首頁 收藏 QQ群
 網(wǎng)站導航

ZNDS智能電視網(wǎng) 推薦當貝市場

TV應用下載 / 資源分享區(qū)

軟件下載 | 游戲 | 討論 | 電視計算器

綜合交流 / 評測 / 活動區(qū)

交流區(qū) | 測硬件 | 網(wǎng)站活動 | Z幣中心

新手入門 / 進階 / 社區(qū)互助

新手 | 你問我答 | 免費刷機救磚 | ROM固件

樓主: benn_zhao
上一主題 下一主題
[求助]

四川電信創(chuàng)維E900,帶usb3.0版本救磚

  [復制鏈接]
11#
發(fā)表于 2017-5-13 18:41 | 只看該作者 | 來自四川
benn_zhao 發(fā)表于 2017-4-11 19:31
多謝樓上,確實有讀U盤的動作,可能是我的文件不對,沒有成功,U盤的燈確實閃了幾下。

大家?guī)兔?,誰手上有 ...

這個命令符是在TTL里面用還是用其它軟件呀?
回復 支持 反對

使用道具 舉報

12#
發(fā)表于 2017-5-13 18:46 | 只看該作者 | 來自四川
benn_zhao 發(fā)表于 2017-4-11 19:31
多謝樓上,確實有讀U盤的動作,可能是我的文件不對,沒有成功,U盤的燈確實閃了幾下。

大家?guī)兔Γl手上有 ...

還有就是優(yōu)盤插哪個口呀?
回復 支持 反對

使用道具 舉報

13#
發(fā)表于 2017-6-11 17:55 | 只看該作者 | 來自浙江
山陰路的夏天 發(fā)表于 2017-4-5 13:53
http://ktgpgw.cn/tv-693882-1-1.html樓主也可以參考一下這個帖子或者也可以自己去相關的板塊找找看 ...

Bootrom start
Boot from eMMC
Initializing DDR ... OK
Starting DDR training ... OK
Starting fastboot ...


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Compressed-boot v1.0.0
Uncompress........................Ok


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Fastboot 3.3.0 (wujiaxi@RD4TEAM) (Oct 14 2015 - 21:52:02)

Fastboot:      Version 3.3.0
Build Date:    Oct 14 2015, 21:52:48
CPU:           Hi3798Mv100 (CA)
Boot Media:    eMMC
DDR Size:      1GB

Check nand flash controller v610. found
Special NAND id table Version 1.36
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!

MMC/SD controller initialization.
MMC/SD Card:
    MID:         0x15
    Read Block:  512 Bytes
    Write Block: 512 Bytes
    Chip Size:   3728M Bytes (High Capacity)
    Name:        "4FPD3"
    Chip Type:   MMC
    Version:     5.0
    Speed:       52000000Hz
    Bus Width:   8bit
    Boot Addr:   0 Bytes

Boot Env on eMMC
    Env Offset:          0x00100000
    Env Size:            0x00010000
    Env Range:           0x00010000
HI_OTP_LockIdWord,327: ID_WORD have already been locked


SDK Version: HiSTBAndroidV600R001C00SPC062_v2015091617

Security Begin Read RSA Key!
Secure boot is enabled
press the key!!
get key 0 2
get chipid =137980100
get chipType (HI3798MV100)
count=2
Press the IR remote!!
Press the IR remote!!
boot_select = kernel
Start TF-Card enable!!!skyworth board!!!
Start WIFI enable!!!skyworth board!!!
kernelbootargs:console=ttyAMA0,115200 blkdevparts=mmcblk0:1M(fastboot),1M(bootargs),10M(recovery),2M(deviceinfo),8M(baseparam),8M(pqparam),20M(logo),20M(logobak),40M(fastplay),40M(fastplaybak),40M(kernel),20M(misc),8M(userapi),8M(hibdrv),8M(qbflag),300M(qbdata),800M(system),1024M(userdata),500M(cache),8M(macid),64M(skparam),400M(skbackup),50M(private),-(sdcard) cohernet_pool=1M --hpmc
mac:72:F4:58:9C:02:1D

MMC read: dev # 0, block # 1, count 1 ... 1 blocks read: OK

738461 Bytes/s
RSA Module:
0xBD, 0xCA, 0x00, 0xF4, 0x0D, 0xA4, 0x04, 0xEF, 0xD8, 0x79, 0xB0, 0x7D, 0xBC, 0x3E, 0x54, 0x4E,
0xFF, 0x96, 0xBB, 0xA9, 0x71, 0x75, 0xAC, 0x4C, 0x35, 0xEB, 0x38, 0x89, 0x42, 0x41, 0x48, 0xE9,
0x58, 0x7A, 0xDF, 0x5B, 0x8D, 0x19, 0x45, 0xA7, 0x29, 0xB2, 0xD7, 0x3D, 0x35, 0x9A, 0xFC, 0xFD,
0xFE, 0x1D, 0x10, 0x5F, 0xA5, 0xE0, 0x33, 0xB2, 0xBB, 0x87, 0x1C, 0x81, 0x5E, 0x4C, 0x53, 0x93,
0x73, 0x05, 0x71, 0x96, 0x80, 0xEE, 0xA0, 0x68, 0x72, 0xE0, 0x64, 0x3A, 0xA7, 0x73, 0xBF, 0x31,
0x09, 0xDE, 0x95, 0x5E, 0xF2, 0x19, 0x25, 0xE1, 0x0A, 0x0A, 0x01, 0xD5, 0xFB, 0x94, 0x1F, 0x2A,
0x17, 0xFF, 0x2C, 0x55, 0x37, 0x7C, 0xB0, 0x7F, 0xAB, 0x33, 0xC2, 0x01, 0xA7, 0xB9, 0x49, 0x7F,
0xDD, 0xA6, 0x69, 0x1D, 0x7C, 0xF3, 0xCB, 0x6B, 0xD5, 0xEB, 0xCD, 0x02, 0xDE, 0xD9, 0x74, 0x4E,
0xB0, 0x1F, 0x2F, 0x47, 0xB5, 0x01, 0x5A, 0xFE, 0x6D, 0x15, 0xE7, 0xA7, 0x59, 0x90, 0x7D, 0x10,
0x84, 0xE6, 0x5F, 0x9D, 0x89, 0x7E, 0x79, 0x5A, 0x8D, 0x20, 0x24, 0x9C, 0x23, 0xD2, 0x67, 0x20,
0x68, 0x41, 0xAB, 0xAD, 0xC5, 0x2D, 0xCB, 0x47, 0x8B, 0xE6, 0xD9, 0x47, 0x65, 0xD3, 0x1E, 0xDB,
0xC6, 0x65, 0x9D, 0x96, 0x78, 0x01, 0x9D, 0x47, 0xE6, 0x1D, 0xA9, 0xD3, 0x34, 0xF6, 0xDC, 0xFD,
0x10, 0x88, 0x1C, 0x5E, 0x64, 0x43, 0xD8, 0xA5, 0x19, 0x6F, 0x9E, 0x0A, 0x6F, 0x35, 0x46, 0xBF,
0xE6, 0x52, 0x5E, 0x0C, 0x92, 0x6D, 0x3E, 0x3F, 0x6C, 0x82, 0x00, 0x05, 0xBE, 0x85, 0x98, 0x19,
0xA0, 0x4B, 0x83, 0x29, 0x55, 0x7E, 0xAB, 0x92, 0x23, 0x5A, 0x6F, 0x8F, 0x12, 0xFE, 0x7A, 0x25,
0xDF, 0x24, 0x58, 0xF9, 0xFE, 0x30, 0x5E, 0xB8, 0xF4, 0xB6, 0x43, 0xDD, 0x98, 0x42, 0xB8, 0x69,
RSA Exponent:
0x03, 0x00, 0x00, 0x00,

get extern rsa key success!
g_EnvFlashAddr:0x100000, g_EnvFlashPartionSize:0x100000
Open addr, enFlashType: 0x00000002
HI_CA_CommonVerify_BootPara,2213: Sign Header found!
HI_CA_CommonVerify_BootPara,2219: CRC32 check ok
HI_CA_CommonVerify_BootPara,2255: begin sha2, length:65536
HI_CA_CommonVerify_BootPara,2270: Sha check ok

u8MagicNumber:Hisilicon_ADVCA_ImgHead_MagicNum
u8Version:v1.0.0.3
u32CreateDay:0x0
u32CreateTime:0x0
u32HeadLength:0x384
u32SignedDataLength:65536:0x10000
u32IsYaffsImage:0
u32IsConfigNandBlock:1
u32NandBlockType:0
u32IsNeedEncrypt:0
u32IsEncrypted:0
u32HashType:1
u32CurrentsectionID:0
u32TotalsectionID:1
u32SectionSize:0
e9 ea 3f b3 42 ae 08 46 69 57 01 d7 d9 f0 ee 68 cf a0 77 52 f8 0a 2a ac c8 0e 1c c6 dc c0 6b 2b
u32SignatureLen:256
2d 03 61 7a 57 d4 4b 7a b1 83 30 13 c3 63 d4 92 70 27 d3 0e f1 46 6d c0 38 ad 2d ab d6 10 fc 43 ed 4d 61 68 bd 88 0c 92 9e 53 54 7e 9d 11 32 63 fc 4e 05 30 90 1a cf f3 ad a4 71 a0 2a d8 1e 69 10 dd 27 93 2b 1a 91 dd 20 51 14 00 db d0 d9 3e 66 21 3f 46 9f 75 25 bd 97 ff c3 6b ed d5 1c b6 ed f6 05 44 52 d0 b9 6b af 34 21 bd a5 f4 8d 20 f1 d8 62 da 80 92 be db 15 15 11 e7 7a 01 f6 ff 04 a9 dc 3b 4d 4e a3 b9 bb 10 b8 8b 7b 81 6a c8 aa 7e 0f 31 2c 60 b8 93 ea f4 3f 0e 19 08 1e 03 e1 70 f7 79 e0 33 5f d1 ae 06 76 28 8c 02 88 0a eb b1 96 62 d6 54 cd a5 92 91 e9 bf 08 43 ff cc b8 f9 f6 8d 67 39 c9 c0 b4 ca ec 8d ec 2f 88 ea 9b df ba c7 7c 73 86 af 4e d6 ba 49 cd 86 5d 36 18 3c 06 20 0a fd 20 f2 f4 e4 74 60 c8 13 ae 4d 8b 19 37 d3 d5 fe 47 7f 68 b0 b2 ec 83 27 1f 38
OrignalImagePath:/homesec/lijingchao/4G_code/sdk/kitkat/out/target/product/Hi3798MV100/Emmc/bootargs.bin
RSAPrivateKeyPath:/homesec/lijingchao/4G_code/sdk/kitkat/device/hisilicon/Hi3798MV100/security/extern_rsa_priv.txt
CRC32:f01d6735
HI_CA_CommonVerify_BootPara,2276: Check Authenitication is ok
CA_Common_VerifyBootParaByPartitionDebug,535: verify success
HI_CA_GetAuthMode,863: Common Signature!
HI_CA_GetAuthMode,863: Common Signature!
CA_Common_VerifyParseSignCommand,462: verify image:recovery, sign:recovery, offset:0x200000
CA_Common_Search_SignHeader,1734: PartitionSignName:recovery
回復 支持 反對

使用道具 舉報

14#
發(fā)表于 2017-6-11 18:07 | 只看該作者 | 來自浙江

Bootrom start
Boot from eMMC
Initializing DDR ... OK
Starting DDR training ... OK
Starting fastboot ...


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Compressed-boot v1.0.0
Uncompress........................Ok


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Fastboot 3.3.0 (wujiaxi@RD4TEAM) (Oct 14 2015 - 21:52:02)

Fastboot:      Version 3.3.0
Build Date:    Oct 14 2015, 21:52:48
CPU:           Hi3798Mv100 (CA)
Boot Media:    eMMC
DDR Size:      1GB

Check nand flash controller v610. found
Special NAND id table Version 1.36
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!

MMC/SD controller initialization.
MMC/SD Card:
    MID:         0x15
    Read Block:  512 Bytes
    Write Block: 512 Bytes
    Chip Size:   3728M Bytes (High Capacity)
    Name:        "4FPD3"
    Chip Type:   MMC
    Version:     5.0
    Speed:       52000000Hz
    Bus Width:   8bit
    Boot Addr:   0 Bytes

Boot Env on eMMC
    Env Offset:          0x00100000
    Env Size:            0x00010000
    Env Range:           0x00010000
HI_OTP_LockIdWord,327: ID_WORD have already been locked


SDK Version: HiSTBAndroidV600R001C00SPC062_v2015091617

Security Begin Read RSA Key!
Secure boot is enabled
press the key!!
get key 0 2
get chipid =137980100
get chipType (HI3798MV100)
count=2
Press the IR remote!!
Press the IR remote!!
boot_select = kernel
Start TF-Card enable!!!skyworth board!!!
Start WIFI enable!!!skyworth board!!!
kernelbootargs:console=ttyAMA0,115200 blkdevparts=mmcblk0:1M(fastboot),1M(bootargs),10M(recovery),2M(deviceinfo),8M(baseparam),8M(pqparam),20M(logo),20M(logobak),40M(fastplay),40M(fastplaybak),40M(kernel),20M(misc),8M(userapi),8M(hibdrv),8M(qbflag),300M(qbdata),800M(system),1024M(userdata),500M(cache),8M(macid),64M(skparam),400M(skbackup),50M(private),-(sdcard) cohernet_pool=1M --hpmc
mac:72:F4:58:9C:02:1D

MMC read: dev # 0, block # 1, count 1 ... 1 blocks read: OK

738461 Bytes/s
RSA Module:
0xBD, 0xCA, 0x00, 0xF4, 0x0D, 0xA4, 0x04, 0xEF, 0xD8, 0x79, 0xB0, 0x7D, 0xBC, 0x3E, 0x54, 0x4E,
0xFF, 0x96, 0xBB, 0xA9, 0x71, 0x75, 0xAC, 0x4C, 0x35, 0xEB, 0x38, 0x89, 0x42, 0x41, 0x48, 0xE9,
0x58, 0x7A, 0xDF, 0x5B, 0x8D, 0x19, 0x45, 0xA7, 0x29, 0xB2, 0xD7, 0x3D, 0x35, 0x9A, 0xFC, 0xFD,
0xFE, 0x1D, 0x10, 0x5F, 0xA5, 0xE0, 0x33, 0xB2, 0xBB, 0x87, 0x1C, 0x81, 0x5E, 0x4C, 0x53, 0x93,
0x73, 0x05, 0x71, 0x96, 0x80, 0xEE, 0xA0, 0x68, 0x72, 0xE0, 0x64, 0x3A, 0xA7, 0x73, 0xBF, 0x31,
0x09, 0xDE, 0x95, 0x5E, 0xF2, 0x19, 0x25, 0xE1, 0x0A, 0x0A, 0x01, 0xD5, 0xFB, 0x94, 0x1F, 0x2A,
0x17, 0xFF, 0x2C, 0x55, 0x37, 0x7C, 0xB0, 0x7F, 0xAB, 0x33, 0xC2, 0x01, 0xA7, 0xB9, 0x49, 0x7F,
0xDD, 0xA6, 0x69, 0x1D, 0x7C, 0xF3, 0xCB, 0x6B, 0xD5, 0xEB, 0xCD, 0x02, 0xDE, 0xD9, 0x74, 0x4E,
0xB0, 0x1F, 0x2F, 0x47, 0xB5, 0x01, 0x5A, 0xFE, 0x6D, 0x15, 0xE7, 0xA7, 0x59, 0x90, 0x7D, 0x10,
0x84, 0xE6, 0x5F, 0x9D, 0x89, 0x7E, 0x79, 0x5A, 0x8D, 0x20, 0x24, 0x9C, 0x23, 0xD2, 0x67, 0x20,
0x68, 0x41, 0xAB, 0xAD, 0xC5, 0x2D, 0xCB, 0x47, 0x8B, 0xE6, 0xD9, 0x47, 0x65, 0xD3, 0x1E, 0xDB,
0xC6, 0x65, 0x9D, 0x96, 0x78, 0x01, 0x9D, 0x47, 0xE6, 0x1D, 0xA9, 0xD3, 0x34, 0xF6, 0xDC, 0xFD,
0x10, 0x88, 0x1C, 0x5E, 0x64, 0x43, 0xD8, 0xA5, 0x19, 0x6F, 0x9E, 0x0A, 0x6F, 0x35, 0x46, 0xBF,
0xE6, 0x52, 0x5E, 0x0C, 0x92, 0x6D, 0x3E, 0x3F, 0x6C, 0x82, 0x00, 0x05, 0xBE, 0x85, 0x98, 0x19,
0xA0, 0x4B, 0x83, 0x29, 0x55, 0x7E, 0xAB, 0x92, 0x23, 0x5A, 0x6F, 0x8F, 0x12, 0xFE, 0x7A, 0x25,
0xDF, 0x24, 0x58, 0xF9, 0xFE, 0x30, 0x5E, 0xB8, 0xF4, 0xB6, 0x43, 0xDD, 0x98, 0x42, 0xB8, 0x69,
RSA Exponent:
0x03, 0x00, 0x00, 0x00,

