lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 18 Feb 2019 10:15:43 +0800
From:   kernel test robot <rong.a.chen@...el.com>
To:     Nikolay Aleksandrov <nikolay@...ulusnetworks.com>
Cc:     netdev@...r.kernel.org, roopa@...ulusnetworks.com,
        wkok@...ulusnetworks.com, anuradhak@...ulusnetworks.com,
        bridge@...ts.linux-foundation.org, linus.luessing@...3.blue,
        davem@...emloft.net, stephen@...workplumber.org,
        Nikolay Aleksandrov <nikolay@...ulusnetworks.com>, lkp@...org
Subject: [LKP] [net]  5c261115ce: hwsim.ap_vlan_without_station.fail

FYI, we noticed the following commit (built with gcc-7):

commit: 5c261115cef6e99302690935266ad113e26ae4bb ("[PATCH RFC] net: bridge: don't flood known multicast traffic when snooping is enabled")
url: https://github.com/0day-ci/linux/commits/Nikolay-Aleksandrov/net-bridge-don-t-flood-known-multicast-traffic-when-snooping-is-enabled/20190216-033700


in testcase: hwsim
with following parameters:

	group: hwsim-02



on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 4G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):




2019-02-18 03:45:08 export USER=root
2019-02-18 03:45:08 ./build.sh
Building TNC testing tools
Building wlantest
Building hostapd
Building wpa_supplicant
2019-02-18 03:47:57 ./start.sh
2019-02-18 03:47:58 	./run-tests.py ap_open_ifdown 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_ifdown 1/1
Test: AP with open mode and external ifconfig down
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_open_ifdown 1.297904 2019-02-18 03:48:02.252163
passed all 1 test case(s)
2019-02-18 03:48:02 	./run-tests.py ap_open_invalid_wmm_action 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_invalid_wmm_action 1/1
Test: AP with open mode configuration and invalid WMM Action frame
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_invalid_wmm_action 0.466601 2019-02-18 03:48:03.408871
passed all 1 test case(s)
2019-02-18 03:48:03 	./run-tests.py ap_open_multicast_to_unicast 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_multicast_to_unicast 1/1
Test: Multicast-to-unicast conversion enabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_multicast_to_unicast 0.43067 2019-02-18 03:48:04.324180
passed all 1 test case(s)
2019-02-18 03:48:04 	./run-tests.py ap_open_multicast_to_unicast_disabled 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_multicast_to_unicast_disabled 1/1
Test: Multicast-to-unicast conversion disabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_multicast_to_unicast_disabled 0.44771 2019-02-18 03:48:05.305661
passed all 1 test case(s)
2019-02-18 03:48:05 	./run-tests.py ap_open_no_reflection 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_no_reflection 1/1
Test: AP with open mode, STA sending packets to itself
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_no_reflection 1.534071 2019-02-18 03:48:07.376354
passed all 1 test case(s)
2019-02-18 03:48:07 	./run-tests.py ap_open_noncountry 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_noncountry 1/1
Test: AP with open mode and noncountry entity as Country String
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_noncountry 6.70197 2019-02-18 03:48:14.689721
passed all 1 test case(s)
2019-02-18 03:48:14 	./run-tests.py ap_open_out_of_memory 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_out_of_memory 1/1
Test: hostapd failing to setup interface due to allocation failure
Starting AP wlan3
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
PASS ap_open_out_of_memory 0.704106 2019-02-18 03:48:15.925191
passed all 1 test case(s)
2019-02-18 03:48:16 	./run-tests.py ap_open_packet_loss 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_packet_loss 1/1
Test: AP with open mode configuration and large packet loss
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_open_packet_loss 11.462469 2019-02-18 03:48:28.121312
passed all 1 test case(s)
2019-02-18 03:48:28 	./run-tests.py ap_open_per_sta_vif 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_per_sta_vif 1/1
Test: AP VLAN with open network
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_per_sta_vif 0.454378 2019-02-18 03:48:29.049047
passed all 1 test case(s)
2019-02-18 03:48:29 	./run-tests.py ap_open_pmf_default 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_pmf_default 1/1
Test: AP with open mode (no security) configuration and pmf=2
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
PASS ap_open_pmf_default 0.767375 2019-02-18 03:48:30.321162
passed all 1 test case(s)
2019-02-18 03:48:30 	./run-tests.py ap_open_poll_sta 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_poll_sta 1/1
Test: AP with open mode and STA poll
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_poll_sta 0.422021 2019-02-18 03:48:31.251816
passed all 1 test case(s)
2019-02-18 03:48:31 	./run-tests.py ap_open_reassoc_not_found 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_reassoc_not_found 1/1
Test: AP with open mode and REASSOCIATE not finding a match
Connect STA wlan0 to AP
PASS ap_open_reassoc_not_found 0.254328 2019-02-18 03:48:32.003562
passed all 1 test case(s)
2019-02-18 03:48:32 	./run-tests.py ap_open_reassoc_same 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_reassoc_same 1/1
Test: AP with open mode and STA reassociating back to same AP without auth exchange
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_reassoc_same 0.515153 2019-02-18 03:48:33.050044
passed all 1 test case(s)
2019-02-18 03:48:33 	./run-tests.py ap_open_reconnect_on_inactivity_disconnect 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_reconnect_on_inactivity_disconnect 1/1
Test: Reconnect to open mode AP after inactivity related disconnection
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_reconnect_on_inactivity_disconnect 0.691548 2019-02-18 03:48:34.289003
passed all 1 test case(s)
2019-02-18 03:48:34 	./run-tests.py ap_open_select_any 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_select_any 1/1
Test: AP with open mode and select any network
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_open_select_any 0.711917 2019-02-18 03:48:35.567014
passed all 1 test case(s)
2019-02-18 03:48:35 	./run-tests.py ap_open_select_network 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_select_network 1/1
Test: Open mode connection and SELECT_NETWORK to change network
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_open_select_network 0.91725 2019-02-18 03:48:37.080350
passed all 1 test case(s)
2019-02-18 03:48:37 	./run-tests.py ap_open_select_network_freq 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_select_network_freq 1/1
Test: AP with open mode and use for SELECT_NETWORK freq parameter
Starting AP wlan3
Connect STA wlan0 to AP
Scan duration: 0.0400000000373 seconds
PASS ap_open_select_network_freq 0.380548 2019-02-18 03:48:37.933411
passed all 1 test case(s)
2019-02-18 03:48:37 	./run-tests.py ap_open_select_twice 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_select_twice 1/1
Test: AP with open mode and select network twice
Connect STA wlan0 to AP
Starting AP wlan3
PASS ap_open_select_twice 0.467613 2019-02-18 03:48:38.869172
passed all 1 test case(s)
2019-02-18 03:48:38 	./run-tests.py ap_open_sta_enable_disable 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_sta_enable_disable 1/1
Test: AP with open mode and wpa_supplicant ENABLE/DISABLE_NETWORK
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan5 to AP
PASS ap_open_sta_enable_disable 0.697957 2019-02-18 03:48:40.073084
passed all 1 test case(s)
2019-02-18 03:48:40 	./run-tests.py ap_open_sta_statistics 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_sta_statistics 1/1
Test: AP with open mode and STA statistics
Starting AP wlan3
Connect STA wlan0 to AP
stats1: {'ht_mcs_bitmask': 'ffff0000000000000000', 'listen_interval': '5', 'rx_packets': '3', 'timeout_next': 'NULLFUNC POLL', 'ext_capab': '04000a02014000400001', 'addr': '02:00:00:00:00:00', 'rx_bytes': '232', 'tx_rate_info': '10', 'signal': '-30', 'inactive_msec': '1', 'rx_rate_info': '585 mcs 6', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'capability': '0x421', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'connected_time': '0', 'tx_bytes': '196', 'aid': '1', 'tx_packets': '3', 'ht_caps_info': '0x1076'}
stats2: {'ht_mcs_bitmask': 'ffff0000000000000000', 'listen_interval': '5', 'rx_packets': '6', 'timeout_next': 'NULLFUNC POLL', 'ext_capab': '04000a02014000400001', 'addr': '02:00:00:00:00:00', 'rx_bytes': '375', 'tx_rate_info': '10', 'signal': '-30', 'inactive_msec': '343', 'rx_rate_info': '1300 mcs 15', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'capability': '0x421', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'connected_time': '0', 'tx_bytes': '229', 'aid': '1', 'tx_packets': '4', 'ht_caps_info': '0x1076'}
stats3: {'ht_mcs_bitmask': 'ffff0000000000000000', 'listen_interval': '5', 'rx_packets': '10', 'timeout_next': 'NULLFUNC POLL', 'ext_capab': '04000a02014000400001', 'addr': '02:00:00:00:00:00', 'rx_bytes': '3448', 'tx_rate_info': '585 mcs 6', 'signal': '-30', 'inactive_msec': '10', 'rx_rate_info': '650 mcs 7', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'capability': '0x421', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'connected_time': '0', 'tx_bytes': '1782', 'aid': '1', 'tx_packets': '6', 'ht_caps_info': '0x1076'}
PASS ap_open_sta_statistics 0.990526 2019-02-18 03:48:41.535840
passed all 1 test case(s)
2019-02-18 03:48:41 	./run-tests.py ap_open_start_disabled 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_start_disabled 1/1
Test: AP with open mode and beaconing disabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_start_disabled 0.716674 2019-02-18 03:48:42.688999
passed all 1 test case(s)
2019-02-18 03:48:42 	./run-tests.py ap_open_start_disabled2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_start_disabled2 1/1
Test: AP with open mode and beaconing disabled (2)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_start_disabled2 1.079394 2019-02-18 03:48:44.253009
passed all 1 test case(s)
2019-02-18 03:48:44 	./run-tests.py ap_open_tdls 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls 1/1
Test: Open AP and two stations using TDLS
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Teardown TDLS
Setup TDLS
Teardown TDLS
PASS ap_open_tdls 7.216686 2019-02-18 03:48:51.943189
passed all 1 test case(s)
2019-02-18 03:48:52 	./run-tests.py ap_open_tdls_external_control 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_external_control 1/1
Test: TDLS and tdls_external_control
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_open_tdls_external_control 0.731239 2019-02-18 03:48:53.299147
passed all 1 test case(s)
2019-02-18 03:48:53 	./run-tests.py ap_open_tdls_vht 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_vht 1/1
Test: Open AP and two stations using TDLS
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Teardown TDLS
Setup TDLS
Teardown TDLS
PASS ap_open_tdls_vht 6.735755 2019-02-18 03:49:00.475475
passed all 1 test case(s)
2019-02-18 03:49:00 	./run-tests.py ap_open_tdls_vht160 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_vht160 1/1
Test: Open AP and two stations using TDLS with VHT 160
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Station dump on dev[0]:
Station 02:00:00:00:03:00 (on wlan0)
	inactive time:	33 ms
	rx bytes:	150405
	rx packets:	170
	tx bytes:	64712
	tx packets:	54
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	25
	rx drop misc:	30
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	no
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	3 seconds
Station 02:00:00:00:01:00 (on wlan0)
	inactive time:	54 ms
	rx bytes:	18306
	rx packets:	16
	tx bytes:	18306
	tx packets:	14
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	25
	rx drop misc:	0
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	yes
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	2 seconds

