2023-04-20 09:45:08 export USER=root 2023-04-20 09:45:08 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2023-04-20 09:49:16 ./start.sh 2023-04-20 09:49:19 ./run-tests.py ap_acs_hw_mode_any DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_hw_mode_any 1/1 Test: Automatic channel selection with hw_mode=any Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_acs_hw_mode_any 11.30695 2023-04-20 09:49:32.858631 passed all 1 test case(s) 2023-04-20 09:49:32 ./run-tests.py ap_csa_2_switches DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_2_switches 1/1 Test: AP Channel Switch, two switches Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_2_switches 4.131885 2023-04-20 09:49:37.716083 passed all 1 test case(s) 2023-04-20 09:49:37 ./run-tests.py ap_ft_eap_pull_wildcard DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_eap_pull_wildcard 1/1 Test: WPA2-EAP-FT AP (pull PMK) - wildcard R0KH/R1KH Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_eap_pull_wildcard 4.482347 2023-04-20 09:49:42.904616 passed all 1 test case(s) 2023-04-20 09:49:43 ./run-tests.py ap_ft_over_ds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds 1/1 Test: WPA2-PSK-FT AP over DS Starting AP wlan3 Starting AP wlan4 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-EAP+FT/EAP-CCMP][ESS] test-ft 02:00:00:00:04:00 2412 -30 [WPA2-EAP+FT/EAP-CCMP][ESS] test-ft Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_over_ds 4.7524 2023-04-20 09:49:48.372115 passed all 1 test case(s) 2023-04-20 09:49:48 ./run-tests.py ap_hs20_eap_ttls_eap_mschapv2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_ttls_eap_mschapv2 1/1 Test: Hotspot 2.0 connection with TTLS/EAP-MSCHAPv2 Starting AP wlan3 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-EAP-CCMP][ESS][HS20] test-hs20 Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 950, in test_ap_hs20_eap_ttls_eap_mschapv2 eap_test(dev[0], apdev[0], "21[3:26][6:7][99:99]", "TTLS", "user") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 891, in eap_test interworking_connect(dev, bssid, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 143, in interworking_connect interworking_auth(dev, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 152, in interworking_auth dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_eap_ttls_eap_mschapv2 17.720244 2023-04-20 09:50:06.807693 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_eap_ttls_eap_mschapv2 2023-04-20 09:50:06 ./run-tests.py ap_ht_op_class_117 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_117 1/1 Test: HT40 on operationg class 117 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_117 5.939118 2023-04-20 09:50:13.501112 passed all 1 test case(s) 2023-04-20 09:50:13 ./run-tests.py ap_invalid_config2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_invalid_config2 1/1 Test: Try to start AP with invalid configuration and remove interface Trying to start AP wlan3 with invalid configuration Starting AP wlan3 Remove interface with failed configuration Removing BSS wlan3 PASS ap_invalid_config2 0.676927 2023-04-20 09:50:14.893374 passed all 1 test case(s) 2023-04-20 09:50:15 ./run-tests.py ap_open_country_table_e4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_country_table_e4 1/1 Test: AP with open mode and Table E-4 Country String Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_open_country_table_e4 2.415629 2023-04-20 09:50:18.037269 passed all 1 test case(s) 2023-04-20 09:50:18 ./run-tests.py ap_open_poll_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_poll_sta 1/1 Test: AP with open mode and STA poll Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_poll_sta 1.933055 2023-04-20 09:50:20.683436 passed all 1 test case(s) 2023-04-20 09:50:20 ./run-tests.py ap_open_select_network_freq DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_network_freq 1/1 Test: AP with open mode and use for SELECT_NETWORK freq parameter Starting AP wlan3 Connect STA wlan0 to AP Scan duration: 0.06999999936670065 seconds PASS ap_open_select_network_freq 2.003396 2023-04-20 09:50:23.394358 passed all 1 test case(s) 2023-04-20 09:50:23 ./run-tests.py ap_roam_open_failed_ssid_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_open_failed_ssid_mismatch 1/1 Test: Roam failure due to SSID mismatch Starting AP wlan3 Starting AP wlan4 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [ESS] test-open 02:00:00:00:04:00 2412 -30 [ESS] test-open2 Connect STA wlan0 to AP PASS ap_roam_open_failed_ssid_mismatch 3.226586 2023-04-20 09:50:27.339179 passed all 1 test case(s) 2023-04-20 09:50:27 ./run-tests.py ap_vlan_wpa2_radius_tagged DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_tagged 1/1 Test: AP VLAN with WPA2-Enterprise and RADIUS EGRESS_VLANID attributes Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vlan_wpa2_radius_tagged 2.900912 2023-04-20 09:50:30.960063 passed all 1 test case(s) 2023-04-20 09:50:31 ./run-tests.py ap_wpa2_eap_ikev2_as_frag DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ikev2_as_frag 1/1 Test: WPA2-Enterprise connection using EAP-IKEv2 with server fragmentation Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ikev2_as_frag 2.097788 2023-04-20 09:50:33.781458 passed all 1 test case(s) 2023-04-20 09:50:33 ./run-tests.py ap_wpa2_eap_peap_eap_mschapv2_incorrect_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_eap_mschapv2_incorrect_password 1/1 Test: WPA2-Enterprise connection using EAP-PEAP/EAP-MSCHAPv2 - incorrect password Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_peap_eap_mschapv2_incorrect_password 2.002001 2023-04-20 09:50:36.521553 passed all 1 test case(s) 2023-04-20 09:50:36 ./run-tests.py ap_wpa2_eap_server_get_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_server_get_id 1/1 Test: Internal EAP server and dot1xAuthSessionUserName Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 7472, in test_ap_wpa2_eap_server_get_id eap_connect(dev[0], hapd, "TLS", "tls user", ca_cert="auth_serv/ca.pem", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_server_get_id 12.161037 2023-04-20 09:50:49.403071 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_server_get_id 2023-04-20 09:50:49 ./run-tests.py ap_wpa2_eap_sim_imsi_identity DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_imsi_identity 1/1 Test: WPA2-Enterprise connection using EAP-SIM and imsi_identity Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_imsi_identity 2.026923 2023-04-20 09:50:52.199491 passed all 1 test case(s) 2023-04-20 09:50:52 ./run-tests.py ap_wpa2_eap_sql DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sql 1/1 Test: WPA2-Enterprise connection using SQLite for user DB Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 529, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 5517, in test_ap_wpa2_eap_sql eap_connect(dev[0], hapd, "TTLS", "user-mschapv2", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_sql 11.936024 2023-04-20 09:51:04.858509 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_sql 2023-04-20 09:51:05 ./run-tests.py ap_wpa2_eap_tls_ocsp_server_signed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_server_signed 1/1 Test: EAP-TLS and server signed OCSP response openssl ocsp -reqout logs/current/ocsp-req.der -issuer auth_serv/ca.pem -sha256 -serial 0xD8D3E3A6CBE3CD73 -no_nonce openssl result: openssl ocsp -index auth_serv/index.txt -rsigner auth_serv/server.pem -rkey auth_serv/server.key -CA auth_serv/ca.pem -ndays 7 -reqin logs/current/ocsp-req.der -respout logs/current/ocsp-resp-server-signed.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP Timeout on EAP status Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 529, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 4555, in test_ap_wpa2_eap_tls_ocsp_server_signed raise Exception("Timeout on EAP status") Exception: Timeout on EAP status FAIL ap_wpa2_eap_tls_ocsp_server_signed 12.226618 2023-04-20 09:51:17.855301 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_tls_ocsp_server_signed 2023-04-20 09:51:18 ./run-tests.py ap_wpa2_eap_wildcard_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_wildcard_ssid 1/1 Test: WPA2-Enterprise connection using EAP-GPSK and wildcard SSID Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_wildcard_ssid 1.978504 2023-04-20 09:51:20.608474 passed all 1 test case(s) 2023-04-20 09:51:20 ./run-tests.py ap_wpa2_psk_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_file 1/1 Test: WPA2-PSK AP with PSK from a file Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP PASS ap_wpa2_psk_file 6.633587 2023-04-20 09:51:27.948496 passed all 1 test case(s) 2023-04-20 09:51:28 ./run-tests.py ap_wpa2_psk_rsne_mismatch_ap3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_rsne_mismatch_ap3 1/1 Test: RSNE mismatch in EAPOL-Key msg 3/4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_rsne_mismatch_ap3 1.929132 2023-04-20 09:51:30.658309 passed all 1 test case(s) 2023-04-20 09:51:30 ./run-tests.py ap_wpa2_psk_supp_proto_no_gtk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_no_gtk 1/1 Test: WPA2-PSK supplicant protocol testing: no GTK Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_no_gtk 2.136716 2023-04-20 09:51:33.519295 passed all 1 test case(s) 2023-04-20 09:51:33 ./run-tests.py ap_wpa2_psk_unexpected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_unexpected 1/1 Test: WPA2-PSK and supplicant receiving unexpected EAPOL-Key frames Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_unexpected 13.954543 2023-04-20 09:51:48.193616 passed all 1 test case(s) 2023-04-20 09:51:48 ./run-tests.py ap_wpa2_psk_wildcard_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_wildcard_ssid 1/1 Test: WPA2-PSK AP and wildcard SSID configuration Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_psk_wildcard_ssid 3.60852 2023-04-20 09:51:52.521247 passed all 1 test case(s) 2023-04-20 09:51:52 ./run-tests.py ap_wps_er_http_proto_no_event_sub_url DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_no_event_sub_url 1/1 Test: WPS ER HTTP protocol testing - no eventSubURL HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" PASS ap_wps_er_http_proto_no_event_sub_url 1.200651 2023-04-20 09:51:54.439255 passed all 1 test case(s) 2023-04-20 09:51:54 ./run-tests.py ap_wps_er_http_proto_upnp_info_invalid_udn_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_upnp_info_invalid_udn_uuid 1/1 Test: WPS ER HTTP protocol testing - Invalid UDN UUID HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/25108474/1 PASS ap_wps_er_http_proto_upnp_info_invalid_udn_uuid 0.52943 2023-04-20 09:51:55.691756 passed all 1 test case(s) 2023-04-20 09:51:55 ./run-tests.py ap_wps_er_link_update DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_link_update 1/1 Test: WPS ER and link update special cases HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/96137112/1 HTTP server received: GET / HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/137265422/1 PASS ap_wps_er_link_update 0.501042 2023-04-20 09:51:57.026430 passed all 1 test case(s) 2023-04-20 09:51:57 ./run-tests.py ap_wps_reg_config_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config_tkip 1/1 Test: WPS registrar configuring AP to use TKIP and AP upgrading to TKIP+CCMP Starting AP wlan3 WPS configuration step flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPS][ESS] test-wps-init-ap Re-connect to verify WPA2 mixed mode PASS ap_wps_reg_config_tkip 6.04499 2023-04-20 09:52:04.302506 passed all 1 test case(s) 2023-04-20 09:52:04 ./run-tests.py ap_wps_registrar_init_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_registrar_init_errors 1/1 Test: WPS Registrar init errors Starting AP wlan3 PASS ap_wps_registrar_init_errors 2.228726 2023-04-20 09:52:07.243459 passed all 1 test case(s) 2023-04-20 09:52:07 ./run-tests.py autogo_tdls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_tdls 1/1 Test: P2P autonomous GO and two clients using TDLS Start autonomous GO with fixed parameters wlan0 Try to connect the client to the GO wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected Try to connect the client to the GO wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected PASS autogo_tdls 11.116111 2023-04-20 09:52:19.076391 passed all 1 test case(s) 2023-04-20 09:52:19 ./run-tests.py dbus_connect_psk_mem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_connect_psk_mem 1/1 Test: D-Bus AddNetwork and connect with memory-only PSK Starting AP wlan3 PASS dbus_connect_psk_mem 2.340657 2023-04-20 09:52:22.121765 passed all 1 test case(s) 2023-04-20 09:52:22 ./run-tests.py dbus_p2p_autogo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_autogo 1/1 Test: D-Bus P2P autonomous GO Add a persistent group Remove persistent group instance Re-start persistent group Authorize peer to connect to the group Remove persistent group PASS dbus_p2p_autogo 9.753363 2023-04-20 09:52:32.579242 passed all 1 test case(s) 2023-04-20 09:52:32 ./run-tests.py dbus_probe_req_reporting_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_probe_req_reporting_oom 1/1 Test: D-Bus Probe Request reporting (OOM) PASS dbus_probe_req_reporting_oom 0.324209 2023-04-20 09:52:33.610248 passed all 1 test case(s) 2023-04-20 09:52:33 ./run-tests.py dbus_wps_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_wps_invalid 1/1 Test: D-Bus invaldi WPS operation PASS dbus_wps_invalid 0.284365 2023-04-20 09:52:34.597219 passed all 1 test case(s) 2023-04-20 09:52:34 ./run-tests.py dpp_config_dpp_gen_expired_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_expired_key 1/1 Test: Generate DPP Config Object for DPP network with expiry value dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_expired_key 0.601694 2023-04-20 09:52:35.906625 passed all 1 test case(s) 2023-04-20 09:52:36 ./run-tests.py dpp_config_error_legacy_psk_with_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_error_legacy_psk_with_sae 1/1 Test: DPP Config Object legacy error - psk_hex with SAE dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication DPP authentication did not succeed (Responder) Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1467, in test_dpp_config_error_legacy_psk_with_sae run_dpp_config_error(dev, apdev, conf) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1290, in run_dpp_config_error run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 461, in run_dpp_qr_code_auth_unicast wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0], File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 4878, in wait_auth_success raise Exception("DPP authentication did not succeed (Responder)") Exception: DPP authentication did not succeed (Responder) FAIL dpp_config_error_legacy_psk_with_sae 5.61056 2023-04-20 09:52:42.224893 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_config_error_legacy_psk_with_sae 2023-04-20 09:52:42 ./run-tests.py dpp_controller_relay_chirp_duplicate DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_controller_relay_chirp_duplicate 1/1 Test: DPP Controller/Relay with chirping (duplicate) Starting AP wlan4 Update AP configuration PASS dpp_controller_relay_chirp_duplicate 33.668115 2023-04-20 09:53:16.662260 passed all 1 test case(s) 2023-04-20 09:53:16 ./run-tests.py dpp_gas_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_gas_timeout 1/1 Test: DPP and GAS server timeout for a query dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_gas_timeout 60.63137 2023-04-20 09:54:18.008675 passed all 1 test case(s) 2023-04-20 09:54:18 ./run-tests.py dpp_hostapd_auth_conf_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_hostapd_auth_conf_timeout 1/1 Test: DPP Authentication Confirm timeout in hostapd Starting AP wlan3 PASS dpp_hostapd_auth_conf_timeout 2.288257 2023-04-20 09:54:21.009558 passed all 1 test case(s) 2023-04-20 09:54:21 ./run-tests.py dpp_hostapd_configurator_fragmentation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_hostapd_configurator_fragmentation 1/1 Test: DPP with hostapd as configurator/initiator requiring fragmentation Starting AP wlan3 PASS dpp_hostapd_configurator_fragmentation 3.444243 2023-04-20 09:54:25.177730 passed all 1 test case(s) 2023-04-20 09:54:25 ./run-tests.py dpp_nfc_uri_hostapd_tag_read DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_uri_hostapd_tag_read 1/1 Test: DPP bootstrapping via NFC URI record (hostapd reading tag) Starting AP wlan3 PASS dpp_nfc_uri_hostapd_tag_read 3.285198 2023-04-20 09:54:29.178742 passed all 1 test case(s) 2023-04-20 09:54:29 ./run-tests.py dpp_pfs_ap_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pfs_ap_2 1/1 Test: DPP PFS AP not allowed Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS dpp_pfs_ap_2 4.076684 2023-04-20 09:54:33.968968 passed all 1 test case(s) 2023-04-20 09:54:34 ./run-tests.py dpp_pkex_no_responder DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_no_responder 1/1 Test: DPP and PKEX with no responder (retry behavior) PASS dpp_pkex_no_responder 10.404812 2023-04-20 09:54:45.078452 passed all 1 test case(s) 2023-04-20 09:54:45 ./run-tests.py dpp_proto_stop_at_auth_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_stop_at_auth_resp 1/1 Test: DPP protocol testing - stop when receiving Auth Resp PASS dpp_proto_stop_at_auth_resp 1.556836 2023-04-20 09:54:47.340167 passed all 1 test case(s) 2023-04-20 09:54:47 ./run-tests.py dpp_proto_stop_at_conf_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_stop_at_conf_req 1/1 Test: DPP protocol testing - stop when receiving Auth Req PASS dpp_proto_stop_at_conf_req 2.350005 2023-04-20 09:54:50.400018 passed all 1 test case(s) 2023-04-20 09:54:50 ./run-tests.py dpp_proto_stop_at_pkex_exchange_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_stop_at_pkex_exchange_resp 1/1 Test: DPP protocol testing - stop when receiving PKEX Exchange Response PASS dpp_proto_stop_at_pkex_exchange_resp 0.507764 2023-04-20 09:54:51.614149 passed all 1 test case(s) 2023-04-20 09:54:51 ./run-tests.py eap_proto_ikev2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_ikev2 1/1 Test: EAP-IKEv2 protocol tests Starting AP wlan3 Running connection iteration 1 Connect STA wlan0 to AP ikev2_handler - RX 02f200090175736572 Test: Missing payload Running connection iteration 2 Connect STA wlan0 to AP ikev2_handler - RX 024800090175736572 Test: Truncated Message Length field Running connection iteration 3 Connect STA wlan0 to AP ikev2_handler - RX 02b600090175736572 Test: Too short Message Length value Running connection iteration 4 Connect STA wlan0 to AP ikev2_handler - RX 026a00090175736572 Test: Truncated message Running connection iteration 5 Connect STA wlan0 to AP ikev2_handler - RX 025100090175736572 Test: Truncated message(2) Running connection iteration 6 Connect STA wlan0 to AP ikev2_handler - RX 02eb00090175736572 Test: Truncated message(3) Running connection iteration 7 Connect STA wlan0 to AP ikev2_handler - RX 021300090175736572 Test: Truncated message(4) Running connection iteration 8 Connect STA wlan0 to AP ikev2_handler - RX 024a00090175736572 Test: Too long fragments (first fragment) ikev2_handler - RX 0209000531 Test: Too long fragments (second fragment) Running connection iteration 9 Connect STA wlan0 to AP ikev2_handler - RX 02bf00090175736572 Test: No Message Length field in first fragment Running connection iteration 10 Connect STA wlan0 to AP ikev2_handler - RX 020100090175736572 Test: ICV before keys Running connection iteration 11 Connect STA wlan0 to AP ikev2_handler - RX 025700090175736572 Test: Unsupported IKEv2 header version Running connection iteration 12 Connect STA wlan0 to AP ikev2_handler - RX 026400090175736572 Test: Incorrect IKEv2 header Length Running connection iteration 13 Connect STA wlan0 to AP ikev2_handler - RX 026700090175736572 Test: Unexpected IKEv2 Exchange Type in SA_INIT state Running connection iteration 14 Connect STA wlan0 to AP ikev2_handler - RX 027700090175736572 Test: Unexpected IKEv2 Message ID in SA_INIT state Running connection iteration 15 Connect STA wlan0 to AP ikev2_handler - RX 021000090175736572 Test: Unexpected IKEv2 Flags value Running connection iteration 16 Connect STA wlan0 to AP ikev2_handler - RX 023200090175736572 Test: Unexpected IKEv2 Flags value(2) Running connection iteration 17 Connect STA wlan0 to