get extern rsa key success!
g_EnvFlashAddr:0x100000, g_EnvFlashPartionSize:0x100000
Open addr, enFlashType: 0x00000002
HI_CA_CommonVerify_BootPara,2213: Sign Header found!
HI_CA_CommonVerify_BootPara,2219: CRC32 check ok
HI_CA_CommonVerify_BootPara,2255: begin sha2, length:65536
HI_CA_CommonVerify_BootPara,2270: Sha check ok

u8MagicNumber:Hisilicon_ADVCA_ImgHead_MagicNum
u8Version:v1.0.0.3
u32CreateDay:0x0
u32CreateTime:0x0
u32HeadLength:0x384
u32SignedDataLength:65536:0x10000
u32IsYaffsImage:0
u32IsConfigNandBlock:1
u32NandBlockType:0
u32IsNeedEncrypt:0
u32IsEncrypted:0
u32HashType:1
u32CurrentsectionID:0
u32TotalsectionID:1
u32SectionSize:0
e9 ea 3f b3 42 ae 08 46 69 57 01 d7 d9 f0 ee 68 cf a0 77 52 f8 0a 2a ac c8 0e 1c c6 dc c0 6b 2b
u32SignatureLen:256
2d 03 61 7a 57 d4 4b 7a b1 83 30 13 c3 63 d4 92 70 27 d3 0e f1 46 6d c0 38 ad 2d ab d6 10 fc 43 ed 4d 61 68 bd 88 0c 92 9e 53 54 7e 9d 11 32 63 fc 4e 05 30 90 1a cf f3 ad a4 71 a0 2a d8 1e 69 10 dd 27 93 2b 1a 91 dd 20 51 14 00 db d0 d9 3e 66 21 3f 46 9f 75 25 bd 97 ff c3 6b ed d5 1c b6 ed f6 05 44 52 d0 b9 6b af 34 21 bd a5 f4 8d 20 f1 d8 62 da 80 92 be db 15 15 11 e7 7a 01 f6 ff 04 a9 dc 3b 4d 4e a3 b9 bb 10 b8 8b 7b 81 6a c8 aa 7e 0f 31 2c 60 b8 93 ea f4 3f 0e 19 08 1e 03 e1 70 f7 79 e0 33 5f d1 ae 06 76 28 8c 02 88 0a eb b1 96 62 d6 54 cd a5 92 91 e9 bf 08 43 ff cc b8 f9 f6 8d 67 39 c9 c0 b4 ca ec 8d ec 2f 88 ea 9b df ba c7 7c 73 86 af 4e d6 ba 49 cd 86 5d 36 18 3c 06 20 0a fd 20 f2 f4 e4 74 60 c8 13 ae 4d 8b 19 37 d3 d5 fe 47 7f 68 b0 b2 ec 83 27 1f 38
OrignalImagePath:/homesec/lijingchao/4G_code/sdk/kitkat/out/target/product/Hi3798MV100/Emmc/bootargs.bin
RSAPrivateKeyPath:/homesec/lijingchao/4G_code/sdk/kitkat/device/hisilicon/Hi3798MV100/security/extern_rsa_priv.txt
CRC32:f01d6735
HI_CA_CommonVerify_BootPara,2276: Check Authenitication is ok
CA_Common_VerifyBootParaByPartitionDebug,535: verify success
HI_CA_GetAuthMode,863: Common Signature!
HI_CA_GetAuthMode,863: Common Signature!
CA_Common_VerifyParseSignCommand,462: verify image:recovery, sign:recovery, offset:0x200000
CA_Common_Search_SignHeader,1734: PartitionSignName:recovery

