Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is it possible to fix my A10X iPad stuck into recovery mode after DelayOTA? #277

Open
i1itione opened this issue Nov 30, 2023 · 3 comments

Comments

@i1itione
Copy link

The device is iPad Pro 2 (12.9 inch), it was iOS 13.7 and I used Chimera to jailbreak it, but now I want to upgrade it to iPadOS 16.6, therefore I follow the DelayOTA guide, setup every needed things and restore RootFS in Chimera before applying OTA.

After OTA downloaded, I press install button to start installing the update, and the iPad reboots few times and there is progress bar, but now the iPad stuck into recovery mode, maybe something wrong happened during installing OTA files?

Is it possible to fix this problem via SSHRD? Because I don't want to updgrade this iPad to iPadOS 17 by iTunes.

@chrismichaelmonaghan
Copy link

Have you tried using the command line tool iRecovery?
./irecovery -n
https://github.com/libimobiledevice/libirecovery

@i1itione
Copy link
Author

i1itione commented Dec 3, 2023

Have you tried using the command line tool iRecovery? ./irecovery -n https://github.com/libimobiledevice/libirecovery

Yes, but no luck, then I tried using FutureRestore with dumped blobs via SSHRD, I got a problem with firmware key not available.

(the device info seems contain personal id, I replace it with xxxxxxx here)

irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode
Found device in DFU mode
Identified device as j120ap, iPad7,1
Extracting BuildManifest from iPSW
Product version: 13.7
Product build: 17H35 Major: 17
Device supports Image4: true
[TSSR] Checking BuildIdentity 0
[TSSR] Selected BuildIdentity for request
[TSSR] Checking BuildIdentity 0
[TSSR] Selected BuildIdentity for request
checking if the APTicket is valid for this restore...
Verified ECID in APTicket matches the device's ECID
checking if the APTicket is valid for this restore...
Verified ECID in APTicket matches the device's ECID
[IMG4TOOL] checking buildidentity 0:
[IMG4TOOL] checking buildidentity matches board ... YES
[IMG4TOOL] checking buildidentity has all required hashes:
[IMG4TOOL] checking hash for "AOP" OK (found "aopf" with matching hash)
[IMG4TOOL] checking hash for "AppleLogo" OK (found "logo" with matching hash)
[IMG4TOOL] checking hash for "BatteryCharging0" OK (found "chg0" with matching hash)
[IMG4TOOL] checking hash for "BatteryCharging1" OK (found "chg1" with matching hash)
[IMG4TOOL] checking hash for "BatteryFull" OK (found "batF" with matching hash)
[IMG4TOOL] checking hash for "BatteryLow0" OK (found "bat0" with matching hash)
[IMG4TOOL] checking hash for "BatteryLow1" OK (found "bat1" with matching hash)
[IMG4TOOL] checking hash for "BatteryPlugin" OK (found "glyP" with matching hash)
[IMG4TOOL] checking hash for "DeviceTree" OK (found "dtre" with matching hash)
[IMG4TOOL] checking hash for "KernelCache" OK (found "krnl" with matching hash)
[IMG4TOOL] checking hash for "LLB" OK (found "illb" with matching hash)
[IMG4TOOL] checking hash for "OS" OK (found "rosi" with matching hash)
[IMG4TOOL] checking hash for "RecoveryMode" OK (found "recm" with matching hash)
[IMG4TOOL] checking hash for "RestoreDeviceTree" OK (found "rdtr" with matching hash)
[IMG4TOOL] checking hash for "RestoreKernelCache" OK (found "rkrn" with matching hash)
[IMG4TOOL] checking hash for "RestoreLogo" OK (found "rlgo" with matching hash)
[IMG4TOOL] checking hash for "RestoreRamDisk" OK (found "rdsk" with matching hash)
[IMG4TOOL] checking hash for "RestoreSEP" OK (found "rsep" with matching hash)
[IMG4TOOL] checking hash for "RestoreTrustCache" OK (found "rtsc" with matching hash)
[IMG4TOOL] checking hash for "SEP" OK (found "sepi" with matching hash)
[IMG4TOOL] checking hash for "StaticTrustCache" OK (found "trst" with matching hash)
[IMG4TOOL] checking hash for "ftap" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "ftsp" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "iBEC" OK (found "ibec" with matching hash)
[IMG4TOOL] checking hash for "iBSS" OK (found "ibss" with matching hash)
[IMG4TOOL] checking hash for "iBoot" OK (found "ibot" with matching hash)
[IMG4TOOL] checking hash for "rfta" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "rfts" IGN (no digest in BuildManifest)
Verified APTicket to be valid for this restore
Variant: Customer Erase Install (IPSW)
This restore will erase all device data.
irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode
Device found in DFU Mode.
Getting firmware keys for: j120ap
Cleaning up...
[exception]:
what=getting keys failed with error: 14745615 (failed to get FirmwareJson from Server). Are keys publicly available?
code=41680950
line=636
file=/tmp/Builder/repos/futurerestore/src/futurerestore.cpp
commit count=308
commit sha =9554c0068dc50e141872ced5da2bd95baa595805
Done: restoring failed!

