group: group-30, test: group-30 2025-06-07 20:21:50 export USER=root 2025-06-07 20:21:50 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2025-06-07 20:22:38 ./start.sh 2025-06-07 20:22:39 ./run-tests.py ap_csa_2_switches_count_0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_2_switches_count_0 1/1 Test: AP Channel Switch, two switches with count 0 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_2_switches_count_0 1.177152 2025-06-07 20:22:41.993934 passed all 1 test case(s) 2025-06-07 20:22:42 ./run-tests.py ap_ft_eap_ptk_rekey_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_eap_ptk_rekey_ap 1/1 Test: WPA2-EAP-FT PTK rekeying triggered by AP Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_eap_ptk_rekey_ap 4.520761 2025-06-07 20:22:46.797340 passed all 1 test case(s) 2025-06-07 20:22:46 ./run-tests.py ap_ft_rrb DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_rrb 1/1 Test: WPA2-PSK-FT RRB protocol testing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ft_rrb 1.250192 2025-06-07 20:22:48.319667 passed all 1 test case(s) 2025-06-07 20:22:48 ./run-tests.py ap_hs20_ft DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_ft 1/1 Test: Hotspot 2.0 connection with FT Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_ft 2.266684 2025-06-07 20:22:50.857353 passed all 1 test case(s) 2025-06-07 20:22:50 ./run-tests.py ap_ht40_csa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_csa2 1/1 Test: HT with 40 MHz channel width and CSA Starting AP wlan3 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ht.py", line 1102, in test_ap_ht40_csa2 hapd = hostapd.add_ap(apdev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL ap_ht40_csa2 5.83452 2025-06-07 20:22:56.965108 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ht40_csa2 2025-06-07 20:22:57 ./run-tests.py ap_ht_op_class_120 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_120 1/1 Test: HT40 on operating class 120 Starting AP wlan3 Skip test case: Channel not supported SKIP ap_ht_op_class_120 5.767741 2025-06-07 20:23:03.004895 passed all 0 test case(s) skipped 1 test case(s) 2025-06-07 20:23:03 ./run-tests.py ap_ht_op_class_81 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_81 1/1 Test: HT20 on operating class 81 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_81 2.761424 2025-06-07 20:23:06.035649 passed all 1 test case(s) 2025-06-07 20:23:06 ./run-tests.py ap_open_start_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_start_disabled 1/1 Test: AP with open mode and beaconing disabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_start_disabled 1.502845 2025-06-07 20:23:07.813375 passed all 1 test case(s) 2025-06-07 20:23:07 ./run-tests.py ap_remove_during_acs3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_acs3 1/1 Test: Remove second BSS during ACS in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Removing BSS wlan3-2 PASS ap_remove_during_acs3 1.106785 2025-06-07 20:23:09.190415 passed all 1 test case(s) 2025-06-07 20:23:09 ./run-tests.py ap_vht_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_tkip 1/1 Test: VHT and TKIP Starting AP wlan3 Country code at the end: 00 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 1246, in test_ap_vht_tkip hapd = hostapd.add_ap(apdev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL ap_vht_tkip 6.632713 2025-06-07 20:23:16.097780 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vht_tkip 2025-06-07 20:23:16 ./run-tests.py ap_vlan_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_psk 1/1 Test: AP VLAN based on PSK/passphrase Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_psk 2.772646 2025-06-07 20:23:19.141895 passed all 1 test case(s) 2025-06-07 20:23:19 ./run-tests.py ap_wpa2_eap_aka_imsi_identity DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_imsi_identity 1/1 Test: WPA2-Enterprise connection using EAP-AKA and imsi_identity Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_imsi_identity 1.110597 2025-06-07 20:23:20.527163 passed all 1 test case(s) 2025-06-07 20:23:20 ./run-tests.py ap_wpa2_eap_sim_id_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_id_2 1/1 Test: WPA2-Enterprise connection using EAP-SIM (no pseudonym, reauth) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_id_2 1.092101 2025-06-07 20:23:21.887325 passed all 1 test case(s) 2025-06-07 20:23:21 ./run-tests.py ap_wpa2_eap_ttls_dh_params_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_dh_params_server 1/1 Test: WPA2-Enterprise using EAP-TTLS and alternative server dhparams Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_dh_params_server 1.074727 2025-06-07 20:23:23.235838 passed all 1 test case(s) 2025-06-07 20:23:23 ./run-tests.py ap_wpa2_eap_ttls_eap_aka DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_aka 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-AKA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_aka 1.117938 2025-06-07 20:23:24.631576 passed all 1 test case(s) 2025-06-07 20:23:24 ./run-tests.py ap_wpa2_plaintext_group_m1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_plaintext_group_m1 1/1 Test: Plaintext group M1 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_plaintext_group_m1 1.465996 2025-06-07 20:23:26.369930 passed all 1 test case(s) 2025-06-07 20:23:26 ./run-tests.py ap_wpa2_psk_ifdown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ifdown 1/1 Test: AP with open mode and external ifconfig down Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ifdown 2.738474 2025-06-07 20:23:29.378430 passed all 1 test case(s) 2025-06-07 20:23:29 ./run-tests.py ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg 1/1 Test: WPA2-PSK supplicant protocol testing: too long GTK KDE in group msg Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg 1.029979 2025-06-07 20:23:30.686291 passed all 1 test case(s) 2025-06-07 20:23:30 ./run-tests.py ap_wps_ap_pin_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_ap_pin_failure 1/1 Test: WPS_AP_PIN failure PASS ap_wps_ap_pin_failure 0.678191 2025-06-07 20:23:31.641774 passed all 1 test case(s) 2025-06-07 20:23:31 ./run-tests.py ap_wps_er_http_proto_control_url_dns DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_control_url_dns 1/1 Test: WPS ER HTTP protocol testing - DNS name in controlURL HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_proto_control_url_dns 2.069783 2025-06-07 20:23:33.988879 passed all 1 test case(s) 2025-06-07 20:23:34 ./run-tests.py ap_wps_er_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_oom 1/1 Test: WPS ER OOM in XML processing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wps_er_oom 6.283238 2025-06-07 20:23:40.550427 passed all 1 test case(s) 2025-06-07 20:23:40 ./run-tests.py ap_wps_m2_missing_dev_passwd_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_missing_dev_passwd_id 1/1 Test: WPS and M2 without Device Password ID Starting AP wlan3 PASS ap_wps_m2_missing_dev_passwd_id 1.540206 2025-06-07 20:23:42.360022 passed all 1 test case(s) 2025-06-07 20:23:42 ./run-tests.py ap_wps_per_station_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_per_station_psk 1/1 Test: WPS PBC provisioning with per-station PSK Starting AP wlan3 First enrollee Second enrollee External registrar Verifying PSK results Second external registrar PASS ap_wps_per_station_psk 6.112327 2025-06-07 20:23:48.746642 passed all 1 test case(s) 2025-06-07 20:23:48 ./run-tests.py ap_wps_set_selected_registrar_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_set_selected_registrar_proto 1/1 Test: WPS UPnP SetSelectedRegistrar protocol testing Starting AP wlan3 PASS ap_wps_set_selected_registrar_proto 0.767352 2025-06-07 20:23:49.794031 passed all 1 test case(s) 2025-06-07 20:23:49 ./run-tests.py autogo_random_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_random_channel 1/1 Test: P2P channel selection: GO instantiated on random channel 1, 6, 11 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 PASS autogo_random_channel 1.782565 2025-06-07 20:23:51.851029 passed all 1 test case(s) 2025-06-07 20:23:51 ./run-tests.py dbus_apscan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_apscan 1/1 Test: D-Bus Get/Set ApScan PASS dbus_apscan 0.068935 2025-06-07 20:23:52.194196 passed all 1 test case(s) 2025-06-07 20:23:52 ./run-tests.py dbus_introspect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_introspect 1/1 Test: D-Bus introspection Initial Introspect: Introspect: None Introspect: Introspect: Introspect: PASS dbus_introspect 0.072364 2025-06-07 20:23:52.546076 passed all 1 test case(s) 2025-06-07 20:23:52 ./run-tests.py dbus_p2p_wps_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_wps_failure 1/1 Test: D-Bus P2P WPS failure wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Ignore unexpected status-driver line: ignore_next_local_deauth PASS dbus_p2p_wps_failure 3.143522 2025-06-07 20:23:55.976824 passed all 1 test case(s) 2025-06-07 20:23:56 ./run-tests.py discovery_device_name_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_device_name_change 1/1 Test: P2P device discovery and peer changing device name PASS discovery_device_name_change 1.096942 2025-06-07 20:23:57.356052 passed all 1 test case(s) 2025-06-07 20:23:57 ./run-tests.py discovery_pd_retries DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_pd_retries 1/1 Test: P2P device discovery and provision discovery retries wlan0: Trying to discover peer 02:00:00:00:01:00 PASS discovery_pd_retries 39.45661 2025-06-07 20:24:37.096474 passed all 1 test case(s) 2025-06-07 20:24:37 ./run-tests.py dpp_config_connector_error_missing_net_role DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_missing_net_role 1/1 Test: DPP Config Object connector error - missing netRole r=55ca34c711ba845a80e26187ce366d93cf9d182bc95379e4991af562e26de6e5 s=89372b15d93649dc5114bdb4680c0e131669036a4de926fa2c93b73eaf9ef2a7 dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_connector_error_missing_net_role 0.146019 2025-06-07 20:24:37.524016 passed all 1 test case(s) 2025-06-07 20:24:37 ./run-tests.py dpp_config_jws_error_prot_hdr_not_an_object DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_not_an_object 1/1 Test: DPP Config Object JWS error - protected header not an object dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_not_an_object 0.127855 2025-06-07 20:24:37.951262 passed all 1 test case(s) 2025-06-07 20:24:37 ./run-tests.py dpp_config_legacy_gen_sta_ap_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_legacy_gen_sta_ap_conf 1/1 Test: Generate DPP Config Object for legacy network (sta and ap config) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_legacy_gen_sta_ap_conf 1.125138 2025-06-07 20:24:39.359315 passed all 1 test case(s) 2025-06-07 20:24:39 ./run-tests.py dpp_configurator_id_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_configurator_id_unknown 1/1 Test: DPP and unknown configurator id Starting AP wlan3 PASS dpp_configurator_id_unknown 0.507673 2025-06-07 20:24:40.153557 passed all 1 test case(s) 2025-06-07 20:24:40 ./run-tests.py dpp_conn_status_assoc_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_conn_status_assoc_reject 1/1 Test: DPP connection status - association rejection Starting AP wlan3 PASS dpp_conn_status_assoc_reject 15.608372 2025-06-07 20:24:56.053926 passed all 1 test case(s) 2025-06-07 20:24:56 ./run-tests.py dpp_conn_status_connector_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_conn_status_connector_mismatch 1/1 Test: DPP connection status - invalid Connector Starting AP wlan3 PASS dpp_conn_status_connector_mismatch 5.474303 2025-06-07 20:25:01.812499 passed all 1 test case(s) 2025-06-07 20:25:01 ./run-tests.py dpp_pkex_exchange_resp_processing_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_exchange_resp_processing_failure 1/1 Test: DPP and PKEX with local failure in processing Exchange Resp PASS dpp_pkex_exchange_resp_processing_failure 0.228074 2025-06-07 20:25:02.334745 passed all 1 test case(s) 2025-06-07 20:25:02 ./run-tests.py dpp_proto_after_wrapped_data_pkex_cr_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_after_wrapped_data_pkex_cr_resp 1/1 Test: DPP protocol testing - attribute after Wrapped Data in PKEX CR Resp PASS dpp_proto_after_wrapped_data_pkex_cr_resp 0.155162 2025-06-07 20:25:02.768661 passed all 1 test case(s) 2025-06-07 20:25:02 ./run-tests.py dpp_proto_auth_req_invalid_i_proto_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_req_invalid_i_proto_key 1/1 Test: DPP protocol testing - invalid I-proto key in Auth Req PASS dpp_proto_auth_req_invalid_i_proto_key 0.211612 2025-06-07 20:25:03.275915 passed all 1 test case(s) 2025-06-07 20:25:03 ./run-tests.py dpp_proto_auth_req_no_i_capab DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_req_no_i_capab 1/1 Test: DPP protocol testing - no I-capab in Auth Req PASS dpp_proto_auth_req_no_i_capab 0.21077 2025-06-07 20:25:03.772865 passed all 1 test case(s) 2025-06-07 20:25:03 ./run-tests.py dpp_proto_conf_resp_no_e_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_resp_no_e_nonce 1/1 Test: DPP protocol testing - no E-nonce in Conf Resp PASS dpp_proto_conf_resp_no_e_nonce 0.13194 2025-06-07 20:25:04.189049 passed all 1 test case(s) 2025-06-07 20:25:04 ./run-tests.py dpp_proto_pkex_cr_req_i_auth_tag_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_cr_req_i_auth_tag_mismatch 1/1 Test: DPP protocol testing - I-auth tag mismatch in PKEX Commit-Reveal Request PASS dpp_proto_pkex_cr_req_i_auth_tag_mismatch 0.158829 2025-06-07 20:25:04.631106 passed all 1 test case(s) 2025-06-07 20:25:04 ./run-tests.py dscp_request DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dscp_request 1/1 Test: DSCP Policy Request Starting AP wlan3 Connect STA wlan0 to AP PASS dscp_request 1.087266 2025-06-07 20:25:06.003329 passed all 1 test case(s) 2025-06-07 20:25:06 ./run-tests.py eap_canned_failure_before_method DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_canned_failure_before_method 1/1 Test: EAP protocol tests for canned EAP-Failure before any method Starting AP wlan3 Connect STA wlan0 to AP PASS eap_canned_failure_before_method 1.003444 2025-06-07 20:25:07.299001 passed all 1 test case(s) 2025-06-07 20:25:07 ./run-tests.py eap_mschapv2_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_mschapv2_errors 1/1 Test: EAP-MSCHAPv2 error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_mschapv2_errors 8.036957 2025-06-07 20:25:15.626903 passed all 1 test case(s) 2025-06-07 20:25:15 ./run-tests.py eap_peap_session_resumption_crypto_binding DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_peap_session_resumption_crypto_binding 1/1 Test: EAP-PEAP session resumption with crypto binding Starting AP wlan3 Connect STA wlan0 to AP PASS eap_peap_session_resumption_crypto_binding 1.056008 2025-06-07 20:25:16.973094 passed all 1 test case(s) 2025-06-07 20:25:17 ./run-tests.py eap_proto_aka DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_aka 1/1 Test: EAP-AKA protocol tests Starting AP wlan3 Connect STA wlan0 to AP aka_handler - RX 02f900150130323332303130303030303030303030 Test: Missing payload Connect STA wlan0 to AP aka_handler - RX 021a00150130323332303130303030303030303030 Test: Unknown subtype aka_handler - RX 021b000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02b800150130323332303130303030303030303030 Test: Client Error aka_handler - RX 02b9000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 020a00150130323332303130303030303030303030 Test: Too short attribute header aka_handler - RX 020b000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 029f00150130323332303130303030303030303030 Test: Truncated attribute aka_handler - RX 02a0000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 027600150130323332303130303030303030303030 Test: Too short attribute data aka_handler - RX 0277000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 028700150130323332303130303030303030303030 Test: Skippable/non-skippable unrecognzized attribute aka_handler - RX 0288000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02c200150130323332303130303030303030303030 Test: Identity request without ID type aka_handler - RX 02c3000817050000 Test: Identity request ANY_ID aka_handler - RX 02c4001c170500000e05001030323332303130303030303030303030 Test: Identity request ANY_ID (duplicate) aka_handler - RX 02c5000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 021200150130323332303130303030303030303030 Test: Identity request ANY_ID aka_handler - RX 0213001c170500000e05001030323332303130303030303030303030 Test: Identity request FULLAUTH_ID aka_handler - RX 0214001c170500000e05001030323332303130303030303030303030 Test: Identity request FULLAUTH_ID (duplicate) aka_handler - RX 0215000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 024800150130323332303130303030303030303030 Test: Identity request ANY_ID aka_handler - RX 0249001c170500000e05001030323332303130303030303030303030 Test: Identity request FULLAUTH_ID aka_handler - RX 024a001c170500000e05001030323332303130303030303030303030 Test: Identity request PERMANENT_ID aka_handler - RX 024b001c170500000e05001030323332303130303030303030303030 Test: Identity request PERMANENT_ID (duplicate) aka_handler - RX 024c000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02d300150130323332303130303030303030303030 Test: Challenge with no attributes aka_handler - RX 02d4000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 029900150130323332303130303030303030303030 Test: AKA Challenge with BIDDING aka_handler - RX 029a000817020000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 024b00150130323332303130303030303030303030 Test: Notification with no attributes aka_handler - RX 024c000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02df00150130323332303130303030303030303030 Test: Notification indicating success, but no MAC aka_handler - RX 02e0000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02f700150130323332303130303030303030303030 Test: Notification indicating success, but invalid MAC value aka_handler - RX 02f8000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 026000150130323332303130303030303030303030 Test: Notification indicating success with zero-key MAC aka_handler - RX 0261000c170e000016010000 Test: EAP-Success Connect STA wlan0 to AP aka_handler - RX 028c00150130323332303130303030303030303030 Test: Notification before auth aka_handler - RX 028d0008170c0000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 023e00150130323332303130303030303030303030 Test: Notification before auth aka_handler - RX 023f0008170c0000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 022b00150130323332303130303030303030303030 Test: Notification with unrecognized non-failure aka_handler - RX 022c0008170c0000 Test: Notification before auth (duplicate) aka_handler - RX 022d000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 028700150130323332303130303030303030303030 Test: Re-authentication (unexpected) with no attributes aka_handler - RX 0288000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 026500150130323332303130303030303030303030 Test: AKA Challenge with Checkcode claiming identity round was used aka_handler - RX 0266000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 023800150130323332303130303030303030303030 Test: Identity request ANY_ID aka_handler - RX 0239001c170500000e05001030323332303130303030303030303030 Test: AKA Challenge with Checkcode claiming no identity round was used aka_handler - RX 023a000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 020e00150130323332303130303030303030303030 Test: Identity request ANY_ID aka_handler - RX 020f001c170500000e05001030323332303130303030303030303030 Test: AKA Challenge with mismatching Checkcode value aka_handler - RX 0210000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 023f00150130323332303130303030303030303030 Test: Re-authentication (unexpected) with Checkcode claimin identity round was used aka_handler - RX 0240000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 024200150130323332303130303030303030303030 Test: Invalid AT_RAND length aka_handler - RX 0243000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 020900150130323332303130303030303030303030 Test: Invalid AT_AUTN length aka_handler - RX 020a000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 024600150130323332303130303030303030303030 Test: Unencrypted AT_PADDING aka_handler - RX 0247000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02b700150130323332303130303030303030303030 Test: Invalid AT_NONCE_MT length aka_handler - RX 02b8000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02a200150130323332303130303030303030303030 Test: Invalid AT_MAC length aka_handler - RX 02a3000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 025d00150130323332303130303030303030303030 Test: Invalid AT_NOTIFICATION length aka_handler - RX 025e000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 022200150130323332303130303030303030303030 Test: AT_IDENTITY overflow aka_handler - RX 0223000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 029b00150130323332303130303030303030303030 Test: Unexpected AT_VERSION_LIST aka_handler - RX 029c000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 027700150130323332303130303030303030303030 Test: Invalid AT_SELECTED_VERSION length aka_handler - RX 0278000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02da00150130323332303130303030303030303030 Test: Unencrypted AT_COUNTER aka_handler - RX 02db000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02a600150130323332303130303030303030303030 Test: Unencrypted AT_COUNTER_TOO_SMALL aka_handler - RX 02a7000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 021600150130323332303130303030303030303030 Test: Unencrypted AT_NONCE_S aka_handler - RX 0217000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 025100150130323332303130303030303030303030 Test: Invalid AT_CLIENT_ERROR_CODE length aka_handler - RX 0252000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 022d00150130323332303130303030303030303030 Test: Invalid AT_IV length aka_handler - RX 022e000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02d800150130323332303130303030303030303030 Test: Invalid AT_ENCR_DATA length aka_handler - RX 02d9000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 026300150130323332303130303030303030303030 Test: Unencrypted AT_NEXT_PSEUDONYM aka_handler - RX 0264000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 027500150130323332303130303030303030303030 Test: Unencrypted AT_NEXT_REAUTH_ID aka_handler - RX 0276000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02ac00150130323332303130303030303030303030 Test: Invalid AT_RES length aka_handler - RX 02ad000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02fc00150130323332303130303030303030303030 Test: Invalid AT_RES length aka_handler - RX 02fd000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02c100150130323332303130303030303030303030 Test: Invalid AT_AUTS length aka_handler - RX 02c2000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 028b00150130323332303130303030303030303030 Test: Invalid AT_CHECKCODE length aka_handler - RX 028c000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02f400150130323332303130303030303030303030 Test: Invalid AT_RESULT_IND length aka_handler - RX 02f5000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 022100150130323332303130303030303030303030 Test: Unexpected AT_KDF_INPUT aka_handler - RX 0222000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 021800150130323332303130303030303030303030 Test: Unexpected AT_KDF aka_handler - RX 0219000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 023200150130323332303130303030303030303030 Test: Invalid AT_BIDDING length aka_handler - RX 0233000c170e000016010000 Test: EAP-Failure PASS eap_proto_aka 17.739082 2025-06-07 20:25:34.985477 passed all 1 test case(s) 2025-06-07 20:25:35 ./run-tests.py eap_proto_aka_prime DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_aka_prime 1/1 Test: EAP-AKA' protocol tests Starting AP wlan3 Connect STA wlan0 to AP aka_prime_handler - RX 029f00150136353535343434333333323232313131 Test: Missing payload Connect STA wlan0 to AP aka_prime_handler - RX 029800150136353535343434333333323232313131 Test: Challenge with no attributes aka_prime_handler - RX 0299000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 028400150136353535343434333333323232313131 Test: Challenge with empty AT_KDF_INPUT aka_prime_handler - RX 0285000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02ad00150136353535343434333333323232313131 Test: Challenge with AT_KDF_INPUT aka_prime_handler - RX 02ae000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02d700150136353535343434333333323232313131 Test: Challenge with duplicated KDF aka_prime_handler - RX 02d8000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02c600150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 02c7000c3201000018010001 Test: Challenge with incorrect KDF selected aka_prime_handler - RX 02c8000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02b600150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 02b7000c3201000018010001 Test: Challenge with selected KDF not duplicated aka_prime_handler - RX 02b8000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 021d00150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 021e000c3201000018010001 Test: Challenge with selected KDF duplicated (missing MAC, RAND, AUTN) aka_prime_handler - RX 021f000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 027d00150136353535343434333333323232313131 Test: Challenge with multiple unsupported KDF proposals aka_prime_handler - RX 027e000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 025800150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 0259000c3201000018010001 Test: Challenge with invalid MAC, RAND, AUTN values) aka_prime_handler - RX 025a000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 027b00150136353535343434333333323232313131 Test: Challenge - AMF separation bit not set) aka_prime_handler - RX 027c000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 029f00150136353535343434333333323232313131 Test: Challenge - Invalid MAC aka_prime_handler - RX 02a0000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02f400150136353535343434333333323232313131 Test: Challenge - Valid MAC aka_prime_handler - RX 02f5000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02f200150136353535343434333333323232313131 Test: Invalid AT_KDF_INPUT length aka_prime_handler - RX 02f3000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 027a00150136353535343434333333323232313131 Test: Invalid AT_KDF length aka_prime_handler - RX 027b000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 029a00150136353535343434333333323232313131 Test: Challenge with large number of KDF proposals aka_prime_handler - RX 029b000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 020900150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 020a000c3201000018010001 Test: Challenge with an extra KDF appended aka_prime_handler - RX 020b000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02cb00150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 02cc000c3201000018010001 Test: Challenge with a modified KDF aka_prime_handler - RX 02cd000c320e000016010000 Test: EAP-Failure PASS eap_proto_aka_prime 8.936866 2025-06-07 20:25:44.212222 passed all 1 test case(s) 2025-06-07 20:25:44 ./run-tests.py eap_proto_md5_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_md5_server 1/1 Test: EAP-MD5 protocol testing for the server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_md5_server 1.863795 2025-06-07 20:25:46.364612 passed all 1 test case(s) 2025-06-07 20:25:46 ./run-tests.py eap_tls_session_resumption_expiration DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_tls_session_resumption_expiration 1/1 Test: EAP-TLS session resumption Starting AP wlan3 Connect STA wlan0 to AP PASS eap_tls_session_resumption_expiration 3.737431 2025-06-07 20:25:50.387914 passed all 1 test case(s) 2025-06-07 20:25:50 ./run-tests.py eht_mld_control_socket_connectivity DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_mld_control_socket_connectivity 1/1 Test: AP MLD control socket connectivity Adding link on: ifname=wlan7 Adding link on: ifname=wlan7 LINK 0 STATUS: state=ENABLED phy=phy7 freq=2412 num_sta_non_erp=0 num_sta_no_short_slot_time=0 num_sta_no_short_preamble=0 olbc=0 num_sta_ht_no_gf=0 num_sta_no_ht=0 num_sta_ht_20_mhz=0 num_sta_ht40_intolerant=0 olbc_ht=0 ht_op_mode=0x0 hw_mode=g cac_time_seconds=0 cac_time_left_seconds=N/A channel=1 edmg_enable=0 edmg_channel=0 secondary_channel=0 ieee80211n=1 ieee80211ac=0 ieee80211ax=1 ieee80211be=1 beacon_int=100 dtim_period=2 eht_oper_chwidth=0 eht_oper_centr_freq_seg0_idx=0 num_links=2 link_id=0 link_addr=02:00:00:c9:62:92 partner_link[1]=02:00:00:a5:32:b3 ap_mld_type=STR he_oper_chwidth=0 he_oper_centr_freq_seg0_idx=0 he_oper_centr_freq_seg1_idx=0 ht_caps_info=000c ht_mcs_bitmask=ffff0000000000000000 supported_rates=02 04 0b 16 0c 12 18 24 30 48 60 6c max_txpower=20 bss[0]=wlan7 bssid[0]=02:00:00:c9:62:92 ssid[0]=mld_ap num_sta[0]=0 mld_addr[0]=02:00:00:00:07:00 mld_id[0]=0 mld_link_id[0]=0 LINK 1 STATUS: state=ENABLED phy=phy7 freq=2417 num_sta_non_erp=0 num_sta_no_short_slot_time=0 num_sta_no_short_preamble=0 olbc=0 num_sta_ht_no_gf=0 num_sta_no_ht=0 num_sta_ht_20_mhz=0 num_sta_ht40_intolerant=0 olbc_ht=0 ht_op_mode=0x0 hw_mode=g cac_time_seconds=0 cac_time_left_seconds=N/A channel=2 edmg_enable=0 edmg_channel=0 secondary_channel=0 ieee80211n=1 ieee80211ac=0 ieee80211ax=1 ieee80211be=1 beacon_int=100 dtim_period=2 eht_oper_chwidth=0 eht_oper_centr_freq_seg0_idx=0 num_links=2 link_id=1 link_addr=02:00:00:a5:32:b3 partner_link[0]=02:00:00:c9:62:92 ap_mld_type=STR he_oper_chwidth=0 he_oper_centr_freq_seg0_idx=0 he_oper_centr_freq_seg1_idx=0 ht_caps_info=000c ht_mcs_bitmask=ffff0000000000000000 supported_rates=02 04 0b 16 0c 12 18 24 30 48 60 6c max_txpower=20 bss[0]=wlan7 bssid[0]=02:00:00:a5:32:b3 ssid[0]=mld_ap num_sta[0]=0 mld_addr[0]=02:00:00:00:07:00 mld_id[0]=0 mld_link_id[0]=1 PASS eht_mld_control_socket_connectivity 1.995034 2025-06-07 20:25:52.660130 passed all 1 test case(s) 2025-06-07 20:25:52 ./run-tests.py eht_sae_mlo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_sae_mlo 1/1 Test: EHT+MLO AP with SAE Starting AP wlan3 Connect STA wlan0 to AP PASS eht_sae_mlo 1.162982 2025-06-07 20:25:54.108025 passed all 1 test case(s) 2025-06-07 20:25:54 ./run-tests.py erp_radius_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START erp_radius_ext 1/1 Test: ERP enabled on a separate RADIUS server and peer Starting AP wlan3 Connect STA wlan0 to AP PASS erp_radius_ext 2.078523 2025-06-07 20:25:56.462491 passed all 1 test case(s) 2025-06-07 20:25:56 ./run-tests.py fils_sk_auth_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_auth_mismatch 1/1 Test: FILS SK authentication type mismatch (PFS not supported) Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS fils_sk_auth_mismatch 1.561734 2025-06-07 20:25:58.293928 passed all 1 test case(s) 2025-06-07 20:25:58 ./run-tests.py fils_sk_erp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp 1/1 Test: FILS SK using ERP Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS fils_sk_erp 1.480064 2025-06-07 20:26:00.044568 passed all 1 test case(s) 2025-06-07 20:26:00 ./run-tests.py fils_sk_multiple_realms DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_multiple_realms 1/1 Test: FILS SK and multiple realms Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS fils_sk_multiple_realms 2.102719 2025-06-07 20:26:02.418801 passed all 1 test case(s) 2025-06-07 20:26:02 ./run-tests.py fst_ap_ack_response_with_session_not_established_init_side DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_session_not_established_init_side 1/1 Test: FST AP ack response with session not established init side Starting AP wlan3 (old add_ap argument type) AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1350, in test_fst_ap_ack_response_with_session_not_established_init_side fst_bad_transfer(apdev, test_params, File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 647, in fst_bad_transfer ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_ap_ack_response_with_session_not_established_init_side 5.248671 2025-06-07 20:26:07.952783 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_ap_ack_response_with_session_not_established_init_side 2025-06-07 20:26:07 ./run-tests.py fst_ap_config_group_len DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_group_len 1/1 Test: FST AP configuration Group max length kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_group_len 1.082918 2025-06-07 20:26:09.317013 passed all 1 test case(s) 2025-06-07 20:26:09 ./run-tests.py fst_ap_config_pri_nan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_pri_nan 1/1 Test: FST AP configuration Priority not a number kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_pri_nan 1.084212 2025-06-07 20:26:10.683947 passed all 1 test case(s) 2025-06-07 20:26:10 ./run-tests.py ft_psk_key_lifetime_in_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ft_psk_key_lifetime_in_memory 1/1 Test: WPA2-PSK-FT and key lifetime in memory Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Reading process memory (pid=5580) [heap] 0x563d759c7000-0x563d759fc000 is at 16384-233472 [stack] 0x7ffccc319000-0x7ffccc33b000 is at 839680-978944 Total process memory read: 978944 bytes Checking keys in memory while associated Skip test case: PMK not found while associated SKIP ft_psk_key_lifetime_in_memory 3.04329 2025-06-07 20:26:14.011382 passed all 0 test case(s) skipped 1 test case(s) 2025-06-07 20:26:14 ./run-tests.py grpform3_c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform3_c 1/1 Test: P2P group formation using PIN and re-init GO Negotiation (group iface) Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed PASS grpform3_c 13.205992 2025-06-07 20:26:27.487163 passed all 1 test case(s) 2025-06-07 20:26:27 ./run-tests.py grpform_no_5ghz_add_cli2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_no_5ghz_add_cli2 1/1 Test: P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (reverse) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_no_5ghz_add_cli2 3.154312 2025-06-07 20:26:30.912455 passed all 1 test case(s) 2025-06-07 20:26:30 ./run-tests.py grpform_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_reject 1/1 Test: User rejecting group formation attempt by a P2P peer wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS grpform_reject 0.465383 2025-06-07 20:26:31.650964 passed all 1 test case(s) 2025-06-07 20:26:31 ./run-tests.py hapd_ctrl_mib DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_mib 1/1 Test: hostapd and MIB ctrl_iface command with open network Starting AP wlan3 Connect STA wlan0 to AP PASS hapd_ctrl_mib 1.016711 2025-06-07 20:26:32.948908 passed all 1 test case(s) 2025-06-07 20:26:32 ./run-tests.py hapd_dup_network_global_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_dup_network_global_wpa2 1/1 Test: hostapd and DUP_NETWORK command (WPA2) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS hapd_dup_network_global_wpa2 1.624549 2025-06-07 20:26:34.844077 passed all 1 test case(s) 2025-06-07 20:26:34 ./run-tests.py he_6ghz_acs_80mhz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_6ghz_acs_80mhz 1/1 Test: HE with ACS on 6 GHz using an 80 MHz channel Starting AP wlan3 Country code at the end: 00 Unexpected ACS event: <3>AP-DISABLED Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1347, in test_he_6ghz_acs_80mhz he_6ghz_acs(dev, apdev, 133, 80) File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1305, in he_6ghz_acs wait_acs(hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_acs.py", line 54, in wait_acs raise Exception("Unexpected ACS event: " + ev) Exception: Unexpected ACS event: <3>AP-DISABLED FAIL he_6ghz_acs_80mhz 6.406439 2025-06-07 20:26:41.527501 passed 0 test case(s) skipped 0 test case(s) failed tests: he_6ghz_acs_80mhz 2025-06-07 20:26:41 ./run-tests.py he_ap_mbssid_single_ssid_tm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_ap_mbssid_single_ssid_tm 1/1 Test: HE AP MBSSID with mixed security and single SSID and transition mode Starting AP wlan3 Starting APs for wlan3 Connect STA wlan0 to AP PASS he_ap_mbssid_single_ssid_tm 7.285531 2025-06-07 20:26:49.088067 passed all 1 test case(s) 2025-06-07 20:26:49 ./run-tests.py he_use_sta_nsts DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_use_sta_nsts 1/1 Test: HE with 80 MHz channel width and use_sta_nsts=1 Starting AP wlan3 Country code at the end: 00 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1021, in test_he_use_sta_nsts hapd = hostapd.add_ap(apdev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL he_use_sta_nsts 6.348495 2025-06-07 20:26:55.712148 passed 0 test case(s) skipped 0 test case(s) failed tests: he_use_sta_nsts 2025-06-07 20:26:55 ./run-tests.py ibss_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wep 1/1 Test: IBSS with WEP wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_wep 10.358451 2025-06-07 20:27:06.347101 passed all 1 test case(s) 2025-06-07 20:27:06 ./run-tests.py macsec_psk_fail_cp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_fail_cp 1/1 Test: MACsec PSK local failures in CP state machine veth0 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=6a:6a:5f:d7:e3:ff PAE KaY status=Active Authenticated=No Secured=Yes Failed=No Actor Priority=255 Key Server Priority=255 Is Key Server=No Number of Keys Distributed=1 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=6a:6a:5f:d7:e3:ff@1 key_server_sci=6a:6a:5f:d7:e3:ff@1 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=d06d07e7ab693b1fc911c5a1 mn=2 active=Yes participant=No retain=No live_peers=1 potential_peers=0 is_key_server=Yes is_elected=Yes uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 veth1 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=e2:98:19:72:a1:bc PAE KaY status=Active Authenticated=No Secured=Yes Failed=No Actor Priority=255 Key Server Priority=255 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=1 MKA Hello Time=2000 actor_sci=e2:98:19:72:a1:bc@1 key_server_sci=6a:6a:5f:d7:e3:ff@1 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=662685c88e66ae8dbe5008af mn=4 active=Yes participant=No retain=No live_peers=1 potential_peers=0 is_key_server=No is_elected=Yes uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 Expected key server: veth0 PASS macsec_psk_fail_cp 4.395935 2025-06-07 20:27:11.017498 passed all 1 test case(s) 2025-06-07 20:27:11 ./run-tests.py mesh_secure_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp 1/1 Test: Secure mesh with CCMP PASS mesh_secure_ccmp 2.145111 2025-06-07 20:27:13.445366 passed all 1 test case(s) 2025-06-07 20:27:13 ./run-tests.py multi_ap_backhaul_roam_with_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_backhaul_roam_with_bridge 1/1 Test: Multi-AP backhaul BSS reassociation to another BSS with bridge Starting AP wlan3 Connect STA wlan5 to AP Starting AP wlan4 PASS multi_ap_backhaul_roam_with_bridge 2.909627 2025-06-07 20:27:16.628982 passed all 1 test case(s) 2025-06-07 20:27:16 ./run-tests.py nan_usd_publish DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nan_usd_publish 1/1 Test: NAN USD Publish Maximum services: 20 PASS nan_usd_publish 0.109488 2025-06-07 20:27:17.012554 passed all 1 test case(s) 2025-06-07 20:27:17 ./run-tests.py nfc_p2p_ip_addr_assignment2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_ip_addr_assignment2 1/1 Test: NFC connection handover and IP address assignment for two clients Perform NFC connection handover Group formed Client 1 IP address: 192.168.42.100 Connect a P2P client wlan2: Trying to discover peer 02:00:00:00:01:00 Client connected Client 2 IP address: 192.168.42.101 PASS nfc_p2p_ip_addr_assignment2 12.724936 2025-06-07 20:27:30.011060 passed all 1 test case(s) 2025-06-07 20:27:30 ./run-tests.py nfc_wps_handover_pk_hash_mismatch_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_pk_hash_mismatch_ap 1/1 Test: WPS NFC connection handover with invalid pkhash from AP (negative) Starting AP wlan3 NFC connection handover wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth PASS nfc_wps_handover_pk_hash_mismatch_ap 1.115178 2025-06-07 20:27:31.403635 passed all 1 test case(s) 2025-06-07 20:27:31 ./run-tests.py olbc_table_limit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START olbc_table_limit 1/1 Test: OLBC AP table size limit Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Starting AP wlan4 PASS olbc_table_limit 2.966666 2025-06-07 20:27:34.640304 passed all 1 test case(s) 2025-06-07 20:27:34 ./run-tests.py owe_double_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_double_assoc 1/1 Test: Opportunistic Wireless Encryption - duplicated association attempt Starting AP wlan3 Connect STA wlan0 to AP PASS owe_double_assoc 1.204135 2025-06-07 20:27:36.116543 passed all 1 test case(s) 2025-06-07 20:27:36 ./run-tests.py p2p_device_persistent_group2_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_persistent_group2_no_group_iface 1/1 Test: P2P persistent group formation and re-invocation (reverse) with cfg80211 P2P Device (no separate group interface) Form a persistent group Start GO negotiation wlan7 -> wlan0 wlan0: Trying to discover peer 42:00:00:00:09:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan0: Trying to discover peer 42:00:00:00:09:00 Terminate persistent group Re-invoke persistent group from GO wlan7: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group PASS p2p_device_persistent_group2_no_group_iface 7.82135 2025-06-07 20:27:44.212031 passed all 1 test case(s) 2025-06-07 20:27:44 ./run-tests.py p2p_service_discovery_peer_not_listening DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_peer_not_listening 1/1 Test: P2P service discovery and peer not listening PASS p2p_service_discovery_peer_not_listening 4.080738 2025-06-07 20:27:48.566926 passed all 1 test case(s) 2025-06-07 20:27:48 ./run-tests.py p2ps_exact_search DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_exact_search 1/1 Test: P2PS exact service request PASS p2ps_exact_search 0.376266 2025-06-07 20:27:49.220347 passed all 1 test case(s) 2025-06-07 20:27:49 ./run-tests.py radius_macacl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_macacl 1/1 Test: RADIUS MAC ACL Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan2 to AP Connect STA wlan2 to AP PASS radius_macacl 1.796507 2025-06-07 20:27:51.289020 passed all 1 test case(s) 2025-06-07 20:27:51 ./run-tests.py radius_macacl_unreachable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_macacl_unreachable 1/1 Test: RADIUS MAC ACL and server unreachable Starting AP wlan3 Connect STA wlan0 to AP Fix authentication server port PASS radius_macacl_unreachable 4.446288 2025-06-07 20:27:56.006870 passed all 1 test case(s) 2025-06-07 20:27:56 ./run-tests.py radius_mppe_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_mppe_failure 1/1 Test: RADIUS failure when adding MPPE keys Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS radius_mppe_failure 1.550128 2025-06-07 20:27:57.826619 passed all 1 test case(s) 2025-06-07 20:27:57 ./run-tests.py rrm_beacon_req_ap_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_ap_errors 1/1 Test: Beacon request - AP error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth wlan0: Waiting for scan operation to complete before continuing Run FLUSH again since scan was in progress PASS rrm_beacon_req_ap_errors 2.592496 2025-06-07 20:28:00.693661 passed all 1 test case(s) 2025-06-07 20:28:00 ./run-tests.py rsn_preauth_local_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_preauth_local_errors 1/1 Test: RSN pre-authentication and local errors on AP Starting AP wlan3 PASS rsn_preauth_local_errors 2.290551 2025-06-07 20:28:03.255879 passed all 1 test case(s) 2025-06-07 20:28:03 ./run-tests.py sae_password_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_ffc 1/1 Test: SAE with number of different passwords (FFC) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_ffc 5.021343 2025-06-07 20:28:08.549729 passed all 1 test case(s) 2025-06-07 20:28:08 ./run-tests.py sae_pk_sec_5 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_sec_5 1/1 Test: SAE-PK with Sec 5 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_sec_5 1.455078 2025-06-07 20:28:10.275198 passed all 1 test case(s) 2025-06-07 20:28:10 ./run-tests.py sae_pwe_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_failure 1/1 Test: SAE and pwe failure Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_failure 3.636411 2025-06-07 20:28:14.186919 passed all 1 test case(s) 2025-06-07 20:28:14 ./run-tests.py sae_wpa3_roam DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_wpa3_roam 1/1 Test: SAE and WPA3-Personal transition mode roaming Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS sae_wpa3_roam 4.436332 2025-06-07 20:28:18.898669 passed all 1 test case(s) 2025-06-07 20:28:18 ./run-tests.py sigma_dut_ap_suite_b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_suite_b 1/1 Test: sigma_dut controlled AP Suite B Starting AP wlan4 Skip test case: sigma_dut not available SKIP sigma_dut_ap_suite_b 0.605163 2025-06-07 20:28:19.774283 passed all 0 test case(s) skipped 1 test case(s) 2025-06-07 20:28:19 ./run-tests.py sigma_dut_ap_transition_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_transition_disable 1/1 Test: sigma_dut controlled AP and transition disabled indication Skip test case: sigma_dut not available SKIP sigma_dut_ap_transition_disable 0.163687 2025-06-07 20:28:20.210326 passed all 0 test case(s) skipped 1 test case(s) 2025-06-07 20:28:20 ./run-tests.py sigma_dut_dpp_pkex_responder_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_pkex_responder_proto 1/1 Test: sigma_dut controlled STA as DPP PKEX responder and error case Skip test case: sigma_dut not available SKIP sigma_dut_dpp_pkex_responder_proto 0.061045 2025-06-07 20:28:20.547955 passed all 0 test case(s) skipped 1 test case(s) 2025-06-07 20:28:20 ./run-tests.py sigma_dut_dpp_proto_peer_disc_req3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_proto_peer_disc_req3 1/1 Test: sigma_dut DPP protocol testing - Peer Discovery Request (e) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_proto_peer_disc_req3 0.062041 2025-06-07 20:28:20.885635 passed all 0 test case(s) skipped 1 test case(s) 2025-06-07 20:28:20 ./run-tests.py suite_b_192_rsa_dhe_radius_rsa2048_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_dhe_radius_rsa2048_client 1/1 Test: Suite B 192-bit level and RSA (DHE) and RSA2048 client Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_dhe_radius_rsa2048_client 2.031388 2025-06-07 20:28:23.194594 passed all 1 test case(s) 2025-06-07 20:28:23 ./run-tests.py suite_b_192_rsa_ecdhe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_ecdhe 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA (ECDHE) Starting AP wlan3 Connect STA wlan0 to AP TLS version: TLSv1.2 PASS suite_b_192_rsa_ecdhe 1.87813 2025-06-07 20:28:25.351194 passed all 1 test case(s) 2025-06-07 20:28:25 ./run-tests.py wext_scan_hidden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_scan_hidden 1/1 Test: WEXT with hidden SSID Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS wext_scan_hidden 20.534875 2025-06-07 20:28:46.160379 passed all 1 test case(s) 2025-06-07 20:28:46 ./run-tests.py wnm_action_proto_no_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_action_proto_no_pmf 1/1 Test: WNM Action protocol testing (PMF disabled) Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_action_proto_no_pmf 1.168987 2025-06-07 20:28:47.605311 passed all 1 test case(s) 2025-06-07 20:28:47 ./run-tests.py wnm_bss_tm_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_reject 1/1 Test: WNM BSS Transition Management request getting rejected Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_reject 7.54275 2025-06-07 20:28:55.423970 passed all 1 test case(s) 2025-06-07 20:28:55 ./run-tests.py wnm_bss_tm_steering_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_steering_timeout 1/1 Test: WNM BSS Transition Management and steering timeout Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS wnm_bss_tm_steering_timeout 4.322427 2025-06-07 20:29:00.023688 passed all 1 test case(s) 2025-06-07 20:29:00 ./run-tests.py wnm_sleep_mode_ap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_sleep_mode_ap_oom 1/1 Test: WNM Sleep Mode - AP side OOM Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_sleep_mode_ap_oom 1.003355 2025-06-07 20:29:01.303976 passed all 1 test case(s) 2025-06-07 20:29:01 ./run-tests.py wpa2_ocv_ap_override_eapol_m3_post_enable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_m3_post_enable 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key msg 3/4 (post enable) Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_m3_post_enable 4.124325 2025-06-07 20:29:05.709319 passed all 1 test case(s) 2025-06-07 20:29:05 ./run-tests.py wpa2_ocv_ap_vht160_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_vht160_mismatch 1/1 Test: OCV AP mismatch (VHT160) Starting AP wlan3 AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 508, in test_wpa2_ocv_ap_vht160_mismatch run_wpa2_ocv_ap_vht160_mismatch(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 527, in run_wpa2_ocv_ap_vht160_mismatch conn = APConnection(apdev[0], dev[0], params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 378, in __init__ self.hapd = hostapd.add_ap(apdev, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL wpa2_ocv_ap_vht160_mismatch 6.681419 2025-06-07 20:29:12.661964 passed 0 test case(s) skipped 0 test case(s) failed tests: wpa2_ocv_ap_vht160_mismatch 2025-06-07 20:29:12 ./run-tests.py wpas_ap_sae_pwe_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_sae_pwe_1 1/1 Test: wpa_supplicant AP mode - SAE using sae_password and sae_pwe=1 Connect STA wlan1 to AP PASS wpas_ap_sae_pwe_1 1.151099 2025-06-07 20:29:14.101784 passed all 1 test case(s) 2025-06-07 20:29:14 ./run-tests.py wpas_config_file_set_global DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_config_file_set_global 1/1 Test: wpa_supplicant config file parsing/writing with arbitrary global values Configuration file contents: ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=adm update_config=1 dik_cipher=0 dik=BC49226934860E0CD042603CDE77E99F PASS wpas_config_file_set_global 0.522949 2025-06-07 20:29:14.898646 passed all 1 test case(s) 2025-06-07 20:29:14 ./run-tests.py wpas_ctrl_get DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_get 1/1 Test: wpa_supplicant ctrl_iface get PASS wpas_ctrl_get 0.067727 2025-06-07 20:29:15.235801 passed all 1 test case(s) 2025-06-07 20:29:15 ./run-tests.py wpas_ctrl_set_uapsd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_uapsd 1/1 Test: wpa_supplicant ctrl_iface SET uapsd PASS wpas_ctrl_set_uapsd 0.067985 2025-06-07 20:29:15.581145 passed all 1 test case(s) 2025-06-07 20:29:15 ./run-tests.py wpas_mesh_secure_sae_group_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_secure_sae_group_mismatch 1/1 Test: wpa_supplicant secure MESH and SAE group mismatch PASS wpas_mesh_secure_sae_group_mismatch 2.931048 2025-06-07 20:29:18.789048 passed all 1 test case(s) 2025-06-07 20:29:18 ./stop.sh