I just uploaded a new version of the exploit that should fix this problem. Just unzip it, execute "run.bat", and let me know how it goes.
If anyone has been having any problems with the exploit, please try the new version here:
I've got problems with rooting my tab.
Here is what i've got:
[*] Waiting for device... * daemon not running. starting it now * * daemon started successfully *[*] Device found.[*] Pushing log flooder to device... 525 KB/s (5382 bytes in 0.010s)[*] Preparing to append to packages.list...[*] Rebooting device...[*] Waiting for tablet to reboot.[*] Attempting to move system package library directory... [+] System package com.google.android.location has uid 10027 [+] Flooding log... run-as: Package 'com.pwn.me' is unknown[*] If you received any errors in the previous step, abort the exploit[*] and try again. Otherwise, press any key to continue. Aby kontynuować, naciśnij dowolny klawisz . . .[*] Rebooting device...[*] Waiting for tablet to reboot.[*] Attempting to insert fake local.prop entry... [+] Flooding log...[*] Rebooting device...[*] Waiting for tablet to reboot.[*] Attemping persistence... remount failed: Operation not permitted failed to copy 'su' to '/system/bin/su': Read-only file system Unable to chmod /system/bin/su: No such file or directory failed to copy 'busybox' to '/system/xbin/busybox': Read-only file system Unable to chmod /system/xbin/busybox: No such file or directory /system/xbin/busybox: not found failed to copy 'Superuser.apk' to '/system/app/Superuser.apk': Read-only file sy stem[*] Cleaning up... failed on '/data/data/com.google.android.location/lib.bak' - No such file or dir ectory