lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Tue, 19 Jan 2021 10:48:10 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Johannes Berg <johannes@...solutions.net>
Cc:     0day robot <lkp@...el.com>, LKML <linux-kernel@...r.kernel.org>,
        lkp@...ts.01.org, linux-wireless@...r.kernel.org,
        Johannes Berg <johannes.berg@...el.com>
Subject: [cfg80211]  1180cd89a7:
 hwsim.dpp_config_signed_connector_error_no_dot_2.fail


Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 1180cd89a7ca9add3e086f7f06b76d6114ae8593 ("[PATCH] cfg80211: avoid holding the RTNL when calling the driver")
url: https://github.com/0day-ci/linux/commits/Johannes-Berg/cfg80211-avoid-holding-the-RTNL-when-calling-the-driver/20210115-124633
base: https://git.kernel.org/cgit/linux/kernel/git/jberg/mac80211-next.git master

in testcase: hwsim
version: hwsim-x86_64-537ab94-1_20210101
with following parameters:

	test: group-26
	ucode: 0xe2



on test machine: 4 threads Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz with 32G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):




If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>

2021-01-18 07:15:17 export USER=root
2021-01-18 07:15:17 ./build.sh
Building TNC testing tools
Building wlantest
Building hs20-osu-client
Building hostapd
Building wpa_supplicant
2021-01-18 07:15:55 ./start.sh
2021-01-18 07:15:56 ./run-tests.py ap_acs_vht160_scan_disable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_acs_vht160_scan_disable 1/1
Test: Automatic channel selection for VHT160 and DISABLE during scan
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Country code at the end: 00
PASS ap_acs_vht160_scan_disable 4.534067 2021-01-18 07:16:01.537145
passed all 1 test case(s)
2021-01-18 07:16:01 ./run-tests.py ap_beacon_rate_ht2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_beacon_rate_ht2 1/1
Test: Open AP with Beacon frame TX rate HT-MCS 1 in VHT BSS
Starting AP wlan3
Skip test case: Setting Beacon frame TX rate not supported
SKIP ap_beacon_rate_ht2 0.441666 2021-01-18 07:16:02.110637
passed all 0 test case(s)
skipped 1 test case(s)
2021-01-18 07:16:02 ./run-tests.py ap_beacon_rate_legacy
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_beacon_rate_legacy 1/1
Test: Open AP with Beacon frame TX rate 5.5 Mbps
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_beacon_rate_legacy 1.675754 2021-01-18 07:16:03.917328
passed all 1 test case(s)
2021-01-18 07:16:03 ./run-tests.py ap_cipher_bip
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_cipher_bip 1/1
Test: WPA2-PSK with BIP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_cipher_bip 0.887131 2021-01-18 07:16:04.934558
passed all 1 test case(s)
2021-01-18 07:16:04 ./run-tests.py ap_config_reload_file
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_config_reload_file 1/1
Test: hostapd configuration reload from file
Starting interface wlan3
Connect STA wlan0 to AP
PASS ap_config_reload_file 0.962365 2021-01-18 07:16:06.026662
passed all 1 test case(s)
2021-01-18 07:16:06 ./run-tests.py ap_csa_1_switch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_csa_1_switch 1/1
Test: AP Channel Switch, one switch
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_csa_1_switch 1.827291 2021-01-18 07:16:07.983522
passed all 1 test case(s)
2021-01-18 07:16:08 ./run-tests.py ap_ft_gcmp_256
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_gcmp_256 1/1
Test: WPA2-PSK-FT AP with GCMP-256 cipher
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
Roam back to the first AP
PASS ap_ft_gcmp_256 2.07804 2021-01-18 07:16:10.192471
passed all 1 test case(s)
2021-01-18 07:16:10 ./run-tests.py ap_ft_internal_rrb_check
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_internal_rrb_check 1/1
Test: RRB internal delivery only to WPA enabled BSS
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_ft_internal_rrb_check 2.233382 2021-01-18 07:16:12.558592
passed all 1 test case(s)
2021-01-18 07:16:12 ./run-tests.py ap_ft_over_ds_ocv
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_over_ds_ocv 1/1
Test: WPA2-PSK-FT AP over DS
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
Roam back to the first AP
PASS ap_ft_over_ds_ocv 1.985539 2021-01-18 07:16:14.675448
passed all 1 test case(s)
2021-01-18 07:16:14 ./run-tests.py ap_ft_ptk_rekey_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_ptk_rekey_ap 1/1
Test: WPA2-PSK-FT PTK rekeying triggered by AP after roam
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
Roam back to the first AP
PASS ap_ft_ptk_rekey_ap 4.055358 2021-01-18 07:16:18.861389
passed all 1 test case(s)
2021-01-18 07:16:18 ./run-tests.py ap_hs20_auto_interworking
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_auto_interworking 1/1
Test: Hotspot 2.0 connection with auto_interworking=1
Starting AP wlan3
PASS ap_hs20_auto_interworking 5.074748 2021-01-18 07:16:24.059931
passed all 1 test case(s)
2021-01-18 07:16:24 ./run-tests.py ap_hs20_eap_unknown
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_eap_unknown 1/1
Test: Hotspot 2.0 connection with unknown EAP method
Starting AP wlan3
PASS ap_hs20_eap_unknown 0.537017 2021-01-18 07:16:24.721301
passed all 1 test case(s)
2021-01-18 07:16:24 ./run-tests.py ap_hs20_req_conn_capab
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_req_conn_capab 1/1
Test: Hotspot 2.0 network selection with req_conn_capab
Starting AP wlan3
Not used in home network
Used in roaming network
Verify that req_conn_capab does not prevent connection if no other network is available
Additional req_conn_capab checks
Starting AP wlan4
PASS ap_hs20_req_conn_capab 1.826074 2021-01-18 07:16:26.672368
passed all 1 test case(s)
2021-01-18 07:16:26 ./run-tests.py ap_ht_op_class_116
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht_op_class_116 1/1
Test: HT40 on operationg class 116
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_ht_op_class_116 1.597179 2021-01-18 07:16:28.394175
passed all 1 test case(s)
2021-01-18 07:16:28 ./run-tests.py ap_open_sta_enable_disable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_sta_enable_disable 1/1
Test: AP with open mode and wpa_supplicant ENABLE/DISABLE_NETWORK
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan5 to AP
PASS ap_open_sta_enable_disable 0.947414 2021-01-18 07:16:29.466205
passed all 1 test case(s)
2021-01-18 07:16:29 ./run-tests.py ap_open_sta_ps
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_sta_ps 1/1
Test: Station power save operation
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_sta_ps 1.413355 2021-01-18 07:16:31.004311
passed all 1 test case(s)
2021-01-18 07:16:31 ./run-tests.py ap_pmf_beacon_protection_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_beacon_protection_mismatch 1/1
Test: WPA2-PSK Beacon protection MIC mismatch
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_beacon_protection_mismatch 2.418877 2021-01-18 07:16:33.547344
passed all 1 test case(s)
2021-01-18 07:16:33 ./run-tests.py ap_pmf_sta_sa_query_no_response
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query_no_response 1/1
Test: WPA2-PSK AP with station using SA Query and getting no response
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query_no_response 4.726932 2021-01-18 07:16:38.398962
passed all 1 test case(s)
2021-01-18 07:16:38 ./run-tests.py ap_vendor_elements
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vendor_elements 1/1
Test: WPA2-PSK AP with vendor elements added
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vendor_elements 0.93081 2021-01-18 07:16:39.454313
passed all 1 test case(s)
2021-01-18 07:16:39 ./run-tests.py ap_vlan_file_parsing
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_file_parsing 1/1
Test: hostapd vlan_file/mac_file parsing
Starting AP wlan3
PASS ap_vlan_file_parsing 0.413193 2021-01-18 07:16:39.992167
passed all 1 test case(s)
2021-01-18 07:16:40 ./run-tests.py ap_wpa2_eap_ext_enable_network_while_connected
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ext_enable_network_while_connected 1/1
Test: WPA2-Enterprise interactive identity entry and ENABLE_NETWORK
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ext_enable_network_while_connected 1.867019 2021-01-18 07:16:41.983238
passed all 1 test case(s)
2021-01-18 07:16:42 ./run-tests.py ap_wpa2_eap_fast_eap_sim_ext
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_eap_sim_ext 1/1
Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM and external GSM auth
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_eap_sim_ext 0.888133 2021-01-18 07:16:42.999438
passed all 1 test case(s)
2021-01-18 07:16:43 ./run-tests.py ap_wpa2_eap_fast_eap_vendor
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_eap_vendor 1/1
Test: WPA2-Enterprise connection using EAP-FAST/EAP-vendor
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_eap_vendor 0.860354 2021-01-18 07:16:43.984111
passed all 1 test case(s)
2021-01-18 07:16:44 ./run-tests.py ap_wpa2_eap_peap_eap_sim
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_peap_eap_sim 1/1
Test: WPA2-Enterprise connection using EAP-PEAP/EAP-SIM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_peap_eap_sim 0.88753 2021-01-18 07:16:45.000410
passed all 1 test case(s)
2021-01-18 07:16:45 ./run-tests.py ap_wpa2_eap_peap_eap_sim_ext
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_peap_eap_sim_ext 1/1
Test: WPA2-Enterprise connection using EAP-PEAP/EAP-SIM and external GSM auth
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_peap_eap_sim_ext 0.894483 2021-01-18 07:16:46.019412
passed all 1 test case(s)
2021-01-18 07:16:46 ./run-tests.py ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked 1/1
Test: EAP-TLS with intermediate server/user CA and OCSP on revoked server certificate
openssl ocsp -reqout /tmp/lkp/tmpk1baiyd4 -issuer auth_serv/iCA-server/cacert.pem -sha256 -cert auth_serv/iCA-server/server-revoked.pem -no_nonce -text
openssl result:
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha256
          Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A
          Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112
          Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783


openssl ocsp -index auth_serv/iCA-server/index.txt -rsigner auth_serv/iCA-server/cacert.pem -rkey auth_serv/iCA-server/private/cakey.pem -CA auth_serv/iCA-server/cacert.pem -issuer auth_serv/iCA-server/cacert.pem -verify_other auth_serv/iCA-server/cacert.pem -trust_other -ndays 7 -reqin /tmp/lkp/tmpk1baiyd4 -resp_no_certs -respout /tmp/lkp/tmp890wf73z -text
openssl result:
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha256
          Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A
          Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112
          Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: C = FI, O = w1.fi, CN = Server Intermediate CA
    Produced At: Jan 18 07:16:46 2021 GMT
    Responses:
    Certificate ID:
      Hash Algorithm: sha256
      Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A
      Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112
      Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783
    Cert Status: revoked
    Revocation Time: May  3 15:20:10 2020 GMT
    This Update: Jan 18 07:16:46 2021 GMT
    Next Update: Jan 25 07:16:46 2021 GMT

    Signature Algorithm: sha256WithRSAEncryption
         3e:9f:20:52:3a:50:f1:95:59:eb:07:11:35:9e:99:e5:34:8d:
         c0:1c:48:49:6b:c2:21:69:ff:12:f3:8d:67:89:1f:58:7b:0b:
         40:98:29:c6:1f:fb:b0:54:96:e2:e3:65:0e:04:bf:19:80:41:
         8c:a4:ca:ae:3c:a4:14:2e:16:68:3a:03:35:03:f9:2c:aa:5c:
         32:fa:ba:c4:74:dd:78:a0:7f:77:28:53:78:f4:59:ef:3e:d1:
         e4:12:05:e5:ab:50:db:ce:d4:d1:24:88:28:64:d0:2c:58:4c:
         9b:9e:aa:9b:00:23:8f:a6:b1:3b:43:ca:f5:a5:bb:f7:2c:b3:
         93:65:b1:64:34:f5:81:13:1f:61:07:be:9f:6f:63:cc:1d:69:
         1d:a0:08:bd:1f:76:05:20:c9:11:da:17:06:d1:f8:7c:e4:30:
         52:11:37:0c:d1:66:a9:b6:06:66:7d:c0:e7:40:df:c5:22:4a:
         cb:ea:d9:46:7b:98:b6:fa:37:7a:03:cf:32:09:03:73:64:6e:
         98:18:ef:f6:33:90:85:0e:aa:fc:92:7a:af:87:f1:9a:3a:dc:
         a6:75:22:44:95:db:11:17:53:d0:0f:41:87:99:78:29:18:e6:
         e0:f1:d5:f6:34:7a:7b:2e:76:92:8f:37:fe:a8:8a:14:d5:1f:
         78:85:51:90


Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked 0.847318 2021-01-18 07:16:46.992710
passed all 1 test case(s)
2021-01-18 07:16:47 ./run-tests.py ap_wpa2_eap_ttls_eap_mschapv2_server_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_eap_mschapv2_server_oom 1/1
Test: WPA2-Enterprise connection using EAP-TTLS/EAP-MSCHAPv2 - server OOM
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_eap_mschapv2_server_oom 1.932255 2021-01-18 07:16:49.057195
passed all 1 test case(s)
2021-01-18 07:16:49 ./run-tests.py ap_wpa2_eap_ttls_server_cert_eku_client_server
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_server_cert_eku_client_server 1/1
Test: WPA2-Enterprise using EAP-TTLS and server cert with client and server EKU
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_server_cert_eku_client_server 0.82954 2021-01-18 07:16:50.012288
passed all 1 test case(s)
2021-01-18 07:16:50 ./run-tests.py ap_wpa2_eap_ttls_server_cert_hash
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_server_cert_hash 1/1
Test: WPA2-Enterprise connection using EAP-TTLS and server certificate hash
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_server_cert_hash 1.454199 2021-01-18 07:16:51.590287
passed all 1 test case(s)
2021-01-18 07:16:51 ./run-tests.py ap_wpa2_gtk_initial_rsc_tkip
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_gtk_initial_rsc_tkip 1/1
Test: Initial group cipher RSC (TKIP)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_gtk_initial_rsc_tkip 10.99963 2021-01-18 07:17:02.713745
passed all 1 test case(s)
2021-01-18 07:17:02 ./run-tests.py ap_wpa2_in_different_bridge
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_in_different_bridge 1/1
Test: hostapd behavior with interface in different bridge
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_in_different_bridge 1.567197 2021-01-18 07:17:04.405404
passed all 1 test case(s)
2021-01-18 07:17:04 ./run-tests.py ap_wps_er_http_client
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_http_client 1/1
Test: WPS ER and HTTP client special cases
HTTP server received: GET /foo.xml HTTP/1.1
HTTP header: Cache-Control: no-cache
HTTP header: Pragma: no-cache
HTTP header: Accept: text/xml, application/xml
HTTP header: User-Agent: wpa_supplicant
HTTP header: Host: 127.0.0.1:12345
HTTP server received: POST /wps_control HTTP/1.1
HTTP header: Host: 127.0.0.1:12345
HTTP header: Content-Type: text/xml; charset="utf-8"
HTTP header: Content-Length: 280
HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo"
HTTP server received: SUBSCRIBE /wps_event HTTP/1.1
HTTP header: HOST: 127.0.0.1:12345
HTTP header: CALLBACK: <http://127.0.0.1:49152/event/44733469/1>
HTTP header: NT: upnp:event
HTTP header: TIMEOUT: Second-1800
Event URL: http://127.0.0.1:49152/event/44733469/1
HTTP server received: GET /foo.xml HTTP/1.1
HTTP header: Cache-Control: no-cache
HTTP header: Pragma: no-cache
HTTP header: Accept: text/xml, application/xml
HTTP header: User-Agent: wpa_supplicant
HTTP header: Host: 127.0.0.1:12345
HTTP server received: GET /foo.xml HTTP/1.1
HTTP header: Cache-Control: no-cache
HTTP header: Pragma: no-cache
HTTP header: Accept: text/xml, application/xml
HTTP header: User-Agent: wpa_supplicant
HTTP header: Host: 127.0.0.1:12345
PASS ap_wps_er_http_client 7.081419 2021-01-18 07:17:11.611378
passed all 1 test case(s)
2021-01-18 07:17:11 ./run-tests.py ap_wps_invalid_assoc_req_elem
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_invalid_assoc_req_elem 1/1
Test: WPS and invalid IE in Association Request frame
Starting AP wlan3
PASS ap_wps_invalid_assoc_req_elem 2.895211 2021-01-18 07:17:14.631352
passed all 1 test case(s)
2021-01-18 07:17:14 ./run-tests.py dbus_tdls_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_tdls_oom 1/1
Test: D-Bus TDLS operations during OOM
No dbus module available
Skip test case: No dbus module available
SKIP dbus_tdls_oom 0.040761 2021-01-18 07:17:14.795969
passed all 0 test case(s)
skipped 1 test case(s)
2021-01-18 07:17:14 ./run-tests.py dfs_radar_chanlist_vht80
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dfs_radar_chanlist_vht80 1/1
Test: DFS chanlist when radar is detected and VHT80 configured
Starting AP wlan3 on DFS channel
Starting AP wlan3
Trigger a simulated radar event
Connect STA wlan0 to AP
Country code at the end: 00
PASS dfs_radar_chanlist_vht80 5.656441 2021-01-18 07:17:20.577178
passed all 1 test case(s)
2021-01-18 07:17:20 ./run-tests.py dpp_config_dpp_gen_prime256v1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_dpp_gen_prime256v1 1/1
Test: Generate DPP Config Object for DPP network (P-256)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
DPP authentication did not succeed (Responder)
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 859, in test_dpp_config_dpp_gen_prime256v1
    configurator=True)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 394, in run_dpp_qr_code_auth_unicast
    stop_responder=stop_responder)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 3875, in wait_auth_success
    raise Exception("DPP authentication did not succeed (Responder)")
Exception: DPP authentication did not succeed (Responder)
FAIL dpp_config_dpp_gen_prime256v1 5.083848 2021-01-18 07:17:25.789959
passed 0 test case(s)
skipped 0 test case(s)
failed tests: dpp_config_dpp_gen_prime256v1
2021-01-18 07:17:25 ./run-tests.py dpp_config_dpp_gen_secp384r1_secp384r1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_dpp_gen_secp384r1_secp384r1 1/1
Test: Generate DPP Config Object for DPP network (P-384 + P-384)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_dpp_gen_secp384r1_secp384r1 0.2373 2021-01-18 07:17:26.158406
passed all 1 test case(s)
2021-01-18 07:17:26 ./run-tests.py dpp_config_no_csign
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_no_csign 1/1
Test: DPP Config Object error - no csign
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_no_csign 2.175501 2021-01-18 07:17:28.459757
passed all 1 test case(s)
2021-01-18 07:17:28 ./run-tests.py dpp_config_signed_connector_error_no_dot_2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_signed_connector_error_no_dot_2 1/1
Test: DPP Config Object signedConnector error - no dot(2)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
DPP authentication did not succeed (Responder)
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1144, in test_dpp_config_signed_connector_error_no_dot_2
    run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn))
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1056, in run_dpp_config_error
    require_conf_failure=conf_failure)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 394, in run_dpp_qr_code_auth_unicast
    stop_responder=stop_responder)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 3875, in wait_auth_success
    raise Exception("DPP authentication did not succeed (Responder)")
Exception: DPP authentication did not succeed (Responder)
FAIL dpp_config_signed_connector_error_no_dot_2 5.086732 2021-01-18 07:17:33.674045
passed 0 test case(s)
skipped 0 test case(s)
failed tests: dpp_config_signed_connector_error_no_dot_2
2021-01-18 07:17:33 ./run-tests.py dpp_pkex_curve_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_pkex_curve_mismatch 1/1
Test: DPP and PKEX with mismatching curve
PASS dpp_pkex_curve_mismatch 2.094433 2021-01-18 07:17:35.898156
passed all 1 test case(s)
2021-01-18 07:17:35 ./run-tests.py dpp_proto_auth_resp_r_auth_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_resp_r_auth_mismatch 1/1
Test: DPP protocol testing - R-auth mismatch in Auth Resp
PASS dpp_proto_auth_resp_r_auth_mismatch 2.105385 2021-01-18 07:17:38.128631
passed all 1 test case(s)
2021-01-18 07:17:38 ./run-tests.py dpp_qr_code_keygen_fail
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_qr_code_keygen_fail 1/1
Test: DPP QR Code and keygen failure
PASS dpp_qr_code_keygen_fail 0.044825 2021-01-18 07:17:38.298837
passed all 1 test case(s)
2021-01-18 07:17:38 ./run-tests.py dpp_two_initiators
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_two_initiators 1/1
Test: DPP and two initiators
Unexpected result: <3>DPP-FAIL Configurator rejected configuration
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 4464, in test_dpp_two_initiators
    "DPP-FAIL Already in DPP authentication exchange - ignore new one")
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 52, in wait_dpp_fail
    raise Exception("Unexpected result: " + ev)
Exception: Unexpected result: <3>DPP-FAIL Configurator rejected configuration
FAIL dpp_two_initiators 0.073818 2021-01-18 07:17:38.497817
passed 0 test case(s)
skipped 0 test case(s)
failed tests: dpp_two_initiators
2021-01-18 07:17:38 ./run-tests.py ext_password_eap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ext_password_eap 1/1
Test: External password storage for EAP password
Starting AP wlan3
Connect STA wlan0 to AP
PASS ext_password_eap 0.973908 2021-01-18 07:17:39.606010
passed all 1 test case(s)
2021-01-18 07:17:39 ./run-tests.py fils_sk_pfs_26
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_sk_pfs_26 1/1
Test: FILS SK with PFS (DH group 26)
Starting AP as-erp
Starting AP wlan3 (old add_ap argument type)
Connect STA wlan0 to AP
PASS fils_sk_pfs_26 1.159497 2021-01-18 07:17:40.890428
passed all 1 test case(s)
2021-01-18 07:17:40 ./run-tests.py fst_sta_start_session_bad_session_id
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_sta_start_session_bad_session_id 1/1
Test: FST STA start session - bad session id
Starting AP wlan3 (old add_ap argument type)
Starting AP wlan4 (old add_ap argument type)
Connect STA wlan5 to AP
Connect STA wlan6 to AP
Success. Bad parameter was detected (Session ID)
PASS fst_sta_start_session_bad_session_id 2.137155 2021-01-18 07:17:43.152090
passed all 1 test case(s)
2021-01-18 07:17:43 ./run-tests.py grpform_go_neg_stopped
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform_go_neg_stopped 1/1
Test: GO Negotiation stopped after TX start
wlan1: Trying to discover peer 02:00:00:00:00:00
PASS grpform_go_neg_stopped 1.050386 2021-01-18 07:17:44.327727
passed all 1 test case(s)
2021-01-18 07:17:44 ./run-tests.py hapd_ctrl_eapol_reauth_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START hapd_ctrl_eapol_reauth_errors 1/1
Test: hostapd and EAPOL_REAUTH errors
Starting AP wlan3
PASS hapd_ctrl_eapol_reauth_errors 0.438384 2021-01-18 07:17:44.891352
passed all 1 test case(s)
2021-01-18 07:17:44 ./run-tests.py he80plus80
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he80plus80 1/1
Test: HE with 80+80 MHz channel width
Starting AP wlan3
Starting AP wlan4
Connect STA wlan1 to AP
PASS he80plus80 1.904203 2021-01-18 07:17:46.921377
passed all 1 test case(s)
2021-01-18 07:17:46 ./run-tests.py he_wifi_generation
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_wifi_generation 1/1
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan5 to AP
Country code at the end: 00
PASS he_wifi_generation 2.032662 2021-01-18 07:17:49.079441
passed all 1 test case(s)
2021-01-18 07:17:49 ./run-tests.py ibss_rsn_tkip
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ibss_rsn_tkip 1/1
Test: IBSS RSN with TKIP as the cipher
wlan0 waiting for IBSS start/join to complete
wlan1 waiting for IBSS start/join to complete
wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00
wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00
PASS ibss_rsn_tkip 8.793589 2021-01-18 07:17:57.998127
passed all 1 test case(s)
2021-01-18 07:17:58 ./run-tests.py mesh_secure_gcmp_gmac
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mesh_secure_gcmp_gmac 1/1
Test: Secure mesh with GCMP-128 and BIP-GMAC-128
PASS mesh_secure_gcmp_gmac 1.291765 2021-01-18 07:17:59.414325
passed all 1 test case(s)
2021-01-18 07:17:59 ./run-tests.py nfc_invalid_ndef_record
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_invalid_ndef_record 1/1
Test: Invalid NFC NDEF record handling
PASS nfc_invalid_ndef_record 0.042264 2021-01-18 07:17:59.580644
passed all 1 test case(s)
2021-01-18 07:17:59 ./run-tests.py nfc_wps_handover
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_wps_handover 1/1
Test: Connect to WPS AP with NFC connection handover
Starting AP wlan3
NFC connection handover
PASS nfc_wps_handover 1.328063 2021-01-18 07:18:01.032241
passed all 1 test case(s)
2021-01-18 07:18:01 ./run-tests.py obss_coex_report_handling2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START obss_coex_report_handling2 1/1
Test: Overlapping BSS scan report handling with obss_interval=1 and no overlap
Starting AP wlan3
Connect STA wlan0 to AP
PASS obss_coex_report_handling2 3.539684 2021-01-18 07:18:04.695368
passed all 1 test case(s)
2021-01-18 07:18:04 ./run-tests.py p2ps_adv_go_persistent_no_peer_entry
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2ps_adv_go_persistent_no_peer_entry 1/1
Test: P2PS advertisement as GO having persistent group (no peer entry)
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
PASS p2ps_adv_go_persistent_no_peer_entry 3.303068 2021-01-18 07:18:08.123259
passed all 1 test case(s)
2021-01-18 07:18:08 ./run-tests.py radius_acct_failure_sta_data
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_acct_failure_sta_data 1/1
Test: RADIUS Accounting and failure to get STA data
Starting AP wlan3
Connect STA wlan0 to AP
PASS radius_acct_failure_sta_data 0.828401 2021-01-18 07:18:09.075401
passed all 1 test case(s)
2021-01-18 07:18:09 ./run-tests.py radius_auth_unreachable2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_auth_unreachable2 1/1
Test: RADIUS Authentication server unreachable (2)
Starting AP wlan3
Connect STA wlan0 to AP
Checking for RADIUS retries
radiusAuthClientAccessRetransmissions: 1
PASS radius_auth_unreachable2 4.796399 2021-01-18 07:18:13.996467
passed all 1 test case(s)
2021-01-18 07:18:14 ./run-tests.py radius_protocol
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_protocol 1/1
Test: RADIUS Authentication protocol tests with a fake server
Starting AP wlan3
Connect STA wlan0 to AP
Received authentication request
Connect STA wlan0 to AP
Received authentication request
Add Message-Authenticator
Use incorrect RADIUS shared secret
Connect STA wlan0 to AP
Received authentication request
Add Message-Authenticator
Received authentication request
Add Message-Authenticator
Connect STA wlan0 to AP
Received authentication request
Add Message-Authenticator
Include two Message-Authenticator attributes
PASS radius_protocol 5.715058 2021-01-18 07:18:19.835399
passed all 1 test case(s)
2021-01-18 07:18:19 ./run-tests.py radius_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_psk 1/1
Test: WPA2 with PSK from RADIUS
Starting AP wlan3
Connect STA wlan0 to AP
Received authentication request
Connect STA wlan1 to AP
Received authentication request
PASS radius_psk 2.119514 2021-01-18 07:18:22.081536
passed all 1 test case(s)
2021-01-18 07:18:22 ./run-tests.py rrm_beacon_req_table_request_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START rrm_beacon_req_table_request_oom 1/1
Test: Beacon request - beacon table mode - request element OOM
Starting AP wlan3
Connect STA wlan0 to AP
PASS rrm_beacon_req_table_request_oom 1.106744 2021-01-18 07:18:23.317311
passed all 1 test case(s)
2021-01-18 07:18:23 ./run-tests.py rrm_link_measurement_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START rrm_link_measurement_oom 1/1
Test: Radio measurement request - link measurement OOM
Skip test case: Required RRM capabilities are not supported
SKIP rrm_link_measurement_oom 0.042312 2021-01-18 07:18:23.483872
passed all 0 test case(s)
skipped 1 test case(s)
2021-01-18 07:18:23 ./run-tests.py rrm_neighbor_rep_req
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START rrm_neighbor_rep_req 1/1
Test: wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST
Starting AP wlan3 (old add_ap argument type)
Starting AP wlan4 (old add_ap argument type)
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS rrm_neighbor_rep_req 1.496302 2021-01-18 07:18:25.105370
passed all 1 test case(s)
2021-01-18 07:18:25 ./run-tests.py rsn_preauth_processing
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START rsn_preauth_processing 1/1
Test: RSN pre-authentication processing on AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS rsn_preauth_processing 0.863815 2021-01-18 07:18:26.093218
passed all 1 test case(s)
2021-01-18 07:18:26 ./run-tests.py sae_pk_missing_ie
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pk_missing_ie 1/1
Test: SAE-PK and missing SAE-PK IE in confirm
Starting AP wlan3
Connect STA wlan0 to AP
PASS sae_pk_missing_ie 2.442482 2021-01-18 07:18:28.661495
passed all 1 test case(s)
2021-01-18 07:18:28 ./run-tests.py sae_pk_only
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pk_only 1/1
Test: SAE-PK only
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS sae_pk_only 1.267646 2021-01-18 07:18:30.054381
passed all 1 test case(s)
2021-01-18 07:18:30 ./run-tests.py scan_bss_expiration_count
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START scan_bss_expiration_count 1/1
Test: BSS entry expiration based on scan results without match
Starting AP wlan3
PASS scan_bss_expiration_count 0.827944 2021-01-18 07:18:31.006657
passed all 1 test case(s)
2021-01-18 07:18:31 ./run-tests.py scan_random_mac_connected
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START scan_random_mac_connected 1/1
Test: Random MAC address in scans while connected
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS scan_random_mac_connected 1.265154 2021-01-18 07:18:32.397285
passed all 1 test case(s)
2021-01-18 07:18:32 ./run-tests.py sigma_dut_ap_dpp_tcp_enrollee_init
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_dpp_tcp_enrollee_init 1/1
Test: sigma_dut DPP AP as TCP Enrollee/initiator
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_dpp_tcp_enrollee_init 0.11249 2021-01-18 07:18:32.634834
passed all 0 test case(s)
skipped 1 test case(s)
2021-01-18 07:18:32 ./run-tests.py sigma_dut_ap_ent_ft_eap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_ent_ft_eap 1/1
Test: sigma_dut controlled AP WPA-EAP and FT-EAP
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_ent_ft_eap 0.103295 2021-01-18 07:18:32.863293
passed all 0 test case(s)
skipped 1 test case(s)
2021-01-18 07:18:32 ./run-tests.py sigma_dut_ap_vht40
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_vht40 1/1
Test: sigma_dut controlled AP and VHT40
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_vht40 0.114717 2021-01-18 07:18:33.102823
passed all 0 test case(s)
skipped 1 test case(s)
2021-01-18 07:18:33 ./run-tests.py sigma_dut_client_privacy
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_client_privacy 1/1
Test: sigma_dut client privacy
Starting AP wlan3
Skip test case: sigma_dut not available
SKIP sigma_dut_client_privacy 0.42407 2021-01-18 07:18:33.651346
passed all 0 test case(s)
skipped 1 test case(s)
2021-01-18 07:18:33 ./run-tests.py sigma_dut_dpp_incompatible_roles_resp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_incompatible_roles_resp 1/1
Test: sigma_dut DPP roles incompatible (Responder)
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_incompatible_roles_resp 0.044547 2021-01-18 07:18:33.820884
passed all 0 test case(s)
skipped 1 test case(s)
2021-01-18 07:18:33 ./run-tests.py suite_b_192_rsa_ecdhe_radius_rsa2048_client
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START suite_b_192_rsa_ecdhe_radius_rsa2048_client 1/1
Test: Suite B 192-bit level and RSA (ECDHE) and RSA2048 client
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
PASS suite_b_192_rsa_ecdhe_radius_rsa2048_client 1.304394 2021-01-18 07:18:35.251981
passed all 1 test case(s)
2021-01-18 07:18:35 ./run-tests.py tnc_fast
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START tnc_fast 1/1
Test: TNC FAST
Starting AP wlan3
Connect STA wlan0 to AP
PASS tnc_fast 0.847054 2021-01-18 07:18:36.223233
passed all 1 test case(s)
2021-01-18 07:18:36 ./run-tests.py wep_shared_key_auth
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wep_shared_key_auth 1/1
Test: WEP Shared Key authentication
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS wep_shared_key_auth 1.393089 2021-01-18 07:18:37.743450
passed all 1 test case(s)
2021-01-18 07:18:37 ./run-tests.py wpa2_ocv_vht80plus80
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpa2_ocv_vht80plus80 1/1
Test: OCV with VHT80+80 channel
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS wpa2_ocv_vht80plus80 17.401307 2021-01-18 07:18:55.269855
passed all 1 test case(s)
2021-01-18 07:18:55 ./run-tests.py wpas_ctrl_dup_network_global
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_dup_network_global 1/1
Test: wpa_supplicant ctrl_iface DUP_NETWORK (global)
Starting AP wlan3
Connect STA wlan0 to AP
PASS wpas_ctrl_dup_network_global 0.904912 2021-01-18 07:18:56.299437
passed all 1 test case(s)
2021-01-18 07:18:56 ./run-tests.py wpas_ctrl_get_capability
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_get_capability 1/1
Test: wpa_supplicant ctrl_iface GET_CAPABILITY
GET_CAPABILITY key_mgmt iftype=STATION: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=AP_VLAN: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=AP: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=P2P_GO: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=P2P_CLIENT: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=P2P_DEVICE: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=MESH: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=IBSS: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=NAN: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE']
GET_CAPABILITY key_mgmt iftype=UNKNOWN: None
PASS wpas_ctrl_get_capability 0.04336 2021-01-18 07:18:56.467729
passed all 1 test case(s)
2021-01-18 07:18:56 ./run-tests.py wpas_ctrl_set_lci_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_set_lci_errors 1/1
Test: wpa_supplicant SET lci error cases
PASS wpas_ctrl_set_lci_errors 0.084169 2021-01-18 07:18:56.702036
passed all 1 test case(s)
2021-01-18 07:18:56 ./run-tests.py wps_ext_cred_proto_encr_type_missing
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_cred_proto_encr_type_missing 1/1
Test: WPS and Credential: Encr Type missing
Starting AP wlan3
PASS wps_ext_cred_proto_encr_type_missing 0.93755 2021-01-18 07:18:57.772048
passed all 1 test case(s)
2021-01-18 07:18:57 ./run-tests.py wps_ext_cred_proto_network_key_missing_open
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_cred_proto_network_key_missing_open 1/1
Test: WPS and Credential: Network Key missing (open)
Starting AP wlan3
PASS wps_ext_cred_proto_network_key_missing_open 0.927873 2021-01-18 07:18:58.824248
passed all 1 test case(s)
2021-01-18 07:18:58 ./run-tests.py wps_ext_proto_ack_m3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_proto_ack_m3 1/1
Test: WPS and ACK M3
Starting AP wlan3
PASS wps_ext_proto_ack_m3 1.028458 2021-01-18 07:18:59.977247
passed all 1 test case(s)
2021-01-18 07:18:59 ./run-tests.py wps_ext_proto_ack_m3_no_r_nonce
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_proto_ack_m3_no_r_nonce 1/1
Test: WPS and ACK M3 missing R-Nonce
Starting AP wlan3
PASS wps_ext_proto_ack_m3_no_r_nonce 1.027771 2021-01-18 07:19:01.129276
passed all 1 test case(s)
2021-01-18 07:19:01 ./stop.sh
wpa_supplicant/hostapd/hlr_auc_gw did not exit - try to force them to die



To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Oliver Sang


View attachment "config-5.10.0-rc7-g1180cd89a7ca" of type "text/plain" (171102 bytes)

View attachment "job-script" of type "text/plain" (5502 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (96012 bytes)

View attachment "hwsim" of type "text/plain" (44278 bytes)

View attachment "job.yaml" of type "text/plain" (4478 bytes)

View attachment "reproduce" of type "text/plain" (3457 bytes)

Powered by blists - more mailing lists