK
OK
Starting kernel ...
Uncompressing Linux... done, booting the kernel.
попытался все заного залить по частям, может стер что лишнее после...стало писать ошибку
hisilicon # run du
miiphy_register: non unique device name '0:2'
PHY 0x02: OUI = 0x01F0, Model = 0x0F, Rev = 0x01
change register for 8710
CONFIG MII
PHY not link!
16384 KiB hi_sfc at 0:0 is now current device
PACK_ID error
DestAddr invalid!
DestAddr: 0x00000000~0x2000000
hisilicon #
теперь не знаю, с чего начинать. Подскажите, пожалуйста.
U-Boot 2010.06-svn344 (Jan 21 2016 - 18:23:38)
Check spi flash controller v350... Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
Set lock level: 3, start of bottom address
Spi is locked. lock address[0x0 => 0x40000]
In: serial
Out: serial
Err: serial
USB: scanning bus for devices... 1 USB Device(s) found
0 Storage Device(s) found
PHY 0x02: OUI = 0x01F0, Model = 0x0F, Rev = 0x01
change register for 8710
CONFIG MII
MAC: 00-0B-3F-00-00-01
Press CTRL-C to abort autoboot in 0 seconds16384 KiB hi_sfc at 0:0 is now current device
CFG_BOOT_ADDR:0x0
### /UbootLogo UbootLogoload complete: 21986 bytes loaded to 0x8e800000
jpeg decoding ...
<<addr=0x8e800000, size=0xb85f9, vobuf=0x8e800000>>
<<imgwidth=800, imgheight=600, linebytes=1600>>
decode success!!!!
decode jpeg success.
decode jpeg!
CFG_BOOT_ADDR:0x58050000
### boot load complete: 2808640 bytes loaded to 0x82000000
### SAVE TO 80008000 !
## Booting kernel from Legacy Image at 82000000 ...
Image Name: linux
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 2808576 Bytes = 2.7 MiB
Load Address: 80008000
Entry Point: 80008000
Loading Kernel Image ... OK
OK
Starting kernel ...
Uncompressing Linux... done, booting the kernel.
попытался все заного залить по частям, может стер что лишнее после...стало писать ошибку
hisilicon # run du
miiphy_register: non unique device name '0:2'
PHY 0x02: OUI = 0x01F0, Model = 0x0F, Rev = 0x01
change register for 8710
CONFIG MII
PHY not link!
16384 KiB hi_sfc at 0:0 is now current device
PACK_ID error
DestAddr invalid!
DestAddr: 0x00000000~0x2000000
hisilicon #
теперь не знаю, с чего начинать. Подскажите, пожалуйста.
Re: NVR-24 после вируса
Пишет же - PHY not link!
Re: NVR-24 после вируса
ну да, не глянул на езернет.
залил по частям, висит на второй заставке уже.
U-Boot 2010.06-svn344 (Jan 21 2016 - 18:23:38)
Check spi flash controller v350... Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
Set lock level: 3, start of bottom address
Spi is locked. lock address[0x0 => 0x40000]
In: serial
Out: serial
Err: serial
USB: scanning bus for devices... 2 USB Device(s) found
0 Storage Device(s) found
PHY 0x02: OUI = 0x01F0, Model = 0x0F, Rev = 0x01
change register for 8710
CONFIG MII
PHY not link!
Press CTRL-C to abort autoboot in 0 seconds16384 KiB hi_sfc at 0:0 is now current device
CFG_BOOT_ADDR:0x0
### /UbootLogo UbootLogoload complete: 21986 bytes loaded to 0x8e800000
jpeg decoding ...
<<addr=0x8e800000, size=0xb85f9, vobuf=0x8e800000>>
<<imgwidth=800, imgheight=600, linebytes=1600>>
decode success!!!!
decode jpeg success.
decode jpeg!
CFG_BOOT_ADDR:0x58050000
### boot load complete: 2808640 bytes loaded to 0x82000000
### SAVE TO 80008000 !
## Booting kernel from Legacy Image at 82000000 ...
Image Name: linux
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 2808576 Bytes = 2.7 MiB
Load Address: 80008000
Entry Point: 80008000
Loading Kernel Image ... OK
OK
Starting kernel ...
Uncompressing Linux... done, booting the kernel.
залил по частям, висит на второй заставке уже.
U-Boot 2010.06-svn344 (Jan 21 2016 - 18:23:38)
Check spi flash controller v350... Found
Spi(cs1) ID: 0xEF 0x40 0x18 0x00 0x00 0x00
Spi(cs1): Block:64KB Chip:16MB Name:"W25Q128B"
Set lock level: 3, start of bottom address
Spi is locked. lock address[0x0 => 0x40000]
In: serial
Out: serial
Err: serial
USB: scanning bus for devices... 2 USB Device(s) found
0 Storage Device(s) found
PHY 0x02: OUI = 0x01F0, Model = 0x0F, Rev = 0x01
change register for 8710
CONFIG MII
PHY not link!
Press CTRL-C to abort autoboot in 0 seconds16384 KiB hi_sfc at 0:0 is now current device
CFG_BOOT_ADDR:0x0
### /UbootLogo UbootLogoload complete: 21986 bytes loaded to 0x8e800000
jpeg decoding ...
<<addr=0x8e800000, size=0xb85f9, vobuf=0x8e800000>>
<<imgwidth=800, imgheight=600, linebytes=1600>>
decode success!!!!
decode jpeg success.
decode jpeg!
CFG_BOOT_ADDR:0x58050000
### boot load complete: 2808640 bytes loaded to 0x82000000
### SAVE TO 80008000 !
## Booting kernel from Legacy Image at 82000000 ...
Image Name: linux
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 2808576 Bytes = 2.7 MiB
Load Address: 80008000
Entry Point: 80008000
Loading Kernel Image ... OK
OK
Starting kernel ...
Uncompressing Linux... done, booting the kernel.
Re: NVR-24 после вируса
уточните, пожалуйста, что заливаете: дамп или прошивку?shv писал(а):Добрый день, плата NBD7000T_HI3535 пытаюсь восстановить, залил слитый дамп, все равно не запускается...
Re: NVR-24 после вируса
да, дамп прошивки 16мб и заливал дамп крипточипа.
Re: NVR-24 после вируса
а вы ее же по частям run du и т.д пытались залить?
Re: NVR-24 после вируса
после дампа, висел на заставке на первой.
Потом рещил залить по частям прошивку и стало висеть на второй заставке....и все
Потом рещил залить по частям прошивку и стало висеть на второй заставке....и все
Re: NVR-24 после вируса
покажите printenv
Re: NVR-24 после вируса
shv писал(а): и заливал дамп крипточипа.
Дамп вообще от такой же платы ? А "крипточип" вы зря трогаете
Re: NVR-24 после вируса
hisilicon # printenv
bootcmd=sf probe 0;sf read 84000000 f20000 20000;logoload 0x84000000;decjpg;sf read 84000000 50000 4A0000;fload 84000000;bootm 0x82000000
bootdelay=1
baudrate=115200
bootfile="uImage"
restore=1
da=mw.b 0x82000000 ff 1000000;tftp 0x82000000 u-boot.bin.img;sf probe 0;flwrite
du=mw.b 0x82000000 ff 1000000;tftp 0x82000000 user-x.cramfs.img;sf probe 0;flwrite
dr=mw.b 0x82000000 ff 1000000;tftp 0x82000000 romfs-x.cramfs.img;sf probe 0;flwrite
dw=mw.b 0x82000000 ff 1000000;tftp 0x82000000 web-x.cramfs.img;sf probe 0;flwrite
dl=mw.b 0x82000000 ff 1000000;tftp 0x82000000 logo-x.cramfs.img;sf probe 0;flwrite
dc=mw.b 0x82000000 ff 1000000;tftp 0x82000000 custom-x.cramfs.img;sf probe 0;flwrite
up=mw.b 0x82000000 ff 1000000;tftp 0x82000000 update.img;sf probe 0;flwrite
tk=mw.b 0x82000000 ff 1000000;tftp 0x82000000 zImage.img; bootm 0x82000000
dd=mw.b 0x82000000 ff 1000000;tftp 0x82000000 mtd-x.jffs2.img;sf probe 0;flwrite
ethaddr=00:0b:3f:00:00:01
bootargs=mem=180M console=ttyAMA0,115200 root=/dev/mtdblock1 rootfstype=cramfs mtdparts=hi_sfc:320K(boot),4736K(romfs),5824K(usr),1536K(web),3072K(custom),128K(logo),768K(mtd)
appVideoStandard=PAL
appSystemLanguage=Russian
filesize=5040
fileaddr=82000000
gatewayip=192.168.0.1
netmask=255.255.255.0
ipaddr=192.168.1.10
serverip=192.168.1.1
stdin=serial
stdout=serial
stderr=serial
verify=n
ver=U-Boot 2010.06-svn344 (Jan 21 2016 - 18:23:38)
Environment size: 1390/65532 bytes
hisilicon #
bootcmd=sf probe 0;sf read 84000000 f20000 20000;logoload 0x84000000;decjpg;sf read 84000000 50000 4A0000;fload 84000000;bootm 0x82000000
bootdelay=1
baudrate=115200
bootfile="uImage"
restore=1
da=mw.b 0x82000000 ff 1000000;tftp 0x82000000 u-boot.bin.img;sf probe 0;flwrite
du=mw.b 0x82000000 ff 1000000;tftp 0x82000000 user-x.cramfs.img;sf probe 0;flwrite
dr=mw.b 0x82000000 ff 1000000;tftp 0x82000000 romfs-x.cramfs.img;sf probe 0;flwrite
dw=mw.b 0x82000000 ff 1000000;tftp 0x82000000 web-x.cramfs.img;sf probe 0;flwrite
dl=mw.b 0x82000000 ff 1000000;tftp 0x82000000 logo-x.cramfs.img;sf probe 0;flwrite
dc=mw.b 0x82000000 ff 1000000;tftp 0x82000000 custom-x.cramfs.img;sf probe 0;flwrite
up=mw.b 0x82000000 ff 1000000;tftp 0x82000000 update.img;sf probe 0;flwrite
tk=mw.b 0x82000000 ff 1000000;tftp 0x82000000 zImage.img; bootm 0x82000000
dd=mw.b 0x82000000 ff 1000000;tftp 0x82000000 mtd-x.jffs2.img;sf probe 0;flwrite
ethaddr=00:0b:3f:00:00:01
bootargs=mem=180M console=ttyAMA0,115200 root=/dev/mtdblock1 rootfstype=cramfs mtdparts=hi_sfc:320K(boot),4736K(romfs),5824K(usr),1536K(web),3072K(custom),128K(logo),768K(mtd)
appVideoStandard=PAL
appSystemLanguage=Russian
filesize=5040
fileaddr=82000000
gatewayip=192.168.0.1
netmask=255.255.255.0
ipaddr=192.168.1.10
serverip=192.168.1.1
stdin=serial
stdout=serial
stderr=serial
verify=n
ver=U-Boot 2010.06-svn344 (Jan 21 2016 - 18:23:38)
Environment size: 1390/65532 bytes
hisilicon #
Re: NVR-24 после вируса
смотрите: у вас флешка залочена "Spi is locked. lock address[0x0 => 0x40000]" т.к это бут и его размер 256K, а в printenv бут 320К. Что-то не стыкуется. Покажите прошивку, которую заливаете по-блокам.
Re: NVR-24 после вируса
Да вот последняя версия, я уже лил в другой с которого делал дамп.https://pan.sohu.net/f/MTY3OTksaGRpeHg.htm" onclick="window.open(this.href);return false;