When run after other tests, It was likely that the target bss was already present in scan_fail, so the scan_for_bss() wouldn't trip the allocation failure in wpa_bss_add(). Flush the scan results before the scan to ensure wpa_bss_add() is called and consistently pass scan_fail. Signed-off-by: Thomas Pedersen <thomas@xxxxxxxxxxxx> --- tests/hwsim/test_scan.py | 1 + 1 file changed, 1 insertion(+) diff --git a/tests/hwsim/test_scan.py b/tests/hwsim/test_scan.py index 9bf7a0fd4ebd..aac07eea6fa6 100644 --- a/tests/hwsim/test_scan.py +++ b/tests/hwsim/test_scan.py @@ -1166,6 +1166,7 @@ def test_scan_fail(dev, apdev): hapd = hostapd.add_ap(apdev[0], {"ssid": "open"}) with alloc_fail(dev[0], 1, "wpa_bss_add"): + dev[0].flush_scan_cache() dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412") def test_scan_fail_type_only(dev, apdev): -- 2.20.1 _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap