找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 1207|回复: 4

xdr6088升级1.25后如何刷第三方uboot,已链接ttl。

[复制链接]
发表于 2024-2-5 18:30 | 显示全部楼层 |阅读模式
升级1.25,继续升级了1.26,又想刷回openwrt了。正好有ch304g,短接5v,也拆开连上了,securtCRT也连接成功了,现在问题是怎么好像进不去uboot呢。

  1. rtl8221 reset pull down by gpio13
  2. rtl8221 reset pull down by gpio17
  3. NOTICE:  EMI: Using DDR3 settings
  4. NOTICE:  EMI: Detected DRAM size: 512MB
  5. NOTICE:  EMI: complex R/W mem test passed
  6. NOTICE:  SPI_NAND parses attributes from parameter page.
  7. NOTICE:  SPI_NAND Detected ID 0x35
  8. NOTICE:  Page size 2048, Block size 131072, size 134217728
  9. NOTICE:  BL2: Booting BL31
  10. NOTICE:  BL31: v2.6(release):220705_xdr6088mtv1-canoe_r17-dirty
  11. NOTICE:  BL31: Built : 07:05:56, Jul  4 2022


  12. U-Boot 2022.04-rc1 (Jul 04 2022 - 07:05:56 +0000)

  13. CPU:   MediaTek MT7986
  14. Model: mt7986-rfb
  15. DRAM:  512 MiB
  16. Core:  42 devices, 15 uclasses, devicetree: embed
  17. MMC:   mmc@11230000: 0
  18. Loading Environment from MTD... spi-nand: spi_nand spi_nand@1: GigaDevice SPI NAND was found.
  19. spi-nand: spi_nand spi_nand@1: 128 MiB, block size: 128 KiB, page size: 2048, OOB size: 64
  20. *** Warning - bad CRC, using default environment

  21. In:    serial@11002000
  22. Out:   serial@11002000
  23. Err:   serial@11002000

  24. 'spi-nand0' is now active device
  25. Reading from 0x4c0000 to 0x4c00cf, size 0xd0 ...
  26. Succeeded
  27. verifying  partition...
  28. Reading from 0x3c0000 to 0x3fffff, size 0x40000 ...
  29. Succeeded
  30. ok
  31. verifying  partition...
  32. Reading from 0x520000 to 0xb9ffff, size 0x680000 ...
  33. \B\B\B\B\B
  34. F0: 102B 0000
  35. FA: 1040 0000
  36. FA: 1040 0000 [0200]
  37. F9: 0000 0000
  38. V0: 0000 0000 [0001]
  39. 00: 0000 0000
  40. BP: 2400 0041 [0000]
  41. G0: 1190 0000
  42. EC: 0000 0000 [1000]
  43. T0: 0000 0142 [010F]
  44. Jump to BL

  45. NOTICE:  BL2: v2.6(release):220705_xdr6088mtv1-canoe_r17-dirty
  46. NOTICE:  BL2: Built : 07:05:56, Jul  4 2022
  47. NOTICE:  WDT: disabled
  48. rtl8221 reset pull down by gpio13
  49. rtl8221 reset pull down by gpio17
  50. NOTICE:  EMI: Using DDR3 settings
  51. NOTICE:  EMI: Detected DRAM size: 512MB
  52. NOTICE:  EMI: complex R/W mem test passed
  53. NOTICE:  SPI_NAND parses attributes from parameter page.
  54. NOTICE:  SPI_NAND Detected ID 0x35
  55. NOTICE:  Page size 2048, Block size 131072, size 134217728
  56. NOTICE:  BL2: Booting BL31
  57. NOTICE:  BL31: v2.6(release):220705_xdr6088mtv1-canoe_r17-dirty
  58. NOTICE:  BL31: Built : 07:05:56, Jul  4 2022


  59. U-Boot 2022.04-rc1 (Jul 04 2022 - 07:05:56 +0000)

  60. CPU:   MediaTek MT7986
  61. Model: mt7986-rfb
  62. DRAM:  512 MiB
  63. Core:  42 devices, 15 uclasses, devicetree: embed
  64. MMC:   mmc@11230000: 0
  65. Loading Environment from MTD... spi-nand: spi_nand spi_nand@1: GigaDevice SPI NAND was found.
  66. spi-nand: spi_nand spi_nand@1: 128 MiB, block size: 128 KiB, page size: 2048, OOB size: 64
  67. *** Warning - bad CRC, using default environment

