Is it possible to fix my A10X iPad stuck into recovery mode after DelayOTA?
i1itione opened this issue · 3 comments
The device is iPad Pro 2 (12.9 inch), it was iOS 13.7 and I used Chimera to jailbreak it, but now I want to upgrade it to iPadOS 16.6, therefore I follow the DelayOTA guide, setup every needed things and restore RootFS in Chimera before applying OTA.
After OTA downloaded, I press install button to start installing the update, and the iPad reboots few times and there is progress bar, but now the iPad stuck into recovery mode, maybe something wrong happened during installing OTA files?
Is it possible to fix this problem via SSHRD? Because I don't want to updgrade this iPad to iPadOS 17 by iTunes.
Have you tried using the command line tool iRecovery?
./irecovery -n
https://github.com/libimobiledevice/libirecovery
Have you tried using the command line tool iRecovery? ./irecovery -n https://github.com/libimobiledevice/libirecovery
Yes, but no luck, then I tried using FutureRestore with dumped blobs via SSHRD, I got a problem with firmware key not available.
(the device info seems contain personal id, I replace it with xxxxxxx here)
irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode
Found device in DFU mode
Identified device as j120ap, iPad7,1
Extracting BuildManifest from iPSW
Product version: 13.7
Product build: 17H35 Major: 17
Device supports Image4: true
[TSSR] Checking BuildIdentity 0
[TSSR] Selected BuildIdentity for request
[TSSR] Checking BuildIdentity 0
[TSSR] Selected BuildIdentity for request
checking if the APTicket is valid for this restore...
Verified ECID in APTicket matches the device's ECID
checking if the APTicket is valid for this restore...
Verified ECID in APTicket matches the device's ECID
[IMG4TOOL] checking buildidentity 0:
[IMG4TOOL] checking buildidentity matches board ... YES
[IMG4TOOL] checking buildidentity has all required hashes:
[IMG4TOOL] checking hash for "AOP" OK (found "aopf" with matching hash)
[IMG4TOOL] checking hash for "AppleLogo" OK (found "logo" with matching hash)
[IMG4TOOL] checking hash for "BatteryCharging0" OK (found "chg0" with matching hash)
[IMG4TOOL] checking hash for "BatteryCharging1" OK (found "chg1" with matching hash)
[IMG4TOOL] checking hash for "BatteryFull" OK (found "batF" with matching hash)
[IMG4TOOL] checking hash for "BatteryLow0" OK (found "bat0" with matching hash)
[IMG4TOOL] checking hash for "BatteryLow1" OK (found "bat1" with matching hash)
[IMG4TOOL] checking hash for "BatteryPlugin" OK (found "glyP" with matching hash)
[IMG4TOOL] checking hash for "DeviceTree" OK (found "dtre" with matching hash)
[IMG4TOOL] checking hash for "KernelCache" OK (found "krnl" with matching hash)
[IMG4TOOL] checking hash for "LLB" OK (found "illb" with matching hash)
[IMG4TOOL] checking hash for "OS" OK (found "rosi" with matching hash)
[IMG4TOOL] checking hash for "RecoveryMode" OK (found "recm" with matching hash)
[IMG4TOOL] checking hash for "RestoreDeviceTree" OK (found "rdtr" with matching hash)
[IMG4TOOL] checking hash for "RestoreKernelCache" OK (found "rkrn" with matching hash)
[IMG4TOOL] checking hash for "RestoreLogo" OK (found "rlgo" with matching hash)
[IMG4TOOL] checking hash for "RestoreRamDisk" OK (found "rdsk" with matching hash)
[IMG4TOOL] checking hash for "RestoreSEP" OK (found "rsep" with matching hash)
[IMG4TOOL] checking hash for "RestoreTrustCache" OK (found "rtsc" with matching hash)
[IMG4TOOL] checking hash for "SEP" OK (found "sepi" with matching hash)
[IMG4TOOL] checking hash for "StaticTrustCache" OK (found "trst" with matching hash)
[IMG4TOOL] checking hash for "ftap" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "ftsp" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "iBEC" OK (found "ibec" with matching hash)
[IMG4TOOL] checking hash for "iBSS" OK (found "ibss" with matching hash)
[IMG4TOOL] checking hash for "iBoot" OK (found "ibot" with matching hash)
[IMG4TOOL] checking hash for "rfta" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "rfts" IGN (no digest in BuildManifest)
Verified APTicket to be valid for this restore
Variant: Customer Erase Install (IPSW)
This restore will erase all device data.
irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode
Device found in DFU Mode.
Getting firmware keys for: j120ap
Cleaning up...
[exception]:
what=getting keys failed with error: 14745615 (failed to get FirmwareJson from Server). Are keys publicly available?
code=41680950
line=636
file=/tmp/Builder/repos/futurerestore/src/futurerestore.cpp
commit count=308
commit sha =9554c0068dc50e141872ced5da2bd95baa595805
Done: restoring failed!
Have you tried using the command line tool iRecovery? ./irecovery -n https://github.com/libimobiledevice/libirecovery
Yes, but no luck, then I tried using FutureRestore with dumped blobs via SSHRD, I got a problem with firmware key not available.
(the device info seems contain personal id, I replace it with xxxxxxx here)
irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode Found device in DFU mode Identified device as j120ap, iPad7,1 Extracting BuildManifest from iPSW Product version: 13.7 Product build: 17H35 Major: 17 Device supports Image4: true [TSSR] Checking BuildIdentity 0 [TSSR] Selected BuildIdentity for request [TSSR] Checking BuildIdentity 0 [TSSR] Selected BuildIdentity for request checking if the APTicket is valid for this restore... Verified ECID in APTicket matches the device's ECID checking if the APTicket is valid for this restore... Verified ECID in APTicket matches the device's ECID [IMG4TOOL] checking buildidentity 0: [IMG4TOOL] checking buildidentity matches board ... YES [IMG4TOOL] checking buildidentity has all required hashes: [IMG4TOOL] checking hash for "AOP" OK (found "aopf" with matching hash) [IMG4TOOL] checking hash for "AppleLogo" OK (found "logo" with matching hash) [IMG4TOOL] checking hash for "BatteryCharging0" OK (found "chg0" with matching hash) [IMG4TOOL] checking hash for "BatteryCharging1" OK (found "chg1" with matching hash) [IMG4TOOL] checking hash for "BatteryFull" OK (found "batF" with matching hash) [IMG4TOOL] checking hash for "BatteryLow0" OK (found "bat0" with matching hash) [IMG4TOOL] checking hash for "BatteryLow1" OK (found "bat1" with matching hash) [IMG4TOOL] checking hash for "BatteryPlugin" OK (found "glyP" with matching hash) [IMG4TOOL] checking hash for "DeviceTree" OK (found "dtre" with matching hash) [IMG4TOOL] checking hash for "KernelCache" OK (found "krnl" with matching hash) [IMG4TOOL] checking hash for "LLB" OK (found "illb" with matching hash) [IMG4TOOL] checking hash for "OS" OK (found "rosi" with matching hash) [IMG4TOOL] checking hash for "RecoveryMode" OK (found "recm" with matching hash) [IMG4TOOL] checking hash for "RestoreDeviceTree" OK (found "rdtr" with matching hash) [IMG4TOOL] checking hash for "RestoreKernelCache" OK (found "rkrn" with matching hash) [IMG4TOOL] checking hash for "RestoreLogo" OK (found "rlgo" with matching hash) [IMG4TOOL] checking hash for "RestoreRamDisk" OK (found "rdsk" with matching hash) [IMG4TOOL] checking hash for "RestoreSEP" OK (found "rsep" with matching hash) [IMG4TOOL] checking hash for "RestoreTrustCache" OK (found "rtsc" with matching hash) [IMG4TOOL] checking hash for "SEP" OK (found "sepi" with matching hash) [IMG4TOOL] checking hash for "StaticTrustCache" OK (found "trst" with matching hash) [IMG4TOOL] checking hash for "ftap" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "ftsp" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "iBEC" OK (found "ibec" with matching hash) [IMG4TOOL] checking hash for "iBSS" OK (found "ibss" with matching hash) [IMG4TOOL] checking hash for "iBoot" OK (found "ibot" with matching hash) [IMG4TOOL] checking hash for "rfta" IGN (no digest in BuildManifest) [IMG4TOOL] checking hash for "rfts" IGN (no digest in BuildManifest) Verified APTicket to be valid for this restore Variant: Customer Erase Install (IPSW) This restore will erase all device data. irecv_event_cb: device 0008xxxxxxxxxxxx (udid: N/A) connected in DFU mode Device found in DFU Mode. Getting firmware keys for: j120ap Cleaning up... [exception]: what=getting keys failed with error: 14745615 (failed to get FirmwareJson from Server). Are keys publicly available? code=41680950 line=636 file=/tmp/Builder/repos/futurerestore/src/futurerestore.cpp commit count=308 commit sha =9554c0068dc50e141872ced5da2bd95baa595805 Done: restoring failed!
Have you figured this out? my iPad stuck in Recovery after install TrollStore