Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VirtualBox USB Passthrough does not work with shofel2 #8

Open
NightHammer1000 opened this issue Apr 24, 2018 · 5 comments
Open

VirtualBox USB Passthrough does not work with shofel2 #8

NightHammer1000 opened this issue Apr 24, 2018 · 5 comments

Comments

@NightHammer1000
Copy link

can anyone confirm?
Had to change to VMWare Workstation to get the Exploit to execute.

@The-Synthax
Copy link

VMware handles USB passthrough differently and is known to work with the exploit. VirtualBox does not.

@foen
Copy link

foen commented Apr 28, 2018

on VMware

  1. Turn off Switch
  2. Ground right JoyCon rail PIN10 using paperclip JIG or JoyCon mod
  3. Press VOL+ and connect USB cable to the Switch
    -=-=--=--=--=-=-=-=-=--=-=-=-=-=-=-=-=--=-=-
    Waiting for NVidia APX (Switch in RCM mode).
    -=-=--=--=--=-=-=-=-=--=-=-=-=-=-=-=-=--=-=-

File descriptor: 9
b'c08405070000001800532c6401101062'
entry 400168ed
throwing more
Performing hax...
Size: 0x6c68

b'820000000000686c'
b'02000000000000000000000000000000801f150100000000716c000000000000000000000000000000000000000000000f0f00000000000000'
URB address: 0x1161ef0
URB status: -2
b'CBFS\n'

Switching to cbfs mode...
sending 0x7000 bytes @0x0
sending 0x4 bytes @0xffffc
sending 0x20 bytes @0x20138
sending 0x18 bytes @0x20100
sending 0x20 bytes @0x20118
sending 0x18 bytes @0x20180
sending 0x20 bytes @0x20198
sending 0x1c bytes @0x201b8
sending 0x533e bytes @0x201d4
sending 0x100000 bytes @0x0
you have been served

Detected. Waiting 5 seconds

config file <conf//imx_usb.conf>
vid=0x0955 pid=0x701a file_name=switch.conf
config file <conf//switch.conf>
parse conf//switch.conf
conf//switch.conf: syntax error: _direct 0x8e000000
{image/switch.scr.img:load 0x8e000000,jump_direct 0x8e000000
}
Trying to open device vid=0x0955 pid=0x701a
Interface 0 claimed
HAB security state: development mode (0x56787856)
== work item
filename kernel/Image.gz
load_size 0 bytes
load_addr 0x83000000
dcd 0
clear_dcd 0
plug 0
jump_mode 0
jump_addr 0x00000000
== end work item
load_addr=83000000

loading binary file(kernel/Image.gz) to 83000000, skip=0, fsize=8433b7 type=0

<<<8663991, 8664064 bytes>>>
succeeded (status 0x88888888)
HAB security state: development mode (0x56787856)
== work item
filename dtb/tegra210-nintendo-switch.dtb
load_size 0 bytes
load_addr 0x8d000000
dcd 0
clear_dcd 0
plug 0
jump_mode 0
jump_addr 0x00000000
== end work item
load_addr=8d000000

loading binary file(dtb/tegra210-nintendo-switch.dtb) to 8d000000, skip=0, fsize=a040 type=0

<<<41024, 41984 bytes>>>
succeeded (status 0x88888888)
HAB security state: development mode (0x56787856)
== work item
filename image/switch.scr.img
load_size 0 bytes
load_addr 0x8e000000
dcd 0
clear_dcd 0
plug 0
jump_mode 1
jump_addr 0x00000000
== end work item
load_addr=8e000000

loading binary file(image/switch.scr.img) to 8e000000, skip=0, fsize=162 type=aa

<<<354, 1024 bytes>>>
succeeded (status 0x88888888)
jumping to 0x8e000000

Done. You should see kernel booting on switch soon

-//- kombos.org -//-

nothing showed up on switch

@NightHammer1000
Copy link
Author

NightHammer1000 commented Apr 28, 2018

Have that problem to. 50% of all Exploit Boots are Black Screens.

Turn off Switch when it has Black Screen. Disconnect USB. Booting into Switch OFW and Turn Switch off again. Now boot into Recovery Mode to boot Exploit. Fixes Blackscreen for me Most of the Time.

@foen
Copy link

foen commented Apr 28, 2018

wish i had 50% rate haha never seen the linux booting yet fusee launcher alwase works so wierd.....

@angelnar87
Copy link

No joy with VirtualBox on macOS.
VMWare Fusion works like a boss

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants