2022-07-13 00:52:48 export USER=root 2022-07-13 00:52:48 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2022-07-13 00:53:30 ./start.sh 2022-07-13 00:53:31 ./run-tests.py ap_basic_rates DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_basic_rates 1/1 Test: Open AP with lots of basic rates Starting AP wlan3 Connect STA wlan0 to AP PASS ap_basic_rates 0.213032 2022-07-13 00:53:32.997742 passed all 1 test case(s) 2022-07-13 00:53:33 ./run-tests.py ap_bss_add_remove_during_ht_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_remove_during_ht_scan 1/1 Test: Dynamic BSS add during HT40 co-ex scan Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan0 to AP Connect STA wlan1 to AP Removing BSS wlan3-2 Removing BSS wlan3 Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Removing BSS wlan3-2 Connect STA wlan1 to AP Connect STA wlan0 to AP Removing BSS wlan3 Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Removing BSS wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_bss_add_remove_during_ht_scan 11.215408 2022-07-13 00:53:44.621688 passed all 1 test case(s) 2022-07-13 00:53:44 ./run-tests.py ap_cipher_bip_gmac_128 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_bip_gmac_128 1/1 Test: WPA2-PSK with BIP-GMAC-128 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_bip_gmac_128 0.395514 2022-07-13 00:53:45.433268 passed all 1 test case(s) 2022-07-13 00:53:45 ./run-tests.py ap_cipher_gcmp_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_gcmp_ccmp 1/1 Test: WPA2-PSK/GCMP/CCMP ciphers Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_cipher_gcmp_ccmp 0.764619 2022-07-13 00:53:46.602175 passed all 1 test case(s) 2022-07-13 00:53:46 ./run-tests.py ap_csa_ecsa_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_ecsa_only 1/1 Test: AP Channel Switch, one switch with only ECSA IE Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_ecsa_only 1.253227 2022-07-13 00:53:48.260287 passed all 1 test case(s) 2022-07-13 00:53:48 ./run-tests.py ap_ft_over_ds_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_proto 1/1 Test: WPA2-PSK-FT AP over DS protocol testing Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_over_ds_proto 0.492633 2022-07-13 00:53:49.150726 passed all 1 test case(s) 2022-07-13 00:53:49 ./run-tests.py ap_ft_over_ds_unknown_target DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_unknown_target 1/1 Test: WPA2-PSK-FT AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ft_over_ds_unknown_target 1.28567 2022-07-13 00:53:50.837088 passed all 1 test case(s) 2022-07-13 00:53:50 ./run-tests.py ap_ft_vlan_disconnected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_vlan_disconnected 1/1 Test: WPA2-PSK-FT AP with VLAN and local key generation Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_vlan_disconnected 0.926258 2022-07-13 00:53:52.163896 passed all 1 test case(s) 2022-07-13 00:53:52 ./run-tests.py ap_hs20_auto_interworking_no_cred_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_no_cred_match 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 but no cred match Starting AP wlan3 Connect STA wlan0 to AP Verify that scanning continues when there is partial network block match Scan completed Scan completed PASS ap_hs20_auto_interworking_no_cred_match 12.566142 2022-07-13 00:54:05.132832 passed all 1 test case(s) 2022-07-13 00:54:05 ./run-tests.py ap_hs20_deauth_req_pmf_htc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_deauth_req_pmf_htc 1/1 Test: Hotspot 2.0 connection and deauthentication request PMF misbehavior (+HTC) Starting AP wlan3 PASS ap_hs20_deauth_req_pmf_htc 1.477094 2022-07-13 00:54:07.011687 passed all 1 test case(s) 2022-07-13 00:54:07 ./run-tests.py ap_ht40_scan_conflict2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_conflict2 1/1 Test: HT40 co-ex scan conflict (HT40-) Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_conflict2 2.846866 2022-07-13 00:54:10.261143 passed all 1 test case(s) 2022-07-13 00:54:10 ./run-tests.py ap_require_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_require_ht 1/1 Test: Require HT Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan2 to AP PASS ap_require_ht 0.302327 2022-07-13 00:54:10.964986 passed all 1 test case(s) 2022-07-13 00:54:11 ./run-tests.py ap_roam_during_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_during_scan 1/1 Test: Roam command during a scan operation Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_roam_during_scan 0.373013 2022-07-13 00:54:11.739614 passed all 1 test case(s) 2022-07-13 00:54:11 ./run-tests.py ap_track_sta_force_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_force_5ghz 1/1 Test: Dualband AP forcing dualband STA to connect on 5 GHz Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_track_sta_force_5ghz 0.730811 2022-07-13 00:54:12.873732 passed all 1 test case(s) 2022-07-13 00:54:12 ./run-tests.py ap_vht80_invalid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_invalid2 1/1 Test: VHT with invalid 80 MHz channel configuration (seg0) Starting AP wlan3 Country code at the end: 00 PASS ap_vht80_invalid2 1.143213 2022-07-13 00:54:14.419662 passed all 1 test case(s) 2022-07-13 00:54:14 ./run-tests.py ap_wpa2_eap_fast_eap_sim DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_sim 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_eap_sim 0.362367 2022-07-13 00:54:15.183120 passed all 1 test case(s) 2022-07-13 00:54:15 ./run-tests.py ap_wpa2_eap_pwd_salt_sha256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_salt_sha256 1/1 Test: WPA2-Enterprise connection using EAP-pwd and salted password SHA256 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_pwd_salt_sha256 0.292762 2022-07-13 00:54:15.874921 passed all 1 test case(s) 2022-07-13 00:54:15 ./run-tests.py ap_wpa2_eap_sim_ext_replace_sim2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_ext_replace_sim2 1/1 Test: EAP-SIM with external GSM auth and replacing SIM and clearing pseudonym identity Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_ext_replace_sim2 0.377989 2022-07-13 00:54:16.656420 passed all 1 test case(s) 2022-07-13 00:54:16 ./run-tests.py ap_wpa2_eap_sim_id_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_id_1 1/1 Test: WPA2-Enterprise connection using EAP-SIM (pseudonym, no reauth) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_id_1 0.281661 2022-07-13 00:54:17.342266 passed all 1 test case(s) 2022-07-13 00:54:17 ./run-tests.py ap_wpa2_eap_tls_diff_ca_trust2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_diff_ca_trust2 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/PAP and different CA trust Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_diff_ca_trust2 0.335734 2022-07-13 00:54:18.078298 passed all 1 test case(s) 2022-07-13 00:54:18 ./run-tests.py ap_wpa2_eap_tls_neg_domain_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_neg_domain_match 1/1 Test: WPA2-Enterprise negative test - domain mismatch Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_neg_domain_match 0.261961 2022-07-13 00:54:18.740192 passed all 1 test case(s) 2022-07-13 00:54:18 ./run-tests.py ap_wpa2_eap_tls_ocsp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp 1/1 Test: WPA2-Enterprise connection using EAP-TLS and verifying OCSP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp 0.303295 2022-07-13 00:54:19.443534 passed all 1 test case(s) 2022-07-13 00:54:19 ./run-tests.py ap_wpa2_psk_supp_proto_unexpected_group_msg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_unexpected_group_msg 1/1 Test: WPA2-PSK supplicant protocol testing: unexpected group message Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_unexpected_group_msg 0.228203 2022-07-13 00:54:20.073128 passed all 1 test case(s) 2022-07-13 00:54:20 ./run-tests.py ap_wpa2_strict_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_strict_rekey 1/1 Test: WPA2-PSK AP and strict GTK rekey enforced by AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_strict_rekey 0.890901 2022-07-13 00:54:21.363301 passed all 1 test case(s) 2022-07-13 00:54:21 ./run-tests.py ap_wpa_mixed_tdls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_mixed_tdls 1/1 Test: WPA+WPA2-PSK AP and two stations using TDLS Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Teardown TDLS Setup TDLS PASS ap_wpa_mixed_tdls 5.144465 2022-07-13 00:54:26.907995 passed all 1 test case(s) 2022-07-13 00:54:26 ./run-tests.py ap_wps_er_http_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto 1/1 Test: WPS ER HTTP protocol testing HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/145985254/1 Valid Probe Request notification Incorrect event URL AP id Missing AP id Incorrect event URL event id Incorrect event URL prefix Unsupported request Unsupported request and OOM Too short WLANEvent Invalid WLANEventMAC Unknown WLANEventType Probe Request notification without any attributes Probe Request notification with invalid attribute EAP message without any attributes EAP message with invalid attribute EAP message from new STA and not M1 EAP message: M1 EAP message: WSC_ACK EAP message: M1 EAP message: WSC_NACK EAP message: M1 - Too long attribute values EAP message: M1 missing UUID-E EAP message: M1 missing MAC Address EAP message: M1 missing Enrollee Nonce EAP message: M1 missing Public Key EAP message: M1 missing Authentication Type flags EAP message: M1 missing Encryption Type Flags EAP message: M1 missing Connection Type flags EAP message: M1 missing Config Methods EAP message: M1 missing Wi-Fi Protected Setup State EAP message: M1 missing Manufacturer EAP message: M1 missing Model Name EAP message: M1 missing Model Number EAP message: M1 missing Serial Number EAP message: M1 missing Primary Device Type EAP message: M1 missing Device Name EAP message: M1 missing RF Bands EAP message: M1 missing Association State EAP message: M1 missing Device Password ID EAP message: M1 missing Configuration Error EAP message: M1 missing OS Version Check max concurrent requests recv[8]: len=0 recv[9]: len=0 recv[10]: len=0 recv[11]: len=0 recv[12]: len=0 recv[13]: len=0 recv[14]: len=0 recv[15]: len=0 recv[16]: len=0 recv[17]: len=0 recv[18]: len=0 recv[19]: len=0 8 concurrent HTTP GET operations returned response OOM in HTTP server Invalid HTTP header EAP message: M1 PASS ap_wps_er_http_proto 1.337358 2022-07-13 00:54:28.645922 passed all 1 test case(s) 2022-07-13 00:54:28 ./run-tests.py ap_wps_reg_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config 1/1 Test: WPS registrar configuring an AP using AP PIN Starting AP wlan3 WPS configuration step Re-configure back to open PASS ap_wps_reg_config 4.329836 2022-07-13 00:54:33.377784 passed all 1 test case(s) 2022-07-13 00:54:33 ./run-tests.py cfg80211_hostapd_ext_sta_remove DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START cfg80211_hostapd_ext_sta_remove 1/1 Test: cfg80211 DEL_STATION issued externally to hostapd Starting AP wlan3 Connect STA wlan0 to AP PASS cfg80211_hostapd_ext_sta_remove 0.215335 2022-07-13 00:54:33.993117 passed all 1 test case(s) 2022-07-13 00:54:34 ./run-tests.py concurrent_grpform_while_connecting DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_grpform_while_connecting 1/1 Test: Concurrent P2P group formation while connecting to an AP Start connection to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP Form a P2P group while connecting to an AP Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Confirm AP connection after P2P group removal PASS concurrent_grpform_while_connecting 5.306697 2022-07-13 00:54:39.700865 passed all 1 test case(s) 2022-07-13 00:54:39 ./run-tests.py connect_cmd_bssid_hint DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_cmd_bssid_hint 1/1 Test: cfg80211 connect command with bssid_hint Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan5 to AP Connect STA wlan5 to AP PASS connect_cmd_bssid_hint 0.470413 2022-07-13 00:54:40.570678 passed all 1 test case(s) 2022-07-13 00:54:40 ./run-tests.py dbus_p2p_persistent DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_persistent 1/1 Test: D-Bus P2P persistent group Add a persistent group Persistent group Properties: dbus.Dictionary({dbus.String('ssid'): dbus.String('"DIRECT-v4"', variant_level=1), dbus.String('scan_ssid'): dbus.String('0', variant_level=1), dbus.String('bssid'): dbus.String('02:00:00:00:00:00', variant_level=1), dbus.String('psk'): dbus.String('"3E5mbgnf"', variant_level=1), dbus.String('mem_only_psk'): dbus.String('0', variant_level=1), dbus.String('proto'): dbus.String('RSN', variant_level=1), dbus.String('key_mgmt'): dbus.String('WPA-PSK', variant_level=1), dbus.String('bg_scan_period'): dbus.String('-1', variant_level=1), dbus.String('pairwise'): dbus.String('CCMP', variant_level=1), dbus.String('group'): dbus.String('CCMP TKIP', variant_level=1), dbus.String('auth_alg'): dbus.String('OPEN', variant_level=1), dbus.String('ht'): dbus.String('1', variant_level=1), dbus.String('vht'): dbus.String('1', variant_level=1), dbus.String('ht40'): dbus.String('0', variant_level=1), dbus.String('max_oper_chwidth'): dbus.String('-1', variant_level=1), dbus.String('vht_center_freq1'): dbus.String('0', variant_level=1), dbus.String('vht_center_freq2'): dbus.String('0', variant_level=1), dbus.String('engine'): dbus.String('0', variant_level=1), dbus.String('engine2'): dbus.String('0', variant_level=1), dbus.String('machine_engine'): dbus.String('0', variant_level=1), dbus.String('machine_ocsp'): dbus.String('0', variant_level=1), dbus.String('eapol_flags'): dbus.String('3', variant_level=1), dbus.String('sim_num'): dbus.String('1', variant_level=1), dbus.String('erp'): dbus.String('0', variant_level=1), dbus.String('wep_tx_keyidx'): dbus.String('0', variant_level=1), dbus.String('priority'): dbus.String('0', variant_level=1), dbus.String('eap_workaround'): dbus.String('-1', variant_level=1), dbus.String('fragment_size'): dbus.String('1398', variant_level=1), dbus.String('ocsp'): dbus.String('0', variant_level=1), dbus.String('ocsp2'): dbus.String('0', variant_level=1), dbus.String('mode'): dbus.String('3', variant_level=1), dbus.String('no_auto_peer'): dbus.String('0', variant_level=1), dbus.String('mesh_fwding'): dbus.String('1', variant_level=1), dbus.String('mesh_rssi_threshold'): dbus.String('1', variant_level=1), dbus.String('proactive_key_caching'): dbus.String('-1', variant_level=1), dbus.String('disabled'): dbus.String('2', variant_level=1), dbus.String('ieee80211w'): dbus.String('3', variant_level=1), dbus.String('ocv'): dbus.String('0', variant_level=1), dbus.String('mixed_cell'): dbus.String('0', variant_level=1), dbus.String('frequency'): dbus.String('0', variant_level=1), dbus.String('fixed_freq'): dbus.String('0', variant_level=1), dbus.String('enable_edmg'): dbus.String('0', variant_level=1), dbus.String('edmg_channel'): dbus.String('0', variant_level=1), dbus.String('acs'): dbus.String('0', variant_level=1), dbus.String('dot11MeshMaxRetries'): dbus.String('2', variant_level=1), dbus.String('dot11MeshRetryTimeout'): dbus.String('40', variant_level=1), dbus.String('dot11MeshConfirmTimeout'): dbus.String('40', variant_level=1), dbus.String('dot11MeshHoldingTimeout'): dbus.String('40', variant_level=1), dbus.String('wpa_ptk_rekey'): dbus.String('0', variant_level=1), dbus.String('wpa_deny_ptk0_rekey'): dbus.String('0', variant_level=1), dbus.String('group_rekey'): dbus.String('0', variant_level=1), dbus.String('ignore_broadcast_ssid'): dbus.String('0', variant_level=1), dbus.String('disable_ht'): dbus.String('0', variant_level=1), dbus.String('disable_ht40'): dbus.String('0', variant_level=1), dbus.String('disable_sgi'): dbus.String('0', variant_level=1), dbus.String('disable_ldpc'): dbus.String('0', variant_level=1), dbus.String('ht40_intolerant'): dbus.String('0', variant_level=1), dbus.String('tx_stbc'): dbus.String('-1', variant_level=1), dbus.String('rx_stbc'): dbus.String('-1', variant_level=1), dbus.String('disable_max_amsdu'): dbus.String('-1', variant_level=1), dbus.String('ampdu_factor'): dbus.String('-1', variant_level=1), dbus.String('ampdu_density'): dbus.String('-1', variant_level=1), dbus.String('disable_vht'): dbus.String('0', variant_level=1), dbus.String('vht_capa'): dbus.String('0', variant_level=1), dbus.String('vht_capa_mask'): dbus.String('0', variant_level=1), dbus.String('vht_rx_mcs_nss_1'): dbus.String('-1', variant_level=1), dbus.String('vht_rx_mcs_nss_2'): dbus.String('-1', variant_level=1), dbus.String('vht_rx_mcs_nss_3'): dbus.String('-1', variant_level=1), dbus.String('vht_rx_mcs_nss_4'): dbus.String('-1', variant_level=1), dbus.String('vht_rx_mcs_nss_5'): dbus.String('-1', variant_level=1), dbus.String('vht_rx_mcs_nss_6'): dbus.String('-1', variant_level=1), dbus.String('vht_rx_mcs_nss_7'): dbus.String('-1', variant_level=1), dbus.String('vht_rx_mcs_nss_8'): dbus.String('-1', variant_level=1), dbus.String('vht_tx_mcs_nss_1'): dbus.String('-1', variant_level=1), dbus.String('vht_tx_mcs_nss_2'): dbus.String('-1', variant_level=1), dbus.String('vht_tx_mcs_nss_3'): dbus.String('-1', variant_level=1), dbus.String('vht_tx_mcs_nss_4'): dbus.String('-1', variant_level=1), dbus.String('vht_tx_mcs_nss_5'): dbus.String('-1', variant_level=1), dbus.String('vht_tx_mcs_nss_6'): dbus.String('-1', variant_level=1), dbus.String('vht_tx_mcs_nss_7'): dbus.String('-1', variant_level=1), dbus.String('vht_tx_mcs_nss_8'): dbus.String('-1', variant_level=1), dbus.String('disable_he'): dbus.String('0', variant_level=1), dbus.String('ap_max_inactivity'): dbus.String('0', variant_level=1), dbus.String('dtim_period'): dbus.String('0', variant_level=1), dbus.String('beacon_int'): dbus.String('0', variant_level=1), dbus.String('update_identifier'): dbus.String('0', variant_level=1), dbus.String('mac_addr'): dbus.String('-1', variant_level=1), dbus.String('pbss'): dbus.String('0', variant_level=1), dbus.String('wps_disabled'): dbus.String('0', variant_level=1), dbus.String('fils_dh_group'): dbus.String('0', variant_level=1), dbus.String('dpp_netaccesskey_expiry'): dbus.String('0', variant_level=1), dbus.String('dpp_pfs'): dbus.String('0', variant_level=1), dbus.String('owe_group'): dbus.String('0', variant_level=1), dbus.String('owe_only'): dbus.String('0', variant_level=1), dbus.String('owe_ptk_workaround'): dbus.String('0', variant_level=1), dbus.String('multi_ap_backhaul_sta'): dbus.String('0', variant_level=1), dbus.String('ft_eap_pmksa_caching'): dbus.String('0', variant_level=1), dbus.String('beacon_prot'): dbus.String('0', variant_level=1), dbus.String('transition_disable'): dbus.String('0', variant_level=1), dbus.String('sae_pk'): dbus.String('0', variant_level=1)}, signature=dbus.Signature('sv'), variant_level=1) PASS dbus_p2p_persistent 0.177169 2022-07-13 00:54:41.150586 passed all 1 test case(s) 2022-07-13 00:54:41 ./run-tests.py dbus_scan_abort DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_scan_abort 1/1 Test: D-Bus scan trigger and abort PASS dbus_scan_abort 0.132044 2022-07-13 00:54:41.695741 passed all 1 test case(s) 2022-07-13 00:54:41 ./run-tests.py dpp_ap_config_p256_p384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p256_p384 1/1 Test: DPP and AP configuration (P-256 + P-384) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p256_p384 0.355917 2022-07-13 00:54:42.471689 passed all 1 test case(s) 2022-07-13 00:54:42 ./run-tests.py dpp_ap_config_p521_p521 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p521_p521 1/1 Test: DPP and AP configuration (P-521 + P-521) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p521_p521 0.417793 2022-07-13 00:54:43.318753 passed all 1 test case(s) 2022-07-13 00:54:43 ./run-tests.py dpp_auth_resp_status_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auth_resp_status_failure 1/1 Test: DPP and Auth Resp(status) build failure PASS dpp_auth_resp_status_failure 0.244067 2022-07-13 00:54:43.976566 passed all 1 test case(s) 2022-07-13 00:54:44 ./run-tests.py dpp_config_dpp_override_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_override_secp384r1 1/1 Test: DPP Config Object override (P-384) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_override_secp384r1 0.13405 2022-07-13 00:54:44.523721 passed all 1 test case(s) 2022-07-13 00:54:44 ./run-tests.py dpp_config_error_legacy_too_short_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_error_legacy_too_short_psk 1/1 Test: DPP Config Object legacy error - too short psk_hex dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_error_legacy_too_short_psk 0.127474 2022-07-13 00:54:45.067271 passed all 1 test case(s) 2022-07-13 00:54:45 ./run-tests.py dpp_configurator_enroll_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_configurator_enroll_conf 1/1 Test: DPP Configurator enrolling followed by use of the new Configurator dev1 displays QR Code and dev0 scans it dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_configurator_enroll_conf 0.146996 2022-07-13 00:54:45.628253 passed all 1 test case(s) 2022-07-13 00:54:45 ./run-tests.py dpp_nfc_uri_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_uri_hostapd 1/1 Test: DPP bootstrapping via NFC URI record (hostapd) Starting AP wlan3 Generated URI: DPP:C:81/1;M:020000000300;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADLVX/HRf7c4YvPiHKPAjW2GhH5kWKvog9VHUYgeAffwA=;; Bootstrapping info: type=NFC-URI mac_addr=02:00:00:00:03:00 info= num_freq=1 use_freq=2412 curve=prime256v1 pkhash=fce2e8dc94ad91427a02616b399bcb8471979179013642fb669830e29d9fcf7d version=0 PASS dpp_nfc_uri_hostapd 0.144021 2022-07-13 00:54:46.188044 passed all 1 test case(s) 2022-07-13 00:54:46 ./run-tests.py dpp_pfs_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pfs_errors 1/1 Test: DPP PFS error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS dpp_pfs_errors 1.011395 2022-07-13 00:54:47.610172 passed all 1 test case(s) 2022-07-13 00:54:47 ./run-tests.py dpp_pkex_code_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_code_mismatch 1/1 Test: DPP and PKEX with mismatching code PASS dpp_pkex_code_mismatch 0.132686 2022-07-13 00:54:48.156431 passed all 1 test case(s) 2022-07-13 00:54:48 ./run-tests.py dpp_proto_after_wrapped_data_auth_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_after_wrapped_data_auth_conf 1/1 Test: DPP protocol testing - attribute after Wrapped Data in Auth Conf PASS dpp_proto_after_wrapped_data_auth_conf 0.119826 2022-07-13 00:54:48.691029 passed all 1 test case(s) 2022-07-13 00:54:48 ./run-tests.py dpp_proto_after_wrapped_data_pkex_cr_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_after_wrapped_data_pkex_cr_req 1/1 Test: DPP protocol testing - attribute after Wrapped Data in PKEX CR Req PASS dpp_proto_after_wrapped_data_pkex_cr_req 0.118227 2022-07-13 00:54:49.228783 passed all 1 test case(s) 2022-07-13 00:54:49 ./run-tests.py dpp_proto_auth_req_no_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_req_no_r_bootstrap_key 1/1 Test: DPP protocol testing - no R-bootstrap key in Auth Req PASS dpp_proto_auth_req_no_r_bootstrap_key 0.2187 2022-07-13 00:54:49.863969 passed all 1 test case(s) 2022-07-13 00:54:49 ./run-tests.py dpp_proto_auth_resp_no_r_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_no_r_auth 1/1 Test: DPP protocol testing - no R-auth in Auth Resp PASS dpp_proto_auth_resp_no_r_auth 0.221604 2022-07-13 00:54:50.501246 passed all 1 test case(s) 2022-07-13 00:54:50 ./run-tests.py dpp_proto_pkex_exchange_resp_invalid_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_exchange_resp_invalid_status 1/1 Test: DPP protocol testing - invalid Status in PKEX Exchange Response PASS dpp_proto_pkex_exchange_resp_invalid_status 0.112316 2022-07-13 00:54:51.013054 passed all 1 test case(s) 2022-07-13 00:54:51 ./run-tests.py dpp_qr_code_auth_enrollee_init_netrole DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_enrollee_init_netrole 1/1 Test: DPP QR Code and enrollee initiating with netrole specified PASS dpp_qr_code_auth_enrollee_init_netrole 0.137242 2022-07-13 00:54:51.551927 passed all 1 test case(s) 2022-07-13 00:54:51 ./run-tests.py dpp_qr_code_auth_incompatible_roles_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_incompatible_roles_failure 1/1 Test: DPP QR Code and authentication exchange (incompatible roles failure) dev0 displays QR Code dev1 scans QR Code dev1 initiates DPP Authentication PASS dpp_qr_code_auth_incompatible_roles_failure 0.11286 2022-07-13 00:54:52.068067 passed all 1 test case(s) 2022-07-13 00:54:52 ./run-tests.py dpp_qr_code_set_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_set_key 1/1 Test: DPP QR Code and fixed bootstrapping key dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_set_key 0.117621 2022-07-13 00:54:52.589838 passed all 1 test case(s) 2022-07-13 00:54:52 ./run-tests.py dpp_tcp_pkex_auto_connect_2_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_pkex_auto_connect_2_status 1/1 Test: DPP/PKEXv2 over TCP and automatic connection status Skip test case: DPP version 3 not supported SKIP dpp_tcp_pkex_auto_connect_2_status 0.106111 2022-07-13 00:54:53.096057 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:54:53 ./run-tests.py fils_auth_gtk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_auth_gtk_rekey 1/1 Test: GTK rekeying after FILS authentication Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_auth_gtk_rekey 6.262213 2022-07-13 00:54:59.762248 passed all 1 test case(s) 2022-07-13 00:54:59 ./run-tests.py fils_sk_pfs_30 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_30 1/1 Test: FILS SK with PFS (DH group 30) Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_30 0.411008 2022-07-13 00:55:00.578274 passed all 1 test case(s) 2022-07-13 00:55:00 ./run-tests.py fst_scan_nomb DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_scan_nomb 1/1 Test: FST scan no MB IE presence with 1 AP start PASS fst_scan_nomb 3.23909 2022-07-13 00:55:04.217366 passed all 1 test case(s) 2022-07-13 00:55:04 ./run-tests.py fst_sta_start_session_negative_llt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session_negative_llt 1/1 Test: FST STA start session - negative llt Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Negative LLT) PASS fst_sta_start_session_negative_llt 0.519645 2022-07-13 00:55:05.139198 passed all 1 test case(s) 2022-07-13 00:55:05 ./run-tests.py fst_sta_transfer_session_bad_session_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_transfer_session_bad_session_id 1/1 Test: FST STA transfer session - bad session id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Session ID) PASS fst_sta_transfer_session_bad_session_id 0.493915 2022-07-13 00:55:06.036505 passed all 1 test case(s) 2022-07-13 00:55:06 ./run-tests.py fst_test_setup DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_test_setup 1/1 Test: FST setup using separate commands Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_test_setup 0.576433 2022-07-13 00:55:07.016248 passed all 1 test case(s) 2022-07-13 00:55:07 ./run-tests.py gas_malformed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_malformed 1/1 Test: GAS malformed response frames Starting AP wlan3 PASS gas_malformed 0.206164 2022-07-13 00:55:07.623987 passed all 1 test case(s) 2022-07-13 00:55:07 ./run-tests.py grpform_per_sta_psk_wps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_per_sta_psk_wps 1/1 Test: P2P group formation with per-STA PSKs with non-P2P WPS STA Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_per_sta_psk_wps 4.721373 2022-07-13 00:55:12.747770 passed all 1 test case(s) 2022-07-13 00:55:12 ./run-tests.py hapd_ctrl_radar DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_radar 1/1 Test: hostapd and RADAR ctrl_iface command Starting AP wlan3 PASS hapd_ctrl_radar 0.12665 2022-07-13 00:55:13.275255 passed all 1 test case(s) 2022-07-13 00:55:13 ./run-tests.py hapd_ctrl_set_deny_mac_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_set_deny_mac_file 1/1 Test: hostapd and SET deny_mac_file ctrl_iface command Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS hapd_ctrl_set_deny_mac_file 1.265938 2022-07-13 00:55:14.944634 passed all 1 test case(s) 2022-07-13 00:55:14 ./run-tests.py mesh_secure_ocv_mix_legacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_mix_legacy 1/1 Test: Mesh network with a VHT STA and a legacy STA under OCV Country code at the end: 00 PASS mesh_secure_ocv_mix_legacy 1.435899 2022-07-13 00:55:16.779664 passed all 1 test case(s) 2022-07-13 00:55:16 ./run-tests.py p2p_channel_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_5ghz 1/1 Test: P2P group formation with 5 GHz preference Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2p_channel_5ghz 1.13813 2022-07-13 00:55:18.321695 passed all 1 test case(s) 2022-07-13 00:55:18 ./run-tests.py p2p_channel_avoid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_avoid 1/1 Test: P2P and avoid frequencies driver event Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2p_channel_avoid 2.105323 2022-07-13 00:55:20.829330 passed all 1 test case(s) 2022-07-13 00:55:20 ./run-tests.py p2p_ext_vendor_elem_pd_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_ext_vendor_elem_pd_resp 1/1 Test: VENDOR_ELEM in PD Response frames wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_ext_vendor_elem_pd_resp 0.365721 2022-07-13 00:55:21.595803 passed all 1 test case(s) 2022-07-13 00:55:21 ./run-tests.py radius_psk_reject_during_4way_hs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_psk_reject_during_4way_hs 1/1 Test: WPA2 with PSK from RADIUS and reject Starting AP wlan3 Connect STA wlan0 to AP Received authentication request PASS radius_psk_reject_during_4way_hs 1.255397 2022-07-13 00:55:23.255001 passed all 1 test case(s) 2022-07-13 00:55:23 ./run-tests.py rrm_lci_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req 1/1 Test: hostapd lci request Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan0 to AP PASS rrm_lci_req 0.243665 2022-07-13 00:55:23.901359 passed all 1 test case(s) 2022-07-13 00:55:23 ./run-tests.py sae_pmk_lifetime DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pmk_lifetime 1/1 Test: SAE and PMK lifetime Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-SAE-CCMP][ESS] test-sae 02:00:00:00:04:00 2412 -30 [WPA2-SAE-CCMP][ESS] test-sae PASS sae_pmk_lifetime 11.261804 2022-07-13 00:55:35.564978 passed all 1 test case(s) 2022-07-13 00:55:35 ./run-tests.py sigma_dut_ap_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_5ghz 1/1 Test: sigma_dut controlled AP on 5 GHz Skip test case: sigma_dut not available SKIP sigma_dut_ap_5ghz 0.145671 2022-07-13 00:55:36.112176 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:55:36 ./run-tests.py sigma_dut_ap_eap_sha256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_eap_sha256 1/1 Test: sigma_dut controlled AP WPA2-Enterprise SHA256 Skip test case: sigma_dut not available SKIP sigma_dut_ap_eap_sha256 0.152493 2022-07-13 00:55:36.666915 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:55:36 ./run-tests.py sigma_dut_ap_ft_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_ft_eap 1/1 Test: sigma_dut controlled AP FT-EAP Skip test case: sigma_dut not available SKIP sigma_dut_ap_ft_eap 0.158667 2022-07-13 00:55:37.229651 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:55:37 ./run-tests.py sigma_dut_ap_sae_h2e DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_h2e 1/1 Test: sigma_dut controlled AP with SAE H2E Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_h2e 0.152743 2022-07-13 00:55:37.787964 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:55:37 ./run-tests.py sigma_dut_dpp_qr_configurator_chirp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_configurator_chirp 1/1 Test: sigma_dut DPP/QR as Configurator waiting for chirp Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_configurator_chirp 0.106757 2022-07-13 00:55:38.295591 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:55:38 ./run-tests.py sigma_dut_dpp_qr_mutual_resp_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_mutual_resp_enrollee 1/1 Test: sigma_dut DPP/QR (mutual) responder as Enrollee Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_mutual_resp_enrollee 0.1432 2022-07-13 00:55:38.837209 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:55:38 ./run-tests.py sigma_dut_eap_ttls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_eap_ttls 1/1 Test: sigma_dut controlled STA and EAP-TTLS parameters Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_eap_ttls 0.16761 2022-07-13 00:55:39.407001 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:55:39 ./run-tests.py sigma_dut_venue_url DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_venue_url 1/1 Test: sigma_dut controlled Venue URL fetch Skip test case: sigma_dut not available SKIP sigma_dut_venue_url 0.105755 2022-07-13 00:55:39.916497 passed all 0 test case(s) skipped 1 test case(s) 2022-07-13 00:55:39 ./run-tests.py suite_b_pmkid_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_pmkid_failure 1/1 Test: WPA2/GCMP connection at Suite B 128-bit level and PMKID derivation failure Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_pmkid_failure 0.380662 2022-07-13 00:55:40.698297 passed all 1 test case(s) 2022-07-13 00:55:40 ./run-tests.py wifi_display_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_disable 1/1 Test: Peer disabling Wi-Fi Display advertisement PASS wifi_display_disable 1.564342 2022-07-13 00:55:42.666061 passed all 1 test case(s) 2022-07-13 00:55:42 ./run-tests.py wnm_disassoc_imminent_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_disassoc_imminent_fail 1/1 Test: WNM Disassociation Imminent failure Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_disassoc_imminent_fail 0.224228 2022-07-13 00:55:43.293665 passed all 1 test case(s) 2022-07-13 00:55:43 ./run-tests.py wpa2_ocv_sta_override_sa_query_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_sta_override_sa_query_req 1/1 Test: OCV on 2.4 GHz and STA override SA Query Request Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_sta_override_sa_query_req 4.50896 2022-07-13 00:55:48.205347 passed all 1 test case(s) 2022-07-13 00:55:48 ./run-tests.py wpas_ap_and_assoc_req_p2p_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_and_assoc_req_p2p_ie 1/1 Test: wpa_supplicant AP mode - unexpected P2P IE in Association Request Connect STA wlan1 to AP PASS wpas_ap_and_assoc_req_p2p_ie 0.28629 2022-07-13 00:55:48.893285 passed all 1 test case(s) 2022-07-13 00:55:48 ./run-tests.py wpas_ap_sae_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_sae_password 1/1 Test: wpa_supplicant AP mode - SAE using sae_password Connect STA wlan1 to AP PASS wpas_ap_sae_password 0.28949 2022-07-13 00:55:49.587363 passed all 1 test case(s) 2022-07-13 00:55:49 ./run-tests.py wpas_ctrl_signal_monitor DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_signal_monitor 1/1 Test: wpa_supplicant SIGNAL_MONITOR command Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wpas_ctrl_signal_monitor 0.646952 2022-07-13 00:55:50.634081 passed all 1 test case(s) 2022-07-13 00:55:50 ./run-tests.py wpas_mesh_pmksa_caching2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_pmksa_caching2 1/1 Test: Secure mesh network and PMKSA caching with no_auto_peer=1 PASS wpas_mesh_pmksa_caching2 1.795864 2022-07-13 00:55:52.832849 passed all 1 test case(s) 2022-07-13 00:55:52 ./run-tests.py wps_ext_m2_nack_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_nack_invalid 1/1 Test: WPS proto: M2 followed by invalid NACK Starting AP wlan3 PASS wps_ext_m2_nack_invalid 0.270926 2022-07-13 00:55:53.503778 passed all 1 test case(s) 2022-07-13 00:55:53 ./run-tests.py wps_ext_proto_m6_no_encr_settings DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m6_no_encr_settings 1/1 Test: WPS and no Encr Settings in M6 Starting AP wlan3 PASS wps_ext_proto_m6_no_encr_settings 0.264711 2022-07-13 00:55:54.172844 passed all 1 test case(s) 2022-07-13 00:55:54 ./stop.sh 1657673754.312535: MEMLEAK[0x557bb3c5aae0]: len 46 1657673754.312543: WPA_TRACE: memleak - START 1657673754.313001: [0]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_malloc+0x8e) [0x557bb0e4f77e] 1657673754.313009: os_malloc() ../src/utils/os_unix.c:721 1657673754.313012: [1]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_strdup+0x1a) [0x557bb0e4fe5a] 1657673754.313015: os_strdup() ../src/utils/os_unix.c:791 1657673754.313018: [2]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_dbus_register_object_per_iface+0x6c) [0x557bb0fd408c] 1657673754.313020: wpa_dbus_register_object_per_iface() dbus/dbus_new_helpers.c:549 1657673754.313023: [3]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_dbus_register_p2p_group+0x17e) [0x557bb0fd9bde] 1657673754.313026: wpas_dbus_register_p2p_group() dbus/dbus_new.c:4907 1657673754.313028: [4]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_notify_p2p_group_started+0x1c) [0x557bb0e408ac] 1657673754.313031: wpas_notify_p2p_group_started() notify.c:721 1657673754.313034: [5]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0xc8a04) [0x557bb0eb2a04] 1657673754.313036: wpas_group_formation_completed() p2p_supplicant.c:1459 1657673754.314490: [6]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x199333) [0x557bb0f83333] 1657673754.314496: hostapd_wps_reg_success_cb() ../src/ap/wps_hostapd.c:247 1657673754.314500: [7]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wps_registrar_process_msg+0xbdc) [0x557bb0f26a3c] 1657673754.314503: wps_process_wsc_done() ../src/wps/wps_registrar.c:3366 1657673754.314503: wps_registrar_process_msg() ../src/wps/wps_registrar.c:3445 1657673754.314816: [8]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x19ced5) [0x557bb0f86ed5] 1657673754.314820: eap_wsc_process() ../src/eap_server/eap_server_wsc.c:439 1657673754.315572: [9]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x181b86) [0x557bb0f6bb86] 1657673754.315579: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:518 1657673754.315583: [10]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eap_server_sm_step+0x3b4) [0x557bb0f6dc44] 1657673754.315585: eap_server_sm_step() ../src/eap_server/eap_server.c:1825 1657673754.316061: [11]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x16e26e) [0x557bb0f5826e] 1657673754.316067: eapol_sm_step_run() ../src/eapol_auth/eapol_auth_sm.c:943 1657673754.316071: [12]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eloop_run+0x1f1) [0x557bb0e51b21] 1657673754.316074: eloop_run() ../src/utils/eloop.c:1206 1657673754.316079: [13]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_supplicant_run+0x73) [0x557bb100d853] 1657673754.316082: wpa_supplicant_run() wpa_supplicant.c:7509 1657673754.316085: [14]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(main+0x3e2) [0x557bb0e37b12] 1657673754.316088: main() main.c:393 1657673754.316089: WPA_TRACE: memleak - END 1657673754.316090: MEMLEAK[0x557bb3c6aff0]: len 9 1657673754.316091: WPA_TRACE: memleak - START 1657673754.316665: [0]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_malloc+0x8e) [0x557bb0e4f77e] 1657673754.316670: os_malloc() ../src/utils/os_unix.c:721 1657673754.316674: [1]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_zalloc+0xa) [0x557bb0e4fe1a] 1657673754.316677: os_zalloc() ../src/utils/os_unix.c:779 1657673754.316680: [2]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_dbus_register_p2p_group+0x160) [0x557bb0fd9bc0] 1657673754.316684: wpas_dbus_register() dbus/dbus_new.c:2523 1657673754.316685: wpas_dbus_register_p2p_group() dbus/dbus_new.c:4903 1657673754.316689: [3]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_notify_p2p_group_started+0x1c) [0x557bb0e408ac] 1657673754.316706: wpas_notify_p2p_group_started() notify.c:721 1657673754.316711: [4]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0xc8a04) [0x557bb0eb2a04] 1657673754.316714: wpas_group_formation_completed() p2p_supplicant.c:1459 1657673754.316718: [5]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x199333) [0x557bb0f83333] 1657673754.316721: hostapd_wps_reg_success_cb() ../src/ap/wps_hostapd.c:247 1657673754.316725: [6]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wps_registrar_process_msg+0xbdc) [0x557bb0f26a3c] 1657673754.316729: wps_process_wsc_done() ../src/wps/wps_registrar.c:3366 1657673754.316729: wps_registrar_process_msg() ../src/wps/wps_registrar.c:3445 1657673754.316733: [7]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x19ced5) [0x557bb0f86ed5] 1657673754.316735: eap_wsc_process() ../src/eap_server/eap_server_wsc.c:439 1657673754.316738: [8]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x181b86) [0x557bb0f6bb86] 1657673754.316741: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:518 1657673754.316743: [9]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eap_server_sm_step+0x3b4) [0x557bb0f6dc44] 1657673754.316746: eap_server_sm_step() ../src/eap_server/eap_server.c:1825 1657673754.316749: [10]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x16e26e) [0x557bb0f5826e] 1657673754.316752: eapol_sm_step_run() ../src/eapol_auth/eapol_auth_sm.c:943 1657673754.316755: [11]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eloop_run+0x1f1) [0x557bb0e51b21] 1657673754.316758: eloop_run() ../src/utils/eloop.c:1206 1657673754.316761: [12]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_supplicant_run+0x73) [0x557bb100d853] 1657673754.316763: wpa_supplicant_run() wpa_supplicant.c:7509 1657673754.316766: [13]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(main+0x3e2) [0x557bb0e37b12] 1657673754.316768: main() main.c:393 1657673754.316770: WPA_TRACE: memleak - END 1657673754.316770: MEMLEAK[0x557bb1b599a0]: len 64 1657673754.316771: WPA_TRACE: memleak - START 1657673754.317332: [0]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_malloc+0x8e) [0x557bb0e4f77e] 1657673754.317336: os_malloc() ../src/utils/os_unix.c:721 1657673754.317339: [1]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_zalloc+0xa) [0x557bb0e4fe1a] 1657673754.317341: os_zalloc() ../src/utils/os_unix.c:779 1657673754.317345: [2]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_dbus_register_p2p_group+0x102) [0x557bb0fd9b62] 1657673754.317347: wpas_dbus_register_p2p_group() dbus/dbus_new.c:4896 1657673754.317350: [3]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_notify_p2p_group_started+0x1c) [0x557bb0e408ac] 1657673754.317352: wpas_notify_p2p_group_started() notify.c:721 1657673754.317355: [4]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0xc8a04) [0x557bb0eb2a04] 1657673754.317358: wpas_group_formation_completed() p2p_supplicant.c:1459 1657673754.317361: [5]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x199333) [0x557bb0f83333] 1657673754.317363: hostapd_wps_reg_success_cb() ../src/ap/wps_hostapd.c:247 1657673754.317367: [6]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wps_registrar_process_msg+0xbdc) [0x557bb0f26a3c] 1657673754.317370: wps_process_wsc_done() ../src/wps/wps_registrar.c:3366 1657673754.317371: wps_registrar_process_msg() ../src/wps/wps_registrar.c:3445 1657673754.317373: [7]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x19ced5) [0x557bb0f86ed5] 1657673754.317376: eap_wsc_process() ../src/eap_server/eap_server_wsc.c:439 1657673754.317389: [8]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x181b86) [0x557bb0f6bb86] 1657673754.317392: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:518 1657673754.317395: [9]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eap_server_sm_step+0x3b4) [0x557bb0f6dc44] 1657673754.317398: eap_server_sm_step() ../src/eap_server/eap_server.c:1825 1657673754.317401: [10]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x16e26e) [0x557bb0f5826e] 1657673754.317404: eapol_sm_step_run() ../src/eapol_auth/eapol_auth_sm.c:943 1657673754.317407: [11]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eloop_run+0x1f1) [0x557bb0e51b21] 1657673754.317410: eloop_run() ../src/utils/eloop.c:1206 1657673754.317413: [12]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_supplicant_run+0x73) [0x557bb100d853] 1657673754.317416: wpa_supplicant_run() wpa_supplicant.c:7509 1657673754.317418: [13]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(main+0x3e2) [0x557bb0e37b12] 1657673754.317421: main() main.c:393 1657673754.317422: WPA_TRACE: memleak - END 1657673754.317423: MEMLEAK[0x557bb1b20c90]: len 46 1657673754.317423: WPA_TRACE: memleak - START 1657673754.317985: [0]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_malloc+0x8e) [0x557bb0e4f77e] 1657673754.317989: os_malloc() ../src/utils/os_unix.c:721 1657673754.317992: [1]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(os_strdup+0x1a) [0x557bb0e4fe5a] 1657673754.317995: os_strdup() ../src/utils/os_unix.c:791 1657673754.317998: [2]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_dbus_register_p2p_group+0xd6) [0x557bb0fd9b36] 1657673754.318001: wpas_dbus_register_p2p_group() dbus/dbus_new.c:4890 1657673754.318004: [3]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpas_notify_p2p_group_started+0x1c) [0x557bb0e408ac] 1657673754.318006: wpas_notify_p2p_group_started() notify.c:721 1657673754.318009: [4]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0xc8a04) [0x557bb0eb2a04] 1657673754.318012: wpas_group_formation_completed() p2p_supplicant.c:1459 1657673754.318015: [5]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x199333) [0x557bb0f83333] 1657673754.318017: hostapd_wps_reg_success_cb() ../src/ap/wps_hostapd.c:247 1657673754.318021: [6]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wps_registrar_process_msg+0xbdc) [0x557bb0f26a3c] 1657673754.318024: wps_process_wsc_done() ../src/wps/wps_registrar.c:3366 1657673754.318024: wps_registrar_process_msg() ../src/wps/wps_registrar.c:3445 1657673754.318027: [7]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x19ced5) [0x557bb0f86ed5] 1657673754.318030: eap_wsc_process() ../src/eap_server/eap_server_wsc.c:439 1657673754.318032: [8]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x181b86) [0x557bb0f6bb86] 1657673754.318035: sm_EAP_METHOD_RESPONSE_Enter() ../src/eap_server/eap_server.c:518 1657673754.318038: [9]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eap_server_sm_step+0x3b4) [0x557bb0f6dc44] 1657673754.318041: eap_server_sm_step() ../src/eap_server/eap_server.c:1825 1657673754.318044: [10]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(+0x16e26e) [0x557bb0f5826e] 1657673754.318047: eapol_sm_step_run() ../src/eapol_auth/eapol_auth_sm.c:943 1657673754.318050: [11]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(eloop_run+0x1f1) [0x557bb0e51b21] 1657673754.318052: eloop_run() ../src/utils/eloop.c:1206 1657673754.318055: [12]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(wpa_supplicant_run+0x73) [0x557bb100d853] 1657673754.318066: wpa_supplicant_run() wpa_supplicant.c:7509 1657673754.318069: [13]: /lkp/benchmarks/hwsim/tests/hwsim/../../wpa_supplicant/wpa_supplicant(main+0x3e2) [0x557bb0e37b12] 1657673754.318072: main() main.c:393 1657673754.318073: WPA_TRACE: memleak - END 1657673754.318074: MEMLEAK: total 165 bytes