group: group-24, test: group-24
2024-12-29 19:17:28 export USER=root
2024-12-29 19:17:28 ./build.sh
Building TNC testing tools
Building wlantest
Building hs20-osu-client
Building hostapd
Building wpa_supplicant
2024-12-29 19:18:19 ./start.sh
2024-12-29 19:18:21 ./run-tests.py ap_anqp_no_sharing_missing_info
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_anqp_no_sharing_missing_info 1/1
Test: ANQP no sharing due to missing information
Starting AP wlan3
Starting AP wlan4
Normal network selection with shared ANQP results
PASS ap_anqp_no_sharing_missing_info 2.268749 2024-12-29 19:18:24.771929
passed all 1 test case(s)
2024-12-29 19:18:24 ./run-tests.py ap_cipher_gcmp_256_group_gcmp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_cipher_gcmp_256_group_gcmp 1/1
Test: WPA2-PSK/GCMP-256 connection with group cipher override GCMP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_cipher_gcmp_256_group_gcmp 1.556638 2024-12-29 19:18:26.608972
passed all 1 test case(s)
2024-12-29 19:18:26 ./run-tests.py ap_cipher_mixed_wpa_wpa2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_cipher_mixed_wpa_wpa2 1/1
Test: WPA2-PSK/CCMP/ and WPA-PSK/TKIP mixed configuration
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_cipher_mixed_wpa_wpa2 3.261353 2024-12-29 19:18:30.139187
passed all 1 test case(s)
2024-12-29 19:18:30 ./run-tests.py ap_ft_ap_oom2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_ap_oom2 1/1
Test: WPA2-PSK-FT and AP OOM 2
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_ft_ap_oom2 4.176041 2024-12-29 19:18:34.582557
passed all 1 test case(s)
2024-12-29 19:18:34 ./run-tests.py ap_ft_reassoc_local_fail
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_reassoc_local_fail 1/1
Test: WPA2-PSK-FT AP Reassociation Request frame and local failure
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_ft_reassoc_local_fail 2.348337 2024-12-29 19:18:37.200714
passed all 1 test case(s)
2024-12-29 19:18:37 ./run-tests.py ap_hs20_fetch_osu_single_ssid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_fetch_osu_single_ssid 1/1
Test: Hotspot 2.0 OSU provider and single SSID
Starting AP wlan3
OSU-PROVIDER 02:00:00:00:03:00
uri=https://example.com/osu/
methods=00000002
osu_ssid=HS 2.0 OSU open
osu_ssid2=test-hs20
osu_nai2=osen@example.com
friendly_name=eng:Test OSU
friendly_name=fin:Testi-OSU
desc=eng:Example services
desc=fin:Esimerkkipalveluja
PASS ap_hs20_fetch_osu_single_ssid 5.581798 2024-12-29 19:18:43.052553
passed all 1 test case(s)
2024-12-29 19:18:43 ./run-tests.py ap_hs20_req_home_ois
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_req_home_ois 1/1
Test: Hotspot 2.0 required roaming consortium
Starting AP wlan3
Starting AP wlan4
Verify network selection to AP wlan4
Verify network selection to AP wlan3
PASS ap_hs20_req_home_ois 2.820678 2024-12-29 19:18:46.141848
passed all 1 test case(s)
2024-12-29 19:18:46 ./run-tests.py ap_hs20_terms_and_conditions
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_terms_and_conditions 1/1
Test: Hotspot 2.0 Terms and Conditions signaling
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_hs20_terms_and_conditions 1.744538 2024-12-29 19:18:48.154406
passed all 1 test case(s)
2024-12-29 19:18:48 ./run-tests.py ap_max_num_sta_no_probe_resp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_max_num_sta_no_probe_resp 1/1
Test: Maximum STA count and limit on Probe Response frames
Starting AP wlan3
Connect STA wlan1 to AP
PASS ap_max_num_sta_no_probe_resp 2.183497 2024-12-29 19:18:50.603962
passed all 1 test case(s)
2024-12-29 19:18:50 ./run-tests.py ap_no_auth_ack
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_no_auth_ack 1/1
Test: AP not receiving Authentication frame ACK
Starting AP wlan3
PASS ap_no_auth_ack 2.131802 2024-12-29 19:18:53.005216
passed all 1 test case(s)
2024-12-29 19:18:53 ./run-tests.py ap_open_disable_enable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_disable_enable 1/1
Test: AP with open mode getting disabled and re-enabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_disable_enable 4.229893 2024-12-29 19:18:57.505850
passed all 1 test case(s)
2024-12-29 19:18:57 ./run-tests.py ap_pmf_valid_unicast_disassoc
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_valid_unicast_disassoc 1/1
Test: WPA2-PSK PMF AP sending valid unicast disassoc without dropping SA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_valid_unicast_disassoc 3.204013 2024-12-29 19:19:00.978721
passed all 1 test case(s)
2024-12-29 19:19:01 ./run-tests.py ap_vht_on_24ghz_2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_on_24ghz_2 1/1
Test: Subset of VHT features on 2.4 GHz (2)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_on_24ghz_2 2.043794 2024-12-29 19:19:03.293341
passed all 1 test case(s)
2024-12-29 19:19:03 ./run-tests.py ap_wpa2_eap_fast_cipher_suites
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_cipher_suites 1/1
Test: EAP-FAST and different TLS cipher suites
Starting AP wlan3
Connect STA wlan0 to AP
Testing DHE-RSA-AES128-SHA
Connect STA wlan0 to AP
Testing RC4-SHA
Connect STA wlan0 to AP
Allow failure due to missing TLS library support
Testing AES128-SHA
Connect STA wlan0 to AP
Testing AES256-SHA
Connect STA wlan0 to AP
Testing DHE-RSA-AES256-SHA
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_cipher_suites 3.372088 2024-12-29 19:19:06.934026
passed all 1 test case(s)
2024-12-29 19:19:06 ./run-tests.py ap_wpa2_eap_psk_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_psk_oom 1/1
Test: WPA2-Enterprise connection using EAP-PSK and OOM
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_psk_oom 5.770055 2024-12-29 19:19:12.975460
passed all 1 test case(s)
2024-12-29 19:19:13 ./run-tests.py ap_wpa2_eap_pwd_disabled_group
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_pwd_disabled_group 1/1
Test: WPA2-Enterprise connection using disabled EAP-pwd group
Group 19
Starting AP wlan3
Connect STA wlan0 to AP
Group 21
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_pwd_disabled_group 4.205298 2024-12-29 19:19:17.447889
passed all 1 test case(s)
2024-12-29 19:19:17 ./run-tests.py ap_wpa2_eap_tls_blob_pem
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_tls_blob_pem 1/1
Test: WPA2-Enterprise connection using EAP-TLS and config blobs (PEM)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_tls_blob_pem 1.522867 2024-12-29 19:19:19.243913
passed all 1 test case(s)
2024-12-29 19:19:19 ./run-tests.py ap_wpa2_eap_tls_rsa_and_ec
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_tls_rsa_and_ec 1/1
Test: EAP-TLS and both RSA and EC sertificates certificates
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_eap_tls_rsa_and_ec 2.015868 2024-12-29 19:19:21.529747
passed all 1 test case(s)
2024-12-29 19:19:21 ./run-tests.py ap_wpa2_eap_tls_tod_tofu
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_tls_tod_tofu 1/1
Test: EAP-TLS server certificate validation and TOD-TOFU
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_tls_tod_tofu 1.611327 2024-12-29 19:19:23.411928
passed all 1 test case(s)
2024-12-29 19:19:23 ./run-tests.py ap_wpa2_eap_ttls_invalid_phase2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_invalid_phase2 1/1
Test: EAP-TTLS with invalid phase2 parameter values
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_invalid_phase2 2.859247 2024-12-29 19:19:26.540563
passed all 1 test case(s)
2024-12-29 19:19:26 ./run-tests.py ap_wpa2_eap_ttls_server_pkcs12_extra
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_server_pkcs12_extra 1/1
Test: EAP-TTLS and server PKCS#12 file with extra certs
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_server_pkcs12_extra 1.57888 2024-12-29 19:19:28.391314
passed all 1 test case(s)
2024-12-29 19:19:28 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_sta1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_ext_key_id_ptk_rekey_sta1 1/1
Test: Extended Key ID and PTK rekey by station (start with Key ID 0)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_psk_ext_key_id_ptk_rekey_sta1 2.551902 2024-12-29 19:19:31.211733
passed all 1 test case(s)
2024-12-29 19:19:31 ./run-tests.py ap_wpa2_psk_supp_proto_too_long_gtk_kde
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_supp_proto_too_long_gtk_kde 1/1
Test: WPA2-PSK supplicant protocol testing: too long GTK KDE
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_psk_supp_proto_too_long_gtk_kde 1.527298 2024-12-29 19:19:33.010719
passed all 1 test case(s)
2024-12-29 19:19:33 ./run-tests.py ap_wpa_psk_ext_eapol
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa_psk_ext_eapol 1/1
Test: WPA2-PSK AP using external EAPOL supplicant
Starting AP wlan3
Connect STA wlan0 to AP
Replay same data back
Too short data
Send EAPOL-Key msg 2/4(invalid type)
Send EAPOL-Key msg 2/4
Replay same data back
Send EAPOL-Key msg 4/4
PASS ap_wpa_psk_ext_eapol 1.61945 2024-12-29 19:19:34.899003
passed all 1 test case(s)
2024-12-29 19:19:34 ./run-tests.py ap_wps_er_add_enrollee_uuid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_add_enrollee_uuid 1/1
Test: WPS ER adding a new enrollee identified by UUID
Starting AP wlan3
WPS configuration step
Start ER
Learn AP configuration through UPnP
Add a specific Enrollee using ER (PBC/UUID)
Add a specific Enrollee using ER (PIN/UUID)
Stop ER
PASS ap_wps_er_add_enrollee_uuid 23.782551 2024-12-29 19:19:58.952288
passed all 1 test case(s)
2024-12-29 19:19:58 ./run-tests.py ap_wps_er_http_proto_no_sid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_http_proto_no_sid 1/1
Test: WPS ER HTTP protocol testing - no SID
HTTP server received: GET /foo.xml HTTP/1.1
HTTP header: Cache-Control: no-cache
HTTP header: Pragma: no-cache
HTTP header: Accept: text/xml, application/xml
HTTP header: User-Agent: wpa_supplicant
HTTP header: Host: 127.0.0.1:12345
HTTP server received: POST /wps_control HTTP/1.1
HTTP header: Host: 127.0.0.1:12345
HTTP header: Content-Type: text/xml; charset="utf-8"
HTTP header: Content-Length: 280
HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo"
HTTP server received: SUBSCRIBE /wps_event HTTP/1.1
HTTP header: HOST: 127.0.0.1:12345
HTTP header: CALLBACK: <http://127.0.0.1:49152/event/133060367/1>
HTTP header: NT: upnp:event
HTTP header: TIMEOUT: Second-1800
Event URL: http://127.0.0.1:49152/event/133060367/1
PASS ap_wps_er_http_proto_no_sid 0.067621 2024-12-29 19:19:59.290648
passed all 1 test case(s)
2024-12-29 19:19:59 ./run-tests.py ap_wps_m2_unknown_opcode2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_m2_unknown_opcode2 1/1
Test: WPS and M2 but unknown opcode (WSC_Start)
Starting AP wlan3
PASS ap_wps_m2_unknown_opcode2 2.026281 2024-12-29 19:20:01.587766
passed all 1 test case(s)
2024-12-29 19:20:01 ./run-tests.py ap_wps_upnp_web_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_upnp_web_oom 1/1
Test: hostapd WPS UPnP web OOM
Starting AP wlan3
PASS ap_wps_upnp_web_oom 1.0725 2024-12-29 19:20:02.937527
passed all 1 test case(s)
2024-12-29 19:20:02 ./run-tests.py authsrv_errors_2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START authsrv_errors_2 1/1
Test: Authentication server errors (2)
Starting AP wlan4
PASS authsrv_errors_2 0.75319 2024-12-29 19:20:03.963901
passed all 1 test case(s)
2024-12-29 19:20:04 ./run-tests.py autogo_passphrase_len
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START autogo_passphrase_len 1/1
Test: P2P autonomous GO and longer passphrase
Start autonomous GO wlan0
Connect P2P client
Try to connect the client to the GO
wlan1: Trying to discover peer 02:00:00:00:00:00
Client connected
Connect legacy WPS client
Connect legacy non-WPS client
Connect STA wlan2 to AP
PASS autogo_passphrase_len 10.094086 2024-12-29 19:20:14.328950
passed all 1 test case(s)
2024-12-29 19:20:14 ./run-tests.py concurrent_persistent_group
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START concurrent_persistent_group 1/1
Test: Concurrent P2P persistent group
Connect to an infrastructure AP
Starting AP wlan3
Connect STA wlan0 to AP
Run persistent group test while associated to an AP
Form a persistent group
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
Terminate persistent group
Re-invoke persistent group from client
wlan1: Trying to discover peer 02:00:00:00:00:00
Terminate persistent group
Re-invoke persistent group from GO
wlan0: Trying to discover peer 02:00:00:00:01:00
Terminate persistent group
PASS concurrent_persistent_group 13.120917 2024-12-29 19:20:27.722466
passed all 1 test case(s)
2024-12-29 19:20:27 ./run-tests.py dbus_anqp_query_done
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_anqp_query_done 1/1
Test: D-Bus ANQP get test
Starting AP wlan3
PASS dbus_anqp_query_done 16.06995 2024-12-29 19:20:44.065827
passed all 1 test case(s)
2024-12-29 19:20:44 ./run-tests.py dbus_p2p_join
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_p2p_join 1/1
Test: D-Bus P2P join an autonomous GO
Join the group
PASS dbus_p2p_join 4.002643 2024-12-29 19:20:48.337209
passed all 1 test case(s)
2024-12-29 19:20:48 ./run-tests.py discovery_listen_find
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START discovery_listen_find 1/1
Test: P2P_LISTEN immediately followed by P2P_FIND
wlan1: Trying to discover peer 02:00:00:00:00:00
PASS discovery_listen_find 5.973288 2024-12-29 19:20:54.587194
passed all 1 test case(s)
2024-12-29 19:20:54 ./run-tests.py dpp_ap_config_bp512_bp512
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_ap_config_bp512_bp512 1/1
Test: DPP and AP configuration (BP-512 + BP-512)
Starting AP wlan3
Update AP configuration
Connect STA wlan1 to AP
Check data connection
PASS dpp_ap_config_bp512_bp512 3.133894 2024-12-29 19:20:57.991403
passed all 1 test case(s)
2024-12-29 19:20:58 ./run-tests.py dpp_config_dpp_gen_secp521r1_prime256v1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_dpp_gen_secp521r1_prime256v1 1/1
Test: Generate DPP Config Object for DPP network (P-521 + P-256)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_dpp_gen_secp521r1_prime256v1 0.187668 2024-12-29 19:20:58.457574
passed all 1 test case(s)
2024-12-29 19:20:58 ./run-tests.py dpp_config_dpp_override_secp521r1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_dpp_override_secp521r1 1/1
Test: DPP Config Object override (P-521)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_dpp_override_secp521r1 0.149432 2024-12-29 19:20:58.874994
passed all 1 test case(s)
2024-12-29 19:20:58 ./run-tests.py dpp_config_jws_error_prot_hdr_unsupported_typ
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_jws_error_prot_hdr_unsupported_typ 1/1
Test: DPP Config Object JWS error - protected header - unsupported typ
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_jws_error_prot_hdr_unsupported_typ 0.144507 2024-12-29 19:20:59.297330
passed all 1 test case(s)
2024-12-29 19:20:59 ./run-tests.py dpp_conn_status_success_hostapd_configurator
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_conn_status_success_hostapd_configurator 1/1
Test: DPP connection status - success with hostapd as Configurator
Starting AP wlan3
Update AP configuration
PASS dpp_conn_status_success_hostapd_configurator 7.415434 2024-12-29 19:21:06.993517
passed all 1 test case(s)
2024-12-29 19:21:07 ./run-tests.py dpp_hostapd_enrollee_gas_timeout
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_hostapd_enrollee_gas_timeout 1/1
Test: DPP and hostapd as Enrollee with GAS timeout
Starting AP wlan3
PASS dpp_hostapd_enrollee_gas_timeout 3.236678 2024-12-29 19:21:10.504270
passed all 1 test case(s)
2024-12-29 19:21:10 ./run-tests.py dpp_invalid_legacy_params
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_invalid_legacy_params 1/1
Test: DPP invalid legacy parameters
PASS dpp_invalid_legacy_params 0.067838 2024-12-29 19:21:10.839639
passed all 1 test case(s)
2024-12-29 19:21:10 ./run-tests.py dpp_pkex_bp384
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_pkex_bp384 1/1
Test: DPP and PKEX (BP-384)
PASS dpp_pkex_bp384 0.213872 2024-12-29 19:21:11.325302
passed all 1 test case(s)
2024-12-29 19:21:11 ./run-tests.py dpp_proto_auth_resp_no_r_bootstrap_key
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_resp_no_r_bootstrap_key 1/1
Test: DPP protocol testing - no R-bootstrap key in Auth Resp
PASS dpp_proto_auth_resp_no_r_bootstrap_key 0.224621 2024-12-29 19:21:11.821972
passed all 1 test case(s)
2024-12-29 19:21:11 ./run-tests.py dpp_proto_conf_resp_no_status
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_conf_resp_no_status 1/1
Test: DPP protocol testing - no Status in Conf Resp
PASS dpp_proto_conf_resp_no_status 0.170699 2024-12-29 19:21:12.266274
passed all 1 test case(s)
2024-12-29 19:21:12 ./run-tests.py dpp_push_button_r_hash_mismatch_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_push_button_r_hash_mismatch_ap 1/1
Test: DPP push button - Responder hash mismatch from AP
Starting AP wlan3
PASS dpp_push_button_r_hash_mismatch_ap 5.542823 2024-12-29 19:21:18.080622
passed all 1 test case(s)
2024-12-29 19:21:18 ./run-tests.py dpp_qr_code_curve_secp384r1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_qr_code_curve_secp384r1 1/1
Test: DPP QR Code and curve secp384r1
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_qr_code_curve_secp384r1 0.153494 2024-12-29 19:21:18.505204
passed all 1 test case(s)
2024-12-29 19:21:18 ./run-tests.py dpp_qr_code_no_chan_list_broadcast
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_qr_code_no_chan_list_broadcast 1/1
Test: DPP QR Code and no channel list (broadcast)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_qr_code_no_chan_list_broadcast 1.169139 2024-12-29 19:21:19.943835
passed all 1 test case(s)
2024-12-29 19:21:19 ./run-tests.py eap_peap_session_resumption
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_peap_session_resumption 1/1
Test: EAP-PEAP session resumption
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_peap_session_resumption 1.623246 2024-12-29 19:21:21.841287
passed all 1 test case(s)
2024-12-29 19:21:21 ./run-tests.py eap_proto_pax_errors_server
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_pax_errors_server 1/1
Test: EAP-PAX local error cases on server
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS eap_proto_pax_errors_server 8.76993 2024-12-29 19:21:30.883983
passed all 1 test case(s)
2024-12-29 19:21:30 ./run-tests.py eap_proto_sim_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_sim_errors 1/1
Test: EAP-SIM protocol tests (error paths)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Starting AP wlan4
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS eap_proto_sim_errors 11.533869 2024-12-29 19:21:42.690759
passed all 1 test case(s)
2024-12-29 19:21:42 ./run-tests.py eap_teap_basic_password_auth_pac
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_teap_basic_password_auth_pac 1/1
Test: EAP-TEAP with Basic-Password-Auth and PAC
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_teap_basic_password_auth_pac 1.621541 2024-12-29 19:21:44.581483
passed all 1 test case(s)
2024-12-29 19:21:44 ./run-tests.py eap_teap_basic_password_auth_pac_binary
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_teap_basic_password_auth_pac_binary 1/1
Test: EAP-TEAP with Basic-Password-Auth and PAC (binary)
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_teap_basic_password_auth_pac_binary 1.575401 2024-12-29 19:21:46.426771
passed all 1 test case(s)
2024-12-29 19:21:46 ./run-tests.py eht_mld_non_pref_chan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eht_mld_non_pref_chan 1/1
Test: EHT MLD with one link. MBO non preferred channels
Adding link on: ifname=wlan7
Connect STA wlan8 to AP
hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy7', 'freq': '2412', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'hw_mode': 'g', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '1', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '1', 'ieee80211be': '1', 'beacon_int': '100', 'dtim_period': '2', 'eht_oper_chwidth': '0', 'eht_oper_centr_freq_seg0_idx': '0', 'num_links': '1', 'link_id': '0', 'link_addr': '02:00:00:52:e9:35', 'he_oper_chwidth': '0', 'he_oper_centr_freq_seg0_idx': '0', 'he_oper_centr_freq_seg1_idx': '0', 'ht_caps_info': '000c', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan7', 'bssid[0]': '02:00:00:52:e9:35', 'ssid[0]': 'mld_ap_one_link_mbo', 'num_sta[0]': '1', 'mld_addr[0]': '02:00:00:00:07:00', 'mld_id[0]': '0', 'mld_link_id[0]': '0'}
hostapd STA: {'addr': '02:00:00:00:08:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][MFP][HT][HE][EHT]', 'aid': '1', 'capability': '0x430', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'dot11RSNAStatsSTAAddress': '02:00:00:00:08:00', 'dot11RSNAStatsVersion': '1', 'dot11RSNAStatsSelectedPairwiseCipher': '00-0f-ac-4', 'dot11RSNAStatsTKIPLocalMICFailures': '0', 'dot11RSNAStatsTKIPRemoteMICFailures': '0', 'wpa': '2', 'AKMSuiteSelector': '00-0f-ac-18', 'hostapdWPAPTKState': '11', 'hostapdWPAPTKGroupState': '0', 'hostapdMFPR': '1', 'rx_packets': '5', 'tx_packets': '4', 'rx_bytes': '726', 'tx_bytes': '760', 'inactive_msec': '1', 'signal': '-50', 'rx_rate_info': '0', 'tx_rate_info': '0', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'mbo_cell_capa': '3', 'non_pref_chan[0]': '81:200:1:7', 'non_pref_chan[1]': '81:100:2:9', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f8081008280', 'he_capab': '0178c81a400002bfce0000000000000000fafffaff', 'eht_capab': '07007c0000feffff0701008888880000', 'ht_caps_info': '0x107e', 'ext_capab': '04004a02014000400001', 'peer_addr[0]': 'd6:4a:07:41:47:f5'}
valid_links=0x1

active_links=0x1

station status: {'bssid': '02:00:00:00:07:00', 'freq': '0', 'ssid': 'mld_ap_one_link_mbo', 'id': '0', 'mode': 'station', 'wifi_generation': '7', 'pairwise_cipher': 'CCMP', 'group_cipher': 'CCMP', 'key_mgmt': 'OWE', 'pmf': '2', 'mgmt_group_cipher': 'BIP', 'wpa_state': 'COMPLETED', 'p2p_device_address': '02:00:00:00:08:00', 'address': '02:00:00:00:08:00', 'ap_mld_addr': '02:00:00:00:07:00', 'uuid': '75a9ac25-8084-5995-9e1a-dd9a7395af8f', 'bss_max_idle_period': '292'}
PASS eht_mld_non_pref_chan 2.163988 2024-12-29 19:21:48.858896
passed all 1 test case(s)
2024-12-29 19:21:48 ./run-tests.py eht_mld_sae_single_link_anti_clogging_token
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eht_mld_sae_single_link_anti_clogging_token 1/1
Test: EHT MLD AP with MLD client SAE H2E connection using single link and SAE anti-clogging token
Adding link on: ifname=wlan7
Connect STA wlan8 to AP
hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy9', 'freq': '2412', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'hw_mode': 'g', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '1', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '1', 'ieee80211be': '1', 'beacon_int': '100', 'dtim_period': '2', 'eht_oper_chwidth': '0', 'eht_oper_centr_freq_seg0_idx': '0', 'num_links': '1', 'link_id': '0', 'link_addr': '02:00:00:12:6f:40', 'he_oper_chwidth': '0', 'he_oper_centr_freq_seg0_idx': '0', 'he_oper_centr_freq_seg1_idx': '0', 'ht_caps_info': '000c', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan7', 'bssid[0]': '02:00:00:12:6f:40', 'ssid[0]': 'mld_ap_sae_single_link', 'num_sta[0]': '1', 'mld_addr[0]': '02:00:00:00:09:00', 'mld_id[0]': '0', 'mld_link_id[0]': '0'}
hostapd STA: {'addr': '02:00:00:00:0a:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][MFP][HT][HE][EHT]', 'aid': '1', 'capability': '0x430', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'dot11RSNAStatsSTAAddress': '02:00:00:00:0a:00', 'dot11RSNAStatsVersion': '1', 'dot11RSNAStatsSelectedPairwiseCipher': '00-0f-ac-4', 'dot11RSNAStatsTKIPLocalMICFailures': '0', 'dot11RSNAStatsTKIPRemoteMICFailures': '0', 'wpa': '2', 'AKMSuiteSelector': '00-0f-ac-8', 'hostapdWPAPTKState': '11', 'hostapdWPAPTKGroupState': '0', 'hostapdMFPR': '1', 'rx_packets': '5', 'tx_packets': '4', 'rx_bytes': '677', 'tx_bytes': '751', 'inactive_msec': '1', 'signal': '-50', 'rx_rate_info': '0', 'tx_rate_info': '0', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'sae_group': '19', 'sae_rejected_groups': '', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f8081008280', 'he_capab': '0178c81a400002bfce0000000000000000fafffaff', 'eht_capab': '07007c0000feffff0701008888880000', 'ht_caps_info': '0x107e', 'ext_capab': '04004a02014000400001', 'peer_addr[0]': '5e:01:34:80:93:3b'}
valid_links=0x1

active_links=0x1

station status: {'bssid': '02:00:00:00:09:00', 'freq': '0', 'ssid': 'mld_ap_sae_single_link', 'id': '0', 'mode': 'station', 'wifi_generation': '7', 'pairwise_cipher': 'CCMP', 'group_cipher': 'CCMP', 'key_mgmt': 'SAE', 'pmf': '2', 'mgmt_group_cipher': 'BIP', 'sae_group': '19', 'sae_h2e': '1', 'sae_pk': '0', 'wpa_state': 'COMPLETED', 'p2p_device_address': '02:00:00:00:0a:00', 'address': '02:00:00:00:0a:00', 'ap_mld_addr': '02:00:00:00:09:00', 'uuid': '723340b3-4764-5ef0-9a45-6d330e294a89', 'bss_max_idle_period': '292', 'ssid_verified': '1'}
PASS eht_mld_sae_single_link_anti_clogging_token 1.947217 2024-12-29 19:21:51.091006
passed all 1 test case(s)
2024-12-29 19:21:51 ./run-tests.py fst_disconnect_2_of_2_stas_from_non_fst_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_disconnect_2_of_2_stas_from_non_fst_ap 1/1
Test: FST disconnect 2 of 2 STAs from non-FST AP
Starting AP wlan3 (old add_ap argument type)
AP startup failed
Traceback (most recent call last):
  File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main
    t(dev, apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 945, in test_fst_disconnect_2_of_2_stas_from_non_fst_ap
    fst_ap1, fst_ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev)
                                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs
    ap1.start()
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start
    self.hapd = hostapd.add_ap(self.iface, params)
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
    raise Exception("AP startup failed")
Exception: AP startup failed
FAIL fst_disconnect_2_of_2_stas_from_non_fst_ap 5.674824 2024-12-29 19:21:57.052907
passed 0 test case(s)
skipped 0 test case(s)
failed tests: fst_disconnect_2_of_2_stas_from_non_fst_ap
2024-12-29 19:21:57 ./run-tests.py fst_sta_start_session
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_sta_start_session 1/1
Test: FST STA start session
Starting AP wlan3 (old add_ap argument type)
AP startup failed
Traceback (most recent call last):
  File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main
    t(dev, apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1552, in test_fst_sta_start_session
    fst_start_session(apdev, test_params, bad_param_none, False)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 95, in fst_start_session
    ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev)
                           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs
    ap1.start()
  File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start
    self.hapd = hostapd.add_ap(self.iface, params)
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
    raise Exception("AP startup failed")
Exception: AP startup failed
FAIL fst_sta_start_session 5.709528 2024-12-29 19:22:03.064545
passed 0 test case(s)
skipped 0 test case(s)
failed tests: fst_sta_start_session
2024-12-29 19:22:03 ./run-tests.py gas_anqp_venue_url2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START gas_anqp_venue_url2 1/1
Test: GAS/ANQP and Venue URL (hostapd venue_url)
Starting AP wlan3
PASS gas_anqp_venue_url2 1.51469 2024-12-29 19:22:04.858212
passed all 1 test case(s)
2024-12-29 19:22:04 ./run-tests.py go_search_non_social
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START go_search_non_social 1/1
Test: P2P_FIND with freq parameter to scan a single channel
Start autonomous GO wlan0
PASS go_search_non_social 2.472123 2024-12-29 19:22:07.620184
passed all 1 test case(s)
2024-12-29 19:22:07 ./run-tests.py grpform_pbc_overlap_group_iface
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform_pbc_overlap_group_iface 1/1
Test: P2P group formation during PBC overlap using group interfaces
Starting AP wlan3
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Removing BSS wlan3
PASS grpform_pbc_overlap_group_iface 5.754886 2024-12-29 19:22:13.672566
passed all 1 test case(s)
2024-12-29 19:22:13 ./run-tests.py he80_pwr_constraint
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he80_pwr_constraint 1/1
Test: HE with 80 MHz channel width and local power constraint
Starting AP wlan3
AP startup failed
Traceback (most recent call last):
  File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 980, in test_he80_pwr_constraint
    hapd = hostapd.add_ap(apdev[0], params)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
    raise Exception("AP startup failed")
Exception: AP startup failed
FAIL he80_pwr_constraint 6.654098 2024-12-29 19:22:20.599926
passed 0 test case(s)
skipped 0 test case(s)
failed tests: he80_pwr_constraint
2024-12-29 19:22:20 ./run-tests.py he80d
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he80d 1/1
Test: HE with 80 MHz channel width (HT40- channel 48)
Starting AP wlan3
Country code at the end: 00
AP startup failed
Traceback (most recent call last):
  File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 300, in test_he80d
    he80_test(apdev[0], dev, 48, "[HT40-]")
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 276, in he80_test
    hapd = hostapd.add_ap(apdev, params)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
    raise Exception("AP startup failed")
Exception: AP startup failed
FAIL he80d 7.155008 2024-12-29 19:22:28.030907
passed 0 test case(s)
skipped 0 test case(s)
failed tests: he80d
2024-12-29 19:22:28 ./run-tests.py he_6ghz_security
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_6ghz_security 1/1
Test: HE AP and 6 GHz security parameter validation
Starting AP wlan3
PASS he_6ghz_security 0.063268 2024-12-29 19:22:28.379958
passed all 1 test case(s)
2024-12-29 19:22:28 ./run-tests.py ibss_open
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ibss_open 1/1
Test: IBSS open (no security)
wlan0 waiting for IBSS start/join to complete
wlan1 waiting for IBSS start/join to complete
PASS ibss_open 12.295172 2024-12-29 19:22:40.954992
passed all 1 test case(s)
2024-12-29 19:22:41 ./run-tests.py ieee8021x_reauth
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ieee8021x_reauth 1/1
Test: IEEE 802.1X and EAPOL_REAUTH request
Starting AP wlan3
Connect STA wlan0 to AP
PASS ieee8021x_reauth 1.123701 2024-12-29 19:22:42.364179
passed all 1 test case(s)
2024-12-29 19:22:42 ./run-tests.py ieee8021x_reauth_peap2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ieee8021x_reauth_peap2 1/1
Test: IEEE 802.1X and EAPOL_REAUTH request (PEAP and session resumption; Phase 2 auth forced)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ieee8021x_reauth_peap2 1.507298 2024-12-29 19:22:44.150786
passed all 1 test case(s)
2024-12-29 19:22:44 ./run-tests.py macsec_psk_integ_only
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START macsec_psk_integ_only 1/1
Test: MACsec PSK (integrity only)
ip macsec:
22: macsec0: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off 
    cipher suite: GCM-AES-128, using ICV length 16
    TXSC: 6a6a5fd7e3ff0001 on SA 0
    offload: off 

ip link:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
    link/ether 98:90:96:e4:18:ed brd ff:ff:ff:ff:ff:ff
    altname eno1
    altname enp0s25
3: wlan0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000
    link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
4: wlan1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000
    link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff
5: wlan2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000
    link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff
6: wlan3: <BROADCAST,MULTICAST> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000
    link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff
7: wlan4: <BROADCAST,MULTICAST> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000
    link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff
8: wlan5: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000
    link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff
9: wlan6: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000
    link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff
10: hwsim0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
20: veth1@veth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000
    link/ether e2:98:19:72:a1:bc brd ff:ff:ff:ff:ff:ff
21: veth0@veth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000
    link/ether 6a:6a:5f:d7:e3:ff brd ff:ff:ff:ff:ff:ff
22: macsec0@veth0: <BROADCAST,MULTICAST> mtu 1468 qdisc noop state DOWN mode DEFAULT group default qlen 1000
    link/ether 6a:6a:5f:d7:e3:ff brd ff:ff:ff:ff:ff:ff

wpas0 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=6a:6a:5f:d7:e3:ff
PAE KaY status=Not-Active
Authenticated=No
Secured=No
Failed=No
Actor Priority=255
Key Server Priority=0
Is Key Server=No
Number of Keys Distributed=0
Number of Keys Received=0
MKA Hello Time=2000
actor_sci=6a:6a:5f:d7:e3:ff@1
key_server_sci=00:00:00:00:00:00@0
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=d12d428d924340a9a0658822
mn=0
active=No
participant=No
retain=No
live_peers=0
potential_peers=0
is_key_server=Yes
is_elected=No
uuid=ecce3620-403e-574b-b592-f3c71db0b7f1

wpas1 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=e2:98:19:72:a1:bc
PAE KaY status=Not-Active
Authenticated=No
Secured=No
Failed=No
Actor Priority=100
Key Server Priority=0
Is Key Server=No
Number of Keys Distributed=0
Number of Keys Received=0
MKA Hello Time=2000
actor_sci=e2:98:19:72:a1:bc@1
key_server_sci=00:00:00:00:00:00@0
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=62baf0ee61ec2a140ba3e8d7
mn=0
active=No
participant=No
retain=No
live_peers=0
potential_peers=0
is_key_server=Yes
is_elected=No
uuid=ecce3620-403e-574b-b592-f3c71db0b7f1

wpas0 STATUS-DRIVER:
ifname=veth0
ifi=22
parent_ifname=macsec0
parent_ifi=21

wpas1 STATUS-DRIVER:
ifname=veth1
ifi=23
parent_ifname=macsec1
parent_ifi=20

veth0 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=6a:6a:5f:d7:e3:ff
PAE KaY status=Active
Authenticated=No
Secured=Yes
Failed=No
Actor Priority=255
Key Server Priority=100
Is Key Server=No
Number of Keys Distributed=0
Number of Keys Received=1
MKA Hello Time=2000
actor_sci=6a:6a:5f:d7:e3:ff@1
key_server_sci=e2:98:19:72:a1:bc@1
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=d12d428d924340a9a0658822
mn=4
active=Yes
participant=No
retain=No
live_peers=1
potential_peers=0
is_key_server=No
is_elected=Yes
uuid=ecce3620-403e-574b-b592-f3c71db0b7f1

veth1 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=e2:98:19:72:a1:bc
PAE KaY status=Active
Authenticated=No
Secured=Yes
Failed=No
Actor Priority=100
Key Server Priority=100
Is Key Server=No
Number of Keys Distributed=1
Number of Keys Received=0
MKA Hello Time=2000
actor_sci=e2:98:19:72:a1:bc@1
key_server_sci=e2:98:19:72:a1:bc@1
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=62baf0ee61ec2a140ba3e8d7
mn=3
active=Yes
participant=No
retain=No
live_peers=1
potential_peers=0
is_key_server=Yes
is_elected=Yes
uuid=ecce3620-403e-574b-b592-f3c71db0b7f1

Expected key server: veth1
wpas0 MIB:
dot11RSNAOptionImplemented=TRUE
dot11RSNAPreauthenticationImplemented=TRUE
dot11RSNAEnabled=FALSE
dot11RSNAPreauthenticationEnabled=FALSE
dot11RSNAConfigVersion=1
dot11RSNAConfigPairwiseKeysSupported=5
dot11RSNAConfigGroupCipherSize=0
dot11RSNAConfigPMKLifetime=43200
dot11RSNAConfigPMKReauthThreshold=70
dot11RSNAConfigNumberOfPTKSAReplayCounters=1
dot11RSNAConfigSATimeout=60
dot11RSNAAuthenticationSuiteSelected=00-00-00-0
dot11RSNAPairwiseCipherSelected=00-50-f2-0
dot11RSNAGroupCipherSelected=00-50-f2-0
dot11RSNAPMKIDUsed=
dot11RSNAAuthenticationSuiteRequested=00-00-00-0
dot11RSNAPairwiseCipherRequested=00-50-f2-0
dot11RSNAGroupCipherRequested=00-50-f2-0
dot11RSNAConfigNumberOfGTKSAReplayCounters=0
dot11RSNA4WayHandshakeFailures=0
dot1xSuppPaeState=9
dot1xSuppHeldPeriod=60
dot1xSuppAuthPeriod=30
dot1xSuppStartPeriod=30
dot1xSuppMaxStart=3
dot1xSuppSuppControlledPortStatus=Authorized
dot1xSuppBackendPaeState=2
dot1xSuppEapolFramesRx=0
dot1xSuppEapolFramesTx=0
dot1xSuppEapolStartFramesTx=0
dot1xSuppEapolLogoffFramesTx=0
dot1xSuppEapolRespFramesTx=0
dot1xSuppEapolReqIdFramesRx=0
dot1xSuppEapolReqFramesRx=0
dot1xSuppInvalidEapolFramesRx=0
dot1xSuppEapLengthErrorFramesRx=0
dot1xSuppLastEapolFrameVersion=0
dot1xSuppLastEapolFrameSource=00:00:00:00:00:00
ieee8021XKayMkaPartCKN=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
ieee8021XKayMkaPartCached=false
ieee8021XKayMkaPartActive=true
ieee8021XKayMkaPartRetain=false
ieee8021XKayMkaPartActivateControl=default
ieee8021XKayMkaPartPrincipal=true
ieee8021XKayMkaPeerListMI=62baf0ee61ec2a140ba3e8d7
ieee8021XKayMkaPeerListMN=4
ieee8021XKayMkaPeerListType=1
ieee8021XKayMkaPeerListSCI=e2:98:19:72:a1:bc@1

wpas1 MIB:
dot11RSNAOptionImplemented=TRUE
dot11RSNAPreauthenticationImplemented=TRUE
dot11RSNAEnabled=FALSE
dot11RSNAPreauthenticationEnabled=FALSE
dot11RSNAConfigVersion=1
dot11RSNAConfigPairwiseKeysSupported=5
dot11RSNAConfigGroupCipherSize=0
dot11RSNAConfigPMKLifetime=43200
dot11RSNAConfigPMKReauthThreshold=70
dot11RSNAConfigNumberOfPTKSAReplayCounters=1
dot11RSNAConfigSATimeout=60
dot11RSNAAuthenticationSuiteSelected=00-00-00-0
dot11RSNAPairwiseCipherSelected=00-50-f2-0
dot11RSNAGroupCipherSelected=00-50-f2-0
dot11RSNAPMKIDUsed=
dot11RSNAAuthenticationSuiteRequested=00-00-00-0
dot11RSNAPairwiseCipherRequested=00-50-f2-0
dot11RSNAGroupCipherRequested=00-50-f2-0
dot11RSNAConfigNumberOfGTKSAReplayCounters=0
dot11RSNA4WayHandshakeFailures=0
dot1xSuppPaeState=9
dot1xSuppHeldPeriod=60
dot1xSuppAuthPeriod=30
dot1xSuppStartPeriod=30
dot1xSuppMaxStart=3
dot1xSuppSuppControlledPortStatus=Authorized
dot1xSuppBackendPaeState=2
dot1xSuppEapolFramesRx=0
dot1xSuppEapolFramesTx=0
dot1xSuppEapolStartFramesTx=0
dot1xSuppEapolLogoffFramesTx=0
dot1xSuppEapolRespFramesTx=0
dot1xSuppEapolReqIdFramesRx=0
dot1xSuppEapolReqFramesRx=0
dot1xSuppInvalidEapolFramesRx=0
dot1xSuppEapLengthErrorFramesRx=0
dot1xSuppLastEapolFrameVersion=0
dot1xSuppLastEapolFrameSource=00:00:00:00:00:00
ieee8021XKayMkaPartCKN=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
ieee8021XKayMkaPartCached=false
ieee8021XKayMkaPartActive=true
ieee8021XKayMkaPartRetain=false
ieee8021XKayMkaPartActivateControl=default
ieee8021XKayMkaPartPrincipal=true
ieee8021XKayMkaPeerListMI=d12d428d924340a9a0658822
ieee8021XKayMkaPeerListMN=5
ieee8021XKayMkaPeerListType=1
ieee8021XKayMkaPeerListSCI=6a:6a:5f:d7:e3:ff@1

wpas0 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=6a:6a:5f:d7:e3:ff
PAE KaY status=Active
Authenticated=No
Secured=Yes
Failed=No
Actor Priority=255
Key Server Priority=100
Is Key Server=No
Number of Keys Distributed=0
Number of Keys Received=1
MKA Hello Time=2000
actor_sci=6a:6a:5f:d7:e3:ff@1
key_server_sci=e2:98:19:72:a1:bc@1
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=d12d428d924340a9a0658822
mn=5
active=Yes
participant=No
retain=No
live_peers=1
potential_peers=0
is_key_server=No
is_elected=Yes
uuid=ecce3620-403e-574b-b592-f3c71db0b7f1

wpas1 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=e2:98:19:72:a1:bc
PAE KaY status=Active
Authenticated=No
Secured=Yes
Failed=No
Actor Priority=100
Key Server Priority=100
Is Key Server=No
Number of Keys Distributed=1
Number of Keys Received=0
MKA Hello Time=2000
actor_sci=e2:98:19:72:a1:bc@1
key_server_sci=e2:98:19:72:a1:bc@1
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=62baf0ee61ec2a140ba3e8d7
mn=4
active=Yes
participant=No
retain=No
live_peers=1
potential_peers=0
is_key_server=Yes
is_elected=Yes
uuid=ecce3620-403e-574b-b592-f3c71db0b7f1

ip macsec:
22: macsec0: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off 
    cipher suite: GCM-AES-128, using ICV length 16
    TXSC: 6a6a5fd7e3ff0001 on SA 0
        0: PN 7, state on, key 62baf0ee61ec2a140ba3e8d701000000
    RXSC: e2981972a1bc0001, state on
        0: PN 6, state on, key 62baf0ee61ec2a140ba3e8d701000000
    offload: off 
23: macsec1: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off 
    cipher suite: GCM-AES-128, using ICV length 16
    TXSC: e2981972a1bc0001 on SA 0
        0: PN 6, state on, key 62baf0ee61ec2a140ba3e8d701000000
    RXSC: 6a6a5fd7e3ff0001, state on
        0: PN 7, state on, key 62baf0ee61ec2a140ba3e8d701000000
    offload: off 

ip macsec:
22: macsec0: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off 
    cipher suite: GCM-AES-128, using ICV length 16
    TXSC: 6a6a5fd7e3ff0001 on SA 0
        0: PN 9, state on, key 62baf0ee61ec2a140ba3e8d701000000
    RXSC: e2981972a1bc0001, state on
        0: PN 8, state on, key 62baf0ee61ec2a140ba3e8d701000000
    offload: off 
23: macsec1: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off 
    cipher suite: GCM-AES-128, using ICV length 16
    TXSC: e2981972a1bc0001 on SA 0
        0: PN 8, state on, key 62baf0ee61ec2a140ba3e8d701000000
    RXSC: 6a6a5fd7e3ff0001, state on
        0: PN 9, state on, key 62baf0ee61ec2a140ba3e8d701000000
    offload: off 

PASS macsec_psk_integ_only 9.449975 2024-12-29 19:22:53.886729
passed all 1 test case(s)
2024-12-29 19:22:53 ./run-tests.py mesh_pmksa_caching_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mesh_pmksa_caching_oom 1/1
Test: Secure mesh network and PMKSA caching failing due to OOM
PASS mesh_pmksa_caching_oom 3.257103 2024-12-29 19:22:57.427017
passed all 1 test case(s)
2024-12-29 19:22:57 ./run-tests.py mesh_secure_invalid_group_cipher
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mesh_secure_invalid_group_cipher 1/1
Test: Secure mesh and invalid group cipher
PASS mesh_secure_invalid_group_cipher 0.505491 2024-12-29 19:22:58.227540
passed all 1 test case(s)
2024-12-29 19:22:58 ./run-tests.py monitor_iface_wpa2_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START monitor_iface_wpa2_psk 1/1
Test: WPA2-PSK connection using cfg80211 monitor interface on AP
Connect STA wlan0 to AP
PASS monitor_iface_wpa2_psk 1.768689 2024-12-29 19:23:00.282178
passed all 1 test case(s)
2024-12-29 19:23:00 ./run-tests.py nfc_p2p_client
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_p2p_client 1/1
Test: NFC connection handover when one device is P2P client
Start autonomous GOs
Connect one device as a P2P client
wlan1: Trying to discover peer 02:00:00:00:00:00
Client connected
NFC connection handover between P2P client and P2P device
Connect to group based on upper layer trigger
wlan2: Trying to discover peer 02:00:00:00:00:00
Client connected
PASS nfc_p2p_client 6.179441 2024-12-29 19:23:06.744570
passed all 1 test case(s)
2024-12-29 19:23:06 ./run-tests.py nfc_p2p_go_neg_ip_pool_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_p2p_go_neg_ip_pool_oom 1/1
Test: NFC connection handover to form a new P2P group and IP pool OOM
Perform NFC connection handover
Group formed
PASS nfc_p2p_go_neg_ip_pool_oom 3.748058 2024-12-29 19:23:10.774134
passed all 1 test case(s)
2024-12-29 19:23:10 ./run-tests.py nfc_p2p_static_handover_tagdev_client
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_p2p_static_handover_tagdev_client 1/1
Test: NFC static handover to form a new P2P group (NFC Tag device becomes P2P Client)
Perform NFC connection handover
Group formed
PASS nfc_p2p_static_handover_tagdev_client 4.512228 2024-12-29 19:23:15.576860
passed all 1 test case(s)
2024-12-29 19:23:15 ./run-tests.py nfc_wps_er_config_token
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_wps_er_config_token 1/1
Test: WPS NFC configuration token from ER to Enrollee
Starting AP wlan3
Learn AP configuration
Start ER
Use learned network configuration on ER
WPS provisioning step using configuration token from ER
PASS nfc_wps_er_config_token 13.380609 2024-12-29 19:23:29.248496
passed all 1 test case(s)
2024-12-29 19:23:29 ./run-tests.py owe_unsupported_group_connect_cmd
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START owe_unsupported_group_connect_cmd 1/1
Test: Opportunistic Wireless Encryption and unsupported group using cfg80211 connect command
Starting AP wlan3
Connect STA wlan5 to AP
PASS owe_unsupported_group_connect_cmd 6.454659 2024-12-29 19:23:35.995435
passed all 1 test case(s)
2024-12-29 19:23:36 ./run-tests.py p2p_service_discovery_upnp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_service_discovery_upnp 1/1
Test: P2P service discovery (UPnP)
wlan1: Trying to discover peer 02:00:00:00:00:00
PASS p2p_service_discovery_upnp 1.953104 2024-12-29 19:23:38.243965
passed all 1 test case(s)
2024-12-29 19:23:38 ./run-tests.py p2p_service_discovery_upnp3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_service_discovery_upnp3 1/1
Test: P2P service discovery (UPnP using request helper - no match)
wlan1: Trying to discover peer 02:00:00:00:00:00
PASS p2p_service_discovery_upnp3 0.977766 2024-12-29 19:23:39.504481
passed all 1 test case(s)
2024-12-29 19:23:39 ./run-tests.py p2p_service_discovery_ws
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_service_discovery_ws 1/1
Test: P2P service discovery (WS-Discovery)
wlan1: Trying to discover peer 02:00:00:00:00:00
PASS p2p_service_discovery_ws 0.905095 2024-12-29 19:23:40.688428
passed all 1 test case(s)
2024-12-29 19:23:40 ./run-tests.py persistent_group_add_cli_chan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START persistent_group_add_cli_chan 1/1
Test: P2P persistent group formation and re-invocation with p2p_add_cli_chan=1
Form a persistent group
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
Terminate persistent group
Re-invoke persistent group from client
wlan1: Trying to discover peer 02:00:00:00:00:00
Terminate persistent group
Re-invoke persistent group from GO
wlan0: Trying to discover peer 02:00:00:00:01:00
Terminate persistent group
PASS persistent_group_add_cli_chan 12.693019 2024-12-29 19:23:53.668397
passed all 1 test case(s)
2024-12-29 19:23:53 ./run-tests.py pmksa_cache_expiration
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START pmksa_cache_expiration 1/1
Test: PMKSA cache entry expiration
Starting AP wlan3
Connect STA wlan0 to AP
Wait for PMKSA cache entry to expire
PASS pmksa_cache_expiration 8.095603 2024-12-29 19:24:02.058654
passed all 1 test case(s)
2024-12-29 19:24:02 ./run-tests.py prefer_eht_20
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START prefer_eht_20 1/1
Test: EHT AP on a 20 MHz channel
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS prefer_eht_20 6.696944 2024-12-29 19:24:09.038496
passed all 1 test case(s)
2024-12-29 19:24:09 ./run-tests.py radius_acct_failure_oom_rsn
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_acct_failure_oom_rsn 1/1
Test: RADIUS Accounting in RSN and failure to add attributes due to OOM
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS radius_acct_failure_oom_rsn 16.6542 2024-12-29 19:24:25.972510
passed all 1 test case(s)
2024-12-29 19:24:26 ./run-tests.py sae_mixed_check_mfp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_mixed_check_mfp 1/1
Test: Mixed SAE and non-SAE network with the sae_check_mfp option
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
Connect STA wlan2 to AP
Connect STA wlan1 to AP
Connect STA wlan1 to AP
PASS sae_mixed_check_mfp 3.477695 2024-12-29 19:24:29.719691
passed all 1 test case(s)
2024-12-29 19:24:29 ./run-tests.py sae_pk_unexpected_status
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pk_unexpected_status 1/1
Test: SAE-PK and unexpected status code in commit
Starting AP wlan3
Connect STA wlan0 to AP
PASS sae_pk_unexpected_status 3.059283 2024-12-29 19:24:33.049363
passed all 1 test case(s)
2024-12-29 19:24:33 ./run-tests.py sae_pwe_group_1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pwe_group_1 1/1
Test: SAE PWE derivation options with group 1
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS sae_pwe_group_1 2.363467 2024-12-29 19:24:35.689173
passed all 1 test case(s)
2024-12-29 19:24:35 ./run-tests.py sae_pwe_h2e_only_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pwe_h2e_only_ap 1/1
Test: SAE PWE derivation with H2E-only AP
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS sae_pwe_h2e_only_ap 2.018675 2024-12-29 19:24:37.980448
passed all 1 test case(s)
2024-12-29 19:24:38 ./run-tests.py sigma_dut_ap_owe_ecgroupid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_owe_ecgroupid 1/1
Test: sigma_dut controlled AP with OWE and ECGroupID
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_owe_ecgroupid 0.14242 2024-12-29 19:24:38.392452
passed all 0 test case(s)
skipped 1 test case(s)
2024-12-29 19:24:38 ./run-tests.py sigma_dut_ap_sae_pw_id_ft
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_sae_pw_id_ft 1/1
Test: sigma_dut controlled AP with SAE Password Identifier and FT
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_sae_pw_id_ft 0.148633 2024-12-29 19:24:38.825283
passed all 0 test case(s)
skipped 1 test case(s)
2024-12-29 19:24:38 ./run-tests.py sigma_dut_dpp_nfc_static_read_enrollee
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_nfc_static_read_enrollee 1/1
Test: sigma_dut DPP/NFC read tag as Enrollee
Starting AP wlan3
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_nfc_static_read_enrollee 1.095658 2024-12-29 19:24:40.192057
passed all 0 test case(s)
skipped 1 test case(s)
2024-12-29 19:24:40 ./run-tests.py sigma_dut_dpp_qr_init_configurator_both
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_qr_init_configurator_both 1/1
Test: sigma_dut DPP/QR initiator as Configurator or Enrollee (conf index 1)
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_qr_init_configurator_both 0.064164 2024-12-29 19:24:40.534328
passed all 0 test case(s)
skipped 1 test case(s)
2024-12-29 19:24:40 ./run-tests.py sigma_dut_dpp_qr_mutual_init_enrollee
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_qr_mutual_init_enrollee 1/1
Test: sigma_dut DPP/QR (mutual) initiator as Enrollee
Starting AP wlan3
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_qr_mutual_init_enrollee 1.057264 2024-12-29 19:24:41.870035
passed all 0 test case(s)
skipped 1 test case(s)
2024-12-29 19:24:41 ./run-tests.py sigma_dut_dpp_qr_resp_status_query
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_qr_resp_status_query 1/1
Test: sigma_dut DPP/QR responder status query
Starting AP wlan3
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_qr_resp_status_query 1.052225 2024-12-29 19:24:43.193752
passed all 0 test case(s)
skipped 1 test case(s)
2024-12-29 19:24:43 ./run-tests.py sigma_dut_dpp_reconfig_no_proto_ver
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_reconfig_no_proto_ver 1/1
Test: sigma_dut DPP reconfiguration (Configurator) - missing Protocol Version
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_reconfig_no_proto_ver 0.062929 2024-12-29 19:24:43.535503
passed all 0 test case(s)
skipped 1 test case(s)
2024-12-29 19:24:43 ./run-tests.py ssid_hex_encoded
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ssid_hex_encoded 1/1
Test: SSID configuration using hex encoded version
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ssid_hex_encoded 1.843893 2024-12-29 19:24:45.656320
passed all 1 test case(s)
2024-12-29 19:24:45 ./run-tests.py tnc_peap_soh_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START tnc_peap_soh_errors 1/1
Test: TNC PEAP-SoH local error cases
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS tnc_peap_soh_errors 2.362595 2024-12-29 19:24:48.292334
passed all 1 test case(s)
2024-12-29 19:24:48 ./run-tests.py wnm_bss_tm_rsn
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_bss_tm_rsn 1/1
Test: WNM BSS Transition Management with RSN
Starting AP wlan3
Starting AP wlan4
AP startup failed
Traceback (most recent call last):
  File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_wnm.py", line 1418, in test_wnm_bss_tm_rsn
    hapd2 = start_wnm_ap(apdev[1], country_code="FI", hw_mode="a",
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_wnm.py", line 101, in start_wnm_ap
    hapd = hostapd.add_ap(apdev, params)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
    raise Exception("AP startup failed")
Exception: AP startup failed
FAIL wnm_bss_tm_rsn 13.697189 2024-12-29 19:25:02.264873
passed 0 test case(s)
skipped 0 test case(s)
failed tests: wnm_bss_tm_rsn
2024-12-29 19:25:02 ./run-tests.py wnm_coloc_intf_reporting
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_coloc_intf_reporting 1/1
Test: WNM Collocated Interference Reporting
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_coloc_intf_reporting 1.484842 2024-12-29 19:25:04.026587
passed all 1 test case(s)
2024-12-29 19:25:04 ./run-tests.py wpas_ap_lifetime_in_memory
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ap_lifetime_in_memory 1/1
Test: wpa_supplicant AP mode and PSK/PTK lifetime in memory
Checking keys in memory after network profile configuration
Reading process memory (pid=5523)
[heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186
[stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296
Total process memory read: 33 bytes
Checking keys in memory after AP start
Reading process memory (pid=5523)
[heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186
[stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296
Total process memory read: 33 bytes
Connect STA wlan1 to AP
Reading process memory (pid=5523)
[heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186
[stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296
Total process memory read: 33 bytes
Reading process memory (pid=5523)
[heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186
[stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296
Total process memory read: 33 bytes
Reading process memory (pid=5523)
[heap] 0x55f12a9ea000-0x55f12aa20000 is at 2-221186
[stack] 0x7ffc325a5000-0x7ffc325c7000 is at 32-139296
Total process memory read: 33 bytes
Checking keys in memory while associated
Skip test case: PMK not found while associated
SKIP wpas_ap_lifetime_in_memory 3.194167 2024-12-29 19:25:07.498546
passed all 0 test case(s)
skipped 1 test case(s)
2024-12-29 19:25:07 ./run-tests.py wpas_ap_open_ht_disabled
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ap_open_ht_disabled 1/1
Test: wpa_supplicant AP mode - open network and HT disabled
Connect STA wlan1 to AP
PASS wpas_ap_open_ht_disabled 1.61298 2024-12-29 19:25:09.384816
passed all 1 test case(s)
2024-12-29 19:25:09 ./run-tests.py wpas_ap_sae
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ap_sae 1/1
Test: wpa_supplicant AP mode - SAE using psk
Connect STA wlan1 to AP
PASS wpas_ap_sae 2.09226 2024-12-29 19:25:11.753031
passed all 1 test case(s)
2024-12-29 19:25:11 ./run-tests.py wpas_ctrl_bssid_filter
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_bssid_filter 1/1
Test: wpa_supplicant bssid_filter
Starting AP wlan3
Starting AP wlan4
PASS wpas_ctrl_bssid_filter 1.826156 2024-12-29 19:25:13.860190
passed all 1 test case(s)
2024-12-29 19:25:13 ./run-tests.py wpas_ctrl_eapol_rx
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_eapol_rx 1/1
Test: wpa_supplicant ctrl_iface EAPOL_RX
PASS wpas_ctrl_eapol_rx 0.058733 2024-12-29 19:25:14.188580
passed all 1 test case(s)
2024-12-29 19:25:14 ./run-tests.py wps_ext_proto_ack_m3_e_nonce_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_proto_ack_m3_e_nonce_mismatch 1/1
Test: WPS and ACK M3 E-Nonce mismatch
Starting AP wlan3
PASS wps_ext_proto_ack_m3_e_nonce_mismatch 2.146425 2024-12-29 19:25:16.607038
passed all 1 test case(s)
2024-12-29 19:25:16 ./run-tests.py wps_ext_proto_ack_m3_invalid_msg_type
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wps_ext_proto_ack_m3_invalid_msg_type 1/1
Test: WPS and ACK M3 invalid Message Type
Starting AP wlan3
PASS wps_ext_proto_ack_m3_invalid_msg_type 2.131088 2024-12-29 19:25:19.015770
passed all 1 test case(s)
2024-12-29 19:25:19 ./stop.sh