Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kernel64Patcher fails #134

Open
thewasteking opened this issue Jan 25, 2025 · 1 comment
Open

Kernel64Patcher fails #134

thewasteking opened this issue Jan 25, 2025 · 1 comment

Comments

@thewasteking
Copy link

I am downgrading my iPod Touch 7 to iOS 14.5. Everything goes normal, until it reboots into recovery mode.

macOS 10.14, MacBook Air (13", early 2015)

[] Waiting for devices
[
] Detected recovery mode device
[] Waiting for devices
[
] Detected recovery mode device
[] Getting device info...
Detected cpid, your cpid is 0x8010
Detected model, your model is n112ap
Detected deviceid, your deviceid is iPod9,1
[
] To get into DFU mode, you will be guided through 2 steps:
[] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (4)
[
] Device entered DFU!
[-] we found ipsw/iPod9,1-14.5.ipsw, do you want to use it ? please write, yes or no
yes
ipsw/iPod9,1-14.5.ipsw
[] Checking if the ipsw is for your device
[
] Checking ipsw version
[] Extracting ipsw, hang on please ...
[
] Got extract the IPSW successfully
[] Creating ramdisk
[-] Ramdisk is already created so SKIPPING ...
[
] Booting ramdisk
[/] We couldn't get the ipsw curl. we will proceed with -k option with curl
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: RESET
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SPRAY
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SETUP
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: PATCH
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33] PWND:[gaster]
Found the USB handle.
Now you can boot untrusted images.
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[] Waiting for the ramdisk to finish booting
Error connecting to device: No such file or directory
Warning: Permanently added '[localhost]:2222' (ECDSA) to the list of known hosts.
[
] Mounting filesystems ...
[] Dumpped SHSH
[
] Checking device version
the version that the device is currently in is 15.8.3
[] extracting kernel ...
[
] extracted
Reboot into recovery mode ...
[] To get into DFU mode, you will be guided through 2 steps:
[
] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (3)
[] Device entered DFU!
[
]Patching some boot files...
[] Finished moving the boot files to work
[
] Decrypthing ibss and iboot
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: RESET
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SPRAY
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SETUP
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: PATCH
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33] PWND:[gaster]
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
[*] Patching the kernel
dyld: cannot load 'Kernel64Patcher' (load command 0x80000034 is unknown)
/Users/antonlando/Downloads/downr1n-main/downr1n.sh: line 1353: 31141 Abort trap: 6 "$dir"/Kernel64Patcher work/kcache.raw work/kcache.patched if [ "$ptraceDisabled" = "1" ]; then echo "-t"; fi if [ "$aslrDisabled" = "1" ]; then echo "-c"; fi if [[ "$version" = "15."* ]]; then echo "-e -o -r -b15"; fi if [[ "$version" = "14."* ]]; then echo "-b"; fi if [[ "$version" = "13."* ]]; then echo "-b13 -n"; fi > /dev/null

@edwin170
Copy link
Owner

use an more updated version of MacOS

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants