2022-04-04 07:47:32 export USER=root
2022-04-04 07:47:32 ./build.sh
Building TNC testing tools
Building wlantest
Building hs20-osu-client
Building hostapd
Building wpa_supplicant
2022-04-04 07:48:19 ./start.sh
2022-04-04 07:48:20 ./run-tests.py ap_country
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_country 1/1
Test: WPA2-PSK AP setting country code and using 5 GHz band
Starting AP wlan3
Failed to enable hostapd interface wlan3
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_params.py", line 128, in test_ap_country
    hapd = hostapd.add_ap(apdev[0], params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 629, in add_ap
    hapd.enable()
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 248, in enable
    raise Exception("Failed to enable hostapd interface " + self.ifname)
Exception: Failed to enable hostapd interface wlan3
FAIL ap_country 1.378953 2022-04-04 07:48:22.697101
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_country
2022-04-04 07:48:22 ./run-tests.py ap_ft_over_ds_pull_vlan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_over_ds_pull_vlan 1/1
Test: WPA2-PSK-FT AP over DS (pull PMK) with VLAN
Starting AP wlan3 (old add_ap argument type)
Starting AP wlan4 (old add_ap argument type)
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
Roam back to the first AP
PASS ap_ft_over_ds_pull_vlan 2.927272 2022-04-04 07:48:25.810699
passed all 1 test case(s)
2022-04-04 07:48:25 ./run-tests.py ap_hs20_excluded_ssid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_excluded_ssid 1/1
Test: Hotspot 2.0 exclusion based on SSID
Starting AP wlan3
Starting AP wlan4
Verify network selection to AP wlan4
Verify network selection to AP wlan3
Verify network selection to AP wlan4
Verify network selection to AP wlan4
PASS ap_hs20_excluded_ssid 2.995367 2022-04-04 07:48:28.975706
passed all 1 test case(s)
2022-04-04 07:48:29 ./run-tests.py ap_hs20_remediation_required
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_remediation_required 1/1
Test: Hotspot 2.0 connection and remediation required from RADIUS
Starting AP wlan3
PASS ap_hs20_remediation_required 1.18573 2022-04-04 07:48:30.341586
passed all 1 test case(s)
2022-04-04 07:48:30 ./run-tests.py ap_ht40_scan_ht20_conflict
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht40_scan_ht20_conflict 1/1
Test: HT40 co-ex scan conflict with HT 20 MHz AP
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_ht40_scan_ht20_conflict 3.12074 2022-04-04 07:48:33.636818
passed all 1 test case(s)
2022-04-04 07:48:33 ./run-tests.py ap_ht40_scan_legacy_conflict
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht40_scan_legacy_conflict 1/1
Test: HT40 co-ex scan conflict with legacy 20 MHz AP
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_ht40_scan_legacy_conflict 3.081798 2022-04-04 07:48:36.885434
passed all 1 test case(s)
2022-04-04 07:48:36 ./run-tests.py ap_ht_op_class_127
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht_op_class_127 1/1
Test: HT40 on operationg class 127
Starting AP wlan3
Failed to enable hostapd interface wlan3
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ht.py", line 1505, in test_ap_ht_op_class_127
    use_op_class=o)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ht.py", line 1384, in run_op_class
    hapd = hostapd.add_ap(apdev[0], params, wait_enabled=False)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 629, in add_ap
    hapd.enable()
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 248, in enable
    raise Exception("Failed to enable hostapd interface " + self.ifname)
Exception: Failed to enable hostapd interface wlan3
FAIL ap_ht_op_class_127 0.755175 2022-04-04 07:48:37.802673
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_ht_op_class_127
2022-04-04 07:48:37 ./run-tests.py ap_open_pmf_default
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_pmf_default 1/1
Test: AP with open mode (no security) configuration and pmf=2
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
PASS ap_open_pmf_default 1.551879 2022-04-04 07:48:39.520569
passed all 1 test case(s)
2022-04-04 07:48:39 ./run-tests.py ap_pmf_beacon_protection_bip_gmac_256
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_beacon_protection_bip_gmac_256 1/1
Test: WPA2-PSK Beacon protection (BIP-GMAC-256)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
STA key: {'ifindex': 'wlan0', 'key': '9689f08dffca8d017daf324a8f3cdc3b814ef6b44e3b1ca0403fbe8b79cc5389', 'icverrors': '0', 'replays': '0', 'rx_spec': '00000000000d', 'tx_spec': '000000000000', 'algorithm': '00-0f-ac:12', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '32'}
AP key: {'ifindex': 'wlan3', 'key': '9689f08dffca8d017daf324a8f3cdc3b814ef6b44e3b1ca0403fbe8b79cc5389', 'icverrors': '0', 'replays': '0', 'rx_spec': '000000000000', 'tx_spec': '00000000000d', 'algorithm': '00-0f-ac:12', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '32'}
wlantest BIP counters: valid=0 invalid=0 missing=0
PASS ap_pmf_beacon_protection_bip_gmac_256 2.544664 2022-04-04 07:48:42.230200
passed all 1 test case(s)
2022-04-04 07:48:42 ./run-tests.py ap_reassociation_to_same_bss
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_reassociation_to_same_bss 1/1
Test: Reassociate to the same BSS
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_reassociation_to_same_bss 11.25364 2022-04-04 07:48:53.641659
passed all 1 test case(s)
2022-04-04 07:48:53 ./run-tests.py ap_vht80b
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80b 1/1
Test: VHT with 80 MHz channel width (HT40- channel 40)
Starting AP wlan3
Country code at the end: 00
Failed to enable hostapd interface wlan3
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 158, in test_ap_vht80b
    vht80_test(apdev[0], dev, 40, "[HT40-]")
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 142, in vht80_test
    hapd = hostapd.add_ap(apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 629, in add_ap
    hapd.enable()
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 248, in enable
    raise Exception("Failed to enable hostapd interface " + self.ifname)
Exception: Failed to enable hostapd interface wlan3
FAIL ap_vht80b 1.235202 2022-04-04 07:48:55.039962
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_vht80b
2022-04-04 07:48:55 ./run-tests.py ap_wpa2_already_in_bridge
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_already_in_bridge 1/1
Test: hostapd behavior with interface already in bridge
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_already_in_bridge 1.210978 2022-04-04 07:48:56.420667
passed all 1 test case(s)
2022-04-04 07:48:56 ./run-tests.py ap_wpa2_disable_eapol_retry
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_disable_eapol_retry 1/1
Test: WPA2-PSK disable EAPOL-Key retry
Starting AP wlan3
Verify working 4-way handshake without retries
Connect STA wlan0 to AP
Verify no retransmission of message 3/4
Connect STA wlan0 to AP
PASS ap_wpa2_disable_eapol_retry 5.306986 2022-04-04 07:49:01.891282
passed all 1 test case(s)
2022-04-04 07:49:01 ./run-tests.py ap_wpa2_disable_eapol_retry_group
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_disable_eapol_retry_group 1/1
Test: WPA2-PSK disable EAPOL-Key retry for group handshake
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_disable_eapol_retry_group 6.537647 2022-04-04 07:49:08.596744
passed all 1 test case(s)
2022-04-04 07:49:08 ./run-tests.py ap_wpa2_eap_pwd_nthash
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_pwd_nthash 1/1
Test: WPA2-Enterprise connection using EAP-pwd and NTHash
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_wpa2_eap_pwd_nthash 3.861764 2022-04-04 07:49:12.625681
passed all 1 test case(s)
2022-04-04 07:49:12 ./run-tests.py ap_wpa2_eap_tls_domain_suffix_match_cn
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_tls_domain_suffix_match_cn 1/1
Test: WPA2-Enterprise using EAP-TLS and domain suffix match (CN)
Starting AP wlan3
Connect STA wlan1 to AP
PASS ap_wpa2_eap_tls_domain_suffix_match_cn 0.983434 2022-04-04 07:49:13.776178
passed all 1 test case(s)
2022-04-04 07:49:13 ./run-tests.py ap_wpa2_eap_tls_ec_and_rsa
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_tls_ec_and_rsa 1/1
Test: EAP-TLS and both EC and RSA sertificates certificates
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_eap_tls_ec_and_rsa 1.418459 2022-04-04 07:49:15.359542
passed all 1 test case(s)
2022-04-04 07:49:15 ./run-tests.py ap_wpa2_psk_ext_eapol_type_diff
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_ext_eapol_type_diff 1/1
Test: WPA2 4-way handshake using external EAPOL supplicant
Starting AP wlan3
Connect STA wlan0 to AP
Replay same data back
Send EAPOL-Key msg 4/4
PASS ap_wpa2_psk_ext_eapol_type_diff 0.956415 2022-04-04 07:49:16.481640
passed all 1 test case(s)
2022-04-04 07:49:16 ./run-tests.py ap_wps_conf_and_sae_h2e
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_conf_and_sae_h2e 1/1
Test: WPS PIN provisioning with configured AP using PSK+SAE(H2E)
Starting AP wlan3
PASS ap_wps_conf_and_sae_h2e 1.536169 2022-04-04 07:49:18.183318
passed all 1 test case(s)
2022-04-04 07:49:18 ./run-tests.py ap_wps_er_http_proto_subscribe_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_http_proto_subscribe_oom 1/1
Test: WPS ER HTTP protocol testing - subscribe OOM
HTTP server received: GET /foo.xml HTTP/1.1
HTTP header: Cache-Control: no-cache
HTTP header: Pragma: no-cache
HTTP header: Accept: text/xml, application/xml
HTTP header: User-Agent: wpa_supplicant
HTTP header: Host: 127.0.0.1:12345
HTTP server received: POST /wps_control HTTP/1.1
HTTP header: Host: 127.0.0.1:12345
HTTP header: Content-Type: text/xml; charset="utf-8"
HTTP header: Content-Length: 280
HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo"
HTTP server received: 
Ignore HTTP request: 
HTTP server received: 
Ignore HTTP request: 
PASS ap_wps_er_http_proto_subscribe_oom 6.230591 2022-04-04 07:49:24.579736
passed all 1 test case(s)
2022-04-04 07:49:24 ./run-tests.py ap_wps_er_learn_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_learn_oom 1/1
Test: WPS ER learn OOM
Starting AP wlan3
PASS ap_wps_er_learn_oom 7.552299 2022-04-04 07:49:32.297303
passed all 1 test case(s)
2022-04-04 07:49:32 ./run-tests.py ap_wps_init_2ap_pbc
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_init_2ap_pbc 1/1
Test: Initial two-radio AP configuration with first WPS PBC Enrollee
Starting AP wlan3
Starting AP wlan4
WPS provisioning step
PASS ap_wps_init_2ap_pbc 6.980532 2022-04-04 07:49:39.442380
passed all 1 test case(s)
2022-04-04 07:49:39 ./run-tests.py ap_wps_mixed_cred
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_mixed_cred 1/1
Test: WPS 2.0 STA merging mixed mode WPA/WPA2 credentials
Starting AP wlan3
PASS ap_wps_mixed_cred 1.066079 2022-04-04 07:49:40.674659
passed all 1 test case(s)
2022-04-04 07:49:40 ./run-tests.py ap_wps_pbc_overlap_2ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_pbc_overlap_2ap 1/1
Test: WPS PBC session overlap with two active APs
Starting AP wlan3
Starting AP wlan4
WPS provisioning step
PASS ap_wps_pbc_overlap_2ap 5.514768 2022-04-04 07:49:46.355698
passed all 1 test case(s)
2022-04-04 07:49:46 ./run-tests.py autogo_many
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START autogo_many 1/1
Test: P2P autonomous GO with large number of GO instances
Was able to add 63 groups
PASS autogo_many 29.549423 2022-04-04 07:50:16.068792
passed all 1 test case(s)
2022-04-04 07:50:16 ./run-tests.py bgscan_simple_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START bgscan_simple_oom 1/1
Test: bgscan_simple OOM
Starting AP wlan3
Connect STA wlan0 to AP
PASS bgscan_simple_oom 0.952999 2022-04-04 07:50:17.186836
passed all 1 test case(s)
2022-04-04 07:50:17 ./run-tests.py connect_cmd_wpa2_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START connect_cmd_wpa2_psk 1/1
Test: WPA2-PSK connection using cfg80211 connect command
Starting AP wlan3
Connect STA wlan5 to AP
PASS connect_cmd_wpa2_psk 1.164163 2022-04-04 07:50:18.516754
passed all 1 test case(s)
2022-04-04 07:50:18 ./run-tests.py dbus_ap_scan_2_ap_mode_scan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_ap_scan_2_ap_mode_scan 1/1
Test: AP_SCAN 2 AP mode and D-Bus Scan()
No dbus module available
Skip test case: No dbus module available
SKIP dbus_ap_scan_2_ap_mode_scan 0.083411 2022-04-04 07:50:18.764275
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:18 ./run-tests.py dbus_creds
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_creds 1/1
Test: D-Bus interworking credentials
No dbus module available
Skip test case: No dbus module available
SKIP dbus_creds 0.080827 2022-04-04 07:50:19.007911
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:19 ./run-tests.py dbus_getall_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_getall_oom 1/1
Test: D-Bus GetAll wpa_config_get_all() OOM
No dbus module available
Skip test case: No dbus module available
SKIP dbus_getall_oom 0.082544 2022-04-04 07:50:19.255002
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:19 ./run-tests.py dbus_introspect_busctl
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_introspect_busctl 1/1
Test: D-Bus introspection with busctl
No dbus module available
Skip test case: No dbus module available
SKIP dbus_introspect_busctl 0.085146 2022-04-04 07:50:19.507516
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:19 ./run-tests.py dbus_remove_connected
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_remove_connected 1/1
Test: D-Bus RemoveAllNetworks while connected
No dbus module available
Skip test case: No dbus module available
SKIP dbus_remove_connected 0.084434 2022-04-04 07:50:19.756812
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:19 ./run-tests.py dbus_tdls_invalid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_tdls_invalid 1/1
Test: D-Bus invalid TDLS operations
No dbus module available
Skip test case: No dbus module available
SKIP dbus_tdls_invalid 0.082888 2022-04-04 07:50:20.004859
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:20 ./run-tests.py dbus_vendor_elem
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_vendor_elem 1/1
Test: D-Bus vendor element operations
No dbus module available
Skip test case: No dbus module available
SKIP dbus_vendor_elem 0.081527 2022-04-04 07:50:20.251623
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:20 ./run-tests.py discovery_social_plus_one
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START discovery_social_plus_one 1/1
Test: P2P device discovery with social-plus-one
Start autonomous GO wlan0
Wait for initial progressive find phases
Verify whether the GO on non-social channel can be found
PASS discovery_social_plus_one 7.897476 2022-04-04 07:50:28.314020
passed all 1 test case(s)
2022-04-04 07:50:28 ./run-tests.py dpp_config_dpp_gen_secp384r1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_dpp_gen_secp384r1 1/1
Test: Generate DPP Config Object for DPP network (P-384)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_dpp_gen_secp384r1 2.160892 2022-04-04 07:50:30.641859
passed all 1 test case(s)
2022-04-04 07:50:30 ./run-tests.py dpp_config_jwk_error_no_kty
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_jwk_error_no_kty 1/1
Test: DPP Config Object JWK error - no kty
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_jwk_error_no_kty 2.180357 2022-04-04 07:50:32.978868
passed all 1 test case(s)
2022-04-04 07:50:33 ./run-tests.py dpp_config_jws_error_prot_hdr_no_kid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_jws_error_prot_hdr_no_kid 1/1
Test: DPP Config Object JWS error - protected header - no kid
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_jws_error_prot_hdr_no_kid 2.153511 2022-04-04 07:50:35.296466
passed all 1 test case(s)
2022-04-04 07:50:35 ./run-tests.py dpp_config_legacy_psk_hex
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_legacy_psk_hex 1/1
Test: DPP Config Object for legacy network using PSK
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_legacy_psk_hex 2.155209 2022-04-04 07:50:37.615491
passed all 1 test case(s)
2022-04-04 07:50:37 ./run-tests.py dpp_config_too_long_discovery_ssid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_too_long_discovery_ssid 1/1
Test: DPP Config Object error - too long discovery::ssid
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_too_long_discovery_ssid 2.154739 2022-04-04 07:50:39.935811
passed all 1 test case(s)
2022-04-04 07:50:39 ./run-tests.py dpp_enterprise_tcp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_enterprise_tcp 1/1
Test: DPP over TCP for enterprise provisioning
Skip test case: OpenSSL python method not available
SKIP dpp_enterprise_tcp 0.082697 2022-04-04 07:50:40.183148
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:40 ./run-tests.py dpp_nfc_negotiated_handover_hostapd_req
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_nfc_negotiated_handover_hostapd_req 1/1
Test: DPP bootstrapping via NFC negotiated handover (hostapd as requestor)
Starting AP wlan3
Generated URI[0]: DPP:C:81/6,11;M:020000000300;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACF7gPQlvN5OKBGu08IvEoKDxJPpcigdGcJgFxEuOHHSk=;;
Generated URI[1]: DPP:C:81/1,6,11;M:020000000000;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADQaQPItWIW/PxejOLnZW3r88/SBh0RNr3B52raeXp9Qo=;;
Updated local bootstrapping info:
type=NFC-URI
mac_addr=02:00:00:00:00:00
info=
num_freq=1
use_freq=2437
curve=prime256v1
pkhash=67c1e376c635f8629fcf7abe4a7e4f438623909276e53d419d00653db59bb397
version=0

Updated URI[1]: DPP:C:81/6;M:020000000000;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADQaQPItWIW/PxejOLnZW3r88/SBh0RNr3B52raeXp9Qo=;;
PASS dpp_nfc_negotiated_handover_hostapd_req 0.750458 2022-04-04 07:50:41.100852
passed all 1 test case(s)
2022-04-04 07:50:41 ./run-tests.py dpp_pkex_nak_curve_change
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_pkex_nak_curve_change 1/1
Test: DPP PKEX with netAccessKey curve change
Skip test case: DPP version 3 not supported
SKIP dpp_pkex_nak_curve_change 0.083163 2022-04-04 07:50:41.351408
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:41 ./run-tests.py dpp_proto_auth_conf_no_i_auth
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_conf_no_i_auth 1/1
Test: DPP protocol testing - no I-Auth in Auth Conf
PASS dpp_proto_auth_conf_no_i_auth 2.129632 2022-04-04 07:50:43.646303
passed all 1 test case(s)
2022-04-04 07:50:43 ./run-tests.py dpp_proto_auth_resp_status_invalid_i_bootstrap_key
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_resp_status_invalid_i_bootstrap_key 1/1
Test: DPP protocol testing - invalid I-bootstrap key in Auth Resp(status)
PASS dpp_proto_auth_resp_status_invalid_i_bootstrap_key 2.239087 2022-04-04 07:50:46.052441
passed all 1 test case(s)
2022-04-04 07:50:46 ./run-tests.py dpp_proto_auth_resp_status_invalid_r_bootstrap_key
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_resp_status_invalid_r_bootstrap_key 1/1
Test: DPP protocol testing - invalid R-bootstrap key in Auth Resp(status)
PASS dpp_proto_auth_resp_status_invalid_r_bootstrap_key 2.240647 2022-04-04 07:50:48.460344
passed all 1 test case(s)
2022-04-04 07:50:48 ./run-tests.py dpp_proto_pkex_cr_req_no_i_auth_tag
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_pkex_cr_req_no_i_auth_tag 1/1
Test: DPP protocol testing - no I-Auth Tag in PKEX Commit-Reveal Request
PASS dpp_proto_pkex_cr_req_no_i_auth_tag 2.139213 2022-04-04 07:50:50.764928
passed all 1 test case(s)
2022-04-04 07:50:50 ./run-tests.py dpp_uri_version
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_uri_version 1/1
Test: DPP URI version information
Generated URI: DPP:V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADrW1fSUFIP/309lkKuRNnTyAX7RI6zr1hDTNV2dWRC7Q=;;
Parsed URI info:
type=QRCODE
mac_addr=00:00:00:00:00:00
info=
num_freq=0
use_freq=0
curve=prime256v1
pkhash=0e9029aa1a7be7ce518a7c0795dfa7db2d282d6bcc174ae88c1e716b3dcfd95b
version=2

