1 Used to analyze the chaos logs & packet captures and produce a consolidated analysis of each test attempt in a text file. 2 Look at the "Sample output" below for a sample output. 3 Requirements: Needs tshark/wireshark installed on the host machine. 4 5 1. Install pyshark python module on the host machine. There are couple of bug fixes that are yet to be accepted upstream for us to use the vanilla version. 6 Download the source tarball from here: https://drive.google.com/a/google.com/file/d/0B-W7uZuGgJr6QldhZm5ManROODA/view?usp=sharing 7 8 tar xvzf pyshark.tgz 9 cd pyshark-master/src 10 python setup.py build 11 python setup.py install 12 13 2. Run the analyzer script from the collected log directory. 14 cd <Log Dir> 15 ./chaos_analyzer.py 16 17 3. The analysis output for each attempt is stored in the same folder as the packet captures with the name: chaos_analyzer_try_[0-9].log. 18 19 Sample Output: 20 -------------------------------------- 21 Packet Capture File: connect_try_4_fail.trc 22 -------------------------------------- 23 AP Beacon count: 274, BSSIDs: ['00:1b:2f:d3:fb:18'] 24 DUT packet count Tx : 4, Rx : 0, DUT: 14:7d:c5:e6:41:24 25 -------------------------------------- 26 WLAN Protocol Verification 27 -------------------------------------- 28 Current state: INIT. Next state: WLAN PROBE REQUEST. 29 Current state: WLAN PROBE REQUEST. Next state: WLAN PROBE RESPONSE. Packet number: 74, Data rate: 1Mbps. 30 Missing ACK for state: WLAN PROBE REQUEST! 31 State Machine halted at WLAN PROBE RESPONSE state! 32 -------------------------------------- 33 Filtered Packet Capture Summary 34 -------------------------------------- 35 74 0.319619 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=218, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2 36 99 0.377054 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=219, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2 37 102 0.387697 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=220, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2 38 141 0.557165 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=225, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2 39 -------------------------------------- 40 Extracted Messages Log 41 -------------------------------------- 42 2015-04-06T19:35:07.151703-07:00 NOTICE autotest[12338]: Connection attempt 4 43 2015-04-06T19:35:08.767978-07:00 WARNING kernel: [ 481.248389] mwifiex_sdio mmc2:0001:1: assoc: requested bss not found in scan results 44 45 -------------------------------------- 46 Extracted Net Log 47 -------------------------------------- 48 2015-04-06T19:35:06.963021-07:00 INFO shill[1214]: [INFO:manager.cc(471)] PushProfileInternal finished; 2 profile(s) now present. 49