Hostapd segmentation fault
Suresh Babu
jv.suri
Wed May 11 01:56:53 PDT 2005
Hi all,
I had got segmentation fault, when attempted to send Ctrl+C
to terminate the Hostapd. I am using madwifi-bsd latest version and
Hostapd 3 weeks old version. I could not debug to find where exactly
hostapd is giving segfault? and the log shows the same PC every time
it`s segfault.
I`m attaching the log. can any body help to resolve this.
Thanx in advence.
Regards,
Suresh Babu
-------------- next part --------------
bash-2.05a# ./hostapd-1105-1 hostapd-wpa-psk-ccmp.conf
Configuration file: hostapd-wpa-psk-ccmp.conf
madwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:03:7f:04:a1:52 and ssid 'suba'
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=3
madwifi_configure_wpa: pairwise key ciphers=0x8
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x3
madwifi_set_iface_flags: dev_up=1
madwifi_set_privacy: enabled=1
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): 80 c3 ee 0e 60 21 51 45 ea fb d3 25 a4 1d 5a 53 3c 1a 92
08 cc 18 3a 59 76 14 38 78 d0 ec fd cd
GTK - hexdump(len=16): d1 04 fd 55 7c 9c a0 8a 4a b0 75 5b 77 12 79 5f
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
l2_packet_receive - recv: Network is down
ath0: creating bss 00:03:7f:04:a1:52
Wireless event: cmd=0x8b19 len=12
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:03:7f:05:02:35 IEEE 802.11: associated
New STA
ath0: STA 00:03:7f:05:02:35 WPA: event 1 notification
madwifi_sta_clear_stats: addr=00:03:7f:05:02:35
ath0: STA 00:03:7f:05:02:35 WPA: start authentication
WPA: 00:03:7f:05:02:35 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:03:7f:05:02:35 key_idx=0
ath0: STA 00:03:7f:05:02:35 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:03:7f:05:02:35 authorized=0
WPA: 00:03:7f:05:02:35 WPA_PTK_GROUP entering state IDLE
WPA: 00:03:7f:05:02:35 WPA_PTK entering state AUTHENTICATION
WPA: 00:03:7f:05:02:35 WPA_PTK entering state AUTHENTICATION2
WPA: 00:03:7f:05:02:35 WPA_PTK entering state INITPSK
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKSTART
ath0: STA 00:03:7f:05:02:35 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 03 7f 05 02 35 00 03 7f 04 a1 52 88 8e 01 03 00
5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 77 1c 96 99 fa 54 ce 10 05 f8 5a 32 a6
c2 ff 35 66 fd 31 78 2d 8b 51 ea bd cc 44 8a e6 de ee b5 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 123 bytes from 00:03:7f:05:02:35
IEEE 802.1X: version=1 type=3 length=119
ath0: STA 00:03:7f:05:02:35 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32): 76 59 fc 35 f7 8a 94 e4 34 db cd 56 43 ed 8f 15 a5 41 88
04 4e e1 10 20 6c 1c 5b 56 b6 b3 b9 b6
PTK - hexdump(len=64): 80 16 4e 86 69 5a 36 24 a4 af c7 ca 03 5d 4a 14 49 2f b0
b4 df 8c 7a fd e9 90 7e 1a 51 d5 0c 99 08 12 21 ce 1a 07 2e 1a fd 10 ec 17 e2 47
51 6f f5 03 01 7f bf b2 e4 18 22 33 77 3d 6a 60 e6 f2
PMK - hexdump(len=32): 66 37 0f 77 73 8e 31 92 f0 fb 9b 12 8f f2 f8 5e f2 7f 2d
ec 19 1b 41 a4 8d ba 2c 20 46 9a bf e6
PTK - hexdump(len=64): 0b 58 bc eb 56 e5 f1 aa d3 df e4 96 22 d3 2a 0c a1 a0 d3
01 0e 3c 37 25 c8 24 84 54 8c 44 c8 9c ca e3 ed 77 0f 25 91 90 e2 b0 e1 8d c2 d4
66 88 f5 c1 5a 00 d1 4d 13 54 fc 79 7d 4d 52 1d 31 63
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:03:7f:05:02:35 WPA: sending 3/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=137): 00 03 7f 05 02 35 00 03 7f 04 a1 52 88 8e 01 03 00
77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 77 1c 96 99 fa 54 ce 10 05 f8 5a 32 a6
c2 ff 35 66 fd 31 78 2d 8b 51 ea bd cc 44 8a e6 de ee b5 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 86
9b 6b ab 7d 61 83 7d 81 b2 36 26 39 68 da 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
04 01 00 00 50 f2 04 01 00 00 50 f2 02
IEEE 802.1X: 99 bytes from 00:03:7f:05:02:35
IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:03:7f:05:02:35 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:03:7f:05:02:35 key_idx=0
ath0: STA 00:03:7f:05:02:35 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:03:7f:05:02:35 authorized=1
madwifi_sta_clear_stats: addr=00:03:7f:05:02:35
ath0: STA 00:03:7f:05:02:35 WPA: pairwise key handshake completed (WPA)
WPA: 00:03:7f:05:02:35 WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:03:7f:05:02:35 WPA: sending 1/2 msg of Group Key Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=24): d1 04 fd 55 7c 9c a0 8a 4a b0 75
5b 77 12 79 5f 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=137): 00 03 7f 05 02 35 00 03 7f 04 a1 52 88 8e 01 03 00
77 fe 03 92 00 10 00 00 00 00 00 00 00 03 77 1c 96 99 fa 54 ce 10 05 f8 5a 32 a6
c2 ff 35 66 fd 31 78 2d 8b 51 ea bd cc 44 8a e6 de ee b4 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 a6
9e 48 7f 2b 88 08 86 4c 44 68 91 a1 41 22 00 18 cc da 0b 67 49 48 ff cc 11 4a 78
36 35 e2 d0 c9 96 e8 35 c5 0f f9 8a a2
IEEE 802.1X: 99 bytes from 00:03:7f:05:02:35
IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:03:7f:05:02:35 WPA: received EAPOL-Key frame (2/2 Group)
WPA: 00:03:7f:05:02:35 WPA_PTK_GROUP entering state REKEYESTABLISHED
ath0: STA 00:03:7f:05:02:35 WPA: group key handshake completed (WPA)
WPA: 00:03:7f:05:02:35 WPA_PTK_GROUP entering state IDLE
Signal 2 received - terminating
Removing station 00:03:7f:05:02:35
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
madwifi_set_privacy: enabled=0
madwifi_set_ieee8021x: enabled=0
Freeing RADIUS radius_client_deinit
madwifi_set_iface_flags: dev_up=0
bash-2.05a# ./hostapd-1105-1 hostapd-wpa-psk-ccmp.conf
Configuration file: hostapd-wpa-psk-ccmp.conf
madwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:03:7f:04:a1:52 and ssid 'suba'
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=3
madwifi_configure_wpa: pairwise key ciphers=0x8
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x3
madwifi_set_iface_flags: dev_up=1
madwifi_set_privacy: enabled=1
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): 94 44 d3 9c 21 68 74 13 8a b7 c8 ea 57 76 36 93 98 8a 8e
4a 80 55 8d ca 83 64 50 87 15 10 03 7b
GTK - hexdump(len=16): 65 62 c5 e9 14 ea d9 56 a2 77 69 5a 50 9e 37 22
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
l2_packet_receive - recv: Network is down
ath0: creating bss 00:03:7f:04:a1:52
Wireless event: cmd=0x8b19 len=12
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:03:7f:05:02:35 IEEE 802.11: associated
New STA
ath0: STA 00:03:7f:05:02:35 WPA: event 1 notification
madwifi_sta_clear_stats: addr=00:03:7f:05:02:35
ath0: STA 00:03:7f:05:02:35 WPA: start authentication
WPA: 00:03:7f:05:02:35 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:03:7f:05:02:35 key_idx=0
ath0: STA 00:03:7f:05:02:35 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:03:7f:05:02:35 authorized=0
WPA: 00:03:7f:05:02:35 WPA_PTK_GROUP entering state IDLE
WPA: 00:03:7f:05:02:35 WPA_PTK entering state AUTHENTICATION
WPA: 00:03:7f:05:02:35 WPA_PTK entering state AUTHENTICATION2
WPA: 00:03:7f:05:02:35 WPA_PTK entering state INITPSK
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKSTART
ath0: STA 00:03:7f:05:02:35 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 03 7f 05 02 35 00 03 7f 04 a1 52 88 8e 01 03 00
5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 69 1e 17 57 da 6f 72 16 75 99 8c 53 e3
ff 11 60 99 73 59 ec 52 cd 0e 2d be 77 bf 0b 05 63 7e db 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 123 bytes from 00:03:7f:05:02:35
IEEE 802.1X: version=1 type=3 length=119
ath0: STA 00:03:7f:05:02:35 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32): 76 59 fc 35 f7 8a 94 e4 34 db cd 56 43 ed 8f 15 a5 41 88
04 4e e1 10 20 6c 1c 5b 56 b6 b3 b9 b6
PTK - hexdump(len=64): 8a 4e 44 19 09 f4 d2 f1 61 37 6e 3b af 2b 1e d5 20 cc 9c
0e a4 39 b5 75 9d f5 46 60 f8 b5 7d 6d a9 3d 69 12 69 76 2b 1c e5 2e 02 39 62 94
a7 68 e3 45 17 ff bb 75 b0 bb 6b be 64 c1 12 1f 2a 09
PMK - hexdump(len=32): 66 37 0f 77 73 8e 31 92 f0 fb 9b 12 8f f2 f8 5e f2 7f 2d
ec 19 1b 41 a4 8d ba 2c 20 46 9a bf e6
PTK - hexdump(len=64): 68 f3 bf 77 a1 ff ee 19 d9 e7 a0 3f 65 f8 23 0c 44 53 14
21 5b e3 b4 d5 48 68 e8 ef 12 be 1a d3 25 01 0b 88 16 2e 7d d6 c0 3c 8e b7 d6 99
5c f9 fe 03 c9 5c ba 5a 22 98 b6 ba 66 66 e9 6e 28 0f
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:03:7f:05:02:35 WPA: sending 3/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=137): 00 03 7f 05 02 35 00 03 7f 04 a1 52 88 8e 01 03 00
77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 69 1e 17 57 da 6f 72 16 75 99 8c 53 e3
ff 11 60 99 73 59 ec 52 cd 0e 2d be 77 bf 0b 05 63 7e db 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 52
f1 13 c5 3d 4a 26 d2 4b de c4 3e 1f 77 c8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
04 01 00 00 50 f2 04 01 00 00 50 f2 02
IEEE 802.1X: 99 bytes from 00:03:7f:05:02:35
IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:03:7f:05:02:35 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:03:7f:05:02:35 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:03:7f:05:02:35 key_idx=0
ath0: STA 00:03:7f:05:02:35 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:03:7f:05:02:35 authorized=1
madwifi_sta_clear_stats: addr=00:03:7f:05:02:35
ath0: STA 00:03:7f:05:02:35 WPA: pairwise key handshake completed (WPA)
WPA: 00:03:7f:05:02:35 WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:03:7f:05:02:35 WPA: sending 1/2 msg of Group Key Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=24): 65 62 c5 e9 14 ea d9 56 a2 77 69
5a 50 9e 37 22 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=137): 00 03 7f 05 02 35 00 03 7f 04 a1 52 88 8e 01 03 00
77 fe 03 92 00 10 00 00 00 00 00 00 00 03 69 1e 17 57 da 6f 72 16 75 99 8c 53 e3
ff 11 60 99 73 59 ec 52 cd 0e 2d be 77 bf 0b 05 63 7e da 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 99
20 ac e8 f9 b7 5b a7 1a c7 6b 2d 25 72 ac 00 18 89 24 1e ff 77 2c 55 cc 2e ad 44
2b 82 c1 6c bd bb 0f 2e 8b 2f be 2a c6
IEEE 802.1X: 99 bytes from 00:03:7f:05:02:35
IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:03:7f:05:02:35 WPA: received EAPOL-Key frame (2/2 Group)
WPA: 00:03:7f:05:02:35 WPA_PTK_GROUP entering state REKEYESTABLISHED
ath0: STA 00:03:7f:05:02:35 WPA: group key handshake completed (WPA)
WPA: 00:03:7f:05:02:35 WPA_PTK_GROUP entering state IDLE
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0f:3d:e9:a6:56 IEEE 802.11: associated
New STA
ath0: STA 00:0f:3d:e9:a6:56 WPA: event 1 notification
madwifi_sta_clear_stats: addr=00:0f:3d:e9:a6:56
ath0: STA 00:0f:3d:e9:a6:56 WPA: start authentication
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:3d:e9:a6:56 key_idx=0
ath0: STA 00:0f:3d:e9:a6:56 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:3d:e9:a6:56 authorized=0
WPA: 00:0f:3d:e9:a6:56 WPA_PTK_GROUP entering state IDLE
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state AUTHENTICATION
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state AUTHENTICATION2
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state INITPSK
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:3d:e9:a6:56 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 0f 3d e9 a6 56 00 03 7f 04 a1 52 88 8e 01 03 00
5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 69 1e 17 57 da 6f 72 16 75 99 8c 53 e3
ff 11 60 99 73 59 ec 52 cd 0e 2d be 77 bf 0b 05 63 7e dc 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 123 bytes from 00:0f:3d:e9:a6:56
IEEE 802.1X: version=1 type=3 length=119
ath0: STA 00:0f:3d:e9:a6:56 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32): 66 37 0f 77 73 8e 31 92 f0 fb 9b 12 8f f2 f8 5e f2 7f 2d
ec 19 1b 41 a4 8d ba 2c 20 46 9a bf e6
PTK - hexdump(len=64): 92 b3 71 dd 90 8d ab 65 0e ce 64 cd 76 15 8f ab 3a 64 aa
bd af 8c 64 6e fb 1f c5 a1 1c dd 80 a9 e5 22 dc 29 f5 08 82 23 d1 ea 55 1f f3 4c
f7 dc c3 31 67 9d d0 74 e1 a2 f7 74 c8 ff 3d 04 d2 26
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:0f:3d:e9:a6:56 WPA: sending 3/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=137): 00 0f 3d e9 a6 56 00 03 7f 04 a1 52 88 8e 01 03 00
77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 69 1e 17 57 da 6f 72 16 75 99 8c 53 e3
ff 11 60 99 73 59 ec 52 cd 0e 2d be 77 bf 0b 05 63 7e dc 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8d 63
cb c7 3a 81 a4 4c ae 10 6b 8c 65 9d c7 2a 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
04 01 00 00 50 f2 04 01 00 00 50 f2 02
IEEE 802.1X: 99 bytes from 00:0f:3d:e9:a6:56
IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:0f:3d:e9:a6:56 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:0f:3d:e9:a6:56 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:0f:3d:e9:a6:56 key_idx=0
ath0: STA 00:0f:3d:e9:a6:56 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:0f:3d:e9:a6:56 authorized=1
madwifi_sta_clear_stats: addr=00:0f:3d:e9:a6:56
ath0: STA 00:0f:3d:e9:a6:56 WPA: pairwise key handshake completed (WPA)
WPA: 00:0f:3d:e9:a6:56 WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:0f:3d:e9:a6:56 WPA: sending 1/2 msg of Group Key Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=24): 65 62 c5 e9 14 ea d9 56 a2 77 69
5a 50 9e 37 22 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=137): 00 0f 3d e9 a6 56 00 03 7f 04 a1 52 88 8e 01 03 00
77 fe 03 92 00 10 00 00 00 00 00 00 00 03 69 1e 17 57 da 6f 72 16 75 99 8c 53 e3
ff 11 60 99 73 59 ec 52 cd 0e 2d be 77 bf 0b 05 63 7e da 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 30 e7
d4 12 e0 10 a8 c5 da 29 f5 f5 00 94 15 f2 00 18 28 78 1c 74 2e b2 69 87 15 ae ac
f1 a0 a9 d3 d5 35 42 ed 6d 3b ef a0 97
IEEE 802.1X: 99 bytes from 00:0f:3d:e9:a6:56
IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:0f:3d:e9:a6:56 WPA: received EAPOL-Key frame (2/2 Group)
WPA: 00:0f:3d:e9:a6:56 WPA_PTK_GROUP entering state REKEYESTABLISHED
ath0: STA 00:0f:3d:e9:a6:56 WPA: group key handshake completed (WPA)
WPA: 00:0f:3d:e9:a6:56 WPA_PTK_GROUP entering state IDLE
Signal 2 received - terminating
Removing station 00:0f:3d:e9:a6:56
Removing station 00:03:7f:05!!!abort_handler addr = 0xc177503a, isr = 0x2, statu
s = 0x22a0
:02:35
Flushing old station entries
madwifi_sta_deauth: addr=fUnable to handle kernel NULL pointer dereference at vi
rtual address 0000003d
f:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
madpgd = c1ea4000
wifi_set_privacy: enabled=0
madwifi_set_ieee8021x: enabled=0
*pgd = 01f9d801, *pmd = 01f9d801, *pte = 00000000, *ppte = 00000000
Internal error: Oops: 0
CPU: 0
pc : [<c0040954>] lr : [<c00402c4>] Tainted: P
sp : c1dddd50 ip : 00000001 fp : c1dddd74
r10: 00000000 r9 : 20000013 r8 : 00000001
r7 : c1ddddac r6 : ff00c020 r5 : c177503a r4 : 00000002
r3 : ff00c014 r2 : 60000013 r1 : 22a00000 r0 : 00000000
Flags: nzcv IRQs on FIQs on Mode SVC_32 Segment user
Control: 39FF Table: 01EA4000 DAC: 00000015
Process hostapd-1105-1 (pid: 164, stackpage=c1ddd000)
Stack: (0xc1dddd40 to 0xc1dde000)
dd40: c00402c4 c0040954 00000013 ffffffff c00522a0 00000416 c1dddde0 c014fbc8
dd60: c177503a c1ddddac c1dddd84 c1dddd78 c003e29c c00408f8 c1dddda8 c1dddd88
dd80: c003e2e4 c003e274 ffffffff c1dddde0 c18b4000 00000000 c18b4000 c1ddde18
dda0: c1ddddac c00382a0 c003e2bc c18b4000 00009930 c18b4000 c3a56000 c18b567c
ddc0: c18b4000 c18b4000 00000000 c18b4000 c18b4000 00000000 c1ddde18 c1ddde1c
dde0: c1ddddf4 c3a35500 c3a20294 20000013 ffffffff c1ddde00 00000e52 c18b4000
de00: c18bae50 00000000 c18b4000 c1ddde70 c1ddde1c c3a32dc8 c3a354c8 c1ddde3c
de20: c1ddde2c 00000000 00000000 02000000 00000000 c18b4214 00000000 00000000
de40: 00000006 c1ddde70 00000e52 c18ba000 c18ba358 c18ba000 c18b4000 00000000
de60: c18ba140 c1dddea4 c1ddde74 c3a4a38c c3a32c44 c1ddde78 783a2065 00000003
de80: 00000004 c18ba358 c18c888c c1dddef4 c1ddc000 00000066 c1dddeec c1dddea8
dea0: c3a17118 c3a4a2c0 c3a105b0 c3a105b8 00000000 40017000 a0000013 00000000
dec0: c00c0528 40017021 00000000 00000000 c1dddf24 c3a19f28 c1dddef4 c18ba000
dee0: c1dddf20 c1dddef0 c00ed4e8 c3a16ff0 c3a50b48 8be00000 00000000 bffffdc8
df00: bffffdc8 00008be0 00000000 c1ddc000 c1dddf24 c1dddf68 c1dddf24 c00e716c
df20: c00ed238 61746830 00000000 00000000 00000000 00000003 00000004 00000000
df40: 00000000 00008be0 c0034b20 bffffdc8 00000003 ffffffe7 00000000 c1dddf78
df60: c1dddf6c c00de990 c00e6d6c c1dddfa4 c1dddf7c c00752b4 c00de974 0000004e
df80: 00000021 00000000 0004e508 00000003 00000036 c00387c4 00000000 c1dddfa8
dfa0: c0038620 c0075200 00000000 c003ddb0 00000003 00008be0 bffffdc8 00000000
dfc0: 00000000 0004e508 00000003 00000004 00000000 0004d734 00000000 00000000
dfe0: 0004dab4 bffffdc8 0002a97c 401d7594 60000010 00000003 00000000 00000000
Backtrace:
Function entered at [<c00408ec>] from [<c003e29c>]
r8 = C1DDDDAC r7 = C177503A r6 = C014FBC8 r5 = C1DDDDE0
r4 = 00000416
Function entered at [<c003e268>] from [<c003e2e4>]
Function entered at [<c003e2b0>] from [<c00382a0>]
r8 = C18B4000 r7 = 00000000 r6 = C18B4000 r5 = C1DDDDE0
r4 = FFFFFFFF
Function entered at [<c3a354bc>] from [<c3a32dc8>]
r8 = C18B4000 r7 = 00000000 r6 = C18BAE50 r5 = C18B4000
r4 = 00000E52
Function entered at [<c3a32c38>] from [<c3a4a38c>]
Function entered at [<c3a4a2b4>] from [<c3a17118>]
Function entered at [<c3a16fe4>] from [<c00ed4e8>]
Function entered at [<c00ed22c>] from [<c00e716c>]
Function entered at [<c00e6d60>] from [<c00de990>]
Function entered at [<c00de968>] from [<c00752b4>]
Function entered at [<c00751f4>] from [<c0038620>]
r8 = C00387C4 r7 = 00000036 r6 = 00000003 r5 = 0004E508
r4 = 00000000
Code: e1a01003 e14b32b2 ebfffe48 e3170b01 (1598303c)
Segmentation fault
bash-2.05a# cd /proc/
More information about the Hostap
mailing list