FYI, we noticed the following commit (built with gcc-7): commit: 5c261115cef6e99302690935266ad113e26ae4bb ("[PATCH RFC] net: bridge: don't flood known multicast traffic when snooping is enabled") url: https://github.com/0day-ci/linux/commits/Nikolay-Aleksandrov/net-bridge-don-t-flood-known-multicast-traffic-when-snooping-is-enabled/20190216-033700 in testcase: hwsim with following parameters: group: hwsim-02 on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 4G caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): 2019-02-18 03:45:08 export USER=root 2019-02-18 03:45:08 ./build.sh Building TNC testing tools Building wlantest Building hostapd Building wpa_supplicant 2019-02-18 03:47:57 ./start.sh 2019-02-18 03:47:58 ./run-tests.py ap_open_ifdown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_ifdown 1/1 Test: AP with open mode and external ifconfig down Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_open_ifdown 1.297904 2019-02-18 03:48:02.252163 passed all 1 test case(s) 2019-02-18 03:48:02 ./run-tests.py ap_open_invalid_wmm_action DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_invalid_wmm_action 1/1 Test: AP with open mode configuration and invalid WMM Action frame Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_invalid_wmm_action 0.466601 2019-02-18 03:48:03.408871 passed all 1 test case(s) 2019-02-18 03:48:03 ./run-tests.py ap_open_multicast_to_unicast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_multicast_to_unicast 1/1 Test: Multicast-to-unicast conversion enabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_multicast_to_unicast 0.43067 2019-02-18 03:48:04.324180 passed all 1 test case(s) 2019-02-18 03:48:04 ./run-tests.py ap_open_multicast_to_unicast_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_multicast_to_unicast_disabled 1/1 Test: Multicast-to-unicast conversion disabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_multicast_to_unicast_disabled 0.44771 2019-02-18 03:48:05.305661 passed all 1 test case(s) 2019-02-18 03:48:05 ./run-tests.py ap_open_no_reflection DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_no_reflection 1/1 Test: AP with open mode, STA sending packets to itself Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_no_reflection 1.534071 2019-02-18 03:48:07.376354 passed all 1 test case(s) 2019-02-18 03:48:07 ./run-tests.py ap_open_noncountry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_noncountry 1/1 Test: AP with open mode and noncountry entity as Country String Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_noncountry 6.70197 2019-02-18 03:48:14.689721 passed all 1 test case(s) 2019-02-18 03:48:14 ./run-tests.py ap_open_out_of_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_out_of_memory 1/1 Test: hostapd failing to setup interface due to allocation failure Starting AP wlan3 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 Starting AP wlan4 PASS ap_open_out_of_memory 0.704106 2019-02-18 03:48:15.925191 passed all 1 test case(s) 2019-02-18 03:48:16 ./run-tests.py ap_open_packet_loss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_packet_loss 1/1 Test: AP with open mode configuration and large packet loss Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_open_packet_loss 11.462469 2019-02-18 03:48:28.121312 passed all 1 test case(s) 2019-02-18 03:48:28 ./run-tests.py ap_open_per_sta_vif DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_per_sta_vif 1/1 Test: AP VLAN with open network Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_per_sta_vif 0.454378 2019-02-18 03:48:29.049047 passed all 1 test case(s) 2019-02-18 03:48:29 ./run-tests.py ap_open_pmf_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_pmf_default 1/1 Test: AP with open mode (no security) configuration and pmf=2 Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP PASS ap_open_pmf_default 0.767375 2019-02-18 03:48:30.321162 passed all 1 test case(s) 2019-02-18 03:48:30 ./run-tests.py ap_open_poll_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_poll_sta 1/1 Test: AP with open mode and STA poll Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_poll_sta 0.422021 2019-02-18 03:48:31.251816 passed all 1 test case(s) 2019-02-18 03:48:31 ./run-tests.py ap_open_reassoc_not_found DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_reassoc_not_found 1/1 Test: AP with open mode and REASSOCIATE not finding a match Connect STA wlan0 to AP PASS ap_open_reassoc_not_found 0.254328 2019-02-18 03:48:32.003562 passed all 1 test case(s) 2019-02-18 03:48:32 ./run-tests.py ap_open_reassoc_same DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_reassoc_same 1/1 Test: AP with open mode and STA reassociating back to same AP without auth exchange Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_reassoc_same 0.515153 2019-02-18 03:48:33.050044 passed all 1 test case(s) 2019-02-18 03:48:33 ./run-tests.py ap_open_reconnect_on_inactivity_disconnect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_reconnect_on_inactivity_disconnect 1/1 Test: Reconnect to open mode AP after inactivity related disconnection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_reconnect_on_inactivity_disconnect 0.691548 2019-02-18 03:48:34.289003 passed all 1 test case(s) 2019-02-18 03:48:34 ./run-tests.py ap_open_select_any DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_any 1/1 Test: AP with open mode and select any network Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_open_select_any 0.711917 2019-02-18 03:48:35.567014 passed all 1 test case(s) 2019-02-18 03:48:35 ./run-tests.py ap_open_select_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_network 1/1 Test: Open mode connection and SELECT_NETWORK to change network Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_open_select_network 0.91725 2019-02-18 03:48:37.080350 passed all 1 test case(s) 2019-02-18 03:48:37 ./run-tests.py ap_open_select_network_freq DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_network_freq 1/1 Test: AP with open mode and use for SELECT_NETWORK freq parameter Starting AP wlan3 Connect STA wlan0 to AP Scan duration: 0.0400000000373 seconds PASS ap_open_select_network_freq 0.380548 2019-02-18 03:48:37.933411 passed all 1 test case(s) 2019-02-18 03:48:37 ./run-tests.py ap_open_select_twice DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_twice 1/1 Test: AP with open mode and select network twice Connect STA wlan0 to AP Starting AP wlan3 PASS ap_open_select_twice 0.467613 2019-02-18 03:48:38.869172 passed all 1 test case(s) 2019-02-18 03:48:38 ./run-tests.py ap_open_sta_enable_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_sta_enable_disable 1/1 Test: AP with open mode and wpa_supplicant ENABLE/DISABLE_NETWORK Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP PASS ap_open_sta_enable_disable 0.697957 2019-02-18 03:48:40.073084 passed all 1 test case(s) 2019-02-18 03:48:40 ./run-tests.py ap_open_sta_statistics DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_sta_statistics 1/1 Test: AP with open mode and STA statistics Starting AP wlan3 Connect STA wlan0 to AP stats1: {'ht_mcs_bitmask': 'ffff0000000000000000', 'listen_interval': '5', 'rx_packets': '3', 'timeout_next': 'NULLFUNC POLL', 'ext_capab': '04000a02014000400001', 'addr': '02:00:00:00:00:00', 'rx_bytes': '232', 'tx_rate_info': '10', 'signal': '-30', 'inactive_msec': '1', 'rx_rate_info': '585 mcs 6', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'capability': '0x421', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'connected_time': '0', 'tx_bytes': '196', 'aid': '1', 'tx_packets': '3', 'ht_caps_info': '0x1076'} stats2: {'ht_mcs_bitmask': 'ffff0000000000000000', 'listen_interval': '5', 'rx_packets': '6', 'timeout_next': 'NULLFUNC POLL', 'ext_capab': '04000a02014000400001', 'addr': '02:00:00:00:00:00', 'rx_bytes': '375', 'tx_rate_info': '10', 'signal': '-30', 'inactive_msec': '343', 'rx_rate_info': '1300 mcs 15', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'capability': '0x421', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'connected_time': '0', 'tx_bytes': '229', 'aid': '1', 'tx_packets': '4', 'ht_caps_info': '0x1076'} stats3: {'ht_mcs_bitmask': 'ffff0000000000000000', 'listen_interval': '5', 'rx_packets': '10', 'timeout_next': 'NULLFUNC POLL', 'ext_capab': '04000a02014000400001', 'addr': '02:00:00:00:00:00', 'rx_bytes': '3448', 'tx_rate_info': '585 mcs 6', 'signal': '-30', 'inactive_msec': '10', 'rx_rate_info': '650 mcs 7', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'capability': '0x421', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'connected_time': '0', 'tx_bytes': '1782', 'aid': '1', 'tx_packets': '6', 'ht_caps_info': '0x1076'} PASS ap_open_sta_statistics 0.990526 2019-02-18 03:48:41.535840 passed all 1 test case(s) 2019-02-18 03:48:41 ./run-tests.py ap_open_start_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_start_disabled 1/1 Test: AP with open mode and beaconing disabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_start_disabled 0.716674 2019-02-18 03:48:42.688999 passed all 1 test case(s) 2019-02-18 03:48:42 ./run-tests.py ap_open_start_disabled2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_start_disabled2 1/1 Test: AP with open mode and beaconing disabled (2) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_start_disabled2 1.079394 2019-02-18 03:48:44.253009 passed all 1 test case(s) 2019-02-18 03:48:44 ./run-tests.py ap_open_tdls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls 1/1 Test: Open AP and two stations using TDLS Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Teardown TDLS Setup TDLS Teardown TDLS PASS ap_open_tdls 7.216686 2019-02-18 03:48:51.943189 passed all 1 test case(s) 2019-02-18 03:48:52 ./run-tests.py ap_open_tdls_external_control DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_external_control 1/1 Test: TDLS and tdls_external_control Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_open_tdls_external_control 0.731239 2019-02-18 03:48:53.299147 passed all 1 test case(s) 2019-02-18 03:48:53 ./run-tests.py ap_open_tdls_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht 1/1 Test: Open AP and two stations using TDLS Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Teardown TDLS Setup TDLS Teardown TDLS PASS ap_open_tdls_vht 6.735755 2019-02-18 03:49:00.475475 passed all 1 test case(s) 2019-02-18 03:49:00 ./run-tests.py ap_open_tdls_vht160 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht160 1/1 Test: Open AP and two stations using TDLS with VHT 160 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Station dump on dev[0]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 33 ms rx bytes: 150405 rx packets: 170 tx bytes: 64712 tx packets: 54 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 25 rx drop misc: 30 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 54 