group: group-24, test: group-24 2024-12-29 19:17:28 export USER=root 2024-12-29 19:17:28 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2024-12-29 19:18:19 ./start.sh 2024-12-29 19:18:21 ./run-tests.py ap_anqp_no_sharing_missing_info DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_anqp_no_sharing_missing_info 1/1 Test: ANQP no sharing due to missing information Starting AP wlan3 Starting AP wlan4 Normal network selection with shared ANQP results PASS ap_anqp_no_sharing_missing_info 2.268749 2024-12-29 19:18:24.771929 passed all 1 test case(s) 2024-12-29 19:18:24 ./run-tests.py ap_cipher_gcmp_256_group_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_gcmp_256_group_gcmp 1/1 Test: WPA2-PSK/GCMP-256 connection with group cipher override GCMP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_gcmp_256_group_gcmp 1.556638 2024-12-29 19:18:26.608972 passed all 1 test case(s) 2024-12-29 19:18:26 ./run-tests.py ap_cipher_mixed_wpa_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_mixed_wpa_wpa2 1/1 Test: WPA2-PSK/CCMP/ and WPA-PSK/TKIP mixed configuration Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_cipher_mixed_wpa_wpa2 3.261353 2024-12-29 19:18:30.139187 passed all 1 test case(s) 2024-12-29 19:18:30 ./run-tests.py ap_ft_ap_oom2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom2 1/1 Test: WPA2-PSK-FT and AP OOM 2 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom2 4.176041 2024-12-29 19:18:34.582557 passed all 1 test case(s) 2024-12-29 19:18:34 ./run-tests.py ap_ft_reassoc_local_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_reassoc_local_fail 1/1 Test: WPA2-PSK-FT AP Reassociation Request frame and local failure Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_ft_reassoc_local_fail 2.348337 2024-12-29 19:18:37.200714 passed all 1 test case(s) 2024-12-29 19:18:37 ./run-tests.py ap_hs20_fetch_osu_single_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_fetch_osu_single_ssid 1/1 Test: Hotspot 2.0 OSU provider and single SSID Starting AP wlan3 OSU-PROVIDER 02:00:00:00:03:00 uri=https://example.com/osu/ methods=00000002 osu_ssid=HS 2.0 OSU open osu_ssid2=test-hs20 osu_nai2=osen@example.com friendly_name=eng:Test OSU friendly_name=fin:Testi-OSU desc=eng:Example services desc=fin:Esimerkkipalveluja PASS ap_hs20_fetch_osu_single_ssid 5.581798 2024-12-29 19:18:43.052553 passed all 1 test case(s) 2024-12-29 19:18:43 ./run-tests.py ap_hs20_req_home_ois DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_req_home_ois 1/1 Test: Hotspot 2.0 required roaming consortium Starting AP wlan3 Starting AP wlan4 Verify network selection to AP wlan4 Verify network selection to AP wlan3 PASS ap_hs20_req_home_ois 2.820678 2024-12-29 19:18:46.141848 passed all 1 test case(s) 2024-12-29 19:18:46 ./run-tests.py ap_hs20_terms_and_conditions DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_terms_and_conditions 1/1 Test: Hotspot 2.0 Terms and Conditions signaling Starting AP wlan3 Connect STA wlan0 to AP PASS ap_hs20_terms_and_conditions 1.744538 2024-12-29 19:18:48.154406 passed all 1 test case(s) 2024-12-29 19:18:48 ./run-tests.py ap_max_num_sta_no_probe_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_max_num_sta_no_probe_resp 1/1 Test: Maximum STA count and limit on Probe Response frames Starting AP wlan3 Connect STA wlan1 to AP PASS ap_max_num_sta_no_probe_resp 2.183497 2024-12-29 19:18:50.603962 passed all 1 test case(s) 2024-12-29 19:18:50 ./run-tests.py ap_no_auth_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_no_auth_ack 1/1 Test: AP not receiving Authentication frame ACK Starting AP wlan3 PASS ap_no_auth_ack 2.131802 2024-12-29 19:18:53.005216 passed all 1 test case(s) 2024-12-29 19:18:53 ./run-tests.py ap_open_disable_enable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_disable_enable 1/1 Test: AP with open mode getting disabled and re-enabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_disable_enable 4.229893 2024-12-29 19:18:57.505850 passed all 1 test case(s) 2024-12-29 19:18:57 ./run-tests.py ap_pmf_valid_unicast_disassoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_valid_unicast_disassoc 1/1 Test: WPA2-PSK PMF AP sending valid unicast disassoc without dropping SA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_valid_unicast_disassoc 3.204013 2024-12-29 19:19:00.978721 passed all 1 test case(s) 2024-12-29 19:19:01 ./run-tests.py ap_vht_on_24ghz_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_on_24ghz_2 1/1 Test: Subset of VHT features on 2.4 GHz (2) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_vht_on_24ghz_2 2.043794 2024-12-29 19:19:03.293341 passed all 1 test case(s) 2024-12-29 19:19:03 ./run-tests.py ap_wpa2_eap_fast_cipher_suites DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_cipher_suites 1/1 Test: EAP-FAST and different TLS cipher suites Starting AP wlan3 Connect STA wlan0 to AP Testing DHE-RSA-AES128-SHA Connect STA wlan0 to AP Testing RC4-SHA Connect STA wlan0 to AP Allow failure due to missing TLS library support Testing AES128-SHA Connect STA wlan0 to AP Testing AES256-SHA Connect STA wlan0 to AP Testing DHE-RSA-AES256-SHA Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_cipher_suites 3.372088 2024-12-29 19:19:06.934026 passed all 1 test case(s) 2024-12-29 19:19:06 ./run-tests.py ap_wpa2_eap_psk_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_psk_oom 1/1 Test: WPA2-Enterprise connection using EAP-PSK and OOM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_psk_oom 5.770055 2024-12-29 19:19:12.975460 passed all 1 test case(s) 2024-12-29 19:19:13 ./run-tests.py ap_wpa2_eap_pwd_disabled_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_disabled_group 1/1 Test: WPA2-Enterprise connection using disabled EAP-pwd group Group 19 Starting AP wlan3 Connect STA wlan0 to AP Group 21 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_pwd_disabled_group 4.205298 2024-12-29 19:19:17.447889 passed all 1 test case(s) 2024-12-29 19:19:17 ./run-tests.py ap_wpa2_eap_tls_blob_pem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_blob_pem 1/1 Test: WPA2-Enterprise connection using EAP-TLS and config blobs (PEM) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_blob_pem 1.522867 2024-12-29 19:19:19.243913 passed all 1 test case(s) 2024-12-29 19:19:19 ./run-tests.py ap_wpa2_eap_tls_rsa_and_ec DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_rsa_and_ec 1/1 Test: EAP-TLS and both RSA and EC sertificates certificates Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_tls_rsa_and_ec 2.015868 2024-12-29 19:19:21.529747 passed all 1 test case(s) 2024-12-29 19:19:21 ./run-tests.py ap_wpa2_eap_tls_tod_tofu DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_tod_tofu 1/1 Test: EAP-TLS server certificate validation and TOD-TOFU Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_tod_tofu 1.611327 2024-12-29 19:19:23.411928 passed all 1 test case(s) 2024-12-29 19:19:23 ./run-tests.py ap_wpa2_eap_ttls_invalid_phase2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_invalid_phase2 1/1 Test: EAP-TTLS with invalid phase2 parameter values Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_invalid_phase2 2.859247 2024-12-29 19:19:26.540563 passed all 1 test case(s) 2024-12-29 19:19:26 ./run-tests.py ap_wpa2_eap_ttls_server_pkcs12_extra DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_server_pkcs12_extra 1/1 Test: EAP-TTLS and server PKCS#12 file with extra certs Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_server_pkcs12_extra 1.57888 2024-12-29 19:19:28.391314 passed all 1 test case(s) 2024-12-29 19:19:28 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_sta1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_key_id_ptk_rekey_sta1 1/1 Test: Extended Key ID and PTK rekey by station (start with Key ID 0) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ext_key_id_ptk_rekey_sta1 2.551902 2024-12-29 19:19:31.211733 passed all 1 test case(s) 2024-12-29 19:19:31 ./run-tests.py ap_wpa2_psk_supp_proto_too_long_gtk_kde DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_too_long_gtk_kde 1/1 Test: WPA2-PSK supplicant protocol testing: too long GTK KDE Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_too_long_gtk_kde 1.527298 2024-12-29 19:19:33.010719 passed all 1 test case(s) 2024-12-29 19:19:33 ./run-tests.py ap_wpa_psk_ext_eapol DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_psk_ext_eapol 1/1 Test: WPA2-PSK AP using external EAPOL supplicant Starting AP wlan3 Connect STA wlan0 to AP Replay same data back Too short data Send EAPOL-Key msg 2/4(invalid type) Send EAPOL-Key msg 2/4 Replay same data back Send EAPOL-Key msg 4/4 PASS ap_wpa_psk_ext_eapol 1.61945 2024-12-29 19:19:34.899003 passed all 1 test case(s) 2024-12-29 19:19:34 ./run-tests.py ap_wps_er_add_enrollee_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_add_enrollee_uuid 1/1 Test: WPS ER adding a new enrollee identified by UUID Starting AP wlan3 WPS configuration step Start ER Learn AP configuration through UPnP Add a specific Enrollee using ER (PBC/UUID) Add a specific Enrollee using ER (PIN/UUID) Stop ER PASS ap_wps_er_add_enrollee_uuid 23.782551 2024-12-29 19:19:58.952288 passed all 1 test case(s) 2024-12-29 19:19:58 ./run-tests.py ap_wps_er_http_proto_no_sid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_no_sid 1/1 Test: WPS ER HTTP protocol testing - no SID HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: <http://127.0.0.1:49152/event/133060367/1> HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/133060367/1 PASS ap_wps_er_http_proto_no_sid 0.067621 2024-12-29 19:19:59.290648 passed all 1 test case(s) 2024-12-29 19:19:59 ./run-tests.py ap_wps_m2_unknown_opcode2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_unknown_opcode2 1/1 Test: WPS and M2 but unknown opcode (WSC_Start) Starting AP wlan3 PASS ap_wps_m2_unknown_opcode2 2.026281 2024-12-29 19:20:01.587766 passed all 1 test case(s) 2024-12-29 19:20:01 ./run-tests.py ap_wps_upnp_web_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_upnp_web_oom 1/1 Test: hostapd WPS UPnP web OOM Starting AP wlan3 PASS ap_wps_upnp_web_oom 1.0725 2024-12-29 19:20:02.937527 passed all 1 test case(s) 2024-12-29 19:20:02 ./run-tests.py authsrv_errors_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_errors_2 1/1 Test: Authentication server errors (2) Starting AP wlan4 PASS authsrv_errors_2 0.75319 2024-12-29 19:20:03.963901 passed all 1 test case(s) 2024-12-29 19:20:04 ./run-tests.py autogo_passphrase_len DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_passphrase_len 1/1 Test: P2P autonomous GO and longer passphrase Start autonomous GO wlan0 Connect P2P client Try to connect the client to the GO wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected Connect legacy WPS client Connect legacy non-WPS client Connect STA wlan2 to AP PASS autogo_passphrase_len 10.094086 2024-12-29 19:20:14.328950 passed all 1 test case(s) 2024-12-29 19:20:14 ./run-tests.py concurrent_persistent_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_persistent_group 1/1 Test: Concurrent P2P persistent group Connect to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP Run persistent group test while associated to an AP Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group PASS concurrent_persistent_group 13.120917 2024-12-29 19:20:27.722466 passed all 1 test case(s) 2024-12-29 19:20:27 ./run-tests.py dbus_anqp_query_done DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_anqp_query_done 1/1 Test: D-Bus ANQP get test Starting AP wlan3 PASS dbus_anqp_query_done 16.06995 2024-12-29 19:20:44.065827 passed all 1 test case(s) 2024-12-29 19:20:44 ./run-tests.py dbus_p2p_join DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_join 1/1 Test: D-Bus P2P join an autonomous GO Join the group PASS dbus_p2p_join 4.002643 2024-12-29 19:20:48.337209 passed all 1 test case(s) 2024-12-29 19:20:48 ./run-tests.py discovery_listen_find DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_listen_find 1/1 Test: P2P_LISTEN immediately followed by P2P_FIND wlan1: Trying to discover peer 02:00:00:00:00:00 PASS discovery_listen_find 5.973288 2024-12-29 19:20:54.587194 passed all 1 test case(s) 2024-12-29 19:20:54 ./run-tests.py dpp_ap_config_bp512_bp512 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_bp512_bp512 1/1 Test: DPP and AP configuration (BP-512 + BP-512) Starting AP wlan3 Update AP configuration Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_bp512_bp512 3.133894 2024-12-29 19:20:57.991403 passed all 1 test case(s) 2024-12-29 19:20:58 ./run-tests.py dpp_config_dpp_gen_secp521r1_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp521r1_prime256v1 