Station dump on dev[1]:
Station 02:00:00:00:03:00 (on wlan0)
	inactive time:	37 ms
	rx bytes:	150405
	rx packets:	170
	tx bytes:	64712
	tx packets:	54
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	25
	rx drop misc:	30
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	no
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	3 seconds
Station 02:00:00:00:01:00 (on wlan0)
	inactive time:	58 ms
	rx bytes:	18306
	rx packets:	16
	tx bytes:	18306
	tx packets:	14
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	25
	rx drop misc:	0
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	yes
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	2 seconds

PASS ap_open_tdls_vht160 3.651131 2019-02-18 03:49:04.716265
passed all 1 test case(s)
2019-02-18 03:49:04 	./run-tests.py ap_open_tdls_vht80 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_vht80 1/1
Test: Open AP and two stations using TDLS with VHT 80
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Station dump on dev[0]:
Station 02:00:00:00:03:00 (on wlan0)
	inactive time:	43 ms
	rx bytes:	150306
	rx packets:	169
	tx bytes:	64624
	tx packets:	53
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	25
	rx drop misc:	29
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	no
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	2 seconds
Station 02:00:00:00:01:00 (on wlan0)
	inactive time:	100 ms
	rx bytes:	18306
	rx packets:	16
	tx bytes:	18306
	tx packets:	14
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	25
	rx drop misc:	0
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	yes
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	2 seconds

Station dump on dev[1]:
Station 02:00:00:00:03:00 (on wlan0)
	inactive time:	65 ms
	rx bytes:	150306
	rx packets:	169
	tx bytes:	64624
	tx packets:	53
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	25
	rx drop misc:	29
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	no
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	2 seconds
Station 02:00:00:00:01:00 (on wlan0)
	inactive time:	122 ms
	rx bytes:	18306
	rx packets:	16
	tx bytes:	18306
	tx packets:	14
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	25
	rx drop misc:	0
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	yes
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	2 seconds

PASS ap_open_tdls_vht80 3.933894 2019-02-18 03:49:09.148975
passed all 1 test case(s)
2019-02-18 03:49:09 	./run-tests.py ap_open_tdls_vht80plus80 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_vht80plus80 1/1
Test: Open AP and two stations using TDLS with VHT 80+80
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Station dump on dev[0]:
Station 02:00:00:00:03:00 (on wlan0)
	inactive time:	44 ms
	rx bytes:	150703
	rx packets:	173
	tx bytes:	64624
	tx packets:	53
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	27
	rx drop misc:	29
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	no
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	3 seconds
Station 02:00:00:00:01:00 (on wlan0)
	inactive time:	71 ms
	rx bytes:	18306
	rx packets:	16
	tx bytes:	18306
	tx packets:	14
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	27
	rx drop misc:	0
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	yes
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	3 seconds

Station dump on dev[1]:
Station 02:00:00:00:03:00 (on wlan0)
	inactive time:	49 ms
	rx bytes:	150703
	rx packets:	173
	tx bytes:	64624
	tx packets:	53
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	27
	rx drop misc:	29
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	no
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	3 seconds
Station 02:00:00:00:01:00 (on wlan0)
	inactive time:	76 ms
	rx bytes:	18306
	rx packets:	16
	tx bytes:	18306
	tx packets:	14
	tx retries:	0
	tx failed:	0
	beacon loss:	0
	beacon rx:	27
	rx drop misc:	0
	signal:  	-30 dBm
	signal avg:	-30 dBm
	beacon signal avg:	226 dBm
	tx bitrate:	6.5 MBit/s MCS 0
	rx bitrate:	6.5 MBit/s MCS 0
	authorized:	yes
	authenticated:	yes
	associated:	yes
	preamble:	long
	WMM/WME:	yes
	MFP:		no
	TDLS peer:	yes
	DTIM period:	2
	beacon interval:100
	short slot time:yes
	connected time:	3 seconds

PASS ap_open_tdls_vht80plus80 4.15715 2019-02-18 03:49:13.840598
passed all 1 test case(s)
2019-02-18 03:49:13 	./run-tests.py ap_open_unexpected_assoc_event 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_unexpected_assoc_event 1/1
Test: AP with open mode and unexpected association event
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_unexpected_assoc_event 1.013542 2019-02-18 03:49:15.422983
passed all 1 test case(s)
2019-02-18 03:49:15 	./run-tests.py ap_open_unknown_action 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_unknown_action 1/1
Test: AP with open mode configuration and unknown Action frame
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_unknown_action 0.466839 2019-02-18 03:49:16.376144
passed all 1 test case(s)
2019-02-18 03:49:16 	./run-tests.py ap_open_wpas_in_bridge 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_wpas_in_bridge 1/1
Test: Open mode AP and wpas interface in a bridge
Starting AP wlan3
Ignore expected interface_add failure due to missing bridge interface: Failed to add a dynamic wpa_supplicant interface
Connect STA wlan5 to AP
PASS ap_open_wpas_in_bridge 0.793123 2019-02-18 03:49:17.652060
passed all 1 test case(s)
2019-02-18 03:49:17 	./run-tests.py ap_pmf_assoc_comeback 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_assoc_comeback 1/1
Test: WPA2-PSK AP with PMF association comeback
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_assoc_comeback 1.846603 2019-02-18 03:49:19.954055
passed all 1 test case(s)
2019-02-18 03:49:20 	./run-tests.py ap_pmf_assoc_comeback2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_assoc_comeback2 1/1
Test: WPA2-PSK AP with PMF association comeback (using DROP_SA)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_assoc_comeback2 1.942487 2019-02-18 03:49:22.519084
passed all 1 test case(s)
2019-02-18 03:49:22 	./run-tests.py ap_pmf_inject_auth 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_inject_auth 1/1
Test: WPA2-PSK AP with PMF and Authentication frame injection
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_inject_auth 0.475774 2019-02-18 03:49:23.596880
passed all 1 test case(s)
2019-02-18 03:49:23 	./run-tests.py ap_pmf_negative 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_negative 1/1
Test: WPA2-PSK AP without PMF (negative test)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_negative 10.580822 2019-02-18 03:49:34.679440
passed all 1 test case(s)
2019-02-18 03:49:34 	./run-tests.py ap_pmf_optional 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_optional 1/1
Test: WPA2-PSK AP with PMF optional
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_optional 0.739529 2019-02-18 03:49:35.842875
passed all 1 test case(s)
2019-02-18 03:49:35 	./run-tests.py ap_pmf_optional_2akm 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_optional_2akm 1/1
Test: WPA2-PSK AP with PMF optional (2 AKMs)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_optional_2akm 0.756945 2019-02-18 03:49:37.088057
passed all 1 test case(s)
2019-02-18 03:49:37 	./run-tests.py ap_pmf_optional_eap 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_optional_eap 1/1
Test: WPA2EAP AP with PMF optional
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_optional_eap 0.734661 2019-02-18 03:49:38.260818
passed all 1 test case(s)
2019-02-18 03:49:38 	./run-tests.py ap_pmf_required 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_required 1/1
Test: WPA2-PSK AP with PMF required
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_required 0.832322 2019-02-18 03:49:39.540459
passed all 1 test case(s)
2019-02-18 03:49:39 	./run-tests.py ap_pmf_required_eap 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_required_eap 1/1
Test: WPA2-EAP AP with PMF required
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_required_eap 0.688298 2019-02-18 03:49:40.722560
passed all 1 test case(s)
2019-02-18 03:49:40 	./run-tests.py ap_pmf_required_sha1 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_required_sha1 1/1
Test: WPA2-PSK AP with PMF required with SHA1 AKM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_required_sha1 0.501929 2019-02-18 03:49:41.683135
passed all 1 test case(s)
2019-02-18 03:49:41 	./run-tests.py ap_pmf_required_sta_no_pmf 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_required_sta_no_pmf 1/1
Test: WPA2-PSK AP with PMF required and PMF disabled on STA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_required_sta_no_pmf 0.521766 2019-02-18 03:49:42.635987
passed all 1 test case(s)
2019-02-18 03:49:42 	./run-tests.py ap_pmf_sta_sa_query 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query 1/1
Test: WPA2-PSK AP with station using SA Query
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query 2.876061 2019-02-18 03:49:45.994251
passed all 1 test case(s)
2019-02-18 03:49:46 	./run-tests.py ap_pmf_sta_sa_query_local_failure 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query_local_failure 1/1
Test: WPA2-PSK AP with station using SA Query (local failure)
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query_local_failure 1.023772 2019-02-18 03:49:47.517876
passed all 1 test case(s)
2019-02-18 03:49:47 	./run-tests.py ap_pmf_sta_sa_query_no_response 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query_no_response 1/1
Test: WPA2-PSK AP with station using SA Query and getting no response
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query_no_response 4.428357 2019-02-18 03:49:52.652890
passed all 1 test case(s)
2019-02-18 03:49:52 	./run-tests.py ap_pmf_sta_sa_query_oom 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query_oom 1/1
Test: WPA2-PSK AP with station using SA Query (OOM)
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query_oom 1.088031 2019-02-18 03:49:54.243853
passed all 1 test case(s)
2019-02-18 03:49:54 	./run-tests.py ap_pmf_sta_unprot_deauth_burst 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_unprot_deauth_burst 1/1
Test: WPA2-PSK AP with station receiving burst of unprotected Deauthentication frames
Connect STA wlan0 to AP
PASS ap_pmf_sta_unprot_deauth_burst 13.33517 2019-02-18 03:50:08.062647
passed all 1 test case(s)
2019-02-18 03:50:08 	./run-tests.py ap_pmf_tkip_reject 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_tkip_reject 1/1
Test: Mixed mode BSS and MFP-enabled AP rejecting TKIP
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_pmf_tkip_reject 1.675624 2019-02-18 03:50:10.533035
passed all 1 test case(s)
2019-02-18 03:50:10 	./run-tests.py ap_pmf_toggle 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_toggle 1/1
Test: WPA2-PSK AP with PMF optional and changing PMF on reassociation
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_toggle 1.089346 2019-02-18 03:50:12.194528
passed all 1 test case(s)
2019-02-18 03:50:12 	./run-tests.py ap_qosmap 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_qosmap 1/1
Test: QoS mapping
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_qosmap 1.501566 2019-02-18 03:50:14.306758
passed all 1 test case(s)
2019-02-18 03:50:14 	./run-tests.py ap_qosmap_default 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_qosmap_default 1/1
Test: QoS mapping with default values
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_qosmap_default 1.316463 2019-02-18 03:50:16.189782
passed all 1 test case(s)
2019-02-18 03:50:16 	./run-tests.py ap_qosmap_default_acm 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_qosmap_default_acm 1/1
Test: QoS mapping with default values and ACM=1 for VO/VI
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_qosmap_default_acm 1.281505 2019-02-18 03:50:18.165012
passed all 1 test case(s)
2019-02-18 03:50:18 	./run-tests.py ap_qosmap_invalid 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_qosmap_invalid 1/1
Test: QoS mapping ctrl_iface error handling
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_qosmap_invalid 0.620016 2019-02-18 03:50:19.658660
passed all 1 test case(s)
2019-02-18 03:50:19 	./run-tests.py ap_reassociation_to_same_bss 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_reassociation_to_same_bss 1/1
Test: Reassociate to the same BSS
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_reassociation_to_same_bss 10.23471 2019-02-18 03:50:30.490735
passed all 1 test case(s)
2019-02-18 03:50:30 	./run-tests.py ap_reconnect_auth_timeout 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_reconnect_auth_timeout 1/1
Test: Reconnect to 2nd AP and authentication times out
Starting AP wlan3
Connect STA wlan5 to AP
Starting AP wlan4
Wait ~10s for auth timeout...
PASS ap_reconnect_auth_timeout 11.801595 2019-02-18 03:50:42.870953
passed all 1 test case(s)
2019-02-18 03:50:42 	./run-tests.py ap_remove_during_acs 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_acs 1/1
Test: Remove interface during ACS
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Removing BSS wlan3
PASS ap_remove_during_acs 7.360816 2019-02-18 03:50:50.758836
passed all 1 test case(s)
2019-02-18 03:50:50 	./run-tests.py ap_remove_during_acs2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_acs2 1/1
Test: Remove BSS during ACS in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Removing BSS wlan3