Generated URI: DPP:K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACZmYhN5RtgIJIUuyMWVRBu14thZiq4/SiTo4DqVyABQw=;;
Parsed URI info:
type=QRCODE
mac_addr=00:00:00:00:00:00
info=
num_freq=0
use_freq=0
curve=prime256v1
pkhash=a77d40b4d6944970bebea065e95779b9f953d2bdf575afb8235d7551498cf4a7
version=0

PASS dpp_uri_version 0.083997 2022-04-04 07:50:51.012817
passed all 1 test case(s)
2022-04-04 07:50:51 ./run-tests.py eap_proto_peap_errors_server
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_peap_errors_server 1/1
Test: EAP-PEAP local error cases on server
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS eap_proto_peap_errors_server 2.005796 2022-04-04 07:50:53.190306
passed all 1 test case(s)
2022-04-04 07:50:53 ./run-tests.py eap_teap_basic_password_auth
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_teap_basic_password_auth 1/1
Test: EAP-TEAP with Basic-Password-Auth
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_teap_basic_password_auth 0.987272 2022-04-04 07:50:54.338262
passed all 1 test case(s)
2022-04-04 07:50:54 ./run-tests.py eap_ttls_ext_cert_check
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_ttls_ext_cert_check 1/1
Test: EAP-TTLS and external server certification validation
Connect STA wlan0 to AP
Skip test case: OpenSSL python method not available
SKIP eap_ttls_ext_cert_check 0.091251 2022-04-04 07:50:54.594290
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:54 ./run-tests.py ext_password_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ext_password_psk 1/1
Test: External password storage for PSK
Starting AP wlan3
Connect STA wlan0 to AP
PASS ext_password_psk 0.972641 2022-04-04 07:50:55.731202
passed all 1 test case(s)
2022-04-04 07:50:55 ./run-tests.py fils_discovery_frame
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_discovery_frame 1/1
Test: FILS Discovery frame generation
Starting AP as-erp
Starting AP wlan3 (old add_ap argument type)
Skip test case: FILS Discovery frame transmission not supported
SKIP fils_discovery_frame 0.275427 2022-04-04 07:50:56.170734
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:50:56 ./run-tests.py fils_offload_to_driver2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_offload_to_driver2 1/1
Test: FILS offload to driver
Starting AP as-erp
Starting AP wlan3 (old add_ap argument type)
Connect STA wlan5 to AP
PASS fils_offload_to_driver2 1.504521 2022-04-04 07:50:57.840047
passed all 1 test case(s)
2022-04-04 07:50:57 ./run-tests.py fils_sk_erp_radius_ext
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_sk_erp_radius_ext 1/1
Test: FILS SK using ERP and external RADIUS server
Starting AP wlan3 (old add_ap argument type)
Connect STA wlan0 to AP
PASS fils_sk_erp_radius_ext 1.366406 2022-04-04 07:50:59.372624
passed all 1 test case(s)
2022-04-04 07:50:59 ./run-tests.py fst_ap_ack_response_with_session_not_set_up
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_ack_response_with_session_not_set_up 1/1
Test: FST AP ack response with session not set up
Starting AP wlan3 (old add_ap argument type)
Failed to enable hostapd interface wlan3
Traceback (most recent call last):
  File "./run-tests.py", line 531, in main
    t(dev, apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1346, in test_fst_ap_ack_response_with_session_not_set_up
    bad_scenario_ack_resp_session_not_set_up, True)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 647, in fst_bad_transfer
    ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs
    ap1.start()
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start
    self.hapd = hostapd.add_ap(self.iface, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 629, in add_ap
    hapd.enable()
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 248, in enable
    raise Exception("Failed to enable hostapd interface " + self.ifname)
Exception: Failed to enable hostapd interface wlan3
FAIL fst_ap_ack_response_with_session_not_set_up 0.279825 2022-04-04 07:50:59.818039
passed 0 test case(s)
skipped 0 test case(s)
failed tests: fst_ap_ack_response_with_session_not_set_up
2022-04-04 07:50:59 ./run-tests.py fst_ap_config_default
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_config_default 1/1
Test: FST AP configuration default parameters
kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second
kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process
hostapd didn't start with valid config parameters
Traceback (most recent call last):
  File "./run-tests.py", line 531, in main
    t(dev, apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_config.py", line 409, in test_fst_ap_config_default
    raise Exception("hostapd didn't start with valid config parameters")
Exception: hostapd didn't start with valid config parameters
FAIL fst_ap_config_default 1.276255 2022-04-04 07:51:01.261073
passed 0 test case(s)
skipped 0 test case(s)
failed tests: fst_ap_config_default
2022-04-04 07:51:01 ./run-tests.py fst_ap_start_session
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_start_session 1/1
Test: FST AP start session
Starting AP wlan3 (old add_ap argument type)
Failed to enable hostapd interface wlan3
Traceback (most recent call last):
  File "./run-tests.py", line 531, in main
    t(dev, apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1153, in test_fst_ap_start_session
    fst_start_session(apdev, test_params, bad_param_none, True)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 95, in fst_start_session
    ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs
    ap1.start()
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start
    self.hapd = hostapd.add_ap(self.iface, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 629, in add_ap
    hapd.enable()
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 248, in enable
    raise Exception("Failed to enable hostapd interface " + self.ifname)
Exception: Failed to enable hostapd interface wlan3
FAIL fst_ap_start_session 0.273278 2022-04-04 07:51:01.702851
passed 0 test case(s)
skipped 0 test case(s)
failed tests: fst_ap_start_session
2022-04-04 07:51:01 ./run-tests.py fst_sta_config_pri_big
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_sta_config_pri_big 1/1
Test: FST STA configuration Priority too large
kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second
kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process
PASS fst_sta_config_pri_big 1.350938 2022-04-04 07:51:03.218769
passed all 1 test case(s)
2022-04-04 07:51:03 ./run-tests.py fst_sta_config_pri_nan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_sta_config_pri_nan 1/1
Test: FST STA configuration Priority not a number
kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second
kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process
PASS fst_sta_config_pri_nan 1.296919 2022-04-04 07:51:04.680118
passed all 1 test case(s)
2022-04-04 07:51:04 ./run-tests.py fst_sta_transfer_session_setup_skipped
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_sta_transfer_session_setup_skipped 1/1
Test: FST STA transfer session - setup skipped
Starting AP wlan3 (old add_ap argument type)
Failed to enable hostapd interface wlan3
Traceback (most recent call last):
  File "./run-tests.py", line 531, in main
    t(dev, apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1721, in test_fst_sta_transfer_session_setup_skipped
    bad_param_session_transfer_setup_skipped, False)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 338, in fst_transfer_session
    ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev, rsn=rsn)
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs
    ap1.start()
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start
    self.hapd = hostapd.add_ap(self.iface, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 629, in add_ap
    hapd.enable()
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 248, in enable
    raise Exception("Failed to enable hostapd interface " + self.ifname)
Exception: Failed to enable hostapd interface wlan3
FAIL fst_sta_transfer_session_setup_skipped 0.278767 2022-04-04 07:51:05.123481
passed 0 test case(s)
skipped 0 test case(s)
failed tests: fst_sta_transfer_session_setup_skipped
2022-04-04 07:51:05 ./run-tests.py gas_fragment
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START gas_fragment 1/1
Test: GAS fragmentation
Starting AP wlan3
PASS gas_fragment 0.677653 2022-04-04 07:51:05.968742
passed all 1 test case(s)
2022-04-04 07:51:05 ./run-tests.py go_search_non_social2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START go_search_non_social2 1/1
Test: P2P_FIND with freq parameter to scan a single channel (2)
Start autonomous GO wlan0
PASS go_search_non_social2 3.67372 2022-04-04 07:51:09.808507
passed all 1 test case(s)
2022-04-04 07:51:09 ./run-tests.py hostapd_oom_wpa2_psk_connect
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START hostapd_oom_wpa2_psk_connect 1/1
Test: hostapd failing during WPA2-PSK mode connection due to OOM
Starting AP wlan3
Iteration 1
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 2
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 3
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 4
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 5
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 6
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 7
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 8
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 9
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 10
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 11
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 12
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 13
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 14
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 15
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 16
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 17
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 18
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 19
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 20
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 21
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 22
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 23
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 24
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 25
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 26
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 27
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 28
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 29
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 30
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 31
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 32
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 33
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 34
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 35
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 36
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 37
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 38
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 39
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 40
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 41
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 42
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 43
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 44
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 45
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 46
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 47
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 48
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 49
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 0:main
Iteration 50
Connect STA wlan0 to AP
GET_ALLOC_FAIL: FAIL

Iteration 51
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 1:main
Iteration 52
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 2:main
Iteration 53
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 3:main
Iteration 54
Connect STA wlan0 to AP
GET_ALLOC_FAIL: 4:main
PASS hostapd_oom_wpa2_psk_connect 23.080045 2022-04-04 07:51:33.054765
passed all 1 test case(s)
2022-04-04 07:51:33 ./run-tests.py ibss_rsn_eapol_trigger
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ibss_rsn_eapol_trigger 1/1
Test: IBSS RSN and EAPOL trigger for a new peer
wlan0 waiting for IBSS start/join to complete
Too short EAPOL frame
RSN: EAPOL frame (type 255) discarded, not a Key frame
RSN: EAPOL frame payload size 96 invalid (frame size 99)
RSN: EAPOL-Key type (255) unknown, discarded
RSN: Timeout on waiting Authentication frame response
PASS ibss_rsn_eapol_trigger 9.521876 2022-04-04 07:51:42.741803
passed all 1 test case(s)
2022-04-04 07:51:42 ./run-tests.py obss_scan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START obss_scan 1/1
Test: Overlapping BSS scan request
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
SIGNAL_POLL:
RSSI=-30
LINKSPEED=1
NOISE=-92
FREQUENCY=2437
WIDTH=40 MHz
CENTER_FRQ1=2427
AVG_RSSI=-30
AVG_BEACON_RSSI=-30

Waiting for OBSS scan to occur
20/40 BSS Coexistence report received
PASS obss_scan 16.057419 2022-04-04 07:51:58.961369
passed all 1 test case(s)
2022-04-04 07:51:58 ./run-tests.py p2p_channel_avoid3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_channel_avoid3 1/1
Test: P2P and avoid frequencies driver event on 5 GHz
command failed: Invalid argument (-22)
command failed: Invalid argument (-22)
No regdom change event seen
Traceback (most recent call last):
  File "./run-tests.py", line 535, in main
    t(dev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_channel.py", line 230, in test_p2p_channel_avoid3
    set_country("CN", dev[0])
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_channel.py", line 29, in set_country
    raise Exception("No regdom change event seen")
Exception: No regdom change event seen
FAIL p2p_channel_avoid3 15.395008 2022-04-04 07:52:14.521378
passed 0 test case(s)
skipped 0 test case(s)
failed tests: p2p_channel_avoid3
2022-04-04 07:52:14 ./run-tests.py p2p_go_move_scm_peer_supports
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_go_move_scm_peer_supports 1/1
Test: P2P GO move due to SCM operation preference (peer supports)
command failed: Invalid argument (-22)
local variable 'hapd' referenced before assignment
Traceback (most recent call last):
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_channel.py", line 924, in _test_p2p_go_move_scm_peer_supports
    set_country("US", dev[0])
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_channel.py", line 29, in set_country
    raise Exception("No regdom change event seen")
Exception: No regdom change event seen

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_channel.py", line 919, in test_p2p_go_move_scm_peer_supports
    _test_p2p_go_move_scm_peer_supports(ndev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_channel.py", line 955, in _test_p2p_go_move_scm_peer_supports
    disable_hapd(hapd)
UnboundLocalError: local variable 'hapd' referenced before assignment
FAIL p2p_go_move_scm_peer_supports 15.453919 2022-04-04 07:52:30.144548
passed 0 test case(s)
skipped 0 test case(s)
failed tests: p2p_go_move_scm_peer_supports
2022-04-04 07:52:30 ./run-tests.py p2ps_nonexact_search
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2ps_nonexact_search 1/1
Test: P2PS nonexact seek request
PASS p2ps_nonexact_search 0.392004 2022-04-04 07:52:30.702450
passed all 1 test case(s)
2022-04-04 07:52:30 ./run-tests.py p2ps_stale_group_removal
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2ps_stale_group_removal 1/1
Test: P2PS stale group removal
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
PASS p2ps_stale_group_removal 7.426252 2022-04-04 07:52:38.291315
passed all 1 test case(s)
2022-04-04 07:52:38 ./run-tests.py pasn_ccmp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START pasn_ccmp 1/1
Test: PASN authentication with WPA2/CCMP AP
Starting AP wlan3
sta: TK: 46e14cc52d9ccfbdce55f5f0bf2f7ba7 KDK: 
ap : TK: 46e14cc52d9ccfbdce55f5f0bf2f7ba7 KDK: 
PASS pasn_ccmp 1.078102 2022-04-04 07:52:39.533153
passed all 1 test case(s)
2022-04-04 07:52:39 ./run-tests.py pasn_fils_sha256_connected_same_channel
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START pasn_fils_sha256_connected_same_channel 1/1
Test: PASN FILS authentication using SHA-256 while connected same channel
Starting AP as-erp
Starting AP wlan3 (old add_ap argument type)
Connect STA wlan0 to AP
Starting AP wlan4
Connect STA wlan0 to AP
flush_scan_cache: Could not clear all BSS entries. These remain:
bssid / frequency / signal level / flags / ssid
02:00:00:00:04:00	2412	-30	[ESS]	open
02:00:00:00:03:00	2412	-30	[WPA2-FILS-SHA256-CCMP][ESS][FILS]	fils

sta: TK: 5077d9c0b4c719bfafd233577f363cca KDK: 
ap : TK: 5077d9c0b4c719bfafd233577f363cca KDK: 
PASS pasn_fils_sha256_connected_same_channel 2.442446 2022-04-04 07:52:42.143391
passed all 1 test case(s)
2022-04-04 07:52:42 ./run-tests.py pasn_gcmp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START pasn_gcmp 1/1
Test: PASN authentication with WPA2/GCMP AP
Starting AP wlan3
sta: TK: 8f500a2348b2441a1a8b076517187ac5 KDK: 
ap : TK: 8f500a2348b2441a1a8b076517187ac5 KDK: 
PASS pasn_gcmp 0.944261 2022-04-04 07:52:43.251393
passed all 1 test case(s)
2022-04-04 07:52:43 ./run-tests.py persistent_group_invite_removed_client
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START persistent_group_invite_removed_client 1/1
Test: P2P persistent group client removal and re-invitation
Form a persistent group
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
Remove client from the group
Re-invite the removed client to join the group
wlan0: Trying to discover peer 02:00:00:00:01:00
Re-invite after client removed persistent group info
wlan0: Trying to discover peer 02:00:00:00:01:00
wlan1: Trying to discover peer 02:00:00:00:00:00
Terminate persistent group
PASS persistent_group_invite_removed_client 11.970315 2022-04-04 07:52:55.388346
passed all 1 test case(s)
2022-04-04 07:52:55 ./run-tests.py persistent_group_peer_dropped2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START persistent_group_peer_dropped2 1/1
Test: P2P persistent group formation and re-invocation with peer having dropped group (2)
Form a persistent group
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
Terminate persistent group
Re-invoke persistent group from GO
wlan0: Trying to discover peer 02:00:00:00:01:00
Terminate persistent group
Remove group on the client and try to invite from the GO
wlan0: Trying to discover peer 02:00:00:00:01:00
Verify that a new group can be formed
Form a persistent group
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
Terminate persistent group
PASS persistent_group_peer_dropped2 7.177933 2022-04-04 07:53:02.731951
passed all 1 test case(s)
2022-04-04 07:53:02 ./run-tests.py proxyarp_open_ebtables_ipv6
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START proxyarp_open_ebtables_ipv6 1/1
Test: ProxyARP with open network (IPv6)
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Bridge setup: bridge name	bridge id		STP enabled	interfaces
ap-br0		8000.020000000300	no		wlan3
							wlan4

Bridge showstp: ap-br0
 bridge id		8000.020000000300
 designated root	8000.020000000300
 root port		   0			path cost		   0
 max age		  20.00			bridge max age		  20.00
 hello time		   2.00			bridge hello time	   2.00
 forward delay		   0.00			bridge forward delay	   0.00
 ageing time		 300.00
 hello timer		   0.00			tcn timer		   0.00
 topology change timer	   0.00			gc timer		 298.35
 flags			


wlan3 (1)
 port id		8001			state		     forwarding
 designated root	8000.020000000300	path cost		 100
 designated bridge	8000.020000000300	message age timer	   0.00
 designated port	8001			forward delay timer	   0.00
 designated cost	   0			hold timer		   0.00
 flags			
 hairpin mode		   1

wlan4 (2)
 port id		8002			state		     forwarding
 designated root	8000.020000000300	path cost		 100
 designated bridge	8000.020000000300	message age timer	   0.00
 designated port	8002			forward delay timer	   0.00
 designated cost	   0			hold timer		   0.00
 flags			


After connect (showmacs): port no	mac addr		is local?	ageing timer
  1	02:00:00:00:00:00	no		   0.04
  1	02:00:00:00:01:00	no		   0.01
  2	02:00:00:00:02:00	no		   0.43
  1	02:00:00:00:03:00	yes		   0.00
  1	02:00:00:00:03:00	yes		   0.00
  2	02:00:00:00:04:00	yes		   0.00
  2	02:00:00:00:04:00	yes		   0.00

After connect: ['aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT', 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT', 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT']
After disconnect (showmacs): port no	mac addr		is local?	ageing timer
  2	02:00:00:00:02:00	no		   0.96
  1	02:00:00:00:03:00	yes		   0.00
  1	02:00:00:00:03:00	yes		   0.00
  2	02:00:00:00:04:00	yes		   0.00
  2	02:00:00:00:04:00	yes		   0.00

After disconnect: []
ebtables results:
Bridge table: filter

Bridge chain: INPUT, entries: 0, policy: ACCEPT

Bridge chain: FORWARD, entries: 4, policy: ACCEPT
-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-solicitation -j DROP
 , pcnt = 16 -- bcnt = 1142-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-advertisement -j DROP
 , pcnt = 2 -- bcnt = 128-p IPv6 -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type router-solicitation -j DROP
 , pcnt = 0 -- bcnt = 0-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type 143/0:255 -j DROP
 , pcnt = 6 -- bcnt = 456
Bridge chain: OUTPUT, entries: 4, policy: ACCEPT
-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-solicitation -j DROP
 , pcnt = 3 -- bcnt = 216-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-advertisement -j DROP
 , pcnt = 1 -- bcnt = 64-p IPv6 -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type router-solicitation -j DROP
 , pcnt = 1 -- bcnt = 56-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type 143/0:255 -j DROP
 , pcnt = 4 -- bcnt = 384
dev0 seen NS: [['33:33:ff:00:00:02', '02:00:00:00:00:00', '::', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '02:00:00:00:00:00'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '02:00:00:00:00:00'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '01:02:03:04:05:06'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:dddd::2', '02:00:00:00:00:00']]
dev0 seen NA: []
Skip test case: Assume kernel did not have the required patches for proxyarp (IPv6)
SKIP proxyarp_open_ebtables_ipv6 6.07339 2022-04-04 07:53:08.970325
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:53:08 ./run-tests.py radius_acct_non_ascii_ssid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_acct_non_ascii_ssid 1/1
Test: RADIUS Accounting and non-ASCII SSID
Starting AP wlan3
Connect STA wlan0 to AP
PASS radius_acct_non_ascii_ssid 0.955254 2022-04-04 07:53:10.095452
passed all 1 test case(s)
2022-04-04 07:53:10 ./run-tests.py sae_no_ffc_by_default
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_no_ffc_by_default 1/1
Test: SAE and default groups rejecting FFC
Starting AP wlan3
Connect STA wlan0 to AP
PASS sae_no_ffc_by_default 1.019141 2022-04-04 07:53:11.282958
passed all 1 test case(s)
2022-04-04 07:53:11 ./run-tests.py sae_pwe_group_25
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pwe_group_25 1/1
Test: SAE PWE derivation options with group 25
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS sae_pwe_group_25 1.76548 2022-04-04 07:53:13.215692
passed all 1 test case(s)
2022-04-04 07:53:13 ./run-tests.py scan_and_bss_entry_removed
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START scan_and_bss_entry_removed 1/1
Test: Last scan result and connect work processing on BSS entry update
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan5 to AP
Connect STA wlan0 to AP
Connect STA wlan5 to AP
PASS scan_and_bss_entry_removed 4.825684 2022-04-04 07:53:18.208354
passed all 1 test case(s)
2022-04-04 07:53:18 ./run-tests.py scan_freq_list
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START scan_freq_list 1/1
Test: Scan with SET freq_list and scan_cur_freq
Starting AP wlan3
Connect STA wlan0 to AP
PASS scan_freq_list 1.158648 2022-04-04 07:53:19.534056
passed all 1 test case(s)
2022-04-04 07:53:19 ./run-tests.py scan_hidden
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START scan_hidden 1/1
Test: Control interface behavior on scan parameters
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS scan_hidden 1.419855 2022-04-04 07:53:21.117308
passed all 1 test case(s)
2022-04-04 07:53:21 ./run-tests.py sigma_dut_ap_ocv
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_ocv 1/1
Test: sigma_dut controlled AP using OCV
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_ocv 0.14866 2022-04-04 07:53:21.429927
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:53:21 ./run-tests.py sigma_dut_dpp_qr_resp_4
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_qr_resp_4 1/1
Test: sigma_dut DPP/QR responder (conf index 4)
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_qr_resp_4 0.08171 2022-04-04 07:53:21.677947
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:53:21 ./run-tests.py sigma_dut_dpp_qr_resp_chan_list
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_qr_resp_chan_list 1/1
Test: sigma_dut DPP/QR responder (channel list override)
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_qr_resp_chan_list 0.083641 2022-04-04 07:53:21.928116
passed all 0 test case(s)
skipped 1 test case(s)
2022-04-04 07:53:21 ./run-tests.py wep_shared_key_auth_multi_key
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wep_shared_key_auth_multi_key 1/1
Test: WEP Shared Key authentication with multiple keys
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS wep_shared_key_auth_multi_key 2.342417 2022-04-04 07:53:24.436828
passed all 1 test case(s)
2022-04-04 07:53:24 ./run-tests.py wnm_ess_disassoc_imminent_pmf
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_ess_disassoc_imminent_pmf 1/1
Test: WNM ESS Disassociation Imminent
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_ess_disassoc_imminent_pmf 1.051623 2022-04-04 07:53:25.654592
passed all 1 test case(s)
2022-04-04 07:53:25 ./run-tests.py wpa2_ocv_sta_override_sa_query_resp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpa2_ocv_sta_override_sa_query_resp 1/1
Test: OCV on 2.4 GHz and STA override SA Query Response
Starting AP wlan3
Connect STA wlan0 to AP
PASS wpa2_ocv_sta_override_sa_query_resp 1.012487 2022-04-04 07:53:26.833788
passed all 1 test case(s)
2022-04-04 07:53:26 ./run-tests.py wpa2_ocv_vht40
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpa2_ocv_vht40 1/1
Test: OCV with VHT40 channel
Starting AP wlan3
Failed to enable hostapd interface wlan3
Traceback (most recent call last):
  File "./run-tests.py", line 533, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 165, in test_wpa2_ocv_vht40
    run_wpa2_ocv_vht40(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 186, in run_wpa2_ocv_vht40
    hapd, ssid, passphrase = ocv_setup_ap(apdev[0], params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 37, in ocv_setup_ap
    hapd = hostapd.add_ap(apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 629, in add_ap
    hapd.enable()
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 248, in enable
    raise Exception("Failed to enable hostapd interface " + self.ifname)
Exception: Failed to enable hostapd interface wlan3
FAIL wpa2_ocv_vht40 0.993183 2022-04-04 07:53:27.991153
passed 0 test case(s)
skipped 0 test case(s)
failed tests: wpa2_ocv_vht40
2022-04-04 07:53:28 ./run-tests.py wpas_ap_5ghz
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ap_5ghz 1/1
Test: wpa_supplicant AP mode - 5 GHz
command failed: Invalid argument (-22)
command failed: Invalid argument (-22)
AP failed to start
Traceback (most recent call last):
  File "./run-tests.py", line 535, in main
    t(dev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_wpas_ap.py", line 661, in test_wpas_ap_5ghz
    _test_wpas_ap_5ghz(dev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_wpas_ap.py", line 677, in _test_wpas_ap_5ghz
    wait_ap_ready(dev[0])
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_wpas_ap.py", line 22, in wait_ap_ready
    raise Exception("AP failed to start")
Exception: AP failed to start
FAIL wpas_ap_5ghz 10.405499 2022-04-04 07:53:38.562841
passed 0 test case(s)
skipped 0 test case(s)
failed tests: wpas_ap_5ghz
2022-04-04 07:53:38 ./run-tests.py wpas_ap_invalid_frequency
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ap_invalid_frequency 1/1
Test: wpa_supplicant AP mode - invalid frequency configuration
PASS wpas_ap_invalid_frequency 1.090167 2022-04-04 07:53:39.821330
passed all 1 test case(s)
2022-04-04 07:53:39 ./run-tests.py wpas_ctrl_dump
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_dump 1/1
Test: wpa_supplicant ctrl_iface and DUMP/GET global parameters
Config values from DUMP: {'ctrl_interface': 'DIR=/var/run/wpa_supplicant GROUP=adm', 'ctrl_interface_group': 'null', 'eapol_version': '1', 'ap_scan': '1', 'user_mpm': '1', 'max_peer_links': '99', 'mesh_max_inactivity': '300', 'mesh_fwding': '1', 'dot11RSNASAERetransPeriod': '1000', 'disable_scan_offload': '0', 'fast_reauth': '1', 'opensc_engine_path': 'null', 'pkcs11_engine_path': 'null', 'pkcs11_module_path': 'null', 'openssl_ciphers': 'null', 'pcsc_reader': 'null', 'pcsc_pin': 'null', 'external_sim': '0', 'driver_param': 'null', 'dot11RSNAConfigPMKLifetime': '0', 'dot11RSNAConfigPMKReauthThreshold': '0', 'dot11RSNAConfigSATimeout': '0', 'update_config': '0', 'auto_uuid': '0', 'device_name': 'Device A', 'manufacturer': 'null', 'model_name': 'null', 'model_number': 'null', 'serial_number': 'null', 'config_methods': 'null', 'wps_cred_processing': '0', 'wps_cred_add_sae': '0', 'p2p_listen_reg_class': '0', 'p2p_listen_channel': '0', 'p2p_oper_reg_class': '0', 'p2p_oper_channel': '0', 'p2p_go_intent': '7', 'p2p_ssid_postfix': 'null', 'persistent_reconnect': '0', 'p2p_intra_bss': '1', 'p2p_group_idle': '0', 'p2p_go_freq_change_policy': '2', 'p2p_passphrase_len': '0', 'p2p_add_cli_chan': '0', 'p2p_optimize_listen_chan': '0', 'p2p_go_ht40': '0', 'p2p_go_vht': '0', 'p2p_go_he': '0', 'p2p_go_edmg': '0', 'p2p_disabled': '0', 'p2p_go_ctwindow': '0', 'p2p_no_group_iface': '1', 'p2p_ignore_shared_freq': '0', 'ip_addr_go': '0.0.0.0', 'ip_addr_mask': '0.0.0.0', 'ip_addr_start': '0.0.0.0', 'ip_addr_end': '0.0.0.0', 'p2p_cli_probe': '0', 'p2p_device_random_mac_addr': '0', 'p2p_interface_random_mac_addr': '0', 'p2p_6ghz_disable': '0', 'bss_max_count': '200', 'bss_expiration_age': '180', 'bss_expiration_scan_count': '2', 'filter_ssids': '0', 'filter_rssi': '0', 'max_num_sta': '128', 'ap_isolate': '0', 'disassoc_low_ack': '0', 'hs20': '1', 'interworking': '1', 'access_network_type': '15', 'go_interworking': '0', 'go_access_network_type': '0', 'go_internet': '0', 'go_venue_group': '0', 'go_venue_type': '0', 'pbc_in_m1': '0', 'autoscan': 'null', 'wps_nfc_dev_pw_id': '0', 'ext_password_backend': 'test:psk1=12345678', 'p2p_go_max_inactivity': '300', 'auto_interworking': '0', 'okc': '0', 'pmf': '0', 'sae_pwe': '0', 'sae_pmkid_in_assoc': '0', 'dtim_period': '0', 'beacon_int': '0', 'ignore_old_scan_res': '0', 'scan_cur_freq': '0', 'scan_res_valid_for_connect': '5', 'sched_scan_interval': '0', 'sched_scan_start_delay': '0', 'tdls_external_control': '0', 'osu_dir': 'null', 'wowlan_triggers': 'null', 'p2p_search_delay': '500', 'mac_addr': '0', 'rand_addr_lifetime': '60', 'preassoc_mac_addr': '0', 'key_mgmt_offload': '1', 'passive_scan': '0', 'reassoc_same_bss_optim': '0', 'wps_priority': '0', 'fst_group_id': 'null', 'fst_priority': '0', 'fst_llt': '0', 'cert_in_cb': '1', 'wpa_rsc_relaxation': '1', 'sched_scan_plans': 'null', 'non_pref_chan': 'null', 'mbo_cell_capa': '3', 'disassoc_imminent_rssi_threshold': '-75', 'oce': '1', 'gas_address3': '0', 'ftm_responder': '0', 'ftm_initiator': '0', 'gas_rand_addr_lifetime': '60', 'gas_rand_mac_addr': '0', 'dpp_config_processing': '0', 'dpp_name': 'null', 'dpp_mud_url': 'null', 'coloc_intf_reporting': '0', 'disable_btm': '0', 'extended_key_id': '0', 'wowlan_disconnect_on_deinit': '0', 'force_kdk_derivation': '0', 'pasn_corrupt_mic': '0'}
PASS wpas_ctrl_dump 0.097657 2022-04-04 07:53:40.082960
passed all 1 test case(s)
2022-04-04 07:53:40 ./run-tests.py wpas_ctrl_nfc_report_handover
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_nfc_report_handover 1/1
Test: wpa_supplicant ctrl_iface NFC_REPORT_HANDOVER
PASS wpas_ctrl_nfc_report_handover 0.086809 2022-04-04 07:53:40.336025
passed all 1 test case(s)
2022-04-04 07:53:40 ./run-tests.py wpas_ctrl_set_sched_scan_relative_rssi
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_set_sched_scan_relative_rssi 1/1
Test: wpa_supplicant SET relative RSSI
PASS wpas_ctrl_set_sched_scan_relative_rssi 0.089439 2022-04-04 07:53:40.594090
passed all 1 test case(s)
2022-04-04 07:53:40 ./run-tests.py wpas_mesh_dynamic_interface
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_mesh_dynamic_interface 1/1
Test: wpa_supplicant mesh with dynamic interface
mesh0 address 42:00:00:00:00:00
mesh-wlan1-0 address 42:00:00:00:01:00
Make sure another dynamic group can be added
mesh0 address 42:00:00:00:00:00
mesh-wlan1-1 address 42:00:00:00:01:00
PASS wpas_mesh_dynamic_interface 1.997972 2022-04-04 07:53:42.759501
passed all 1 test case(s)
2022-04-04 07:53:42 ./run-tests.py wps_ext_m1_invalid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_m1_invalid 1/1
Test: WPS proto: M1 failing parsing
Starting AP wlan3
PASS wps_ext_m1_invalid 1.048013 2022-04-04 07:53:43.973586
passed all 1 test case(s)
2022-04-04 07:53:44 ./run-tests.py wps_ext_m3_missing_e_hash2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_m3_missing_e_hash2 1/1
Test: WPS proto: M3 missing E-Hash2
Starting AP wlan3
PASS wps_ext_m3_missing_e_hash2 1.066129 2022-04-04 07:53:45.205677
passed all 1 test case(s)
2022-04-04 07:53:45 ./stop.sh