Bootrom start
Boot from eMMC

Entry usb bootstrap

Bootrom start
Boot from eMMC

Entry usb bootstrap
No found fastboot.bin in host:1
No found fastboot.bin in host:2
Initializing DDR ... OK
Starting DDR training ... OK
Starting fastboot ...


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Compressed-boot v1.0.0
Uncompress........................Ok


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Fastboot 3.3.0 (wujiaxi@RD4TEAM) (Oct 14 2015 - 21:52:02)

Fastboot:      Version 3.3.0
Build Date:    Oct 14 2015, 21:52:48
CPU:           Hi3798Mv100 (CA)
Boot Media:    eMMC
DDR Size:      1GB

Check nand flash controller v610. found
Special NAND id table Version 1.36
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!

MMC/SD controller initialization.
MMC/SD Card:
    MID:         0x15
    Read Block:  512 Bytes
    Write Block: 512 Bytes
    Chip Size:   3728M Bytes (High Capacity)
    Name:        "4FPD3"
    Chip Type:   MMC
    Version:     5.0
    Speed:       52000000Hz
    Bus Width:   8bit
    Boot Addr:   0 Bytes

Bootrom start
回復 支持 反對

使用道具 舉報

15#
發(fā)表于 2017-12-9 23:57 | 只看該作者 | 來自湖南
樓主“2,所以從創(chuàng)維E900四川電信版本不帶usb3.0版本中,備份出fastboot,bootargs,recovery等前5個文件為im”能發(fā)一份給我嗎?719293401@qq.com
回復 支持 反對

使用道具 舉報

16#
發(fā)表于 2017-12-9 23:58 | 只看該作者 | 來自湖南
@benn_zhao
回復 支持 反對

使用道具 舉報

17#
發(fā)表于 2017-12-21 00:50 | 只看該作者 | 來自安徽
你好能給我一份 帶USB3.0版本 備份出fastboot,bootargs,recovery的嗎我的給我清空了也需要這些
回復 支持 反對

使用道具 舉報

18#
發(fā)表于 2018-2-18 17:54 | 只看該作者 | 來自重慶
同求不帶USB口的   5文件         有的發(fā)一份謝謝   1002238740@qq.com
回復 支持 反對

使用道具 舉報

19#
發(fā)表于 2018-3-1 11:40 | 只看該作者 | 來自廣東
有的話,也給我一份
回復 支持 反對

使用道具 舉報

20#
發(fā)表于 2018-3-1 11:59 | 只看該作者 | 來自廣東
benn_zhao 發(fā)表于 2017-4-11 19:31
多謝樓上,確實有讀U盤的動作,可能是我的文件不對,沒有成功,U盤的燈確實閃了幾下。

大家?guī)兔Γl手上有 ...

在嗎?
四川電信創(chuàng)維E900 我也跟你遇到問題,能把fastboot.img bootargs.img recovery.img deviceinfo.img baseparam.img pqparam.img 也給下我
回復 支持 反對

使用道具 舉報

您需要登錄后才可以回帖 登錄 | 立即注冊

本版積分規(guī)則

Archiver|新帖|標簽|軟件|Sitemap|ZNDS智能電視網(wǎng) ( 蘇ICP備2023012627號 )

網(wǎng)絡信息服務信用承諾書 | 增值電信業(yè)務經(jīng)營許可證:蘇B2-20221768 丨 蘇公網(wǎng)安備 32011402011373號

GMT+8, 2024-11-15 17:04 , Processed in 0.070292 second(s), 10 queries , Redis On.

Powered by Discuz!

監(jiān)督舉報:report#znds.com (請將#替換為@)

© 2007-2024 ZNDS.Com

快速回復 返回頂部 返回列表