[ROM] Official Sony ICS 4.1.A.0.562 for Neo V Nordic-1253-1755

Search This thread

3ftw

Senior Member
Feb 20, 2012
104
5
Thessaloniki
can i flash it with flash tool..?i have relock the bootloader to restore the official rom..im boring to unlock again..i read here for flashing with flashtool...its correct?
 

sspoko

Senior Member
Jan 31, 2010
232
38
Flash those files through recovery to get root access, first RootXperia then Superuser.
 

Attachments

  • RootXperia.zip
    1.2 MB · Views: 407
  • Superuser-3.0.7-efghi-signed.zip
    625.2 KB · Views: 206

addicted2088

Senior Member
Oct 20, 2010
558
154
Pune
Guys, here's how you can root it. Requires unlocked bootloader. Download the Superuser file first, and copy to SD card of course..

Superuser-3.0.7-efghi-signed.zip

Then, hot boot any kernel with CWM (I used Nightelf MIUI kernel, Nightelf ICS Beta 2 somehow refused to enter recovery) using the following command:

fastboot boot kernel_name.img

Phone will reboot, start spamming the Back button when Sony logo comes up to enter recovery, install the superuser zip, then reboot to boot into rooted official ICS ;) Oh, and install busybox by using a busybox installer from Market or by updating su binary through Superuser app, which will download busybox in the process..

OP: Best to add it to 1st post :)
 
Last edited:

ayfon

Senior Member
Dec 11, 2010
242
61
istanbul
OnePlus 6T
Redmi Note 10 Pro
Guy, here's how you can root it. Download the Superuser file first, and copy to SD card of course..

Superuser-3.0.7-efghi-signed.zip

Then, hot boot any kernel with CWM (I used Nightelf MIUI kernel, Nightelf ICS Beta 2 somehow refused to enter recovery) using the following command:

fastboot boot kernel_name.img

Phone will reboot, start spamming the Back button when Sony logo comes up to enter recovery, install the superuser zip, then reboot to boot into rooted official ICS ;) Oh, and install busybox by using a busybox installer from Market or by updating su binary through Superuser app, which will download busybox in the process..

OP: Best to add it to 1st post :)

ı have do this but i think i have permission problem i cant flash it in recovery and another problem i cant copy anything to sd card
 

kvroath

Senior Member
Dec 17, 2010
109
15
Jinju
Google Pixel 4 XL
Guy, here's how you can root it. Download the Superuser file first, and copy to SD card of course..

Superuser-3.0.7-efghi-signed.zip

Then, hot boot any kernel with CWM (I used Nightelf MIUI kernel, Nightelf ICS Beta 2 somehow refused to enter recovery) using the following command:

fastboot boot kernel_name.img

Phone will reboot, start spamming the Back button when Sony logo comes up to enter recovery, install the superuser zip, then reboot to boot into rooted official ICS ;) Oh, and install busybox by using a busybox installer from Market or by updating su binary through Superuser app, which will download busybox in the process..

OP: Best to add it to 1st post :)

Can you upload official Sony ics kernel that is already rooted or with recovery?

Sent from my MT11i using XDA
 

addicted2088

Senior Member
Oct 20, 2010
558
154
Pune
ı have do this but i think i have permission problem i cant flash it in recovery and another problem i cant copy anything to sd card

Sorry, no idea what's wrong. Can't you copy it to SD card when the phone is on? It works for me, though I updated through PC Companion using the build.prop hack. Oh, and my bootloaders are unlocked as well but that goes without saying when you wanna flash a custom kernel.

Can you upload official Sony ics kernel that is already rooted or with recovery?

Sent from my MT11i using XDA

Haha, nope, I am just a normal user, don't know how to make or compile kernels :p
 
wifi not work for me. still got the wifi drop out issues

here is the logcat..

HTML:
19:48:35.656 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd POWERMODE 0 len = 4096
19:48:35.656 Debug wpa_supplicant 10653  global POWERMODE set to 0 (wanted 0), ret 0
19:48:35.656 Debug wpa_supplicant 10653  wlan0: ap_scan = 2
19:48:35.656 Debug wpa_supplicant 10653  Setting scan request: 0 sec 0 usec
19:48:35.656 Debug wpa_supplicant 10653  Starting AP scan for wildcard SSID
19:48:35.656 Debug wpa_supplicant 10653  Scan requested (ret=0) - scan timeout 30 seconds
19:48:35.656 Debug wpa_supplicant 10653  nl80211: Event message available
19:48:35.656 Debug wpa_supplicant 10653  nl80211: Scan trigger
19:48:35.656 Debug wpa_supplicant 10653  wlan0: ap_scan = 2
19:48:35.656 Debug wpa_supplicant 10653  Ongoing scan action - reject new request
19:48:35.765 Debug wpa_supplicant 10653  nl80211: Event message available
19:48:35.765 Debug wpa_supplicant 10653  nl80211: New scan results available
19:48:35.765 Debug wpa_supplicant 10653  Event 3 received on interface wlan0
19:48:35.765 Debug wpa_supplicant 10653  nl80211: Associated on 2437 MHz
19:48:35.765 Debug wpa_supplicant 10653  Received scan results (3 BSSes)
19:48:35.765 Debug wpa_supplicant 10653  nl80211: Scan results indicate BSS status with 50:2a:8b:33:61:c0 as associated
19:48:35.765 Debug wpa_supplicant 10653  BSS: Start scan result update 2
19:48:35.765 Debug wpa_supplicant 10653  New scan results available
19:48:35.765 Debug wpa_supplicant 10653  Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
19:48:35.765 Debug wpa_supplicant 10653  RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
19:48:35.765 Debug wpa_supplicant 10653  RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
19:48:35.765 Debug wpa_supplicant 10653  Event 5 received on interface wlan0
19:48:35.765 Debug wpa_supplicant 10653  wlan0: ap_scan = 1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=24
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=28
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=9
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103c len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=24
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=28
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=9
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103c len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=24
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=28
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=9
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103c len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1041 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1041 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1041 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:40.687 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd SETSUSPENDOPT 0 len = 4096
19:48:40.687 Error wpa_supplicant 10653  Unsupported command: SETSUSPENDOPT 0
19:48:40.687 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd POWERMODE 0 len = 4096
19:48:40.687 Debug wpa_supplicant 10653  global POWERMODE set to 0 (wanted 0), ret 0
19:49:24.437 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd SETSUSPENDOPT 0 len = 4096
19:49:24.437 Error wpa_supplicant 10653  Unsupported command: SETSUSPENDOPT 0
19:49:24.437 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd POWERMODE 0 len = 4096
19:49:24.437 Debug wpa_supplicant 10653  global POWERMODE set to 0 (wanted 0), ret 0
19:51:38.765 Debug wpa_supplicant 10653  BSS: Expire BSS 1 due to age
19:51:38.765 Debug wpa_supplicant 10653  BSS: Remove id 1 BSSID 28:10:7b:ea:76:20 SSID 'rosbaki@unifi'
19:51:38.765 Debug wpa_supplicant 10653  BSS: Expire BSS 2 due to age
19:51:38.765 Debug wpa_supplicant 10653  BSS: Remove id 2 BSSID 34:08:04:e3:6b:e5 SSID 'yamaha'
19:52:27.109 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd SETSUSPENDOPT 0 len = 4096
19:52:27.109 Error wpa_supplicant 10653  Unsupported command: SETSUSPENDOPT 0
19:52:27.109 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd POWERMODE 0 len = 4096
19:52:27.109 Debug wpa_supplicant 10653  global POWERMODE set to 0 (wanted 0), ret 0
 

Aarush

Senior Member
Jan 11, 2012
1,497
693
New Delhi
can someone help?
i have unlocked bootloader! flashed file with flashtool, but the phone just switches off boots again and same, bootloop :(
what to do?

EDIT: back to life.
 
Last edited:

umarian

Inactive Recognized Contributor
May 7, 2011
1,488
2,958
can someone help?
i have unlocked bootloader! flashed file with flashtool, but the phone just switches off boots again and same, bootloop :(
what to do?

man try with flashtool 0.6.9.1 (the same thing i have when i use a older version for flashtool)
 

archijit

Senior Member
Dec 25, 2010
592
183
New Delhi
i have rooted with CWM with stock kernel :D
My steps:
1.Put this http://downloads.androidsu.com/superuser/Superuser-3.0.7-efghi-signed.zip in sd
2.switch off the phone, attach in fastboot mode
command: fastboot boot recoveryNeo.img
(dont forget to put recoveryNeo.img in fastboot folder from attach. below)
--- phone will automatically boot in recovery.(no need to press any button)
----detach the phone from cable.
3. from recovery flash superuser-3.0.7....
----(beware of button behaviour of this cwm--- power button is for selection)
----reboot the phone.
4. plug the phone with pc & run install-cwm1 (extract this from attach. below)
------Enjoy--------
 

Attachments

  • recoveryNeo.img
    4.5 MB · Views: 120
  • CWM-Install.rar
    1.4 MB · Views: 179
  • Like
Reactions: addicted2088

rolar50

Member
Mar 24, 2012
43
5
Hello, i flashed with flashtools and have a problem.:(
Neo V brick.
After i have flash 0.62.

Now flash i-scream.
 

Top Liked Posts

  • There are no posts matching your filters.
  • 16
    Here's the FTF Files for Neo V - Nordic

    Part 1: http://www.mediafire.com/?9dera4tes44pa7d

    Part 2: http://www.mediafire.com/?7ik510cq7cy2p62

    You may use: HJ Split to join the FTF files

    HJ Split: http://www.hjsplit.org/windows/
    3
    Everithing working fine for me only flashing with Flashtool. The only thing I needed to do was allowing Data Roaming for yoigo-spain to work since
    this carrier is not considered in the Nordic update (this might be a frequent issue with other carriers)

    btw. If any linux user wants to join the two ftf files it's as simple as writing
    ina terminal

    $ cat first_half.ftf.1 second_half.ftf.1 > whole_file.ftf

    something wou can also do ina terminal emulator in your Xperia Neo, and no need for HJ Split.
    3
    Guys, here's how you can root it. Requires unlocked bootloader. Download the Superuser file first, and copy to SD card of course..

    Superuser-3.0.7-efghi-signed.zip

    Then, hot boot any kernel with CWM (I used Nightelf MIUI kernel, Nightelf ICS Beta 2 somehow refused to enter recovery) using the following command:

    fastboot boot kernel_name.img

    Phone will reboot, start spamming the Back button when Sony logo comes up to enter recovery, install the superuser zip, then reboot to boot into rooted official ICS ;) Oh, and install busybox by using a busybox installer from Market or by updating su binary through Superuser app, which will download busybox in the process..

    OP: Best to add it to 1st post :)
    2
    Downloading !!!!.. No it wont need an Unloacked Bootloader.. Will Work on Locked Bootloaders :)
    2
    Can I flash just kernel from mt11i_4.1.A.0.562.ftf (whole rom) using Flashtool?

    I think that would be possible by unticking the Wipe options, and ticking Exclude System + Exclude Baseband options in Flastool.