group: group-30, test: group-30
2025-06-07 20:21:50 export USER=root
2025-06-07 20:21:50 ./build.sh
Building TNC testing tools
Building wlantest
Building hs20-osu-client
Building hostapd
Building wpa_supplicant
2025-06-07 20:22:38 ./start.sh
2025-06-07 20:22:39 ./run-tests.py ap_csa_2_switches_count_0
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_csa_2_switches_count_0 1/1
Test: AP Channel Switch, two switches with count 0
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_csa_2_switches_count_0 1.177152 2025-06-07 20:22:41.993934
passed all 1 test case(s)
2025-06-07 20:22:42 ./run-tests.py ap_ft_eap_ptk_rekey_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_eap_ptk_rekey_ap 1/1
Test: WPA2-EAP-FT PTK rekeying triggered by AP
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
PASS ap_ft_eap_ptk_rekey_ap 4.520761 2025-06-07 20:22:46.797340
passed all 1 test case(s)
2025-06-07 20:22:46 ./run-tests.py ap_ft_rrb
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_rrb 1/1
Test: WPA2-PSK-FT RRB protocol testing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_ft_rrb 1.250192 2025-06-07 20:22:48.319667
passed all 1 test case(s)
2025-06-07 20:22:48 ./run-tests.py ap_hs20_ft
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_ft 1/1
Test: Hotspot 2.0 connection with FT
Starting AP wlan3
Starting AP wlan4
PASS ap_hs20_ft 2.266684 2025-06-07 20:22:50.857353
passed all 1 test case(s)
2025-06-07 20:22:50 ./run-tests.py ap_ht40_csa2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht40_csa2 1/1
Test: HT with 40 MHz channel width and CSA
Starting AP wlan3
AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main
t(dev, apdev)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ht.py", line 1102, in test_ap_ht40_csa2
hapd = hostapd.add_ap(apdev[0], params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL ap_ht40_csa2 5.83452 2025-06-07 20:22:56.965108
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_ht40_csa2
2025-06-07 20:22:57 ./run-tests.py ap_ht_op_class_120
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht_op_class_120 1/1
Test: HT40 on operating class 120
Starting AP wlan3
Skip test case: Channel not supported
SKIP ap_ht_op_class_120 5.767741 2025-06-07 20:23:03.004895
passed all 0 test case(s)
skipped 1 test case(s)
2025-06-07 20:23:03 ./run-tests.py ap_ht_op_class_81
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht_op_class_81 1/1
Test: HT20 on operating class 81
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_ht_op_class_81 2.761424 2025-06-07 20:23:06.035649
passed all 1 test case(s)
2025-06-07 20:23:06 ./run-tests.py ap_open_start_disabled
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_start_disabled 1/1
Test: AP with open mode and beaconing disabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_start_disabled 1.502845 2025-06-07 20:23:07.813375
passed all 1 test case(s)
2025-06-07 20:23:07 ./run-tests.py ap_remove_during_acs3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_acs3 1/1
Test: Remove second BSS during ACS in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Removing BSS wlan3-2
PASS ap_remove_during_acs3 1.106785 2025-06-07 20:23:09.190415
passed all 1 test case(s)
2025-06-07 20:23:09 ./run-tests.py ap_vht_tkip
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_tkip 1/1
Test: VHT and TKIP
Starting AP wlan3
Country code at the end: 00
AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main
t(dev, apdev)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 1246, in test_ap_vht_tkip
hapd = hostapd.add_ap(apdev[0], params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL ap_vht_tkip 6.632713 2025-06-07 20:23:16.097780
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_vht_tkip
2025-06-07 20:23:16 ./run-tests.py ap_vlan_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_psk 1/1
Test: AP VLAN based on PSK/passphrase
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_psk 2.772646 2025-06-07 20:23:19.141895
passed all 1 test case(s)
2025-06-07 20:23:19 ./run-tests.py ap_wpa2_eap_aka_imsi_identity
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_imsi_identity 1/1
Test: WPA2-Enterprise connection using EAP-AKA and imsi_identity
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_imsi_identity 1.110597 2025-06-07 20:23:20.527163
passed all 1 test case(s)
2025-06-07 20:23:20 ./run-tests.py ap_wpa2_eap_sim_id_2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_sim_id_2 1/1
Test: WPA2-Enterprise connection using EAP-SIM (no pseudonym, reauth)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_sim_id_2 1.092101 2025-06-07 20:23:21.887325
passed all 1 test case(s)
2025-06-07 20:23:21 ./run-tests.py ap_wpa2_eap_ttls_dh_params_server
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_dh_params_server 1/1
Test: WPA2-Enterprise using EAP-TTLS and alternative server dhparams
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_dh_params_server 1.074727 2025-06-07 20:23:23.235838
passed all 1 test case(s)
2025-06-07 20:23:23 ./run-tests.py ap_wpa2_eap_ttls_eap_aka
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_eap_aka 1/1
Test: WPA2-Enterprise connection using EAP-TTLS/EAP-AKA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_eap_aka 1.117938 2025-06-07 20:23:24.631576
passed all 1 test case(s)
2025-06-07 20:23:24 ./run-tests.py ap_wpa2_plaintext_group_m1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_plaintext_group_m1 1/1
Test: Plaintext group M1
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_plaintext_group_m1 1.465996 2025-06-07 20:23:26.369930
passed all 1 test case(s)
2025-06-07 20:23:26 ./run-tests.py ap_wpa2_psk_ifdown
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_ifdown 1/1
Test: AP with open mode and external ifconfig down
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_psk_ifdown 2.738474 2025-06-07 20:23:29.378430
passed all 1 test case(s)
2025-06-07 20:23:29 ./run-tests.py ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg 1/1
Test: WPA2-PSK supplicant protocol testing: too long GTK KDE in group msg
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg 1.029979 2025-06-07 20:23:30.686291
passed all 1 test case(s)
2025-06-07 20:23:30 ./run-tests.py ap_wps_ap_pin_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_ap_pin_failure 1/1
Test: WPS_AP_PIN failure
PASS ap_wps_ap_pin_failure 0.678191 2025-06-07 20:23:31.641774
passed all 1 test case(s)
2025-06-07 20:23:31 ./run-tests.py ap_wps_er_http_proto_control_url_dns
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_http_proto_control_url_dns 1/1
Test: WPS ER HTTP protocol testing - DNS name in controlURL
HTTP server received: GET /foo.xml HTTP/1.1
HTTP header: Cache-Control: no-cache
HTTP header: Pragma: no-cache
HTTP header: Accept: text/xml, application/xml
HTTP header: User-Agent: wpa_supplicant
HTTP header: Host: 127.0.0.1:12345
PASS ap_wps_er_http_proto_control_url_dns 2.069783 2025-06-07 20:23:33.988879
passed all 1 test case(s)
2025-06-07 20:23:34 ./run-tests.py ap_wps_er_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_oom 1/1
Test: WPS ER OOM in XML processing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wps_er_oom 6.283238 2025-06-07 20:23:40.550427
passed all 1 test case(s)
2025-06-07 20:23:40 ./run-tests.py ap_wps_m2_missing_dev_passwd_id
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_m2_missing_dev_passwd_id 1/1
Test: WPS and M2 without Device Password ID
Starting AP wlan3
PASS ap_wps_m2_missing_dev_passwd_id 1.540206 2025-06-07 20:23:42.360022
passed all 1 test case(s)
2025-06-07 20:23:42 ./run-tests.py ap_wps_per_station_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_per_station_psk 1/1
Test: WPS PBC provisioning with per-station PSK
Starting AP wlan3
First enrollee
Second enrollee
External registrar
Verifying PSK results
Second external registrar
PASS ap_wps_per_station_psk 6.112327 2025-06-07 20:23:48.746642
passed all 1 test case(s)
2025-06-07 20:23:48 ./run-tests.py ap_wps_set_selected_registrar_proto
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_set_selected_registrar_proto 1/1
Test: WPS UPnP SetSelectedRegistrar protocol testing
Starting AP wlan3
PASS ap_wps_set_selected_registrar_proto 0.767352 2025-06-07 20:23:49.794031
passed all 1 test case(s)
2025-06-07 20:23:49 ./run-tests.py autogo_random_channel
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START autogo_random_channel 1/1
Test: P2P channel selection: GO instantiated on random channel 1, 6, 11
Start autonomous GO wlan0
Start autonomous GO wlan0
Start autonomous GO wlan0
PASS autogo_random_channel 1.782565 2025-06-07 20:23:51.851029
passed all 1 test case(s)
2025-06-07 20:23:51 ./run-tests.py dbus_apscan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_apscan 1/1
Test: D-Bus Get/Set ApScan
PASS dbus_apscan 0.068935 2025-06-07 20:23:52.194196
passed all 1 test case(s)
2025-06-07 20:23:52 ./run-tests.py dbus_introspect
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_introspect 1/1
Test: D-Bus introspection
Initial Introspect:
Introspect: None
Introspect:
Introspect:
Introspect:
PASS dbus_introspect 0.072364 2025-06-07 20:23:52.546076
passed all 1 test case(s)
2025-06-07 20:23:52 ./run-tests.py dbus_p2p_wps_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_p2p_wps_failure 1/1
Test: D-Bus P2P WPS failure
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan1: Ignore unexpected status-driver line: ignore_next_local_deauth
PASS dbus_p2p_wps_failure 3.143522 2025-06-07 20:23:55.976824
passed all 1 test case(s)
2025-06-07 20:23:56 ./run-tests.py discovery_device_name_change
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START discovery_device_name_change 1/1
Test: P2P device discovery and peer changing device name
PASS discovery_device_name_change 1.096942 2025-06-07 20:23:57.356052
passed all 1 test case(s)
2025-06-07 20:23:57 ./run-tests.py discovery_pd_retries
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START discovery_pd_retries 1/1
Test: P2P device discovery and provision discovery retries
wlan0: Trying to discover peer 02:00:00:00:01:00
PASS discovery_pd_retries 39.45661 2025-06-07 20:24:37.096474
passed all 1 test case(s)
2025-06-07 20:24:37 ./run-tests.py dpp_config_connector_error_missing_net_role
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_connector_error_missing_net_role 1/1
Test: DPP Config Object connector error - missing netRole
r=55ca34c711ba845a80e26187ce366d93cf9d182bc95379e4991af562e26de6e5
s=89372b15d93649dc5114bdb4680c0e131669036a4de926fa2c93b73eaf9ef2a7
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_connector_error_missing_net_role 0.146019 2025-06-07 20:24:37.524016
passed all 1 test case(s)
2025-06-07 20:24:37 ./run-tests.py dpp_config_jws_error_prot_hdr_not_an_object
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_jws_error_prot_hdr_not_an_object 1/1
Test: DPP Config Object JWS error - protected header not an object
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_jws_error_prot_hdr_not_an_object 0.127855 2025-06-07 20:24:37.951262
passed all 1 test case(s)
2025-06-07 20:24:37 ./run-tests.py dpp_config_legacy_gen_sta_ap_conf
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_legacy_gen_sta_ap_conf 1/1
Test: Generate DPP Config Object for legacy network (sta and ap config)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_legacy_gen_sta_ap_conf 1.125138 2025-06-07 20:24:39.359315
passed all 1 test case(s)
2025-06-07 20:24:39 ./run-tests.py dpp_configurator_id_unknown
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_configurator_id_unknown 1/1
Test: DPP and unknown configurator id
Starting AP wlan3
PASS dpp_configurator_id_unknown 0.507673 2025-06-07 20:24:40.153557
passed all 1 test case(s)
2025-06-07 20:24:40 ./run-tests.py dpp_conn_status_assoc_reject
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_conn_status_assoc_reject 1/1
Test: DPP connection status - association rejection
Starting AP wlan3
PASS dpp_conn_status_assoc_reject 15.608372 2025-06-07 20:24:56.053926
passed all 1 test case(s)
2025-06-07 20:24:56 ./run-tests.py dpp_conn_status_connector_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_conn_status_connector_mismatch 1/1
Test: DPP connection status - invalid Connector
Starting AP wlan3
PASS dpp_conn_status_connector_mismatch 5.474303 2025-06-07 20:25:01.812499
passed all 1 test case(s)
2025-06-07 20:25:01 ./run-tests.py dpp_pkex_exchange_resp_processing_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_pkex_exchange_resp_processing_failure 1/1
Test: DPP and PKEX with local failure in processing Exchange Resp
PASS dpp_pkex_exchange_resp_processing_failure 0.228074 2025-06-07 20:25:02.334745
passed all 1 test case(s)
2025-06-07 20:25:02 ./run-tests.py dpp_proto_after_wrapped_data_pkex_cr_resp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_after_wrapped_data_pkex_cr_resp 1/1
Test: DPP protocol testing - attribute after Wrapped Data in PKEX CR Resp
PASS dpp_proto_after_wrapped_data_pkex_cr_resp 0.155162 2025-06-07 20:25:02.768661
passed all 1 test case(s)
2025-06-07 20:25:02 ./run-tests.py dpp_proto_auth_req_invalid_i_proto_key
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_req_invalid_i_proto_key 1/1
Test: DPP protocol testing - invalid I-proto key in Auth Req
PASS dpp_proto_auth_req_invalid_i_proto_key 0.211612 2025-06-07 20:25:03.275915
passed all 1 test case(s)
2025-06-07 20:25:03 ./run-tests.py dpp_proto_auth_req_no_i_capab
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_req_no_i_capab 1/1
Test: DPP protocol testing - no I-capab in Auth Req
PASS dpp_proto_auth_req_no_i_capab 0.21077 2025-06-07 20:25:03.772865
passed all 1 test case(s)
2025-06-07 20:25:03 ./run-tests.py dpp_proto_conf_resp_no_e_nonce
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_conf_resp_no_e_nonce 1/1
Test: DPP protocol testing - no E-nonce in Conf Resp
PASS dpp_proto_conf_resp_no_e_nonce 0.13194 2025-06-07 20:25:04.189049
passed all 1 test case(s)
2025-06-07 20:25:04 ./run-tests.py dpp_proto_pkex_cr_req_i_auth_tag_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_pkex_cr_req_i_auth_tag_mismatch 1/1
Test: DPP protocol testing - I-auth tag mismatch in PKEX Commit-Reveal Request
PASS dpp_proto_pkex_cr_req_i_auth_tag_mismatch 0.158829 2025-06-07 20:25:04.631106
passed all 1 test case(s)
2025-06-07 20:25:04 ./run-tests.py dscp_request
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dscp_request 1/1
Test: DSCP Policy Request
Starting AP wlan3
Connect STA wlan0 to AP
PASS dscp_request 1.087266 2025-06-07 20:25:06.003329
passed all 1 test case(s)
2025-06-07 20:25:06 ./run-tests.py eap_canned_failure_before_method
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_canned_failure_before_method 1/1
Test: EAP protocol tests for canned EAP-Failure before any method
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_canned_failure_before_method 1.003444 2025-06-07 20:25:07.299001
passed all 1 test case(s)
2025-06-07 20:25:07 ./run-tests.py eap_mschapv2_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_mschapv2_errors 1/1
Test: EAP-MSCHAPv2 error cases
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS eap_mschapv2_errors 8.036957 2025-06-07 20:25:15.626903
passed all 1 test case(s)
2025-06-07 20:25:15 ./run-tests.py eap_peap_session_resumption_crypto_binding
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_peap_session_resumption_crypto_binding 1/1
Test: EAP-PEAP session resumption with crypto binding
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_peap_session_resumption_crypto_binding 1.056008 2025-06-07 20:25:16.973094
passed all 1 test case(s)
2025-06-07 20:25:17 ./run-tests.py eap_proto_aka
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_aka 1/1
Test: EAP-AKA protocol tests
Starting AP wlan3
Connect STA wlan0 to AP
aka_handler - RX 02f900150130323332303130303030303030303030
Test: Missing payload
Connect STA wlan0 to AP
aka_handler - RX 021a00150130323332303130303030303030303030
Test: Unknown subtype
aka_handler - RX 021b000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02b800150130323332303130303030303030303030
Test: Client Error
aka_handler - RX 02b9000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 020a00150130323332303130303030303030303030
Test: Too short attribute header
aka_handler - RX 020b000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 029f00150130323332303130303030303030303030
Test: Truncated attribute
aka_handler - RX 02a0000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 027600150130323332303130303030303030303030
Test: Too short attribute data
aka_handler - RX 0277000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 028700150130323332303130303030303030303030
Test: Skippable/non-skippable unrecognzized attribute
aka_handler - RX 0288000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02c200150130323332303130303030303030303030
Test: Identity request without ID type
aka_handler - RX 02c3000817050000
Test: Identity request ANY_ID
aka_handler - RX 02c4001c170500000e05001030323332303130303030303030303030
Test: Identity request ANY_ID (duplicate)
aka_handler - RX 02c5000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 021200150130323332303130303030303030303030
Test: Identity request ANY_ID
aka_handler - RX 0213001c170500000e05001030323332303130303030303030303030
Test: Identity request FULLAUTH_ID
aka_handler - RX 0214001c170500000e05001030323332303130303030303030303030
Test: Identity request FULLAUTH_ID (duplicate)
aka_handler - RX 0215000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 024800150130323332303130303030303030303030
Test: Identity request ANY_ID
aka_handler - RX 0249001c170500000e05001030323332303130303030303030303030
Test: Identity request FULLAUTH_ID
aka_handler - RX 024a001c170500000e05001030323332303130303030303030303030
Test: Identity request PERMANENT_ID
aka_handler - RX 024b001c170500000e05001030323332303130303030303030303030
Test: Identity request PERMANENT_ID (duplicate)
aka_handler - RX 024c000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02d300150130323332303130303030303030303030
Test: Challenge with no attributes
aka_handler - RX 02d4000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 029900150130323332303130303030303030303030
Test: AKA Challenge with BIDDING
aka_handler - RX 029a000817020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 024b00150130323332303130303030303030303030
Test: Notification with no attributes
aka_handler - RX 024c000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02df00150130323332303130303030303030303030
Test: Notification indicating success, but no MAC
aka_handler - RX 02e0000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02f700150130323332303130303030303030303030
Test: Notification indicating success, but invalid MAC value
aka_handler - RX 02f8000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 026000150130323332303130303030303030303030
Test: Notification indicating success with zero-key MAC
aka_handler - RX 0261000c170e000016010000
Test: EAP-Success
Connect STA wlan0 to AP
aka_handler - RX 028c00150130323332303130303030303030303030
Test: Notification before auth
aka_handler - RX 028d0008170c0000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 023e00150130323332303130303030303030303030
Test: Notification before auth
aka_handler - RX 023f0008170c0000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 022b00150130323332303130303030303030303030
Test: Notification with unrecognized non-failure
aka_handler - RX 022c0008170c0000
Test: Notification before auth (duplicate)
aka_handler - RX 022d000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 028700150130323332303130303030303030303030
Test: Re-authentication (unexpected) with no attributes
aka_handler - RX 0288000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 026500150130323332303130303030303030303030
Test: AKA Challenge with Checkcode claiming identity round was used
aka_handler - RX 0266000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 023800150130323332303130303030303030303030
Test: Identity request ANY_ID
aka_handler - RX 0239001c170500000e05001030323332303130303030303030303030
Test: AKA Challenge with Checkcode claiming no identity round was used
aka_handler - RX 023a000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 020e00150130323332303130303030303030303030
Test: Identity request ANY_ID
aka_handler - RX 020f001c170500000e05001030323332303130303030303030303030
Test: AKA Challenge with mismatching Checkcode value
aka_handler - RX 0210000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 023f00150130323332303130303030303030303030
Test: Re-authentication (unexpected) with Checkcode claimin identity round was used
aka_handler - RX 0240000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 024200150130323332303130303030303030303030
Test: Invalid AT_RAND length
aka_handler - RX 0243000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 020900150130323332303130303030303030303030
Test: Invalid AT_AUTN length
aka_handler - RX 020a000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 024600150130323332303130303030303030303030
Test: Unencrypted AT_PADDING
aka_handler - RX 0247000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02b700150130323332303130303030303030303030
Test: Invalid AT_NONCE_MT length
aka_handler - RX 02b8000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02a200150130323332303130303030303030303030
Test: Invalid AT_MAC length
aka_handler - RX 02a3000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 025d00150130323332303130303030303030303030
Test: Invalid AT_NOTIFICATION length
aka_handler - RX 025e000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 022200150130323332303130303030303030303030
Test: AT_IDENTITY overflow
aka_handler - RX 0223000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 029b00150130323332303130303030303030303030
Test: Unexpected AT_VERSION_LIST
aka_handler - RX 029c000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 027700150130323332303130303030303030303030
Test: Invalid AT_SELECTED_VERSION length
aka_handler - RX 0278000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02da00150130323332303130303030303030303030
Test: Unencrypted AT_COUNTER
aka_handler - RX 02db000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02a600150130323332303130303030303030303030
Test: Unencrypted AT_COUNTER_TOO_SMALL
aka_handler - RX 02a7000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 021600150130323332303130303030303030303030
Test: Unencrypted AT_NONCE_S
aka_handler - RX 0217000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 025100150130323332303130303030303030303030
Test: Invalid AT_CLIENT_ERROR_CODE length
aka_handler - RX 0252000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 022d00150130323332303130303030303030303030
Test: Invalid AT_IV length
aka_handler - RX 022e000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02d800150130323332303130303030303030303030
Test: Invalid AT_ENCR_DATA length
aka_handler - RX 02d9000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 026300150130323332303130303030303030303030
Test: Unencrypted AT_NEXT_PSEUDONYM
aka_handler - RX 0264000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 027500150130323332303130303030303030303030
Test: Unencrypted AT_NEXT_REAUTH_ID
aka_handler - RX 0276000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02ac00150130323332303130303030303030303030
Test: Invalid AT_RES length
aka_handler - RX 02ad000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02fc00150130323332303130303030303030303030
Test: Invalid AT_RES length
aka_handler - RX 02fd000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02c100150130323332303130303030303030303030
Test: Invalid AT_AUTS length
aka_handler - RX 02c2000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 028b00150130323332303130303030303030303030
Test: Invalid AT_CHECKCODE length
aka_handler - RX 028c000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02f400150130323332303130303030303030303030
Test: Invalid AT_RESULT_IND length
aka_handler - RX 02f5000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 022100150130323332303130303030303030303030
Test: Unexpected AT_KDF_INPUT
aka_handler - RX 0222000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 021800150130323332303130303030303030303030
Test: Unexpected AT_KDF
aka_handler - RX 0219000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 023200150130323332303130303030303030303030
Test: Invalid AT_BIDDING length
aka_handler - RX 0233000c170e000016010000
Test: EAP-Failure
PASS eap_proto_aka 17.739082 2025-06-07 20:25:34.985477
passed all 1 test case(s)
2025-06-07 20:25:35 ./run-tests.py eap_proto_aka_prime
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_aka_prime 1/1
Test: EAP-AKA' protocol tests
Starting AP wlan3
Connect STA wlan0 to AP
aka_prime_handler - RX 029f00150136353535343434333333323232313131
Test: Missing payload
Connect STA wlan0 to AP
aka_prime_handler - RX 029800150136353535343434333333323232313131
Test: Challenge with no attributes
aka_prime_handler - RX 0299000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 028400150136353535343434333333323232313131
Test: Challenge with empty AT_KDF_INPUT
aka_prime_handler - RX 0285000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02ad00150136353535343434333333323232313131
Test: Challenge with AT_KDF_INPUT
aka_prime_handler - RX 02ae000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02d700150136353535343434333333323232313131
Test: Challenge with duplicated KDF
aka_prime_handler - RX 02d8000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02c600150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 02c7000c3201000018010001
Test: Challenge with incorrect KDF selected
aka_prime_handler - RX 02c8000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02b600150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 02b7000c3201000018010001
Test: Challenge with selected KDF not duplicated
aka_prime_handler - RX 02b8000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 021d00150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 021e000c3201000018010001
Test: Challenge with selected KDF duplicated (missing MAC, RAND, AUTN)
aka_prime_handler - RX 021f000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 027d00150136353535343434333333323232313131
Test: Challenge with multiple unsupported KDF proposals
aka_prime_handler - RX 027e000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 025800150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 0259000c3201000018010001
Test: Challenge with invalid MAC, RAND, AUTN values)
aka_prime_handler - RX 025a000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 027b00150136353535343434333333323232313131
Test: Challenge - AMF separation bit not set)
aka_prime_handler - RX 027c000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 029f00150136353535343434333333323232313131
Test: Challenge - Invalid MAC
aka_prime_handler - RX 02a0000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02f400150136353535343434333333323232313131
Test: Challenge - Valid MAC
aka_prime_handler - RX 02f5000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02f200150136353535343434333333323232313131
Test: Invalid AT_KDF_INPUT length
aka_prime_handler - RX 02f3000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 027a00150136353535343434333333323232313131
Test: Invalid AT_KDF length
aka_prime_handler - RX 027b000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 029a00150136353535343434333333323232313131
Test: Challenge with large number of KDF proposals
aka_prime_handler - RX 029b000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 020900150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 020a000c3201000018010001
Test: Challenge with an extra KDF appended
aka_prime_handler - RX 020b000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02cb00150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 02cc000c3201000018010001
Test: Challenge with a modified KDF
aka_prime_handler - RX 02cd000c320e000016010000
Test: EAP-Failure
PASS eap_proto_aka_prime 8.936866 2025-06-07 20:25:44.212222
passed all 1 test case(s)
2025-06-07 20:25:44 ./run-tests.py eap_proto_md5_server
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_md5_server 1/1
Test: EAP-MD5 protocol testing for the server
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS eap_proto_md5_server 1.863795 2025-06-07 20:25:46.364612
passed all 1 test case(s)
2025-06-07 20:25:46 ./run-tests.py eap_tls_session_resumption_expiration
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_tls_session_resumption_expiration 1/1
Test: EAP-TLS session resumption
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_tls_session_resumption_expiration 3.737431 2025-06-07 20:25:50.387914
passed all 1 test case(s)
2025-06-07 20:25:50 ./run-tests.py eht_mld_control_socket_connectivity
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eht_mld_control_socket_connectivity 1/1
Test: AP MLD control socket connectivity
Adding link on: ifname=wlan7
Adding link on: ifname=wlan7
LINK 0 STATUS:
state=ENABLED
phy=phy7
freq=2412
num_sta_non_erp=0
num_sta_no_short_slot_time=0
num_sta_no_short_preamble=0
olbc=0
num_sta_ht_no_gf=0
num_sta_no_ht=0
num_sta_ht_20_mhz=0
num_sta_ht40_intolerant=0
olbc_ht=0
ht_op_mode=0x0
hw_mode=g
cac_time_seconds=0
cac_time_left_seconds=N/A
channel=1
edmg_enable=0
edmg_channel=0
secondary_channel=0
ieee80211n=1
ieee80211ac=0
ieee80211ax=1
ieee80211be=1
beacon_int=100
dtim_period=2
eht_oper_chwidth=0
eht_oper_centr_freq_seg0_idx=0
num_links=2
link_id=0
link_addr=02:00:00:c9:62:92
partner_link[1]=02:00:00:a5:32:b3
ap_mld_type=STR
he_oper_chwidth=0
he_oper_centr_freq_seg0_idx=0
he_oper_centr_freq_seg1_idx=0
ht_caps_info=000c
ht_mcs_bitmask=ffff0000000000000000
supported_rates=02 04 0b 16 0c 12 18 24 30 48 60 6c
max_txpower=20
bss[0]=wlan7
bssid[0]=02:00:00:c9:62:92
ssid[0]=mld_ap
num_sta[0]=0
mld_addr[0]=02:00:00:00:07:00
mld_id[0]=0
mld_link_id[0]=0
LINK 1 STATUS:
state=ENABLED
phy=phy7
freq=2417
num_sta_non_erp=0
num_sta_no_short_slot_time=0
num_sta_no_short_preamble=0
olbc=0
num_sta_ht_no_gf=0
num_sta_no_ht=0
num_sta_ht_20_mhz=0
num_sta_ht40_intolerant=0
olbc_ht=0
ht_op_mode=0x0
hw_mode=g
cac_time_seconds=0
cac_time_left_seconds=N/A
channel=2
edmg_enable=0
edmg_channel=0
secondary_channel=0
ieee80211n=1
ieee80211ac=0
ieee80211ax=1
ieee80211be=1
beacon_int=100
dtim_period=2
eht_oper_chwidth=0
eht_oper_centr_freq_seg0_idx=0
num_links=2
link_id=1
link_addr=02:00:00:a5:32:b3
partner_link[0]=02:00:00:c9:62:92
ap_mld_type=STR
he_oper_chwidth=0
he_oper_centr_freq_seg0_idx=0
he_oper_centr_freq_seg1_idx=0
ht_caps_info=000c
ht_mcs_bitmask=ffff0000000000000000
supported_rates=02 04 0b 16 0c 12 18 24 30 48 60 6c
max_txpower=20
bss[0]=wlan7
bssid[0]=02:00:00:a5:32:b3
ssid[0]=mld_ap
num_sta[0]=0
mld_addr[0]=02:00:00:00:07:00
mld_id[0]=0
mld_link_id[0]=1
PASS eht_mld_control_socket_connectivity 1.995034 2025-06-07 20:25:52.660130
passed all 1 test case(s)
2025-06-07 20:25:52 ./run-tests.py eht_sae_mlo
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eht_sae_mlo 1/1
Test: EHT+MLO AP with SAE
Starting AP wlan3
Connect STA wlan0 to AP
PASS eht_sae_mlo 1.162982 2025-06-07 20:25:54.108025
passed all 1 test case(s)
2025-06-07 20:25:54 ./run-tests.py erp_radius_ext
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START erp_radius_ext 1/1
Test: ERP enabled on a separate RADIUS server and peer
Starting AP wlan3
Connect STA wlan0 to AP
PASS erp_radius_ext 2.078523 2025-06-07 20:25:56.462491
passed all 1 test case(s)
2025-06-07 20:25:56 ./run-tests.py fils_sk_auth_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_sk_auth_mismatch 1/1
Test: FILS SK authentication type mismatch (PFS not supported)
Starting AP as-erp
Starting AP wlan3
Connect STA wlan0 to AP
PASS fils_sk_auth_mismatch 1.561734 2025-06-07 20:25:58.293928
passed all 1 test case(s)
2025-06-07 20:25:58 ./run-tests.py fils_sk_erp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_sk_erp 1/1
Test: FILS SK using ERP
Starting AP as-erp
Starting AP wlan3
Connect STA wlan0 to AP
PASS fils_sk_erp 1.480064 2025-06-07 20:26:00.044568
passed all 1 test case(s)
2025-06-07 20:26:00 ./run-tests.py fils_sk_multiple_realms
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_sk_multiple_realms 1/1
Test: FILS SK and multiple realms
Starting AP as-erp
Starting AP wlan3
Connect STA wlan0 to AP
PASS fils_sk_multiple_realms 2.102719 2025-06-07 20:26:02.418801
passed all 1 test case(s)
2025-06-07 20:26:02 ./run-tests.py fst_ap_ack_response_with_session_not_established_init_side
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_ack_response_with_session_not_established_init_side 1/1
Test: FST AP ack response with session not established init side
Starting AP wlan3 (old add_ap argument type)
AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 589, in main
t(dev, apdev, params)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1350, in test_fst_ap_ack_response_with_session_not_established_init_side
fst_bad_transfer(apdev, test_params,
File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 647, in fst_bad_transfer
ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs
ap1.start()
File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start
self.hapd = hostapd.add_ap(self.iface, params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL fst_ap_ack_response_with_session_not_established_init_side 5.248671 2025-06-07 20:26:07.952783
passed 0 test case(s)
skipped 0 test case(s)
failed tests: fst_ap_ack_response_with_session_not_established_init_side
2025-06-07 20:26:07 ./run-tests.py fst_ap_config_group_len
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_config_group_len 1/1
Test: FST AP configuration Group max length
kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second
kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process
PASS fst_ap_config_group_len 1.082918 2025-06-07 20:26:09.317013
passed all 1 test case(s)
2025-06-07 20:26:09 ./run-tests.py fst_ap_config_pri_nan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_config_pri_nan 1/1
Test: FST AP configuration Priority not a number
kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second
kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process
PASS fst_ap_config_pri_nan 1.084212 2025-06-07 20:26:10.683947
passed all 1 test case(s)
2025-06-07 20:26:10 ./run-tests.py ft_psk_key_lifetime_in_memory
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ft_psk_key_lifetime_in_memory 1/1
Test: WPA2-PSK-FT and key lifetime in memory
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
Reading process memory (pid=5580)
[heap] 0x563d759c7000-0x563d759fc000 is at 16384-233472
[stack] 0x7ffccc319000-0x7ffccc33b000 is at 839680-978944
Total process memory read: 978944 bytes
Checking keys in memory while associated
Skip test case: PMK not found while associated
SKIP ft_psk_key_lifetime_in_memory 3.04329 2025-06-07 20:26:14.011382
passed all 0 test case(s)
skipped 1 test case(s)
2025-06-07 20:26:14 ./run-tests.py grpform3_c
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform3_c 1/1
Test: P2P group formation using PIN and re-init GO Negotiation (group iface)
Start GO negotiation wlan0 -> wlan1
wlan0: Trying to discover peer 02:00:00:00:01:00
wlan1: Trying to discover peer 02:00:00:00:00:00
Group formed
PASS grpform3_c 13.205992 2025-06-07 20:26:27.487163
passed all 1 test case(s)
2025-06-07 20:26:27 ./run-tests.py grpform_no_5ghz_add_cli2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform_no_5ghz_add_cli2 1/1
Test: P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (reverse)
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
PASS grpform_no_5ghz_add_cli2 3.154312 2025-06-07 20:26:30.912455
passed all 1 test case(s)
2025-06-07 20:26:30 ./run-tests.py grpform_reject
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform_reject 1/1
Test: User rejecting group formation attempt by a P2P peer
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan1: Trying to discover peer 02:00:00:00:00:00
PASS grpform_reject 0.465383 2025-06-07 20:26:31.650964
passed all 1 test case(s)
2025-06-07 20:26:31 ./run-tests.py hapd_ctrl_mib
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START hapd_ctrl_mib 1/1
Test: hostapd and MIB ctrl_iface command with open network
Starting AP wlan3
Connect STA wlan0 to AP
PASS hapd_ctrl_mib 1.016711 2025-06-07 20:26:32.948908
passed all 1 test case(s)
2025-06-07 20:26:32 ./run-tests.py hapd_dup_network_global_wpa2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START hapd_dup_network_global_wpa2 1/1
Test: hostapd and DUP_NETWORK command (WPA2)
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS hapd_dup_network_global_wpa2 1.624549 2025-06-07 20:26:34.844077
passed all 1 test case(s)
2025-06-07 20:26:34 ./run-tests.py he_6ghz_acs_80mhz
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_6ghz_acs_80mhz 1/1
Test: HE with ACS on 6 GHz using an 80 MHz channel
Starting AP wlan3
Country code at the end: 00
Unexpected ACS event: <3>AP-DISABLED
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main
t(dev, apdev)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1347, in test_he_6ghz_acs_80mhz
he_6ghz_acs(dev, apdev, 133, 80)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1305, in he_6ghz_acs
wait_acs(hapd)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_acs.py", line 54, in wait_acs
raise Exception("Unexpected ACS event: " + ev)
Exception: Unexpected ACS event: <3>AP-DISABLED
FAIL he_6ghz_acs_80mhz 6.406439 2025-06-07 20:26:41.527501
passed 0 test case(s)
skipped 0 test case(s)
failed tests: he_6ghz_acs_80mhz
2025-06-07 20:26:41 ./run-tests.py he_ap_mbssid_single_ssid_tm
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_ap_mbssid_single_ssid_tm 1/1
Test: HE AP MBSSID with mixed security and single SSID and transition mode
Starting AP wlan3
Starting APs for wlan3
Connect STA wlan0 to AP
PASS he_ap_mbssid_single_ssid_tm 7.285531 2025-06-07 20:26:49.088067
passed all 1 test case(s)
2025-06-07 20:26:49 ./run-tests.py he_use_sta_nsts
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_use_sta_nsts 1/1
Test: HE with 80 MHz channel width and use_sta_nsts=1
Starting AP wlan3
Country code at the end: 00
AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main
t(dev, apdev)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1021, in test_he_use_sta_nsts
hapd = hostapd.add_ap(apdev[0], params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL he_use_sta_nsts 6.348495 2025-06-07 20:26:55.712148
passed 0 test case(s)
skipped 0 test case(s)
failed tests: he_use_sta_nsts
2025-06-07 20:26:55 ./run-tests.py ibss_wep
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ibss_wep 1/1
Test: IBSS with WEP
wlan0 waiting for IBSS start/join to complete
wlan1 waiting for IBSS start/join to complete
PASS ibss_wep 10.358451 2025-06-07 20:27:06.347101
passed all 1 test case(s)
2025-06-07 20:27:06 ./run-tests.py macsec_psk_fail_cp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START macsec_psk_fail_cp 1/1
Test: MACsec PSK local failures in CP state machine
veth0 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=6a:6a:5f:d7:e3:ff
PAE KaY status=Active
Authenticated=No
Secured=Yes
Failed=No
Actor Priority=255
Key Server Priority=255
Is Key Server=No
Number of Keys Distributed=1
Number of Keys Received=0
MKA Hello Time=2000
actor_sci=6a:6a:5f:d7:e3:ff@1
key_server_sci=6a:6a:5f:d7:e3:ff@1
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=d06d07e7ab693b1fc911c5a1
mn=2
active=Yes
participant=No
retain=No
live_peers=1
potential_peers=0
is_key_server=Yes
is_elected=Yes
uuid=ecce3620-403e-574b-b592-f3c71db0b7f1
veth1 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=e2:98:19:72:a1:bc
PAE KaY status=Active
Authenticated=No
Secured=Yes
Failed=No
Actor Priority=255
Key Server Priority=255
Is Key Server=No
Number of Keys Distributed=0
Number of Keys Received=1
MKA Hello Time=2000
actor_sci=e2:98:19:72:a1:bc@1
key_server_sci=6a:6a:5f:d7:e3:ff@1
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=662685c88e66ae8dbe5008af
mn=4
active=Yes
participant=No
retain=No
live_peers=1
potential_peers=0
is_key_server=No
is_elected=Yes
uuid=ecce3620-403e-574b-b592-f3c71db0b7f1
Expected key server: veth0
PASS macsec_psk_fail_cp 4.395935 2025-06-07 20:27:11.017498
passed all 1 test case(s)
2025-06-07 20:27:11 ./run-tests.py mesh_secure_ccmp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mesh_secure_ccmp 1/1
Test: Secure mesh with CCMP
PASS mesh_secure_ccmp 2.145111 2025-06-07 20:27:13.445366
passed all 1 test case(s)
2025-06-07 20:27:13 ./run-tests.py multi_ap_backhaul_roam_with_bridge
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START multi_ap_backhaul_roam_with_bridge 1/1
Test: Multi-AP backhaul BSS reassociation to another BSS with bridge
Starting AP wlan3
Connect STA wlan5 to AP
Starting AP wlan4
PASS multi_ap_backhaul_roam_with_bridge 2.909627 2025-06-07 20:27:16.628982
passed all 1 test case(s)
2025-06-07 20:27:16 ./run-tests.py nan_usd_publish
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nan_usd_publish 1/1
Test: NAN USD Publish
Maximum services: 20
PASS nan_usd_publish 0.109488 2025-06-07 20:27:17.012554
passed all 1 test case(s)
2025-06-07 20:27:17 ./run-tests.py nfc_p2p_ip_addr_assignment2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_p2p_ip_addr_assignment2 1/1
Test: NFC connection handover and IP address assignment for two clients
Perform NFC connection handover
Group formed
Client 1 IP address: 192.168.42.100
Connect a P2P client
wlan2: Trying to discover peer 02:00:00:00:01:00
Client connected
Client 2 IP address: 192.168.42.101
PASS nfc_p2p_ip_addr_assignment2 12.724936 2025-06-07 20:27:30.011060
passed all 1 test case(s)
2025-06-07 20:27:30 ./run-tests.py nfc_wps_handover_pk_hash_mismatch_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_wps_handover_pk_hash_mismatch_ap 1/1
Test: WPS NFC connection handover with invalid pkhash from AP (negative)
Starting AP wlan3
NFC connection handover
wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth
PASS nfc_wps_handover_pk_hash_mismatch_ap 1.115178 2025-06-07 20:27:31.403635
passed all 1 test case(s)
2025-06-07 20:27:31 ./run-tests.py olbc_table_limit
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START olbc_table_limit 1/1
Test: OLBC AP table size limit
Starting BSS phy=phy3 ifname=wlan3
Starting BSS phy=phy3 ifname=wlan3-2
Starting BSS phy=phy3 ifname=wlan3-3
Starting AP wlan4
PASS olbc_table_limit 2.966666 2025-06-07 20:27:34.640304
passed all 1 test case(s)
2025-06-07 20:27:34 ./run-tests.py owe_double_assoc
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START owe_double_assoc 1/1
Test: Opportunistic Wireless Encryption - duplicated association attempt
Starting AP wlan3
Connect STA wlan0 to AP
PASS owe_double_assoc 1.204135 2025-06-07 20:27:36.116543
passed all 1 test case(s)
2025-06-07 20:27:36 ./run-tests.py p2p_device_persistent_group2_no_group_iface
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_device_persistent_group2_no_group_iface 1/1
Test: P2P persistent group formation and re-invocation (reverse) with cfg80211 P2P Device (no separate group interface)
Form a persistent group
Start GO negotiation wlan7 -> wlan0
wlan0: Trying to discover peer 42:00:00:00:09:00
wlan7: Trying to discover peer 02:00:00:00:00:00
Group formed
Terminate persistent group
Re-invoke persistent group from client
wlan0: Trying to discover peer 42:00:00:00:09:00
Terminate persistent group
Re-invoke persistent group from GO
wlan7: Trying to discover peer 02:00:00:00:00:00
Terminate persistent group
PASS p2p_device_persistent_group2_no_group_iface 7.82135 2025-06-07 20:27:44.212031
passed all 1 test case(s)
2025-06-07 20:27:44 ./run-tests.py p2p_service_discovery_peer_not_listening
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_service_discovery_peer_not_listening 1/1
Test: P2P service discovery and peer not listening
PASS p2p_service_discovery_peer_not_listening 4.080738 2025-06-07 20:27:48.566926
passed all 1 test case(s)
2025-06-07 20:27:48 ./run-tests.py p2ps_exact_search
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2ps_exact_search 1/1
Test: P2PS exact service request
PASS p2ps_exact_search 0.376266 2025-06-07 20:27:49.220347
passed all 1 test case(s)
2025-06-07 20:27:49 ./run-tests.py radius_macacl
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_macacl 1/1
Test: RADIUS MAC ACL
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan2 to AP
Connect STA wlan2 to AP
PASS radius_macacl 1.796507 2025-06-07 20:27:51.289020
passed all 1 test case(s)
2025-06-07 20:27:51 ./run-tests.py radius_macacl_unreachable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_macacl_unreachable 1/1
Test: RADIUS MAC ACL and server unreachable
Starting AP wlan3
Connect STA wlan0 to AP
Fix authentication server port
PASS radius_macacl_unreachable 4.446288 2025-06-07 20:27:56.006870
passed all 1 test case(s)
2025-06-07 20:27:56 ./run-tests.py radius_mppe_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_mppe_failure 1/1
Test: RADIUS failure when adding MPPE keys
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
PASS radius_mppe_failure 1.550128 2025-06-07 20:27:57.826619
passed all 1 test case(s)
2025-06-07 20:27:57 ./run-tests.py rrm_beacon_req_ap_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START rrm_beacon_req_ap_errors 1/1
Test: Beacon request - AP error cases
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth
wlan0: Waiting for scan operation to complete before continuing
Run FLUSH again since scan was in progress
PASS rrm_beacon_req_ap_errors 2.592496 2025-06-07 20:28:00.693661
passed all 1 test case(s)
2025-06-07 20:28:00 ./run-tests.py rsn_preauth_local_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START rsn_preauth_local_errors 1/1
Test: RSN pre-authentication and local errors on AP
Starting AP wlan3
PASS rsn_preauth_local_errors 2.290551 2025-06-07 20:28:03.255879
passed all 1 test case(s)
2025-06-07 20:28:03 ./run-tests.py sae_password_ffc
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_password_ffc 1/1
Test: SAE with number of different passwords (FFC)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS sae_password_ffc 5.021343 2025-06-07 20:28:08.549729
passed all 1 test case(s)
2025-06-07 20:28:08 ./run-tests.py sae_pk_sec_5
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pk_sec_5 1/1
Test: SAE-PK with Sec 5
Starting AP wlan3
Connect STA wlan0 to AP
PASS sae_pk_sec_5 1.455078 2025-06-07 20:28:10.275198
passed all 1 test case(s)
2025-06-07 20:28:10 ./run-tests.py sae_pwe_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pwe_failure 1/1
Test: SAE and pwe failure
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS sae_pwe_failure 3.636411 2025-06-07 20:28:14.186919
passed all 1 test case(s)
2025-06-07 20:28:14 ./run-tests.py sae_wpa3_roam
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_wpa3_roam 1/1
Test: SAE and WPA3-Personal transition mode roaming
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS sae_wpa3_roam 4.436332 2025-06-07 20:28:18.898669
passed all 1 test case(s)
2025-06-07 20:28:18 ./run-tests.py sigma_dut_ap_suite_b
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_suite_b 1/1
Test: sigma_dut controlled AP Suite B
Starting AP wlan4
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_suite_b 0.605163 2025-06-07 20:28:19.774283
passed all 0 test case(s)
skipped 1 test case(s)
2025-06-07 20:28:19 ./run-tests.py sigma_dut_ap_transition_disable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_transition_disable 1/1
Test: sigma_dut controlled AP and transition disabled indication
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_transition_disable 0.163687 2025-06-07 20:28:20.210326
passed all 0 test case(s)
skipped 1 test case(s)
2025-06-07 20:28:20 ./run-tests.py sigma_dut_dpp_pkex_responder_proto
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_pkex_responder_proto 1/1
Test: sigma_dut controlled STA as DPP PKEX responder and error case
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_pkex_responder_proto 0.061045 2025-06-07 20:28:20.547955
passed all 0 test case(s)
skipped 1 test case(s)
2025-06-07 20:28:20 ./run-tests.py sigma_dut_dpp_proto_peer_disc_req3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_proto_peer_disc_req3 1/1
Test: sigma_dut DPP protocol testing - Peer Discovery Request (e)
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_proto_peer_disc_req3 0.062041 2025-06-07 20:28:20.885635
passed all 0 test case(s)
skipped 1 test case(s)
2025-06-07 20:28:20 ./run-tests.py suite_b_192_rsa_dhe_radius_rsa2048_client
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START suite_b_192_rsa_dhe_radius_rsa2048_client 1/1
Test: Suite B 192-bit level and RSA (DHE) and RSA2048 client
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
PASS suite_b_192_rsa_dhe_radius_rsa2048_client 2.031388 2025-06-07 20:28:23.194594
passed all 1 test case(s)
2025-06-07 20:28:23 ./run-tests.py suite_b_192_rsa_ecdhe
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START suite_b_192_rsa_ecdhe 1/1
Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA (ECDHE)
Starting AP wlan3
Connect STA wlan0 to AP
TLS version: TLSv1.2
PASS suite_b_192_rsa_ecdhe 1.87813 2025-06-07 20:28:25.351194
passed all 1 test case(s)
2025-06-07 20:28:25 ./run-tests.py wext_scan_hidden
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wext_scan_hidden 1/1
Test: WEXT with hidden SSID
Starting AP wlan3
Starting AP wlan4
Connect STA wlan5 to AP
Connect STA wlan5 to AP
PASS wext_scan_hidden 20.534875 2025-06-07 20:28:46.160379
passed all 1 test case(s)
2025-06-07 20:28:46 ./run-tests.py wnm_action_proto_no_pmf
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_action_proto_no_pmf 1/1
Test: WNM Action protocol testing (PMF disabled)
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_action_proto_no_pmf 1.168987 2025-06-07 20:28:47.605311
passed all 1 test case(s)
2025-06-07 20:28:47 ./run-tests.py wnm_bss_tm_reject
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_bss_tm_reject 1/1
Test: WNM BSS Transition Management request getting rejected
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_bss_tm_reject 7.54275 2025-06-07 20:28:55.423970
passed all 1 test case(s)
2025-06-07 20:28:55 ./run-tests.py wnm_bss_tm_steering_timeout
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_bss_tm_steering_timeout 1/1
Test: WNM BSS Transition Management and steering timeout
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS wnm_bss_tm_steering_timeout 4.322427 2025-06-07 20:29:00.023688
passed all 1 test case(s)
2025-06-07 20:29:00 ./run-tests.py wnm_sleep_mode_ap_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_sleep_mode_ap_oom 1/1
Test: WNM Sleep Mode - AP side OOM
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_sleep_mode_ap_oom 1.003355 2025-06-07 20:29:01.303976
passed all 1 test case(s)
2025-06-07 20:29:01 ./run-tests.py wpa2_ocv_ap_override_eapol_m3_post_enable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpa2_ocv_ap_override_eapol_m3_post_enable 1/1
Test: OCV on 2.4 GHz and AP override EAPOL-Key msg 3/4 (post enable)
Starting AP wlan3
Connect STA wlan0 to AP
PASS wpa2_ocv_ap_override_eapol_m3_post_enable 4.124325 2025-06-07 20:29:05.709319
passed all 1 test case(s)
2025-06-07 20:29:05 ./run-tests.py wpa2_ocv_ap_vht160_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpa2_ocv_ap_vht160_mismatch 1/1
Test: OCV AP mismatch (VHT160)
Starting AP wlan3
AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 591, in main
t(dev, apdev)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 508, in test_wpa2_ocv_ap_vht160_mismatch
run_wpa2_ocv_ap_vht160_mismatch(dev, apdev)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 527, in run_wpa2_ocv_ap_vht160_mismatch
conn = APConnection(apdev[0], dev[0], params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 378, in __init__
self.hapd = hostapd.add_ap(apdev, params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL wpa2_ocv_ap_vht160_mismatch 6.681419 2025-06-07 20:29:12.661964
passed 0 test case(s)
skipped 0 test case(s)
failed tests: wpa2_ocv_ap_vht160_mismatch
2025-06-07 20:29:12 ./run-tests.py wpas_ap_sae_pwe_1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ap_sae_pwe_1 1/1
Test: wpa_supplicant AP mode - SAE using sae_password and sae_pwe=1
Connect STA wlan1 to AP
PASS wpas_ap_sae_pwe_1 1.151099 2025-06-07 20:29:14.101784
passed all 1 test case(s)
2025-06-07 20:29:14 ./run-tests.py wpas_config_file_set_global
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_config_file_set_global 1/1
Test: wpa_supplicant config file parsing/writing with arbitrary global values
Configuration file contents: ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=adm
update_config=1
dik_cipher=0
dik=BC49226934860E0CD042603CDE77E99F
PASS wpas_config_file_set_global 0.522949 2025-06-07 20:29:14.898646
passed all 1 test case(s)
2025-06-07 20:29:14 ./run-tests.py wpas_ctrl_get
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_get 1/1
Test: wpa_supplicant ctrl_iface get
PASS wpas_ctrl_get 0.067727 2025-06-07 20:29:15.235801
passed all 1 test case(s)
2025-06-07 20:29:15 ./run-tests.py wpas_ctrl_set_uapsd
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_set_uapsd 1/1
Test: wpa_supplicant ctrl_iface SET uapsd
PASS wpas_ctrl_set_uapsd 0.067985 2025-06-07 20:29:15.581145
passed all 1 test case(s)
2025-06-07 20:29:15 ./run-tests.py wpas_mesh_secure_sae_group_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_mesh_secure_sae_group_mismatch 1/1
Test: wpa_supplicant secure MESH and SAE group mismatch
PASS wpas_mesh_secure_sae_group_mismatch 2.931048 2025-06-07 20:29:18.789048
passed all 1 test case(s)
2025-06-07 20:29:18 ./stop.sh