Mail to M. Rosenberg
I've sent a mail today to M. Rosenberg, asking for some help :
"
Hello M. Rosenberg,
As an owner of a Sony Tablet S, I've successfuly used your exploit to gain root.
Unfortunatly, I bricked the device while deleting Sony bloatware on it. The tablet went back
to life after an OTA update that lead it from a #8 kernel build to a #10, no more rootable.
I've try to understand why and discovered that the /log directory now belongs to system group
so ADB could not write in it anymore. I've noticed that /dev/log directory, writable by ADB may
have something to do with the logging process you used and try a lot of (silly) things to adapt
your script without success.
So I've take a look at your other exploits and tought that the one provided for the LG Thrill / Optimus 3D
may work for the Sony Tablet. I've modified your script to match /dev/block/mmcblk0p3 and patched your block
binary to do so but the program failed to open the block device.
We are some people at XDA forum in the same situation, waiting for something to happend about root and
the newly released #10 kernel... It will be very kind from you to find some time for working again on the
Sony Tablet S, giving us some idea, some trick or... a new fully working script !
I'll publish this mail in XDA forum and join the mounts of the Sony Tablet kernel #10...
Best regards,
Nesquick95
----------------------------------------------------------------------------------------
rootfs / rootfs ro,relatime 0 0
tmpfs /dev tmpfs rw,nosuid,relatime,mode=755 0 0
devpts /dev/pts devpts rw,relatime,mode=600 0 0
proc /proc proc rw,relatime 0 0
sysfs /sys sysfs rw,relatime 0 0
debugfs /sys/kernel/debug debugfs rw,relatime 0 0
/dev/block/mmcblk0p1 /configs ext2 ro,relatime 0 0
none /acct cgroup rw,relatime,cpuacct 0 0
tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0
tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0
none /dev/cpuctl cgroup rw,relatime,cpu 0 0
/dev/block/mmcblk0p3 /system ext4 ro,relatime,barrier=1,data=ordered 0 0
/dev/block/mmcblk0p10 /data ext4 rw,nosuid,nodev,noatime,barrier=1,data=ordered 0 0
/dev/block/mmcblk0p4 /cache ext4 rw,nosuid,nodev,noatime,barrier=1,data=ordered 0 0
/dev/block/mmcblk0p9 /log ext4 rw,nosuid,nodev,noatime,barrier=1,data=ordered 0 0
/dev/block/svold/179:17 /mnt/sdcard2 vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,batch_sync,utf8,comp_uni,avoid_dlink,errors=remount-ro 0 0
/dev/block/vold/179:11 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,batch_sync,utf8,comp_uni,avoid_dlink,errors=remount-ro 0 0
/dev/block/vold/179:11 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,batch_sync,utf8,comp_uni,avoid_dlink,errors=remount-ro 0 0
tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0
----------------------------------------------------------------------------------------
"