Closed jasonj0820 closed 12 months ago
Hi, I am quite new to linux and when i tried to downgrade my iphone 6s to ios 14.8, the commands wont go pass "found USB handle". I dont know if im missing some driver or smth. Please help.
Code: jason@jason-GF63-8RD:~/Downloads/downr1n$ sudo ./downr1n.sh --downgrade 14.8 [sudo] password for jason: [*] Command ran: sudo ./downr1n.sh --downgrade 14.8 [22:35:49.241][3] usbmuxd v1.1.1 starting up [22:35:49.241][1] Another instance is already running (pid 15640). exiting. downr1n | Version 1.0 Created by edwin, thanks sunst0rm, and all people creator of path file boot
[] Waiting for devices [] Detected DFU mode device [] Getting device info... 0x8000 n71ap iPhone8,1 [] Continuing... extracting ipsw, hang on please ... Archive: ipsw/iPhone_4.7_14.8_18H17Restore.ipsw 'ipsw/extracted//BuildManifest.plist' -> 'work/BuildManifest.plist' now the IPSW is extracted [] Creating ramdisk [-] Ramdisk is already created so SKIPPING ... [_] Booting ramdisk usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. usbtimeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% bind(): Address in use Error creating socket for listen port 2222: Address in use [] Waiting for the ramdisk to finish booting seputil: Gigalocker file (/mnt7/9AD9337E-2FED-517A-8218-72ED70655D64.gl) exists seputil: Gigalocker initialization completed sepi digest (20 bytes): 20402a449340e9e619921e6b2fab74abb8bb2fdd sepi nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 rsep digest (20 bytes): 17aea80c5aca463d7a7296027afd32c81a2eb60b rsep nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE Compiled with plist: YES Saved IM4M to work/IM4M Dumpped SHSH [_] Patching kernel ... Reading work/kernelcache... [NOTE] Image4 payload data is LZSS compressed, decompressing... Extracted extra Image4 payload data: to work/kpp.bin. Extracted Image4 payload data to: work/kcache.raw sending incremental file list kcache.raw
sent 90 bytes received 43,638 bytes 17,491.20 bytes/sec total size is 38,764,544 speedup is 886.49 sending incremental file list Kernel15Patcher.ios
sent 99 bytes received 1,139 bytes 2,476.00 bytes/sec total size is 128,736 speedup is 103.99 ./downr1n.sh: line 820: [: too many arguments receiving incremental file list kcache.patched
sent 43 bytes received 14,480,760 bytes 4,137,372.29 bytes/sec total size is 38,764,544 speedup is 2.68 [] To get into DFU mode, you will be guided through 2 steps: [] Press any key when ready for DFU mode Get ready (0) Release power button, but keep holding home button (9) Release power button, but keep holding home button (2) [] Device entered DFU! [ ]Patchimg some boot files... trst [] Finished moving the boot files to work [] Pwning device usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: RESET ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SETUP ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SPRAY ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: PATCH ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [*] Resetting DFU state usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle.
something is broken on gaster downr1n, need ti check it so please wait for the fix and I will tell you it
@edwin170 Has this been resolved yet?
@edwin170 Has this been resolved yet?
please git pull, and try again and let me know if it worked
Freezing on "Compressing payload using LZSS..." now. @edwin170 Left it for about 20 mins thusfar and no activity or indication of furthering, also not showing as using disk in activity monitor. iPhone 8, restoring to ios 14.3
That was attempted on python 3.11 ^, I'm trying with python3.8 now.
Python3.8 makes it instantly crash on compressing payload using LZSS.
EDIT: It's also crashing on Python3.11 now.
Hi, I am quite new to linux and when i tried to downgrade my iphone 6s to ios 14.8, the commands wont go pass "found USB handle". I dont know if im missing some driver or smth. Please help.