@lnguyen234
Copy link

Have you tried using the command line tool iRecovery? ./irecovery -n https://github.com/libimobiledevice/libirecovery

Yes, but no luck, then I tried using FutureRestore with dumped blobs via SSHRD, I got a problem with firmware key not available.

(the device info seems contain personal id, I replace it with xxxxxxx here)

irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode Found device in DFU mode Identified device as j120ap, iPad7,1 Extracting BuildManifest from iPSW Product version: 13.7 Product build: 17H35 Major: 17 Device supports Image4: true [TSSR] Checking BuildIdentity 0 [TSSR] Selected BuildIdentity for request [TSSR] Checking BuildIdentity 0 [TSSR] Selected BuildIdentity for request checking if the APTicket is valid for this restore... Verified ECID in APTicket matches the device's ECID checking if the APTicket is valid for this restore... Verified ECID in APTicket matches the device's ECID [IMG4TOOL] checking buildidentity 0: [IMG4TOOL] checking buildidentity matches board ... YES [IMG4TOOL] checking buildidentity has all required hashes: [IMG4TOOL] checking hash for "AOP" OK (found "aopf" with matching hash) [IMG4TOOL] checking hash for "AppleLogo" OK (found "logo" with matching hash) [IMG4TOOL] checking hash for "BatteryCharging0" OK (found "chg0" with matching hash) [IMG4TOOL] checking hash for "BatteryCharging1" OK (found "chg1" with matching hash) [IMG4TOOL] checking hash for "BatteryFull" OK (found "batF" with matching hash) [IMG4TOOL] checking hash for "BatteryLow0" OK (found "bat0" with matching hash) [IMG4TOOL] checking hash for "BatteryLow1" OK (found "bat1" with matching hash) [IMG4TOOL] checking hash for "BatteryPlugin" OK (found "glyP" with matching hash) [IMG4TOOL] checking hash for "DeviceTree" OK (found "dtre" with matching hash) [IMG4TOOL] checking hash for "KernelCache" OK (found "krnl" with matching hash) [IMG4TOOL] checking hash for "LLB" OK (found "illb" with matching hash) [IMG4TOOL] checking hash for "OS" OK (found "rosi" with matching hash) [IMG4TOOL] checking hash for "RecoveryMode" OK (found "recm" with matching hash) [IMG4TOOL] checking hash for "RestoreDeviceTree" OK (found "rdtr" with matching hash) [IMG4TOOL] checking hash for "RestoreKernelCache" OK (found "rkrn" with matching hash) [IMG4TOOL] checking hash for "RestoreLogo" OK (found "rlgo" with matching hash) [IMG4TOOL] checking hash for "RestoreRamDisk" OK (found "rdsk" with matching hash) [IMG4TOOL] checking hash for "RestoreSEP" OK (found "rsep" with matching hash) [IMG4TOOL] checking hash for "RestoreTrustCache" OK (found "rtsc" with matching hash) [IMG4TOOL] checking hash for "SEP" OK (found "sepi" with matching hash) [IMG4TOOL] checking hash for "StaticTrustCache" OK (found "trst" with matching hash) [IMG4TOOL] checking hash for "ftap" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "ftsp" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "iBEC" OK (found "ibec" with matching hash) [IMG4TOOL] checking hash for "iBSS" OK (found "ibss" with matching hash) [IMG4TOOL] checking hash for "iBoot" OK (found "ibot" with matching hash) [IMG4TOOL] checking hash for "rfta" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "rfts" IGN (no digest in BuildManifest) Verified APTicket to be valid for this restore Variant: Customer Erase Install (IPSW) This restore will erase all device data. irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode Device found in DFU Mode. Getting firmware keys for: j120ap Cleaning up... [exception]: what=getting keys failed with error: 14745615 (failed to get FirmwareJson from Server). Are keys publicly available? code=41680950 line=636 file=/tmp/Builder/repos/futurerestore/src/futurerestore.cpp commit count=308 commit sha =9554c0068dc50e141872ced5da2bd95baa595805 Done: restoring failed!

Have you figured this out? my iPad stuck in Recovery after install TrollStore

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants