90

[ENGINEERING][ROM][OFFICIAL] OFFICIAL Engineering Firmware for LANCELOT (Redmi 9...

 1 year ago
source link: https://forum.xda-developers.com/t/engineering-rom-official-official-engineering-firmware-for-lancelot-redmi-9-redmi-9-prime.4246931/page-7#post-87924957
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

[ENGINEERING][ROM][OFFICIAL] OFFICIAL Engineering Firmware for LANCELOT (Redmi 9

rizky.ode

New member
asalammualikum warohmatullahi wabarokathu i am sorry just translate, i am indonesia semua file ini sangat berguna. matikan antivirus untuk mengekstrak ataupun menjalankan program ini. langkah penting 1.flash dengan flashtool format&dowload v11.0.9.0 tanpa mengganti file. 2. setelah itu flash hanya preload dan md1img/md1rom file yang saya cantumkan 3. setelah selesai format nvdata dan nvram, adress dan partisi ada didalam scatter(maaf saya lupa copy scatter tetapi semuanya sama atau ambil scatter dari v11.0.4.0) 4. jalankan mauimeta tulis imei hanya simcard 2,reboot 5. login micloud, unlockbootloader, instal twrp dan vbmeta file saya, cara mudah menggunakan flashtool ganti file recovery.img dan vbmeta.img 6.hidupkan ponsel sampai ke menu awal setelah melewati registrasi 7.reboot dan flash boot.img file saya, setelah itu buka mauimeta dan tulis kedua imei, reboot baca dengan teliti perintah yang saya berikan dan sebarkan tutorial ini ke saudara lainnya untuk saling membantu. wasalammualaikum warohmatullahi wabarokathu

untuk langkah ke 3. itu flash nvram dan nvdata gimana yah ?

untuk langkah ke 3. itu flash nvram dan nvdata gimana yah ?

Format nvram nvdata.. untuk code partisi cari di scatter.txt

xeonzombie

New member
ok, it works! thank you
Last edited: Dec 18, 2022

ELIUDOS

Member
Works with:
- Xiaomi Redmi 9
- Xiaomi Redmi 9 Prime

Build Date:
2020/06/23

Android Version:
QP1A.190711.020

Display ID:
AL2615-lancelot-V011-Q-0623

Build Fingerprint:
Redmi/lancelot/lancelot:10/QP1A.190711.020/6:userdebug/test-keys

Security Patch:
2019/12/05

Radio/Modem/Baseband Version:
MOLY.LR12A.R3.MP.V98.P16

Download:
https://www.mediafire.com/file/7fs4...V011-Q-0623_QP1A.190711.020_by-VD171.zip/file

Password:
Pass is in the attached file: PASSWORD_by_VD171.txt

How to flash it?
Use the attached scatter file.

Radio/Modem/Baseband properties:
Code:
md1_dbginfodsp=DbgInfo_DSP_MT6768_MOLY_LR12A_R3_MP_V98_P16_2020_04_05_21_55.xz
md1_dbginfo=DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V98_P16_2020_04_22_12_37.xz
md1_mddbmeta=MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V98_P16.EDB
md1_mddbmetaodb=MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V98_P16.XML.GZ
md1_mddb=MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V98_P16.EDB
Prop.default:
Code:
ro.build.version.incremental=6
ro.odm.build.version.incremental=6
ro.vendor.build.version.incremental=6
ro.build.version.security_patch=2019-12-05
ro.vendor.build.security_patch=2019-12-05
ro.build.display.id=AL2615-lanceelot-V011-Q-0623
ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp2-V1.9.1_huaqin.q0mp1.k69v1.64_P17
ro.build.product=lancelot
ro.product.board=lancelot
ro.product.odm.device=lancelot
ro.product.odm.model=lancelot
ro.product.odm.name=lancelot
ro.product.product.device=lancelot
ro.product.product.model=lancelot
ro.product.product.name=lancelot
ro.product.system.device=lancelot
ro.product.system.model=lancelot
ro.product.system.name=lancelot
ro.product.vendor.device=lancelot
ro.product.vendor.model=lancelot
ro.product.vendor.name=lancelot
ro.build.flavor=lancelot-userdebug
ro.build.description=lancelot-userdebug 10 QP1A.190711.020 6 test-keys
ro.board.platform=mt6768
ro.build.id=QP1A.190711.020
ro.odm.build.id=QP1A.190711.020
ro.product.build.id=QP1A.190711.020
ro.system.build.id=QP1A.190711.020
ro.vendor.build.id=QP1A.190711.020
ro.bootimage.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/6:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/6:userdebug/test-keys
ro.product.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/6:userdebug/test-keys
ro.system.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/6:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/6:userdebug/test-keys
ro.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.build.type=userdebug
ro.odm.build.type=userdebug
ro.system.build.type=userdebug
ro.vendor.build.type=userdebug
ro.bootimage.build.date=Tue Jun 23 16:00:24 CST 2020
ro.build.date=Tue Jun 23 16:00:24 CST 2020
ro.odm.build.date=Tue Jun 23 16:00:24 CST 2020
ro.product.build.date=Tue Jun 23 16:00:24 CST 2020
ro.system.build.date=Tue Jun 23 16:00:24 CST 2020
ro.vendor.build.date=Tue Jun 23 16:00:24 CST 2020
MD5 hashes:
Code:
APDB_MT6768_S01__W2006 -> 7177e8c1bb17e5fd98f0e6723799c50d
boot-debug.img -> 8cd7eda58701088c5080fc18eee2d01b
boot.img -> 81cc18e714ea49a328f6f4da95d08268
cache.img -> df336c69fc9169d8c248bf0159dabd19
Checksum.ini -> 37b76d2bc20b7da2f98f68d64b2c2390
crclist.txt -> e5f360ad6f480f9635cca523487d1936
cust.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V98_P14_2020_04_02_09_21_1_ulwctg_n -> b98ee0dd6410d951a97dc06195ba83e8
dtb.img -> bfe051e750bab9942d3509be26852f76
dtbo-verified.img -> 4849e7b4147d1f145b6cabeb89ad75f4
dtbo.img -> 4849e7b4147d1f145b6cabeb89ad75f4
efuse.img -> 421f2cead0fbea555680b96136555941
exaid.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
lk-verified.img -> 03f3abe6f7b74eae1bb2faf5117662b3
lk.img -> 03f3abe6f7b74eae1bb2faf5117662b3
logo.bin -> e72a0fbf91e0efcc13012c71312fc376
md1arm7.img -> a0453e723dc84255940d7791740d06db
md1img-verified.img -> 8be0824b8be8d366c08a346df1d73a76
md1img.img -> 8be0824b8be8d366c08a346df1d73a76
md3img.img -> 9a9c185e3f6234103e5949716b9962d2
MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V98_P14_1_ulwctg_n.XML.GZ -> 376361df52cddd8e2d8127c009ad9a97
MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V98_P14_1_ulwctg_n.EDB -> 762c8ba299c76dde214394d8e7e3fc7e
MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V98_P14_1_ulwctg_n.EDB -> a5757c7b6acf3e52ce051d731f1e11ab
MT6768_Android_scatter.txt -> 49ccb3ee5ebcd5a1da213f6e6a97f6e0
preloader.img -> 97d4bf8c5d7eb7077242643355154121
preloader_emmc.img -> 97d4bf8c5d7eb7077242643355154121
preloader_lancelot.bin -> 3d78e9cdf37504c6f4b6e085b9c0ed23
preloader_ufs.img -> 2ca4e781fc1716fb9f818fd3bc13708a
product.img -> 8a2a3b2e34c7ad615385f52a578ac19e
ramdisk-debug.img -> e983139c5a4a17f856b48a9168462246
ramdisk-recovery.img -> 83730e31866842708346352df1364019
ramdisk.img -> b280f1a76fd113fa4a2819c131bd5a4b
recovery.img -> 85a47773595b006fd430826f5b88d76c
scp-verified.img -> fad098e9a4ac55809437bcda5702d5e2
scp.img -> fad098e9a4ac55809437bcda5702d5e2
secro.img -> 096587b863e1252d67b1b8307291db09
sparsecrclist.img -> 9a027470a494d216f144b6a2ac86c440
sparsecrclist.txt -> ff3cdb1767f609ccd66fb994b02e030a
spmfw-verified.img -> 34c71ef9e7b790d06b1c935a36d41c7c
spmfw.img -> 34c71ef9e7b790d06b1c935a36d41c7c
sspm-verified.img -> 49adc450b2c4aca22ed17a59064e4dc3
sspm.img -> 49adc450b2c4aca22ed17a59064e4dc3
super.img -> fd0ac354f4e40d4ffb9fd4e11b9d2e3b
super_empty.img -> a6d56d7a12d989bf31511d866449291d
system.img -> dab92acecad053e31bebe8d2872029b5
tee-verified.img -> 25e64f2ddb3d8cffa1fd6a1f7d2137a2
tee.img -> 25e64f2ddb3d8cffa1fd6a1f7d2137a2
userdata.img -> fc22c593b15f28f4fe0f9a462334ea70
vbmeta.img -> d763d4e03d647df580e193da6c046b5b
vbmeta_system.img -> 51618fef8d4e5c535c5c779a4cf4e8b7
vbmeta_vendor.img -> 4c12ab0788baad9d32d95dbd33da1442
vendor.img -> 4878e677e80d6ceaa73c30722682d41f

thanks alot, it's been two days trying to break this problem.


Recommend

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK