-
Notifications
You must be signed in to change notification settings - Fork 154
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VirtualBox USB Passthrough does not work with shofel2 #8
Comments
VMware handles USB passthrough differently and is known to work with the exploit. VirtualBox does not. |
on VMware
File descriptor: 9 b'820000000000686c'
Detected. Waiting 5 seconds config file <conf//imx_usb.conf> loading binary file(kernel/Image.gz) to 83000000, skip=0, fsize=8433b7 type=0 <<<8663991, 8664064 bytes>>> loading binary file(dtb/tegra210-nintendo-switch.dtb) to 8d000000, skip=0, fsize=a040 type=0 <<<41024, 41984 bytes>>> loading binary file(image/switch.scr.img) to 8e000000, skip=0, fsize=162 type=aa <<<354, 1024 bytes>>> Done. You should see kernel booting on switch soon -//- kombos.org -//- nothing showed up on switch |
Have that problem to. 50% of all Exploit Boots are Black Screens. Turn off Switch when it has Black Screen. Disconnect USB. Booting into Switch OFW and Turn Switch off again. Now boot into Recovery Mode to boot Exploit. Fixes Blackscreen for me Most of the Time. |
wish i had 50% rate haha never seen the linux booting yet fusee launcher alwase works so wierd..... |
No joy with VirtualBox on macOS. |
can anyone confirm?
Had to change to VMWare Workstation to get the Exploit to execute.
The text was updated successfully, but these errors were encountered: