EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=17): 6c 6f 67 69 6e 40 66 72 65 73 68 74 65 6c 2e 72 login@freshtel.r 75 u EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS) EAP-TTLS: Phase2 type: MSCHAPV2 CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-TTLS: Start (server ver=0, own ver=0) TLS: using phase1 config options TLS: Include TLS Message Length in unfragmented packets EAP-TTLS: Start SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 210 bytes pending from ssl_out SSL: 210 bytes left to be sent out (of total 210 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=522) - Flags 0xc0 SSL: TLS Message Length: 3206 SSL: Need 2694 bytes more input data SSL: Building ACK (type=21 id=3 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 2182 bytes more input data SSL: Building ACK (type=21 id=4 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=5 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 1670 bytes more input data SSL: Building ACK (type=21 id=5 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=6 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 1158 bytes more input data SSL: Building ACK (type=21 id=6 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=7 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 646 bytes more input data SSL: Building ACK (type=21 id=7 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=8 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 134 bytes more input data SSL: Building ACK (type=21 id=8 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=9 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=140) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=US/O=Intel Corporation/CN=Intel WiMAX Server Sub CA' CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Intel Corporation/CN=Intel WiMAX Server Sub CA' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='/O=INTERPROJECT Ltd/OU=000032/CN=aaamsk.fresh-tel.ru' CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/O=INTERPROJECT Ltd/OU=000032/CN=aaamsk.fresh-tel.ru' SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server certificate A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server done A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write change cipher spec A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write finished A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 flush data SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read finished A SSL: SSL_connect - want more data SSL: 134 bytes pending from ssl_out SSL: 134 bytes left to be sent out (of total 134 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=10 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=69) - Flags 0x80 SSL: TLS Message Length: 59 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read finished A SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out SSL: No Application Data included SSL: No data to be sent out EAP-TTLS: TLS done, proceed to Phase 2 EAP-TTLS: Derived key - hexdump(len=64): [REMOVED] EAP-TTLS: received 0 bytes encrypted data for Phase 2 EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity EAP-TTLS: Phase 2 MSCHAPV2 Request MSCHAPV2: Identity - hexdump_ascii(len=9): 77 6d 31 30 30 32 33 37 31 wm1002371 MSCHAPV2: Username - hexdump_ascii(len=9): 77 6d 31 30 30 32 33 37 31 wm1002371 MSCHAPV2: auth_challenge - hexdump(len=16): 91 18 7d 52 84 e5 44 d6 24 eb 89 41 cb 3f 65 5f MSCHAPV2: peer_challenge - hexdump(len=16): 00 00 00 11 00 00 00 10 9c a4 08 00 00 00 00 00 MSCHAPV2: username - hexdump_ascii(len=9): 77 6d 31 30 30 32 33 37 31 wm1002371 MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] MSCHAPV2: NT Response - hexdump(len=24): 3e a9 43 f5 a6 75 71 44 3e cc aa 21 07 30 22 fb 54 cf 34 af 21 75 cd 91 MSCHAPV2: Auth Response - hexdump(len=20): 75 b8 60 c0 eb ec a0 fc 66 f6 85 7a 1c 18 ee 53 86 cc 53 f5 MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] EAP-TTLS: Encrypting Phase 2 data - hexdump(len=112): [REMOVED] SSL: 186 bytes left to be sent out (of total 186 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Failure EAP: EAP entering state FAILURE CTRL-EVENT-EAP-FAILURE EAP authentication failed EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=17): 6c 6f 67 69 6e 40 66 72 65 73 68 74 65 6c 2e 72 login@freshtel.r 75 u EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS) EAP-TTLS: Phase2 type: MSCHAPV2 CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-TTLS: Start (server ver=0, own ver=0) TLS: using phase1 config options TLS: Include TLS Message Length in unfragmented packets EAP-TTLS: Start SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 210 bytes pending from ssl_out SSL: 210 bytes left to be sent out (of total 210 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=522) - Flags 0xc0 SSL: TLS Message Length: 3206 SSL: Need 2694 bytes more input data SSL: Building ACK (type=21 id=3 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 2182 bytes more input data SSL: Building ACK (type=21 id=4 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=5 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 1670 bytes more input data SSL: Building ACK (type=21 id=5 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=6 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 1158 bytes more input data SSL: Building ACK (type=21 id=6 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=7 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 646 bytes more input data SSL: Building ACK (type=21 id=7 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=8 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 134 bytes more input data SSL: Building ACK (type=21 id=8 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=9 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=140) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=US/O=Intel Corporation/CN=Intel WiMAX Server Sub CA' CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Intel Corporation/CN=Intel WiMAX Server Sub CA' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='/O=INTERPROJECT Ltd/OU=000032/CN=aaamsk.fresh-tel.ru' CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/O=INTERPROJECT Ltd/OU=000032/CN=aaamsk.fresh-tel.ru' SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server certificate A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server done A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write change cipher spec A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write finished A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 flush data SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read finished A SSL: SSL_connect - want more data SSL: 134 bytes pending from ssl_out SSL: 134 bytes left to be sent out (of total 134 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=10 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=69) - Flags 0x80 SSL: TLS Message Length: 59 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read finished A SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out SSL: No Application Data included SSL: No data to be sent out EAP-TTLS: TLS done, proceed to Phase 2 EAP-TTLS: Derived key - hexdump(len=64): [REMOVED] EAP-TTLS: received 0 bytes encrypted data for Phase 2 EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity EAP-TTLS: Phase 2 MSCHAPV2 Request MSCHAPV2: Identity - hexdump_ascii(len=9): 77 6d 31 30 30 32 33 37 31 wm1002371 MSCHAPV2: Username - hexdump_ascii(len=9): 77 6d 31 30 30 32 33 37 31 wm1002371 MSCHAPV2: auth_challenge - hexdump(len=16): b0 46 bd dc 2d 8f 6a 15 f5 24 61 8a af 40 91 03 MSCHAPV2: peer_challenge - hexdump(len=16): 00 00 00 51 00 00 00 00 08 00 00 a8 af a4 08 40 MSCHAPV2: username - hexdump_ascii(len=9): 77 6d 31 30 30 32 33 37 31 wm1002371 MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] MSCHAPV2: NT Response - hexdump(len=24): 22 d5 dd e6 2d f1 18 d5 01 9e 7b 80 11 45 01 22 de 8d 07 34 75 cf 79 44 MSCHAPV2: Auth Response - hexdump(len=20): bb 2b c5 e8 9e ce e7 94 96 36 b3 0f 8b ce 66 d1 75 fc a1 4c MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] EAP-TTLS: Encrypting Phase 2 data - hexdump(len=112): [REMOVED] SSL: 186 bytes left to be sent out (of total 186 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Failure EAP: EAP entering state FAILURE CTRL-EVENT-EAP-FAILURE EAP authentication failed EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=17): 6c 6f 67 69 6e 40 66 72 65 73 68 74 65 6c 2e 72 login@freshtel.r 75 u EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS) EAP-TTLS: Phase2 type: MSCHAPV2 CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-TTLS: Start (server ver=0, own ver=0) TLS: using phase1 config options TLS: Include TLS Message Length in unfragmented packets EAP-TTLS: Start SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 210 bytes pending from ssl_out SSL: 210 bytes left to be sent out (of total 210 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit *** glibc detected *** /opt/wimax/wimax: corrupted double-linked list: 0x08a29088 *** ======= Backtrace: ========= /lib/libc.so.6(+0x6b661)[0xb759e661] /lib/libc.so.6(+0x6bac6)[0xb759eac6] /lib/libc.so.6(+0x6d615)[0xb75a0615] /lib/libc.so.6(__libc_calloc+0xb2)[0xb75a3c22] /usr/lib/libeap.so.0(os_zalloc+0x25)[0xb7691d85] /usr/lib/libeap.so.0(wpabuf_alloc+0x25)[0xb7692985] /usr/lib/libeap.so.0(wpabuf_alloc_copy+0x25)[0xb7692c45] /opt/wimax/wimax[0x804ca5f] /opt/wimax/wimax[0x804b2ea] /opt/wimax/wimax[0x80497a4] /usr/lib/libusb-1.0.so.0(+0x4a7e)[0xb7683a7e] /usr/lib/libusb-1.0.so.0(+0x9368)[0xb7688368] /usr/lib/libusb-1.0.so.0(+0x4873)[0xb7683873] /usr/lib/libusb-1.0.so.0(libusb_handle_events_timeout+0x69)[0xb76842f9] /opt/wimax/wimax[0x8049d9a] /opt/wimax/wimax[0x8049f9d] /opt/wimax/wimax[0x804ac9b] /lib/libc.so.6(__libc_start_main+0xe6)[0xb7549db6] /opt/wimax/wimax[0x8049681] ======= Memory map: ======== 08048000-0804e000 r-xp 00000000 08:12 3360 /opt/wimax/wimax 0804e000-0804f000 rw-p 00006000 08:12 3360 /opt/wimax/wimax 0804f000-08053000 rw-p 00000000 00:00 0 08a27000-08a69000 rw-p 00000000 00:00 0 [heap] b71b6000-b71d1000 r-xp 00000000 08:12 27208 /usr/lib/libgcc_s.so.1 b71d1000-b71d2000 rw-p 0001a000 08:12 27208 /usr/lib/libgcc_s.so.1 b7200000-b7221000 rw-p 00000000 00:00 0 b7221000-b7300000 ---p 00000000 00:00 0 b7329000-b732b000 rw-p 00000000 00:00 0 b732b000-b733f000 r-xp 00000000 08:12 18417 /usr/lib/libz.so.1.2.5 b733f000-b7340000 rw-p 00013000 08:12 18417 /usr/lib/libz.so.1.2.5 b7340000-b7342000 r-xp 00000000 08:12 239 /lib/libdl-2.13.so b7342000-b7343000 r--p 00001000 08:12 239 /lib/libdl-2.13.so b7343000-b7344000 rw-p 00002000 08:12 239 /lib/libdl-2.13.so b7344000-b7359000 r-xp 00000000 08:12 256 /lib/libpthread-2.13.so b7359000-b735a000 ---p 00015000 08:12 256 /lib/libpthread-2.13.so b735a000-b735b000 r--p 00015000 08:12 256 /lib/libpthread-2.13.so b735b000-b735c000 rw-p 00016000 08:12 256 /lib/libpthread-2.13.so b735c000-b735e000 rw-p 00000000 00:00 0 b735e000-b7365000 r-xp 00000000 08:12 322 /lib/librt-2.13.so b7365000-b7366000 r--p 00006000 08:12 322 /lib/librt-2.13.so b7366000-b7367000 rw-p 00007000 08:12 322 /lib/librt-2.13.so b7367000-b74ca000 r-xp 00000000 08:12 12603 /usr/lib/libcrypto.so.1.0.0 b74ca000-b74de000 rw-p 00162000 08:12 12603 /usr/lib/libcrypto.so.1.0.0 b74de000-b74e2000 rw-p 00000000 00:00 0 b74e2000-b752f000 r-xp 00000000 08:12 13099 /usr/lib/libssl.so.1.0.0 b752f000-b7533000 rw-p 0004d000 08:12 13099 /usr/lib/libssl.so.1.0.0 b7533000-b7678000 r-xp 00000000 08:12 258 /lib/libc-2.13.so b7678000-b7679000 ---p 00145000 08:12 258 /lib/libc-2.13.so b7679000-b767b000 r--p 00145000 08:12 258 /lib/libc-2.13.so b767b000-b767c000 rw-p 00147000 08:12 258 /lib/libc-2.13.so b767c000-b767f000 rw-p 00000000 00:00 0 b767f000-b768a000 r-xp 00000000 08:12 1399 /usr/lib/libusb-1.0.so.0.0.0 b768a000-b768b000 rw-p 0000a000 08:12 1399 /usr/lib/libusb-1.0.so.0.0.0 b768b000-b76b4000 r-xp 00000000 08:12 3225 /usr/lib/libeap.so.0.0.0 b76b4000-b76b5000 rw-p 00028000 08:12 3225 /usr/lib/libeap.so.0.0.0 b76e1000-b76e4000 rw-p 00000000 00:00 0 b76e4000-b76e5000 r-xp 00000000 00:00 0 [vdso] b76e5000-b7701000 r-xp 00000000 08:12 277 /lib/ld-2.13.so b7701000-b7702000 r--p 0001b000 08:12 277 /lib/ld-2.13.so b7702000-b7703000 rw-p 0001c000 08:12 277 /lib/ld-2.13.so bfed6000-bfef7000 rw-p 00000000 00:00 0 [stack] ./wimax-start.sh: line 4: 8114 Аварийный останов $WIMAX_ROOT/wimax -vv --login=%skipped% --pass=%skipped% --nai=login@freshtel.ru --event-script=$WIMAX_ROOT/event.sh --log-file=$WIMAX_ROOT/wimax.log