General [ENGINEERING][ROM][OFFICIAL] OFFICIAL Engineering Firmware for LIME (Redmi 9 Power / Redmi 9T) - Redmi 9 Power / 9T
Works with:
- Xiaomi Redmi 9 Power
- Xiaomi Redmi 9T
Build Date:
2021/06/13
Android Version:
QKQ1.200730.002
Display ID:
QL2880-lime-V065-Q-0613
Build Fingerprint:
Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
Security Patch:
2020-10-01
Radio/Modem/Baseband Version:
A.1.0-00505.1-KAMORTA_GEN_PACK-3
Download:
https://www.mediafire.com/file/y25b...ing_QL2880-lime-V065-Q-0613_by-VD171.zip/file
Password:
Pass is in the attached file: PASSWORD_by_VD171.txt
Prop.default:
Code:
ro.build.version.incremental=1648
ro.odm.build.version.incremental=1648
ro.vendor.build.version.incremental=1648
ro.product.board=lime
ro.product.odm.device=lime
ro.product.odm.model=lime
ro.product.odm.name=lime
ro.product.system.device=lime
ro.product.system.model=lime
ro.product.system.name=lime
ro.product.vendor.device=lime
ro.product.vendor.model=lime
ro.product.vendor.name=lime
ro.build.flavor=lime-userdebug
ro.build.display.id=QL2880-lime-V065-Q-0613
ro.board.platform=bengal
ro.build.id=QKQ1.200730.002
ro.odm.build.id=QKQ1.200730.002
ro.system.build.id=QKQ1.200730.002
ro.vendor.build.id=QKQ1.200730.002
ro.bootimage.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
ro.system.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
ro.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.build.type=userdebug
ro.odm.build.type=userdebug
ro.system.build.type=userdebug
ro.vendor.build.type=userdebug
ro.build.version.security_patch=2020-10-01
ro.vendor.build.security_patch=2020-10-01
ro.bootimage.build.date=Sun Jun 13 11:26:22 CST 2021
ro.build.date=Sun Jun 13 11:26:22 CST 2021
ro.odm.build.date=Sun Jun 13 11:26:22 CST 2021
ro.system.build.date=Sun Jun 13 11:26:22 CST 2021
ro.vendor.build.date=Sun Jun 13 11:26:22 CST 2021
MD5 hashes:
Code:
abl.elf -> 307b569127da67ebdeb370565583de1a
adsp.mbn -> ffa7d3bc5ef6f891ab5125d48234b89b
Android.mk -> 9974f4247eb0ae79e4b255bc9f00fcbb
AndroidBoard.mk -> a6b120e6be701425f0173dd692da4251
AndroidProducts.mk -> 02ceda404d626107e7120c75b69f78e0
apdp.mbn -> f07702b513692fcc0527f7b110352349
BoardConfig.mk -> 9faf9a77e686cdf7c376b597187f9ac3
boot-debug.img -> 6a4e7d179387eb2e2bf34289c7b0c5a8
boot.img -> 1657f03a47b851e8a4bb8c17c8ccb86a
BTFM.bin -> 60bafd6a584fb0a7400cf2165ca88e43
cache.img -> b8153431cc4d6ea191b645e0a128bdc0
cdsp.mbn -> 011980a2a26de149c948c1231d53cf22
cmnlib.mbn -> 77fa0376beb60fb0bd012a6494df9a6a
cmnlib64.mbn -> f355ecc5aa729b2d2b1c368b78251538
crclist.txt -> e02e29f4e54bd8296d21e58e631e9d2d
devcfg.mbn -> f1a7eeb49175d09288c17617f518646f
dspso.bin -> 05ac90f5b8ed3081953bfc6fa6892723
dtb.img -> 39e42397b1a22d76cd719541c5352098
dtbo.img -> ee0390d2139b9ee762e78284856c4621
featenabler.mbn -> 72cee21b29be1d40fc1c67ba7f77b2b3
ffu_list.txt -> de14db3496000a21b5dfab4aebbdd65b
fpctzappfingerprint.mbn -> 74fa2cff302eba319ceab45fe6800584
framework_manifest.xml -> 27356acf4cc0f74dcc57a6d15feacf4d
fsgall.img -> f41be81fc7bc6399253ff709f7505b6f
fstab_AB_dynamic_partition.qti -> 7c3d314e66a594d3eb4e33595ffc38be
fstab_AB_variant.qti -> 119a06c449fd04b505197683f0efcd09
fstab_non_AB_dynamic_partition.qti -> 6f4d0e4bae0bae60b6d71fac323dc472
fstab_non_AB_variant.qti -> 6dec0d19154c8281a42442fcb86bbb83
goodixfp.mbn -> c2ef5ece85b46b8da46e22e7a5c76524
gpio-keys.kl -> fab01e275a873c98eb02d028914d106e
gpt_backup0.bin -> a36dcedb727673b91a2e7b8b22a1aa75
gpt_backup1.bin -> f0de661557245fd66019c67609c947da
gpt_backup2.bin -> c06bcb8b4e61886020a05a285acd741c
gpt_backup3.bin -> befa5fc7e32238c271d301809de66e02
gpt_backup4.bin -> 2b488b4ca19529696da66503c31fec99
gpt_backup5.bin -> 5297cf70c8bea38c889f4a7f7cb34aed
gpt_both0.bin -> 5cad138c5ee02829f9c93b05b204f95e
gpt_both1.bin -> bd2495d9ab349f50b79b1ff725dbe685
gpt_both2.bin -> 70eb31cdc704c1069733716a954c4f56
gpt_both3.bin -> 4089e123aa5efeef27e243ff672971f4
gpt_both4.bin -> 6e7eeea89b88461b4ab002c01be3ea5a
gpt_both5.bin -> 9f4fea4d36ccd14d4e2520d5dc63374d
gpt_empty0.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty1.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty2.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty3.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty4.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty5.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_main0.bin -> 02a364a649d8ceacfb1d4ef999c69a32
gpt_main1.bin -> 89cd12e778b682e1bbef3c39d4c04b47
gpt_main2.bin -> 0126324ac62639234b97c15b24a3fb6a
gpt_main3.bin -> 79d7af8800e97a51b6a3777275f4c8dc
gpt_main4.bin -> f81792b8fce6267a71cb2f1ef1ce3666
gpt_main5.bin -> 41043df5c47c07d3204f8ccecb4e7978
gptest.mbn -> c566897e78ab5c509715fa45dcf4a5f0
haventkn.mbn -> f2aebab2e886c94644eeda2f27d5addf
hyp.mbn -> 42208206997cfade7c3e48b356eab71a
imagefv.elf -> 6aa23453aa999dc35eba9923f1441609
init.target.rc -> aeb427a1c3333b6d9dc77f3f776eb506
km4.mbn -> 9a438dc22df7c80178cacfd62ef60184
lime.mk -> 1dfbe34c27e319b90441c9a89af1d39d
logfs_ufs_8mb.bin -> c040a889d66a4f120f502f89b551f42b
manifest.xml -> caf0e96e0c0bf30f991f165030fa3cc4
manifest_ab.xml -> b623b992da295acd8310f43e8f4ebe85
metadata.img -> ac7abb42ba4dd0f75335153549f41f84
MICRON_LYRA2_64GB_0605.bin -> e35b487e8c63d492aac16db97cbd77ef
multi_image.mbn -> 434a8847eb2848e3ed6f25713aadad53
NON-HLOS.bin -> 875cb19f6013dfe44f1d15fc7b5159e2
NOTICE -> 98017cf03a7e1b612bcf232f9b44aa2e
odm_manifest_lemon.xml -> 9b290f8f379c3e8a6f8f79822acac677
odm_manifest_lime.xml -> 2384e886ad7573acb92604d4103c1c87
odm_manifest_pomelo.xml -> 2384e886ad7573acb92604d4103c1c87
partition.xml -> e3b3e37247680b45408fd3d1982eca09
patch0.xml -> 15694a6e6716908db07b048d915ab37f
patch1.xml -> 0780990ee59934bdcaffc918cac99aed
patch2.xml -> 81036277fd056a16c0e418a756a5a835
patch3.xml -> f1e955eeee449ed57767ac0b87552cf1
patch4.xml -> 82a65c3c86ad47ffa1aaa21417598c32
patch5.xml -> 90ed396b2667209688b315f4dcc37104
persist.img -> 9c8f964fb03faa6a79d6e4ab2dd1957d
prebuilt_dtbo.img -> 5a310187621d72f82d672daf91231463
product.img -> 3edbde6439c089e66368cd370c6cd903
prog_firehose_ddr.elf -> 13dd339bd2db3a8c9bdfa6357d41ca12
ProjectConfig.mk -> 8f9e31321f8452a1e690f2e426ad8a22
provision_hynix.xml -> c7fecbec91b6aa5449bbe7ff5c2ca51d
PT_3Dv5_TLC_Voyager_UFS2.2_A251_USER.bin -> ca3088a07474377f54429f7cb1d9d7a2
public.libraries-qti.txt -> d599da22e6c4b8467ce28e1e562250eb
qupv3fw.elf -> dde60357158c8f7275aa153d8e221bba
ramdisk-debug.img -> e931fe2a009dbaab4f60775f83f0e772
ramdisk-recovery.img -> 8e579f57d0695d925b08a63b57c809f1
ramdisk.img -> 19e3f68d17f4d8f5a8b47d24a4d3e72b
rawprogram0.xml -> 98c3a8110edccdf01c57bfa5f0dd97a3
rawprogram0_BLANK_GPT.xml -> b3200cadf9be377d4f950cc03f4490a6
rawprogram0_WIPE_PARTITIONS.xml -> a08020b62484e1bfa7dbc6a7a76ac8fb
rawprogram1.xml -> 1df8d77508440b40cce09e94d5904af9
rawprogram1_BLANK_GPT.xml -> 30c9b7228531bbc0a0bfc5421105c196
rawprogram1_WIPE_PARTITIONS.xml -> 2c9dd8708195e23f910c0728873662c6
rawprogram2.xml -> 5b75a6083172cce4147d4a8769d81a55
rawprogram2_BLANK_GPT.xml -> 3198bf3e352b48600e63b90979e71a08
rawprogram2_WIPE_PARTITIONS.xml -> db15a8c1ac994e50be924e32ed9f03f4
rawprogram3.xml -> e03411d04b290ffe1ea9b993d1f23074
rawprogram3_BLANK_GPT.xml -> 439d4e875584101690085e1c95833e24
rawprogram3_WIPE_PARTITIONS.xml -> 3322789cb2c9e42bebd04f364e7a7aed
rawprogram4.xml -> fbaa3ea21bca23aa413bb9167773c7c7
rawprogram4_BLANK_GPT.xml -> 4d34e3bb4a83abdbe5f1fbf972d31918
rawprogram4_WIPE_PARTITIONS.xml -> 1dae44f86205d39ac83a6f83ee8911ad
rawprogram5.xml -> ebc54f7ab9d20e97b7601fb71bab4d6f
rawprogram5_BLANK_GPT.xml -> 93e0a3b178a136cda2cbab8de547f645
rawprogram5_WIPE_PARTITIONS.xml -> 9abf9d0a5859d4394a159ea29b499d9a
recovery-two-step.img -> a5a6f212c93886ff8515c2479ef4bfb2
recovery.img -> 251497aba4fed6188919606dda5cd715
recovery_AB_dynamic_partition.fstab -> a1734c76b6cf3c7cceb6384f2b167bf9
recovery_AB_variant.fstab -> 131037786ef6b9a8c56a1e34cb03ecc5
recovery_non-AB_dynamic_partition.fstab -> e4e761473a7a0e190c3e0ed5d5438600
recovery_non-AB_variant.fstab -> 379263def26dcaf344aa027980f4b731
rpm.mbn -> 05c3096461be56f1d94200be9124c547
S101_64G_430bda1ae4_MICRON.bin -> 2644fac2ba2516c40aee7cc543544a29
S201_64G_dd6e035122_MICRON.bin -> ea229b469d8e39e2d411cdac0fc467fa
SANTOS_UFS_2_2_V5_TLC_256Gb_128GB_P17.bin -> 1238740ee9d31d3f5b560c61f94f7845
Santos_V5_TLC_128GB_P15_General.bin -> f02b19fc3bcb8f2a9f1c8bdb919a86ac
sec.dat -> 21775907582b06389a656ab56011c160
sec.elf -> db0ff694b116843bef34a1b8fc1fbd5b
smplap64.mbn -> 6ef1323ee8a74727359ca510719fea36
soter64.mbn -> 9ecc10629adb114076489cd12540d94c
sparsecrclist.txt -> a6b02a3d5d0819ae7a994decbb456db9
storsec.mbn -> cbcaa3cd55ef02eb318066eaa800cf90
super.img -> ec54cd76fc3d8300a37222bc9ad9b31a
super_empty.img -> 1f8c5307a34885c9577d875d5c366d93
system.img -> 2e1cd737578b8c94dd0ead1c9ddeb97f
system.prop -> dcf0fa9fc04edeaed8ef6a9d0d224276
tz.mbn -> 21c38fd53a3c46e1ebdb2efc59bacba7
uefi_sec.mbn -> 4a28fa0f72ecc18a173d8035098e36c5
userdata.img -> e952e2c175d99f35d20acdd31d90e8f2
vbmeta.img -> 1cbd4a76cf8bc05d1dc3f84fb2dacf02
vbmeta_system.img -> 74a918bbd11203de6d001c2ebade8f08
vendor.img -> 3dd4303c5c516e33f374a6419e0656b6
vold.fstab -> a1e06a3daf0404cb89944e95dfdd8fec
widevine.mbn -> f07842bfedbf439111d9be6a6a35eb81
xbl.elf -> 14cda50cabdaaae74a0a204a39b68b32
xbl_config.elf -> 7975e2560048f7c4a543045d399091ee
Xiaomi_Columbus_S76_PRV_0005_Official_FW_bitflip_count.bin -> fc9018659527ad3add419eff38a75753
Xiaomi_Columbus_S76_T005_Test _FW_bitflip_count.bin -> 7f6647928bb0eb78b2c583603fffd460
zeros_1sector.bin -> 620f0b67a91f7f74151bc5be745b7110
zeros_5sectors.bin -> daa100df6e6711906b61c9ab5aa16032
Woah, nice!
Done.
Uploaded.
Enjoy !
Hey,
I noticed that the EDL Loader included in the Engineering Firmware does not require an authentication, meaning that the Redmi 9T can now be unbricked without having to contact a Service Center, etc.
Thank you
TheRedHugo said:
Hey,
I noticed that the EDL Loader included in the Engineering Firmware does not require an authentication, meaning that the Redmi 9T can now be unbricked without having to contact a Service Center, etc.
Thank you
Click to expand...
Click to collapse
Very good work, my friend.
You are welcome
Hello, phone come with problem:
Not power on, when connect to PC - hs-usb qdloader 9008
Try flash it. Flash Ok, but problem same
Not power on, when connect to PC - hs-usb qdloader 9008
What may be? Memory die?
Abzal said:
Hello, phone come with problem:
Not power on, when connect to PC - hs-usb qdloader 9008
Try flash it. Flash Ok, but problem same
Not power on, when connect to PC - hs-usb qdloader 9008
What may be? Memory die?
Click to expand...
Click to collapse
If you can flash to the device, it is not dead.
So what problem may be?
VD171 said:
Works withass
- Xiaomi Redmi 9 Power
- Xiaomi Redmi 9T
Build Date:
2021/06/13
Android Version:
QKQ1.200730.002
Display ID:
QL2880-lime-V065-Q-0613
Build Fingerprint:
Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
Security Patch:
2020-10-01
Radio/Modem/Baseband Version:
A.1.0-00505.1-KAMORTA_GEN_PACK-3
Download:
https://www.mediafire.com/file/y25b...ing_QL2880-lime-V065-Q-0613_by-VD171.zip/file
Password:
Pass is in the attached file: PASSWORD_by_VD171.txt
Prop.default:
Code:
ro.build.version.incremental=1648
ro.odm.build.version.incremental=1648
ro.vendor.build.version.incremental=1648
ro.product.board=lime
ro.product.odm.device=lime
ro.product.odm.model=lime
ro.product.odm.name=lime
ro.product.system.device=lime
ro.product.system.model=lime
ro.product.system.name=lime
ro.product.vendor.device=lime
ro.product.vendor.model=lime
ro.product.vendor.name=lime
ro.build.flavor=lime-userdebug
ro.build.display.id=QL2880-lime-V065-Q-0613
ro.board.platform=bengal
ro.build.id=QKQ1.200730.002
ro.odm.build.id=QKQ1.200730.002
ro.system.build.id=QKQ1.200730.002
ro.vendor.build.id=QKQ1.200730.002
ro.bootimage.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
ro.system.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
ro.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.build.type=userdebug
ro.odm.build.type=userdebug
ro.system.build.type=userdebug
ro.vendor.build.type=userdebug
ro.build.version.security_patch=2020-10-01
ro.vendor.build.security_patch=2020-10-01
ro.bootimage.build.date=Sun Jun 13 11:26:22 CST 2021
ro.build.date=Sun Jun 13 11:26:22 CST 2021
ro.odm.build.date=Sun Jun 13 11:26:22 CST 2021
ro.system.build.date=Sun Jun 13 11:26:22 CST 2021
ro.vendor.build.date=Sun Jun 13 11:26:22 CST 2021
MD5 hashes:
Code:
abl.elf -> 307b569127da67ebdeb370565583de1a
adsp.mbn -> ffa7d3bc5ef6f891ab5125d48234b89b
Android.mk -> 9974f4247eb0ae79e4b255bc9f00fcbb
AndroidBoard.mk -> a6b120e6be701425f0173dd692da4251
AndroidProducts.mk -> 02ceda404d626107e7120c75b69f78e0
apdp.mbn -> f07702b513692fcc0527f7b110352349
BoardConfig.mk -> 9faf9a77e686cdf7c376b597187f9ac3
boot-debug.img -> 6a4e7d179387eb2e2bf34289c7b0c5a8
boot.img -> 1657f03a47b851e8a4bb8c17c8ccb86a
BTFM.bin -> 60bafd6a584fb0a7400cf2165ca88e43
cache.img -> b8153431cc4d6ea191b645e0a128bdc0
cdsp.mbn -> 011980a2a26de149c948c1231d53cf22
cmnlib.mbn -> 77fa0376beb60fb0bd012a6494df9a6a
cmnlib64.mbn -> f355ecc5aa729b2d2b1c368b78251538
crclist.txt -> e02e29f4e54bd8296d21e58e631e9d2d
devcfg.mbn -> f1a7eeb49175d09288c17617f518646f
dspso.bin -> 05ac90f5b8ed3081953bfc6fa6892723
dtb.img -> 39e42397b1a22d76cd719541c5352098
dtbo.img -> ee0390d2139b9ee762e78284856c4621
featenabler.mbn -> 72cee21b29be1d40fc1c67ba7f77b2b3
ffu_list.txt -> de14db3496000a21b5dfab4aebbdd65b
fpctzappfingerprint.mbn -> 74fa2cff302eba319ceab45fe6800584
framework_manifest.xml -> 27356acf4cc0f74dcc57a6d15feacf4d
fsgall.img -> f41be81fc7bc6399253ff709f7505b6f
fstab_AB_dynamic_partition.qti -> 7c3d314e66a594d3eb4e33595ffc38be
fstab_AB_variant.qti -> 119a06c449fd04b505197683f0efcd09
fstab_non_AB_dynamic_partition.qti -> 6f4d0e4bae0bae60b6d71fac323dc472
fstab_non_AB_variant.qti -> 6dec0d19154c8281a42442fcb86bbb83
goodixfp.mbn -> c2ef5ece85b46b8da46e22e7a5c76524
gpio-keys.kl -> fab01e275a873c98eb02d028914d106e
gpt_backup0.bin -> a36dcedb727673b91a2e7b8b22a1aa75
gpt_backup1.bin -> f0de661557245fd66019c67609c947da
gpt_backup2.bin -> c06bcb8b4e61886020a05a285acd741c
gpt_backup3.bin -> befa5fc7e32238c271d301809de66e02
gpt_backup4.bin -> 2b488b4ca19529696da66503c31fec99
gpt_backup5.bin -> 5297cf70c8bea38c889f4a7f7cb34aed
gpt_both0.bin -> 5cad138c5ee02829f9c93b05b204f95e
gpt_both1.bin -> bd2495d9ab349f50b79b1ff725dbe685
gpt_both2.bin -> 70eb31cdc704c1069733716a954c4f56
gpt_both3.bin -> 4089e123aa5efeef27e243ff672971f4
gpt_both4.bin -> 6e7eeea89b88461b4ab002c01be3ea5a
gpt_both5.bin -> 9f4fea4d36ccd14d4e2520d5dc63374d
gpt_empty0.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty1.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty2.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty3.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty4.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_empty5.bin -> 7b062e4b9562bb74ea8fe445676b3a92
gpt_main0.bin -> 02a364a649d8ceacfb1d4ef999c69a32
gpt_main1.bin -> 89cd12e778b682e1bbef3c39d4c04b47
gpt_main2.bin -> 0126324ac62639234b97c15b24a3fb6a
gpt_main3.bin -> 79d7af8800e97a51b6a3777275f4c8dc
gpt_main4.bin -> f81792b8fce6267a71cb2f1ef1ce3666
gpt_main5.bin -> 41043df5c47c07d3204f8ccecb4e7978
gptest.mbn -> c566897e78ab5c509715fa45dcf4a5f0
haventkn.mbn -> f2aebab2e886c94644eeda2f27d5addf
hyp.mbn -> 42208206997cfade7c3e48b356eab71a
imagefv.elf -> 6aa23453aa999dc35eba9923f1441609
init.target.rc -> aeb427a1c3333b6d9dc77f3f776eb506
km4.mbn -> 9a438dc22df7c80178cacfd62ef60184
lime.mk -> 1dfbe34c27e319b90441c9a89af1d39d
logfs_ufs_8mb.bin -> c040a889d66a4f120f502f89b551f42b
manifest.xml -> caf0e96e0c0bf30f991f165030fa3cc4
manifest_ab.xml -> b623b992da295acd8310f43e8f4ebe85
metadata.img -> ac7abb42ba4dd0f75335153549f41f84
MICRON_LYRA2_64GB_0605.bin -> e35b487e8c63d492aac16db97cbd77ef
multi_image.mbn -> 434a8847eb2848e3ed6f25713aadad53
NON-HLOS.bin -> 875cb19f6013dfe44f1d15fc7b5159e2
NOTICE -> 98017cf03a7e1b612bcf232f9b44aa2e
odm_manifest_lemon.xml -> 9b290f8f379c3e8a6f8f79822acac677
odm_manifest_lime.xml -> 2384e886ad7573acb92604d4103c1c87
odm_manifest_pomelo.xml -> 2384e886ad7573acb92604d4103c1c87
partition.xml -> e3b3e37247680b45408fd3d1982eca09
patch0.xml -> 15694a6e6716908db07b048d915ab37f
patch1.xml -> 0780990ee59934bdcaffc918cac99aed
patch2.xml -> 81036277fd056a16c0e418a756a5a835
patch3.xml -> f1e955eeee449ed57767ac0b87552cf1
patch4.xml -> 82a65c3c86ad47ffa1aaa21417598c32
patch5.xml -> 90ed396b2667209688b315f4dcc37104
persist.img -> 9c8f964fb03faa6a79d6e4ab2dd1957d
prebuilt_dtbo.img -> 5a310187621d72f82d672daf91231463
product.img -> 3edbde6439c089e66368cd370c6cd903
prog_firehose_ddr.elf -> 13dd339bd2db3a8c9bdfa6357d41ca12
ProjectConfig.mk -> 8f9e31321f8452a1e690f2e426ad8a22
provision_hynix.xml -> c7fecbec91b6aa5449bbe7ff5c2ca51d
PT_3Dv5_TLC_Voyager_UFS2.2_A251_USER.bin -> ca3088a07474377f54429f7cb1d9d7a2
public.libraries-qti.txt -> d599da22e6c4b8467ce28e1e562250eb
qupv3fw.elf -> dde60357158c8f7275aa153d8e221bba
ramdisk-debug.img -> e931fe2a009dbaab4f60775f83f0e772
ramdisk-recovery.img -> 8e579f57d0695d925b08a63b57c809f1
ramdisk.img -> 19e3f68d17f4d8f5a8b47d24a4d3e72b
rawprogram0.xml -> 98c3a8110edccdf01c57bfa5f0dd97a3
rawprogram0_BLANK_GPT.xml -> b3200cadf9be377d4f950cc03f4490a6
rawprogram0_WIPE_PARTITIONS.xml -> a08020b62484e1bfa7dbc6a7a76ac8fb
rawprogram1.xml -> 1df8d77508440b40cce09e94d5904af9
rawprogram1_BLANK_GPT.xml -> 30c9b7228531bbc0a0bfc5421105c196
rawprogram1_WIPE_PARTITIONS.xml -> 2c9dd8708195e23f910c0728873662c6
rawprogram2.xml -> 5b75a6083172cce4147d4a8769d81a55
rawprogram2_BLANK_GPT.xml -> 3198bf3e352b48600e63b90979e71a08
rawprogram2_WIPE_PARTITIONS.xml -> db15a8c1ac994e50be924e32ed9f03f4
rawprogram3.xml -> e03411d04b290ffe1ea9b993d1f23074
rawprogram3_BLANK_GPT.xml -> 439d4e875584101690085e1c95833e24
rawprogram3_WIPE_PARTITIONS.xml -> 3322789cb2c9e42bebd04f364e7a7aed
rawprogram4.xml -> fbaa3ea21bca23aa413bb9167773c7c7
rawprogram4_BLANK_GPT.xml -> 4d34e3bb4a83abdbe5f1fbf972d31918
rawprogram4_WIPE_PARTITIONS.xml -> 1dae44f86205d39ac83a6f83ee8911ad
rawprogram5.xml -> ebc54f7ab9d20e97b7601fb71bab4d6f
rawprogram5_BLANK_GPT.xml -> 93e0a3b178a136cda2cbab8de547f645
rawprogram5_WIPE_PARTITIONS.xml -> 9abf9d0a5859d4394a159ea29b499d9a
recovery-two-step.img -> a5a6f212c93886ff8515c2479ef4bfb2
recovery.img -> 251497aba4fed6188919606dda5cd715
recovery_AB_dynamic_partition.fstab -> a1734c76b6cf3c7cceb6384f2b167bf9
recovery_AB_variant.fstab -> 131037786ef6b9a8c56a1e34cb03ecc5
recovery_non-AB_dynamic_partition.fstab -> e4e761473a7a0e190c3e0ed5d5438600
recovery_non-AB_variant.fstab -> 379263def26dcaf344aa027980f4b731
rpm.mbn -> 05c3096461be56f1d94200be9124c547
S101_64G_430bda1ae4_MICRON.bin -> 2644fac2ba2516c40aee7cc543544a29
S201_64G_dd6e035122_MICRON.bin -> ea229b469d8e39e2d411cdac0fc467fa
SANTOS_UFS_2_2_V5_TLC_256Gb_128GB_P17.bin -> 1238740ee9d31d3f5b560c61f94f7845
Santos_V5_TLC_128GB_P15_General.bin -> f02b19fc3bcb8f2a9f1c8bdb919a86ac
sec.dat -> 21775907582b06389a656ab56011c160
sec.elf -> db0ff694b116843bef34a1b8fc1fbd5b
smplap64.mbn -> 6ef1323ee8a74727359ca510719fea36
soter64.mbn -> 9ecc10629adb114076489cd12540d94c
sparsecrclist.txt -> a6b02a3d5d0819ae7a994decbb456db9
storsec.mbn -> cbcaa3cd55ef02eb318066eaa800cf90
super.img -> ec54cd76fc3d8300a37222bc9ad9b31a
super_empty.img -> 1f8c5307a34885c9577d875d5c366d93
system.img -> 2e1cd737578b8c94dd0ead1c9ddeb97f
system.prop -> dcf0fa9fc04edeaed8ef6a9d0d224276
tz.mbn -> 21c38fd53a3c46e1ebdb2efc59bacba7
uefi_sec.mbn -> 4a28fa0f72ecc18a173d8035098e36c5
userdata.img -> e952e2c175d99f35d20acdd31d90e8f2
vbmeta.img -> 1cbd4a76cf8bc05d1dc3f84fb2dacf02
vbmeta_system.img -> 74a918bbd11203de6d001c2ebade8f08
vendor.img -> 3dd4303c5c516e33f374a6419e0656b6
vold.fstab -> a1e06a3daf0404cb89944e95dfdd8fec
widevine.mbn -> f07842bfedbf439111d9be6a6a35eb81
xbl.elf -> 14cda50cabdaaae74a0a204a39b68b32
xbl_config.elf -> 7975e2560048f7c4a543045d399091ee
Xiaomi_Columbus_S76_PRV_0005_Official_FW_bitflip_count.bin -> fc9018659527ad3add419eff38a75753
Xiaomi_Columbus_S76_T005_Test _FW_bitflip_count.bin -> 7f6647928bb0eb78b2c583603fffd460
zeros_1sector.bin -> 620f0b67a91f7f74151bc5be745b7110
zeros_5sectors.bin -> daa100df6e6711906b61c9ab5aa16032
Click to expand...
Click to collapse
Abzal said:
So what problem may be?
Click to expand...
Click to collapse
Allright, sorry. My mistake.
VD171 said:
Qdloader is for QUALCOMM devices.
LIME is mediatek.
Apparentely you doing something wrong.
Click to expand...
Click to collapse
Lime has Qualcomm Snapdragon 662 processor.
Show me Redmi 9T on mediatek, this phone go on Snapdragon 662
Allright, sorry. My mistake.
I'm not so familiarized with qualcomm devices.
How to flash normal firmware if bootloader locked. cant find unlock bootloader option
almat_moto said:
How to flash normal firmware if bootloader locked. cant find unlock bootloader option
Click to expand...
Click to collapse
Apply for unlocking Mi devices
en.miui.com
Thanks for providing this. Managed to unbrick my Redmi 9T that has been sitting in a drawer for months.
SZander93 said:
Thanks for providing this. Managed to unbrick my Redmi 9T that has been sitting in a drawer for months.
Click to expand...
Click to collapse
Good work, my friend.
You are welcome
Abzal said:
Hello, phone come with problem:
Not power on, when connect to PC - hs-usb qdloader 9008
Try flash it. Flash Ok, but problem same
Not power on, when connect to PC - hs-usb qdloader 9008
What may be? Memory die?
Click to expand...
Click to collapse
Hello, it is working way, maybe it can help you:
password not work
wil232 said:
password not work
Click to expand...
Click to collapse
Password is inside the attached file PASSWORD_by_VD171.txt.
Enjoy
Related
[Help] I really messed up... Pushed alarm/audio
So, I removed my system audio files the other day to clear up some room and I accidently pushed them to /system/media/audio instead of /system/media/audio/alarms and /system/media/audio/ringtones. Does anyone know how I can fix this mishap? This is what my code is currently looking like for the file locations Code: pull: ringtones/Standard_2.mp3 -> /system/media/audio/Standard_2.mp3 push: ringtones/Standard_1.mp3 -> /system/media/audio/Standard_1.mp3 push: ringtones/SpringyJalopy.ogg -> /system/media/audio/SpringyJalopy.ogg push: ringtones/Solaris.mp3 -> /system/media/audio/Solaris.mp3 push: ringtones/SitarVsSitar.ogg -> /system/media/audio/SitarVsSitar.ogg push: ringtones/SilkyWay.ogg -> /system/media/audio/SilkyWay.ogg push: ringtones/silent.mp3 -> /system/media/audio/silent.mp3 push: ringtones/Shocking.mp3 -> /system/media/audio/Shocking.mp3 push: ringtones/Shes_All_That.ogg -> /system/media/audio/Shes_All_That.ogg push: ringtones/Seville.ogg -> /system/media/audio/Seville.ogg push: ringtones/Savannah.ogg -> /system/media/audio/Savannah.ogg push: ringtones/Safari.ogg -> /system/media/audio/Safari.ogg push: ringtones/RomancingTheTone.ogg -> /system/media/audio/RomancingTheTone. push: ringtones/Road_Trip.ogg -> /system/media/audio/Road_Trip.ogg push: ringtones/Ring_Synth_04.ogg -> /system/media/audio/Ring_Synth_04.ogg push: ringtones/Ring_Synth_02.ogg -> /system/media/audio/Ring_Synth_02.ogg push: ringtones/Ring_Digital_02.ogg -> /system/media/audio/Ring_Digital_02.og push: ringtones/Ring_Classic_02.ogg -> /system/media/audio/Ring_Classic_02.og push: ringtones/Riffing.mp3 -> /system/media/audio/Riffing.mp3 push: ringtones/Rhino.mp3 -> /system/media/audio/Rhino.mp3 push: ringtones/Revelation.ogg -> /system/media/audio/Revelation.ogg push: ringtones/Reset.mp3 -> /system/media/audio/Reset.mp3 push: ringtones/Red_Tea.mp3 -> /system/media/audio/Red_Tea.mp3 push: ringtones/Potluck.mp3 -> /system/media/audio/Potluck.mp3 push: ringtones/Playa.ogg -> /system/media/audio/Playa.ogg push: ringtones/Paradise_Island.ogg -> /system/media/audio/Paradise_Island.og push: ringtones/OrganDub.ogg -> /system/media/audio/OrganDub.ogg push: ringtones/Old_Phone.mp3 -> /system/media/audio/Old_Phone.mp3 push: ringtones/No_Limits.ogg -> /system/media/audio/No_Limits.ogg push: ringtones/Noises3.ogg -> /system/media/audio/Noises3.ogg push: ringtones/Noises2.ogg -> /system/media/audio/Noises2.ogg push: ringtones/Noises1.ogg -> /system/media/audio/Noises1.ogg push: ringtones/NewPlayer.ogg -> /system/media/audio/NewPlayer.ogg push: ringtones/Nassau.ogg -> /system/media/audio/Nassau.ogg push: ringtones/Nairobi.ogg -> /system/media/audio/Nairobi.ogg push: ringtones/MildlyAlarming.ogg -> /system/media/audio/MildlyAlarming.ogg push: ringtones/MidEvilJaunt.ogg -> /system/media/audio/MidEvilJaunt.ogg push: ringtones/LoveFlute.ogg -> /system/media/audio/LoveFlute.ogg push: ringtones/LoopyLounge.ogg -> /system/media/audio/LoopyLounge.ogg push: ringtones/K.O..mp3 -> /system/media/audio/K.O..mp3 push: ringtones/Jack.mp3 -> /system/media/audio/Jack.mp3 push: ringtones/InsertCoin.ogg -> /system/media/audio/InsertCoin.ogg push: ringtones/Innovation.mp3 -> /system/media/audio/Innovation.mp3 push: ringtones/Heavy.mp3 -> /system/media/audio/Heavy.mp3 push: ringtones/Happy.mp3 -> /system/media/audio/Happy.mp3 push: ringtones/HalfwayHome.ogg -> /system/media/audio/HalfwayHome.ogg push: ringtones/Growl.ogg -> /system/media/audio/Growl.ogg push: ringtones/Glass.mp3 -> /system/media/audio/Glass.mp3 push: ringtones/Glacial_Groove.ogg -> /system/media/audio/Glacial_Groove.ogg push: ringtones/Gimme_Mo_Town.ogg -> /system/media/audio/Gimme_Mo_Town.ogg push: ringtones/GameOverGuitar.ogg -> /system/media/audio/GameOverGuitar.ogg push: ringtones/Funk_Yall.ogg -> /system/media/audio/Funk_Yall.ogg push: ringtones/Funk.mp3 -> /system/media/audio/Funk.mp3 push: ringtones/FriendlyGhost.ogg -> /system/media/audio/FriendlyGhost.ogg push: ringtones/Friday.mp3 -> /system/media/audio/Friday.mp3 push: ringtones/FreeFlight.ogg -> /system/media/audio/FreeFlight.ogg push: ringtones/Fire_Fly.mp3 -> /system/media/audio/Fire_Fly.mp3 push: ringtones/EtherShake.ogg -> /system/media/audio/EtherShake.ogg push: ringtones/Enter_the_Nexus.ogg -> /system/media/audio/Enter_the_Nexus.og push: ringtones/Eastern_Sky.ogg -> /system/media/audio/Eastern_Sky.ogg push: ringtones/dwarfs_riot_2-ringtone.mp3 -> /system/media/audio/dwarfs_riot ringtone.mp3 push: ringtones/DreamTheme.ogg -> /system/media/audio/DreamTheme.ogg push: ringtones/DonMessWivIt.ogg -> /system/media/audio/DonMessWivIt.ogg push: ringtones/Don't Waste Your Life.mp3 -> /system/media/audio/Don't Waste r Life.mp3 push: ringtones/Ding.ogg -> /system/media/audio/Ding.ogg push: ringtones/DancinFool.ogg -> /system/media/audio/DancinFool.ogg push: ringtones/CurveBall.ogg -> /system/media/audio/CurveBall.ogg push: ringtones/Curve.mp3 -> /system/media/audio/Curve.mp3 push: ringtones/CrazyDream.ogg -> /system/media/audio/CrazyDream.ogg push: ringtones/CrayonRock.ogg -> /system/media/audio/CrayonRock.ogg push: ringtones/Cobblestone.mp3 -> /system/media/audio/Cobblestone.mp3 push: ringtones/Club_Cubano.ogg -> /system/media/audio/Club_Cubano.ogg push: ringtones/Champagne_Edition.ogg -> /system/media/audio/Champagne_Editio gg push: ringtones/CaribbeanIce.ogg -> /system/media/audio/CaribbeanIce.ogg push: ringtones/Calypso_Steel.ogg -> /system/media/audio/Calypso_Steel.ogg push: ringtones/Cairo.ogg -> /system/media/audio/Cairo.ogg push: ringtones/BussaMove.ogg -> /system/media/audio/BussaMove.ogg push: ringtones/Bollywood.ogg -> /system/media/audio/Bollywood.ogg push: ringtones/Blippy.mp3 -> /system/media/audio/Blippy.mp3 push: ringtones/BirdLoop.ogg -> /system/media/audio/BirdLoop.ogg push: ringtones/Big_Easy.ogg -> /system/media/audio/Big_Easy.ogg push: ringtones/BentleyDubs.ogg -> /system/media/audio/BentleyDubs.ogg push: ringtones/BeatPlucker.ogg -> /system/media/audio/BeatPlucker.ogg push: ringtones/Backroad.ogg -> /system/media/audio/Backroad.ogg push: ringtones/Around.mp3 -> /system/media/audio/Around.mp3 push: ringtones/Aqua.mp3 -> /system/media/audio/Aqua.mp3 push: ringtones/Alpha.mp3 -> /system/media/audio/Alpha.mp3 push: ringtones/2_Step.mp3 -> /system/media/audio/2_Step.mp3 99 files pushed. 0 files skipped. 623 KB/s (5432667 bytes in 8.508s) C:\android-sdk-windows\tools>adb push alarms /system/media/audio push: alarms/Snooze.mp3 -> /system/media/audio/Snooze.mp3 push: alarms/Positive.mp3 -> /system/media/audio/Positive.mp3 push: alarms/Light.mp3 -> /system/media/audio/Light.mp3 push: alarms/Instance.mp3 -> /system/media/audio/Instance.mp3 push: alarms/Classic.mp3 -> /system/media/audio/Classic.mp3 push: alarms/Beeps.mp3 -> /system/media/audio/Beeps.mp3 push: alarms/Alarm_Rooster_02.ogg -> /system/media/audio/Alarm_Rooster_02.ogg push: alarms/Alarm_Classic.ogg -> /system/media/audio/Alarm_Classic.ogg push: alarms/Alarm_Buzzer.ogg -> /system/media/audio/Alarm_Buzzer.ogg push: alarms/Alarm_Beep_03.ogg -> /system/media/audio/Alarm_Beep_03.ogg push: alarms/Alarm_Beep_02.ogg -> /system/media/audio/Alarm_Beep_02.ogg push: alarms/Alarm_Beep_01.ogg -> /system/media/audio/Alarm_Beep_01.ogg¬¬ Is there some sort of file viewer I can use to delete the files (preferably batch mode) Linda can't delete them
Root Explorer on the market can do this. If you are looking for a file explorer to delete these files I would suggest it. It does have a option for deleting multiple files as well.
[INFO] SPH-L720 Hidden Dialer Codes, AT Commands, Partition List and AOSP Diag Mode
One of my standard threads with codes and info. I will add onto this as I find more. Dialer Codes Code: ##25327# - nothing? ##2539# - nothing? ##3282# - DATA ##33284# - DEBUG (Password: 777468 / SPRINT) ##3424# - DIAG ##367738# - DNSSET ##4772579# - GPSCLRX ##72786# - SCRTN ##786# - RTN ##889# - TTY *#0011# - Service Mode *#7284# **7838 - nothing? **583 - nothing? Stole some codes from [B][URL="http://forum.xda-developers.com/member.php?u=2698939"]thekingofmean[/URL][/B]'s thread [URL="http://forum.xda-developers.com/showthread.php?t=2261538"]here[/URL]. Thank you! *#0*# General Test Mode *#0228# Battery status *#06# IMEI *#1234# Check HW/SW Info, PDA, CSC, MODEM (F/W Ver) *#12580*369# SW & HW Info *#2663# TSP / TSK firmware update *#34971539# Camera Firmware Update *#7353# Quick Test Menu *#9900# Sys Dump Menu *#9090# Diag Config AT Commands See here for AT command info from E:V:A Code: AT+SYSSLEEP AT+VERSNAME AT+MAXPOWER AT+TEMPTEST AT+SIMDETEC AT+PRODCODE AT+CALIDATE AT+BANSELCT AT+SECNRSSI AT+READRSSI AT+CALLCONN AT+SCMMONIT AT+TESTMODE AT+GPSSTEST AT+MSLSECUR AT+IMEITEST AT+AKSEEDNO AT+LIFETIME AT+IMEICERT AT+LVOFLOCK AT+DETALOCK AT+LOCKREAD AT+CFUN AT+MEIDAUTH AT+CHNSELCT AT+AOTKEYWR AT+FACTORST AT+BAKUPCHK AT+FAILDUMP AT+NAMCHECK AT+PRLVERIF AT+RECONDIT AT+KSTRINGB AT+SVCBANDB AT+LOCKINFO AT+EFSSYNCC AT+$QCSIMSTAT AT+$QCPBMPREF AT+$CREG AT+$CCLK AT+$QCCNMI AT+*CNTI AT+$QCCLR AT+$QCDMR AT+$QCDNSP AT+$QCDNSS AT+$QCTER AT+$QCSLOT AT+$QCSIMAPP AT+$QCPINSTAT AT+$QCPDPP AT+$QCPDPLT AT+$QCPWRDN AT+$QCDGEN AT+$QCPDPCFGE AT+$BREW AT+$QCANTE AT+$QCRPW AT+$QCSQ AT+$CSQ AT+$QCSYSMODE AT+$QCCTM AT+$QCBANDPREF AT+^PREFMODE AT+^SYSINFO AT+^SYSCONFIG AT+^CARDMODE AT+^DSCI AT+$QCVOLT AT+$QCHWREV AT+$QCBOOTVER AT+$ECALL AT+$QCDEFPROF AT+$QCMRUE AT+$QCMRUC AT+$QCAPNE AT+$QCPDPIMSCFGE AT+$QCCLAC AT+^SPN AT+$QCRMCALL AT+$QCDRX AT+$MDN AT+$MSID AT+$MIPERR AT+$1XRXPWR AT+$1XECIO AT+$DORXPWR AT+$DOSINR AT+$DEBUG AT+$ERI AT+FCLASS AT+ICF AT+IFC AT+IPR AT+GMI AT+GMM AT+GMR AT+GCAP AT+GSN AT+CMEE AT+WS46 AT+PACSP AT+CLCC Partition List Thanks to balistic2 for providing this. Code: [email protected]:/ # ls -al /dev/block/platform/msm_sdcc.1/by-name/ lrwxrwxrwx root aboot -> /dev/block/mmcblk0p6 lrwxrwxrwx root apnhlos -> /dev/block/mmcblk0p1 lrwxrwxrwx root backup -> /dev/block/mmcblk0p23 lrwxrwxrwx root boot -> /dev/block/mmcblk0p20 lrwxrwxrwx root cache -> /dev/block/mmcblk0p18 lrwxrwxrwx root carrier -> /dev/block/mmcblk0p28 lrwxrwxrwx root efs -> /dev/block/mmcblk0p10 lrwxrwxrwx root fota -> /dev/block/mmcblk0p22 lrwxrwxrwx root fsg -> /dev/block/mmcblk0p24 lrwxrwxrwx root hidden -> /dev/block/mmcblk0p27 lrwxrwxrwx root m9kefs1 -> /dev/block/mmcblk0p13 lrwxrwxrwx root m9kefs2 -> /dev/block/mmcblk0p14 lrwxrwxrwx root m9kefs3 -> /dev/block/mmcblk0p15 lrwxrwxrwx root mdm -> /dev/block/mmcblk0p2 lrwxrwxrwx root modemst1 -> /dev/block/mmcblk0p11 lrwxrwxrwx root modemst2 -> /dev/block/mmcblk0p12 lrwxrwxrwx root pad -> /dev/block/mmcblk0p9 lrwxrwxrwx root param -> /dev/block/mmcblk0p19 lrwxrwxrwx root persdata -> /dev/block/mmcblk0p26 lrwxrwxrwx root persist -> /dev/block/mmcblk0p17 lrwxrwxrwx root recovery -> /dev/block/mmcblk0p21 lrwxrwxrwx root rpm -> /dev/block/mmcblk0p7 lrwxrwxrwx root sbl1 -> /dev/block/mmcblk0p3 lrwxrwxrwx root sbl2 -> /dev/block/mmcblk0p4 lrwxrwxrwx root sbl3 -> /dev/block/mmcblk0p5 lrwxrwxrwx root ssd -> /dev/block/mmcblk0p25 lrwxrwxrwx root system -> /dev/block/mmcblk0p16 lrwxrwxrwx root tz -> /dev/block/mmcblk0p8 lrwxrwxrwx root userdata -> /dev/block/mmcblk0p29 AOSP Diag Mode Make script or run in Script Manager. See here for more diag mode info. Code: #/system/bin/sh #reboot phone to disable #enables diag mode echo "0" /sys/class/android_usb/android0/enable echo "04E8" /sys/class/android_usb/android0/idVendor echo "685D" /sys/class/android_usb/android0/idProduct echo "diag,diag_mdm" /sys/class/android_usb/android0/f_diag/clients echo "hsic" /sys/class/android_usb/android0/f_acm/acm_transports echo "diag,acm,adb" /sys/class/android_usb/android0/functions echo "1" /sys/module/ci13xxx_msm/parameters/streaming echo "1" /sys/class/android_usb/android0/enable
autoprime said: *#0011# - Service Mode Click to expand... Click to collapse Mine says No Service. I hit Menu button. Wifi is the only thing that really gives me any options. There is a Wifi Power Save toggle switch for On or Off. What does this do?
jpkelly05 said: Mine says No Service. I hit Menu button. Wifi is the only thing that really gives me any options. There is a Wifi Power Save toggle switch for On or Off. What does this do? Click to expand... Click to collapse unfortunately i dont have this device yet so I can't say exactly what everything does. I'm just sifting thru dumps and roms to find fun stuff. on a different note... I've updated the OP to include a script to enable diag mode on the GS4. Diag mode can be used to write new PRLs to your device while on an AOSP rom(using DFS or QPST etc)... or diag mode can be used for other fun things... but if you don't know what it does then you probably don't need it
whats the test screen? ##0#?? does anyone kno it? NEVERMIND!! i found it.. *#0*#
what are all the commands aosp roms will take?
Been trying to work on learning AT commands and found some in the modem.bin of the NAE tarball like AT+MSLSECUR and AT+SIMDETEC however NONE of the commands in this list do anything. I've tried a ? after the command and a =? after the command, still errors out. I'm connected to the modem port (not the port used for flashing phones but for sending AT commands). I think this port is labeled /dev/ttyUSB0. I've tried downgrading to MDC baseband. Still nothing. How the heck am I supposed to send these other AT commands to the phone?
@ecs87 The AT commands shown on top of this thread are not correct, because: 1) they are device dependent 2) they are service provider dependent 3) they are mixed "fake" AT commands, as interpreted by RIL daemon, and "real" Modem AT commands, as we like. I have several posts and threads on this subject, please search. In addition, AT port may not be accessible if already used by RIL daemon in some cases.
I figured it out EVA. Apparently you MUST be using a UART cable. I think it's just the regular USB cable with a resistor on a line. I didn't do too much research on it because I was able to simulate the same thing using a GSM service box and a c3300k cable then accessing the box port using a terminal type application. I was then able to use the "exteneded" set of AT commands I found in modem.bin. The AT+AKSEEDNO does have me stumped though. Well...I guess the AT+MSLSECUR does as well. I'm able to get an output, but it must be calculated and returned. I was able to logcat the default MSLSECUR password for the G900P but I wasn't sure how it was calculated. Same goes for the AKSEEDNO. And considering how the AKSEEDNO changes every time you call for it, logging does nothing to help. Sent from my SPH-L720 using XDA Free mobile app My original thread for this is http://forum.gsmhosting.com/vbb/f83/note-3-imei-writing-questions-1828950/ Keep in mind I'm not trying to CHANGE the IMEI, but rather write the original one WITHOUT a box or EFS backup (I like to tinker...what can I say?). I got all the way down to the AKSEEDNO...then I hit a brick wall lol. Makes sense considering that's the absolute last step before I get to send the AT command to write the IMEI and sign the IMEI with a certificate.
Unable to access diag mode in AOSP I've got a Galaxy S4 on SlimKat 4.4.4. I've saved the script for AOSP diag mode in Script Manager, and ran it. I also tried running it over an ADB shell. Neither reports errors, but nothing ever changes. The phone remains the same. I've tried unplugging/replugging USB cable to no avail. The phone never shows as a different device in device manager. Are there any known reasons for this not working?
