[ENGINEERING][ROM][OFFICIAL] OFFICIAL Engineering Firmware for DANDELION (Redmi 9A / Redmi 9AT)

Search This thread

VD171

Senior Member
Jun 21, 2012
3,027
2
2,282
127.0.0.1
LG K10
Samsung Galaxy J7
Works with:
- Xiaomi Redmi 9A
- Xiaomi Redmi 9AT

Does NOT work with:
- Xiaomi Redmi 10A


Build Date:
2020/07/03

Android Version:
QP1A.190711.020

Display ID:
dandelion-userdebug 10 QP1A.190711.020 246 test-keys

Build Fingerprint:
Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys

Security Patch:
2020/03/05

Radio/Modem/Baseband Version:
MOLY.LR12A.R3.MP.V107.5.P4

Download:
https://www.mediafire.com/file/7kaa...neering_246_QP1A.190711.020_by-VD171.zip/file

Password:
Pass is in the attached file: PASSWORD_by_VD171.txt

How to flash it?
Use the attached scatter file.

Radio/Modem/Baseband properties:
Code:
md1_dbginfodsp=DbgInfo_DSP_MT6765_MOLY_LR12A_R3_MP_V107_5_P4_2020_05_08_15_56.xz
md1_dbginfo=DbgInfo_LR12A.R3.MP_LCSH_Q0MP1_MT6762_SP_MOLY_LR12A_R3_MP_V107_5_P4_2020_07_01_16_05.xz
md1_mddbmeta=MDDB.META_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.EDB
md1_mddbmetaodb=MDDB.META.ODB_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.XML.GZ
md1_mddb=MDDB_InfoCustomAppSrcP_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.EDB

Prop.default:
Code:
ro.build.version.incremental=246
ro.vendor.build.version.incremental=246
ro.odm.build.version.incremental=246
ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp3-V1.4_lcsh.q0mp1.k62v1.64.bsp_P4
ro.product.system.device=dandelion
ro.product.system.model=dandelion
ro.product.system.name=dandelion
ro.build.product=dandelion
ro.product.board=dandelion
ro.product.vendor.device=dandelion
ro.product.vendor.model=dandelion
ro.product.vendor.name=dandelion
ro.product.odm.device=dandelion
ro.product.odm.model=dandelion
ro.product.odm.name=dandelion
ro.product.product.device=dandelion
ro.product.product.model=dandelion
ro.product.product.name=dandelion
ro.build.flavor=dandelion-userdebug
ro.build.display.id=dandelion-userdebug 10 QP1A.190711.020 246 test-keys
ro.build.description=dandelion-userdebug 10 QP1A.190711.020 246 test-keys
ro.board.platform=mt6765
ro.system.build.id=QP1A.190711.020
ro.build.id=QP1A.190711.020
ro.vendor.build.id=QP1A.190711.020
ro.odm.build.id=QP1A.190711.020
ro.product.build.id=QP1A.190711.020
ro.system.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.bootimage.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.product.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.system.build.tags=test-keys
ro.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.type=userdebug
ro.build.type=userdebug
ro.vendor.build.type=userdebug
ro.odm.build.type=userdebug
ro.build.version.security_patch=2020-03-05
ro.vendor.build.security_patch=2020-03-05
ro.system.build.date=Fri Jul  3 07:47:24 CST 2020
ro.build.date=Fri Jul  3 07:47:24 CST 2020
ro.vendor.build.date=Fri Jul  3 07:47:24 CST 2020
ro.odm.build.date=Fri Jul  3 07:47:24 CST 2020
ro.product.build.date=Fri Jul  3 07:47:24 CST 2020
ro.bootimage.build.date=Fri Jul 3 07:47:24 CST 2020

MD5 hashes:
Code:
android-info.txt -> 32dbb7967eee2053e0317f87a93fb6b9
APDB_MT6765_S01__W2015 -> 5358ccefe1fda7f456f3a568ec4b04d5
APDB_MT6765_S01__W2015_ENUM -> fbe5f23b8bc20d1bce7be6200a0731a1
apex -> d41d8cd98f00b204e9800998ecf8427e
arm11_path.txt -> e40c703ef2deffd68827450517984a77
boot-debug.img -> c1d38992863d18176047b02429b11c59
boot.img -> a32268ea83ff1d5d51f47eca241a87a3
build.prop -> 3ae4db3db38ca854dd72df6a457aa703
build_fingerprint.txt -> 07d4c4773385f28d5f0b4659f6777d3b
build_thumbprint.txt -> 9cd94d3bb077ca0d08d72c4bf3131ec3
cache.img -> 9515cdaf0a9558de94f0502ed3664da4
Checksum.ini -> 7a098cb0b8710975489f70478283ab30
clean_steps.mk -> 30f988afe6140fd1afb0a19ed9b53da4
content_cert_sig.bin_hash.tmp -> b0b9c0585e65fab3fa827d4aac0edf26
cust.img -> 09e9b617296df53b0716255c86d01c53
dexpreopt.config -> 3bd2bfa98738f4798fcc97be5ba41e74
dtb.img -> 8cae5478f4627f3dd5f27f7d970db7e5
dtbo-verified.img -> 6c55f4ca20af2d45b1635103df4f68a1
dtbo.img -> 24a92cc62b438970407ff16536fcb4bb
dummy.bin -> 6811c482ead27c0b1165ecfbe996c2b4
efuse.img -> 22e70283687ccca929e3f6d117c5fc34
flash_all.bat -> 024c2db0556931d2d7fc6e92e6ed54b6
fs_image.tar.gz.mbn.img -> 633b9aac7f2d2e81c0dc595d2a644d80
init -> 0c3c9ae3511888e757583690d46e8068
installed-files-product.json -> 8f6fce4756c9e83ccedd0299939e7bdd
installed-files-product.txt -> a9198d055f20793c95bbb5eb12a163ca
installed-files-ramdisk-debug.json -> 0ef92222c9c2cd818c9c6dcd7b727007
installed-files-ramdisk-debug.txt -> 3d2578d523ca82acb1e878fcf5718261
installed-files-ramdisk.json -> 398a83700d0da10043200dd81f5b7397
installed-files-ramdisk.txt -> 194df0e3bdef259bd0d69c036a6af870
installed-files-recovery.json -> e5a3877f1341d5b950e91193ab78a746
installed-files-recovery.txt -> 7e9701a5f6c42c9cd27a0125e3b99888
installed-files-root.json -> e2017cd6f1befb266cb137f306b0a6eb
installed-files-root.txt -> 40d211d2878ac2e27d1d93878dff8a41
installed-files-vendor.json -> 4d53b60ae91e57b5a6a79e760759c72f
installed-files-vendor.txt -> 179c7cb9aa22d7134c5c26b731022e24
installed-files.json -> 0790dbb6a5ecd887b7ff26db3a7ba8b6
installed-files.txt -> f2f4e07ee2f870fc4f90dcae2c87280a
kernel -> f8e1e485a3a62a4394e9519e9ca4fc83
LCSH_Q0MP1_MT6762_SP_PCB01_MT6765_S00_1_lwg_n.elf -> 6787d83c0163564471394381f4f8d29a
lk-verified.img -> 0b178c7801d794020c2a451af00ffedc
lk.img -> 5449098089f99f6665621a0c86beaddb
logo-verified.bin -> b8e0d8450e3d4d99cf0b3bd871152a7a
logo.bin -> 535bfd42ca7ef019d44c6ae64104633e
md1arm7-verified.img -> 1b32f1ebac264d195c7f555b9fd8f042
md1arm7.img -> a0453e723dc84255940d7791740d06db
md1img-verified.img -> dd3497f816cf00c9925d8115cc77a474
md1img.img -> 0d4d8c18261e8a697c5e933ac482f352
md3img.img -> 9a9c185e3f6234103e5949716b9962d2
MDDB_InfoCustomAppSrcP_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4_1_ulwctg_n.EDB -> 449ece5c1a6ab8ffa6b4efc92891be72
module-info.json -> 5d00ba03fa5af1e00c75ffac1f7903b0
MT6765_Android_scatter.txt -> bf253edfc605418fd862337cdcb488ff
PGPT -> 20bedc49348b16cdc20be09c4f32245c
preloader.bin -> d63fc47140c0d7c1bc6ea86ec6ce9043
preloader.img -> 59f7f68c99f30b5471e166a82c1bda57
preloader_dandelion.bin -> d63fc47140c0d7c1bc6ea86ec6ce9043
preloader_dandelion_signed.bin -> ba020d4e46ff99bcc91ccb2da887bc20
preloader_emmc.img -> 59f7f68c99f30b5471e166a82c1bda57
preloader_k62v1_64_bsp.bin -> ba020d4e46ff99bcc91ccb2da887bc20
preloader_ufs.img -> 1883960018454eaae59555c48dc7285b
previous_build_config.mk -> 673bf9a01f6afa6b55a5554ed1a09176
product -> d41d8cd98f00b204e9800998ecf8427e
product.img -> 41a7589079435e9f84b93feedbbbcf1e
ramdisk-debug.img -> 24a5f19c3eb41e553f8e035e4125b383
ramdisk-recovery.img -> a6b50d8cb84d722d405200f35c961e08
ramdisk.img -> 2392bea220016ec89cd9b7df0c6ce173
recovery -> d41d8cd98f00b204e9800998ecf8427e
recovery.id -> b86a1ea13fe21eea9a521b2e1da13146
recovery.img -> a9cd39f28ee3063afd9639ee151fef38
scp-verified.img -> 2f168c310b4f23d403548a766ee71bc5
scp.img -> 1e0a976e554975c7d5625910436916ae
secro.img -> 096587b863e1252d67b1b8307291db09
sig_size.txt -> 7a600b6f266737e2830a101876dd3561
sparsecrclist.img -> 9a027470a494d216f144b6a2ac86c440
spmfw-verified.img -> d6b568c6f86146aed476b91bbdf61341
spmfw.img -> 66cf26550d6650dd65f5f3865948bdf2
sspm-verified.img -> d014b44c00a39b78c4c08384996282ae
sspm.img -> b281a508c22190047eed1af202bd5520
super.img -> eba65ecb1ec79c259c59a27c45b9d70a
super_empty.img -> f911a1089119bd6f6a56919deb7bb9e8
system -> d41d8cd98f00b204e9800998ecf8427e
system.img -> 4a340e79e83e90d6c70360b6503cfa20
TARGET.txt -> 748150f0c3bbf2fa4dcc3346e73099f5
tee-verified.img -> 452aa3410f1be5f80d5c52aa1751a6c3
tee.img -> c17a4cd1a2c8265954ce3238fad9f3b3
userdata.img -> 0af062847d5f163ed835686f4a196743
vbmeta.img -> 8f10a8eabccb78a5ef5526ba8a0b17a4
vbmeta_system.img -> c3fa65e967f5b63c200b6493df9b5034
vbmeta_vendor.img -> b8faac2a2e1a60aa6cf6030ac7e3827d
vendor -> d41d8cd98f00b204e9800998ecf8427e
vendor.img -> 160818f19e7460b7a4d266eab93b4768
 

Attachments

  • MT6765_Android_scatter--246.txt
    18 KB · Views: 16,896
  • prop.default--246.txt
    21.4 KB · Views: 16,687
  • PASSWORD_by_VD171.txt
    159 bytes · Views: 18,292
Last edited:
  • Like
Reactions: RN9_G85

stels.ol

New member
Sep 25, 2016
2
0
Does not turn on after engineering firmware. On MIUI, it is enabled, but there is no imei and no radio module. Tell me what's wrong. Lk and lk2 flashed separately from MIUI, still not included.
 

VD171

Senior Member
Jun 21, 2012
3,027
2
2,282
127.0.0.1
LG K10
Samsung Galaxy J7
Does not turn on after engineering firmware. On MIUI, it is enabled, but there is no imei and no radio module. Tell me what's wrong. Lk and lk2 flashed separately from MIUI, still not included.
If you lost radio/baseband, you need to format nvdata and then flash the whole miui again.
After the first reboot, the device will rewrite the baseband.
 

leiniercs

Member
Jun 19, 2022
10
1
Works with:
- Xiaomi Redmi 9A
- Xiaomi Redmi 9AT

Does NOT work with:
- Xiaomi Redmi 10A


Build Date:
2020/07/03

Android Version:
QP1A.190711.020

Display ID:
dandelion-userdebug 10 QP1A.190711.020 246 test-keys

Build Fingerprint:
Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys

Security Patch:
2020/03/05

Radio/Modem/Baseband Version:
MOLY.LR12A.R3.MP.V107.5.P4

Download:
https://www.mediafire.com/file/7kaa...neering_246_QP1A.190711.020_by-VD171.zip/file

Password:
Pass is in the attached file: PASSWORD_by_VD171.txt

How to flash it?
Use the attached scatter file.

Radio/Modem/Baseband properties:
Code:
md1_dbginfodsp=DbgInfo_DSP_MT6765_MOLY_LR12A_R3_MP_V107_5_P4_2020_05_08_15_56.xz
md1_dbginfo=DbgInfo_LR12A.R3.MP_LCSH_Q0MP1_MT6762_SP_MOLY_LR12A_R3_MP_V107_5_P4_2020_07_01_16_05.xz
md1_mddbmeta=MDDB.META_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.EDB
md1_mddbmetaodb=MDDB.META.ODB_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.XML.GZ
md1_mddb=MDDB_InfoCustomAppSrcP_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.EDB

Prop.default:
Code:
ro.build.version.incremental=246
ro.vendor.build.version.incremental=246
ro.odm.build.version.incremental=246
ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp3-V1.4_lcsh.q0mp1.k62v1.64.bsp_P4
ro.product.system.device=dandelion
ro.product.system.model=dandelion
ro.product.system.name=dandelion
ro.build.product=dandelion
ro.product.board=dandelion
ro.product.vendor.device=dandelion
ro.product.vendor.model=dandelion
ro.product.vendor.name=dandelion
ro.product.odm.device=dandelion
ro.product.odm.model=dandelion
ro.product.odm.name=dandelion
ro.product.product.device=dandelion
ro.product.product.model=dandelion
ro.product.product.name=dandelion
ro.build.flavor=dandelion-userdebug
ro.build.display.id=dandelion-userdebug 10 QP1A.190711.020 246 test-keys
ro.build.description=dandelion-userdebug 10 QP1A.190711.020 246 test-keys
ro.board.platform=mt6765
ro.system.build.id=QP1A.190711.020
ro.build.id=QP1A.190711.020
ro.vendor.build.id=QP1A.190711.020
ro.odm.build.id=QP1A.190711.020
ro.product.build.id=QP1A.190711.020
ro.system.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.bootimage.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.product.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
ro.system.build.tags=test-keys
ro.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.type=userdebug
ro.build.type=userdebug
ro.vendor.build.type=userdebug
ro.odm.build.type=userdebug
ro.build.version.security_patch=2020-03-05
ro.vendor.build.security_patch=2020-03-05
ro.system.build.date=Fri Jul  3 07:47:24 CST 2020
ro.build.date=Fri Jul  3 07:47:24 CST 2020
ro.vendor.build.date=Fri Jul  3 07:47:24 CST 2020
ro.odm.build.date=Fri Jul  3 07:47:24 CST 2020
ro.product.build.date=Fri Jul  3 07:47:24 CST 2020
ro.bootimage.build.date=Fri Jul 3 07:47:24 CST 2020

MD5 hashes:
Code:
android-info.txt -> 32dbb7967eee2053e0317f87a93fb6b9
APDB_MT6765_S01__W2015 -> 5358ccefe1fda7f456f3a568ec4b04d5
APDB_MT6765_S01__W2015_ENUM -> fbe5f23b8bc20d1bce7be6200a0731a1
apex -> d41d8cd98f00b204e9800998ecf8427e
arm11_path.txt -> e40c703ef2deffd68827450517984a77
boot-debug.img -> c1d38992863d18176047b02429b11c59
boot.img -> a32268ea83ff1d5d51f47eca241a87a3
build.prop -> 3ae4db3db38ca854dd72df6a457aa703
build_fingerprint.txt -> 07d4c4773385f28d5f0b4659f6777d3b
build_thumbprint.txt -> 9cd94d3bb077ca0d08d72c4bf3131ec3
cache.img -> 9515cdaf0a9558de94f0502ed3664da4
Checksum.ini -> 7a098cb0b8710975489f70478283ab30
clean_steps.mk -> 30f988afe6140fd1afb0a19ed9b53da4
content_cert_sig.bin_hash.tmp -> b0b9c0585e65fab3fa827d4aac0edf26
cust.img -> 09e9b617296df53b0716255c86d01c53
dexpreopt.config -> 3bd2bfa98738f4798fcc97be5ba41e74
dtb.img -> 8cae5478f4627f3dd5f27f7d970db7e5
dtbo-verified.img -> 6c55f4ca20af2d45b1635103df4f68a1
dtbo.img -> 24a92cc62b438970407ff16536fcb4bb
dummy.bin -> 6811c482ead27c0b1165ecfbe996c2b4
efuse.img -> 22e70283687ccca929e3f6d117c5fc34
flash_all.bat -> 024c2db0556931d2d7fc6e92e6ed54b6
fs_image.tar.gz.mbn.img -> 633b9aac7f2d2e81c0dc595d2a644d80
init -> 0c3c9ae3511888e757583690d46e8068
installed-files-product.json -> 8f6fce4756c9e83ccedd0299939e7bdd
installed-files-product.txt -> a9198d055f20793c95bbb5eb12a163ca
installed-files-ramdisk-debug.json -> 0ef92222c9c2cd818c9c6dcd7b727007
installed-files-ramdisk-debug.txt -> 3d2578d523ca82acb1e878fcf5718261
installed-files-ramdisk.json -> 398a83700d0da10043200dd81f5b7397
installed-files-ramdisk.txt -> 194df0e3bdef259bd0d69c036a6af870
installed-files-recovery.json -> e5a3877f1341d5b950e91193ab78a746
installed-files-recovery.txt -> 7e9701a5f6c42c9cd27a0125e3b99888
installed-files-root.json -> e2017cd6f1befb266cb137f306b0a6eb
installed-files-root.txt -> 40d211d2878ac2e27d1d93878dff8a41
installed-files-vendor.json -> 4d53b60ae91e57b5a6a79e760759c72f
installed-files-vendor.txt -> 179c7cb9aa22d7134c5c26b731022e24
installed-files.json -> 0790dbb6a5ecd887b7ff26db3a7ba8b6
installed-files.txt -> f2f4e07ee2f870fc4f90dcae2c87280a
kernel -> f8e1e485a3a62a4394e9519e9ca4fc83
LCSH_Q0MP1_MT6762_SP_PCB01_MT6765_S00_1_lwg_n.elf -> 6787d83c0163564471394381f4f8d29a
lk-verified.img -> 0b178c7801d794020c2a451af00ffedc
lk.img -> 5449098089f99f6665621a0c86beaddb
logo-verified.bin -> b8e0d8450e3d4d99cf0b3bd871152a7a
logo.bin -> 535bfd42ca7ef019d44c6ae64104633e
md1arm7-verified.img -> 1b32f1ebac264d195c7f555b9fd8f042
md1arm7.img -> a0453e723dc84255940d7791740d06db
md1img-verified.img -> dd3497f816cf00c9925d8115cc77a474
md1img.img -> 0d4d8c18261e8a697c5e933ac482f352
md3img.img -> 9a9c185e3f6234103e5949716b9962d2
MDDB_InfoCustomAppSrcP_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4_1_ulwctg_n.EDB -> 449ece5c1a6ab8ffa6b4efc92891be72
module-info.json -> 5d00ba03fa5af1e00c75ffac1f7903b0
MT6765_Android_scatter.txt -> bf253edfc605418fd862337cdcb488ff
PGPT -> 20bedc49348b16cdc20be09c4f32245c
preloader.bin -> d63fc47140c0d7c1bc6ea86ec6ce9043
preloader.img -> 59f7f68c99f30b5471e166a82c1bda57
preloader_dandelion.bin -> d63fc47140c0d7c1bc6ea86ec6ce9043
preloader_dandelion_signed.bin -> ba020d4e46ff99bcc91ccb2da887bc20
preloader_emmc.img -> 59f7f68c99f30b5471e166a82c1bda57
preloader_k62v1_64_bsp.bin -> ba020d4e46ff99bcc91ccb2da887bc20
preloader_ufs.img -> 1883960018454eaae59555c48dc7285b
previous_build_config.mk -> 673bf9a01f6afa6b55a5554ed1a09176
product -> d41d8cd98f00b204e9800998ecf8427e
product.img -> 41a7589079435e9f84b93feedbbbcf1e
ramdisk-debug.img -> 24a5f19c3eb41e553f8e035e4125b383
ramdisk-recovery.img -> a6b50d8cb84d722d405200f35c961e08
ramdisk.img -> 2392bea220016ec89cd9b7df0c6ce173
recovery -> d41d8cd98f00b204e9800998ecf8427e
recovery.id -> b86a1ea13fe21eea9a521b2e1da13146
recovery.img -> a9cd39f28ee3063afd9639ee151fef38
scp-verified.img -> 2f168c310b4f23d403548a766ee71bc5
scp.img -> 1e0a976e554975c7d5625910436916ae
secro.img -> 096587b863e1252d67b1b8307291db09
sig_size.txt -> 7a600b6f266737e2830a101876dd3561
sparsecrclist.img -> 9a027470a494d216f144b6a2ac86c440
spmfw-verified.img -> d6b568c6f86146aed476b91bbdf61341
spmfw.img -> 66cf26550d6650dd65f5f3865948bdf2
sspm-verified.img -> d014b44c00a39b78c4c08384996282ae
sspm.img -> b281a508c22190047eed1af202bd5520
super.img -> eba65ecb1ec79c259c59a27c45b9d70a
super_empty.img -> f911a1089119bd6f6a56919deb7bb9e8
system -> d41d8cd98f00b204e9800998ecf8427e
system.img -> 4a340e79e83e90d6c70360b6503cfa20
TARGET.txt -> 748150f0c3bbf2fa4dcc3346e73099f5
tee-verified.img -> 452aa3410f1be5f80d5c52aa1751a6c3
tee.img -> c17a4cd1a2c8265954ce3238fad9f3b3
userdata.img -> 0af062847d5f163ed835686f4a196743
vbmeta.img -> 8f10a8eabccb78a5ef5526ba8a0b17a4
vbmeta_system.img -> c3fa65e967f5b63c200b6493df9b5034
vbmeta_vendor.img -> b8faac2a2e1a60aa6cf6030ac7e3827d
vendor -> d41d8cd98f00b204e9800998ecf8427e
vendor.img -> 160818f19e7460b7a4d266eab93b4768
Hello. I recently flashed the firmware v12.0.10 global from PitchBlack Recovery. I was on v12.5.12 China before flashing. What I did was boot into the recovery, flash the firmware, flash the new recovery who Works with firmware v12.0.10 and then the installer of that recovery rebooted my device automatically. The result is that my Redmi 9A is dead. It doesnt show the initial screen after power on, nor boot, nor nothing. I can not enter it in META mode either. The Maui Meta software is not able to put it into META mode because it fails when checking Serial Link Authentication with error 6004, after checking the baseband chip, send AUTH. Do you know any tricks, software or whatever that help me to bring to life this device?
 

Al3xFreitex

Member
Mar 20, 2022
22
3
Hello. I recently flashed the firmware v12.0.10 global from PitchBlack Recovery. I was on v12.5.12 China before flashing. What I did was boot into the recovery, flash the firmware, flash the new recovery who Works with firmware v12.0.10 and then the installer of that recovery rebooted my device automatically. The result is that my Redmi 9A is dead. It doesnt show the initial screen after power on, nor boot, nor nothing. I can not enter it in META mode either. The Maui Meta software is not able to put it into META mode because it fails when checking Serial Link Authentication with error 6004, after checking the baseband chip, send AUTH. Do you know any tricks, software or whatever that help me to bring to life this device?
use EDL mode to revive your phone, and use SP Flash Tool to revive it on Global Firmware
 

leiniercs

Member
Jun 19, 2022
10
1
use EDL mode to revive your phone, and use SP Flash Tool to revive it on Global Firmware
Hello. I was able to flash the stock ROM once again using the software MTKClient. It has modern techniques. Now I'm using crDroid with firmware 12.5.12 R-vendor. I relieve that I must to flash the full stock ROM v12.0.10 if I want to avoid that bar experience once again, and then flash other custom ROMs. Thank you all for your tips.
 

Al3xFreitex

Member
Mar 20, 2022
22
3
Hello. I was able to flash the stock ROM once again using the software MTKClient. It has modern techniques. Now I'm using crDroid with firmware 12.5.12 R-vendor. I relieve that I must to flash the full stock ROM v12.0.10 if I want to avoid that bar experience once again, and then flash other custom ROMs. Thank you all for your tips.
I do not recommend it, if it is bricked in v12.0.10 it is because you have the ARB (AntiRollBack) that prevents you from downgrading to other versions
 

Al3xFreitex

Member
Mar 20, 2022
22
3
Hola. Pude flashear la ROM stock una vez más usando el software MTKClient. Tiene técnicas modernas. Ahora estoy usando crDroid con firmware 12.5.12 R-vendor. Considero que debo flashear la ROM de stock completa v12.0.10 si quiero evitar esa experiencia de barra una vez más, y luego flashear otras ROM personalizadas. Gracias a todos por sus consejos.
Could you tell me how you flashed the CrDroid ROM? because I've done a lot of research and if I don't downgrade to MIUI 12.0.10 I get a Wi-Fi bug
 

Top Liked Posts

  • There are no posts matching your filters.
  • 2
    Does not turn on after engineering firmware. On MIUI, it is enabled, but there is no imei and no radio module. Tell me what's wrong. Lk and lk2 flashed separately from MIUI, still not included.
    If you lost radio/baseband, you need to format nvdata and then flash the whole miui again.
    After the first reboot, the device will rewrite the baseband.
    1
    Works with:
    - Xiaomi Redmi 9A
    - Xiaomi Redmi 9AT

    Does NOT work with:
    - Xiaomi Redmi 10A


    Build Date:
    2020/07/03

    Android Version:
    QP1A.190711.020

    Display ID:
    dandelion-userdebug 10 QP1A.190711.020 246 test-keys

    Build Fingerprint:
    Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys

    Security Patch:
    2020/03/05

    Radio/Modem/Baseband Version:
    MOLY.LR12A.R3.MP.V107.5.P4

    Download:
    https://www.mediafire.com/file/7kaa...neering_246_QP1A.190711.020_by-VD171.zip/file

    Password:
    Pass is in the attached file: PASSWORD_by_VD171.txt

    How to flash it?
    Use the attached scatter file.

    Radio/Modem/Baseband properties:
    Code:
    md1_dbginfodsp=DbgInfo_DSP_MT6765_MOLY_LR12A_R3_MP_V107_5_P4_2020_05_08_15_56.xz
    md1_dbginfo=DbgInfo_LR12A.R3.MP_LCSH_Q0MP1_MT6762_SP_MOLY_LR12A_R3_MP_V107_5_P4_2020_07_01_16_05.xz
    md1_mddbmeta=MDDB.META_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.EDB
    md1_mddbmetaodb=MDDB.META.ODB_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.XML.GZ
    md1_mddb=MDDB_InfoCustomAppSrcP_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4.EDB

    Prop.default:
    Code:
    ro.build.version.incremental=246
    ro.vendor.build.version.incremental=246
    ro.odm.build.version.incremental=246
    ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp3-V1.4_lcsh.q0mp1.k62v1.64.bsp_P4
    ro.product.system.device=dandelion
    ro.product.system.model=dandelion
    ro.product.system.name=dandelion
    ro.build.product=dandelion
    ro.product.board=dandelion
    ro.product.vendor.device=dandelion
    ro.product.vendor.model=dandelion
    ro.product.vendor.name=dandelion
    ro.product.odm.device=dandelion
    ro.product.odm.model=dandelion
    ro.product.odm.name=dandelion
    ro.product.product.device=dandelion
    ro.product.product.model=dandelion
    ro.product.product.name=dandelion
    ro.build.flavor=dandelion-userdebug
    ro.build.display.id=dandelion-userdebug 10 QP1A.190711.020 246 test-keys
    ro.build.description=dandelion-userdebug 10 QP1A.190711.020 246 test-keys
    ro.board.platform=mt6765
    ro.system.build.id=QP1A.190711.020
    ro.build.id=QP1A.190711.020
    ro.vendor.build.id=QP1A.190711.020
    ro.odm.build.id=QP1A.190711.020
    ro.product.build.id=QP1A.190711.020
    ro.system.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
    ro.vendor.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
    ro.bootimage.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
    ro.odm.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
    ro.product.build.fingerprint=Redmi/dandelion/dandelion:10/QP1A.190711.020/246:userdebug/test-keys
    ro.system.build.tags=test-keys
    ro.build.tags=test-keys
    ro.vendor.build.tags=test-keys
    ro.odm.build.tags=test-keys
    ro.system.build.type=userdebug
    ro.build.type=userdebug
    ro.vendor.build.type=userdebug
    ro.odm.build.type=userdebug
    ro.build.version.security_patch=2020-03-05
    ro.vendor.build.security_patch=2020-03-05
    ro.system.build.date=Fri Jul  3 07:47:24 CST 2020
    ro.build.date=Fri Jul  3 07:47:24 CST 2020
    ro.vendor.build.date=Fri Jul  3 07:47:24 CST 2020
    ro.odm.build.date=Fri Jul  3 07:47:24 CST 2020
    ro.product.build.date=Fri Jul  3 07:47:24 CST 2020
    ro.bootimage.build.date=Fri Jul 3 07:47:24 CST 2020

    MD5 hashes:
    Code:
    android-info.txt -> 32dbb7967eee2053e0317f87a93fb6b9
    APDB_MT6765_S01__W2015 -> 5358ccefe1fda7f456f3a568ec4b04d5
    APDB_MT6765_S01__W2015_ENUM -> fbe5f23b8bc20d1bce7be6200a0731a1
    apex -> d41d8cd98f00b204e9800998ecf8427e
    arm11_path.txt -> e40c703ef2deffd68827450517984a77
    boot-debug.img -> c1d38992863d18176047b02429b11c59
    boot.img -> a32268ea83ff1d5d51f47eca241a87a3
    build.prop -> 3ae4db3db38ca854dd72df6a457aa703
    build_fingerprint.txt -> 07d4c4773385f28d5f0b4659f6777d3b
    build_thumbprint.txt -> 9cd94d3bb077ca0d08d72c4bf3131ec3
    cache.img -> 9515cdaf0a9558de94f0502ed3664da4
    Checksum.ini -> 7a098cb0b8710975489f70478283ab30
    clean_steps.mk -> 30f988afe6140fd1afb0a19ed9b53da4
    content_cert_sig.bin_hash.tmp -> b0b9c0585e65fab3fa827d4aac0edf26
    cust.img -> 09e9b617296df53b0716255c86d01c53
    dexpreopt.config -> 3bd2bfa98738f4798fcc97be5ba41e74
    dtb.img -> 8cae5478f4627f3dd5f27f7d970db7e5
    dtbo-verified.img -> 6c55f4ca20af2d45b1635103df4f68a1
    dtbo.img -> 24a92cc62b438970407ff16536fcb4bb
    dummy.bin -> 6811c482ead27c0b1165ecfbe996c2b4
    efuse.img -> 22e70283687ccca929e3f6d117c5fc34
    flash_all.bat -> 024c2db0556931d2d7fc6e92e6ed54b6
    fs_image.tar.gz.mbn.img -> 633b9aac7f2d2e81c0dc595d2a644d80
    init -> 0c3c9ae3511888e757583690d46e8068
    installed-files-product.json -> 8f6fce4756c9e83ccedd0299939e7bdd
    installed-files-product.txt -> a9198d055f20793c95bbb5eb12a163ca
    installed-files-ramdisk-debug.json -> 0ef92222c9c2cd818c9c6dcd7b727007
    installed-files-ramdisk-debug.txt -> 3d2578d523ca82acb1e878fcf5718261
    installed-files-ramdisk.json -> 398a83700d0da10043200dd81f5b7397
    installed-files-ramdisk.txt -> 194df0e3bdef259bd0d69c036a6af870
    installed-files-recovery.json -> e5a3877f1341d5b950e91193ab78a746
    installed-files-recovery.txt -> 7e9701a5f6c42c9cd27a0125e3b99888
    installed-files-root.json -> e2017cd6f1befb266cb137f306b0a6eb
    installed-files-root.txt -> 40d211d2878ac2e27d1d93878dff8a41
    installed-files-vendor.json -> 4d53b60ae91e57b5a6a79e760759c72f
    installed-files-vendor.txt -> 179c7cb9aa22d7134c5c26b731022e24
    installed-files.json -> 0790dbb6a5ecd887b7ff26db3a7ba8b6
    installed-files.txt -> f2f4e07ee2f870fc4f90dcae2c87280a
    kernel -> f8e1e485a3a62a4394e9519e9ca4fc83
    LCSH_Q0MP1_MT6762_SP_PCB01_MT6765_S00_1_lwg_n.elf -> 6787d83c0163564471394381f4f8d29a
    lk-verified.img -> 0b178c7801d794020c2a451af00ffedc
    lk.img -> 5449098089f99f6665621a0c86beaddb
    logo-verified.bin -> b8e0d8450e3d4d99cf0b3bd871152a7a
    logo.bin -> 535bfd42ca7ef019d44c6ae64104633e
    md1arm7-verified.img -> 1b32f1ebac264d195c7f555b9fd8f042
    md1arm7.img -> a0453e723dc84255940d7791740d06db
    md1img-verified.img -> dd3497f816cf00c9925d8115cc77a474
    md1img.img -> 0d4d8c18261e8a697c5e933ac482f352
    md3img.img -> 9a9c185e3f6234103e5949716b9962d2
    MDDB_InfoCustomAppSrcP_MT6765_S00_MOLY_LR12A_R3_MP_V107_5_P4_1_ulwctg_n.EDB -> 449ece5c1a6ab8ffa6b4efc92891be72
    module-info.json -> 5d00ba03fa5af1e00c75ffac1f7903b0
    MT6765_Android_scatter.txt -> bf253edfc605418fd862337cdcb488ff
    PGPT -> 20bedc49348b16cdc20be09c4f32245c
    preloader.bin -> d63fc47140c0d7c1bc6ea86ec6ce9043
    preloader.img -> 59f7f68c99f30b5471e166a82c1bda57
    preloader_dandelion.bin -> d63fc47140c0d7c1bc6ea86ec6ce9043
    preloader_dandelion_signed.bin -> ba020d4e46ff99bcc91ccb2da887bc20
    preloader_emmc.img -> 59f7f68c99f30b5471e166a82c1bda57
    preloader_k62v1_64_bsp.bin -> ba020d4e46ff99bcc91ccb2da887bc20
    preloader_ufs.img -> 1883960018454eaae59555c48dc7285b
    previous_build_config.mk -> 673bf9a01f6afa6b55a5554ed1a09176
    product -> d41d8cd98f00b204e9800998ecf8427e
    product.img -> 41a7589079435e9f84b93feedbbbcf1e
    ramdisk-debug.img -> 24a5f19c3eb41e553f8e035e4125b383
    ramdisk-recovery.img -> a6b50d8cb84d722d405200f35c961e08
    ramdisk.img -> 2392bea220016ec89cd9b7df0c6ce173
    recovery -> d41d8cd98f00b204e9800998ecf8427e
    recovery.id -> b86a1ea13fe21eea9a521b2e1da13146
    recovery.img -> a9cd39f28ee3063afd9639ee151fef38
    scp-verified.img -> 2f168c310b4f23d403548a766ee71bc5
    scp.img -> 1e0a976e554975c7d5625910436916ae
    secro.img -> 096587b863e1252d67b1b8307291db09
    sig_size.txt -> 7a600b6f266737e2830a101876dd3561
    sparsecrclist.img -> 9a027470a494d216f144b6a2ac86c440
    spmfw-verified.img -> d6b568c6f86146aed476b91bbdf61341
    spmfw.img -> 66cf26550d6650dd65f5f3865948bdf2
    sspm-verified.img -> d014b44c00a39b78c4c08384996282ae
    sspm.img -> b281a508c22190047eed1af202bd5520
    super.img -> eba65ecb1ec79c259c59a27c45b9d70a
    super_empty.img -> f911a1089119bd6f6a56919deb7bb9e8
    system -> d41d8cd98f00b204e9800998ecf8427e
    system.img -> 4a340e79e83e90d6c70360b6503cfa20
    TARGET.txt -> 748150f0c3bbf2fa4dcc3346e73099f5
    tee-verified.img -> 452aa3410f1be5f80d5c52aa1751a6c3
    tee.img -> c17a4cd1a2c8265954ce3238fad9f3b3
    userdata.img -> 0af062847d5f163ed835686f4a196743
    vbmeta.img -> 8f10a8eabccb78a5ef5526ba8a0b17a4
    vbmeta_system.img -> c3fa65e967f5b63c200b6493df9b5034
    vbmeta_vendor.img -> b8faac2a2e1a60aa6cf6030ac7e3827d
    vendor -> d41d8cd98f00b204e9800998ecf8427e
    vendor.img -> 160818f19e7460b7a4d266eab93b4768
    1
    Is this miui or aosp ?
    That is a leaked OFFICIAL rom.
    So, obviously that is MIUI.
    1
    You are welcome, my friend.
    Enjoy :)