plz help me i'm newbi

tayeb_am

Inactive User
Joined
Jan 19, 2011
Messages
12
Reaction score
0
i have rieciever with this hardware info


--------------------------------------------------------------------
-- Generic Primary Bootloader 0.1-3847, NI (04:13:33, Feb 17 2009)
-- Andre McCurdy, NXP Semiconductors
--------------------------------------------------------------------
Device: PNX8335 M1
Secure boot: disabled, keysel: 0, vid: 0 (expecting 2)
Poly10: 0x00000000
RNG: enabled
RSA keyhide: enabled
UID: 0000000000000000
AES key: 00000000000000000000000000000000
KC status: 0x00000000
Flash config: 7 (omni: 8bit NAND), timing: 0x0C
CPU clock: 320 MHz
SIF0: 512 cols x 8192 rows: 64 MBytes
SIF1: 512 cols x 8192 rows: 64 MBytes
DRAM: 200 MHz, 2 x 64 MBytes: 128 MBytes
NAND: RDY polling disabled
NAND: (AD76) Hynix SLC, pagesize 512, blocksize 16k, 64 MBytes
NAND 0x00020000: valid header
NAND 0x00020000: valid image
aboot exec time: 268521 uSec


U-Boot 1.2.0.0428_a (Secondary Bootloader) (Aug 24 2010 - 11:14:28)

CPU: PNX????
Secure boot: disabled
DRAM: 128 MB
NAND: nCS0 (force asserted legacy mode)
NAND: Hynix 64MiB 3,3V 8-bit
Net: ip3902
Board Opts: EthOsc HDMI PAL
Splash: done
u-boot startup time so far: 1114 msec
Hit any key to stop autoboot-----: 1 0
Boot mode is :

Loading from 64MiB 3,3V 8-bit, offset 0x1020000
Automatic boot of image at addr 0x80800000 ...
## Booting image at 80800100 ...
Image Name: Linux Kernel Image
Image Type: MIPS Linux Kernel Image (gzip compressed)
Data Size: 1704621 Bytes = 1.6 MB
Load Address: 80001000
Entry Point: 802e30f0
Verifying Checksum ... OK
Uncompressing Kernel Image ... OK

Starting kernel ...


can i flash it with tm image


thnx
 
no bro, its another brand but it has the same hardware, i(m looking for jtag connection interface if u can help, or software that can change uboot to upload the image of tm800 and test it

thnx for reply
 
no bro, its another brand but it has the same hardware, i(m looking for jtag connection interface if u can help, or software that can change uboot to upload the image of tm800 and test it

thnx for reply

hi m8

compare to this one its very similar to yours

Device: PNX8335 M1
Secure boot: disabled, keysel: 0, vid: 0 (expecting 2)
Poly10: 0x00000000
RNG: enabled
RSA keyhide: enabled
UID: 0000000000000000
AES ***: 00000000000000000000000000000000
KC status: 0x00000000
Flash config: 7 (omni: 8bit NAND), timing: 0x0C
CPU clock: 320 MHz
SIF0: 1024 cols x 8192 rows: 128 MBytes
SIF1: 1024 cols x 8192 rows: 128 MBytes
DRAM: 200 MHz, 2 x 128 MBytes: 256 MBytes
NAND: ST SLC, pagesize 512, blocksize 16k, 64 MBytes
NAND 0x00020000: valid header
NAND 0x00020000: valid image
aboot exec time: 172154 uSec


U-Boot 1.2.0.dev (Secondary Bootloader) (Apr 14 2010 - 03:13:41)

CPU: PNX????
Secure boot: disabled
DRAM: 256 MB
## Unknown FLASH on Bank 1 - Size = 0x00000000 = 0 MB
NOR: 0 kB
NAND: nCS0 (force asserted legacy mode)
NAND: ST Micro 64MiB 3,3V 8-bit
NAND 0x004b0000: bad block
NAND 0x00d24000: bad block
NAND 0x03758000: bad block
NAND 0x03c58000: bad block
Using default environment

Net: ip3902
Board Opts: EthOsc HDMI PAL
Splash: done
u-boot startup time so far: 611 msec
Hit any *** to stop autoboot: 0

TM800 nand# erase
Usage:
erase - erase FLASH memory



TM800 nand# loady
## Ready for binary (ymodem) download to 0x80800000 at 115200 bps...
CCxyzModem - CRC mode, 3(SOH)/58628(STX)/0(CAN) packets, 4 retries
## Total Size = 0x03941040 = 60035136 Bytes

TM800 nand#Reboot

--------------------------------------------------------------------
-- STB225 Primary Bootloader dev, NI (21:17:47, Apr 16 2010)
-- Andre McCurdy, NXP Semiconductors
--------------------------------------------------------------------
Device: PNX8335 M1
Secure boot: disabled, keysel: 0, vid: 0 (expecting 2)
Poly10: 0x00000000
RNG: enabled
RSA keyhide: enabled
UID: 0000000000000000
AES ***: 00000000000000000000000000000000
KC status: 0x00000000
Flash config: 7 (omni: 8bit NAND), timing: 0x0C
CPU clock: 320 MHz
SIF0: 1024 cols x 8192 rows: 128 MBytes
SIF1: 1024 cols x 8192 rows: 128 MBytes
DRAM: 200 MHz, 2 x 128 MBytes: 256 MBytes
NAND: ST SLC, pagesize 512, blocksize 16k, 64 MBytes
NAND 0x00020000: valid header
NAND 0x00020000: valid image
aboot exec time: 172146 uSec


U-Boot 1.2.0.dev (Secondary Bootloader) (Apr 14 2010 - 03:13:41)

CPU: PNX????
Secure boot: disabled
DRAM: 256 MB
## Unknown FLASH on Bank 1 - Size = 0x00000000 = 0 MB
NOR: 0 kB
NAND: nCS0 (force asserted legacy mode)
NAND: ST Micro 64MiB 3,3V 8-bit
NAND 0x004b0000: bad block
NAND 0x00d24000: bad block
NAND 0x03758000: bad block
NAND 0x03c58000: bad block
Using default environment

Net: ip3902
Board Opts: EthOsc HDMI PAL
Splash: done
u-boot startup time so far: 611 msec
Hit any *** to stop autoboot: 0

Loading from 64MiB 3,3V 8-bit, offset 0x1a0000
Automatic boot of image at addr 0x80800000 ...
## Booting image at 80800000 ...
Image Name: Linux Kernel Image
Image Type: MIPS Linux Kernel Image (gzip compressed)
Data Size: 1570274 Bytes = 1.5 MB
Load Address: 80001000
Entry Point: 802a9b40
Verifying Checksum ... OK
Uncompressing Kernel Image ... OK
 
Hi mate would be good to know who makes the box as maybe the image could be dumped and used on the tm800hd fir testing etc
 
What brand is it ?
Who would clone a box where the software is incomplete ?
 
i have rieciever with this hardware info


--------------------------------------------------------------------
-- Generic Primary Bootloader 0.1-3847, NI (04:13:33, Feb 17 2009)
-- Andre McCurdy, NXP Semiconductors
--------------------------------------------------------------------
Device: PNX8335 M1
Secure boot: disabled, keysel: 0, vid: 0 (expecting 2)
Poly10: 0x00000000
RNG: enabled
RSA keyhide: enabled
UID: 0000000000000000
AES key: 00000000000000000000000000000000
KC status: 0x00000000
Flash config: 7 (omni: 8bit NAND), timing: 0x0C
CPU clock: 320 MHz
SIF0: 512 cols x 8192 rows: 64 MBytes
SIF1: 512 cols x 8192 rows: 64 MBytes
DRAM: 200 MHz, 2 x 64 MBytes: 128 MBytes
NAND: RDY polling disabled
NAND: (AD76) Hynix SLC, pagesize 512, blocksize 16k, 64 MBytes
NAND 0x00020000: valid header
NAND 0x00020000: valid image
aboot exec time: 268521 uSec


U-Boot 1.2.0.0428_a (Secondary Bootloader) (Aug 24 2010 - 11:14:28)

CPU: PNX????
Secure boot: disabled
DRAM: 128 MB
NAND: nCS0 (force asserted legacy mode)
NAND: Hynix 64MiB 3,3V 8-bit
Net: ip3902
Board Opts: EthOsc HDMI PAL
Splash: done
u-boot startup time so far: 1114 msec
Hit any key to stop autoboot-----: 1 0
Boot mode is :

Loading from 64MiB 3,3V 8-bit, offset 0x1020000
Automatic boot of image at addr 0x80800000 ...
## Booting image at 80800100 ...
Image Name: Linux Kernel Image
Image Type: MIPS Linux Kernel Image (gzip compressed)
Data Size: 1704621 Bytes = 1.6 MB
Load Address: 80001000
Entry Point: 802e30f0
Verifying Checksum ... OK
Uncompressing Kernel Image ... OK

Starting kernel ...


can i flash it with tm image


thnx

is it gigablue stb ?
 
This is Gigablue HD 800 solo

Description:

PVR ready (via USB) digital/HDTV satellite receiver with 1 smartcard reader and 1 Common Interface slot. Linux based operating system, Broadcom MIPS processor, and Ethernet port are featured.


- MPEG-2 / MPEG-4 Part 10 / H.264
- Video format PAL / NTSC
- 480p/576p/720p/1080i
- Video Output: RGB, CVBS, YPbPr
- 1 x CI Slot
- Smartcard Reader
- USB PVR Ready Media Player
- Electronic Program Guide (EPG)
- Parental control
- Timer and timeshift functions like editing
- Create favorites, move channels, search, rename, delete, sort, automatic background scan for new channels
- Easy software update via the USB port
- Component connection, video and audio scart
- HDMI 1.2 support
- HDCP 1.1
10/100 Mbps Ethernet LAN Base Support
- USB 2.0
- Digital Audio AC-3 SPDIF
- DiSEqC 1.0/1.2 & USALS
 
its brand in algeria, when i use terminal i cant stop its autoboot mode

Hit any key to stop autoboot-----: 1 0
Boot mode is :

Loading from 64MiB 3,3V 8-bit, offset 0x1020000
Automatic boot of image at addr 0x80800000 ...
## Booting image at 80800100 ...
Image Name: Linux Kernel Image
Image Type: MIPS Linux Kernel Image (gzip compressed)
Data Size: 1704621 Bytes = 1.6 MB
Load Address: 80001000
Entry Point: 802e30f0
Verifying Checksum ... OK
Uncompressing Kernel Image ... OK

Starting kernel ...


so any idea how to change its uboot or to test tm800hd image, i use this reciver for testing so any one has solution can post it here
 
can you extract the imag efrom the receiver and post it m8?
 
cheers m8, it dont flash onto a TM800, i tried lol

its also half the size (ish) of a tm800 image
 
ok, thanx for test, but can i load image of tm800 on my reciver? if yes how
 
i succed to get it in terminal mode

STB225v1 nand# help
? - alias for 'help'
askenv - get environment variables from stdin
base - print or set address offset
bdinfo - print Board Info structure
boot - boot default, i.e., run 'bootcmd'
boota - find, verify and boot signed kernel image
bootd - boot default, i.e., run 'bootcmd'
bootm - boot application image from memory
bootp - boot image via network using BootP/TFTP protocol
chpart - change active partition
clearenv- erase environment variables persistent storage
cmp - memory compare
cp - memory copy
crc32 - checksum calculation
echo - echo args to console
exit - exit script
go - start application at address 'addr'
help - print online help
iminfo - print header information for application image
itest - return true/false on integer compare
loadb - load binary file over serial line (kermit mode)
loady - load binary file over serial line (ymodem mode)
loop - infinite loop on address range
md - memory display
mii - MII utility commands
mm - memory modify (auto-incrementing)
mtdparts- define flash/nand partitions
mtest - simple RAM test
mw - memory write (fill)
nand - NAND sub-system
nboot - boot from NAND device
nm - memory modify (constant address)
printenv- print environment variables
rarpboot- boot image via network using RARP/TFTP protocol
reboot - Perform RESET of the CPU
reset - Perform RESET of the CPU
run - run commands in an environment variable
saveenv - save environment variables to persistent storage
setenv - set environment variables
sha1 - sha1 hash calculation
sleep - delay execution for some time
splash - init splash screen
st_aes - run AES selftest
st_ai - run aimage selftest
st_ecc - run NAND ECC selftest benchmark
st_miu - dump MIU timing
st_sha1 - run sha1 selftest
test - minimal test like /bin/sh
tftpboot- boot image via network using TFTP protocol
version - print monitor version

here is some infos

addipaddr=setenv ipaddr 192.168.0.7${boardnum}
addethaddr=setenv ethaddr 00:13:8f:8e:c3:81
boardnum}
serverip=192.168.0.243
gatewayip=192.168.0.1
netmask=255.255.255.0
hostname=stb
addrootpath=setenv rootpath /home/${username}/nfsroot/rootfs_stb225
ethport=eth0
addnfs=setenv bootargs ${bootargs} root=/dev/nfs rw nfsroot=${serverip}:${rootpath},tcp
addip=setenv bootargs ${bootargs} ip=${ipaddr}:${serverip}::::${ethport}
adddhcp=setenv bootargs ${bootargs} ip=dhcp
addbootfile=setenv bootfile uImage_${username}
addfs1=setenv bootargs ${bootargs} root=/dev/mtdblock_robbs7 ro rootfstype=cramfs
addfs2=setenv bootargs ${bootargs} root=/dev/mtdblock_robbs4 ro rootfstype=cramfs
bootmech1=nboot.jffs2 80800000 0 1020000
bootmech2=nboot.jffs2 80800000 0 1A0000
mtdids=nand0=gen_nand
setargs=setenv bootargs ${mtdparts} ${xargs} ip3902.mac_address=${ethaddr}
mtdparts=mtdparts=gen_nand:128k(B0),1M(B1),512k(Env),2M(K0),12M(F0),512k(U0),3M(K1),33M(F1),3M(U1),7M(U2)
autostart=yes
printmenu=echo "Select your bootmode:";run printmenu1;run printmenu2;run printmenu3;run printmenu4; echo " "
printmenu1=echo "1 : Load kernel from Flash and FS from NFS"
printmenu2=echo "2 : Load kernel from Flash and FS from Flash"
printmenu3=echo "3 : Load kernel from NFS and FS from NFS"
printmenu4=echo "4 : Failsafe from secondary flash image"
bootmode1=run addipaddr; run addethaddr; run setargs; run addip; run addrootpath; run addnfs; run bootmech
bootmode2=run addipaddr; run addethaddr; run setargs; run addip; run addfs1; run bootmech1
bootmode3=run addipaddr; run addethaddr; run setargs; run addip; run addrootpath; run addnfs; run addbootfile;tftpboot
bootmode4=run setargs; run addfs2; run bootmech2
askmenu=run printmenu; askenv bootchoice
menu=run askmenu; saveenv;
bootcmd=echo "Boot mode is :"; run bootmode${bootchoice}
boardnum=0
username=xuwenju
ethact=ip3902
bootchoice=2
stdin=serial
stdout=serial
stderr=serial
partition=nand0,0
mtddevnum=0
mtddevname=B0

Environment size: 1958/131068 bytes
STB225v1 nand# saveenv
Saving Environment to NAND...
Erasing Nand...Writing to Nand...

Writing data at 0x00123200 -- 10% complete
Writing data at 0x00126600 -- 20% complete
Writing data at 0x00129800 -- 30% complete
Writing data at 0x0012cc00 -- 40% complete
Writing data at 0x0012fe00 -- 50% complete
Writing data at 0x00133200 -- 60% complete
Writing data at 0x00136600 -- 70% complete
Writing data at 0x00139800 -- 80% complete
Writing data at 0x0013cc00 -- 90% complete
Writing data at 0x0013fe00 -- 100% complete
done

STB225v1 nand# go
Usage:
go - start application at address 'addr'


STB225v1 nand# setenv
Usage:
setenv - set environment variables


STB225v1 nand# st_aes
--------------------------------------------------------------------
-- AES ECB encryption
--------------------------------------------------------------------
ecb_e_key: c9 8d 5f b6 3b 68 c0 27 e8 83 17 d8 23 3c 5b 9d
ecb_e_pt : 0a c1 5a 9a fb b2 4d 54 ad 99 e9 87 20 82 72 e2
ecb_e_ct : a3 d4 3b ff a6 5d 0e 80 09 2f 67 a3 14 85 78 70 <- pass

--------------------------------------------------------------------
-- AES ECB decryption
--------------------------------------------------------------------
ecb_d_key: a7 bc 3b d0 ea bd 9e ba 98 1e 23 e6 ff c9 c9 c2
ecb_d_ct : e3 fd 51 12 3b 48 a2 e2 ab 1d b2 98 94 20 22 22
ecb_d_pt : 87 7b 88 a7 7a ef 04 f0 55 46 53 9e 17 25 9f 53 <- pass

--------------------------------------------------------------------
-- AES CBC encryption
--------------------------------------------------------------------
cbc_e_key: 93 28 67 64 a8 51 46 73 0e 64 18 88 db 34 eb 47
cbc_e_iv : 19 2d 9b 3a a1 0b b2 f7 84 6c cb a0 08 5c 65 7a <- initial
cbc_e_iv : 40 d8 da f6 d1 fd a0 a0 73 b3 bd 18 b7 69 5d 2e <- final
cbc_e_pt : 98 3b f6 f5 a6 df bc da a1 93 70 66 6e 83 a9 9a
cbc_e_ct : 40 d8 da f6 d1 fd a0 a0 73 b3 bd 18 b7 69 5d 2e <- pass

--------------------------------------------------------------------
-- AES CBC decryption
--------------------------------------------------------------------
cbc_d_key: 0f fd 18 77 85 0d 3b 2c c2 d3 0c dc 99 02 86 c6
cbc_d_iv : dd 74 bb 1a c6 f0 f8 66 c7 99 2c 61 f5 9d 55 94 <- initial
cbc_d_iv : 37 95 c8 81 34 f7 c0 11 43 33 97 d1 44 3f eb 3a <- final
cbc_d_ct : f5 37 2f 97 35 c5 68 5f 1d a3 62 af 6e cb 29 40
cbc_d_pt : 54 96 a4 c2 9c 76 70 f6 1b 5d 5d f6 18 1f 59 47 <- pass

--------------------------------------------------------------------
-- AES ECB decryption, KC bypass key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB encryption, KC bypass key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB decryption, KC 2 level generated key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB encryption, KC 2 level generated key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB decryption, KC 3 level generated key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB encryption, KC 3 level generated key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB performance
--------------------------------------------------------------------
Encrypt DRAM: 1048576 bytes in 216775 usec (4723 kbps)
Decrypt DRAM: 1048576 bytes in 216774 usec (4723 kbps)

--------------------------------------------------------------------
-- AES CBC performance
--------------------------------------------------------------------
Encrypt DRAM: 1048576 bytes in 295398 usec (3466 kbps)
Decrypt DRAM: 1048576 bytes in 318348 usec (3216 kbps)


STB225v1 nand# st_sha1
abc (aligned)
Actual : A9993E364706816ABA3E25717850C26C9CD0D89D
Expected: A9993E364706816ABA3E25717850C26C9CD0D89D

abc (mis-aligned)
Actual : A9993E364706816ABA3E25717850C26C9CD0D89D
Expected: A9993E364706816ABA3E25717850C26C9CD0D89D

abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
Actual : 84983E441C3BD26EBAAE4AA1F95129E5E54670F1
Expected: 84983E441C3BD26EBAAE4AA1F95129E5E54670F1

A million repetitions of "a"
Actual : 34AA973CD4C4DAA4F61EEB2BDBAD27316534016F
Expected: 34AA973CD4C4DAA4F61EEB2BDBAD27316534016F

Lots of misaligned input data...
Actual : 1966198757BF74D485DF596320B76E8FEE9F526E
Expected: 1966198757BF74D485DF596320B76E8FEE9F526E

sha1sum 0x80000000..0x807fffff: d1f76f6261b106e3c4ba4afa575a99af65a11de5 (8388608 bytes, 15072 kbps)


waiting your commments

thnx
 
i succed to get it in terminal mode

STB225v1 nand# help
? - alias for 'help'
askenv - get environment variables from stdin
base - print or set address offset
bdinfo - print Board Info structure
boot - boot default, i.e., run 'bootcmd'
boota - find, verify and boot signed kernel image
bootd - boot default, i.e., run 'bootcmd'
bootm - boot application image from memory
bootp - boot image via network using BootP/TFTP protocol
chpart - change active partition
clearenv- erase environment variables persistent storage
cmp - memory compare
cp - memory copy
crc32 - checksum calculation
echo - echo args to console
exit - exit script
go - start application at address 'addr'
help - print online help
iminfo - print header information for application image
itest - return true/false on integer compare
loadb - load binary file over serial line (kermit mode)
loady - load binary file over serial line (ymodem mode)
loop - infinite loop on address range
md - memory display
mii - MII utility commands
mm - memory modify (auto-incrementing)
mtdparts- define flash/nand partitions
mtest - simple RAM test
mw - memory write (fill)
nand - NAND sub-system
nboot - boot from NAND device
nm - memory modify (constant address)
printenv- print environment variables
rarpboot- boot image via network using RARP/TFTP protocol
reboot - Perform RESET of the CPU
reset - Perform RESET of the CPU
run - run commands in an environment variable
saveenv - save environment variables to persistent storage
setenv - set environment variables
sha1 - sha1 hash calculation
sleep - delay execution for some time
splash - init splash screen
st_aes - run AES selftest
st_ai - run aimage selftest
st_ecc - run NAND ECC selftest benchmark
st_miu - dump MIU timing
st_sha1 - run sha1 selftest
test - minimal test like /bin/sh
tftpboot- boot image via network using TFTP protocol
version - print monitor version

here is some infos

addipaddr=setenv ipaddr 192.168.0.7${boardnum}
addethaddr=setenv ethaddr 00:13:8f:8e:c3:81
boardnum}
serverip=192.168.0.243
gatewayip=192.168.0.1
netmask=255.255.255.0
hostname=stb
addrootpath=setenv rootpath /home/${username}/nfsroot/rootfs_stb225
ethport=eth0
addnfs=setenv bootargs ${bootargs} root=/dev/nfs rw nfsroot=${serverip}:${rootpath},tcp
addip=setenv bootargs ${bootargs} ip=${ipaddr}:${serverip}::::${ethport}
adddhcp=setenv bootargs ${bootargs} ip=dhcp
addbootfile=setenv bootfile uImage_${username}
addfs1=setenv bootargs ${bootargs} root=/dev/mtdblock_robbs7 ro rootfstype=cramfs
addfs2=setenv bootargs ${bootargs} root=/dev/mtdblock_robbs4 ro rootfstype=cramfs
bootmech1=nboot.jffs2 80800000 0 1020000
bootmech2=nboot.jffs2 80800000 0 1A0000
mtdids=nand0=gen_nand
setargs=setenv bootargs ${mtdparts} ${xargs} ip3902.mac_address=${ethaddr}
mtdparts=mtdparts=gen_nand:128k(B0),1M(B1),512k(Env),2M(K0),12M(F0),512k(U0),3M(K1),33M(F1),3M(U1),7M(U2)
autostart=yes
printmenu=echo "Select your bootmode:";run printmenu1;run printmenu2;run printmenu3;run printmenu4; echo " "
printmenu1=echo "1 : Load kernel from Flash and FS from NFS"
printmenu2=echo "2 : Load kernel from Flash and FS from Flash"
printmenu3=echo "3 : Load kernel from NFS and FS from NFS"
printmenu4=echo "4 : Failsafe from secondary flash image"
bootmode1=run addipaddr; run addethaddr; run setargs; run addip; run addrootpath; run addnfs; run bootmech
bootmode2=run addipaddr; run addethaddr; run setargs; run addip; run addfs1; run bootmech1
bootmode3=run addipaddr; run addethaddr; run setargs; run addip; run addrootpath; run addnfs; run addbootfile;tftpboot
bootmode4=run setargs; run addfs2; run bootmech2
askmenu=run printmenu; askenv bootchoice
menu=run askmenu; saveenv;
bootcmd=echo "Boot mode is :"; run bootmode${bootchoice}
boardnum=0
username=xuwenju
ethact=ip3902
bootchoice=2
stdin=serial
stdout=serial
stderr=serial
partition=nand0,0
mtddevnum=0
mtddevname=B0

Environment size: 1958/131068 bytes
STB225v1 nand# saveenv
Saving Environment to NAND...
Erasing Nand...Writing to Nand...

Writing data at 0x00123200 -- 10% complete
Writing data at 0x00126600 -- 20% complete
Writing data at 0x00129800 -- 30% complete
Writing data at 0x0012cc00 -- 40% complete
Writing data at 0x0012fe00 -- 50% complete
Writing data at 0x00133200 -- 60% complete
Writing data at 0x00136600 -- 70% complete
Writing data at 0x00139800 -- 80% complete
Writing data at 0x0013cc00 -- 90% complete
Writing data at 0x0013fe00 -- 100% complete
done

STB225v1 nand# go
Usage:
go - start application at address 'addr'


STB225v1 nand# setenv
Usage:
setenv - set environment variables


STB225v1 nand# st_aes
--------------------------------------------------------------------
-- AES ECB encryption
--------------------------------------------------------------------
ecb_e_key: c9 8d 5f b6 3b 68 c0 27 e8 83 17 d8 23 3c 5b 9d
ecb_e_pt : 0a c1 5a 9a fb b2 4d 54 ad 99 e9 87 20 82 72 e2
ecb_e_ct : a3 d4 3b ff a6 5d 0e 80 09 2f 67 a3 14 85 78 70 <- pass

--------------------------------------------------------------------
-- AES ECB decryption
--------------------------------------------------------------------
ecb_d_key: a7 bc 3b d0 ea bd 9e ba 98 1e 23 e6 ff c9 c9 c2
ecb_d_ct : e3 fd 51 12 3b 48 a2 e2 ab 1d b2 98 94 20 22 22
ecb_d_pt : 87 7b 88 a7 7a ef 04 f0 55 46 53 9e 17 25 9f 53 <- pass

--------------------------------------------------------------------
-- AES CBC encryption
--------------------------------------------------------------------
cbc_e_key: 93 28 67 64 a8 51 46 73 0e 64 18 88 db 34 eb 47
cbc_e_iv : 19 2d 9b 3a a1 0b b2 f7 84 6c cb a0 08 5c 65 7a <- initial
cbc_e_iv : 40 d8 da f6 d1 fd a0 a0 73 b3 bd 18 b7 69 5d 2e <- final
cbc_e_pt : 98 3b f6 f5 a6 df bc da a1 93 70 66 6e 83 a9 9a
cbc_e_ct : 40 d8 da f6 d1 fd a0 a0 73 b3 bd 18 b7 69 5d 2e <- pass

--------------------------------------------------------------------
-- AES CBC decryption
--------------------------------------------------------------------
cbc_d_key: 0f fd 18 77 85 0d 3b 2c c2 d3 0c dc 99 02 86 c6
cbc_d_iv : dd 74 bb 1a c6 f0 f8 66 c7 99 2c 61 f5 9d 55 94 <- initial
cbc_d_iv : 37 95 c8 81 34 f7 c0 11 43 33 97 d1 44 3f eb 3a <- final
cbc_d_ct : f5 37 2f 97 35 c5 68 5f 1d a3 62 af 6e cb 29 40
cbc_d_pt : 54 96 a4 c2 9c 76 70 f6 1b 5d 5d f6 18 1f 59 47 <- pass

--------------------------------------------------------------------
-- AES ECB decryption, KC bypass key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB encryption, KC bypass key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB decryption, KC 2 level generated key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB encryption, KC 2 level generated key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB decryption, KC 3 level generated key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB encryption, KC 3 level generated key
--------------------------------------------------------------------
kc_setup: KC_STATUS 0x00000000
Not supported
--------------------------------------------------------------------
-- AES ECB performance
--------------------------------------------------------------------
Encrypt DRAM: 1048576 bytes in 216775 usec (4723 kbps)
Decrypt DRAM: 1048576 bytes in 216774 usec (4723 kbps)

--------------------------------------------------------------------
-- AES CBC performance
--------------------------------------------------------------------
Encrypt DRAM: 1048576 bytes in 295398 usec (3466 kbps)
Decrypt DRAM: 1048576 bytes in 318348 usec (3216 kbps)


STB225v1 nand# st_sha1
abc (aligned)
Actual : A9993E364706816ABA3E25717850C26C9CD0D89D
Expected: A9993E364706816ABA3E25717850C26C9CD0D89D

abc (mis-aligned)
Actual : A9993E364706816ABA3E25717850C26C9CD0D89D
Expected: A9993E364706816ABA3E25717850C26C9CD0D89D

abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
Actual : 84983E441C3BD26EBAAE4AA1F95129E5E54670F1
Expected: 84983E441C3BD26EBAAE4AA1F95129E5E54670F1

A million repetitions of "a"
Actual : 34AA973CD4C4DAA4F61EEB2BDBAD27316534016F
Expected: 34AA973CD4C4DAA4F61EEB2BDBAD27316534016F

Lots of misaligned input data...
Actual : 1966198757BF74D485DF596320B76E8FEE9F526E
Expected: 1966198757BF74D485DF596320B76E8FEE9F526E

sha1sum 0x80000000..0x807fffff: d1f76f6261b106e3c4ba4afa575a99af65a11de5 (8388608 bytes, 15072 kbps)


waiting your commments

thnx



Dear All,

I am also a new bie....i have a similar kind of STB225v1 (Tiger T600 HD) with similar printenv boot loader information (previously) as above. Mistakenly i've run the clearenv (erase environment Variable persistent storage) command. Now I am unable to do any thing with that. Following is the printenv results currently:

