Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Loader for Onyx Boox Note 2 - Qualcomm Bengal (aka Snapdragon 662) #200

Closed
baqlias opened this issue Dec 6, 2021 · 34 comments
Closed

Loader for Onyx Boox Note 2 - Qualcomm Bengal (aka Snapdragon 662) #200

baqlias opened this issue Dec 6, 2021 · 34 comments

Comments

@baqlias
Copy link

baqlias commented Dec 6, 2021

Loader.txt

I've attached a copy of what came up on Terminal with my device in EDL mode when I ran the command edl printgpt --memory=emmc

It was unable to find a suitable loader for my device and encouraged me to pass this on. So here it is! If you need additional info, please let me know. My main purpose in doing this is to get the boot.img from my device so I can root it with Magisk.

@baqlias
Copy link
Author

baqlias commented Dec 6, 2021

PS - the title is incorrect. Should be Onyx Boox Note Air 2...

@bkerler
Copy link
Owner

bkerler commented Dec 9, 2021

Please try b30f7c9 and make sure you do a submodule init and update to get the latest Loaders directory as well.

@baqlias
Copy link
Author

baqlias commented Dec 10, 2021

Thanks for your response! I'm still learning my way around edl. When you speak of the submodule init and update, do you mean running the git submodule update line in the installation instructions? Thanks again!!

@baqlias
Copy link
Author

baqlias commented Dec 10, 2021

The loader doesn't appear to be working, but I may have installed it incorrectly. How would I install this manually? Thanks!

@bkerler
Copy link
Owner

bkerler commented Dec 19, 2021

can you share the log to see why it doesn't work ?

@baqlias
Copy link
Author

baqlias commented Dec 20, 2021

UbuntuTerminal.txt
Attached is a log of my terminal on Ubuntu. Towards the end, it looks like the loader was finally installed but that it was not being recognized. Either I have missed something (highly probable) or perhaps this is the wrong loader?

Thanks for your assistance.

@baqlias
Copy link
Author

baqlias commented Dec 27, 2021

I thought that my Onyx Boox Note Air 2 had a Snapdragon 662 chip. I found out that the code name “bengal” covers more than one chip. I installed the CPU-Z app. It tells me that I have a Snapdragon 665.

@VPaulV
Copy link

VPaulV commented Jan 2, 2022

Hey guys, I have the same problem cannot make it work with Qualcomm Bengal, please let me know if I can help somehow with logs or testing. I have tried 662 loader, doesn't work for me either.
Debug log without loader:

Qualcomm Sahara / Firehose Client V3.53 (c) B.Kerler 2018-2021.
main - Trying with no loader given ...
main - Waiting for the device
UsbClass
UsbClass - [LIB]: ←[95m  CONFIGURATION 1: 2 mA ====================================
   bLength              :    0x9 (9 bytes)
   bDescriptorType      :    0x2 Configuration
   wTotalLength         :   0x2c (44 bytes)
   bNumInterfaces       :    0x1
   bConfigurationValue  :    0x1
   iConfiguration       :    0x0
   bmAttributes         :   0xa0 Bus Powered, Remote Wakeup
   bMaxPower            :    0x1 (2 mA)
    INTERFACE 0: Vendor Specific ===========================
     bLength            :    0x9 (9 bytes)
     bDescriptorType    :    0x4 Interface
     bInterfaceNumber   :    0x0
     bAlternateSetting  :    0x0
     bNumEndpoints      :    0x2
     bInterfaceClass    :   0xff Vendor Specific
     bInterfaceSubClass :   0xff
     bInterfaceProtocol :   0x10
     iInterface         :    0x0
      ENDPOINT 0x81: Bulk IN ===============================
       bLength          :    0x7 (7 bytes)
       bDescriptorType  :    0x5 Endpoint
       bEndpointAddress :   0x81 IN
       bmAttributes     :    0x2 Bulk
       wMaxPacketSize   :  0x400 (1024 bytes)
       bInterval        :    0x0
      ENDPOINT 0x1: Bulk OUT ===============================
       bLength          :    0x7 (7 bytes)
       bDescriptorType  :    0x5 Endpoint
       bEndpointAddress :    0x1 OUT
       bmAttributes     :    0x2 Bulk
       wMaxPacketSize   :  0x400 (1024 bytes)
       bInterval        :    0x0←[0m
UsbClass
UsbClass - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m
UsbClass
UsbClass - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m
main - Device detected :)
UsbClass
UsbClass - [LIB]: ←[95mconnect:0x400←[0m

Debug log with loader:

C:\Users\pvtgo\Desktop\edl>python3 edl printgpt --loader C:\Users\pvtgo\Desktop\edl\Loaders\qualcomm\factory\sdm662\0014d0e100000000_d40eee56f3194665_FHPRG.bin --debugmode
Qualcomm Sahara / Firehose Client V3.53 (c) B.Kerler 2018-2021.
main - Using loader C:\Users\pvtgo\Desktop\edl\Loaders\qualcomm\factory\sdm662\0014d0e100000000_d40eee56f3194665_FHPRG.bin ...
main - Waiting for the device
UsbClass
UsbClass - [LIB]: ←[95m  CONFIGURATION 1: 2 mA ====================================
   bLength              :    0x9 (9 bytes)
   bDescriptorType      :    0x2 Configuration
   wTotalLength         :   0x2c (44 bytes)
   bNumInterfaces       :    0x1
   bConfigurationValue  :    0x1
   iConfiguration       :    0x0
   bmAttributes         :   0xa0 Bus Powered, Remote Wakeup
   bMaxPower            :    0x1 (2 mA)
    INTERFACE 0: Vendor Specific ===========================
     bLength            :    0x9 (9 bytes)
     bDescriptorType    :    0x4 Interface
     bInterfaceNumber   :    0x0
     bAlternateSetting  :    0x0
     bNumEndpoints      :    0x2
     bInterfaceClass    :   0xff Vendor Specific
     bInterfaceSubClass :   0xff
     bInterfaceProtocol :   0x10
     iInterface         :    0x0
      ENDPOINT 0x81: Bulk IN ===============================
       bLength          :    0x7 (7 bytes)
       bDescriptorType  :    0x5 Endpoint
       bEndpointAddress :   0x81 IN
       bmAttributes     :    0x2 Bulk
       wMaxPacketSize   :  0x400 (1024 bytes)
       bInterval        :    0x0
      ENDPOINT 0x1: Bulk OUT ===============================
       bLength          :    0x7 (7 bytes)
       bDescriptorType  :    0x5 Endpoint
       bEndpointAddress :    0x1 OUT
       bmAttributes     :    0x2 Bulk
       wMaxPacketSize   :  0x400 (1024 bytes)
       bInterval        :    0x0←[0m
UsbClass
UsbClass - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m
UsbClass
UsbClass - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m
main - Device detected :)
UsbClass
UsbClass - [LIB]: ←[95mconnect:0x400←[0m

In both cases I was using libusb1.2.6

@bkerler
Copy link
Owner

bkerler commented Jan 2, 2022

please use linux, windows is currently broken due to usbdk issues.

@jensMF
Copy link

jensMF commented Jan 3, 2022

I am using OpenSuse Linux and I have the problem, that I loose the connection to the device (onyx boox note air 2) as soon as the message Successfully uploaded programmer :) appears in the Terminal. Here is the output with and without debug mode:
edl_onyx_boox_note_air2_emmc.txt
edl_onyx_boox_note_air2_emmc_debugmode.txt

@bkerler
Copy link
Owner

bkerler commented Jan 3, 2022

According to the log the programmer doesn't seem to fit your device

@jensMF
Copy link

jensMF commented Jan 3, 2022

So, how can I find the correct programmer?

@baqlias
Copy link
Author

baqlias commented Jan 6, 2022

One reason for our difficulties may be, as I have said before, the CPU in the Note Air 2 is a Snapdragon 665, not 662, as I previously thought. The loader and programmer(s) we use need to be compatible with the 665.

@kalebpace
Copy link

A little context,
I've been digging for the correct loader to fix an Unknown mode. Aborting. issue on Ubuntu 20.04

@baqlias I believe the CPU-Z app has a bug in it. I installed it and confirmed it said 665, however, DevCheck shows 662. All I can find in documentation points to 662 which is code named "BENGAL". I found this with adb shell cat /proc/cpuinfo and on phonedb
image

I believe the one you mention is 665 "Trinket"

Just wanted to verify this for my own sanity and share with others

@bkerler
Copy link
Owner

bkerler commented Jan 7, 2022

I wonder why it says unknown cpu, will have a look at the msm id

@baqlias
Copy link
Author

baqlias commented Jan 7, 2022

Thanks for clarifying this. I installed CPU Identifier Pro and it tells me I have a Qualcomm Snapdragon Bengal, but does not give a number such as 662 or 665. The adb shell command does likewise. Everything else I've seen points to 662, as you said.

@xenoscr
Copy link

xenoscr commented Jan 7, 2022

Similar experience with the new BOOX Note 5, with the same CPU. I know next to nothing but am willing to learn and test.

@baqlias
Copy link
Author

baqlias commented Jan 7, 2022

I'm also willing to test, as long as there's a way to back things up first, just in case!

@baqlias
Copy link
Author

baqlias commented Jan 8, 2022

I had a PM from someone for whom bkerler's 662 loader worked. This person says that memory in the Note Air 2 is UFS mode, not eMMC mode. Once this person posts on Mobileread, you can all check it out. I'll post a link to that post here. It still didn't work for me, but this person was kind enough to upload the boot.img.

@bkerler
Copy link
Owner

bkerler commented Jan 8, 2022

If that's the case, just use --memory=ufs as option

@baqlias
Copy link
Author

baqlias commented Jan 8, 2022

Using --memory=ufs didn't work for me for some reason! It worked for someone else, whose post appeared on Mobileread today!

@xenoscr
Copy link

xenoscr commented Jan 9, 2022

Does not work for the Note 5 either. Tried a few variations without luck.

@kalebpace
Copy link

Using --memory=ufs didn't work for me for some reason! It worked for someone else, whose post appeared on Mobileread today!

Have not been able to get --memory=ufs working either, but the provided factory image on your contact's post is much appreciated. Was able to patch and root. Tyvm @baqlias!

@xenoscr
Copy link

xenoscr commented Jan 9, 2022

Still unable to pull the boot image from the BOOX Note 5 using --memory=ufs. I can open a new issue since it's a different device. I've tried from a couple different machines and keep getting this:

HWID:              0x0014d0e100000000 (MSM_ID:0x0014d0e1,OEM_ID:0x0000,MODEL_ID:0x0000)
CPU detected:      "SDM662"
PK_HASH:           0xd40eee56f3194665574109a39267724ae7944134cd53cb767e293d3c40497955
Serial:            0xd81532b6

sahara - Possibly unfused device detected, so any loader should be fine...
sahara - Trying loader: /storage/projects/onyx/edl/edlclient/../Loaders/qualcomm/factory/sdm662/0014d0e100000000_d40eee56f3194665_FHPRG.bin
sahara - Uploading loader /storage/projects/onyx/edl/edlclient/../Loaders/qualcomm/factory/sdm662/0014d0e100000000_d40eee56f3194665_FHPRG.bin ...
Successfully uploaded programmer :)
USBError(19, 'No such device (it may have been disconnected)') <class 'usb.core.USBError'> 19

I know very little (nothing) about loaders or how they're obtained, or how edl works. I would love to be more helpful but I will need to wait until there is a solution or Onyx releases a new firmware that I can pull the image from. Until then I have a workaround to keep my device from calling back to Onyx and Tencent.

@bkerler
Copy link
Owner

bkerler commented Jan 9, 2022

My best guess is that there are different chip revisions or hardware configurations and the edl loader will then fail.

@bkerler
Copy link
Owner

bkerler commented Jan 10, 2022

Ok, so:

onyx boox note air2 has 0x0014d0e100000000, which is SDM662.

What msmid does boox note 5 show ? The msmid is the only reliable source for cpu identification.

@bkerler
Copy link
Owner

bkerler commented Jan 10, 2022

So, onyx boox note air2 seems to work fine with 0014d0e100000000_d40eee56f3194665_FHPRG.bin and option --memory=ufs.

@xenoscr
Copy link

xenoscr commented Jan 10, 2022

Ok, so:

onyx boox note air2 has 0x0014d0e100000000, which is SDM662.

What msmid does boox note 5 show ? The msmid is the only reliable source for cpu identification.

@bkerler, the value according to edl's output is: 0x0014d0e1

(The output above is from my BOOX Note 5)

@ifg
Copy link

ifg commented Jan 24, 2022

Same problem with Boox Max Lumi2. Device disconnected after 0014d0e100000000_d40eee56f3194665_FHPRG.bin uploaded.
Fortunately, I have found a patched loader for SDM662 and it works!
Google the keyword: Qualcomm SDM662 Patched Loader
MD5: cd7a91985353e0a1a6d581b423e1325c

@MlgmXyysd
Copy link

Same problem with Boox Max Lumi2. Device disconnected after 0014d0e100000000_d40eee56f3194665_FHPRG.bin uploaded. Fortunately, I have found a patched loader for SDM662 and it works! Google the keyword: Qualcomm SDM662 Patched Loader MD5: cd7a91985353e0a1a6d581b423e1325c

Onyx Boox Note X failed, stucked at Trying to read first storage sector

$ edl printgpt --loader=prog_firehose_life_ddr_patched.elf --memory=ufs
Qualcomm Sahara / Firehose Client V3.60 (c) B.Kerler 2018-2022.
main - Using loader prog_firehose_life_ddr_patched.elf ...
main - Waiting for the device

main - Device detected :)
sahara - Protocol version: 2.1
main - Mode detected: sahara
sahara - 
------------------------
HWID:              0x0014d0e100000000 (MSM_ID:0x0014d0e1,OEM_ID:0x0000,MODEL_ID:0x0000)
CPU detected:      "SDM662"
PK_HASH:           0xd40eee56f3194665574109a39267724ae7944134cd53cb767e293d3c40497955
Serial:            0x04ee17b9

sahara - Protocol version: 2.1
sahara - Uploading loader prog_firehose_life_ddr_patched.elf ...
sahara - 64-Bit mode detected.
sahara - Firehose mode detected, uploading...
sahara - Loader successfully uploaded.
main - Trying to connect to firehose loader ...
firehose
firehose - [LIB]: Couldn't detect MaxPayloadSizeFromTargetinBytes
firehose
firehose - [LIB]: Couldn't detect TargetName
firehose - TargetName=Unknown
firehose - MemoryName=UFS
firehose - Version=1
firehose - Trying to read first storage sector...
^CTraceback (most recent call last):
......
KeyboardInterrupt

$ md5sum prog_firehose_life_ddr_patched.elf 
cd7a91985353e0a1a6d581b423e1325c  prog_firehose_life_ddr_patched.elf

prog_firehose_life_ddr_patched.zip

@bkerler
Copy link
Owner

bkerler commented Feb 5, 2022

I've ordered one ... so I will try to figure out what the problem is

@zenminimalist
Copy link

@bkerler Hey Bjoern,

I have a Note Air 2 and just tried @MlgmXyysd command edl printgpt --loader=prog_firehose_life_ddr_patched.elf --memory=ufs. I got the following output which I'll post below (in the hopes it helps). Not sure what it means, as I'm not a dev and have no clue when it comes to EDL and all that stuff).

Capstone library is missing (optional).
Keystone library is missing (optional).
Qualcomm Sahara / Firehose Client V3.60 (c) B.Kerler 2018-2022.
main - Using loader prog_firehose_life_ddr_patched.elf ...
main - Waiting for the device
main - Device detected :)
sahara - Protocol version: 2.1
main - Mode detected: sahara
sahara

HWID: 0x0014d0e100000000
(MSM_ID:0x0014d0e1,OEM_ID:0x0000,MODEL_ID:0x0000)
CPU detected: "SDM662"
PK_HASH:
0xd40eee56f3194665574109a39267724ae7944134cd53cb767e293d3c40497955
Serial: 0x1fbf42ce
sahara - Protocol version: 2.1
sahara - Uploading loader prog_firehose_life_ddr_patched.elf ...
sahara - 64-Bit mode detected.
sahara - Firehose mode detected, uploading...
sahara - Loader successfully uploaded.
main - Trying to connect to firehose loader ...
firehose - INFO: ufs: SAMSUNG
firehose - INFO: Binary build date: Nov 11 2020 @ 21:33:13
firehose - INFO: Binary build date: Nov 11 2020 @ 21:33:13
firehose - INFO: Chip serial num: 532628174 (0x1fbf42ce)
firehose - INFO: Supported Functions (15):
firehose - INFO: program
firehose - INFO: read
firehose - INFO: nop
firehose - INFO: patch
firehose - INFO: configure
firehose - INFO: setbootablestoragedrive
firehose - INFO: erase
firehose - INFO: power
firehose - INFO: firmwarewrite
firehose - INFO: getstorageinfo
firehose - INFO: benchmark
firehose - INFO: emmc
firehose - INFO: ufs
firehose - INFO: fixgpt
firehose - INFO: getsha256digest
firehose - INFO: End of supported functions 15
firehose
firehose - [LIB]: Couldn't detect MaxPayloadSizeFromTargetinBytes
firehose
firehose - [LIB]: Couldn't detect TargetName
firehose - TargetName=Unknown
firehose - MemoryName=UFS
firehose - Version=1
firehose - Trying to read first storage sector...
firehose - Running configure...
firehose - Storage report:
firehose - total_blocks:14145536
firehose - block_size:4096
firehose - page_size:4096
firehose - num_physical:6
firehose - manufacturer_id:462
firehose - serial_num:1297306958
firehose - fw_version:400
firehose - mem_type:UFS
firehose - prod_name:KM5H7001DM-B424
firehose_client - Supported functions:
-----------------
program,read,nop,patch,configure,setbootablestoragedrive,erase,power,firmwarewri
te,getstorageinfo,benchmark,emmc,ufs,fixgpt,getsha256digest
firehose
firehose - [LIB]: INFO: Calling handler for read
firehose
firehose - [LIB]: ERROR: Failed to open the UFS Device slot 0 partition 6
firehose
firehose - [LIB]: ERROR: Failed to open the device:3 slot:0 partition:6 error:0
firehose
firehose - [LIB]: ERROR: OPEN handle NULL and no error, weird 203949180
firehose
firehose - [LIB]: ERROR: Failed to open device, type:UFS, slot:0, lun:6 error:3
Parsing Lun 0:
GPT Table:
-------------
ssd: Offset 0x0000000000006000, Length 0x0000000000002000, Flags
0x0000000000000000, UUID 564dd160-74c2-8ef4-42d4-d601c14c8629, Type 0x2c86e742,
Active False
persist: Offset 0x0000000000008000, Length 0x0000000002000000, Flags
0x0000000000000000, UUID 05c50f6c-9a5d-97cf-c065-a82cc0b30506, Type 0x6c95e238,
Active False
misc: Offset 0x0000000002008000, Length 0x0000000000100000, Flags
0x0000000000000000, UUID d4a399d6-16b2-28da-2bd1-843736aa443d, Type 0x82acc91f,
Active False
keystore: Offset 0x0000000002108000, Length 0x0000000000080000, Flags
0x0000000000000000, UUID 08a4a605-a398-92d9-3424-72ca3ef91efe, Type 0xde7d4029,
Active False
frp: Offset 0x0000000002188000, Length 0x0000000000080000, Flags
0x0000000000000000, UUID 382da215-536c-f9cd-0443-ee41c97633b6, Type 0x91b72d4d,
Active False
super: Offset 0x0000000002208000, Length 0x0000000100000000, Flags
0x0000000000000000, UUID ec6482c7-95ea-0f5e-679e-f35e2a81401b, Type 0x89a12de1,
Active False
recovery_a: Offset 0x0000000102208000, Length 0x0000000006000000, Flags
0x1000000000000000, UUID 7d46f4f9-71ea-00bd-8c7b-a6711c38fedb, Type 0xd504d6db,
Active False
recovery_b: Offset 0x0000000108208000, Length 0x0000000006000000, Flags
0x1004000000000000, UUID 094142cf-138f-ef1a-e139-571db24e756d, Type 0x352b8083,
Active True
vbmeta_system_a: Offset 0x000000010e208000, Length 0x0000000000010000, Flags
0x1000000000000000, UUID 90d85797-1f86-dc60-cc7d-f27024841f2b, Type 0x1344859d,
Active False
vbmeta_system_b: Offset 0x000000010e218000, Length 0x0000000000010000, Flags
0x1004000000000000, UUID 9f605cd0-e5e8-b2bb-8f21-4728c129b399, Type 0xfe3ab853,
Active True
metadata: Offset 0x000000010e228000, Length 0x0000000001000000, Flags
0x0000000000000000, UUID 5ddb92bd-d222-b936-02cf-6ae882ed163b, Type 0x988a98c9,
Active False
onyxconfig: Offset 0x000000010f228000, Length 0x0000000001800000, Flags
0x0000000000000000, UUID 8d64a061-36e0-29e0-23dd-6023c58a400c, Type 0x97d7b011,
Active False
userdata: Offset 0x0000000110a28000, Length 0x0000000c6cdd3000, Flags
0x0000000000000000, UUID 45ce138d-2307-933e-1709-34c4fbc59ddc, Type 0x1b81e7e6,
Active False
Total disk size:0x0000000d7d81c000, sectors:0x0000000000d7d81c
Parsing Lun 1:
GPT Table:
-------------
xbl_a: Offset 0x0000000000006000, Length 0x0000000000380000, Flags
0x1040000000000000, UUID 84cae08b-ecd5-2051-b684-c5863222f452, Type 0xdea0ba2c,
Active False
xbl_config_a: Offset 0x0000000000386000, Length 0x0000000000020000, Flags
0x0040000000000000, UUID e5f270be-576a-a5ab-69f1-51610156bc45, Type 0x5a325ae4,
Active False
Total disk size:0x000000000041c000, sectors:0x000000000000041c
Parsing Lun 2:
GPT Table:
-------------
xbl_b: Offset 0x0000000000006000, Length 0x0000000000380000, Flags
0x10c4000000000000, UUID f6ae1c67-3419-335d-ec94-f13cfd736ac3, Type 0xdea0ba2c,
Active True
xbl_config_b: Offset 0x0000000000386000, Length 0x0000000000020000, Flags
0x00c4000000000000, UUID a6d3a35d-e516-4fb1-8860-0cbc40e2c884, Type 0x5a325ae4,
Active True
Total disk size:0x000000000041c000, sectors:0x000000000000041c
Parsing Lun 3:
GPT Table:
-------------
ALIGN_TO_128K_1: Offset 0x0000000000006000, Length 0x000000000001a000, Flags
0x1000000000000000, UUID da2b3e34-ad86-dc30-c077-a7b299ada7a6, Type 0xfde1604b,
Active False
cdt: Offset 0x0000000000020000, Length 0x0000000000020000, Flags
0x1000000000000000, UUID 104581d3-0bc8-c3a6-6adb-7c61bf34efeb, Type 0xa19f205f,
Active False
ddr: Offset 0x0000000000040000, Length 0x0000000000100000, Flags
0x1000000000000000, UUID fe4a9bc5-245c-0a97-43f3-dfbb7cfc5b82, Type 0x20a0c19c,
Active False
Total disk size:0x000000000801c000, sectors:0x000000000000801c
Parsing Lun 4:
GPT Table:
-------------
rpm_a: Offset 0x0000000000006000, Length 0x0000000000080000, Flags
0x1040000000000000, UUID fd61587c-ef40-c132-b5e2-adf82ed3a48f, Type 0x77036cd4,
Active False
tz_a: Offset 0x0000000000086000, Length 0x0000000000400000, Flags
0x1040000000000000, UUID 48673392-7048-c93a-0bf3-2f619ab31faa, Type 0x77036cd4,
Active False
hyp_a: Offset 0x0000000000486000, Length 0x0000000000080000, Flags
0x0040000000000000, UUID 76959e7e-8345-f3b1-b578-80102fb043f4, Type 0x77036cd4,
Active False
modem_a: Offset 0x0000000000506000, Length 0x000000000b400000, Flags
0x1040000000000000, UUID 4dc95ebd-e1b1-178f-ef9c-0778b0660c12, Type 0x77036cd4,
Active False
bluetooth_a: Offset 0x000000000b906000, Length 0x0000000000100000, Flags
0x1040000000000000, UUID 26230ba8-66b9-5807-e47b-1ff7a6eb3709, Type 0x77036cd4,
Active False
mdtpsecapp_a: Offset 0x000000000ba06000, Length 0x0000000000400000, Flags
0x1040000000000000, UUID 9533f6df-2597-4ff1-6467-0741ab4a7327, Type 0x77036cd4,
Active False
mdtp_a: Offset 0x000000000be06000, Length 0x0000000002000000, Flags
0x1040000000000000, UUID fabb1284-8f8e-6db8-46cd-68feaff02c7b, Type 0x77036cd4,
Active False
abl_a: Offset 0x000000000de06000, Length 0x0000000000100000, Flags
0x1040000000000000, UUID 4d4453e1-a662-879a-862f-5b258b8b956f, Type 0x77036cd4,
Active False
dsp_a: Offset 0x000000000df06000, Length 0x0000000002000000, Flags
0x1040000000000000, UUID ce34c964-2bc2-4970-b957-73aac714a8c5, Type 0x77036cd4,
Active False
keymaster_a: Offset 0x000000000ff06000, Length 0x0000000000080000, Flags
0x1040000000000000, UUID 73204943-4b68-bcc7-bbf9-bd02b15d247d, Type 0x77036cd4,
Active False
boot_a: Offset 0x000000000ff86000, Length 0x0000000006000000, Flags
0x0073000000000000, UUID 2794bf59-f4f2-365d-b7e2-a09b936ed2f4, Type 0x77036cd4,
Active False
cmnlib_a: Offset 0x0000000015f86000, Length 0x0000000000080000, Flags
0x1040000000000000, UUID ff26e81d-deb7-95c6-a85f-3333299af593, Type 0x77036cd4,
Active False
cmnlib64_a: Offset 0x0000000016006000, Length 0x0000000000080000, Flags
0x1040000000000000, UUID 7c2e191c-2591-df58-7bda-d3de8abcff7d, Type 0x77036cd4,
Active False
devcfg_a: Offset 0x0000000016086000, Length 0x0000000000020000, Flags
0x0040000000000000, UUID a5dbd0d6-cef2-2618-2212-4e4293498f30, Type 0x77036cd4,
Active False
qupfw_a: Offset 0x00000000160a6000, Length 0x0000000000010000, Flags
0x0040000000000000, UUID ee942380-9ec6-4401-d302-6620d18ac4f0, Type 0x77036cd4,
Active False
vbmeta_a: Offset 0x00000000160b6000, Length 0x0000000000010000, Flags
0x1040000000000000, UUID 8b25da1f-f275-c41d-65ae-febf0952dae8, Type 0x77036cd4,
Active False
dtbo_a: Offset 0x00000000160c6000, Length 0x0000000001800000, Flags
0x0040000000000000, UUID f62ba866-90ed-2f8e-21fc-cb5ee49898f1, Type 0x77036cd4,
Active False
imagefv_a: Offset 0x00000000178c6000, Length 0x0000000000200000, Flags
0x0040000000000001, UUID b490044a-c3da-b4dd-bb46-700d1d78f840, Type 0x77036cd4,
Active False
uefisecapp_a: Offset 0x0000000017ac6000, Length 0x0000000000200000, Flags
0x0000000000000000, UUID 39365aaa-7a90-2a4c-df77-cdd8bf713263, Type 0xbe8a7e08,
Active False
featenabler_a: Offset 0x0000000017cc6000, Length 0x0000000000020000, Flags
0x0000000000000000, UUID 9e674584-a25c-5a75-afcb-5d3e65814842, Type 0x741813d2,
Active False
rpm_b: Offset 0x0000000017ce6000, Length 0x0000000000080000, Flags
0x007f000000000000, UUID be5c06c1-e412-a2e9-e2b0-7f844bad3864, Type 0x98df793,
Active True
tz_b: Offset 0x0000000017d66000, Length 0x0000000000400000, Flags
0x007f000000000000, UUID 62929835-0df0-01d3-dbea-68e9e2668504, Type 0xa053aa7f,
Active True
hyp_b: Offset 0x0000000018166000, Length 0x0000000000080000, Flags
0x007f000000000000, UUID bf1366d0-5d84-69e2-6773-22621fb34245, Type 0xe1a6a689,
Active True
modem_b: Offset 0x00000000181e6000, Length 0x000000000b400000, Flags
0x107f000000000000, UUID 0282a2c2-99b4-c969-47e1-39ca7480a059, Type
EFI_BASIC_DATA, Active True
bluetooth_b: Offset 0x00000000235e6000, Length 0x0000000000100000, Flags
0x107f000000000000, UUID c9d4ee3c-ca8e-8659-ca9a-82875855261a, Type 0x6cb747f1,
Active True
mdtpsecapp_b: Offset 0x00000000236e6000, Length 0x0000000000400000, Flags
0x107f000000000000, UUID 35632fbf-3cd4-b7ad-d9d4-004d2d6d84ef, Type 0xea02d680,
Active True
mdtp_b: Offset 0x0000000023ae6000, Length 0x0000000002000000, Flags
0x107f000000000000, UUID 212676bc-130f-eb32-87d4-c090e91173af, Type 0x3878408a,
Active True
abl_b: Offset 0x0000000025ae6000, Length 0x0000000000100000, Flags
0x107f000000000000, UUID 1be96389-4a6d-6cd0-ee18-371fc2d6389a, Type 0xbd6928a1,
Active True
dsp_b: Offset 0x0000000025be6000, Length 0x0000000002000000, Flags
0x107f000000000000, UUID b7c0bc5d-764b-ab0e-f225-5eca4c94adb3, Type 0x7efe5010,
Active True
keymaster_b: Offset 0x0000000027be6000, Length 0x0000000000080000, Flags
0x107f000000000000, UUID bb983733-d884-1ba4-5171-93234188c332, Type 0xa11d2a7c,
Active True
boot_b: Offset 0x0000000027c66000, Length 0x0000000006000000, Flags
0x0077000000000000, UUID c6a0e9c0-533a-266b-5e02-f18923a58cb8, Type 0x20117f86,
Active True
cmnlib_b: Offset 0x000000002dc66000, Length 0x0000000000080000, Flags
0x107f000000000000, UUID e570b8f7-db9f-c3cc-3b90-3eac7c975600, Type 0x73471795,
Active True
cmnlib64_b: Offset 0x000000002dce6000, Length 0x0000000000080000, Flags
0x107f000000000000, UUID 5726b0ff-95c3-4a59-c6de-159062c89ec3, Type 0x8ea64893,
Active True
devcfg_b: Offset 0x000000002dd66000, Length 0x0000000000020000, Flags
0x007f000000000000, UUID e2efc09f-18e5-33b3-54d2-c0e8bebd7a2d, Type 0xf65d4b16,
Active True
qupfw_b: Offset 0x000000002dd86000, Length 0x0000000000010000, Flags
0x007f000000000000, UUID c2dac47f-dd85-1c06-3829-7a8cd4d2501e, Type 0x21d1219f,
Active True
vbmeta_b: Offset 0x000000002dd96000, Length 0x0000000000010000, Flags
0x107f000000000000, UUID 016f05f5-35fa-c647-9535-a2878fbedc2c, Type 0x4b7a15d6,
Active True
dtbo_b: Offset 0x000000002dda6000, Length 0x0000000001800000, Flags
0x007f000000000000, UUID 001e0295-ea42-22b2-3df4-51ed89c8e7c7, Type 0x24d0d418,
Active True
featenabler_b: Offset 0x000000002f5a6000, Length 0x0000000000020000, Flags
0x0004000000000000, UUID ac30b452-6829-1438-f7fe-d32133355554, Type 0x77036cd4,
Active True
imagefv_b: Offset 0x000000002f5c6000, Length 0x0000000000200000, Flags
0x007f000000000001, UUID 7a936a0b-3bc8-574d-206c-e91bcfd2c45c, Type 0x17911177,
Active True
uefisecapp_b: Offset 0x000000002f7c6000, Length 0x0000000000200000, Flags
0x0004000000000000, UUID bd55f021-e974-abfe-fde4-6a2c3aab4bde, Type 0x77036cd4,
Active True
devinfo: Offset 0x000000002f9c6000, Length 0x0000000000001000, Flags
0x1000000000000000, UUID 6c891958-bb60-6c5f-9e12-d012799ab53f, Type 0x65addcf4,
Active False
dip: Offset 0x000000002f9c7000, Length 0x0000000000100000, Flags
0x1000000000000000, UUID 116dc63b-c1e3-6a4c-1640-d51483a5a272, Type 0x4114b077,
Active False
apdp: Offset 0x000000002fac7000, Length 0x0000000000040000, Flags
0x0000000000000000, UUID 21fdf668-70f0-a092-ba53-5a29c0549a90, Type 0xe6e98da2,
Active False
spunvm: Offset 0x000000002fb07000, Length 0x0000000000800000, Flags
0x0000000000000000, UUID c60370ae-0b79-132d-da41-071716008738, Type 0xe42e2b4c,
Active False
splash: Offset 0x0000000030307000, Length 0x00000000020a4000, Flags
0x0000000000000000, UUID 46435535-2b13-5967-7581-58a070c803b4, Type 0xad99f201,
Active False
limits: Offset 0x00000000323ab000, Length 0x0000000000001000, Flags
0x1000000000000000, UUID 279c5ebc-4a97-3788-4c1d-097f98234f3c, Type 0x10a0c19c,
Active False
toolsfv: Offset 0x00000000323ac000, Length 0x0000000000100000, Flags
0x1000000000000000, UUID b2fa039c-2dfb-cf91-4391-6accdc8ef3f7, Type 0x97745aba,
Active False
logfs: Offset 0x00000000324ac000, Length 0x0000000000800000, Flags
0x0000000000000000, UUID 3210b7b2-3632-22e8-d5f3-28ee0313e4ed, Type 0xbc0330eb,
Active False
cateloader: Offset 0x0000000032cac000, Length 0x0000000000200000, Flags
0x0000000000000000, UUID 90b68734-3090-1fa7-b295-c5c6f3ab4f4c, Type 0xaa9a5c4c,
Active False
rawdump: Offset 0x0000000032eac000, Length 0x0000000008000000, Flags
0x0000000000000000, UUID 1f61a3a4-c168-8d1e-27ef-96d6e6bdb74e, Type 0x66c9b323,
Active False
logdump: Offset 0x000000003aeac000, Length 0x0000000004000000, Flags
0x0000000000000000, UUID bab65470-0bcd-82ff-240c-f66b541bde80, Type 0x5af80809,
Active False
storsec: Offset 0x000000003eeac000, Length 0x0000000000020000, Flags
0x1000000000000000, UUID 84d96e13-d467-3e86-62b3-28c19c8a8483, Type 0x2db45fe,
Active False
multiimgoem: Offset 0x000000003eecc000, Length 0x0000000000008000, Flags
0x1000000000000000, UUID 7f2f828f-ba8b-5520-8092-81a592f8fac4, Type 0xe126a436,
Active False
multiimgqti: Offset 0x000000003eed4000, Length 0x0000000000008000, Flags
0x1000000000000000, UUID a425b3a7-2bb8-98f2-8d39-a31159513155, Type 0x846c6f05,
Active False
uefivarstore: Offset 0x000000003eedc000, Length 0x0000000000080000, Flags
0x1000000000000000, UUID 20c9a153-11c1-c921-b156-5a20e00e907c, Type 0x165bd6bc,
Active False
secdata: Offset 0x000000003ef5c000, Length 0x0000000000007000, Flags
0x1000000000000000, UUID 3a5db6ff-1fb0-3987-193a-123b509634a0, Type 0x76cfc7ef,
Active False
catefv: Offset 0x000000003ef63000, Length 0x0000000000080000, Flags
0x1000000000000000, UUID 53c69284-2536-c584-f247-b2e2e9690099, Type 0x80c23c26,
Active False
catecontentfv: Offset 0x000000003efe3000, Length 0x0000000000100000, Flags
0x1000000000000000, UUID 356742d9-09f4-853c-f177-8d901d0a201d, Type 0xe12d830b,
Active False
Total disk size:0x000000010001c000, sectors:0x000000000010001c
Parsing Lun 5:
GPT Table:
-------------
ALIGN_TO_128K_2: Offset 0x0000000000006000, Length 0x000000000001a000, Flags
0x1000000000000000, UUID 7eb5554e-c2a5-fe3d-9719-bc43663ccbfa, Type 0x6891a3b7,
Active False
modemst1: Offset 0x0000000000020000, Length 0x0000000000200000, Flags
0x0000000000000000, UUID cb8d50db-c818-563d-8de5-b647509a05b3, Type 0xebbeadaf,
Active False
modemst2: Offset 0x0000000000220000, Length 0x0000000000200000, Flags
0x0000000000000000, UUID 9eefc3e6-4662-c546-996a-64ea2ecfcfdc, Type 0xa288b1f,
Active False
fsg: Offset 0x0000000000420000, Length 0x0000000000200000, Flags
0x1000000000000000, UUID b0746a4c-7a0e-5ab3-48a7-82aa8a360fe3, Type 0x638ff8e2,
Active False
fsc: Offset 0x0000000000620000, Length 0x0000000000020000, Flags
0x0000000000000000, UUID 19366ed1-6553-ef46-e3a1-f857909cda0b, Type 0x57b90a16,
Active False
Total disk size:0x000000006001c000, sectors:0x000000000006001c
firehose
firehose - [LIB]: INFO: Calling handler for read
firehose
firehose - [LIB]: ERROR: Failed to open the UFS Device slot 0 partition 6
firehose
firehose - [LIB]: ERROR: Failed to open the device:3 slot:0 partition:6 error:0
firehose
firehose - [LIB]: ERROR: OPEN handle NULL and no error, weird 203949180
firehose
firehose - [LIB]: ERROR: Failed to open device, type:UFS, slot:0, lun:6 error:3```

@RenateUSB
Copy link

Most (all?) of the Onyx with UFS have 6 LUNs, LUN 0 - LUN 5. You'll get an error querying LUN 6. This is to be expected.

@bkerler
Copy link
Owner

bkerler commented Apr 7, 2023

Ok, my Onxy Boox Note Air 2 (new HW Variant) also didn't work. But it seems I've found a fix now :) I've added the fix to the latest commit onxy_boox_air_2_variant2.zip
To enter edl, just power off the device and use the edl cable (short id + gnd on connect).

@bkerler bkerler closed this as completed Apr 7, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

10 participants