lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20210204073451.GD17757@xsang-OptiPlex-9020>
Date:   Thu, 4 Feb 2021 15:34:52 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Johannes Berg <johannes@...solutions.net>
Cc:     0day robot <lkp@...el.com>,
        Chaitanya Tata <chaitanya.tata@...wireless.com>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        linux-wireless@...r.kernel.org,
        Johannes Berg <johannes.berg@...el.com>
Subject: [cfg80211]  12f9a570c0: hwsim.ap_csa_2_switches_count_1.fail


Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 12f9a570c0a654c6abc9e189e2227a1eb2d5d99e ("cfg80211: Skip key deletion for open associations")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git Johannes-Berg/cfg80211-fix-netdev-registration-deadlock/20210202-092757


in testcase: hwsim
version: hwsim-x86_64-537ab94-1_20210101
with following parameters:

	test: group-33
	ucode: 0x21



on test machine: 4 threads Intel(R) Core(TM) i3-3220 CPU @ 3.30GHz with 8G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):




If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>

2021-02-03 00:04:54 export USER=root
2021-02-03 00:04:54 ./build.sh
Building TNC testing tools
Building wlantest
Building hs20-osu-client
Building hostapd
Building wpa_supplicant
2021-02-03 00:06:06 ./start.sh
2021-02-03 00:06:06 ./run-tests.py ap_acs_hw_mode_any_5ghz
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_acs_hw_mode_any_5ghz 1/1
Test: Automatic channel selection with hw_mode=any and 5 GHz
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Connect STA wlan0 to AP
Country code at the end: 00
PASS ap_acs_hw_mode_any_5ghz 12.909362 2021-02-03 00:06:20.765348
passed all 1 test case(s)
2021-02-03 00:06:20 ./run-tests.py ap_csa_2_switches_count_1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_csa_2_switches_count_1 1/1
Test: AP Channel Switch, two switches with count 1
Starting AP wlan3
Connect STA wlan0 to AP
dev2->dev1 unicast data delivery failed
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_csa.py", line 139, in test_ap_csa_2_switches_count_1
    hwsim_utils.test_connectivity(dev[0], ap)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity
    raise Exception(last_err)
Exception: dev2->dev1 unicast data delivery failed
FAIL ap_csa_2_switches_count_1 5.255997 2021-02-03 00:06:26.179210
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_csa_2_switches_count_1
2021-02-03 00:06:26 ./run-tests.py ap_ft_pmf_over_ds
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_pmf_over_ds 1/1
Test: WPA2-PSK-FT AP over DS with PMF
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
Roam back to the first AP
PASS ap_ft_pmf_over_ds 0.668993 2021-02-03 00:06:27.012678
passed all 1 test case(s)
2021-02-03 00:06:27 ./run-tests.py ap_ft_sae_ptk_rekey1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_sae_ptk_rekey1 1/1
Test: WPA2-PSK-FT-SAE AP and PTK rekey triggered by station
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
PASS ap_ft_sae_ptk_rekey1 1.487963 2021-02-03 00:06:28.658113
passed all 1 test case(s)
2021-02-03 00:06:28 ./run-tests.py ap_ft_sae_rsnxe_used_mismatch2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_sae_rsnxe_used_mismatch2 1/1
Test: FT-SAE AP and unexpected RSNXE Used in ReassocResp
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
PASS ap_ft_sae_rsnxe_used_mismatch2 0.754793 2021-02-03 00:06:29.569400
passed all 1 test case(s)
2021-02-03 00:06:29 ./run-tests.py ap_ft_skip_prune_assoc2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_skip_prune_assoc2 1/1
Test: WPA2-PSK-FT AP with skip_prune_assoc (disable full_ap_client_state)
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
Roam back to the first AP
PASS ap_ft_skip_prune_assoc2 0.496598 2021-02-03 00:06:30.222631
passed all 1 test case(s)
2021-02-03 00:06:30 ./run-tests.py ap_hs20_external_selection
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_external_selection 1/1
Test: Hotspot 2.0 connection using external network selection and creation
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_hs20_external_selection 0.268145 2021-02-03 00:06:30.643985
passed all 1 test case(s)
2021-02-03 00:06:30 ./run-tests.py ap_hs20_fetch_osu_proto
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_fetch_osu_proto 1/1
Test: Hotspot 2.0 OSU provider and protocol testing
Starting AP wlan3
PASS ap_hs20_fetch_osu_proto 1.204107 2021-02-03 00:06:32.004099
passed all 1 test case(s)
