• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1Used to analyze the chaos logs & packet captures and produce a consolidated analysis of each test attempt in a text file.
2Look at the "Sample output" below for a sample output.
3Requirements: Needs tshark/wireshark installed on the host machine.
4
51. Install pyshark python module on the host machine. There are couple of bug fixes that are yet to be accepted upstream for us to use the vanilla version.
6Download the source tarball from here: https://drive.google.com/a/google.com/file/d/0B-W7uZuGgJr6QldhZm5ManROODA/view?usp=sharing
7
8tar xvzf pyshark.tgz
9cd pyshark-master/src
10python setup.py build
11python setup.py install
12
132. Run the analyzer script from the collected log directory.
14cd <Log Dir>
15./chaos_analyzer.py
16
173. The analysis output for each attempt is stored in the same folder as the packet captures with the name: chaos_analyzer_try_[0-9].log.
18
19Sample Output:
20  --------------------------------------
21  Packet Capture File: connect_try_4_fail.trc
22  --------------------------------------
23  AP Beacon count: 274, BSSIDs: ['00:1b:2f:d3:fb:18']
24  DUT packet count Tx : 4, Rx : 0, DUT: 14:7d:c5:e6:41:24
25  --------------------------------------
26  WLAN Protocol Verification
27  --------------------------------------
28  Current state: INIT. Next state: WLAN PROBE REQUEST.
29  Current state: WLAN PROBE REQUEST. Next state: WLAN PROBE RESPONSE. Packet number: 74, Data rate: 1Mbps.
30  Missing ACK for state: WLAN PROBE REQUEST!
31  State Machine halted at WLAN PROBE RESPONSE state!
32  --------------------------------------
33  Filtered Packet Capture Summary
34  --------------------------------------
35  74 0.319619 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=218, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2
36  99 0.377054 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=219, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2
37  102 0.387697 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=220, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2
38  141 0.557165 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=225, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2
39  --------------------------------------
40  Extracted Messages Log
41  --------------------------------------
42  2015-04-06T19:35:07.151703-07:00 NOTICE autotest[12338]: Connection attempt 4
43  2015-04-06T19:35:08.767978-07:00 WARNING kernel: [  481.248389] mwifiex_sdio mmc2:0001:1: assoc: requested bss not found in scan results
44
45  --------------------------------------
46  Extracted Net Log
47  --------------------------------------
48  2015-04-06T19:35:06.963021-07:00 INFO shill[1214]: [INFO:manager.cc(471)] PushProfileInternal finished; 2 profile(s) now present.
49