  68. In:    serial@11002000
  69. Out:   serial@11002000
  70. Err:   serial@11002000

  71. 'spi-nand0' is now active device
  72. Reading from 0x4c0000 to 0x4c00cf, size 0xd0 ...
  73. Succeeded
  74. verifying  partition...
  75. Reading from 0x3c0000 to 0x3fffff, size 0x40000 ...
  76. Succeeded
  77. ok
  78. verifying  partition...
  79. Reading from 0x520000 to 0xb9ffff, size 0x680000 ...
  80. Succeeded
  81. Reading from 0xc60000 to 0x445ffff, size 0x3800000 ...
  82. Succeeded
  83. ok
  84. Reading from 0x4c0000 to 0x4dffff, size 0x20000 ...
  85. Succeeded
  86. Reading from 0x3c0000 to 0x3fffff, size 0x40000 ...
  87. Succeeded
  88. boot image at 41000000

  89. U-Boot 2022.04-rc1 (Sep 01 2023 - 01:42:31 +0000)

  90. CPU:   MediaTek MT7986
  91. Model: mt7986-rfb
  92. DRAM:  512 MiB
  93. Core:  42 devices, 15 uclasses, devicetree: embed
  94. MMC:   mmc@11230000: 0
  95. Loading Environment from MTD... spi-nand: spi_nand spi_nand@1: GigaDevice SPI NAND was found.
  96. spi-nand: spi_nand spi_nand@1: 128 MiB, block size: 128 KiB, page size: 2048, OOB size: 64
  97. *** Warning - bad CRC, using default environment

  98. In:    serial@11002000
  99. Out:   serial@11002000
  100. Err:   serial@11002000
  101. 'spi-nand0' is now active device
  102. Reading from 0x4c0000 to 0x4dffff, size 0x20000 ...
  103. Succeeded
  104. Reading from 0x520000 to 0xc1ffff, size 0x700000 ...
  105. Succeeded
  106. ## Loading kernel from FIT Image at 46000000 ...
  107.    Using 'config-1' configuration
  108.    Trying 'kernel-1' kernel subimage
  109.      Description:  ARM64 OpenWrt Linux-5.4.168
  110.      Type:         Kernel Image
  111.      Compression:  lzma compressed
  112.      Data Start:   0x460000e8
  113.      Data Size:    4447225 Bytes = 4.2 MiB
  114.      Architecture: AArch64
  115.      OS:           Linux
  116.      Load Address: 0x44080000
  117.      Entry Point:  0x44080000
  118.      Hash algo:    crc32
  119.      Hash value:   e1d1f8cd
  120.      Hash algo:    sha1
  121.      Hash value:   c1adc9e62009789260214ae30e8d49ea130a1b23
  122. ## Loading fdt from FIT Image at 46000000 ...
  123.    Using 'config-1' configuration
  124.    Trying 'fdt-1' fdt subimage
  125.      Description:  ARM64 OpenWrt xdr6088mtv1-canoe device tree blob
  126.      Type:         Flat Device Tree
  127.      Compression:  uncompressed
  128.      Data Start:   0x4643de28
  129.      Data Size:    21160 Bytes = 20.7 KiB
  130.      Architecture: AArch64
  131.      Hash algo:    crc32
  132.      Hash value:   84ef023b
  133.      Hash algo:    sha1
  134.      Hash value:   707dca22fb85c0f7de179ddae4c73968f9b5c2ef
  135.    Booting using the fdt blob at 0x4643de28
  136.    Uncompressing Kernel Image
  137.    Loading Device Tree to 000000005f7f0000, end 000000005f7f82a7 ... OK

  138. Starting kernel ...

复制代码
等一会就看到mt7986的登录界面了,用户输入admin直接不行,输入root让我输入密码,我也不知道是什么试了root也不行。
我看另一个红米ax6000的教程让按上/下键在开机我也按了,好像都是直接进去系统了,没有停留在uboot。

有大佬说怎么办嘛
发表于 2024-2-5 20:06 | 显示全部楼层
之前xwrt你是怎么整上的

点评

没升级系统,也就是1.24可以通过反弹shell的漏洞刷机,1.25升级说了修复了  详情 回复 发表于 2024-2-5 22:11
回复 支持 反对

使用道具 举报

 楼主| 发表于 2024-2-5 22:11 | 显示全部楼层
1562004423 发表于 2024-2-5 20:06
之前xwrt你是怎么整上的

没升级系统,也就是1.24可以通过反弹shell的漏洞刷机,1.25升级说了修复了
回复 支持 反对

使用道具 举报

发表于 2024-2-19 09:54 | 显示全部楼层
大佬 请问刷openwrt能装docker吗

点评

不知道,没注意有没有  详情 回复 发表于 2024-2-25 15:15
回复 支持 反对

使用道具 举报

 楼主| 发表于 2024-2-25 15:15 来自手机 | 显示全部楼层
aruisi888 发表于 2024-2-19 09:54
大佬 请问刷openwrt能装docker吗

不知道,没注意有没有
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-6-12 07:13

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com

快速回复 返回顶部 返回列表