2021-02-03 00:06:32 ./run-tests.py ap_hs20_min_bandwidth_and_roaming_partner_preference
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_min_bandwidth_and_roaming_partner_preference 1/1
Test: Hotspot 2.0 and minimum bandwidth with roaming partner preference
Starting AP wlan3
Starting AP wlan4
PASS ap_hs20_min_bandwidth_and_roaming_partner_preference 0.64994 2021-02-03 00:06:32.814619
passed all 1 test case(s)
2021-02-03 00:06:32 ./run-tests.py ap_hs20_min_bandwidth_no_wan_metrics
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_min_bandwidth_no_wan_metrics 1/1
Test: Hotspot 2.0 network selection with min bandwidth but no WAN Metrics
Starting AP wlan3
PASS ap_hs20_min_bandwidth_no_wan_metrics 0.180371 2021-02-03 00:06:33.156209
passed all 1 test case(s)
2021-02-03 00:06:33 ./run-tests.py ap_hs20_network_preference2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_network_preference2 1/1
Test: Hotspot 2.0 network selection with preferred credential
Starting AP wlan4
Starting AP wlan3
PASS ap_hs20_network_preference2 0.510504 2021-02-03 00:06:33.826628
passed all 1 test case(s)
2021-02-03 00:06:33 ./run-tests.py ap_hs20_osen
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_osen 1/1
Test: Hotspot 2.0 OSEN connection
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan5 to AP
PASS ap_hs20_osen 0.476851 2021-02-03 00:06:34.462415
passed all 1 test case(s)
2021-02-03 00:06:34 ./run-tests.py ap_hs20_proxyarp_disable_dgaf
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_proxyarp_disable_dgaf 1/1
Test: Hotspot 2.0 and ProxyARP with DGAF disabled
Starting AP wlan3
Connect STA wlan1 to AP
After connect: ['192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT']
After disconnect: []
PASS ap_hs20_proxyarp_disable_dgaf 1.208 2021-02-03 00:06:35.823218
passed all 1 test case(s)
2021-02-03 00:06:35 ./run-tests.py ap_ht40_csa3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht40_csa3 1/1
Test: HT with 40 MHz channel width and CSA
Starting AP wlan3
Connect STA wlan0 to AP
dev2->dev1 unicast data delivery failed
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ht.py", line 1142, in test_ap_ht40_csa3
    hwsim_utils.test_connectivity(dev[0], hapd)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity
    raise Exception(last_err)
Exception: dev2->dev1 unicast data delivery failed
FAIL ap_ht40_csa3 5.677041 2021-02-03 00:06:41.659603
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_ht40_csa3
2021-02-03 00:06:41 ./run-tests.py ap_ht40_scan_conflict
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht40_scan_conflict 1/1
Test: HT40 co-ex scan conflict
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_ht40_scan_conflict 2.874248 2021-02-03 00:06:44.693659
passed all 1 test case(s)
2021-02-03 00:06:44 ./run-tests.py ap_open_unexpected_assoc_event
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_unexpected_assoc_event 1/1
Test: AP with open mode and unexpected association event
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_unexpected_assoc_event 0.563543 2021-02-03 00:06:45.417773
passed all 1 test case(s)
2021-02-03 00:06:45 ./run-tests.py ap_pmf_sta_sa_query_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query_oom 1/1
Test: WPA2-PSK AP with station using SA Query (OOM)
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query_oom 0.375688 2021-02-03 00:06:45.951757
passed all 1 test case(s)
2021-02-03 00:06:45 ./run-tests.py ap_roam_wpa2_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_wpa2_psk 1/1
Test: Roam between two WPA2-PSK APs
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_wpa2_psk 14.776256 2021-02-03 00:07:00.883474
passed all 1 test case(s)
2021-02-03 00:07:00 ./run-tests.py ap_vht80_csa
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_csa 1/1
Test: VHT with 80 MHz channel width and CSA
Starting AP wlan3
Connect STA wlan0 to AP
Country code at the end: 00
dev2->dev1 unicast data delivery failed
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 739, in test_ap_vht80_csa
    hwsim_utils.test_connectivity(dev[0], hapd)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity
    raise Exception(last_err)
Exception: dev2->dev1 unicast data delivery failed
FAIL ap_vht80_csa 5.77785 2021-02-03 00:07:06.818475
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_vht80_csa
2021-02-03 00:07:06 ./run-tests.py ap_wowlan_triggers
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wowlan_triggers 1/1
Test: AP with wowlan_triggers
Starting AP wlan3
Connect STA wlan0 to AP
dev2->dev1 unicast data delivery failed
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_params.py", line 845, in test_ap_wowlan_triggers
    hwsim_utils.test_connectivity(dev[0], hapd)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity
    raise Exception(last_err)
Exception: dev2->dev1 unicast data delivery failed
FAIL ap_wowlan_triggers 5.259493 2021-02-03 00:07:12.239506
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_wowlan_triggers
2021-02-03 00:07:12 ./run-tests.py ap_wpa2_eap_pwd_salt_sha1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_pwd_salt_sha1 1/1
Test: WPA2-Enterprise connection using EAP-pwd and salted password SHA-1
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_pwd_salt_sha1 0.235241 2021-02-03 00:07:12.640604
passed all 1 test case(s)
2021-02-03 00:07:12 ./run-tests.py ap_wpa2_eap_ttls_dh_params_invalid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_dh_params_invalid 1/1
Test: EAP-TLS server and invalid dhparams file
Starting AP wlan3
PASS ap_wpa2_eap_ttls_dh_params_invalid 0.055963 2021-02-03 00:07:12.855433
passed all 1 test case(s)
2021-02-03 00:07:12 ./run-tests.py ap_wpa2_eap_ttls_eap_md5_server_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_eap_md5_server_oom 1/1
Test: WPA2-Enterprise connection using EAP-TTLS/EAP-MD5 - server OOM
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_eap_md5_server_oom 0.339437 2021-02-03 00:07:13.351569
passed all 1 test case(s)
2021-02-03 00:07:13 ./run-tests.py ap_wpa2_eap_unexpected_wep_eapol_key
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_unexpected_wep_eapol_key 1/1
Test: WPA2-Enterprise connection and unexpected WEP EAPOL-Key
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_unexpected_wep_eapol_key 0.23947 2021-02-03 00:07:13.746338
passed all 1 test case(s)
2021-02-03 00:07:13 ./run-tests.py ap_wpa2_psk_incorrect_passphrase
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_incorrect_passphrase 1/1
Test: WPA2-PSK AP and station using incorrect passphrase
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_psk_incorrect_passphrase 10.444571 2021-02-03 00:07:24.348540
passed all 1 test case(s)
2021-02-03 00:07:24 ./run-tests.py ap_wpa2_psk_supp_proto_gtk_tx_bit_workaround
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_supp_proto_gtk_tx_bit_workaround 1/1
Test: WPA2-PSK supplicant protocol testing: GTK TX bit workaround
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_psk_supp_proto_gtk_tx_bit_workaround 0.233467 2021-02-03 00:07:24.741161
passed all 1 test case(s)
2021-02-03 00:07:24 ./run-tests.py ap_wpa2_tdls_diff_rsnie
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_tdls_diff_rsnie 1/1
Test: TDLS with different RSN IEs
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Teardown TDLS
PASS ap_wpa2_tdls_diff_rsnie 3.017181 2021-02-03 00:07:27.916099
passed all 1 test case(s)
2021-02-03 00:07:27 ./run-tests.py ap_wps_and_bss_limit
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_and_bss_limit 1/1
Test: WPS and wpa_supplicant BSS entry limit
Starting AP wlan3
Starting AP wlan4
PASS ap_wps_and_bss_limit 4.243865 2021-02-03 00:07:32.321394
passed all 1 test case(s)
2021-02-03 00:07:32 ./run-tests.py ap_wps_authenticator_mismatch_m2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_authenticator_mismatch_m2 1/1
Test: WPS and Authenticator attribute mismatch in M2
Starting AP wlan3
PASS ap_wps_authenticator_mismatch_m2 0.262258 2021-02-03 00:07:32.744824
passed all 1 test case(s)
2021-02-03 00:07:32 ./run-tests.py ap_wps_er_http_proto_upnp_info_no_device_type
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_http_proto_upnp_info_no_device_type 1/1
Test: WPS ER HTTP protocol testing - No deviceType in UPnP info
HTTP server received: GET /foo.xml HTTP/1.1
HTTP header: Cache-Control: no-cache
HTTP header: Pragma: no-cache
HTTP header: Accept: text/xml, application/xml
HTTP header: User-Agent: wpa_supplicant
HTTP header: Host: 127.0.0.1:12345
PASS ap_wps_er_http_proto_upnp_info_no_device_type 2.038222 2021-02-03 00:07:34.943100
passed all 1 test case(s)
2021-02-03 00:07:34 ./run-tests.py ap_wps_er_init_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_init_oom 1/1
Test: WPS ER and OOM during init
PASS ap_wps_er_init_oom 0.044205 2021-02-03 00:07:35.146994
passed all 1 test case(s)
2021-02-03 00:07:35 ./run-tests.py ap_wps_er_ssdp_proto
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_ssdp_proto 1/1
Test: WPS ER SSDP protocol testing
PASS ap_wps_er_ssdp_proto 2.33919 2021-02-03 00:07:37.642445
passed all 1 test case(s)
2021-02-03 00:07:37 ./run-tests.py ap_wps_m5_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_m5_oom 1/1
Test: WPS and OOM for M5 on STA
Starting AP wlan3
PASS ap_wps_m5_oom 0.463147 2021-02-03 00:07:38.266681
passed all 1 test case(s)
2021-02-03 00:07:38 ./run-tests.py ap_wps_new_version_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_new_version_ap 1/1
Test: WPS compatibility with new version number on the AP
Starting AP wlan3
WPS provisioning step
PASS ap_wps_new_version_ap 0.34721 2021-02-03 00:07:38.773379
passed all 1 test case(s)
2021-02-03 00:07:38 ./run-tests.py autogo_noa
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START autogo_noa 1/1
Test: P2P autonomous GO and NoA
Start autonomous GO wlan0
Connect STA wlan1 to AP
PASS autogo_noa 0.273418 2021-02-03 00:07:39.204520
passed all 1 test case(s)
2021-02-03 00:07:39 ./run-tests.py bgscan_learn_beacon_loss
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START bgscan_learn_beacon_loss 1/1
Test: bgscan_simple and beacon loss
Starting AP wlan3
Connect STA wlan0 to AP
PASS bgscan_learn_beacon_loss 1.483879 2021-02-03 00:07:40.845941
passed all 1 test case(s)
2021-02-03 00:07:40 ./run-tests.py dbus_wps_cancel
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_wps_cancel 1/1
Test: D-Bus WPS Cancel operation
No dbus module available
Skip test case: No dbus module available
SKIP dbus_wps_cancel 0.035014 2021-02-03 00:07:41.041998
passed all 0 test case(s)
skipped 1 test case(s)
2021-02-03 00:07:41 ./run-tests.py dfs_radar_chanlist_vht20
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dfs_radar_chanlist_vht20 1/1
Test: DFS chanlist when radar is detected and VHT40 configured
Starting AP wlan3 on DFS channel
Starting AP wlan3
Trigger a simulated radar event
Connect STA wlan0 to AP
Country code at the end: 00
PASS dfs_radar_chanlist_vht20 4.180751 2021-02-03 00:07:45.385070
passed all 1 test case(s)
2021-02-03 00:07:45 ./run-tests.py dpp_auto_connect_2_ver1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_auto_connect_2_ver1 1/1
Test: DPP and auto connect (2; AP and STA using ver 1)
Starting AP wlan3
PASS dpp_auto_connect_2_ver1 5.955091 2021-02-03 00:07:51.497018
passed all 1 test case(s)
2021-02-03 00:07:51 ./run-tests.py dpp_config_connector_error_invalid_timestamp_date
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_connector_error_invalid_timestamp_date 1/1
Test: DPP Config Object connector error - invalid timestamp date
Skip test case: OpenSSL python method not available
SKIP dpp_config_connector_error_invalid_timestamp_date 0.033603 2021-02-03 00:07:51.689628
passed all 0 test case(s)
skipped 1 test case(s)
2021-02-03 00:07:51 ./run-tests.py dpp_config_dpp_override_prime256v1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_dpp_override_prime256v1 1/1
Test: DPP Config Object override (P-256)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_dpp_override_prime256v1 2.065779 2021-02-03 00:07:53.917437
passed all 1 test case(s)
2021-02-03 00:07:53 ./run-tests.py dpp_config_jwk_error_no_y
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_jwk_error_no_y 1/1
Test: DPP Config Object JWK error - no y
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_jwk_error_no_y 0.055721 2021-02-03 00:07:54.128549
passed all 1 test case(s)
2021-02-03 00:07:54 ./run-tests.py dpp_config_legacy_gen
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_legacy_gen 1/1
Test: Generate DPP Config Object for legacy network
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_legacy_gen 0.053415 2021-02-03 00:07:54.337242
passed all 1 test case(s)
2021-02-03 00:07:54 ./run-tests.py dpp_proto_auth_conf_invalid_i_bootstrap_key
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_conf_invalid_i_bootstrap_key 1/1
Test: DPP protocol testing - invalid I-bootstrap key in Auth Conf
PASS dpp_proto_auth_conf_invalid_i_bootstrap_key 0.048936 2021-02-03 00:07:54.544633
passed all 1 test case(s)
2021-02-03 00:07:54 ./run-tests.py dpp_proto_auth_conf_no_wrapped_data
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_conf_no_wrapped_data 1/1
Test: DPP protocol testing - no Wrapped Data in Auth Conf
PASS dpp_proto_auth_conf_no_wrapped_data 0.047731 2021-02-03 00:07:54.752618
passed all 1 test case(s)
2021-02-03 00:07:54 ./run-tests.py dpp_proto_auth_resp_i_nonce_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_resp_i_nonce_mismatch 1/1
Test: DPP protocol testing - I-nonce mismatch in Auth Resp
PASS dpp_proto_auth_resp_i_nonce_mismatch 0.148387 2021-02-03 00:07:55.060516
passed all 1 test case(s)
2021-02-03 00:07:55 ./run-tests.py dpp_qr_code_auth_mutual2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_qr_code_auth_mutual2 1/1
Test: DPP QR Code and authentication exchange (mutual2)
dev0 displays QR Code
dev1 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
dev0 scans QR Code
PASS dpp_qr_code_auth_mutual2 3.062129 2021-02-03 00:07:58.280291
passed all 1 test case(s)
2021-02-03 00:07:58 ./run-tests.py dpp_qr_code_auth_mutual_p_521
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_qr_code_auth_mutual_p_521 1/1
Test: DPP QR Code and authentication exchange (mutual, autogen P-521)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
dev0 scans QR Code
PASS dpp_qr_code_auth_mutual_p_521 1.060108 2021-02-03 00:07:59.499497
passed all 1 test case(s)
2021-02-03 00:07:59 ./run-tests.py dpp_qr_code_auth_rand_mac_addr
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_qr_code_auth_rand_mac_addr 1/1
Test: DPP QR Code and authentication exchange (rand_mac_addr=1)
Skip test case: Driver does not support random GAS TA
SKIP dpp_qr_code_auth_rand_mac_addr 0.035043 2021-02-03 00:07:59.693564
passed all 0 test case(s)
skipped 1 test case(s)
2021-02-03 00:07:59 ./run-tests.py eap_teap_basic_password_auth_user_and_machine_no_machine
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_teap_basic_password_auth_user_and_machine_no_machine 1/1
Test: EAP-TEAP with Basic-Password-Auth using user and machine credentials (no machine)
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_teap_basic_password_auth_user_and_machine_no_machine 0.212537 2021-02-03 00:08:00.068075
passed all 1 test case(s)
2021-02-03 00:08:00 ./run-tests.py eap_teap_tls_cs_sha1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_teap_tls_cs_sha1 1/1
Test: EAP-TEAP with TLS cipher suite that uses SHA-1
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_teap_tls_cs_sha1 0.215339 2021-02-03 00:08:00.441304
passed all 1 test case(s)
2021-02-03 00:08:00 ./run-tests.py erp_local_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START erp_local_errors 1/1
Test: ERP and local error cases
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS erp_local_errors 1.654486 2021-02-03 00:08:02.252257
passed all 1 test case(s)
2021-02-03 00:08:02 ./run-tests.py erp_radius_eap_tls_v13
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START erp_radius_eap_tls_v13 1/1
Test: ERP enabled on RADIUS server and peer using EAP-TLS v1.3
Starting AP as-erp
Starting AP wlan3
Connect STA wlan0 to AP
PASS erp_radius_eap_tls_v13 0.283183 2021-02-03 00:08:02.692945
passed all 1 test case(s)
2021-02-03 00:08:02 ./run-tests.py fst_ap_ack_request_with_bad_fsts_id
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_ack_request_with_bad_fsts_id 1/1
Test: FST AP ack request with bad fsts id
Starting AP wlan3 (old add_ap argument type)
Starting AP wlan4 (old add_ap argument type)
Connect STA wlan5 to AP
Connect STA wlan6 to AP
Success. Bad scenario was handled correctly (Ack request received with bad fsts_id)
PASS fst_ap_ack_request_with_bad_fsts_id 5.522014 2021-02-03 00:08:08.372576
passed all 1 test case(s)
2021-02-03 00:08:08 ./run-tests.py fst_ap_initiate_session_response_with_zero_llt
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_initiate_session_response_with_zero_llt 1/1
Test: FST AP initiate session - zero llt
Starting AP wlan3 (old add_ap argument type)
Starting AP wlan4 (old add_ap argument type)
Connect STA wlan5 to AP
Connect STA wlan6 to AP
Success. Bad parameter was detected (Response with zero llt)
PASS fst_ap_initiate_session_response_with_zero_llt 0.486703 2021-02-03 00:08:09.019710
passed all 1 test case(s)
2021-02-03 00:08:09 ./run-tests.py fst_ap_tear_down_session_bad_fsts_id
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_tear_down_session_bad_fsts_id 1/1
Test: FST AP tear down session - bad fsts id
Starting AP wlan3 (old add_ap argument type)
Starting AP wlan4 (old add_ap argument type)
Connect STA wlan5 to AP
Connect STA wlan6 to AP
Success. Bad parameter was detected (Bad fsts_id)
PASS fst_ap_tear_down_session_bad_fsts_id 5.495795 2021-02-03 00:08:14.675082
passed all 1 test case(s)
2021-02-03 00:08:14 ./run-tests.py gas_anqp_address3_ap_non_compliant
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START gas_anqp_address3_ap_non_compliant 1/1
Test: GAS/ANQP query using IEEE 802.11 non-compliant Address 3 (AP)
Starting AP wlan3
PASS gas_anqp_address3_ap_non_compliant 0.443631 2021-02-03 00:08:15.274815
passed all 1 test case(s)
2021-02-03 00:08:15 ./run-tests.py gas_anqp_address3_assoc
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START gas_anqp_address3_assoc 1/1
Test: GAS/ANQP query using IEEE 802.11 compliant Address 3 value when associated
Starting AP wlan3
Connect STA wlan0 to AP
PASS gas_anqp_address3_assoc 0.536333 2021-02-03 00:08:15.968907
passed all 1 test case(s)
2021-02-03 00:08:15 ./run-tests.py gas_stop_fetch_anqp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START gas_stop_fetch_anqp 1/1
Test: Stop FETCH_ANQP operation
Starting AP wlan3
PASS gas_stop_fetch_anqp 0.148113 2021-02-03 00:08:16.272233
passed all 1 test case(s)
2021-02-03 00:08:16 ./run-tests.py grpform_force_chan_conflict
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform_force_chan_conflict 1/1
Test: P2P group formation fails due to forced channel mismatch
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
PASS grpform_force_chan_conflict 1.543236 2021-02-03 00:08:17.974097
passed all 1 test case(s)
2021-02-03 00:08:18 ./run-tests.py grpform_no_wsc_done
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform_no_wsc_done 1/1
Test: P2P group formation with WSC-Done not sent
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Drop WSC_Done
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Drop WSC_Done
PASS grpform_no_wsc_done 1.468339 2021-02-03 00:08:19.599329
passed all 1 test case(s)
2021-02-03 00:08:19 ./run-tests.py he160_no_dfs_120_minus
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he160_no_dfs_120_minus 1/1
Test: HE with 160 MHz channel width and no DFS (120 minus)
Starting AP wlan3
Connect STA wlan0 to AP
Country code at the end: 00
PASS he160_no_dfs_120_minus 0.789011 2021-02-03 00:08:20.543017
passed all 1 test case(s)
2021-02-03 00:08:20 ./run-tests.py he80_invalid2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he80_invalid2 1/1
Test: HE with invalid 80 MHz channel configuration (seg0)
Starting AP wlan3
Country code at the end: 00
PASS he80_invalid2 1.072566 2021-02-03 00:08:21.769668
passed all 1 test case(s)
2021-02-03 00:08:21 ./run-tests.py he_params
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_params 1/1
Test: HE AP parameters
Starting AP wlan3
Connect STA wlan0 to AP
PASS he_params 0.227878 2021-02-03 00:08:22.153712
passed all 1 test case(s)
2021-02-03 00:08:22 ./run-tests.py ieee8021x_held
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ieee8021x_held 1/1
Test: IEEE 802.1X and HELD state
Starting AP wlan3
Connect STA wlan0 to AP
PASS ieee8021x_held 3.384748 2021-02-03 00:08:25.697686
passed all 1 test case(s)
2021-02-03 00:08:25 ./run-tests.py macsec_psk_shorter_ckn2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START macsec_psk_shorter_ckn2 1/1
Test: MACsec PSK (shorter CKN, unaligned)
Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC)
SKIP macsec_psk_shorter_ckn2 0.075782 2021-02-03 00:08:25.931948
passed all 0 test case(s)
skipped 1 test case(s)
2021-02-03 00:08:25 ./run-tests.py mbo_non_pref_chan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mbo_non_pref_chan 1/1
Test: MBO non-preferred channel list
Starting AP wlan3
Connect STA wlan0 to AP
PASS mbo_non_pref_chan 0.587402 2021-02-03 00:08:26.695997
passed all 1 test case(s)
2021-02-03 00:08:26 ./run-tests.py mbo_sta_supp_op_classes
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mbo_sta_supp_op_classes 1/1
Test: MBO STA supported operating classes
Starting AP wlan3
Connect STA wlan0 to AP
PASS mbo_sta_supp_op_classes 0.178048 2021-02-03 00:08:27.033942
passed all 1 test case(s)
2021-02-03 00:08:27 ./run-tests.py mbo_supp_oper_classes_us_disable_vht
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mbo_supp_oper_classes_us_disable_vht 1/1
Test: MBO and supported operating classes (US) - disable_vht
Starting AP wlan4
Country: US
Connect STA wlan0 to AP
Country code at the end (1): US
Country code at the end (2): 00
Country code at the end (3): 00
PASS mbo_supp_oper_classes_us_disable_vht 0.680999 2021-02-03 00:08:27.873065
passed all 1 test case(s)
2021-02-03 00:08:27 ./run-tests.py mesh_forwarding
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mesh_forwarding 1/1
Test: Mesh with two stations that can't reach each other directly
PASS mesh_forwarding 1.222768 2021-02-03 00:08:29.250539
passed all 1 test case(s)
2021-02-03 00:08:29 ./run-tests.py nfc_p2p_static_handover_join_tagdev_go
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_p2p_static_handover_join_tagdev_go 1/1
Test: NFC static handover to join a P2P group (NFC Tag device is the GO)
Start autonomous GO
Write NFC Tag on the GO
Read NFC Tag on a P2P Device to join a group
Read NFC Tag on another P2P Device to join a group
PASS nfc_p2p_static_handover_join_tagdev_go 1.93676 2021-02-03 00:08:31.340844
passed all 1 test case(s)
2021-02-03 00:08:31 ./run-tests.py p2p_channel_5ghz_only
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_channel_5ghz_only 1/1
Test: P2P GO start with only 5 GHz band allowed
Start autonomous GO wlan0
Country code at the end: 00
PASS p2p_channel_5ghz_only 0.389332 2021-02-03 00:08:31.885213
passed all 1 test case(s)
2021-02-03 00:08:31 ./run-tests.py p2p_go_invite
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_go_invite 1/1
Test: P2P GO inviting a client to join
Generate BSS table entry for old group
Discover peer
wlan0: Trying to discover peer 02:00:00:00:01:00
Start GO on non-social channel
Invite peer to join the group
Join the group
wlan1: Trying to discover peer 02:00:00:00:00:00
Client connected
Terminate group
PASS p2p_go_invite 8.152832 2021-02-03 00:08:40.194870
passed all 1 test case(s)
2021-02-03 00:08:40 ./run-tests.py p2p_msg_go_neg_req_reject
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_msg_go_neg_req_reject 1/1
Test: P2P protocol tests for user reject incorrectly in GO Neg Req
wlan1: Trying to discover peer 02:00:00:00:00:00
PASS p2p_msg_go_neg_req_reject 1.433934 2021-02-03 00:08:41.788539
passed all 1 test case(s)
2021-02-03 00:08:41 ./run-tests.py p2ps_exact_search_srvinfo
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2ps_exact_search_srvinfo 1/1
Test: P2PS exact service request with service info
PASS p2ps_exact_search_srvinfo 0.239895 2021-02-03 00:08:42.184485
passed all 1 test case(s)
2021-02-03 00:08:42 ./run-tests.py pmksa_cache_and_ptk_rekey_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START pmksa_cache_and_ptk_rekey_ap 1/1
Test: PMKSA caching and PTK rekey triggered by AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
Roam to AP2
Roam back to AP1
PASS pmksa_cache_and_ptk_rekey_ap 2.564103 2021-02-03 00:08:44.903896
passed all 1 test case(s)
2021-02-03 00:08:44 ./run-tests.py pmksa_cache_preauth
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START pmksa_cache_preauth 1/1
Test: RSN pre-authentication to generate PMKSA cache entry
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS pmksa_cache_preauth 0.748757 2021-02-03 00:08:45.809016
passed all 1 test case(s)
2021-02-03 00:08:45 ./run-tests.py radius_acct_pmksa_caching
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_acct_pmksa_caching 1/1
Test: RADIUS Accounting with PMKSA caching
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS radius_acct_pmksa_caching 0.516278 2021-02-03 00:08:46.481772
passed all 1 test case(s)
2021-02-03 00:08:46 ./run-tests.py sae_and_psk_transition_disable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_and_psk_transition_disable 1/1
Test: SAE and PSK transition disable indication
Starting AP wlan3
Connect STA wlan0 to AP
PASS sae_and_psk_transition_disable 0.291366 2021-02-03 00:08:46.933173
passed all 1 test case(s)
2021-02-03 00:08:46 ./run-tests.py sae_h2e_rsnxe_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_h2e_rsnxe_mismatch 1/1
Test: SAE H2E and RSNXE mismatch in EAPOL-Key msg 2/4
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS sae_h2e_rsnxe_mismatch 0.374933 2021-02-03 00:08:47.464601
passed all 1 test case(s)
2021-02-03 00:08:47 ./run-tests.py scan_abort
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START scan_abort 1/1
Test: Aborting a full scan
PASS scan_abort 0.0409 2021-02-03 00:08:47.664114
passed all 1 test case(s)
2021-02-03 00:08:47 ./run-tests.py scan_for_auth_fail
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START scan_for_auth_fail 1/1
Test: cfg80211 workaround with scan-for-auth failing
Starting AP wlan3
Connect STA wlan0 to AP
PASS scan_for_auth_fail 0.362718 2021-02-03 00:08:48.181330
passed all 1 test case(s)
2021-02-03 00:08:48 ./run-tests.py sigma_dut_ap_sae_pk_misbehavior
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_sae_pk_misbehavior 1/1
Test: sigma_dut controlled AP using SAE-PK misbehavior
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_sae_pk_misbehavior 0.062682 2021-02-03 00:08:48.401901
passed all 0 test case(s)
skipped 1 test case(s)
2021-02-03 00:08:48 ./run-tests.py sigma_dut_dpp_nfc_handover_requestor_enrollee
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_nfc_handover_requestor_enrollee 1/1
Test: sigma_dut DPP/NFC handover requestor as Enrollee
Starting AP wlan3
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_nfc_handover_requestor_enrollee 0.096988 2021-02-03 00:08:48.660086
passed all 0 test case(s)
skipped 1 test case(s)
2021-02-03 00:08:48 ./run-tests.py sigma_dut_sae_pw_id_ft
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_sae_pw_id_ft 1/1
Test: sigma_dut controlled SAE association with Password Identifier and FT
Skip test case: sigma_dut not available
SKIP sigma_dut_sae_pw_id_ft 0.033816 2021-02-03 00:08:48.854774
passed all 0 test case(s)
skipped 1 test case(s)
2021-02-03 00:08:48 ./run-tests.py tspec_ap_parsing
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START tspec_ap_parsing 1/1
Test: TSPEC AP parsing tests
Starting AP wlan3
Connect STA wlan0 to AP
PASS tspec_ap_parsing 0.218362 2021-02-03 00:08:49.232161
passed all 1 test case(s)
2021-02-03 00:08:49 ./run-tests.py wifi_display_go_invite
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wifi_display_go_invite 1/1
Test: P2P GO with Wi-Fi Display inviting a client to join
wlan0: Trying to discover peer 02:00:00:00:01:00
wlan1: Trying to discover peer 02:00:00:00:00:00
Authorize invitation
Try to connect the client to the GO
wlan2: Trying to discover peer 02:00:00:00:00:00
Client connected
Invite peer to join the group
PASS wifi_display_go_invite 1.482665 2021-02-03 00:08:50.870367
passed all 1 test case(s)
2021-02-03 00:08:50 ./run-tests.py wnm_sleep_mode_open_fail
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_sleep_mode_open_fail 1/1
Test: WNM Sleep Mode - open (fail)
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_sleep_mode_open_fail 0.195912 2021-02-03 00:08:51.225212
passed all 1 test case(s)
2021-02-03 00:08:51 ./run-tests.py wpa2_ocv_ap_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpa2_ocv_ap_mismatch 1/1
Test: OCV AP mismatch
Starting AP wlan3
Connect STA wlan0 to AP
Send EAPOL-Key msg 2/4
Send EAPOL-Key msg 2/4
Send EAPOL-Key msg 2/4
Send EAPOL-Key msg 2/4
Send EAPOL-Key msg 2/4
Send EAPOL-Key msg 2/4
Send EAPOL-Key msg 4/4
PASS wpa2_ocv_ap_mismatch 4.309702 2021-02-03 00:08:55.693607
passed all 1 test case(s)
2021-02-03 00:08:55 ./run-tests.py wpas_ctrl_cred
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_cred 1/1
Test: wpa_supplicant ctrl_iface cred set
PASS wpas_ctrl_cred 0.126635 2021-02-03 00:08:55.979963
passed all 1 test case(s)
2021-02-03 00:08:56 ./run-tests.py wpas_ctrl_wps_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_wps_errors 1/1
Test: wpa_supplicant ctrl_iface WPS error cases
PASS wpas_ctrl_wps_errors 0.03499 2021-02-03 00:08:56.171238
passed all 1 test case(s)
2021-02-03 00:08:56 ./run-tests.py wpas_mesh_password_mismatch_retry
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_mesh_password_mismatch_retry 1/1
Test: Mesh password mismatch and retry
Skip test case: Skip test case with long duration due to --long not specified
SKIP wpas_mesh_password_mismatch_retry 0.034659 2021-02-03 00:08:56.366421
passed all 0 test case(s)
skipped 1 test case(s)
2021-02-03 00:08:56 ./run-tests.py wps_ext_ap_settings_mac_addr_missing
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_ap_settings_mac_addr_missing 1/1
Test: WPS and AP Settings: missing MAC Address
Starting AP wlan3
PASS wps_ext_ap_settings_mac_addr_missing 0.329988 2021-02-03 00:08:56.861621
passed all 1 test case(s)
2021-02-03 00:08:56 ./stop.sh



To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install                job.yaml  # job file is attached in this email
        bin/lkp split-job --compatible job.yaml
        bin/lkp run                    compatible-job.yaml



Thanks,
Oliver Sang


View attachment "config-5.11.0-rc4-00539-g12f9a570c0a6" of type "text/plain" (173972 bytes)

View attachment "job-script" of type "text/plain" (5878 bytes)

Download attachment "kmsg.xz" of type "application/x-xz" (103092 bytes)

View attachment "hwsim" of type "text/plain" (42441 bytes)

View attachment "job.yaml" of type "text/plain" (4887 bytes)

View attachment "reproduce" of type "text/plain" (3915 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