綜合交流 / 評(píng)測 / 活動(dòng)區(qū)
交流區(qū) | 測硬件 | 網(wǎng)站活動(dòng) | Z幣中心
新手入門 / 進(jìn)階 / 社區(qū)互助
新手 | 你問我答 | 免費(fèi)刷機(jī)救磚 | ROM固件
![]() |
發(fā)布時(shí)間: 2020-10-1 13:55
正文摘要:注意:這機(jī)器的CPU為高安版本,所以不到萬不得已的情況下不要 擦除全部 也不要重新燒寫fastboot分區(qū)(第一個(gè)分區(qū))如果做了,有可能會(huì)出現(xiàn)無法燒寫fastboot的情況,切記 切記 切記 這是一個(gè) ... |
rinnng8 發(fā)表于 2020-10-30 18:33 可以回復(fù)出廠設(shè)置,閃退的原因是因?yàn)闄C(jī)器個(gè)別設(shè)置與我的系統(tǒng)不同,你可以先備份自己的全部分區(qū)后,除了三碼分區(qū)不要刷,其他分區(qū)刷成我的就可以了 |
樓主,刷好純潔系統(tǒng)可以恢復(fù)出廠設(shè)置么?電視家3打開就閃退,而且總出現(xiàn)有權(quán)查看使用情況的應(yīng)用窗口 |
sntemwong 發(fā)表于 2020-10-27 10:21 你要是解決了,麻煩也幫我解決一下。謝謝 |
libao 發(fā)表于 2020-10-26 20:49 我也在研究,可能行得通的方法,1找能解高安boot的軟件,解后查看內(nèi)部文件,或者提取內(nèi)核移植到其他機(jī)器 2試試找1002 1004 1006等同樣的機(jī)器的包來刷,3機(jī)器電路上一定有記錄一些信息的小儲(chǔ)存芯片,例如8腳的幾M的芯片,可以取下來后放編輯器上讀取信息 能力有限只能想到這么多,這東西要是到售后那邊估計(jì)也就是幾分鐘搞定的事 |
Tuning datastrobe[1,15],set[8],type[0] MMC/SD Card: MID: 0x15 Read Block: 512 Bytes Write Block: 512 Bytes Chip Size: 7456M Bytes (High Capacity) Name: "8GME4R" Chip Type: MMC Version: 5.1 Speed: 150000000Hz Mode: HS400 Voltage: 1.8V Bus Width: 8bit Boot Addr: 0 Bytes Boot Env on eMMC Env Offset: 0x00100000 Env Size: 0x00010000 Env Range: 0x00010000 SDK Version: HiSTBAndroidV600R002C00SPC031_v2016051915 Security Begin Read RSA CRC Key in USB disk! Security Read RSA CRC Key in USB disk failed, length is -1 mac:00:e4:00:57:e5:02 get chipid =37980200 get chipType (Hi3798CV200) count=2 get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop |
本帖最后由 libao 于 2020-10-27 09:41 編輯 樓主,我使用擦除全器件了,現(xiàn)在刷上系統(tǒng)后一直重啟。Tuning datastrobe[1,15],set[8],type[0] MMC/SD Card: MID: 0x15 Read Block: 512 Bytes Write Block: 512 Bytes Chip Size: 7456M Bytes (High Capacity) Name: "8GME4R" Chip Type: MMC Version: 5.1 Speed: 150000000Hz Mode: HS400 Voltage: 1.8V Bus Width: 8bit Boot Addr: 0 Bytes Boot Env on eMMC Env Offset: 0x00100000 Env Size: 0x00010000 Env Range: 0x00010000 SDK Version: HiSTBAndroidV600R002C00SPC031_v2016051915 Security Begin Read RSA CRC Key in USB disk! Security Read RSA CRC Key in USB disk failed, length is -1 mac:00:e4:00:57:e5:02 get chipid =37980200 get chipType (Hi3798CV200) count=2 get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop get rc key fail, continue next loop check_rckey_recovery->keyUpdateCount:0, keyClearCount:0, keyEnterFactoryCount:0, keyEnterRecovery:0, keyBurnCount:0, responseType:0 boot_select_result:kernel g_EnvFlashAddr:0x100000, g_EnvFlashPartionSize:0x10000 CA_flash_open_addr,334: Open addr, enFlashType: 0x00000002 CA_flash_open_addr,334: Open addr, enFlashType: 0x00000002 HI_CA_Verify_BootPara,412: Check BootPara authenitication is ok CA_CMD_VerifyBootParaByPartName,50: verify success CA_CMD_AdvcaAuthByPartName,78: advca_verify: kernel pstImgInfo->length = 0x2e656c75 Attempt to write outside the flash handle area, flash handle size: 0x02800000, o ffset: 0x00000000, length: 0x2e656c00 CA_flash_read,248: HI_Flash_Read partion kernel error HI_CA_AdvcaVerifyByPartName,433: run CA_flash_read((HI_CHAR*)pPartionName,0ULL,( ImgInfo.length+CH_NOVEL_HEAD_LEN),(HI_U8*)u32RamAddr, HI_NULL) failed, ERRNO:0xf fffffff. CA_CMD_AdvcaAuthByPartName,79: run HI_CA_AdvcaVerifyByPartName((HI_U8*)argv[1], u32RamAddr, NULL) failed, ERRNO:0xffffffff. HI_Android_Authenticate,592: Fail to verify kernel! resetting ... System startup Relocate Boot Jump to C code |
我全部擦除了,現(xiàn)在該咋辦呢 |
凄凄切切群群群群群群群群群群群群 |
rinnng8 發(fā)表于 2020-10-23 15:48 要不要無所謂,一起拷貝也行 |
Archiver|新帖|標(biāo)簽|軟件|Sitemap|ZNDS智能電視網(wǎng) ( 蘇ICP備2023012627號(hào) )
網(wǎng)絡(luò)信息服務(wù)信用承諾書 | 增值電信業(yè)務(wù)經(jīng)營許可證:蘇B2-20221768 丨 蘇公網(wǎng)安備 32011402011373號(hào)
GMT+8, 2025-8-12 01:43 , Processed in 0.052999 second(s), 12 queries , Redis On.