2022-04-14 11:00:01 export USER=root 2022-04-14 11:00:01 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-04-14 11:00:48 ./start.sh 2022-04-14 11:00:49 ./run-tests.py ap_country DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_country 1/1 Test: WPA2-PSK AP setting country code and using 5 GHz band Starting AP wlan3 Connect STA wlan0 to AP PASS ap_country 1.258113 2022-04-14 11:00:51.603436 passed all 1 test case(s) 2022-04-14 11:00:51 ./run-tests.py ap_ft_over_ds_pull_vlan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_pull_vlan 1/1 Test: WPA2-PSK-FT AP over DS (pull PMK) with VLAN Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_over_ds_pull_vlan 2.806694 2022-04-14 11:00:54.591981 passed all 1 test case(s) 2022-04-14 11:00:54 ./run-tests.py ap_hs20_excluded_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_excluded_ssid 1/1 Test: Hotspot 2.0 exclusion based on SSID Starting AP wlan3 Starting AP wlan4 Verify network selection to AP wlan4 Verify network selection to AP wlan3 Verify network selection to AP wlan4 Verify network selection to AP wlan4 PASS ap_hs20_excluded_ssid 2.995992 2022-04-14 11:00:57.767350 passed all 1 test case(s) 2022-04-14 11:00:57 ./run-tests.py ap_hs20_remediation_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_remediation_required 1/1 Test: Hotspot 2.0 connection and remediation required from RADIUS Starting AP wlan3 PASS ap_hs20_remediation_required 1.181417 2022-04-14 11:00:59.128642 passed all 1 test case(s) 2022-04-14 11:00:59 ./run-tests.py ap_ht40_scan_ht20_conflict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_ht20_conflict 1/1 Test: HT40 co-ex scan conflict with HT 20 MHz AP Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_ht20_conflict 3.115149 2022-04-14 11:01:02.422790 passed all 1 test case(s) 2022-04-14 11:01:02 ./run-tests.py ap_ht40_scan_legacy_conflict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_legacy_conflict 1/1 Test: HT40 co-ex scan conflict with legacy 20 MHz AP Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_legacy_conflict 3.061683 2022-04-14 11:01:05.648881 passed all 1 test case(s) 2022-04-14 11:01:05 ./run-tests.py ap_ht_op_class_127 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_127 1/1 Test: HT40 on operationg class 127 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_127 3.321665 2022-04-14 11:01:09.135344 passed all 1 test case(s) 2022-04-14 11:01:09 ./run-tests.py ap_open_pmf_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_pmf_default 1/1 Test: AP with open mode (no security) configuration and pmf=2 Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP PASS ap_open_pmf_default 1.550499 2022-04-14 11:01:10.850418 passed all 1 test case(s) 2022-04-14 11:01:10 ./run-tests.py ap_pmf_beacon_protection_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_beacon_protection_bip_gmac_256 1/1 Test: WPA2-PSK Beacon protection (BIP-GMAC-256) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP STA key: {'ifindex': 'wlan0', 'key': '280a4ca32b8f2f23fba209df5985f0a3b68d88f249f395bc42204c0a41137952', 'icverrors': '0', 'replays': '0', 'rx_spec': '00000000000d', 'tx_spec': '000000000000', 'algorithm': '00-0f-ac:12', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '32'} AP key: {'ifindex': 'wlan3', 'key': '280a4ca32b8f2f23fba209df5985f0a3b68d88f249f395bc42204c0a41137952', 'icverrors': '0', 'replays': '0', 'rx_spec': '000000000000', 'tx_spec': '00000000000d', 'algorithm': '00-0f-ac:12', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '32'} wlantest BIP counters: valid=0 invalid=0 missing=0 PASS ap_pmf_beacon_protection_bip_gmac_256 2.560685 2022-04-14 11:01:13.576300 passed all 1 test case(s) 2022-04-14 11:01:13 ./run-tests.py ap_reassociation_to_same_bss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_reassociation_to_same_bss 1/1 Test: Reassociate to the same BSS Starting AP wlan3 Connect STA wlan0 to AP PASS ap_reassociation_to_same_bss 11.316429 2022-04-14 11:01:25.057334 passed all 1 test case(s) 2022-04-14 11:01:25 ./run-tests.py ap_vht80b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80b 1/1 Test: VHT with 80 MHz channel width (HT40- channel 40) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht80b 1.958323 2022-04-14 11:01:27.179197 passed all 1 test case(s) 2022-04-14 11:01:27 ./run-tests.py ap_wpa2_already_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_already_in_bridge 1/1 Test: hostapd behavior with interface already in bridge Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_already_in_bridge 1.297305 2022-04-14 11:01:28.640688 passed all 1 test case(s) 2022-04-14 11:01:28 ./run-tests.py ap_wpa2_disable_eapol_retry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_disable_eapol_retry 1/1 Test: WPA2-PSK disable EAPOL-Key retry Starting AP wlan3 Verify working 4-way handshake without retries Connect STA wlan0 to AP Verify no retransmission of message 3/4 Connect STA wlan0 to AP PASS ap_wpa2_disable_eapol_retry 5.308892 2022-04-14 11:01:34.107778 passed all 1 test case(s) 2022-04-14 11:01:34 ./run-tests.py ap_wpa2_disable_eapol_retry_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_disable_eapol_retry_group 1/1 Test: WPA2-PSK disable EAPOL-Key retry for group handshake Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ap_wpa2_disable_eapol_retry_group 6.539883 2022-04-14 11:01:40.813820 passed all 1 test case(s) 2022-04-14 11:01:40 ./run-tests.py ap_wpa2_eap_pwd_nthash DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_nthash 1/1 Test: WPA2-Enterprise connection using EAP-pwd and NTHash Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_eap_pwd_nthash 3.882312 2022-04-14 11:01:44.861177 passed all 1 test case(s) 2022-04-14 11:01:44 ./run-tests.py ap_wpa2_eap_tls_domain_suffix_match_cn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_domain_suffix_match_cn 1/1 Test: WPA2-Enterprise using EAP-TLS and domain suffix match (CN) Starting AP wlan3 Connect STA wlan1 to AP PASS ap_wpa2_eap_tls_domain_suffix_match_cn 0.980347 2022-04-14 11:01:46.007945 passed all 1 test case(s) 2022-04-14 11:01:46 ./run-tests.py ap_wpa2_eap_tls_ec_and_rsa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ec_and_rsa 1/1 Test: EAP-TLS and both EC and RSA sertificates certificates Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_tls_ec_and_rsa 1.439267 2022-04-14 11:01:47.613166 passed all 1 test case(s) 2022-04-14 11:01:47 ./run-tests.py ap_wpa2_psk_ext_eapol_type_diff DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_eapol_type_diff 1/1 Test: WPA2 4-way handshake using external EAPOL supplicant Starting AP wlan3 Connect STA wlan0 to AP Replay same data back Send EAPOL-Key msg 4/4 PASS ap_wpa2_psk_ext_eapol_type_diff 0.952686 2022-04-14 11:01:48.732380 passed all 1 test case(s) 2022-04-14 11:01:48 ./run-tests.py ap_wps_conf_and_sae_h2e DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_and_sae_h2e 1/1 Test: WPS PIN provisioning with configured AP using PSK+SAE(H2E) Starting AP wlan3 PASS ap_wps_conf_and_sae_h2e 1.54435 2022-04-14 11:01:50.440812 passed all 1 test case(s) 2022-04-14 11:01:50 ./run-tests.py ap_wps_er_http_proto_subscribe_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_subscribe_oom 1/1 Test: WPS ER HTTP protocol testing - subscribe OOM HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: Ignore HTTP request: HTTP server received: Ignore HTTP request: PASS ap_wps_er_http_proto_subscribe_oom 6.231161 2022-04-14 11:01:56.838899 passed all 1 test case(s) 2022-04-14 11:01:56 ./run-tests.py ap_wps_er_learn_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_learn_oom 1/1 Test: WPS ER learn OOM Starting AP wlan3 PASS ap_wps_er_learn_oom 7.524846 2022-04-14 11:02:04.527066 passed all 1 test case(s) 2022-04-14 11:02:04 ./run-tests.py ap_wps_init_2ap_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_init_2ap_pbc 1/1 Test: Initial two-radio AP configuration with first WPS PBC Enrollee Starting AP wlan3 Starting AP wlan4 WPS provisioning step PASS ap_wps_init_2ap_pbc 6.918245 2022-04-14 11:02:11.611256 passed all 1 test case(s) 2022-04-14 11:02:11 ./run-tests.py ap_wps_mixed_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_mixed_cred 1/1 Test: WPS 2.0 STA merging mixed mode WPA/WPA2 credentials Starting AP wlan3 PASS ap_wps_mixed_cred 1.042265 2022-04-14 11:02:12.819845 passed all 1 test case(s) 2022-04-14 11:02:12 ./run-tests.py ap_wps_pbc_overlap_2ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_pbc_overlap_2ap 1/1 Test: WPS PBC session overlap with two active APs Starting AP wlan3 Starting AP wlan4 WPS provisioning step PASS ap_wps_pbc_overlap_2ap 5.533022 2022-04-14 11:02:18.511029 passed all 1 test case(s) 2022-04-14 11:02:18 ./run-tests.py autogo_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_many 1/1 Test: P2P autonomous GO with large number of GO instances Was able to add 63 groups PASS autogo_many 29.423777 2022-04-14 11:02:48.097688 passed all 1 test case(s) 2022-04-14 11:02:48 ./run-tests.py bgscan_simple_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START bgscan_simple_oom 1/1 Test: bgscan_simple OOM Starting AP wlan3 Connect STA wlan0 to AP PASS bgscan_simple_oom 0.942524 2022-04-14 11:02:49.204327 passed all 1 test case(s) 2022-04-14 11:02:49 ./run-tests.py connect_cmd_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_cmd_wpa2_psk 1/1 Test: WPA2-PSK connection using cfg80211 connect command Starting AP wlan3 Connect STA wlan5 to AP PASS connect_cmd_wpa2_psk 1.16167 2022-04-14 11:02:50.529738 passed all 1 test case(s) 2022-04-14 11:02:50 ./run-tests.py dbus_ap_scan_2_ap_mode_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_ap_scan_2_ap_mode_scan 1/1 Test: AP_SCAN 2 AP mode and D-Bus Scan() No dbus module available Skip test case: No dbus module available SKIP dbus_ap_scan_2_ap_mode_scan 0.083717 2022-04-14 11:02:50.777333 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:02:50 ./run-tests.py dbus_creds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_creds 1/1 Test: D-Bus interworking credentials No dbus module available Skip test case: No dbus module available SKIP dbus_creds 0.081739 2022-04-14 11:02:51.023305 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:02:51 ./run-tests.py dbus_getall_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_getall_oom 1/1 Test: D-Bus GetAll wpa_config_get_all() OOM No dbus module available Skip test case: No dbus module available SKIP dbus_getall_oom 0.082659 2022-04-14 11:02:51.269567 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:02:51 ./run-tests.py dbus_introspect_busctl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_introspect_busctl 1/1 Test: D-Bus introspection with busctl No dbus module available Skip test case: No dbus module available SKIP dbus_introspect_busctl 0.083351 2022-04-14 11:02:51.518651 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:02:51 ./run-tests.py dbus_remove_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_remove_connected 1/1 Test: D-Bus RemoveAllNetworks while connected No dbus module available Skip test case: No dbus module available SKIP dbus_remove_connected 0.082835 2022-04-14 11:02:51.768331 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:02:51 ./run-tests.py dbus_tdls_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_tdls_invalid 1/1 Test: D-Bus invalid TDLS operations No dbus module available Skip test case: No dbus module available SKIP dbus_tdls_invalid 0.082981 2022-04-14 11:02:52.015688 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:02:52 ./run-tests.py dbus_vendor_elem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_vendor_elem 1/1 Test: D-Bus vendor element operations No dbus module available Skip test case: No dbus module available SKIP dbus_vendor_elem 0.082237 2022-04-14 11:02:52.261759 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:02:52 ./run-tests.py discovery_social_plus_one DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_social_plus_one 1/1 Test: P2P device discovery with social-plus-one Start autonomous GO wlan0 Wait for initial progressive find phases Verify whether the GO on non-social channel can be found PASS discovery_social_plus_one 8.818562 2022-04-14 11:03:01.245106 passed all 1 test case(s) 2022-04-14 11:03:01 ./run-tests.py dpp_config_dpp_gen_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp384r1 1/1 Test: Generate DPP Config Object for DPP network (P-384) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp384r1 0.168166 2022-04-14 11:03:01.572226 passed all 1 test case(s) 2022-04-14 11:03:01 ./run-tests.py dpp_config_jwk_error_no_kty DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_no_kty 1/1 Test: DPP Config Object JWK error - no kty dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_no_kty 2.154325 2022-04-14 11:03:03.890739 passed all 1 test case(s) 2022-04-14 11:03:03 ./run-tests.py dpp_config_jws_error_prot_hdr_no_kid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_no_kid 1/1 Test: DPP Config Object JWS error - protected header - no kid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_no_kid 2.154868 2022-04-14 11:03:06.212982 passed all 1 test case(s) 2022-04-14 11:03:06 ./run-tests.py dpp_config_legacy_psk_hex DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_legacy_psk_hex 1/1 Test: DPP Config Object for legacy network using PSK dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_legacy_psk_hex 2.154583 2022-04-14 11:03:08.532839 passed all 1 test case(s) 2022-04-14 11:03:08 ./run-tests.py dpp_config_too_long_discovery_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_too_long_discovery_ssid 1/1 Test: DPP Config Object error - too long discovery::ssid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_too_long_discovery_ssid 2.154005 2022-04-14 11:03:10.854360 passed all 1 test case(s) 2022-04-14 11:03:10 ./run-tests.py dpp_enterprise_tcp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_enterprise_tcp 1/1 Test: DPP over TCP for enterprise provisioning Skip test case: OpenSSL python method not available SKIP dpp_enterprise_tcp 0.083182 2022-04-14 11:03:11.101934 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:03:11 ./run-tests.py dpp_nfc_negotiated_handover_hostapd_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_negotiated_handover_hostapd_req 1/1 Test: DPP bootstrapping via NFC negotiated handover (hostapd as requestor) Starting AP wlan3 Generated URI[0]: DPP:C:81/6,11;M:020000000300;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACxbHJmvbbaXkSzxaUY29826FzqTyMFmRB93rGSNn3yI4=;; Generated URI[1]: DPP:C:81/1,6,11;M:020000000000;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADFdP/auOLxS3pwMyi+CxX5z+2qLjBj/O0/AT5wJAtW9Q=;; Updated local bootstrapping info: type=NFC-URI mac_addr=02:00:00:00:00:00 info= num_freq=1 use_freq=2437 curve=prime256v1 pkhash=c39ef96795725676a23c912cb56e63a49124124d1422be5671b638f9dccd3c81 version=0 Updated URI[1]: DPP:C:81/6;M:020000000000;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADFdP/auOLxS3pwMyi+CxX5z+2qLjBj/O0/AT5wJAtW9Q=;; PASS dpp_nfc_negotiated_handover_hostapd_req 2.653896 2022-04-14 11:03:13.924280 passed all 1 test case(s) 2022-04-14 11:03:13 ./run-tests.py dpp_pkex_nak_curve_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_nak_curve_change 1/1 Test: DPP PKEX with netAccessKey curve change Skip test case: DPP version 3 not supported SKIP dpp_pkex_nak_curve_change 0.082777 2022-04-14 11:03:14.170990 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:03:14 ./run-tests.py dpp_proto_auth_conf_no_i_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_no_i_auth 1/1 Test: DPP protocol testing - no I-Auth in Auth Conf PASS dpp_proto_auth_conf_no_i_auth 2.129403 2022-04-14 11:03:16.466282 passed all 1 test case(s) 2022-04-14 11:03:16 ./run-tests.py dpp_proto_auth_resp_status_invalid_i_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_status_invalid_i_bootstrap_key 1/1 Test: DPP protocol testing - invalid I-bootstrap key in Auth Resp(status) PASS dpp_proto_auth_resp_status_invalid_i_bootstrap_key 2.23742 2022-04-14 11:03:18.870160 passed all 1 test case(s) 2022-04-14 11:03:18 ./run-tests.py dpp_proto_auth_resp_status_invalid_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_status_invalid_r_bootstrap_key 1/1 Test: DPP protocol testing - invalid R-bootstrap key in Auth Resp(status) PASS dpp_proto_auth_resp_status_invalid_r_bootstrap_key 2.241071 2022-04-14 11:03:21.279356 passed all 1 test case(s) 2022-04-14 11:03:21 ./run-tests.py dpp_proto_pkex_cr_req_no_i_auth_tag DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_cr_req_no_i_auth_tag 1/1 Test: DPP protocol testing - no I-Auth Tag in PKEX Commit-Reveal Request PASS dpp_proto_pkex_cr_req_no_i_auth_tag 2.140915 2022-04-14 11:03:23.586007 passed all 1 test case(s) 2022-04-14 11:03:23 ./run-tests.py dpp_uri_version DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_uri_version 1/1 Test: DPP URI version information Generated URI: DPP:V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACiqMqsRETnb11ewoib6W05D29w/rQkSZ9bwN4fEHq9sA=;; Parsed URI info: type=QRCODE mac_addr=00:00:00:00:00:00 info= num_freq=0 use_freq=0 curve=prime256v1 pkhash=8b985c00758137b8fecbfa0d481933dee3eaa2b3ea62858bb04a6eecd94aaf00 version=2 Generated URI: DPP:K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADhzFeP8yryw85hfG3MRVjWl6zTi/827NH62mdYDf8Xdk=;; Parsed URI info: type=QRCODE mac_addr=00:00:00:00:00:00 info= num_freq=0 use_freq=0 curve=prime256v1 pkhash=4b0116a45370a2b0720984875fcfedbd36aba3a8840e42b216e7b315bd494530 version=0 PASS dpp_uri_version 0.08165 2022-04-14 11:03:23.832401 passed all 1 test case(s) 2022-04-14 11:03:23 ./run-tests.py eap_proto_peap_errors_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_peap_errors_server 1/1 Test: EAP-PEAP local error cases on server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_peap_errors_server 2.002315 2022-04-14 11:03:26.008877 passed all 1 test case(s) 2022-04-14 11:03:26 ./run-tests.py eap_teap_basic_password_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth 1/1 Test: EAP-TEAP with Basic-Password-Auth Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth 0.98546 2022-04-14 11:03:27.162329 passed all 1 test case(s) 2022-04-14 11:03:27 ./run-tests.py eap_ttls_ext_cert_check DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_ttls_ext_cert_check 1/1 Test: EAP-TTLS and external server certification validation Connect STA wlan0 to AP Skip test case: OpenSSL python method not available SKIP eap_ttls_ext_cert_check 0.085423 2022-04-14 11:03:27.414635 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:03:27 ./run-tests.py ext_password_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ext_password_psk 1/1 Test: External password storage for PSK Starting AP wlan3 Connect STA wlan0 to AP PASS ext_password_psk 0.959559 2022-04-14 11:03:28.538514 passed all 1 test case(s) 2022-04-14 11:03:28 ./run-tests.py fils_discovery_frame DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_discovery_frame 1/1 Test: FILS Discovery frame generation Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Skip test case: FILS Discovery frame transmission not supported SKIP fils_discovery_frame 0.271758 2022-04-14 11:03:28.974798 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:03:29 ./run-tests.py fils_offload_to_driver2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_offload_to_driver2 1/1 Test: FILS offload to driver Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan5 to AP PASS fils_offload_to_driver2 1.529125 2022-04-14 11:03:30.673101 passed all 1 test case(s) 2022-04-14 11:03:30 ./run-tests.py fils_sk_erp_radius_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_radius_ext 1/1 Test: FILS SK using ERP and external RADIUS server Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_erp_radius_ext 1.379483 2022-04-14 11:03:32.218718 passed all 1 test case(s) 2022-04-14 11:03:32 ./run-tests.py fst_ap_ack_response_with_session_not_set_up DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_session_not_set_up 1/1 Test: FST AP ack response with session not set up Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad scenario was handled correctly (Ack response received before the session was set up) PASS fst_ap_ack_response_with_session_not_set_up 7.464667 2022-04-14 11:03:39.850771 passed all 1 test case(s) 2022-04-14 11:03:39 ./run-tests.py fst_ap_config_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_default 1/1 Test: FST AP configuration default parameters PASS fst_ap_config_default 6.545816 2022-04-14 11:03:46.561926 passed all 1 test case(s) 2022-04-14 11:03:46 ./run-tests.py fst_ap_start_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_start_session 1/1 Test: FST AP start session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Session added and set PASS fst_ap_start_session 2.333572 2022-04-14 11:03:49.061226 passed all 1 test case(s) 2022-04-14 11:03:49 ./run-tests.py fst_sta_config_pri_big DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_pri_big 1/1 Test: FST STA configuration Priority too large kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_pri_big 1.297421 2022-04-14 11:03:50.525814 passed all 1 test case(s) 2022-04-14 11:03:50 ./run-tests.py fst_sta_config_pri_nan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_pri_nan 1/1 Test: FST STA configuration Priority not a number kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_pri_nan 1.301849 2022-04-14 11:03:51.994255 passed all 1 test case(s) 2022-04-14 11:03:52 ./run-tests.py fst_sta_transfer_session_setup_skipped DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_transfer_session_setup_skipped 1/1 Test: FST STA transfer session - setup skipped Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Session setup skipped) PASS fst_sta_transfer_session_setup_skipped 2.369244 2022-04-14 11:03:54.532104 passed all 1 test case(s) 2022-04-14 11:03:54 ./run-tests.py gas_fragment DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_fragment 1/1 Test: GAS fragmentation Starting AP wlan3 PASS gas_fragment 0.624439 2022-04-14 11:03:55.321972 passed all 1 test case(s) 2022-04-14 11:03:55 ./run-tests.py go_search_non_social2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_search_non_social2 1/1 Test: P2P_FIND with freq parameter to scan a single channel (2) Start autonomous GO wlan0 PASS go_search_non_social2 3.60727 2022-04-14 11:03:59.095065 passed all 1 test case(s) 2022-04-14 11:03:59 ./run-tests.py hostapd_oom_wpa2_psk_connect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_wpa2_psk_connect 1/1 Test: hostapd failing during WPA2-PSK mode connection due to OOM Starting AP wlan3 Iteration 1 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 2 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 3 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 4 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 5 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 6 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 7 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 8 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 9 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 10 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 11 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 12 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 13 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 14 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 15 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 16 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 17 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 18 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 19 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 20 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 21 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 22 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 23 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 24 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 25 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 26 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 27 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 28 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 29 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 30 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 31 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 32 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 33 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 34 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 35 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 36 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 37 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 38 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 39 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 40 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 41 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 42 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 43 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 44 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 45 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 46 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 47 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 48 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 49 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 50 Connect STA wlan0 to AP GET_ALLOC_FAIL: FAIL Iteration 51 Connect STA wlan0 to AP GET_ALLOC_FAIL: 1:main Iteration 52 Connect STA wlan0 to AP GET_ALLOC_FAIL: 2:main Iteration 53 Connect STA wlan0 to AP GET_ALLOC_FAIL: 3:main Iteration 54 Connect STA wlan0 to AP GET_ALLOC_FAIL: 4:main PASS hostapd_oom_wpa2_psk_connect 23.06067 2022-04-14 11:04:22.323751 passed all 1 test case(s) 2022-04-14 11:04:22 ./run-tests.py ibss_rsn_eapol_trigger DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_eapol_trigger 1/1 Test: IBSS RSN and EAPOL trigger for a new peer wlan0 waiting for IBSS start/join to complete Too short EAPOL frame RSN: EAPOL frame (type 255) discarded, not a Key frame RSN: EAPOL frame payload size 96 invalid (frame size 99) RSN: EAPOL-Key type (255) unknown, discarded RSN: Timeout on waiting Authentication frame response PASS ibss_rsn_eapol_trigger 10.851858 2022-04-14 11:04:33.341922 passed all 1 test case(s) 2022-04-14 11:04:33 ./run-tests.py obss_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START obss_scan 1/1 Test: Overlapping BSS scan request Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP SIGNAL_POLL: RSSI=-30 LINKSPEED=1 NOISE=-92 FREQUENCY=2437 WIDTH=40 MHz CENTER_FRQ1=2427 AVG_RSSI=-30 AVG_BEACON_RSSI=-30 Waiting for OBSS scan to occur 20/40 BSS Coexistence report received PASS obss_scan 16.071018 2022-04-14 11:04:49.577232 passed all 1 test case(s) 2022-04-14 11:04:49 ./run-tests.py p2p_channel_avoid3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_avoid3 1/1 Test: P2P and avoid frequencies driver event on 5 GHz Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Failed to trigger scan: FAIL-BUSY Traceback (most recent call last): File "./run-tests.py", line 535, in main t(dev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_channel.py", line 256, in test_p2p_channel_avoid3 dev[1].flush_scan_cache() File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1187, in flush_scan_cache self.scan(freq=freq, only_new=True) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1164, in scan raise Exception("Failed to trigger scan: " + str(res)) Exception: Failed to trigger scan: FAIL-BUSY FAIL p2p_channel_avoid3 6.108844 2022-04-14 11:04:55.853359 passed 0 test case(s) skipped 0 test case(s) failed tests: p2p_channel_avoid3 2022-04-14 11:04:55 ./run-tests.py p2p_go_move_scm_peer_supports DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_go_move_scm_peer_supports 1/1 Test: P2P GO move due to SCM operation preference (peer supports) Start GO negotiation wlan7 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:07:00 wlan7: Trying to discover peer 02:00:00:00:01:00 Group formed Starting AP wlan3 Connecting client to to an AP on channel 11 Connect STA wlan7 to AP Country code at the end: 00 PASS p2p_go_move_scm_peer_supports 4.29364 2022-04-14 11:05:00.320133 passed all 1 test case(s) 2022-04-14 11:05:00 ./run-tests.py p2ps_nonexact_search DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_nonexact_search 1/1 Test: P2PS nonexact seek request PASS p2ps_nonexact_search 0.407979 2022-04-14 11:05:00.892393 passed all 1 test case(s) 2022-04-14 11:05:00 ./run-tests.py p2ps_stale_group_removal DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_stale_group_removal 1/1 Test: P2PS stale group removal Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2ps_stale_group_removal 7.650324 2022-04-14 11:05:08.708775 passed all 1 test case(s) 2022-04-14 11:05:08 ./run-tests.py pasn_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_ccmp 1/1 Test: PASN authentication with WPA2/CCMP AP Starting AP wlan3 sta: TK: 11f0bdd747f90cab8ed23164e9764f1e KDK: ap : TK: 11f0bdd747f90cab8ed23164e9764f1e KDK: PASS pasn_ccmp 1.087917 2022-04-14 11:05:09.961566 passed all 1 test case(s) 2022-04-14 11:05:09 ./run-tests.py pasn_fils_sha256_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha256_connected_same_channel 1/1 Test: PASN FILS authentication using SHA-256 while connected same channel Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:04:00 2412 -30 [ESS] open sta: TK: 45e6c85fc2d568b6f9d94f5b73dbd57a KDK: ap : TK: 45e6c85fc2d568b6f9d94f5b73dbd57a KDK: PASS pasn_fils_sha256_connected_same_channel 2.475672 2022-04-14 11:05:12.604768 passed all 1 test case(s) 2022-04-14 11:05:12 ./run-tests.py pasn_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_gcmp 1/1 Test: PASN authentication with WPA2/GCMP AP Starting AP wlan3 sta: TK: 1b56da511d7207d0bd074e168518e3fc KDK: ap : TK: 1b56da511d7207d0bd074e168518e3fc KDK: PASS pasn_gcmp 1.064364 2022-04-14 11:05:13.833542 passed all 1 test case(s) 2022-04-14 11:05:13 ./run-tests.py persistent_group_invite_removed_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_invite_removed_client 1/1 Test: P2P persistent group client removal and re-invitation Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Remove client from the group Re-invite the removed client to join the group wlan0: Trying to discover peer 02:00:00:00:01:00 Re-invite after client removed persistent group info wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group PASS persistent_group_invite_removed_client 12.078991 2022-04-14 11:05:26.081426 passed all 1 test case(s) 2022-04-14 11:05:26 ./run-tests.py persistent_group_peer_dropped2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_peer_dropped2 1/1 Test: P2P persistent group formation and re-invocation with peer having dropped group (2) Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group Remove group on the client and try to invite from the GO wlan0: Trying to discover peer 02:00:00:00:01:00 Verify that a new group can be formed Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group PASS persistent_group_peer_dropped2 7.132948 2022-04-14 11:05:33.378980 passed all 1 test case(s) 2022-04-14 11:05:33 ./run-tests.py proxyarp_open_ebtables_ipv6 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START proxyarp_open_ebtables_ipv6 1/1 Test: ProxyARP with open network (IPv6) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Bridge setup: bridge name bridge id STP enabled interfaces ap-br0 8000.020000000300 no wlan3 wlan4 Bridge showstp: ap-br0 bridge id 8000.020000000300 designated root 8000.020000000300 root port 0 path cost 0 max age 20.00 bridge max age 20.00 hello time 2.00 bridge hello time 2.00 forward delay 0.00 bridge forward delay 0.00 ageing time 300.00 hello timer 0.00 tcn timer 0.00 topology change timer 0.00 gc timer 298.41 flags wlan3 (1) port id 8001 state forwarding designated root 8000.020000000300 path cost 100 designated bridge 8000.020000000300 message age timer 0.00 designated port 8001 forward delay timer 0.00 designated cost 0 hold timer 0.00 flags hairpin mode 1 wlan4 (2) port id 8002 state forwarding designated root 8000.020000000300 path cost 100 designated bridge 8000.020000000300 message age timer 0.00 designated port 8002 forward delay timer 0.00 designated cost 0 hold timer 0.00 flags After connect (showmacs): port no mac addr is local? ageing timer 1 02:00:00:00:00:00 no 0.06 1 02:00:00:00:01:00 no 0.01 2 02:00:00:00:02:00 no 0.31 1 02:00:00:00:03:00 yes 0.00 1 02:00:00:00:03:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 After connect: ['aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT', 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT'] After disconnect (showmacs): port no mac addr is local? ageing timer 2 02:00:00:00:02:00 no 0.96 1 02:00:00:00:03:00 yes 0.00 1 02:00:00:00:03:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 After disconnect: [] ebtables results: Bridge table: filter Bridge chain: INPUT, entries: 0, policy: ACCEPT Bridge chain: FORWARD, entries: 4, policy: ACCEPT -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-solicitation -j DROP , pcnt = 16 -- bcnt = 1142-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-advertisement -j DROP , pcnt = 2 -- bcnt = 128-p IPv6 -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type router-solicitation -j DROP , pcnt = 0 -- bcnt = 0-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type 143/0:255 -j DROP , pcnt = 6 -- bcnt = 456 Bridge chain: OUTPUT, entries: 4, policy: ACCEPT -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-solicitation -j DROP , pcnt = 3 -- bcnt = 216-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-advertisement -j DROP , pcnt = 1 -- bcnt = 64-p IPv6 -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type router-solicitation -j DROP , pcnt = 1 -- bcnt = 56-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type 143/0:255 -j DROP , pcnt = 4 -- bcnt = 384 dev0 seen NS: [['33:33:ff:00:00:02', '02:00:00:00:00:00', '::', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '02:00:00:00:00:00'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '02:00:00:00:00:00'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '01:02:03:04:05:06'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:dddd::2', '02:00:00:00:00:00']] dev0 seen NA: [] Skip test case: Assume kernel did not have the required patches for proxyarp (IPv6) SKIP proxyarp_open_ebtables_ipv6 6.110769 2022-04-14 11:05:39.655362 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:05:39 ./run-tests.py radius_acct_non_ascii_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_non_ascii_ssid 1/1 Test: RADIUS Accounting and non-ASCII SSID Starting AP wlan3 Connect STA wlan0 to AP PASS radius_acct_non_ascii_ssid 0.948114 2022-04-14 11:05:40.771561 passed all 1 test case(s) 2022-04-14 11:05:40 ./run-tests.py sae_no_ffc_by_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_no_ffc_by_default 1/1 Test: SAE and default groups rejecting FFC Starting AP wlan3 Connect STA wlan0 to AP PASS sae_no_ffc_by_default 1.011738 2022-04-14 11:05:41.949383 passed all 1 test case(s) 2022-04-14 11:05:41 ./run-tests.py sae_pwe_group_25 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_25 1/1 Test: SAE PWE derivation options with group 25 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_25 1.772612 2022-04-14 11:05:43.888402 passed all 1 test case(s) 2022-04-14 11:05:43 ./run-tests.py scan_and_bss_entry_removed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_and_bss_entry_removed 1/1 Test: Last scan result and connect work processing on BSS entry update Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP Connect STA wlan0 to AP Connect STA wlan5 to AP PASS scan_and_bss_entry_removed 4.97791 2022-04-14 11:05:49.032843 passed all 1 test case(s) 2022-04-14 11:05:49 ./run-tests.py scan_freq_list DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_freq_list 1/1 Test: Scan with SET freq_list and scan_cur_freq Starting AP wlan3 Connect STA wlan0 to AP PASS scan_freq_list 1.167298 2022-04-14 11:05:50.365768 passed all 1 test case(s) 2022-04-14 11:05:50 ./run-tests.py scan_hidden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_hidden 1/1 Test: Control interface behavior on scan parameters Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS scan_hidden 1.419327 2022-04-14 11:05:51.950713 passed all 1 test case(s) 2022-04-14 11:05:51 ./run-tests.py sigma_dut_ap_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_ocv 1/1 Test: sigma_dut controlled AP using OCV Skip test case: sigma_dut not available SKIP sigma_dut_ap_ocv 0.149541 2022-04-14 11:05:52.266013 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:05:52 ./run-tests.py sigma_dut_dpp_qr_resp_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_4 1/1 Test: sigma_dut DPP/QR responder (conf index 4) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_4 0.08302 2022-04-14 11:05:52.514475 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:05:52 ./run-tests.py sigma_dut_dpp_qr_resp_chan_list DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_chan_list 1/1 Test: sigma_dut DPP/QR responder (channel list override) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_chan_list 0.084606 2022-04-14 11:05:52.766629 passed all 0 test case(s) skipped 1 test case(s) 2022-04-14 11:05:52 ./run-tests.py wep_shared_key_auth_multi_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_shared_key_auth_multi_key 1/1 Test: WEP Shared Key authentication with multiple keys Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wep_shared_key_auth_multi_key 2.336576 2022-04-14 11:05:55.271687 passed all 1 test case(s) 2022-04-14 11:05:55 ./run-tests.py wnm_ess_disassoc_imminent_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_ess_disassoc_imminent_pmf 1/1 Test: WNM ESS Disassociation Imminent Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_ess_disassoc_imminent_pmf 1.048734 2022-04-14 11:05:56.486808 passed all 1 test case(s) 2022-04-14 11:05:56 ./run-tests.py wpa2_ocv_sta_override_sa_query_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_sta_override_sa_query_resp 1/1 Test: OCV on 2.4 GHz and STA override SA Query Response Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_sta_override_sa_query_resp 1.007474 2022-04-14 11:05:57.661352 passed all 1 test case(s) 2022-04-14 11:05:57 ./run-tests.py wpa2_ocv_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_vht40 1/1 Test: OCV with VHT40 channel Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wpa2_ocv_vht40 12.982096 2022-04-14 11:06:10.808582 passed all 1 test case(s) 2022-04-14 11:06:10 ./run-tests.py wpas_ap_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_5ghz 1/1 Test: wpa_supplicant AP mode - 5 GHz Connect STA wlan1 to AP Wi-Fi Generation: 6 ['RSSI=-27', 'LINKSPEED=6', 'NOISE=9999', 'FREQUENCY=5180', 'WIDTH=20 MHz', 'CENTER_FRQ1=5180', 'AVG_RSSI=-27', 'AVG_BEACON_RSSI=-27'] PASS wpas_ap_5ghz 1.384156 2022-04-14 11:06:12.352993 passed all 1 test case(s) 2022-04-14 11:06:12 ./run-tests.py wpas_ap_invalid_frequency DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_invalid_frequency 1/1 Test: wpa_supplicant AP mode - invalid frequency configuration PASS wpas_ap_invalid_frequency 1.083434 2022-04-14 11:06:13.604140 passed all 1 test case(s) 2022-04-14 11:06:13 ./run-tests.py wpas_ctrl_dump DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_dump 1/1 Test: wpa_supplicant ctrl_iface and DUMP/GET global parameters Config values from DUMP: {'ctrl_interface': 'DIR=/var/run/wpa_supplicant GROUP=adm', 'ctrl_interface_group': 'null', 'eapol_version': '1', 'ap_scan': '1', 'user_mpm': '1', 'max_peer_links': '99', 'mesh_max_inactivity': '300', 'mesh_fwding': '1', 'dot11RSNASAERetransPeriod': '1000', 'disable_scan_offload': '0', 'fast_reauth': '1', 'opensc_engine_path': 'null', 'pkcs11_engine_path': 'null', 'pkcs11_module_path': 'null', 'openssl_ciphers': 'null', 'pcsc_reader': 'null', 'pcsc_pin': 'null', 'external_sim': '0', 'driver_param': 'null', 'dot11RSNAConfigPMKLifetime': '0', 'dot11RSNAConfigPMKReauthThreshold': '0', 'dot11RSNAConfigSATimeout': '0', 'update_config': '0', 'auto_uuid': '0', 'device_name': 'Device A', 'manufacturer': 'null', 'model_name': 'null', 'model_number': 'null', 'serial_number': 'null', 'config_methods': 'null', 'wps_cred_processing': '0', 'wps_cred_add_sae': '0', 'p2p_listen_reg_class': '0', 'p2p_listen_channel': '0', 'p2p_oper_reg_class': '0', 'p2p_oper_channel': '0', 'p2p_go_intent': '7', 'p2p_ssid_postfix': 'null', 'persistent_reconnect': '0', 'p2p_intra_bss': '1', 'p2p_group_idle': '0', 'p2p_go_freq_change_policy': '2', 'p2p_passphrase_len': '0', 'p2p_add_cli_chan': '0', 'p2p_optimize_listen_chan': '0', 'p2p_go_ht40': '0', 'p2p_go_vht': '0', 'p2p_go_he': '0', 'p2p_go_edmg': '0', 'p2p_disabled': '0', 'p2p_go_ctwindow': '0', 'p2p_no_group_iface': '1', 'p2p_ignore_shared_freq': '0', 'ip_addr_go': '0.0.0.0', 'ip_addr_mask': '0.0.0.0', 'ip_addr_start': '0.0.0.0', 'ip_addr_end': '0.0.0.0', 'p2p_cli_probe': '0', 'p2p_device_random_mac_addr': '0', 'p2p_interface_random_mac_addr': '0', 'p2p_6ghz_disable': '0', 'bss_max_count': '200', 'bss_expiration_age': '180', 'bss_expiration_scan_count': '2', 'filter_ssids': '0', 'filter_rssi': '0', 'max_num_sta': '128', 'ap_isolate': '0', 'disassoc_low_ack': '0', 'hs20': '1', 'interworking': '1', 'access_network_type': '15', 'go_interworking': '0', 'go_access_network_type': '0', 'go_internet': '0', 'go_venue_group': '0', 'go_venue_type': '0', 'pbc_in_m1': '0', 'autoscan': 'null', 'wps_nfc_dev_pw_id': '0', 'ext_password_backend': 'test:psk1=12345678', 'p2p_go_max_inactivity': '300', 'auto_interworking': '0', 'okc': '0', 'pmf': '0', 'sae_pwe': '0', 'sae_pmkid_in_assoc': '0', 'dtim_period': '0', 'beacon_int': '0', 'ignore_old_scan_res': '0', 'scan_cur_freq': '0', 'scan_res_valid_for_connect': '5', 'sched_scan_interval': '0', 'sched_scan_start_delay': '0', 'tdls_external_control': '0', 'osu_dir': 'null', 'wowlan_triggers': 'null', 'p2p_search_delay': '500', 'mac_addr': '0', 'rand_addr_lifetime': '60', 'preassoc_mac_addr': '0', 'key_mgmt_offload': '1', 'passive_scan': '0', 'reassoc_same_bss_optim': '0', 'wps_priority': '0', 'fst_group_id': 'null', 'fst_priority': '0', 'fst_llt': '0', 'cert_in_cb': '1', 'wpa_rsc_relaxation': '1', 'sched_scan_plans': 'null', 'non_pref_chan': 'null', 'mbo_cell_capa': '3', 'disassoc_imminent_rssi_threshold': '-75', 'oce': '1', 'gas_address3': '0', 'ftm_responder': '0', 'ftm_initiator': '0', 'gas_rand_addr_lifetime': '60', 'gas_rand_mac_addr': '0', 'dpp_config_processing': '0', 'dpp_name': 'null', 'dpp_mud_url': 'null', 'coloc_intf_reporting': '0', 'disable_btm': '0', 'extended_key_id': '0', 'wowlan_disconnect_on_deinit': '0', 'force_kdk_derivation': '0', 'pasn_corrupt_mic': '0'} PASS wpas_ctrl_dump 0.096002 2022-04-14 11:06:13.866402 passed all 1 test case(s) 2022-04-14 11:06:13 ./run-tests.py wpas_ctrl_nfc_report_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_nfc_report_handover 1/1 Test: wpa_supplicant ctrl_iface NFC_REPORT_HANDOVER PASS wpas_ctrl_nfc_report_handover 0.086931 2022-04-14 11:06:14.119241 passed all 1 test case(s) 2022-04-14 11:06:14 ./run-tests.py wpas_ctrl_set_sched_scan_relative_rssi DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_sched_scan_relative_rssi 1/1 Test: wpa_supplicant SET relative RSSI PASS wpas_ctrl_set_sched_scan_relative_rssi 0.090255 2022-04-14 11:06:14.380024 passed all 1 test case(s) 2022-04-14 11:06:14 ./run-tests.py wpas_mesh_dynamic_interface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_dynamic_interface 1/1 Test: wpa_supplicant mesh with dynamic interface mesh0 address 42:00:00:00:00:00 mesh-wlan1-0 address 42:00:00:00:01:00 Make sure another dynamic group can be added mesh0 address 42:00:00:00:00:00 mesh-wlan1-1 address 42:00:00:00:01:00 PASS wpas_mesh_dynamic_interface 2.024449 2022-04-14 11:06:16.570404 passed all 1 test case(s) 2022-04-14 11:06:16 ./run-tests.py wps_ext_m1_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m1_invalid 1/1 Test: WPS proto: M1 failing parsing Starting AP wlan3 PASS wps_ext_m1_invalid 1.049695 2022-04-14 11:06:17.787626 passed all 1 test case(s) 2022-04-14 11:06:17 ./run-tests.py wps_ext_m3_missing_e_hash2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m3_missing_e_hash2 1/1 Test: WPS proto: M3 missing E-Hash2 Starting AP wlan3 PASS wps_ext_m3_missing_e_hash2 1.060746 2022-04-14 11:06:19.017512 passed all 1 test case(s) 2022-04-14 11:06:19 ./stop.sh