2019-04-20 20:04:43 export USER=root 2019-04-20 20:04:43 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2019-04-20 20:06:54 ./start.sh 2019-04-20 20:06:55 ./run-tests.py scan_hidden_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_hidden_many 1/1 Test: scan_ssid=1 with large number of profile with hidden SSID Starting AP wlan3 PASS scan_hidden_many 1.913848 2019-04-20 20:06:59.376898 passed all 1 test case(s) 2019-04-20 20:06:59 ./run-tests.py scan_ies DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_ies 1/1 Test: Scan and both Beacon and Probe Response frame IEs Starting AP wlan3 ie: [0, 1, 50, 3, 127, 221, 42, 59, 45, 61] beacon_ie: [0, 1, 50, 3, 127, 221, 42, 59, 45, 61] PASS scan_ies 0.538189 2019-04-20 20:07:00.336754 passed all 1 test case(s) 2019-04-20 20:07:00 ./run-tests.py scan_int DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_int 1/1 Test: scan interval configuration Connect STA wlan0 to AP Waiting for scan to start Waiting for scan to complete Waiting for scan to start Waiting for scan to complete Waiting for scan to start Waiting for scan to complete times={0: 0.009999999776482582, 1: 1.0099999997764826, 2: 1.0100000007078052} PASS scan_int 2.239995 2019-04-20 20:07:02.934408 passed all 1 test case(s) 2019-04-20 20:07:03 ./run-tests.py scan_mbssid_hidden_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_mbssid_hidden_ssid 1/1 Test: Non-transmitting BSS has hidden SSID bssid: 02:00:00:00:03:00 Starting AP wlan3 AP 02:00:00:00:03:00: {'level': '-30', 'flags': '[ESS]', 'bssid': '02:00:00:00:03:00', 'est_throughput': '65000', 'ssid': 'transmitted', 'snr': '59', 'update_idx': '14', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f004718020009530201000000550101000a53020200000132550102', 'beacon_int': '100', 'age': '0', 'id': '4', 'noise': '-89', 'freq': '2412', 'capabilities': '0x0401', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f004718020009530201000000550101000a53020200000132550102', 'qual': '0', 'tsf': '1555762023526641'} AP 02:00:00:00:03:01: {'level': '-30', 'flags': '[ESS]', 'bssid': '02:00:00:00:03:01', 'est_throughput': '65000', 'ssid': '', 'snr': '59', 'update_idx': '14', 'ie': '0000010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'beacon_int': '100', 'age': '0', 'id': '5', 'noise': '-89', 'freq': '2412', 'capabilities': '0x0001', 'beacon_ie': '0000010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'qual': '0', 'tsf': '1555762023526641'} AP 02:00:00:00:03:02: {'level': '-30', 'flags': '[IBSS]', 'bssid': '02:00:00:00:03:02', 'est_throughput': '65000', 'ssid': '2', 'snr': '59', 'update_idx': '14', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'beacon_int': '100', 'age': '0', 'id': '6', 'noise': '-89', 'freq': '2412', 'capabilities': '0x0002', 'beacon_ie': '000132010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'qual': '0', 'tsf': '1555762023526641'} PASS scan_mbssid_hidden_ssid 0.381351 2019-04-20 20:07:03.622408 passed all 1 test case(s) 2019-04-20 20:07:03 ./run-tests.py scan_multi_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid 1/1 Test: Scan and Multiple BSSID element Starting AP wlan3 Starting AP wlan4 AP 02:00:00:00:03:00: {'freq': '2412', 'bssid': '02:00:00:00:03:00', 'qual': '0', 'flags': '[ESS]', 'level': '-30', 'age': '0', 'capabilities': '0x0401', 'tsf': '1555762024346113', 'noise': '-89', 'beacon_ie': '0009746573742d7363616e010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470100', 'beacon_int': '100', 'update_idx': '17', 'est_throughput': '65000', 'ssid': 'test-scan', 'ie': '0009746573742d7363616e010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470100', 'id': '7', 'snr': '59'} AP 02:00:00:00:04:00: {'freq': '2412', 'bssid': '02:00:00:00:04:00', 'qual': '0', 'flags': '[ESS]', 'level': '-30', 'age': '0', 'capabilities': '0x0401', 'tsf': '1555762024346125', 'noise': '-89', 'beacon_ie': '0009746573742d7363616e010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470d01000a53020104000131550101', 'beacon_int': '100', 'update_idx': '17', 'est_throughput': '65000', 'ssid': 'test-scan', 'ie': '0009746573742d7363616e010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470d01000a53020104000131550101', 'id': '8', 'snr': '59'} AP 02:00:00:00:04:01: {'freq': '2412', 'bssid': '02:00:00:00:04:01', 'qual': '0', 'flags': '[ESS]', 'level': '-30', 'age': '0', 'capabilities': '0x0401', 'tsf': '1555762024346125', 'noise': '-89', 'beacon_ie': '000131010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'beacon_int': '100', 'update_idx': '17', 'est_throughput': '65000', 'ssid': '1', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'id': '9', 'snr': '59'} PASS scan_multi_bssid 0.54546 2019-04-20 20:07:04.508115 passed all 1 test case(s) 2019-04-20 20:07:04 ./run-tests.py scan_multi_bssid_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_2 1/1 Test: Scan and Multiple BSSID element (2) Starting AP wlan3 AP 02:00:00:00:03:00: {'snr': '59', 'beacon_int': '100', 'noise': '-89', 'flags': '[ESS]', 'level': '-30', 'capabilities': '0x0401', 'freq': '2412', 'qual': '0', 'ssid': 'transmitted', 'id': '10', 'est_throughput': '65000', 'age': '0', 'tsf': '1555762025133651', 'update_idx': '20', 'bssid': '02:00:00:00:03:00', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00474b04001453020100000b7472616e736d6974746564550100001753020100000e6e6f6e7472616e736d697474656455010100195302010000106e6f6e7472616e736d69747465645f32550102'} AP 02:00:00:00:03:01: {'snr': '59', 'beacon_int': '100', 'noise': '-89', 'flags': '[ESS]', 'level': '-30', 'capabilities': '0x0001', 'freq': '2412', 'qual': '0', 'ssid': 'nontransmitted', 'id': '11', 'est_throughput': '65000', 'age': '0', 'tsf': '1555762025133651', 'update_idx': '20', 'bssid': '02:00:00:00:03:01', 'ie': '000e6e6f6e7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101'} AP 02:00:00:00:03:02: {'snr': '59', 'beacon_int': '100', 'noise': '-89', 'flags': '[ESS]', 'level': '-30', 'capabilities': '0x0001', 'freq': '2412', 'qual': '0', 'ssid': 'nontransmitted_2', 'id': '12', 'est_throughput': '65000', 'age': '0', 'tsf': '1555762025133651', 'update_idx': '20', 'bssid': '02:00:00:00:03:02', 'ie': '00106e6f6e7472616e736d69747465645f32010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102'} PASS scan_multi_bssid_2 0.421625 2019-04-20 20:07:05.266282 passed all 1 test case(s) 2019-04-20 20:07:05 ./run-tests.py scan_multi_bssid_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_3 1/1 Test: Scan and Multiple BSSID element (3) Starting AP wlan3 AP 02:00:00:00:03:00: {'level': '-30', 'freq': '2412', 'noise': '-89', 'qual': '0', 'beacon_int': '100', 'tsf': '1555762025881801', 'est_throughput': '65000', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00473302001753020100000e6e6f6e7472616e736d6974746564550101001753020100000e6e6f6e7472616e736d6974746564550101', 'flags': '[ESS]', 'age': '0', 'capabilities': '0x0401', 'snr': '59', 'update_idx': '23', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00473302001753020100000e6e6f6e7472616e736d6974746564550101001753020100000e6e6f6e7472616e736d6974746564550101', 'bssid': '02:00:00:00:03:00', 'ssid': 'transmitted', 'id': '13'} AP 02:00:00:00:03:01: {'level': '-30', 'freq': '2412', 'noise': '-89', 'qual': '0', 'beacon_int': '100', 'tsf': '1555762025881801', 'est_throughput': '65000', 'ie': '000e6e6f6e7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'flags': '[ESS]', 'age': '0', 'capabilities': '0x0001', 'snr': '59', 'update_idx': '23', 'beacon_ie': '000e6e6f6e7472616e736d6974746564010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'bssid': '02:00:00:00:03:01', 'ssid': 'nontransmitted', 'id': '14'} PASS scan_multi_bssid_3 0.404124 2019-04-20 20:07:06.008876 passed all 1 test case(s) 2019-04-20 20:07:06 ./run-tests.py scan_multi_bssid_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_4 1/1 Test: Scan and Multiple BSSID element (3) Starting AP wlan3 AP 02:00:00:00:03:01: {'est_throughput': '65000', 'flags': '[ESS]', 'update_idx': '26', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103', 'ssid': 'transmitted', 'bssid': '02:00:00:00:03:01', 'freq': '2412', 'beacon_int': '100', 'noise': '-89', 'level': '-30', 'qual': '0', 'age': '0', 'capabilities': '0x0401', 'id': '15', 'snr': '59', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103', 'tsf': '1555762026647920'} AP 02:00:00:00:03:02: {'est_throughput': '65000', 'flags': '[ESS]', 'update_idx': '26', 'beacon_ie': '000131010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'ssid': '1', 'bssid': '02:00:00:00:03:02', 'freq': '2412', 'beacon_int': '100', 'noise': '-89', 'level': '-30', 'qual': '0', 'age': '0', 'capabilities': '0x0001', 'id': '16', 'snr': '59', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'tsf': '1555762026647920'} AP 02:00:00:00:03:03: {'est_throughput': '65000', 'flags': '[ESS]', 'update_idx': '26', 'beacon_ie': '000132010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'ssid': '2', 'bssid': '02:00:00:00:03:03', 'freq': '2412', 'beacon_int': '100', 'noise': '-89', 'level': '-30', 'qual': '0', 'age': '0', 'capabilities': '0x0001', 'id': '17', 'snr': '59', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'tsf': '1555762026647920'} AP 02:00:00:00:03:00: {'est_throughput': '65000', 'flags': '[ESS]', 'update_idx': '26', 'beacon_ie': '000133010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550103', 'ssid': '3', 'bssid': '02:00:00:00:03:00', 'freq': '2412', 'beacon_int': '100', 'noise': '-89', 'level': '-30', 'qual': '0', 'age': '0', 'capabilities': '0x0001', 'id': '18', 'snr': '59', 'ie': '000133010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550103', 'tsf': '1555762026647920'} PASS scan_multi_bssid_4 0.547417 2019-04-20 20:07:06.931180 passed all 1 test case(s) 2019-04-20 20:07:06 ./run-tests.py scan_multi_bssid_check_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_check_ie 1/1 Test: Scan and check if nontransmitting BSS inherits IE from transmitting BSS Starting AP wlan3 trans_bss beacon_ie: [0, 1, 3, 5, 71, 42, 45, 61, 50, 59, 221, 127] nontrans_bss1 beacon_ie: [0, 1, 3, 5, 42, 45, 61, 50, 85, 59, 221, 127] check IE failed Traceback (most recent call last): File "./run-tests.py", line 504, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_scan.py", line 1704, in test_scan_multi_bssid_check_ie raise Exception("check IE failed") Exception: check IE failed FAIL scan_multi_bssid_check_ie 0.529016 2019-04-20 20:07:07.780295 passed 0 test case(s) skipped 0 test case(s) failed tests: scan_multi_bssid_check_ie 2019-04-20 20:07:07 ./run-tests.py scan_multi_bssid_fms DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_fms 1/1 Test: Non-transmitting BSS has different FMS IE from transmitting BSS Starting AP wlan3 trans_bss fms ie: 013901 nontrans_bss fms ie: 0229320102 PASS scan_multi_bssid_fms 0.506388 2019-04-20 20:07:08.610808 passed all 1 test case(s) 2019-04-20 20:07:08 ./run-tests.py scan_multiple_mbssid_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multiple_mbssid_ie 1/1 Test: Transmitting BSS has 2 MBSSID IE bssid: 02:00:00:00:03:00 Starting AP wlan3 AP 02:00:00:00:03:00: {'est_throughput': '65000', 'age': '0', 'ssid': 'transmitted', 'capabilities': '0x0401', 'bssid': '02:00:00:00:03:00', 'level': '-30', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470d02000a53020100000131550101470d02000a53020200000132550102', 'qual': '0', 'tsf': '1555762029172054', 'update_idx': '35', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'noise': '-89', 'id': '23', 'snr': '59'} AP 02:00:00:00:03:01: {'est_throughput': '65000', 'age': '0', 'ssid': '1', 'capabilities': '0x0001', 'bssid': '02:00:00:00:03:01', 'level': '-30', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'qual': '0', 'tsf': '1555762029172054', 'update_idx': '35', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'noise': '-89', 'id': '24', 'snr': '59'} AP 02:00:00:00:03:02: {'est_throughput': '65000', 'age': '0', 'ssid': '2', 'capabilities': '0x0002', 'bssid': '02:00:00:00:03:02', 'level': '-30', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'qual': '0', 'tsf': '1555762029172054', 'update_idx': '35', 'beacon_int': '100', 'flags': '[IBSS]', 'freq': '2412', 'noise': '-89', 'id': '25', 'snr': '59'} PASS scan_multiple_mbssid_ie 0.391324 2019-04-20 20:07:09.336954 passed all 1 test case(s) 2019-04-20 20:07:09 ./run-tests.py scan_new_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_new_only 1/1 Test: Scan and only_new=1 multiple times Starting AP wlan3 PASS scan_new_only 1.127008 2019-04-20 20:07:10.746479 passed all 1 test case(s) 2019-04-20 20:07:10 ./run-tests.py scan_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_only 1/1 Test: Control interface behavior on scan parameters with type=only Starting AP wlan3 Full scan Limited channel scan Passive single-channel scan Active single-channel scan Unexpectedly updated BSS entry Traceback (most recent call last): File "./run-tests.py", line 504, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_scan.py", line 139, in test_scan_only raise Exception("Unexpectedly updated BSS entry") Exception: Unexpectedly updated BSS entry FAIL scan_only 7.481363 2019-04-20 20:07:18.551061 passed 0 test case(s) skipped 0 test case(s) failed tests: scan_only 2019-04-20 20:07:18 ./run-tests.py scan_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_parsing 1/1 Test: Scan result parsing SCAN_RESULTS: bssid / frequency / signal level / flags / ssid 02:ff:00:00:00:02 1234 10 [WEP] test 02:ff:00:00:00:03 0 0 02:ff:00:00:00:04 0 0 02:ff:00:00:00:05 58320 0 [DMG] dmg 02:ff:00:00:00:06 60480 0 [DMG][IBSS] dmg 02:ff:00:00:00:07 62640 0 [DMG][PBSS] dmg 02:ff:00:00:00:08 64800 0 [DMG][ESS] dmg 02:ff:00:00:00:09 2412 1 [WEP][ESS] upd 02:ff:00:00:00:00 0 0 BSS output: id=28 bssid=02:ff:00:00:00:02 freq=1234 beacon_int=102 capabilities=0x1234 qual=10 noise=10 level=10 tsf=1234605616436508552 age=123 ie=000474657374 flags=[WEP] ssid=test snr=10 est_throughput=100 update_idx=54 beacon_ie=000474657374 BSS output: id=29 bssid=02:ff:00:00:00:03 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=54 beacon_ie=0003ffff BSS output: id=30 bssid=02:ff:00:00:00:04 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=00000101 flags= ssid= snr=0 est_throughput=0 update_idx=54 beacon_ie=0000 BSS output: id=31 bssid=02:ff:00:00:00:05 freq=58320 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG] ssid=dmg snr=0 est_throughput=0 update_idx=54 BSS output: id=32 bssid=02:ff:00:00:00:06 freq=60480 beacon_int=0 capabilities=0x0001 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][IBSS] ssid=dmg snr=0 est_throughput=0 update_idx=54 BSS output: id=33 bssid=02:ff:00:00:00:07 freq=62640 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][PBSS] ssid=dmg snr=0 est_throughput=0 update_idx=54 BSS output: id=34 bssid=02:ff:00:00:00:08 freq=64800 beacon_int=0 capabilities=0x0003 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][ESS] ssid=dmg snr=0 est_throughput=0 update_idx=54 BSS output: id=35 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0011 qual=0 noise=0 level=1 tsf=0000000000000000 age=0 ie=0003757064010182 flags=[WEP][ESS] ssid=upd snr=0 est_throughput=0 update_idx=54 BSS output: id=36 bssid=02:ff:00:00:00:00 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=54 Discovered BSSs: ['02:ff:00:00:00:02', '02:ff:00:00:00:03', '02:ff:00:00:00:04', '02:ff:00:00:00:05', '02:ff:00:00:00:06', '02:ff:00:00:00:07', '02:ff:00:00:00:08', '02:ff:00:00:00:09', '02:ff:00:00:00:00'] Update BSS parameters Updated BSS: id=35 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=2 tsf=0000000000000000 age=0 ie=000375706401028204 flags=[IBSS] ssid=upd snr=0 est_throughput=0 update_idx=55 PASS scan_parsing 0.089198 2019-04-20 20:07:19.059781 passed all 1 test case(s) 2019-04-20 20:07:19 ./run-tests.py scan_probe_req_events DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_probe_req_events 1/1 Test: Probe Request frame RX events from hostapd Starting AP wlan3 PASS scan_probe_req_events 1.216005 2019-04-20 20:07:20.752569 passed all 1 test case(s) 2019-04-20 20:07:20 ./run-tests.py scan_random_mac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_random_mac 1/1 Test: Random MAC address in scans Starting AP wlan3 Probe Request frames seen from: ['d2:10:63:3a:d9:b0', 'f2:11:22:33:44:55', 'f2:11:33:3b:66:4e'] PASS scan_random_mac 0.988627 2019-04-20 20:07:22.088919 passed all 1 test case(s) 2019-04-20 20:07:22 ./run-tests.py scan_random_mac_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_random_mac_connected 1/1 Test: Random MAC address in scans while connected Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS scan_random_mac_connected 0.901527 2019-04-20 20:07:23.290155 passed all 1 test case(s) 2019-04-20 20:07:23 ./run-tests.py scan_reqs_with_non_scan_radio_work DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_reqs_with_non_scan_radio_work 1/1 Test: SCAN commands while non-scan radio_work is in progress PASS scan_reqs_with_non_scan_radio_work 4.383081 2019-04-20 20:07:28.102481 passed all 1 test case(s) 2019-04-20 20:07:28 ./run-tests.py scan_setband DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_setband 1/1 Test: Band selection for scan operations Starting AP wlan3 Starting AP wlan4 PASS scan_setband 3.755734 2019-04-20 20:07:32.159174 passed all 1 test case(s) 2019-04-20 20:07:32 ./run-tests.py scan_specific_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specific_bssid 1/1 Test: Scan for a specific BSSID Starting AP wlan3 PASS scan_specific_bssid 0.524844 2019-04-20 20:07:32.975764 passed all 1 test case(s) 2019-04-20 20:07:33 ./run-tests.py scan_specify_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specify_ssid 1/1 Test: Control interface behavior on scan SSID parameter Starting AP wlan3 PASS scan_specify_ssid 0.764649 2019-04-20 20:07:34.102892 passed all 1 test case(s) 2019-04-20 20:07:34 ./run-tests.py scan_trigger_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_trigger_failure 1/1 Test: Scan trigger to the driver failing Starting AP wlan3 Connect STA wlan0 to AP PASS scan_trigger_failure 1.519096 2019-04-20 20:07:35.888284 passed all 1 test case(s) 2019-04-20 20:07:35 ./run-tests.py scan_tsf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_tsf 1/1 Test: Scan and TSF updates from Beacon/Probe Response frames Starting AP wlan3 TSF: 1555762056397005 TSF: 1555762056499404 TSF: 1555762056601804 TSF: 1555762056806604 TSF: 1555762056909005 TSF: 1555762057011410 TSF: 1555762057132372 TSF: 1555762057181845 TSF: 1555762057232067 TSF: 1555762057318634 TSF: 1555762057421004 TSF: 1555762057625806 PASS scan_tsf 1.581977 2019-04-20 20:07:37.766154 passed all 1 test case(s) ignored_by_lkp sigma_dut_ap_cipher_ccmp_128 ignored_by_lkp sigma_dut_ap_cipher_ccmp_256 ignored_by_lkp sigma_dut_ap_cipher_ccmp_gcmp_1 ignored_by_lkp sigma_dut_ap_cipher_ccmp_gcmp_2 ignored_by_lkp sigma_dut_ap_cipher_gcmp_128 ignored_by_lkp sigma_dut_ap_cipher_gcmp_256 ignored_by_lkp sigma_dut_ap_cipher_gcmp_256_group_ccmp ignored_by_lkp sigma_dut_ap_dpp_pkex_responder ignored_by_lkp sigma_dut_ap_dpp_qr ignored_by_lkp sigma_dut_ap_dpp_qr_legacy ignored_by_lkp sigma_dut_ap_dpp_qr_legacy_psk ignored_by_lkp sigma_dut_ap_dpp_self_config ignored_by_lkp sigma_dut_ap_eap ignored_by_lkp sigma_dut_ap_eap_osen ignored_by_lkp sigma_dut_ap_eap_sha256 ignored_by_lkp sigma_dut_ap_ent_ft_eap ignored_by_lkp sigma_dut_ap_ft_eap ignored_by_lkp sigma_dut_ap_ft_psk ignored_by_lkp sigma_dut_ap_hs20 ignored_by_lkp sigma_dut_ap_osen ignored_by_lkp sigma_dut_ap_override_rsne ignored_by_lkp sigma_dut_ap_owe ignored_by_lkp sigma_dut_ap_owe_ecgroupid ignored_by_lkp sigma_dut_ap_owe_transition_mode ignored_by_lkp sigma_dut_ap_owe_transition_mode_2 ignored_by_lkp sigma_dut_ap_psk ignored_by_lkp sigma_dut_ap_psk_sae ignored_by_lkp sigma_dut_ap_psk_sae_ft ignored_by_lkp sigma_dut_ap_psk_sha256 ignored_by_lkp sigma_dut_ap_pskhex ignored_by_lkp sigma_dut_ap_sae ignored_by_lkp sigma_dut_ap_sae_group ignored_by_lkp sigma_dut_ap_sae_password ignored_by_lkp sigma_dut_ap_sae_pw_id ignored_by_lkp sigma_dut_ap_sae_pw_id_ft ignored_by_lkp sigma_dut_ap_suite_b ignored_by_lkp sigma_dut_basic ignored_by_lkp sigma_dut_dpp_incompatible_roles_init ignored_by_lkp sigma_dut_dpp_incompatible_roles_resp ignored_by_lkp sigma_dut_dpp_pkex_init_configurator ignored_by_lkp sigma_dut_dpp_pkex_responder_proto ignored_by_lkp sigma_dut_dpp_proto_initiator ignored_by_lkp sigma_dut_dpp_proto_initiator_pkex ignored_by_lkp sigma_dut_dpp_proto_peer_disc_req ignored_by_lkp sigma_dut_dpp_proto_responder ignored_by_lkp sigma_dut_dpp_proto_responder_pkex ignored_by_lkp sigma_dut_dpp_proto_stop_at_initiator ignored_by_lkp sigma_dut_dpp_proto_stop_at_initiator_enrollee ignored_by_lkp sigma_dut_dpp_proto_stop_at_responder ignored_by_lkp sigma_dut_dpp_qr_init_configurator_1 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_2 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_3 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_4 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_5 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_6 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_7 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_both ignored_by_lkp sigma_dut_dpp_qr_init_configurator_neg_freq ignored_by_lkp sigma_dut_dpp_qr_init_enrollee ignored_by_lkp sigma_dut_dpp_qr_init_enrollee_psk ignored_by_lkp sigma_dut_dpp_qr_init_enrollee_sae ignored_by_lkp sigma_dut_dpp_qr_mutual_init_enrollee ignored_by_lkp sigma_dut_dpp_qr_mutual_init_enrollee_check ignored_by_lkp sigma_dut_dpp_qr_mutual_init_enrollee_pending ignored_by_lkp sigma_dut_dpp_qr_mutual_resp_enrollee ignored_by_lkp sigma_dut_dpp_qr_mutual_resp_enrollee_pending ignored_by_lkp sigma_dut_dpp_qr_resp_1 ignored_by_lkp sigma_dut_dpp_qr_resp_2 ignored_by_lkp sigma_dut_dpp_qr_resp_3 ignored_by_lkp sigma_dut_dpp_qr_resp_4 ignored_by_lkp sigma_dut_dpp_qr_resp_5 ignored_by_lkp sigma_dut_dpp_qr_resp_6 ignored_by_lkp sigma_dut_dpp_qr_resp_7 ignored_by_lkp sigma_dut_dpp_qr_resp_chan_list ignored_by_lkp sigma_dut_dpp_self_config ignored_by_lkp sigma_dut_hs20_assoc_24 ignored_by_lkp sigma_dut_hs20_assoc_5 ignored_by_lkp sigma_dut_open ignored_by_lkp sigma_dut_owe ignored_by_lkp sigma_dut_preconfigured_profile ignored_by_lkp sigma_dut_psk_pmf ignored_by_lkp sigma_dut_psk_pmf_bip_cmac_128 ignored_by_lkp sigma_dut_psk_pmf_bip_cmac_256 ignored_by_lkp sigma_dut_psk_pmf_bip_gmac_128 ignored_by_lkp sigma_dut_psk_pmf_bip_gmac_256 ignored_by_lkp sigma_dut_psk_pmf_bip_gmac_256_mismatch ignored_by_lkp sigma_dut_sae ignored_by_lkp sigma_dut_sae_password ignored_by_lkp sigma_dut_sae_pw_id ignored_by_lkp sigma_dut_sae_pw_id_ft ignored_by_lkp sigma_dut_sta_override_rsne ignored_by_lkp sigma_dut_sta_scan_bss ignored_by_lkp sigma_dut_sta_scan_ssid_bssid ignored_by_lkp sigma_dut_suite_b ignored_by_lkp sigma_dut_suite_b_rsa ignored_by_lkp sigma_dut_venue_url ignored_by_lkp sigma_dut_wps_pbc 2019-04-20 20:07:37 ./run-tests.py ssid_1_octet DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_1_octet 1/1 Test: SSID with one octet Starting AP wlan3 Connect STA wlan0 to AP PASS ssid_1_octet 0.473733 2019-04-20 20:07:38.714046 passed all 1 test case(s) 2019-04-20 20:07:38 ./run-tests.py ssid_32_octets DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_32_octets 1/1 Test: SSID with 32 octets Starting AP wlan3 Connect STA wlan0 to AP PASS ssid_32_octets 0.548263 2019-04-20 20:07:39.622517 passed all 1 test case(s) 2019-04-20 20:07:39 ./run-tests.py ssid_32_octets_nul_term DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_32_octets_nul_term 1/1 Test: SSID with 32 octets with nul at the end Starting AP wlan3 Connect STA wlan0 to AP PASS ssid_32_octets_nul_term 0.568007 2019-04-20 20:07:40.528974 passed all 1 test case(s) 2019-04-20 20:07:40 ./run-tests.py ssid_hex_encoded DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_hex_encoded 1/1 Test: SSID configuration using hex encoded version Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ssid_hex_encoded 0.758185 2019-04-20 20:07:41.742556 passed all 1 test case(s) 2019-04-20 20:07:41 ./run-tests.py ssid_hidden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_hidden 1/1 Test: Hidden SSID Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ssid_hidden 1.917738 2019-04-20 20:07:44.119121 passed all 1 test case(s) 2019-04-20 20:07:44 ./run-tests.py ssid_hidden2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_hidden2 1/1 Test: Hidden SSID using zero octets as payload Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ssid_hidden2 1.836932 2019-04-20 20:07:46.389749 passed all 1 test case(s) 2019-04-20 20:07:46 ./run-tests.py ssid_hidden_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_hidden_wpa2 1/1 Test: Hidden SSID with WPA2-PSK Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ssid_hidden_wpa2 1.817548 2019-04-20 20:07:48.549704 passed all 1 test case(s) 2019-04-20 20:07:48 ./run-tests.py ssid_printf_encoded DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_printf_encoded 1/1 Test: SSID configuration using printf encoded version Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ssid_printf_encoded 0.903447 2019-04-20 20:07:49.791297 passed all 1 test case(s) 2019-04-20 20:07:49 ./run-tests.py ssid_utf8 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_utf8 1/1 Test: SSID with UTF8 encoding Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ssid_utf8 0.753913 2019-04-20 20:07:50.838955 passed all 1 test case(s) 2019-04-20 20:07:50 ./run-tests.py sta_ap_scan_0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_ap_scan_0 1/1 Test: Dynamically added wpa_supplicant interface with AP_SCAN 0 connection Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_ap_scan_0 1.010325 2019-04-20 20:07:52.157241 passed all 1 test case(s) 2019-04-20 20:07:52 ./run-tests.py sta_ap_scan_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_ap_scan_2 1/1 Test: Dynamically added wpa_supplicant interface with AP_SCAN 2 connection Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_ap_scan_2 2.755522 2019-04-20 20:07:55.228769 passed all 1 test case(s) 2019-04-20 20:07:55 ./run-tests.py sta_ap_scan_2b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_ap_scan_2b 1/1 Test: Dynamically added wpa_supplicant interface with AP_SCAN 2 operation Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_ap_scan_2b 14.119557 2019-04-20 20:08:09.686319 passed all 1 test case(s) 2019-04-20 20:08:09 ./run-tests.py sta_dynamic DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic 1/1 Test: Dynamically added wpa_supplicant interface Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_dynamic 0.572857 2019-04-20 20:08:10.576204 passed all 1 test case(s) 2019-04-20 20:08:10 ./run-tests.py sta_dynamic_down_up DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_down_up 1/1 Test: Dynamically added wpa_supplicant interface down/up Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_dynamic_down_up 1.145693 2019-04-20 20:08:12.118814 passed all 1 test case(s) 2019-04-20 20:08:12 ./run-tests.py sta_dynamic_ext_mac_addr_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_ext_mac_addr_change 1/1 Test: Dynamically added wpa_supplicant interface with external MAC address change Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_dynamic_ext_mac_addr_change 1.178056 2019-04-20 20:08:13.641766 passed all 1 test case(s) 2019-04-20 20:08:13 ./run-tests.py sta_dynamic_random_mac_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr 1.483828 2019-04-20 20:08:15.563094 passed all 1 test case(s) 2019-04-20 20:08:15 ./run-tests.py sta_dynamic_random_mac_addr_keep_oui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_keep_oui 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address (keep OUI) Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_keep_oui 1.691622 2019-04-20 20:08:17.669737 passed all 1 test case(s) 2019-04-20 20:08:17 ./run-tests.py sta_dynamic_random_mac_addr_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_scan 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address for scan Starting AP wlan3 Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_scan 1.01245 2019-04-20 20:08:19.002887 passed all 1 test case(s) 2019-04-20 20:08:19 ./run-tests.py sta_dynamic_random_mac_addr_scan_keep_oui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_scan_keep_oui 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address for scan (keep OUI) Starting AP wlan3 Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_scan_keep_oui 0.95917 2019-04-20 20:08:20.275388 passed all 1 test case(s) 2019-04-20 20:08:20 ./run-tests.py suite_b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b 1/1 Test: WPA2/GCMP connection at Suite B 128-bit level Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b 1.21341 2019-04-20 20:08:21.770048 passed all 1 test case(s) 2019-04-20 20:08:21 ./run-tests.py suite_b_192 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192 1.321621 2019-04-20 20:08:23.442421 passed all 1 test case(s) 2019-04-20 20:08:23 ./run-tests.py suite_b_192_mic_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_mic_failure 1/1 Test: WPA2/GCMP connection at Suite B 192-bit level and MIC derivation failure Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_mic_failure 0.738994 2019-04-20 20:08:24.513244 passed all 1 test case(s) 2019-04-20 20:08:24 ./run-tests.py suite_b_192_pmkid_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_pmkid_failure 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and PMKID derivation failure Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_pmkid_failure 0.555292 2019-04-20 20:08:25.387620 passed all 1 test case(s) 2019-04-20 20:08:25 ./run-tests.py suite_b_192_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_radius 1/1 Test: WPA2/GCMP-256 (RADIUS) connection at Suite B 192-bit level Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_radius 0.916114 2019-04-20 20:08:26.609525 passed all 1 test case(s) 2019-04-20 20:08:26 ./run-tests.py suite_b_192_radius_and_p256_cert DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_radius_and_p256_cert 1/1 Test: Suite B 192-bit level and p256 client cert Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_radius_and_p256_cert 0.720039 2019-04-20 20:08:27.616761 passed all 1 test case(s) 2019-04-20 20:08:27 ./run-tests.py suite_b_192_rsa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa 0.709893 2019-04-20 20:08:28.611771 passed all 1 test case(s) 2019-04-20 20:08:28 ./run-tests.py suite_b_192_rsa_dhe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_dhe 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA (DHE) Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_dhe 0.753364 2019-04-20 20:08:29.686208 passed all 1 test case(s) 2019-04-20 20:08:29 ./run-tests.py suite_b_192_rsa_dhe_radius_rsa2048_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_dhe_radius_rsa2048_client 1/1 Test: Suite B 192-bit level and RSA (DHE) and RSA2048 client Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_dhe_radius_rsa2048_client 0.739424 2019-04-20 20:08:30.741580 passed all 1 test case(s) 2019-04-20 20:08:30 ./run-tests.py suite_b_192_rsa_ecdhe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_ecdhe 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA (ECDHE) Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_ecdhe 0.673524 2019-04-20 20:08:31.681456 passed all 1 test case(s) 2019-04-20 20:08:31 ./run-tests.py suite_b_192_rsa_ecdhe_radius_rsa2048_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_ecdhe_radius_rsa2048_client 1/1 Test: Suite B 192-bit level and RSA (ECDHE) and RSA2048 client Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_ecdhe_radius_rsa2048_client 0.681132 2019-04-20 20:08:32.631488 passed all 1 test case(s) 2019-04-20 20:08:32 ./run-tests.py suite_b_192_rsa_insufficient_dh DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_insufficient_dh 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA with insufficient DH key length Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_insufficient_dh 0.477821 2019-04-20 20:08:33.421739 passed all 1 test case(s) 2019-04-20 20:08:33 ./run-tests.py suite_b_192_rsa_insufficient_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_insufficient_key 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA with insufficient key length Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_insufficient_key 0.491011 2019-04-20 20:08:34.187286 passed all 1 test case(s) 2019-04-20 20:08:34 ./run-tests.py suite_b_192_rsa_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_radius 1/1 Test: WPA2/GCMP-256 (RADIUS) connection at Suite B 192-bit level and RSA (ECDHE) Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_radius 0.800041 2019-04-20 20:08:35.309173 passed all 1 test case(s) 2019-04-20 20:08:35 ./run-tests.py suite_b_mic_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_mic_failure 1/1 Test: WPA2/GCMP connection at Suite B 128-bit level and MIC derivation failure Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_mic_failure 0.515104 2019-04-20 20:08:36.162488 passed all 1 test case(s) 2019-04-20 20:08:36 ./run-tests.py suite_b_pmkid_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_pmkid_failure 1/1 Test: WPA2/GCMP connection at Suite B 128-bit level and PMKID derivation failure Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_pmkid_failure 0.520886 2019-04-20 20:08:36.956412 passed all 1 test case(s) 2019-04-20 20:08:37 ./run-tests.py suite_b_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_radius 1/1 Test: WPA2/GCMP (RADIUS) connection at Suite B 128-bit level Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_radius 0.758091 2019-04-20 20:08:37.996930 passed all 1 test case(s) ignored_by_lkp tdls_chan_switch 2019-04-20 20:08:38 ./run-tests.py tnc_fast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_fast 1/1 Test: TNC FAST Starting AP wlan3 Connect STA wlan0 to AP PASS tnc_fast 0.472827 2019-04-20 20:08:38.800306 passed all 1 test case(s) 2019-04-20 20:08:38 ./run-tests.py tnc_peap_soh DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_peap_soh 1/1 Test: TNC PEAP-SoH Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS tnc_peap_soh 0.843674 2019-04-20 20:08:39.922407 passed all 1 test case(s) 2019-04-20 20:08:39 ./run-tests.py tnc_peap_soh_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_peap_soh_errors 1/1 Test: TNC PEAP-SoH local error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS tnc_peap_soh_errors 0.866336 2019-04-20 20:08:41.060740 passed all 1 test case(s) 2019-04-20 20:08:41 ./run-tests.py tnc_ttls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_ttls 1/1 Test: TNC TTLS Starting AP wlan3 Connect STA wlan0 to AP PASS tnc_ttls 0.4476 2019-04-20 20:08:41.779146 passed all 1 test case(s) 2019-04-20 20:08:41 ./run-tests.py tnc_ttls_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_ttls_errors 1/1 Test: TNC TTLS local error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS tnc_ttls_errors 4.788294 2019-04-20 20:08:46.907719 passed all 1 test case(s) 2019-04-20 20:08:46 ./run-tests.py tnc_ttls_fragmentation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_ttls_fragmentation 1/1 Test: TNC TTLS with fragmentation Starting AP wlan3 Connect STA wlan0 to AP PASS tnc_ttls_fragmentation 0.435385 2019-04-20 20:08:47.625763 passed all 1 test case(s) 2019-04-20 20:08:47 ./run-tests.py tspec DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec 1/1 Test: Basic addts/delts tests Starting AP wlan3 Connect STA wlan0 to AP PASS tspec 0.455457 2019-04-20 20:08:48.344360 passed all 1 test case(s) 2019-04-20 20:08:48 ./run-tests.py tspec_ap_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_ap_fail 1/1 Test: AP failing to send tspec response Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_ap_fail 1.394919 2019-04-20 20:08:49.995882 passed all 1 test case(s) 2019-04-20 20:08:50 ./run-tests.py tspec_ap_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_ap_parsing 1/1 Test: TSPEC AP parsing tests Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_ap_parsing 0.372399 2019-04-20 20:08:50.634966 passed all 1 test case(s) 2019-04-20 20:08:50 ./run-tests.py tspec_ap_roam_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_ap_roam_open 1/1 Test: Roam between two open APs while having tspecs Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS tspec_ap_roam_open 4.737401 2019-04-20 20:08:55.677029 passed all 1 test case(s) 2019-04-20 20:08:55 ./run-tests.py tspec_not_enabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_not_enabled 1/1 Test: addts failing if AP does not support WMM Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_not_enabled 0.397953 2019-04-20 20:08:56.332126 passed all 1 test case(s) 2019-04-20 20:08:56 ./run-tests.py tspec_protocol DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_protocol 1/1 Test: Protocol tests for addts/delts Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_protocol 1.431399 2019-04-20 20:08:58.032076 passed all 1 test case(s) 2019-04-20 20:08:58 ./run-tests.py tspec_reassoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_reassoc 1/1 Test: Reassociation to same BSS while having tspecs Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_reassoc 4.514217 2019-04-20 20:09:02.862943 passed all 1 test case(s) 2019-04-20 20:09:02 ./run-tests.py wep_ht_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_ht_vht 1/1 Test: WEP and HT/VHT Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'channel': '36', 'bss[0]': 'wlan3', 'ssid[0]': 'test-vht40-wep', 'olbc': '0', 'freq': '5180', 'num_sta_no_short_preamble': '1', 'dtim_period': '2', 'phy': 'phy3', 'beacon_int': '100', 'num_sta_ht_20_mhz': '0', 'ieee80211n': '0', 'olbc_ht': '0', 'num_sta_ht_no_gf': '0', 'num_sta[0]': '1', 'ieee80211ac': '0', 'ht_op_mode': '0x13', 'num_sta_no_short_slot_time': '1', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'bssid[0]': '02:00:00:00:03:00', 'secondary_channel': '0', 'max_txpower': '20', 'num_sta_non_erp': '0', 'cac_time_seconds': '0', 'num_sta_ht40_intolerant': '0', 'num_sta_no_ht': '1', 'cac_time_left_seconds': 'N/A', 'state': 'ENABLED'} PASS wep_ht_vht 1.030885 2019-04-20 20:09:04.190318 passed all 1 test case(s) 2019-04-20 20:09:04 ./run-tests.py wep_ifdown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_ifdown 1/1 Test: AP with WEP and external ifconfig down Starting AP wlan3 Connect STA wlan0 to AP PASS wep_ifdown 0.846423 2019-04-20 20:09:05.364177 passed all 1 test case(s) 2019-04-20 20:09:05 ./run-tests.py wep_open_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_open_auth 1/1 Test: WEP Open System authentication Starting AP wlan3 Connect STA wlan0 to AP PASS wep_open_auth 0.543874 2019-04-20 20:09:06.236009 passed all 1 test case(s) 2019-04-20 20:09:06 ./run-tests.py wep_shared_key_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_shared_key_auth 1/1 Test: WEP Shared Key authentication Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS wep_shared_key_auth 0.663699 2019-04-20 20:09:07.169374 passed all 1 test case(s) 2019-04-20 20:09:07 ./run-tests.py wep_shared_key_auth_multi_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_shared_key_auth_multi_key 1/1 Test: WEP Shared Key authentication with multiple keys Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wep_shared_key_auth_multi_key 1.068954 2019-04-20 20:09:08.506451 passed all 1 test case(s) 2019-04-20 20:09:08 ./run-tests.py wep_shared_key_auth_not_allowed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_shared_key_auth_not_allowed 1/1 Test: WEP Shared Key authentication not allowed Starting AP wlan3 Connect STA wlan0 to AP PASS wep_shared_key_auth_not_allowed 1.213203 2019-04-20 20:09:10.140616 passed all 1 test case(s) 2019-04-20 20:09:10 ./run-tests.py wext_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_open 1/1 Test: WEXT driver interface with open network Starting AP wlan3 Connect STA wlan5 to AP PASS wext_open 4.993671 2019-04-20 20:09:15.410369 passed all 1 test case(s) 2019-04-20 20:09:15 ./run-tests.py wext_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_pmf 1/1 Test: WEXT driver interface with WPA2-PSK and PMF Starting AP wlan3 Connect STA wlan5 to AP PASS wext_pmf 9.307507 2019-04-20 20:09:25.284719 passed all 1 test case(s) 2019-04-20 20:09:25 ./run-tests.py wext_pmksa_cache DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_pmksa_cache 1/1 Test: PMKSA caching with WEXT Starting AP wlan3 Connect STA wlan5 to AP Starting AP wlan4 Roam to AP2 Roam back to AP1 PASS wext_pmksa_cache 33.523004 2019-04-20 20:09:59.453450 passed all 1 test case(s) 2019-04-20 20:09:59 ./run-tests.py wext_rfkill DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_rfkill 1/1 Test: WEXT and rfkill block/unblock Starting AP wlan3 Connect STA wlan5 to AP rfkill block rfkill unblock PASS wext_rfkill 9.391651 2019-04-20 20:10:09.237910 passed all 1 test case(s) 2019-04-20 20:10:09 ./run-tests.py wext_scan_hidden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_scan_hidden 1/1 Test: WEXT with hidden SSID Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS wext_scan_hidden 18.021643 2019-04-20 20:10:27.986131 passed all 1 test case(s) 2019-04-20 20:10:28 ./run-tests.py wext_wep_open_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_wep_open_auth 1/1 Test: WEP Open System authentication Starting AP wlan3 Connect STA wlan5 to AP PASS wext_wep_open_auth 4.384859 2019-04-20 20:10:32.658613 passed all 1 test case(s) 2019-04-20 20:10:32 ./run-tests.py wext_wep_shared_key_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_wep_shared_key_auth 1/1 Test: WEP Shared Key authentication Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS wext_wep_shared_key_auth 4.923228 2019-04-20 20:10:37.866472 passed all 1 test case(s) 2019-04-20 20:10:37 ./run-tests.py wext_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_wpa2_psk 1/1 Test: WEXT driver interface with WPA2-PSK Starting AP wlan3 Connect STA wlan5 to AP PASS wext_wpa2_psk 4.505243 2019-04-20 20:10:42.724923 passed all 1 test case(s) 2019-04-20 20:10:42 ./run-tests.py wext_wpa_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_wpa_psk 1/1 Test: WEXT driver interface with WPA-PSK Starting AP wlan3 Connect STA wlan5 to AP PASS wext_wpa_psk 5.735076 2019-04-20 20:10:48.747573 passed all 1 test case(s) 2019-04-20 20:10:48 ./run-tests.py wifi_display DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display 1/1 Test: Wi-Fi Display extensions to P2P wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS wifi_display 3.381546 2019-04-20 20:10:52.543317 passed all 1 test case(s) 2019-04-20 20:10:52 ./run-tests.py wifi_display_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_disable 1/1 Test: Peer disabling Wi-Fi Display advertisement PASS wifi_display_disable 1.610761 2019-04-20 20:10:54.426846 passed all 1 test case(s) 2019-04-20 20:10:54 ./run-tests.py wifi_display_go_invite DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_go_invite 1/1 Test: P2P GO with Wi-Fi Display inviting a client to join wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Authorize invitation Try to connect the client to the GO wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected Invite peer to join the group PASS wifi_display_go_invite 2.585779 2019-04-20 20:10:57.423038 passed all 1 test case(s) 2019-04-20 20:10:57 ./run-tests.py wifi_display_invalid_subelem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_invalid_subelem 1/1 Test: Wi-Fi Display and invalid subelement parsing PASS wifi_display_invalid_subelem 0.301309 2019-04-20 20:10:58.051402 passed all 1 test case(s) 2019-04-20 20:10:58 ./run-tests.py wifi_display_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_parsing 1/1 Test: Wi-Fi Display extensions to P2P and special parsing cases wlan1: Trying to discover peer 02:00:00:00:00:00 wlan2: Trying to discover peer 02:00:00:00:00:00 PASS wifi_display_parsing 2.206685 2019-04-20 20:11:00.555474 passed all 1 test case(s) 2019-04-20 20:11:00 ./run-tests.py wifi_display_persistent_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_persistent_group 1/1 Test: P2P persistent group formation and re-invocation with Wi-Fi Display enabled Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group Try to connect the client to the GO wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected wlan1: Trying to discover peer 02:00:00:00:00:00 PASS wifi_display_persistent_group 5.945119 2019-04-20 20:11:06.800587 passed all 1 test case(s) 2019-04-20 20:11:06 ./run-tests.py wifi_display_r2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_r2 1/1 Test: Wi-Fi Display extensions to P2P with R2 subelems wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS wifi_display_r2 2.43232 2019-04-20 20:11:09.488652 passed all 1 test case(s) ignored_by_lkp wmediumd_path_rann 2019-04-20 20:11:09 ./run-tests.py wmediumd_path_simple DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_path_simple 1/1 Test: test a mesh path PASS wmediumd_path_simple 1.005548 2019-04-20 20:11:10.791166 passed all 1 test case(s) 2019-04-20 20:11:10 ./run-tests.py wmediumd_path_ttl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_path_ttl 1/1 Test: Mesh path request TTL PASS wmediumd_path_ttl 9.1118 2019-04-20 20:11:20.223241 passed all 1 test case(s) 2019-04-20 20:11:20 ./run-tests.py wmediumd_simple DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_simple 1/1 Test: test a simple wmediumd configuration Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS wmediumd_simple 0.888479 2019-04-20 20:11:21.438769 passed all 1 test case(s) 2019-04-20 20:11:21 ./run-tests.py wmm_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmm_disabled 1/1 Test: WMM disabled and unexpected TSPEC Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS wmm_disabled 0.410354 2019-04-20 20:11:22.119206 passed all 1 test case(s) 2019-04-20 20:11:22 ./run-tests.py wmm_element DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmm_element 1/1 Test: hostapd FTM range request timeout Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS wmm_element 0.467222 2019-04-20 20:11:22.907382 passed all 1 test case(s) 2019-04-20 20:11:22 ./run-tests.py wnm_action_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_action_proto 1/1 Test: WNM Action protocol testing Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_action_proto 0.586483 2019-04-20 20:11:23.808028 passed all 1 test case(s) 2019-04-20 20:11:23 ./run-tests.py wnm_action_proto_no_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_action_proto_no_pmf 1/1 Test: WNM Action protocol testing (PMF disabled) Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_action_proto_no_pmf 0.5315 2019-04-20 20:11:24.673124 passed all 1 test case(s) 2019-04-20 20:11:24 ./stop.sh 2019-04-20 20:11:26 ./start.sh channels=4 2019-04-20 20:11:26 ./stop.sh