AP ikev2_handler - RX 02c200090175736572 Test: No SAi1 in SA_INIT Running connection iteration 18 Connect STA wlan0 to AP ikev2_handler - RX 027600090175736572 Test: Unexpected extra data after payloads Running connection iteration 19 Connect STA wlan0 to AP ikev2_handler - RX 02d200090175736572 Test: Truncated payload header Running connection iteration 20 Connect STA wlan0 to AP ikev2_handler - RX 024800090175736572 Test: Too small payload header length Running connection iteration 21 Connect STA wlan0 to AP ikev2_handler - RX 029800090175736572 Test: Too large payload header length Running connection iteration 22 Connect STA wlan0 to AP ikev2_handler - RX 02a500090175736572 Test: Unsupported payload (non-critical and critical) Running connection iteration 23 Connect STA wlan0 to AP ikev2_handler - RX 029100090175736572 Test: Certificate and empty SAi1 Running connection iteration 24 Connect STA wlan0 to AP ikev2_handler - RX 021a00090175736572 Test: Too short proposal Running connection iteration 25 Connect STA wlan0 to AP ikev2_handler - RX 029b00090175736572 Test: Too small proposal length in SAi1 Running connection iteration 26 Connect STA wlan0 to AP ikev2_handler - RX 022d00090175736572 Test: Too large proposal length in SAi1 Running connection iteration 27 Connect STA wlan0 to AP ikev2_handler - RX 025400090175736572 Test: Unexpected proposal type in SAi1 Running connection iteration 28 Connect STA wlan0 to AP ikev2_handler - RX 024f00090175736572 Test: Unexpected Protocol ID in SAi1 Running connection iteration 29 Connect STA wlan0 to AP ikev2_handler - RX 023500090175736572 Test: Unexpected proposal number in SAi1 Running connection iteration 30 Connect STA wlan0 to AP ikev2_handler - RX 021300090175736572 Test: Not enough room for SPI in SAi1 Running connection iteration 31 Connect STA wlan0 to AP ikev2_handler - RX 025a00090175736572 Test: Unexpected SPI in SAi1 Running connection iteration 32 Connect STA wlan0 to AP ikev2_handler - RX 022700090175736572 Test: No transforms in SAi1 Running connection iteration 33 Connect STA wlan0 to AP ikev2_handler - RX 025b00090175736572 Test: Too short transform in SAi1 Running connection iteration 34 Connect STA wlan0 to AP ikev2_handler - RX 021000090175736572 Test: Too small transform length in SAi1 Running connection iteration 35 Connect STA wlan0 to AP ikev2_handler - RX 029100090175736572 Test: Too large transform length in SAi1 Running connection iteration 36 Connect STA wlan0 to AP ikev2_handler - RX 02ac00090175736572 Test: Unexpected Transform type in SAi1 Running connection iteration 37 Connect STA wlan0 to AP ikev2_handler - RX 02fc00090175736572 Test: No transform attributes in SAi1 Running connection iteration 38 Connect STA wlan0 to AP ikev2_handler - RX 02a400090175736572 Test: No transform attr for AES and unexpected data after transforms in SAi1 Running connection iteration 39 Connect STA wlan0 to AP ikev2_handler - RX 02bb00090175736572 Test: Valid proposal, but no KEi in SAi1 Running connection iteration 40 Connect STA wlan0 to AP ikev2_handler - RX 02a500090175736572 Test: Empty KEi in SAi1 Running connection iteration 41 Connect STA wlan0 to AP ikev2_handler - RX 024e00090175736572 Test: Mismatch in DH Group in SAi1 ikev2_handler - RX 022b002c3100000000000000000000000000000000002920222000000000000000260000000a000000110005 Test: EAP-Failure Running connection iteration 42 Connect STA wlan0 to AP ikev2_handler - RX 022000090175736572 Test: Invalid DH public value length in SAi1 Running connection iteration 43 Connect STA wlan0 to AP ikev2_handler - RX 020c00090175736572 Test: Valid proposal and KEi, but no Ni in SAi1 Running connection iteration 44 Connect STA wlan0 to AP ikev2_handler - RX 02c500090175736572 Test: Too short Ni in SAi1 Running connection iteration 45 Connect STA wlan0 to AP ikev2_handler - RX 023000090175736572 Test: Too long Ni in SAi1 Running connection iteration 46 Connect STA wlan0 to AP ikev2_handler - RX 023f00090175736572 Test: Valid proposal, KEi, and Ni in SAi1 ikev2_handler - RX 023101523100000000000000000006ba1400d820c0a321202220000000000000014c2200002c00000028010100040300000801000003030000080200000103000008030000010000000804000005280000c800050000b27b74de6c55c750e47df2a4ce0763200bdc60bb08e112e7513a0e2e6a5f66bb97128fcea41ac454bab3aa90e4f40c649a73ff03f01f5cc244a43c88ac06f2d57de4c665d9f37869af2448b90e9872249cc65f5a8c34113b2179416532b106cee52c9d9a9111f3341ba013d22c30c09533f93ed3cf4a3acbe5fdae2cca96f766aae77ce95cd519aff43ef0aad30d959ddfa8c9bc39a577b1de9c385a3bc57b038cb683e6080b2badd284c4140565b6f9ded577d2738a1a0ac509b153ce9d4cf32e0000149c14dc829231fdfbe1892b9fc698f890240000280b2d477b7e58f64b61a34cee08da4a4debaa40eff1de5b09914b19c66939dadbab82ba23 Test: EAP-Failure Running connection iteration 47 Connect STA wlan0 to AP ikev2_handler - RX 02a700090175736572 Test: Valid proposal, KEi, and Ni in SAi1 ikev2_handler - RX 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 Test: No integrity checksum Running connection iteration 48 Connect STA wlan0 to AP ikev2_handler - RX 02cf00090175736572 Test: Valid proposal, KEi, and Ni in SAi1 ikev2_handler - RX 02350152310000000000000000006459af1ec9e4a1ee21202220000000000000014c2200002c00000028010100040300000801000003030000080200000103000008030000010000000804000005280000c800050000deed93b664bf20dd841e70112475d17ed3d04fdf0062a3515ebc76ec3d03c513273bb6de73d4d8049d323425d33926305990b5c50036f41c1dc7d81d79fa316015599d6e57a7c91ab46b0ca759306698606d03289510194909be830bde42b373e4633d8d1ab2bfacb52c7ea6d3a674849c4aa9ea707284d035ba259cfbd1cfd88afefb117a7ad7258746ebbd9e6369e2fa0edee5ef1d59520954d986fb7fbe6776c94039e1e7c0143edfcc979c28cc86758687f4bfb8603ab96deb23637226d92e000014f4ee888aff1d89580ec7cd96db90ffef24000028aa08bd57b0829895d19b2d5f4231408d9608689e6fe50b08b796fd5c8a5b5c940390e562 Test: Truncated integrity checksum Running connection iteration 49 Connect STA wlan0 to AP ikev2_handler - RX 02b700090175736572 Test: Valid proposal, KEi, and Ni in SAi1 ikev2_handler - RX 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 Test: Invalid integrity checksum Running connection iteration 50 Connect STA wlan0 to AP ikev2_handler - RX 025900090175736572 No more test responses available - test case completed PASS eap_proto_ikev2 50.599255 2023-04-20 09:55:42.928262 passed all 1 test case(s) 2023-04-20 09:55:43 ./run-tests.py eap_teap_eap_mschapv2_user_and_machine_no_machine DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_user_and_machine_no_machine 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 using user and machine credentials (no machine) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_user_and_machine_no_machine 4.985021 2023-04-20 09:55:49.144341 passed all 1 test case(s) 2023-04-20 09:55:49 ./run-tests.py erp_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START erp_radius 1/1 Test: ERP enabled on RADIUS server and peer Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP Did not use ERP Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 529, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_erp.py", line 154, in test_erp_radius raise Exception("Did not use ERP") Exception: Did not use ERP FAIL erp_radius 5.308382 2023-04-20 09:55:55.672977 passed 0 test case(s) skipped 0 test case(s) failed tests: erp_radius 2023-04-20 09:55:55 ./run-tests.py fils_sk_pfs_27 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_27 1/1 Test: FILS SK with PFS (DH group 27) Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_27 5.884084 2023-04-20 09:56:02.922520 passed all 1 test case(s) 2023-04-20 09:56:03 ./run-tests.py fst_ap_config_good DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_good 1/1 Test: FST AP configuration good parameters PASS fst_ap_config_good 7.828074 2023-04-20 09:56:11.966531 passed all 1 test case(s) 2023-04-20 09:56:12 ./run-tests.py fst_ap_connect_to_fst_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_connect_to_fst_sta 1/1 Test: FST AP connecting to FST STA Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP PASS fst_ap_connect_to_fst_sta 8.121216 2023-04-20 09:56:21.309478 passed all 1 test case(s) 2023-04-20 09:56:21 ./run-tests.py fst_ap_remove_session_bad_session_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_remove_session_bad_session_id 1/1 Test: FST AP remove session - bad session id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Remove scenario ended as expected (Bad session id) PASS fst_ap_remove_session_bad_session_id 7.270614 2023-04-20 09:56:29.800877 passed all 1 test case(s) 2023-04-20 09:56:29 ./run-tests.py fst_ap_session_response_reject_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_session_response_reject_with_no_session 1/1 Test: FST AP session response reject with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Session Response) PASS fst_ap_session_response_reject_with_no_session 12.337202 2023-04-20 09:56:43.494397 passed all 1 test case(s) 2023-04-20 09:56:43 ./run-tests.py fst_dynamic_iface_attach DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_dynamic_iface_attach 1/1 Test: FST dynamic interface attach Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) PASS fst_dynamic_iface_attach 6.595515 2023-04-20 09:56:51.402534 passed all 1 test case(s) 2023-04-20 09:56:51 ./run-tests.py fst_sta_initiate_session_invalid_session_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_initiate_session_invalid_session_id 1/1 Test: FST STA initiate session - invalid session id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Session ID) PASS fst_sta_initiate_session_invalid_session_id 7.382291 2023-04-20 09:57:00.014565 passed all 1 test case(s) 2023-04-20 09:57:00 ./run-tests.py gas_anqp_overrides DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_overrides 1/1 Test: GAS and ANQP overrides Starting AP wlan3 PASS gas_anqp_overrides 1.928915 2023-04-20 09:57:03.176178 passed all 1 test case(s) 2023-04-20 09:57:03 ./run-tests.py hapd_ctrl_ess_disassoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_ess_disassoc 1/1 Test: hostapd and ESS_DISASSOC ctrl_iface command Starting AP wlan3 Connect STA wlan0 to AP PASS