STB225v1 nand#
bootdelay=1
baudrate=115200
ethaddr=00:60:37:03:00:00
mtdids=nand0=gen_nand
mtdparts=mtdparts=gen_nand:128k(Boot0),1M(Boot1),512k(Env),4M(Kernel),16M(Filesy
stem),128k(User)
fspart=4
autostart=yes
bootnand=nboot.jffs2 Kernel
boottftp=tftpboot
setargs=set bootargs ${mtdparts} ${xargs} ip3902.mac_address=${ethaddr}
adddhcp=set bootargs ${bootargs} ip=dhcp
addip=set bootargs ${bootargs} ip=${ipaddr}:${serverip}::::${ethport}
addjffs=set bootargs ${bootargs} root=/dev/mtdblock${fspart} ro rootfstype=jffs2

addcramfs=set bootargs ${bootargs} root=/dev/mtdblock_robbs${fspart} ro rootfsty
pe=cramfs
addsquashfs=set bootargs ${bootargs} root=/dev/mtdblock_robbs${fspart} ro rootfs
type=squashfs
addnfs=set bootargs ${bootargs} root=/dev/nfs rw nfsroot=${serverip}:${rootpath}
,tcp,nfsvers=3
hostname=stb
loadaddr=80800000
bootfile=uImage_stb225
rootpath=/rootfs
ethport=eth0
ipaddr=192.168.0.2
serverip=192.168.0.1
gatewayip=192.168.0.1
netmask=255.255.255.0
bootcmd=run setargs; run addip; run addjffs; run bootnand
stdin=serial
stdout=serial
stderr=serial
ethact=ip3902
filesize=AC800

Environment size: 1081/131068 bytes


In normal boot my box is not going further after saying "Starting kernel ..." as shown below:

--------------------------------------------------------------------
-- Generic Primary Bootloader 0.1-3847, NI (04:13:33, Feb 17 2009)
-- Andre McCurdy, NXP Semiconductors
--------------------------------------------------------------------
Device: PNX8335 M1
Secure boot: disabled, keysel: 0, vid: 0 (expecting 2)
Poly10: 0x00000000
RNG: enabled
RSA keyhide: enabled
UID: 0000000000000000
AES key: 00000000000000000000000000000000
KC status: 0x00000000
Flash config: 7 (omni: 8bit NAND), timing: 0x0C
CPU clock: 320 MHz
SIF0: 512 cols x 8192 rows: 64 MBytes
SIF1: 512 cols x 8192 rows: 64 MBytes
DRAM: 200 MHz, 2 x 64 MBytes: 128 MBytes
NAND: RDY polling disabled
NAND: (AD76) Hynix SLC, pagesize 512, blocksize 16k, 64 MBytes
NAND 0x00020000: valid header
NAND 0x00020000: valid image
aboot exec time: 246554 uSec


U-Boot 1.2.0.0428_a (Secondary Bootloader) (Jun 3 2010 - 17:56:44)

CPU: PNX????
Secure boot: disabled
DRAM: 128 MB
NAND: nCS0 (force asserted legacy mode)
NAND: Hynix 64MiB 3,3V 8-bit
NAND 0x03638000: bad block
Using default environment

init scart chip uda3000.
init scart chip on i2c 1 bus.
init hdmi on i2c 1 bus.
Net: ip3902
Board Opts: EthOsc SCART HDMI PAL
Splash: done
u-boot startup time so far: 1112 msec
Hit any key to stop autoboot-----: 0

Loading from 64MiB 3,3V 8-bit, offset 0x1a0000
Automatic boot of image at addr 0x80800000 ...
## Booting image at 80800100 ...
Image Name: Linux Kernel Image
Image Type: MIPS Linux Kernel Image (gzip compressed)
Data Size: 1566751 Bytes = 1.5 MB
Load Address: 80001000
Entry Point: 802a69d0
Verifying Checksum ... OK
Uncompressing Kernel Image ... OK

Starting kernel ...


Please help me how can i restore my STB.
Thanks in Advance!
 
Dear Tayen,

did u get the proceedure to jtag ur stb????
if yes then plz help me also

Thanks!
 
Back
Top