SSHRD_Script icon indicating copy to clipboard operation
SSHRD_Script copied to clipboard

Is it possible to fix my A10X iPad stuck into recovery mode after DelayOTA?

Open i1itione opened this issue 8 months ago • 3 comments

The device is iPad Pro 2 (12.9 inch), it was iOS 13.7 and I used Chimera to jailbreak it, but now I want to upgrade it to iPadOS 16.6, therefore I follow the DelayOTA guide, setup every needed things and restore RootFS in Chimera before applying OTA.

After OTA downloaded, I press install button to start installing the update, and the iPad reboots few times and there is progress bar, but now the iPad stuck into recovery mode, maybe something wrong happened during installing OTA files?

Is it possible to fix this problem via SSHRD? Because I don't want to updgrade this iPad to iPadOS 17 by iTunes.

i1itione avatar Nov 30 '23 23:11 i1itione

Have you tried using the command line tool iRecovery?
./irecovery -n https://github.com/libimobiledevice/libirecovery

chrismichaelmonaghan avatar Dec 03 '23 13:12 chrismichaelmonaghan

Have you tried using the command line tool iRecovery? ./irecovery -n https://github.com/libimobiledevice/libirecovery

Yes, but no luck, then I tried using FutureRestore with dumped blobs via SSHRD, I got a problem with firmware key not available.

(the device info seems contain personal id, I replace it with xxxxxxx here)

irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode Found device in DFU mode Identified device as j120ap, iPad7,1 Extracting BuildManifest from iPSW Product version: 13.7 Product build: 17H35 Major: 17 Device supports Image4: true [TSSR] Checking BuildIdentity 0 [TSSR] Selected BuildIdentity for request [TSSR] Checking BuildIdentity 0 [TSSR] Selected BuildIdentity for request checking if the APTicket is valid for this restore... Verified ECID in APTicket matches the device's ECID checking if the APTicket is valid for this restore... Verified ECID in APTicket matches the device's ECID [IMG4TOOL] checking buildidentity 0: [IMG4TOOL] checking buildidentity matches board ... YES [IMG4TOOL] checking buildidentity has all required hashes: [IMG4TOOL] checking hash for "AOP" OK (found "aopf" with matching hash) [IMG4TOOL] checking hash for "AppleLogo" OK (found "logo" with matching hash) [IMG4TOOL] checking hash for "BatteryCharging0" OK (found "chg0" with matching hash) [IMG4TOOL] checking hash for "BatteryCharging1" OK (found "chg1" with matching hash) [IMG4TOOL] checking hash for "BatteryFull" OK (found "batF" with matching hash) [IMG4TOOL] checking hash for "BatteryLow0" OK (found "bat0" with matching hash) [IMG4TOOL] checking hash for "BatteryLow1" OK (found "bat1" with matching hash) [IMG4TOOL] checking hash for "BatteryPlugin" OK (found "glyP" with matching hash) [IMG4TOOL] checking hash for "DeviceTree" OK (found "dtre" with matching hash) [IMG4TOOL] checking hash for "KernelCache" OK (found "krnl" with matching hash) [IMG4TOOL] checking hash for "LLB" OK (found "illb" with matching hash) [IMG4TOOL] checking hash for "OS" OK (found "rosi" with matching hash) [IMG4TOOL] checking hash for "RecoveryMode" OK (found "recm" with matching hash) [IMG4TOOL] checking hash for "RestoreDeviceTree" OK (found "rdtr" with matching hash) [IMG4TOOL] checking hash for "RestoreKernelCache" OK (found "rkrn" with matching hash) [IMG4TOOL] checking hash for "RestoreLogo" OK (found "rlgo" with matching hash) [IMG4TOOL] checking hash for "RestoreRamDisk" OK (found "rdsk" with matching hash) [IMG4TOOL] checking hash for "RestoreSEP" OK (found "rsep" with matching hash) [IMG4TOOL] checking hash for "RestoreTrustCache" OK (found "rtsc" with matching hash) [IMG4TOOL] checking hash for "SEP" OK (found "sepi" with matching hash) [IMG4TOOL] checking hash for "StaticTrustCache" OK (found "trst" with matching hash) [IMG4TOOL] checking hash for "ftap" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "ftsp" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "iBEC" OK (found "ibec" with matching hash) [IMG4TOOL] checking hash for "iBSS" OK (found "ibss" with matching hash) [IMG4TOOL] checking hash for "iBoot" OK (found "ibot" with matching hash) [IMG4TOOL] checking hash for "rfta" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "rfts" IGN (no digest in BuildManifest) Verified APTicket to be valid for this restore Variant: Customer Erase Install (IPSW) This restore will erase all device data. irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode Device found in DFU Mode. Getting firmware keys for: j120ap Cleaning up... [exception]: what=getting keys failed with error: 14745615 (failed to get FirmwareJson from Server). Are keys publicly available? code=41680950 line=636 file=/tmp/Builder/repos/futurerestore/src/futurerestore.cpp commit count=308 commit sha =9554c0068dc50e141872ced5da2bd95baa595805 Done: restoring failed!

i1itione avatar Dec 03 '23 14:12 i1itione

Have you tried using the command line tool iRecovery? ./irecovery -n https://github.com/libimobiledevice/libirecovery

Yes, but no luck, then I tried using FutureRestore with dumped blobs via SSHRD, I got a problem with firmware key not available.

(the device info seems contain personal id, I replace it with xxxxxxx here)

irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode Found device in DFU mode Identified device as j120ap, iPad7,1 Extracting BuildManifest from iPSW Product version: 13.7 Product build: 17H35 Major: 17 Device supports Image4: true [TSSR] Checking BuildIdentity 0 [TSSR] Selected BuildIdentity for request [TSSR] Checking BuildIdentity 0 [TSSR] Selected BuildIdentity for request checking if the APTicket is valid for this restore... Verified ECID in APTicket matches the device's ECID checking if the APTicket is valid for this restore... Verified ECID in APTicket matches the device's ECID [IMG4TOOL] checking buildidentity 0: [IMG4TOOL] checking buildidentity matches board ... YES [IMG4TOOL] checking buildidentity has all required hashes: [IMG4TOOL] checking hash for "AOP" OK (found "aopf" with matching hash) [IMG4TOOL] checking hash for "AppleLogo" OK (found "logo" with matching hash) [IMG4TOOL] checking hash for "BatteryCharging0" OK (found "chg0" with matching hash) [IMG4TOOL] checking hash for "BatteryCharging1" OK (found "chg1" with matching hash) [IMG4TOOL] checking hash for "BatteryFull" OK (found "batF" with matching hash) [IMG4TOOL] checking hash for "BatteryLow0" OK (found "bat0" with matching hash) [IMG4TOOL] checking hash for "BatteryLow1" OK (found "bat1" with matching hash) [IMG4TOOL] checking hash for "BatteryPlugin" OK (found "glyP" with matching hash) [IMG4TOOL] checking hash for "DeviceTree" OK (found "dtre" with matching hash) [IMG4TOOL] checking hash for "KernelCache" OK (found "krnl" with matching hash) [IMG4TOOL] checking hash for "LLB" OK (found "illb" with matching hash) [IMG4TOOL] checking hash for "OS" OK (found "rosi" with matching hash) [IMG4TOOL] checking hash for "RecoveryMode" OK (found "recm" with matching hash) [IMG4TOOL] checking hash for "RestoreDeviceTree" OK (found "rdtr" with matching hash) [IMG4TOOL] checking hash for "RestoreKernelCache" OK (found "rkrn" with matching hash) [IMG4TOOL] checking hash for "RestoreLogo" OK (found "rlgo" with matching hash) [IMG4TOOL] checking hash for "RestoreRamDisk" OK (found "rdsk" with matching hash) [IMG4TOOL] checking hash for "RestoreSEP" OK (found "rsep" with matching hash) [IMG4TOOL] checking hash for "RestoreTrustCache" OK (found "rtsc" with matching hash) [IMG4TOOL] checking hash for "SEP" OK (found "sepi" with matching hash) [IMG4TOOL] checking hash for "StaticTrustCache" OK (found "trst" with matching hash) [IMG4TOOL] checking hash for "ftap" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "ftsp" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "iBEC" OK (found "ibec" with matching hash) [IMG4TOOL] checking hash for "iBSS" OK (found "ibss" with matching hash) [IMG4TOOL] checking hash for "iBoot" OK (found "ibot" with matching hash) [IMG4TOOL] checking hash for "rfta" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "rfts" IGN (no digest in BuildManifest) Verified APTicket to be valid for this restore Variant: Customer Erase Install (IPSW) This restore will erase all device data. irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode Device found in DFU Mode. Getting firmware keys for: j120ap Cleaning up... [exception]: what=getting keys failed with error: 14745615 (failed to get FirmwareJson from Server). Are keys publicly available? code=41680950 line=636 file=/tmp/Builder/repos/futurerestore/src/futurerestore.cpp commit count=308 commit sha =9554c0068dc50e141872ced5da2bd95baa595805 Done: restoring failed!

Have you figured this out? my iPad stuck in Recovery after install TrollStore

lnguyen234 avatar Jan 09 '24 05:01 lnguyen234