hapd_ctrl_ess_disassoc 3.101857 2023-04-20 09:57:07.508115 passed all 1 test case(s) 2023-04-20 09:57:07 ./run-tests.py hapd_ctrl_get_capability DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_get_capability 1/1 Test: hostapd GET_CAPABILITY Starting AP wlan3 DPP capability: DPP=2 PASS hapd_ctrl_get_capability 1.645642 2023-04-20 09:57:10.379908 passed all 1 test case(s) 2023-04-20 09:57:10 ./run-tests.py he80c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80c 1/1 Test: HE with 80 MHz channel width (HT40+ channel 44) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80c 4.940091 2023-04-20 09:57:16.530351 passed all 1 test case(s) 2023-04-20 09:57:16 ./run-tests.py ibss_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn 1/1 Test: IBSS RSN Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 wlan2 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan2 02:00:00:00:02:00 wlan2 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 and 02:00:00:00:01:00 wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 PASS ibss_rsn 20.757999 2023-04-20 09:57:38.525956 passed all 1 test case(s) 2023-04-20 09:57:38 ./run-tests.py ip4_drop_gratuitous_arp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ip4_drop_gratuitous_arp 1/1 Test: Hotspot 2.0 frame filtering - IPv4 drop gratuitous ARP Skip test case: Not running under VM SKIP ip4_drop_gratuitous_arp 0.287833 2023-04-20 09:57:39.665541 passed all 0 test case(s) skipped 1 test case(s) 2023-04-20 09:57:39 ./run-tests.py mesh_wpa_init_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_wpa_init_fail 1/1 Test: Secure mesh network setup local failure PASS mesh_wpa_init_fail 6.195934 2023-04-20 09:57:46.591504 passed all 1 test case(s) 2023-04-20 09:57:46 ./run-tests.py multi_ap_wps_shared_apdev_csa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_shared_apdev_csa 1/1 Test: WPS on shared fronthaul/backhaul AP add apdev on same phy and run CSA Starting AP wlan3 Starting AP wlan0_ap PASS multi_ap_wps_shared_apdev_csa 26.077477 2023-04-20 09:58:13.385554 passed all 1 test case(s) 2023-04-20 09:58:13 ./run-tests.py nfc_p2p_static_handover_tagdev_client_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_tagdev_client_group_iface 1/1 Test: NFC static handover to form a new P2P group (NFC Tag device becomes P2P Client with group iface) Perform NFC connection handover Group formed PASS nfc_p2p_static_handover_tagdev_client_group_iface 4.811666 2023-04-20 09:58:18.911210 passed all 1 test case(s) 2023-04-20 09:58:19 ./run-tests.py nfc_p2p_static_handover_tagdev_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_tagdev_go 1/1 Test: NFC static handover to form a new P2P group (NFC Tag device becomes GO) Perform NFC connection handover Group formed PASS nfc_p2p_static_handover_tagdev_go 4.499076 2023-04-20 09:58:24.122589 passed all 1 test case(s) 2023-04-20 09:58:24 ./run-tests.py nfc_wps_er_handover_pk_hash_mismatch_er DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_handover_pk_hash_mismatch_er 1/1 Test: WPS NFC connection handover with invalid pkhash from ER to station (negative) Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using connection handover PASS nfc_wps_er_handover_pk_hash_mismatch_er 13.992608 2023-04-20 09:58:38.831177 passed all 1 test case(s) 2023-04-20 09:58:38 ./run-tests.py nfc_wps_er_pw_token DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_pw_token 1/1 Test: WPS NFC password token from Enrollee to ER Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using password token from station PASS nfc_wps_er_pw_token 16.449719 2023-04-20 09:58:55.999275 passed all 1 test case(s) 2023-04-20 09:58:56 ./run-tests.py owe_and_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_and_psk 1/1 Test: Opportunistic Wireless Encryption and WPA2-PSK enabled Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS owe_and_psk 2.950205 2023-04-20 09:58:59.653744 passed all 1 test case(s) 2023-04-20 09:58:59 ./run-tests.py owe_transition_mode_ifname DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_transition_mode_ifname 1/1 Test: Opportunistic Wireless Encryption transition mode (ifname) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS owe_transition_mode_ifname 3.30178 2023-04-20 09:59:03.671972 passed all 1 test case(s) 2023-04-20 09:59:03 ./run-tests.py p2p_msg_invitation_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_msg_invitation_req 1/1 Test: P2P protocol tests for invitation request processing Starting AP wlan3 PASS p2p_msg_invitation_req 3.177437 2023-04-20 09:59:07.560429 passed all 1 test case(s) 2023-04-20 09:59:07 ./run-tests.py p2p_service_discovery_cancel_during_query DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_cancel_during_query 1/1 Test: P2P service discovery and cancel during query PASS p2p_service_discovery_cancel_during_query 1.206786 2023-04-20 09:59:09.522956 passed all 1 test case(s) 2023-04-20 09:59:09 ./run-tests.py p2p_unauthorize DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_unauthorize 1/1 Test: P2P_UNAUTHORIZE to unauthorize a peer wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_unauthorize 2.433507 2023-04-20 09:59:12.667966 passed all 1 test case(s) 2023-04-20 09:59:12 ./run-tests.py p2ps_feature_capability_udp_mac_nonautoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_feature_capability_udp_mac_nonautoaccept 1/1 Test: P2PS PD Feature Capability CPT: advertiser UDP:MAC, seeker MAC:UDP, nonautoaccept PASS p2ps_feature_capability_udp_mac_nonautoaccept 1.74118 2023-04-20 09:59:15.135106 passed all 1 test case(s) 2023-04-20 09:59:15 ./run-tests.py p2ps_stale_group_removal3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_stale_group_removal3 1/1 Test: P2PS stale group removal (3) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2ps_stale_group_removal3 17.150624 2023-04-20 09:59:32.998570 passed all 1 test case(s) 2023-04-20 09:59:33 ./run-tests.py pmksa_cache_ctrl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pmksa_cache_ctrl 1/1 Test: PMKSA cache control interface operations Starting AP wlan3 Connect STA wlan0 to AP PASS pmksa_cache_ctrl 2.743642 2023-04-20 09:59:36.450705 passed all 1 test case(s) 2023-04-20 09:59:36 ./run-tests.py pmksa_cache_preauth_per_sta_vif DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pmksa_cache_preauth_per_sta_vif 1/1 Test: RSN pre-authentication to generate PMKSA cache entry with per_sta_vif Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS pmksa_cache_preauth_per_sta_vif 5.040742 2023-04-20 09:59:42.214236 passed all 1 test case(s) 2023-04-20 09:59:42 ./run-tests.py radius_macacl_acct DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_macacl_acct 1/1 Test: RADIUS MAC ACL and accounting enabled Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS radius_macacl_acct 3.403067 2023-04-20 09:59:46.485321 passed all 1 test case(s) 2023-04-20 09:59:46 ./run-tests.py radius_psk_during_4way_hs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_psk_during_4way_hs 1/1 Test: WPA2 with PSK from RADIUS during 4-way handshake Starting AP wlan3 Connect STA wlan0 to AP Received authentication request Connect STA wlan1 to AP Received authentication request PASS radius_psk_during_4way_hs 3.812341 2023-04-20 09:59:51.021898 passed all 1 test case(s) 2023-04-20 09:59:51 ./run-tests.py rrm_beacon_req_table_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_vht 1/1 Test: Beacon request - beacon table mode - VHT Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=128 channel=36 start=0 duration=0 frame_info=9 rcpi=166 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=663d399ac1f9050064000110000772726d2d76687401088c129824b048606c030124460570000000003b0280002d1a0e001bffff0000000000000000000001000000000000000000003d16240500000000000000000000000000000000000000007f080400000200000040bf0c00000000aaaa0000aaaa0000c005012a00fcffc304022e2e2edd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 Received beacon report: opclass=117 channel=48 start=0 duration=0 frame_info=9 rcpi=166 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=aad7359ac1f9050064000100000a746573742d766874343001088c129824b048606c0301303b0275002d1a0e001bffff0000000000000000000001000000000000000000003d16300700000000000000000000000000000000000000007f080400000200000040bf0c00000000aaaa0000aaaa0000c005000000fcffc303012e2edd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 Country code at the end: 00 PASS rrm_beacon_req_table_vht 5.710794 2023-04-20 09:59:57.445699 passed all 1 test case(s) 2023-04-20 09:59:57 ./run-tests.py rrm_unexpected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_unexpected 1/1 Test: hostapd unexpected rrm Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_unexpected 3.026727 2023-04-20 10:00:01.679563 passed all 1 test case(s) 2023-04-20 10:00:01 ./run-tests.py rssi_based_assoc_rej_good_rssi DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rssi_based_assoc_rej_good_rssi 1/1 Test: RSSI-based association rejection: STA with RSSI above the threshold connects Starting AP wlan3 Set APs RSSI rejection threshold to -45 dBm Starting AP wlan3 Set STAs TX RSSI to -45 STA is trying to connect Connect STA wlan0 to AP PASS rssi_based_assoc_rej_good_rssi 9.035597 2023-04-20 10:00:11.937873 passed all 1 test case(s) 2023-04-20 10:00:12 ./run-tests.py sae_pk_mixed_immediate_confirm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_mixed_immediate_confirm 1/1 Test: SAE-PK mixed deployment with immediate confirm on AP Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS sae_pk_mixed_immediate_confirm 5.333194 2023-04-20 10:00:18.516462 passed all 1 test case(s) 2023-04-20 10:00:18 ./run-tests.py sae_proto_hostapd_status_127 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_hostapd_status_127 1/1 Test: SAE protocol testing with hostapd (status code 127) Starting AP wlan3 unpack requires a buffer of 2 bytes Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_sae.py", line 1248, in test_sae_proto_hostapd_status_127 check_commit_status(hapd, 127, 1) File "/lkp/benchmarks/hwsim/tests/hwsim/test_sae.py", line 1235, in check_commit_status status, = struct.unpack('