group: group-14, test: group-14 2024-06-01 05:04:51 export USER=root 2024-06-01 05:04:51 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2024-06-01 05:05:54 ./start.sh 2024-06-01 05:05:56 ./run-tests.py ap_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs 1/1 Test: Automatic channel selection Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_acs 22.230605 2024-06-01 05:06:34.189121 passed all 1 test case(s) 2024-06-01 05:06:34 ./run-tests.py ap_acs_40mhz_plus_or_minus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_40mhz_plus_or_minus 1/1 Test: Automatic channel selection for 40 MHz channel (plus or minus) Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_acs_40mhz_plus_or_minus 28.024168 2024-06-01 05:07:15.482326 passed all 1 test case(s) 2024-06-01 05:07:15 ./run-tests.py ap_bss_add_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_many 1/1 Test: Large number of BSS add operations with hostapd Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-0 Starting BSS phy=phy3 ifname=wlan3-1 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Starting BSS phy=phy3 ifname=wlan3-4 Starting BSS phy=phy3 ifname=wlan3-5 Starting BSS phy=phy3 ifname=wlan3-6 Starting BSS phy=phy3 ifname=wlan3-7 Starting BSS phy=phy3 ifname=wlan3-8 Starting BSS phy=phy3 ifname=wlan3-9 Starting BSS phy=phy3 ifname=wlan3-10 Starting BSS phy=phy3 ifname=wlan3-11 Starting BSS phy=phy3 ifname=wlan3-12 Starting BSS phy=phy3 ifname=wlan3-13 Starting BSS phy=phy3 ifname=wlan3-14 Starting BSS phy=phy3 ifname=wlan3-15 Connect STA wlan0 to AP Connect STA wlan0 to AP Removing BSS wlan3-0 Connect STA wlan0 to AP Removing BSS wlan3-1 Connect STA wlan0 to AP Removing BSS wlan3-2 Connect STA wlan0 to AP Removing BSS wlan3-3 Connect STA wlan0 to AP Removing BSS wlan3-4 Connect STA wlan0 to AP Removing BSS wlan3-5 Connect STA wlan0 to AP Removing BSS wlan3-6 Connect STA wlan0 to AP Removing BSS wlan3-7 Connect STA wlan0 to AP Removing BSS wlan3-8 Connect STA wlan0 to AP Removing BSS wlan3-9 Connect STA wlan0 to AP Removing BSS wlan3-10 Connect STA wlan0 to AP Removing BSS wlan3-11 Connect STA wlan0 to AP Removing BSS wlan3-12 Connect STA wlan0 to AP Removing BSS wlan3-13 Connect STA wlan0 to AP Removing BSS wlan3-14 Connect STA wlan0 to AP Removing BSS wlan3-15 PASS ap_bss_add_many 27.597894 2024-06-01 05:08:00.434105 passed all 1 test case(s) 2024-06-01 05:08:00 ./run-tests.py ap_config_set_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_config_set_errors 1/1 Test: hostapd configuration parsing errors Starting AP wlan3 hs20_conn_capab limit at 16380 PASS ap_config_set_errors 19.918508 2024-06-01 05:08:33.700698 passed all 1 test case(s) 2024-06-01 05:08:33 ./run-tests.py ap_csa_1_switch_count_0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_1_switch_count_0 1/1 Test: AP Channel Switch, one switch with count 0 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_1_switch_count_0 18.332415 2024-06-01 05:09:05.393363 passed all 1 test case(s) 2024-06-01 05:09:05 ./run-tests.py ap_csa_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_invalid 1/1 Test: AP Channel Switch - invalid channel Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_invalid 14.107902 2024-06-01 05:09:32.750954 passed all 1 test case(s) 2024-06-01 05:09:32 ./run-tests.py ap_ft_ap_oom7b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom7b 1/1 Test: WPA2-PSK-FT and AP OOM 7b Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom7b 19.863798 2024-06-01 05:10:05.897698 passed all 1 test case(s) 2024-06-01 05:10:05 ./run-tests.py ap_ft_many_vlan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_many_vlan 1/1 Test: WPA2-PSK-FT AP with VLAN multiple times Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP PASS ap_ft_many_vlan 61.374069 2024-06-01 05:11:20.492801 passed all 1 test case(s) 2024-06-01 05:11:20 ./run-tests.py ap_ft_pmf_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_bip_gmac_256 1/1 Test: WPA2-PSK-FT AP with PMF/BIP-GMAC-256 Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf_bip_gmac_256 19.869585 2024-06-01 05:11:53.620063 passed all 1 test case(s) 2024-06-01 05:11:53 ./run-tests.py ap_ft_sae_ext_key_19_over_ds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_ext_key_19_over_ds 1/1 Test: WPA2-FT-SAE-EXT-KEY AP over DS (group 19) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_sae_ext_key_19_over_ds 19.739975 2024-06-01 05:12:26.596334 passed all 1 test case(s) 2024-06-01 05:12:26 ./run-tests.py ap_hs20_anqp_invalid_gas_response DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_anqp_invalid_gas_response 1/1 Test: Hotspot 2.0 network selection and invalid GAS response Starting AP wlan3 ANQP: Unexpected Advertisement Protocol in response ANQP: Invalid element length for Info ID 1234 PASS ap_hs20_anqp_invalid_gas_response 18.889691 2024-06-01 05:12:58.714917 passed all 1 test case(s) 2024-06-01 05:12:58 ./run-tests.py ap_hs20_auto_interworking_no_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_no_match 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 and no matching network Starting AP wlan3 Connect STA wlan0 to AP start ping ping done start ping ping done start ping ping done start ping ping done start ping ping done PASS ap_hs20_auto_interworking_no_match 14.156159 2024-06-01 05:13:26.150060 passed all 1 test case(s) 2024-06-01 05:13:26 ./run-tests.py ap_hs20_connect_no_full_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_connect_no_full_match 1/1 Test: Hotspot 2.0 connection and no full match Starting AP wlan3 Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 1407, in test_ap_hs20_connect_no_full_match interworking_connect(dev[0], bssid, "TTLS") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 147, in interworking_connect interworking_auth(dev, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 156, in interworking_auth dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1437, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_connect_no_full_match 33.682051 2024-06-01 05:14:13.091420 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_connect_no_full_match 2024-06-01 05:14:13 ./run-tests.py ap_hs20_interworking_select_blocking_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_interworking_select_blocking_scan 1/1 Test: Ongoing INTERWORKING_SELECT blocking SCAN Starting AP wlan3 PASS ap_hs20_interworking_select_blocking_scan 18.263362 2024-06-01 05:14:44.566117 passed all 1 test case(s) 2024-06-01 05:14:44 ./run-tests.py ap_hs20_network_preference3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_network_preference3 1/1 Test: Hotspot 2.0 network selection with two credential (one preferred) Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_network_preference3 19.762097 2024-06-01 05:15:17.560791 passed all 1 test case(s) 2024-06-01 05:15:17 ./run-tests.py ap_hs20_proxyarp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_proxyarp 1/1 Test: Hotspot 2.0 and ProxyARP Starting AP wlan3 Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 4415, in test_ap_hs20_proxyarp _test_ap_hs20_proxyarp(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 4328, in _test_ap_hs20_proxyarp interworking_connect(dev[0], bssid, "TTLS") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 147, in interworking_connect interworking_auth(dev, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 156, in interworking_auth dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1437, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_proxyarp 33.733344 2024-06-01 05:16:04.527862 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_proxyarp 2024-06-01 05:16:04 ./run-tests.py ap_hs20_random_mac_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_random_mac_addr 1/1 Test: Hotspot 2.0 connection with random MAC address Starting AP wlan3 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-EAP-CCMP][ESS][HS20] test-hs20 Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 4229, in test_ap_hs20_random_mac_addr interworking_connect(wpas, bssid, "TTLS") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 147, in interworking_connect interworking_auth(dev, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 156, in interworking_auth dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1437, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_random_mac_addr 35.144029 2024-06-01 05:16:52.934216 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_random_mac_addr 2024-06-01 05:16:52 ./run-tests.py ap_multi_bss_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_multi_bss_acs 1/1 Test: hostapd start with a multi-BSS configuration file using ACS Starting AP wlan3 Removing BSS wlan3 Starting interface wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_multi_bss_acs 27.405557 2024-06-01 05:17:33.705265 passed all 1 test case(s) 2024-06-01 05:17:33 ./run-tests.py ap_open_select_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_network 1/1 Test: Open mode connection and SELECT_NETWORK to change network Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_open_select_network 17.397978 2024-06-01 05:18:04.439683 passed all 1 test case(s) 2024-06-01 05:18:04 ./run-tests.py ap_open_tdls_vht160 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht160 1/1 Test: Open AP and two stations using TDLS with VHT 160 Starting AP wlan3 a bytes-like object is required, not 'str' Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_tdls.py", line 522, in test_ap_open_tdls_vht160 if "5490" in r and "DFS" in r: ^^^^^^^^^^^ TypeError: a bytes-like object is required, not 'str' FAIL ap_open_tdls_vht160 21.820774 2024-06-01 05:18:39.585779 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_open_tdls_vht160 2024-06-01 05:18:39 ./run-tests.py ap_pmf_inject_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_inject_assoc 1/1 Test: WPA2-PSK with PMF and Association Request frame injection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_inject_assoc 22.249221 2024-06-01 05:19:15.185107 passed all 1 test case(s) 2024-06-01 05:19:15 ./run-tests.py ap_pmf_sta_sa_query_local_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_local_failure 1/1 Test: WPA2-PSK AP with station using SA Query (local failure) Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_local_failure 18.570867 2024-06-01 05:19:47.034792 passed all 1 test case(s) 2024-06-01 05:19:47 ./run-tests.py ap_roam_signal_level_override DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_signal_level_override 1/1 Test: Roam between two APs based on driver signal level override Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_roam_signal_level_override 20.379787 2024-06-01 05:20:20.746041 passed all 1 test case(s) 2024-06-01 05:20:20 ./run-tests.py ap_tdls_discovery DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_discovery 1/1 Test: WPA2-PSK AP and two stations using TDLS discovery Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_tdls_discovery 19.316212 2024-06-01 05:20:53.363001 passed all 1 test case(s) 2024-06-01 05:20:53 ./run-tests.py ap_vht80_to_24g_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_to_24g_ht 1/1 Test: VHT with 80 MHz channel width reconfigured to 2.4 GHz HT Starting AP wlan3 Country code at the end: 00 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 1307, in test_ap_vht80_to_24g_ht hapd = hostapd.add_ap(apdev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 683, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL ap_vht80_to_24g_ht 22.271412 2024-06-01 05:21:28.987920 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vht80_to_24g_ht 2024-06-01 05:21:29 ./run-tests.py ap_vht_wifi_generation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_wifi_generation 1/1 Test: VHT and wifi_generation Starting AP wlan3 Country code at the end: 00 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 98, in test_ap_vht_wifi_generation hapd = hostapd.add_ap(apdev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 683, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL ap_vht_wifi_generation 22.292659 2024-06-01 05:22:04.555834 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vht_wifi_generation 2024-06-01 05:22:04 ./run-tests.py ap_wds_sta_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wds_sta_open 1/1 Test: Open AP with STA using 4addr mode Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wds_sta_open 19.312394 2024-06-01 05:22:37.094260 passed all 1 test case(s) 2024-06-01 05:22:37 ./run-tests.py ap_wpa2_delayed_m1_m3_retransmission2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_delayed_m1_m3_retransmission2 1/1 Test: Delayed M1+M3 retransmission (change M1 ANonce) Skip test case: Not running under VM SKIP ap_wpa2_delayed_m1_m3_retransmission2 13.265316 2024-06-01 05:23:03.577995 passed all 0 test case(s) skipped 1 test case(s) 2024-06-01 05:23:03 ./run-tests.py ap_wpa2_eap_aka_prime_imsi_identity DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime_imsi_identity 1/1 Test: WPA2-Enterprise connection using EAP-AKA' and imsi_identity Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_prime_imsi_identity 17.220084 2024-06-01 05:23:34.144733 passed all 1 test case(s) 2024-06-01 05:23:34 ./run-tests.py ap_wpa2_eap_assoc_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_assoc_rsn 1/1 Test: WPA2-Enterprise AP and association request RSN IE differences Starting AP wlan3 Starting AP wlan4 Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP Extra PMKIDCount field in RSN IE Connect STA wlan0 to AP Extra Group Management Cipher Suite in RSN IE Connect STA wlan0 to AP Extra undefined extension field in RSN IE Connect STA wlan0 to AP RSN IE without RSN Capabilities Connect STA wlan0 to AP RSN IE without AKM Connect STA wlan0 to AP RSN IE without pairwise Connect STA wlan0 to AP RSN IE without group Connect STA wlan0 to AP Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP Group management cipher included in assoc req RSN IE Connect STA wlan0 to AP Invalid group cipher Connect STA wlan0 to AP Invalid pairwise cipher Connect STA wlan0 to AP Management frame protection not enabled Connect STA wlan0 to AP Unsupported management group cipher Connect STA wlan0 to AP PASS ap_wpa2_eap_assoc_rsn 22.396984 2024-06-01 05:24:09.892314 passed all 1 test case(s) 2024-06-01 05:24:09 ./run-tests.py ap_wpa2_eap_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_in_bridge 1/1 Test: WPA2-EAP and wpas interface in a bridge Starting AP wlan3 Connect STA wlan5 to AP PASS ap_wpa2_eap_in_bridge 19.052361 2024-06-01 05:24:42.238634 passed all 1 test case(s) 2024-06-01 05:24:42 ./run-tests.py ap_wpa2_eap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_oom 1/1 Test: EAP server and OOM Starting AP wlan3 Connect STA wlan0 to AP Pending failures at time of exception: 0:eapol_auth_alloc Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 6165, in test_ap_wpa2_eap_oom dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TLS", File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1153, in connect self.connect_network(id, timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 506, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1437, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_wpa2_eap_oom 36.375881 2024-06-01 05:25:31.933439 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_oom 2024-06-01 05:25:31 ./run-tests.py ap_wpa2_eap_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_psk 1/1 Test: WPA2-Enterprise connection using EAP-PSK Starting AP wlan3 Connect STA wlan0 to AP Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_psk 18.75899 2024-06-01 05:26:04.074554 passed all 1 test case(s) 2024-06-01 05:26:04 ./run-tests.py ap_wpa2_eap_ttls_chap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_chap 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/CHAP Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 1811, in test_ap_wpa2_eap_ttls_chap eap_connect(dev[0], hapd, "TTLS", "chap user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 164, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 226, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_ttls_chap 27.436028 2024-06-01 05:26:44.899992 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_ttls_chap 2024-06-01 05:26:44 ./run-tests.py ap_wpa2_eap_ttls_expired_cert DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_expired_cert 1/1 Test: WPA2-Enterprise using EAP-TTLS and expired certificate Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_expired_cert 17.30406 2024-06-01 05:27:15.743660 passed all 1 test case(s) 2024-06-01 05:27:15 ./run-tests.py ap_wpa2_gtk_initial_rsc_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_initial_rsc_ccmp 1/1 Test: Initial group cipher RSC (CCMP) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_gtk_initial_rsc_ccmp 27.386702 2024-06-01 05:27:56.425510 passed all 1 test case(s) 2024-06-01 05:27:56 ./run-tests.py ap_wpa2_gtk_rekey_request DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_rekey_request 1/1 Test: WPA2-PSK AP and GTK rekey request from multiple stations Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_gtk_rekey_request 17.398651 2024-06-01 05:28:27.131300 passed all 1 test case(s) 2024-06-01 05:28:27 ./run-tests.py ap_wpa2_psk_ap_control_port_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ap_control_port_disabled 1/1 Test: WPA2-PSK AP with nl80211 control port in AP mode disabled Starting AP wlan3 AP driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'FTM_RESPONDER', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] AP driver flags2: ['CONTROL_PORT_RX', 'AP_SME', 'SCAN_MIN_PREQ'] STA driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'FTM_RESPONDER', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] STA driver flags2: ['CONTROL_PORT_RX', 'CONTROL_PORT_TX_STATUS', 'AP_SME', 'SCAN_MIN_PREQ'] Connect STA wlan0 to AP PASS ap_wpa2_psk_ap_control_port_disabled 18.633523 2024-06-01 05:28:59.124478 passed all 1 test case(s) 2024-06-01 05:28:59 ./run-tests.py ap_wpa2_tdls_decline_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_tdls_decline_resp 1/1 Test: Decline TDLS Setup Response Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS PASS ap_wpa2_tdls_decline_resp 16.447028 2024-06-01 05:29:29.079256 passed all 1 test case(s) 2024-06-01 05:29:29 ./run-tests.py ap_wpa_gtk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_gtk_rekey 1/1 Test: WPA-PSK/TKIP AP and GTK rekey enforced by AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa_gtk_rekey 19.839562 2024-06-01 05:30:02.253318 passed all 1 test case(s) 2024-06-01 05:30:02 ./run-tests.py ap_wps_conf_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_pin 1/1 Test: WPS PIN provisioning with configured AP Starting AP wlan3 WPS provisioning step Try to connect from another station using the same PIN PASS ap_wps_conf_pin 34.060567 2024-06-01 05:30:49.576094 passed all 1 test case(s) 2024-06-01 05:30:49 ./run-tests.py ap_wps_conf_pin_gcmp_128 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_pin_gcmp_128 1/1 Test: WPS PIN provisioning with configured AP using GCMP-128 Starting AP wlan3 WPS provisioning step PASS ap_wps_conf_pin_gcmp_128 19.159076 2024-06-01 05:31:21.983709 passed all 1 test case(s) 2024-06-01 05:31:22 ./run-tests.py ap_wps_incorrect_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_incorrect_pin 1/1 Test: WPS PIN provisioning with incorrect PIN Starting AP wlan3 WPS provisioning attempt 1 WPS provisioning attempt 2 wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth PASS ap_wps_incorrect_pin 22.340362 2024-06-01 05:31:57.614626 passed all 1 test case(s) 2024-06-01 05:31:57 ./run-tests.py ap_wps_random_ap_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_random_ap_pin 1/1 Test: WPS registrar using random AP PIN Starting AP wlan3 WPS provisioning step WPS provisioning step with AP PIN disabled WPS provisioning step with AP PIN reset WPS provisioning step after AP PIN timeout WPS provisioning step after AP PIN timeout(2) wlan1: Ignore unexpected status-driver line: ignore_next_local_deauth PASS ap_wps_random_ap_pin 22.35073 2024-06-01 05:32:33.277976 passed all 1 test case(s) 2024-06-01 05:32:33 ./run-tests.py ap_wps_upnp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_upnp 1/1 Test: WPS AP and UPnP operations Starting AP wlan3 PASS ap_wps_upnp 13.746905 2024-06-01 05:33:00.413285 passed all 1 test case(s) 2024-06-01 05:33:00 ./run-tests.py autogo_force_diff_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_force_diff_channel 1/1 Test: P2P autonomous GO and station interface operate on different channels Starting AP wlan3 Connect STA wlan7 to AP Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_p2p_channel.py", line 444, in test_autogo_force_diff_channel wpas.connect("ap-test", key_mgmt="NONE", scan_freq="2412") File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1153, in connect self.connect_network(id, timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 506, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1437, in wait_connected raise Exception(error) Exception: Connection timed out FAIL autogo_force_diff_channel 29.021569 2024-06-01 05:33:42.767850 passed 0 test case(s) skipped 0 test case(s) failed tests: autogo_force_diff_channel 2024-06-01 05:33:42 ./run-tests.py connect_mbssid_open_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_mbssid_open_1 1/1 Test: Connect to transmitting and nontransmitting BSS in open mode Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS connect_mbssid_open_1 14.997396 2024-06-01 05:34:11.166632 passed all 1 test case(s) 2024-06-01 05:34:11 ./run-tests.py dbus_bss_expire DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_bss_expire 1/1 Test: D-Bus Get/Set BSSExpireAge and BSSExpireCount PASS dbus_bss_expire 13.790398 2024-06-01 05:34:38.296680 passed all 1 test case(s) 2024-06-01 05:34:38 ./run-tests.py dbus_connect_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_connect_eap 1/1 Test: D-Bus AddNetwork and connect to EAP network Starting AP wlan3 altsubject: DNS:server.w1.fi altsubject: DNS:server.w1.fi Expected signals not seen Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dbus.py", line 1818, in test_dbus_connect_eap raise Exception("Expected signals not seen") Exception: Expected signals not seen FAIL dbus_connect_eap 32.4635 2024-06-01 05:35:28.109547 passed 0 test case(s) skipped 0 test case(s) failed tests: dbus_connect_eap 2024-06-01 05:35:28 ./run-tests.py dbus_p2p_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_invalid 1/1 Test: D-Bus invalid P2P operations PASS dbus_p2p_invalid 17.377896 2024-06-01 05:36:02.928682 passed all 1 test case(s) 2024-06-01 05:36:02 ./run-tests.py discovery_dev_type_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_dev_type_go 1/1 Test: P2P device discovery with Device Type filter on GO wlan1: Trying to discover peer 02:00:00:00:00:00 PASS discovery_dev_type_go 27.445266 2024-06-01 05:36:47.774424 passed all 1 test case(s) 2024-06-01 05:36:47 ./run-tests.py dpp_ap_config_p256_p521 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p256_p521 1/1 Test: DPP and AP configuration (P-256 + P-521) Starting AP wlan3 Update AP configuration Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p256_p521 19.381751 2024-06-01 05:37:20.489733 passed all 1 test case(s) 2024-06-01 05:37:20 ./run-tests.py dpp_ap_config_p384_p384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p384_p384 1/1 Test: DPP and AP configuration (P-384 + P-384) Starting AP wlan3 Update AP configuration Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p384_p384 19.259658 2024-06-01 05:37:53.066074 passed all 1 test case(s) 2024-06-01 05:37:53 ./run-tests.py dpp_config_dpp_gen_prime256v1_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_prime256v1_prime256v1 1/1 Test: Generate DPP Config Object for DPP network (P-256 + P-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_prime256v1_prime256v1 13.418144 2024-06-01 05:38:19.914203 passed all 1 test case(s) 2024-06-01 05:38:19 ./run-tests.py dpp_config_error_legacy_invalid_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_error_legacy_invalid_psk 1/1 Test: DPP Config Object legacy error - invalid psk_hex dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_error_legacy_invalid_psk 17.476928 2024-06-01 05:38:51.199515 passed all 1 test case(s) 2024-06-01 05:38:51 ./run-tests.py dpp_config_no_signed_connector DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_no_signed_connector 1/1 Test: DPP Config Object error - no signedConnector dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_no_signed_connector 17.537114 2024-06-01 05:39:26.017159 passed all 1 test case(s) 2024-06-01 05:39:26 ./run-tests.py dpp_config_root_not_an_object DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_root_not_an_object 1/1 Test: DPP Config Object error - root not an object dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_root_not_an_object 17.484501 2024-06-01 05:40:00.719874 passed all 1 test case(s) 2024-06-01 05:40:00 ./run-tests.py dpp_controller_rx_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_controller_rx_failure 1/1 Test: DPP Controller RX failure PASS dpp_controller_rx_failure 17.206527 2024-06-01 05:40:31.216533 passed all 1 test case(s) 2024-06-01 05:40:31 ./run-tests.py dpp_pfs_connect_cmd_ap_2_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pfs_connect_cmd_ap_2_sae 1/1 Test: DPP PFS and cfg80211 connect command (PFS not allowed by AP; SAE enabled) Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP Connect STA wlan5 to AP PASS dpp_pfs_connect_cmd_ap_2_sae 15.652483 2024-06-01 05:41:00.171120 passed all 1 test case(s) 2024-06-01 05:41:00 ./run-tests.py dpp_pkex_identifier_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_identifier_mismatch 1/1 Test: DPP and PKEX with different identifiers PASS dpp_pkex_identifier_mismatch 14.419906 2024-06-01 05:41:27.855187 passed all 1 test case(s) 2024-06-01 05:41:27 ./run-tests.py dpp_proto_auth_conf_i_auth_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_i_auth_mismatch 1/1 Test: DPP protocol testing - I-auth mismatch in Auth Conf PASS dpp_proto_auth_conf_i_auth_mismatch 17.367977 2024-06-01 05:41:58.549802 passed all 1 test case(s) 2024-06-01 05:41:58 ./run-tests.py dpp_push_button_unsupported_ap_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_push_button_unsupported_ap_conf 1/1 Test: DPP push button and unsupported AP configuration Starting AP wlan3 PASS dpp_push_button_unsupported_ap_conf 116.74114 2024-06-01 05:44:12.508068 passed all 1 test case(s) 2024-06-01 05:44:12 ./run-tests.py dpp_qr_code_chan_list_broadcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_chan_list_broadcast 1/1 Test: DPP QR Code and some 2.4 GHz channels (broadcast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_chan_list_broadcast 18.308159 2024-06-01 05:44:48.113069 passed all 1 test case(s) 2024-06-01 05:44:48 ./run-tests.py dpp_qr_code_parsing_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_parsing_fail 1/1 Test: DPP QR Code parsing local failure PASS dpp_qr_code_parsing_fail 17.331609 2024-06-01 05:45:22.690410 passed all 1 test case(s) 2024-06-01 05:45:22 ./run-tests.py dpp_tcp_mutual_hostapd_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_mutual_hostapd_conf 1/1 Test: DPP over TCP (mutual, hostapd as Configurator) Starting AP wlan3 PASS dpp_tcp_mutual_hostapd_conf 17.187401 2024-06-01 05:45:53.183928 passed all 1 test case(s) 2024-06-01 05:45:53 ./run-tests.py eap_canned_success_before_method DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_canned_success_before_method 1/1 Test: EAP protocol tests for canned EAP-Success before any method Starting AP wlan3 Connect STA wlan0 to AP PASS eap_canned_success_before_method 14.162148 2024-06-01 05:46:20.618200 passed all 1 test case(s) 2024-06-01 05:46:20 ./run-tests.py eap_proto_psk_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_psk_server 1/1 Test: EAP-PSK protocol testing for the server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_psk_server 19.512945 2024-06-01 05:46:53.382557 passed all 1 test case(s) 2024-06-01 05:46:53 ./run-tests.py eap_teap_eap_mschapv2_pac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_pac 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and PAC provisioning Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_eap.py", line 202, in test_eap_teap_eap_mschapv2_pac eap_connect(dev[0], hapd, "TEAP", "user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 164, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 226, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL eap_teap_eap_mschapv2_pac 27.288251 2024-06-01 05:47:33.890934 passed 0 test case(s) skipped 0 test case(s) failed tests: eap_teap_eap_mschapv2_pac 2024-06-01 05:47:33 ./run-tests.py eap_teap_eap_mschapv2_separate_result DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_separate_result 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and separate message for Result TLV Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_eap.py", line 232, in test_eap_teap_eap_mschapv2_separate_result eap_connect(dev[0], hapd, "TEAP", "user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 164, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 226, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL eap_teap_eap_mschapv2_separate_result 27.23432 2024-06-01 05:48:18.419239 passed 0 test case(s) skipped 0 test case(s) failed tests: eap_teap_eap_mschapv2_separate_result 2024-06-01 05:48:18 ./run-tests.py eap_teap_peer_outer_tlvs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_peer_outer_tlvs 1/1 Test: EAP-TEAP with peer Outer TLVs Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_eap.py", line 191, in test_eap_teap_peer_outer_tlvs eap_connect(dev[0], hapd, "TEAP", "user", File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 164, in eap_connect eap_check_auth(dev, method, True, sha256=sha256, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 226, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL eap_teap_peer_outer_tlvs 27.311815 2024-06-01 05:48:58.994432 passed 0 test case(s) skipped 0 test case(s) failed tests: eap_teap_peer_outer_tlvs 2024-06-01 05:48:59 ./run-tests.py eht_mld_and_mlds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_mld_and_mlds 1/1 Test: EHT AP MLD and multiple non-AP MLDs Adding link on: ifname=wlan7 Connect STA wlan8 to AP Connection timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_eht.py", line 1735, in test_eht_mld_and_mlds wpas.connect(ssid, sae_password=password, scan_freq="2412", File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1153, in connect self.connect_network(id, timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 506, in connect_network self.wait_connected(timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1437, in wait_connected raise Exception(error) Exception: Connection timed out FAIL eht_mld_and_mlds 32.371445 2024-06-01 05:49:48.687170 passed 0 test case(s) skipped 0 test case(s) failed tests: eht_mld_and_mlds 2024-06-01 05:49:48 ./run-tests.py fst_ap_ctrl_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ctrl_iface 1/1 Test: FST control interface behavior Starting AP wlan3 (old add_ap argument type) AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1415, in test_fst_ap_ctrl_iface ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 683, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_ap_ctrl_iface 18.471575 2024-06-01 05:50:24.445785 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_ap_ctrl_iface 2024-06-01 05:50:24 ./run-tests.py fst_sta_config_llt_neg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_llt_neg 1/1 Test: FST STA configuration negative LLT kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_llt_neg 18.297392 2024-06-01 05:50:56.412007 passed all 1 test case(s) 2024-06-01 05:50:56 ./run-tests.py fst_sta_session_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_session_request_with_no_session 1/1 Test: FST STA session request with no session Starting AP wlan3 (old add_ap argument type) AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1676, in test_fst_sta_session_request_with_no_session fst_send_unexpected_frame(apdev, test_params, frame_type_session_request, File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 552, in fst_send_unexpected_frame ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 683, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_sta_session_request_with_no_session 22.298778 2024-06-01 05:51:32.040079 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_sta_session_request_with_no_session 2024-06-01 05:51:32 ./run-tests.py fst_sta_tear_down_response_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_tear_down_response_with_no_session 1/1 Test: FST STA tear down response with no session Starting AP wlan3 (old add_ap argument type) AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1702, in test_fst_sta_tear_down_response_with_no_session fst_send_unexpected_frame(apdev, test_params, frame_type_tear_down, False) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 552, in fst_send_unexpected_frame ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 683, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_sta_tear_down_response_with_no_session 18.464063 2024-06-01 05:52:07.791692 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_sta_tear_down_response_with_no_session 2024-06-01 05:52:07 ./run-tests.py gas_comeback_delay_long2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_comeback_delay_long2 1/1 Test: GAS long comeback delay over default STA timeout Starting AP wlan3 PASS gas_comeback_delay_long2 24.013382 2024-06-01 05:52:45.522850 passed all 1 test case(s) 2024-06-01 05:52:45 ./run-tests.py gas_failures DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_failures 1/1 Test: GAS failure cases Starting AP wlan3 Starting AP wlan4 PASS gas_failures 18.858492 2024-06-01 05:53:17.678992 passed all 1 test case(s) 2024-06-01 05:53:17 ./run-tests.py grpform_c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_c 1/1 Test: P2P group formation using PIN and authorized connection (init -> GO) (group iface) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_c 27.327641 2024-06-01 05:53:58.335960 passed all 1 test case(s) 2024-06-01 05:53:58 ./run-tests.py grpform_ext_listen_oper DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_ext_listen_oper 1/1 Test: P2P extended listen timing operations wlan0: Trying to discover peer 02:00:00:00:05:00 wlan5: Trying to discover peer 02:00:00:00:00:00 PASS grpform_ext_listen_oper 18.347265 2024-06-01 05:54:34.022950 passed all 1 test case(s) 2024-06-01 05:54:34 ./run-tests.py grpform_per_sta_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_per_sta_psk 1/1 Test: P2P group formation with per-STA PSKs Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed wlan2: Trying to discover peer 02:00:00:00:00:00 PASS grpform_per_sta_psk 30.766185 2024-06-01 05:55:18.109219 passed all 1 test case(s) 2024-06-01 05:55:18 ./run-tests.py hapd_ctrl_set_accept_mac_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_set_accept_mac_file 1/1 Test: hostapd and SET accept_mac_file ctrl_iface command Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS hapd_ctrl_set_accept_mac_file 19.668907 2024-06-01 05:55:51.109974 passed all 1 test case(s) 2024-06-01 05:55:51 ./run-tests.py hapd_ctrl_vendor_test DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_vendor_test 1/1 Test: hostapd and VENDOR test command Starting AP wlan3 PASS hapd_ctrl_vendor_test 13.714672 2024-06-01 05:56:18.128873 passed all 1 test case(s) 2024-06-01 05:56:18 ./run-tests.py he_prefer_he20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_prefer_he20 1/1 Test: Preference on HE20 over HT20 Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS he_prefer_he20 18.276422 2024-06-01 05:56:49.810399 passed all 1 test case(s) 2024-06-01 05:56:49 ./run-tests.py macsec_psk_cak_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_cak_mismatch 1/1 Test: MACsec PSK (CAK mismatch) ip macsec: 48: macsec0: protect on validate strict sc off sa off encrypt on send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: da3e163a05290001 on SA 0 offload: off ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether f8:b1:56:ce:16:62 brd ff:ff:ff:ff:ff:ff altname eno1 altname enp0s25 3: wlan0: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 46: veth1@veth0: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether 7e:57:a6:62:87:ce brd ff:ff:ff:ff:ff:ff 47: veth0@veth1: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether da:3e:16:3a:05:29 brd ff:ff:ff:ff:ff:ff 48: macsec0@veth0: mtu 1468 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether da:3e:16:3a:05:29 brd ff:ff:ff:ff:ff:ff wpas0 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=da:3e:16:3a:05:29 PAE KaY status=Not-Active Authenticated=No Secured=No Failed=No Actor Priority=255 Key Server Priority=0 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=da:3e:16:3a:05:29@1 key_server_sci=00:00:00:00:00:00@0 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=d06387f131eaa8a5d3f39abd mn=0 active=No participant=No retain=No live_peers=0 potential_peers=0 is_key_server=Yes is_elected=No uuid=c02a8aa0-8131-5891-a711-235f9f93291e wpas1 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=7e:57:a6:62:87:ce PAE KaY status=Not-Active Authenticated=No Secured=No Failed=No Actor Priority=100 Key Server Priority=0 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=7e:57:a6:62:87:ce@1 key_server_sci=00:00:00:00:00:00@0 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=9635620b17b92954fce37e35 mn=0 active=No participant=No retain=No live_peers=0 potential_peers=0 is_key_server=Yes is_elected=No uuid=c02a8aa0-8131-5891-a711-235f9f93291e wpas0 STATUS-DRIVER: ifname=veth0 ifi=48 parent_ifname=macsec0 parent_ifi=47 wpas1 STATUS-DRIVER: ifname=veth1 ifi=49 parent_ifname=macsec1 parent_ifi=46 PASS macsec_psk_cak_mismatch 26.713732 2024-06-01 05:57:33.881437 passed all 1 test case(s) 2024-06-01 05:57:33 ./run-tests.py mesh_secure_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp 1/1 Test: Secure mesh with GCMP PASS mesh_secure_gcmp 18.767947 2024-06-01 05:58:06.007403 passed all 1 test case(s) 2024-06-01 05:58:06 ./run-tests.py mesh_wpa_auth_init_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_wpa_auth_init_oom 1/1 Test: Secure mesh network setup failing due to wpa_init() OOM PASS mesh_wpa_auth_init_oom 13.558984 2024-06-01 05:58:32.861418 passed all 1 test case(s) 2024-06-01 05:58:32 ./run-tests.py multi_ap_wps_split_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split_mixed 1/1 Test: WPS on split fronthaul and backhaul AP with mixed-mode fronthaul Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split_mixed 27.500034 2024-06-01 05:59:13.899032 passed all 1 test case(s) 2024-06-01 05:59:13 ./run-tests.py nan_usd_publish_multi_chan_solicited DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nan_usd_publish_multi_chan_solicited 1/1 Test: NAN USD Publish - multi channel - solicited Skip test case: NAN USD not supported SKIP nan_usd_publish_multi_chan_solicited 13.219479 2024-06-01 05:59:40.409195 passed all 0 test case(s) skipped 1 test case(s) 2024-06-01 05:59:40 ./run-tests.py owe_group_negotiation_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_group_negotiation_connect_cmd 1/1 Test: Opportunistic Wireless Encryption and group negotiation (connect command) Starting AP wlan3 Connect STA wlan5 to AP PASS owe_group_negotiation_connect_cmd 18.207386 2024-06-01 06:00:12.580932 passed all 1 test case(s) 2024-06-01 06:00:12 ./run-tests.py p2p_autogo_pref_chan_disallowed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_autogo_pref_chan_disallowed 1/1 Test: P2P channel selection: GO preferred channels are disallowed Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 PASS p2p_autogo_pref_chan_disallowed 18.322396 2024-06-01 06:00:48.248048 passed all 1 test case(s) 2024-06-01 06:00:48 ./run-tests.py p2p_device_grpform2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_grpform2 1/1 Test: P2P group formation with driver using cfg80211 P2P Device (reverse) Start GO negotiation wlan7 -> wlan0 wlan0: Trying to discover peer 42:00:00:00:0b:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Group formed PASS p2p_device_grpform2 18.231462 2024-06-01 06:01:23.754974 passed all 1 test case(s) 2024-06-01 06:01:23 ./run-tests.py p2ps_connect_p2p_device_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_p2p_device_no_group_iface 1/1 Test: P2PS connection using cfg80211 P2P Device (no separate group interface) PASS p2ps_connect_p2p_device_no_group_iface 18.296077 2024-06-01 06:01:59.302558 passed all 1 test case(s) 2024-06-01 06:01:59 ./run-tests.py p2ps_feature_capability_mac_udp_nonautoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_feature_capability_mac_udp_nonautoaccept 1/1 Test: P2PS PD Feature Capability CPT: advertiser MAC:UDP, seeker UDP:MAC, nonautoaccept PASS p2ps_feature_capability_mac_udp_nonautoaccept 18.293112 2024-06-01 06:02:34.942246 passed all 1 test case(s) 2024-06-01 06:02:34 ./run-tests.py p2ps_feature_capability_udp_mac_autoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_feature_capability_udp_mac_autoaccept 1/1 Test: P2PS PD Feature Capability CPT: advertiser UDP:MAC, seeker MAC:UDP, autoaccept PASS p2ps_feature_capability_udp_mac_autoaccept 18.26118 2024-06-01 06:03:10.578850 passed all 1 test case(s) 2024-06-01 06:03:10 ./run-tests.py pasn_fils_sha384_kdk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha384_kdk 1/1 Test: Station authentication with FILS-SHA384 with KDK derivation during connection Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 2798e59827442f5da466e2786be18185 KDK: 5995e6d4bb1dc2f0367b635d4feae2cd5d9b9f13d11bc89c4539bad0ed117247 ap : TK: 2798e59827442f5da466e2786be18185 KDK: 5995e6d4bb1dc2f0367b635d4feae2cd5d9b9f13d11bc89c4539bad0ed117247 sta: TK: 50d13bef5ae2c205206556f36574d569 KDK: 9ed625c52897a96dfc84d1926cf85d683746e1fe110faf12981636ad8c80410e ap : TK: 50d13bef5ae2c205206556f36574d569 KDK: 9ed625c52897a96dfc84d1926cf85d683746e1fe110faf12981636ad8c80410e PASS pasn_fils_sha384_kdk 18.284238 2024-06-01 06:03:46.314327 passed all 1 test case(s) 2024-06-01 06:03:46 ./run-tests.py pasn_fils_sha384_pmksa_cache DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha384_pmksa_cache 1/1 Test: PASN authentication with FILS-SHA384 with PMKSA caching Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP sta: TK: c5e97c60aa93652e25cf388fc286040d KDK: ap : TK: c5e97c60aa93652e25cf388fc286040d KDK: PASS pasn_fils_sha384_pmksa_cache 18.315452 2024-06-01 06:04:21.964366 passed all 1 test case(s) 2024-06-01 06:04:22 ./run-tests.py pasn_owe_kdk_secure_ltf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_owe_kdk_secure_ltf 1/1 Test: Station authentication with OWE AP with KDK derivation during connection based on Secure LTF support Starting AP wlan3 Connect STA wlan5 to AP sta: TK: af956bb76cb43183ccc5ab7f5c05aed7 KDK: bc814742e9f767b829ed5391e0ea7b245f1d7be6eab0c413e295698a9ea9fb27 ap : TK: af956bb76cb43183ccc5ab7f5c05aed7 KDK: bc814742e9f767b829ed5391e0ea7b245f1d7be6eab0c413e295698a9ea9fb27 PASS pasn_owe_kdk_secure_ltf 18.239269 2024-06-01 06:04:57.480566 passed all 1 test case(s) 2024-06-01 06:04:57 ./run-tests.py persistent_group2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group2 1/1 Test: P2P persistent group formation with reverse roles Form a persistent group Start GO negotiation wlan1 -> wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group PASS persistent_group2 22.496954 2024-06-01 06:05:33.281020 passed all 1 test case(s) 2024-06-01 06:05:33 ./run-tests.py prefer_ht20_during_roam DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START prefer_ht20_during_roam 1/1 Test: Preference on HT20 over no-HT in roaming consideration Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS prefer_ht20_during_roam 17.275221 2024-06-01 06:06:03.843303 passed all 1 test case(s) 2024-06-01 06:06:03 ./run-tests.py prefer_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START prefer_vht40 1/1 Test: Preference on VHT40 over HT40 Starting AP wlan3 Country code at the end: 00 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 1125, in test_prefer_vht40 hapd = hostapd.add_ap(apdev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 683, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL prefer_vht40 22.281963 2024-06-01 06:06:39.398488 passed 0 test case(s) skipped 0 test case(s) failed tests: prefer_vht40 2024-06-01 06:06:39 ./run-tests.py radius_acct_ipaddr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_ipaddr 1/1 Test: RADIUS Accounting and Framed-IP-Address Starting AP wlan3 Connect STA wlan0 to AP PASS radius_acct_ipaddr 18.318075 2024-06-01 06:07:11.021648 passed all 1 test case(s) 2024-06-01 06:07:11 ./run-tests.py rrm_beacon_req_active_ap_channel_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_ap_channel_oom 1/1 Test: Beacon request - AP Channel Report subelement and OOM Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS rrm_beacon_req_active_ap_channel_oom 18.627573 2024-06-01 06:07:42.901244 passed all 1 test case(s) 2024-06-01 06:07:42 ./run-tests.py rrm_ftm_range_req_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_ftm_range_req_failure 1/1 Test: hostapd FTM range request failure Starting AP wlan3 (old add_ap argument type) Connect STA wlan1 to AP PASS rrm_ftm_range_req_failure 14.156191 2024-06-01 06:08:10.297249 passed all 1 test case(s) 2024-06-01 06:08:10 ./run-tests.py sae_bignum_failure_unsafe_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_bignum_failure_unsafe_group 1/1 Test: SAE and bignum failure unsafe group Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_bignum_failure_unsafe_group 13.892119 2024-06-01 06:08:37.484491 passed all 1 test case(s) 2024-06-01 06:08:37 ./run-tests.py sae_commit_invalid_scalar_element_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_commit_invalid_scalar_element_sta 1/1 Test: SAE commit invalid scalar/element from STA Starting AP wlan3 Connect STA wlan0 to AP PASS sae_commit_invalid_scalar_element_sta 18.237848 2024-06-01 06:09:09.622386 passed all 1 test case(s) 2024-06-01 06:09:09 ./run-tests.py sae_h2e_rsnxe_mismatch_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_h2e_rsnxe_mismatch_assoc 1/1 Test: SAE H2E and RSNXE mismatch in EAPOL-Key msg 2/4 (assoc) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_h2e_rsnxe_mismatch_assoc 18.26623 2024-06-01 06:09:45.148626 passed all 1 test case(s) 2024-06-01 06:09:45 ./run-tests.py sae_pk_group_19_sae_group_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_group_19_sae_group_20 1/1 Test: SAE-PK with group 19 with SAE group 20 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_group_19_sae_group_20 18.292481 2024-06-01 06:10:20.647073 passed all 1 test case(s) 2024-06-01 06:10:20 ./run-tests.py sae_pwe_group_22 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_22 1/1 Test: SAE PWE derivation options with group 22 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_22 18.296607 2024-06-01 06:10:56.234504 passed all 1 test case(s) 2024-06-01 06:10:56 ./run-tests.py scan_fail_type_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_fail_type_only 1/1 Test: Scan failures for TYPE=ONLY Starting AP wlan3 Connect STA wlan0 to AP PASS scan_fail_type_only 18.187565 2024-06-01 06:11:31.710884 passed all 1 test case(s) 2024-06-01 06:11:31 ./run-tests.py scan_for_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_for_auth 1/1 Test: cfg80211 workaround with scan-for-auth Starting AP wlan3 Connect STA wlan0 to AP PASS scan_for_auth 18.276138 2024-06-01 06:12:07.300430 passed all 1 test case(s) 2024-06-01 06:12:07 ./run-tests.py scan_only_one DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_only_one 1/1 Test: Test that scanning with a single active AP only returns that one Starting AP wlan3 PASS scan_only_one 18.400608 2024-06-01 06:12:42.908127 passed all 1 test case(s) 2024-06-01 06:12:42 ./run-tests.py scan_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_parsing 1/1 Test: Scan result parsing SCAN_RESULTS: bssid / frequency / signal level / flags / ssid 02:ff:00:00:00:02 1234 10 [WEP] test 02:ff:00:00:00:03 0 0 02:ff:00:00:00:04 0 0 02:ff:00:00:00:05 58320 0 [DMG] dmg 02:ff:00:00:00:06 60480 0 [DMG][IBSS] dmg 02:ff:00:00:00:07 62640 0 [DMG][PBSS] dmg 02:ff:00:00:00:08 64800 0 [DMG][ESS] dmg 02:ff:00:00:00:09 2412 1 [WEP][ESS] upd 02:ff:00:00:00:00 0 0 BSS output: id=105 bssid=02:ff:00:00:00:02 freq=1234 beacon_int=102 capabilities=0x1234 qual=10 noise=10 level=10 tsf=1234605616436508552 age=0 ie=000474657374 flags=[WEP] ssid=test snr=10 est_throughput=100 update_idx=173 beacon_ie=000474657374 BSS output: id=106 bssid=02:ff:00:00:00:03 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=173 beacon_ie=0003ffff BSS output: id=107 bssid=02:ff:00:00:00:04 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=00000101 flags= ssid= snr=0 est_throughput=0 update_idx=173 beacon_ie=0000 BSS output: id=108 bssid=02:ff:00:00:00:05 freq=58320 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG] ssid=dmg snr=0 est_throughput=0 update_idx=173 BSS output: id=109 bssid=02:ff:00:00:00:06 freq=60480 beacon_int=0 capabilities=0x0001 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][IBSS] ssid=dmg snr=0 est_throughput=0 update_idx=173 BSS output: id=110 bssid=02:ff:00:00:00:07 freq=62640 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][PBSS] ssid=dmg snr=0 est_throughput=0 update_idx=173 BSS output: id=111 bssid=02:ff:00:00:00:08 freq=64800 beacon_int=0 capabilities=0x0003 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][ESS] ssid=dmg snr=0 est_throughput=0 update_idx=173 BSS output: id=112 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0011 qual=0 noise=0 level=1 tsf=0000000000000000 age=0 ie=0003757064010182 flags=[WEP][ESS] ssid=upd snr=0 est_throughput=0 update_idx=173 BSS output: id=113 bssid=02:ff:00:00:00:00 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=173 Discovered BSSs: ['02:ff:00:00:00:02', '02:ff:00:00:00:03', '02:ff:00:00:00:04', '02:ff:00:00:00:05', '02:ff:00:00:00:06', '02:ff:00:00:00:07', '02:ff:00:00:00:08', '02:ff:00:00:00:09', '02:ff:00:00:00:00'] Update BSS parameters Updated BSS: id=112 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=2 tsf=0000000000000000 age=0 ie=000375706401028204 flags=[IBSS] ssid=upd snr=0 est_throughput=0 update_idx=174 PASS scan_parsing 17.363469 2024-06-01 06:13:14.037840 passed all 1 test case(s) 2024-06-01 06:13:14 ./run-tests.py scan_reqs_with_non_scan_radio_work DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_reqs_with_non_scan_radio_work 1/1 Test: SCAN commands while non-scan radio_work is in progress PASS scan_reqs_with_non_scan_radio_work 21.787409 2024-06-01 06:13:49.233078 passed all 1 test case(s) 2024-06-01 06:13:49 ./run-tests.py sigma_dut_ap_dpp_self_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_dpp_self_config 1/1 Test: sigma_dut DPP AP Configurator using self-configuration Skip test case: sigma_dut not available SKIP sigma_dut_ap_dpp_self_config 17.428829 2024-06-01 06:14:23.911837 passed all 0 test case(s) skipped 1 test case(s) 2024-06-01 06:14:23 ./run-tests.py sigma_dut_dpp_qr_init_configurator_nak_from_uri DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_init_configurator_nak_from_uri 1/1 Test: sigma_dut DPP/QR initiator as Configurator (NAK from URI) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_init_configurator_nak_from_uri 17.38303 2024-06-01 06:14:58.642231 passed all 0 test case(s) skipped 1 test case(s) 2024-06-01 06:14:58 ./run-tests.py sigma_dut_dpp_qr_init_enrollee_configurator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_init_enrollee_configurator 1/1 Test: sigma_dut DPP/QR initiator as Enrollee (to become Configurator) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_init_enrollee_configurator 17.464437 2024-06-01 06:15:33.558307 passed all 0 test case(s) skipped 1 test case(s) 2024-06-01 06:15:33 ./run-tests.py sta_dynamic_down_up DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_down_up 1/1 Test: Dynamically added wpa_supplicant interface down/up Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_dynamic_down_up 17.543596 2024-06-01 06:16:04.465975 passed all 1 test case(s) 2024-06-01 06:16:04 ./run-tests.py wnm_bss_transition_mgmt_query_mbo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_transition_mgmt_query_mbo 1/1 Test: WNM BSS Transition Management query - TM only due to MBO on AP Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_transition_mgmt_query_mbo 14.279359 2024-06-01 06:16:32.162331 passed all 1 test case(s) 2024-06-01 06:16:32 ./run-tests.py wpa2_ocv_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_5ghz 1/1 Test: OCV on 5 GHz Starting AP wlan3 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 86, in test_wpa2_ocv_5ghz run_wpa2_ocv_5ghz(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 97, in run_wpa2_ocv_5ghz hapd, ssid, passphrase = ocv_setup_ap(apdev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 37, in ocv_setup_ap hapd = hostapd.add_ap(apdev, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 683, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL wpa2_ocv_5ghz 23.014822 2024-06-01 06:17:08.529693 passed 0 test case(s) skipped 0 test case(s) failed tests: wpa2_ocv_5ghz 2024-06-01 06:17:08 ./run-tests.py wpa2_ocv_ap_override_eapol_g1_post_enable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_g1_post_enable 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key group msg 1/2 (post enable) Starting AP wlan3 Connect STA wlan0 to AP wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth PASS wpa2_ocv_ap_override_eapol_g1_post_enable 18.390912 2024-06-01 06:17:40.297588 passed all 1 test case(s) 2024-06-01 06:17:40 ./run-tests.py wpas_ap_default_frequency DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_default_frequency 1/1 Test: wpa_supplicant AP mode - default frequency Connect STA wlan1 to AP PASS wpas_ap_default_frequency 18.393857 2024-06-01 06:18:12.043187 passed all 1 test case(s) 2024-06-01 06:18:12 ./run-tests.py wpas_ap_wps_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_wps_disabled 1/1 Test: wpa_supplicant AP mode - WPS disabled Connect STA wlan1 to AP PASS wpas_ap_wps_disabled 18.473617 2024-06-01 06:18:43.950445 passed all 1 test case(s) 2024-06-01 06:18:43 ./run-tests.py wpas_ap_wps_pbc_overlap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_wps_pbc_overlap 1/1 Test: wpa_supplicant AP mode - WPS operations with PBC overlap PASS wpas_ap_wps_pbc_overlap 19.023346 2024-06-01 06:19:16.355749 passed all 1 test case(s) 2024-06-01 06:19:16 ./run-tests.py wpas_ctrl_tdls_discover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_tdls_discover 1/1 Test: wpa_supplicant ctrl_iface tdls_discover PASS wpas_ctrl_tdls_discover 13.294914 2024-06-01 06:19:43.024773 passed all 1 test case(s) 2024-06-01 06:19:43 ./run-tests.py wps_ext_m2_ack_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_ack_invalid 1/1 Test: WPS proto: M2 followed by invalid ACK Starting AP wlan3 PASS wps_ext_m2_ack_invalid 18.386338 2024-06-01 06:20:15.315479 passed all 1 test case(s) 2024-06-01 06:20:15 ./run-tests.py wps_ext_wsc_done_wrong_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_wsc_done_wrong_msg_type 1/1 Test: WPS proto: WSC_Done with wrong Msg Type Starting AP wlan3 PASS wps_ext_wsc_done_wrong_msg_type 17.407608 2024-06-01 06:20:46.145240 passed all 1 test case(s) 2024-06-01 06:20:46 ./stop.sh