Open GoogleCodeExporter opened 8 years ago
For developer
I think that on various HW rooted systems this Java (api.java) function:
'exec = Runtime.getruntime().exec ("su -c " +abspath);
cannot run because 'SU' command is invoked as "(/system/bin/./su)" and not only
"su"(Z4root mode); in this case Driodwall do not have possibility to check
superuser permission and it's impossible promote via superuser.apk . I suggest
to use,in this case,a simple file (ie: root.txt) that 'root user' can write in
<\data\data\com.googlecode.droidwall\app_bin\> for bypass this limitation and
grant full Droidwall functionality.
regards Giuseppe
Original comment by GZicchin...@webgateit.zzn.com
on 19 Dec 2011 at 10:39
*** Warning: For Linux Experts only ->| rooted via Z4root| <- :
You can bypass manually : as Root# rename link under "/bin/su ->busybox" whith
other name (ie: mv su su_last) and reboot tablet , on login new SU#
(/system/bin/./su)is
active and droidwall work now .
** Do not assume responsability for this internal modification : it's at your
risk .
Giuseppe. Italy
Original comment by GZicchin...@webgateit.zzn.com
on 19 Dec 2011 at 12:53
Hi, were you able to run other root applications BEFORE the "fix"?
As far as I know, all root apps expect that you have a good "su" binary on the
system PATH - so if you have a bad one at "/bin/su", root access will not work.
Original comment by rodrigo...@gmail.com
on 21 Dec 2011 at 11:56
Original issue reported on code.google.com by
GZicchin...@webgateit.zzn.com
on 16 Dec 2011 at 9:27