2023-07-09 23:32:50 export USER=root 2023-07-09 23:32:50 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2023-07-09 23:33:46 ./start.sh 2023-07-09 23:33:48 ./run-tests.py ap_anqp_no_sharing_missing_info DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_anqp_no_sharing_missing_info 1/1 Test: ANQP no sharing due to missing information Starting AP wlan3 Starting AP wlan4 Normal network selection with shared ANQP results PASS ap_anqp_no_sharing_missing_info 1.602966 2023-07-09 23:33:51.210478 passed all 1 test case(s) 2023-07-09 23:33:51 ./run-tests.py ap_cipher_gcmp_256_group_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_gcmp_256_group_gcmp 1/1 Test: WPA2-PSK/GCMP-256 connection with group cipher override GCMP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_gcmp_256_group_gcmp 1.292081 2023-07-09 23:33:53.202565 passed all 1 test case(s) 2023-07-09 23:33:53 ./run-tests.py ap_cipher_mixed_wpa_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_mixed_wpa_wpa2 1/1 Test: WPA2-PSK/CCMP/ and WPA-PSK/TKIP mixed configuration Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_cipher_mixed_wpa_wpa2 2.855905 2023-07-09 23:33:56.757556 passed all 1 test case(s) 2023-07-09 23:33:56 ./run-tests.py ap_ft_ap_oom2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom2 1/1 Test: WPA2-PSK-FT and AP OOM 2 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom2 2.794818 2023-07-09 23:34:00.639460 passed all 1 test case(s) 2023-07-09 23:34:00 ./run-tests.py ap_ft_reassoc_local_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_reassoc_local_fail 1/1 Test: WPA2-PSK-FT AP Reassociation Request frame and local failure Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_ft_reassoc_local_fail 1.925868 2023-07-09 23:34:03.255414 passed all 1 test case(s) 2023-07-09 23:34:03 ./run-tests.py ap_hs20_fetch_osu_single_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_fetch_osu_single_ssid 1/1 Test: Hotspot 2.0 OSU provider and single SSID Starting AP wlan3 OSU-PROVIDER 02:00:00:00:03:00 uri=https://example.com/osu/ methods=00000002 osu_ssid=HS 2.0 OSU open osu_ssid2=test-hs20 osu_nai2=osen@example.com friendly_name=eng:Test OSU friendly_name=fin:Testi-OSU desc=eng:Example services desc=fin:Esimerkkipalveluja PASS ap_hs20_fetch_osu_single_ssid 5.21259 2023-07-09 23:34:09.169734 passed all 1 test case(s) 2023-07-09 23:34:09 ./run-tests.py ap_hs20_req_home_ois DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_req_home_ois 1/1 Test: Hotspot 2.0 required roaming consortium Starting AP wlan3 Starting AP wlan4 Verify network selection to AP wlan4 Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 1819, in test_ap_hs20_req_home_ois policy_test(dev[0], apdev[1], values) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 1767, in policy_test ev = dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_req_home_ois 16.532407 2023-07-09 23:34:26.446814 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_req_home_ois 2023-07-09 23:34:26 ./run-tests.py ap_hs20_terms_and_conditions DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_terms_and_conditions 1/1 Test: Hotspot 2.0 Terms and Conditions signaling Starting AP wlan3 Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 6230, in test_ap_hs20_terms_and_conditions dev[0].connect("test-hs20", proto="RSN", key_mgmt="WPA-EAP", eap="TTLS", File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1150, in connect self.connect_network(id, timeout=20) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 506, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_terms_and_conditions 20.81456 2023-07-09 23:34:47.965956 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_terms_and_conditions 2023-07-09 23:34:48 ./run-tests.py ap_max_num_sta_no_probe_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_max_num_sta_no_probe_resp 1/1 Test: Maximum STA count and limit on Probe Response frames Starting AP wlan3 Connect STA wlan1 to AP PASS ap_max_num_sta_no_probe_resp 1.644027 2023-07-09 23:34:50.316161 passed all 1 test case(s) 2023-07-09 23:34:50 ./run-tests.py ap_no_auth_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_no_auth_ack 1/1 Test: AP not receiving Authentication frame ACK Starting AP wlan3 PASS ap_no_auth_ack 1.756345 2023-07-09 23:34:53.141467 passed all 1 test case(s) 2023-07-09 23:34:53 ./run-tests.py ap_open_disable_enable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_disable_enable 1/1 Test: AP with open mode getting disabled and re-enabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_disable_enable 2.980724 2023-07-09 23:34:56.816158 passed all 1 test case(s) 2023-07-09 23:34:56 ./run-tests.py ap_pmf_valid_unicast_disassoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_valid_unicast_disassoc 1/1 Test: WPA2-PSK PMF AP sending valid unicast disassoc without dropping SA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_valid_unicast_disassoc 2.904511 2023-07-09 23:35:00.412368 passed all 1 test case(s) 2023-07-09 23:35:00 ./run-tests.py ap_vht_on_24ghz_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_on_24ghz_2 1/1 Test: Subset of VHT features on 2.4 GHz (2) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_vht_on_24ghz_2 1.687179 2023-07-09 23:35:02.798509 passed all 1 test case(s) 2023-07-09 23:35:02 ./run-tests.py ap_wpa2_eap_fast_cipher_suites DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_cipher_suites 1/1 Test: EAP-FAST and different TLS cipher suites Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 4159, in test_ap_wpa2_eap_fast_cipher_suites eap_connect(dev[0], hapd, "FAST", "user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_fast_cipher_suites 11.128455 2023-07-09 23:35:15.113346 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_fast_cipher_suites 2023-07-09 23:35:15 ./run-tests.py ap_wpa2_eap_psk_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_psk_oom 1/1 Test: WPA2-Enterprise connection using EAP-PSK and OOM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_psk_oom 5.696287 2023-07-09 23:35:21.520614 passed all 1 test case(s) 2023-07-09 23:35:21 ./run-tests.py ap_wpa2_eap_pwd_disabled_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_disabled_group 1/1 Test: WPA2-Enterprise connection using disabled EAP-pwd group Group 19 Starting AP wlan3 Connect STA wlan0 to AP Group 21 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_pwd_disabled_group 2.896896 2023-07-09 23:35:25.120490 passed all 1 test case(s) 2023-07-09 23:35:25 ./run-tests.py ap_wpa2_eap_tls_blob_pem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_blob_pem 1/1 Test: WPA2-Enterprise connection using EAP-TLS and config blobs (PEM) Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2481, in test_ap_wpa2_eap_tls_blob_pem eap_connect(dev[0], hapd, "TLS", "tls user", ca_cert="blob://cacert", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_tls_blob_pem 11.095406 2023-07-09 23:35:36.914771 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_tls_blob_pem 2023-07-09 23:35:36 ./run-tests.py ap_wpa2_eap_tls_rsa_and_ec DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_rsa_and_ec 1/1 Test: EAP-TLS and both RSA and EC sertificates certificates Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 529, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 6257, in test_ap_wpa2_eap_tls_rsa_and_ec eap_connect(dev[1], hapd, "TLS", "tls user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_tls_rsa_and_ec 11.578173 2023-07-09 23:35:49.181792 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_tls_rsa_and_ec 2023-07-09 23:35:49 ./run-tests.py ap_wpa2_eap_tls_tod_tofu DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_tod_tofu 1/1 Test: EAP-TLS server certificate validation and TOD-TOFU Starting AP wlan3 Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 7642, in test_ap_wpa2_eap_tls_tod_tofu dev[0].wait_connected() File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_wpa2_eap_tls_tod_tofu 11.104656 2023-07-09 23:36:00.983350 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_tls_tod_tofu 2023-07-09 23:36:01 ./run-tests.py ap_wpa2_eap_ttls_invalid_phase2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_invalid_phase2 1/1 Test: EAP-TTLS with invalid phase2 parameter values Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_invalid_phase2 2.605536 2023-07-09 23:36:04.297493 passed all 1 test case(s) 2023-07-09 23:36:04 ./run-tests.py ap_wpa2_eap_ttls_server_pkcs12_extra DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_server_pkcs12_extra 1/1 Test: EAP-TTLS and server PKCS#12 file with extra certs Starting AP wlan3 Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 5251, in test_ap_wpa2_eap_ttls_server_pkcs12_extra dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TTLS", File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1150, in connect self.connect_network(id, timeout=20) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 506, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_wpa2_eap_ttls_server_pkcs12_extra 20.828756 2023-07-09 23:36:25.820936 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_ttls_server_pkcs12_extra 2023-07-09 23:36:25 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_sta1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_key_id_ptk_rekey_sta1 1/1 Test: Extended Key ID and PTK rekey by station (start with Key ID 0) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ext_key_id_ptk_rekey_sta1 2.346781 2023-07-09 23:36:28.867962 passed all 1 test case(s) 2023-07-09 23:36:28 ./run-tests.py ap_wpa2_psk_supp_proto_too_long_gtk_kde DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_too_long_gtk_kde 1/1 Test: WPA2-PSK supplicant protocol testing: too long GTK KDE Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_too_long_gtk_kde 1.206865 2023-07-09 23:36:30.775362 passed all 1 test case(s) 2023-07-09 23:36:30 ./run-tests.py ap_wpa_psk_ext_eapol DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_psk_ext_eapol 1/1 Test: WPA2-PSK AP using external EAPOL supplicant Starting AP wlan3 Connect STA wlan0 to AP Replay same data back Too short data Send EAPOL-Key msg 2/4(invalid type) Send EAPOL-Key msg 2/4 Replay same data back Send EAPOL-Key msg 4/4 PASS ap_wpa_psk_ext_eapol 1.281389 2023-07-09 23:36:32.765736 passed all 1 test case(s) 2023-07-09 23:36:32 ./run-tests.py ap_wps_er_add_enrollee_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_add_enrollee_uuid 1/1 Test: WPS ER adding a new enrollee identified by UUID Starting AP wlan3 WPS configuration step Start ER Learn AP configuration through UPnP Add a specific Enrollee using ER (PBC/UUID) Add a specific Enrollee using ER (PIN/UUID) Stop ER PASS ap_wps_er_add_enrollee_uuid 14.702768 2023-07-09 23:36:48.161678 passed all 1 test case(s) 2023-07-09 23:36:48 ./run-tests.py ap_wps_er_http_proto_no_sid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_no_sid 1/1 Test: WPS ER HTTP protocol testing - no SID HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/262139289/1 PASS ap_wps_er_http_proto_no_sid 0.460595 2023-07-09 23:36:49.760624 passed all 1 test case(s) 2023-07-09 23:36:49 ./run-tests.py ap_wps_m2_unknown_opcode2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_unknown_opcode2 1/1 Test: WPS and M2 but unknown opcode (WSC_Start) Starting AP wlan3 PASS ap_wps_m2_unknown_opcode2 1.468993 2023-07-09 23:36:52.378886 passed all 1 test case(s) 2023-07-09 23:36:52 ./run-tests.py ap_wps_upnp_web_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_upnp_web_oom 1/1 Test: hostapd WPS UPnP web OOM Starting AP wlan3 PASS ap_wps_upnp_web_oom 0.779071 2023-07-09 23:36:53.873618 passed all 1 test case(s) 2023-07-09 23:36:53 ./run-tests.py authsrv_errors_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_errors_2 1/1 Test: Authentication server errors (2) Starting AP wlan4 PASS authsrv_errors_2 0.451121 2023-07-09 23:36:55.019647 passed all 1 test case(s) 2023-07-09 23:36:55 ./run-tests.py autogo_passphrase_len DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_passphrase_len 1/1 Test: P2P autonomous GO and longer passphrase Start autonomous GO wlan0 Connect P2P client Try to connect the client to the GO wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected Connect legacy WPS client Connect legacy non-WPS client Connect STA wlan2 to AP PASS autogo_passphrase_len 8.832466 2023-07-09 23:37:04.555461 passed all 1 test case(s) 2023-07-09 23:37:04 ./run-tests.py concurrent_persistent_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_persistent_group 1/1 Test: Concurrent P2P persistent group Connect to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP Run persistent group test while associated to an AP Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group PASS concurrent_persistent_group 8.287392 2023-07-09 23:37:13.599679 passed all 1 test case(s) 2023-07-09 23:37:13 ./run-tests.py dbus_p2p_join DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_join 1/1 Test: D-Bus P2P join an autonomous GO Join the group PASS dbus_p2p_join 14.852578 2023-07-09 23:37:29.147243 passed all 1 test case(s) 2023-07-09 23:37:29 ./run-tests.py discovery_listen_find DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_listen_find 1/1 Test: P2P_LISTEN immediately followed by P2P_FIND wlan1: Trying to discover peer 02:00:00:00:00:00 PASS discovery_listen_find 1.439212 2023-07-09 23:37:31.611003 passed all 1 test case(s) 2023-07-09 23:37:31 ./run-tests.py dpp_ap_config_bp512_bp512 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_bp512_bp512 1/1 Test: DPP and AP configuration (BP-512 + BP-512) Starting AP wlan3 Update AP configuration Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_bp512_bp512 4.23005 2023-07-09 23:37:36.542030 passed all 1 test case(s) 2023-07-09 23:37:36 ./run-tests.py dpp_config_dpp_gen_secp521r1_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp521r1_prime256v1 1/1 Test: Generate DPP Config Object for DPP network (P-521 + P-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp521r1_prime256v1 2.346842 2023-07-09 23:37:39.598205 passed all 1 test case(s) 2023-07-09 23:37:39 ./run-tests.py dpp_config_dpp_override_secp521r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_override_secp521r1 1/1 Test: DPP Config Object override (P-521) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_override_secp521r1 2.517614 2023-07-09 23:37:42.824474 passed all 1 test case(s) 2023-07-09 23:37:42 ./run-tests.py dpp_config_jws_error_prot_hdr_unsupported_typ DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_unsupported_typ 1/1 Test: DPP Config Object JWS error - protected header - unsupported typ dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_unsupported_typ 2.365814 2023-07-09 23:37:46.301538 passed all 1 test case(s) 2023-07-09 23:37:46 ./run-tests.py dpp_conn_status_success_hostapd_configurator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_conn_status_success_hostapd_configurator 1/1 Test: DPP connection status - success with hostapd as Configurator Starting AP wlan3 Update AP configuration Unexpected connection status: <3>DPP-CONN-STATUS-RESULT timeout Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 6412, in test_dpp_conn_status_success_hostapd_configurator run_dpp_conn_status_hostapd_configurator(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 6450, in run_dpp_conn_status_hostapd_configurator raise Exception("Unexpected connection status: " + ev) Exception: Unexpected connection status: <3>DPP-CONN-STATUS-RESULT timeout FAIL dpp_conn_status_success_hostapd_configurator 19.508429 2023-07-09 23:38:06.504388 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_conn_status_success_hostapd_configurator 2023-07-09 23:38:06 ./run-tests.py dpp_hostapd_enrollee_gas_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_hostapd_enrollee_gas_timeout 1/1 Test: DPP and hostapd as Enrollee with GAS timeout Starting AP wlan3 PASS dpp_hostapd_enrollee_gas_timeout 2.809102 2023-07-09 23:38:10.025018 passed all 1 test case(s) 2023-07-09 23:38:10 ./run-tests.py dpp_invalid_legacy_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_invalid_legacy_params 1/1 Test: DPP invalid legacy parameters PASS dpp_invalid_legacy_params 0.302098 2023-07-09 23:38:11.315185 passed all 1 test case(s) 2023-07-09 23:38:11 ./run-tests.py dpp_pkex_bp384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_bp384 1/1 Test: DPP and PKEX (BP-384) PASS dpp_pkex_bp384 2.369534 2023-07-09 23:38:14.385576 passed all 1 test case(s) 2023-07-09 23:38:14 ./run-tests.py dpp_proto_auth_resp_no_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_no_r_bootstrap_key 1/1 Test: DPP protocol testing - no R-bootstrap key in Auth Resp PASS dpp_proto_auth_resp_no_r_bootstrap_key 2.416728 2023-07-09 23:38:17.512847 passed all 1 test case(s) 2023-07-09 23:38:17 ./run-tests.py dpp_proto_conf_resp_no_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_resp_no_status 1/1 Test: DPP protocol testing - no Status in Conf Resp PASS dpp_proto_conf_resp_no_status 2.328787 2023-07-09 23:38:20.548243 passed all 1 test case(s) 2023-07-09 23:38:20 ./run-tests.py dpp_push_button_r_hash_mismatch_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_push_button_r_hash_mismatch_ap 1/1 Test: DPP push button - Responder hash mismatch from AP Skip test case: DPP version 3 not supported SKIP dpp_push_button_r_hash_mismatch_ap 0.283954 2023-07-09 23:38:21.534707 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:38:21 ./run-tests.py dpp_qr_code_curve_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_curve_secp384r1 1/1 Test: DPP QR Code and curve secp384r1 dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_curve_secp384r1 0.511888 2023-07-09 23:38:23.246219 passed all 1 test case(s) 2023-07-09 23:38:23 ./run-tests.py dpp_qr_code_no_chan_list_broadcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_no_chan_list_broadcast 1/1 Test: DPP QR Code and no channel list (broadcast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_no_chan_list_broadcast 1.352656 2023-07-09 23:38:25.651123 passed all 1 test case(s) 2023-07-09 23:38:25 ./run-tests.py eap_peap_session_resumption DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_peap_session_resumption 1/1 Test: EAP-PEAP session resumption Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 6500, in test_eap_peap_session_resumption eap_connect(dev[0], hapd, "PEAP", "user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL eap_peap_session_resumption 11.213995 2023-07-09 23:38:37.567243 passed 0 test case(s) skipped 0 test case(s) failed tests: eap_peap_session_resumption 2023-07-09 23:38:37 ./run-tests.py eap_proto_pax_errors_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pax_errors_server 1/1 Test: EAP-PAX local error cases on server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_pax_errors_server 8.637209 2023-07-09 23:38:46.967966 passed all 1 test case(s) 2023-07-09 23:38:47 ./run-tests.py eap_proto_sim_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_sim_errors 1/1 Test: EAP-SIM protocol tests (error paths) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_sim_errors 10.912338 2023-07-09 23:38:58.577379 passed all 1 test case(s) 2023-07-09 23:38:58 ./run-tests.py eap_teap_basic_password_auth_pac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_pac 1/1 Test: EAP-TEAP with Basic-Password-Auth and PAC Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_eap.py", line 381, in test_eap_teap_basic_password_auth_pac eap_connect(dev[0], hapd, "TEAP", "user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL eap_teap_basic_password_auth_pac 11.103107 2023-07-09 23:39:10.373429 passed 0 test case(s) skipped 0 test case(s) failed tests: eap_teap_basic_password_auth_pac 2023-07-09 23:39:10 ./run-tests.py eap_teap_basic_password_auth_pac_binary DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_pac_binary 1/1 Test: EAP-TEAP with Basic-Password-Auth and PAC (binary) Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_eap.py", line 395, in test_eap_teap_basic_password_auth_pac_binary eap_connect(dev[0], hapd, "TEAP", "user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL eap_teap_basic_password_auth_pac_binary 11.091974 2023-07-09 23:39:22.165644 passed 0 test case(s) skipped 0 test case(s) failed tests: eap_teap_basic_password_auth_pac_binary 2023-07-09 23:39:22 ./run-tests.py fst_disconnect_2_of_2_stas_from_non_fst_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_2_of_2_stas_from_non_fst_ap 1/1 Test: FST disconnect 2 of 2 STAs from non-FST AP Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Starting AP wlan7 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_disconnect_2_of_2_stas_from_non_fst_ap 9.434507 2023-07-09 23:39:32.299518 passed all 1 test case(s) 2023-07-09 23:39:32 ./run-tests.py fst_sta_start_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session 1/1 Test: FST STA start session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Session added and set PASS fst_sta_start_session 2.791014 2023-07-09 23:39:35.784795 passed all 1 test case(s) 2023-07-09 23:39:35 ./run-tests.py gas_anqp_venue_url2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_venue_url2 1/1 Test: GAS/ANQP and Venue URL (hostapd venue_url) Starting AP wlan3 PASS gas_anqp_venue_url2 0.901436 2023-07-09 23:39:37.373957 passed all 1 test case(s) 2023-07-09 23:39:37 ./run-tests.py go_search_non_social DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_search_non_social 1/1 Test: P2P_FIND with freq parameter to scan a single channel Start autonomous GO wlan0 PASS go_search_non_social 1.573793 2023-07-09 23:39:39.644584 passed all 1 test case(s) 2023-07-09 23:39:39 ./run-tests.py grpform_pbc_overlap_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_pbc_overlap_group_iface 1/1 Test: P2P group formation during PBC overlap using group interfaces Starting AP wlan3 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Removing BSS wlan3 PASS grpform_pbc_overlap_group_iface 4.041322 2023-07-09 23:39:44.381435 passed all 1 test case(s) 2023-07-09 23:39:44 ./run-tests.py he80_pwr_constraint DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80_pwr_constraint 1/1 Test: HE with 80 MHz channel width and local power constraint Starting AP wlan3 Connect STA wlan0 to AP PASS he80_pwr_constraint 1.730701 2023-07-09 23:39:46.818919 passed all 1 test case(s) 2023-07-09 23:39:46 ./run-tests.py he80d DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80d 1/1 Test: HE with 80 MHz channel width (HT40- channel 48) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80d 2.313179 2023-07-09 23:39:49.834550 passed all 1 test case(s) 2023-07-09 23:39:49 ./run-tests.py he_6ghz_security DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_6ghz_security 1/1 Test: HE AP and 6 GHz security parameter validation Starting AP wlan3 PASS he_6ghz_security 0.274968 2023-07-09 23:39:50.807064 passed all 1 test case(s) 2023-07-09 23:39:50 ./run-tests.py ibss_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_open 1/1 Test: IBSS open (no security) wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_open 10.8027 2023-07-09 23:40:02.314313 passed all 1 test case(s) 2023-07-09 23:40:02 ./run-tests.py ieee8021x_reauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_reauth 1/1 Test: IEEE 802.1X and EAPOL_REAUTH request Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_reauth 1.356073 2023-07-09 23:40:04.384919 passed all 1 test case(s) 2023-07-09 23:40:04 ./run-tests.py macsec_psk_integ_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_integ_only 1/1 Test: MACsec PSK (integrity only) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_integ_only 0.560037 2023-07-09 23:40:05.643722 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:40:05 ./run-tests.py mesh_pmksa_caching_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_pmksa_caching_oom 1/1 Test: Secure mesh network and PMKSA caching failing due to OOM PASS mesh_pmksa_caching_oom 2.63182 2023-07-09 23:40:09.013416 passed all 1 test case(s) 2023-07-09 23:40:09 ./run-tests.py mesh_secure_invalid_group_cipher DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_invalid_group_cipher 1/1 Test: Secure mesh and invalid group cipher PASS mesh_secure_invalid_group_cipher 0.396596 2023-07-09 23:40:10.492763 passed all 1 test case(s) 2023-07-09 23:40:10 ./run-tests.py monitor_iface_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START monitor_iface_wpa2_psk 1/1 Test: WPA2-PSK connection using cfg80211 monitor interface on AP Connect STA wlan0 to AP PASS monitor_iface_wpa2_psk 5.834051 2023-07-09 23:40:17.101848 passed all 1 test case(s) 2023-07-09 23:40:17 ./run-tests.py nfc_p2p_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_client 1/1 Test: NFC connection handover when one device is P2P client Start autonomous GOs Connect one device as a P2P client wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected NFC connection handover between P2P client and P2P device Connect to group based on upper layer trigger wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected PASS nfc_p2p_client 5.028448 2023-07-09 23:40:22.827619 passed all 1 test case(s) 2023-07-09 23:40:22 ./run-tests.py nfc_p2p_go_neg_ip_pool_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_go_neg_ip_pool_oom 1/1 Test: NFC connection handover to form a new P2P group and IP pool OOM Perform NFC connection handover Group formed PASS nfc_p2p_go_neg_ip_pool_oom 2.640273 2023-07-09 23:40:26.559458 passed all 1 test case(s) 2023-07-09 23:40:26 ./run-tests.py nfc_p2p_static_handover_tagdev_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_tagdev_client 1/1 Test: NFC static handover to form a new P2P group (NFC Tag device becomes P2P Client) Perform NFC connection handover Group formed PASS nfc_p2p_static_handover_tagdev_client 2.534012 2023-07-09 23:40:29.787333 passed all 1 test case(s) 2023-07-09 23:40:29 ./run-tests.py nfc_wps_er_config_token DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_config_token 1/1 Test: WPS NFC configuration token from ER to Enrollee Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using configuration token from ER PASS nfc_wps_er_config_token 12.657127 2023-07-09 23:40:43.138627 passed all 1 test case(s) 2023-07-09 23:40:43 ./run-tests.py owe_unsupported_group_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_unsupported_group_connect_cmd 1/1 Test: Opportunistic Wireless Encryption and unsupported group using cfg80211 connect command Starting AP wlan3 Connect STA wlan5 to AP PASS owe_unsupported_group_connect_cmd 1.356891 2023-07-09 23:40:45.196929 passed all 1 test case(s) 2023-07-09 23:40:45 ./run-tests.py p2p_service_discovery_upnp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_upnp 1/1 Test: P2P service discovery (UPnP) wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_upnp 0.567828 2023-07-09 23:40:46.477220 passed all 1 test case(s) 2023-07-09 23:40:46 ./run-tests.py p2p_service_discovery_upnp3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_upnp3 1/1 Test: P2P service discovery (UPnP using request helper - no match) wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_upnp3 0.575914 2023-07-09 23:40:47.750067 passed all 1 test case(s) 2023-07-09 23:40:47 ./run-tests.py p2p_service_discovery_ws DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_ws 1/1 Test: P2P service discovery (WS-Discovery) wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_ws 0.74451 2023-07-09 23:40:49.603910 passed all 1 test case(s) 2023-07-09 23:40:49 ./run-tests.py persistent_group_add_cli_chan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_add_cli_chan 1/1 Test: P2P persistent group formation and re-invocation with p2p_add_cli_chan=1 Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group PASS persistent_group_add_cli_chan 7.082143 2023-07-09 23:40:57.762243 passed all 1 test case(s) 2023-07-09 23:40:57 ./run-tests.py pmksa_cache_expiration DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pmksa_cache_expiration 1/1 Test: PMKSA cache entry expiration Starting AP wlan3 Connect STA wlan0 to AP Wait for PMKSA cache entry to expire PASS pmksa_cache_expiration 8.367401 2023-07-09 23:41:06.829170 passed all 1 test case(s) 2023-07-09 23:41:06 ./run-tests.py prefer_eht_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START prefer_eht_20 1/1 Starting AP wlan3 Skip test case: EHT not supported SKIP prefer_eht_20 0.268057 2023-07-09 23:41:07.801997 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:41:07 ./run-tests.py radius_acct_failure_oom_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_failure_oom_rsn 1/1 Test: RADIUS Accounting in RSN and failure to add attributes due to OOM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS radius_acct_failure_oom_rsn 17.012634 2023-07-09 23:41:25.515343 passed all 1 test case(s) 2023-07-09 23:41:25 ./run-tests.py sae_mixed_check_mfp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_mixed_check_mfp 1/1 Test: Mixed SAE and non-SAE network with the sae_check_mfp option Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan2 to AP Connect STA wlan1 to AP Connect STA wlan1 to AP PASS sae_mixed_check_mfp 3.280354 2023-07-09 23:41:29.502794 passed all 1 test case(s) 2023-07-09 23:41:29 ./run-tests.py sae_pk_unexpected_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_unexpected_status 1/1 Test: SAE-PK and unexpected status code in commit Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_unexpected_status 2.819312 2023-07-09 23:41:33.368626 passed all 1 test case(s) 2023-07-09 23:41:33 ./run-tests.py sae_pwe_group_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_1 1/1 Test: SAE PWE derivation options with group 1 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_1 2.096735 2023-07-09 23:41:36.164172 passed all 1 test case(s) 2023-07-09 23:41:36 ./run-tests.py sae_pwe_h2e_only_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_h2e_only_ap 1/1 Test: SAE PWE derivation with H2E-only AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_h2e_only_ap 1.693668 2023-07-09 23:41:38.556475 passed all 1 test case(s) 2023-07-09 23:41:38 ./run-tests.py sigma_dut_ap_owe_ecgroupid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_owe_ecgroupid 1/1 Test: sigma_dut controlled AP with OWE and ECGroupID Skip test case: sigma_dut not available SKIP sigma_dut_ap_owe_ecgroupid 0.350283 2023-07-09 23:41:39.612448 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:41:39 ./run-tests.py sigma_dut_ap_sae_pw_id_ft DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_pw_id_ft 1/1 Test: sigma_dut controlled AP with SAE Password Identifier and FT Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_pw_id_ft 0.345427 2023-07-09 23:41:40.665158 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:41:40 ./run-tests.py sigma_dut_dpp_nfc_static_read_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_nfc_static_read_enrollee 1/1 Test: sigma_dut DPP/NFC read tag as Enrollee Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_nfc_static_read_enrollee 0.936512 2023-07-09 23:41:42.568646 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:41:42 ./run-tests.py sigma_dut_dpp_qr_init_configurator_both DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_init_configurator_both 1/1 Test: sigma_dut DPP/QR initiator as Configurator or Enrollee (conf index 1) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_init_configurator_both 0.391458 2023-07-09 23:41:44.050362 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:41:44 ./run-tests.py sigma_dut_dpp_qr_mutual_init_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_mutual_init_enrollee 1/1 Test: sigma_dut DPP/QR (mutual) initiator as Enrollee Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_mutual_init_enrollee 0.758484 2023-07-09 23:41:45.535656 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:41:45 ./run-tests.py sigma_dut_dpp_qr_resp_status_query DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_status_query 1/1 Test: sigma_dut DPP/QR responder status query Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_status_query 0.748482 2023-07-09 23:41:46.992995 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:41:47 ./run-tests.py sigma_dut_dpp_reconfig_no_proto_ver DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_reconfig_no_proto_ver 1/1 Test: sigma_dut DPP reconfiguration (Configurator) - missing Protocol Version Skip test case: sigma_dut not available SKIP sigma_dut_dpp_reconfig_no_proto_ver 0.271132 2023-07-09 23:41:47.966032 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:41:48 ./run-tests.py ssid_hex_encoded DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_hex_encoded 1/1 Test: SSID configuration using hex encoded version Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ssid_hex_encoded 1.573334 2023-07-09 23:41:50.245227 passed all 1 test case(s) 2023-07-09 23:41:50 ./run-tests.py tnc_peap_soh_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_peap_soh_errors 1/1 Test: TNC PEAP-SoH local error cases Starting AP wlan3 Connect STA wlan0 to AP Failure not triggered Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_tnc.py", line 60, in test_tnc_peap_soh_errors wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") File "/lkp/benchmarks/hwsim/tests/hwsim/utils.py", line 72, in wait_fail_trigger raise Exception(note) Exception: Failure not triggered FAIL tnc_peap_soh_errors 2.843812 2023-07-09 23:41:53.799838 passed 0 test case(s) skipped 0 test case(s) failed tests: tnc_peap_soh_errors 2023-07-09 23:41:53 ./run-tests.py wnm_bss_tm_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_rsn 1/1 Test: WNM BSS Transition Management with RSN Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Preferred Candidate List (matching neighbor for another BSS) without Disassociation Imminent PASS wnm_bss_tm_rsn 3.683856 2023-07-09 23:41:58.196794 passed all 1 test case(s) 2023-07-09 23:41:58 ./run-tests.py wnm_coloc_intf_reporting DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_coloc_intf_reporting 1/1 Test: WNM Collocated Interference Reporting Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_coloc_intf_reporting 1.25523 2023-07-09 23:42:00.155662 passed all 1 test case(s) 2023-07-09 23:42:00 ./run-tests.py wpas_ap_lifetime_in_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_lifetime_in_memory 1/1 Test: wpa_supplicant AP mode and PSK/PTK lifetime in memory Checking keys in memory after network profile configuration Reading process memory (pid=4585) [heap] 0x5653d7fc9000-0x5653d8000000 is at 12288-237568 [stack] 0x7ffefcc6c000-0x7ffefcc8e000 is at 917504-1056768 Total process memory read: 1056768 bytes Checking keys in memory after AP start Reading process memory (pid=4585) [heap] 0x5653d7fc9000-0x5653d8000000 is at 12288-237568 [stack] 0x7ffefcc6c000-0x7ffefcc8e000 is at 917504-1056768 Total process memory read: 1056768 bytes Connect STA wlan1 to AP Reading process memory (pid=4585) [heap] 0x5653d7fc9000-0x5653d8000000 is at 12288-237568 [stack] 0x7ffefcc6c000-0x7ffefcc8e000 is at 917504-1056768 Total process memory read: 1056768 bytes Reading process memory (pid=4585) [heap] 0x5653d7fc9000-0x5653d8000000 is at 12288-237568 [stack] 0x7ffefcc6c000-0x7ffefcc8e000 is at 917504-1056768 Total process memory read: 1056768 bytes Reading process memory (pid=4585) [heap] 0x5653d7fc9000-0x5653d8000000 is at 12288-237568 [stack] 0x7ffefcc6c000-0x7ffefcc8e000 is at 917504-1056768 Total process memory read: 1056768 bytes Checking keys in memory while associated Skip test case: PMK not found while associated SKIP wpas_ap_lifetime_in_memory 1.534117 2023-07-09 23:42:02.390524 passed all 0 test case(s) skipped 1 test case(s) 2023-07-09 23:42:02 ./run-tests.py wpas_ap_open_ht_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_open_ht_disabled 1/1 Test: wpa_supplicant AP mode - open network and HT disabled Connect STA wlan1 to AP PASS wpas_ap_open_ht_disabled 1.356847 2023-07-09 23:42:04.462771 passed all 1 test case(s) 2023-07-09 23:42:04 ./run-tests.py wpas_ap_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_sae 1/1 Test: wpa_supplicant AP mode - SAE using psk Connect STA wlan1 to AP PASS wpas_ap_sae 1.425511 2023-07-09 23:42:06.600831 passed all 1 test case(s) 2023-07-09 23:42:06 ./run-tests.py wpas_ctrl_bssid_filter DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_bssid_filter 1/1 Test: wpa_supplicant bssid_filter Starting AP wlan3 Starting AP wlan4 PASS wpas_ctrl_bssid_filter 1.611704 2023-07-09 23:42:08.914368 passed all 1 test case(s) 2023-07-09 23:42:08 ./run-tests.py wpas_ctrl_eapol_rx DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_eapol_rx 1/1 Test: wpa_supplicant ctrl_iface EAPOL_RX PASS wpas_ctrl_eapol_rx 0.455194 2023-07-09 23:42:10.442763 passed all 1 test case(s) 2023-07-09 23:42:10 ./run-tests.py wps_ext_proto_ack_m3_e_nonce_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3_e_nonce_mismatch 1/1 Test: WPS and ACK M3 E-Nonce mismatch Starting AP wlan3 PASS wps_ext_proto_ack_m3_e_nonce_mismatch 1.455812 2023-07-09 23:42:12.771145 passed all 1 test case(s) 2023-07-09 23:42:12 ./run-tests.py wps_ext_proto_ack_m3_invalid_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3_invalid_msg_type 1/1 Test: WPS and ACK M3 invalid Message Type Starting AP wlan3 PASS wps_ext_proto_ack_m3_invalid_msg_type 1.479922 2023-07-09 23:42:14.960373 passed all 1 test case(s) 2023-07-09 23:42:15 ./stop.sh