General [ENGINEERING][ROM][OFFICIAL] OFFICIAL Engineering Firmware for LIME (Redmi 9 Power / Redmi 9T)

Search This thread

dbsamin

Member
Feb 18, 2016
13
2
try to drain you battery after you flash this rom until (hs-usb qdloader 9008) won't appear when connect to PC then plug it to the charger the sign of charging must not appear wait some minutes and let it boot by itself .
If you want to flash stock rom in my case I reboot my phone to fastboot using adb then I flash it with miflash this way I unbriked my phone ( my phon was not rooted by the way) hope this method helps you
 
Apr 2, 2022
9
3
Hi there please can you provide a little guide what use to flash that rom (some special ver miflash or any qfil) and what program file choose if qfil
coz atm i have that one piece of **** 4/124 ver 4g nfc lemon in bricked state,only edl mode detects when connected to pc, has unlck bl, no gacc no mi lock, xi want edl auth,i want only one jts bring that pice of **** to any live condition wipe everything coz it probably has deeply inside still important data AND TROW THIS DAMN PIECE IF **** INTO TRASH BIN AND FORGOT XIAOMI not ss a brand but as a damn word for the end of a live. not ever once. how damn troubles and rip off money it taked holy ****.. for everything. and yeah i was stipid enough to obtain not one device from that brand lol. others already sold, but that ****er will be burn. but first need guarantee wipe data at all
 

Top Liked Posts

  • There are no posts matching your filters.
  • 12
    Works with:
    - Xiaomi Redmi 9 Power
    - Xiaomi Redmi 9T

    Build Date:
    2021/06/13

    Android Version:
    QKQ1.200730.002

    Display ID:
    QL2880-lime-V065-Q-0613

    Build Fingerprint:
    Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys

    Security Patch:
    2020-10-01

    Radio/Modem/Baseband Version:
    A.1.0-00505.1-KAMORTA_GEN_PACK-3

    Download:
    https://www.mediafire.com/file/y25b...ing_QL2880-lime-V065-Q-0613_by-VD171.zip/file

    Password:
    Pass is in the attached file: PASSWORD_by_VD171.txt

    Prop.default:
    Code:
    ro.build.version.incremental=1648
    ro.odm.build.version.incremental=1648
    ro.vendor.build.version.incremental=1648
    ro.product.board=lime
    ro.product.odm.device=lime
    ro.product.odm.model=lime
    ro.product.odm.name=lime
    ro.product.system.device=lime
    ro.product.system.model=lime
    ro.product.system.name=lime
    ro.product.vendor.device=lime
    ro.product.vendor.model=lime
    ro.product.vendor.name=lime
    ro.build.flavor=lime-userdebug
    ro.build.display.id=QL2880-lime-V065-Q-0613
    ro.board.platform=bengal
    ro.build.id=QKQ1.200730.002
    ro.odm.build.id=QKQ1.200730.002
    ro.system.build.id=QKQ1.200730.002
    ro.vendor.build.id=QKQ1.200730.002
    ro.bootimage.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
    ro.odm.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
    ro.system.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
    ro.vendor.build.fingerprint=Redmi/lime/lime:10/QKQ1.200730.002/1648:userdebug/test-keys
    ro.build.tags=test-keys
    ro.odm.build.tags=test-keys
    ro.system.build.tags=test-keys
    ro.vendor.build.tags=test-keys
    ro.build.type=userdebug
    ro.odm.build.type=userdebug
    ro.system.build.type=userdebug
    ro.vendor.build.type=userdebug
    ro.build.version.security_patch=2020-10-01
    ro.vendor.build.security_patch=2020-10-01
    ro.bootimage.build.date=Sun Jun 13 11:26:22 CST 2021
    ro.build.date=Sun Jun 13 11:26:22 CST 2021
    ro.odm.build.date=Sun Jun 13 11:26:22 CST 2021
    ro.system.build.date=Sun Jun 13 11:26:22 CST 2021
    ro.vendor.build.date=Sun Jun 13 11:26:22 CST 2021

    MD5 hashes:
    Code:
    abl.elf -> 307b569127da67ebdeb370565583de1a
    adsp.mbn -> ffa7d3bc5ef6f891ab5125d48234b89b
    Android.mk -> 9974f4247eb0ae79e4b255bc9f00fcbb
    AndroidBoard.mk -> a6b120e6be701425f0173dd692da4251
    AndroidProducts.mk -> 02ceda404d626107e7120c75b69f78e0
    apdp.mbn -> f07702b513692fcc0527f7b110352349
    BoardConfig.mk -> 9faf9a77e686cdf7c376b597187f9ac3
    boot-debug.img -> 6a4e7d179387eb2e2bf34289c7b0c5a8
    boot.img -> 1657f03a47b851e8a4bb8c17c8ccb86a
    BTFM.bin -> 60bafd6a584fb0a7400cf2165ca88e43
    cache.img -> b8153431cc4d6ea191b645e0a128bdc0
    cdsp.mbn -> 011980a2a26de149c948c1231d53cf22
    cmnlib.mbn -> 77fa0376beb60fb0bd012a6494df9a6a
    cmnlib64.mbn -> f355ecc5aa729b2d2b1c368b78251538
    crclist.txt -> e02e29f4e54bd8296d21e58e631e9d2d
    devcfg.mbn -> f1a7eeb49175d09288c17617f518646f
    dspso.bin -> 05ac90f5b8ed3081953bfc6fa6892723
    dtb.img -> 39e42397b1a22d76cd719541c5352098
    dtbo.img -> ee0390d2139b9ee762e78284856c4621
    featenabler.mbn -> 72cee21b29be1d40fc1c67ba7f77b2b3
    ffu_list.txt -> de14db3496000a21b5dfab4aebbdd65b
    fpctzappfingerprint.mbn -> 74fa2cff302eba319ceab45fe6800584
    framework_manifest.xml -> 27356acf4cc0f74dcc57a6d15feacf4d
    fsgall.img -> f41be81fc7bc6399253ff709f7505b6f
    fstab_AB_dynamic_partition.qti -> 7c3d314e66a594d3eb4e33595ffc38be
    fstab_AB_variant.qti -> 119a06c449fd04b505197683f0efcd09
    fstab_non_AB_dynamic_partition.qti -> 6f4d0e4bae0bae60b6d71fac323dc472
    fstab_non_AB_variant.qti -> 6dec0d19154c8281a42442fcb86bbb83
    goodixfp.mbn -> c2ef5ece85b46b8da46e22e7a5c76524
    gpio-keys.kl -> fab01e275a873c98eb02d028914d106e
    gpt_backup0.bin -> a36dcedb727673b91a2e7b8b22a1aa75
    gpt_backup1.bin -> f0de661557245fd66019c67609c947da
    gpt_backup2.bin -> c06bcb8b4e61886020a05a285acd741c
    gpt_backup3.bin -> befa5fc7e32238c271d301809de66e02
    gpt_backup4.bin -> 2b488b4ca19529696da66503c31fec99
    gpt_backup5.bin -> 5297cf70c8bea38c889f4a7f7cb34aed
    gpt_both0.bin -> 5cad138c5ee02829f9c93b05b204f95e
    gpt_both1.bin -> bd2495d9ab349f50b79b1ff725dbe685
    gpt_both2.bin -> 70eb31cdc704c1069733716a954c4f56
    gpt_both3.bin -> 4089e123aa5efeef27e243ff672971f4
    gpt_both4.bin -> 6e7eeea89b88461b4ab002c01be3ea5a
    gpt_both5.bin -> 9f4fea4d36ccd14d4e2520d5dc63374d
    gpt_empty0.bin -> 7b062e4b9562bb74ea8fe445676b3a92
    gpt_empty1.bin -> 7b062e4b9562bb74ea8fe445676b3a92
    gpt_empty2.bin -> 7b062e4b9562bb74ea8fe445676b3a92
    gpt_empty3.bin -> 7b062e4b9562bb74ea8fe445676b3a92
    gpt_empty4.bin -> 7b062e4b9562bb74ea8fe445676b3a92
    gpt_empty5.bin -> 7b062e4b9562bb74ea8fe445676b3a92
    gpt_main0.bin -> 02a364a649d8ceacfb1d4ef999c69a32
    gpt_main1.bin -> 89cd12e778b682e1bbef3c39d4c04b47
    gpt_main2.bin -> 0126324ac62639234b97c15b24a3fb6a
    gpt_main3.bin -> 79d7af8800e97a51b6a3777275f4c8dc
    gpt_main4.bin -> f81792b8fce6267a71cb2f1ef1ce3666
    gpt_main5.bin -> 41043df5c47c07d3204f8ccecb4e7978
    gptest.mbn -> c566897e78ab5c509715fa45dcf4a5f0
    haventkn.mbn -> f2aebab2e886c94644eeda2f27d5addf
    hyp.mbn -> 42208206997cfade7c3e48b356eab71a
    imagefv.elf -> 6aa23453aa999dc35eba9923f1441609
    init.target.rc -> aeb427a1c3333b6d9dc77f3f776eb506
    km4.mbn -> 9a438dc22df7c80178cacfd62ef60184
    lime.mk -> 1dfbe34c27e319b90441c9a89af1d39d
    logfs_ufs_8mb.bin -> c040a889d66a4f120f502f89b551f42b
    manifest.xml -> caf0e96e0c0bf30f991f165030fa3cc4
    manifest_ab.xml -> b623b992da295acd8310f43e8f4ebe85
    metadata.img -> ac7abb42ba4dd0f75335153549f41f84
    MICRON_LYRA2_64GB_0605.bin -> e35b487e8c63d492aac16db97cbd77ef
    multi_image.mbn -> 434a8847eb2848e3ed6f25713aadad53
    NON-HLOS.bin -> 875cb19f6013dfe44f1d15fc7b5159e2
    NOTICE -> 98017cf03a7e1b612bcf232f9b44aa2e
    odm_manifest_lemon.xml -> 9b290f8f379c3e8a6f8f79822acac677
    odm_manifest_lime.xml -> 2384e886ad7573acb92604d4103c1c87
    odm_manifest_pomelo.xml -> 2384e886ad7573acb92604d4103c1c87
    partition.xml -> e3b3e37247680b45408fd3d1982eca09
    patch0.xml -> 15694a6e6716908db07b048d915ab37f
    patch1.xml -> 0780990ee59934bdcaffc918cac99aed
    patch2.xml -> 81036277fd056a16c0e418a756a5a835
    patch3.xml -> f1e955eeee449ed57767ac0b87552cf1
    patch4.xml -> 82a65c3c86ad47ffa1aaa21417598c32
    patch5.xml -> 90ed396b2667209688b315f4dcc37104
    persist.img -> 9c8f964fb03faa6a79d6e4ab2dd1957d
    prebuilt_dtbo.img -> 5a310187621d72f82d672daf91231463
    product.img -> 3edbde6439c089e66368cd370c6cd903
    prog_firehose_ddr.elf -> 13dd339bd2db3a8c9bdfa6357d41ca12
    ProjectConfig.mk -> 8f9e31321f8452a1e690f2e426ad8a22
    provision_hynix.xml -> c7fecbec91b6aa5449bbe7ff5c2ca51d
    PT_3Dv5_TLC_Voyager_UFS2.2_A251_USER.bin -> ca3088a07474377f54429f7cb1d9d7a2
    public.libraries-qti.txt -> d599da22e6c4b8467ce28e1e562250eb
    qupv3fw.elf -> dde60357158c8f7275aa153d8e221bba
    ramdisk-debug.img -> e931fe2a009dbaab4f60775f83f0e772
    ramdisk-recovery.img -> 8e579f57d0695d925b08a63b57c809f1
    ramdisk.img -> 19e3f68d17f4d8f5a8b47d24a4d3e72b
    rawprogram0.xml -> 98c3a8110edccdf01c57bfa5f0dd97a3
    rawprogram0_BLANK_GPT.xml -> b3200cadf9be377d4f950cc03f4490a6
    rawprogram0_WIPE_PARTITIONS.xml -> a08020b62484e1bfa7dbc6a7a76ac8fb
    rawprogram1.xml -> 1df8d77508440b40cce09e94d5904af9
    rawprogram1_BLANK_GPT.xml -> 30c9b7228531bbc0a0bfc5421105c196
    rawprogram1_WIPE_PARTITIONS.xml -> 2c9dd8708195e23f910c0728873662c6
    rawprogram2.xml -> 5b75a6083172cce4147d4a8769d81a55
    rawprogram2_BLANK_GPT.xml -> 3198bf3e352b48600e63b90979e71a08
    rawprogram2_WIPE_PARTITIONS.xml -> db15a8c1ac994e50be924e32ed9f03f4
    rawprogram3.xml -> e03411d04b290ffe1ea9b993d1f23074
    rawprogram3_BLANK_GPT.xml -> 439d4e875584101690085e1c95833e24
    rawprogram3_WIPE_PARTITIONS.xml -> 3322789cb2c9e42bebd04f364e7a7aed
    rawprogram4.xml -> fbaa3ea21bca23aa413bb9167773c7c7
    rawprogram4_BLANK_GPT.xml -> 4d34e3bb4a83abdbe5f1fbf972d31918
    rawprogram4_WIPE_PARTITIONS.xml -> 1dae44f86205d39ac83a6f83ee8911ad
    rawprogram5.xml -> ebc54f7ab9d20e97b7601fb71bab4d6f
    rawprogram5_BLANK_GPT.xml -> 93e0a3b178a136cda2cbab8de547f645
    rawprogram5_WIPE_PARTITIONS.xml -> 9abf9d0a5859d4394a159ea29b499d9a
    recovery-two-step.img -> a5a6f212c93886ff8515c2479ef4bfb2
    recovery.img -> 251497aba4fed6188919606dda5cd715
    recovery_AB_dynamic_partition.fstab -> a1734c76b6cf3c7cceb6384f2b167bf9
    recovery_AB_variant.fstab -> 131037786ef6b9a8c56a1e34cb03ecc5
    recovery_non-AB_dynamic_partition.fstab -> e4e761473a7a0e190c3e0ed5d5438600
    recovery_non-AB_variant.fstab -> 379263def26dcaf344aa027980f4b731
    rpm.mbn -> 05c3096461be56f1d94200be9124c547
    S101_64G_430bda1ae4_MICRON.bin -> 2644fac2ba2516c40aee7cc543544a29
    S201_64G_dd6e035122_MICRON.bin -> ea229b469d8e39e2d411cdac0fc467fa
    SANTOS_UFS_2_2_V5_TLC_256Gb_128GB_P17.bin -> 1238740ee9d31d3f5b560c61f94f7845
    Santos_V5_TLC_128GB_P15_General.bin -> f02b19fc3bcb8f2a9f1c8bdb919a86ac
    sec.dat -> 21775907582b06389a656ab56011c160
    sec.elf -> db0ff694b116843bef34a1b8fc1fbd5b
    smplap64.mbn -> 6ef1323ee8a74727359ca510719fea36
    soter64.mbn -> 9ecc10629adb114076489cd12540d94c
    sparsecrclist.txt -> a6b02a3d5d0819ae7a994decbb456db9
    storsec.mbn -> cbcaa3cd55ef02eb318066eaa800cf90
    super.img -> ec54cd76fc3d8300a37222bc9ad9b31a
    super_empty.img -> 1f8c5307a34885c9577d875d5c366d93
    system.img -> 2e1cd737578b8c94dd0ead1c9ddeb97f
    system.prop -> dcf0fa9fc04edeaed8ef6a9d0d224276
    tz.mbn -> 21c38fd53a3c46e1ebdb2efc59bacba7
    uefi_sec.mbn -> 4a28fa0f72ecc18a173d8035098e36c5
    userdata.img -> e952e2c175d99f35d20acdd31d90e8f2
    vbmeta.img -> 1cbd4a76cf8bc05d1dc3f84fb2dacf02
    vbmeta_system.img -> 74a918bbd11203de6d001c2ebade8f08
    vendor.img -> 3dd4303c5c516e33f374a6419e0656b6
    vold.fstab -> a1e06a3daf0404cb89944e95dfdd8fec
    widevine.mbn -> f07842bfedbf439111d9be6a6a35eb81
    xbl.elf -> 14cda50cabdaaae74a0a204a39b68b32
    xbl_config.elf -> 7975e2560048f7c4a543045d399091ee
    Xiaomi_Columbus_S76_PRV_0005_Official_FW_bitflip_count.bin -> fc9018659527ad3add419eff38a75753
    Xiaomi_Columbus_S76_T005_Test _FW_bitflip_count.bin -> 7f6647928bb0eb78b2c583603fffd460
    zeros_1sector.bin -> 620f0b67a91f7f74151bc5be745b7110
    zeros_5sectors.bin -> daa100df6e6711906b61c9ab5aa16032
    5
    Hey,
    I noticed that the EDL Loader included in the Engineering Firmware does not require an authentication, meaning that the Redmi 9T can now be unbricked without having to contact a Service Center, etc.


    Thank you :D
    2
    Hey,
    I noticed that the EDL Loader included in the Engineering Firmware does not require an authentication, meaning that the Redmi 9T can now be unbricked without having to contact a Service Center, etc.


    Thank you :D
    Very good work, my friend.
    You are welcome :)
    2
    Hello, phone come with problem:
    Not power on, when connect to PC - hs-usb qdloader 9008
    Try flash it. Flash Ok, but problem same
    Not power on, when connect to PC - hs-usb qdloader 9008
    What may be? Memory die?
    Hello, it is working way, maybe it can help you:
    1
    Done.
    Uploaded.
    Enjoy !