2026-05-08 01:25:22 cd /lkp/benchmarks/hwsim/tests/hwsim group: group-30, test: group-30 2026-05-08 01:25:22 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2026-05-08 01:26:12 systemctl status dbus.service ○ dbus.service - D-Bus System Message Bus Loaded: loaded (/usr/lib/systemd/system/dbus.service; static) Active: inactive (dead) TriggeredBy: ○ dbus.socket Docs: man:dbus-daemon(1) 2026-05-08 01:26:12 systemctl restart dbus.service srw-rw-rw- 1 root root 0 May 8 01:26 /run/dbus/system_bus_socket 2026-05-08 01:26:22 ./start.sh 2026-05-08 01:26:24 ./run-tests.py ap_csa_2_switches_count_0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_2_switches_count_0 1/1 Test: AP Channel Switch, two switches with count 0 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_2_switches_count_0 1.142654 2026-05-08 01:26:26.440312 passed all 1 test case(s) 2026-05-08 01:26:26 ./run-tests.py ap_ft_eap_ptk_rekey_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_eap_ptk_rekey_ap 1/1 Test: WPA2-EAP-FT PTK rekeying triggered by AP Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_eap_ptk_rekey_ap 4.442009 2026-05-08 01:26:31.185469 passed all 1 test case(s) 2026-05-08 01:26:31 ./run-tests.py ap_ft_rrb DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_rrb 1/1 Test: WPA2-PSK-FT RRB protocol testing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ft_rrb 1.20398 2026-05-08 01:26:32.682303 passed all 1 test case(s) 2026-05-08 01:26:32 ./run-tests.py ap_hs20_ft DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_ft 1/1 Test: Hotspot 2.0 connection with FT Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_ft 2.187819 2026-05-08 01:26:35.160020 passed all 1 test case(s) 2026-05-08 01:26:35 ./run-tests.py ap_ht40_csa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_csa2 1/1 Test: HT with 40 MHz channel width and CSA Starting AP wlan3 Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main t(dev, apdev) ~^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ht.py", line 1144, in test_ap_ht40_csa2 hapd = hostapd.add_ap(apdev[0], params) File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL ap_ht40_csa2 5.824385 2026-05-08 01:26:41.279744 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ht40_csa2 2026-05-08 01:26:41 ./run-tests.py ap_ht_op_class_120 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_120 1/1 Test: HT40 on operating class 120 Starting AP wlan3 Skip test case: Channel not supported SKIP ap_ht_op_class_120 5.675426 2026-05-08 01:26:47.246767 passed all 0 test case(s) skipped 1 test case(s) 2026-05-08 01:26:47 ./run-tests.py ap_ht_op_class_81 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_81 1/1 Test: HT20 on operating class 81 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_81 2.730061 2026-05-08 01:26:50.268867 passed all 1 test case(s) 2026-05-08 01:26:50 ./run-tests.py ap_open_start_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_start_disabled 1/1 Test: AP with open mode and beaconing disabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_start_disabled 1.473255 2026-05-08 01:26:52.037982 passed all 1 test case(s) 2026-05-08 01:26:52 ./run-tests.py ap_remove_during_acs3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_acs3 1/1 Test: Remove second BSS during ACS in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Removing BSS wlan3-2 PASS ap_remove_during_acs3 1.101466 2026-05-08 01:26:53.439553 passed all 1 test case(s) 2026-05-08 01:26:53 ./run-tests.py ap_vht_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_tkip 1/1 Test: VHT and TKIP Starting AP wlan3 Country code at the end: 00 Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main t(dev, apdev) ~^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 1207, in test_ap_vht_tkip hapd = hostapd.add_ap(apdev[0], params) File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL ap_vht_tkip 6.628952 2026-05-08 01:27:00.359284 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vht_tkip 2026-05-08 01:27:00 ./run-tests.py ap_vlan_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_psk 1/1 Test: AP VLAN based on PSK/passphrase Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_psk 2.567763 2026-05-08 01:27:03.222989 passed all 1 test case(s) 2026-05-08 01:27:03 ./run-tests.py ap_wpa2_eap_aka_imsi_identity DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_imsi_identity 1/1 Test: WPA2-Enterprise connection using EAP-AKA and imsi_identity Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_imsi_identity 1.044746 2026-05-08 01:27:04.557560 passed all 1 test case(s) 2026-05-08 01:27:04 ./run-tests.py ap_wpa2_eap_sim_id_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_id_2 1/1 Test: WPA2-Enterprise connection using EAP-SIM (no pseudonym, reauth) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_id_2 1.03433 2026-05-08 01:27:05.890540 passed all 1 test case(s) 2026-05-08 01:27:05 ./run-tests.py ap_wpa2_eap_ttls_dh_params_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_dh_params_server 1/1 Test: WPA2-Enterprise using EAP-TTLS and alternative server dhparams Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_dh_params_server 1.017112 2026-05-08 01:27:07.205686 passed all 1 test case(s) 2026-05-08 01:27:07 ./run-tests.py ap_wpa2_eap_ttls_eap_aka DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_aka 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-AKA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_aka 1.054506 2026-05-08 01:27:08.559125 passed all 1 test case(s) 2026-05-08 01:27:08 ./run-tests.py ap_wpa2_plaintext_group_m1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_plaintext_group_m1 1/1 Test: Plaintext group M1 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_plaintext_group_m1 1.4225 2026-05-08 01:27:10.273822 passed all 1 test case(s) 2026-05-08 01:27:10 ./run-tests.py ap_wpa2_psk_ifdown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ifdown 1/1 Test: AP with open mode and external ifconfig down Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ifdown 2.75004 2026-05-08 01:27:13.320331 passed all 1 test case(s) 2026-05-08 01:27:13 ./run-tests.py ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg 1/1 Test: WPA2-PSK supplicant protocol testing: too long GTK KDE in group msg Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg 0.994077 2026-05-08 01:27:14.612174 passed all 1 test case(s) 2026-05-08 01:27:14 ./run-tests.py ap_wps_ap_pin_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_ap_pin_failure 1/1 Test: WPS_AP_PIN failure PASS ap_wps_ap_pin_failure 0.818223 2026-05-08 01:27:15.725308 passed all 1 test case(s) 2026-05-08 01:27:15 ./run-tests.py ap_wps_er_http_proto_control_url_dns DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_control_url_dns 1/1 Test: WPS ER HTTP protocol testing - DNS name in controlURL HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_proto_control_url_dns 2.078787 2026-05-08 01:27:18.101550 passed all 1 test case(s) 2026-05-08 01:27:18 ./run-tests.py ap_wps_er_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_oom 1/1 Test: WPS ER OOM in XML processing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wps_er_oom 6.207664 2026-05-08 01:27:24.609309 passed all 1 test case(s) 2026-05-08 01:27:24 ./run-tests.py ap_wps_m2_missing_dev_passwd_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_missing_dev_passwd_id 1/1 Test: WPS and M2 without Device Password ID Starting AP wlan3 PASS ap_wps_m2_missing_dev_passwd_id 1.495333 2026-05-08 01:27:26.403735 passed all 1 test case(s) 2026-05-08 01:27:26 ./run-tests.py ap_wps_per_station_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_per_station_psk 1/1 Test: WPS PBC provisioning with per-station PSK Starting AP wlan3 First enrollee Second enrollee External registrar Verifying PSK results Second external registrar PASS ap_wps_per_station_psk 5.835553 2026-05-08 01:27:32.538225 passed all 1 test case(s) 2026-05-08 01:27:32 ./run-tests.py ap_wps_set_selected_registrar_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_set_selected_registrar_proto 1/1 Test: WPS UPnP SetSelectedRegistrar protocol testing Starting AP wlan3 PASS ap_wps_set_selected_registrar_proto 0.759907 2026-05-08 01:27:33.599140 passed all 1 test case(s) 2026-05-08 01:27:33 ./run-tests.py autogo_random_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_random_channel 1/1 Test: P2P channel selection: GO instantiated on random channel 1, 6, 11 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 PASS autogo_random_channel 3.832551 2026-05-08 01:27:37.726891 passed all 1 test case(s) 2026-05-08 01:27:37 ./run-tests.py dbus_apscan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_apscan 1/1 Test: D-Bus Get/Set ApScan PASS dbus_apscan 0.078455 2026-05-08 01:27:38.099333 passed all 1 test case(s) 2026-05-08 01:27:38 ./run-tests.py dbus_connect_oom_201_300 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_connect_oom_201_300 1/1 Test: D-Bus AddNetwork and connect when out-of-memory (201-300) Starting AP wlan3 Iteration 251 - Expected signals not seen GET_ALLOC_FAIL: 0:main Iteration 252 - success GET_ALLOC_FAIL: 31:main Iteration 253 - success GET_ALLOC_FAIL: 31:main Iteration 254 - Expected signals not seen GET_ALLOC_FAIL: 0:main Iteration 255 - success GET_ALLOC_FAIL: 33:main Iteration 256 - success GET_ALLOC_FAIL: 35:main Iteration 257 - success GET_ALLOC_FAIL: 36:main PASS dbus_connect_oom_201_300 13.239894 2026-05-08 01:27:51.635622 passed all 1 test case(s) 2026-05-08 01:27:51 ./run-tests.py dbus_introspect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_introspect 1/1 Test: D-Bus introspection Initial Introspect: Introspect: None Introspect: Introspect: Introspect: PASS dbus_introspect 0.075073 2026-05-08 01:27:52.005750 passed all 1 test case(s) 2026-05-08 01:27:52 ./run-tests.py dbus_p2p_wps_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_wps_failure 1/1 Test: D-Bus P2P WPS failure wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Ignore unexpected status-driver line: ignore_next_local_deauth PASS dbus_p2p_wps_failure 2.518228 2026-05-08 01:27:54.828178 passed all 1 test case(s) 2026-05-08 01:27:54 ./run-tests.py discovery_device_name_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_device_name_change 1/1 Test: P2P device discovery and peer changing device name PASS discovery_device_name_change 1.252334 2026-05-08 01:27:56.378024 passed all 1 test case(s) 2026-05-08 01:27:56 ./run-tests.py discovery_pd_retries DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_pd_retries 1/1 Test: P2P device discovery and provision discovery retries wlan0: Trying to discover peer 02:00:00:00:01:00 PASS discovery_pd_retries 39.400458 2026-05-08 01:28:36.080049 passed all 1 test case(s) 2026-05-08 01:28:36 ./run-tests.py dpp_config_connector_error_missing_net_role DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_missing_net_role 1/1 Test: DPP Config Object connector error - missing netRole Exception during test execution: module 'OpenSSL.crypto' has no attribute 'sign' Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main t(dev, apdev) ~^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1636, in test_dpp_config_connector_error_missing_net_role run_dpp_config_connector(dev, apdev, payload=payload) ~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1563, in run_dpp_config_connector sign = ecdsa_sign(pkey, conn) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1514, in ecdsa_sign sign = OpenSSL.crypto.sign(pkey, message, alg) ^^^^^^^^^^^^^^^^^^^ File "/usr/lib/python3/dist-packages/cryptography/utils.py", line 68, in __getattr__ obj = getattr(self._module, attr) AttributeError: module 'OpenSSL.crypto' has no attribute 'sign' FAIL dpp_config_connector_error_missing_net_role 0.074178 2026-05-08 01:28:36.464348 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_config_connector_error_missing_net_role 2026-05-08 01:28:36 ./run-tests.py dpp_config_jws_error_prot_hdr_not_an_object DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_not_an_object 1/1 Test: DPP Config Object JWS error - protected header not an object dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_not_an_object 0.155696 2026-05-08 01:28:36.934068 passed all 1 test case(s) 2026-05-08 01:28:36 ./run-tests.py dpp_config_legacy_gen_sta_ap_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_legacy_gen_sta_ap_conf 1/1 Test: Generate DPP Config Object for legacy network (sta and ap config) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_legacy_gen_sta_ap_conf 1.145515 2026-05-08 01:28:38.382273 passed all 1 test case(s) 2026-05-08 01:28:38 ./run-tests.py dpp_configurator_id_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_configurator_id_unknown 1/1 Test: DPP and unknown configurator id Starting AP wlan3 PASS dpp_configurator_id_unknown 0.51277 2026-05-08 01:28:39.195875 passed all 1 test case(s) 2026-05-08 01:28:39 ./run-tests.py dpp_conn_status_assoc_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_conn_status_assoc_reject 1/1 Test: DPP connection status - association rejection Starting AP wlan3 PASS dpp_conn_status_assoc_reject 15.64168 2026-05-08 01:28:55.140861 passed all 1 test case(s) 2026-05-08 01:28:55 ./run-tests.py dpp_conn_status_connector_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_conn_status_connector_mismatch 1/1 Test: DPP connection status - invalid Connector Starting AP wlan3 PASS dpp_conn_status_connector_mismatch 5.477155 2026-05-08 01:29:00.924849 passed all 1 test case(s) 2026-05-08 01:29:00 ./run-tests.py dpp_pkex_exchange_resp_processing_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_exchange_resp_processing_failure 1/1 Test: DPP and PKEX with local failure in processing Exchange Resp PASS dpp_pkex_exchange_resp_processing_failure 0.369803 2026-05-08 01:29:01.599081 passed all 1 test case(s) 2026-05-08 01:29:01 ./run-tests.py dpp_proto_after_wrapped_data_pkex_cr_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_after_wrapped_data_pkex_cr_resp 1/1 Test: DPP protocol testing - attribute after Wrapped Data in PKEX CR Resp PASS dpp_proto_after_wrapped_data_pkex_cr_resp 0.162656 2026-05-08 01:29:02.062700 passed all 1 test case(s) 2026-05-08 01:29:02 ./run-tests.py dpp_proto_auth_req_invalid_i_proto_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_req_invalid_i_proto_key 1/1 Test: DPP protocol testing - invalid I-proto key in Auth Req PASS dpp_proto_auth_req_invalid_i_proto_key 0.215205 2026-05-08 01:29:02.589310 passed all 1 test case(s) 2026-05-08 01:29:02 ./run-tests.py dpp_proto_auth_req_no_i_capab DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_req_no_i_capab 1/1 Test: DPP protocol testing - no I-capab in Auth Req PASS dpp_proto_auth_req_no_i_capab 0.205004 2026-05-08 01:29:03.097155 passed all 1 test case(s) 2026-05-08 01:29:03 ./run-tests.py dpp_proto_conf_resp_no_e_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_resp_no_e_nonce 1/1 Test: DPP protocol testing - no E-nonce in Conf Resp PASS dpp_proto_conf_resp_no_e_nonce 0.133916 2026-05-08 01:29:03.534611 passed all 1 test case(s) 2026-05-08 01:29:03 ./run-tests.py dpp_proto_pkex_cr_req_i_auth_tag_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_cr_req_i_auth_tag_mismatch 1/1 Test: DPP protocol testing - I-auth tag mismatch in PKEX Commit-Reveal Request PASS dpp_proto_pkex_cr_req_i_auth_tag_mismatch 0.16198 2026-05-08 01:29:04.004642 passed all 1 test case(s) 2026-05-08 01:29:04 ./run-tests.py dscp_request DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dscp_request 1/1 Test: DSCP Policy Request Starting AP wlan3 Connect STA wlan0 to AP PASS dscp_request 1.00344 2026-05-08 01:29:05.310276 passed all 1 test case(s) 2026-05-08 01:29:05 ./run-tests.py eap_canned_failure_before_method DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_canned_failure_before_method 1/1 Test: EAP protocol tests for canned EAP-Failure before any method Starting AP wlan3 Connect STA wlan0 to AP PASS eap_canned_failure_before_method 0.973553 2026-05-08 01:29:06.589804 passed all 1 test case(s) 2026-05-08 01:29:06 ./run-tests.py eap_mschapv2_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_mschapv2_errors 1/1 Test: EAP-MSCHAPv2 error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_mschapv2_errors 8.018608 2026-05-08 01:29:14.918057 passed all 1 test case(s) 2026-05-08 01:29:14 ./run-tests.py eap_peap_session_resumption_crypto_binding DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_peap_session_resumption_crypto_binding 1/1 Test: EAP-PEAP session resumption with crypto binding Starting AP wlan3 Connect STA wlan0 to AP PASS eap_peap_session_resumption_crypto_binding 1.029912 2026-05-08 01:29:16.254699 passed all 1 test case(s) 2026-05-08 01:29:16 ./run-tests.py eap_proto_aka DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_aka 1/1 Test: EAP-AKA protocol tests Starting AP wlan3 Connect STA wlan0 to AP aka_handler - RX 024f00150130323332303130303030303030303030 Test: Missing payload Connect STA wlan0 to AP aka_handler - RX 028b00150130323332303130303030303030303030 Test: Unknown subtype aka_handler - RX 028c000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 026100150130323332303130303030303030303030 Test: Client Error aka_handler - RX 0262000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02d000150130323332303130303030303030303030 Test: Too short attribute header aka_handler - RX 02d1000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 020100150130323332303130303030303030303030 Test: Truncated attribute aka_handler - RX 0202000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02f500150130323332303130303030303030303030 Test: Too short attribute data aka_handler - RX 02f6000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 029400150130323332303130303030303030303030 Test: Skippable/non-skippable unrecognzized attribute aka_handler - RX 0295000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 028900150130323332303130303030303030303030 Test: Identity request without ID type aka_handler - RX 028a000817050000 Test: Identity request ANY_ID aka_handler - RX 028b001c170500000e05001030323332303130303030303030303030 Test: Identity request ANY_ID (duplicate) aka_handler - RX 028c000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 027b00150130323332303130303030303030303030 Test: Identity request ANY_ID aka_handler - RX 027c001c170500000e05001030323332303130303030303030303030 Test: Identity request FULLAUTH_ID aka_handler - RX 027d001c170500000e05001030323332303130303030303030303030 Test: Identity request FULLAUTH_ID (duplicate) aka_handler - RX 027e000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02a300150130323332303130303030303030303030 Test: Identity request ANY_ID aka_handler - RX 02a4001c170500000e05001030323332303130303030303030303030 Test: Identity request FULLAUTH_ID aka_handler - RX 02a5001c170500000e05001030323332303130303030303030303030 Test: Identity request PERMANENT_ID aka_handler - RX 02a6001c170500000e05001030323332303130303030303030303030 Test: Identity request PERMANENT_ID (duplicate) aka_handler - RX 02a7000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 020100150130323332303130303030303030303030 Test: Challenge with no attributes aka_handler - RX 0202000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02f600150130323332303130303030303030303030 Test: AKA Challenge with BIDDING aka_handler - RX 02f7000817020000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 021400150130323332303130303030303030303030 Test: Notification with no attributes aka_handler - RX 0215000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 021600150130323332303130303030303030303030 Test: Notification indicating success, but no MAC aka_handler - RX 0217000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 020f00150130323332303130303030303030303030 Test: Notification indicating success, but invalid MAC value aka_handler - RX 0210000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 022400150130323332303130303030303030303030 Test: Notification indicating success with zero-key MAC aka_handler - RX 0225000c170e000016010000 Test: EAP-Success Connect STA wlan0 to AP aka_handler - RX 029300150130323332303130303030303030303030 Test: Notification before auth aka_handler - RX 02940008170c0000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 021700150130323332303130303030303030303030 Test: Notification before auth aka_handler - RX 02180008170c0000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02ef00150130323332303130303030303030303030 Test: Notification with unrecognized non-failure aka_handler - RX 02f00008170c0000 Test: Notification before auth (duplicate) aka_handler - RX 02f1000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02ab00150130323332303130303030303030303030 Test: Re-authentication (unexpected) with no attributes aka_handler - RX 02ac000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02d700150130323332303130303030303030303030 Test: AKA Challenge with Checkcode claiming identity round was used aka_handler - RX 02d8000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 021500150130323332303130303030303030303030 Test: Identity request ANY_ID aka_handler - RX 0216001c170500000e05001030323332303130303030303030303030 Test: AKA Challenge with Checkcode claiming no identity round was used aka_handler - RX 0217000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 022600150130323332303130303030303030303030 Test: Identity request ANY_ID aka_handler - RX 0227001c170500000e05001030323332303130303030303030303030 Test: AKA Challenge with mismatching Checkcode value aka_handler - RX 0228000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 025800150130323332303130303030303030303030 Test: Re-authentication (unexpected) with Checkcode claimin identity round was used aka_handler - RX 0259000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 028100150130323332303130303030303030303030 Test: Invalid AT_RAND length aka_handler - RX 0282000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02fd00150130323332303130303030303030303030 Test: Invalid AT_AUTN length aka_handler - RX 02fe000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 021a00150130323332303130303030303030303030 Test: Unencrypted AT_PADDING aka_handler - RX 021b000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02a900150130323332303130303030303030303030 Test: Invalid AT_NONCE_MT length aka_handler - RX 02aa000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 029200150130323332303130303030303030303030 Test: Invalid AT_MAC length aka_handler - RX 0293000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02c800150130323332303130303030303030303030 Test: Invalid AT_NOTIFICATION length aka_handler - RX 02c9000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 027100150130323332303130303030303030303030 Test: AT_IDENTITY overflow aka_handler - RX 0272000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02e100150130323332303130303030303030303030 Test: Unexpected AT_VERSION_LIST aka_handler - RX 02e2000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 025300150130323332303130303030303030303030 Test: Invalid AT_SELECTED_VERSION length aka_handler - RX 0254000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02d300150130323332303130303030303030303030 Test: Unencrypted AT_COUNTER aka_handler - RX 02d4000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02b100150130323332303130303030303030303030 Test: Unencrypted AT_COUNTER_TOO_SMALL aka_handler - RX 02b2000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 025300150130323332303130303030303030303030 Test: Unencrypted AT_NONCE_S aka_handler - RX 0254000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02c800150130323332303130303030303030303030 Test: Invalid AT_CLIENT_ERROR_CODE length aka_handler - RX 02c9000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 024500150130323332303130303030303030303030 Test: Invalid AT_IV length aka_handler - RX 0246000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02dd00150130323332303130303030303030303030 Test: Invalid AT_ENCR_DATA length aka_handler - RX 02de000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 024400150130323332303130303030303030303030 Test: Unencrypted AT_NEXT_PSEUDONYM aka_handler - RX 0245000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02e800150130323332303130303030303030303030 Test: Unencrypted AT_NEXT_REAUTH_ID aka_handler - RX 02e9000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02dd00150130323332303130303030303030303030 Test: Invalid AT_RES length aka_handler - RX 02de000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 023a00150130323332303130303030303030303030 Test: Invalid AT_RES length aka_handler - RX 023b000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02fc00150130323332303130303030303030303030 Test: Invalid AT_AUTS length aka_handler - RX 02fd000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 02f300150130323332303130303030303030303030 Test: Invalid AT_CHECKCODE length aka_handler - RX 02f4000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 024900150130323332303130303030303030303030 Test: Invalid AT_RESULT_IND length aka_handler - RX 024a000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 022100150130323332303130303030303030303030 Test: Unexpected AT_KDF_INPUT aka_handler - RX 0222000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 028600150130323332303130303030303030303030 Test: Unexpected AT_KDF aka_handler - RX 0287000c170e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_handler - RX 026000150130323332303130303030303030303030 Test: Invalid AT_BIDDING length aka_handler - RX 0261000c170e000016010000 Test: EAP-Failure PASS eap_proto_aka 17.532108 2026-05-08 01:29:34.089905 passed all 1 test case(s) 2026-05-08 01:29:34 ./run-tests.py eap_proto_aka_prime DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_aka_prime 1/1 Test: EAP-AKA' protocol tests Starting AP wlan3 Connect STA wlan0 to AP aka_prime_handler - RX 023200150136353535343434333333323232313131 Test: Missing payload Connect STA wlan0 to AP aka_prime_handler - RX 023700150136353535343434333333323232313131 Test: Challenge with no attributes aka_prime_handler - RX 0238000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 022500150136353535343434333333323232313131 Test: Challenge with empty AT_KDF_INPUT aka_prime_handler - RX 0226000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 025800150136353535343434333333323232313131 Test: Challenge with AT_KDF_INPUT aka_prime_handler - RX 0259000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 028f00150136353535343434333333323232313131 Test: Challenge with duplicated KDF aka_prime_handler - RX 0290000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02a600150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 02a7000c3201000018010001 Test: Challenge with incorrect KDF selected aka_prime_handler - RX 02a8000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 025500150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 0256000c3201000018010001 Test: Challenge with selected KDF not duplicated aka_prime_handler - RX 0257000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02aa00150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 02ab000c3201000018010001 Test: Challenge with selected KDF duplicated (missing MAC, RAND, AUTN) aka_prime_handler - RX 02ac000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 025000150136353535343434333333323232313131 Test: Challenge with multiple unsupported KDF proposals aka_prime_handler - RX 0251000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02e700150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 02e8000c3201000018010001 Test: Challenge with invalid MAC, RAND, AUTN values) aka_prime_handler - RX 02e9000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 027200150136353535343434333333323232313131 Test: Challenge - AMF separation bit not set) aka_prime_handler - RX 0273000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02c100150136353535343434333333323232313131 Test: Challenge - Invalid MAC aka_prime_handler - RX 02c2000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02c900150136353535343434333333323232313131 Test: Challenge - Valid MAC aka_prime_handler - RX 02ca000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 02c600150136353535343434333333323232313131 Test: Invalid AT_KDF_INPUT length aka_prime_handler - RX 02c7000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 029400150136353535343434333333323232313131 Test: Invalid AT_KDF length aka_prime_handler - RX 0295000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 027a00150136353535343434333333323232313131 Test: Challenge with large number of KDF proposals aka_prime_handler - RX 027b000832020000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 021900150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 021a000c3201000018010001 Test: Challenge with an extra KDF appended aka_prime_handler - RX 021b000c320e000016010000 Test: EAP-Failure Connect STA wlan0 to AP aka_prime_handler - RX 025d00150136353535343434333333323232313131 Test: Challenge with multiple KDF proposals aka_prime_handler - RX 025e000c3201000018010001 Test: Challenge with a modified KDF aka_prime_handler - RX 025f000c320e000016010000 Test: EAP-Failure PASS eap_proto_aka_prime 7.508453 2026-05-08 01:29:41.901807 passed all 1 test case(s) 2026-05-08 01:29:41 ./run-tests.py eap_proto_md5_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_md5_server 1/1 Test: EAP-MD5 protocol testing for the server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_md5_server 1.679304 2026-05-08 01:29:43.883888 passed all 1 test case(s) 2026-05-08 01:29:43 ./run-tests.py eap_tls_session_resumption_expiration DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_tls_session_resumption_expiration 1/1 Test: EAP-TLS session resumption Starting AP wlan3 Connect STA wlan0 to AP PASS eap_tls_session_resumption_expiration 2.616564 2026-05-08 01:29:46.809855 passed all 1 test case(s) 2026-05-08 01:29:46 ./run-tests.py eht_mld_control_socket_connectivity DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_mld_control_socket_connectivity 1/1 Test: AP MLD control socket connectivity Adding link on: ifname=wlan7 Adding link on: ifname=wlan7 LINK 0 STATUS: state=ENABLED phy=phy7 freq=2412 num_sta_non_erp=0 num_sta_no_short_slot_time=0 num_sta_no_short_preamble=0 olbc=0 num_sta_ht_no_gf=0 num_sta_no_ht=0 num_sta_ht_20_mhz=0 num_sta_ht40_intolerant=0 olbc_ht=0 ht_op_mode=0x0 hw_mode=g cac_time_seconds=0 cac_time_left_seconds=N/A channel=1 edmg_enable=0 edmg_channel=0 secondary_channel=0 ieee80211n=1 ieee80211ac=0 ieee80211ax=1 ieee80211be=1 beacon_int=100 dtim_period=2 eht_oper_chwidth=0 eht_oper_centr_freq_seg0_idx=0 num_links=2 link_id=0 link_addr=02:00:00:13:76:38 partner_link[1]=02:00:00:e0:70:80 ap_mld_type=STR he_oper_chwidth=0 he_oper_centr_freq_seg0_idx=0 he_oper_centr_freq_seg1_idx=0 ht_caps_info=000c ht_mcs_bitmask=ffff0000000000000000 supported_rates=02 04 0b 16 0c 12 18 24 30 48 60 6c max_txpower=20 bss[0]=wlan7 bssid[0]=02:00:00:13:76:38 ssid[0]=mld_ap num_sta[0]=0 mld_addr[0]=02:00:00:00:07:00 mld_id[0]=0 mld_link_id[0]=0 LINK 1 STATUS: state=ENABLED phy=phy7 freq=2417 num_sta_non_erp=0 num_sta_no_short_slot_time=0 num_sta_no_short_preamble=0 olbc=0 num_sta_ht_no_gf=0 num_sta_no_ht=0 num_sta_ht_20_mhz=0 num_sta_ht40_intolerant=0 olbc_ht=0 ht_op_mode=0x0 hw_mode=g cac_time_seconds=0 cac_time_left_seconds=N/A channel=2 edmg_enable=0 edmg_channel=0 secondary_channel=0 ieee80211n=1 ieee80211ac=0 ieee80211ax=1 ieee80211be=1 beacon_int=100 dtim_period=2 eht_oper_chwidth=0 eht_oper_centr_freq_seg0_idx=0 num_links=2 link_id=1 link_addr=02:00:00:e0:70:80 partner_link[0]=02:00:00:13:76:38 ap_mld_type=STR he_oper_chwidth=0 he_oper_centr_freq_seg0_idx=0 he_oper_centr_freq_seg1_idx=0 ht_caps_info=000c ht_mcs_bitmask=ffff0000000000000000 supported_rates=02 04 0b 16 0c 12 18 24 30 48 60 6c max_txpower=20 bss[0]=wlan7 bssid[0]=02:00:00:e0:70:80 ssid[0]=mld_ap num_sta[0]=0 mld_addr[0]=02:00:00:00:07:00 mld_id[0]=0 mld_link_id[0]=1 PASS eht_mld_control_socket_connectivity 1.723305 2026-05-08 01:29:48.838570 passed all 1 test case(s) 2026-05-08 01:29:48 ./run-tests.py eht_sae_mlo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_sae_mlo 1/1 Test: EHT+MLO AP with SAE Starting AP wlan3 Connect STA wlan0 to AP PASS eht_sae_mlo 1.541184 2026-05-08 01:29:50.688370 passed all 1 test case(s) 2026-05-08 01:29:50 ./run-tests.py eppke_akm_suite_and_rsnxe_feature_flags DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eppke_akm_suite_and_rsnxe_feature_flags 1/1 Test: AP EPPKE AKM Advertisement with SAE base AKM and EPPKE related feature flags Starting AP wlan3 Starting AP wlan3 PASS eppke_akm_suite_and_rsnxe_feature_flags 5.015832 2026-05-08 01:29:55.996884 passed all 1 test case(s) 2026-05-08 01:29:56 ./run-tests.py eppke_authentication_pmkid_in_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eppke_authentication_pmkid_in_assoc 1/1 Test: EPPKE authentication (PMKID in Association Request after EPPKE) Starting AP wlan3 Connect STA wlan0 to AP PASS eppke_authentication_pmkid_in_assoc 1.035208 2026-05-08 01:29:57.330605 passed all 1 test case(s) 2026-05-08 01:29:57 ./run-tests.py erp_radius_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START erp_radius_ext 1/1 Test: ERP enabled on a separate RADIUS server and peer Starting AP wlan3 Connect STA wlan0 to AP PASS erp_radius_ext 2.05104 2026-05-08 01:29:59.676305 passed all 1 test case(s) 2026-05-08 01:29:59 ./run-tests.py fils_sk_auth_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_auth_mismatch 1/1 Test: FILS SK authentication type mismatch (PFS not supported) Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS fils_sk_auth_mismatch 1.447987 2026-05-08 01:30:01.416273 passed all 1 test case(s) 2026-05-08 01:30:01 ./run-tests.py fils_sk_erp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp 1/1 Test: FILS SK using ERP Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS fils_sk_erp 1.414602 2026-05-08 01:30:03.126197 passed all 1 test case(s) 2026-05-08 01:30:03 ./run-tests.py fils_sk_multiple_realms DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_multiple_realms 1/1 Test: FILS SK and multiple realms Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS fils_sk_multiple_realms 1.874633 2026-05-08 01:30:05.293520 passed all 1 test case(s) 2026-05-08 01:30:05 ./run-tests.py fst_ap_ack_response_with_session_not_established_init_side DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_session_not_established_init_side 1/1 Test: FST AP ack response with session not established init side Starting AP wlan3 (old add_ap argument type) Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 633, in main t(dev, apdev, params) ~^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1350, in test_fst_ap_ack_response_with_session_not_established_init_side fst_bad_transfer(apdev, test_params, ~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^ bad_scenario_ack_resp_session_not_established_init_side, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ True) ^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 647, in fst_bad_transfer ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() ~~~~~~~~~^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_ap_ack_response_with_session_not_established_init_side 5.306729 2026-05-08 01:30:10.897450 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_ap_ack_response_with_session_not_established_init_side 2026-05-08 01:30:10 ./run-tests.py fst_ap_config_group_len DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_group_len 1/1 Test: FST AP configuration Group max length kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_group_len 1.088225 2026-05-08 01:30:12.290341 passed all 1 test case(s) 2026-05-08 01:30:12 ./run-tests.py fst_ap_config_pri_nan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_pri_nan 1/1 Test: FST AP configuration Priority not a number kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_pri_nan 1.088781 2026-05-08 01:30:13.680800 passed all 1 test case(s) 2026-05-08 01:30:13 ./run-tests.py ft_psk_key_lifetime_in_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ft_psk_key_lifetime_in_memory 1/1 Test: WPA2-PSK-FT and key lifetime in memory Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Reading process memory (pid=6074) [heap] 0x564b0cdf2000-0x564b0ce27000 is at 12288-229376 [stack] 0x7ffc255fb000-0x7ffc2561d000 is at 843776-983040 Total process memory read: 983040 bytes Checking keys in memory while associated Skip test case: PMK not found while associated SKIP ft_psk_key_lifetime_in_memory 2.646126 2026-05-08 01:30:16.620894 passed all 0 test case(s) skipped 1 test case(s) 2026-05-08 01:30:16 ./run-tests.py grpform3_c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform3_c 1/1 Test: P2P group formation using PIN and re-init GO Negotiation (group iface) Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed PASS grpform3_c 12.940293 2026-05-08 01:30:29.860083 passed all 1 test case(s) 2026-05-08 01:30:29 ./run-tests.py grpform_no_5ghz_add_cli2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_no_5ghz_add_cli2 1/1 Test: P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (reverse) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_no_5ghz_add_cli2 3.135734 2026-05-08 01:30:33.302001 passed all 1 test case(s) 2026-05-08 01:30:33 ./run-tests.py grpform_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_reject 1/1 Test: User rejecting group formation attempt by a P2P peer wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS grpform_reject 0.471777 2026-05-08 01:30:34.073046 passed all 1 test case(s) 2026-05-08 01:30:34 ./run-tests.py hapd_ctrl_mib DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_mib 1/1 Test: hostapd and MIB ctrl_iface command with open network Starting AP wlan3 Connect STA wlan0 to AP PASS hapd_ctrl_mib 0.997019 2026-05-08 01:30:35.373834 passed all 1 test case(s) 2026-05-08 01:30:35 ./run-tests.py hapd_dup_network_global_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_dup_network_global_wpa2 1/1 Test: hostapd and DUP_NETWORK command (WPA2) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS hapd_dup_network_global_wpa2 1.653722 2026-05-08 01:30:37.321991 passed all 1 test case(s) 2026-05-08 01:30:37 ./run-tests.py he_6ghz_acs_80mhz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_6ghz_acs_80mhz 1/1 Test: HE with ACS on 6 GHz using an 80 MHz channel Starting AP wlan3 Country code at the end: 00 Exception during test execution: ACS start timed out Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main t(dev, apdev) ~^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1347, in test_he_6ghz_acs_80mhz he_6ghz_acs(dev, apdev, 133, 80) ~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1305, in he_6ghz_acs wait_acs(hapd) ~~~~~~~~^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_acs.py", line 52, in wait_acs raise Exception("ACS start timed out") Exception: ACS start timed out FAIL he_6ghz_acs_80mhz 6.39876 2026-05-08 01:30:44.025731 passed 0 test case(s) skipped 0 test case(s) failed tests: he_6ghz_acs_80mhz 2026-05-08 01:30:44 ./run-tests.py he_ap_mbssid_single_ssid_tm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_ap_mbssid_single_ssid_tm 1/1 Test: HE AP MBSSID with mixed security and single SSID and transition mode Starting AP wlan3 Starting APs for wlan3 Connect STA wlan0 to AP PASS he_ap_mbssid_single_ssid_tm 7.248933 2026-05-08 01:30:51.575067 passed all 1 test case(s) 2026-05-08 01:30:51 ./run-tests.py he_use_sta_nsts DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_use_sta_nsts 1/1 Test: HE with 80 MHz channel width and use_sta_nsts=1 Starting AP wlan3 Country code at the end: 00 Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main t(dev, apdev) ~^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 1021, in test_he_use_sta_nsts hapd = hostapd.add_ap(apdev[0], params) File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL he_use_sta_nsts 6.338027 2026-05-08 01:30:58.211201 passed 0 test case(s) skipped 0 test case(s) failed tests: he_use_sta_nsts 2026-05-08 01:30:58 ./run-tests.py ibss_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wep 1/1 Test: IBSS with WEP wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_wep 10.704202 2026-05-08 01:31:09.221866 passed all 1 test case(s) 2026-05-08 01:31:09 ./run-tests.py ieee8021x_auth_connect_disconnect_reconnect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_auth_connect_disconnect_reconnect 1/1 Test: IEEE 802.1X Authentication frames: non-MLO connect/disconnect/reconnect Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_auth_connect_disconnect_reconnect 1.844997 2026-05-08 01:31:11.365203 passed all 1 test case(s) 2026-05-08 01:31:11 ./run-tests.py ieee8021x_auth_mlo_three_links DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_auth_mlo_three_links 1/1 Test: IEEE 802.1X Authentication frames: MLO three-link EAP-TLS Adding link on: ifname=wlan7 Adding link on: ifname=wlan7 Adding link on: ifname=wlan7 Connect STA wlan8 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy9', 'freq': '2412', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'hw_mode': 'g', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '1', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '1', 'ieee80211be': '1', 'beacon_int': '100', 'dtim_period': '2', 'eht_oper_chwidth': '0', 'eht_oper_centr_freq_seg0_idx': '0', 'num_links': '3', 'link_id': '0', 'link_addr': '02:00:00:73:d8:60', 'partner_link[1]': '02:00:00:2a:1a:8a', 'partner_link[2]': '02:00:00:2f:33:f0', 'ap_mld_type': 'STR', 'he_oper_chwidth': '0', 'he_oper_centr_freq_seg0_idx': '0', 'he_oper_centr_freq_seg1_idx': '0', 'ht_caps_info': '000c', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan7', 'bssid[0]': '02:00:00:73:d8:60', 'ssid[0]': 'test-ieee8021x-auth-mlo-3l', 'num_sta[0]': '1', 'mld_addr[0]': '02:00:00:00:09:00', 'mld_id[0]': '0', 'mld_link_id[0]': '0'} hostapd STA: {'addr': '02:00:00:00:0a:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][MFP][HT][HE][EHT]', 'aid': '1', 'capability': '0x430', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'auth_alg': '8', 'dot11RSNAStatsSTAAddress': '02:00:00:00:0a:00', 'dot11RSNAStatsVersion': '1', 'dot11RSNAStatsSelectedPairwiseCipher': '00-0f-ac-4', 'dot11RSNAStatsTKIPLocalMICFailures': '0', 'dot11RSNAStatsTKIPRemoteMICFailures': '0', 'wpa': '2', 'AKMSuiteSelector': '00-0f-ac-5', 'hostapdWPAPTKState': '11', 'hostapdWPAPTKGroupState': '0', 'hostapdMFPR': '1', 'rx_packets': '23', 'tx_packets': '9', 'rx_bytes': '4182', 'tx_bytes': '3890', 'inactive_msec': '1712', 'signal': '-50', 'rx_rate_info': '10', 'tx_rate_info': '0', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '4', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f8081008280', 'he_capab': '0178c81a400002bfce0000000000000000fafffaff', 'eht_capab': '07007c0000feffff0f01008888880000', 'ht_caps_info': '0x107e', 'ext_capab': '04004a02014000400001', 'peer_addr[0]': 'c6:d9:be:62:09:d1', 'peer_addr[1]': '7e:c2:94:97:de:f1', 'peer_addr[2]': '7e:a2:12:21:87:f7', 'max_simul_links': '0'} valid_links=0x7 active_links=0x7 PASS ieee8021x_auth_mlo_three_links 7.034365 2026-05-08 01:31:18.696021 passed all 1 test case(s) 2026-05-08 01:31:18 ./run-tests.py macsec_psk_fail_cp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_fail_cp 1/1 Test: MACsec PSK local failures in CP state machine veth0 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=66:47:98:22:61:77 PAE KaY status=Active Authenticated=No Secured=Yes Failed=No Actor Priority=255 Key Server Priority=255 Is Key Server=No Number of Keys Distributed=1 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=66:47:98:22:61:77@1 key_server_sci=66:47:98:22:61:77@1 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=2739cd4d3dfa85d1fd19543e mn=2 active=Yes participant=No retain=No live_peers=1 potential_peers=0 is_key_server=Yes is_elected=Yes uuid=a547d1b3-cf18-5596-8566-562eb941f482 veth1 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=8e:8a:d8:73:31:46 PAE KaY status=Active Authenticated=No Secured=Yes Failed=No Actor Priority=255 Key Server Priority=255 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=1 MKA Hello Time=2000 actor_sci=8e:8a:d8:73:31:46@1 key_server_sci=66:47:98:22:61:77@1 participant_idx=0 ckn=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f mi=5d1d5941d15e0c6371907267 mn=3 active=Yes participant=No retain=No live_peers=1 potential_peers=0 is_key_server=No is_elected=Yes uuid=a547d1b3-cf18-5596-8566-562eb941f482 Expected key server: veth0 PASS macsec_psk_fail_cp 3.176714 2026-05-08 01:31:22.184733 passed all 1 test case(s) 2026-05-08 01:31:22 ./run-tests.py mesh_secure_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp 1/1 Test: Secure mesh with CCMP PASS mesh_secure_ccmp 1.677947 2026-05-08 01:31:24.171783 passed all 1 test case(s) 2026-05-08 01:31:24 ./run-tests.py multi_ap_backhaul_roam_with_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_backhaul_roam_with_bridge 1/1 Test: Multi-AP backhaul BSS reassociation to another BSS with bridge Starting AP wlan3 Connect STA wlan5 to AP Starting AP wlan4 PASS multi_ap_backhaul_roam_with_bridge 2.760183 2026-05-08 01:31:27.240609 passed all 1 test case(s) 2026-05-08 01:31:27 ./run-tests.py nan_sync_multi_services_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nan_sync_multi_services_4 1/1 Test: NAN synchronized service discovery with multiple services: passive subscribe (subset) NAN capabilities: USD NAN NAN device starting on nan0 Setting master_pref to 10 on nan0 Setting dual_band to 0 on nan0 NAN device started on nan0 NAN capabilities: USD NAN NAN device starting on nan1 Setting master_pref to 10 on nan1 Setting dual_band to 0 on nan1 NAN device started on nan1 NAN device stopping on nan1 NAN device stopped on nan1 NAN device stopping on nan0 NAN device stopped on nan0 Exception during test execution: Not all services where discovered Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 633, in main t(dev, apdev, params) ~^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 809, in test_nan_sync_multi_services_4 _nan_sync_multi_services(test_params) ~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 742, in _nan_sync_multi_services raise Exception("Not all services where discovered") Exception: Not all services where discovered FAIL nan_sync_multi_services_4 21.173483 2026-05-08 01:31:48.727316 passed 0 test case(s) skipped 0 test case(s) failed tests: nan_sync_multi_services_4 2026-05-08 01:31:48 ./run-tests.py nan_sync_publisher_match_filter_6 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nan_sync_publisher_match_filter_6 1/1 Test: NAN synchronized active subscribe and solicited publish with match filter NAN capabilities: USD NAN NAN device starting on nan0 Setting master_pref to 10 on nan0 Setting dual_band to 0 on nan0 NAN device started on nan0 NAN capabilities: USD NAN NAN device starting on nan1 Setting master_pref to 10 on nan1 Setting dual_band to 0 on nan1 NAN device started on nan1 Cancelling publish with ID 1 on nan0 Cancelling subscribe with ID 1 on nan1 NAN device stopping on nan1 NAN device stopped on nan1 NAN device stopping on nan0 NAN device stopped on nan0 Exception during test execution: NAN-DISCOVERY-RESULT event not seen Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 633, in main t(dev, apdev, params) ~^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 380, in test_nan_sync_publisher_match_filter_6 _nan_sync_publisher_match_filter(pub_rx_filter="0000000000", ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^ sub_tx_filter="01010102010301040105") ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 346, in _nan_sync_publisher_match_filter raise Exception("NAN-DISCOVERY-RESULT event not seen") Exception: NAN-DISCOVERY-RESULT event not seen FAIL nan_sync_publisher_match_filter_6 3.104205 2026-05-08 01:31:52.133330 passed 0 test case(s) skipped 0 test case(s) failed tests: nan_sync_publisher_match_filter_6 2026-05-08 01:31:52 ./run-tests.py nan_sync_srf_mac_addr_8 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nan_sync_srf_mac_addr_8 1/1 Test: NAN synchronized active subscribe and solicited publish with MAC address in SRF NAN capabilities: USD NAN NAN device starting on nan0 Setting master_pref to 10 on nan0 Setting dual_band to 0 on nan0 NAN device started on nan0 NAN capabilities: USD NAN NAN device starting on nan1 Setting master_pref to 10 on nan1 Setting dual_band to 0 on nan1 NAN device started on nan1 Cancelling publish with ID 1 on nan0 Cancelling subscribe with ID 1 on nan1 NAN device stopping on nan1 NAN device stopped on nan1 NAN device stopping on nan0 NAN device stopped on nan0 Exception during test execution: NAN-DISCOVERY-RESULT event not seen Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 633, in main t(dev, apdev, params) ~^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 665, in test_nan_sync_srf_mac_addr_8 _nan_sync_srf(wpas2, pub, srf_include=0, srf_mac_list=srf) ~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_nan.py", line 560, in _nan_sync_srf raise Exception("NAN-DISCOVERY-RESULT event not seen") Exception: NAN-DISCOVERY-RESULT event not seen FAIL nan_sync_srf_mac_addr_8 3.097871 2026-05-08 01:31:55.539483 passed 0 test case(s) skipped 0 test case(s) failed tests: nan_sync_srf_mac_addr_8 2026-05-08 01:31:55 ./run-tests.py nan_sync_subscriber_match_filter_16 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nan_sync_subscriber_match_filter_16 1/1 Test: NAN synchronized passive subscribe and unsolicited publish with match filter NAN capabilities: USD NAN NAN device starting on nan0 Setting master_pref to 10 on nan0 Setting dual_band to 0 on nan0 NAN device started on nan0 NAN capabilities: USD NAN NAN device starting on nan1 Setting master_pref to 10 on nan1 Setting dual_band to 0 on nan1 NAN device started on nan1 Cancelling publish with ID 1 on nan0 Cancelling subscribe with ID 1 on nan1 NAN device stopping on nan1 NAN device stopped on nan1 NAN device stopping on nan0 NAN device stopped on nan0 PASS nan_sync_subscriber_match_filter_16 3.140243 2026-05-08 01:31:58.985914 passed all 1 test case(s) 2026-05-08 01:31:59 ./run-tests.py nan_usd_publish DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nan_usd_publish 1/1 Test: NAN USD Publish Maximum services: 20 PASS nan_usd_publish 0.125749 2026-05-08 01:31:59.425053 passed all 1 test case(s) 2026-05-08 01:31:59 ./run-tests.py nfc_p2p_ip_addr_assignment2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_ip_addr_assignment2 1/1 Test: NFC connection handover and IP address assignment for two clients Perform NFC connection handover Group formed Client 1 IP address: 192.168.42.100 Connect a P2P client wlan2: Trying to discover peer 02:00:00:00:01:00 Client connected Client 2 IP address: 192.168.42.101 PASS nfc_p2p_ip_addr_assignment2 13.416028 2026-05-08 01:32:13.148184 passed all 1 test case(s) 2026-05-08 01:32:13 ./run-tests.py nfc_wps_handover_pk_hash_mismatch_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_pk_hash_mismatch_ap 1/1 Test: WPS NFC connection handover with invalid pkhash from AP (negative) Starting AP wlan3 NFC connection handover wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth PASS nfc_wps_handover_pk_hash_mismatch_ap 1.173259 2026-05-08 01:32:14.632245 passed all 1 test case(s) 2026-05-08 01:32:14 ./run-tests.py olbc_table_limit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START olbc_table_limit 1/1 Test: OLBC AP table size limit Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Starting AP wlan4 PASS olbc_table_limit 3.298146 2026-05-08 01:32:18.245520 passed all 1 test case(s) 2026-05-08 01:32:18 ./run-tests.py owe_double_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_double_assoc 1/1 Test: Opportunistic Wireless Encryption - duplicated association attempt Starting AP wlan3 Connect STA wlan0 to AP PASS owe_double_assoc 1.108066 2026-05-08 01:32:19.651321 passed all 1 test case(s) 2026-05-08 01:32:19 ./run-tests.py p2p_device_persistent_group2_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_persistent_group2_no_group_iface 1/1 Test: P2P persistent group formation and re-invocation (reverse) with cfg80211 P2P Device (no separate group interface) Form a persistent group Start GO negotiation wlan7 -> wlan0 wlan0: Trying to discover peer 42:00:00:00:13:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan0: Trying to discover peer 42:00:00:00:13:00 Terminate persistent group Re-invoke persistent group from GO wlan7: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group PASS p2p_device_persistent_group2_no_group_iface 7.325253 2026-05-08 01:32:27.272651 passed all 1 test case(s) 2026-05-08 01:32:27 ./run-tests.py p2p_service_discovery_peer_not_listening DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_peer_not_listening 1/1 Test: P2P service discovery and peer not listening PASS p2p_service_discovery_peer_not_listening 4.12095 2026-05-08 01:32:31.687401 passed all 1 test case(s) 2026-05-08 01:32:31 ./run-tests.py p2ps_exact_search DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_exact_search 1/1 Test: P2PS exact service request PASS p2ps_exact_search 0.381856 2026-05-08 01:32:32.370118 passed all 1 test case(s) 2026-05-08 01:32:32 ./run-tests.py radius_macacl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_macacl 1/1 Test: RADIUS MAC ACL Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan2 to AP Connect STA wlan2 to AP PASS radius_macacl 1.789749 2026-05-08 01:32:34.470210 passed all 1 test case(s) 2026-05-08 01:32:34 ./run-tests.py radius_macacl_unreachable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_macacl_unreachable 1/1 Test: RADIUS MAC ACL and server unreachable Starting AP wlan3 Connect STA wlan0 to AP Fix authentication server port PASS radius_macacl_unreachable 9.487129 2026-05-08 01:32:44.255332 passed all 1 test case(s) 2026-05-08 01:32:44 ./run-tests.py radius_mppe_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_mppe_failure 1/1 Test: RADIUS failure when adding MPPE keys Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS radius_mppe_failure 1.526958 2026-05-08 01:32:46.078272 passed all 1 test case(s) 2026-05-08 01:32:46 ./run-tests.py rrm_beacon_req_ap_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_ap_errors 1/1 Test: Beacon request - AP error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP wlan0: Ignore unexpected status-driver line: ignore_next_local_deauth wlan0: Waiting for scan operation to complete before continuing Run FLUSH again since scan was in progress PASS rrm_beacon_req_ap_errors 2.596151 2026-05-08 01:32:48.968154 passed all 1 test case(s) 2026-05-08 01:32:49 ./run-tests.py rsn_preauth_local_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_preauth_local_errors 1/1 Test: RSN pre-authentication and local errors on AP Starting AP wlan3 PASS rsn_preauth_local_errors 2.065424 2026-05-08 01:32:51.325231 passed all 1 test case(s) 2026-05-08 01:32:51 ./run-tests.py sae_password_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_ffc 1/1 Test: SAE with number of different passwords (FFC) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_ffc 4.842009 2026-05-08 01:32:56.463450 passed all 1 test case(s) 2026-05-08 01:32:56 ./run-tests.py sae_pk_sec_5 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_sec_5 1/1 Test: SAE-PK with Sec 5 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_sec_5 1.394883 2026-05-08 01:32:58.161626 passed all 1 test case(s) 2026-05-08 01:32:58 ./run-tests.py sae_pwe_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_failure 1/1 Test: SAE and pwe failure Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_failure 3.578184 2026-05-08 01:33:02.044190 passed all 1 test case(s) 2026-05-08 01:33:02 ./run-tests.py sae_wpa3_roam DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_wpa3_roam 1/1 Test: SAE and WPA3-Personal transition mode roaming Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS sae_wpa3_roam 4.32429 2026-05-08 01:33:06.664758 passed all 1 test case(s) 2026-05-08 01:33:06 ./run-tests.py sigma_dut_ap_suite_b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_suite_b 1/1 Test: sigma_dut controlled AP Suite B Starting AP wlan4 Skip test case: sigma_dut not available SKIP sigma_dut_ap_suite_b 0.587491 2026-05-08 01:33:07.549284 passed all 0 test case(s) skipped 1 test case(s) 2026-05-08 01:33:07 ./run-tests.py sigma_dut_ap_transition_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_transition_disable 1/1 Test: sigma_dut controlled AP and transition disabled indication Skip test case: sigma_dut not available SKIP sigma_dut_ap_transition_disable 0.14467 2026-05-08 01:33:08.005929 passed all 0 test case(s) skipped 1 test case(s) 2026-05-08 01:33:08 ./run-tests.py sigma_dut_dpp_pkex_responder_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_pkex_responder_proto 1/1 Test: sigma_dut controlled STA as DPP PKEX responder and error case Skip test case: sigma_dut not available SKIP sigma_dut_dpp_pkex_responder_proto 0.066482 2026-05-08 01:33:08.381097 passed all 0 test case(s) skipped 1 test case(s) 2026-05-08 01:33:08 ./run-tests.py sigma_dut_dpp_proto_peer_disc_req3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_proto_peer_disc_req3 1/1 Test: sigma_dut DPP protocol testing - Peer Discovery Request (e) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_proto_peer_disc_req3 0.070323 2026-05-08 01:33:08.761673 passed all 0 test case(s) skipped 1 test case(s) 2026-05-08 01:33:08 ./run-tests.py suite_b_192_rsa_dhe_radius_rsa2048_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_dhe_radius_rsa2048_client 1/1 Test: Suite B 192-bit level and RSA (DHE) and RSA2048 client Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_dhe_radius_rsa2048_client 1.962229 2026-05-08 01:33:11.024974 passed all 1 test case(s) 2026-05-08 01:33:11 ./run-tests.py suite_b_192_rsa_ecdhe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_ecdhe 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and RSA (ECDHE) Starting AP wlan3 Connect STA wlan0 to AP TLS version: TLSv1.2 PASS suite_b_192_rsa_ecdhe 1.771073 2026-05-08 01:33:13.096549 passed all 1 test case(s) 2026-05-08 01:33:13 ./run-tests.py wext_scan_hidden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_scan_hidden 1/1 Test: WEXT with hidden SSID Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS wext_scan_hidden 20.41178 2026-05-08 01:33:33.811357 passed all 1 test case(s) 2026-05-08 01:33:33 ./run-tests.py wnm_action_proto_no_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_action_proto_no_pmf 1/1 Test: WNM Action protocol testing (PMF disabled) Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_action_proto_no_pmf 1.111117 2026-05-08 01:33:35.224103 passed all 1 test case(s) 2026-05-08 01:33:35 ./run-tests.py wnm_bss_tm_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_reject 1/1 Test: WNM BSS Transition Management request getting rejected Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_reject 7.53028 2026-05-08 01:33:43.049281 passed all 1 test case(s) 2026-05-08 01:33:43 ./run-tests.py wnm_bss_tm_steering_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_steering_timeout 1/1 Test: WNM BSS Transition Management and steering timeout Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS wnm_bss_tm_steering_timeout 4.14312 2026-05-08 01:33:47.483319 passed all 1 test case(s) 2026-05-08 01:33:47 ./run-tests.py wnm_sleep_mode_ap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_sleep_mode_ap_oom 1/1 Test: WNM Sleep Mode - AP side OOM Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_sleep_mode_ap_oom 0.962956 2026-05-08 01:33:48.751875 passed all 1 test case(s) 2026-05-08 01:33:48 ./run-tests.py wpa2_ocv_ap_override_eapol_m3_post_enable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_m3_post_enable 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key msg 3/4 (post enable) Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_m3_post_enable 4.094461 2026-05-08 01:33:53.148793 passed all 1 test case(s) 2026-05-08 01:33:53 ./run-tests.py wpa2_ocv_ap_vht160_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_vht160_mismatch 1/1 Test: OCV AP mismatch (VHT160) Starting AP wlan3 Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 635, in main t(dev, apdev) ~^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 508, in test_wpa2_ocv_ap_vht160_mismatch run_wpa2_ocv_ap_vht160_mismatch(dev, apdev) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 527, in run_wpa2_ocv_ap_vht160_mismatch conn = APConnection(apdev[0], dev[0], params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ocv.py", line 378, in __init__ self.hapd = hostapd.add_ap(apdev, params) ~~~~~~~~~~~~~~^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL wpa2_ocv_ap_vht160_mismatch 6.683707 2026-05-08 01:34:00.135257 passed 0 test case(s) skipped 0 test case(s) failed tests: wpa2_ocv_ap_vht160_mismatch 2026-05-08 01:34:00 ./run-tests.py wpas_ap_sae_pwe_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_sae_pwe_1 1/1 Test: wpa_supplicant AP mode - SAE using sae_password and sae_pwe=1 Connect STA wlan1 to AP PASS wpas_ap_sae_pwe_1 1.128162 2026-05-08 01:34:01.566002 passed all 1 test case(s) 2026-05-08 01:34:01 ./run-tests.py wpas_config_file_set_global DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_config_file_set_global 1/1 Test: wpa_supplicant config file parsing/writing with arbitrary global values Configuration file contents: ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=adm update_config=1 dik_cipher=0 dik=6B75BF4B662154D4CB6C11F30E818E44 PASS wpas_config_file_set_global 0.479506 2026-05-08 01:34:02.347972 passed all 1 test case(s) 2026-05-08 01:34:02 ./run-tests.py wpas_ctrl_get DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_get 1/1 Test: wpa_supplicant ctrl_iface get PASS wpas_ctrl_get 0.069376 2026-05-08 01:34:02.713748 passed all 1 test case(s) 2026-05-08 01:34:02 ./run-tests.py wpas_ctrl_set_uapsd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_uapsd 1/1 Test: wpa_supplicant ctrl_iface SET uapsd PASS wpas_ctrl_set_uapsd 0.070559 2026-05-08 01:34:03.085606 passed all 1 test case(s) 2026-05-08 01:34:03 ./run-tests.py wpas_mesh_secure_sae_group_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_secure_sae_group_mismatch 1/1 Test: wpa_supplicant secure MESH and SAE group mismatch PASS wpas_mesh_secure_sae_group_mismatch 2.953885 2026-05-08 01:34:06.343249 passed all 1 test case(s) 2026-05-08 01:34:06 ./stop.sh