PASS ap_remove_during_acs2 0.773318 2019-02-18 03:50:52.285577
passed all 1 test case(s)
2019-02-18 03:50:52 	./run-tests.py ap_remove_during_acs3 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_acs3 1/1
Test: Remove second BSS during ACS in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Removing BSS wlan3-2
PASS ap_remove_during_acs3 0.706935 2019-02-18 03:50:53.825074
passed all 1 test case(s)
2019-02-18 03:50:53 	./run-tests.py ap_remove_during_ht_coex_scan 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_ht_coex_scan 1/1
Test: Remove interface during HT co-ex scan
Starting AP wlan3
Removing BSS wlan3
PASS ap_remove_during_ht_coex_scan 1.761081 2019-02-18 03:50:56.324913
passed all 1 test case(s)
2019-02-18 03:50:56 	./run-tests.py ap_remove_during_ht_coex_scan2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_ht_coex_scan2 1/1
Test: Remove BSS during HT co-ex scan in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3
PASS ap_remove_during_ht_coex_scan2 0.297697 2019-02-18 03:50:57.365153
passed all 1 test case(s)
2019-02-18 03:50:57 	./run-tests.py ap_remove_during_ht_coex_scan3 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_ht_coex_scan3 1/1
Test: Remove second BSS during HT co-ex scan in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3-2
PASS ap_remove_during_ht_coex_scan3 0.287574 2019-02-18 03:50:58.504939
passed all 1 test case(s)
2019-02-18 03:50:58 	./run-tests.py ap_require_ht 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_require_ht 1/1
Test: Require HT
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
Connect STA wlan2 to AP
PASS ap_require_ht 6.152003 2019-02-18 03:51:05.399988
passed all 1 test case(s)
2019-02-18 03:51:05 	./run-tests.py ap_require_ht_limited_rates 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_require_ht_limited_rates 1/1
Test: Require HT with limited supported rates
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_require_ht_limited_rates 5.709097 2019-02-18 03:51:12.178598
passed all 1 test case(s)
2019-02-18 03:51:12 	./run-tests.py ap_roam_open 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_open 1/1
Test: Roam between two open APs
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_open 16.610558 2019-02-18 03:51:29.945006
passed all 1 test case(s)
2019-02-18 03:51:30 	./run-tests.py ap_roam_open_failed 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_open_failed 1/1
Test: Roam failure due to rejected authentication
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_open_failed 1.610171 2019-02-18 03:51:32.504307
passed all 1 test case(s)
2019-02-18 03:51:32 	./run-tests.py ap_roam_set_bssid 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_set_bssid 1/1
Test: Roam control
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_roam_set_bssid 0.987355 2019-02-18 03:51:34.254787
passed all 1 test case(s)
2019-02-18 03:51:34 	./run-tests.py ap_roam_with_reassoc_auth_timeout 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_with_reassoc_auth_timeout 1/1
Test: Roam using reassoc between two APs and authentication times out
Starting AP wlan3
Connect STA wlan5 to AP
Starting AP wlan4
Wait ~10s for auth timeout...
PASS ap_roam_with_reassoc_auth_timeout 12.445467 2019-02-18 03:51:47.578201
passed all 1 test case(s)
2019-02-18 03:51:47 	./run-tests.py ap_roam_wpa2_psk 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_wpa2_psk 1/1
Test: Roam between two WPA2-PSK APs
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_wpa2_psk 17.391712 2019-02-18 03:52:06.129840
passed all 1 test case(s)
2019-02-18 03:52:06 	./run-tests.py ap_roam_wpa2_psk_failed 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_wpa2_psk_failed 1/1
Test: Roam failure with WPA2-PSK AP due to wrong passphrase
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_wpa2_psk_failed 5.745806 2019-02-18 03:52:12.834889
passed all 1 test case(s)
2019-02-18 03:52:12 	./run-tests.py ap_roam_wpa2_psk_race 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_wpa2_psk_race 1/1
Test: Roam between two WPA2-PSK APs and try to hit a disconnection race
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_wpa2_psk_race 4.286711 2019-02-18 03:52:18.119818
passed all 1 test case(s)
2019-02-18 03:52:18 	./run-tests.py ap_short_preamble 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_short_preamble 1/1
Test: Open AP with short preamble
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_short_preamble 0.702471 2019-02-18 03:52:19.815715
passed all 1 test case(s)
2019-02-18 03:52:19 	./run-tests.py ap_spectrum_management_required 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_spectrum_management_required 1/1
Test: Open AP with spectrum management required
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_spectrum_management_required 0.881917 2019-02-18 03:52:21.703931
passed all 1 test case(s)
2019-02-18 03:52:21 	./run-tests.py ap_tdls_chan_switch_prohibit 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tdls_chan_switch_prohibit 1/1
Test: Open AP and TDLS channel switch prohibited
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
PASS ap_tdls_chan_switch_prohibit 2.594155 2019-02-18 03:52:25.101262
passed all 1 test case(s)
2019-02-18 03:52:25 	./run-tests.py ap_tdls_discovery 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tdls_discovery 1/1
Test: WPA2-PSK AP and two stations using TDLS discovery
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_tdls_discovery 1.54158 2019-02-18 03:52:27.343200
passed all 1 test case(s)
2019-02-18 03:52:27 	./run-tests.py ap_tdls_link_status 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tdls_link_status 1/1
Test: Check TDLS link status between two stations
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
wlan0: TDLS link status: peer does not exist
wlan1: TDLS link status: peer does not exist
Setup TDLS
wlan0: TDLS link status: connected
wlan1: TDLS link status: connected
Teardown TDLS
wlan0: TDLS link status: peer does not exist
wlan1: TDLS link status: peer does not exist
PASS ap_tdls_link_status 3.883501 2019-02-18 03:52:31.930046
passed all 1 test case(s)
2019-02-18 03:52:32 	./run-tests.py ap_tdls_prohibit 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tdls_prohibit 1/1
Test: Open AP and TDLS prohibited
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_tdls_prohibit 1.340085 2019-02-18 03:52:34.333396
passed all 1 test case(s)
2019-02-18 03:52:34 	./run-tests.py ap_track_sta 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta 1/1
Test: Dualband AP tracking unconnected stations
Starting AP wlan3
Starting AP wlan4
PASS ap_track_sta 3.278663 2019-02-18 03:52:38.424321
passed all 1 test case(s)
2019-02-18 03:52:38 	./run-tests.py ap_track_sta_force_2ghz 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_force_2ghz 1/1
Test: Dualband AP forcing dualband STA to connect on 2.4 GHz
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_track_sta_force_2ghz 1.66752 2019-02-18 03:52:40.984266
passed all 1 test case(s)
2019-02-18 03:52:41 	./run-tests.py ap_track_sta_force_5ghz 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_force_5ghz 1/1
Test: Dualband AP forcing dualband STA to connect on 5 GHz
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_track_sta_force_5ghz 1.232844 2019-02-18 03:52:42.834494
passed all 1 test case(s)
2019-02-18 03:52:42 	./run-tests.py ap_track_sta_no_auth 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_no_auth 1/1
Test: Dualband AP rejecting authentication from dualband STA on 2.4 GHz
Starting AP wlan3
Starting AP wlan4
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_track_sta_no_auth 1.321395 2019-02-18 03:52:45.095514
passed all 1 test case(s)
2019-02-18 03:52:45 	./run-tests.py ap_track_sta_no_auth_passive 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_no_auth_passive 1/1
Test: AP rejecting authentication from dualband STA on 2.4 GHz (passive)
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_track_sta_no_auth_passive 1.383806 2019-02-18 03:52:47.236338
passed all 1 test case(s)
2019-02-18 03:52:47 	./run-tests.py ap_track_sta_no_probe_resp 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_no_probe_resp 1/1
Test: Dualband AP not replying to probes from dualband STA on 2.4 GHz
Starting AP wlan3
Starting AP wlan4
PASS ap_track_sta_no_probe_resp 1.290614 2019-02-18 03:52:49.379728
passed all 1 test case(s)
2019-02-18 03:52:49 	./run-tests.py ap_track_taxonomy 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_taxonomy 1/1
Test: AP tracking STA taxonomy
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan5 to AP
sta0: wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:_|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001
sta1: wifi4|probe:0,1,50,3,45,127,114,255,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001
sta: wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:track_test|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001
Connect STA wlan2 to AP
sta2: wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:_|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001
flush_scan_cache: Could not clear all BSS entries. These remain:
bssid / frequency / signal level / flags / ssid
02:00:00:00:03:00	2437	-30	[ESS]	track

flush_scan_cache: Could not clear all BSS entries. These remain:
bssid / frequency / signal level / flags / ssid
02:00:00:00:03:00	2437	-30	[ESS]	track

flush_scan_cache: Could not clear all BSS entries. These remain:
bssid / frequency / signal level / flags / ssid
02:00:00:00:03:00	2437	-30	[ESS]	track

PASS ap_track_taxonomy 3.6158 2019-02-18 03:52:54.032243
passed all 1 test case(s)
2019-02-18 03:52:54 	./run-tests.py ap_tx_queue_params 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tx_queue_params 1/1
Test: Open AP with TX queue params set
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_tx_queue_params 0.902553 2019-02-18 03:52:55.662101
passed all 1 test case(s)
2019-02-18 03:52:55 	./run-tests.py ap_tx_queue_params_invalid 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tx_queue_params_invalid 1/1
Test: Invalid TX queue params set (cwmin/cwmax)
Starting AP wlan3
PASS ap_tx_queue_params_invalid 0.612112 2019-02-18 03:52:56.962271
passed all 1 test case(s)
2019-02-18 03:52:57 	./run-tests.py ap_vendor_elements 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vendor_elements 1/1
Test: WPA2-PSK AP with vendor elements added
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vendor_elements 1.113925 2019-02-18 03:52:59.048956
passed all 1 test case(s)
ignored_by_lkp ap_vht160
2019-02-18 03:52:59 	./run-tests.py ap_vht160_no_dfs 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs 1/1
Test: VHT with 160 MHz channel width and no DFS (104 minus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs 1.453284 2019-02-18 03:53:01.472052
passed all 1 test case(s)
2019-02-18 03:53:01 	./run-tests.py ap_vht160_no_dfs_100_plus 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_100_plus 1/1
Test: VHT with 160 MHz channel width and no DFS (100 plus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_100_plus 1.529072 2019-02-18 03:53:04.038338
passed all 1 test case(s)
2019-02-18 03:53:04 	./run-tests.py ap_vht160_no_dfs_108_plus 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_108_plus 1/1
Test: VHT with 160 MHz channel width and no DFS (108 plus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_108_plus 1.368689 2019-02-18 03:53:06.085228
passed all 1 test case(s)
2019-02-18 03:53:06 	./run-tests.py ap_vht160_no_dfs_112_minus 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_112_minus 1/1
Test: VHT with 160 MHz channel width and no DFS (112 minus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_112_minus 1.308186 2019-02-18 03:53:08.216280
passed all 1 test case(s)
2019-02-18 03:53:08 	./run-tests.py ap_vht160_no_dfs_116_plus 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_116_plus 1/1
Test: VHT with 160 MHz channel width and no DFS (116 plus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_116_plus 1.319312 2019-02-18 03:53:10.347411
passed all 1 test case(s)
2019-02-18 03:53:10 	./run-tests.py ap_vht160_no_dfs_120_minus 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_120_minus 1/1
Test: VHT with 160 MHz channel width and no DFS (120 minus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_120_minus 1.265689 2019-02-18 03:53:12.308748
passed all 1 test case(s)
2019-02-18 03:53:12 	./run-tests.py ap_vht160_no_dfs_124_plus 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_124_plus 1/1
Test: VHT with 160 MHz channel width and no DFS (124 plus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_124_plus 1.289689 2019-02-18 03:53:14.594918
passed all 1 test case(s)
2019-02-18 03:53:14 	./run-tests.py ap_vht160_no_dfs_128_minus 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_128_minus 1/1
Test: VHT with 160 MHz channel width and no DFS (128 minus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_128_minus 1.26795 2019-02-18 03:53:16.726790
passed all 1 test case(s)
2019-02-18 03:53:16 	./run-tests.py ap_vht160_no_ht40 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_ht40 1/1
Test: VHT with 160 MHz channel width and HT40 disabled
Starting AP wlan3
PASS ap_vht160_no_ht40 0.298702 2019-02-18 03:53:17.937075
passed all 1 test case(s)
2019-02-18 03:53:18 	./run-tests.py ap_vht160b 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160b 1/1
Test: VHT with 160 MHz channel width (2)
Starting AP wlan4
Waiting for CAC to complete
Connect STA wlan0 to AP
PASS ap_vht160b 63.447712 2019-02-18 03:54:22.289042
passed all 1 test case(s)
2019-02-18 03:54:22 	./run-tests.py ap_vht80 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80 1/1
Test: VHT with 80 MHz channel width
Starting AP wlan3
Connect STA wlan0 to AP
hostapd STATUS: {'olbc_ht': '0', 'cac_time_left_seconds': 'N/A', 'num_sta_no_short_slot_time': '1', 'vht_caps_info': '00000000', 'olbc': '0', 'vht_oper_centr_freq_seg0_idx': '42', 'num_sta_non_erp': '0', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'ht_op_mode': '0x0', 'tx_vht_mcs_map': 'aaaa', 'state': 'ENABLED', 'vht_oper_centr_freq_seg1_idx': '0', 'num_sta_ht40_intolerant': '0', 'channel': '36', 'ht_mcs_bitmask': 'ffff0000000000000000', 'vht_oper_chwidth': '1', 'bssid[0]': '02:00:00:00:03:00', 'ieee80211n': '1', 'cac_time_seconds': '0', 'num_sta[0]': '1', 'ieee80211ac': '1', 'phy': 'phy3', 'max_txpower': '23', 'num_sta_ht_no_gf': '0', 'freq': '5180', 'num_sta_ht_20_mhz': '0', 'num_sta_no_short_preamble': '1', 'secondary_channel': '1', 'rx_vht_mcs_map': 'aaaa', 'ssid[0]': 'vht', 'dtim_period': '2', 'beacon_int': '100', 'num_sta_no_ht': '0', 'bss[0]': 'wlan3', 'ht_caps_info': '000e'}
hostapd STA: {'connected_time': '0', 'vht_caps_info': '0x038004fa', 'capability': '0x1', 'addr': '02:00:00:00:00:00', 'rx_vht_mcs_map': 'aaaa', 'supp_op_classes': '73515354737475767778797a7b808182', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'tx_vht_mcs_map': 'aaaa', 'tx_packets': '6', 'ht_mcs_bitmask': 'ffff0000000000000000', 'rx_packets': '10', 'ext_capab': '04000a02014000400001', 'rx_rate_info': '1300 vhtmcs 7 vhtnss 2', 'tx_bytes': '1797', 'tx_rate_info': '65 mcs 0', 'timeout_next': 'NULLFUNC POLL', 'rx_bytes': '3367', 'signal': '-30', 'inactive_msec': '15', 'listen_interval': '5', 'flags': '[AUTH][ASSOC][AUTHORIZED][WMM][HT][VHT]', 'aid': '1', 'ht_caps_info': '0x1076'}
PASS ap_vht80 0.827731 2019-02-18 03:54:23.642805
passed all 1 test case(s)
2019-02-18 03:54:23 	./run-tests.py ap_vht80_csa 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_csa 1/1
Test: VHT with 80 MHz channel width and CSA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80_csa 3.670639 2019-02-18 03:54:27.866965
passed all 1 test case(s)
2019-02-18 03:54:27 	./run-tests.py ap_vht80_invalid 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_invalid 1/1
Test: VHT with invalid 80 MHz channel configuration (seg1)
Starting AP wlan3
PASS ap_vht80_invalid 0.414459 2019-02-18 03:54:28.658308
passed all 1 test case(s)
2019-02-18 03:54:28 	./run-tests.py ap_vht80_invalid2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_invalid2 1/1
Test: VHT with invalid 80 MHz channel configuration (seg0)
Starting AP wlan3
PASS ap_vht80_invalid2 0.407354 2019-02-18 03:54:29.619404
passed all 1 test case(s)
2019-02-18 03:54:29 	./run-tests.py ap_vht80_params 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_params 1/1
Test: VHT with 80 MHz channel width and number of optional features enabled
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_vht80_params 0.978619 2019-02-18 03:54:31.087551
passed all 1 test case(s)
2019-02-18 03:54:31 	./run-tests.py ap_vht80_pwr_constraint 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_pwr_constraint 1/1
Test: VHT with 80 MHz channel width and local power constraint
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80_pwr_constraint 0.760777 2019-02-18 03:54:32.340006
passed all 1 test case(s)
2019-02-18 03:54:32 	./run-tests.py ap_vht80_to_24g_ht 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_to_24g_ht 1/1
Test: VHT with 80 MHz channel width reconfigured to 2.4 GHz HT
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80_to_24g_ht 0.956588 2019-02-18 03:54:33.780176
passed all 1 test case(s)
2019-02-18 03:54:33 	./run-tests.py ap_vht80b 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80b 1/1
Test: VHT with 80 MHz channel width (HT40- channel 40)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80b 0.968629 2019-02-18 03:54:35.292958
passed all 1 test case(s)
2019-02-18 03:54:35 	./run-tests.py ap_vht80c 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80c 1/1
Test: VHT with 80 MHz channel width (HT40+ channel 44)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80c 0.949574 2019-02-18 03:54:36.726849
passed all 1 test case(s)
2019-02-18 03:54:36 	./run-tests.py ap_vht80d 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80d 1/1
Test: VHT with 80 MHz channel width (HT40- channel 48)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80d 1.053612 2019-02-18 03:54:38.260818
passed all 1 test case(s)
2019-02-18 03:54:38 	./run-tests.py ap_vht80plus80 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80plus80 1/1
Test: VHT with 80+80 MHz channel width
Starting AP wlan3
Starting AP wlan4
Connect STA wlan1 to AP
PASS ap_vht80plus80 1.194404 2019-02-18 03:54:39.994603
passed all 1 test case(s)
2019-02-18 03:54:40 	./run-tests.py ap_vht80plus80_invalid 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80plus80_invalid 1/1
Test: VHT with invalid 80+80 MHz channel
Starting AP wlan3
PASS ap_vht80plus80_invalid 0.468483 2019-02-18 03:54:40.909884
passed all 1 test case(s)
2019-02-18 03:54:40 	./run-tests.py ap_vht_20 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_20 1/1
Test: VHT and 20 MHz channel
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht_20 0.616448 2019-02-18 03:54:42.105781
passed all 1 test case(s)
2019-02-18 03:54:42 	./run-tests.py ap_vht_40 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_40 1/1
Test: VHT and 40 MHz channel
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht_40 0.874736 2019-02-18 03:54:43.468565
passed all 1 test case(s)
2019-02-18 03:54:43 	./run-tests.py ap_vht_40_fallback_to_20 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_40_fallback_to_20 1/1
Test: VHT and 40 MHz channel configuration falling back to 20 MHz
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht_40_fallback_to_20 0.848963 2019-02-18 03:54:44.783780
passed all 1 test case(s)
2019-02-18 03:54:44 	./run-tests.py ap_vht_capab_not_supported 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_capab_not_supported 1/1
Test: VHT configuration with driver not supporting all vht_capab entries
Starting AP wlan3
PASS ap_vht_capab_not_supported 0.151441 2019-02-18 03:54:45.378652
passed all 1 test case(s)
2019-02-18 03:54:45 	./run-tests.py ap_vht_csa_vht20 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_csa_vht20 1/1
Test: VHT CSA with VHT20 getting enabled
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_csa_vht20 2.649841 2019-02-18 03:54:48.507921
passed all 1 test case(s)
2019-02-18 03:54:48 	./run-tests.py ap_vht_csa_vht40 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_csa_vht40 1/1
Test: VHT CSA with VHT40 getting enabled
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_csa_vht40 3.187669 2019-02-18 03:54:52.404297
passed all 1 test case(s)
2019-02-18 03:54:52 	./run-tests.py ap_vht_csa_vht40_disable 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_csa_vht40_disable 1/1
Test: VHT CSA with VHT40 getting disabled
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_csa_vht40_disable 3.062347 2019-02-18 03:54:56.469628
passed all 1 test case(s)
2019-02-18 03:54:56 	./run-tests.py ap_vht_on_24ghz 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_on_24ghz 1/1
Test: Subset of VHT features on 2.4 GHz
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_on_24ghz 1.5841 2019-02-18 03:54:58.908579
passed all 1 test case(s)
2019-02-18 03:54:59 	./run-tests.py ap_vht_tkip 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_tkip 1/1
Test: VHT and TKIP
Starting AP wlan3
Connect STA wlan0 to AP
hostapd STATUS: {'olbc_ht': '0', 'cac_time_left_seconds': 'N/A', 'num_sta_no_short_slot_time': '1', 'olbc': '0', 'num_sta_non_erp': '0', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'ht_op_mode': '0x13', 'state': 'ENABLED', 'num_sta_ht40_intolerant': '0', 'channel': '36', 'bssid[0]': '02:00:00:00:03:00', 'ieee80211n': '0', 'cac_time_seconds': '0', 'num_sta[0]': '1', 'ieee80211ac': '0', 'phy': 'phy3', 'max_txpower': '23', 'num_sta_ht_no_gf': '0', 'freq': '5180', 'num_sta_ht_20_mhz': '0', 'num_sta_no_short_preamble': '1', 'secondary_channel': '0', 'ssid[0]': 'vht', 'dtim_period': '2', 'beacon_int': '100', 'num_sta_no_ht': '1', 'bss[0]': 'wlan3'}
PASS ap_vht_tkip 1.818004 2019-02-18 03:55:01.709886
passed all 1 test case(s)
2019-02-18 03:55:01 	./run-tests.py ap_vht_use_sta_nsts 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_use_sta_nsts 1/1
Test: VHT with 80 MHz channel width and use_sta_nsts=1
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht_use_sta_nsts 1.212397 2019-02-18 03:55:03.824251
passed all 1 test case(s)
2019-02-18 03:55:03 	./run-tests.py ap_vlan_file_open 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_file_open 1/1
Test: AP VLAN with open network and vlan_file mapping
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_file_open 2.172376 2019-02-18 03:55:06.670709
passed all 1 test case(s)
2019-02-18 03:55:06 	./run-tests.py ap_vlan_file_open2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_file_open2 1/1
Test: AP VLAN with open network and vlan_file mapping (2)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_file_open2 1.834327 2019-02-18 03:55:09.166559
passed all 1 test case(s)
2019-02-18 03:55:09 	./run-tests.py ap_vlan_file_parsing 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_file_parsing 1/1
Test: hostapd vlan_file/mac_file parsing
Starting AP wlan3
PASS ap_vlan_file_parsing 0.617818 2019-02-18 03:55:10.321704
passed all 1 test case(s)
2019-02-18 03:55:10 	./run-tests.py ap_vlan_iface_cleanup_multibss 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_iface_cleanup_multibss 1/1
Test: AP VLAN operation in multi-BSS multi-VLAN case
RTNETLINK answers: File exists
Starting AP wlan4
Starting interface wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
wlan0 -> VLAN 2
test wlan1 == VLAN 1
wlan1 -> VLAN 2
test wlan0 == VLAN 2
PASS ap_vlan_iface_cleanup_multibss 6.159491 2019-02-18 03:55:17.360016
passed all 1 test case(s)
2019-02-18 03:55:17 	./run-tests.py ap_vlan_iface_cleanup_multibss_per_sta_vif 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_iface_cleanup_multibss_per_sta_vif 1/1
Test: AP VLAN operation in multi-BSS multi-VLAN case with per-sta-vif set
Starting AP wlan4
Starting interface wlan3
Connect STA wlan0 to AP
dev1->dev2 unicast data delivery failed
Traceback (most recent call last):
  File "./run-tests.py", line 466, in main
    t(dev, apdev)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 505, in test_ap_vlan_iface_cleanup_multibss_per_sta_vif
    'multi-bss-iface-per_sta_vif.conf')
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 404, in ap_vlan_iface_cleanup_multibss
    hwsim_utils.test_connectivity_iface(dev[0], hapd, "brvlan1")
  File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 176, in test_connectivity_iface
    max_tries=max_tries, timeout=timeout)
  File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 169, in test_connectivity
    raise Exception(last_err)
Exception: dev1->dev2 unicast data delivery failed
FAIL ap_vlan_iface_cleanup_multibss_per_sta_vif 7.965708 2019-02-18 03:55:25.909762
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_vlan_iface_cleanup_multibss_per_sta_vif
2019-02-18 03:55:26 	./run-tests.py ap_vlan_open 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_open 1/1
Test: AP VLAN with open network
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_open 2.102242 2019-02-18 03:55:28.763859
passed all 1 test case(s)
2019-02-18 03:55:28 	./run-tests.py ap_vlan_open_per_sta_vif 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_open_per_sta_vif 1/1
Test: AP VLAN (dynamic) with open network
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vlan_open_per_sta_vif 0.847503 2019-02-18 03:55:30.465482
passed all 1 test case(s)
2019-02-18 03:55:30 	./run-tests.py ap_vlan_reconnect 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_reconnect 1/1
Test: AP VLAN with WPA2-PSK connect, disconnect, connect
Starting AP wlan3
connect sta
Connect STA wlan0 to AP
disconnect sta
reconnect sta
Connect STA wlan0 to AP
PASS ap_vlan_reconnect 2.54459 2019-02-18 03:55:33.672956
passed all 1 test case(s)
2019-02-18 03:55:33 	./run-tests.py ap_vlan_tagged 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_tagged 1/1
Test: AP VLAN with tagged interface
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_tagged 2.285961 2019-02-18 03:55:36.723342
passed all 1 test case(s)
2019-02-18 03:55:36 	./run-tests.py ap_vlan_tagged_wpa2_radius_id_change 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_tagged_wpa2_radius_id_change 1/1
Test: AP tagged VLAN with WPA2-Enterprise and RADIUS attributes changing VLANID
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
VLAN-ID -> 2
VLAN-ID -> 1
PASS ap_vlan_tagged_wpa2_radius_id_change 4.797598 2019-02-18 03:55:42.210015
passed all 1 test case(s)
2019-02-18 03:55:42 	./run-tests.py ap_vlan_without_station 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_without_station 1/1
Test: AP VLAN with WPA2-PSK and no station
Starting AP wlan3
Connect STA wlan0 to AP
first frame not observed
second frame not observed
Traceback (most recent call last):
  File "./run-tests.py", line 464, in main
    t(dev, apdev, params)
  File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 569, in test_ap_vlan_without_station
    raise Exception("second frame not observed")
Exception: second frame not observed
FAIL ap_vlan_without_station 3.525371 2019-02-18 03:55:46.600545
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_vlan_without_station
2019-02-18 03:55:46 	./run-tests.py ap_vlan_wpa2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2 1/1
Test: AP VLAN with WPA2-PSK
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_wpa2 1.968433 2019-02-18 03:55:49.347561
passed all 1 test case(s)
2019-02-18 03:55:49 	./run-tests.py ap_vlan_wpa2_psk_radius_required 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_psk_radius_required 1/1
Test: AP VLAN with WPA2-PSK and RADIUS attributes required
Starting AP wlan3
connecting without VLAN
Connect STA wlan0 to AP
Received authentication request
connecting without VLAN failed as expected
connecting without VLAN (CUI/User-Name)
Connect STA wlan1 to AP
Received authentication request
connecting without VLAN failed as expected(2)
connecting with VLAN
Connect STA wlan2 to AP
Received authentication request
connecting with VLAN succeeded as expected
PASS ap_vlan_wpa2_psk_radius_required 6.585046 2019-02-18 03:55:56.784261
passed all 1 test case(s)
2019-02-18 03:55:56 	./run-tests.py ap_vlan_wpa2_radius 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS attributes
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_wpa2_radius 2.196264 2019-02-18 03:55:59.592897
passed all 1 test case(s)
2019-02-18 03:55:59 	./run-tests.py ap_vlan_wpa2_radius_2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_2 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS EGRESS_VLANID attributes
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vlan_wpa2_radius_2 1.22128 2019-02-18 03:56:01.344570
passed all 1 test case(s)
2019-02-18 03:56:01 	./run-tests.py ap_vlan_wpa2_radius_id_change 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_id_change 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS attributes changing VLANID
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
VLAN-ID -> 2
VLAN-ID -> 1
PASS ap_vlan_wpa2_radius_id_change 3.514212 2019-02-18 03:56:05.460140
passed all 1 test case(s)
2019-02-18 03:56:05 	./run-tests.py ap_vlan_wpa2_radius_mixed 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_mixed 1/1
Test: AP VLAN with WPA2-Enterprise and tagged+untagged VLANs
Starting AP wlan3
Connect STA wlan0 to AP
Test connectivity in untagged VLAN 2
Test connectivity in tagged VLAN 1
PASS ap_vlan_wpa2_radius_mixed 1.822332 2019-02-18 03:56:08.176305
passed all 1 test case(s)
2019-02-18 03:56:08 	./run-tests.py ap_vlan_wpa2_radius_required 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_required 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS attributes required
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan2 to AP
PASS ap_vlan_wpa2_radius_required 1.20929 2019-02-18 03:56:10.616721
passed all 1 test case(s)
2019-02-18 03:56:10 	./run-tests.py ap_vlan_wpa2_radius_tagged 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_tagged 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS EGRESS_VLANID attributes
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vlan_wpa2_radius_tagged 1.161304 2019-02-18 03:56:12.544577
passed all 1 test case(s)
2019-02-18 03:56:12 	./run-tests.py ap_wds_sta 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wds_sta 1/1
Test: WPA2-PSK AP with STA using 4addr mode
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wds_sta 1.663096 2019-02-18 03:56:15.096223
passed all 1 test case(s)
2019-02-18 03:56:15 	./run-tests.py ap_wds_sta_open 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wds_sta_open 1/1
Test: Open AP with STA using 4addr mode
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wds_sta_open 1.436037 2019-02-18 03:56:17.319670
passed all 1 test case(s)
2019-02-18 03:56:17 	./run-tests.py ap_wds_sta_wep 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wds_sta_wep 1/1
Test: WEP AP with STA using 4addr mode
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wds_sta_wep 1.453279 2019-02-18 03:56:19.754751
passed all 1 test case(s)
2019-02-18 03:56:19 	./run-tests.py ap_wep_tdls 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wep_tdls 1/1
Test: WEP AP and two stations using TDLS
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Teardown TDLS
Setup TDLS
PASS ap_wep_tdls 5.21386 2019-02-18 03:56:25.945241
passed all 1 test case(s)
2019-02-18 03:56:26 	./run-tests.py ap_wep_to_wpa 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wep_to_wpa 1/1
Test: WEP to WPA2-PSK configuration change in hostapd
Starting AP wlan3
flush_scan_cache: Could not clear all BSS entries. These remain:
bssid / frequency / signal level / flags / ssid
02:00:00:00:03:00	2412	-30	[WEP][ESS]	wep-to-wpa

Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wep_to_wpa 1.675087 2019-02-18 03:56:28.817724
passed all 1 test case(s)
2019-02-18 03:56:28 	./run-tests.py ap_wmm_uapsd 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wmm_uapsd 1/1
Test: AP with U-APSD advertisement
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wmm_uapsd 0.680948 2019-02-18 03:56:30.498942
passed all 1 test case(s)
2019-02-18 03:56:30 	./run-tests.py ap_wowlan_triggers 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wowlan_triggers 1/1
Test: AP with wowlan_triggers
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wowlan_triggers 0.628063 2019-02-18 03:56:31.928285
passed all 1 test case(s)
2019-02-18 03:56:32 	./run-tests.py ap_wpa2_already_in_bridge 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_already_in_bridge 1/1
Test: hostapd behavior with interface already in bridge
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_already_in_bridge 1.060688 2019-02-18 03:56:33.867243
passed all 1 test case(s)
2019-02-18 03:56:33 	./run-tests.py ap_wpa2_bridge_fdb 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_bridge_fdb 1/1
Test: Bridge FDB entry removal
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_bridge_fdb 2.373252 2019-02-18 03:56:37.070589
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_delayed_group_m1_retransmission
ignored_by_lkp ap_wpa2_delayed_m1_m3_retransmission
ignored_by_lkp ap_wpa2_delayed_m1_m3_retransmission2
2019-02-18 03:56:37 	./run-tests.py ap_wpa2_delayed_m1_m3_zero_tk 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_delayed_m1_m3_zero_tk 1/1
Test: Delayed M1+M3 retransmission and zero TK
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_delayed_m1_m3_zero_tk 1.980082 2019-02-18 03:56:40.026558
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_delayed_m3_retransmission
2019-02-18 03:56:40 	./run-tests.py ap_wpa2_disable_eapol_retry 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_disable_eapol_retry 1/1
Test: WPA2-PSK disable EAPOL-Key retry
Starting AP wlan3
Verify working 4-way handshake without retries
Connect STA wlan0 to AP
Verify no retransmission of message 3/4
Connect STA wlan0 to AP
PASS ap_wpa2_disable_eapol_retry 5.06931 2019-02-18 03:56:45.674770
passed all 1 test case(s)
2019-02-18 03:56:45 	./run-tests.py ap_wpa2_disable_eapol_retry_group 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_disable_eapol_retry_group 1/1
Test: WPA2-PSK disable EAPOL-Key retry for group handshake
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_disable_eapol_retry_group 6.40001 2019-02-18 03:56:52.860652
passed all 1 test case(s)
2019-02-18 03:56:52 	./run-tests.py ap_wpa2_eap_aka 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka 1/1
Test: WPA2-Enterprise connection using EAP-AKA
Starting AP wlan3
Connect STA wlan0 to AP
Negative test with incorrect key
Connect STA wlan0 to AP
Invalid Milenage key
Connect STA wlan0 to AP
Invalid Milenage key(2)
Connect STA wlan0 to AP
Invalid Milenage key(3)
Connect STA wlan0 to AP
Invalid Milenage key(4)
Connect STA wlan0 to AP
Invalid Milenage key(5)
Connect STA wlan0 to AP
Invalid Milenage key(6)
Connect STA wlan0 to AP
Missing key configuration
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka 3.102522 2019-02-18 03:56:56.708046
passed all 1 test case(s)
2019-02-18 03:56:56 	./run-tests.py ap_wpa2_eap_aka_config 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_config 1/1
Test: EAP-AKA configuration options
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_config 0.768344 2019-02-18 03:56:58.087304
passed all 1 test case(s)
2019-02-18 03:56:58 	./run-tests.py ap_wpa2_eap_aka_ext 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_ext 1/1
Test: WPA2-Enterprise connection using EAP-AKA and external UMTS auth
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_ext 3.556318 2019-02-18 03:57:02.400173
passed all 1 test case(s)
2019-02-18 03:57:02 	./run-tests.py ap_wpa2_eap_aka_ext_auth_fail 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_ext_auth_fail 1/1
Test: EAP-AKA with external UMTS auth and auth failing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_ext_auth_fail 0.611019 2019-02-18 03:57:03.830989
passed all 1 test case(s)
2019-02-18 03:57:03 	./run-tests.py ap_wpa2_eap_aka_prime 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_prime 1/1
Test: WPA2-Enterprise connection using EAP-AKA'
Starting AP wlan3
Connect STA wlan0 to AP
EAP-AKA' bidding protection when EAP-AKA enabled as well
Connect STA wlan1 to AP
Negative test with incorrect key
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_prime 1.632476 2019-02-18 03:57:06.456149
passed all 1 test case(s)
2019-02-18 03:57:06 	./run-tests.py ap_wpa2_eap_aka_prime_ext 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_prime_ext 1/1
Test: EAP-AKA' with external UMTS auth to hit Synchronization-Failure
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_prime_ext 0.855597 2019-02-18 03:57:08.394548
passed all 1 test case(s)
2019-02-18 03:57:08 	./run-tests.py ap_wpa2_eap_aka_prime_ext_auth_fail 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_prime_ext_auth_fail 1/1
Test: EAP-AKA' with external UMTS auth and auth failing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_prime_ext_auth_fail 0.687723 2019-02-18 03:57:09.967309
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_eap_aka_prime_sql
2019-02-18 03:57:10 	./run-tests.py ap_wpa2_eap_aka_sql 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_sql 1/1
Test: WPA2-Enterprise connection using EAP-AKA (SQL)
Starting AP wlan3
Connect STA wlan0 to AP
AKA fast re-authentication
AKA full auth with pseudonym
AKA full auth with permanent identity
AKA reauth with mismatching MK
Connect STA wlan0 to AP
AKA reauth with mismatching counter
Connect STA wlan0 to AP
AKA reauth with max reauth count reached
PASS ap_wpa2_eap_aka_sql 1.67753 2019-02-18 03:57:12.590868
passed all 1 test case(s)
2019-02-18 03:57:12 	./run-tests.py ap_wpa2_eap_assoc_rsn 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_assoc_rsn 1/1
Test: WPA2-Enterprise AP and association request RSN IE differences
Starting AP wlan3
Starting AP wlan4
Normal wpa_supplicant assoc req RSN IE
Connect STA wlan0 to AP
Extra PMKIDCount field in RSN IE
Connect STA wlan0 to AP
Extra Group Management Cipher Suite in RSN IE
Connect STA wlan0 to AP
Extra undefined extension field in RSN IE
Connect STA wlan0 to AP
RSN IE without RSN Capabilities
Connect STA wlan0 to AP
RSN IE without AKM
Connect STA wlan0 to AP
RSN IE without pairwise
Connect STA wlan0 to AP
RSN IE without group
Connect STA wlan0 to AP
Normal wpa_supplicant assoc req RSN IE
Connect STA wlan0 to AP
Group management cipher included in assoc req RSN IE
Connect STA wlan0 to AP
Invalid group cipher
Connect STA wlan0 to AP
Invalid pairwise cipher
Connect STA wlan0 to AP
Management frame protection not enabled
Connect STA wlan0 to AP
Unsupported management group cipher
Connect STA wlan0 to AP
PASS ap_wpa2_eap_assoc_rsn 3.983073 2019-02-18 03:57:17.522490
passed all 1 test case(s)
2019-02-18 03:57:17 	./run-tests.py ap_wpa2_eap_eke 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_eke 1/1
Test: WPA2-Enterprise connection using EAP-EKE
Starting AP wlan3
Connect STA wlan0 to AP
Test forced algorithm selection
Test failed algorithm negotiation
Negative test with incorrect password
Connect STA wlan0 to AP
PASS ap_wpa2_eap_eke 4.163842 2019-02-18 03:57:22.940469
passed all 1 test case(s)
2019-02-18 03:57:23 	./run-tests.py ap_wpa2_eap_eke_many --long
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_eke_many 1/1
Test: WPA2-Enterprise connection using EAP-EKE (many connections) [long]
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Total success=300 failure=0
PASS ap_wpa2_eap_eke_many 74.35472 2019-02-18 03:58:38.380717
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_eap_eke_server_oom
ignored_by_lkp ap_wpa2_eap_eke_serverid_nai
2019-02-18 03:58:38 	./run-tests.py ap_wpa2_eap_expanded_nak 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_expanded_nak 1/1
Test: WPA2-Enterprise connection with EAP resulting in expanded NAK
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_expanded_nak 4.44168 2019-02-18 03:58:43.325725
passed all 1 test case(s)
2019-02-18 03:58:43 	./run-tests.py ap_wpa2_eap_ext_enable_network_while_connected 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ext_enable_network_while_connected 1/1
Test: WPA2-Enterprise interactive identity entry and ENABLE_NETWORK
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ext_enable_network_while_connected 1.775412 2019-02-18 03:58:45.717845
passed all 1 test case(s)
2019-02-18 03:58:45 	./run-tests.py ap_wpa2_eap_fast_binary_pac 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_binary_pac 1/1
Test: WPA2-Enterprise connection using EAP-FAST and binary PAC format
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_binary_pac 1.406704 2019-02-18 03:58:47.654618
passed all 1 test case(s)
2019-02-18 03:58:47 	./run-tests.py ap_wpa2_eap_fast_binary_pac_errors 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_binary_pac_errors 1/1
Test: EAP-FAST and binary PAC errors
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_binary_pac_errors 9.403607 2019-02-18 03:58:57.965410
passed all 1 test case(s)
2019-02-18 03:58:58 	./run-tests.py ap_wpa2_eap_fast_cipher_suites 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_cipher_suites 1/1
Test: EAP-FAST and different TLS cipher suites
Starting AP wlan3
Connect STA wlan0 to AP
Testing DHE-RSA-AES128-SHA
Connect STA wlan0 to AP
Testing RC4-SHA
Connect STA wlan0 to AP
Allow failure due to missing TLS library support
Testing AES128-SHA
Connect STA wlan0 to AP
Testing AES256-SHA
Connect STA wlan0 to AP
Testing DHE-RSA-AES256-SHA
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_cipher_suites 2.888002 2019-02-18 03:59:01.960077
passed all 1 test case(s)
2019-02-18 03:59:02 	./run-tests.py ap_wpa2_eap_fast_eap_aka 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_eap_aka 1/1
Test: WPA2-Enterprise connection using EAP-FAST/EAP-AKA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_eap_aka 0.974931 2019-02-18 03:59:04.076214
passed all 1 test case(s)
2019-02-18 03:59:04 	./run-tests.py ap_wpa2_eap_fast_eap_sim 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_eap_sim 1/1
Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_eap_sim 0.929913 2019-02-18 03:59:05.862302
passed all 1 test case(s)
2019-02-18 03:59:05 	./run-tests.py ap_wpa2_eap_fast_eap_sim_ext 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_eap_sim_ext 1/1
Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM and external GSM auth
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_eap_sim_ext 0.852774 2019-02-18 03:59:07.641296
passed all 1 test case(s)
2019-02-18 03:59:07 	./run-tests.py ap_wpa2_eap_fast_gtc_auth_prov 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_gtc_auth_prov 1/1
Test: WPA2-Enterprise connection using EAP-FAST/GTC and authenticated provisioning
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_gtc_auth_prov 1.024947 2019-02-18 03:59:09.578109
passed all 1 test case(s)
2019-02-18 03:59:09 	./run-tests.py ap_wpa2_eap_fast_gtc_identity_change 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_gtc_identity_change 1/1
Test: WPA2-Enterprise connection using EAP-FAST/GTC and identity changing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_gtc_identity_change 1.320837 2019-02-18 03:59:11.945942
passed all 1 test case(s)
2019-02-18 03:59:12 	./run-tests.py ap_wpa2_eap_fast_missing_pac_config 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_missing_pac_config 1/1
Test: WPA2-Enterprise connection using EAP-FAST and missing PAC config
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_missing_pac_config 0.933775 2019-02-18 03:59:14.222675
passed all 1 test case(s)
2019-02-18 03:59:14 	./run-tests.py ap_wpa2_eap_fast_mschapv2_unauth_prov 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_mschapv2_unauth_prov 1/1
Test: WPA2-Enterprise connection using EAP-FAST/MSCHAPv2 and unauthenticated provisioning
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_mschapv2_unauth_prov 1.424351 2019-02-18 03:59:17.065810
passed all 1 test case(s)
2019-02-18 03:59:17 	./run-tests.py ap_wpa2_eap_fast_pac_file 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_pac_file 1/1
Test: WPA2-Enterprise connection using EAP-FAST/MSCHAPv2 and PAC file
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_eap_fast_pac_file 2.923583 2019-02-18 03:59:21.505107
passed all 1 test case(s)
2019-02-18 03:59:21 	./run-tests.py ap_wpa2_eap_fast_pac_lifetime 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_pac_lifetime 1/1
Test: EAP-FAST and PAC lifetime
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_pac_lifetime 4.376031 2019-02-18 03:59:26.943570
passed all 1 test case(s)
2019-02-18 03:59:27 	./run-tests.py ap_wpa2_eap_fast_pac_refresh 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_pac_refresh 1/1
Test: EAP-FAST and PAC refresh
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_pac_refresh 3.517503 2019-02-18 03:59:31.585812
passed all 1 test case(s)
2019-02-18 03:59:31 	./run-tests.py ap_wpa2_eap_fast_pac_truncate 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_pac_truncate 1/1
Test: EAP-FAST and PAC list truncation
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_pac_truncate 5.803978 2019-02-18 03:59:38.146524
passed all 1 test case(s)
2019-02-18 03:59:38 	./run-tests.py ap_wpa2_eap_fast_prf_oom 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_prf_oom 1/1
Test: WPA2-Enterprise connection using EAP-FAST and OOM in PRF
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_prf_oom 0.668612 2019-02-18 03:59:39.763243
passed all 1 test case(s)
2019-02-18 03:59:39 	./run-tests.py ap_wpa2_eap_fast_prov 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_prov 1/1
Test: EAP-FAST and provisioning options
Starting AP wlan3
Provisioning attempt while server has provisioning disabled
Connect STA wlan0 to AP
Authenticated provisioning
Provisioning disabled - using previously provisioned PAC
Drop PAC and verify connection failure
Anonymous provisioning
Provisioning disabled - using previously provisioned PAC
PASS ap_wpa2_eap_fast_prov 3.631459 2019-02-18 03:59:44.247819
passed all 1 test case(s)
2019-02-18 03:59:44 	./run-tests.py ap_wpa2_eap_fast_server_oom 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_server_oom 1/1
Test: EAP-FAST/MSCHAPv2 and server OOM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_server_oom 1.649876 2019-02-18 03:59:47.585881
passed all 1 test case(s)
2019-02-18 03:59:47 	./run-tests.py ap_wpa2_eap_fast_text_pac_errors 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_text_pac_errors 1/1
Test: EAP-FAST and text PAC errors
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Starting AP wlan4
Connect STA wlan0 to AP
Starting AP wlan4
Connect STA wlan0 to AP
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_text_pac_errors 8.64542 2019-02-18 03:59:57.312444
passed all 1 test case(s)
2019-02-18 03:59:57 	./run-tests.py ap_wpa2_eap_gpsk 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_gpsk 1/1
Test: WPA2-Enterprise connection using EAP-GPSK
Starting AP wlan3
Connect STA wlan0 to AP
Test forced algorithm selection
Test failed algorithm negotiation
Negative test with incorrect password
Connect STA wlan0 to AP
PASS ap_wpa2_eap_gpsk 2.622526 2019-02-18 04:00:00.917552
passed all 1 test case(s)
2019-02-18 04:00:01 	./run-tests.py ap_wpa2_eap_gpsk_ptk_rekey_ap 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_gpsk_ptk_rekey_ap 1/1
Test: WPA2-Enterprise with EAP-GPSK and PTK rekey enforced by AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_gpsk_ptk_rekey_ap 3.047803 2019-02-18 04:00:05.099445
passed all 1 test case(s)
2019-02-18 04:00:05 	./run-tests.py ap_wpa2_eap_ikev2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ikev2 1/1
Test: WPA2-Enterprise connection using EAP-IKEv2
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Negative test with incorrect password
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ikev2 1.751638 2019-02-18 04:00:07.941861
passed all 1 test case(s)
2019-02-18 04:00:08 	./run-tests.py ap_wpa2_eap_ikev2_as_frag 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ikev2_as_frag 1/1
Test: WPA2-Enterprise connection using EAP-IKEv2 with server fragmentation
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ikev2_as_frag 0.801185 2019-02-18 04:00:09.496354
passed all 1 test case(s)
2019-02-18 04:00:09 	./run-tests.py ap_wpa2_eap_ikev2_oom 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ikev2_oom 1/1
Test: WPA2-Enterprise connection using EAP-IKEv2 and OOM
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ikev2_oom 1.486708 2019-02-18 04:00:11.674223
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_eap_in_bridge
2019-02-18 04:00:11 	./run-tests.py ap_wpa2_eap_interactive 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_interactive 1/1
Test: WPA2-Enterprise connection using interactive identity/password entry
Starting AP wlan3
Connection with dynamic TTLS/MSCHAPv2 password entry
Connect STA wlan0 to AP
Connection with dynamic TTLS/MSCHAPv2 identity and password entry
Connect STA wlan0 to AP
Connection with dynamic TTLS/EAP-MSCHAPv2 password entry
Connect STA wlan0 to AP
Connection with dynamic TTLS/EAP-MD5 password entry
Connect STA wlan0 to AP
Connection with dynamic PEAP/EAP-MSCHAPv2 password entry
Connect STA wlan0 to AP
Connection with dynamic PEAP/EAP-GTC password entry
Connect STA wlan0 to AP
PASS ap_wpa2_eap_interactive 2.229559 2019-02-18 04:00:14.931981
passed all 1 test case(s)
2019-02-18 04:00:15 	./run-tests.py ap_wpa2_eap_no_workaround 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_no_workaround 1/1
Test: WPA2-Enterprise connection using EAP-TTLS and eap_workaround=0
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_no_workaround 0.748379 2019-02-18 04:00:16.464873
passed all 1 test case(s)
2019-02-18 04:00:16 	./run-tests.py ap_wpa2_eap_non_ascii_identity 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_non_ascii_identity 1/1
Test: WPA2-Enterprise connection attempt using non-ASCII identity
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_eap_non_ascii_identity 4.926255 2019-02-18 04:00:22.186021
passed all 1 test case(s)
2019-02-18 04:00:22 	./run-tests.py ap_wpa2_eap_non_ascii_identity2 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_non_ascii_identity2 1/1
Test: WPA2-Enterprise connection attempt using non-ASCII identity
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_eap_non_ascii_identity2 4.897567 2019-02-18 04:00:28.131459
passed all 1 test case(s)
2019-02-18 04:00:28 	./run-tests.py ap_wpa2_eap_oom 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_oom 1/1
Test: EAP server and OOM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_oom 2.9186 2019-02-18 04:00:31.869330
passed all 1 test case(s)
2019-02-18 04:00:31 	./run-tests.py ap_wpa2_eap_pax 
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_pax 1/1
Test: WPA2-Enterprise connection using EAP-PAX
Starting AP wlan3
Connect STA wlan0 to AP
Negative test with incorrect password
Connect STA wlan0 to AP
PASS ap_wpa2_eap_pax 0.988707 2019-02-18 04:00:33.697369
passed all 1 test case(s)
2019-02-18 04:00:33 ./stop.sh
2019-02-18 04:00:35 ./start.sh channels=4
2019-02-18 04:00:36 ./stop.sh



To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email



Thanks,
Rong Chen

View attachment "config-5.0.0-rc5-00320-g5c26111" of type "text/plain" (169062 bytes)

View attachment "job-script" of type "text/plain" (4864 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (303412 bytes)

View attachment "hwsim" of type "text/plain" (103765 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