2020-05-13 02:38:00 export USER=root 2020-05-13 02:38:00 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2020-05-13 02:41:05 ./start.sh 2020-05-13 02:41:06 ./run-tests.py he80b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80b 1/1 Test: HE with 80 MHz channel width (HT40- channel 40) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80b 1.729154 2020-05-13 02:41:10.896152 passed all 1 test case(s) 2020-05-13 02:41:10 ./run-tests.py he80c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80c 1/1 Test: HE with 80 MHz channel width (HT40+ channel 44) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80c 1.480152 2020-05-13 02:41:12.920119 passed all 1 test case(s) 2020-05-13 02:41:12 ./run-tests.py he80d DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80d 1/1 Test: HE with 80 MHz channel width (HT40- channel 48) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80d 1.432905 2020-05-13 02:41:14.863433 passed all 1 test case(s) 2020-05-13 02:41:14 ./run-tests.py he80plus80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80plus80 1/1 Test: HE with 80+80 MHz channel width Starting AP wlan3 Starting AP wlan4 Connect STA wlan1 to AP PASS he80plus80 1.491218 2020-05-13 02:41:16.817077 passed all 1 test case(s) 2020-05-13 02:41:16 ./run-tests.py he80plus80_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80plus80_invalid 1/1 Test: HE with invalid 80+80 MHz channel Starting AP wlan3 Country code at the end: 00 PASS he80plus80_invalid 1.277736 2020-05-13 02:41:18.601714 passed all 1 test case(s) 2020-05-13 02:41:18 ./run-tests.py he_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_20 1/1 Test: HE and 20 MHz channel Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he_20 0.885677 2020-05-13 02:41:19.947331 passed all 1 test case(s) 2020-05-13 02:41:20 ./run-tests.py he_40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_40 1/1 Test: HE and 40 MHz channel Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he_40 1.164265 2020-05-13 02:41:21.569776 passed all 1 test case(s) 2020-05-13 02:41:21 ./run-tests.py he_40_fallback_to_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_40_fallback_to_20 1/1 Test: HE and 40 MHz channel configuration falling back to 20 MHz Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he_40_fallback_to_20 1.14734 2020-05-13 02:41:23.295688 passed all 1 test case(s) 2020-05-13 02:41:23 ./run-tests.py he_on_24ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_on_24ghz 1/1 Test: Subset of HE features on 2.4 GHz Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS he_on_24ghz 0.990987 2020-05-13 02:41:24.725123 passed all 1 test case(s) 2020-05-13 02:41:24 ./run-tests.py he_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_open 1/1 Test: HE AP with open mode configuration Starting AP wlan3 Connect STA wlan0 to AP PASS he_open 0.487618 2020-05-13 02:41:25.648684 passed all 1 test case(s) 2020-05-13 02:41:25 ./run-tests.py he_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_params 1/1 Test: HE AP parameters Starting AP wlan3 Connect STA wlan0 to AP PASS he_params 0.455291 2020-05-13 02:41:26.503187 passed all 1 test case(s) 2020-05-13 02:41:26 ./run-tests.py he_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_tkip 1/1 Test: HE and TKIP Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'he_oper_centr_freq_seg1_idx': '0', 'olbc': '0', 'freq': '5180', 'edmg_enable': '0', 'beacon_int': '100', 'state': 'ENABLED', 'phy': 'phy3', 'num_sta_no_ht': '1', 'olbc_ht': '0', 'he_oper_chwidth': '1', 'channel': '36', 'ieee80211n': '0', 'ieee80211ac': '0', 'ht_op_mode': '0x13', 'num_sta_ht_20_mhz': '0', 'secondary_channel': '0', 'max_txpower': '23', 'he_oper_centr_freq_seg0_idx': '42', 'cac_time_left_seconds': 'N/A', 'num_sta_no_short_slot_time': '1', 'bssid[0]': '02:00:00:00:03:00', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'ssid[0]': 'he', 'cac_time_seconds': '0', 'dtim_period': '2', 'num_sta_ht_no_gf': '0', 'num_sta_ht40_intolerant': '0', 'bss[0]': 'wlan3', 'num_sta[0]': '1', 'num_sta_no_short_preamble': '1', 'edmg_channel': '0', 'num_sta_non_erp': '0', 'ieee80211ax': '1'} Country code at the end: 00 PASS he_tkip 1.312455 2020-05-13 02:41:28.299971 passed all 1 test case(s) 2020-05-13 02:41:28 ./run-tests.py he_use_sta_nsts DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_use_sta_nsts 1/1 Test: HE with 80 MHz channel width and use_sta_nsts=1 Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he_use_sta_nsts 1.275365 2020-05-13 02:41:30.054704 passed all 1 test case(s) 2020-05-13 02:41:30 ./run-tests.py he_wifi_generation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_wifi_generation 1/1 Test: HE and wifi_generation Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 Unexpected wifi_generation value: 5 Traceback (most recent call last): File "./run-tests.py", line 521, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_he.py", line 186, in test_he_wifi_generation raise Exception("Unexpected wifi_generation value: " + status['wifi_generation']) Exception: Unexpected wifi_generation value: 5 FAIL he_wifi_generation 1.218073 2020-05-13 02:41:31.699448 passed 0 test case(s) skipped 0 test case(s) failed tests: he_wifi_generation 2020-05-13 02:41:31 ./run-tests.py hostapd_oom_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_open 1/1 Test: hostapd failing to setup open mode due to OOM Starting AP wlan3 Starting AP wlan4 Iteration 1 - ATTACH failed Starting AP wlan4 Iteration 2 - ATTACH failed Starting AP wlan4 Iteration 3 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 4 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 5 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 6 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 7 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 8 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 9 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 10 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 11 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 12 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 13 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 14 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 15 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 16 - ATTACH failed Starting AP wlan4 Iteration 17 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 18 - Could not ping hostapd Starting AP wlan4 Iteration 19 - ATTACH failed Starting AP wlan4 Iteration 20 - ATTACH failed Starting AP wlan4 Iteration 21 - Could not ping hostapd Starting AP wlan4 Iteration 22 - Failed to set hostapd parameter driver Starting AP wlan4 Iteration 23 - Failed to set hostapd parameter hw_mode Starting AP wlan4 Iteration 24 - Failed to set hostapd parameter channel Starting AP wlan4 Iteration 25 - Failed to set hostapd parameter ieee80211n Starting AP wlan4 Iteration 26 - Failed to set hostapd parameter logger_stdout Starting AP wlan4 Iteration 27 - Failed to set hostapd parameter logger_stdout_level Starting AP wlan4 Iteration 28 - Failed to set hostapd parameter ssid Starting AP wlan4 Iteration 29 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 30 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 31 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 32 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 33 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 34 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 35 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 36 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 37 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 38 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 39 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 40 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 41 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 42 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 43 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 44 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 45 - AP startup timed out Starting AP wlan4 Iteration 46 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 47 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 48 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 49 - success Removing BSS wlan4 Iteration 49 - ATTACH failed Starting AP wlan4 Iteration 50 - success Removing BSS wlan4 Iteration 50 - ATTACH failed Starting AP wlan4 Iteration 51 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 52 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 53 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 54 - success Removing BSS wlan4 GET_ALLOC_FAIL: FAIL Starting AP wlan4 Iteration 55 - success Removing BSS wlan4 GET_ALLOC_FAIL: 1:main Starting AP wlan4 Iteration 56 - success Removing BSS wlan4 GET_ALLOC_FAIL: 2:main Starting AP wlan4 Iteration 57 - success Removing BSS wlan4 GET_ALLOC_FAIL: 4:main Starting AP wlan4 Iteration 58 - success Removing BSS wlan4 GET_ALLOC_FAIL: 3:main PASS hostapd_oom_open 8.947314 2020-05-13 02:41:41.041338 passed all 1 test case(s) 2020-05-13 02:41:41 ./run-tests.py hostapd_oom_wpa2_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_wpa2_eap 1/1 Test: hostapd failing to setup WPA2-EAP mode due to OOM Starting AP wlan3 Starting AP wlan4 Iteration 1 - ATTACH failed Starting AP wlan4 Iteration 2 - ATTACH failed Starting AP wlan4 Iteration 3 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 4 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 5 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 6 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 7 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 8 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 9 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 10 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 11 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 12 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 13 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 14 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 15 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 16 - ATTACH failed Starting AP wlan4 Iteration 17 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 18 - Could not ping hostapd Starting AP wlan4 Iteration 19 - ATTACH failed Starting AP wlan4 Iteration 20 - ATTACH failed Starting AP wlan4 Iteration 21 - Could not ping hostapd Starting AP wlan4 Iteration 22 - Failed to set hostapd parameter driver Starting AP wlan4 Iteration 23 - Failed to set hostapd parameter hw_mode Starting AP wlan4 Iteration 24 - Failed to set hostapd parameter channel Starting AP wlan4 Iteration 25 - Failed to set hostapd parameter ieee80211n Starting AP wlan4 Iteration 26 - Failed to set hostapd parameter logger_stdout Starting AP wlan4 Iteration 27 - Failed to set hostapd parameter logger_stdout_level Starting AP wlan4 Iteration 28 - Failed to set hostapd parameter ssid Starting AP wlan4 Iteration 29 - Failed to set hostapd parameter nas_identifier Starting AP wlan4 Iteration 30 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 31 - Failed to set hostapd parameter rsn_pairwise Starting AP wlan4 Iteration 32 - Failed to set hostapd parameter wpa_key_mgmt Starting AP wlan4 Iteration 33 - Failed to set hostapd parameter wpa Starting AP wlan4 Iteration 34 - Failed to set hostapd parameter rsn_pairwise Starting AP wlan4 Iteration 35 - Failed to set hostapd parameter rsn_pairwise Starting AP wlan4 Iteration 36 - Failed to set hostapd parameter auth_server_addr Starting AP wlan4 Iteration 37 - Failed to set hostapd parameter auth_server_addr Starting AP wlan4 Iteration 38 - Failed to set hostapd parameter acct_server_addr Starting AP wlan4 Iteration 39 - Failed to set hostapd parameter acct_server_addr Starting AP wlan4 Iteration 40 - Failed to set hostapd parameter auth_server_port Starting AP wlan4 Iteration 41 - Failed to set hostapd parameter auth_server_shared_secret Starting AP wlan4 Iteration 42 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 43 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 44 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 45 - Failed to set hostapd parameter acct_server_shared_secret Starting AP wlan4 Iteration 46 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 47 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 48 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 49 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 50 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 51 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 52 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 53 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 54 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 55 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 56 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 57 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 58 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 59 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 60 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 61 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 62 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 63 - AP startup timed out Starting AP wlan4 Iteration 64 - AP startup timed out Starting AP wlan4 Iteration 65 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 66 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 67 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 68 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 69 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 70 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 71 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 72 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 73 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 74 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 75 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 76 - success Removing BSS wlan4 Iteration 76 - ATTACH failed Starting AP wlan4 Iteration 77 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 78 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 79 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 80 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 81 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 82 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 83 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 84 - success Removing BSS wlan4 GET_ALLOC_FAIL: 1:main Starting AP wlan4 Iteration 85 - success Removing BSS wlan4 GET_ALLOC_FAIL: 2:main Starting AP wlan4 Iteration 86 - success Removing BSS wlan4 GET_ALLOC_FAIL: 5:main Starting AP wlan4 Iteration 87 - success Removing BSS wlan4 GET_ALLOC_FAIL: 3:main Starting AP wlan4 Iteration 88 - success Removing BSS wlan4 GET_ALLOC_FAIL: 5:main PASS hostapd_oom_wpa2_eap 17.109841 2020-05-13 02:41:58.563166 passed all 1 test case(s) 2020-05-13 02:41:58 ./run-tests.py hostapd_oom_wpa2_eap_connect --long DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_wpa2_eap_connect 1/1 Test: hostapd failing during WPA2-EAP mode connection due to OOM Starting AP wlan3 Iteration 1 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 2 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 3 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 4 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 5 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 6 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 7 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 8 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 9 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 10 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 11 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 12 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 13 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 14 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 15 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 16 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 17 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 18 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 19 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 20 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 21 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 22 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 23 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 24 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 25 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 26 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 27 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 28 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 29 Connect STA wlan0 to AP Re-select to avoid long wait for temp disavle GET_ALLOC_FAIL: 0:main Iteration 30 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 30 GET_ALLOC_FAIL: 0:main Iteration 31 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 32 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 33 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 34 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 35 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 36 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 37 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 38 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 39 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 40 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 41 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 42 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 43 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 44 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 45 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 46 Connect STA wlan0 to AP Re-select to avoid long wait for temp disavle GET_ALLOC_FAIL: 0:main Iteration 47 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 47 GET_ALLOC_FAIL: 0:main Iteration 48 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 49 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 50 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 51 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 51 GET_ALLOC_FAIL: 0:main Iteration 52 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 53 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 53 GET_ALLOC_FAIL: 0:main Iteration 54 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 54 GET_ALLOC_FAIL: 0:main Iteration 55 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 55 GET_ALLOC_FAIL: 0:main Iteration 56 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 56 GET_ALLOC_FAIL: 0:main Iteration 57 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 58 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 59 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 60 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 61 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 62 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 63 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 64 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 65 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 66 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 67 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 68 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 69 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 70 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 70 GET_ALLOC_FAIL: 0:main Iteration 71 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 72 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 73 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 74 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 74 GET_ALLOC_FAIL: 0:main Iteration 75 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 76 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 77 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 78 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 79 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 80 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 81 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 82 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 83 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 84 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 85 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 86 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 86 GET_ALLOC_FAIL: 0:main Iteration 87 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 88 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 88 GET_ALLOC_FAIL: 0:main Iteration 89 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 89 GET_ALLOC_FAIL: 0:main Iteration 90 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 90 GET_ALLOC_FAIL: 0:main Iteration 91 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 91 GET_ALLOC_FAIL: 0:main Iteration 92 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 92 GET_ALLOC_FAIL: 0:main Iteration 93 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 93 GET_ALLOC_FAIL: 0:main Iteration 94 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 95 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 96 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 97 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 98 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 99 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 100 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 101 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 102 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 103 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 104 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 105 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 106 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 107 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 107 GET_ALLOC_FAIL: 0:main Iteration 108 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 109 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 110 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 111 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 111 GET_ALLOC_FAIL: 0:main Iteration 112 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 113 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 114 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 115 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 116 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 117 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 118 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 119 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 120 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 121 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 122 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 123 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 123 GET_ALLOC_FAIL: 0:main Iteration 124 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 125 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 125 GET_ALLOC_FAIL: 0:main Iteration 126 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 126 GET_ALLOC_FAIL: 0:main Iteration 127 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 127 GET_ALLOC_FAIL: 0:main Iteration 128 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 128 GET_ALLOC_FAIL: 0:main Iteration 129 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 129 GET_ALLOC_FAIL: 0:main Iteration 130 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 130 GET_ALLOC_FAIL: 0:main Iteration 131 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 132 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 133 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 134 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 135 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 136 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 137 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 138 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 139 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 140 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 141 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 142 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 143 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 144 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 145 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 146 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 147 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 148 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 149 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 150 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 151 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 152 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 153 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 154 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 155 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 156 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 157 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 158 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 159 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 160 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 161 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 162 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 163 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 164 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 165 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 166 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 167 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 168 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 169 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 170 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 171 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 172 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 173 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 174 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 175 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 176 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 177 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 178 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 178 GET_ALLOC_FAIL: 0:main Iteration 179 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 180 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 181 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 182 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 183 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 184 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 185 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 186 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 187 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 188 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 189 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 190 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 191 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 192 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 193 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 194 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 195 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 196 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 197 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 198 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 199 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 200 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 201 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 202 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 203 Connect STA wlan0 to AP GET_ALLOC_FAIL: 13:main Iteration 204 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 205 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 206 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 207 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 208 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 209 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 210 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 211 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 212 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 213 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 214 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 215 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 216 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 217 Connect STA wlan0 to AP GET_ALLOC_FAIL: 27:main Iteration 218 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 219 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 220 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 221 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 222 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 223 Connect STA wlan0 to AP GET_ALLOC_FAIL: 1:main Iteration 224 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 225 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 226 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 227 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 228 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 229 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 230 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 231 Connect STA wlan0 to AP GET_ALLOC_FAIL: FAIL Iteration 232 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 233 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 234 Connect STA wlan0 to AP GET_ALLOC_FAIL: 22:main Iteration 235 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 236 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 237 Connect STA wlan0 to AP GET_ALLOC_FAIL: 6:main Iteration 238 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 239 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 240 Connect STA wlan0 to AP GET_ALLOC_FAIL: FAIL Iteration 241 Connect STA wlan0 to AP GET_ALLOC_FAIL: 1:main Iteration 242 Connect STA wlan0 to AP GET_ALLOC_FAIL: 2:main Iteration 243 Connect STA wlan0 to AP GET_ALLOC_FAIL: 31:main Iteration 244 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 245 Connect STA wlan0 to AP GET_ALLOC_FAIL: 5:main Iteration 246 Connect STA wlan0 to AP GET_ALLOC_FAIL: 24:main Iteration 247 Connect STA wlan0 to AP GET_ALLOC_FAIL: 7:main Iteration 248 Connect STA wlan0 to AP GET_ALLOC_FAIL: 17:main Iteration 249 Connect STA wlan0 to AP GET_ALLOC_FAIL: 9:main PASS hostapd_oom_wpa2_eap_connect 226.848994 2020-05-13 02:45:45.915864 passed all 1 test case(s) 2020-05-13 02:45:45 ./run-tests.py hostapd_oom_wpa2_eap_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_wpa2_eap_radius 1/1 Test: hostapd failing to setup WPA2-EAP mode due to OOM in RADIUS Starting AP wlan3 Starting AP wlan4 Iteration 1 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 2 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Iteration 2 - AP setup succeeded during out-of-memory Starting AP wlan4 Iteration 3 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Starting AP wlan4 Iteration 4 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Starting AP wlan4 Iteration 5 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Starting AP wlan4 Iteration 6 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Starting AP wlan4 Iteration 7 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Starting AP wlan4 Iteration 8 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Starting AP wlan4 Iteration 9 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Starting AP wlan4 Iteration 10 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:accounting_init Starting AP wlan4 Iteration 11 - success Removing BSS wlan4 GET_ALLOC_FAIL: 1:accounting_init Starting AP wlan4 Iteration 12 - success Removing BSS wlan4 GET_ALLOC_FAIL: 2:accounting_init Starting AP wlan4 Iteration 13 - success Removing BSS wlan4 GET_ALLOC_FAIL: 3:accounting_init Starting AP wlan4 Iteration 14 - success Removing BSS wlan4 GET_ALLOC_FAIL: 4:accounting_init Starting AP wlan4 Iteration 15 - success Removing BSS wlan4 GET_ALLOC_FAIL: 5:accounting_init PASS hostapd_oom_wpa2_eap_radius 3.689685 2020-05-13 02:45:50.033686 passed all 1 test case(s) 2020-05-13 02:45:50 ./run-tests.py hostapd_oom_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_wpa2_psk 1/1 Test: hostapd failing to setup WPA2-PSK mode due to OOM Starting AP wlan3 Starting AP wlan4 Iteration 1 - ATTACH failed Starting AP wlan4 Iteration 2 - ATTACH failed Starting AP wlan4 Iteration 3 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 4 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 5 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 6 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 7 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 8 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 9 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 10 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 11 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 12 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 13 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 14 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 15 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 16 - ATTACH failed Starting AP wlan4 Iteration 17 - Could not add hostapd interface wlan4 Starting AP wlan4 Iteration 18 - Could not ping hostapd Starting AP wlan4 Iteration 19 - ATTACH failed Starting AP wlan4 Iteration 20 - ATTACH failed Starting AP wlan4 Iteration 21 - Could not ping hostapd Starting AP wlan4 Iteration 22 - Failed to set hostapd parameter driver Starting AP wlan4 Iteration 23 - Failed to set hostapd parameter hw_mode Starting AP wlan4 Iteration 24 - Failed to set hostapd parameter channel Starting AP wlan4 Iteration 25 - Failed to set hostapd parameter ieee80211n Starting AP wlan4 Iteration 26 - Failed to set hostapd parameter logger_stdout Starting AP wlan4 Iteration 27 - Failed to set hostapd parameter logger_stdout_level Starting AP wlan4 Iteration 28 - Failed to set hostapd parameter ssid Starting AP wlan4 Iteration 29 - Failed to set hostapd parameter wpa_passphrase Starting AP wlan4 Iteration 30 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 31 - Failed to set hostapd parameter rsn_pairwise Starting AP wlan4 Iteration 32 - Failed to set hostapd parameter wpa_key_mgmt Starting AP wlan4 Iteration 33 - Failed to set hostapd parameter wpa Starting AP wlan4 Iteration 34 - Failed to set hostapd parameter rsn_pairwise Starting AP wlan4 Iteration 35 - Failed to set hostapd parameter rsn_pairwise Starting AP wlan4 Iteration 36 - Failed to set hostapd parameter wpa_psk_file Starting AP wlan4 Iteration 37 - Failed to set hostapd parameter wpa_psk_file Starting AP wlan4 Iteration 38 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 39 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 40 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 41 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 42 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 43 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 44 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 45 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 46 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 47 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 48 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 49 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 50 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 51 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 52 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 53 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 54 - AP startup timed out Starting AP wlan4 Iteration 55 - Failed to enable hostapd interface wlan4 Starting AP wlan4 Iteration 56 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 57 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 58 - success Removing BSS wlan4 Iteration 58 - ATTACH failed Starting AP wlan4 Iteration 59 - success Removing BSS wlan4 Iteration 59 - ATTACH failed Starting AP wlan4 Iteration 60 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 61 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 62 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 63 - success Removing BSS wlan4 GET_ALLOC_FAIL: 0:main Starting AP wlan4 Iteration 64 - success Removing BSS wlan4 GET_ALLOC_FAIL: FAIL Starting AP wlan4 Iteration 65 - success Removing BSS wlan4 GET_ALLOC_FAIL: 1:main Starting AP wlan4 Iteration 66 - success Removing BSS wlan4 GET_ALLOC_FAIL: 2:main Starting AP wlan4 Iteration 67 - success Removing BSS wlan4 GET_ALLOC_FAIL: 3:main Starting AP wlan4 Iteration 68 - success Removing BSS wlan4 GET_ALLOC_FAIL: 4:main Starting AP wlan3 Starting AP wlan4 Starting AP wlan3 Starting AP wlan4 PASS hostapd_oom_wpa2_psk 11.206954 2020-05-13 02:46:01.712640 passed all 1 test case(s) 2020-05-13 02:46:01 ./run-tests.py hostapd_oom_wpa2_psk_connect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_wpa2_psk_connect 1/1 Test: hostapd failing during WPA2-PSK mode connection due to OOM Starting AP wlan3 Iteration 1 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 2 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 3 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 4 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 5 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 6 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 7 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 8 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 9 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 10 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 11 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 12 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 13 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 14 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 15 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 16 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 17 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 18 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 19 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 20 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 21 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 22 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 23 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 24 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 25 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 26 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 27 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 28 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 29 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 30 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 30 GET_ALLOC_FAIL: 0:main Iteration 31 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 32 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 33 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 34 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 35 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 36 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 37 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 38 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 39 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 40 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 41 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 42 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 43 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 44 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 45 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 46 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 47 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 48 Connect STA wlan0 to AP GET_ALLOC_FAIL: FAIL Iteration 49 Connect STA wlan0 to AP GET_ALLOC_FAIL: 1:main Iteration 50 Connect STA wlan0 to AP GET_ALLOC_FAIL: 2:main Iteration 51 Connect STA wlan0 to AP GET_ALLOC_FAIL: 3:main Iteration 52 Connect STA wlan0 to AP GET_ALLOC_FAIL: 4:main PASS hostapd_oom_wpa2_psk_connect 15.858281 2020-05-13 02:46:18.013718 passed all 1 test case(s) 2020-05-13 02:46:18 ./run-tests.py hs20_pps_mo_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hs20_pps_mo_1 1/1 Test: Hotspot 2.0 PPS MO with username/password credential Starting AP wlan3 set_pps result: Set PPS MO info to wpa_supplicant - SP FQDN wi-fi.org wpa_command(ifname='wlan0', cmd='REMOVE_CRED provisioning_sp=wi-fi.org') - UpdateIdentifier = 1 wpa_command(ifname='wlan0', cmd='ADD_CRED') wpa_command(ifname='wlan0', cmd='SET_CRED 0 update_identifier 1') wpa_command(ifname='wlan0', cmd='SET_CRED 0 provisioning_sp "wi-fi.org"') credential localname: 'Cred01' - Policy - Policy/PreferredRoamingPartnerList//Priority = 10 - Policy/PreferredRoamingPartnerList//FQDN_Match = another.example.org,includeSubdomains wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_partner "another.example.org,0,10,*"') - Policy/PreferredRoamingPartnerList//Priority = 20 - Policy/PreferredRoamingPartnerList//FQDN_Match = example.com,exactMatch wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_partner "example.com,1,20,*"') - Policy/PolicyUpdate - CredentialPriority = 1 wpa_command(ifname='wlan0', cmd='SET_CRED 0 sp_priority 1') - AAAServerTrustRoot - TODO - SubscriptionUpdate - HomeSP - HomeSP/FriendlyName = Example Operator - HomeSP/FQDN = w1.fi wpa_command(ifname='wlan0', cmd='SET_CRED 0 domain "w1.fi"') wpa_command(ifname='wlan0', cmd='SET_CRED 0 domain_suffix_match "w1.fi"') - HomeSP/RoamingConsortiumOI = 010203040506 wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_consortiums "010203040506"') - Credential - Credential/CreationDate = 2012-12-01T12:00:00Z - Credential/UsernamePassword - Credential/UsernamePassword/Username = hs20-test wpa_command(ifname='wlan0', cmd='SET_CRED 0 username "hs20-test"') - Credential/UsernamePassword/Password = password wpa_command(ifname='wlan0', cmd='SET_CRED 0 password 70617373776f7264') - Credential/UsernamePassword/MachineManaged = TRUE - Credential/UsernamePassword/EAPMethod - Credential/UsernamePassword/EAPMethod/EAPType = 21 wpa_command(ifname='wlan0', cmd='SET_CRED 0 eap TTLS') - Credential/UsernamePassword/EAPMethod/InnerMethod = MS-CHAP-V2 wpa_command(ifname='wlan0', cmd='SET_CRED 0 phase2 "auth=MSCHAPV2"') - Credential/Realm = w1.fi wpa_command(ifname='wlan0', cmd='SET_CRED 0 realm "w1.fi"') PASS hs20_pps_mo_1 0.747949 2020-05-13 02:46:19.278378 passed all 1 test case(s) 2020-05-13 02:46:19 ./run-tests.py ibss_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_5ghz 1/1 Test: IBSS on 5 GHz band wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_5ghz 8.055918 2020-05-13 02:46:27.778101 passed all 1 test case(s) 2020-05-13 02:46:27 ./run-tests.py ibss_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_open 1/1 Test: IBSS open (no security) wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_open 12.70241 2020-05-13 02:46:40.927759 passed all 1 test case(s) 2020-05-13 02:46:41 ./run-tests.py ibss_open_fixed_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_open_fixed_bssid 1/1 Test: IBSS open (no security) and fixed BSSID wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_open_fixed_bssid 9.58201 2020-05-13 02:46:50.961111 passed all 1 test case(s) 2020-05-13 02:46:51 ./run-tests.py ibss_open_retry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_open_retry 1/1 Test: IBSS open (no security) with cfg80211 retry workaround wlan0 waiting for IBSS start/join to complete PASS ibss_open_retry 10.405677 2020-05-13 02:47:01.821147 passed all 1 test case(s) 2020-05-13 02:47:01 ./run-tests.py ibss_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn 1/1 Test: IBSS RSN Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 wlan2 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan2 02:00:00:00:02:00 wlan2 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 and 02:00:00:00:01:00 wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 PASS ibss_rsn 27.759522 2020-05-13 02:47:30.032096 passed all 1 test case(s) 2020-05-13 02:47:30 ./run-tests.py ibss_rsn_eapol_trigger DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_eapol_trigger 1/1 Test: IBSS RSN and EAPOL trigger for a new peer wlan0 waiting for IBSS start/join to complete Too short EAPOL frame RSN: EAPOL frame (type 255) discarded, not a Key frame RSN: EAPOL frame payload size 96 invalid (frame size 99) RSN: EAPOL-Key type (255) unknown, discarded RSN: Timeout on waiting Authentication frame response PASS ibss_rsn_eapol_trigger 10.535107 2020-05-13 02:47:40.996922 passed all 1 test case(s) 2020-05-13 02:47:41 ./run-tests.py ibss_rsn_error_case DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_error_case 1/1 Test: IBSS RSN regression test for IBSS_RSN prior IBSS setup PASS ibss_rsn_error_case 0.089939 2020-05-13 02:47:41.612052 passed all 1 test case(s) 2020-05-13 02:47:41 ./run-tests.py ibss_rsn_group_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_group_rekey 1/1 Test: IBSS RSN group rekeying Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 PASS ibss_rsn_group_rekey 13.810853 2020-05-13 02:47:55.918509 passed all 1 test case(s) 2020-05-13 02:47:55 ./run-tests.py ibss_rsn_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_oom 1/1 Test: IBSS RSN OOM during wpa_init wlan0 waiting for IBSS start/join to complete wlan0 waiting for IBSS start/join to complete PASS ibss_rsn_oom 18.484095 2020-05-13 02:48:14.867478 passed all 1 test case(s) 2020-05-13 02:48:14 ./run-tests.py ibss_rsn_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_tkip 1/1 Test: IBSS RSN with TKIP as the cipher wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 PASS ibss_rsn_tkip 9.885112 2020-05-13 02:48:25.221761 passed all 1 test case(s) 2020-05-13 02:48:25 ./run-tests.py ibss_vht_80p80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_vht_80p80 1/1 Test: IBSS on VHT 80+80 MHz channel wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete STA1 SIGNAL_POLL: ['RSSI=0', 'LINKSPEED=0', 'NOISE=-92', 'FREQUENCY=5180', 'WIDTH=80+80 MHz', 'CENTER_FRQ1=5210', 'CENTER_FRQ2=5775'] PASS ibss_vht_80p80 9.806945 2020-05-13 02:48:35.584833 passed all 1 test case(s) 2020-05-13 02:48:35 ./run-tests.py ibss_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wep 1/1 Test: IBSS with WEP wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_wep 10.201272 2020-05-13 02:48:46.225848 passed all 1 test case(s) 2020-05-13 02:48:46 ./run-tests.py ibss_wpa_none DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wpa_none 1/1 Test: IBSS WPA-None Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Waiting for real BSSID on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete STA0 BSSID c2:cd:18:a1:54:9a differs from STA1 BSSID 00:00:00:00:00:00 wlan1 waiting for IBSS start/join to complete wlan2 waiting for IBSS start/join to complete STA0 BSSID c2:cd:18:a1:54:9a differs from STA2 BSSID 00:00:00:00:00:00 wlan2 waiting for IBSS start/join to complete bssid0=c2:cd:18:a1:54:9a bssid1=c2:cd:18:a1:54:9a bssid2=c2:cd:18:a1:54:9a Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed PASS ibss_wpa_none 30.387124 2020-05-13 02:49:17.041767 passed all 1 test case(s) 2020-05-13 02:49:17 ./run-tests.py ibss_wpa_none_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wpa_none_ccmp 1/1 Test: IBSS WPA-None/CCMP Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Waiting for real BSSID on the first STA wlan0 waiting for IBSS start/join to complete Join a STA to the IBSS wlan1 waiting for IBSS start/join to complete STA0 BSSID e2:34:d1:51:81:fe differs from STA1 BSSID 00:00:00:00:00:00 wlan1 waiting for IBSS start/join to complete bssid0=e2:34:d1:51:81:fe bssid1=e2:34:d1:51:81:fe Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed PASS ibss_wpa_none_ccmp 15.605675 2020-05-13 02:49:33.073188 passed all 1 test case(s) 2020-05-13 02:49:33 ./run-tests.py ieee8021x_and_wpa_enabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_and_wpa_enabled 1/1 Test: IEEE 802.1X connection using dynamic WEP104 when WPA enabled Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_and_wpa_enabled 0.614433 2020-05-13 02:49:34.146520 passed all 1 test case(s) 2020-05-13 02:49:34 ./run-tests.py ieee8021x_auth_awhile DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_auth_awhile 1/1 Test: IEEE 802.1X and EAPOL Authenticator aWhile handling Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ieee8021x_auth_awhile 1.586697 2020-05-13 02:49:36.190806 passed all 1 test case(s) 2020-05-13 02:49:36 ./run-tests.py ieee8021x_eapol_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_eapol_key 1/1 Test: IEEE 802.1X connection and EAPOL-Key protocol tests Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_eapol_key 0.491568 2020-05-13 02:49:37.117707 passed all 1 test case(s) 2020-05-13 02:49:37 ./run-tests.py ieee8021x_eapol_start DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_eapol_start 1/1 Test: IEEE 802.1X and EAPOL-Start retransmissions Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_eapol_start 4.519542 2020-05-13 02:49:42.094829 passed all 1 test case(s) 2020-05-13 02:49:42 ./run-tests.py ieee8021x_held DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_held 1/1 Test: IEEE 802.1X and HELD state Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_held 3.64653 2020-05-13 02:49:46.185560 passed all 1 test case(s) 2020-05-13 02:49:46 ./run-tests.py ieee8021x_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_open 1/1 Test: IEEE 802.1X connection using open network Starting AP wlan3 Connect STA wlan0 to AP Test EAPOL-Logoff PASS ieee8021x_open 0.939238 2020-05-13 02:49:47.558409 passed all 1 test case(s) 2020-05-13 02:49:47 ./run-tests.py ieee8021x_open_leap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_open_leap 1/1 Test: IEEE 802.1X connection with LEAP included in configuration Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ieee8021x_open_leap 0.682932 2020-05-13 02:49:48.684768 passed all 1 test case(s) 2020-05-13 02:49:48 ./run-tests.py ieee8021x_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_proto 1/1 Test: IEEE 802.1X and EAPOL supplicant protocol testing Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP MIB before test frames: {'dot1xSuppEapLengthErrorFramesRx': '0', 'dot1xSuppLastEapolFrameSource': '02:00:00:00:03:00', 'dot11RSNAConfigPMKLifetime': '43200', 'dot1xSuppAuthPeriod': '30', 'dot11RSNAPairwiseCipherSelected': '00-50-f2-0', 'dot11RSNAEnabled': 'FALSE', 'dot1xSuppEapolReqFramesRx': '521', 'dot11RSNAConfigPairwiseKeysSupported': '5', 'dot11RSNAConfigPMKReauthThreshold': '70', 'dot11RSNAAuthenticationSuiteRequested': '00-00-00-0', 'dot1xSuppMaxStart': '3', 'dot11RSNAConfigSATimeout': '60', 'dot1xSuppEapolStartFramesTx': '3', 'dot1xSuppEapolRespFramesTx': '789', 'dot1xSuppEapolFramesTx': '1350', 'dot1xSuppSuppControlledPortStatus': 'Authorized', 'dot11RSNAPreauthenticationImplemented': 'TRUE', 'dot1xSuppEapolLogoffFramesTx': '1', 'dot11RSNAConfigVersion': '1', 'dot11RSNAGroupCipherRequested': '00-50-f2-0', 'dot1xSuppLastEapolFrameVersion': '2', 'dot11RSNAPreauthenticationEnabled': 'FALSE', 'dot1xSuppEapolReqIdFramesRx': '268', 'dot1xSuppInvalidEapolFramesRx': '0', 'dot11RSNA4WayHandshakeFailures': '2', 'dot1xSuppStartPeriod': '30', 'dot1xSuppBackendPaeState': '2', 'dot1xSuppEapolFramesRx': '1491', 'dot11RSNAOptionImplemented': 'TRUE', 'dot11RSNAConfigNumberOfGTKSAReplayCounters': '0', 'dot11RSNAGroupCipherSelected': '00-50-f2-0', 'dot11RSNAConfigGroupCipherSize': '0', 'dot11RSNAPairwiseCipherRequested': '00-50-f2-0', 'dot11RSNAConfigNumberOfPTKSAReplayCounters': '1', 'dot11RSNAAuthenticationSuiteSelected': '00-00-00-0', 'dot1xSuppHeldPeriod': '60', 'dot11RSNAPMKIDUsed': '', 'dot1xSuppPaeState': '5'} MIB after test frames: {'dot1xSuppEapLengthErrorFramesRx': '1', 'dot1xSuppLastEapolFrameSource': '02:00:00:00:03:00', 'dot11RSNAConfigPMKLifetime': '43200', 'dot1xSuppAuthPeriod': '30', 'dot11RSNAPairwiseCipherSelected': '00-50-f2-0', 'dot11RSNAEnabled': 'FALSE', 'dot1xSuppEapolReqFramesRx': '521', 'dot11RSNAConfigPairwiseKeysSupported': '5', 'dot11RSNAConfigPMKReauthThreshold': '70', 'dot11RSNAAuthenticationSuiteRequested': '00-00-00-0', 'dot1xSuppMaxStart': '3', 'dot11RSNAConfigSATimeout': '60', 'dot1xSuppEapolStartFramesTx': '3', 'dot1xSuppEapolRespFramesTx': '789', 'dot1xSuppEapolFramesTx': '1350', 'dot1xSuppSuppControlledPortStatus': 'Authorized', 'dot11RSNAPreauthenticationImplemented': 'TRUE', 'dot1xSuppEapolLogoffFramesTx': '1', 'dot11RSNAConfigVersion': '1', 'dot11RSNAGroupCipherRequested': '00-50-f2-0', 'dot1xSuppLastEapolFrameVersion': '2', 'dot11RSNAPreauthenticationEnabled': 'FALSE', 'dot1xSuppEapolReqIdFramesRx': '268', 'dot1xSuppInvalidEapolFramesRx': '2', 'dot11RSNA4WayHandshakeFailures': '2', 'dot1xSuppStartPeriod': '30', 'dot1xSuppBackendPaeState': '2', 'dot1xSuppEapolFramesRx': '1499', 'dot11RSNAOptionImplemented': 'TRUE', 'dot11RSNAConfigNumberOfGTKSAReplayCounters': '0', 'dot11RSNAGroupCipherSelected': '00-50-f2-0', 'dot11RSNAConfigGroupCipherSize': '0', 'dot11RSNAPairwiseCipherRequested': '00-50-f2-0', 'dot11RSNAConfigNumberOfPTKSAReplayCounters': '1', 'dot11RSNAAuthenticationSuiteSelected': '00-00-00-0', 'dot1xSuppHeldPeriod': '60', 'dot11RSNAPMKIDUsed': '', 'dot1xSuppPaeState': '5'} PASS ieee8021x_proto 0.767801 2020-05-13 02:49:49.895287 passed all 1 test case(s) 2020-05-13 02:49:49 ./run-tests.py ieee8021x_reauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_reauth 1/1 Test: IEEE 802.1X and EAPOL_REAUTH request Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_reauth 0.727062 2020-05-13 02:49:51.047561 passed all 1 test case(s) 2020-05-13 02:49:51 ./run-tests.py ieee8021x_reauth_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_reauth_wep 1/1 Test: IEEE 802.1X and EAPOL_REAUTH request with WEP Starting AP wlan3 Connect STA wlan0 to AP num_eapol_key: 4 num_eap_req: 6 num_eap_resp: 6 PASS ieee8021x_reauth_wep 1.317817 2020-05-13 02:49:52.806970 passed all 1 test case(s) 2020-05-13 02:49:52 ./run-tests.py ieee8021x_set_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_set_conf 1/1 Test: IEEE 802.1X and EAPOL_SET command Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_set_conf 0.75127 2020-05-13 02:49:54.014999 passed all 1 test case(s) 2020-05-13 02:49:54 ./run-tests.py ieee8021x_static_wep104 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_static_wep104 1/1 Test: IEEE 802.1X connection using static WEP104 Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_static_wep104 0.649806 2020-05-13 02:49:55.126963 passed all 1 test case(s) 2020-05-13 02:49:55 ./run-tests.py ieee8021x_static_wep40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_static_wep40 1/1 Test: IEEE 802.1X connection using static WEP40 Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_static_wep40 0.648888 2020-05-13 02:49:56.246626 passed all 1 test case(s) 2020-05-13 02:49:56 ./run-tests.py ieee8021x_wep104 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_wep104 1/1 Test: IEEE 802.1X connection using dynamic WEP104 Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_wep104 0.547923 2020-05-13 02:49:57.208627 passed all 1 test case(s) 2020-05-13 02:49:57 ./run-tests.py ieee8021x_wep40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_wep40 1/1 Test: IEEE 802.1X connection using dynamic WEP40 Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_wep40 0.567939 2020-05-13 02:49:58.225727 passed all 1 test case(s) 2020-05-13 02:49:58 ./run-tests.py ieee8021x_wep_index_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_wep_index_workaround 1/1 Test: IEEE 802.1X and EAPOL-Key index workaround Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_wep_index_workaround 0.50517 2020-05-13 02:49:59.263221 passed all 1 test case(s) 2020-05-13 02:49:59 ./run-tests.py invalid_p2p_connect_command DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START invalid_p2p_connect_command 1/1 Test: P2P_CONNECT error cases PASS invalid_p2p_connect_command 0.094595 2020-05-13 02:49:59.763295 passed all 1 test case(s) 2020-05-13 02:49:59 ./run-tests.py ip4_drop_gratuitous_arp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ip4_drop_gratuitous_arp 1/1 Skip test case: Not running under VM SKIP ip4_drop_gratuitous_arp 0.07733 2020-05-13 02:50:00.236937 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:00 ./run-tests.py ip4_gtk_drop_bcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ip4_gtk_drop_bcast 1/1 Skip test case: Not running under VM SKIP ip4_gtk_drop_bcast 0.075537 2020-05-13 02:50:00.714748 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:00 ./run-tests.py ip4_gtk_drop_mcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ip4_gtk_drop_mcast 1/1 Skip test case: Not running under VM SKIP ip4_gtk_drop_mcast 0.076738 2020-05-13 02:50:01.195333 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:01 ./run-tests.py ip6_drop_unsolicited_na DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ip6_drop_unsolicited_na 1/1 Skip test case: Not running under VM SKIP ip6_drop_unsolicited_na 0.094197 2020-05-13 02:50:01.702658 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:01 ./run-tests.py ip6_gtk_drop_bcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ip6_gtk_drop_bcast 1/1 Skip test case: Not running under VM SKIP ip6_gtk_drop_bcast 0.081636 2020-05-13 02:50:02.195367 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:02 ./run-tests.py ip6_gtk_drop_mcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ip6_gtk_drop_mcast 1/1 Skip test case: Not running under VM SKIP ip6_gtk_drop_mcast 0.087472 2020-05-13 02:50:02.712418 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:02 ./run-tests.py kernel_bss_leak_deauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START kernel_bss_leak_deauth 1/1 Test: cfg80211/mac80211 BSS leak on deauthentication Starting AP wlan3 Connect STA wlan0 to AP PASS kernel_bss_leak_deauth 0.613256 2020-05-13 02:50:03.748978 passed all 1 test case(s) 2020-05-13 02:50:03 ./run-tests.py kernel_bss_leak_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START kernel_bss_leak_timeout 1/1 Test: cfg80211/mac80211 BSS leak on timeout Starting AP wlan3 Connect STA wlan0 to AP PASS kernel_bss_leak_timeout 0.609788 2020-05-13 02:50:04.771469 passed all 1 test case(s) 2020-05-13 02:50:04 ./run-tests.py kernel_unknown_action_frame_rejection_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START kernel_unknown_action_frame_rejection_sta 1/1 Test: mac80211 and unknown Action frame rejection in STA mode Starting AP wlan3 Connect STA wlan0 to AP PASS kernel_unknown_action_frame_rejection_sta 1.05002 2020-05-13 02:50:06.294845 passed all 1 test case(s) 2020-05-13 02:50:06 ./run-tests.py macsec_hostapd_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_hostapd_eap 1/1 Test: MACsec EAP with hostapd ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 52:54:00:12:34:56 brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_hostapd_eap 0.170935 2020-05-13 02:50:06.986662 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:07 ./run-tests.py macsec_hostapd_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_hostapd_psk 1/1 Test: MACsec PSK with hostapd ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 52:54:00:12:34:56 brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_hostapd_psk 0.144189 2020-05-13 02:50:07.544127 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:07 ./run-tests.py macsec_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk 1/1 Test: MACsec PSK Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk 0.153366 2020-05-13 02:50:08.129142 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:08 ./run-tests.py macsec_psk_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_256 1/1 Test: MACsec PSK with 256-bit keys Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_256 0.167484 2020-05-13 02:50:08.706198 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:08 ./run-tests.py macsec_psk_br2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br2 1/1 Test: MACsec PSK (bridge; 2 devices) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 52:54:00:12:34:56 brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 19: brveth: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 22:db:06:72:5b:1e brd ff:ff:ff:ff:ff:ff 20: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 22:db:06:72:5b:1e brd ff:ff:ff:ff:ff:ff 21: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 0e:c9:a4:09:46:9d brd ff:ff:ff:ff:ff:ff 22: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether ee:1f:1e:94:30:7a brd ff:ff:ff:ff:ff:ff 23: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 62:e1:1b:1c:c3:36 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br2 0.355042 2020-05-13 02:50:09.484006 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:09 ./run-tests.py macsec_psk_br2_same_prio DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br2_same_prio 1/1 Test: MACsec PSK (bridge; 2 devices, same mka_priority) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 52:54:00:12:34:56 brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 24: brveth: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 46:40:26:08:77:49 brd ff:ff:ff:ff:ff:ff 25: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 5a:44:0f:fe:a2:d1 brd ff:ff:ff:ff:ff:ff 26: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether a6:47:8d:62:e7:8c brd ff:ff:ff:ff:ff:ff 27: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 46:40:26:08:77:49 brd ff:ff:ff:ff:ff:ff 28: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether ba:d5:ba:f9:5d:ce brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br2_same_prio 0.268089 2020-05-13 02:50:10.219494 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:10 ./run-tests.py macsec_psk_br3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br3 1/1 Test: MACsec PSK (bridge; 3 devices) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 52:54:00:12:34:56 brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 29: brveth: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 2a:f9:a6:84:25:fd brd ff:ff:ff:ff:ff:ff 30: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 6e:42:bd:3f:d4:f7 brd ff:ff:ff:ff:ff:ff 31: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 6a:37:4b:f7:df:a0 brd ff:ff:ff:ff:ff:ff 32: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 4a:a2:a5:af:af:55 brd ff:ff:ff:ff:ff:ff 33: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether a6:64:f7:0b:11:0c brd ff:ff:ff:ff:ff:ff 34: vethbr2@veth2: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 2a:f9:a6:84:25:fd brd ff:ff:ff:ff:ff:ff 35: veth2@vethbr2: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether c2:43:40:c4:be:85 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br3 0.379515 2020-05-13 02:50:11.028514 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:11 ./run-tests.py macsec_psk_br3_same_prio DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br3_same_prio 1/1 Test: MACsec PSK (bridge; 3 devices, same mka_priority) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 52:54:00:12:34:56 brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 36: brveth: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 12:20:51:8b:96:68 brd ff:ff:ff:ff:ff:ff 37: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 7a:96:98:c1:a3:fa brd ff:ff:ff:ff:ff:ff 38: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether fa:a0:53:f3:f0:64 brd ff:ff:ff:ff:ff:ff 39: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether e2:ab:e5:4b:ce:21 brd ff:ff:ff:ff:ff:ff 40: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether aa:fa:f8:02:e6:85 brd ff:ff:ff:ff:ff:ff 41: vethbr2@veth2: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 12:20:51:8b:96:68 brd ff:ff:ff:ff:ff:ff 42: veth2@vethbr2: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 9e:fa:0b:06:2b:31 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br3_same_prio 0.370936 2020-05-13 02:50:11.812063 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:11 ./run-tests.py macsec_psk_cak_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_cak_mismatch 1/1 Test: MACsec PSK (CAK mismatch) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_cak_mismatch 0.142143 2020-05-13 02:50:12.357765 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:12 ./run-tests.py macsec_psk_ckn_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_ckn_mismatch 1/1 Test: MACsec PSK (CKN mismatch) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_ckn_mismatch 0.160824 2020-05-13 02:50:12.942712 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:13 ./run-tests.py macsec_psk_different_ports DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_different_ports 1/1 Test: MACsec PSK (different ports) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_different_ports 0.155549 2020-05-13 02:50:13.518284 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:13 ./run-tests.py macsec_psk_fail_cp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_fail_cp 1/1 Test: MACsec PSK local failures in CP state machine Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_fail_cp 0.121844 2020-05-13 02:50:14.068002 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:14 ./run-tests.py macsec_psk_fail_cp2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_fail_cp2 1/1 Test: MACsec PSK local failures in CP state machine (2) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_fail_cp2 0.137691 2020-05-13 02:50:14.605831 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:14 ./run-tests.py macsec_psk_integ_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_integ_only 1/1 Test: MACsec PSK (integrity only) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_integ_only 0.16639 2020-05-13 02:50:15.187007 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:15 ./run-tests.py macsec_psk_mka_life_time DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_mka_life_time 1/1 Test: MACsec PSK - MKA life time Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_mka_life_time 0.156318 2020-05-13 02:50:15.767503 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:15 ./run-tests.py macsec_psk_ns DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_ns 1/1 Test: MACsec PSK (netns) Start wpa_supplicant: ['ip', 'netns', 'exec', 'ns0', '../../wpa_supplicant/wpa_supplicant', '-BdddtKW', '-P', 'logs/current/macsec_psk_ns.pid0', '-f', 'logs/current/macsec_psk_ns.veth0.log', '-g', '/tmp/wpas-veth0', '-Dmacsec_linux', '-c', 'logs/current/macsec_psk_ns.conf0', '-i', 'veth0'] ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 52:54:00:12:34:56 brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff ip link show (ns0): 1: lo: mtu 65536 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 ip link show (ns1): 1: lo: mtu 65536 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_ns 0.228678 2020-05-13 02:50:16.530362 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:16 ./run-tests.py macsec_psk_port DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_port 1/1 Test: MACsec PSK (port) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_port 0.145391 2020-05-13 02:50:17.082588 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:17 ./run-tests.py macsec_psk_shorter_ckn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_shorter_ckn 1/1 Test: MACsec PSK (shorter CKN) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_shorter_ckn 0.154283 2020-05-13 02:50:17.652469 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:17 ./run-tests.py macsec_psk_shorter_ckn2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_shorter_ckn2 1/1 Test: MACsec PSK (shorter CKN, unaligned) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_shorter_ckn2 0.180407 2020-05-13 02:50:18.312372 passed all 0 test case(s) skipped 1 test case(s) 2020-05-13 02:50:18 ./run-tests.py mbo_anqp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_anqp 1/1 Test: MBO ANQP Starting AP wlan3 PASS mbo_anqp 0.432971 2020-05-13 02:50:19.220977 passed all 1 test case(s) 2020-05-13 02:50:19 ./run-tests.py mbo_assoc_disallow DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_assoc_disallow 1/1 Test: MBO and association disallowed Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS mbo_assoc_disallow 2.586569 2020-05-13 02:50:22.252000 passed all 1 test case(s) 2020-05-13 02:50:22 ./run-tests.py mbo_assoc_disallow_ignore DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_assoc_disallow_ignore 1/1 Test: MBO and ignoring disallowed association Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_assoc_disallow_ignore 1.96238 2020-05-13 02:50:24.659019 passed all 1 test case(s) 2020-05-13 02:50:24 ./run-tests.py mbo_cell_capa_update DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_cell_capa_update 1/1 Test: MBO cellular data capability update Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_cell_capa_update 0.78258 2020-05-13 02:50:25.896150 passed all 1 test case(s) 2020-05-13 02:50:25 ./run-tests.py mbo_cell_capa_update_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_cell_capa_update_pmf 1/1 Test: MBO cellular data capability update with PMF required Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_cell_capa_update_pmf 0.814161 2020-05-13 02:50:27.175884 passed all 1 test case(s) 2020-05-13 02:50:27 ./run-tests.py mbo_failures DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_failures 1/1 Test: MBO failure cases Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_failures 0.545762 2020-05-13 02:50:28.171142 passed all 1 test case(s) 2020-05-13 02:50:28 ./run-tests.py mbo_non_pref_chan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_non_pref_chan 1/1 Test: MBO non-preferred channel list Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_non_pref_chan 1.019697 2020-05-13 02:50:29.606966 passed all 1 test case(s) 2020-05-13 02:50:29 ./run-tests.py mbo_sta_supp_op_classes DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_sta_supp_op_classes 1/1 Test: MBO STA supported operating classes Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_sta_supp_op_classes 0.477412 2020-05-13 02:50:30.486350 passed all 1 test case(s) 2020-05-13 02:50:30 ./run-tests.py mbo_supp_oper_classes_bd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_bd 1/1 Test: MBO and supported operating classes (BD) Starting AP wlan4 Country: BD Connect STA wlan0 to AP Country code at the end (1): BD Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_bd 1.057975 2020-05-13 02:50:31.947297 passed all 1 test case(s) 2020-05-13 02:50:32 ./run-tests.py mbo_supp_oper_classes_fi DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_fi 1/1 Test: MBO and supported operating classes (FI) Starting AP wlan3 Starting AP wlan4 Country: FI Connect STA wlan0 to AP Connect STA wlan0 to AP Country code at the end (1): FI Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_fi 3.38633 2020-05-13 02:50:35.827050 passed all 1 test case(s) 2020-05-13 02:50:35 ./run-tests.py mbo_supp_oper_classes_jp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_jp 1/1 Test: MBO and supported operating classes (JP) Starting AP wlan3 Starting AP wlan4 Country: JP Connect STA wlan0 to AP Connect STA wlan0 to AP Country code at the end (1): JP Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_jp 1.988463 2020-05-13 02:50:38.239493 passed all 1 test case(s) 2020-05-13 02:50:38 ./run-tests.py mbo_supp_oper_classes_sy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_sy 1/1 Test: MBO and supported operating classes (SY) Starting AP wlan4 Country: SY Connect STA wlan0 to AP Country code at the end (1): SY Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_sy 1.11202 2020-05-13 02:50:39.794372 passed all 1 test case(s) 2020-05-13 02:50:39 ./run-tests.py mbo_supp_oper_classes_us DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_us 1/1 Test: MBO and supported operating classes (US) Starting AP wlan3 Starting AP wlan4 Country: US Connect STA wlan0 to AP Connect STA wlan0 to AP Country code at the end (1): US Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_us 1.955337 2020-05-13 02:50:42.221077 passed all 1 test case(s) 2020-05-13 02:50:42 ./run-tests.py mbo_supp_oper_classes_us_disable_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_us_disable_ht 1/1 Test: MBO and supported operating classes (US) - disable_ht Starting AP wlan4 Country: US Connect STA wlan0 to AP Country code at the end (1): US Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_us_disable_ht 1.299951 2020-05-13 02:50:43.979958 passed all 1 test case(s) 2020-05-13 02:50:44 ./run-tests.py mbo_supp_oper_classes_us_disable_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_us_disable_vht 1/1 Test: MBO and supported operating classes (US) - disable_vht Starting AP wlan4 Country: US Connect STA wlan0 to AP Country code at the end (1): US Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_us_disable_vht 1.151943 2020-05-13 02:50:45.669676 passed all 1 test case(s) 2020-05-13 02:50:45 ./run-tests.py mbo_supp_oper_classes_us_freq_list DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_us_freq_list 1/1 Test: MBO and supported operating classes (US) - freq_list Starting AP wlan4 Country: US Connect STA wlan0 to AP Country code at the end (1): US Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_us_freq_list 1.097802 2020-05-13 02:50:47.190995 passed all 1 test case(s) 2020-05-13 02:50:47 ./run-tests.py mbo_supp_oper_classes_za DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_za 1/1 Test: MBO and supported operating classes (ZA) Starting AP wlan3 Starting AP wlan4 Country: ZA Connect STA wlan0 to AP Connect STA wlan0 to AP Country code at the end (1): ZA Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_za 2.175385 2020-05-13 02:50:49.811405 passed all 1 test case(s) 2020-05-13 02:50:49 ./run-tests.py mbo_without_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_without_pmf 1/1 Test: MBO and WPA2 without PMF Starting AP wlan3 PASS mbo_without_pmf 0.107272 2020-05-13 02:50:50.347530 passed all 1 test case(s) 2020-05-13 02:50:50 ./run-tests.py mbo_without_pmf_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_without_pmf_workaround 1/1 Test: MBO and WPA2 without PMF on misbehaving AP Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_without_pmf_workaround 0.902767 2020-05-13 02:50:51.663040 passed all 1 test case(s) 2020-05-13 02:50:51 ./run-tests.py mbo_wnm_bss_tm_ie_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_wnm_bss_tm_ie_parsing 1/1 Test: MBO BSS transition request MBO IE parsing Starting AP wlan3 Connect STA wlan0 to AP Truncated attribute in MBO IE Unexpected cell data capa attribute length in MBO IE Unexpected transition reason attribute length in MBO IE Unexpected assoc retry delay attribute length in MBO IE Unknown attribute id 255 in MBO IE Unexpected association retry delay PASS mbo_wnm_bss_tm_ie_parsing 0.777149 2020-05-13 02:50:52.987647 passed all 1 test case(s) 2020-05-13 02:50:53 ./stop.sh 2020-05-13 02:50:54 ./start.sh channels=4 2020-05-13 02:50:55 ./stop.sh