[SOLVED] how to root xperia zl c6502 10.4.1.B.0.101 locked bootloader?

Search This thread

alkesh95

Senior Member
Mar 22, 2012
1,232
228
Mumbai
First of all this is wrong thread for your question and if you will search by using search option in forums you will find something
Now if u have locked bootloader then use nuts method check development thread
And if you are willing to unlockbootloader then there is easy way

Sent from my C6502 using XDA Premium 4 mobile app
 

alkesh95

Senior Member
Mar 22, 2012
1,232
228
Mumbai
I rooted my device by unlocking bootloader
So if u r ready then i can help u
Pm me

Sent from my C6502 using XDA Premium 4 mobile app
 

Cookie Ninja

Senior Member
Jan 21, 2010
2,043
700
Simple steps:
1. Downgrade to 4.2.2 (67 firmware) by flashing the ftf file of your region. Search the ZL thread to find your ROM on 67 fw.
2. Root the 67 firmware by bin4ry's method or cubeundcube method.
3. Make a TA backup using DevShaft's method. This is important for relocking your bootloader.
4. Upgrade to 101 using PCC or SUS. You will lose root. Make a ftf file of the update files that has been downloaded to your computer using flashtool.
5. Unlock bootloader from Sony. You will lose DRM.
6. Flash a custom kernel by Doomlord or Gustavo RD78. This is a modified stock kernel with cwm recovery built-in.
7. Now download the latest 1.94 update super su.zip from chainfire's website. Store it in your ext micro SD card. Flash it to root your phone from the cwm recovery.
8. To get back to stock recovery, use the ftf file created at step 4 above. Flash only the kernel and fotakernel from the ftf file.
9. Now relock your bootloader by flashing the ta backup you made at step 3. Now your phone is rooted with locked bootloader on 101 firmware.
10. Enjoy!

I made a similar help thread for Sony Xperia Z here: http://xdaforums.com/showthread.php?t=2656698.
Go though the thread except using the custom kernel in that thread. That kernel is Z specific. For the ZL use the advanced stock kernel by Doomlord or Gustavo RD78 in the dev section. Link for kernel for ZL is here:
http://xdaforums.com/showthread.php?t=2599619

Sent from one of my/our device/s
 
Last edited:

Cookie Ninja

Senior Member
Jan 21, 2010
2,043
700
I'm sorry, but isn't flashing 4.2.2 version (ftf .67), then rooting with kingo, then upgrading to .101 via OTA a much easier procedure?

Kingo steals your IMEI and phone information while it roots. Some malware package is dropped onto your phone ( a long alpha numeric gibberish folder name with a dot in the begining to hide it). The folder is copied onto your phone's external SD card as well as onto your internal memory.This folder contains a .nomedia file sized 80 bytes, which is funny 'coz all nomedia files are 0 byte files. The file has some code stored in it, which is very suspicious. Avoid Kingo, vroot and all such Chinese fly-by night closed-source root methods that require an internet connection to root your phone.
Also read the last post in this thread for more information.
http://xdaforums.com/showthread.php?t=2491457
 
Last edited:

alex_herrero

Senior Member
Jul 6, 2010
325
55
Buenos Aires
Kingo steals your IMEI and phone information while it roots. Some malware package is dropped onto your phone ( a long alpha numeric gibberish folder name with a dot in the begining to hide it). The folder is copied onto your phone's external SD card as well as onto your internal memory.This folder contains a .nomedia file sized 80 bytes, which is funny 'coz all nomedia files are 0 byte files. The file has some code stored in it, which is very suspicious. Avoid Kingo, vroot and all such Chinese fly-by night closed-source root methods that require an internet connection to root your phone.
Also read the last post in this thread for more information.
http://xdaforums.com/showthread.php?t=2491457

Ok, sounds enough arguments for at least try another method. By the time I was rooting my device (a couple of months ago), kingo was the only method I could get my unlocked bootloader phone to keep root after upgrading to latest firmware through OTA (it was .569 back then). If someone is willing to point me (while I look by myself) to the method you followed to get root on a .101 firmware with a locked bootloader (mine can't be unlocked, AFAIK) I'll be more than glad!

Thanks for your comments.
 
Last edited:

Top Liked Posts

  • There are no posts matching your filters.
  • 3
    Simple steps:
    1. Downgrade to 4.2.2 (67 firmware) by flashing the ftf file of your region. Search the ZL thread to find your ROM on 67 fw.
    2. Root the 67 firmware by bin4ry's method or cubeundcube method.
    3. Make a TA backup using DevShaft's method. This is important for relocking your bootloader.
    4. Upgrade to 101 using PCC or SUS. You will lose root. Make a ftf file of the update files that has been downloaded to your computer using flashtool.
    5. Unlock bootloader from Sony. You will lose DRM.
    6. Flash a custom kernel by Doomlord or Gustavo RD78. This is a modified stock kernel with cwm recovery built-in.
    7. Now download the latest 1.94 update super su.zip from chainfire's website. Store it in your ext micro SD card. Flash it to root your phone from the cwm recovery.
    8. To get back to stock recovery, use the ftf file created at step 4 above. Flash only the kernel and fotakernel from the ftf file.
    9. Now relock your bootloader by flashing the ta backup you made at step 3. Now your phone is rooted with locked bootloader on 101 firmware.
    10. Enjoy!

    I made a similar help thread for Sony Xperia Z here: http://xdaforums.com/showthread.php?t=2656698.
    Go though the thread except using the custom kernel in that thread. That kernel is Z specific. For the ZL use the advanced stock kernel by Doomlord or Gustavo RD78 in the dev section. Link for kernel for ZL is here:
    http://xdaforums.com/showthread.php?t=2599619

    Sent from one of my/our device/s
    2
    I'm sorry, but isn't flashing 4.2.2 version (ftf .67), then rooting with kingo, then upgrading to .101 via OTA a much easier procedure?

    Kingo steals your IMEI and phone information while it roots. Some malware package is dropped onto your phone ( a long alpha numeric gibberish folder name with a dot in the begining to hide it). The folder is copied onto your phone's external SD card as well as onto your internal memory.This folder contains a .nomedia file sized 80 bytes, which is funny 'coz all nomedia files are 0 byte files. The file has some code stored in it, which is very suspicious. Avoid Kingo, vroot and all such Chinese fly-by night closed-source root methods that require an internet connection to root your phone.
    Also read the last post in this thread for more information.
    http://xdaforums.com/showthread.php?t=2491457