[ENGINEERING][ROM][OFFICIAL] OFFICIAL Engineering Firmware for ANGELICA (POCO C3 / Redmi 9C/ Redmi 9C NFC) - Redmi 9C Guides, News, & Discussion

Works with:
- Xiaomi POCO C3
- Xiaomi Redmi 9C
- Xiaomi Redmi 9C NFC
Build Date:
2020/11/19
Android Version:
QP1A.190711.020
Display ID:
angelica-userdebug 10 QP1A.190711.020 484 test-keys
Build Fingerprint:
Redmi/angelica/angelica:10/QP1A.190711.020/484:userdebug/test-keys
Security Patch:
2020-03-05
Radio/Modem/Baseband Version:
MOLY.LR12A.R3.MP.V107.5.P4
Download:
https://www.mediafire.com/file/w4vs...neering_484_QP1A.190711.020_by-VD171.zip/file
Password:
Pass is in the attached file: PASSWORD_by_VD171.txt
How to flash it?
Use the attached scatter file.
Radio/Modem/Baseband properties:
Code:
md1_dbginfodsp=DbgInfo_DSP_MT6765_MOLY_LR12A_R3_MP_V107_5_P4_2020_05_08_15_56.xz
md1_dbginfo=DbgInfo_LR12A.R3.MP_LCSH_Q0MP1_MT6765_SP_MOLY_LR12A_R3_MP_V107_5_P4_2020_10_30_17_09.xz
md1_mddbmeta=MDDB.META_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.EDB
md1_mddbmetaodb=MDDB.META.ODB_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.XML.GZ
md1_mddb=MDDB_InfoCustomAppSrcP_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.EDB
Prop.default:
Code:
ro.build.version.incremental=484
ro.vendor.build.version.incremental=484
ro.odm.build.version.incremental=484
ro.build.version.security_patch=2020-03-05
ro.vendor.build.security_patch=2020-03-05
ro.build.display.id=angelica-userdebug 10 QP1A.190711.020 484 test-keys
ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp3-V1.4_lcsh.q0mp1.k62v1.64.bsp_P4
ro.product.system.device=angelica
ro.product.system.model=angelica
ro.product.system.name=angelica
ro.build.product=angelica
ro.product.board=angelica
ro.product.vendor.device=angelica
ro.product.vendor.model=angelica
ro.product.vendor.name=angelica
ro.product.odm.device=angelica
ro.product.odm.model=angelica
ro.product.odm.name=angelica
ro.product.product.device=angelica
ro.product.product.model=angelica
ro.product.product.name=angelica
ro.build.flavor=angelica-userdebug
ro.build.description=angelica-userdebug 10 QP1A.190711.020 484 test-keys
ro.board.platform=mt6765
ro.system.build.id=QP1A.190711.020
ro.build.id=QP1A.190711.020
ro.vendor.build.id=QP1A.190711.020
ro.odm.build.id=QP1A.190711.020
ro.product.build.id=QP1A.190711.020
ro.system.build.fingerprint=Redmi/angelica/angelica:10/QP1A.190711.020/484:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/angelica/angelica:10/QP1A.190711.020/484:userdebug/test-keys
ro.bootimage.build.fingerprint=Redmi/angelica/angelica:10/QP1A.190711.020/484:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/angelica/angelica:10/QP1A.190711.020/484:userdebug/test-keys
ro.product.build.fingerprint=Redmi/angelica/angelica:10/QP1A.190711.020/484:userdebug/test-keys
