2022-11-18 01:38:06 export USER=root 2022-11-18 01:38:06 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2022-11-18 01:38:56 ./start.sh 2022-11-18 01:38:57 ./run-tests.py ap_bss_add_out_of_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_out_of_memory 1/1 Test: Running out of memory while adding a BSS Starting AP wlan4 Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Removing BSS wlan3-2 Removing BSS wlan3 PASS ap_bss_add_out_of_memory 1.734882 2022-11-18 01:39:01.046362 passed all 1 test case(s) 2022-11-18 01:39:01 ./run-tests.py ap_cipher_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_bip_gmac_256 1/1 Test: WPA2-PSK with BIP-GMAC-256 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_bip_gmac_256 1.239921 2022-11-18 01:39:02.756253 passed all 1 test case(s) 2022-11-18 01:39:02 ./run-tests.py ap_enable_disable_reenable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_enable_disable_reenable 1/1 Test: Enable, disable, re-enable AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_enable_disable_reenable 2.264614 2022-11-18 01:39:05.484595 passed all 1 test case(s) 2022-11-18 01:39:05 ./run-tests.py ap_fragmentation_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_fragmentation_open 1/1 Test: Open AP with fragmentation threshold Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_params.py", line 46, in test_ap_fragmentation_open hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_fragmentation_open 6.141026 2022-11-18 01:39:12.078350 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_fragmentation_open 2022-11-18 01:39:12 ./run-tests.py ap_ft_pmf_beacon_prot DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_beacon_prot 1/1 Test: WPA2-PSK-FT AP with PMF and beacon protection Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 498, in test_ap_ft_pmf_beacon_prot run_ap_ft_pmf(dev, apdev, "1", beacon_prot=True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 521, in run_ap_ft_pmf run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 216, in run_roams hwsim_utils.test_connectivity(dev, hapd1ap) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_ft_pmf_beacon_prot 6.909902 2022-11-18 01:39:19.428923 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_pmf_beacon_prot 2022-11-18 01:39:19 ./run-tests.py ap_ft_ptk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ptk_rekey 1/1 Test: WPA2-PSK-FT PTK rekeying triggered by station after roam Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 2890, in test_ap_ft_ptk_rekey run_roams(dev[0], apdev, hapd0, hapd1, "test-ft", "12345678", ptk_rekey="1") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 216, in run_roams hwsim_utils.test_connectivity(dev, hapd1ap) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_ft_ptk_rekey 6.725572 2022-11-18 01:39:26.596452 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_ptk_rekey 2022-11-18 01:39:26 ./run-tests.py ap_ft_sae_h2e_and_loop DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_h2e_and_loop 1/1 Test: WPA2-PSK-FT-SAE AP (AP H2E, STA loop) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 1132, in test_ap_ft_sae_h2e_and_loop run_roams(dev[0], apdev, hapd0, hapd1, "test-ft", "12345678", sae=True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 216, in run_roams hwsim_utils.test_connectivity(dev, hapd1ap) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_ft_sae_h2e_and_loop 6.725738 2022-11-18 01:39:33.762011 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_sae_h2e_and_loop 2022-11-18 01:39:33 ./run-tests.py ap_hs20_anqp_format_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_anqp_format_errors 1/1 Test: Interworking network selection and ANQP format errors Starting AP wlan3 PASS ap_hs20_anqp_format_errors 3.274885 2022-11-18 01:39:37.479629 passed all 1 test case(s) 2022-11-18 01:39:37 ./run-tests.py ap_hs20_auto_interworking_global_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_global_pmf 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 and pmf=2 Starting AP wlan3 PASS ap_hs20_auto_interworking_global_pmf 5.363513 2022-11-18 01:39:43.285097 passed all 1 test case(s) 2022-11-18 01:39:43 ./run-tests.py ap_hs20_deauth_req_from_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_deauth_req_from_radius 1/1 Test: Hotspot 2.0 connection and deauthentication request from RADIUS Starting AP wlan3 PASS ap_hs20_deauth_req_from_radius 3.199139 2022-11-18 01:39:46.926642 passed all 1 test case(s) 2022-11-18 01:39:46 ./run-tests.py ap_hs20_domain_suffix_match_full DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_domain_suffix_match_full 1/1 Test: Hotspot 2.0 and domain_suffix_match Starting AP wlan3 PASS ap_hs20_domain_suffix_match_full 2.767798 2022-11-18 01:39:50.134386 passed all 1 test case(s) 2022-11-18 01:39:50 ./run-tests.py ap_hs20_eap_fast_gtc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_fast_gtc 1/1 Test: Hotspot 2.0 connection with FAST/EAP-GTC Starting AP wlan3 PASS ap_hs20_eap_fast_gtc 1.347232 2022-11-18 01:39:51.922644 passed all 1 test case(s) 2022-11-18 01:39:51 ./run-tests.py ap_hs20_gas_while_associated DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_gas_while_associated 1/1 Test: Hotspot 2.0 connection with GAS query while associated Starting AP wlan3 Verifying GAS query while associated PASS ap_hs20_gas_while_associated 1.212147 2022-11-18 01:39:53.578594 passed all 1 test case(s) 2022-11-18 01:39:53 ./run-tests.py ap_ht40_plus_minus2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_plus_minus2 1/1 Test: HT40 with both plus and minus allowed (2) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_plus_minus2 2.79218 2022-11-18 01:39:56.809443 passed all 1 test case(s) 2022-11-18 01:39:56 ./run-tests.py ap_ht40_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan 1/1 Test: HT40 co-ex scan Starting AP wlan3 hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '2432', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '5', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '-1', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'ht_caps_info': '000e', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-ht40', 'num_sta[0]': '0'} Connect STA wlan0 to AP hostapd STA: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '2', 'tx_packets': '2', 'rx_bytes': '128', 'tx_bytes': '169', 'inactive_msec': '92', 'signal': '-30', 'rx_rate_info': '0', 'tx_rate_info': '10', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5451525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} STA SIGNAL_POLL: RSSI=-30 LINKSPEED=1 NOISE=-92 FREQUENCY=2432 WIDTH=40 MHz CENTER_FRQ1=2422 AVG_RSSI=-30 AVG_BEACON_RSSI=-30 PASS ap_ht40_scan 2.837288 2022-11-18 01:40:00.083806 passed all 1 test case(s) 2022-11-18 01:40:00 ./run-tests.py ap_ht_stbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_stbc 1/1 Test: HT STBC overrides Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_ht_stbc 1.993234 2022-11-18 01:40:02.527172 passed all 1 test case(s) 2022-11-18 01:40:02 ./run-tests.py ap_invalid_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_invalid_config 1/1 Test: Try to start AP with invalid configuration and fix configuration Trying to start AP wlan3 with invalid configuration Starting AP wlan3 Fix configuration and start AP again Connect STA wlan0 to AP PASS ap_invalid_config 1.242847 2022-11-18 01:40:04.218135 passed all 1 test case(s) 2022-11-18 01:40:04 ./run-tests.py ap_qosmap_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_default 1/1 Test: QoS mapping with default values Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_qosmap.py", line 90, in test_ap_qosmap_default check_qos_map(apdev[0], hapd, dev[0], addr, dscp, dscp >> 3) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_qosmap.py", line 23, in check_qos_map hwsim_utils.test_connectivity(dev, hapd, dscp=dscp, config=False) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_qosmap_default 6.070798 2022-11-18 01:40:10.737755 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_qosmap_default 2022-11-18 01:40:10 ./run-tests.py ap_tdls_prohibit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_prohibit 1/1 Test: Open AP and TDLS prohibited Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP dev1->dev2 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_tdls.py", line 581, in test_ap_tdls_prohibit connect_2sta_open(dev, hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_tdls.py", line 69, in connect_2sta_open connectivity(dev, hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_tdls.py", line 25, in connectivity hwsim_utils.test_connectivity_sta(dev[0], dev[1]) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 211, in test_connectivity_sta test_connectivity(dev1, dev2, dscp, tos) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev1->dev2 unicast data delivery failed FAIL ap_tdls_prohibit 6.481161 2022-11-18 01:40:17.672954 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_tdls_prohibit 2022-11-18 01:40:17 ./run-tests.py ap_vht160_no_dfs_100_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_100_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (100 plus) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 515, in test_ap_vht160_no_dfs_100_plus run_ap_vht160_no_dfs(dev, apdev, "100", "[HT40+]") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 573, in run_ap_vht160_no_dfs hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_vht160_no_dfs_100_plus 6.898314 2022-11-18 01:40:25.025843 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vht160_no_dfs_100_plus 2022-11-18 01:40:25 ./run-tests.py ap_wpa2_eap_aka_prime_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime_ext 1/1 Test: EAP-AKA' with external UMTS auth to hit Synchronization-Failure Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_prime_ext 1.123558 2022-11-18 01:40:26.599039 passed all 1 test case(s) 2022-11-18 01:40:26 ./run-tests.py ap_wpa2_eap_sim_db DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_db 1/1 Test: EAP-SIM DB error cases Starting AP wlan3 Connect STA wlan0 to AP No proper response - wait for pending eap_sim_db request timeout PASS ap_wpa2_eap_sim_db 2.829047 2022-11-18 01:40:29.871395 passed all 1 test case(s) 2022-11-18 01:40:29 ./run-tests.py ap_wpa2_eap_tls_ocsp_ca_signed_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_ca_signed_unknown 1/1 Test: EAP-TLS and CA signed OCSP response (unknown) openssl ocsp -reqout logs/current/ocsp-req.der -issuer auth_serv/ca.pem -sha256 -serial 0xD8D3E3A6CBE3CD73 -no_nonce openssl result: openssl ocsp -index auth_serv/index-unknown.txt -rsigner auth_serv/ca.pem -rkey auth_serv/ca-key.pem -CA auth_serv/ca.pem -ndays 7 -reqin logs/current/ocsp-req.der -resp_no_certs -respout logs/current/ocsp-resp-ca-signed-unknown.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_ca_signed_unknown 1.07605 2022-11-18 01:40:31.389689 passed all 1 test case(s) 2022-11-18 01:40:31 ./run-tests.py ap_wpa2_psk_ext_eapol_retry1c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_eapol_retry1c 1/1 Test: WPA2 4-way handshake with EAPOL-Key 1/4 and 2/4 retransmitted and SNonce changing Starting AP wlan3 Connect STA wlan0 to AP Send EAPOL-Key msg 2/4 (a) Send EAPOL-Key msg 2/4 (b) Send EAPOL-Key msg 4/4 PASS ap_wpa2_psk_ext_eapol_retry1c 1.130708 2022-11-18 01:40:32.971595 passed all 1 test case(s) 2022-11-18 01:40:33 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 1/1 Test: Extended Key ID and PTK rekey by station (start with Key ID 1) Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_psk.py", line 3583, in test_ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 run_ap_wpa2_psk_ext_key_id_ptk_rekey_sta(dev, apdev, 2) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_psk.py", line 3617, in run_ap_wpa2_psk_ext_key_id_ptk_rekey_sta hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 7.303371 2022-11-18 01:40:40.727586 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 2022-11-18 01:40:40 ./run-tests.py ap_wpa2_psk_supp_proto_no_igtk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_no_igtk 1/1 Test: WPA2-PSK supplicant protocol testing: no IGTK KDE Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_no_igtk 1.734585 2022-11-18 01:40:42.904257 passed all 1 test case(s) 2022-11-18 01:40:42 ./run-tests.py ap_wps_conf_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_5ghz 1/1 Test: WPS PBC provisioning with configured AP on 5 GHz band Starting AP wlan3 WPS provisioning step Country code at the end: 00 PASS ap_wps_conf_5ghz 2.109691 2022-11-18 01:40:45.456530 passed all 1 test case(s) 2022-11-18 01:40:45 ./run-tests.py ap_wps_eap_wsc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_eap_wsc 1/1 Test: WPS and EAP-WSC in network profile Starting AP wlan3 Unexpected identity Connect STA wlan0 to AP No phase1 parameter Connect STA wlan0 to AP No PIN/PBC in phase1 Connect STA wlan0 to AP Invalid pkhash in phase1 Connect STA wlan0 to AP Zero fragment_size Connect STA wlan0 to AP Missing new_auth Connect STA wlan0 to AP Missing new_encr Connect STA wlan0 to AP Missing new_key Connect STA wlan0 to AP PASS ap_wps_eap_wsc 3.622233 2022-11-18 01:40:49.521283 passed all 1 test case(s) 2022-11-18 01:40:49 ./run-tests.py ap_wps_er_http_proto_invalid_sid_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_invalid_sid_uuid 1/1 Test: WPS ER HTTP protocol testing - invalid SID UUID HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/115567742/1 PASS ap_wps_er_http_proto_invalid_sid_uuid 0.15098 2022-11-18 01:40:50.114417 passed all 1 test case(s) 2022-11-18 01:40:50 ./run-tests.py ap_wps_m2_missing_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_missing_msg_type 1/1 Test: WPS and M2 without Message Type Starting AP wlan3 PASS ap_wps_m2_missing_msg_type 1.425685 2022-11-18 01:40:51.984006 passed all 1 test case(s) 2022-11-18 01:40:52 ./run-tests.py ap_wps_priority DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_priority 1/1 Test: WPS PIN provisioning with configured AP and wps_priority Starting AP wlan3 WPS provisioning step PASS ap_wps_priority 1.805028 2022-11-18 01:40:54.231423 passed all 1 test case(s) 2022-11-18 01:40:54 ./run-tests.py ap_wps_probe_req_ie_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_probe_req_ie_oom 1/1 Test: WPS ProbeReq IE OOM Starting AP wlan3 PASS ap_wps_probe_req_ie_oom 1.973529 2022-11-18 01:40:56.645947 passed all 1 test case(s) 2022-11-18 01:40:56 ./run-tests.py ap_wps_reg_config_and_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config_and_sae 1/1 Test: WPS registrar configuring an AP using AP PIN and using PSK+SAE Starting AP wlan3 WPS configuration step Connect STA wlan1 to AP PASS ap_wps_reg_config_and_sae 2.283791 2022-11-18 01:40:59.371308 passed all 1 test case(s) 2022-11-18 01:40:59 ./run-tests.py authsrv_errors_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_errors_1 1/1 Test: Authentication server errors (1) Starting AP wlan4 PASS authsrv_errors_1 0.321893 2022-11-18 01:41:00.134814 passed all 1 test case(s) 2022-11-18 01:41:00 ./run-tests.py authsrv_unknown_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_unknown_client 1/1 Test: Authentication server and unknown user Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS authsrv_unknown_client 1.483077 2022-11-18 01:41:02.058376 passed all 1 test case(s) 2022-11-18 01:41:02 ./run-tests.py autogo_join_auto_go_neg_after_seeing_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_join_auto_go_neg_after_seeing_go 1/1 Test: P2P_CONNECT-auto fallback to GO Neg after seeing GO Start autonomous GO wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS autogo_join_auto_go_neg_after_seeing_go 8.603499 2022-11-18 01:41:11.105940 passed all 1 test case(s) 2022-11-18 01:41:11 ./run-tests.py autogo_remove_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_remove_iface 1/1 Test: P2P autonomous GO and interface being removed Start autonomous GO wlan5 PASS autogo_remove_iface 2.071154 2022-11-18 01:41:13.620942 passed all 1 test case(s) 2022-11-18 01:41:13 ./run-tests.py dbus_scan_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_scan_oom 1/1 Test: D-Bus scan method and OOM PASS dbus_scan_oom 0.144006 2022-11-18 01:41:14.208986 passed all 1 test case(s) 2022-11-18 01:41:14 ./run-tests.py dbus_wps_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_wps_pbc 1/1 Test: D-Bus WPS/PBC operation and signals Starting AP wlan3 PASS dbus_wps_pbc 6.136435 2022-11-18 01:41:20.786797 passed all 1 test case(s) 2022-11-18 01:41:20 ./run-tests.py dpp_akm_sha512 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_akm_sha512 1/1 Test: DPP AKM (SHA512) Starting AP wlan3 Connect STA wlan0 to AP PASS dpp_akm_sha512 1.271022 2022-11-18 01:41:22.501470 passed all 1 test case(s) 2022-11-18 01:41:22 ./run-tests.py dpp_nfc_errors_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_errors_hostapd 1/1 Test: DPP NFC operation failures in hostapd Starting AP wlan3 PASS dpp_nfc_errors_hostapd 0.61024 2022-11-18 01:41:23.553204 passed all 1 test case(s) 2022-11-18 01:41:23 ./run-tests.py dpp_qr_code_auth_initiator_either_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_initiator_either_3 1/1 Test: DPP QR Code and authentication exchange (Initiator in either role) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_auth_initiator_either_3 2.219314 2022-11-18 01:41:26.214784 passed all 1 test case(s) 2022-11-18 01:41:26 ./run-tests.py dpp_qr_code_auth_responder_configurator_group_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_responder_configurator_group_id 1/1 Test: DPP QR Code and responder as the configurator with group_id) PASS dpp_qr_code_auth_responder_configurator_group_id 2.290245 2022-11-18 01:41:28.948952 passed all 1 test case(s) 2022-11-18 01:41:28 ./run-tests.py dpp_qr_code_chan_list_unicast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_chan_list_unicast 1/1 Test: DPP QR Code and 2.4 GHz channels (unicast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_chan_list_unicast 0.259471 2022-11-18 01:41:29.650650 passed all 1 test case(s) 2022-11-18 01:41:29 ./run-tests.py dpp_qr_code_listen_continue DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_listen_continue 1/1 Test: DPP QR Code and listen operation needing continuation dev0 displays QR Code Wait for listen to expire and get restarted dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_listen_continue 5.71764 2022-11-18 01:41:35.811226 passed all 1 test case(s) 2022-11-18 01:41:35 ./run-tests.py dpp_tcp_qr_code_config_event_initiator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_qr_code_config_event_initiator 1/1 Test: DPP over TCP (Configurator initiates with config event) PASS dpp_tcp_qr_code_config_event_initiator 0.674463 2022-11-18 01:41:36.929643 passed all 1 test case(s) 2022-11-18 01:41:36 ./run-tests.py eap_proto_aka_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_aka_errors 1/1 Test: EAP-AKA protocol tests (error paths) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_aka_errors 8.168325 2022-11-18 01:41:45.538231 passed all 1 test case(s) 2022-11-18 01:41:45 ./run-tests.py eap_proto_tls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_tls 1/1 Test: EAP-TLS protocol tests Starting AP wlan3 Running connection iteration 1 Connect STA wlan0 to AP tls_handler - RX 02d0000d01746c732075736572 Test: Too much payload in TLS/Start: TLS Message Length (0 bytes) smaller than this fragment (1 bytes) Running connection iteration 2 Connect STA wlan0 to AP tls_handler - RX 0292000d01746c732075736572 Test: Fragmented TLS/Start tls_handler - RX 020300060d00 Test: Too long fragment of TLS/Start: Invalid reassembly state: tls_in_left=2 tls_in_len=0 in_len=0 Running connection iteration 3 Connect STA wlan0 to AP tls_handler - RX 0246000d01746c732075736572 Test: EAP-Failure Running connection iteration 4 Connect STA wlan0 to AP tls_handler - RX 02a3000d01746c732075736572 Test: TLS/Start tls_handler - RX 020600be0d0016030100b3010000af0303fc1be03589c1b555377232c6e7331c4a2843e13d3c6913507a3d2259a5f24dba000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message tls_handler - RX 020700060d00 Test: Invalid TLS message: no Flags octet included + workaround tls_handler - RX 020800060d00 Test: Too long fragment of TLS message: more data than TLS message length indicated tls_handler - RX 020900060d00 Test: EAP-Failure Running connection iteration 5 Connect STA wlan0 to AP tls_handler - RX 0227000d01746c732075736572 Test: Fragmented TLS/Start and truncated Message Length field Running connection iteration 6 Connect STA wlan0 to AP tls_handler - RX 025d000d01746c732075736572 Test: TLS/Start tls_handler - RX 020c00c20d0016030100b7010000b30303aca2812cf300783566f319c87fc232d9591c1d7688bd14daa5be1d265b2ba58e000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff01000052000b000403000102000a000c000a001d0017001e00190018002300000016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message tls_handler - RX 020d00060d00 Test: Invalid TLS message: no Flags octet included + workaround disabled Running connection iteration 7 Connect STA wlan0 to AP tls_handler - RX 021d000d01746c732075736572 Test: TLS/Start tls_handler - RX 020f00be0d0016030100b3010000af03032673ee09cc47e0624306132dc9f89b22f6c3a8e543eaca1e85c4a862043cc0ca000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message (long; first) tls_handler - RX 021000060d00 Test: Fragmented TLS message (long; cont 0) tls_handler - RX 021100060d00 Test: Fragmented TLS message (long; cont 1) tls_handler - RX 021200060d00 Test: Fragmented TLS message (long; cont 2) tls_handler - RX 021300060d00 Test: Fragmented TLS message (long; cont 3) tls_handler - RX 021400060d00 Test: Fragmented TLS message (long; cont 4) tls_handler - RX 021500060d00 Test: Fragmented TLS message (long; cont 5) tls_handler - RX 021600060d00 Test: Fragmented TLS message (long; cont 6) tls_handler - RX 021700060d00 Test: Fragmented TLS message (long; cont 7) tls_handler - RX 021800060d00 Test: Fragmented TLS message (long; cont 8) tls_handler - RX 021900060d00 Test: Fragmented TLS message (long; cont 9) tls_handler - RX 021a00060d00 Test: Fragmented TLS message (long; cont 10) tls_handler - RX 021b00060d00 Test: Fragmented TLS message (long; cont 11) tls_handler - RX 021c00060d00 Test: Fragmented TLS message (long; cont 12) tls_handler - RX 021d00060d00 Test: Fragmented TLS message (long; cont 13) tls_handler - RX 021e00060d00 Test: Fragmented TLS message (long; cont 14) tls_handler - RX 021f00060d00 Test: Fragmented TLS message (long; cont 15) tls_handler - RX 022000060d00 Test: Fragmented TLS message (long; cont 16) tls_handler - RX 022100060d00 Test: Fragmented TLS message (long; cont 17) tls_handler - RX 022200060d00 Test: Fragmented TLS message (long; cont 18) tls_handler - RX 022300060d00 Test: Fragmented TLS message (long; cont 19) tls_handler - RX 022400060d00 Test: Fragmented TLS message (long; cont 20) tls_handler - RX 022500060d00 Test: Fragmented TLS message (long; cont 21) tls_handler - RX 022600060d00 Test: Fragmented TLS message (long; cont 22) tls_handler - RX 022700060d00 Test: Fragmented TLS message (long; cont 23) tls_handler - RX 022800060d00 Test: Fragmented TLS message (long; cont 24) tls_handler - RX 022900060d00 Test: Fragmented TLS message (long; cont 25) tls_handler - RX 022a00060d00 Test: Fragmented TLS message (long; cont 26) tls_handler - RX 022b00060d00 Test: Fragmented TLS message (long; cont 27) tls_handler - RX 022c00060d00 Test: Fragmented TLS message (long; cont 28) tls_handler - RX 022d00060d00 Test: Fragmented TLS message (long; cont 29) tls_handler - RX 022e00060d00 Test: Fragmented TLS message (long; cont 30) tls_handler - RX 022f00060d00 Test: Fragmented TLS message (long; cont 31) tls_handler - RX 023000060d00 Test: Fragmented TLS message (long; cont 32) tls_handler - RX 023100060d00 Test: Fragmented TLS message (long; cont 33) tls_handler - RX 023200060d00 Test: Fragmented TLS message (long; cont 34) tls_handler - RX 023300060d00 Test: Fragmented TLS message (long; cont 35) tls_handler - RX 023400060d00 Test: Fragmented TLS message (long; cont 36) tls_handler - RX 023500060d00 Test: Fragmented TLS message (long; cont 37) tls_handler - RX 023600060d00 Test: Fragmented TLS message (long; cont 38) tls_handler - RX 023700060d00 Test: Fragmented TLS message (long; cont 39) tls_handler - RX 023800060d00 Test: Fragmented TLS message (long; cont 40) tls_handler - RX 023900060d00 Test: Fragmented TLS message (long; cont 41) tls_handler - RX 023a00060d00 Test: Fragmented TLS message (long; cont 42) tls_handler - RX 023b00060d00 Test: Fragmented TLS message (long; cont 43) tls_handler - RX 023c00060d00 Test: EAP-Failure Running connection iteration 8 Connect STA wlan0 to AP tls_handler - RX 02aa000d01746c732075736572 Test: TLS/Start tls_handler - RX 023e006e0dc0000000b816030100b3010000af03038e5f5be8e868ce7e413e63c7054b54d905fc88d5ba835a7214efd8203a82d5ff000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f Test: Non-ACK to more-fragment message tls_handler - RX 023f00060d00 Test: EAP-Failure Running connection iteration 9 Connect STA wlan0 to AP tls_handler - RX 0259000d01746c732075736572 No more test responses available - test case completed PASS eap_proto_tls 4.95702 2022-11-18 01:41:50.934999 passed all 1 test case(s) 2022-11-18 01:41:50 ./run-tests.py eap_teap_basic_password_auth_pac_no_inner_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_pac_no_inner_eap 1/1 Test: EAP-TEAP with Basic-Password-Auth and PAC without inner auth Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_pac_no_inner_eap 1.445627 2022-11-18 01:41:52.835119 passed all 1 test case(s) 2022-11-18 01:41:52 ./run-tests.py eap_teap_eap_mschapv2_pac_no_inner_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_pac_no_inner_eap 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and PAC without inner EAP Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_pac_no_inner_eap 1.251172 2022-11-18 01:41:54.556650 passed all 1 test case(s) 2022-11-18 01:41:54 ./run-tests.py eap_tls_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_tls_sha384 1/1 Test: EAP-TLS with SHA384 signature Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS eap_tls_sha384 1.673325 2022-11-18 01:41:56.669676 passed all 1 test case(s) 2022-11-18 01:41:56 ./run-tests.py fils_offload_to_driver DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_offload_to_driver 1/1 Test: FILS offload to driver Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_offload_to_driver 2.002251 2022-11-18 01:41:59.118147 passed all 1 test case(s) 2022-11-18 01:41:59 ./run-tests.py fils_sk_erp_followed_by_pmksa_caching DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_followed_by_pmksa_caching 1/1 Test: FILS SK ERP following by PMKSA caching Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 532, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fils.py", line 462, in test_fils_sk_erp_followed_by_pmksa_caching hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL fils_sk_erp_followed_by_pmksa_caching 6.549887 2022-11-18 01:42:06.109251 passed 0 test case(s) skipped 0 test case(s) failed tests: fils_sk_erp_followed_by_pmksa_caching 2022-11-18 01:42:06 ./run-tests.py fst_ap_ack_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_request_with_no_session 1/1 Test: FST AP ack request with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Ack request) PASS fst_ap_ack_request_with_no_session 7.643079 2022-11-18 01:42:14.197859 passed all 1 test case(s) 2022-11-18 01:42:14 ./run-tests.py fst_ap_ack_response_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_no_session 1/1 Test: FST AP ack response with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Ack response) PASS fst_ap_ack_response_with_no_session 7.573848 2022-11-18 01:42:22.209382 passed all 1 test case(s) 2022-11-18 01:42:22 ./run-tests.py fst_ap_initiate_session_no_new_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session_no_new_iface 1/1 Test: FST AP initiate session - no new iface Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (No new_iface was set) PASS fst_ap_initiate_session_no_new_iface 2.563482 2022-11-18 01:42:25.216036 passed all 1 test case(s) 2022-11-18 01:42:25 ./run-tests.py fst_disconnect_1_of_2_stas_from_non_fst_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_1_of_2_stas_from_non_fst_ap 1/1 Test: FST disconnect 1 of 2 STAs from non-FST AP Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Starting AP wlan7 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_disconnect_1_of_2_stas_from_non_fst_ap 7.012776 2022-11-18 01:42:32.672966 passed all 1 test case(s) 2022-11-18 01:42:32 ./run-tests.py fst_setup_mbie_diff DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_setup_mbie_diff 1/1 Test: FST setup and different MBIE in FST Setup Request Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_setup_mbie_diff 2.802843 2022-11-18 01:42:35.917208 passed all 1 test case(s) 2022-11-18 01:42:35 ./run-tests.py gas_anqp_get_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_get_oom 1/1 Test: GAS/ANQP query OOM Starting AP wlan3 PASS gas_anqp_get_oom 0.713494 2022-11-18 01:42:37.073252 passed all 1 test case(s) 2022-11-18 01:42:37 ./run-tests.py gas_anqp_hs20_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_hs20_proto 1/1 Test: GAS/ANQP and Hotspot 2.0 element protocol testing Starting AP wlan3 PASS gas_anqp_hs20_proto 0.945966 2022-11-18 01:42:38.459726 passed all 1 test case(s) 2022-11-18 01:42:38 ./run-tests.py gas_anqp_oom_hapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_oom_hapd 1/1 Test: GAS/ANQP query and OOM in hostapd Starting AP wlan3 PASS gas_anqp_oom_hapd 2.90404 2022-11-18 01:42:41.806450 passed all 1 test case(s) 2022-11-18 01:42:41 ./run-tests.py gas_fragment_with_comeback_delay DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_fragment_with_comeback_delay 1/1 Test: GAS fragmentation and comeback delay Starting AP wlan3 PASS gas_fragment_with_comeback_delay 1.237631 2022-11-18 01:42:43.489003 passed all 1 test case(s) 2022-11-18 01:42:43 ./run-tests.py grpform_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_pbc 1/1 Test: P2P group formation using PBC and re-init GO Negotiation Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed PASS grpform_pbc 3.981092 2022-11-18 01:42:47.911041 passed all 1 test case(s) 2022-11-18 01:42:47 ./run-tests.py hapd_ctrl_ext_io_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_ext_io_errors 1/1 Test: hostapd and external I/O errors Starting AP wlan3 PASS hapd_ctrl_ext_io_errors 0.617821 2022-11-18 01:42:48.970978 passed all 1 test case(s) 2022-11-18 01:42:49 ./run-tests.py he_40_fallback_to_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_40_fallback_to_20 1/1 Test: HE and 40 MHz channel configuration falling back to 20 MHz Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1090, in test_he_40_fallback_to_20 hwsim_utils.test_connectivity(dev, hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL he_40_fallback_to_20 6.827818 2022-11-18 01:42:56.239250 passed 0 test case(s) skipped 0 test case(s) failed tests: he_40_fallback_to_20 2022-11-18 01:42:56 ./run-tests.py he_capab_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_capab_parsing 1/1 Test: HE AP and capability parsing Starting AP wlan3 PASS he_capab_parsing 0.808063 2022-11-18 01:42:57.490527 passed all 1 test case(s) 2022-11-18 01:42:57 ./run-tests.py he_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_tkip 1/1 Test: HE and TKIP Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'he', 'num_sta[0]': '1'} Country code at the end: 00 PASS he_tkip 2.384136 2022-11-18 01:43:00.313650 passed all 1 test case(s) 2022-11-18 01:43:00 ./run-tests.py ibss_wpa_none DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wpa_none 1/1 Test: IBSS WPA-None Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Waiting for real BSSID on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete STA0 BSSID fe:58:3d:be:ed:97 differs from STA1 BSSID 00:00:00:00:00:00 wlan1 waiting for IBSS start/join to complete wlan2 waiting for IBSS start/join to complete STA0 BSSID fe:58:3d:be:ed:97 differs from STA2 BSSID 00:00:00:00:00:00 wlan2 waiting for IBSS start/join to complete bssid0=fe:58:3d:be:ed:97 bssid1=fe:58:3d:be:ed:97 bssid2=fe:58:3d:be:ed:97 Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed PASS ibss_wpa_none 25.680336 2022-11-18 01:43:26.444272 passed all 1 test case(s) 2022-11-18 01:43:26 ./run-tests.py kernel_bss_leak_deauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START kernel_bss_leak_deauth 1/1 Test: cfg80211/mac80211 BSS leak on deauthentication Starting AP wlan3 Connect STA wlan0 to AP PASS kernel_bss_leak_deauth 1.037077 2022-11-18 01:43:27.924956 passed all 1 test case(s) 2022-11-18 01:43:27 ./run-tests.py macsec_psk_br3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br3 1/1 Test: MACsec PSK (bridge; 3 devices) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 64:00:6a:30:91:ac brd ff:ff:ff:ff:ff:ff altname enp0s31f6 3: wlan0: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 14: brveth: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 92:e5:43:67:9b:c6 brd ff:ff:ff:ff:ff:ff 15: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether b2:1b:4a:d2:b9:b9 brd ff:ff:ff:ff:ff:ff 16: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 7e:b6:13:e2:f2:8e brd ff:ff:ff:ff:ff:ff 17: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 82:7c:98:eb:59:6b brd ff:ff:ff:ff:ff:ff 18: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 96:3a:10:bb:8c:45 brd ff:ff:ff:ff:ff:ff 19: vethbr2@veth2: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 4e:44:a2:0d:29:66 brd ff:ff:ff:ff:ff:ff 20: veth2@vethbr2: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 1a:9b:93:4d:33:64 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br3 0.802442 2022-11-18 01:43:29.167493 passed all 0 test case(s) skipped 1 test case(s) 2022-11-18 01:43:29 ./run-tests.py macsec_psk_mka_life_time DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_mka_life_time 1/1 Test: MACsec PSK - MKA life time Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_mka_life_time 0.264021 2022-11-18 01:43:29.883001 passed all 0 test case(s) skipped 1 test case(s) 2022-11-18 01:43:29 ./run-tests.py mbo_assoc_disallow_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_assoc_disallow_change 1/1 Test: MBO and dynamic association disallowed change with passive scanning Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_assoc_disallow_change 1.40744 2022-11-18 01:43:31.761462 passed all 1 test case(s) 2022-11-18 01:43:31 ./run-tests.py mesh_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_failure 1/1 Test: Mesh and local failures PASS mesh_failure 4.060509 2022-11-18 01:43:36.274261 passed all 1 test case(s) 2022-11-18 01:43:36 ./run-tests.py mesh_open_no_auto2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_open_no_auto2 1/1 Test: Open mesh network connectivity, no_auto on both peers PASS mesh_open_no_auto2 1.646129 2022-11-18 01:43:38.361225 passed all 1 test case(s) 2022-11-18 01:43:38 ./run-tests.py mesh_secure_ocv_mix_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_mix_ht 1/1 Test: Mesh network with a VHT STA and a HT STA under OCV Country code at the end: 00 PASS mesh_secure_ocv_mix_ht 2.658154 2022-11-18 01:43:41.461490 passed all 1 test case(s) 2022-11-18 01:43:41 ./run-tests.py mscs_without_ap_support DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mscs_without_ap_support 1/1 Test: MSCS without AP support Starting AP wlan3 Connect STA wlan0 to AP PASS mscs_without_ap_support 1.124256 2022-11-18 01:43:43.029654 passed all 1 test case(s) 2022-11-18 01:43:43 ./run-tests.py multi_ap_wps_shared DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_shared 1/1 Test: WPS on shared fronthaul/backhaul AP Starting AP wlan3 PASS multi_ap_wps_shared 18.473543 2022-11-18 01:44:01.944662 passed all 1 test case(s) 2022-11-18 01:44:01 ./run-tests.py p2p_channel_5ghz_165_169_us DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_5ghz_165_169_us 1/1 Test: P2P GO and 5 GHz channels 165 (allowed) and 169 (disallowed) in US Country code at the end: 00 PASS p2p_channel_5ghz_165_169_us 1.024362 2022-11-18 01:44:03.410267 passed all 1 test case(s) 2022-11-18 01:44:03 ./run-tests.py p2ps_connect_adv_go_p2ps_method_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_adv_go_p2ps_method_group_iface 1/1 Test: P2PS auto-accept connection with advertisement as GO and P2PS method using separate group interface PASS p2ps_connect_adv_go_p2ps_method_group_iface 12.677431 2022-11-18 01:44:16.526851 passed all 1 test case(s) 2022-11-18 01:44:16 ./run-tests.py p2ps_wildcard_p2ps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_wildcard_p2ps 1/1 Test: P2PS wildcard SD Probe Request/Response PASS p2ps_wildcard_p2ps 2.8532 2022-11-18 01:44:19.820159 passed all 1 test case(s) 2022-11-18 01:44:19 ./run-tests.py pasn_comeback_after_0_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_comeback_after_0_sae 1/1 Test: PASN authentication with SAE, with comeback flow where comeback after is set to 0 Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 0b3225833f2b373ea7598b18e52267ec KDK: ap : TK: 0b3225833f2b373ea7598b18e52267ec KDK: sta: TK: a4c82c99b0d2cedc105c615c53443975 KDK: ap : TK: a4c82c99b0d2cedc105c615c53443975 KDK: PASS pasn_comeback_after_0_sae 4.17725 2022-11-18 01:44:24.438945 passed all 1 test case(s) 2022-11-18 01:44:24 ./run-tests.py pasn_sae_while_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_sae_while_connected_same_channel 1/1 Test: PASN SAE authentication while connected same channel Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-pasn-wpa2-psk 02:00:00:00:04:00 2412 -30 [WPA2-SAE-CCMP][SAE-H2E][ESS] test-pasn-sae sta: TK: 789a70f454b7592ba4c53c5901b92c5f KDK: ap : TK: 789a70f454b7592ba4c53c5901b92c5f KDK: PASS pasn_sae_while_connected_same_channel 2.81156 2022-11-18 01:44:27.692347 passed all 1 test case(s) 2022-11-18 01:44:27 ./run-tests.py pasn_while_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_while_connected_same_channel 1/1 Test: PASN authentication with WPA2/CCMP AP while connected same channel Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-wpa2-psk 02:00:00:00:04:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-wpa2-pasn sta: TK: 8d296f954765320a85faba02057911fa KDK: ap : TK: 8d296f954765320a85faba02057911fa KDK: PASS pasn_while_connected_same_channel 2.038114 2022-11-18 01:44:30.174773 passed all 1 test case(s) 2022-11-18 01:44:30 ./run-tests.py sae_ocv_pmk_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_ocv_pmk_failure 1/1 Test: SAE with OCV and fetching PMK (failed 4-way handshake) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_ocv_pmk_failure 5.191653 2022-11-18 01:44:35.808054 passed all 1 test case(s) 2022-11-18 01:44:35 ./run-tests.py sae_pk_and_psk_invalid_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_and_psk_invalid_password 1/1 Test: SAE-PK and PSK using invalid password combination Starting AP wlan3 PASS sae_pk_and_psk_invalid_password 0.236628 2022-11-18 01:44:36.489263 passed all 1 test case(s) 2022-11-18 01:44:36 ./run-tests.py sae_pmksa_caching_pmkid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pmksa_caching_pmkid 1/1 Test: SAE and PMKSA caching (PMKID in AssocReq after SAE) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pmksa_caching_pmkid 1.475666 2022-11-18 01:44:38.409098 passed all 1 test case(s) 2022-11-18 01:44:38 ./run-tests.py sae_pwe_group_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_2 1/1 Test: SAE PWE derivation options with group 2 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_2 1.853052 2022-11-18 01:44:40.702996 passed all 1 test case(s) 2022-11-18 01:44:40 ./run-tests.py sae_reflection_attack_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ffc 1/1 Test: SAE reflection attack (FFC) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ffc 1.291151 2022-11-18 01:44:42.438136 passed all 1 test case(s) 2022-11-18 01:44:42 ./run-tests.py scan_multi_bssid_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_4 1/1 Test: Scan and Multiple BSSID element (3) Starting AP wlan3 AP 02:00:00:00:03:01: {'id': '75', 'bssid': '02:00:00:00:03:01', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1668735883417873', 'age': '0', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103', 'flags': '[ESS]', 'ssid': 'transmitted', 'snr': '59', 'est_throughput': '65000', 'update_idx': '144', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103'} AP 02:00:00:00:03:02: {'id': '76', 'bssid': '02:00:00:00:03:02', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1668735883417873', 'age': '0', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101', 'flags': '[ESS]', 'ssid': '1', 'snr': '59', 'est_throughput': '65000', 'update_idx': '144', 'beacon_ie': '000131010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101'} AP 02:00:00:00:03:03: {'id': '77', 'bssid': '02:00:00:00:03:03', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1668735883417873', 'age': '0', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102', 'flags': '[ESS]', 'ssid': '2', 'snr': '59', 'est_throughput': '65000', 'update_idx': '144', 'beacon_ie': '000132010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102'} AP 02:00:00:00:03:00: {'id': '78', 'bssid': '02:00:00:00:03:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1668735883417873', 'age': '0', 'ie': '000133010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550103', 'flags': '[ESS]', 'ssid': '3', 'snr': '59', 'est_throughput': '65000', 'update_idx': '144', 'beacon_ie': '000133010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550103'} PASS scan_multi_bssid_4 1.276104 2022-11-18 01:44:44.155804 passed all 1 test case(s) 2022-11-18 01:44:44 ./run-tests.py scan_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_only 1/1 Test: Control interface behavior on scan parameters with type=only Starting AP wlan3 Full scan Limited channel scan Passive single-channel scan Active single-channel scan Unexpectedly updated BSS entry Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_scan.py", line 142, in test_scan_only raise Exception("Unexpectedly updated BSS entry") Exception: Unexpectedly updated BSS entry FAIL scan_only 8.173907 2022-11-18 01:44:52.777759 passed 0 test case(s) skipped 0 test case(s) failed tests: scan_only 2022-11-18 01:44:52 ./run-tests.py scan_specific_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specific_bssid 1/1 Test: Scan for a specific BSSID Starting AP wlan3 PASS scan_specific_bssid 1.122115 2022-11-18 01:44:54.349706 passed all 1 test case(s) 2022-11-18 01:44:54 ./run-tests.py sigma_dut_ap_osen DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_osen 1/1 Test: sigma_dut controlled AP with OSEN Skip test case: sigma_dut not available SKIP sigma_dut_ap_osen 0.181624 2022-11-18 01:44:54.979896 passed all 0 test case(s) skipped 1 test case(s) 2022-11-18 01:44:55 ./run-tests.py sigma_dut_ap_sae_h2e_anti_clogging DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_h2e_anti_clogging 1/1 Test: sigma_dut controlled AP with SAE H2E and anti-clogging token Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_h2e_anti_clogging 0.185067 2022-11-18 01:44:55.618816 passed all 0 test case(s) skipped 1 test case(s) 2022-11-18 01:44:55 ./run-tests.py sigma_dut_ap_transition_disable_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_transition_disable_change 1/1 Test: sigma_dut controlled AP and transition disabled indication change Skip test case: sigma_dut not available SKIP sigma_dut_ap_transition_disable_change 0.182684 2022-11-18 01:44:56.254297 passed all 0 test case(s) skipped 1 test case(s) 2022-11-18 01:44:56 ./run-tests.py sigma_dut_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_open 1/1 Test: sigma_dut controlled open network association Skip test case: sigma_dut not available SKIP sigma_dut_open 0.139577 2022-11-18 01:44:56.844609 passed all 0 test case(s) skipped 1 test case(s) 2022-11-18 01:44:56 ./run-tests.py sta_dynamic_random_mac_addr_scan_keep_oui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_scan_keep_oui 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address for scan (keep OUI) Starting AP wlan3 Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_scan_keep_oui 1.604399 2022-11-18 01:44:58.903331 passed all 1 test case(s) 2022-11-18 01:44:58 ./run-tests.py tspec_reassoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_reassoc 1/1 Test: Reassociation to same BSS while having tspecs Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_wpas_wmm_ac.py", line 282, in test_tspec_reassoc hwsim_utils.test_connectivity(dev[0], hapd0) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL tspec_reassoc 10.258671 2022-11-18 01:45:09.612637 passed 0 test case(s) skipped 0 test case(s) failed tests: tspec_reassoc 2022-11-18 01:45:09 ./run-tests.py wep_ht_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_ht_vht 1/1 Test: WEP and HT/VHT Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-vht40-wep', 'num_sta[0]': '1'} Country code at the end: 00 PASS wep_ht_vht 1.996267 2022-11-18 01:45:12.057683 passed all 1 test case(s) 2022-11-18 01:45:12 ./run-tests.py wmediumd_path_ttl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_path_ttl 1/1 Test: Mesh path request TTL PASS wmediumd_path_ttl 10.168872 2022-11-18 01:45:22.675284 passed all 1 test case(s) 2022-11-18 01:45:22 ./run-tests.py wnm_bss_tm_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_connect_cmd 1/1 Test: WNM BSS Transition Management and cfg80211 connect command Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Preferred Candidate List (matching neighbor for another BSS) without Disassociation Imminent PASS wnm_bss_tm_connect_cmd 2.259934 2022-11-18 01:45:25.385972 passed all 1 test case(s) 2022-11-18 01:45:25 ./run-tests.py wnm_bss_tm_req_with_mbo_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_req_with_mbo_ie 1/1 Test: WNM BSS transition request with MBO IE and reassociation delay attribute Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_req_with_mbo_ie 7.337287 2022-11-18 01:45:33.173885 passed all 1 test case(s) 2022-11-18 01:45:33 ./run-tests.py wpa2_ocv_ap_override_eapol_g1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_g1 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key group msg 1/2 Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_g1 1.080387 2022-11-18 01:45:34.707292 passed all 1 test case(s) 2022-11-18 01:45:34 ./run-tests.py wpas_ap_dfs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_dfs 1/1 Test: wpa_supplicant AP mode - DFS Connect STA wlan1 to AP PASS wpas_ap_dfs 68.874935 2022-11-18 01:46:44.030783 passed all 1 test case(s) 2022-11-18 01:46:44 ./run-tests.py wpas_mesh_password_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_password_mismatch 1/1 Test: Mesh network and one device with mismatching password PASS wpas_mesh_password_mismatch 21.638282 2022-11-18 01:47:06.108436 passed all 1 test case(s) 2022-11-18 01:47:06 ./run-tests.py wps_ext_cred_proto_missing_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_missing_cred 1/1 Test: WPS and Credential: Missing Credential Starting AP wlan3 PASS wps_ext_cred_proto_missing_cred 1.203539 2022-11-18 01:47:07.752944 passed all 1 test case(s) 2022-11-18 01:47:07 ./run-tests.py wps_ext_m2_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_ack 1/1 Test: WPS proto: M2 followed by ACK Starting AP wlan3 PASS wps_ext_m2_ack 1.19041 2022-11-18 01:47:09.386035 passed all 1 test case(s) 2022-11-18 01:47:09 ./run-tests.py wps_ext_proto_m4_missing_r_snonce1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m4_missing_r_snonce1 1/1 Test: WPS and no R-SNonce1 in M4 Starting AP wlan3 PASS wps_ext_proto_m4_missing_r_snonce1 1.186874 2022-11-18 01:47:11.015455 passed all 1 test case(s) 2022-11-18 01:47:11 ./stop.sh