2023-04-27 08:20:53 export USER=root 2023-04-27 08:20:53 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2023-04-27 08:21:35 ./start.sh 2023-04-27 08:21:36 ./run-tests.py ap_acs_vht160_scan_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_vht160_scan_disable 1/1 Test: Automatic channel selection for VHT160 and DISABLE during scan Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Country code at the end: 00 PASS ap_acs_vht160_scan_disable 4.642395 2023-04-27 08:21:42.658279 passed all 1 test case(s) 2023-04-27 08:21:42 ./run-tests.py ap_airtime_policy_per_bss_limit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_airtime_policy_per_bss_limit 1/1 Test: Airtime policy - per-BSS limit Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_airtime_policy_per_bss_limit 3.607151 2023-04-27 08:21:46.688544 passed all 1 test case(s) 2023-04-27 08:21:46 ./run-tests.py ap_beacon_rate_ht2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_beacon_rate_ht2 1/1 Test: Open AP with Beacon frame TX rate HT-MCS 1 in VHT BSS Starting AP wlan3 Skip test case: Setting Beacon frame TX rate not supported SKIP ap_beacon_rate_ht2 0.604257 2023-04-27 08:21:47.712395 passed all 0 test case(s) skipped 1 test case(s) 2023-04-27 08:21:47 ./run-tests.py ap_beacon_rate_legacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_beacon_rate_legacy 1/1 Test: Open AP with Beacon frame TX rate 5.5 Mbps Starting AP wlan3 Connect STA wlan0 to AP PASS ap_beacon_rate_legacy 1.979084 2023-04-27 08:21:50.114547 passed all 1 test case(s) 2023-04-27 08:21:50 ./run-tests.py ap_cipher_bip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_bip 1/1 Test: WPA2-PSK with BIP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_bip 1.183489 2023-04-27 08:21:51.709336 passed all 1 test case(s) 2023-04-27 08:21:51 ./run-tests.py ap_config_reload_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_config_reload_file 1/1 Test: hostapd configuration reload from file Starting interface wlan3 Connect STA wlan0 to AP PASS ap_config_reload_file 1.090434 2023-04-27 08:21:53.217530 passed all 1 test case(s) 2023-04-27 08:21:53 ./run-tests.py ap_csa_1_switch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_1_switch 1/1 Test: AP Channel Switch, one switch Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_1_switch 2.083386 2023-04-27 08:21:55.712392 passed all 1 test case(s) 2023-04-27 08:21:55 ./run-tests.py ap_ft_gcmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_gcmp_256 1/1 Test: WPA2-PSK-FT AP with GCMP-256 cipher Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_gcmp_256 2.50374 2023-04-27 08:21:58.622352 passed all 1 test case(s) 2023-04-27 08:21:58 ./run-tests.py ap_ft_internal_rrb_check DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_internal_rrb_check 1/1 Test: RRB internal delivery only to WPA enabled BSS Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_ft_internal_rrb_check 2.540398 2023-04-27 08:22:01.574167 passed all 1 test case(s) 2023-04-27 08:22:01 ./run-tests.py ap_ft_over_ds_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_ocv 1/1 Test: WPA2-PSK-FT AP over DS Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_over_ds_ocv 2.714663 2023-04-27 08:22:04.697580 passed all 1 test case(s) 2023-04-27 08:22:04 ./run-tests.py ap_ft_ptk_rekey_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ptk_rekey_ap 1/1 Test: WPA2-PSK-FT PTK rekeying triggered by AP after roam Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_ptk_rekey_ap 4.466438 2023-04-27 08:22:09.572976 passed all 1 test case(s) 2023-04-27 08:22:09 ./run-tests.py ap_hs20_auto_interworking DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 Starting AP wlan3 Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 750, in test_ap_hs20_auto_interworking dev[0].wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_auto_interworking 15.686723 2023-04-27 08:22:25.667703 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_auto_interworking 2023-04-27 08:22:25 ./run-tests.py ap_hs20_eap_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_unknown 1/1 Test: Hotspot 2.0 connection with unknown EAP method Starting AP wlan3 PASS ap_hs20_eap_unknown 0.688151 2023-04-27 08:22:26.766646 passed all 1 test case(s) 2023-04-27 08:22:26 ./run-tests.py ap_hs20_req_conn_capab DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_req_conn_capab 1/1 Test: Hotspot 2.0 network selection with req_conn_capab Starting AP wlan3 Not used in home network Used in roaming network Verify that req_conn_capab does not prevent connection if no other network is available Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 2262, in test_ap_hs20_req_conn_capab check_auto_select(dev[0], bssid) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 61, in check_auto_select ev = dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_req_conn_capab 16.000867 2023-04-27 08:22:43.173894 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_req_conn_capab 2023-04-27 08:22:43 ./run-tests.py ap_ht_op_class_116 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_116 1/1 Test: HT40 on operationg class 116 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_116 3.56036 2023-04-27 08:22:47.147522 passed all 1 test case(s) 2023-04-27 08:22:47 ./run-tests.py ap_open_sta_enable_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_sta_enable_disable 1/1 Test: AP with open mode and wpa_supplicant ENABLE/DISABLE_NETWORK Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP PASS ap_open_sta_enable_disable 1.15246 2023-04-27 08:22:48.705905 passed all 1 test case(s) 2023-04-27 08:22:48 ./run-tests.py ap_open_sta_ps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_sta_ps 1/1 Test: Station power save operation Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_sta_ps 1.592231 2023-04-27 08:22:50.706092 passed all 1 test case(s) 2023-04-27 08:22:50 ./run-tests.py ap_pmf_beacon_protection_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_beacon_protection_mismatch 1/1 Test: WPA2-PSK Beacon protection MIC mismatch Starting AP wlan3 Connect STA wlan0 to AP Unprotected Beacon frame not reported Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_pmf.py", line 1375, in test_ap_pmf_beacon_protection_mismatch run_ap_pmf_beacon_protection_mismatch(dev, apdev, False) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_pmf.py", line 1423, in run_ap_pmf_beacon_protection_mismatch raise Exception("Unprotected Beacon frame not reported") Exception: Unprotected Beacon frame not reported FAIL ap_pmf_beacon_protection_mismatch 6.189226 2023-04-27 08:22:57.302682 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_pmf_beacon_protection_mismatch 2023-04-27 08:22:57 ./run-tests.py ap_pmf_sta_sa_query_no_response DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_no_response 1/1 Test: WPA2-PSK AP with station using SA Query and getting no response Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_no_response 5.10929 2023-04-27 08:23:02.819604 passed all 1 test case(s) 2023-04-27 08:23:02 ./run-tests.py ap_vendor_elements DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vendor_elements 1/1 Test: WPA2-PSK AP with vendor elements added Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vendor_elements 1.179836 2023-04-27 08:23:04.402451 passed all 1 test case(s) 2023-04-27 08:23:04 ./run-tests.py ap_vlan_file_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_file_parsing 1/1 Test: hostapd vlan_file/mac_file parsing Starting AP wlan3 PASS ap_vlan_file_parsing 0.559405 2023-04-27 08:23:05.369157 passed all 1 test case(s) 2023-04-27 08:23:05 ./run-tests.py ap_wpa2_eap_ext_enable_network_while_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ext_enable_network_while_connected 1/1 Test: WPA2-Enterprise interactive identity entry and ENABLE_NETWORK Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Request for identity timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 3628, in test_ap_wpa2_eap_ext_enable_network_while_connected raise Exception("Request for identity timed out") Exception: Request for identity timed out FAIL ap_wpa2_eap_ext_enable_network_while_connected 10.647859 2023-04-27 08:23:16.434300 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_ext_enable_network_while_connected 2023-04-27 08:23:16 ./run-tests.py ap_wpa2_eap_fast_eap_sim_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_sim_ext 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM and external GSM auth Starting AP wlan3 Connect STA wlan0 to AP Wait for external SIM processing request timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2183, in test_ap_wpa2_eap_fast_eap_sim_ext run_ap_wpa2_eap_fast_eap_sim_ext(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2199, in run_ap_wpa2_eap_fast_eap_sim_ext run_ext_sim_auth(hapd, dev[0]) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2079, in run_ext_sim_auth raise Exception("Wait for external SIM processing request timed out") Exception: Wait for external SIM processing request timed out FAIL ap_wpa2_eap_fast_eap_sim_ext 15.667046 2023-04-27 08:23:32.516920 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_fast_eap_sim_ext 2023-04-27 08:23:32 ./run-tests.py ap_wpa2_eap_fast_eap_vendor DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_vendor 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-vendor Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 4331, in test_ap_wpa2_eap_fast_eap_vendor eap_connect(dev[0], hapd, "FAST", "vendor-test-2", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_fast_eap_vendor 10.950713 2023-04-27 08:23:43.881248 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_fast_eap_vendor 2023-04-27 08:23:43 ./run-tests.py ap_wpa2_eap_peap_eap_sim DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_eap_sim 1/1 Test: WPA2-Enterprise connection using EAP-PEAP/EAP-SIM Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2140, in test_ap_wpa2_eap_peap_eap_sim eap_connect(dev[0], hapd, "PEAP", "1232010000000000", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 160, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_peap_eap_sim 10.944555 2023-04-27 08:23:55.234288 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_peap_eap_sim 2023-04-27 08:23:55 ./run-tests.py ap_wpa2_eap_peap_eap_sim_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_eap_sim_ext 1/1 Test: WPA2-Enterprise connection using EAP-PEAP/EAP-SIM and external GSM auth Starting AP wlan3 Connect STA wlan0 to AP Wait for external SIM processing request timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2150, in test_ap_wpa2_eap_peap_eap_sim_ext run_ap_wpa2_eap_peap_eap_sim_ext(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2164, in run_ap_wpa2_eap_peap_eap_sim_ext run_ext_sim_auth(hapd, dev[0]) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2079, in run_ext_sim_auth raise Exception("Wait for external SIM processing request timed out") Exception: Wait for external SIM processing request timed out FAIL ap_wpa2_eap_peap_eap_sim_ext 15.683643 2023-04-27 08:24:11.335744 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_peap_eap_sim_ext 2023-04-27 08:24:11 ./run-tests.py ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked 1/1 Test: EAP-TLS with intermediate server/user CA and OCSP on revoked server certificate openssl ocsp -reqout /tmp/lkp/tmpv7fvfu8g -issuer auth_serv/iCA-server/cacert.pem -sha256 -cert auth_serv/iCA-server/server-revoked.pem -no_nonce -text openssl result: OCSP Request Data: Version: 1 (0x0) Requestor List: Certificate ID: Hash Algorithm: sha256 Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112 Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783 openssl ocsp -index auth_serv/iCA-server/index.txt -rsigner auth_serv/iCA-server/cacert.pem -rkey auth_serv/iCA-server/private/cakey.pem -CA auth_serv/iCA-server/cacert.pem -issuer auth_serv/iCA-server/cacert.pem -verify_other auth_serv/iCA-server/cacert.pem -trust_other -ndays 7 -reqin /tmp/lkp/tmpv7fvfu8g -resp_no_certs -respout /tmp/lkp/tmpxkdkyvkx -text openssl result: OCSP Request Data: Version: 1 (0x0) Requestor List: Certificate ID: Hash Algorithm: sha256 Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112 Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783 OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: C = FI, O = w1.fi, CN = Server Intermediate CA Produced At: Apr 27 08:24:11 2023 GMT Responses: Certificate ID: Hash Algorithm: sha256 Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112 Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783 Cert Status: revoked Revocation Time: May 3 15:20:10 2020 GMT This Update: Apr 27 08:24:11 2023 GMT Next Update: May 4 08:24:11 2023 GMT Signature Algorithm: sha256WithRSAEncryption 20:65:3c:d8:18:24:cc:f3:20:54:ca:40:d1:59:33:2f:c3:05: 56:21:c9:d1:8c:5b:71:91:84:04:3f:04:0b:c5:bb:a1:75:d7: d9:40:27:6e:7f:ef:71:e5:c4:ce:7b:04:31:53:b7:e0:a2:2a: 22:1c:59:f8:a2:58:bf:c2:0c:00:98:d1:9c:e0:7d:7a:f4:7e: 59:6a:f4:37:9a:bc:88:d7:71:2b:80:b5:8b:59:af:f8:58:9b: 95:28:73:67:48:0a:6c:68:44:05:11:39:9c:d5:55:33:43:d3: 20:ae:3a:d2:c8:eb:8f:3f:27:60:80:61:3b:3d:e6:35:2d:1d: a5:d8:fc:63:e6:e5:c7:8c:90:ac:d3:f7:45:c6:29:14:00:de: a5:2c:49:7f:c3:49:23:e8:4c:0f:2c:5a:b6:a6:4a:07:27:6a: 82:2d:a5:6b:06:46:ef:1f:f0:16:a1:63:39:40:3e:38:93:24: 0b:a0:71:e3:e7:ad:0c:75:be:90:ef:e9:3e:a9:6d:15:89:bf: 5a:f8:a0:7f:52:3d:99:fe:5c:a6:fe:a9:7f:0f:b1:3d:b2:84: 62:f9:47:c0:c5:94:2d:62:71:e9:e0:6f:6b:63:3c:a5:35:c0: ec:ef:8f:70:ae:33:cc:22:3e:90:ba:b0:dc:84:ca:dd:57:10: 5b:7d:65:0a Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked 1.147686 2023-04-27 08:24:12.897086 passed all 1 test case(s) 2023-04-27 08:24:12 ./run-tests.py ap_wpa2_eap_ttls_eap_mschapv2_server_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_mschapv2_server_oom 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-MSCHAPv2 - server OOM Starting AP wlan3 Connect STA wlan0 to AP Allocation failure did not trigger Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 2022, in test_ap_wpa2_eap_ttls_eap_mschapv2_server_oom dev[0].request("REMOVE_NETWORK all") File "/lkp/benchmarks/hwsim/tests/hwsim/utils.py", line 50, in __exit__ raise Exception("Allocation failure did not trigger") Exception: Allocation failure did not trigger FAIL ap_wpa2_eap_ttls_eap_mschapv2_server_oom 1.145965 2023-04-27 08:24:14.472562 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_ttls_eap_mschapv2_server_oom 2023-04-27 08:24:14 ./run-tests.py ap_wpa2_eap_ttls_server_cert_eku_client_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_server_cert_eku_client_server 1/1 Test: WPA2-Enterprise using EAP-TTLS and server cert with client and server EKU Starting AP wlan3 Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 5226, in test_ap_wpa2_eap_ttls_server_cert_eku_client_server dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TTLS", File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1150, in connect self.connect_network(id, timeout=20) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 506, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_wpa2_eap_ttls_server_cert_eku_client_server 20.708241 2023-04-27 08:24:35.597102 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_ttls_server_cert_eku_client_server 2023-04-27 08:24:35 ./run-tests.py ap_wpa2_eap_ttls_server_cert_hash DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_server_cert_hash 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and server certificate hash Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_server_cert_hash 1.811012 2023-04-27 08:24:37.816872 passed all 1 test case(s) 2023-04-27 08:24:37 ./run-tests.py ap_wpa2_gtk_initial_rsc_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_initial_rsc_tkip 1/1 Test: Initial group cipher RSC (TKIP) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_gtk_initial_rsc_tkip 11.237266 2023-04-27 08:24:49.463260 passed all 1 test case(s) 2023-04-27 08:24:49 ./run-tests.py ap_wpa2_in_different_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_in_different_bridge 1/1 Test: hostapd behavior with interface in different bridge Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_in_different_bridge 1.984245 2023-04-27 08:24:51.860788 passed all 1 test case(s) 2023-04-27 08:24:51 ./run-tests.py ap_wps_er_http_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_client 1/1 Test: WPS ER and HTTP client special cases HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/217771411/1 HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_client 7.16641 2023-04-27 08:24:59.439092 passed all 1 test case(s) 2023-04-27 08:24:59 ./run-tests.py ap_wps_invalid_assoc_req_elem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_invalid_assoc_req_elem 1/1 Test: WPS and invalid IE in Association Request frame Starting AP wlan3 PASS ap_wps_invalid_assoc_req_elem 3.154475 2023-04-27 08:25:03.006539 passed all 1 test case(s) 2023-04-27 08:25:03 ./run-tests.py dbus_tdls_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_tdls_oom 1/1 Test: D-Bus TDLS operations during OOM PASS dbus_tdls_oom 0.126897 2023-04-27 08:25:03.548124 passed all 1 test case(s) 2023-04-27 08:25:03 ./run-tests.py dfs_radar_chanlist_vht80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dfs_radar_chanlist_vht80 1/1 Test: DFS chanlist when radar is detected and VHT80 configured Starting AP wlan3 on DFS channel Starting AP wlan3 Trigger a simulated radar event Connect STA wlan0 to AP Country code at the end: 00 PASS dfs_radar_chanlist_vht80 6.584927 2023-04-27 08:25:10.545311 passed all 1 test case(s) 2023-04-27 08:25:10 ./run-tests.py dpp_config_dpp_gen_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_prime256v1 1/1 Test: Generate DPP Config Object for DPP network (P-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_prime256v1 2.234245 2023-04-27 08:25:13.185565 passed all 1 test case(s) 2023-04-27 08:25:13 ./run-tests.py dpp_config_dpp_gen_secp384r1_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp384r1_secp384r1 1/1 Test: Generate DPP Config Object for DPP network (P-384 + P-384) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp384r1_secp384r1 2.246232 2023-04-27 08:25:15.848436 passed all 1 test case(s) 2023-04-27 08:25:15 ./run-tests.py dpp_config_no_csign DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_no_csign 1/1 Test: DPP Config Object error - no csign dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_no_csign 2.235718 2023-04-27 08:25:18.498075 passed all 1 test case(s) 2023-04-27 08:25:18 ./run-tests.py dpp_config_signed_connector_error_no_dot_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_signed_connector_error_no_dot_2 1/1 Test: DPP Config Object signedConnector error - no dot(2) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_signed_connector_error_no_dot_2 2.226107 2023-04-27 08:25:21.141988 passed all 1 test case(s) 2023-04-27 08:25:21 ./run-tests.py dpp_pkex_curve_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_curve_mismatch 1/1 Test: DPP and PKEX with mismatching curve PASS dpp_pkex_curve_mismatch 2.173686 2023-04-27 08:25:23.736724 passed all 1 test case(s) 2023-04-27 08:25:23 ./run-tests.py dpp_proto_auth_resp_r_auth_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_r_auth_mismatch 1/1 Test: DPP protocol testing - R-auth mismatch in Auth Resp PASS dpp_proto_auth_resp_r_auth_mismatch 2.175054 2023-04-27 08:25:26.327287 passed all 1 test case(s) 2023-04-27 08:25:26 ./run-tests.py dpp_qr_code_keygen_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_keygen_fail 1/1 Test: DPP QR Code and keygen failure PASS dpp_qr_code_keygen_fail 0.127192 2023-04-27 08:25:26.861528 passed all 1 test case(s) 2023-04-27 08:25:26 ./run-tests.py dpp_two_initiators DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_two_initiators 1/1 Test: DPP and two initiators PASS dpp_two_initiators 2.203619 2023-04-27 08:25:29.474089 passed all 1 test case(s) 2023-04-27 08:25:29 ./run-tests.py ext_password_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ext_password_eap 1/1 Test: External password storage for EAP password Starting AP wlan3 Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ext_password.py", line 65, in test_ext_password_eap dev[0].connect("ext-pw-eap", key_mgmt="WPA-EAP", eap="PEAP", File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1150, in connect self.connect_network(id, timeout=20) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 506, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ext_password_eap 20.698362 2023-04-27 08:25:50.592583 passed 0 test case(s) skipped 0 test case(s) failed tests: ext_password_eap 2023-04-27 08:25:50 ./run-tests.py fils_sk_pfs_26 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_26 1/1 Test: FILS SK with PFS (DH group 26) Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_26 1.471147 2023-04-27 08:25:52.469314 passed all 1 test case(s) 2023-04-27 08:25:52 ./run-tests.py fst_sta_start_session_bad_session_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session_bad_session_id 1/1 Test: FST STA start session - bad session id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Session ID) PASS fst_sta_start_session_bad_session_id 2.600684 2023-04-27 08:25:55.475329 passed all 1 test case(s) 2023-04-27 08:25:55 ./run-tests.py grpform_go_neg_stopped DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_go_neg_stopped 1/1 Test: GO Negotiation stopped after TX start wlan1: Trying to discover peer 02:00:00:00:00:00 PASS grpform_go_neg_stopped 0.804668 2023-04-27 08:25:56.688923 passed all 1 test case(s) 2023-04-27 08:25:56 ./run-tests.py hapd_ctrl_eapol_reauth_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_eapol_reauth_errors 1/1 Test: hostapd and EAPOL_REAUTH errors Starting AP wlan3 PASS hapd_ctrl_eapol_reauth_errors 0.570276 2023-04-27 08:25:57.667682 passed all 1 test case(s) 2023-04-27 08:25:57 ./run-tests.py he80plus80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80plus80 1/1 Test: HE with 80+80 MHz channel width Starting AP wlan3 Starting AP wlan4 Connect STA wlan1 to AP PASS he80plus80 2.194347 2023-04-27 08:26:00.275883 passed all 1 test case(s) 2023-04-27 08:26:00 ./run-tests.py he_wifi_generation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_wifi_generation 1/1 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP Country code at the end: 00 PASS he_wifi_generation 2.405935 2023-04-27 08:26:03.095793 passed all 1 test case(s) 2023-04-27 08:26:03 ./run-tests.py ibss_rsn_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_tkip 1/1 Test: IBSS RSN with TKIP as the cipher wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 PASS ibss_rsn_tkip 10.714756 2023-04-27 08:26:14.217996 passed all 1 test case(s) 2023-04-27 08:26:14 ./run-tests.py ieee8021x_force_unauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_force_unauth 1/1 Test: IEEE 802.1X and FORCE_UNAUTH state Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_force_unauth 1.067012 2023-04-27 08:26:15.693622 passed all 1 test case(s) 2023-04-27 08:26:15 ./run-tests.py mesh_secure_gcmp_gmac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp_gmac 1/1 Test: Secure mesh with GCMP-128 and BIP-GMAC-128 PASS mesh_secure_gcmp_gmac 1.508244 2023-04-27 08:26:17.614389 passed all 1 test case(s) 2023-04-27 08:26:17 ./run-tests.py nfc_invalid_ndef_record DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_invalid_ndef_record 1/1 Test: Invalid NFC NDEF record handling PASS nfc_invalid_ndef_record 0.119179 2023-04-27 08:26:18.145344 passed all 1 test case(s) 2023-04-27 08:26:18 ./run-tests.py nfc_wps_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover 1/1 Test: Connect to WPS AP with NFC connection handover Starting AP wlan3 NFC connection handover PASS nfc_wps_handover 1.610095 2023-04-27 08:26:20.167857 passed all 1 test case(s) 2023-04-27 08:26:20 ./run-tests.py obss_coex_report_handling2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START obss_coex_report_handling2 1/1 Test: Overlapping BSS scan report handling with obss_interval=1 and no overlap Starting AP wlan3 Connect STA wlan0 to AP PASS obss_coex_report_handling2 3.81313 2023-04-27 08:26:24.386352 passed all 1 test case(s) 2023-04-27 08:26:24 ./run-tests.py p2ps_adv_go_persistent_no_peer_entry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_adv_go_persistent_no_peer_entry 1/1 Test: P2PS advertisement as GO having persistent group (no peer entry) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2ps_adv_go_persistent_no_peer_entry 3.883159 2023-04-27 08:26:28.676454 passed all 1 test case(s) 2023-04-27 08:26:28 ./run-tests.py persistent_group_cancel_on_cli3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_cancel_on_cli3 1/1 Test: P2P persistent group formation, re-invocation, and cancel Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Group removal event timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 533, in main t(dev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_persistent.py", line 621, in test_persistent_group_cancel_on_cli3 form(dev[0], dev[1]) File "/lkp/benchmarks/hwsim/tests/hwsim/p2p_utils.py", line 171, in form terminate_group(go, cli) File "/lkp/benchmarks/hwsim/tests/hwsim/p2p_utils.py", line 110, in terminate_group cli.wait_go_ending_session() File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 914, in wait_go_ending_session raise Exception("Group removal event timed out") Exception: Group removal event timed out FAIL persistent_group_cancel_on_cli3 6.844441 2023-04-27 08:26:35.927328 passed 0 test case(s) skipped 0 test case(s) failed tests: persistent_group_cancel_on_cli3 2023-04-27 08:26:35 ./run-tests.py radius_acct_failure_sta_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_failure_sta_data 1/1 Test: RADIUS Accounting and failure to get STA data Starting AP wlan3 Connect STA wlan0 to AP PASS radius_acct_failure_sta_data 1.0662 2023-04-27 08:26:37.403315 passed all 1 test case(s) 2023-04-27 08:26:37 ./run-tests.py radius_auth_unreachable2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_auth_unreachable2 1/1 Test: RADIUS Authentication server unreachable (2) Starting AP wlan3 Connect STA wlan0 to AP Checking for RADIUS retries radiusAuthClientAccessRetransmissions: 1 PASS radius_auth_unreachable2 5.038273 2023-04-27 08:26:42.847871 passed all 1 test case(s) 2023-04-27 08:26:42 ./run-tests.py radius_protocol DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_protocol 1/1 Test: RADIUS Authentication protocol tests with a fake server Starting AP wlan3 Connect STA wlan0 to AP Received authentication request Connect STA wlan0 to AP Received authentication request Add Message-Authenticator Use incorrect RADIUS shared secret Connect STA wlan0 to AP Received authentication request Add Message-Authenticator Received authentication request Add Message-Authenticator Connect STA wlan0 to AP Received authentication request Add Message-Authenticator Include two Message-Authenticator attributes PASS radius_protocol 5.802966 2023-04-27 08:26:49.064546 passed all 1 test case(s) 2023-04-27 08:26:49 ./run-tests.py radius_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_psk 1/1 Test: WPA2 with PSK from RADIUS Starting AP wlan3 Connect STA wlan0 to AP Received authentication request Connect STA wlan1 to AP Received authentication request PASS radius_psk 2.403992 2023-04-27 08:26:51.884775 passed all 1 test case(s) 2023-04-27 08:26:51 ./run-tests.py rrm_beacon_req_table_request_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_request_oom 1/1 Test: Beacon request - beacon table mode - request element OOM Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_beacon_req_table_request_oom 1.35401 2023-04-27 08:26:53.646538 passed all 1 test case(s) 2023-04-27 08:26:53 ./run-tests.py rrm_link_measurement_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_link_measurement_oom 1/1 Test: Radio measurement request - link measurement OOM Skip test case: Required RRM capabilities are not supported SKIP rrm_link_measurement_oom 0.120777 2023-04-27 08:26:54.171051 passed all 0 test case(s) skipped 1 test case(s) 2023-04-27 08:26:54 ./run-tests.py rrm_neighbor_rep_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req 1/1 Test: wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP PASS rrm_neighbor_rep_req 2.492863 2023-04-27 08:26:57.069002 passed all 1 test case(s) 2023-04-27 08:26:57 ./run-tests.py rsn_preauth_processing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_preauth_processing 1/1 Test: RSN pre-authentication processing on AP Starting AP wlan3 Connect STA wlan0 to AP PASS rsn_preauth_processing 1.092991 2023-04-27 08:26:58.576810 passed all 1 test case(s) 2023-04-27 08:26:58 ./run-tests.py sae_ext_key_21_gcmp256_gcmp256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_ext_key_21_gcmp256_gcmp256 1/1 Test: SAE with extended key AKM (group 21) with GCMP-256 pairwise and group cipher Starting AP wlan3 Connect STA wlan0 to AP PASS sae_ext_key_21_gcmp256_gcmp256 1.450025 2023-04-27 08:27:00.433143 passed all 1 test case(s) 2023-04-27 08:27:00 ./run-tests.py sae_pk_missing_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_missing_ie 1/1 Test: SAE-PK and missing SAE-PK IE in confirm Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_missing_ie 2.654917 2023-04-27 08:27:03.495727 passed all 1 test case(s) 2023-04-27 08:27:03 ./run-tests.py sae_pk_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_only 1/1 Test: SAE-PK only Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS sae_pk_only 1.602449 2023-04-27 08:27:05.507538 passed all 1 test case(s) 2023-04-27 08:27:05 ./run-tests.py scan_bss_expiration_count DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_expiration_count 1/1 Test: BSS entry expiration based on scan results without match Starting AP wlan3 PASS scan_bss_expiration_count 1.007357 2023-04-27 08:27:06.923391 passed all 1 test case(s) 2023-04-27 08:27:06 ./run-tests.py scan_random_mac_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_random_mac_connected 1/1 Test: Random MAC address in scans while connected Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS scan_random_mac_connected 1.557658 2023-04-27 08:27:08.891646 passed all 1 test case(s) 2023-04-27 08:27:08 ./run-tests.py sigma_dut_ap_dpp_tcp_enrollee_init DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_dpp_tcp_enrollee_init 1/1 Test: sigma_dut DPP AP as TCP Enrollee/initiator Skip test case: sigma_dut not available SKIP sigma_dut_ap_dpp_tcp_enrollee_init 0.200032 2023-04-27 08:27:09.506050 passed all 0 test case(s) skipped 1 test case(s) 2023-04-27 08:27:09 ./run-tests.py sigma_dut_ap_ent_ft_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_ent_ft_eap 1/1 Test: sigma_dut controlled AP WPA-EAP and FT-EAP Skip test case: sigma_dut not available SKIP sigma_dut_ap_ent_ft_eap 0.204015 2023-04-27 08:27:10.118750 passed all 0 test case(s) skipped 1 test case(s) 2023-04-27 08:27:10 ./run-tests.py sigma_dut_ap_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_vht40 1/1 Test: sigma_dut controlled AP and VHT40 Skip test case: sigma_dut not available SKIP sigma_dut_ap_vht40 0.195615 2023-04-27 08:27:10.722097 passed all 0 test case(s) skipped 1 test case(s) 2023-04-27 08:27:10 ./run-tests.py sigma_dut_client_privacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_client_privacy 1/1 Test: sigma_dut client privacy Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_client_privacy 0.584985 2023-04-27 08:27:11.711921 passed all 0 test case(s) skipped 1 test case(s) 2023-04-27 08:27:11 ./run-tests.py sigma_dut_dpp_incompatible_roles_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_incompatible_roles_resp 1/1 Test: sigma_dut DPP roles incompatible (Responder) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_incompatible_roles_resp 0.120006 2023-04-27 08:27:12.242691 passed all 0 test case(s) skipped 1 test case(s) 2023-04-27 08:27:12 ./run-tests.py sigma_dut_dpp_pkexv2_init_fallback_to_v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_pkexv2_init_fallback_to_v1 1/1 Test: sigma_dut DPP/PKEXv2 initiator and fallback to v1 Skip test case: DPP version 3 not supported SKIP sigma_dut_dpp_pkexv2_init_fallback_to_v1 0.125797 2023-04-27 08:27:12.778530 passed all 0 test case(s) skipped 1 test case(s) 2023-04-27 08:27:12 ./run-tests.py suite_b_192_rsa_ecdhe_radius_rsa2048_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_ecdhe_radius_rsa2048_client 1/1 Test: Suite B 192-bit level and RSA (ECDHE) and RSA2048 client Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_ecdhe_radius_rsa2048_client 1.617274 2023-04-27 08:27:14.808871 passed all 1 test case(s) 2023-04-27 08:27:14 ./run-tests.py tnc_fast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_fast 1/1 Test: TNC FAST Starting AP wlan3 Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 531, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_tnc.py", line 194, in test_tnc_fast dev[0].wait_connected(timeout=10) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1426, in wait_connected raise Exception(error) Exception: Connection timed out FAIL tnc_fast 10.634905 2023-04-27 08:27:25.849953 passed 0 test case(s) skipped 0 test case(s) failed tests: tnc_fast 2023-04-27 08:27:25 ./run-tests.py wep_shared_key_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_shared_key_auth 1/1 Test: WEP Shared Key authentication Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS wep_shared_key_auth 1.696917 2023-04-27 08:27:27.957851 passed all 1 test case(s) 2023-04-27 08:27:28 ./run-tests.py wpa2_ocv_vht80plus80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_vht80plus80 1/1 Test: OCV with VHT80+80 channel Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wpa2_ocv_vht80plus80 19.12557 2023-04-27 08:27:47.494445 passed all 1 test case(s) 2023-04-27 08:27:47 ./run-tests.py wpas_ctrl_dup_network_global DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_dup_network_global 1/1 Test: wpa_supplicant ctrl_iface DUP_NETWORK (global) Starting AP wlan3 Connect STA wlan0 to AP PASS wpas_ctrl_dup_network_global 1.138944 2023-04-27 08:27:49.047284 passed all 1 test case(s) 2023-04-27 08:27:49 ./run-tests.py wpas_ctrl_get_capability DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_get_capability 1/1 Test: wpa_supplicant ctrl_iface GET_CAPABILITY GET_CAPABILITY key_mgmt iftype=STATION: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=AP_VLAN: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=AP: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=P2P_GO: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=P2P_CLIENT: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=P2P_DEVICE: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=MESH: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=IBSS: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=NAN: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=UNKNOWN: None PASS wpas_ctrl_get_capability 0.120321 2023-04-27 08:27:49.578457 passed all 1 test case(s) 2023-04-27 08:27:49 ./run-tests.py wpas_ctrl_set_lci_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_lci_errors 1/1 Test: wpa_supplicant SET lci error cases PASS wpas_ctrl_set_lci_errors 0.120519 2023-04-27 08:27:50.111661 passed all 1 test case(s) 2023-04-27 08:27:50 ./run-tests.py wpas_ctrl_vendor_test DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_vendor_test 1/1 Test: wpas_supplicant and VENDOR test command PASS wpas_ctrl_vendor_test 0.139989 2023-04-27 08:27:50.663499 passed all 1 test case(s) 2023-04-27 08:27:50 ./run-tests.py wps_ext_cred_proto_encr_type_missing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_encr_type_missing 1/1 Test: WPS and Credential: Encr Type missing Starting AP wlan3 PASS wps_ext_cred_proto_encr_type_missing 1.171196 2023-04-27 08:27:52.241763 passed all 1 test case(s) 2023-04-27 08:27:52 ./run-tests.py wps_ext_cred_proto_network_key_missing_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_network_key_missing_open 1/1 Test: WPS and Credential: Network Key missing (open) Starting AP wlan3 PASS wps_ext_cred_proto_network_key_missing_open 1.159323 2023-04-27 08:27:53.808274 passed all 1 test case(s) 2023-04-27 08:27:53 ./run-tests.py wps_ext_proto_ack_m3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3 1/1 Test: WPS and ACK M3 Starting AP wlan3 PASS wps_ext_proto_ack_m3 1.277484 2023-04-27 08:27:55.490429 passed all 1 test case(s) 2023-04-27 08:27:55 ./run-tests.py wps_ext_proto_ack_m3_no_r_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3_no_r_nonce 1/1 Test: WPS and ACK M3 missing R-Nonce Starting AP wlan3 PASS wps_ext_proto_ack_m3_no_r_nonce 1.27656 2023-04-27 08:27:57.181874 passed all 1 test case(s) 2023-04-27 08:27:57 ./stop.sh