ro.system.build.tags=test-keys
ro.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.type=userdebug
ro.build.type=userdebug
ro.vendor.build.type=userdebug
ro.odm.build.type=userdebug
ro.system.build.date=Thu Nov 19 00:20:49 CST 2020
ro.build.date=Thu Nov 19 00:20:49 CST 2020
ro.vendor.build.date=Thu Nov 19 00:20:49 CST 2020
ro.bootimage.build.date=Thu Nov 19 00:20:49 CST 2020
ro.odm.build.date=Thu Nov 19 00:20:49 CST 2020
ro.product.build.date=Thu Nov 19 00:20:49 CST 2020
MD5 hashes:
Code:
ADPT_20201119-022241_0.log -> af419a58194cc06d36a38a8053c60b0a
android-info.txt -> a2e30dbe30b036fe2f2da4728c50da34
APDB_MT6765_S01__W2015 -> 5358ccefe1fda7f456f3a568ec4b04d5
APDB_MT6765_S01__W2015_ENUM -> fbe5f23b8bc20d1bce7be6200a0731a1
apex -> d41d8cd98f00b204e9800998ecf8427e
arm11_path.txt -> e0fff7b6c16354d672c6df5beb73635f
boot-debug.img -> f8c67d0a50ce7f5a32f76690881a5652
boot.img -> 08b8329446f1d9a916c9dfa327a2c4e2
build.prop -> 9e16fa94f827c0961eb1ae26d09399fa
build_fingerprint.txt -> 5abf0a64b22a54c8bae9b7844067e888
build_thumbprint.txt -> 4df3c90452d25e672f5d105b52353797
cache.img -> 14f8eee266f1e4e09298ffd7564f7490
Checksum.ini -> 9486db622499e5a22812c74039763580
clean_steps.mk -> 30f988afe6140fd1afb0a19ed9b53da4
content_cert_sig.bin_hash.tmp -> acd3d8a4dfc44c0266f96f3482552ecf
CT865_factory_1_0.zip -> 1a8d2920eee999ef3b014c46adb61137
cust.img -> 09e9b617296df53b0716255c86d01c53
dexpreopt.config -> 3bd2bfa98738f4798fcc97be5ba41e74
dtb.img -> 8cae5478f4627f3dd5f27f7d970db7e5
dtbo-verified.img -> 599646e7a4bec2ddf53205f9142a769b
dtbo.img -> 9c45c9d8cb33173ad92ae2030f5b06e8
dummy.bin -> 6811c482ead27c0b1165ecfbe996c2b4
efuse.img -> 22e70283687ccca929e3f6d117c5fc34
flash_all.bat -> 24fa9f257fae3afd491535eed61787cd
fs_image.tar.gz.mbn.img -> 633b9aac7f2d2e81c0dc595d2a644d80
init -> 0c3c9ae3511888e757583690d46e8068
installed-files-product.json -> 57fdb0849ad188efd21c5478b4a2ab53
installed-files-product.txt -> f5ec1bad7fa1dba550a7edde9e8acb19
installed-files-ramdisk-debug.json -> 12fb22e79d25d59659f5e9ff1c7e13c4
installed-files-ramdisk-debug.txt -> 2b7375b11e0b15c08ea73fef68932b41
installed-files-ramdisk.json -> 8a7ab1d04d038fc3a8478378d5118d75
installed-files-ramdisk.txt -> 42f4aedb8144ddc25f082c2d7e1d5f1d
installed-files-recovery.json -> 961ebfc9bae732bbf8629a985d0f01d2
installed-files-recovery.txt -> 319b89a9a3203d9260b48fd216f9f13c
installed-files-root.json -> e2017cd6f1befb266cb137f306b0a6eb
installed-files-root.txt -> 40d211d2878ac2e27d1d93878dff8a41
installed-files-vendor.json -> 6be216de6e09fd926daa2f3643745ab1
installed-files-vendor.txt -> 9d4a7dd86d346e92756f7a971c6d3f15
installed-files.json -> c9ed71d95a77bccc43d52c8611b03968
installed-files.txt -> f1e06245106be3cc07b1c0e0264b0a2a
kernel -> 81bc84380ce37a9dbfb3fd5e728a90d1
LCSH_Q0MP1_MT6765_SP_PCB01_MT6765_S00_1_lwg_n.elf -> 1262030a6e6a69a54bf4964a7712a142
lk-verified.img -> b7d5e7b225fbd2c793bc138965fb6749
lk.img -> 1cb3667e581e1623ea0491b24e2dc365
logo-verified.bin -> 95925abd3a933e709770736abc7bb469
logo.bin -> 535bfd42ca7ef019d44c6ae64104633e
md1arm7-verified.img -> 6fb4b893db805c8a1e28b7bdb05dc689
md1arm7.img -> a0453e723dc84255940d7791740d06db
md1img-verified.img -> 1245636b84df0b3bd8b92e70cb665c79
md1img.img -> 867fa4249ea527bfd8208d2dd8794b29
md3img.img -> 9a9c185e3f6234103e5949716b9962d2
md5.txt -> a9064c5f147d81b3e97fdaddcc694959
MDDB_InfoCustomAppSrcP_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4_1_ulwctg_n.EDB -> 166fa9937371e654e91e022554f73765
module-info.json -> af3da4a16cf5a2807bb756b005c86b59
MT6765_Android_scatter.txt -> bb35c38b368cba3cb8412fcf7f87ae7e
PGPT -> 20bedc49348b16cdc20be09c4f32245c
preloader.bin -> ded6d9e4ee9c78fcc4431b03c044c515
preloader.img -> 321c28c429b9e775374132c6f2e394f3
preloader_angelica.bin -> ded6d9e4ee9c78fcc4431b03c044c515
preloader_angelica_signed.bin -> c54e168ccdf259623cbdb225a961f354
preloader_emmc.img -> 321c28c429b9e775374132c6f2e394f3
preloader_k65v1_64_bsp.bin -> c54e168ccdf259623cbdb225a961f354
preloader_ufs.img -> 7c233fd64a63ad906df7bd44ebbebe60
previous_build_config.mk -> 719267d360015f315698ae68c36ea08a
product -> d41d8cd98f00b204e9800998ecf8427e
product.img -> 00484d1d7c50850b4e884fd878a0e9ed
ramdisk-debug.img -> b6b0d0eb85d103beb8a437997e830026
ramdisk-recovery.img -> 0b09c6ef20a969884e2a69bbdf3a8715
ramdisk.img -> 34287bcd26aba8383de52d055ae3620b
recovery -> d41d8cd98f00b204e9800998ecf8427e
recovery.id -> 8ccbb57f3431bb57a8be9dec7eaa7252
recovery.img -> eb11468c4f639d0f2ba49290f4f28679
scp-verified.img -> cb8c196962ba474df347154baafeee63
scp.img -> 5f3763151352d37efec598443bc8a52f
secro.img -> 096587b863e1252d67b1b8307291db09
sig_size.txt -> 7a600b6f266737e2830a101876dd3561
spmfw-verified.img -> 22e5a5a016129ed5786127664900ee3b
spmfw.img -> 66cf26550d6650dd65f5f3865948bdf2
sspm-verified.img -> 164f3ef783323299cb5244949a560e87
sspm.img -> b281a508c22190047eed1af202bd5520
super.img -> 38e15bcfdd2d42cb211d1e9cd804a066
super_empty.img -> f911a1089119bd6f6a56919deb7bb9e8
system -> d41d8cd98f00b204e9800998ecf8427e
system.img -> cc48fbaee410e878c74ed10bc825b5c2
TARGET.txt -> 748150f0c3bbf2fa4dcc3346e73099f5
tee-verified.img -> 41f6595b21e6d3adbb8ca88e39c2f1e6
tee.img -> 2da6bfb5fa75119c984579b6fbe2e752
userdata.img -> b308f4d258cc086ea10d0c64dfcca17f
vbmeta.img -> 88e06152ae5ed02a0aefed78e2ab6049
vbmeta_system.img -> c8fbf3859cef073136d596fa978c7797
vbmeta_vendor.img -> d2241e965215b0410a2118ffd9222990
vendor -> d41d8cd98f00b204e9800998ecf8427e
vendor.img -> 86850a18f6d35bae45677d40b367e8c3

HOLA, disculpe mi ignorancia,. pero cual es ese archivo de dispersión adjunto ?????
es un poco engorroso esto, y no entiendo.,
espero su pronta respuesta.

PARA QUE SIRVE ESTA ROM DE INGENIERIA, Y COMO SE INSTALA POR FAVOR.

jasann said:
HOLA, disculpe mi ignorancia,. pero cual es ese archivo de dispersión adjunto ?????
es un poco engorroso esto, y no entiendo.,
espero su pronta respuesta.
Click to expand...
Click to collapse
English only, please.

What is it for? And essentially, what it exactly is?

XdaInsiderAndDev said:
What is it for? And essentially, what it exactly is?
Click to expand...
Click to collapse
This is a rom with low security.
You can do everything your creativity allows.

VD171 said:
This is a rom with low security.
You can do everything your creativity allows.
Click to expand...
Click to collapse
Wait a sec, so it is MIUI or AOSP or what?

XdaInsiderAndDev said:
Wait a sec, so it is MIUI or AOSP or what?
Click to expand...
Click to collapse
Official MIUI leaked by developer team.

VD171 said:
Official MIUI leaked by developer team.
Click to expand...
Click to collapse
So it's a Low-Security MIUI version?

XdaInsiderAndDev said:
So it's a Low-Security MIUI version?
Click to expand...
Click to collapse
Exactly.
You can use meta mode on ENGINEERING rom too, so you can write IMEI, bluetooth MAC, wifi MAC...

VD171 said:
Exactly.
You can use meta mode on ENGINEERING rom too, so you can write IMEI, bluetooth MAC, wifi MAC...
Click to expand...
Click to collapse
Oh ok so for developers this is great

XdaInsiderAndDev said:
Oh ok so for developers this is great
Click to expand...
Click to collapse
Yes, perfect.

it works 1000000000%...my phone back from the dead after flashing with this rom

Faith1 said:
it works 1000000000%...my phone back from the dead after flashing with this rom
Click to expand...
Click to collapse
Good work, my friend.
Enjoy

Thanks for this, will it work on Poco C31 (Angelicainin) already on 12.5.1 rom?

manojmat29 said:
Thanks for this, will it work on Poco C31 (Angelicainin) already on 12.5.1 rom?
Click to expand...
Click to collapse
I'm not sure, I'm sorry.

VD171 said:
Good work, my friend.
Enjoy
Click to expand...
Click to collapse
Works on redmi 9 Activ (cattail)??
Angelica and cattail have the same looks and processors and custom ROMs generally work on BOTH of them so.....I hope it works

Benjamin B C H said:
Works on redmi 9 Activ (cattail)??
Angelica and cattail have the same looks and processors and custom ROMs generally work on BOTH of them so.....I hope it works
Click to expand...
Click to collapse
Probably, no.
It works for Angelica devices only.

VD171 said:
Probably, no.
It works for Angelica devices only.
Click to expand...
Click to collapse
I tried it
It did work on cattail
But any ideas on how to get back IMEI on Redmi 9C?? Devices doesn't boot to META mode even while using ENG firmware

Related

How to root samsung galaxy Ace 4 lite duos

I need root my device
Samsung Galaxy Ace 4 Lite Duos
Nombre del dispositivo/Numero de modelo: SM-G313ML
Android: 4.4.2
Banda Base: G313MLUBU0ANH1
Kernel: 3.10.17-2383385 [email protected] #2 Thu Jul 31 20:05:44 KST 2014
Numero de compilación: KOT49H.G313MLUBU0AANH1
Already use without result the framaroot and Towelroot.
In CF of Chainfire I didn't find none it specifies for my device
Can somebody indicate me a solution?
Orlando1953 said:
I need root my device
Samsung Galaxy Ace 4 Lite Duos
Nombre del dispositivo/Numero de modelo: SM-G313ML
Android: 4.4.2
Banda Base: G313MLUBU0ANH1
Kernel: 3.10.17-2383385 [email protected] #2 Thu Jul 31 20:05:44 KST 2014
Numero de compilación: KOT49H.G313MLUBU0AANH1
Already use without result the framaroot and Towelroot.
In CF of Chainfire I didn't find none it specifies for my device
Can somebody indicate me a solution?
Click to expand...
Click to collapse
i am not sure, but you could try ROOT GENIUS.
Mufrad said:
i am not sure, but you could try ROOT GENIUS.
Click to expand...
Click to collapse
I already proved geniusroot it without results, also Kingo root
Thank you for their help
.
Hello, after so long finally found a way looking to root my device, enter this site and there is the whole process that is safe and easy to do.
http :// root-samsung-galaxy-ace-4.blogspot.com.br/2014/12/como-rootear-el-samsung-galaxy-ace-4-sm.html?showComment=1420901854337#c1268354575780548393

HELP!!!!!!!!!!!!!!!!!!!!!!!!!!

my lenovo vibe k5 (A6020a40) stuck on lenovo boot logo screen and not booting up ... i tried almost all the stock roms such as AIM-System-V2.5-20171001-UNOFFICIAL-A6020-FINAL , cm-13.0-20160824-UNOFFICIAL-A6020 , DOT-N-v1.2-20180812-A6020-UNOFFICIAL , flyme_Lenovo-K32c36_Deelie_6.7.6.30IR , pac_A6020_MM.Stable.Official_20161021-140123 , ResurrectionRemix-M-v5.7.4-20160920-A6020 but the result is same it alwys get stuck on the lenovo boot screen and dont boot up futher... and i left the phone for a whole day after installing the custom rom but still it doesnt boot up and remained stuck on lenovo boot logo....but whenever i install AOSPExtended Android 8.1 Oreo ROM it boots up without any issues...
plzzzzzzz if anyone have the solution plz resolve this issue
Eu não sei inglês, mas aqui a solução:
(Google Translate)
Custom rom? use this forum here: Vibe k5 and Vibe K5 Plus
Solution: link.
IMPORTANT:
Your device was not detected:
Configuration -> Update and Security -> Restart Advanced -> Troubleshooting -> Advanced Options -> Startup Settings -> Button 7 - Disable Drive Signing Imposition
Install the Qualcomm USB Drivers again.
Caso tenha erro de tradução:
Configuração -> Atualização e Segurança -> Reiniciar Avançada -> Solução de Problemas -> Opções avançadas -> Configurações de Inicialização -> Botão 7 - Desativar Imposisão de Assinatura de Drives
Do you install android mods after the ROM install.
Something like Magisk, because this mod patches boot.img and sometimes you can't boot.
Also try something else than the stock ROM... So far my K5 is very stable and performs better with a custom ROM.
Try Lineage 14, 15, but 16 is a little buggy.
Or even better try AEX 6.1 (Pie) - I'm on this one...

Help Soft Android MXQ-4K

mxqpro-6051-414p-nv5-0705.img
Board Number
MXQ-4K-3229X3D-20170928-V1.8
asmar271164 said:
mxqpro-6051-414p-nv5-0705.img
Número da placa
MXQ-4K-3229X3D-20170928-V1.8
Click to expand...
Click to collapse
This box has 3D-NAND flash storage, so only the (stock) firmware that contains driver for this type of memory (SpecTek PFF62) is suitable.
rk3229_7.1_box_MX4VB_SSV6051p_SpecTek_flash-update_20171209.img -->
Scishion V88 [Android] - 4PDA
Scishion V88 [Android], [TV Box][Rockchip RK3229]
4pda.to

Firmware FullOTA-MF Rhone-L22 C636 8.0.0.361 EMUI v8 Android 8.0 (the last stock rom)

Firmware FullOTA-MF Rhone-L22 C636 8.0.0.361 EMUI v8 Android 8.0 (the last stock rom) with 2 new partitions: preas and preavs
preas -> /dev/block/mmcblk0p52
preavs -> /dev/block/mmcblk0p53
RNE-L02 8.0.0.361(C636)
RNE-L22 8.0.0.361(C636)
Rhone-L22C636CUSTC636D1B361_8.0.0.361_Asia_Pacific
Model Code Name: Rhone-L22
Model Name: HUAWEI NOVA 2I
Language Code: C636
Region / Country: Asia Pacific
EMUI Version: 8.0.0.361
OS Version: Android Oreo V8.0
Firmware Type: FullOTA-MF
File Size: 2.00 GB
Link download:
Code:
http://update.dbankcdn.com/download/data/pub_13/HWHOTA_hotaMigrate_900_9/a5/v3/7e4e4d03b7224ab7831133bd81a1c603/full/update.zip
http://update.dbankcdn.com/download/data/pub_13/HWHOTA_hotaMigrate_900_9/a5/v3/7e4e4d03b7224ab7831133bd81a1c603/full/RNE-L22_hw_spcseas/update_full_RNE-L22_hw_spcseas.zip
http://update.dbankcdn.com/download/data/pub_13/HWHOTA_hotaMigrate_900_9/a5/v3/7e4e4d03b7224ab7831133bd81a1c603/full/public/update_data_full_public.zip
Update with my attached custom TWRP img file with HuRUpdate 0.4
Code:
https://forum.xda-developers.com/t/tool-hurupdater-0-4-flash-official-firmware-in-recovery.3769279/
https://www.getdroidtips.com/hurupdater-tool/
You must factory reset the phone after install this.
This update improves system security with Android security patches.
[Security]
Integrates Android security patches released in September 2020 for improved system security. For more information on the security of Huawei EMUI system updates, please visit the official Huawei website:
Huawei EMUI security updates Sep-20|HUAWEI Support Global
We are releasing monthly security updates for flagship models. This security update includes Google patches.This security update includes the CVE announced in the September 2020 Android security bulletin.
consumer.huawei.com
Update notes:
1. This update will not erase your personal data, but we recommend that you back up any important data before updating.
2. If you encounter any issues during the update, please call the Huawei customer service hotline or visit a Huawei customer service center for assistance.
3. The update package will be deleted automatically after the update is complete.
Bộ rom đầy đủ cứu máy brick cho điện thoại Huawei Nova 2i.
Flash bằng TWRP qua tập tin HuRUpdater_0.4 zip đòi hỏi máy phải được unlock bootloader trước (cách làm chi tiết vui lòng hỏi chị Google).
nttuan said:
Firmware FullOTA-MF Rhone-L22 C636 8.0.0.361 EMUI v8 Android 8.0 (the last stock rom) with 2 new partitions: preas and preavs
preas -> /dev/block/mmcblk0p52
preavs -> /dev/block/mmcblk0p53
RNE-L02 8.0.0.361(C636)
RNE-L22 8.0.0.361(C636)
Rhone-L22C636CUSTC636D1B361_8.0.0.361_Asia_Pacific
Model Code Name: Rhone-L22
Model Name: HUAWEI NOVA 2I
Language Code: C636
Region / Country: Asia Pacific
EMUI Version: 8.0.0.361
OS Version: Android Oreo V8.0
Firmware Type: FullOTA-MF
File Size: 2.00 GB
Link download:
Code:
http://update.dbankcdn.com/download/data/pub_13/HWHOTA_hotaMigrate_900_9/a5/v3/7e4e4d03b7224ab7831133bd81a1c603/full/update.zip
Update with my attached custom TWRP img file with HuRUpdate 0.4
Code:
https://forum.xda-developers.com/t/tool-hurupdater-0-4-flash-official-firmware-in-recovery.3769279/
https://www.getdroidtips.com/hurupdater-tool/
You must factory reset the phone after install this.
Click to expand...
Click to collapse
Hi, have you tried this method? The update package contains only update.zip file . I tried to flash your update via HuRupdater, but after successfully flashing my phone stay on previous build number - 8.0.0.321, imo due to missing hw and data files.
But maybe I'm wrong
I've already tried and using it.
It's ok. Firmware version is store in oeminfo partition and it's not be updated.
nttuan said:
It's ok. Firmware version is store in oeminfo partition and it's not be updated.
Click to expand...
Click to collapse
. Have a nice day !
Update link 3 files.
nttuan said:
Update link 3 files.
Click to expand...
Click to collapse
Yes, now it should work ...
Hey guys, can you teach me how I can flash this? I'm new to this device, thanks in advance

[V2][ENGINEERING][ROM][OFFICIAL] OFFICIAL Engineering Firmware for LANCELOT (Redmi 9 / Redmi 9 Prime)

Works with:
- Xiaomi Redmi 9
- Xiaomi Redmi 9 Prime
Build Date:
2020/11/13
Android Version:
QP1A.190711.020
Display ID:
dandelion-userdebug 10 QP1A.190711.020 440 test-keys
Build Fingerprint:
Redmi/dandelion/dandelion:10/QP1A.190711.020/440:userdebug/test-keys
Security Patch:
2020-03-05
Radio/Modem/Baseband Version:
MOLY.LR12A.R3.MP.V98.P49
Download:
https://www.mediafire.com/file/3w00...V016-Q-0918_QP1A.190711.020_by-VD171.zip/file
Password:
Pass is in the attached file: PASSWORD_by_VD171.txt
How to flash it?
Use the attached scatter file.
Radio/Modem/Baseband properties:
Code:
md1_dbginfodsp=DbgInfo_DSP_MT6768_MOLY_LR12A_R3_MP_V98_P49_2020_06_28_11_09.xz
md1_dbginfo=DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V98_P49_2020_06_30_17_53.xz
md1_mddbmeta=MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V98_P49.EDB
md1_mddbmetaodb=MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V98_P49.XML.GZ
md1_mddb=MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V98_P49.EDB
Prop.default:
Code:
ro.build.version.incremental=20
ro.vendor.build.version.incremental=20
ro.odm.build.version.incremental=20
ro.build.version.security_patch=2019-12-05
ro.vendor.build.security_patch=2019-12-05
ro.build.display.id=AL2615-lancelot-V016-Q-0918
ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp2-V1.9.1_huaqin.q0mp1.k69v1.64_P17
ro.product.system.device=lancelot
ro.product.system.model=lancelot
ro.product.system.name=lancelot
ro.build.product=lancelot
ro.product.board=lancelot
ro.product.vendor.device=lancelot
ro.product.vendor.model=lancelot
ro.product.vendor.name=lancelot
ro.product.odm.device=lancelot
ro.product.odm.model=lancelot
ro.product.odm.name=lancelot
ro.product.product.device=lancelot
ro.product.product.model=lancelot
ro.product.product.name=lancelot
ro.build.flavor=lancelot-userdebug
ro.build.description=lancelot-userdebug 10 QP1A.190711.020 20 test-keys
ro.board.platform=mt6768
ro.system.build.id=QP1A.190711.020
ro.build.id=QP1A.190711.020
ro.vendor.build.id=QP1A.190711.020
ro.odm.build.id=QP1A.190711.020
ro.product.build.id=QP1A.190711.020
ro.system.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/20:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/20:userdebug/test-keys
ro.bootimage.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/20:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/20:userdebug/test-keys
ro.product.build.fingerprint=Redmi/lancelot/lancelot:10/QP1A.190711.020/20:userdebug/test-keys
ro.system.build.tags=test-keys
ro.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.type=userdebug
ro.build.type=userdebug
ro.vendor.build.type=userdebug
ro.odm.build.type=userdebug
ro.system.build.date=Fri Sep 18 22:19:19 CST 2020
ro.build.date=Fri Sep 18 22:19:19 CST 2020
ro.vendor.build.date=Fri Sep 18 22:19:19 CST 2020
ro.bootimage.build.date=Fri Sep 18 22:19:19 CST 2020
ro.odm.build.date=Fri Sep 18 22:19:19 CST 2020
ro.product.build.date=Fri Sep 18 22:19:19 CST 2020
MD5 hashes:
Code:
APDB_MT6768_S01__W2006 -> 7177e8c1bb17e5fd98f0e6723799c50d
boot-debug.img -> 4554a3ae2c6e29a48b2550f2a9ba0059
boot.img -> 8b017ceb0d1fb8cfba84edb3d075a3da
cache.img -> 6972e40cf2fab817af657638ef074d44
Checksum.ini -> 27f0bde03463632c322fc0afb67c446c
crclist.txt -> f23ab0e10114086a411a3bdd36c2e935
cust.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V98_P14_2020_04_02_09_21_1_ulwctg_n -> b98ee0dd6410d951a97dc06195ba83e8
dtb.img -> bfe051e750bab9942d3509be26852f76
dtbo-verified.img -> cb8f212deca67eac25064b736e6ab722
dtbo.img -> cb8f212deca67eac25064b736e6ab722
efuse.img -> 421f2cead0fbea555680b96136555941
exaid.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
flash_all.bat -> 2e9b6766c41f291f6ed47c28cf476396
flash_all.sh -> 2fbbf3a1ad0556f5750da749007fbfb5
flash_all_except_data_storage.bat -> b3eae922880d6de2ef1ccbbbe04eb491
flash_all_except_data_storage.sh -> 046f69b79cef396dfeb3fa16a6e0a702
flash_all_lock.bat -> 118f2f4a04889d5b56cc0a4d9ae1148e
flash_all_lock.sh -> 7b905c508c810a28cfbcfbb51ee718eb
flash_gen_md5_list.py -> dd670ee88280d308473a7aff355b975d
hat_extract.py -> cbf07a5e8389476f4ed71e34dcbd7591
hat_flash.sh -> fa3bdd091388cdb3fff69421cf4187cd
lk-verified.img -> 3f7bccf0ce4e391845c4c4d807a21f0a
lk.img -> 3f7bccf0ce4e391845c4c4d807a21f0a
logo.bin -> d8701054eb8587fec3c7827d44361385
md1arm7.img -> a0453e723dc84255940d7791740d06db
md1img-verified.img -> e3980a4c60a54bdf58e09e1172659d1a
md1img.img -> e3980a4c60a54bdf58e09e1172659d1a
md3img.img -> 9a9c185e3f6234103e5949716b9962d2
MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V98_P14_1_ulwctg_n.XML.GZ -> 376361df52cddd8e2d8127c009ad9a97
MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V98_P14_1_ulwctg_n.EDB -> 762c8ba299c76dde214394d8e7e3fc7e
MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V98_P14_1_ulwctg_n.EDB -> a5757c7b6acf3e52ce051d731f1e11ab
MT6768_Android_scatter.txt -> 49ccb3ee5ebcd5a1da213f6e6a97f6e0
preloader.img -> f8518bd0ea6b1e141f44a6ef0ef8a999
preloader_emmc.img -> f8518bd0ea6b1e141f44a6ef0ef8a999
preloader_lancelot.bin -> 06f72184cadcbe4b23c858a533aab1c3
preloader_ufs.img -> a567cfe99bcf994eb1a4450be29e9d46
product.img -> 9670aa56e5c8c2b3df3738840c29d8b6
ramdisk-debug.img -> e983139c5a4a17f856b48a9168462246
ramdisk-recovery.img -> 9d154bc54802d9bb300460d47e466678
ramdisk.img -> b280f1a76fd113fa4a2819c131bd5a4b
recovery.img -> 2aeb935e9e4ebfdf8a5f24a6afe84a2c
scp-verified.img -> 3173d15281606ed65d30125786df26a8
scp.img -> 3173d15281606ed65d30125786df26a8
secro.img -> 096587b863e1252d67b1b8307291db09
sparsecrclist.txt -> 18c229554165f5ab08760f77a8cb7171
spmfw-verified.img -> 3c1ea62d3b90ba09910b21b5967177be
spmfw.img -> 3c1ea62d3b90ba09910b21b5967177be
sspm-verified.img -> e298071c20c2cb4e2d3a82bf11232953
sspm.img -> e298071c20c2cb4e2d3a82bf11232953
super.img -> 108f18840dc902c7caaade3219b703b9
super_empty.img -> a6d56d7a12d989bf31511d866449291d
system.img -> b222d039308ba3ed86259418836e987c
tee-verified.img -> 18cf1db4268682f26f621b22dcdb2e55
tee.img -> 18cf1db4268682f26f621b22dcdb2e55
userdata.img -> f587cb8342ac2e4b081d2655d71c8913
vbmeta.img -> 33424ed5ce956942dbc935ab54ff4cc5
vbmeta_system.img -> 7450f65dc4afef75b2d25c24d20ff077
vbmeta_vendor.img -> 66bd3b645785e28e4046394d66a46e0e
vendor.img -> 1b11032ffa59c02c2c97f911d508f4a3
after updating to lancelot_global_images_V12.5.3.0.RJCMIXM_20211017.0000.00_11.0_global
i can no longer make this eng rom works every time i flash it the phone goes in erasing boot loop until I go back to the latest global rom
coliotte said:
after updating to lancelot_global_images_V12.5.3.0.RJCMIXM_20211017.0000.00_11.0_global
i can no longer make this eng rom works every time i flash it the phone goes in erasing boot loop until I go back to the latest global rom
Click to expand...
Click to collapse
Engineering rom and stock rom has different partitions tables.
So, if you are in one and want to flash another, you need to flash partition table again.
This can be done flashing the rom using spflashtool.
i flashed using spflash tool and Ultimate Multi Tool - MTK and nck tool
flash normal but boot loop after this same eng from used to work but after update it become boot looping.
unlocking the bootloader didn't help eather
do you have J19-AL2615-lancelot-V016-Q-0918 ?
am not sure but I think this is a new version am not sure how to solve this I haven't seen someone with this problem yet
coliotte said:
i flashed using spflash tool and Ultimate Multi Tool - MTK and nck tool
flash normal but boot loop after this same eng from used to work but after update it become boot looping.
unlocking the bootloader didn't help eather
do you have J19-AL2615-lancelot-V016-Q-0918 ?
am not sure but I think this is a new version am not sure how to solve this I haven't seen someone with this problem yet
Click to expand...
Click to collapse
You may need to format data.
For anyone with a Redmi 9, I finally flashed the ENG rom after days of trying with the attached files:

Categories

Resources