edwin170 / downr1n

downgrade tethered checkm8 idevices ios 14, 15.
Apache License 2.0
261 stars 36 forks source link

stuck at "Found USB handle" #41

Closed jasonj0820 closed 12 months ago

jasonj0820 commented 1 year ago

Hi, I am quite new to linux and when i tried to downgrade my iphone 6s to ios 14.8, the commands wont go pass "found USB handle". I dont know if im missing some driver or smth. Please help.

Code: jason@jason-GF63-8RD:~/Downloads/downr1n$ sudo ./downr1n.sh --downgrade 14.8 [sudo] password for jason:
[*] Command ran: sudo ./downr1n.sh --downgrade 14.8 [22:35:49.241][3] usbmuxd v1.1.1 starting up [22:35:49.241][1] Another instance is already running (pid 15640). exiting. downr1n | Version 1.0 Created by edwin, thanks sunst0rm, and all people creator of path file boot

[] Waiting for devices [] Detected DFU mode device [] Getting device info... 0x8000 n71ap iPhone8,1 [] Continuing... extracting ipsw, hang on please ... Archive: ipsw/iPhone_4.7_14.8_18H17_Restore.ipsw 'ipsw/extracted//BuildManifest.plist' -> 'work/BuildManifest.plist' now the IPSW is extracted [] Creating ramdisk [-] Ramdisk is already created so SKIPPING ... [] Booting ramdisk usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% bind(): Address in use Error creating socket for listen port 2222: Address in use [] Waiting for the ramdisk to finish booting seputil: Gigalocker file (/mnt7/9AD9337E-2FED-517A-8218-72ED70655D64.gl) exists seputil: Gigalocker initialization completed sepi digest (20 bytes): 20402a449340e9e619921e6b2fab74abb8bb2fdd sepi nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 rsep digest (20 bytes): 17aea80c5aca463d7a7296027afd32c81a2eb60b rsep nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE Compiled with plist: YES Saved IM4M to work/IM4M Dumpped SHSH [] Patching kernel ... Reading work/kernelcache... [NOTE] Image4 payload data is LZSS compressed, decompressing... Extracted extra Image4 payload data: to work/kpp.bin. Extracted Image4 payload data to: work/kcache.raw sending incremental file list kcache.raw

sent 90 bytes received 43,638 bytes 17,491.20 bytes/sec total size is 38,764,544 speedup is 886.49 sending incremental file list Kernel15Patcher.ios

sent 99 bytes received 1,139 bytes 2,476.00 bytes/sec total size is 128,736 speedup is 103.99 ./downr1n.sh: line 820: [: too many arguments receiving incremental file list kcache.patched

sent 43 bytes received 14,480,760 bytes 4,137,372.29 bytes/sec total size is 38,764,544 speedup is 2.68 [] To get into DFU mode, you will be guided through 2 steps: [] Press any key when ready for DFU mode Get ready (0) Release power button, but keep holding home button (9) Release power button, but keep holding home button (2) [] Device entered DFU! [ ]Patchimg some boot files... trst [] Finished moving the boot files to work [] Pwning device usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: RESET ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SETUP ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SPRAY ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: PATCH ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [*] Resetting DFU state usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle.

edwin170 commented 1 year ago

Hi, I am quite new to linux and when i tried to downgrade my iphone 6s to ios 14.8, the commands wont go pass "found USB handle". I dont know if im missing some driver or smth. Please help.

Code: jason@jason-GF63-8RD:~/Downloads/downr1n$ sudo ./downr1n.sh --downgrade 14.8 [sudo] password for jason: [*] Command ran: sudo ./downr1n.sh --downgrade 14.8 [22:35:49.241][3] usbmuxd v1.1.1 starting up [22:35:49.241][1] Another instance is already running (pid 15640). exiting. downr1n | Version 1.0 Created by edwin, thanks sunst0rm, and all people creator of path file boot

[] Waiting for devices [] Detected DFU mode device [] Getting device info... 0x8000 n71ap iPhone8,1 [] Continuing... extracting ipsw, hang on please ... Archive: ipsw/iPhone_4.7_14.8_18H17Restore.ipsw 'ipsw/extracted//BuildManifest.plist' -> 'work/BuildManifest.plist' now the IPSW is extracted [] Creating ramdisk [-] Ramdisk is already created so SKIPPING ... [_] Booting ramdisk usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. usbtimeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% bind(): Address in use Error creating socket for listen port 2222: Address in use [] Waiting for the ramdisk to finish booting seputil: Gigalocker file (/mnt7/9AD9337E-2FED-517A-8218-72ED70655D64.gl) exists seputil: Gigalocker initialization completed sepi digest (20 bytes): 20402a449340e9e619921e6b2fab74abb8bb2fdd sepi nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 rsep digest (20 bytes): 17aea80c5aca463d7a7296027afd32c81a2eb60b rsep nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE Compiled with plist: YES Saved IM4M to work/IM4M Dumpped SHSH [_] Patching kernel ... Reading work/kernelcache... [NOTE] Image4 payload data is LZSS compressed, decompressing... Extracted extra Image4 payload data: to work/kpp.bin. Extracted Image4 payload data to: work/kcache.raw sending incremental file list kcache.raw

sent 90 bytes received 43,638 bytes 17,491.20 bytes/sec total size is 38,764,544 speedup is 886.49 sending incremental file list Kernel15Patcher.ios

sent 99 bytes received 1,139 bytes 2,476.00 bytes/sec total size is 128,736 speedup is 103.99 ./downr1n.sh: line 820: [: too many arguments receiving incremental file list kcache.patched

sent 43 bytes received 14,480,760 bytes 4,137,372.29 bytes/sec total size is 38,764,544 speedup is 2.68 [] To get into DFU mode, you will be guided through 2 steps: [] Press any key when ready for DFU mode Get ready (0) Release power button, but keep holding home button (9) Release power button, but keep holding home button (2) [] Device entered DFU! [ ]Patchimg some boot files... trst [] Finished moving the boot files to work [] Pwning device usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: RESET ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SETUP ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SPRAY ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: PATCH ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [*] Resetting DFU state usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle.

something is broken on gaster downr1n, need ti check it so please wait for the fix and I will tell you it

itsnotrin commented 1 year ago

@edwin170 Has this been resolved yet?

edwin170 commented 1 year ago

@edwin170 Has this been resolved yet?

please git pull, and try again and let me know if it worked

itsnotrin commented 1 year ago

Freezing on "Compressing payload using LZSS..." now. @edwin170 Left it for about 20 mins thusfar and no activity or indication of furthering, also not showing as using disk in activity monitor. iPhone 8, restoring to ios 14.3

itsnotrin commented 1 year ago

That was attempted on python 3.11 ^, I'm trying with python3.8 now.

itsnotrin commented 1 year ago

Python3.8 makes it instantly crash on compressing payload using LZSS.

EDIT: It's also crashing on Python3.11 now.

edwin170 commented 12 months ago

Hi, I am quite new to linux and when i tried to downgrade my iphone 6s to ios 14.8, the commands wont go pass "found USB handle". I dont know if im missing some driver or smth. Please help.

Code: jason@jason-GF63-8RD:~/Downloads/downr1n$ sudo ./downr1n.sh --downgrade 14.8 [sudo] password for jason: [*] Command ran: sudo ./downr1n.sh --downgrade 14.8 [22:35:49.241][3] usbmuxd v1.1.1 starting up [22:35:49.241][1] Another instance is already running (pid 15640). exiting. downr1n | Version 1.0 Created by edwin, thanks sunst0rm, and all people creator of path file boot

[] Waiting for devices [] Detected DFU mode device [] Getting device info... 0x8000 n71ap iPhone8,1 [] Continuing... extracting ipsw, hang on please ... Archive: ipsw/iPhone_4.7_14.8_18H17Restore.ipsw 'ipsw/extracted//BuildManifest.plist' -> 'work/BuildManifest.plist' now the IPSW is extracted [] Creating ramdisk [-] Ramdisk is already created so SKIPPING ... [_] Booting ramdisk usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. usbtimeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% bind(): Address in use Error creating socket for listen port 2222: Address in use [] Waiting for the ramdisk to finish booting seputil: Gigalocker file (/mnt7/9AD9337E-2FED-517A-8218-72ED70655D64.gl) exists seputil: Gigalocker initialization completed sepi digest (20 bytes): 20402a449340e9e619921e6b2fab74abb8bb2fdd sepi nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 rsep digest (20 bytes): 17aea80c5aca463d7a7296027afd32c81a2eb60b rsep nonce (20 bytes): 96376e5d4855ac9d21c2752a1ed320333109b500 img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE Compiled with plist: YES Saved IM4M to work/IM4M Dumpped SHSH [_] Patching kernel ... Reading work/kernelcache... [NOTE] Image4 payload data is LZSS compressed, decompressing... Extracted extra Image4 payload data: to work/kpp.bin. Extracted Image4 payload data to: work/kcache.raw sending incremental file list kcache.raw

sent 90 bytes received 43,638 bytes 17,491.20 bytes/sec total size is 38,764,544 speedup is 886.49 sending incremental file list Kernel15Patcher.ios

sent 99 bytes received 1,139 bytes 2,476.00 bytes/sec total size is 128,736 speedup is 103.99 ./downr1n.sh: line 820: [: too many arguments receiving incremental file list kcache.patched

sent 43 bytes received 14,480,760 bytes 4,137,372.29 bytes/sec total size is 38,764,544 speedup is 2.68 [] To get into DFU mode, you will be guided through 2 steps: [] Press any key when ready for DFU mode Get ready (0) Release power button, but keep holding home button (9) Release power button, but keep holding home button (2) [] Device entered DFU! [ ]Patchimg some boot files... trst [] Finished moving the boot files to work [] Pwning device usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: RESET ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SETUP ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: SPRAY ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Stage: PATCH ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [*] Resetting DFU state usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. usb_timeout: 5 usb_abort_timeout_min: 0 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8000 Found the USB handle. Now you can boot untrusted images. [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle.

git pull and try again please

edwin170 commented 12 months ago

Python3.8 makes it instantly crash on compressing payload using LZSS.

EDIT: It's also crashing on Python3.11 now.

update pyimg4