2022-07-20 18:51:38 export USER=root 2022-07-20 18:51:38 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2022-07-20 18:52:42 ./start.sh 2022-07-20 18:52:43 ./run-tests.py ap_bss_add_out_of_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_out_of_memory 1/1 Test: Running out of memory while adding a BSS Starting AP wlan4 Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Removing BSS wlan3-2 Removing BSS wlan3 PASS ap_bss_add_out_of_memory 1.457995 2022-07-20 18:52:46.174023 passed all 1 test case(s) 2022-07-20 18:52:46 ./run-tests.py ap_cipher_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_bip_gmac_256 1/1 Test: WPA2-PSK with BIP-GMAC-256 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_bip_gmac_256 1.087687 2022-07-20 18:52:47.751127 passed all 1 test case(s) 2022-07-20 18:52:47 ./run-tests.py ap_enable_disable_reenable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_enable_disable_reenable 1/1 Test: Enable, disable, re-enable AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_enable_disable_reenable 2.074672 2022-07-20 18:52:50.313059 passed all 1 test case(s) 2022-07-20 18:52:50 ./run-tests.py ap_fragmentation_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_fragmentation_open 1/1 Test: Open AP with fragmentation threshold Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_params.py", line 46, in test_ap_fragmentation_open hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_fragmentation_open 6.026712 2022-07-20 18:52:56.826787 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_fragmentation_open 2022-07-20 18:52:56 ./run-tests.py ap_ft_pmf_beacon_prot DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_beacon_prot 1/1 Test: WPA2-PSK-FT AP with PMF and beacon protection Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 498, in test_ap_ft_pmf_beacon_prot run_ap_ft_pmf(dev, apdev, "1", beacon_prot=True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 521, in run_ap_ft_pmf run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 216, in run_roams hwsim_utils.test_connectivity(dev, hapd1ap) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_ft_pmf_beacon_prot 6.707527 2022-07-20 18:53:04.020869 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_pmf_beacon_prot 2022-07-20 18:53:04 ./run-tests.py ap_ft_ptk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ptk_rekey 1/1 Test: WPA2-PSK-FT PTK rekeying triggered by station after roam Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 2890, in test_ap_ft_ptk_rekey run_roams(dev[0], apdev, hapd0, hapd1, "test-ft", "12345678", ptk_rekey="1") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 216, in run_roams hwsim_utils.test_connectivity(dev, hapd1ap) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_ft_ptk_rekey 6.581052 2022-07-20 18:53:11.087602 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_ptk_rekey 2022-07-20 18:53:11 ./run-tests.py ap_ft_sae_h2e_and_loop DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_h2e_and_loop 1/1 Test: WPA2-PSK-FT-SAE AP (AP H2E, STA loop) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 1132, in test_ap_ft_sae_h2e_and_loop run_roams(dev[0], apdev, hapd0, hapd1, "test-ft", "12345678", sae=True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 216, in run_roams hwsim_utils.test_connectivity(dev, hapd1ap) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_ft_sae_h2e_and_loop 6.58769 2022-07-20 18:53:18.166732 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_sae_h2e_and_loop 2022-07-20 18:53:18 ./run-tests.py ap_hs20_anqp_format_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_anqp_format_errors 1/1 Test: Interworking network selection and ANQP format errors Starting AP wlan3 PASS ap_hs20_anqp_format_errors 1.457185 2022-07-20 18:53:20.108194 passed all 1 test case(s) 2022-07-20 18:53:20 ./run-tests.py ap_hs20_auto_interworking_global_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_global_pmf 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 and pmf=2 Starting AP wlan3 PASS ap_hs20_auto_interworking_global_pmf 4.661621 2022-07-20 18:53:25.254354 passed all 1 test case(s) 2022-07-20 18:53:25 ./run-tests.py ap_hs20_deauth_req_from_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_deauth_req_from_radius 1/1 Test: Hotspot 2.0 connection and deauthentication request from RADIUS Starting AP wlan3 PASS ap_hs20_deauth_req_from_radius 3.070729 2022-07-20 18:53:28.810730 passed all 1 test case(s) 2022-07-20 18:53:28 ./run-tests.py ap_hs20_domain_suffix_match_full DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_domain_suffix_match_full 1/1 Test: Hotspot 2.0 and domain_suffix_match Starting AP wlan3 PASS ap_hs20_domain_suffix_match_full 1.436758 2022-07-20 18:53:30.733792 passed all 1 test case(s) 2022-07-20 18:53:30 ./run-tests.py ap_hs20_eap_fast_gtc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_fast_gtc 1/1 Test: Hotspot 2.0 connection with FAST/EAP-GTC Starting AP wlan3 PASS ap_hs20_eap_fast_gtc 1.13391 2022-07-20 18:53:32.353355 passed all 1 test case(s) 2022-07-20 18:53:32 ./run-tests.py ap_hs20_gas_while_associated DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_gas_while_associated 1/1 Test: Hotspot 2.0 connection with GAS query while associated Starting AP wlan3 Verifying GAS query while associated PASS ap_hs20_gas_while_associated 1.062811 2022-07-20 18:53:33.900478 passed all 1 test case(s) 2022-07-20 18:53:33 ./run-tests.py ap_ht40_plus_minus2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_plus_minus2 1/1 Test: HT40 with both plus and minus allowed (2) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_plus_minus2 2.161946 2022-07-20 18:53:36.549282 passed all 1 test case(s) 2022-07-20 18:53:36 ./run-tests.py ap_ht40_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan 1/1 Test: HT40 co-ex scan Starting AP wlan3 hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '2432', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '5', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '-1', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'ht_caps_info': '000e', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-ht40', 'num_sta[0]': '0'} Connect STA wlan0 to AP hostapd STA: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '2', 'tx_packets': '2', 'rx_bytes': '128', 'tx_bytes': '169', 'inactive_msec': '4', 'signal': '-30', 'rx_rate_info': '0', 'tx_rate_info': '10', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5451525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} STA SIGNAL_POLL: RSSI=-30 LINKSPEED=1 NOISE=-92 FREQUENCY=2432 WIDTH=40 MHz CENTER_FRQ1=2422 AVG_RSSI=-30 AVG_BEACON_RSSI=-30 PASS ap_ht40_scan 2.173117 2022-07-20 18:53:39.206361 passed all 1 test case(s) 2022-07-20 18:53:39 ./run-tests.py ap_ht_stbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_stbc 1/1 Test: HT STBC overrides Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_ht_stbc 1.690714 2022-07-20 18:53:41.394778 passed all 1 test case(s) 2022-07-20 18:53:41 ./run-tests.py ap_invalid_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_invalid_config 1/1 Test: Try to start AP with invalid configuration and fix configuration Trying to start AP wlan3 with invalid configuration Starting AP wlan3 Fix configuration and start AP again Connect STA wlan0 to AP PASS ap_invalid_config 1.070441 2022-07-20 18:53:42.960881 passed all 1 test case(s) 2022-07-20 18:53:43 ./run-tests.py ap_qosmap_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_default 1/1 Test: QoS mapping with default values Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_qosmap.py", line 90, in test_ap_qosmap_default check_qos_map(apdev[0], hapd, dev[0], addr, dscp, dscp >> 3) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_qosmap.py", line 23, in check_qos_map hwsim_utils.test_connectivity(dev, hapd, dscp=dscp, config=False) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_qosmap_default 5.790656 2022-07-20 18:53:49.248406 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_qosmap_default 2022-07-20 18:53:49 ./run-tests.py ap_tdls_prohibit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_prohibit 1/1 Test: Open AP and TDLS prohibited Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP dev1->dev2 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_tdls.py", line 581, in test_ap_tdls_prohibit connect_2sta_open(dev, hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_tdls.py", line 69, in connect_2sta_open connectivity(dev, hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_tdls.py", line 25, in connectivity hwsim_utils.test_connectivity_sta(dev[0], dev[1]) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 211, in test_connectivity_sta test_connectivity(dev1, dev2, dscp, tos) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev1->dev2 unicast data delivery failed FAIL ap_tdls_prohibit 5.807054 2022-07-20 18:53:55.552230 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_tdls_prohibit 2022-07-20 18:53:55 ./run-tests.py ap_vht160_no_dfs_100_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_100_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (100 plus) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 515, in test_ap_vht160_no_dfs_100_plus run_ap_vht160_no_dfs(dev, apdev, "100", "[HT40+]") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 573, in run_ap_vht160_no_dfs hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_vht160_no_dfs_100_plus 6.473767 2022-07-20 18:54:02.525233 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vht160_no_dfs_100_plus 2022-07-20 18:54:02 ./run-tests.py ap_wpa2_eap_aka_prime_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime_ext 1/1 Test: EAP-AKA' with external UMTS auth to hit Synchronization-Failure Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_prime_ext 1.216953 2022-07-20 18:54:04.245233 passed all 1 test case(s) 2022-07-20 18:54:04 ./run-tests.py ap_wpa2_eap_sim_db DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_db 1/1 Test: EAP-SIM DB error cases Starting AP wlan3 Connect STA wlan0 to AP No proper response - wait for pending eap_sim_db request timeout PASS ap_wpa2_eap_sim_db 2.333431 2022-07-20 18:54:07.062836 passed all 1 test case(s) 2022-07-20 18:54:07 ./run-tests.py ap_wpa2_eap_tls_ocsp_ca_signed_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_ca_signed_unknown 1/1 Test: EAP-TLS and CA signed OCSP response (unknown) openssl ocsp -reqout logs/current/ocsp-req.der -issuer auth_serv/ca.pem -sha256 -serial 0xD8D3E3A6CBE3CD73 -no_nonce openssl result: openssl ocsp -index auth_serv/index-unknown.txt -rsigner auth_serv/ca.pem -rkey auth_serv/ca-key.pem -CA auth_serv/ca.pem -ndays 7 -reqin logs/current/ocsp-req.der -resp_no_certs -respout logs/current/ocsp-resp-ca-signed-unknown.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_ca_signed_unknown 0.9159 2022-07-20 18:54:08.463496 passed all 1 test case(s) 2022-07-20 18:54:08 ./run-tests.py ap_wpa2_psk_ext_eapol_retry1c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_eapol_retry1c 1/1 Test: WPA2 4-way handshake with EAPOL-Key 1/4 and 2/4 retransmitted and SNonce changing Starting AP wlan3 Connect STA wlan0 to AP Send EAPOL-Key msg 2/4 (a) Send EAPOL-Key msg 2/4 (b) Send EAPOL-Key msg 4/4 PASS ap_wpa2_psk_ext_eapol_retry1c 0.906715 2022-07-20 18:54:09.866138 passed all 1 test case(s) 2022-07-20 18:54:09 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 1/1 Test: Extended Key ID and PTK rekey by station (start with Key ID 1) Starting AP wlan3 Connect STA wlan0 to AP Unexpected Key ID for the second TK: 1 (expected 0) Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_psk.py", line 3583, in test_ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 run_ap_wpa2_psk_ext_key_id_ptk_rekey_sta(dev, apdev, 2) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_psk.py", line 3616, in run_ap_wpa2_psk_ext_key_id_ptk_rekey_sta raise Exception("Unexpected Key ID for the second TK: %d (expected %d)" % (idx, expect_idx)) Exception: Unexpected Key ID for the second TK: 1 (expected 0) FAIL ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 0.898502 2022-07-20 18:54:11.258199 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 2022-07-20 18:54:11 ./run-tests.py ap_wpa2_psk_supp_proto_no_igtk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_no_igtk 1/1 Test: WPA2-PSK supplicant protocol testing: no IGTK KDE Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_no_igtk 1.718837 2022-07-20 18:54:13.474244 passed all 1 test case(s) 2022-07-20 18:54:13 ./run-tests.py ap_wps_conf_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_5ghz 1/1 Test: WPS PBC provisioning with configured AP on 5 GHz band Starting AP wlan3 WPS provisioning step Country code at the end: 00 PASS ap_wps_conf_5ghz 1.760243 2022-07-20 18:54:15.720636 passed all 1 test case(s) 2022-07-20 18:54:15 ./run-tests.py ap_wps_eap_wsc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_eap_wsc 1/1 Test: WPS and EAP-WSC in network profile Starting AP wlan3 Unexpected identity Connect STA wlan0 to AP No phase1 parameter Connect STA wlan0 to AP No PIN/PBC in phase1 Connect STA wlan0 to AP Invalid pkhash in phase1 Connect STA wlan0 to AP Zero fragment_size Connect STA wlan0 to AP Missing new_auth Connect STA wlan0 to AP Missing new_encr Connect STA wlan0 to AP Missing new_key Connect STA wlan0 to AP PASS ap_wps_eap_wsc 3.321132 2022-07-20 18:54:19.525788 passed all 1 test case(s) 2022-07-20 18:54:19 ./run-tests.py ap_wps_er_http_proto_invalid_sid_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_invalid_sid_uuid 1/1 Test: WPS ER HTTP protocol testing - invalid SID UUID HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/236984971/1 PASS ap_wps_er_http_proto_invalid_sid_uuid 0.138315 2022-07-20 18:54:20.149628 passed all 1 test case(s) 2022-07-20 18:54:20 ./run-tests.py ap_wps_m2_missing_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_missing_msg_type 1/1 Test: WPS and M2 without Message Type Starting AP wlan3 PASS ap_wps_m2_missing_msg_type 1.030223 2022-07-20 18:54:21.668651 passed all 1 test case(s) 2022-07-20 18:54:21 ./run-tests.py ap_wps_priority DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_priority 1/1 Test: WPS PIN provisioning with configured AP and wps_priority Starting AP wlan3 WPS provisioning step PASS ap_wps_priority 1.529609 2022-07-20 18:54:23.685215 passed all 1 test case(s) 2022-07-20 18:54:23 ./run-tests.py ap_wps_probe_req_ie_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_probe_req_ie_oom 1/1 Test: WPS ProbeReq IE OOM Starting AP wlan3 PASS ap_wps_probe_req_ie_oom 1.623022 2022-07-20 18:54:25.795295 passed all 1 test case(s) 2022-07-20 18:54:25 ./run-tests.py ap_wps_reg_config_and_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config_and_sae 1/1 Test: WPS registrar configuring an AP using AP PIN and using PSK+SAE Starting AP wlan3 WPS configuration step Connect STA wlan1 to AP PASS ap_wps_reg_config_and_sae 1.963116 2022-07-20 18:54:28.246185 passed all 1 test case(s) 2022-07-20 18:54:28 ./run-tests.py authsrv_errors_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_errors_1 1/1 Test: Authentication server errors (1) Starting AP wlan4 PASS authsrv_errors_1 0.155831 2022-07-20 18:54:28.887927 passed all 1 test case(s) 2022-07-20 18:54:28 ./run-tests.py authsrv_unknown_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_unknown_client 1/1 Test: Authentication server and unknown user Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS authsrv_unknown_client 1.321955 2022-07-20 18:54:30.697633 passed all 1 test case(s) 2022-07-20 18:54:30 ./run-tests.py autogo_join_auto_go_neg_after_seeing_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_join_auto_go_neg_after_seeing_go 1/1 Test: P2P_CONNECT-auto fallback to GO Neg after seeing GO Start autonomous GO wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS autogo_join_auto_go_neg_after_seeing_go 7.649986 2022-07-20 18:54:38.832586 passed all 1 test case(s) 2022-07-20 18:54:38 ./run-tests.py autogo_remove_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_remove_iface 1/1 Test: P2P autonomous GO and interface being removed Start autonomous GO wlan5 PASS autogo_remove_iface 1.894017 2022-07-20 18:54:41.212455 passed all 1 test case(s) 2022-07-20 18:54:41 ./run-tests.py dbus_scan_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_scan_oom 1/1 Test: D-Bus scan method and OOM PASS dbus_scan_oom 0.144457 2022-07-20 18:54:41.838767 passed all 1 test case(s) 2022-07-20 18:54:41 ./run-tests.py dbus_wps_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_wps_pbc 1/1 Test: D-Bus WPS/PBC operation and signals Starting AP wlan3 PASS dbus_wps_pbc 5.17964 2022-07-20 18:54:47.503515 passed all 1 test case(s) 2022-07-20 18:54:47 ./run-tests.py dpp_akm_sha512 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_akm_sha512 1/1 Test: DPP AKM (SHA512) Starting AP wlan3 Connect STA wlan0 to AP PASS dpp_akm_sha512 1.117995 2022-07-20 18:54:49.108303 passed all 1 test case(s) 2022-07-20 18:54:49 ./run-tests.py dpp_nfc_errors_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_errors_hostapd 1/1 Test: DPP NFC operation failures in hostapd Starting AP wlan3 PASS dpp_nfc_errors_hostapd 0.359473 2022-07-20 18:54:49.953156 passed all 1 test case(s) 2022-07-20 18:54:49 ./run-tests.py dpp_qr_code_auth_initiator_either_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_initiator_either_3 1/1 Test: DPP QR Code and authentication exchange (Initiator in either role) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_auth_initiator_either_3 0.150172 2022-07-20 18:54:50.593478 passed all 1 test case(s) 2022-07-20 18:54:50 ./run-tests.py dpp_qr_code_auth_responder_configurator_group_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_responder_configurator_group_id 1/1 Test: DPP QR Code and responder as the configurator with group_id) PASS dpp_qr_code_auth_responder_configurator_group_id 0.154832 2022-07-20 18:54:51.234666 passed all 1 test case(s) 2022-07-20 18:54:51 ./run-tests.py dpp_qr_code_chan_list_unicast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_chan_list_unicast 1/1 Test: DPP QR Code and 2.4 GHz channels (unicast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_chan_list_unicast 0.152839 2022-07-20 18:54:51.872243 passed all 1 test case(s) 2022-07-20 18:54:51 ./run-tests.py dpp_qr_code_listen_continue DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_listen_continue 1/1 Test: DPP QR Code and listen operation needing continuation dev0 displays QR Code Wait for listen to expire and get restarted dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_listen_continue 5.651602 2022-07-20 18:54:58.009774 passed all 1 test case(s) 2022-07-20 18:54:58 ./run-tests.py dpp_tcp_qr_code_config_event_initiator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_qr_code_config_event_initiator 1/1 Test: DPP over TCP (Configurator initiates with config event) PASS dpp_tcp_qr_code_config_event_initiator 0.66834 2022-07-20 18:54:59.163357 passed all 1 test case(s) 2022-07-20 18:54:59 ./run-tests.py eap_proto_aka_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_aka_errors 1/1 Test: EAP-AKA protocol tests (error paths) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_aka_errors 7.040088 2022-07-20 18:55:06.686092 passed all 1 test case(s) 2022-07-20 18:55:06 ./run-tests.py eap_proto_tls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_tls 1/1 Test: EAP-TLS protocol tests Starting AP wlan3 Running connection iteration 1 Connect STA wlan0 to AP tls_handler - RX 02ce000d01746c732075736572 Test: Too much payload in TLS/Start: TLS Message Length (0 bytes) smaller than this fragment (1 bytes) Running connection iteration 2 Connect STA wlan0 to AP tls_handler - RX 0207000d01746c732075736572 Test: Fragmented TLS/Start tls_handler - RX 020300060d00 Test: Too long fragment of TLS/Start: Invalid reassembly state: tls_in_left=2 tls_in_len=0 in_len=0 Running connection iteration 3 Connect STA wlan0 to AP tls_handler - RX 029c000d01746c732075736572 Test: EAP-Failure Running connection iteration 4 Connect STA wlan0 to AP tls_handler - RX 02e5000d01746c732075736572 Test: TLS/Start tls_handler - RX 020600be0d0016030100b3010000af030377f2a4b80589c1d1ab508441dde72d5753d6b08474e74f222ff2a61e84ff167b000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message tls_handler - RX 020700060d00 Test: Invalid TLS message: no Flags octet included + workaround tls_handler - RX 020800060d00 Test: Too long fragment of TLS message: more data than TLS message length indicated tls_handler - RX 020900060d00 Test: EAP-Failure Running connection iteration 5 Connect STA wlan0 to AP tls_handler - RX 022b000d01746c732075736572 Test: Fragmented TLS/Start and truncated Message Length field Running connection iteration 6 Connect STA wlan0 to AP tls_handler - RX 02ba000d01746c732075736572 Test: TLS/Start tls_handler - RX 020c00c20d0016030100b7010000b3030344bcf9bbd256629946c1964dca44161568c80119a7b517eed2a4adc3c2186252000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff01000052000b000403000102000a000c000a001d0017001e00190018002300000016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message tls_handler - RX 020d00060d00 Test: Invalid TLS message: no Flags octet included + workaround disabled Running connection iteration 7 Connect STA wlan0 to AP tls_handler - RX 02f8000d01746c732075736572 Test: TLS/Start tls_handler - RX 020f00be0d0016030100b3010000af030346ddec727c0a429c4848ad5b002d32f7cb59a629f5cbd06342d38af181ff2674000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message (long; first) tls_handler - RX 021000060d00 Test: Fragmented TLS message (long; cont 0) tls_handler - RX 021100060d00 Test: Fragmented TLS message (long; cont 1) tls_handler - RX 021200060d00 Test: Fragmented TLS message (long; cont 2) tls_handler - RX 021300060d00 Test: Fragmented TLS message (long; cont 3) tls_handler - RX 021400060d00 Test: Fragmented TLS message (long; cont 4) tls_handler - RX 021500060d00 Test: Fragmented TLS message (long; cont 5) tls_handler - RX 021600060d00 Test: Fragmented TLS message (long; cont 6) tls_handler - RX 021700060d00 Test: Fragmented TLS message (long; cont 7) tls_handler - RX 021800060d00 Test: Fragmented TLS message (long; cont 8) tls_handler - RX 021900060d00 Test: Fragmented TLS message (long; cont 9) tls_handler - RX 021a00060d00 Test: Fragmented TLS message (long; cont 10) tls_handler - RX 021b00060d00 Test: Fragmented TLS message (long; cont 11) tls_handler - RX 021c00060d00 Test: Fragmented TLS message (long; cont 12) tls_handler - RX 021d00060d00 Test: Fragmented TLS message (long; cont 13) tls_handler - RX 021e00060d00 Test: Fragmented TLS message (long; cont 14) tls_handler - RX 021f00060d00 Test: Fragmented TLS message (long; cont 15) tls_handler - RX 022000060d00 Test: Fragmented TLS message (long; cont 16) tls_handler - RX 022100060d00 Test: Fragmented TLS message (long; cont 17) tls_handler - RX 022200060d00 Test: Fragmented TLS message (long; cont 18) tls_handler - RX 022300060d00 Test: Fragmented TLS message (long; cont 19) tls_handler - RX 022400060d00 Test: Fragmented TLS message (long; cont 20) tls_handler - RX 022500060d00 Test: Fragmented TLS message (long; cont 21) tls_handler - RX 022600060d00 Test: Fragmented TLS message (long; cont 22) tls_handler - RX 022700060d00 Test: Fragmented TLS message (long; cont 23) tls_handler - RX 022800060d00 Test: Fragmented TLS message (long; cont 24) tls_handler - RX 022900060d00 Test: Fragmented TLS message (long; cont 25) tls_handler - RX 022a00060d00 Test: Fragmented TLS message (long; cont 26) tls_handler - RX 022b00060d00 Test: Fragmented TLS message (long; cont 27) tls_handler - RX 022c00060d00 Test: Fragmented TLS message (long; cont 28) tls_handler - RX 022d00060d00 Test: Fragmented TLS message (long; cont 29) tls_handler - RX 022e00060d00 Test: Fragmented TLS message (long; cont 30) tls_handler - RX 022f00060d00 Test: Fragmented TLS message (long; cont 31) tls_handler - RX 023000060d00 Test: Fragmented TLS message (long; cont 32) tls_handler - RX 023100060d00 Test: Fragmented TLS message (long; cont 33) tls_handler - RX 023200060d00 Test: Fragmented TLS message (long; cont 34) tls_handler - RX 023300060d00 Test: Fragmented TLS message (long; cont 35) tls_handler - RX 023400060d00 Test: Fragmented TLS message (long; cont 36) tls_handler - RX 023500060d00 Test: Fragmented TLS message (long; cont 37) tls_handler - RX 023600060d00 Test: Fragmented TLS message (long; cont 38) tls_handler - RX 023700060d00 Test: Fragmented TLS message (long; cont 39) tls_handler - RX 023800060d00 Test: Fragmented TLS message (long; cont 40) tls_handler - RX 023900060d00 Test: Fragmented TLS message (long; cont 41) tls_handler - RX 023a00060d00 Test: Fragmented TLS message (long; cont 42) tls_handler - RX 023b00060d00 Test: Fragmented TLS message (long; cont 43) tls_handler - RX 023c00060d00 Test: EAP-Failure Running connection iteration 8 Connect STA wlan0 to AP tls_handler - RX 0270000d01746c732075736572 Test: TLS/Start tls_handler - RX 023e006e0dc0000000b816030100b3010000af0303a495d1253e1797cc053ef18d3adc62f4d11508d37988155904cdeec772e67304000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f Test: Non-ACK to more-fragment message tls_handler - RX 023f00060d00 Test: EAP-Failure Running connection iteration 9 Connect STA wlan0 to AP tls_handler - RX 02fe000d01746c732075736572 No more test responses available - test case completed PASS eap_proto_tls 3.783316 2022-07-20 18:55:10.962083 passed all 1 test case(s) 2022-07-20 18:55:11 ./run-tests.py eap_teap_basic_password_auth_pac_no_inner_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_pac_no_inner_eap 1/1 Test: EAP-TEAP with Basic-Password-Auth and PAC without inner auth Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_pac_no_inner_eap 0.971651 2022-07-20 18:55:12.437175 passed all 1 test case(s) 2022-07-20 18:55:12 ./run-tests.py eap_teap_eap_mschapv2_pac_no_inner_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_pac_no_inner_eap 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and PAC without inner EAP Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_pac_no_inner_eap 1.713952 2022-07-20 18:55:14.666317 passed all 1 test case(s) 2022-07-20 18:55:14 ./run-tests.py eap_tls_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_tls_sha384 1/1 Test: EAP-TLS with SHA384 signature Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS eap_tls_sha384 1.381207 2022-07-20 18:55:16.540648 passed all 1 test case(s) 2022-07-20 18:55:16 ./run-tests.py fils_offload_to_driver DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_offload_to_driver 1/1 Test: FILS offload to driver Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_offload_to_driver 1.831306 2022-07-20 18:55:18.864460 passed all 1 test case(s) 2022-07-20 18:55:18 ./run-tests.py fils_sk_erp_followed_by_pmksa_caching DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_followed_by_pmksa_caching 1/1 Test: FILS SK ERP following by PMKSA caching Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 532, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fils.py", line 462, in test_fils_sk_erp_followed_by_pmksa_caching hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL fils_sk_erp_followed_by_pmksa_caching 6.423678 2022-07-20 18:55:25.779909 passed 0 test case(s) skipped 0 test case(s) failed tests: fils_sk_erp_followed_by_pmksa_caching 2022-07-20 18:55:25 ./run-tests.py fst_ap_ack_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_request_with_no_session 1/1 Test: FST AP ack request with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Ack request) PASS fst_ap_ack_request_with_no_session 6.439081 2022-07-20 18:55:32.713657 passed all 1 test case(s) 2022-07-20 18:55:32 ./run-tests.py fst_ap_ack_response_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_no_session 1/1 Test: FST AP ack response with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Ack response) PASS fst_ap_ack_response_with_no_session 6.315853 2022-07-20 18:55:39.519529 passed all 1 test case(s) 2022-07-20 18:55:39 ./run-tests.py fst_ap_initiate_session_no_new_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session_no_new_iface 1/1 Test: FST AP initiate session - no new iface Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (No new_iface was set) PASS fst_ap_initiate_session_no_new_iface 2.272657 2022-07-20 18:55:42.280754 passed all 1 test case(s) 2022-07-20 18:55:42 ./run-tests.py fst_disconnect_1_of_2_stas_from_non_fst_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_1_of_2_stas_from_non_fst_ap 1/1 Test: FST disconnect 1 of 2 STAs from non-FST AP Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Starting AP wlan7 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_disconnect_1_of_2_stas_from_non_fst_ap 5.549104 2022-07-20 18:55:48.324426 passed all 1 test case(s) 2022-07-20 18:55:48 ./run-tests.py fst_setup_mbie_diff DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_setup_mbie_diff 1/1 Test: FST setup and different MBIE in FST Setup Request Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_setup_mbie_diff 2.345471 2022-07-20 18:55:51.155124 passed all 1 test case(s) 2022-07-20 18:55:51 ./run-tests.py gas_anqp_get_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_get_oom 1/1 Test: GAS/ANQP query OOM Starting AP wlan3 PASS gas_anqp_get_oom 0.600192 2022-07-20 18:55:52.241209 passed all 1 test case(s) 2022-07-20 18:55:52 ./run-tests.py gas_anqp_hs20_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_hs20_proto 1/1 Test: GAS/ANQP and Hotspot 2.0 element protocol testing Starting AP wlan3 PASS gas_anqp_hs20_proto 0.500602 2022-07-20 18:55:53.231096 passed all 1 test case(s) 2022-07-20 18:55:53 ./run-tests.py gas_anqp_oom_hapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_oom_hapd 1/1 Test: GAS/ANQP query and OOM in hostapd Starting AP wlan3 PASS gas_anqp_oom_hapd 2.625135 2022-07-20 18:55:56.345823 passed all 1 test case(s) 2022-07-20 18:55:56 ./run-tests.py gas_fragment_with_comeback_delay DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_fragment_with_comeback_delay 1/1 Test: GAS fragmentation and comeback delay Starting AP wlan3 PASS gas_fragment_with_comeback_delay 1.029458 2022-07-20 18:55:57.860794 passed all 1 test case(s) 2022-07-20 18:55:57 ./run-tests.py grpform_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_pbc 1/1 Test: P2P group formation using PBC and re-init GO Negotiation Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed PASS grpform_pbc 4.239897 2022-07-20 18:56:02.590255 passed all 1 test case(s) 2022-07-20 18:56:02 ./run-tests.py hapd_ctrl_ext_io_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_ext_io_errors 1/1 Test: hostapd and external I/O errors Starting AP wlan3 PASS hapd_ctrl_ext_io_errors 0.560112 2022-07-20 18:56:03.638876 passed all 1 test case(s) 2022-07-20 18:56:03 ./run-tests.py he_40_fallback_to_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_40_fallback_to_20 1/1 Test: HE and 40 MHz channel configuration falling back to 20 MHz Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1090, in test_he_40_fallback_to_20 hwsim_utils.test_connectivity(dev, hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL he_40_fallback_to_20 6.489205 2022-07-20 18:56:10.612731 passed 0 test case(s) skipped 0 test case(s) failed tests: he_40_fallback_to_20 2022-07-20 18:56:10 ./run-tests.py he_capab_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_capab_parsing 1/1 Test: HE AP and capability parsing Starting AP wlan3 PASS he_capab_parsing 0.716541 2022-07-20 18:56:11.815073 passed all 1 test case(s) 2022-07-20 18:56:11 ./run-tests.py he_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_tkip 1/1 Test: HE and TKIP Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'he', 'num_sta[0]': '1'} Country code at the end: 00 PASS he_tkip 1.848284 2022-07-20 18:56:14.149725 passed all 1 test case(s) 2022-07-20 18:56:14 ./run-tests.py ibss_wpa_none DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wpa_none 1/1 Test: IBSS WPA-None Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Waiting for real BSSID on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete STA0 BSSID 32:b9:3f:61:71:c4 differs from STA1 BSSID 00:00:00:00:00:00 wlan1 waiting for IBSS start/join to complete wlan2 waiting for IBSS start/join to complete STA0 BSSID 32:b9:3f:61:71:c4 differs from STA2 BSSID 00:00:00:00:00:00 wlan2 waiting for IBSS start/join to complete bssid0=32:b9:3f:61:71:c4 bssid1=32:b9:3f:61:71:c4 bssid2=32:b9:3f:61:71:c4 Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed PASS ibss_wpa_none 26.754396 2022-07-20 18:56:41.400045 passed all 1 test case(s) 2022-07-20 18:56:41 ./run-tests.py kernel_bss_leak_deauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START kernel_bss_leak_deauth 1/1 Test: cfg80211/mac80211 BSS leak on deauthentication Starting AP wlan3 Connect STA wlan0 to AP PASS kernel_bss_leak_deauth 0.887329 2022-07-20 18:56:42.773609 passed all 1 test case(s) 2022-07-20 18:56:42 ./run-tests.py macsec_psk_br3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br3 1/1 Test: MACsec PSK (bridge; 3 devices) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 64:00:6a:30:91:ac brd ff:ff:ff:ff:ff:ff altname enp0s31f6 3: wlan0: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 14: brveth: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 92:e5:43:67:9b:c6 brd ff:ff:ff:ff:ff:ff 15: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether b2:1b:4a:d2:b9:b9 brd ff:ff:ff:ff:ff:ff 16: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 7e:b6:13:e2:f2:8e brd ff:ff:ff:ff:ff:ff 17: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 82:7c:98:eb:59:6b brd ff:ff:ff:ff:ff:ff 18: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 96:3a:10:bb:8c:45 brd ff:ff:ff:ff:ff:ff 19: vethbr2@veth2: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 4e:44:a2:0d:29:66 brd ff:ff:ff:ff:ff:ff 20: veth2@vethbr2: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 1a:9b:93:4d:33:64 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br3 0.614992 2022-07-20 18:56:43.873597 passed all 0 test case(s) skipped 1 test case(s) 2022-07-20 18:56:43 ./run-tests.py macsec_psk_mka_life_time DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_mka_life_time 1/1 Test: MACsec PSK - MKA life time Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_mka_life_time 0.242476 2022-07-20 18:56:44.611551 passed all 0 test case(s) skipped 1 test case(s) 2022-07-20 18:56:44 ./run-tests.py mbo_assoc_disallow_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_assoc_disallow_change 1/1 Test: MBO and dynamic association disallowed change with passive scanning Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_assoc_disallow_change 1.082047 2022-07-20 18:56:46.212118 passed all 1 test case(s) 2022-07-20 18:56:46 ./run-tests.py mesh_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_failure 1/1 Test: Mesh and local failures PASS mesh_failure 3.39371 2022-07-20 18:56:50.100009 passed all 1 test case(s) 2022-07-20 18:56:50 ./run-tests.py mesh_open_no_auto2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_open_no_auto2 1/1 Test: Open mesh network connectivity, no_auto on both peers PASS mesh_open_no_auto2 0.931628 2022-07-20 18:56:51.518290 passed all 1 test case(s) 2022-07-20 18:56:51 ./run-tests.py mesh_secure_ocv_mix_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_mix_ht 1/1 Test: Mesh network with a VHT STA and a HT STA under OCV Country code at the end: 00 PASS mesh_secure_ocv_mix_ht 2.050472 2022-07-20 18:56:54.056803 passed all 1 test case(s) 2022-07-20 18:56:54 ./run-tests.py mscs_without_ap_support DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mscs_without_ap_support 1/1 Test: MSCS without AP support Starting AP wlan3 Connect STA wlan0 to AP PASS mscs_without_ap_support 0.993327 2022-07-20 18:56:55.535809 passed all 1 test case(s) 2022-07-20 18:56:55 ./run-tests.py multi_ap_wps_shared DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_shared 1/1 Test: WPS on shared fronthaul/backhaul AP Starting AP wlan3 PASS multi_ap_wps_shared 14.64327 2022-07-20 18:57:10.663876 passed all 1 test case(s) 2022-07-20 18:57:10 ./run-tests.py p2p_channel_5ghz_165_169_us DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_5ghz_165_169_us 1/1 Test: P2P GO and 5 GHz channels 165 (allowed) and 169 (disallowed) in US Country code at the end: 00 PASS p2p_channel_5ghz_165_169_us 0.806829 2022-07-20 18:57:11.955628 passed all 1 test case(s) 2022-07-20 18:57:12 ./run-tests.py p2ps_connect_adv_go_p2ps_method_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_adv_go_p2ps_method_group_iface 1/1 Test: P2PS auto-accept connection with advertisement as GO and P2PS method using separate group interface PASS p2ps_connect_adv_go_p2ps_method_group_iface 12.286614 2022-07-20 18:57:24.728803 passed all 1 test case(s) 2022-07-20 18:57:24 ./run-tests.py p2ps_wildcard_p2ps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_wildcard_p2ps 1/1 Test: P2PS wildcard SD Probe Request/Response PASS p2ps_wildcard_p2ps 2.622573 2022-07-20 18:57:27.839248 passed all 1 test case(s) 2022-07-20 18:57:27 ./run-tests.py pasn_comeback_after_0_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_comeback_after_0_sae 1/1 Test: PASN authentication with SAE, with comeback flow where comeback after is set to 0 Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 2f98ee85088761a1bea9cf659e8425e5 KDK: ap : TK: 2f98ee85088761a1bea9cf659e8425e5 KDK: sta: TK: c8183a62d5dd4691ffd9cd6069a60779 KDK: ap : TK: c8183a62d5dd4691ffd9cd6069a60779 KDK: PASS pasn_comeback_after_0_sae 3.681998 2022-07-20 18:57:32.005761 passed all 1 test case(s) 2022-07-20 18:57:32 ./run-tests.py pasn_sae_while_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_sae_while_connected_same_channel 1/1 Test: PASN SAE authentication while connected same channel Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-pasn-wpa2-psk sta: TK: 1f402cf166f540429c931db712673517 KDK: ap : TK: 1f402cf166f540429c931db712673517 KDK: PASS pasn_sae_while_connected_same_channel 1.729136 2022-07-20 18:57:34.219210 passed all 1 test case(s) 2022-07-20 18:57:34 ./run-tests.py pasn_while_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_while_connected_same_channel 1/1 Test: PASN authentication with WPA2/CCMP AP while connected same channel Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-wpa2-psk 02:00:00:00:04:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-wpa2-pasn sta: TK: 55b5b51773f8e42928fd789ef83cdad3 KDK: ap : TK: 55b5b51773f8e42928fd789ef83cdad3 KDK: PASS pasn_while_connected_same_channel 1.693522 2022-07-20 18:57:36.398767 passed all 1 test case(s) 2022-07-20 18:57:36 ./run-tests.py sae_ocv_pmk_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_ocv_pmk_failure 1/1 Test: SAE with OCV and fetching PMK (failed 4-way handshake) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_ocv_pmk_failure 4.946841 2022-07-20 18:57:41.834923 passed all 1 test case(s) 2022-07-20 18:57:41 ./run-tests.py sae_pk_and_psk_invalid_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_and_psk_invalid_password 1/1 Test: SAE-PK and PSK using invalid password combination Starting AP wlan3 PASS sae_pk_and_psk_invalid_password 0.207111 2022-07-20 18:57:42.530159 passed all 1 test case(s) 2022-07-20 18:57:42 ./run-tests.py sae_pmksa_caching_pmkid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pmksa_caching_pmkid 1/1 Test: SAE and PMKSA caching (PMKID in AssocReq after SAE) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pmksa_caching_pmkid 1.332104 2022-07-20 18:57:44.349908 passed all 1 test case(s) 2022-07-20 18:57:44 ./run-tests.py sae_pwe_group_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_2 1/1 Test: SAE PWE derivation options with group 2 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_2 1.755877 2022-07-20 18:57:46.586509 passed all 1 test case(s) 2022-07-20 18:57:46 ./run-tests.py sae_reflection_attack_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ffc 1/1 Test: SAE reflection attack (FFC) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ffc 1.033228 2022-07-20 18:57:48.106521 passed all 1 test case(s) 2022-07-20 18:57:48 ./run-tests.py scan_multi_bssid_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_4 1/1 Test: Scan and Multiple BSSID element (3) Starting AP wlan3 AP 02:00:00:00:03:01: {'id': '74', 'bssid': '02:00:00:00:03:01', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1658343468709619', 'age': '0', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103', 'flags': '[ESS]', 'ssid': 'transmitted', 'snr': '59', 'est_throughput': '65000', 'update_idx': '146'} AP 02:00:00:00:03:02: {'id': '75', 'bssid': '02:00:00:00:03:02', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1658343468709619', 'age': '0', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101', 'flags': '[ESS]', 'ssid': '1', 'snr': '59', 'est_throughput': '65000', 'update_idx': '146'} AP 02:00:00:00:03:03: {'id': '76', 'bssid': '02:00:00:00:03:03', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1658343468709619', 'age': '0', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102', 'flags': '[ESS]', 'ssid': '2', 'snr': '59', 'est_throughput': '65000', 'update_idx': '146'} AP 02:00:00:00:03:00: {'id': '77', 'bssid': '02:00:00:00:03:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1658343468709619', 'age': '0', 'ie': '000133010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550103', 'flags': '[ESS]', 'ssid': '3', 'snr': '59', 'est_throughput': '65000', 'update_idx': '146'} PASS scan_multi_bssid_4 0.898649 2022-07-20 18:57:49.490182 passed all 1 test case(s) 2022-07-20 18:57:49 ./run-tests.py scan_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_only 1/1 Test: Control interface behavior on scan parameters with type=only Starting AP wlan3 Full scan Limited channel scan Passive single-channel scan Active single-channel scan Active single-channel scan on AP's operating channel PASS scan_only 7.69072 2022-07-20 18:57:57.686746 passed all 1 test case(s) 2022-07-20 18:57:57 ./run-tests.py scan_specific_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specific_bssid 1/1 Test: Scan for a specific BSSID Starting AP wlan3 PASS scan_specific_bssid 0.73853 2022-07-20 18:57:58.924066 passed all 1 test case(s) 2022-07-20 18:57:58 ./run-tests.py sigma_dut_ap_osen DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_osen 1/1 Test: sigma_dut controlled AP with OSEN Skip test case: sigma_dut not available SKIP sigma_dut_ap_osen 0.177661 2022-07-20 18:57:59.597152 passed all 0 test case(s) skipped 1 test case(s) 2022-07-20 18:57:59 ./run-tests.py sigma_dut_ap_sae_h2e_anti_clogging DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_h2e_anti_clogging 1/1 Test: sigma_dut controlled AP with SAE H2E and anti-clogging token Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_h2e_anti_clogging 0.1995 2022-07-20 18:58:00.294543 passed all 0 test case(s) skipped 1 test case(s) 2022-07-20 18:58:00 ./run-tests.py sigma_dut_ap_transition_disable_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_transition_disable_change 1/1 Test: sigma_dut controlled AP and transition disabled indication change Skip test case: sigma_dut not available SKIP sigma_dut_ap_transition_disable_change 0.190197 2022-07-20 18:58:00.982520 passed all 0 test case(s) skipped 1 test case(s) 2022-07-20 18:58:01 ./run-tests.py sigma_dut_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_open 1/1 Test: sigma_dut controlled open network association Skip test case: sigma_dut not available SKIP sigma_dut_open 0.135734 2022-07-20 18:58:01.613218 passed all 0 test case(s) skipped 1 test case(s) 2022-07-20 18:58:01 ./run-tests.py sta_dynamic_random_mac_addr_scan_keep_oui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_scan_keep_oui 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address for scan (keep OUI) Starting AP wlan3 Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_scan_keep_oui 1.42127 2022-07-20 18:58:03.531704 passed all 1 test case(s) 2022-07-20 18:58:03 ./run-tests.py tspec_reassoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_reassoc 1/1 Test: Reassociation to same BSS while having tspecs Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_wpas_wmm_ac.py", line 282, in test_tspec_reassoc hwsim_utils.test_connectivity(dev[0], hapd0) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL tspec_reassoc 9.301113 2022-07-20 18:58:13.331839 passed 0 test case(s) skipped 0 test case(s) failed tests: tspec_reassoc 2022-07-20 18:58:13 ./run-tests.py wep_ht_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_ht_vht 1/1 Test: WEP and HT/VHT Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-vht40-wep', 'num_sta[0]': '1'} Country code at the end: 00 PASS wep_ht_vht 1.529083 2022-07-20 18:58:15.357961 passed all 1 test case(s) 2022-07-20 18:58:15 ./run-tests.py wmediumd_path_ttl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_path_ttl 1/1 Test: Mesh path request TTL PASS wmediumd_path_ttl 10.427578 2022-07-20 18:58:26.285206 passed all 1 test case(s) 2022-07-20 18:58:26 ./run-tests.py wnm_bss_tm_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_connect_cmd 1/1 Test: WNM BSS Transition Management and cfg80211 connect command Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Preferred Candidate List (matching neighbor for another BSS) without Disassociation Imminent PASS wnm_bss_tm_connect_cmd 1.905701 2022-07-20 18:58:28.689748 passed all 1 test case(s) 2022-07-20 18:58:28 ./run-tests.py wnm_bss_tm_req_with_mbo_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_req_with_mbo_ie 1/1 Test: WNM BSS transition request with MBO IE and reassociation delay attribute Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_req_with_mbo_ie 6.964223 2022-07-20 18:58:36.153961 passed all 1 test case(s) 2022-07-20 18:58:36 ./run-tests.py wpa2_ocv_ap_override_eapol_g1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_g1 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key group msg 1/2 Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_g1 0.955369 2022-07-20 18:58:37.605670 passed all 1 test case(s) 2022-07-20 18:58:37 ./run-tests.py wpas_ap_dfs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_dfs 1/1 Test: wpa_supplicant AP mode - DFS Connect STA wlan1 to AP PASS wpas_ap_dfs 64.457596 2022-07-20 18:59:42.559817 passed all 1 test case(s) 2022-07-20 18:59:42 ./run-tests.py wpas_mesh_password_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_password_mismatch 1/1 Test: Mesh network and one device with mismatching password PASS wpas_mesh_password_mismatch 22.548729 2022-07-20 19:00:05.595419 passed all 1 test case(s) 2022-07-20 19:00:05 ./run-tests.py wps_ext_cred_proto_missing_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_missing_cred 1/1 Test: WPS and Credential: Missing Credential Starting AP wlan3 PASS wps_ext_cred_proto_missing_cred 1.009586 2022-07-20 19:00:07.101119 passed all 1 test case(s) 2022-07-20 19:00:07 ./run-tests.py wps_ext_m2_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_ack 1/1 Test: WPS proto: M2 followed by ACK Starting AP wlan3 PASS wps_ext_m2_ack 0.973769 2022-07-20 19:00:08.567198 passed all 1 test case(s) 2022-07-20 19:00:08 ./run-tests.py wps_ext_proto_m4_missing_r_snonce1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m4_missing_r_snonce1 1/1 Test: WPS and no R-SNonce1 in M4 Starting AP wlan3 PASS wps_ext_proto_m4_missing_r_snonce1 0.982454 2022-07-20 19:00:10.037626 passed all 1 test case(s) 2022-07-20 19:00:10 ./stop.sh