1Used to analyze the chaos logs & packet captures and produce a consolidated analysis of each test attempt in a text file. 2Look at the "Sample output" below for a sample output. 3Requirements: Needs tshark/wireshark installed on the host machine. 4 51. Install pyshark python module on the host machine. There are couple of bug fixes that are yet to be accepted upstream for us to use the vanilla version. 6Download the source tarball from here: https://drive.google.com/a/google.com/file/d/0B-W7uZuGgJr6QldhZm5ManROODA/view?usp=sharing 7 8tar xvzf pyshark.tgz 9cd pyshark-master/src 10python setup.py build 11python setup.py install 12 132. Run the analyzer script from the collected log directory. 14cd <Log Dir> 15./chaos_analyzer.py 16 173. The analysis output for each attempt is stored in the same folder as the packet captures with the name: chaos_analyzer_try_[0-9].log. 18 19Sample Output: 20 -------------------------------------- 21 Packet Capture File: connect_try_4_fail.trc 22 -------------------------------------- 23 AP Beacon count: 274, BSSIDs: ['00:1b:2f:d3:fb:18'] 24 DUT packet count Tx : 4, Rx : 0, DUT: 14:7d:c5:e6:41:24 25 -------------------------------------- 26 WLAN Protocol Verification 27 -------------------------------------- 28 Current state: INIT. Next state: WLAN PROBE REQUEST. 29 Current state: WLAN PROBE REQUEST. Next state: WLAN PROBE RESPONSE. Packet number: 74, Data rate: 1Mbps. 30 Missing ACK for state: WLAN PROBE REQUEST! 31 State Machine halted at WLAN PROBE RESPONSE state! 32 -------------------------------------- 33 Filtered Packet Capture Summary 34 -------------------------------------- 35 74 0.319619 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=218, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2 36 99 0.377054 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=219, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2 37 102 0.387697 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=220, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2 38 141 0.557165 14:7d:c5:e6:41:24 ff:ff:ff:ff:ff:ff 802.11 121 Probe Request, SN=225, FN=0, Flags=........C, SSID=wnr854t_g_ch5_wpa2 39 -------------------------------------- 40 Extracted Messages Log 41 -------------------------------------- 42 2015-04-06T19:35:07.151703-07:00 NOTICE autotest[12338]: Connection attempt 4 43 2015-04-06T19:35:08.767978-07:00 WARNING kernel: [ 481.248389] mwifiex_sdio mmc2:0001:1: assoc: requested bss not found in scan results 44 45 -------------------------------------- 46 Extracted Net Log 47 -------------------------------------- 48 2015-04-06T19:35:06.963021-07:00 INFO shill[1214]: [INFO:manager.cc(471)] PushProfileInternal finished; 2 profile(s) now present. 49