Home | History | Annotate | Download | only in chaos_lib
      1 Used to analyze the chaos logs & packet captures and produce a consolidated analysis of each test attempt in a text file.
      2 Look at the "Sample output" below for a sample output.
      3 Requirements: Needs tshark/wireshark installed on the host machine.
      4 
      5 1. Install pyshark python module on the host machine. There are couple of bug fixes that are yet to be accepted upstream for us to use the vanilla version.
      6 Download the source tarball from here: https://drive.google.com/a/google.com/file/d/0B-W7uZuGgJr6QldhZm5ManROODA/view?usp=sharing
      7 
      8 tar xvzf pyshark.tgz
      9 cd pyshark-master/src
     10 python setup.py build
     11 python setup.py install
     12 
     13 2. Run the analyzer script from the collected log directory.
     14 cd <Log Dir>
     15 ./chaos_analyzer.py
     16 
     17 3. The analysis output for each attempt is stored in the same folder as the packet captures with the name: chaos_analyzer_try_[0-9].log.
     18 
     19 Sample Output:
     20   --------------------------------------
     21   Packet Capture File: connect_try_4_fail.trc
     22   --------------------------------------
     23   AP Beacon count: 274, BSSIDs: ['00:1b:2f:d3:fb:18']
     24   DUT packet count Tx : 4, Rx : 0, DUT: 14:7d:c5:e6:41:24
     25   --------------------------------------
     26   WLAN Protocol Verification
     27   --------------------------------------
     28   Current state: INIT. Next state: WLAN PROBE REQUEST.
     29   Current state: WLAN PROBE REQUEST. Next state: WLAN PROBE RESPONSE. Packet number: 74, Data rate: 1Mbps.
     30   Missing ACK for state: WLAN PROBE REQUEST!  
     31   State Machine halted at WLAN PROBE RESPONSE state!
     32   --------------------------------------
     33   Filtered Packet Capture Summary
     34   --------------------------------------
     35   74 0.319619 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=218, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2
     36   99 0.377054 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=219, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2
     37   102 0.387697 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=220, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2
     38   141 0.557165 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=225, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2
     39   --------------------------------------
     40   Extracted Messages Log
     41   --------------------------------------
     42   2015-04-06T19:35:07.151703-07:00 NOTICE autotest[12338]: Connection attempt 4
     43   2015-04-06T19:35:08.767978-07:00 WARNING kernel: [  481.248389] mwifiex_sdio mmc2:0001:1: assoc: requested bss not found in scan results
     44 
     45   --------------------------------------
     46   Extracted Net Log
     47   --------------------------------------
     48   2015-04-06T19:35:06.963021-07:00 INFO shill[1214]: [INFO:manager.cc(471)] PushProfileInternal finished; 2 profile(s) now present.
     49