[Q] Creating partition images on 870A
Does anyone know the relation of which block devices in /dev/mmcblk0pXX belong to which partition? (ex: system, modem, boot, etc) I'm looking to create a custom Odin AIO package for my install of lollipop, which has been rooted and such; going back to NE4 is a PITA and would like a faster route for when a full wipe is required. Thanks in advance :good:
After scrounging the internet for awhile, I was able to answer my own question. I've posted the partition scheme below for others who might need it someday: aboot -> /dev/block/mmcblk0p6 apnhlos -> /dev/block/mmcblk0p1 backup -> /dev/block/mmcblk0p18 boot -> /dev/block/mmcblk0p15 cache -> /dev/block/mmcblk0p24 dbi -> /dev/block/mmcblk0p4 ddr -> /dev/block/mmcblk0p5 efs -> /dev/block/mmcblk0p12 fota -> /dev/block/mmcblk0p17 fsc -> /dev/block/mmcblk0p19 fsg -> /dev/block/mmcblk0p9 modem -> /dev/block/mmcblk0p2 modemst1 -> /dev/block/mmcblk0p13 modemst2 -> /dev/block/mmcblk0p14 pad -> /dev/block/mmcblk0p10 param -> /dev/block/mmcblk0p11 persdata -> /dev/block/mmcblk0p22 persist -> /dev/block/mmcblk0p21 recovery -> /dev/block/mmcblk0p16 rpm -> /dev/block/mmcblk0p7 sbl1 -> /dev/block/mmcblk0p3 ssd -> /dev/block/mmcblk0p20 system -> /dev/block/mmcblk0p23 tz -> /dev/block/mmcblk0p8 userdata -> /dev/block/mmcblk0p25
Oneplus 3 partition table
Hi ! I rescently flashed a zip on OP3 i made for my good old Nexus 5, but it failed, as it didnt mounted system and set_perms had failed so. So i started to dig in /dev/block to find where were the system partition and the idea of searching for full partition table crossed my head. So here's what i found : Partitions names are here : Code: /dev/block/platform/soc/624000.ufshc/by-name What i wrote on terminal, using adb shell with root access : Code: [email protected]:/ # ls -al /dev/block/platform/soc/624000.ufshc/by-name lrwxrwxrwx root root 1970-01-18 10:20 LOGO -> /dev/block/sde17 lrwxrwxrwx root root 1970-01-18 10:20 aboot -> /dev/block/sde15 lrwxrwxrwx root root 1970-01-18 10:20 abootbak -> /dev/block/sde16 lrwxrwxrwx root root 1970-01-18 10:20 apdp -> /dev/block/sde30 lrwxrwxrwx root root 1970-01-18 10:20 bluetooth -> /dev/block/sde23 lrwxrwxrwx root root 1970-01-18 10:20 boot -> /dev/block/sde18 lrwxrwxrwx root root 1970-01-18 10:20 boot_aging -> /dev/block/sde19 lrwxrwxrwx root root 1970-01-18 10:20 cache -> /dev/block/sda3 lrwxrwxrwx root root 1970-01-18 10:20 cdt -> /dev/block/sdd2 lrwxrwxrwx root root 1970-01-18 10:20 cmnlib -> /dev/block/sde26 lrwxrwxrwx root root 1970-01-18 10:20 cmnlib64 -> /dev/block/sde28 lrwxrwxrwx root root 1970-01-18 10:20 cmnlib64bak -> /dev/block/sde29 lrwxrwxrwx root root 1970-01-18 10:20 cmnlibbak -> /dev/block/sde27 lrwxrwxrwx root root 1970-01-18 10:20 config -> /dev/block/sda14 lrwxrwxrwx root root 1970-01-18 10:20 ddr -> /dev/block/sdd3 lrwxrwxrwx root root 1970-01-18 10:20 devcfg -> /dev/block/sda6 lrwxrwxrwx root root 1970-01-18 10:20 devcfgbak -> /dev/block/sda7 lrwxrwxrwx root root 1970-01-18 10:20 devinfo -> /dev/block/sde22 lrwxrwxrwx root root 1970-01-18 10:20 dip -> /dev/block/sde13 lrwxrwxrwx root root 1970-01-18 10:20 dpo -> /dev/block/sde32 lrwxrwxrwx root root 1970-01-18 10:20 dsp -> /dev/block/sde12 lrwxrwxrwx root root 1970-01-18 10:20 frp -> /dev/block/sda8 lrwxrwxrwx root root 1970-01-18 10:20 fsc -> /dev/block/sdf3 lrwxrwxrwx root root 1970-01-18 10:20 fsg -> /dev/block/sde7 lrwxrwxrwx root root 1970-01-18 10:20 hyp -> /dev/block/sde5 lrwxrwxrwx root root 1970-01-18 10:20 hypbak -> /dev/block/sde6 lrwxrwxrwx root root 1970-01-18 10:20 keymaster -> /dev/block/sde24 lrwxrwxrwx root root 1970-01-18 10:20 keymasterbak -> /dev/block/sde25 lrwxrwxrwx root root 1970-01-18 10:20 keystore -> /dev/block/sda5 lrwxrwxrwx root root 1970-01-18 10:20 md5 -> /dev/block/sdf4 lrwxrwxrwx root root 1970-01-18 10:20 mdtp -> /dev/block/sde14 lrwxrwxrwx root root 1970-01-18 10:20 misc -> /dev/block/sda4 lrwxrwxrwx root root 1970-01-18 10:20 modem -> /dev/block/sde11 lrwxrwxrwx root root 1970-01-18 10:20 modemst1 -> /dev/block/sdf1 lrwxrwxrwx root root 1970-01-18 10:20 modemst2 -> /dev/block/sdf2 lrwxrwxrwx root root 1970-01-18 10:20 msadp -> /dev/block/sde31 lrwxrwxrwx root root 1970-01-18 10:20 oem_dycnvbk -> /dev/block/sda9 lrwxrwxrwx root root 1970-01-18 10:20 oem_stanvbk -> /dev/block/sda10 lrwxrwxrwx root root 1970-01-18 10:20 param -> /dev/block/sda11 lrwxrwxrwx root root 1970-01-18 10:20 persist -> /dev/block/sda2 lrwxrwxrwx root root 1970-01-18 10:20 pmic -> /dev/block/sde9 lrwxrwxrwx root root 1970-01-18 10:20 pmicbak -> /dev/block/sde10 lrwxrwxrwx root root 1970-01-18 10:20 recovery -> /dev/block/sde21 lrwxrwxrwx root root 1970-01-18 10:20 reserve -> /dev/block/sdd1 lrwxrwxrwx root root 1970-01-18 10:20 reserve1 -> /dev/block/sda12 lrwxrwxrwx root root 1970-01-18 10:20 reserve2 -> /dev/block/sda13 lrwxrwxrwx root root 1970-01-18 10:20 rpm -> /dev/block/sde1 lrwxrwxrwx root root 1970-01-18 10:20 rpmbak -> /dev/block/sde2 lrwxrwxrwx root root 1970-01-18 10:20 sec -> /dev/block/sde8 lrwxrwxrwx root root 1970-01-18 10:20 splash -> /dev/block/sde33 lrwxrwxrwx root root 1970-01-18 10:20 ssd -> /dev/block/sda1 lrwxrwxrwx root root 1970-01-18 10:20 sti -> /dev/block/sde34 lrwxrwxrwx root root 1970-01-18 10:20 system -> /dev/block/sde20 lrwxrwxrwx root root 1970-01-18 10:20 tz -> /dev/block/sde3 lrwxrwxrwx root root 1970-01-18 10:20 tzbak -> /dev/block/sde4 lrwxrwxrwx root root 1970-01-18 10:20 userdata -> /dev/block/sda15 lrwxrwxrwx root root 1970-01-18 10:20 xbl -> /dev/block/sdb1 lrwxrwxrwx root root 1970-01-18 10:20 xblbak -> /dev/block/sdc1 [email protected]:/ # cat /proc/partitions major minor #blocks name 7 0 98304 loop0 8 0 56582144 sda 8 1 8 sda1 8 2 32768 sda2 8 3 262144 sda3 8 4 1024 sda4 8 5 512 sda5 8 6 128 sda6 8 7 128 sda7 8 8 512 sda8 8 9 10240 sda9 8 10 10240 sda10 8 11 1024 sda11 8 12 8096 sda12 8 13 16192 sda13 8 14 512 sda14 8 15 56238572 sda15 8 16 4096 sdb 8 17 4052 sdb1 8 32 4096 sdc 8 33 4052 sdc1 8 80 1572864 sdf 8 81 2048 sdf1 8 82 2048 sdf2 8 83 4 sdf3 8 84 512 sdf4 8 64 4194304 sde 8 65 512 sde1 8 66 512 sde2 8 67 2048 sde3 8 68 2048 sde4 8 69 512 sde5 8 70 512 sde6 8 71 2048 sde7 8 72 16 sde8 8 73 512 sde9 8 74 512 sde10 8 75 97280 sde11 8 76 16384 sde12 8 77 1024 sde13 8 78 32768 sde14 8 79 8192 sde15 259 0 8192 sde16 259 1 16384 sde17 259 2 65536 sde18 259 3 65536 sde19 259 4 3080192 sde20 259 5 65536 sde21 259 6 4 sde22 259 7 1024 sde23 259 8 512 sde24 259 9 512 sde25 259 10 256 sde26 259 11 256 sde27 259 12 256 sde28 259 13 256 sde29 259 14 256 sde30 259 15 256 sde31 259 16 4 sde32 259 17 33424 sde33 259 18 2048 sde34 8 48 131072 sdd 8 49 32 sdd1 8 50 4 sdd2 8 51 1024 sdd3 I assigned each partition with its space, in kb, to get the full partition table : Code: Size (in Kb) Partitions names and paths --------------------------------------------------------- 98304 loop0 --------------------------------------------------------- 56582144 sda 8 ssd -> /dev/block/sda1[B] 32768 persist -> /dev/block/sda2 262144 cache -> /dev/block/sda3[/B] 1024 misc -> /dev/block/sda4 512 keystore -> /dev/block/sda5 128 devcfg -> /dev/block/sda6 128 devcfgbak -> /dev/block/sda7 512 frp -> /dev/block/sda8 10240 oem_dycnvbk -> /dev/block/sda9 10240 oem_stanvbk -> /dev/block/sda10 1024 param -> /dev/block/sda11 8096 reserve1 -> /dev/block/sda12 16192 reserve2 -> /dev/block/sda13 512 config -> /dev/block/sda14[B] 56238572 userdata -> /dev/block/sda15[/B] --------------------------------------------------------- 4096 sdb 4052 xbl -> /dev/block/sdb1 --------------------------------------------------------- 4096 sdc 4052 xblbak -> /dev/block/sdc1 --------------------------------------------------------- 131072 sdd 32 reserve -> /dev/block/sdd1 4 cdt -> /dev/block/sdd2 1024 ddr -> /dev/block/sdd3 --------------------------------------------------------- 4194304 sde 512 rpm -> /dev/block/sde1 512 rpmbak -> /dev/block/sde2 2048 tz -> /dev/block/sde3 2048 tzbak -> /dev/block/sde4 512 hyp -> /dev/block/sde5 512 hypbak -> /dev/block/sde6 2048 fsg -> /dev/block/sde7 16 sec -> /dev/block/sde8 512 pmic -> /dev/block/sde9 512 pmicbak -> /dev/block/sde10 97280 modem -> /dev/block/sde11 16384 dsp -> /dev/block/sde12 1024 dip -> /dev/block/sde13 32768 mdtp -> /dev/block/sde14 8192 aboot -> /dev/block/sde15 8192 abootbak -> /dev/block/sde16 16384 LOGO -> /dev/block/sde17[B] 65536 boot -> /dev/block/sde18[/B] 65536 boot_aging -> /dev/block/sde19[B] 3080192 system -> /dev/block/sde20 65536 recovery -> /dev/block/sde21[/B] 4 devinfo -> /dev/block/sde22 1024 bluetooth -> /dev/block/sde23 512 keymaster -> /dev/block/sde24 512 keymasterbak -> /dev/block/sde25 256 cmnlib -> /dev/block/sde26 256 cmnlibbak -> /dev/block/sde27 256 cmnlib64 -> /dev/block/sde28 256 cmnlib64bak -> /dev/block/sde29 256 apdp -> /dev/block/sde30 256 msadp -> /dev/block/sde31 4 dpo -> /dev/block/sde32 33424 splash -> /dev/block/sde33 2048 sti -> /dev/block/sde34 --------------------------------------------------------- 1572864 sdf [B] 2048 modemst1 -> /dev/block/sdf1 (EFS1, I suppose) 2048 modemst2 -> /dev/block/sdf2 (EFS2, I suppose) [/B] 4 fsc -> /dev/block/sdf3 512 md5 -> /dev/block/sdf4
How is it, that one flash storage chip is found as different sd* entrys? Like sda to sdf? How is it technically possible for them to split this chip into several "disks"? Could someone explain it to me please?
awesome an information
[official]MIUI10 with PIE and Project Treble
this is a official Chinese version ,and not use /CUST to /VENDOR,so most of recovery not support it(but still can use it)I will upload to mega soon,and here is something i can show you the first step is something you are ready,backup you file(whole data will be format) and unlock BL the second step is flash the MIUI10 with p and pt if you want go back to miui10 with o and non Treble,there is the third step issues: none,it is good for daily using Attention: don't flash any boot or boot fix, because this one is different with others, if you flashed any kernel or boot fix, it would NOT boot, but we can still flash MAGISK, just don't flash kernel or boot fix.zip DOWNLOAD MIUI10 WITH PIE AND PROJECT TREBLE https://mega.nz/#!KFAQjabB!0peaRtW89NVJSqRCI0olqLO3-DI9Bvora5jwQhBe9iA
here is the rom you must flash by miflash if you want go back to non treble https://mega.nz/#!Wc5AjK4a!LLGfxp5Fky_mABBwlh8gSFg8Iyihyst3YkHQxhxBXmE
abl -> /dev/block/sde23 ablbak -> /dev/block/sde24 apdp -> /dev/block/sde5 bk1 -> /dev/block/sda3 bk2 -> /dev/block/sda4 bk3 -> /dev/block/sda5 bk31 -> /dev/block/sdd2 bk32 -> /dev/block/sdd5 bk4 -> /dev/block/sda8 bk41 -> /dev/block/sde4 bk42 -> /dev/block/sde30 bk43 -> /dev/block/sde45 bk5 -> /dev/block/sda12 bk51 -> /dev/block/sdf2 bk52 -> /dev/block/sdf3 bk53 -> /dev/block/sdf6 bk6 -> /dev/block/sda13 bluetooth -> /dev/block/sde32 boot -> /dev/block/sde40 cache -> /dev/block/sda16 cdt -> /dev/block/sdd3 cmnlib -> /dev/block/sde19 cmnlib64 -> /dev/block/sde21 cmnlib64bak -> /dev/block/sde22 cmnlibbak -> /dev/block/sde20 cust -> /dev/block/sde42 ddr -> /dev/block/sdd4 devcfg -> /dev/block/sde7 devcfgbak -> /dev/block/sde8 devinfo -> /dev/block/sde35 dip -> /dev/block/sde31 dpo -> /dev/block/sde1 dsp -> /dev/block/sde37 frp -> /dev/block/sda7 fsc -> /dev/block/sdf1 fsg -> /dev/block/sde34 hyp -> /dev/block/sde13 hypbak -> /dev/block/sde14 keymaster -> /dev/block/sde17 keymasterbak -> /dev/block/sde18 keystore -> /dev/block/sda6 limits -> /dev/block/sde3 logfs -> /dev/block/sda10 logo -> /dev/block/sde36 mdtp -> /dev/block/sde39 mdtpsecapp -> /dev/block/sde25 mdtpsecappbak -> /dev/block/sde26 misc -> /dev/block/sda9 modem -> /dev/block/sde41 modemst1 -> /dev/block/sdf4 modemst2 -> /dev/block/sdf5 msadp -> /dev/block/sde6 oops -> /dev/block/sda11 persist -> /dev/block/sda14 pmic -> /dev/block/sde9 pmicbak -> /dev/block/sde10 recovery -> /dev/block/sda15 reserve -> /dev/block/sdd1 rpm -> /dev/block/sde11 rpmbak -> /dev/block/sde12 sec -> /dev/block/sde2 splash -> /dev/block/sde38 ssd -> /dev/block/sda2 sti -> /dev/block/sde33 storsec -> /dev/block/sde28 storsecbak -> /dev/block/sde29 switch -> /dev/block/sda1 system -> /dev/block/sde44 toolsfv -> /dev/block/sde27 tz -> /dev/block/sde15 tzbak -> /dev/block/sde16 userdata -> /dev/block/sda17 vendor -> /dev/block/sde43 xbl -> /dev/block/sdb1 xblbak -> /dev/block/sdc1
my english is poor,but i will try my best to help you
here is the line https://pan.baidu.com/s/1RwPOoavi2YNwcrTNgPV8UQ,and put '8xtv' to web to get MIUI10 with p and pt https://pan.baidu.com/s/1bG9W13mWuWWZyN2PpcyqVg,and put 'kfp0' to web to get MIUI10 with o and non Treble I will upgrade it to mega now it's 5 o'clock in the morning,so tired
Good job
artful said: Good job Click to expand... Click to collapse added MEGA download
Could you get the global version? Thanks for the chinese version. Greetings
Thank you for the post. I am on the xiaomi.eu ROM. I got the android pie, but I don't have Treble enabled. Why is this? Sent from my MI 6 using Tapatalk
It is said that flashing this firmware will fix the fingerprint sensor , you can have a try. https://pan.baidu.com/s/1Y2NQnEBYVQeRcTDHRrI7DA code: dzb8
Interesting! But I have already back to lineage,MIUI made me lost my patience.
LKc丶 said: It is said that flashing this firmware will fix the fingerprint sensor , you can have a try. https://pan.baidu.com/s/1Y2NQnEBYVQeRcTDHRrI7DA code: dzb8 Click to expand... Click to collapse Please, can you upload it to mega? I can't download from baidu because I don't have chinese number phone.
juanyllo87 said: Please, can you upload it to mega? I can't download from baidu because I don't have chinese number phone. Click to expand... Click to collapse In China we can only use free Baidu netdisk :crying:,but I think he will upload it to mega soon.
juanyllo87 said: Please, can you upload it to mega? I can't download from baidu because I don't have chinese number phone. Click to expand... Click to collapse have a try https://mega.nz/#!7oZjQIiI!3ZVx_DmC2wAnUtNoTLsDgTKR2QTdAqFDQ7OmITaQs3Q
LKc丶 said: have a try https://mega.nz/#!7oZjQIiI!3ZVx_DmC2wAnUtNoTLsDgTKR2QTdAqFDQ7OmITaQs3Q Click to expand... Click to collapse still can't add fingerprint
akd1 said: still can't add fingerprint Click to expand... Click to collapse That's too bad . As I Know,PT is not officially released by Xiaomi, but there may be a officially stable PT version after the vacation. (Labour Day) Let's wait.
If someone wants to install another rom you must first install this, to remove treble. Install with Xiaomi MiFlash Tool https://mega.nz/#!cxRh2YjR!eZKkhIIlUiUvCCdcFONuZXTMhQqnpx4DpXLnTrhTYQk
juanyllo87 said: Could you get the global version? Thanks for the chinese version. Greetings Click to expand... Click to collapse don't have global vesion,but it's easy to add gapps
LKc丶 said: That's too bad . As I Know,PT is not officially released by Xiaomi, but there may be a officially stable PT version after the vacation. (Labour Day) Let's wait. Click to expand... Click to collapse this is a offical vesion,developed by XIAOMI,but not released and will never released,this is let you easy to flash another rom,as the XIAOMI framework developers said,this is the final version with project treble,so if you had flashed the PT from others,better to change to this office version(by the way,as i test,this pt could flash color os )
juanyllo87 said: If someone wants to install another rom you must first install this, to remove treble. Install with Xiaomi MiFlash Tool https://mega.nz/#!cxRh2YjR!eZKkhIIlUiUvCCdcFONuZXTMhQqnpx4DpXLnTrhTYQk Click to expand... Click to collapse still could install other PT rom,as for me,i won't go back