ZNDS智能电视网 推荐当贝市场

TV应用下载 / 资源分享区

软件下载 | 游戏 | 讨论 | 电视计算器

综合交流 / 评测 / 活动区

交流区 | 测硬件 | 网站活动 | Z币中心

新手入门 / 进阶 / 社区互助

新手 | 你问我答 | 免费刷机救砖 | ROM固件

楼主: benn_zhao
上一主题 下一主题
[求助]

四川电信创维E900,带usb3.0版本救砖

  [复制链接]
11#
发表于 2017-5-13 18:41 | 只看该作者
benn_zhao 发表于 2017-4-11 19:31
多谢楼上,确实有读U盘的动作,可能是我的文件不对,没有成功,U盘的灯确实闪了几下。

大家帮忙,谁手上有 ...

这个命令符是在TTL里面用还是用其它软件呀?
回复 支持 反对

使用道具 举报

12#
发表于 2017-5-13 18:46 | 只看该作者
benn_zhao 发表于 2017-4-11 19:31
多谢楼上,确实有读U盘的动作,可能是我的文件不对,没有成功,U盘的灯确实闪了几下。

大家帮忙,谁手上有 ...

还有就是优盘插哪个口呀?
回复 支持 反对

使用道具 举报

13#
发表于 2017-6-11 17:55 | 只看该作者
山阴路的夏天 发表于 2017-4-5 13:53
https://www.znds.com/tv-693882-1-1.html楼主也可以参考一下这个帖子或者也可以自己去相关的板块找找看 ...

Bootrom start
Boot from eMMC
Initializing DDR ... OK
Starting DDR training ... OK
Starting fastboot ...


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Compressed-boot v1.0.0
Uncompress........................Ok


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Fastboot 3.3.0 (wujiaxi@RD4TEAM) (Oct 14 2015 - 21:52:02)

Fastboot:      Version 3.3.0
Build Date:    Oct 14 2015, 21:52:48
CPU:           Hi3798Mv100 (CA)
Boot Media:    eMMC
DDR Size:      1GB

Check nand flash controller v610. found
Special NAND id table Version 1.36
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!

MMC/SD controller initialization.
MMC/SD Card:
    MID:         0x15
    Read Block:  512 Bytes
    Write Block: 512 Bytes
    Chip Size:   3728M Bytes (High Capacity)
    Name:        "4FPD3"
    Chip Type:   MMC
    Version:     5.0
    Speed:       52000000Hz
    Bus Width:   8bit
    Boot Addr:   0 Bytes

Boot Env on eMMC
    Env Offset:          0x00100000
    Env Size:            0x00010000
    Env Range:           0x00010000
HI_OTP_LockIdWord,327: ID_WORD have already been locked


SDK Version: HiSTBAndroidV600R001C00SPC062_v2015091617

Security Begin Read RSA Key!
Secure boot is enabled
press the key!!
get key 0 2
get chipid =137980100
get chipType (HI3798MV100)
count=2
Press the IR remote!!
Press the IR remote!!
boot_select = kernel
Start TF-Card enable!!!skyworth board!!!
Start WIFI enable!!!skyworth board!!!
kernelbootargs:console=ttyAMA0,115200 blkdevparts=mmcblk0:1M(fastboot),1M(bootargs),10M(recovery),2M(deviceinfo),8M(baseparam),8M(pqparam),20M(logo),20M(logobak),40M(fastplay),40M(fastplaybak),40M(kernel),20M(misc),8M(userapi),8M(hibdrv),8M(qbflag),300M(qbdata),800M(system),1024M(userdata),500M(cache),8M(macid),64M(skparam),400M(skbackup),50M(private),-(sdcard) cohernet_pool=1M --hpmc
mac:72:F4:58:9C:02:1D

MMC read: dev # 0, block # 1, count 1 ... 1 blocks read: OK

738461 Bytes/s
RSA Module:
0xBD, 0xCA, 0x00, 0xF4, 0x0D, 0xA4, 0x04, 0xEF, 0xD8, 0x79, 0xB0, 0x7D, 0xBC, 0x3E, 0x54, 0x4E,
0xFF, 0x96, 0xBB, 0xA9, 0x71, 0x75, 0xAC, 0x4C, 0x35, 0xEB, 0x38, 0x89, 0x42, 0x41, 0x48, 0xE9,
0x58, 0x7A, 0xDF, 0x5B, 0x8D, 0x19, 0x45, 0xA7, 0x29, 0xB2, 0xD7, 0x3D, 0x35, 0x9A, 0xFC, 0xFD,
0xFE, 0x1D, 0x10, 0x5F, 0xA5, 0xE0, 0x33, 0xB2, 0xBB, 0x87, 0x1C, 0x81, 0x5E, 0x4C, 0x53, 0x93,
0x73, 0x05, 0x71, 0x96, 0x80, 0xEE, 0xA0, 0x68, 0x72, 0xE0, 0x64, 0x3A, 0xA7, 0x73, 0xBF, 0x31,
0x09, 0xDE, 0x95, 0x5E, 0xF2, 0x19, 0x25, 0xE1, 0x0A, 0x0A, 0x01, 0xD5, 0xFB, 0x94, 0x1F, 0x2A,
0x17, 0xFF, 0x2C, 0x55, 0x37, 0x7C, 0xB0, 0x7F, 0xAB, 0x33, 0xC2, 0x01, 0xA7, 0xB9, 0x49, 0x7F,
0xDD, 0xA6, 0x69, 0x1D, 0x7C, 0xF3, 0xCB, 0x6B, 0xD5, 0xEB, 0xCD, 0x02, 0xDE, 0xD9, 0x74, 0x4E,
0xB0, 0x1F, 0x2F, 0x47, 0xB5, 0x01, 0x5A, 0xFE, 0x6D, 0x15, 0xE7, 0xA7, 0x59, 0x90, 0x7D, 0x10,
0x84, 0xE6, 0x5F, 0x9D, 0x89, 0x7E, 0x79, 0x5A, 0x8D, 0x20, 0x24, 0x9C, 0x23, 0xD2, 0x67, 0x20,
0x68, 0x41, 0xAB, 0xAD, 0xC5, 0x2D, 0xCB, 0x47, 0x8B, 0xE6, 0xD9, 0x47, 0x65, 0xD3, 0x1E, 0xDB,
0xC6, 0x65, 0x9D, 0x96, 0x78, 0x01, 0x9D, 0x47, 0xE6, 0x1D, 0xA9, 0xD3, 0x34, 0xF6, 0xDC, 0xFD,
0x10, 0x88, 0x1C, 0x5E, 0x64, 0x43, 0xD8, 0xA5, 0x19, 0x6F, 0x9E, 0x0A, 0x6F, 0x35, 0x46, 0xBF,
0xE6, 0x52, 0x5E, 0x0C, 0x92, 0x6D, 0x3E, 0x3F, 0x6C, 0x82, 0x00, 0x05, 0xBE, 0x85, 0x98, 0x19,
0xA0, 0x4B, 0x83, 0x29, 0x55, 0x7E, 0xAB, 0x92, 0x23, 0x5A, 0x6F, 0x8F, 0x12, 0xFE, 0x7A, 0x25,
0xDF, 0x24, 0x58, 0xF9, 0xFE, 0x30, 0x5E, 0xB8, 0xF4, 0xB6, 0x43, 0xDD, 0x98, 0x42, 0xB8, 0x69,
RSA Exponent:
0x03, 0x00, 0x00, 0x00,

get extern rsa key success!
g_EnvFlashAddr:0x100000, g_EnvFlashPartionSize:0x100000
Open addr, enFlashType: 0x00000002
HI_CA_CommonVerify_BootPara,2213: Sign Header found!
HI_CA_CommonVerify_BootPara,2219: CRC32 check ok
HI_CA_CommonVerify_BootPara,2255: begin sha2, length:65536
HI_CA_CommonVerify_BootPara,2270: Sha check ok

u8MagicNumber:Hisilicon_ADVCA_ImgHead_MagicNum
u8Version:v1.0.0.3
u32CreateDay:0x0
u32CreateTime:0x0
u32HeadLength:0x384
u32SignedDataLength:65536:0x10000
u32IsYaffsImage:0
u32IsConfigNandBlock:1
u32NandBlockType:0
u32IsNeedEncrypt:0
u32IsEncrypted:0
u32HashType:1
u32CurrentsectionID:0
u32TotalsectionID:1
u32SectionSize:0
e9 ea 3f b3 42 ae 08 46 69 57 01 d7 d9 f0 ee 68 cf a0 77 52 f8 0a 2a ac c8 0e 1c c6 dc c0 6b 2b
u32SignatureLen:256
2d 03 61 7a 57 d4 4b 7a b1 83 30 13 c3 63 d4 92 70 27 d3 0e f1 46 6d c0 38 ad 2d ab d6 10 fc 43 ed 4d 61 68 bd 88 0c 92 9e 53 54 7e 9d 11 32 63 fc 4e 05 30 90 1a cf f3 ad a4 71 a0 2a d8 1e 69 10 dd 27 93 2b 1a 91 dd 20 51 14 00 db d0 d9 3e 66 21 3f 46 9f 75 25 bd 97 ff c3 6b ed d5 1c b6 ed f6 05 44 52 d0 b9 6b af 34 21 bd a5 f4 8d 20 f1 d8 62 da 80 92 be db 15 15 11 e7 7a 01 f6 ff 04 a9 dc 3b 4d 4e a3 b9 bb 10 b8 8b 7b 81 6a c8 aa 7e 0f 31 2c 60 b8 93 ea f4 3f 0e 19 08 1e 03 e1 70 f7 79 e0 33 5f d1 ae 06 76 28 8c 02 88 0a eb b1 96 62 d6 54 cd a5 92 91 e9 bf 08 43 ff cc b8 f9 f6 8d 67 39 c9 c0 b4 ca ec 8d ec 2f 88 ea 9b df ba c7 7c 73 86 af 4e d6 ba 49 cd 86 5d 36 18 3c 06 20 0a fd 20 f2 f4 e4 74 60 c8 13 ae 4d 8b 19 37 d3 d5 fe 47 7f 68 b0 b2 ec 83 27 1f 38
OrignalImagePath:/homesec/lijingchao/4G_code/sdk/kitkat/out/target/product/Hi3798MV100/Emmc/bootargs.bin
RSAPrivateKeyPath:/homesec/lijingchao/4G_code/sdk/kitkat/device/hisilicon/Hi3798MV100/security/extern_rsa_priv.txt
CRC32:f01d6735
HI_CA_CommonVerify_BootPara,2276: Check Authenitication is ok
CA_Common_VerifyBootParaByPartitionDebug,535: verify success
HI_CA_GetAuthMode,863: Common Signature!
HI_CA_GetAuthMode,863: Common Signature!
CA_Common_VerifyParseSignCommand,462: verify image:recovery, sign:recovery, offset:0x200000
CA_Common_Search_SignHeader,1734: PartitionSignName:recovery
回复 支持 反对

使用道具 举报

14#
发表于 2017-6-11 18:07 | 只看该作者

Bootrom start
Boot from eMMC
Initializing DDR ... OK
Starting DDR training ... OK
Starting fastboot ...


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Compressed-boot v1.0.0
Uncompress........................Ok


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Fastboot 3.3.0 (wujiaxi@RD4TEAM) (Oct 14 2015 - 21:52:02)

Fastboot:      Version 3.3.0
Build Date:    Oct 14 2015, 21:52:48
CPU:           Hi3798Mv100 (CA)
Boot Media:    eMMC
DDR Size:      1GB

Check nand flash controller v610. found
Special NAND id table Version 1.36
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!

MMC/SD controller initialization.
MMC/SD Card:
    MID:         0x15
    Read Block:  512 Bytes
    Write Block: 512 Bytes
    Chip Size:   3728M Bytes (High Capacity)
    Name:        "4FPD3"
    Chip Type:   MMC
    Version:     5.0
    Speed:       52000000Hz
    Bus Width:   8bit
    Boot Addr:   0 Bytes

Boot Env on eMMC
    Env Offset:          0x00100000
    Env Size:            0x00010000
    Env Range:           0x00010000
HI_OTP_LockIdWord,327: ID_WORD have already been locked


SDK Version: HiSTBAndroidV600R001C00SPC062_v2015091617

Security Begin Read RSA Key!
Secure boot is enabled
press the key!!
get key 0 2
get chipid =137980100
get chipType (HI3798MV100)
count=2
Press the IR remote!!
Press the IR remote!!
boot_select = kernel
Start TF-Card enable!!!skyworth board!!!
Start WIFI enable!!!skyworth board!!!
kernelbootargs:console=ttyAMA0,115200 blkdevparts=mmcblk0:1M(fastboot),1M(bootargs),10M(recovery),2M(deviceinfo),8M(baseparam),8M(pqparam),20M(logo),20M(logobak),40M(fastplay),40M(fastplaybak),40M(kernel),20M(misc),8M(userapi),8M(hibdrv),8M(qbflag),300M(qbdata),800M(system),1024M(userdata),500M(cache),8M(macid),64M(skparam),400M(skbackup),50M(private),-(sdcard) cohernet_pool=1M --hpmc
mac:72:F4:58:9C:02:1D

MMC read: dev # 0, block # 1, count 1 ... 1 blocks read: OK

738461 Bytes/s
RSA Module:
0xBD, 0xCA, 0x00, 0xF4, 0x0D, 0xA4, 0x04, 0xEF, 0xD8, 0x79, 0xB0, 0x7D, 0xBC, 0x3E, 0x54, 0x4E,
0xFF, 0x96, 0xBB, 0xA9, 0x71, 0x75, 0xAC, 0x4C, 0x35, 0xEB, 0x38, 0x89, 0x42, 0x41, 0x48, 0xE9,
0x58, 0x7A, 0xDF, 0x5B, 0x8D, 0x19, 0x45, 0xA7, 0x29, 0xB2, 0xD7, 0x3D, 0x35, 0x9A, 0xFC, 0xFD,
0xFE, 0x1D, 0x10, 0x5F, 0xA5, 0xE0, 0x33, 0xB2, 0xBB, 0x87, 0x1C, 0x81, 0x5E, 0x4C, 0x53, 0x93,
0x73, 0x05, 0x71, 0x96, 0x80, 0xEE, 0xA0, 0x68, 0x72, 0xE0, 0x64, 0x3A, 0xA7, 0x73, 0xBF, 0x31,
0x09, 0xDE, 0x95, 0x5E, 0xF2, 0x19, 0x25, 0xE1, 0x0A, 0x0A, 0x01, 0xD5, 0xFB, 0x94, 0x1F, 0x2A,
0x17, 0xFF, 0x2C, 0x55, 0x37, 0x7C, 0xB0, 0x7F, 0xAB, 0x33, 0xC2, 0x01, 0xA7, 0xB9, 0x49, 0x7F,
0xDD, 0xA6, 0x69, 0x1D, 0x7C, 0xF3, 0xCB, 0x6B, 0xD5, 0xEB, 0xCD, 0x02, 0xDE, 0xD9, 0x74, 0x4E,
0xB0, 0x1F, 0x2F, 0x47, 0xB5, 0x01, 0x5A, 0xFE, 0x6D, 0x15, 0xE7, 0xA7, 0x59, 0x90, 0x7D, 0x10,
0x84, 0xE6, 0x5F, 0x9D, 0x89, 0x7E, 0x79, 0x5A, 0x8D, 0x20, 0x24, 0x9C, 0x23, 0xD2, 0x67, 0x20,
0x68, 0x41, 0xAB, 0xAD, 0xC5, 0x2D, 0xCB, 0x47, 0x8B, 0xE6, 0xD9, 0x47, 0x65, 0xD3, 0x1E, 0xDB,
0xC6, 0x65, 0x9D, 0x96, 0x78, 0x01, 0x9D, 0x47, 0xE6, 0x1D, 0xA9, 0xD3, 0x34, 0xF6, 0xDC, 0xFD,
0x10, 0x88, 0x1C, 0x5E, 0x64, 0x43, 0xD8, 0xA5, 0x19, 0x6F, 0x9E, 0x0A, 0x6F, 0x35, 0x46, 0xBF,
0xE6, 0x52, 0x5E, 0x0C, 0x92, 0x6D, 0x3E, 0x3F, 0x6C, 0x82, 0x00, 0x05, 0xBE, 0x85, 0x98, 0x19,
0xA0, 0x4B, 0x83, 0x29, 0x55, 0x7E, 0xAB, 0x92, 0x23, 0x5A, 0x6F, 0x8F, 0x12, 0xFE, 0x7A, 0x25,
0xDF, 0x24, 0x58, 0xF9, 0xFE, 0x30, 0x5E, 0xB8, 0xF4, 0xB6, 0x43, 0xDD, 0x98, 0x42, 0xB8, 0x69,
RSA Exponent:
0x03, 0x00, 0x00, 0x00,

get extern rsa key success!
g_EnvFlashAddr:0x100000, g_EnvFlashPartionSize:0x100000
Open addr, enFlashType: 0x00000002
HI_CA_CommonVerify_BootPara,2213: Sign Header found!
HI_CA_CommonVerify_BootPara,2219: CRC32 check ok
HI_CA_CommonVerify_BootPara,2255: begin sha2, length:65536
HI_CA_CommonVerify_BootPara,2270: Sha check ok

u8MagicNumber:Hisilicon_ADVCA_ImgHead_MagicNum
u8Version:v1.0.0.3
u32CreateDay:0x0
u32CreateTime:0x0
u32HeadLength:0x384
u32SignedDataLength:65536:0x10000
u32IsYaffsImage:0
u32IsConfigNandBlock:1
u32NandBlockType:0
u32IsNeedEncrypt:0
u32IsEncrypted:0
u32HashType:1
u32CurrentsectionID:0
u32TotalsectionID:1
u32SectionSize:0
e9 ea 3f b3 42 ae 08 46 69 57 01 d7 d9 f0 ee 68 cf a0 77 52 f8 0a 2a ac c8 0e 1c c6 dc c0 6b 2b
u32SignatureLen:256
2d 03 61 7a 57 d4 4b 7a b1 83 30 13 c3 63 d4 92 70 27 d3 0e f1 46 6d c0 38 ad 2d ab d6 10 fc 43 ed 4d 61 68 bd 88 0c 92 9e 53 54 7e 9d 11 32 63 fc 4e 05 30 90 1a cf f3 ad a4 71 a0 2a d8 1e 69 10 dd 27 93 2b 1a 91 dd 20 51 14 00 db d0 d9 3e 66 21 3f 46 9f 75 25 bd 97 ff c3 6b ed d5 1c b6 ed f6 05 44 52 d0 b9 6b af 34 21 bd a5 f4 8d 20 f1 d8 62 da 80 92 be db 15 15 11 e7 7a 01 f6 ff 04 a9 dc 3b 4d 4e a3 b9 bb 10 b8 8b 7b 81 6a c8 aa 7e 0f 31 2c 60 b8 93 ea f4 3f 0e 19 08 1e 03 e1 70 f7 79 e0 33 5f d1 ae 06 76 28 8c 02 88 0a eb b1 96 62 d6 54 cd a5 92 91 e9 bf 08 43 ff cc b8 f9 f6 8d 67 39 c9 c0 b4 ca ec 8d ec 2f 88 ea 9b df ba c7 7c 73 86 af 4e d6 ba 49 cd 86 5d 36 18 3c 06 20 0a fd 20 f2 f4 e4 74 60 c8 13 ae 4d 8b 19 37 d3 d5 fe 47 7f 68 b0 b2 ec 83 27 1f 38
OrignalImagePath:/homesec/lijingchao/4G_code/sdk/kitkat/out/target/product/Hi3798MV100/Emmc/bootargs.bin
RSAPrivateKeyPath:/homesec/lijingchao/4G_code/sdk/kitkat/device/hisilicon/Hi3798MV100/security/extern_rsa_priv.txt
CRC32:f01d6735
HI_CA_CommonVerify_BootPara,2276: Check Authenitication is ok
CA_Common_VerifyBootParaByPartitionDebug,535: verify success
HI_CA_GetAuthMode,863: Common Signature!
HI_CA_GetAuthMode,863: Common Signature!
CA_Common_VerifyParseSignCommand,462: verify image:recovery, sign:recovery, offset:0x200000
CA_Common_Search_SignHeader,1734: PartitionSignName:recovery

Bootrom start
Boot from eMMC

Entry usb bootstrap

Bootrom start
Boot from eMMC

Entry usb bootstrap
No found fastboot.bin in host:1
No found fastboot.bin in host:2
Initializing DDR ... OK
Starting DDR training ... OK
Starting fastboot ...


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Compressed-boot v1.0.0
Uncompress........................Ok


System startup

Reg Version:  v1.1.0
Reg Time:     2015/5/8   17:00:29
Reg Name:     hi3798mdmo1d_hi3798mv100_ddr3_2gbyte_8bitx4_4layers_emmc.reg

Relocate Boot to DDR

Jump to DDR


Fastboot 3.3.0 (wujiaxi@RD4TEAM) (Oct 14 2015 - 21:52:02)

Fastboot:      Version 3.3.0
Build Date:    Oct 14 2015, 21:52:48
CPU:           Hi3798Mv100 (CA)
Boot Media:    eMMC
DDR Size:      1GB

Check nand flash controller v610. found
Special NAND id table Version 1.36
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!

MMC/SD controller initialization.
MMC/SD Card:
    MID:         0x15
    Read Block:  512 Bytes
    Write Block: 512 Bytes
    Chip Size:   3728M Bytes (High Capacity)
    Name:        "4FPD3"
    Chip Type:   MMC
    Version:     5.0
    Speed:       52000000Hz
    Bus Width:   8bit
    Boot Addr:   0 Bytes

Bootrom start
回复 支持 反对

使用道具 举报

15#
发表于 2017-12-9 23:57 | 只看该作者
楼主“2,所以从创维E900四川电信版本不带usb3.0版本中,备份出fastboot,bootargs,recovery等前5个文件为im”能发一份给我吗?719293401@qq.com
回复 支持 反对

使用道具 举报

16#
发表于 2017-12-9 23:58 | 只看该作者
@benn_zhao
回复 支持 反对

使用道具 举报

17#
发表于 2017-12-21 00:50 | 只看该作者
你好能给我一份 带USB3.0版本 备份出fastboot,bootargs,recovery的吗我的给我清空了也需要这些
回复 支持 反对

使用道具 举报

18#
发表于 2018-2-18 17:54 | 只看该作者
同求不带USB口的   5文件         有的发一份谢谢   1002238740@qq.com
回复 支持 反对

使用道具 举报

19#
发表于 2018-3-1 11:40 | 只看该作者
有的话,也给我一份
回复 支持 反对

使用道具 举报

20#
发表于 2018-3-1 11:59 | 只看该作者
benn_zhao 发表于 2017-4-11 19:31
多谢楼上,确实有读U盘的动作,可能是我的文件不对,没有成功,U盘的灯确实闪了几下。

大家帮忙,谁手上有 ...

在吗?
四川电信创维E900 我也跟你遇到问题,能把fastboot.img bootargs.img recovery.img deviceinfo.img baseparam.img pqparam.img 也给下我
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|新帖|标签|软件|Sitemap|ZNDS智能电视网 ( 苏ICP备2023012627号 )

网络信息服务信用承诺书 | 增值电信业务经营许可证:苏B2-20221768 丨 苏公网安备 32011402011373号

GMT+8, 2024-4-29 08:45 , Processed in 0.053508 second(s), 11 queries , Redis On.

Powered by Discuz!

监督举报:report#znds.com (请将#替换为@)

© 2007-2024 ZNDS.Com

快速回复 返回顶部 返回列表