Welcome to XDA

Search to go directly to your device's forum

Register an account

Unlock full posting privileges

Ask a question

No registration required
Post Reply

[ROM] Official Sony ICS 4.1.A.0.562 for Neo V Nordic-1253-1755

OP DrearierJester1

14th April 2012, 01:10 PM   |  #31  
daviduco's Avatar
Senior Member
Flag Madrid
Thanks Meter: 74
 
437 posts
Join Date:Joined: Jul 2011
More
Will this work on neo?
14th April 2012, 01:30 PM   |  #32  
umarian's Avatar
Recognized Contributor
Thanks Meter: 2,923
 
1,457 posts
Join Date:Joined: May 2011
Smile
Quote:
Originally Posted by ZduneX25

I doedexed this rom: http://speedy.sh/K4b5w/deodex.zip (if you do not know what deodexing is for, do not install this package)

Thans man.one question (i am use Xultimate for deodex) you use other progam?
14th April 2012, 01:46 PM   |  #33  
Senior Member
Flag istanbul
Thanks Meter: 50
 
213 posts
Join Date:Joined: Dec 2010
Quote:
Originally Posted by addicted2088

Guy, here's how you can root it. Download the Superuser file first, and copy to SD card of course..

Superuser-3.0.7-efghi-signed.zip

Then, hot boot any kernel with CWM (I used Nightelf MIUI kernel, Nightelf ICS Beta 2 somehow refused to enter recovery) using the following command:

fastboot boot kernel_name.img

Phone will reboot, start spamming the Back button when Sony logo comes up to enter recovery, install the superuser zip, then reboot to boot into rooted official ICS Oh, and install busybox by using a busybox installer from Market or by updating su binary through Superuser app, which will download busybox in the process..

OP: Best to add it to 1st post

ı have do this but i think i have permission problem i cant flash it in recovery and another problem i cant copy anything to sd card
14th April 2012, 01:50 PM   |  #34  
Member
Flag Phnom Penh
Thanks Meter: 1
 
93 posts
Join Date:Joined: Dec 2010
More
Quote:
Originally Posted by addicted2088

Guy, here's how you can root it. Download the Superuser file first, and copy to SD card of course..

Superuser-3.0.7-efghi-signed.zip

Then, hot boot any kernel with CWM (I used Nightelf MIUI kernel, Nightelf ICS Beta 2 somehow refused to enter recovery) using the following command:

fastboot boot kernel_name.img

Phone will reboot, start spamming the Back button when Sony logo comes up to enter recovery, install the superuser zip, then reboot to boot into rooted official ICS Oh, and install busybox by using a busybox installer from Market or by updating su binary through Superuser app, which will download busybox in the process..

OP: Best to add it to 1st post

Can you upload official Sony ics kernel that is already rooted or with recovery?

Sent from my MT11i using XDA
14th April 2012, 01:57 PM   |  #35  
Senior Member
Flag Pune
Thanks Meter: 154
 
554 posts
Join Date:Joined: Oct 2010
Donate to Me
More
Quote:
Originally Posted by ayfon

ı have do this but i think i have permission problem i cant flash it in recovery and another problem i cant copy anything to sd card

Sorry, no idea what's wrong. Can't you copy it to SD card when the phone is on? It works for me, though I updated through PC Companion using the build.prop hack. Oh, and my bootloaders are unlocked as well but that goes without saying when you wanna flash a custom kernel.

Quote:
Originally Posted by kvroath

Can you upload official Sony ics kernel that is already rooted or with recovery?

Sent from my MT11i using XDA

Haha, nope, I am just a normal user, don't know how to make or compile kernels
14th April 2012, 01:58 PM   |  #36  
masterinc's Avatar
Senior Member
Flag Shah Alam
Thanks Meter: 21
 
171 posts
Join Date:Joined: Jan 2008
More
Quote:
Originally Posted by masterinc

wifi not work for me. still got the wifi drop out issues

here is the logcat..

HTML Code:
19:48:35.656 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd POWERMODE 0 len = 4096
19:48:35.656 Debug wpa_supplicant 10653  global POWERMODE set to 0 (wanted 0), ret 0
19:48:35.656 Debug wpa_supplicant 10653  wlan0: ap_scan = 2
19:48:35.656 Debug wpa_supplicant 10653  Setting scan request: 0 sec 0 usec
19:48:35.656 Debug wpa_supplicant 10653  Starting AP scan for wildcard SSID
19:48:35.656 Debug wpa_supplicant 10653  Scan requested (ret=0) - scan timeout 30 seconds
19:48:35.656 Debug wpa_supplicant 10653  nl80211: Event message available
19:48:35.656 Debug wpa_supplicant 10653  nl80211: Scan trigger
19:48:35.656 Debug wpa_supplicant 10653  wlan0: ap_scan = 2
19:48:35.656 Debug wpa_supplicant 10653  Ongoing scan action - reject new request
19:48:35.765 Debug wpa_supplicant 10653  nl80211: Event message available
19:48:35.765 Debug wpa_supplicant 10653  nl80211: New scan results available
19:48:35.765 Debug wpa_supplicant 10653  Event 3 received on interface wlan0
19:48:35.765 Debug wpa_supplicant 10653  nl80211: Associated on 2437 MHz
19:48:35.765 Debug wpa_supplicant 10653  Received scan results (3 BSSes)
19:48:35.765 Debug wpa_supplicant 10653  nl80211: Scan results indicate BSS status with 50:2a:8b:33:61:c0 as associated
19:48:35.765 Debug wpa_supplicant 10653  BSS: Start scan result update 2
19:48:35.765 Debug wpa_supplicant 10653  New scan results available
19:48:35.765 Debug wpa_supplicant 10653  Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
19:48:35.765 Debug wpa_supplicant 10653  RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
19:48:35.765 Debug wpa_supplicant 10653  RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
19:48:35.765 Debug wpa_supplicant 10653  Event 5 received on interface wlan0
19:48:35.765 Debug wpa_supplicant 10653  wlan0: ap_scan = 1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=24
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=28
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=9
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103c len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=24
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=28
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=9
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103c len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=24
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=28
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=9
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103c len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1041 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1041 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x104a len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1044 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1041 len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x103b len=1
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1047 len=16
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1021 len=6
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1023 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1024 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1042 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1054 len=8
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1011 len=7
19:48:35.765 Debug wpa_supplicant 10653  WPS: attr type=0x1008 len=2
19:48:40.687 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd SETSUSPENDOPT 0 len = 4096
19:48:40.687 Error wpa_supplicant 10653  Unsupported command: SETSUSPENDOPT 0
19:48:40.687 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd POWERMODE 0 len = 4096
19:48:40.687 Debug wpa_supplicant 10653  global POWERMODE set to 0 (wanted 0), ret 0
19:49:24.437 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd SETSUSPENDOPT 0 len = 4096
19:49:24.437 Error wpa_supplicant 10653  Unsupported command: SETSUSPENDOPT 0
19:49:24.437 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd POWERMODE 0 len = 4096
19:49:24.437 Debug wpa_supplicant 10653  global POWERMODE set to 0 (wanted 0), ret 0
19:51:38.765 Debug wpa_supplicant 10653  BSS: Expire BSS 1 due to age
19:51:38.765 Debug wpa_supplicant 10653  BSS: Remove id 1 BSSID 28:10:7b:ea:76:20 SSID 'rosbaki@unifi'
19:51:38.765 Debug wpa_supplicant 10653  BSS: Expire BSS 2 due to age
19:51:38.765 Debug wpa_supplicant 10653  BSS: Remove id 2 BSSID 34:08:04:e3:6b:e5 SSID 'yamaha'
19:52:27.109 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd SETSUSPENDOPT 0 len = 4096
19:52:27.109 Error wpa_supplicant 10653  Unsupported command: SETSUSPENDOPT 0
19:52:27.109 Debug wpa_supplicant 10653  nl80211_priv_driver_cmd POWERMODE 0 len = 4096
19:52:27.109 Debug wpa_supplicant 10653  global POWERMODE set to 0 (wanted 0), ret 0
14th April 2012, 02:03 PM   |  #37  
Aarush's Avatar
Senior Member
Flag New Delhi
Thanks Meter: 700
 
1,499 posts
Join Date:Joined: Jan 2012
More
can someone help?
i have unlocked bootloader! flashed file with flashtool, but the phone just switches off boots again and same, bootloop
what to do?

EDIT: back to life.
Last edited by Aarush; 14th April 2012 at 02:13 PM.
14th April 2012, 02:16 PM   |  #38  
umarian's Avatar
Recognized Contributor
Thanks Meter: 2,923
 
1,457 posts
Join Date:Joined: May 2011
[QUOTE=Aarush;24840120]can someone help?
i have unlocked bootloader! flashed file with flashtool, but the phone just switches off boots again and same, bootloop
what to do?

man try with flashtool 0.6.9.1 (the same thing i have when i use a older version for flashtool)
14th April 2012, 02:17 PM   |  #39  
archijit's Avatar
Senior Member
Flag New Delhi
Thanks Meter: 184
 
592 posts
Join Date:Joined: Dec 2010
More
i have rooted with CWM with stock kernel
My steps:
1.Put this http://downloads.androidsu.com/super...ghi-signed.zip in sd
2.switch off the phone, attach in fastboot mode
command: fastboot boot recoveryNeo.img
(dont forget to put recoveryNeo.img in fastboot folder from attach. below)
--- phone will automatically boot in recovery.(no need to press any button)
----detach the phone from cable.
3. from recovery flash superuser-3.0.7....
----(beware of button behaviour of this cwm--- power button is for selection)
----reboot the phone.
4. plug the phone with pc & run install-cwm1 (extract this from attach. below)
------Enjoy--------
Attached Files
File Type: img recoveryNeo.img - [Click for QR Code] (4.54 MB, 108 views)
File Type: rar CWM-Install.rar - [Click for QR Code] (1.45 MB, 166 views)
The Following User Says Thank You to archijit For This Useful Post: [ View ]
14th April 2012, 02:30 PM   |  #40  
Member
Thanks Meter: 5
 
43 posts
Join Date:Joined: Mar 2012
More
Hello, i flashed with flashtools and have a problem.
Neo V brick.
After i have flash 0.62.

Now flash i-scream.

Post Reply Subscribe to Thread
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes