2022-05-25 14:25:25 export USER=root 2022-05-25 14:25:25 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-05-25 14:26:07 ./start.sh 2022-05-25 14:26:07 ./run-tests.py ap_basic_rates DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_basic_rates 1/1 Test: Open AP with lots of basic rates Starting AP wlan3 Connect STA wlan0 to AP PASS ap_basic_rates 0.193841 2022-05-25 14:26:08.878914 passed all 1 test case(s) 2022-05-25 14:26:08 ./run-tests.py ap_bss_add_remove_during_ht_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_remove_during_ht_scan 1/1 Test: Dynamic BSS add during HT40 co-ex scan Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan0 to AP Connect STA wlan1 to AP Removing BSS wlan3-2 Removing BSS wlan3 Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Removing BSS wlan3-2 Connect STA wlan1 to AP Connect STA wlan0 to AP Removing BSS wlan3 Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Removing BSS wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_bss_add_remove_during_ht_scan 11.142333 2022-05-25 14:26:20.191219 passed all 1 test case(s) 2022-05-25 14:26:20 ./run-tests.py ap_cipher_bip_gmac_128 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_bip_gmac_128 1/1 Test: WPA2-PSK with BIP-GMAC-128 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_bip_gmac_128 0.330313 2022-05-25 14:26:20.687166 passed all 1 test case(s) 2022-05-25 14:26:20 ./run-tests.py ap_cipher_gcmp_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_gcmp_ccmp 1/1 Test: WPA2-PSK/GCMP/CCMP ciphers Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_cipher_gcmp_ccmp 0.794887 2022-05-25 14:26:21.650151 passed all 1 test case(s) 2022-05-25 14:26:21 ./run-tests.py ap_csa_ecsa_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_ecsa_only 1/1 Test: AP Channel Switch, one switch with only ECSA IE Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_ecsa_only 1.184774 2022-05-25 14:26:23.003380 passed all 1 test case(s) 2022-05-25 14:26:23 ./run-tests.py ap_ft_over_ds_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_proto 1/1 Test: WPA2-PSK-FT AP over DS protocol testing Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_over_ds_proto 0.436669 2022-05-25 14:26:23.607136 passed all 1 test case(s) 2022-05-25 14:26:23 ./run-tests.py ap_ft_over_ds_unknown_target DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_unknown_target 1/1 Test: WPA2-PSK-FT AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ft_over_ds_unknown_target 1.236439 2022-05-25 14:26:25.012341 passed all 1 test case(s) 2022-05-25 14:26:25 ./run-tests.py ap_ft_vlan_disconnected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_vlan_disconnected 1/1 Test: WPA2-PSK-FT AP with VLAN and local key generation Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_vlan_disconnected 0.816773 2022-05-25 14:26:25.996934 passed all 1 test case(s) 2022-05-25 14:26:26 ./run-tests.py ap_hs20_auto_interworking_no_cred_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_no_cred_match 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 but no cred match Starting AP wlan3 Connect STA wlan0 to AP Verify that scanning continues when there is partial network block match Scan completed Scan completed PASS ap_hs20_auto_interworking_no_cred_match 12.545952 2022-05-25 14:26:38.709588 passed all 1 test case(s) 2022-05-25 14:26:38 ./run-tests.py ap_hs20_deauth_req_pmf_htc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_deauth_req_pmf_htc 1/1 Test: Hotspot 2.0 connection and deauthentication request PMF misbehavior (+HTC) Starting AP wlan3 Connection timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 2608, in test_ap_hs20_deauth_req_pmf_htc run_ap_hs20_deauth_req_pmf_htc(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 2615, in run_ap_hs20_deauth_req_pmf_htc hapd = eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user", release=1) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 863, in eap_test interworking_connect(dev, bssid, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 143, in interworking_connect interworking_auth(dev, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 152, in interworking_auth dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1411, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_deauth_req_pmf_htc 15.305965 2022-05-25 14:26:54.182778 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_deauth_req_pmf_htc 2022-05-25 14:26:54 ./run-tests.py ap_ht40_scan_conflict2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_conflict2 1/1 Test: HT40 co-ex scan conflict (HT40-) Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_conflict2 2.799313 2022-05-25 14:26:57.152111 passed all 1 test case(s) 2022-05-25 14:26:57 ./run-tests.py ap_require_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_require_ht 1/1 Test: Require HT Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan2 to AP PASS ap_require_ht 0.269345 2022-05-25 14:26:57.586930 passed all 1 test case(s) 2022-05-25 14:26:57 ./run-tests.py ap_roam_during_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_during_scan 1/1 Test: Roam command during a scan operation Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_roam_during_scan 0.359951 2022-05-25 14:26:58.111800 passed all 1 test case(s) 2022-05-25 14:26:58 ./run-tests.py ap_track_sta_force_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_force_5ghz 1/1 Test: Dualband AP forcing dualband STA to connect on 5 GHz Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_track_sta_force_5ghz 0.698155 2022-05-25 14:26:58.975637 passed all 1 test case(s) 2022-05-25 14:26:59 ./run-tests.py ap_vht80_invalid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_invalid2 1/1 Test: VHT with invalid 80 MHz channel configuration (seg0) Starting AP wlan3 Country code at the end: 00 PASS ap_vht80_invalid2 1.108964 2022-05-25 14:27:00.251466 passed all 1 test case(s) 2022-05-25 14:27:00 ./run-tests.py ap_wpa2_eap_fast_eap_sim DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_sim 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 1966, in test_ap_wpa2_eap_fast_eap_sim ca_cert="auth_serv/ca.pem", phase2="auth=SIM") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 165, in eap_connect expect_cert_error=expect_cert_error) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_fast_eap_sim 10.232224 2022-05-25 14:27:10.648125 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_fast_eap_sim 2022-05-25 14:27:10 ./run-tests.py ap_wpa2_eap_pwd_salt_sha256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_salt_sha256 1/1 Test: WPA2-Enterprise connection using EAP-pwd and salted password SHA256 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_pwd_salt_sha256 0.240114 2022-05-25 14:27:11.056503 passed all 1 test case(s) 2022-05-25 14:27:11 ./run-tests.py ap_wpa2_eap_sim_ext_replace_sim2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_ext_replace_sim2 1/1 Test: EAP-SIM with external GSM auth and replacing SIM and clearing pseudonym identity Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_ext_replace_sim2 0.34225 2022-05-25 14:27:11.564440 passed all 1 test case(s) 2022-05-25 14:27:11 ./run-tests.py ap_wpa2_eap_sim_id_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_id_1 1/1 Test: WPA2-Enterprise connection using EAP-SIM (pseudonym, no reauth) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_id_1 0.244552 2022-05-25 14:27:11.974713 passed all 1 test case(s) 2022-05-25 14:27:12 ./run-tests.py ap_wpa2_eap_tls_diff_ca_trust2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_diff_ca_trust2 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/PAP and different CA trust Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_diff_ca_trust2 0.301334 2022-05-25 14:27:12.440445 passed all 1 test case(s) 2022-05-25 14:27:12 ./run-tests.py ap_wpa2_eap_tls_neg_domain_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_neg_domain_match 1/1 Test: WPA2-Enterprise negative test - domain mismatch Starting AP wlan3 Connect STA wlan0 to AP Domain mismatch not reported Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2599, in test_ap_wpa2_eap_tls_neg_domain_match raise Exception("Domain mismatch not reported") Exception: Domain mismatch not reported FAIL ap_wpa2_eap_tls_neg_domain_match 0.212269 2022-05-25 14:27:12.820662 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_tls_neg_domain_match 2022-05-25 14:27:12 ./run-tests.py ap_wpa2_eap_tls_ocsp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp 1/1 Test: WPA2-Enterprise connection using EAP-TLS and verifying OCSP Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 4133, in test_ap_wpa2_eap_tls_ocsp private_key_passwd="whatever", ocsp=2) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 165, in eap_connect expect_cert_error=expect_cert_error) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_tls_ocsp 10.183831 2022-05-25 14:27:23.171743 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_tls_ocsp 2022-05-25 14:27:23 ./run-tests.py ap_wpa2_psk_supp_proto_unexpected_group_msg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_unexpected_group_msg 1/1 Test: WPA2-PSK supplicant protocol testing: unexpected group message Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_unexpected_group_msg 0.194824 2022-05-25 14:27:23.534557 passed all 1 test case(s) 2022-05-25 14:27:23 ./run-tests.py ap_wpa2_strict_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_strict_rekey 1/1 Test: WPA2-PSK AP and strict GTK rekey enforced by AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_strict_rekey 0.857291 2022-05-25 14:27:24.556946 passed all 1 test case(s) 2022-05-25 14:27:24 ./run-tests.py ap_wpa_mixed_tdls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_mixed_tdls 1/1 Test: WPA+WPA2-PSK AP and two stations using TDLS Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Teardown TDLS Setup TDLS PASS ap_wpa_mixed_tdls 4.495076 2022-05-25 14:27:29.217493 passed all 1 test case(s) 2022-05-25 14:27:29 ./run-tests.py ap_wps_er_http_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto 1/1 Test: WPS ER HTTP protocol testing HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/76267744/1 Valid Probe Request notification Incorrect event URL AP id Missing AP id Incorrect event URL event id Incorrect event URL prefix Unsupported request Unsupported request and OOM Too short WLANEvent Invalid WLANEventMAC Unknown WLANEventType Probe Request notification without any attributes Probe Request notification with invalid attribute EAP message without any attributes EAP message with invalid attribute EAP message from new STA and not M1 EAP message: M1 EAP message: WSC_ACK EAP message: M1 EAP message: WSC_NACK EAP message: M1 - Too long attribute values EAP message: M1 missing UUID-E EAP message: M1 missing MAC Address EAP message: M1 missing Enrollee Nonce EAP message: M1 missing Public Key EAP message: M1 missing Authentication Type flags EAP message: M1 missing Encryption Type Flags EAP message: M1 missing Connection Type flags EAP message: M1 missing Config Methods EAP message: M1 missing Wi-Fi Protected Setup State EAP message: M1 missing Manufacturer EAP message: M1 missing Model Name EAP message: M1 missing Model Number EAP message: M1 missing Serial Number EAP message: M1 missing Primary Device Type EAP message: M1 missing Device Name EAP message: M1 missing RF Bands EAP message: M1 missing Association State EAP message: M1 missing Device Password ID EAP message: M1 missing Configuration Error EAP message: M1 missing OS Version Check max concurrent requests recv[8]: len=0 recv[9]: len=0 recv[10]: len=0 recv[11]: len=0 recv[12]: len=0 recv[13]: len=0 recv[14]: len=0 recv[15]: len=0 recv[16]: len=0 recv[17]: len=0 recv[18]: len=0 recv[19]: len=0 8 concurrent HTTP GET operations returned response OOM in HTTP server Invalid HTTP header EAP message: M1 PASS ap_wps_er_http_proto 1.288859 2022-05-25 14:27:30.672446 passed all 1 test case(s) 2022-05-25 14:27:30 ./run-tests.py ap_wps_reg_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config 1/1 Test: WPS registrar configuring an AP using AP PIN Starting AP wlan3 WPS configuration step Re-configure back to open PASS ap_wps_reg_config 4.301768 2022-05-25 14:27:35.139834 passed all 1 test case(s) 2022-05-25 14:27:35 ./run-tests.py cfg80211_hostapd_ext_sta_remove DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START cfg80211_hostapd_ext_sta_remove 1/1 Test: cfg80211 DEL_STATION issued externally to hostapd Starting AP wlan3 Connect STA wlan0 to AP PASS cfg80211_hostapd_ext_sta_remove 0.196749 2022-05-25 14:27:35.502264 passed all 1 test case(s) 2022-05-25 14:27:35 ./run-tests.py concurrent_grpform_while_connecting DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_grpform_while_connecting 1/1 Test: Concurrent P2P group formation while connecting to an AP Start connection to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP Form a P2P group while connecting to an AP Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Confirm AP connection after P2P group removal PASS concurrent_grpform_while_connecting 5.231673 2022-05-25 14:27:40.898837 passed all 1 test case(s) 2022-05-25 14:27:40 ./run-tests.py connect_cmd_bssid_hint DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_cmd_bssid_hint 1/1 Test: cfg80211 connect command with bssid_hint Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan5 to AP Connect STA wlan5 to AP PASS connect_cmd_bssid_hint 0.430619 2022-05-25 14:27:41.496270 passed all 1 test case(s) 2022-05-25 14:27:41 ./run-tests.py dbus_p2p_persistent DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_persistent 1/1 Test: D-Bus P2P persistent group No dbus module available Skip test case: No dbus module available SKIP dbus_p2p_persistent 0.070202 2022-05-25 14:27:41.733036 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:27:41 ./run-tests.py dbus_scan_abort DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_scan_abort 1/1 Test: D-Bus scan trigger and abort No dbus module available Skip test case: No dbus module available SKIP dbus_scan_abort 0.068033 2022-05-25 14:27:41.968531 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:27:41 ./run-tests.py dpp_ap_config_p256_p384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p256_p384 1/1 Test: DPP and AP configuration (P-256 + P-384) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p256_p384 0.298642 2022-05-25 14:27:42.434443 passed all 1 test case(s) 2022-05-25 14:27:42 ./run-tests.py dpp_ap_config_p521_p521 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p521_p521 1/1 Test: DPP and AP configuration (P-521 + P-521) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p521_p521 0.30664 2022-05-25 14:27:42.907238 passed all 1 test case(s) 2022-05-25 14:27:42 ./run-tests.py dpp_auth_resp_status_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auth_resp_status_failure 1/1 Test: DPP and Auth Resp(status) build failure PASS dpp_auth_resp_status_failure 0.195808 2022-05-25 14:27:43.269898 passed all 1 test case(s) 2022-05-25 14:27:43 ./run-tests.py dpp_config_dpp_override_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_override_secp384r1 1/1 Test: DPP Config Object override (P-384) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_override_secp384r1 0.096347 2022-05-25 14:27:43.533620 passed all 1 test case(s) 2022-05-25 14:27:43 ./run-tests.py dpp_config_error_legacy_too_short_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_error_legacy_too_short_psk 1/1 Test: DPP Config Object legacy error - too short psk_hex dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_error_legacy_too_short_psk 0.083792 2022-05-25 14:27:43.782342 passed all 1 test case(s) 2022-05-25 14:27:43 ./run-tests.py dpp_configurator_enroll_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_configurator_enroll_conf 1/1 Test: DPP Configurator enrolling followed by use of the new Configurator dev1 displays QR Code and dev0 scans it dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_configurator_enroll_conf 0.104607 2022-05-25 14:27:44.054127 passed all 1 test case(s) 2022-05-25 14:27:44 ./run-tests.py dpp_nfc_uri_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_uri_hostapd 1/1 Test: DPP bootstrapping via NFC URI record (hostapd) Starting AP wlan3 Generated URI: DPP:C:81/1;M:020000000300;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACgYgEosYBy9hBYV7KF9Zy0cXDnIy8j8BxABFxxLlxYgk=;; Bootstrapping info: type=NFC-URI mac_addr=02:00:00:00:03:00 info= num_freq=1 use_freq=2412 curve=prime256v1 pkhash=ee1c9fb71dfd8664f6b822d0542abae1915ff6b30de0cc7197c0d697a79c6896 version=0 PASS dpp_nfc_uri_hostapd 0.117082 2022-05-25 14:27:44.334135 passed all 1 test case(s) 2022-05-25 14:27:44 ./run-tests.py dpp_pfs_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pfs_errors 1/1 Test: DPP PFS error cases Starting AP wlan3 Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 6553, in test_dpp_pfs_errors dpp_netaccesskey=params1_sta_netaccesskey) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1140, in connect self.connect_network(id) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 500, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1411, in wait_connected raise Exception(error) Exception: Connection timed out FAIL dpp_pfs_errors 10.14996 2022-05-25 14:27:54.649706 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_pfs_errors 2022-05-25 14:27:54 ./run-tests.py dpp_pkex_code_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_code_mismatch 1/1 Test: DPP and PKEX with mismatching code PASS dpp_pkex_code_mismatch 0.09175 2022-05-25 14:27:54.910044 passed all 1 test case(s) 2022-05-25 14:27:54 ./run-tests.py dpp_proto_after_wrapped_data_auth_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_after_wrapped_data_auth_conf 1/1 Test: DPP protocol testing - attribute after Wrapped Data in Auth Conf PASS dpp_proto_after_wrapped_data_auth_conf 0.079905 2022-05-25 14:27:55.154679 passed all 1 test case(s) 2022-05-25 14:27:55 ./run-tests.py dpp_proto_after_wrapped_data_pkex_cr_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_after_wrapped_data_pkex_cr_req 1/1 Test: DPP protocol testing - attribute after Wrapped Data in PKEX CR Req PASS dpp_proto_after_wrapped_data_pkex_cr_req 0.077526 2022-05-25 14:27:55.396866 passed all 1 test case(s) 2022-05-25 14:27:55 ./run-tests.py dpp_proto_auth_req_no_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_req_no_r_bootstrap_key 1/1 Test: DPP protocol testing - no R-bootstrap key in Auth Req PASS dpp_proto_auth_req_no_r_bootstrap_key 0.176176 2022-05-25 14:27:55.737495 passed all 1 test case(s) 2022-05-25 14:27:55 ./run-tests.py dpp_proto_auth_resp_no_r_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_no_r_auth 1/1 Test: DPP protocol testing - no R-auth in Auth Resp PASS dpp_proto_auth_resp_no_r_auth 0.18019 2022-05-25 14:27:56.082902 passed all 1 test case(s) 2022-05-25 14:27:56 ./run-tests.py dpp_proto_pkex_exchange_resp_invalid_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_exchange_resp_invalid_status 1/1 Test: DPP protocol testing - invalid Status in PKEX Exchange Response PASS dpp_proto_pkex_exchange_resp_invalid_status 0.07814 2022-05-25 14:27:56.327151 passed all 1 test case(s) 2022-05-25 14:27:56 ./run-tests.py dpp_qr_code_auth_enrollee_init_netrole DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_enrollee_init_netrole 1/1 Test: DPP QR Code and enrollee initiating with netrole specified PASS dpp_qr_code_auth_enrollee_init_netrole 0.101303 2022-05-25 14:27:56.594548 passed all 1 test case(s) 2022-05-25 14:27:56 ./run-tests.py dpp_qr_code_auth_incompatible_roles_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_incompatible_roles_failure 1/1 Test: DPP QR Code and authentication exchange (incompatible roles failure) dev0 displays QR Code dev1 scans QR Code dev1 initiates DPP Authentication PASS dpp_qr_code_auth_incompatible_roles_failure 0.078689 2022-05-25 14:27:56.839599 passed all 1 test case(s) 2022-05-25 14:27:56 ./run-tests.py dpp_qr_code_set_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_set_key 1/1 Test: DPP QR Code and fixed bootstrapping key dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_set_key 0.081714 2022-05-25 14:27:57.086582 passed all 1 test case(s) 2022-05-25 14:27:57 ./run-tests.py dpp_tcp_pkex_auto_connect_2_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_pkex_auto_connect_2_status 1/1 Test: DPP/PKEXv2 over TCP and automatic connection status Starting AP wlan3 Skip test case: DPP version 3 not supported SKIP dpp_tcp_pkex_auto_connect_2_status 0.120521 2022-05-25 14:27:57.372534 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:27:57 ./run-tests.py fils_auth_gtk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_auth_gtk_rekey 1/1 Test: GTK rekeying after FILS authentication Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_auth_gtk_rekey 6.241656 2022-05-25 14:28:03.780909 passed all 1 test case(s) 2022-05-25 14:28:03 ./run-tests.py fils_sk_pfs_30 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_30 1/1 Test: FILS SK with PFS (DH group 30) Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_30 0.349577 2022-05-25 14:28:04.297378 passed all 1 test case(s) 2022-05-25 14:28:04 ./run-tests.py fst_scan_nomb DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_scan_nomb 1/1 Test: FST scan no MB IE presence with 1 AP start PASS fst_scan_nomb 3.196992 2022-05-25 14:28:07.659403 passed all 1 test case(s) 2022-05-25 14:28:07 ./run-tests.py fst_sta_start_session_negative_llt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session_negative_llt 1/1 Test: FST STA start session - negative llt Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Negative LLT) PASS fst_sta_start_session_negative_llt 0.47161 2022-05-25 14:28:08.296500 passed all 1 test case(s) 2022-05-25 14:28:08 ./run-tests.py fst_sta_transfer_session_bad_session_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_transfer_session_bad_session_id 1/1 Test: FST STA transfer session - bad session id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Session ID) PASS fst_sta_transfer_session_bad_session_id 0.430279 2022-05-25 14:28:08.892659 passed all 1 test case(s) 2022-05-25 14:28:08 ./run-tests.py fst_test_setup DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_test_setup 1/1 Test: FST setup using separate commands Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_test_setup 0.563424 2022-05-25 14:28:09.622448 passed all 1 test case(s) 2022-05-25 14:28:09 ./run-tests.py gas_malformed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_malformed 1/1 Test: GAS malformed response frames Starting AP wlan3 PASS gas_malformed 0.15978 2022-05-25 14:28:09.947524 passed all 1 test case(s) 2022-05-25 14:28:09 ./run-tests.py grpform_per_sta_psk_wps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_per_sta_psk_wps 1/1 Test: P2P group formation with per-STA PSKs with non-P2P WPS STA Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_per_sta_psk_wps 4.737292 2022-05-25 14:28:14.850074 passed all 1 test case(s) 2022-05-25 14:28:14 ./run-tests.py hapd_ctrl_radar DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_radar 1/1 Test: hostapd and RADAR ctrl_iface command Starting AP wlan3 PASS hapd_ctrl_radar 0.107684 2022-05-25 14:28:15.123392 passed all 1 test case(s) 2022-05-25 14:28:15 ./run-tests.py hapd_ctrl_set_deny_mac_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_set_deny_mac_file 1/1 Test: hostapd and SET deny_mac_file ctrl_iface command Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS hapd_ctrl_set_deny_mac_file 1.312389 2022-05-25 14:28:16.603278 passed all 1 test case(s) 2022-05-25 14:28:16 ./run-tests.py mesh_secure_ocv_mix_legacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_mix_legacy 1/1 Test: Mesh network with a VHT STA and a legacy STA under OCV Country code at the end: 00 PASS mesh_secure_ocv_mix_legacy 1.300929 2022-05-25 14:28:18.070580 passed all 1 test case(s) 2022-05-25 14:28:18 ./run-tests.py p2p_channel_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_5ghz 1/1 Test: P2P group formation with 5 GHz preference Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2p_channel_5ghz 1.123406 2022-05-25 14:28:19.359055 passed all 1 test case(s) 2022-05-25 14:28:19 ./run-tests.py p2p_channel_avoid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_avoid 1/1 Test: P2P and avoid frequencies driver event Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2p_channel_avoid 2.069518 2022-05-25 14:28:21.593178 passed all 1 test case(s) 2022-05-25 14:28:21 ./run-tests.py p2p_ext_vendor_elem_pd_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_ext_vendor_elem_pd_resp 1/1 Test: VENDOR_ELEM in PD Response frames wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_ext_vendor_elem_pd_resp 0.329184 2022-05-25 14:28:22.094477 passed all 1 test case(s) 2022-05-25 14:28:22 ./run-tests.py radius_psk_reject_during_4way_hs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_psk_reject_during_4way_hs 1/1 Test: WPA2 with PSK from RADIUS and reject Starting AP wlan3 Connect STA wlan0 to AP Received authentication request PASS radius_psk_reject_during_4way_hs 1.256287 2022-05-25 14:28:23.516768 passed all 1 test case(s) 2022-05-25 14:28:23 ./run-tests.py rrm_lci_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req 1/1 Test: hostapd lci request Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan0 to AP PASS rrm_lci_req 0.253005 2022-05-25 14:28:23.938501 passed all 1 test case(s) 2022-05-25 14:28:23 ./run-tests.py sae_pmk_lifetime DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pmk_lifetime 1/1 Test: SAE and PMK lifetime Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-SAE-CCMP][ESS] test-sae PASS sae_pmk_lifetime 11.24084 2022-05-25 14:28:35.345946 passed all 1 test case(s) 2022-05-25 14:28:35 ./run-tests.py sigma_dut_ap_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_5ghz 1/1 Test: sigma_dut controlled AP on 5 GHz Skip test case: sigma_dut not available SKIP sigma_dut_ap_5ghz 0.11397 2022-05-25 14:28:35.627935 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:28:35 ./run-tests.py sigma_dut_ap_eap_sha256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_eap_sha256 1/1 Test: sigma_dut controlled AP WPA2-Enterprise SHA256 Skip test case: sigma_dut not available SKIP sigma_dut_ap_eap_sha256 0.125212 2022-05-25 14:28:35.920600 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:28:35 ./run-tests.py sigma_dut_ap_ft_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_ft_eap 1/1 Test: sigma_dut controlled AP FT-EAP Skip test case: sigma_dut not available SKIP sigma_dut_ap_ft_eap 0.122106 2022-05-25 14:28:36.211456 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:28:36 ./run-tests.py sigma_dut_ap_sae_h2e DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_h2e 1/1 Test: sigma_dut controlled AP with SAE H2E Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_h2e 0.137423 2022-05-25 14:28:36.516466 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:28:36 ./run-tests.py sigma_dut_dpp_qr_configurator_chirp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_configurator_chirp 1/1 Test: sigma_dut DPP/QR as Configurator waiting for chirp Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_configurator_chirp 0.070056 2022-05-25 14:28:36.755038 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:28:36 ./run-tests.py sigma_dut_dpp_qr_mutual_resp_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_mutual_resp_enrollee 1/1 Test: sigma_dut DPP/QR (mutual) responder as Enrollee Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_mutual_resp_enrollee 0.116705 2022-05-25 14:28:37.039544 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:28:37 ./run-tests.py sigma_dut_eap_ttls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_eap_ttls 1/1 Test: sigma_dut controlled STA and EAP-TTLS parameters Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_eap_ttls 0.126306 2022-05-25 14:28:37.334932 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:28:37 ./run-tests.py sigma_dut_venue_url DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_venue_url 1/1 Test: sigma_dut controlled Venue URL fetch Skip test case: sigma_dut not available SKIP sigma_dut_venue_url 0.069906 2022-05-25 14:28:37.573144 passed all 0 test case(s) skipped 1 test case(s) 2022-05-25 14:28:37 ./run-tests.py suite_b_pmkid_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_pmkid_failure 1/1 Test: WPA2/GCMP connection at Suite B 128-bit level and PMKID derivation failure Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_pmkid_failure 0.325475 2022-05-25 14:28:38.065947 passed all 1 test case(s) 2022-05-25 14:28:38 ./run-tests.py wifi_display_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_disable 1/1 Test: Peer disabling Wi-Fi Display advertisement PASS wifi_display_disable 1.527482 2022-05-25 14:28:39.759341 passed all 1 test case(s) 2022-05-25 14:28:39 ./run-tests.py wnm_disassoc_imminent_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_disassoc_imminent_fail 1/1 Test: WNM Disassociation Imminent failure Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_disassoc_imminent_fail 0.18603 2022-05-25 14:28:40.112503 passed all 1 test case(s) 2022-05-25 14:28:40 ./run-tests.py wpa2_ocv_sta_override_sa_query_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_sta_override_sa_query_req 1/1 Test: OCV on 2.4 GHz and STA override SA Query Request Starting AP wlan3 Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 943, in test_wpa2_ocv_sta_override_sa_query_req ieee80211w="2") File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1140, in connect self.connect_network(id) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 500, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1411, in wait_connected raise Exception(error) Exception: Connection timed out FAIL wpa2_ocv_sta_override_sa_query_req 10.129819 2022-05-25 14:28:50.410355 passed 0 test case(s) skipped 0 test case(s) failed tests: wpa2_ocv_sta_override_sa_query_req 2022-05-25 14:28:50 ./run-tests.py wpas_ap_and_assoc_req_p2p_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_and_assoc_req_p2p_ie 1/1 Test: wpa_supplicant AP mode - unexpected P2P IE in Association Request Connect STA wlan1 to AP PASS wpas_ap_and_assoc_req_p2p_ie 0.258209 2022-05-25 14:28:50.838185 passed all 1 test case(s) 2022-05-25 14:28:50 ./run-tests.py wpas_ap_sae_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_sae_password 1/1 Test: wpa_supplicant AP mode - SAE using sae_password Connect STA wlan1 to AP PASS wpas_ap_sae_password 0.263872 2022-05-25 14:28:51.267659 passed all 1 test case(s) 2022-05-25 14:28:51 ./run-tests.py wpas_ctrl_signal_monitor DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_signal_monitor 1/1 Test: wpa_supplicant SIGNAL_MONITOR command Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wpas_ctrl_signal_monitor 0.697608 2022-05-25 14:28:52.133985 passed all 1 test case(s) 2022-05-25 14:28:52 ./run-tests.py wpas_mesh_pmksa_caching2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_pmksa_caching2 1/1 Test: Secure mesh network and PMKSA caching with no_auto_peer=1 PASS wpas_mesh_pmksa_caching2 1.835605 2022-05-25 14:28:54.137988 passed all 1 test case(s) 2022-05-25 14:28:54 ./run-tests.py wps_ext_m2_nack_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_nack_invalid 1/1 Test: WPS proto: M2 followed by invalid NACK Starting AP wlan3 PASS wps_ext_m2_nack_invalid 0.256307 2022-05-25 14:28:54.561313 passed all 1 test case(s) 2022-05-25 14:28:54 ./run-tests.py wps_ext_proto_m6_no_encr_settings DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m6_no_encr_settings 1/1 Test: WPS and no Encr Settings in M6 Starting AP wlan3 PASS wps_ext_proto_m6_no_encr_settings 0.25564 2022-05-25 14:28:54.984121 passed all 1 test case(s) 2022-05-25 14:28:55 ./stop.sh 1653488935.100304: MEMLEAK[0x563c23395790]: len 46 1653488935.100315: WPA_TRACE: memleak - START 1653488935.100894: [0]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_malloc+0x90) [0x563c21233e80] 1653488935.100918: os_malloc() ../src/utils/os_unix.c:721 1653488935.100923: [1]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_strdup+0x1a) [0x563c2123444a] 1653488935.100927: os_strdup() ../src/utils/os_unix.c:791 1653488935.100933: [2]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_dbus_register_object_per_iface+0x6c) [0x563c213b06cc] 1653488935.100937: wpa_dbus_register_object_per_iface() dbus/dbus_new_helpers.c:549 1653488935.100942: [3]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_dbus_register_p2p_group+0x12a) [0x563c213b631a] 1653488935.100945: wpas_dbus_register_p2p_group() dbus/dbus_new.c:4907 1653488935.100949: [4]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_notify_p2p_group_started+0x1a) [0x563c2122531a] 1653488935.100952: wpas_notify_p2p_group_started() notify.c:721 1653488935.100957: [5]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0xbf1d0) [0x563c2128f1d0] 1653488935.100960: wpas_group_formation_completed() p2p_supplicant.c:1459 1653488935.100964: [6]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_p2p_wps_success+0xc5) [0x563c21298c25] 1653488935.100968: wpas_p2p_wps_success() p2p_supplicant.c:7181 1653488935.102373: [7]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1914df) [0x563c213614df] 1653488935.102382: hostapd_wps_reg_success_cb() ../src/ap/wps_hostapd.c:247 1653488935.102388: [8]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wps_registrar_process_msg+0x7f1) [0x563c21306ae1] 1653488935.102392: wps_cb_reg_success() ../src/wps/wps_registrar.c:1258 1653488935.102393: wps_process_wsc_done() ../src/wps/wps_registrar.c:3362 1653488935.102394: wps_registrar_process_msg() ../src/wps/wps_registrar.c:3445 1653488935.102797: [9]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x194e64) [0x563c21364e64] 1653488935.102803: eap_wsc_process() ../src/eap_server/eap_server_wsc.c:439 1653488935.103465: [10]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x17a59c) [0x563c2134a59c] 1653488935.103470: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:518 1653488935.103471: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:510 1653488935.103474: [11]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eap_server_sm_step+0x55a) [0x563c2134c4da] 1653488935.103476: sm_EAP_Step() ../src/eap_server/eap_server.c:1315 1653488935.103477: eap_server_sm_step() ../src/eap_server/eap_server.c:1824 1653488935.103822: [12]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1671ee) [0x563c213371ee] 1653488935.103826: eapol_sm_step_run() ../src/eapol_auth/eapol_auth_sm.c:943 1653488935.103829: [13]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eloop_run+0x214) [0x563c21236144] 1653488935.103831: eloop_run() ../src/utils/eloop.c:1206 1653488935.103835: [14]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_supplicant_run+0x7b) [0x563c213e851b] 1653488935.103837: wpa_supplicant_run() wpa_supplicant.c:7478 1653488935.103840: [15]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(main+0x3eb) [0x563c2121c93b] 1653488935.103842: main() main.c:392 1653488935.103843: WPA_TRACE: memleak - END 1653488935.103843: MEMLEAK[0x563c244cb5b0]: len 9 1653488935.103844: WPA_TRACE: memleak - START 1653488935.104282: [0]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_malloc+0x90) [0x563c21233e80] 1653488935.104285: os_malloc() ../src/utils/os_unix.c:721 1653488935.104288: [1]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_zalloc+0x9) [0x563c21234409] 1653488935.104308: os_zalloc() ../src/utils/os_unix.c:779 1653488935.104312: [2]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1e1e27) [0x563c213b1e27] 1653488935.104315: wpas_dbus_register() dbus/dbus_new.c:2523 1653488935.104318: [3]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_dbus_register_p2p_group+0x115) [0x563c213b6305] 1653488935.104320: wpas_dbus_register_p2p_group() dbus/dbus_new.c:4907 1653488935.104323: [4]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_notify_p2p_group_started+0x1a) [0x563c2122531a] 1653488935.104325: wpas_notify_p2p_group_started() notify.c:721 1653488935.104329: [5]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0xbf1d0) [0x563c2128f1d0] 1653488935.104331: wpas_group_formation_completed() p2p_supplicant.c:1459 1653488935.104334: [6]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_p2p_wps_success+0xc5) [0x563c21298c25] 1653488935.104337: wpas_p2p_wps_success() p2p_supplicant.c:7181 1653488935.104339: [7]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1914df) [0x563c213614df] 1653488935.104341: hostapd_wps_reg_success_cb() ../src/ap/wps_hostapd.c:247 1653488935.104344: [8]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wps_registrar_process_msg+0x7f1) [0x563c21306ae1] 1653488935.104346: wps_cb_reg_success() ../src/wps/wps_registrar.c:1258 1653488935.104347: wps_process_wsc_done() ../src/wps/wps_registrar.c:3362 1653488935.104347: wps_registrar_process_msg() ../src/wps/wps_registrar.c:3445 1653488935.104349: [9]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x194e64) [0x563c21364e64] 1653488935.104352: eap_wsc_process() ../src/eap_server/eap_server_wsc.c:439 1653488935.104354: [10]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x17a59c) [0x563c2134a59c] 1653488935.104356: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:518 1653488935.104357: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:510 1653488935.104359: [11]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eap_server_sm_step+0x55a) [0x563c2134c4da] 1653488935.104361: sm_EAP_Step() ../src/eap_server/eap_server.c:1315 1653488935.104362: eap_server_sm_step() ../src/eap_server/eap_server.c:1824 1653488935.104364: [12]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1671ee) [0x563c213371ee] 1653488935.104366: eapol_sm_step_run() ../src/eapol_auth/eapol_auth_sm.c:943 1653488935.104369: [13]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eloop_run+0x214) [0x563c21236144] 1653488935.104380: eloop_run() ../src/utils/eloop.c:1206 1653488935.104382: [14]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_supplicant_run+0x7b) [0x563c213e851b] 1653488935.104385: wpa_supplicant_run() wpa_supplicant.c:7478 1653488935.104387: [15]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(main+0x3eb) [0x563c2121c93b] 1653488935.104389: main() main.c:392 1653488935.104390: WPA_TRACE: memleak - END 1653488935.104390: MEMLEAK[0x563c233953e0]: len 64 1653488935.104390: WPA_TRACE: memleak - START 1653488935.104805: [0]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_malloc+0x90) [0x563c21233e80] 1653488935.104808: os_malloc() ../src/utils/os_unix.c:721 1653488935.104810: [1]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_zalloc+0x9) [0x563c21234409] 1653488935.104812: os_zalloc() ../src/utils/os_unix.c:779 1653488935.104815: [2]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_dbus_register_p2p_group+0xf0) [0x563c213b62e0] 1653488935.104817: wpas_dbus_register_p2p_group() dbus/dbus_new.c:4896 1653488935.104819: [3]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_notify_p2p_group_started+0x1a) [0x563c2122531a] 1653488935.104827: wpas_notify_p2p_group_started() notify.c:721 1653488935.104830: [4]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0xbf1d0) [0x563c2128f1d0] 1653488935.104832: wpas_group_formation_completed() p2p_supplicant.c:1459 1653488935.104835: [5]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_p2p_wps_success+0xc5) [0x563c21298c25] 1653488935.104837: wpas_p2p_wps_success() p2p_supplicant.c:7181 1653488935.104839: [6]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1914df) [0x563c213614df] 1653488935.104841: hostapd_wps_reg_success_cb() ../src/ap/wps_hostapd.c:247 1653488935.104844: [7]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wps_registrar_process_msg+0x7f1) [0x563c21306ae1] 1653488935.104846: wps_cb_reg_success() ../src/wps/wps_registrar.c:1258 1653488935.104846: wps_process_wsc_done() ../src/wps/wps_registrar.c:3362 1653488935.104847: wps_registrar_process_msg() ../src/wps/wps_registrar.c:3445 1653488935.104849: [8]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x194e64) [0x563c21364e64] 1653488935.104851: eap_wsc_process() ../src/eap_server/eap_server_wsc.c:439 1653488935.104854: [9]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x17a59c) [0x563c2134a59c] 1653488935.104856: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:518 1653488935.104856: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:510 1653488935.104859: [10]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eap_server_sm_step+0x55a) [0x563c2134c4da] 1653488935.104861: sm_EAP_Step() ../src/eap_server/eap_server.c:1315 1653488935.104861: eap_server_sm_step() ../src/eap_server/eap_server.c:1824 1653488935.104864: [11]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1671ee) [0x563c213371ee] 1653488935.104866: eapol_sm_step_run() ../src/eapol_auth/eapol_auth_sm.c:943 1653488935.104868: [12]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eloop_run+0x214) [0x563c21236144] 1653488935.104870: eloop_run() ../src/utils/eloop.c:1206 1653488935.104873: [13]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_supplicant_run+0x7b) [0x563c213e851b] 1653488935.104875: wpa_supplicant_run() wpa_supplicant.c:7478 1653488935.104877: [14]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(main+0x3eb) [0x563c2121c93b] 1653488935.104879: main() main.c:392 1653488935.104880: WPA_TRACE: memleak - END 1653488935.104881: MEMLEAK[0x563c232ac1d0]: len 46 1653488935.104881: WPA_TRACE: memleak - START 1653488935.105301: [0]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_malloc+0x90) [0x563c21233e80] 1653488935.105304: os_malloc() ../src/utils/os_unix.c:721 1653488935.105306: [1]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_strdup+0x1a) [0x563c2123444a] 1653488935.105309: os_strdup() ../src/utils/os_unix.c:791 1653488935.105311: [2]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_dbus_register_p2p_group+0xc4) [0x563c213b62b4] 1653488935.105313: wpas_dbus_register_p2p_group() dbus/dbus_new.c:4890 1653488935.105316: [3]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_notify_p2p_group_started+0x1a) [0x563c2122531a] 1653488935.105318: wpas_notify_p2p_group_started() notify.c:721 1653488935.105320: [4]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0xbf1d0) [0x563c2128f1d0] 1653488935.105322: wpas_group_formation_completed() p2p_supplicant.c:1459 1653488935.105324: [5]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_p2p_wps_success+0xc5) [0x563c21298c25] 1653488935.105327: wpas_p2p_wps_success() p2p_supplicant.c:7181 1653488935.105335: [6]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1914df) [0x563c213614df] 1653488935.105337: hostapd_wps_reg_success_cb() ../src/ap/wps_hostapd.c:247 1653488935.105340: [7]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wps_registrar_process_msg+0x7f1) [0x563c21306ae1] 1653488935.105342: wps_cb_reg_success() ../src/wps/wps_registrar.c:1258 1653488935.105343: wps_process_wsc_done() ../src/wps/wps_registrar.c:3362 1653488935.105343: wps_registrar_process_msg() ../src/wps/wps_registrar.c:3445 1653488935.105345: [8]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x194e64) [0x563c21364e64] 1653488935.105348: eap_wsc_process() ../src/eap_server/eap_server_wsc.c:439 1653488935.105350: [9]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x17a59c) [0x563c2134a59c] 1653488935.105353: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:518 1653488935.105355: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:510 1653488935.105358: [10]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eap_server_sm_step+0x55a) [0x563c2134c4da] 1653488935.105361: sm_EAP_Step() ../src/eap_server/eap_server.c:1315 1653488935.105362: eap_server_sm_step() ../src/eap_server/eap_server.c:1824 1653488935.105374: [11]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x1671ee) [0x563c213371ee] 1653488935.105377: eapol_sm_step_run() ../src/eapol_auth/eapol_auth_sm.c:943 1653488935.105380: [12]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eloop_run+0x214) [0x563c21236144] 1653488935.105383: eloop_run() ../src/utils/eloop.c:1206 1653488935.105386: [13]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_supplicant_run+0x7b) [0x563c213e851b] 1653488935.105389: wpa_supplicant_run() wpa_supplicant.c:7478 1653488935.105392: [14]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(main+0x3eb) [0x563c2121c93b] 1653488935.105395: main() main.c:392 1653488935.105397: WPA_TRACE: memleak - END 1653488935.105397: MEMLEAK: total 165 bytes