Closed andr0id365 closed 5 months ago
Which meizu is it? I've tried several meizu but none worked. (M2 Note, M3s, M5c) They give me other errors.
m1 m1note
m1 m1note
The odds are even less that it will work, it matters that many other devices also have similar problems and have never been fixed
t........... Port - Device detected :) Preloader - CPU: MT6752() Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212c00 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x6752 Preloader - Target config: 0x7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca01 Preloader - SW Ver: 0x1 Preloader - ME_ID: 6F2E2D3638F136B04BE86C529304EF00 PLTools - Loading payload from generic_patcher_payload.bin, 0x56c bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Traceback (most recent call last): File "mtk", line 814, in mtk = Main(args).run(parser) File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\mtk_main.py", line 583, in run self.cmd_payload(mtk=mtk, payloadfile=payloadfile) File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\mtk_main.py", line 645, in cmd_payload plt.runpayload(filename=payloadfile) File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\pltools.py", line 102, in runpayload if self.kama.payload(payload, addr, True, exploittype): File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\kamakiri.py", line 139, in payload if self.exploit2(payload, addr): File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\kamakiri.py", line 117, in exploit2 ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr
[0][ 1], 4))[0] + 8 TypeError: 'NoneType' object is not subscriptable brom_6752.zip
try re-installing python and mtkclient
t........... Port - Device detected :) Preloader - CPU: MT6752() Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212c00 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x6752 Preloader - Target config: 0x7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca01 Preloader - SW Ver: 0x1 Preloader - ME_ID: 6F2E2D3638F136B04BE86C529304EF00 PLTools - Loading payload from generic_patcher_payload.bin, 0x56c bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Traceback (most recent call last): File "mtk", line 814, in mtk = Main(args).run(parser) File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\mtk_main.py", line 583, in run self.cmd_payload(mtk=mtk, payloadfile=payloadfile) File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\mtk_main.py", line 645, in cmd_payload plt.runpayload(filename=payloadfile) File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\pltools.py", line 102, in runpayload if self.kama.payload(payload, addr, True, exploittype): File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\kamakiri.py", line 139, in payload if self.exploit2(payload, addr): File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient Library\kamakiri.py", line 117, in exploit2 ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr
[0][ 1], 4))[0] + 8 TypeError: 'NoneType' object is not subscriptable brom_6752.zip
My meizu note5 has the same wrong,and now it can't switch on T_T
My meizu note5 has the same wrong,and now it can't switch on T_T
Try using mtkclient on ubuntu. Be careful on meizu devices, because if you change something in the system and then update, you have a chance of bricking or soft bricking your device. I bricked my Meizu M3 Max and first it would just hang at the meizu logo, but after trying some roms and flashing, i am now stuck at the flyme logo, meaning i am soft bricked. i tried updating through recovery, but it doesnt fix the soft brick.
t........... Port - Device detected :) Preloader - CPU: MT6752() Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212c00 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x6752 Preloader - Target config: 0x7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca01 Preloader - SW Ver: 0x1 Preloader - ME_ID: 6F2E2D3638F136B04BE86C529304EF00 PLTools - Loading payload from generic_patcher_payload.bin, 0x56c bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Traceback (most recent call last): File "mtk", line 814, in
mtk = Main(args).run(parser)
File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient\ Library\mtk_main.py", line 583, in run self.cmd_payload(mtk=mtk, payloadfile=payloadfile) File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient\ Library\mtk_main.py", line 645, in cmd_payload plt.runpayload(filename=payloadfile) File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient\ Library\pltools.py", line 102, in runpayload if self.kama.payload(payload, addr, True, exploittype): File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient\ Library\kamakiri.py", line 139, in payload if self.exploit2(payload, addr): File "D:\Program Files (x86)\IDA_Pro_7.7\python38\lib\site-packages
\mtkclient\ Library\kamakiri.py", line 117, in exploit2 ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr
[0][ 1], 4))[0] + 8 TypeError: 'NoneType' object is not subscriptable brom_6752.zip