1/1 Test: Generate DPP Config Object for DPP network (P-521 + P-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp521r1_prime256v1 0.187668 2024-12-29 19:20:58.457574 passed all 1 test case(s) 2024-12-29 19:20:58 ./run-tests.py dpp_config_dpp_override_secp521r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_override_secp521r1 1/1 Test: DPP Config Object override (P-521) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_override_secp521r1 0.149432 2024-12-29 19:20:58.874994 passed all 1 test case(s) 2024-12-29 19:20:58 ./run-tests.py dpp_config_jws_error_prot_hdr_unsupported_typ DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_unsupported_typ 1/1 Test: DPP Config Object JWS error - protected header - unsupported typ dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_unsupported_typ 0.144507 2024-12-29 19:20:59.297330 passed all 1 test case(s) 2024-12-29 19:20:59 ./run-tests.py dpp_conn_status_success_hostapd_configurator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_conn_status_success_hostapd_configurator 1/1 Test: DPP connection status - success with hostapd as Configurator Starting AP wlan3 Update AP configuration PASS dpp_conn_status_success_hostapd_configurator 7.415434 2024-12-29 19:21:06.993517 passed all 1 test case(s) 2024-12-29 19:21:07 ./run-tests.py dpp_hostapd_enrollee_gas_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_hostapd_enrollee_gas_timeout 1/1 Test: DPP and hostapd as Enrollee with GAS timeout Starting AP wlan3 PASS dpp_hostapd_enrollee_gas_timeout 3.236678 2024-12-29 19:21:10.504270 passed all 1 test case(s) 2024-12-29 19:21:10 ./run-tests.py dpp_invalid_legacy_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_invalid_legacy_params 1/1 Test: DPP invalid legacy parameters PASS dpp_invalid_legacy_params 0.067838 2024-12-29 19:21:10.839639 passed all 1 test case(s) 2024-12-29 19:21:10 ./run-tests.py dpp_pkex_bp384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_bp384 1/1 Test: DPP and PKEX (BP-384) PASS dpp_pkex_bp384 0.213872 2024-12-29 19:21:11.325302 passed all 1 test case(s) 2024-12-29 19:21:11 ./run-tests.py dpp_proto_auth_resp_no_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_no_r_bootstrap_key 1/1 Test: DPP protocol testing - no R-bootstrap key in Auth Resp PASS dpp_proto_auth_resp_no_r_bootstrap_key 0.224621 2024-12-29 19:21:11.821972 passed all 1 test case(s) 2024-12-29 19:21:11 ./run-tests.py dpp_proto_conf_resp_no_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_resp_no_status 1/1 Test: DPP protocol testing - no Status in Conf Resp PASS dpp_proto_conf_resp_no_status 0.170699 2024-12-29 19:21:12.266274 passed all 1 test case(s) 2024-12-29 19:21:12 ./run-tests.py dpp_push_button_r_hash_mismatch_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_push_button_r_hash_mismatch_ap 1/1 Test: DPP push button - Responder hash mismatch from AP Starting AP wlan3 PASS dpp_push_button_r_hash_mismatch_ap 5.542823 2024-12-29 19:21:18.080622 passed all 1 test case(s) 2024-12-29 19:21:18 ./run-tests.py dpp_qr_code_curve_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_curve_secp384r1 1/1 Test: DPP QR Code and curve secp384r1 dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_curve_secp384r1 0.153494 2024-12-29 19:21:18.505204 passed all 1 test case(s) 2024-12-29 19:21:18 ./run-tests.py dpp_qr_code_no_chan_list_broadcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_no_chan_list_broadcast 1/1 Test: DPP QR Code and no channel list (broadcast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_no_chan_list_broadcast 1.169139 2024-12-29 19:21:19.943835 passed all 1 test case(s) 2024-12-29 19:21:19 ./run-tests.py eap_peap_session_resumption DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_peap_session_resumption 1/1 Test: EAP-PEAP session resumption Starting AP wlan3 Connect STA wlan0 to AP PASS eap_peap_session_resumption 1.623246 2024-12-29 19:21:21.841287 passed all 1 test case(s) 2024-12-29 19:21:21 ./run-tests.py eap_proto_pax_errors_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pax_errors_server 1/1 Test: EAP-PAX local error cases on server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_pax_errors_server 8.76993 2024-12-29 19:21:30.883983 passed all 1 test case(s) 2024-12-29 19:21:30 ./run-tests.py eap_proto_sim_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_sim_errors 1/1 Test: EAP-SIM protocol tests (error paths) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_sim_errors 11.533869 2024-12-29 19:21:42.690759 passed all 1 test case(s) 2024-12-29 19:21:42 ./run-tests.py eap_teap_basic_password_auth_pac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_pac 1/1 Test: EAP-TEAP with Basic-Password-Auth and PAC Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_pac 1.621541 2024-12-29 19:21:44.581483 passed all 1 test case(s) 2024-12-29 19:21:44 ./run-tests.py eap_teap_basic_password_auth_pac_binary DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_pac_binary 1/1 Test: EAP-TEAP with Basic-Password-Auth and PAC (binary) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_pac_binary 1.575401 2024-12-29 19:21:46.426771 passed all 1 test case(s) 2024-12-29 19:21:46 ./run-tests.py eht_mld_non_pref_chan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_mld_non_pref_chan 1/1 Test: EHT MLD with one link. MBO non preferred channels Adding link on: ifname=wlan7 Connect STA wlan8 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy7', 'freq': '2412', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'hw_mode': 'g', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '1', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '1', 'ieee80211be': '1', 'beacon_int': '100', 'dtim_period': '2', 'eht_oper_chwidth': '0', 'eht_oper_centr_freq_seg0_idx': '0', 'num_links': '1', 'link_id': '0', 'link_addr': '02:00:00:52:e9:35', 'he_oper_chwidth': '0', 'he_oper_centr_freq_seg0_idx': '0', 'he_oper_centr_freq_seg1_idx': '0', 'ht_caps_info': '000c', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan7', 'bssid[0]': '02:00:00:52:e9:35', 'ssid[0]': 'mld_ap_one_link_mbo', 'num_sta[0]': '1', 'mld_addr[0]': '02:00:00:00:07:00', 'mld_id[0]': '0', 'mld_link_id[0]': '0'} hostapd STA: {'addr': '02:00:00:00:08:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][MFP][HT][HE][EHT]', 'aid': '1', 'capability': '0x430', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'dot11RSNAStatsSTAAddress': '02:00:00:00:08:00', 'dot11RSNAStatsVersion': '1', 'dot11RSNAStatsSelectedPairwiseCipher': '00-0f-ac-4', 'dot11RSNAStatsTKIPLocalMICFailures': '0', 'dot11RSNAStatsTKIPRemoteMICFailures': '0', 'wpa': '2', 'AKMSuiteSelector': '00-0f-ac-18', 'hostapdWPAPTKState': '11', 'hostapdWPAPTKGroupState': '0', 'hostapdMFPR': '1', 'rx_packets': '5', 'tx_packets': '4', 'rx_bytes': '726', 'tx_bytes': '760', 'inactive_msec': '1', 'signal': '-50', 'rx_rate_info': '0', 'tx_rate_info': '0', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'mbo_cell_capa': '3', 'non_pref_chan[0]': '81:200:1:7', 'non_pref_chan[1]': '81:100:2:9', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f8081008280', 'he_capab': '0178c81a400002bfce0000000000000000fafffaff', 'eht_capab': '07007c0000feffff0701008888880000', 'ht_caps_info': '0x107e', 'ext_capab': '04004a02014000400001', 'peer_addr[0]': 'd6:4a:07:41:47:f5'} valid_links=0x1 active_links=0x1 station status: {'bssid': '02:00:00:00:07:00', 'freq': '0', 'ssid': 'mld_ap_one_link_mbo', 'id': '0', 'mode': 'station', 'wifi_generation': '7', 'pairwise_cipher': 'CCMP', 'group_cipher': 'CCMP', 'key_mgmt': 'OWE', 'pmf': '2', 'mgmt_group_cipher': 'BIP', 'wpa_state': 'COMPLETED', 'p2p_device_address': '02:00:00:00:08:00', 'address': '02:00:00:00:08:00', 'ap_mld_addr': '02:00:00:00:07:00', 'uuid': '75a9ac25-8084-5995-9e1a-dd9a7395af8f', 'bss_max_idle_period': '292'} PASS eht_mld_non_pref_chan 2.163988 2024-12-29 19:21:48.858896 passed all 1 test case(s) 2024-12-29 19:21:48 ./run-tests.py eht_mld_sae_single_link_anti_clogging_token DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_mld_sae_single_link_anti_clogging_token 1/1 Test: EHT MLD AP with MLD client SAE H2E connection using single link and SAE anti-clogging token Adding link on: ifname=wlan7 Connect STA wlan8 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy9', 'freq': '2412', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'hw_mode': 'g', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '1', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '1', 'ieee80211be': '1', 'beacon_int': '100', 'dtim_period': '2', 'eht_oper_chwidth': '0', 'eht_oper_centr_freq_seg0_idx': '0', 'num_links': '1', 'link_id': '0', 'link_addr': '02:00:00:12:6f:40', 'he_oper_chwidth': '0', 'he_oper_centr_freq_seg0_idx': '0', 'he_oper_centr_freq_seg1_idx': '0', 'ht_caps_info': '000c', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan7', 'bssid[0]': '02:00:00:12:6f:40', 'ssid[0]': 'mld_ap_sae_single_link', 'num_sta[0]': '1', 'mld_addr[0]': '02:00:00:00:09:00', 'mld_id[0]': '0', 'mld_link_id[0]': '0'} hostapd STA: {'addr': '02:00:00:00:0a:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][MFP][HT][HE][EHT]', 'aid': '1', 'capability': '0x430', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'dot11RSNAStatsSTAAddress': '02:00:00:00:0a:00', 'dot11RSNAStatsVersion': '1', 'dot11RSNAStatsSelectedPairwiseCipher': '00-0f-ac-4', 'dot11RSNAStatsTKIPLocalMICFailures': '0', 'dot11RSNAStatsTKIPRemoteMICFailures': '0', 'wpa': '2', 'AKMSuiteSelector': '00-0f-ac-8', 'hostapdWPAPTKState': '11', 'hostapdWPAPTKGroupState': '0', 'hostapdMFPR': '1', 'rx_packets': '5', 'tx_packets': '4', 'rx_bytes': '677', 'tx_bytes': '751', 'inactive_msec': '1', 'signal': '-50', 'rx_rate_info': '0', 'tx_rate_info': '0', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'sae_group': '19', 'sae_rejected_groups': '', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f8081008280', 'he_capab': '0178c81a400002bfce0000000000000000fafffaff', 'eht_capab': '07007c0000feffff0701008888880000', 'ht_caps_info': '0x107e', 'ext_capab': '04004a02014000400001', 'peer_addr[0]': '5e:01:34:80:93:3b'} valid_links=0x1 active_links=0x1 station status: {'bssid': '02:00:00:00:09:00', 'freq': '0', 'ssid': 'mld_ap_sae_single_link', 'id': '0', 'mode': 'station', 'wifi_generation': '7', 'pairwise_cipher': 'CCMP', 'group_cipher': 'CCMP', 'key_mgmt': 'SAE', 'pmf': '2', 'mgmt_group_cipher': 'BIP', 'sae_group': '19', 'sae_h2e': '1', 'sae_pk': '0', 'wpa_state': 'COMPLETED', 'p2p_device_address': '02:00:00:00:0a:00', 'address': '02:00:00:00:0a:00', 'ap_mld_addr': '02:00:00:00:09:00', 'uuid': '723340b3-4764-5ef0-9a45-6d330e294a89', 'bss_max_idle_period': '292', 'ssid_verified': '1'} PASS eht_mld_sae_single_link_anti_clogging_token 1.947217 2024-12-29 19:21:51.091006 passed all 1 test case(s) 2024-12-29 19:21:51 ./run-tests.py fst_disconnect_2_of_2_stas_from_non_fst_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_2_of_2_stas_from_non_fst_ap 1/1 Test: FST disconnect 2 of 2 STAs from non-FST AP Starting AP wlan3 (old add_ap argument type) AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 945, in test_fst_disconnect_2_of_2_stas_from_non_fst_ap fst_ap1, fst_ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_disconnect_2_of_2_stas_from_non_fst_ap 5.674824 2024-12-29 19:21:57.052907 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_disconnect_2_of_2_stas_from_non_fst_ap 2024-12-29 19:21:57 ./run-tests.py fst_sta_start_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session 1/1 Test: FST STA start session Starting AP wlan3 (old add_ap argument type) AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1552, in test_fst_sta_start_session fst_start_session(apdev, test_params, bad_param_none, False) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 95, in fst_start_session ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_sta_start_session 5.709528 2024-12-29 19:22:03.064545 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_sta_start_session 2024-12-29 19:22:03 ./run-tests.py gas_anqp_venue_url2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_venue_url2 1/1 Test: GAS/ANQP and Venue URL (hostapd venue_url) Starting AP wlan3 PASS gas_anqp_venue_url2 1.51469 2024-12-29 19:22:04.858212 passed all 1 test case(s) 2024-12-29 19:22:04 ./run-tests.py go_search_non_social DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_search_non_social 1/1 Test: P2P_FIND with freq parameter to scan a single channel Start autonomous GO wlan0 PASS go_search_non_social 2.472123 2024-12-29 19:22:07.620184 passed all 1 test case(s) 2024-12-29 19:22:07 ./run-tests.py grpform_pbc_overlap_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_pbc_overlap_group_iface 1/1 Test: P2P group formation during PBC overlap using group interfaces Starting AP wlan3 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Removing BSS wlan3 PASS grpform_pbc_overlap_group_iface 5.754886 2024-12-29 19:22:13.672566 passed all 1 test case(s) 2024-12-29 19:22:13 ./run-tests.py he80_pwr_constraint DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80_pwr_constraint 1/1 Test: HE with 80 MHz channel width and local power constraint Starting AP wlan3 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 980, in test_he80_pwr_constraint hapd = hostapd.add_ap(apdev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL he80_pwr_constraint 6.654098 2024-12-29 19:22:20.599926 passed 0 test case(s) skipped 0 test case(s) failed tests: he80_pwr_constraint 2024-12-29 19:22:20 ./run-tests.py he80d DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80d 1/1 Test: HE with 80 MHz channel width (HT40- channel 48) Starting AP wlan3 Country code at the end: 00 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 300, in test_he80d he80_test(apdev[0], dev, 48, "[HT40-]") File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 276, in he80_test hapd = hostapd.add_ap(apdev, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL he80d 7.155008 2024-12-29 19:22:28.030907 passed 0 test case(s) skipped 0 test case(s) failed tests: he80d 2024-12-29 19:22:28 ./run-tests.py he_6ghz_security DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_6ghz_security 1/1 Test: HE AP and 6 GHz security parameter validation Starting AP wlan3 PASS he_6ghz_security 0.063268 2024-12-29 19:22:28.379958 passed all 1 test case(s) 2024-12-29 19:22:28 ./run-tests.py ibss_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_open 1/1 Test: IBSS open (no security) wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_open 12.295172 2024-12-29 19:22:40.954992 passed all 1 test case(s) 2024-12-29 19:22:41 ./run-tests.py ieee8021x_reauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_reauth 1/1 Test: IEEE 802.1X and EAPOL_REAUTH request Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_reauth 1.123701 2024-12-29 19:22:42.364179 passed all 1 test case(s) 2024-12-29 19:22:42 ./run-tests.py ieee8021x_reauth_peap2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_reauth_peap2 1/1 Test: IEEE 802.1X and EAPOL_REAUTH request (PEAP and session resumption; Phase 2 auth forced) Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_reauth_peap2 1.507298 2024-12-29 19:22:44.150786 passed all 1 test case(s) 2024-12-29 19:22:44 ./run-tests.py macsec_psk_integ_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_integ_only 1/1 Test: MACsec PSK (integrity only) ip macsec: 22: macsec0: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 6a6a5fd7e3ff0001 on SA 0 offload: off ip link: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 98:90:96:e4:18:ed brd ff:ff:ff:ff:ff:ff altname eno1 altname enp0s25 3: wlan0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: <BROADCAST,MULTICAST> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: <BROADCAST,MULTICAST> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 20: veth1@veth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether e2:98:19:72:a1:bc brd ff:ff:ff:ff:ff:ff 21: veth0@veth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether 6a:6a:5f:d7:e3:ff brd ff:ff:ff:ff:ff:ff 22: macsec0@veth0: <BROADCAST,MULTICAST> mtu 1468 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 6a:6a:5f:d7:e3:ff brd ff:ff:ff:ff:ff:ff wpas0 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=6a:6a:5f:d7:e3:ff PAE KaY status=Not-Active Authenticated=No Secured=No Failed=No Actor Priority=255 Key Server Priority=0 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=6a:6a:5f:d7:e3:ff@1 key_server_sci=00:00:00:00:00:00@0 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=d12d428d924340a9a0658822 mn=0 active=No participant=No retain=No live_peers=0 potential_peers=0 is_key_server=Yes is_elected=No uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 wpas1 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=e2:98:19:72:a1:bc PAE KaY status=Not-Active Authenticated=No Secured=No Failed=No Actor Priority=100 Key Server Priority=0 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=e2:98:19:72:a1:bc@1 key_server_sci=00:00:00:00:00:00@0 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=62baf0ee61ec2a140ba3e8d7 mn=0 active=No participant=No retain=No live_peers=0 potential_peers=0 is_key_server=Yes is_elected=No uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 wpas0 STATUS-DRIVER: ifname=veth0 ifi=22 parent_ifname=macsec0 parent_ifi=21 wpas1 STATUS-DRIVER: ifname=veth1 ifi=23 parent_ifname=macsec1 parent_ifi=20 veth0 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=6a:6a:5f:d7:e3:ff PAE KaY status=Active Authenticated=No Secured=Yes Failed=No Actor Priority=255 Key Server Priority=100 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=1 MKA Hello Time=2000 actor_sci=6a:6a:5f:d7:e3:ff@1 key_server_sci=e2:98:19:72:a1:bc@1 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=d12d428d924340a9a0658822 mn=4 active=Yes participant=No retain=No live_peers=1 potential_peers=0 is_key_server=No is_elected=Yes uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 veth1 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=e2:98:19:72:a1:bc PAE KaY status=Active Authenticated=No Secured=Yes Failed=No Actor Priority=100 Key Server Priority=100 Is Key Server=No Number of Keys Distributed=1 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=e2:98:19:72:a1:bc@1 key_server_sci=e2:98:19:72:a1:bc@1 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=62baf0ee61ec2a140ba3e8d7 mn=3 active=Yes participant=No retain=No live_peers=1 potential_peers=0 is_key_server=Yes is_elected=Yes uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 Expected key server: veth1 wpas0 MIB: dot11RSNAOptionImplemented=TRUE dot11RSNAPreauthenticationImplemented=TRUE dot11RSNAEnabled=FALSE dot11RSNAPreauthenticationEnabled=FALSE dot11RSNAConfigVersion=1 dot11RSNAConfigPairwiseKeysSupported=5 dot11RSNAConfigGroupCipherSize=0 dot11RSNAConfigPMKLifetime=43200 dot11RSNAConfigPMKReauthThreshold=70 dot11RSNAConfigNumberOfPTKSAReplayCounters=1 dot11RSNAConfigSATimeout=60 dot11RSNAAuthenticationSuiteSelected=00-00-00-0 dot11RSNAPairwiseCipherSelected=00-50-f2-0 dot11RSNAGroupCipherSelected=00-50-f2-0 dot11RSNAPMKIDUsed= dot11RSNAAuthenticationSuiteRequested=00-00-00-0 dot11RSNAPairwiseCipherRequested=00-50-f2-0 dot11RSNAGroupCipherRequested=00-50-f2-0 dot11RSNAConfigNumberOfGTKSAReplayCounters=0 dot11RSNA4WayHandshakeFailures=0 dot1xSuppPaeState=9 dot1xSuppHeldPeriod=60 dot1xSuppAuthPeriod=30 dot1xSuppStartPeriod=30 dot1xSuppMaxStart=3 dot1xSuppSuppControlledPortStatus=Authorized dot1xSuppBackendPaeState=2 dot1xSuppEapolFramesRx=0 dot1xSuppEapolFramesTx=0 dot1xSuppEapolStartFramesTx=0 dot1xSuppEapolLogoffFramesTx=0 dot1xSuppEapolRespFramesTx=0 dot1xSuppEapolReqIdFramesRx=0 dot1xSuppEapolReqFramesRx=0 dot1xSuppInvalidEapolFramesRx=0 dot1xSuppEapLengthErrorFramesRx=0 dot1xSuppLastEapolFrameVersion=0 dot1xSuppLastEapolFrameSource=00:00:00:00:00:00 ieee8021XKayMkaPartCKN=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f ieee8021XKayMkaPartCached=false ieee8021XKayMkaPartActive=true ieee8021XKayMkaPartRetain=false ieee8021XKayMkaPartActivateControl=default ieee8021XKayMkaPartPrincipal=true ieee8021XKayMkaPeerListMI=62baf0ee61ec2a140ba3e8d7 ieee8021XKayMkaPeerListMN=4 ieee8021XKayMkaPeerListType=1 ieee8021XKayMkaPeerListSCI=e2:98:19:72:a1:bc@1 wpas1 MIB: dot11RSNAOptionImplemented=TRUE dot11RSNAPreauthenticationImplemented=TRUE dot11RSNAEnabled=FALSE dot11RSNAPreauthenticationEnabled=FALSE dot11RSNAConfigVersion=1 dot11RSNAConfigPairwiseKeysSupported=5 dot11RSNAConfigGroupCipherSize=0 dot11RSNAConfigPMKLifetime=43200 dot11RSNAConfigPMKReauthThreshold=70 dot11RSNAConfigNumberOfPTKSAReplayCounters=1 dot11RSNAConfigSATimeout=60 dot11RSNAAuthenticationSuiteSelected=00-00-00-0 dot11RSNAPairwiseCipherSelected=00-50-f2-0 dot11RSNAGroupCipherSelected=00-50-f2-0 dot11RSNAPMKIDUsed= dot11RSNAAuthenticationSuiteRequested=00-00-00-0 dot11RSNAPairwiseCipherRequested=00-50-f2-0 dot11RSNAGroupCipherRequested=00-50-f2-0 dot11RSNAConfigNumberOfGTKSAReplayCounters=0 dot11RSNA4WayHandshakeFailures=0 dot1xSuppPaeState=9 dot1xSuppHeldPeriod=60 dot1xSuppAuthPeriod=30 dot1xSuppStartPeriod=30 dot1xSuppMaxStart=3 dot1xSuppSuppControlledPortStatus=Authorized dot1xSuppBackendPaeState=2 dot1xSuppEapolFramesRx=0 dot1xSuppEapolFramesTx=0 dot1xSuppEapolStartFramesTx=0 dot1xSuppEapolLogoffFramesTx=0 dot1xSuppEapolRespFramesTx=0 dot1xSuppEapolReqIdFramesRx=0 dot1xSuppEapolReqFramesRx=0 dot1xSuppInvalidEapolFramesRx=0 dot1xSuppEapLengthErrorFramesRx=0 dot1xSuppLastEapolFrameVersion=0 dot1xSuppLastEapolFrameSource=00:00:00:00:00:00 ieee8021XKayMkaPartCKN=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f ieee8021XKayMkaPartCached=false ieee8021XKayMkaPartActive=true ieee8021XKayMkaPartRetain=false ieee8021XKayMkaPartActivateControl=default ieee8021XKayMkaPartPrincipal=true ieee8021XKayMkaPeerListMI=d12d428d924340a9a0658822 ieee8021XKayMkaPeerListMN=5 ieee8021XKayMkaPeerListType=1 ieee8021XKayMkaPeerListSCI=6a:6a:5f:d7:e3:ff@1 wpas0 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=6a:6a:5f:d7:e3:ff PAE KaY status=Active Authenticated=No Secured=Yes Failed=No Actor Priority=255 Key Server Priority=100 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=1 MKA Hello Time=2000 actor_sci=6a:6a:5f:d7:e3:ff@1 key_server_sci=e2:98:19:72:a1:bc@1 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=d12d428d924340a9a0658822 mn=5 active=Yes participant=No retain=No live_peers=1 potential_peers=0 is_key_server=No is_elected=Yes uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 wpas1 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=e2:98:19:72:a1:bc PAE KaY status=Active Authenticated=No Secured=Yes Failed=No Actor Priority=100 Key Server Priority=100 Is Key Server=No Number of Keys Distributed=1 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=e2:98:19:72:a1:bc@1 key_server_sci=e2:98:19:72:a1:bc@1 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=62baf0ee61ec2a140ba3e8d7 mn=4 active=Yes participant=No retain=No live_peers=1 potential_peers=0 is_key_server=Yes is_elected=Yes uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 ip macsec: 22: macsec0: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 6a6a5fd7e3ff0001 on SA 0 0: PN 7, state on, key 62baf0ee61ec2a140ba3e8d701000000 RXSC: e2981972a1bc0001, state on 0: PN 6, state on, key 62baf0ee61ec2a140ba3e8d701000000 offload: off 23: macsec1: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: e2981972a1bc0001 on SA 0 0: PN 6, state on, key 62baf0ee61ec2a140ba3e8d701000000 RXSC: 6a6a5fd7e3ff0001, state on 0: PN 7, state on, key 62baf0ee61ec2a140ba3e8d701000000 offload: off ip macsec: 22: macsec0: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 6a6a5fd7e3ff0001 on SA 0 0: PN 9, state on, key 62baf0ee61ec2a140ba3e8d701000000 RXSC: e2981972a1bc0001, state on 0: PN 8, state on, key 62baf0ee61ec2a140ba3e8d701000000 offload: off 23: macsec1: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: e2981972a1bc0001 on SA 0 0: PN 8, state on, key 62baf0ee61ec2a140ba3e8d701000000 RXSC: 6a6a5fd7e3ff0001, state on 0: PN 9, state on, key 62baf0ee61ec2a140ba3e8d701000000 offload: off PASS macsec_psk_integ_only 9.449975 2024-12-29 19:22:53.886729 passed all 1 test case(s) 2024-12-29 19:22:53 ./run-tests.py mesh_pmksa_caching_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_pmksa_caching_oom 1/1 Test: Secure mesh network and PMKSA caching failing due to OOM PASS mesh_pmksa_caching_oom 3.257103 2024-12-29 19:22:57.427017 passed all 1 test case(s) 2024-12-29 19:22:57 ./run-tests.py mesh_secure_invalid_group_cipher DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_invalid_group_cipher 1/1 Test: Secure mesh and invalid group cipher PASS mesh_secure_invalid_group_cipher 0.505491 2024-12-29 19:22:58.227540 passed all 1 test case(s) 2024-12-29 19:22:58 ./run-tests.py monitor_iface_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START monitor_iface_wpa2_psk 1/1 Test: WPA2-PSK connection using cfg80211 monitor interface on AP Connect STA wlan0 to AP PASS monitor_iface_wpa2_psk 1.768689 2024-12-29 19:23:00.282178 passed all 1 test case(s) 2024-12-29 19:23:00 ./run-tests.py nfc_p2p_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_client 1/1 Test: NFC connection handover when one device is P2P client Start autonomous GOs Connect one device as a P2P client wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected NFC connection handover between P2P client and P2P device Connect to group based on upper layer trigger wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected PASS nfc_p2p_client 6.179441 2024-12-29 19:23:06.744570 passed all 1 test case(s) 2024-12-29 19:23:06 ./run-tests.py nfc_p2p_go_neg_ip_pool_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_go_neg_ip_pool_oom 1/1 Test: NFC connection handover to form a new P2P group and IP pool OOM Perform NFC connection handover Group formed PASS nfc_p2p_go_neg_ip_pool_oom 3.748058 2024-12-29 19:23:10.774134 passed all 1 test case(s) 2024-12-29 19:23:10 ./run-tests.py nfc_p2p_static_handover_tagdev_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_tagdev_client 1/1 Test: NFC static handover to form a new P2P group (NFC Tag device becomes P2P Client) Perform NFC connection handover Group formed PASS nfc_p2p_static_handover_tagdev_client 4.512228 2024-12-29 19:23:15.576860 passed all 1 test case(s) 2024-12-29 19:23:15 ./run-tests.py nfc_wps_er_config_token DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_config_token 1/1 Test: WPS NFC configuration token from ER to Enrollee Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using configuration token from ER PASS nfc_wps_er_config_token 13.380609 2024-12-29 19:23:29.248496 passed all 1 test case(s) 2024-12-29 19:23:29 ./run-tests.py owe_unsupported_group_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_unsupported_group_connect_cmd 1/1 Test: Opportunistic Wireless Encryption and unsupported group using cfg80211 connect command Starting AP wlan3 Connect STA wlan5 to AP PASS owe_unsupported_group_connect_cmd 6.454659 2024-12-29 19:23:35.995435 passed all 1 test case(s) 2024-12-29 19:23:36 ./run-tests.py p2p_service_discovery_upnp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_upnp 1/1 Test: P2P service discovery (UPnP) wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_upnp 1.953104 2024-12-29 19:23:38.243965 passed all 1 test case(s) 2024-12-29 19:23:38 ./run-tests.py p2p_service_discovery_upnp3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_upnp3 1/1 Test: P2P service discovery (UPnP using request helper - no match) wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_upnp3 0.977766 2024-12-29 19:23:39.504481 passed all 1 test case(s) 2024-12-29 19:23:39 ./run-tests.py p2p_service_discovery_ws DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_ws 1/1 Test: P2P service discovery (WS-Discovery) wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_ws 0.905095 2024-12-29 19:23:40.688428 passed all 1 test case(s) 2024-12-29 19:23:40 ./run-tests.py persistent_group_add_cli_chan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_add_cli_chan 1/1 Test: P2P persistent group formation and re-invocation with p2p_add_cli_chan=1 Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group PASS persistent_group_add_cli_chan 12.693019 2024-12-29 19:23:53.668397 passed all 1 test case(s) 2024-12-29 19:23:53 ./run-tests.py pmksa_cache_expiration DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pmksa_cache_expiration 1/1 Test: PMKSA cache entry expiration Starting AP wlan3 Connect STA wlan0 to AP Wait for PMKSA cache entry to expire PASS pmksa_cache_expiration 8.095603 2024-12-29 19:24:02.058654 passed all 1 test case(s) 2024-12-29 19:24:02 ./run-tests.py prefer_eht_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START prefer_eht_20 1/1 Test: EHT AP on a 20 MHz channel Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS prefer_eht_20 6.696944 2024-12-29 19:24:09.038496 passed all 1 test case(s) 2024-12-29 19:24:09 ./run-tests.py radius_acct_failure_oom_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_failure_oom_rsn 1/1 Test: RADIUS Accounting in RSN and failure to add attributes due to OOM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS radius_acct_failure_oom_rsn 16.6542 2024-12-29 19:24:25.972510 passed all 1 test case(s) 2024-12-29 19:24:26 ./run-tests.py sae_mixed_check_mfp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_mixed_check_mfp 1/1 Test: Mixed SAE and non-SAE network with the sae_check_mfp option Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan2 to AP Connect STA wlan1 to AP Connect STA wlan1 to AP PASS sae_mixed_check_mfp 3.477695 2024-12-29 19:24:29.719691 passed all 1 test case(s) 2024-12-29 19:24:29 ./run-tests.py sae_pk_unexpected_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_unexpected_status 1/1 Test: SAE-PK and unexpected status code in commit Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_unexpected_status 3.059283 2024-12-29 19:24:33.049363 passed all 1 test case(s) 2024-12-29 19:24:33 ./run-tests.py sae_pwe_group_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_1 1/1 Test: SAE PWE derivation options with group 1 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_1 2.363467 2024-12-29 19:24:35.689173 passed all 1 test case(s) 2024-12-29 19:24:35 ./run-tests.py sae_pwe_h2e_only_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_h2e_only_ap 1/1 Test: SAE PWE derivation with H2E-only AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_h2e_only_ap 2.018675 2024-12-29 19:24:37.980448 passed all 1 test case(s) 2024-12-29 19:24:38 ./run-tests.py sigma_dut_ap_owe_ecgroupid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_owe_ecgroupid 1/1 Test: sigma_dut controlled AP with OWE and ECGroupID Skip test case: sigma_dut not available SKIP sigma_dut_ap_owe_ecgroupid 0.14242 2024-12-29 19:24:38.392452 passed all 0 test case(s) skipped 1 test case(s) 2024-12-29 19:24:38 ./run-tests.py sigma_dut_ap_sae_pw_id_ft DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_pw_id_ft 1/1 Test: sigma_dut controlled AP with SAE Password Identifier and FT Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_pw_id_ft 0.148633 2024-12-29 19:24:38.825283 passed all 0 test case(s) skipped 1 test case(s) 2024-12-29 19:24:38 ./run-tests.py sigma_dut_dpp_nfc_static_read_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_nfc_static_read_enrollee 1/1 Test: sigma_dut DPP/NFC read tag as Enrollee Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_nfc_static_read_enrollee 1.095658 2024-12-29 19:24:40.192057 passed all 0 test case(s) skipped 1 test case(s) 2024-12-29 19:24:40 ./run-tests.py sigma_dut_dpp_qr_init_configurator_both DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_init_configurator_both 1/1 Test: sigma_dut DPP/QR initiator as Configurator or Enrollee (conf index 1) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_init_configurator_both 0.064164 2024-12-29 19:24:40.534328 passed all 0 test case(s) skipped 1 test case(s) 2024-12-29 19:24:40 ./run-tests.py sigma_dut_dpp_qr_mutual_init_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_mutual_init_enrollee 1/1 Test: sigma_dut DPP/QR (mutual) initiator as Enrollee Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_mutual_init_enrollee 1.057264 2024-12-29 19:24:41.870035 passed all 0 test case(s) skipped 1 test case(s) 2024-12-29 19:24:41 ./run-tests.py sigma_dut_dpp_qr_resp_status_query DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_status_query 1/1 Test: sigma_dut DPP/QR responder status query Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_status_query 1.052225 2024-12-29 19:24:43.193752 passed all 0 test case(s) skipped 1 test case(s) 2024-12-29 19:24:43 ./run-tests.py sigma_dut_dpp_reconfig_no_proto_ver DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_reconfig_no_proto_ver 1/1 Test: sigma_dut DPP reconfiguration (Configurator) - missing Protocol Version Skip test case: sigma_dut not available SKIP sigma_dut_dpp_reconfig_no_proto_ver 0.062929 2024-12-29 19:24:43.535503 passed all 0 test case(s) skipped 1 test case(s) 2024-12-29 19:24:43 ./run-tests.py ssid_hex_encoded DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_hex_encoded 1/1 Test: SSID configuration using hex encoded version Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ssid_hex_encoded 1.843893 2024-12-29 19:24:45.656320 passed all 1 test case(s) 2024-12-29 19:24:45 ./run-tests.py tnc_peap_soh_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_peap_soh_errors 1/1 Test: TNC PEAP-SoH local error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS tnc_peap_soh_errors 2.362595 2024-12-29 19:24:48.292334 passed all 1 test case(s) 2024-12-29 19:24:48 ./run-tests.py wnm_bss_tm_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_rsn 1/1 Test: WNM BSS Transition Management with RSN Starting AP wlan3 Starting AP wlan4 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_wnm.py", line 1418, in test_wnm_bss_tm_rsn hapd2 = start_wnm_ap(apdev[1], country_code="FI", hw_mode="a", ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_wnm.py", line 101, in start_wnm_ap hapd = hostapd.add_ap(apdev, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL wnm_bss_tm_rsn 13.697189 2024-12-29 19:25:02.264873 passed 0 test case(s) skipped 0 test case(s) failed tests: wnm_bss_tm_rsn 2024-12-29 19:25:02 ./run-tests.py wnm_coloc_intf_reporting DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_coloc_intf_reporting 1/1 Test: WNM Collocated Interference Reporting Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_coloc_intf_reporting 1.484842 2024-12-29 19:25:04.026587 passed all 1 test case(s) 2024-12-29 19:25:04 ./run-tests.py wpas_ap_lifetime_in_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_lifetime_in_memory 1/1 Test: wpa_supplicant AP mode and PSK/PTK lifetime in memory Checking keys in memory after network profile configuration Reading process memory (pid=5523) [heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186 [stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296 Total process memory read: 33 bytes Checking keys in memory after AP start Reading process memory (pid=5523) [heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186 [stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296 Total process memory read: 33 bytes Connect STA wlan1 to AP Reading process memory (pid=5523) [heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186 [stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296 Total process memory read: 33 bytes Reading process memory (pid=5523) [heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186 [stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296 Total process memory read: 33 bytes Reading process memory (pid=5523) [heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186 [stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296 Total process memory read: 33 bytes Checking keys in memory while associated Skip test case: PMK not found while associated SKIP wpas_ap_lifetime_in_memory 3.194167 2024-12-29 19:25:07.498546 passed all 0 test case(s) skipped 1 test case(s) 2024-12-29 19:25:07 ./run-tests.py wpas_ap_open_ht_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_open_ht_disabled 1/1 Test: wpa_supplicant AP mode - open network and HT disabled Connect STA wlan1 to AP PASS wpas_ap_open_ht_disabled 1.61298 2024-12-29 19:25:09.384816 passed all 1 test case(s) 2024-12-29 19:25:09 ./run-tests.py wpas_ap_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_sae 1/1 Test: wpa_supplicant AP mode - SAE using psk Connect STA wlan1 to AP PASS wpas_ap_sae 2.09226 2024-12-29 19:25:11.753031 passed all 1 test case(s) 2024-12-29 19:25:11 ./run-tests.py wpas_ctrl_bssid_filter DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_bssid_filter 1/1 Test: wpa_supplicant bssid_filter Starting AP wlan3 Starting AP wlan4 PASS wpas_ctrl_bssid_filter 1.826156 2024-12-29 19:25:13.860190 passed all 1 test case(s) 2024-12-29 19:25:13 ./run-tests.py wpas_ctrl_eapol_rx DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_eapol_rx 1/1 Test: wpa_supplicant ctrl_iface EAPOL_RX PASS wpas_ctrl_eapol_rx 0.058733 2024-12-29 19:25:14.188580 passed all 1 test case(s) 2024-12-29 19:25:14 ./run-tests.py wps_ext_proto_ack_m3_e_nonce_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3_e_nonce_mismatch 1/1 Test: WPS and ACK M3 E-Nonce mismatch Starting AP wlan3 PASS wps_ext_proto_ack_m3_e_nonce_mismatch 2.146425 2024-12-29 19:25:16.607038 passed all 1 test case(s) 2024-12-29 19:25:16 ./run-tests.py wps_ext_proto_ack_m3_invalid_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3_invalid_msg_type 1/1 Test: WPS and ACK M3 invalid Message Type Starting AP wlan3 PASS wps_ext_proto_ack_m3_invalid_msg_type 2.131088 2024-12-29 19:25:19.015770 passed all 1 test case(s) 2024-12-29 19:25:19 ./stop.sh