flyfire / droidsshd

Automatically exported from code.google.com/p/droidsshd
0 stars 0 forks source link

SIGSEGV after successful login #9

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
On my HTC Desire, I cannot get a shell after log in using the droidsshd applet.

In the logcat output, I see this:

D/DroidSShd Util(  644): pidFile = 905 - 
/data/data/br.com.bott.droidsshd/files/run/dropbear.pid = 905
D/DroidSSHdService-daemon-stderr(  644): [906] Jan 30 16:57:36 Child connection 
from 10.0.10.2:64104
D/DroidSSHdService-daemon(  644): '[906] Jan 30 16:57:36 Child connection from 
10.0.10.2:64104'
D/DroidSSHdService-daemon-stderr(  644): [906] Jan 30 16:57:41 password auth 
succeeded for 'root' from 10.0.10.2:64104
D/DroidSSHdService-daemon(  644): '[906] Jan 30 16:57:41 password auth 
succeeded for 'root' from 10.0.10.2:64104'
I/DEBUG   (   64): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 
***
I/DEBUG   (   64): Build fingerprint: 
'htc_wwe/htc_bravo/bravo/bravo:2.2/FRF91/226611:user/release-keys'
I/DEBUG   (   64): pid: 907, tid: 907  >>> -sh <<<
I/DEBUG   (   64): signal 11 (SIGSEGV), fault addr 40008280
I/DEBUG   (   64):  r0 00000000  r1 40008280  r2 0000000e  r3 00000000
I/DEBUG   (   64):  r4 afd386a0  r5 0000000e  r6 000003d4  r7 40008280
I/DEBUG   (   64):  r8 00000000  r9 00001600  10 afd43918  fp afd0cea1
I/DEBUG   (   64):  ip 00000064  sp bedf4ab8  lr afd25937  pc afd0eda4  cpsr 
60000010
I/DEBUG   (   64):  d0  6472656767756265  d1  0000000000000069
I/DEBUG   (   64):  d2  0000000000000062  d3  0000000000000063
I/DEBUG   (   64):  d4  0000000000000000  d5  0000000000000000
I/DEBUG   (   64):  d6  0000000000000000  d7  0000000000000000
I/DEBUG   (   64):  d8  0000000000000000  d9  0000000000000000
I/DEBUG   (   64):  d10 0000000000000000  d11 0000000000000000
I/DEBUG   (   64):  d12 0000000000000000  d13 0000000000000000
I/DEBUG   (   64):  d14 0000000000000000  d15 0000000000000000
I/DEBUG   (   64):  d16 0000000000000000  d17 0000000000000000
I/DEBUG   (   64):  d18 0000000000000000  d19 0000000000000000
I/DEBUG   (   64):  d20 0000000000000000  d21 0000000000000000
I/DEBUG   (   64):  d22 0000000000000000  d23 0000000000000000
I/DEBUG   (   64):  d24 0000000000000000  d25 0000000000000000
I/DEBUG   (   64):  d26 0000000000000000  d27 0000000000000000
I/DEBUG   (   64):  d28 0000000000000000  d29 0000000000000000
I/DEBUG   (   64):  d30 0000000000000000  d31 0000000000000000
I/DEBUG   (   64):  scr 00000000
I/DEBUG   (   64):
I/DEBUG   (   64):          #00  pc 0000eda4  /system/lib/libc.so
I/DEBUG   (   64):          #01  pc 00025934  /system/lib/libc.so
I/DEBUG   (   64):          #02  pc 00025958  /system/lib/libc.so
I/DEBUG   (   64):          #03  pc 0000ceba  /system/lib/libc.so
I/DEBUG   (   64):          #04  pc 000111d8  /system/lib/libc.so
I/DEBUG   (   64):          #05  pc 0000ce76  /system/lib/libc.so
I/DEBUG   (   64):          #06  pc 0000d448  /system/lib/libc.so
I/DEBUG   (   64):
I/DEBUG   (   64): code around pc:
I/DEBUG   (   64): afd0ed84 e4d1c001 e050000c 1a000039 e2533001
I/DEBUG   (   64): afd0ed94 1afffff9 e0240001 e2100003 1a000036
I/DEBUG   (   64): afd0eda4 e591c000 e2522024 4a00001c f5d4f040
I/DEBUG   (   64): afd0edb4 f5d1f040 e4940004 e5b1e004 e030000c
I/DEBUG   (   64): afd0edc4 04940004 05b1c004 0030000e 04940004
I/DEBUG   (   64):
I/DEBUG   (   64): code around lr:
I/DEBUG   (   64): afd25914 4605462b 599fe011 6f17ebb5 9902d10b
I/DEBUG   (   64): afd25924 407ff027 9301462a 9803180f f7e94639
I/DEBUG   (   64): afd25934 9b01ea06 3c01b120 2c003604 4627d1eb
I/DEBUG   (   64): afd25944 b0054638 bf00bdf0 0001ca2c 000000c4
I/DEBUG   (   64): afd25954 460cb510 ffccf7ff 2100b120 f7ff4622
I/DEBUG   (   64):
I/DEBUG   (   64): stack:
I/DEBUG   (   64):     bedf4a78  00000000
I/DEBUG   (   64):     bedf4a7c  00000000
I/DEBUG   (   64):     bedf4a80  00000000
I/DEBUG   (   64):     bedf4a84  00000000
I/DEBUG   (   64):     bedf4a88  00000000
I/DEBUG   (   64):     bedf4a8c  00000000
I/DEBUG   (   64):     bedf4a90  00000000
I/DEBUG   (   64):     bedf4a94  00000000
I/DEBUG   (   64):     bedf4a98  00000000
I/DEBUG   (   64):     bedf4a9c  00000000
I/DEBUG   (   64):     bedf4aa0  00000000
I/DEBUG   (   64):     bedf4aa4  00000000
I/DEBUG   (   64):     bedf4aa8  00000000
I/DEBUG   (   64):     bedf4aac  00000000
I/DEBUG   (   64):     bedf4ab0  df002777
I/DEBUG   (   64):     bedf4ab4  e3a070ad
I/DEBUG   (   64): #00 bedf4ab8  00000006
I/DEBUG   (   64):     bedf4abc  afd25937  /system/lib/libc.so
I/DEBUG   (   64): #01 bedf4ac0  00000000
I/DEBUG   (   64):     bedf4ac4  40000020  /dev/ashmem/system_properties 
(deleted)
I/DEBUG   (   64):     bedf4ac8  40000000  /dev/ashmem/system_properties 
(deleted)
I/DEBUG   (   64):     bedf4acc  afd386a0  /system/lib/libc.so
I/DEBUG   (   64):     bedf4ad0  00000000
I/DEBUG   (   64):     bedf4ad4  bedf4b68  [stack]
I/DEBUG   (   64):     bedf4ad8  bedf4b68  [stack]
I/DEBUG   (   64):     bedf4adc  afd42328  /system/lib/libc.so
I/DEBUG   (   64):     bedf4ae0  00000000
I/DEBUG   (   64):     bedf4ae4  afd2595d  /system/lib/libc.so
D/DroidSSHdService-daemon-stderr(  644): [906] Jan 30 16:57:41 exit after auth 
(root): Exited normally
D/DroidSSHdService-daemon(  644): '[906] Jan 30 16:57:41 exit after auth 
(root): Exited normally'
I/BootReceiver(   96): Copying /data/tombstones/tombstone_07 to DropBox 
(SYSTEM_TOMBSTONE)
D/DroidSShd Util(  644): getDropbearPid() line = 905
D/DroidSShd Util(  644): getDropbearPid() tmp = 905
D/DroidSShd Util(  644): pidFile = 905 - 
/data/data/br.com.bott.droidsshd/files/run/dropbear.pid = 905
V/DroidSSHd(  644): btnStartStop pressed: stopping

Interestingly, if I run the dropbear process with the exact same command line, 
but from a "ConnectBot" root shell, everything works fine.

Original issue reported on code.google.com by ChrisR...@gmail.com on 30 Jan 2011 at 5:32