2026-05-08 01:25:22 cd /lkp/benchmarks/hwsim/tests/hwsim
group: group-30, test: group-30
2026-05-08 01:25:22 ./build.sh
Building TNC testing tools
Building wlantest
Building hs20-osu-client
Building hostapd
Building wpa_supplicant
2026-05-08 01:26:12 systemctl status dbus.service
○ dbus.service - D-Bus System Message Bus
Loaded: loaded (/usr/lib/systemd/system/dbus.service; static)
Active: inactive (dead)
TriggeredBy: ○ dbus.socket
Docs: man:dbus-daemon(1)
2026-05-08 01:26:12 systemctl restart dbus.service
srw-rw-rw- 1 root root 0 May 8 01:26 /run/dbus/system_bus_socket
2026-05-08 01:26:22 ./start.sh
2026-05-08 01:26:24 ./run-tests.py ap_csa_2_switches_count_0
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_csa_2_switches_count_0 1/1
Test: AP Channel Switch, two switches with count 0
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_csa_2_switches_count_0 1.142654 2026-05-08 01:26:26.440312
passed all 1 test case(s)
2026-05-08 01:26:26 ./run-tests.py ap_ft_eap_ptk_rekey_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_eap_ptk_rekey_ap 1/1
Test: WPA2-EAP-FT PTK rekeying triggered by AP
Starting AP wlan3
Starting AP wlan4
Connect to first AP
Connect STA wlan0 to AP
Roam to the second AP
PASS ap_ft_eap_ptk_rekey_ap 4.442009 2026-05-08 01:26:31.185469
passed all 1 test case(s)
2026-05-08 01:26:31 ./run-tests.py ap_ft_rrb
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ft_rrb 1/1
Test: WPA2-PSK-FT RRB protocol testing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_ft_rrb 1.20398 2026-05-08 01:26:32.682303
passed all 1 test case(s)
2026-05-08 01:26:32 ./run-tests.py ap_hs20_ft
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_hs20_ft 1/1
Test: Hotspot 2.0 connection with FT
Starting AP wlan3
Starting AP wlan4
PASS ap_hs20_ft 2.187819 2026-05-08 01:26:35.160020
passed all 1 test case(s)
2026-05-08 01:26:35 ./run-tests.py ap_ht40_csa2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht40_csa2 1/1
Test: HT with 40 MHz channel width and CSA
Starting AP wlan3
Exception during test execution: AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main
t(dev, apdev)
~^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ht.py", line 1144, in test_ap_ht40_csa2
hapd = hostapd.add_ap(apdev[0], params)
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL ap_ht40_csa2 5.824385 2026-05-08 01:26:41.279744
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_ht40_csa2
2026-05-08 01:26:41 ./run-tests.py ap_ht_op_class_120
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht_op_class_120 1/1
Test: HT40 on operating class 120
Starting AP wlan3
Skip test case: Channel not supported
SKIP ap_ht_op_class_120 5.675426 2026-05-08 01:26:47.246767
passed all 0 test case(s)
skipped 1 test case(s)
2026-05-08 01:26:47 ./run-tests.py ap_ht_op_class_81
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_ht_op_class_81 1/1
Test: HT20 on operating class 81
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_ht_op_class_81 2.730061 2026-05-08 01:26:50.268867
passed all 1 test case(s)
2026-05-08 01:26:50 ./run-tests.py ap_open_start_disabled
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_start_disabled 1/1
Test: AP with open mode and beaconing disabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_start_disabled 1.473255 2026-05-08 01:26:52.037982
passed all 1 test case(s)
2026-05-08 01:26:52 ./run-tests.py ap_remove_during_acs3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_acs3 1/1
Test: Remove second BSS during ACS in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Removing BSS wlan3-2
PASS ap_remove_during_acs3 1.101466 2026-05-08 01:26:53.439553
passed all 1 test case(s)
2026-05-08 01:26:53 ./run-tests.py ap_vht_tkip
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_tkip 1/1
Test: VHT and TKIP
Starting AP wlan3
Country code at the end: 00
Exception during test execution: AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main
t(dev, apdev)
~^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 1207, in test_ap_vht_tkip
hapd = hostapd.add_ap(apdev[0], params)
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL ap_vht_tkip 6.628952 2026-05-08 01:27:00.359284
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_vht_tkip
2026-05-08 01:27:00 ./run-tests.py ap_vlan_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_psk 1/1
Test: AP VLAN based on PSK/passphrase
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_psk 2.567763 2026-05-08 01:27:03.222989
passed all 1 test case(s)
2026-05-08 01:27:03 ./run-tests.py ap_wpa2_eap_aka_imsi_identity
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_imsi_identity 1/1
Test: WPA2-Enterprise connection using EAP-AKA and imsi_identity
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_imsi_identity 1.044746 2026-05-08 01:27:04.557560
passed all 1 test case(s)
2026-05-08 01:27:04 ./run-tests.py ap_wpa2_eap_sim_id_2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_sim_id_2 1/1
Test: WPA2-Enterprise connection using EAP-SIM (no pseudonym, reauth)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_sim_id_2 1.03433 2026-05-08 01:27:05.890540
passed all 1 test case(s)
2026-05-08 01:27:05 ./run-tests.py ap_wpa2_eap_ttls_dh_params_server
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_dh_params_server 1/1
Test: WPA2-Enterprise using EAP-TTLS and alternative server dhparams
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_dh_params_server 1.017112 2026-05-08 01:27:07.205686
passed all 1 test case(s)
2026-05-08 01:27:07 ./run-tests.py ap_wpa2_eap_ttls_eap_aka
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ttls_eap_aka 1/1
Test: WPA2-Enterprise connection using EAP-TTLS/EAP-AKA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ttls_eap_aka 1.054506 2026-05-08 01:27:08.559125
passed all 1 test case(s)
2026-05-08 01:27:08 ./run-tests.py ap_wpa2_plaintext_group_m1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_plaintext_group_m1 1/1
Test: Plaintext group M1
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_plaintext_group_m1 1.4225 2026-05-08 01:27:10.273822
passed all 1 test case(s)
2026-05-08 01:27:10 ./run-tests.py ap_wpa2_psk_ifdown
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_ifdown 1/1
Test: AP with open mode and external ifconfig down
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_psk_ifdown 2.75004 2026-05-08 01:27:13.320331
passed all 1 test case(s)
2026-05-08 01:27:13 ./run-tests.py ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg 1/1
Test: WPA2-PSK supplicant protocol testing: too long GTK KDE in group msg
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg 0.994077 2026-05-08 01:27:14.612174
passed all 1 test case(s)
2026-05-08 01:27:14 ./run-tests.py ap_wps_ap_pin_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_ap_pin_failure 1/1
Test: WPS_AP_PIN failure
PASS ap_wps_ap_pin_failure 0.818223 2026-05-08 01:27:15.725308
passed all 1 test case(s)
2026-05-08 01:27:15 ./run-tests.py ap_wps_er_http_proto_control_url_dns
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_http_proto_control_url_dns 1/1
Test: WPS ER HTTP protocol testing - DNS name in controlURL
HTTP server received: GET /foo.xml HTTP/1.1
HTTP header: Cache-Control: no-cache
HTTP header: Pragma: no-cache
HTTP header: Accept: text/xml, application/xml
HTTP header: User-Agent: wpa_supplicant
HTTP header: Host: 127.0.0.1:12345
PASS ap_wps_er_http_proto_control_url_dns 2.078787 2026-05-08 01:27:18.101550
passed all 1 test case(s)
2026-05-08 01:27:18 ./run-tests.py ap_wps_er_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_er_oom 1/1
Test: WPS ER OOM in XML processing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wps_er_oom 6.207664 2026-05-08 01:27:24.609309
passed all 1 test case(s)
2026-05-08 01:27:24 ./run-tests.py ap_wps_m2_missing_dev_passwd_id
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_m2_missing_dev_passwd_id 1/1
Test: WPS and M2 without Device Password ID
Starting AP wlan3
PASS ap_wps_m2_missing_dev_passwd_id 1.495333 2026-05-08 01:27:26.403735
passed all 1 test case(s)
2026-05-08 01:27:26 ./run-tests.py ap_wps_per_station_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_per_station_psk 1/1
Test: WPS PBC provisioning with per-station PSK
Starting AP wlan3
First enrollee
Second enrollee
External registrar
Verifying PSK results
Second external registrar
PASS ap_wps_per_station_psk 5.835553 2026-05-08 01:27:32.538225
passed all 1 test case(s)
2026-05-08 01:27:32 ./run-tests.py ap_wps_set_selected_registrar_proto
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wps_set_selected_registrar_proto 1/1
Test: WPS UPnP SetSelectedRegistrar protocol testing
Starting AP wlan3
PASS ap_wps_set_selected_registrar_proto 0.759907 2026-05-08 01:27:33.599140
passed all 1 test case(s)
2026-05-08 01:27:33 ./run-tests.py autogo_random_channel
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START autogo_random_channel 1/1
Test: P2P channel selection: GO instantiated on random channel 1, 6, 11
Start autonomous GO wlan0
Start autonomous GO wlan0
Start autonomous GO wlan0
Start autonomous GO wlan0
Start autonomous GO wlan0
Start autonomous GO wlan0
Start autonomous GO wlan0
PASS autogo_random_channel 3.832551 2026-05-08 01:27:37.726891
passed all 1 test case(s)
2026-05-08 01:27:37 ./run-tests.py dbus_apscan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_apscan 1/1
Test: D-Bus Get/Set ApScan
PASS dbus_apscan 0.078455 2026-05-08 01:27:38.099333
passed all 1 test case(s)
2026-05-08 01:27:38 ./run-tests.py dbus_connect_oom_201_300
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_connect_oom_201_300 1/1
Test: D-Bus AddNetwork and connect when out-of-memory (201-300)
Starting AP wlan3
Iteration 251 - Expected signals not seen
GET_ALLOC_FAIL: 0:main
Iteration 252 - success
GET_ALLOC_FAIL: 31:main
Iteration 253 - success
GET_ALLOC_FAIL: 31:main
Iteration 254 - Expected signals not seen
GET_ALLOC_FAIL: 0:main
Iteration 255 - success
GET_ALLOC_FAIL: 33:main
Iteration 256 - success
GET_ALLOC_FAIL: 35:main
Iteration 257 - success
GET_ALLOC_FAIL: 36:main
PASS dbus_connect_oom_201_300 13.239894 2026-05-08 01:27:51.635622
passed all 1 test case(s)
2026-05-08 01:27:51 ./run-tests.py dbus_introspect
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_introspect 1/1
Test: D-Bus introspection
Initial Introspect:
Introspect: None
Introspect:
Introspect:
Introspect:
PASS dbus_introspect 0.075073 2026-05-08 01:27:52.005750
passed all 1 test case(s)
2026-05-08 01:27:52 ./run-tests.py dbus_p2p_wps_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dbus_p2p_wps_failure 1/1
Test: D-Bus P2P WPS failure
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan1: Ignore unexpected status-driver line: ignore_next_local_deauth
PASS dbus_p2p_wps_failure 2.518228 2026-05-08 01:27:54.828178
passed all 1 test case(s)
2026-05-08 01:27:54 ./run-tests.py discovery_device_name_change
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START discovery_device_name_change 1/1
Test: P2P device discovery and peer changing device name
PASS discovery_device_name_change 1.252334 2026-05-08 01:27:56.378024
passed all 1 test case(s)
2026-05-08 01:27:56 ./run-tests.py discovery_pd_retries
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START discovery_pd_retries 1/1
Test: P2P device discovery and provision discovery retries
wlan0: Trying to discover peer 02:00:00:00:01:00
PASS discovery_pd_retries 39.400458 2026-05-08 01:28:36.080049
passed all 1 test case(s)
2026-05-08 01:28:36 ./run-tests.py dpp_config_connector_error_missing_net_role
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_connector_error_missing_net_role 1/1
Test: DPP Config Object connector error - missing netRole
Exception during test execution: module 'OpenSSL.crypto' has no attribute 'sign'
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main
t(dev, apdev)
~^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1636, in test_dpp_config_connector_error_missing_net_role
run_dpp_config_connector(dev, apdev, payload=payload)
~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1563, in run_dpp_config_connector
sign = ecdsa_sign(pkey, conn)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1514, in ecdsa_sign
sign = OpenSSL.crypto.sign(pkey, message, alg)
^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/cryptography/utils.py", line 68, in __getattr__
obj = getattr(self._module, attr)
AttributeError: module 'OpenSSL.crypto' has no attribute 'sign'
FAIL dpp_config_connector_error_missing_net_role 0.074178 2026-05-08 01:28:36.464348
passed 0 test case(s)
skipped 0 test case(s)
failed tests: dpp_config_connector_error_missing_net_role
2026-05-08 01:28:36 ./run-tests.py dpp_config_jws_error_prot_hdr_not_an_object
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_jws_error_prot_hdr_not_an_object 1/1
Test: DPP Config Object JWS error - protected header not an object
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_jws_error_prot_hdr_not_an_object 0.155696 2026-05-08 01:28:36.934068
passed all 1 test case(s)
2026-05-08 01:28:36 ./run-tests.py dpp_config_legacy_gen_sta_ap_conf
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_config_legacy_gen_sta_ap_conf 1/1
Test: Generate DPP Config Object for legacy network (sta and ap config)
dev0 displays QR Code
dev1 scans QR Code and initiates DPP Authentication
PASS dpp_config_legacy_gen_sta_ap_conf 1.145515 2026-05-08 01:28:38.382273
passed all 1 test case(s)
2026-05-08 01:28:38 ./run-tests.py dpp_configurator_id_unknown
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_configurator_id_unknown 1/1
Test: DPP and unknown configurator id
Starting AP wlan3
PASS dpp_configurator_id_unknown 0.51277 2026-05-08 01:28:39.195875
passed all 1 test case(s)
2026-05-08 01:28:39 ./run-tests.py dpp_conn_status_assoc_reject
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_conn_status_assoc_reject 1/1
Test: DPP connection status - association rejection
Starting AP wlan3
PASS dpp_conn_status_assoc_reject 15.64168 2026-05-08 01:28:55.140861
passed all 1 test case(s)
2026-05-08 01:28:55 ./run-tests.py dpp_conn_status_connector_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_conn_status_connector_mismatch 1/1
Test: DPP connection status - invalid Connector
Starting AP wlan3
PASS dpp_conn_status_connector_mismatch 5.477155 2026-05-08 01:29:00.924849
passed all 1 test case(s)
2026-05-08 01:29:00 ./run-tests.py dpp_pkex_exchange_resp_processing_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_pkex_exchange_resp_processing_failure 1/1
Test: DPP and PKEX with local failure in processing Exchange Resp
PASS dpp_pkex_exchange_resp_processing_failure 0.369803 2026-05-08 01:29:01.599081
passed all 1 test case(s)
2026-05-08 01:29:01 ./run-tests.py dpp_proto_after_wrapped_data_pkex_cr_resp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_after_wrapped_data_pkex_cr_resp 1/1
Test: DPP protocol testing - attribute after Wrapped Data in PKEX CR Resp
PASS dpp_proto_after_wrapped_data_pkex_cr_resp 0.162656 2026-05-08 01:29:02.062700
passed all 1 test case(s)
2026-05-08 01:29:02 ./run-tests.py dpp_proto_auth_req_invalid_i_proto_key
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_req_invalid_i_proto_key 1/1
Test: DPP protocol testing - invalid I-proto key in Auth Req
PASS dpp_proto_auth_req_invalid_i_proto_key 0.215205 2026-05-08 01:29:02.589310
passed all 1 test case(s)
2026-05-08 01:29:02 ./run-tests.py dpp_proto_auth_req_no_i_capab
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_auth_req_no_i_capab 1/1
Test: DPP protocol testing - no I-capab in Auth Req
PASS dpp_proto_auth_req_no_i_capab 0.205004 2026-05-08 01:29:03.097155
passed all 1 test case(s)
2026-05-08 01:29:03 ./run-tests.py dpp_proto_conf_resp_no_e_nonce
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_conf_resp_no_e_nonce 1/1
Test: DPP protocol testing - no E-nonce in Conf Resp
PASS dpp_proto_conf_resp_no_e_nonce 0.133916 2026-05-08 01:29:03.534611
passed all 1 test case(s)
2026-05-08 01:29:03 ./run-tests.py dpp_proto_pkex_cr_req_i_auth_tag_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dpp_proto_pkex_cr_req_i_auth_tag_mismatch 1/1
Test: DPP protocol testing - I-auth tag mismatch in PKEX Commit-Reveal Request
PASS dpp_proto_pkex_cr_req_i_auth_tag_mismatch 0.16198 2026-05-08 01:29:04.004642
passed all 1 test case(s)
2026-05-08 01:29:04 ./run-tests.py dscp_request
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START dscp_request 1/1
Test: DSCP Policy Request
Starting AP wlan3
Connect STA wlan0 to AP
PASS dscp_request 1.00344 2026-05-08 01:29:05.310276
passed all 1 test case(s)
2026-05-08 01:29:05 ./run-tests.py eap_canned_failure_before_method
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_canned_failure_before_method 1/1
Test: EAP protocol tests for canned EAP-Failure before any method
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_canned_failure_before_method 0.973553 2026-05-08 01:29:06.589804
passed all 1 test case(s)
2026-05-08 01:29:06 ./run-tests.py eap_mschapv2_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_mschapv2_errors 1/1
Test: EAP-MSCHAPv2 error cases
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS eap_mschapv2_errors 8.018608 2026-05-08 01:29:14.918057
passed all 1 test case(s)
2026-05-08 01:29:14 ./run-tests.py eap_peap_session_resumption_crypto_binding
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_peap_session_resumption_crypto_binding 1/1
Test: EAP-PEAP session resumption with crypto binding
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_peap_session_resumption_crypto_binding 1.029912 2026-05-08 01:29:16.254699
passed all 1 test case(s)
2026-05-08 01:29:16 ./run-tests.py eap_proto_aka
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_aka 1/1
Test: EAP-AKA protocol tests
Starting AP wlan3
Connect STA wlan0 to AP
aka_handler - RX 024f00150130323332303130303030303030303030
Test: Missing payload
Connect STA wlan0 to AP
aka_handler - RX 028b00150130323332303130303030303030303030
Test: Unknown subtype
aka_handler - RX 028c000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 026100150130323332303130303030303030303030
Test: Client Error
aka_handler - RX 0262000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02d000150130323332303130303030303030303030
Test: Too short attribute header
aka_handler - RX 02d1000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 020100150130323332303130303030303030303030
Test: Truncated attribute
aka_handler - RX 0202000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02f500150130323332303130303030303030303030
Test: Too short attribute data
aka_handler - RX 02f6000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 029400150130323332303130303030303030303030
Test: Skippable/non-skippable unrecognzized attribute
aka_handler - RX 0295000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 028900150130323332303130303030303030303030
Test: Identity request without ID type
aka_handler - RX 028a000817050000
Test: Identity request ANY_ID
aka_handler - RX 028b001c170500000e05001030323332303130303030303030303030
Test: Identity request ANY_ID (duplicate)
aka_handler - RX 028c000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 027b00150130323332303130303030303030303030
Test: Identity request ANY_ID
aka_handler - RX 027c001c170500000e05001030323332303130303030303030303030
Test: Identity request FULLAUTH_ID
aka_handler - RX 027d001c170500000e05001030323332303130303030303030303030
Test: Identity request FULLAUTH_ID (duplicate)
aka_handler - RX 027e000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02a300150130323332303130303030303030303030
Test: Identity request ANY_ID
aka_handler - RX 02a4001c170500000e05001030323332303130303030303030303030
Test: Identity request FULLAUTH_ID
aka_handler - RX 02a5001c170500000e05001030323332303130303030303030303030
Test: Identity request PERMANENT_ID
aka_handler - RX 02a6001c170500000e05001030323332303130303030303030303030
Test: Identity request PERMANENT_ID (duplicate)
aka_handler - RX 02a7000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 020100150130323332303130303030303030303030
Test: Challenge with no attributes
aka_handler - RX 0202000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02f600150130323332303130303030303030303030
Test: AKA Challenge with BIDDING
aka_handler - RX 02f7000817020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 021400150130323332303130303030303030303030
Test: Notification with no attributes
aka_handler - RX 0215000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 021600150130323332303130303030303030303030
Test: Notification indicating success, but no MAC
aka_handler - RX 0217000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 020f00150130323332303130303030303030303030
Test: Notification indicating success, but invalid MAC value
aka_handler - RX 0210000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 022400150130323332303130303030303030303030
Test: Notification indicating success with zero-key MAC
aka_handler - RX 0225000c170e000016010000
Test: EAP-Success
Connect STA wlan0 to AP
aka_handler - RX 029300150130323332303130303030303030303030
Test: Notification before auth
aka_handler - RX 02940008170c0000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 021700150130323332303130303030303030303030
Test: Notification before auth
aka_handler - RX 02180008170c0000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02ef00150130323332303130303030303030303030
Test: Notification with unrecognized non-failure
aka_handler - RX 02f00008170c0000
Test: Notification before auth (duplicate)
aka_handler - RX 02f1000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02ab00150130323332303130303030303030303030
Test: Re-authentication (unexpected) with no attributes
aka_handler - RX 02ac000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02d700150130323332303130303030303030303030
Test: AKA Challenge with Checkcode claiming identity round was used
aka_handler - RX 02d8000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 021500150130323332303130303030303030303030
Test: Identity request ANY_ID
aka_handler - RX 0216001c170500000e05001030323332303130303030303030303030
Test: AKA Challenge with Checkcode claiming no identity round was used
aka_handler - RX 0217000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 022600150130323332303130303030303030303030
Test: Identity request ANY_ID
aka_handler - RX 0227001c170500000e05001030323332303130303030303030303030
Test: AKA Challenge with mismatching Checkcode value
aka_handler - RX 0228000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 025800150130323332303130303030303030303030
Test: Re-authentication (unexpected) with Checkcode claimin identity round was used
aka_handler - RX 0259000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 028100150130323332303130303030303030303030
Test: Invalid AT_RAND length
aka_handler - RX 0282000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02fd00150130323332303130303030303030303030
Test: Invalid AT_AUTN length
aka_handler - RX 02fe000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 021a00150130323332303130303030303030303030
Test: Unencrypted AT_PADDING
aka_handler - RX 021b000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02a900150130323332303130303030303030303030
Test: Invalid AT_NONCE_MT length
aka_handler - RX 02aa000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 029200150130323332303130303030303030303030
Test: Invalid AT_MAC length
aka_handler - RX 0293000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02c800150130323332303130303030303030303030
Test: Invalid AT_NOTIFICATION length
aka_handler - RX 02c9000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 027100150130323332303130303030303030303030
Test: AT_IDENTITY overflow
aka_handler - RX 0272000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02e100150130323332303130303030303030303030
Test: Unexpected AT_VERSION_LIST
aka_handler - RX 02e2000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 025300150130323332303130303030303030303030
Test: Invalid AT_SELECTED_VERSION length
aka_handler - RX 0254000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02d300150130323332303130303030303030303030
Test: Unencrypted AT_COUNTER
aka_handler - RX 02d4000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02b100150130323332303130303030303030303030
Test: Unencrypted AT_COUNTER_TOO_SMALL
aka_handler - RX 02b2000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 025300150130323332303130303030303030303030
Test: Unencrypted AT_NONCE_S
aka_handler - RX 0254000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02c800150130323332303130303030303030303030
Test: Invalid AT_CLIENT_ERROR_CODE length
aka_handler - RX 02c9000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 024500150130323332303130303030303030303030
Test: Invalid AT_IV length
aka_handler - RX 0246000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02dd00150130323332303130303030303030303030
Test: Invalid AT_ENCR_DATA length
aka_handler - RX 02de000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 024400150130323332303130303030303030303030
Test: Unencrypted AT_NEXT_PSEUDONYM
aka_handler - RX 0245000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02e800150130323332303130303030303030303030
Test: Unencrypted AT_NEXT_REAUTH_ID
aka_handler - RX 02e9000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02dd00150130323332303130303030303030303030
Test: Invalid AT_RES length
aka_handler - RX 02de000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 023a00150130323332303130303030303030303030
Test: Invalid AT_RES length
aka_handler - RX 023b000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02fc00150130323332303130303030303030303030
Test: Invalid AT_AUTS length
aka_handler - RX 02fd000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 02f300150130323332303130303030303030303030
Test: Invalid AT_CHECKCODE length
aka_handler - RX 02f4000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 024900150130323332303130303030303030303030
Test: Invalid AT_RESULT_IND length
aka_handler - RX 024a000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 022100150130323332303130303030303030303030
Test: Unexpected AT_KDF_INPUT
aka_handler - RX 0222000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 028600150130323332303130303030303030303030
Test: Unexpected AT_KDF
aka_handler - RX 0287000c170e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_handler - RX 026000150130323332303130303030303030303030
Test: Invalid AT_BIDDING length
aka_handler - RX 0261000c170e000016010000
Test: EAP-Failure
PASS eap_proto_aka 17.532108 2026-05-08 01:29:34.089905
passed all 1 test case(s)
2026-05-08 01:29:34 ./run-tests.py eap_proto_aka_prime
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_aka_prime 1/1
Test: EAP-AKA' protocol tests
Starting AP wlan3
Connect STA wlan0 to AP
aka_prime_handler - RX 023200150136353535343434333333323232313131
Test: Missing payload
Connect STA wlan0 to AP
aka_prime_handler - RX 023700150136353535343434333333323232313131
Test: Challenge with no attributes
aka_prime_handler - RX 0238000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 022500150136353535343434333333323232313131
Test: Challenge with empty AT_KDF_INPUT
aka_prime_handler - RX 0226000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 025800150136353535343434333333323232313131
Test: Challenge with AT_KDF_INPUT
aka_prime_handler - RX 0259000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 028f00150136353535343434333333323232313131
Test: Challenge with duplicated KDF
aka_prime_handler - RX 0290000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02a600150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 02a7000c3201000018010001
Test: Challenge with incorrect KDF selected
aka_prime_handler - RX 02a8000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 025500150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 0256000c3201000018010001
Test: Challenge with selected KDF not duplicated
aka_prime_handler - RX 0257000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02aa00150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 02ab000c3201000018010001
Test: Challenge with selected KDF duplicated (missing MAC, RAND, AUTN)
aka_prime_handler - RX 02ac000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 025000150136353535343434333333323232313131
Test: Challenge with multiple unsupported KDF proposals
aka_prime_handler - RX 0251000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02e700150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 02e8000c3201000018010001
Test: Challenge with invalid MAC, RAND, AUTN values)
aka_prime_handler - RX 02e9000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 027200150136353535343434333333323232313131
Test: Challenge - AMF separation bit not set)
aka_prime_handler - RX 0273000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02c100150136353535343434333333323232313131
Test: Challenge - Invalid MAC
aka_prime_handler - RX 02c2000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02c900150136353535343434333333323232313131
Test: Challenge - Valid MAC
aka_prime_handler - RX 02ca000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 02c600150136353535343434333333323232313131
Test: Invalid AT_KDF_INPUT length
aka_prime_handler - RX 02c7000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 029400150136353535343434333333323232313131
Test: Invalid AT_KDF length
aka_prime_handler - RX 0295000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 027a00150136353535343434333333323232313131
Test: Challenge with large number of KDF proposals
aka_prime_handler - RX 027b000832020000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 021900150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 021a000c3201000018010001
Test: Challenge with an extra KDF appended
aka_prime_handler - RX 021b000c320e000016010000
Test: EAP-Failure
Connect STA wlan0 to AP
aka_prime_handler - RX 025d00150136353535343434333333323232313131
Test: Challenge with multiple KDF proposals
aka_prime_handler - RX 025e000c3201000018010001
Test: Challenge with a modified KDF
aka_prime_handler - RX 025f000c320e000016010000
Test: EAP-Failure
PASS eap_proto_aka_prime 7.508453 2026-05-08 01:29:41.901807
passed all 1 test case(s)
2026-05-08 01:29:41 ./run-tests.py eap_proto_md5_server
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_proto_md5_server 1/1
Test: EAP-MD5 protocol testing for the server
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS eap_proto_md5_server 1.679304 2026-05-08 01:29:43.883888
passed all 1 test case(s)
2026-05-08 01:29:43 ./run-tests.py eap_tls_session_resumption_expiration
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eap_tls_session_resumption_expiration 1/1
Test: EAP-TLS session resumption
Starting AP wlan3
Connect STA wlan0 to AP
PASS eap_tls_session_resumption_expiration 2.616564 2026-05-08 01:29:46.809855
passed all 1 test case(s)
2026-05-08 01:29:46 ./run-tests.py eht_mld_control_socket_connectivity
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eht_mld_control_socket_connectivity 1/1
Test: AP MLD control socket connectivity
Adding link on: ifname=wlan7
Adding link on: ifname=wlan7
LINK 0 STATUS:
state=ENABLED
phy=phy7
freq=2412
num_sta_non_erp=0
num_sta_no_short_slot_time=0
num_sta_no_short_preamble=0
olbc=0
num_sta_ht_no_gf=0
num_sta_no_ht=0
num_sta_ht_20_mhz=0
num_sta_ht40_intolerant=0
olbc_ht=0
ht_op_mode=0x0
hw_mode=g
cac_time_seconds=0
cac_time_left_seconds=N/A
channel=1
edmg_enable=0
edmg_channel=0
secondary_channel=0
ieee80211n=1
ieee80211ac=0
ieee80211ax=1
ieee80211be=1
beacon_int=100
dtim_period=2
eht_oper_chwidth=0
eht_oper_centr_freq_seg0_idx=0
num_links=2
link_id=0
link_addr=02:00:00:13:76:38
partner_link[1]=02:00:00:e0:70:80
ap_mld_type=STR
he_oper_chwidth=0
he_oper_centr_freq_seg0_idx=0
he_oper_centr_freq_seg1_idx=0
ht_caps_info=000c
ht_mcs_bitmask=ffff0000000000000000
supported_rates=02 04 0b 16 0c 12 18 24 30 48 60 6c
max_txpower=20
bss[0]=wlan7
bssid[0]=02:00:00:13:76:38
ssid[0]=mld_ap
num_sta[0]=0
mld_addr[0]=02:00:00:00:07:00
mld_id[0]=0
mld_link_id[0]=0
LINK 1 STATUS:
state=ENABLED
phy=phy7
freq=2417
num_sta_non_erp=0
num_sta_no_short_slot_time=0
num_sta_no_short_preamble=0
olbc=0
num_sta_ht_no_gf=0
num_sta_no_ht=0
num_sta_ht_20_mhz=0
num_sta_ht40_intolerant=0
olbc_ht=0
ht_op_mode=0x0
hw_mode=g
cac_time_seconds=0
cac_time_left_seconds=N/A
channel=2
edmg_enable=0
edmg_channel=0
secondary_channel=0
ieee80211n=1
ieee80211ac=0
ieee80211ax=1
ieee80211be=1
beacon_int=100
dtim_period=2
eht_oper_chwidth=0
eht_oper_centr_freq_seg0_idx=0
num_links=2
link_id=1
link_addr=02:00:00:e0:70:80
partner_link[0]=02:00:00:13:76:38
ap_mld_type=STR
he_oper_chwidth=0
he_oper_centr_freq_seg0_idx=0
he_oper_centr_freq_seg1_idx=0
ht_caps_info=000c
ht_mcs_bitmask=ffff0000000000000000
supported_rates=02 04 0b 16 0c 12 18 24 30 48 60 6c
max_txpower=20
bss[0]=wlan7
bssid[0]=02:00:00:e0:70:80
ssid[0]=mld_ap
num_sta[0]=0
mld_addr[0]=02:00:00:00:07:00
mld_id[0]=0
mld_link_id[0]=1
PASS eht_mld_control_socket_connectivity 1.723305 2026-05-08 01:29:48.838570
passed all 1 test case(s)
2026-05-08 01:29:48 ./run-tests.py eht_sae_mlo
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eht_sae_mlo 1/1
Test: EHT+MLO AP with SAE
Starting AP wlan3
Connect STA wlan0 to AP
PASS eht_sae_mlo 1.541184 2026-05-08 01:29:50.688370
passed all 1 test case(s)
2026-05-08 01:29:50 ./run-tests.py eppke_akm_suite_and_rsnxe_feature_flags
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eppke_akm_suite_and_rsnxe_feature_flags 1/1
Test: AP EPPKE AKM Advertisement with SAE base AKM and EPPKE related feature flags
Starting AP wlan3
Starting AP wlan3
PASS eppke_akm_suite_and_rsnxe_feature_flags 5.015832 2026-05-08 01:29:55.996884
passed all 1 test case(s)
2026-05-08 01:29:56 ./run-tests.py eppke_authentication_pmkid_in_assoc
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START eppke_authentication_pmkid_in_assoc 1/1
Test: EPPKE authentication (PMKID in Association Request after EPPKE)
Starting AP wlan3
Connect STA wlan0 to AP
PASS eppke_authentication_pmkid_in_assoc 1.035208 2026-05-08 01:29:57.330605
passed all 1 test case(s)
2026-05-08 01:29:57 ./run-tests.py erp_radius_ext
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START erp_radius_ext 1/1
Test: ERP enabled on a separate RADIUS server and peer
Starting AP wlan3
Connect STA wlan0 to AP
PASS erp_radius_ext 2.05104 2026-05-08 01:29:59.676305
passed all 1 test case(s)
2026-05-08 01:29:59 ./run-tests.py fils_sk_auth_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_sk_auth_mismatch 1/1
Test: FILS SK authentication type mismatch (PFS not supported)
Starting AP as-erp
Starting AP wlan3
Connect STA wlan0 to AP
PASS fils_sk_auth_mismatch 1.447987 2026-05-08 01:30:01.416273
passed all 1 test case(s)
2026-05-08 01:30:01 ./run-tests.py fils_sk_erp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_sk_erp 1/1
Test: FILS SK using ERP
Starting AP as-erp
Starting AP wlan3
Connect STA wlan0 to AP
PASS fils_sk_erp 1.414602 2026-05-08 01:30:03.126197
passed all 1 test case(s)
2026-05-08 01:30:03 ./run-tests.py fils_sk_multiple_realms
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fils_sk_multiple_realms 1/1
Test: FILS SK and multiple realms
Starting AP as-erp
Starting AP wlan3
Connect STA wlan0 to AP
PASS fils_sk_multiple_realms 1.874633 2026-05-08 01:30:05.293520
passed all 1 test case(s)
2026-05-08 01:30:05 ./run-tests.py fst_ap_ack_response_with_session_not_established_init_side
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_ack_response_with_session_not_established_init_side 1/1
Test: FST AP ack response with session not established init side
Starting AP wlan3 (old add_ap argument type)
Exception during test execution: AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 633, in main
t(dev, apdev, params)
~^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1350, in test_fst_ap_ack_response_with_session_not_established_init_side
fst_bad_transfer(apdev, test_params,
~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^
bad_scenario_ack_resp_session_not_established_init_side,
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
True)
^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 647, in fst_bad_transfer
ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs
ap1.start()
~~~~~~~~~^^
File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start
self.hapd = hostapd.add_ap(self.iface, params)
~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL fst_ap_ack_response_with_session_not_established_init_side 5.306729 2026-05-08 01:30:10.897450
passed 0 test case(s)
skipped 0 test case(s)
failed tests: fst_ap_ack_response_with_session_not_established_init_side
2026-05-08 01:30:10 ./run-tests.py fst_ap_config_group_len
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_config_group_len 1/1
Test: FST AP configuration Group max length
kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second
kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process
PASS fst_ap_config_group_len 1.088225 2026-05-08 01:30:12.290341
passed all 1 test case(s)
2026-05-08 01:30:12 ./run-tests.py fst_ap_config_pri_nan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START fst_ap_config_pri_nan 1/1
Test: FST AP configuration Priority not a number
kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second
kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process
PASS fst_ap_config_pri_nan 1.088781 2026-05-08 01:30:13.680800
passed all 1 test case(s)
2026-05-08 01:30:13 ./run-tests.py ft_psk_key_lifetime_in_memory
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ft_psk_key_lifetime_in_memory 1/1
Test: WPA2-PSK-FT and key lifetime in memory
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
Reading process memory (pid=6074)
[heap] 0x564b0cdf2000-0x564b0ce27000 is at 12288-229376
[stack] 0x7ffc255fb000-0x7ffc2561d000 is at 843776-983040
Total process memory read: 983040 bytes
Checking keys in memory while associated
Skip test case: PMK not found while associated
SKIP ft_psk_key_lifetime_in_memory 2.646126 2026-05-08 01:30:16.620894
passed all 0 test case(s)
skipped 1 test case(s)
2026-05-08 01:30:16 ./run-tests.py grpform3_c
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform3_c 1/1
Test: P2P group formation using PIN and re-init GO Negotiation (group iface)
Start GO negotiation wlan0 -> wlan1
wlan0: Trying to discover peer 02:00:00:00:01:00
wlan1: Trying to discover peer 02:00:00:00:00:00
Group formed
PASS grpform3_c 12.940293 2026-05-08 01:30:29.860083
passed all 1 test case(s)
2026-05-08 01:30:29 ./run-tests.py grpform_no_5ghz_add_cli2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform_no_5ghz_add_cli2 1/1
Test: P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (reverse)
Start GO negotiation wlan0 -> wlan1
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan0: Trying to discover peer 02:00:00:00:01:00
Group formed
PASS grpform_no_5ghz_add_cli2 3.135734 2026-05-08 01:30:33.302001
passed all 1 test case(s)
2026-05-08 01:30:33 ./run-tests.py grpform_reject
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START grpform_reject 1/1
Test: User rejecting group formation attempt by a P2P peer
wlan1: Trying to discover peer 02:00:00:00:00:00
wlan1: Trying to discover peer 02:00:00:00:00:00
PASS grpform_reject 0.471777 2026-05-08 01:30:34.073046
passed all 1 test case(s)
2026-05-08 01:30:34 ./run-tests.py hapd_ctrl_mib
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START hapd_ctrl_mib 1/1
Test: hostapd and MIB ctrl_iface command with open network
Starting AP wlan3
Connect STA wlan0 to AP
PASS hapd_ctrl_mib 0.997019 2026-05-08 01:30:35.373834
passed all 1 test case(s)
2026-05-08 01:30:35 ./run-tests.py hapd_dup_network_global_wpa2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START hapd_dup_network_global_wpa2 1/1
Test: hostapd and DUP_NETWORK command (WPA2)
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS hapd_dup_network_global_wpa2 1.653722 2026-05-08 01:30:37.321991
passed all 1 test case(s)
2026-05-08 01:30:37 ./run-tests.py he_6ghz_acs_80mhz
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_6ghz_acs_80mhz 1/1
Test: HE with ACS on 6 GHz using an 80 MHz channel
Starting AP wlan3
Country code at the end: 00
Exception during test execution: ACS start timed out
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main
t(dev, apdev)
~^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1347, in test_he_6ghz_acs_80mhz
he_6ghz_acs(dev, apdev, 133, 80)
~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1305, in he_6ghz_acs
wait_acs(hapd)
~~~~~~~~^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_acs.py", line 52, in wait_acs
raise Exception("ACS start timed out")
Exception: ACS start timed out
FAIL he_6ghz_acs_80mhz 6.39876 2026-05-08 01:30:44.025731
passed 0 test case(s)
skipped 0 test case(s)
failed tests: he_6ghz_acs_80mhz
2026-05-08 01:30:44 ./run-tests.py he_ap_mbssid_single_ssid_tm
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_ap_mbssid_single_ssid_tm 1/1
Test: HE AP MBSSID with mixed security and single SSID and transition mode
Starting AP wlan3
Starting APs for wlan3
Connect STA wlan0 to AP
PASS he_ap_mbssid_single_ssid_tm 7.248933 2026-05-08 01:30:51.575067
passed all 1 test case(s)
2026-05-08 01:30:51 ./run-tests.py he_use_sta_nsts
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START he_use_sta_nsts 1/1
Test: HE with 80 MHz channel width and use_sta_nsts=1
Starting AP wlan3
Country code at the end: 00
Exception during test execution: AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main
t(dev, apdev)
~^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1021, in test_he_use_sta_nsts
hapd = hostapd.add_ap(apdev[0], params)
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL he_use_sta_nsts 6.338027 2026-05-08 01:30:58.211201
passed 0 test case(s)
skipped 0 test case(s)
failed tests: he_use_sta_nsts
2026-05-08 01:30:58 ./run-tests.py ibss_wep
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ibss_wep 1/1
Test: IBSS with WEP
wlan0 waiting for IBSS start/join to complete
wlan1 waiting for IBSS start/join to complete
PASS ibss_wep 10.704202 2026-05-08 01:31:09.221866
passed all 1 test case(s)
2026-05-08 01:31:09 ./run-tests.py ieee8021x_auth_connect_disconnect_reconnect
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ieee8021x_auth_connect_disconnect_reconnect 1/1
Test: IEEE 802.1X Authentication frames: non-MLO connect/disconnect/reconnect
Starting AP wlan3
Connect STA wlan0 to AP
PASS ieee8021x_auth_connect_disconnect_reconnect 1.844997 2026-05-08 01:31:11.365203
passed all 1 test case(s)
2026-05-08 01:31:11 ./run-tests.py ieee8021x_auth_mlo_three_links
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ieee8021x_auth_mlo_three_links 1/1
Test: IEEE 802.1X Authentication frames: MLO three-link EAP-TLS
Adding link on: ifname=wlan7
Adding link on: ifname=wlan7
Adding link on: ifname=wlan7
Connect STA wlan8 to AP
hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy9', 'freq': '2412', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'hw_mode': 'g', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '1', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '1', 'ieee80211be': '1', 'beacon_int': '100', 'dtim_period': '2', 'eht_oper_chwidth': '0', 'eht_oper_centr_freq_seg0_idx': '0', 'num_links': '3', 'link_id': '0', 'link_addr': '02:00:00:73:d8:60', 'partner_link[1]': '02:00:00:2a:1a:8a', 'partner_link[2]': '02:00:00:2f:33:f0', 'ap_mld_type': 'STR', 'he_oper_chwidth': '0', 'he_oper_centr_freq_seg0_idx': '0', 'he_oper_centr_freq_seg1_idx': '0', 'ht_caps_info': '000c', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan7', 'bssid[0]': '02:00:00:73:d8:60', 'ssid[0]': 'test-ieee8021x-auth-mlo-3l', 'num_sta[0]': '1', 'mld_addr[0]': '02:00:00:00:09:00', 'mld_id[0]': '0', 'mld_link_id[0]': '0'}
hostapd STA: {'addr': '02:00:00:00:0a:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][MFP][HT][HE][EHT]', 'aid': '1', 'capability': '0x430', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'auth_alg': '8', 'dot11RSNAStatsSTAAddress': '02:00:00:00:0a:00', 'dot11RSNAStatsVersion': '1', 'dot11RSNAStatsSelectedPairwiseCipher': '00-0f-ac-4', 'dot11RSNAStatsTKIPLocalMICFailures': '0', 'dot11RSNAStatsTKIPRemoteMICFailures': '0', 'wpa': '2', 'AKMSuiteSelector': '00-0f-ac-5', 'hostapdWPAPTKState': '11', 'hostapdWPAPTKGroupState': '0', 'hostapdMFPR': '1', 'rx_packets': '23', 'tx_packets': '9', 'rx_bytes': '4182', 'tx_bytes': '3890', 'inactive_msec': '1712', 'signal': '-50', 'rx_rate_info': '10', 'tx_rate_info': '0', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '4', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f8081008280', 'he_capab': '0178c81a400002bfce0000000000000000fafffaff', 'eht_capab': '07007c0000feffff0f01008888880000', 'ht_caps_info': '0x107e', 'ext_capab': '04004a02014000400001', 'peer_addr[0]': 'c6:d9:be:62:09:d1', 'peer_addr[1]': '7e:c2:94:97:de:f1', 'peer_addr[2]': '7e:a2:12:21:87:f7', 'max_simul_links': '0'}
valid_links=0x7
active_links=0x7
PASS ieee8021x_auth_mlo_three_links 7.034365 2026-05-08 01:31:18.696021
passed all 1 test case(s)
2026-05-08 01:31:18 ./run-tests.py macsec_psk_fail_cp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START macsec_psk_fail_cp 1/1
Test: MACsec PSK local failures in CP state machine
veth0 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=66:47:98:22:61:77
PAE KaY status=Active
Authenticated=No
Secured=Yes
Failed=No
Actor Priority=255
Key Server Priority=255
Is Key Server=No
Number of Keys Distributed=1
Number of Keys Received=0
MKA Hello Time=2000
actor_sci=66:47:98:22:61:77@1
key_server_sci=66:47:98:22:61:77@1
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=2739cd4d3dfa85d1fd19543e
mn=2
active=Yes
participant=No
retain=No
live_peers=1
potential_peers=0
is_key_server=Yes
is_elected=Yes
uuid=a547d1b3-cf18-5596-8566-562eb941f482
veth1 STATUS:
bssid=01:80:c2:00:00:03
freq=0
ssid=
id=0
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=NONE
wpa_state=COMPLETED
address=8e:8a:d8:73:31:46
PAE KaY status=Active
Authenticated=No
Secured=Yes
Failed=No
Actor Priority=255
Key Server Priority=255
Is Key Server=No
Number of Keys Distributed=0
Number of Keys Received=1
MKA Hello Time=2000
actor_sci=8e:8a:d8:73:31:46@1
key_server_sci=66:47:98:22:61:77@1
participant_idx=0
ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
mi=5d1d5941d15e0c6371907267
mn=3
active=Yes
participant=No
retain=No
live_peers=1
potential_peers=0
is_key_server=No
is_elected=Yes
uuid=a547d1b3-cf18-5596-8566-562eb941f482
Expected key server: veth0
PASS macsec_psk_fail_cp 3.176714 2026-05-08 01:31:22.184733
passed all 1 test case(s)
2026-05-08 01:31:22 ./run-tests.py mesh_secure_ccmp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START mesh_secure_ccmp 1/1
Test: Secure mesh with CCMP
PASS mesh_secure_ccmp 1.677947 2026-05-08 01:31:24.171783
passed all 1 test case(s)
2026-05-08 01:31:24 ./run-tests.py multi_ap_backhaul_roam_with_bridge
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START multi_ap_backhaul_roam_with_bridge 1/1
Test: Multi-AP backhaul BSS reassociation to another BSS with bridge
Starting AP wlan3
Connect STA wlan5 to AP
Starting AP wlan4
PASS multi_ap_backhaul_roam_with_bridge 2.760183 2026-05-08 01:31:27.240609
passed all 1 test case(s)
2026-05-08 01:31:27 ./run-tests.py nan_sync_multi_services_4
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nan_sync_multi_services_4 1/1
Test: NAN synchronized service discovery with multiple services: passive subscribe (subset)
NAN capabilities: USD NAN
NAN device starting on nan0
Setting master_pref to 10 on nan0
Setting dual_band to 0 on nan0
NAN device started on nan0
NAN capabilities: USD NAN
NAN device starting on nan1
Setting master_pref to 10 on nan1
Setting dual_band to 0 on nan1
NAN device started on nan1
NAN device stopping on nan1
NAN device stopped on nan1
NAN device stopping on nan0
NAN device stopped on nan0
Exception during test execution: Not all services where discovered
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 633, in main
t(dev, apdev, params)
~^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 809, in test_nan_sync_multi_services_4
_nan_sync_multi_services(test_params)
~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 742, in _nan_sync_multi_services
raise Exception("Not all services where discovered")
Exception: Not all services where discovered
FAIL nan_sync_multi_services_4 21.173483 2026-05-08 01:31:48.727316
passed 0 test case(s)
skipped 0 test case(s)
failed tests: nan_sync_multi_services_4
2026-05-08 01:31:48 ./run-tests.py nan_sync_publisher_match_filter_6
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nan_sync_publisher_match_filter_6 1/1
Test: NAN synchronized active subscribe and solicited publish with match filter
NAN capabilities: USD NAN
NAN device starting on nan0
Setting master_pref to 10 on nan0
Setting dual_band to 0 on nan0
NAN device started on nan0
NAN capabilities: USD NAN
NAN device starting on nan1
Setting master_pref to 10 on nan1
Setting dual_band to 0 on nan1
NAN device started on nan1
Cancelling publish with ID 1 on nan0
Cancelling subscribe with ID 1 on nan1
NAN device stopping on nan1
NAN device stopped on nan1
NAN device stopping on nan0
NAN device stopped on nan0
Exception during test execution: NAN-DISCOVERY-RESULT event not seen
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 633, in main
t(dev, apdev, params)
~^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 380, in test_nan_sync_publisher_match_filter_6
_nan_sync_publisher_match_filter(pub_rx_filter="0000000000",
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^
sub_tx_filter="01010102010301040105")
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 346, in _nan_sync_publisher_match_filter
raise Exception("NAN-DISCOVERY-RESULT event not seen")
Exception: NAN-DISCOVERY-RESULT event not seen
FAIL nan_sync_publisher_match_filter_6 3.104205 2026-05-08 01:31:52.133330
passed 0 test case(s)
skipped 0 test case(s)
failed tests: nan_sync_publisher_match_filter_6
2026-05-08 01:31:52 ./run-tests.py nan_sync_srf_mac_addr_8
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nan_sync_srf_mac_addr_8 1/1
Test: NAN synchronized active subscribe and solicited publish with MAC address in SRF
NAN capabilities: USD NAN
NAN device starting on nan0
Setting master_pref to 10 on nan0
Setting dual_band to 0 on nan0
NAN device started on nan0
NAN capabilities: USD NAN
NAN device starting on nan1
Setting master_pref to 10 on nan1
Setting dual_band to 0 on nan1
NAN device started on nan1
Cancelling publish with ID 1 on nan0
Cancelling subscribe with ID 1 on nan1
NAN device stopping on nan1
NAN device stopped on nan1
NAN device stopping on nan0
NAN device stopped on nan0
Exception during test execution: NAN-DISCOVERY-RESULT event not seen
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 633, in main
t(dev, apdev, params)
~^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 665, in test_nan_sync_srf_mac_addr_8
_nan_sync_srf(wpas2, pub, srf_include=0, srf_mac_list=srf)
~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 560, in _nan_sync_srf
raise Exception("NAN-DISCOVERY-RESULT event not seen")
Exception: NAN-DISCOVERY-RESULT event not seen
FAIL nan_sync_srf_mac_addr_8 3.097871 2026-05-08 01:31:55.539483
passed 0 test case(s)
skipped 0 test case(s)
failed tests: nan_sync_srf_mac_addr_8
2026-05-08 01:31:55 ./run-tests.py nan_sync_subscriber_match_filter_16
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nan_sync_subscriber_match_filter_16 1/1
Test: NAN synchronized passive subscribe and unsolicited publish with match filter
NAN capabilities: USD NAN
NAN device starting on nan0
Setting master_pref to 10 on nan0
Setting dual_band to 0 on nan0
NAN device started on nan0
NAN capabilities: USD NAN
NAN device starting on nan1
Setting master_pref to 10 on nan1
Setting dual_band to 0 on nan1
NAN device started on nan1
Cancelling publish with ID 1 on nan0
Cancelling subscribe with ID 1 on nan1
NAN device stopping on nan1
NAN device stopped on nan1
NAN device stopping on nan0
NAN device stopped on nan0
PASS nan_sync_subscriber_match_filter_16 3.140243 2026-05-08 01:31:58.985914
passed all 1 test case(s)
2026-05-08 01:31:59 ./run-tests.py nan_usd_publish
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nan_usd_publish 1/1
Test: NAN USD Publish
Maximum services: 20
PASS nan_usd_publish 0.125749 2026-05-08 01:31:59.425053
passed all 1 test case(s)
2026-05-08 01:31:59 ./run-tests.py nfc_p2p_ip_addr_assignment2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_p2p_ip_addr_assignment2 1/1
Test: NFC connection handover and IP address assignment for two clients
Perform NFC connection handover
Group formed
Client 1 IP address: 192.168.42.100
Connect a P2P client
wlan2: Trying to discover peer 02:00:00:00:01:00
Client connected
Client 2 IP address: 192.168.42.101
PASS nfc_p2p_ip_addr_assignment2 13.416028 2026-05-08 01:32:13.148184
passed all 1 test case(s)
2026-05-08 01:32:13 ./run-tests.py nfc_wps_handover_pk_hash_mismatch_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START nfc_wps_handover_pk_hash_mismatch_ap 1/1
Test: WPS NFC connection handover with invalid pkhash from AP (negative)
Starting AP wlan3
NFC connection handover
wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth
PASS nfc_wps_handover_pk_hash_mismatch_ap 1.173259 2026-05-08 01:32:14.632245
passed all 1 test case(s)
2026-05-08 01:32:14 ./run-tests.py olbc_table_limit
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START olbc_table_limit 1/1
Test: OLBC AP table size limit
Starting BSS phy=phy3 ifname=wlan3
Starting BSS phy=phy3 ifname=wlan3-2
Starting BSS phy=phy3 ifname=wlan3-3
Starting AP wlan4
PASS olbc_table_limit 3.298146 2026-05-08 01:32:18.245520
passed all 1 test case(s)
2026-05-08 01:32:18 ./run-tests.py owe_double_assoc
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START owe_double_assoc 1/1
Test: Opportunistic Wireless Encryption - duplicated association attempt
Starting AP wlan3
Connect STA wlan0 to AP
PASS owe_double_assoc 1.108066 2026-05-08 01:32:19.651321
passed all 1 test case(s)
2026-05-08 01:32:19 ./run-tests.py p2p_device_persistent_group2_no_group_iface
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_device_persistent_group2_no_group_iface 1/1
Test: P2P persistent group formation and re-invocation (reverse) with cfg80211 P2P Device (no separate group interface)
Form a persistent group
Start GO negotiation wlan7 -> wlan0
wlan0: Trying to discover peer 42:00:00:00:13:00
wlan7: Trying to discover peer 02:00:00:00:00:00
Group formed
Terminate persistent group
Re-invoke persistent group from client
wlan0: Trying to discover peer 42:00:00:00:13:00
Terminate persistent group
Re-invoke persistent group from GO
wlan7: Trying to discover peer 02:00:00:00:00:00
Terminate persistent group
PASS p2p_device_persistent_group2_no_group_iface 7.325253 2026-05-08 01:32:27.272651
passed all 1 test case(s)
2026-05-08 01:32:27 ./run-tests.py p2p_service_discovery_peer_not_listening
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2p_service_discovery_peer_not_listening 1/1
Test: P2P service discovery and peer not listening
PASS p2p_service_discovery_peer_not_listening 4.12095 2026-05-08 01:32:31.687401
passed all 1 test case(s)
2026-05-08 01:32:31 ./run-tests.py p2ps_exact_search
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START p2ps_exact_search 1/1
Test: P2PS exact service request
PASS p2ps_exact_search 0.381856 2026-05-08 01:32:32.370118
passed all 1 test case(s)
2026-05-08 01:32:32 ./run-tests.py radius_macacl
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_macacl 1/1
Test: RADIUS MAC ACL
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan2 to AP
Connect STA wlan2 to AP
PASS radius_macacl 1.789749 2026-05-08 01:32:34.470210
passed all 1 test case(s)
2026-05-08 01:32:34 ./run-tests.py radius_macacl_unreachable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_macacl_unreachable 1/1
Test: RADIUS MAC ACL and server unreachable
Starting AP wlan3
Connect STA wlan0 to AP
Fix authentication server port
PASS radius_macacl_unreachable 9.487129 2026-05-08 01:32:44.255332
passed all 1 test case(s)
2026-05-08 01:32:44 ./run-tests.py radius_mppe_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START radius_mppe_failure 1/1
Test: RADIUS failure when adding MPPE keys
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
PASS radius_mppe_failure 1.526958 2026-05-08 01:32:46.078272
passed all 1 test case(s)
2026-05-08 01:32:46 ./run-tests.py rrm_beacon_req_ap_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START rrm_beacon_req_ap_errors 1/1
Test: Beacon request - AP error cases
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth
wlan0: Waiting for scan operation to complete before continuing
Run FLUSH again since scan was in progress
PASS rrm_beacon_req_ap_errors 2.596151 2026-05-08 01:32:48.968154
passed all 1 test case(s)
2026-05-08 01:32:49 ./run-tests.py rsn_preauth_local_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START rsn_preauth_local_errors 1/1
Test: RSN pre-authentication and local errors on AP
Starting AP wlan3
PASS rsn_preauth_local_errors 2.065424 2026-05-08 01:32:51.325231
passed all 1 test case(s)
2026-05-08 01:32:51 ./run-tests.py sae_password_ffc
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_password_ffc 1/1
Test: SAE with number of different passwords (FFC)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS sae_password_ffc 4.842009 2026-05-08 01:32:56.463450
passed all 1 test case(s)
2026-05-08 01:32:56 ./run-tests.py sae_pk_sec_5
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pk_sec_5 1/1
Test: SAE-PK with Sec 5
Starting AP wlan3
Connect STA wlan0 to AP
PASS sae_pk_sec_5 1.394883 2026-05-08 01:32:58.161626
passed all 1 test case(s)
2026-05-08 01:32:58 ./run-tests.py sae_pwe_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_pwe_failure 1/1
Test: SAE and pwe failure
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS sae_pwe_failure 3.578184 2026-05-08 01:33:02.044190
passed all 1 test case(s)
2026-05-08 01:33:02 ./run-tests.py sae_wpa3_roam
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sae_wpa3_roam 1/1
Test: SAE and WPA3-Personal transition mode roaming
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS sae_wpa3_roam 4.32429 2026-05-08 01:33:06.664758
passed all 1 test case(s)
2026-05-08 01:33:06 ./run-tests.py sigma_dut_ap_suite_b
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_suite_b 1/1
Test: sigma_dut controlled AP Suite B
Starting AP wlan4
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_suite_b 0.587491 2026-05-08 01:33:07.549284
passed all 0 test case(s)
skipped 1 test case(s)
2026-05-08 01:33:07 ./run-tests.py sigma_dut_ap_transition_disable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_ap_transition_disable 1/1
Test: sigma_dut controlled AP and transition disabled indication
Skip test case: sigma_dut not available
SKIP sigma_dut_ap_transition_disable 0.14467 2026-05-08 01:33:08.005929
passed all 0 test case(s)
skipped 1 test case(s)
2026-05-08 01:33:08 ./run-tests.py sigma_dut_dpp_pkex_responder_proto
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_pkex_responder_proto 1/1
Test: sigma_dut controlled STA as DPP PKEX responder and error case
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_pkex_responder_proto 0.066482 2026-05-08 01:33:08.381097
passed all 0 test case(s)
skipped 1 test case(s)
2026-05-08 01:33:08 ./run-tests.py sigma_dut_dpp_proto_peer_disc_req3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START sigma_dut_dpp_proto_peer_disc_req3 1/1
Test: sigma_dut DPP protocol testing - Peer Discovery Request (e)
Skip test case: sigma_dut not available
SKIP sigma_dut_dpp_proto_peer_disc_req3 0.070323 2026-05-08 01:33:08.761673
passed all 0 test case(s)
skipped 1 test case(s)
2026-05-08 01:33:08 ./run-tests.py suite_b_192_rsa_dhe_radius_rsa2048_client
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START suite_b_192_rsa_dhe_radius_rsa2048_client 1/1
Test: Suite B 192-bit level and RSA (DHE) and RSA2048 client
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
PASS suite_b_192_rsa_dhe_radius_rsa2048_client 1.962229 2026-05-08 01:33:11.024974
passed all 1 test case(s)
2026-05-08 01:33:11 ./run-tests.py suite_b_192_rsa_ecdhe
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START suite_b_192_rsa_ecdhe 1/1
Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA (ECDHE)
Starting AP wlan3
Connect STA wlan0 to AP
TLS version: TLSv1.2
PASS suite_b_192_rsa_ecdhe 1.771073 2026-05-08 01:33:13.096549
passed all 1 test case(s)
2026-05-08 01:33:13 ./run-tests.py wext_scan_hidden
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wext_scan_hidden 1/1
Test: WEXT with hidden SSID
Starting AP wlan3
Starting AP wlan4
Connect STA wlan5 to AP
Connect STA wlan5 to AP
PASS wext_scan_hidden 20.41178 2026-05-08 01:33:33.811357
passed all 1 test case(s)
2026-05-08 01:33:33 ./run-tests.py wnm_action_proto_no_pmf
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_action_proto_no_pmf 1/1
Test: WNM Action protocol testing (PMF disabled)
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_action_proto_no_pmf 1.111117 2026-05-08 01:33:35.224103
passed all 1 test case(s)
2026-05-08 01:33:35 ./run-tests.py wnm_bss_tm_reject
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_bss_tm_reject 1/1
Test: WNM BSS Transition Management request getting rejected
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_bss_tm_reject 7.53028 2026-05-08 01:33:43.049281
passed all 1 test case(s)
2026-05-08 01:33:43 ./run-tests.py wnm_bss_tm_steering_timeout
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_bss_tm_steering_timeout 1/1
Test: WNM BSS Transition Management and steering timeout
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS wnm_bss_tm_steering_timeout 4.14312 2026-05-08 01:33:47.483319
passed all 1 test case(s)
2026-05-08 01:33:47 ./run-tests.py wnm_sleep_mode_ap_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wnm_sleep_mode_ap_oom 1/1
Test: WNM Sleep Mode - AP side OOM
Starting AP wlan3
Connect STA wlan0 to AP
PASS wnm_sleep_mode_ap_oom 0.962956 2026-05-08 01:33:48.751875
passed all 1 test case(s)
2026-05-08 01:33:48 ./run-tests.py wpa2_ocv_ap_override_eapol_m3_post_enable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpa2_ocv_ap_override_eapol_m3_post_enable 1/1
Test: OCV on 2.4 GHz and AP override EAPOL-Key msg 3/4 (post enable)
Starting AP wlan3
Connect STA wlan0 to AP
PASS wpa2_ocv_ap_override_eapol_m3_post_enable 4.094461 2026-05-08 01:33:53.148793
passed all 1 test case(s)
2026-05-08 01:33:53 ./run-tests.py wpa2_ocv_ap_vht160_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpa2_ocv_ap_vht160_mismatch 1/1
Test: OCV AP mismatch (VHT160)
Starting AP wlan3
Exception during test execution: AP startup failed
Traceback (most recent call last):
File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main
t(dev, apdev)
~^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 508, in test_wpa2_ocv_ap_vht160_mismatch
run_wpa2_ocv_ap_vht160_mismatch(dev, apdev)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 527, in run_wpa2_ocv_ap_vht160_mismatch
conn = APConnection(apdev[0], dev[0], params)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 378, in __init__
self.hapd = hostapd.add_ap(apdev, params)
~~~~~~~~~~~~~~^^^^^^^^^^^^^^^
File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap
raise Exception("AP startup failed")
Exception: AP startup failed
FAIL wpa2_ocv_ap_vht160_mismatch 6.683707 2026-05-08 01:34:00.135257
passed 0 test case(s)
skipped 0 test case(s)
failed tests: wpa2_ocv_ap_vht160_mismatch
2026-05-08 01:34:00 ./run-tests.py wpas_ap_sae_pwe_1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ap_sae_pwe_1 1/1
Test: wpa_supplicant AP mode - SAE using sae_password and sae_pwe=1
Connect STA wlan1 to AP
PASS wpas_ap_sae_pwe_1 1.128162 2026-05-08 01:34:01.566002
passed all 1 test case(s)
2026-05-08 01:34:01 ./run-tests.py wpas_config_file_set_global
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_config_file_set_global 1/1
Test: wpa_supplicant config file parsing/writing with arbitrary global values
Configuration file contents: ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=adm
update_config=1
dik_cipher=0
dik=6B75BF4B662154D4CB6C11F30E818E44
PASS wpas_config_file_set_global 0.479506 2026-05-08 01:34:02.347972
passed all 1 test case(s)
2026-05-08 01:34:02 ./run-tests.py wpas_ctrl_get
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_get 1/1
Test: wpa_supplicant ctrl_iface get
PASS wpas_ctrl_get 0.069376 2026-05-08 01:34:02.713748
passed all 1 test case(s)
2026-05-08 01:34:02 ./run-tests.py wpas_ctrl_set_uapsd
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_ctrl_set_uapsd 1/1
Test: wpa_supplicant ctrl_iface SET uapsd
PASS wpas_ctrl_set_uapsd 0.070559 2026-05-08 01:34:03.085606
passed all 1 test case(s)
2026-05-08 01:34:03 ./run-tests.py wpas_mesh_secure_sae_group_mismatch
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START wpas_mesh_secure_sae_group_mismatch 1/1
Test: wpa_supplicant secure MESH and SAE group mismatch
PASS wpas_mesh_secure_sae_group_mismatch 2.953885 2026-05-08 01:34:06.343249
passed all 1 test case(s)
2026-05-08 01:34:06 ./stop.sh