Code: jason@jason-GF63-8RD:~/Downloads/downr1n$ sudo ./downr1n.sh --downgrade 14.8 [sudo] password for jason: [*] Command ran: sudo ./downr1n.sh --downgrade 14.8 [22:35:49.241][3] usbmuxd v1.1.1 starting up [22:35:49.241][1] Another instance is already running (pid 15640). exiting. downr1n | Version 1.0 Created by edwin, thanks sunst0rm, and all people creator of path file boot
[] Waiting for devices [] Detected DFU mode device [] Getting device info... 0x8000 n71ap iPhone8,1 [] Continuing... extracting ipsw, hang on please ... Archive: ipsw/iPhone_4.7_14.8_18H17Restore.ipsw 'ipsw/extracted//BuildManifest.plist' -> 'work/BuildManifest.plist' now the IPSW is extracted [] Creating ramdisk [-] Ramdisk is already created so SKIPPING ... [_] Booting ramdisk usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. usbtimeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% bind(): Address in use Error creating socket for listen port 2222: Address in use [] Waiting for the ramdisk to finish booting seputil: Gigalocker file (/mnt7/9AD9337E-2FED-517A-8218-72ED70655D64.gl) exists seputil: Gigalocker initialization completed sepi digest (20 bytes): 20402a449340e9e619921e6b2fab74abb8bb2fdd sepi nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 rsep digest (20 bytes): 17aea80c5aca463d7a7296027afd32c81a2eb60b rsep nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE Compiled with plist: YES Saved IM4M to work/IM4M Dumpped SHSH [_] Patching kernel ... Reading work/kernelcache... [NOTE] Image4 payload data is LZSS compressed, decompressing... Extracted extra Image4 payload data: to work/kpp.bin. Extracted Image4 payload data to: work/kcache.raw sending incremental file list kcache.raw
sent 90 bytes received 43,638 bytes 17,491.20 bytes/sec total size is 38,764,544 speedup is 886.49 sending incremental file list Kernel15Patcher.ios
sent 99 bytes received 1,139 bytes 2,476.00 bytes/sec total size is 128,736 speedup is 103.99 ./downr1n.sh: line 820: [: too many arguments receiving incremental file list kcache.patched
sent 43 bytes received 14,480,760 bytes 4,137,372.29 bytes/sec total size is 38,764,544 speedup is 2.68 [] To get into DFU mode, you will be guided through 2 steps: [] Press any key when ready for DFU mode Get ready (0) Release power button, but keep holding home button (9) Release power button, but keep holding home button (2) [] Device entered DFU! [ ]Patchimg some boot files... trst [] Finished moving the boot files to work [] Pwning device usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: RESET ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SETUP ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SPRAY ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: PATCH ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [*] Resetting DFU state usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle.
git pull and try again please
Python3.8 makes it instantly crash on compressing payload using LZSS.
EDIT: It's also crashing on Python3.11 now.
update pyimg4
Hi, I am quite new to linux and when i tried to downgrade my iphone 6s to ios 14.8, the commands wont go pass "found USB handle". I dont know if im missing some driver or smth. Please help.
Code: jason@jason-GF63-8RD:~/Downloads/downr1n$ sudo ./downr1n.sh --downgrade 14.8 [sudo] password for jason:
[*] Command ran: sudo ./downr1n.sh --downgrade 14.8 [22:35:49.241][3] usbmuxd v1.1.1 starting up [22:35:49.241][1] Another instance is already running (pid 15640). exiting. downr1n | Version 1.0 Created by edwin, thanks sunst0rm, and all people creator of path file boot
[] Waiting for devices [] Detected DFU mode device [] Getting device info... 0x8000 n71ap iPhone8,1 [] Continuing... extracting ipsw, hang on please ... Archive: ipsw/iPhone_4.7_14.8_18H17_Restore.ipsw 'ipsw/extracted//BuildManifest.plist' -> 'work/BuildManifest.plist' now the IPSW is extracted [] Creating ramdisk [-] Ramdisk is already created so SKIPPING ... [] Booting ramdisk usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% bind(): Address in use Error creating socket for listen port 2222: Address in use [] Waiting for the ramdisk to finish booting seputil: Gigalocker file (/mnt7/9AD9337E-2FED-517A-8218-72ED70655D64.gl) exists seputil: Gigalocker initialization completed sepi digest (20 bytes): 20402a449340e9e619921e6b2fab74abb8bb2fdd sepi nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 rsep digest (20 bytes): 17aea80c5aca463d7a7296027afd32c81a2eb60b rsep nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE Compiled with plist: YES Saved IM4M to work/IM4M Dumpped SHSH [] Patching kernel ... Reading work/kernelcache... [NOTE] Image4 payload data is LZSS compressed, decompressing... Extracted extra Image4 payload data: to work/kpp.bin. Extracted Image4 payload data to: work/kcache.raw sending incremental file list kcache.raw
sent 90 bytes received 43,638 bytes 17,491.20 bytes/sec total size is 38,764,544 speedup is 886.49 sending incremental file list Kernel15Patcher.ios
sent 99 bytes received 1,139 bytes 2,476.00 bytes/sec total size is 128,736 speedup is 103.99 ./downr1n.sh: line 820: [: too many arguments receiving incremental file list kcache.patched
sent 43 bytes received 14,480,760 bytes 4,137,372.29 bytes/sec total size is 38,764,544 speedup is 2.68 [] To get into DFU mode, you will be guided through 2 steps: [] Press any key when ready for DFU mode Get ready (0) Release power button, but keep holding home button (9) Release power button, but keep holding home button (2) [] Device entered DFU! [ ]Patchimg some boot files... trst [] Finished moving the boot files to work [] Pwning device usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: RESET ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SETUP ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SPRAY ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: PATCH ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [*] Resetting DFU state usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle.