* Using Linux mount second partition of SD-card to the fs (sorry, can't help if you do not know how to do this... cannot distribute modified image as it would violate Sony's IP):
mount /dev/sdb2 /mnt/part2
* Give executable permissions for mksh (sh is linked to mksh):
Code:
chmod 755 /mnt/part2/bin/mksh
* Set imutable bit for mksh:
Code:
chattr +i /mnt/part2/bin/mksh
* While doing this, you may just as well download motochopper and put pwn to xbin and give execute permissions:
Code:
cp pwn /mnt/part2/xbin/
chmod 755 /mnt/part2/xbin/pwn
* EDIT: See my post below. This is good time to push system.img and hidden.img to the sdcard. Get OTA zip, decrypt, unzip and write:
Code:
cp system.img /mnt/part2/
cp hidden.img /mnt/part2/
* Umount, put SD-card to the Xperia Tablet S and boot it. Wait a while.
* Start shell and gain root using pwn (motochopper is not designed for this so ignore al the error messages after success message):
C:\>adb shell
[email protected]:/ $ /system/xbin/pwn
/system/xbin/pwn
[+] This may take a few minutes.
[+] Success!
sh: /system/xbin/busybox: not found
sh: cp: not found
* Add busybox to PATH for convenience:
Code:
export PATH=$PATH:/system/xbin/busyboxbin
- Using desklunvr (
http://forum.xda-developers.com/show....php?t=2068261) decrypt the OTA you used to brick your devices in the first place. ie:
Code:
Code:
desklunvr.exe signed-txs03_xxx-ota-nnn.zip
- Push resulting system.img to /tmp (or
better write it to sd-card while you write pwn etc., adb is slow...):
Code:
- From adb shell flash system image to first system partition:
Code:
Code:
/system/xbin/busyboxbin/dd if=/tmp/system.img of=/dev/block/mmcblk0p3
- From adb shell flash system image to second system partition:
Code:
Code:
/system/xbin/busyboxbin/dd if=/tmp/system.img of=/dev/block/mmcblk0p4
To try to flash hidden.img if system.img is not enough, push hidden.img to /tmp just like you did system img and:
Code:
/system/xbin/busyboxbin/dd if=/tmp/hidden.img of=/dev/block/mmcblk0p7