Question Bricked OP 2T 12GB/256GB

Search This thread

woodiewood3

Member
Nov 29, 2015
10
1
Hi fellow XDA members,

I had my OP Nord 2T rooted and tried to revert back to stock by:
- Turning off the modules in Magisk
- Lock bootlader via fastboot => corrupted image boot/recovery message

I then tried to flash a payload.bin file via mtk_gui and only realized after the transfer that it was the CPH2401 file instead of the CPH2399 file. The mtk-gui was not responsive after the 100% transfer and also the phone stopped responding... Unfortunately my phone now seems dead, the screen stays black, the phone is sometimes recognized in mtk_gui, but there is no succesful handshake anymore :/

Is there any way for me to get the phone back alive from it's current state? Can someone share the CPH2399 A11 stock ROM? Maybe I could flash this stock rom if the phone manages a succefull connection via mtk_gui. Is there maybe another way I should try to tackle this issue?

I will be happy to donate some money via PayPal to those that are able to get my phone back working.
 

woodiewood3

Member
Nov 29, 2015
10
1
Dump from cmd when using mtk_gui. It freezes after the last line displayed below.

Port - Device detected :)
Preloader - CPU: MT6893(Dimensity 1200)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0xa
Preloader - Disabling Watchdog...
Preloader - HW code: 0x950
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 49939DEBB365775208865EAA0DCE5FFE
Preloader - SOC_ID: 2A32AFFED999CD65E36EAF4C8A2666625DAEBBB505E6F6D650E8837D23B3F6E0
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Preloader
Preloader - [LIB]: ←[31mStatus: Handshake failed, retrying...←[0m

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.


....Port - Device detected :)
Preloader - CPU: MT6893(Dimensity 1200)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0xa
Preloader - Disabling Watchdog...
Preloader - HW code: 0x950
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 49939DEBB365775208865EAA0DCE5FFE
Preloader - SOC_ID: 2A32AFFED999CD65E36EAF4C8A2666625DAEBBB505E6F6D650E8837D23B3F6E0
Port - Device detected :)
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
xflashext
xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer: 0x31
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: KLUEG8UHDC-B0E
DAXFlash - UFS CID: ce014b4c55454738554844432d423045
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ce014b4c55454738554844432d423045
DAXFlash - Sending emi data ...
DAXFlash - DRAM setup passed.
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - UFS FWVer: 0x31
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: KLUEG8UHDC-B0E
DAXFlash - UFS CID: ce014b4c55454738554844432d423045
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - HW-CODE : 0x950
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA00
DAXFlash - SW-VERSION : 0x0
DAXFlash - CHIP-EVOLUTION : 0x2
DAXFlash - DA-VERSION : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added

mtk_gui freezes after the DA Extensions successfully added
 

PattasuBalu

Member
Dec 4, 2020
41
6
I would recommend you to give your phone to service center and tell them that the new update bricked your phone. They will have the firmware to fix your device. That's how I managed to fix my device.