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 25 rx drop misc: 0 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds Station dump on dev[1]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 37 ms rx bytes: 150405 rx packets: 170 tx bytes: 64712 tx packets: 54 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 25 rx drop misc: 30 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 58 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 25 rx drop misc: 0 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds PASS ap_open_tdls_vht160 3.651131 2019-02-18 03:49:04.716265 passed all 1 test case(s) 2019-02-18 03:49:04 ./run-tests.py ap_open_tdls_vht80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht80 1/1 Test: Open AP and two stations using TDLS with VHT 80 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Station dump on dev[0]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 43 ms rx bytes: 150306 rx packets: 169 tx bytes: 64624 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 25 rx drop misc: 29 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 100 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 25 rx drop misc: 0 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds Station dump on dev[1]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 65 ms rx bytes: 150306 rx packets: 169 tx bytes: 64624 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 25 rx drop misc: 29 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 122 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 25 rx drop misc: 0 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds PASS ap_open_tdls_vht80 3.933894 2019-02-18 03:49:09.148975 passed all 1 test case(s) 2019-02-18 03:49:09 ./run-tests.py ap_open_tdls_vht80plus80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht80plus80 1/1 Test: Open AP and two stations using TDLS with VHT 80+80 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Station dump on dev[0]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 44 ms rx bytes: 150703 rx packets: 173 tx bytes: 64624 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 27 rx drop misc: 29 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 71 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 27 rx drop misc: 0 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds Station dump on dev[1]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 49 ms rx bytes: 150703 rx packets: 173 tx bytes: 64624 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 27 rx drop misc: 29 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 76 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 27 rx drop misc: 0 signal: -30 dBm signal avg: -30 dBm beacon signal avg: 226 dBm tx bitrate: 6.5 MBit/s MCS 0 rx bitrate: 6.5 MBit/s MCS 0 authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds PASS ap_open_tdls_vht80plus80 4.15715 2019-02-18 03:49:13.840598 passed all 1 test case(s) 2019-02-18 03:49:13 ./run-tests.py ap_open_unexpected_assoc_event DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_unexpected_assoc_event 1/1 Test: AP with open mode and unexpected association event Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_unexpected_assoc_event 1.013542 2019-02-18 03:49:15.422983 passed all 1 test case(s) 2019-02-18 03:49:15 ./run-tests.py ap_open_unknown_action DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_unknown_action 1/1 Test: AP with open mode configuration and unknown Action frame Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_unknown_action 0.466839 2019-02-18 03:49:16.376144 passed all 1 test case(s) 2019-02-18 03:49:16 ./run-tests.py ap_open_wpas_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_wpas_in_bridge 1/1 Test: Open mode AP and wpas interface in a bridge Starting AP wlan3 Ignore expected interface_add failure due to missing bridge interface: Failed to add a dynamic wpa_supplicant interface Connect STA wlan5 to AP PASS ap_open_wpas_in_bridge 0.793123 2019-02-18 03:49:17.652060 passed all 1 test case(s) 2019-02-18 03:49:17 ./run-tests.py ap_pmf_assoc_comeback DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_assoc_comeback 1/1 Test: WPA2-PSK AP with PMF association comeback Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_assoc_comeback 1.846603 2019-02-18 03:49:19.954055 passed all 1 test case(s) 2019-02-18 03:49:20 ./run-tests.py ap_pmf_assoc_comeback2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_assoc_comeback2 1/1 Test: WPA2-PSK AP with PMF association comeback (using DROP_SA) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_assoc_comeback2 1.942487 2019-02-18 03:49:22.519084 passed all 1 test case(s) 2019-02-18 03:49:22 ./run-tests.py ap_pmf_inject_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_inject_auth 1/1 Test: WPA2-PSK AP with PMF and Authentication frame injection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_inject_auth 0.475774 2019-02-18 03:49:23.596880 passed all 1 test case(s) 2019-02-18 03:49:23 ./run-tests.py ap_pmf_negative DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_negative 1/1 Test: WPA2-PSK AP without PMF (negative test) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_negative 10.580822 2019-02-18 03:49:34.679440 passed all 1 test case(s) 2019-02-18 03:49:34 ./run-tests.py ap_pmf_optional DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_optional 1/1 Test: WPA2-PSK AP with PMF optional Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_optional 0.739529 2019-02-18 03:49:35.842875 passed all 1 test case(s) 2019-02-18 03:49:35 ./run-tests.py ap_pmf_optional_2akm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_optional_2akm 1/1 Test: WPA2-PSK AP with PMF optional (2 AKMs) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_optional_2akm 0.756945 2019-02-18 03:49:37.088057 passed all 1 test case(s) 2019-02-18 03:49:37 ./run-tests.py ap_pmf_optional_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_optional_eap 1/1 Test: WPA2EAP AP with PMF optional Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_optional_eap 0.734661 2019-02-18 03:49:38.260818 passed all 1 test case(s) 2019-02-18 03:49:38 ./run-tests.py ap_pmf_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_required 1/1 Test: WPA2-PSK AP with PMF required Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_required 0.832322 2019-02-18 03:49:39.540459 passed all 1 test case(s) 2019-02-18 03:49:39 ./run-tests.py ap_pmf_required_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_required_eap 1/1 Test: WPA2-EAP AP with PMF required Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_required_eap 0.688298 2019-02-18 03:49:40.722560 passed all 1 test case(s) 2019-02-18 03:49:40 ./run-tests.py ap_pmf_required_sha1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_required_sha1 1/1 Test: WPA2-PSK AP with PMF required with SHA1 AKM Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_required_sha1 0.501929 2019-02-18 03:49:41.683135 passed all 1 test case(s) 2019-02-18 03:49:41 ./run-tests.py ap_pmf_required_sta_no_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_required_sta_no_pmf 1/1 Test: WPA2-PSK AP with PMF required and PMF disabled on STA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_required_sta_no_pmf 0.521766 2019-02-18 03:49:42.635987 passed all 1 test case(s) 2019-02-18 03:49:42 ./run-tests.py ap_pmf_sta_sa_query DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query 1/1 Test: WPA2-PSK AP with station using SA Query Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query 2.876061 2019-02-18 03:49:45.994251 passed all 1 test case(s) 2019-02-18 03:49:46 ./run-tests.py ap_pmf_sta_sa_query_local_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_local_failure 1/1 Test: WPA2-PSK AP with station using SA Query (local failure) Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_local_failure 1.023772 2019-02-18 03:49:47.517876 passed all 1 test case(s) 2019-02-18 03:49:47 ./run-tests.py ap_pmf_sta_sa_query_no_response DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_no_response 1/1 Test: WPA2-PSK AP with station using SA Query and getting no response Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_no_response 4.428357 2019-02-18 03:49:52.652890 passed all 1 test case(s) 2019-02-18 03:49:52 ./run-tests.py ap_pmf_sta_sa_query_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_oom 1/1 Test: WPA2-PSK AP with station using SA Query (OOM) Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_oom 1.088031 2019-02-18 03:49:54.243853 passed all 1 test case(s) 2019-02-18 03:49:54 ./run-tests.py ap_pmf_sta_unprot_deauth_burst DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_unprot_deauth_burst 1/1 Test: WPA2-PSK AP with station receiving burst of unprotected Deauthentication frames Connect STA wlan0 to AP PASS ap_pmf_sta_unprot_deauth_burst 13.33517 2019-02-18 03:50:08.062647 passed all 1 test case(s) 2019-02-18 03:50:08 ./run-tests.py ap_pmf_tkip_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_tkip_reject 1/1 Test: Mixed mode BSS and MFP-enabled AP rejecting TKIP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_pmf_tkip_reject 1.675624 2019-02-18 03:50:10.533035 passed all 1 test case(s) 2019-02-18 03:50:10 ./run-tests.py ap_pmf_toggle DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_toggle 1/1 Test: WPA2-PSK AP with PMF optional and changing PMF on reassociation Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_toggle 1.089346 2019-02-18 03:50:12.194528 passed all 1 test case(s) 2019-02-18 03:50:12 ./run-tests.py ap_qosmap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap 1/1 Test: QoS mapping Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap 1.501566 2019-02-18 03:50:14.306758 passed all 1 test case(s) 2019-02-18 03:50:14 ./run-tests.py ap_qosmap_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_default 1/1 Test: QoS mapping with default values Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap_default 1.316463 2019-02-18 03:50:16.189782 passed all 1 test case(s) 2019-02-18 03:50:16 ./run-tests.py ap_qosmap_default_acm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_default_acm 1/1 Test: QoS mapping with default values and ACM=1 for VO/VI Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap_default_acm 1.281505 2019-02-18 03:50:18.165012 passed all 1 test case(s) 2019-02-18 03:50:18 ./run-tests.py ap_qosmap_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_invalid 1/1 Test: QoS mapping ctrl_iface error handling Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap_invalid 0.620016 2019-02-18 03:50:19.658660 passed all 1 test case(s) 2019-02-18 03:50:19 ./run-tests.py ap_reassociation_to_same_bss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_reassociation_to_same_bss 1/1 Test: Reassociate to the same BSS Starting AP wlan3 Connect STA wlan0 to AP PASS ap_reassociation_to_same_bss 10.23471 2019-02-18 03:50:30.490735 passed all 1 test case(s) 2019-02-18 03:50:30 ./run-tests.py ap_reconnect_auth_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_reconnect_auth_timeout 1/1 Test: Reconnect to 2nd AP and authentication times out Starting AP wlan3 Connect STA wlan5 to AP Starting AP wlan4 Wait ~10s for auth timeout... PASS ap_reconnect_auth_timeout 11.801595 2019-02-18 03:50:42.870953 passed all 1 test case(s) 2019-02-18 03:50:42 ./run-tests.py ap_remove_during_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_acs 1/1 Test: Remove interface during ACS Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Removing BSS wlan3 PASS ap_remove_during_acs 7.360816 2019-02-18 03:50:50.758836 passed all 1 test case(s) 2019-02-18 03:50:50 ./run-tests.py ap_remove_during_acs2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_acs2 1/1 Test: Remove BSS during ACS in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Removing BSS wlan3 PASS ap_remove_during_acs2 0.773318 2019-02-18 03:50:52.285577 passed all 1 test case(s) 2019-02-18 03:50:52 ./run-tests.py ap_remove_during_acs3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_acs3 1/1 Test: Remove second BSS during ACS in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Removing BSS wlan3-2 PASS ap_remove_during_acs3 0.706935 2019-02-18 03:50:53.825074 passed all 1 test case(s) 2019-02-18 03:50:53 ./run-tests.py ap_remove_during_ht_coex_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_ht_coex_scan 1/1 Test: Remove interface during HT co-ex scan Starting AP wlan3 Removing BSS wlan3 PASS ap_remove_during_ht_coex_scan 1.761081 2019-02-18 03:50:56.324913 passed all 1 test case(s) 2019-02-18 03:50:56 ./run-tests.py ap_remove_during_ht_coex_scan2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_ht_coex_scan2 1/1 Test: Remove BSS during HT co-ex scan in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3 PASS ap_remove_during_ht_coex_scan2 0.297697 2019-02-18 03:50:57.365153 passed all 1 test case(s) 2019-02-18 03:50:57 ./run-tests.py ap_remove_during_ht_coex_scan3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_ht_coex_scan3 1/1 Test: Remove second BSS during HT co-ex scan in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3-2 PASS ap_remove_during_ht_coex_scan3 0.287574 2019-02-18 03:50:58.504939 passed all 1 test case(s) 2019-02-18 03:50:58 ./run-tests.py ap_require_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_require_ht 1/1 Test: Require HT Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan2 to AP PASS ap_require_ht 6.152003 2019-02-18 03:51:05.399988 passed all 1 test case(s) 2019-02-18 03:51:05 ./run-tests.py ap_require_ht_limited_rates DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_require_ht_limited_rates 1/1 Test: Require HT with limited supported rates Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ap_require_ht_limited_rates 5.709097 2019-02-18 03:51:12.178598 passed all 1 test case(s) 2019-02-18 03:51:12 ./run-tests.py ap_roam_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_open 1/1 Test: Roam between two open APs Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_roam_open 16.610558 2019-02-18 03:51:29.945006 passed all 1 test case(s) 2019-02-18 03:51:30 ./run-tests.py ap_roam_open_failed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_open_failed 1/1 Test: Roam failure due to rejected authentication Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_roam_open_failed 1.610171 2019-02-18 03:51:32.504307 passed all 1 test case(s) 2019-02-18 03:51:32 ./run-tests.py ap_roam_set_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_set_bssid 1/1 Test: Roam control Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_roam_set_bssid 0.987355 2019-02-18 03:51:34.254787 passed all 1 test case(s) 2019-02-18 03:51:34 ./run-tests.py ap_roam_with_reassoc_auth_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_with_reassoc_auth_timeout 1/1 Test: Roam using reassoc between two APs and authentication times out Starting AP wlan3 Connect STA wlan5 to AP Starting AP wlan4 Wait ~10s for auth timeout... PASS ap_roam_with_reassoc_auth_timeout 12.445467 2019-02-18 03:51:47.578201 passed all 1 test case(s) 2019-02-18 03:51:47 ./run-tests.py ap_roam_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_wpa2_psk 1/1 Test: Roam between two WPA2-PSK APs Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_roam_wpa2_psk 17.391712 2019-02-18 03:52:06.129840 passed all 1 test case(s) 2019-02-18 03:52:06 ./run-tests.py ap_roam_wpa2_psk_failed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_wpa2_psk_failed 1/1 Test: Roam failure with WPA2-PSK AP due to wrong passphrase Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_roam_wpa2_psk_failed 5.745806 2019-02-18 03:52:12.834889 passed all 1 test case(s) 2019-02-18 03:52:12 ./run-tests.py ap_roam_wpa2_psk_race DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_wpa2_psk_race 1/1 Test: Roam between two WPA2-PSK APs and try to hit a disconnection race Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_roam_wpa2_psk_race 4.286711 2019-02-18 03:52:18.119818 passed all 1 test case(s) 2019-02-18 03:52:18 ./run-tests.py ap_short_preamble DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_short_preamble 1/1 Test: Open AP with short preamble Starting AP wlan3 Connect STA wlan0 to AP PASS ap_short_preamble 0.702471 2019-02-18 03:52:19.815715 passed all 1 test case(s) 2019-02-18 03:52:19 ./run-tests.py ap_spectrum_management_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_spectrum_management_required 1/1 Test: Open AP with spectrum management required Starting AP wlan3 Connect STA wlan0 to AP PASS ap_spectrum_management_required 0.881917 2019-02-18 03:52:21.703931 passed all 1 test case(s) 2019-02-18 03:52:21 ./run-tests.py ap_tdls_chan_switch_prohibit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_chan_switch_prohibit 1/1 Test: Open AP and TDLS channel switch prohibited Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS PASS ap_tdls_chan_switch_prohibit 2.594155 2019-02-18 03:52:25.101262 passed all 1 test case(s) 2019-02-18 03:52:25 ./run-tests.py ap_tdls_discovery DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_discovery 1/1 Test: WPA2-PSK AP and two stations using TDLS discovery Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_tdls_discovery 1.54158 2019-02-18 03:52:27.343200 passed all 1 test case(s) 2019-02-18 03:52:27 ./run-tests.py ap_tdls_link_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_link_status 1/1 Test: Check TDLS link status between two stations Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP wlan0: TDLS link status: peer does not exist wlan1: TDLS link status: peer does not exist Setup TDLS wlan0: TDLS link status: connected wlan1: TDLS link status: connected Teardown TDLS wlan0: TDLS link status: peer does not exist wlan1: TDLS link status: peer does not exist PASS ap_tdls_link_status 3.883501 2019-02-18 03:52:31.930046 passed all 1 test case(s) 2019-02-18 03:52:32 ./run-tests.py ap_tdls_prohibit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_prohibit 1/1 Test: Open AP and TDLS prohibited Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_tdls_prohibit 1.340085 2019-02-18 03:52:34.333396 passed all 1 test case(s) 2019-02-18 03:52:34 ./run-tests.py ap_track_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta 1/1 Test: Dualband AP tracking unconnected stations Starting AP wlan3 Starting AP wlan4 PASS ap_track_sta 3.278663 2019-02-18 03:52:38.424321 passed all 1 test case(s) 2019-02-18 03:52:38 ./run-tests.py ap_track_sta_force_2ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_force_2ghz 1/1 Test: Dualband AP forcing dualband STA to connect on 2.4 GHz Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_track_sta_force_2ghz 1.66752 2019-02-18 03:52:40.984266 passed all 1 test case(s) 2019-02-18 03:52:41 ./run-tests.py ap_track_sta_force_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_force_5ghz 1/1 Test: Dualband AP forcing dualband STA to connect on 5 GHz Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_track_sta_force_5ghz 1.232844 2019-02-18 03:52:42.834494 passed all 1 test case(s) 2019-02-18 03:52:42 ./run-tests.py ap_track_sta_no_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_no_auth 1/1 Test: Dualband AP rejecting authentication from dualband STA on 2.4 GHz Starting AP wlan3 Starting AP wlan4 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ap_track_sta_no_auth 1.321395 2019-02-18 03:52:45.095514 passed all 1 test case(s) 2019-02-18 03:52:45 ./run-tests.py ap_track_sta_no_auth_passive DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_no_auth_passive 1/1 Test: AP rejecting authentication from dualband STA on 2.4 GHz (passive) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_track_sta_no_auth_passive 1.383806 2019-02-18 03:52:47.236338 passed all 1 test case(s) 2019-02-18 03:52:47 ./run-tests.py ap_track_sta_no_probe_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_no_probe_resp 1/1 Test: Dualband AP not replying to probes from dualband STA on 2.4 GHz Starting AP wlan3 Starting AP wlan4 PASS ap_track_sta_no_probe_resp 1.290614 2019-02-18 03:52:49.379728 passed all 1 test case(s) 2019-02-18 03:52:49 ./run-tests.py ap_track_taxonomy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_taxonomy 1/1 Test: AP tracking STA taxonomy Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan5 to AP sta0: wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:_|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001 sta1: wifi4|probe:0,1,50,3,45,127,114,255,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001 sta: wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:track_test|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001 Connect STA wlan2 to AP sta2: wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:_|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2437 -30 [ESS] track flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2437 -30 [ESS] track flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2437 -30 [ESS] track PASS ap_track_taxonomy 3.6158 2019-02-18 03:52:54.032243 passed all 1 test case(s) 2019-02-18 03:52:54 ./run-tests.py ap_tx_queue_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tx_queue_params 1/1 Test: Open AP with TX queue params set Starting AP wlan3 Connect STA wlan0 to AP PASS ap_tx_queue_params 0.902553 2019-02-18 03:52:55.662101 passed all 1 test case(s) 2019-02-18 03:52:55 ./run-tests.py ap_tx_queue_params_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tx_queue_params_invalid 1/1 Test: Invalid TX queue params set (cwmin/cwmax) Starting AP wlan3 PASS ap_tx_queue_params_invalid 0.612112 2019-02-18 03:52:56.962271 passed all 1 test case(s) 2019-02-18 03:52:57 ./run-tests.py ap_vendor_elements DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vendor_elements 1/1 Test: WPA2-PSK AP with vendor elements added Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vendor_elements 1.113925 2019-02-18 03:52:59.048956 passed all 1 test case(s) ignored_by_lkp ap_vht160 2019-02-18 03:52:59 ./run-tests.py ap_vht160_no_dfs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs 1/1 Test: VHT with 160 MHz channel width and no DFS (104 minus) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht160_no_dfs 1.453284 2019-02-18 03:53:01.472052 passed all 1 test case(s) 2019-02-18 03:53:01 ./run-tests.py ap_vht160_no_dfs_100_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_100_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (100 plus) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht160_no_dfs_100_plus 1.529072 2019-02-18 03:53:04.038338 passed all 1 test case(s) 2019-02-18 03:53:04 ./run-tests.py ap_vht160_no_dfs_108_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_108_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (108 plus) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht160_no_dfs_108_plus 1.368689 2019-02-18 03:53:06.085228 passed all 1 test case(s) 2019-02-18 03:53:06 ./run-tests.py ap_vht160_no_dfs_112_minus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_112_minus 1/1 Test: VHT with 160 MHz channel width and no DFS (112 minus) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht160_no_dfs_112_minus 1.308186 2019-02-18 03:53:08.216280 passed all 1 test case(s) 2019-02-18 03:53:08 ./run-tests.py ap_vht160_no_dfs_116_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_116_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (116 plus) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht160_no_dfs_116_plus 1.319312 2019-02-18 03:53:10.347411 passed all 1 test case(s) 2019-02-18 03:53:10 ./run-tests.py ap_vht160_no_dfs_120_minus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_120_minus 1/1 Test: VHT with 160 MHz channel width and no DFS (120 minus) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht160_no_dfs_120_minus 1.265689 2019-02-18 03:53:12.308748 passed all 1 test case(s) 2019-02-18 03:53:12 ./run-tests.py ap_vht160_no_dfs_124_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_124_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (124 plus) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht160_no_dfs_124_plus 1.289689 2019-02-18 03:53:14.594918 passed all 1 test case(s) 2019-02-18 03:53:14 ./run-tests.py ap_vht160_no_dfs_128_minus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_128_minus 1/1 Test: VHT with 160 MHz channel width and no DFS (128 minus) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht160_no_dfs_128_minus 1.26795 2019-02-18 03:53:16.726790 passed all 1 test case(s) 2019-02-18 03:53:16 ./run-tests.py ap_vht160_no_ht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_ht40 1/1 Test: VHT with 160 MHz channel width and HT40 disabled Starting AP wlan3 PASS ap_vht160_no_ht40 0.298702 2019-02-18 03:53:17.937075 passed all 1 test case(s) 2019-02-18 03:53:18 ./run-tests.py ap_vht160b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160b 1/1 Test: VHT with 160 MHz channel width (2) Starting AP wlan4 Waiting for CAC to complete Connect STA wlan0 to AP PASS ap_vht160b 63.447712 2019-02-18 03:54:22.289042 passed all 1 test case(s) 2019-02-18 03:54:22 ./run-tests.py ap_vht80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80 1/1 Test: VHT with 80 MHz channel width Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'olbc_ht': '0', 'cac_time_left_seconds': 'N/A', 'num_sta_no_short_slot_time': '1', 'vht_caps_info': '00000000', 'olbc': '0', 'vht_oper_centr_freq_seg0_idx': '42', 'num_sta_non_erp': '0', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'ht_op_mode': '0x0', 'tx_vht_mcs_map': 'aaaa', 'state': 'ENABLED', 'vht_oper_centr_freq_seg1_idx': '0', 'num_sta_ht40_intolerant': '0', 'channel': '36', 'ht_mcs_bitmask': 'ffff0000000000000000', 'vht_oper_chwidth': '1', 'bssid[0]': '02:00:00:00:03:00', 'ieee80211n': '1', 'cac_time_seconds': '0', 'num_sta[0]': '1', 'ieee80211ac': '1', 'phy': 'phy3', 'max_txpower': '23', 'num_sta_ht_no_gf': '0', 'freq': '5180', 'num_sta_ht_20_mhz': '0', 'num_sta_no_short_preamble': '1', 'secondary_channel': '1', 'rx_vht_mcs_map': 'aaaa', 'ssid[0]': 'vht', 'dtim_period': '2', 'beacon_int': '100', 'num_sta_no_ht': '0', 'bss[0]': 'wlan3', 'ht_caps_info': '000e'} hostapd STA: {'connected_time': '0', 'vht_caps_info': '0x038004fa', 'capability': '0x1', 'addr': '02:00:00:00:00:00', 'rx_vht_mcs_map': 'aaaa', 'supp_op_classes': '73515354737475767778797a7b808182', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'tx_vht_mcs_map': 'aaaa', 'tx_packets': '6', 'ht_mcs_bitmask': 'ffff0000000000000000', 'rx_packets': '10', 'ext_capab': '04000a02014000400001', 'rx_rate_info': '1300 vhtmcs 7 vhtnss 2', 'tx_bytes': '1797', 'tx_rate_info': '65 mcs 0', 'timeout_next': 'NULLFUNC POLL', 'rx_bytes': '3367', 'signal': '-30', 'inactive_msec': '15', 'listen_interval': '5', 'flags': '[AUTH][ASSOC][AUTHORIZED][WMM][HT][VHT]', 'aid': '1', 'ht_caps_info': '0x1076'} PASS ap_vht80 0.827731 2019-02-18 03:54:23.642805 passed all 1 test case(s) 2019-02-18 03:54:23 ./run-tests.py ap_vht80_csa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_csa 1/1 Test: VHT with 80 MHz channel width and CSA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht80_csa 3.670639 2019-02-18 03:54:27.866965 passed all 1 test case(s) 2019-02-18 03:54:27 ./run-tests.py ap_vht80_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_invalid 1/1 Test: VHT with invalid 80 MHz channel configuration (seg1) Starting AP wlan3 PASS ap_vht80_invalid 0.414459 2019-02-18 03:54:28.658308 passed all 1 test case(s) 2019-02-18 03:54:28 ./run-tests.py ap_vht80_invalid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_invalid2 1/1 Test: VHT with invalid 80 MHz channel configuration (seg0) Starting AP wlan3 PASS ap_vht80_invalid2 0.407354 2019-02-18 03:54:29.619404 passed all 1 test case(s) 2019-02-18 03:54:29 ./run-tests.py ap_vht80_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_params 1/1 Test: VHT with 80 MHz channel width and number of optional features enabled Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ap_vht80_params 0.978619 2019-02-18 03:54:31.087551 passed all 1 test case(s) 2019-02-18 03:54:31 ./run-tests.py ap_vht80_pwr_constraint DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_pwr_constraint 1/1 Test: VHT with 80 MHz channel width and local power constraint Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht80_pwr_constraint 0.760777 2019-02-18 03:54:32.340006 passed all 1 test case(s) 2019-02-18 03:54:32 ./run-tests.py ap_vht80_to_24g_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_to_24g_ht 1/1 Test: VHT with 80 MHz channel width reconfigured to 2.4 GHz HT Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht80_to_24g_ht 0.956588 2019-02-18 03:54:33.780176 passed all 1 test case(s) 2019-02-18 03:54:33 ./run-tests.py ap_vht80b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80b 1/1 Test: VHT with 80 MHz channel width (HT40- channel 40) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht80b 0.968629 2019-02-18 03:54:35.292958 passed all 1 test case(s) 2019-02-18 03:54:35 ./run-tests.py ap_vht80c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80c 1/1 Test: VHT with 80 MHz channel width (HT40+ channel 44) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht80c 0.949574 2019-02-18 03:54:36.726849 passed all 1 test case(s) 2019-02-18 03:54:36 ./run-tests.py ap_vht80d DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80d 1/1 Test: VHT with 80 MHz channel width (HT40- channel 48) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht80d 1.053612 2019-02-18 03:54:38.260818 passed all 1 test case(s) 2019-02-18 03:54:38 ./run-tests.py ap_vht80plus80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80plus80 1/1 Test: VHT with 80+80 MHz channel width Starting AP wlan3 Starting AP wlan4 Connect STA wlan1 to AP PASS ap_vht80plus80 1.194404 2019-02-18 03:54:39.994603 passed all 1 test case(s) 2019-02-18 03:54:40 ./run-tests.py ap_vht80plus80_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80plus80_invalid 1/1 Test: VHT with invalid 80+80 MHz channel Starting AP wlan3 PASS ap_vht80plus80_invalid 0.468483 2019-02-18 03:54:40.909884 passed all 1 test case(s) 2019-02-18 03:54:40 ./run-tests.py ap_vht_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_20 1/1 Test: VHT and 20 MHz channel Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht_20 0.616448 2019-02-18 03:54:42.105781 passed all 1 test case(s) 2019-02-18 03:54:42 ./run-tests.py ap_vht_40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_40 1/1 Test: VHT and 40 MHz channel Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht_40 0.874736 2019-02-18 03:54:43.468565 passed all 1 test case(s) 2019-02-18 03:54:43 ./run-tests.py ap_vht_40_fallback_to_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_40_fallback_to_20 1/1 Test: VHT and 40 MHz channel configuration falling back to 20 MHz Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht_40_fallback_to_20 0.848963 2019-02-18 03:54:44.783780 passed all 1 test case(s) 2019-02-18 03:54:44 ./run-tests.py ap_vht_capab_not_supported DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_capab_not_supported 1/1 Test: VHT configuration with driver not supporting all vht_capab entries Starting AP wlan3 PASS ap_vht_capab_not_supported 0.151441 2019-02-18 03:54:45.378652 passed all 1 test case(s) 2019-02-18 03:54:45 ./run-tests.py ap_vht_csa_vht20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_csa_vht20 1/1 Test: VHT CSA with VHT20 getting enabled Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_vht_csa_vht20 2.649841 2019-02-18 03:54:48.507921 passed all 1 test case(s) 2019-02-18 03:54:48 ./run-tests.py ap_vht_csa_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_csa_vht40 1/1 Test: VHT CSA with VHT40 getting enabled Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_vht_csa_vht40 3.187669 2019-02-18 03:54:52.404297 passed all 1 test case(s) 2019-02-18 03:54:52 ./run-tests.py ap_vht_csa_vht40_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_csa_vht40_disable 1/1 Test: VHT CSA with VHT40 getting disabled Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_vht_csa_vht40_disable 3.062347 2019-02-18 03:54:56.469628 passed all 1 test case(s) 2019-02-18 03:54:56 ./run-tests.py ap_vht_on_24ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_on_24ghz 1/1 Test: Subset of VHT features on 2.4 GHz Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_vht_on_24ghz 1.5841 2019-02-18 03:54:58.908579 passed all 1 test case(s) 2019-02-18 03:54:59 ./run-tests.py ap_vht_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_tkip 1/1 Test: VHT and TKIP Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'olbc_ht': '0', 'cac_time_left_seconds': 'N/A', 'num_sta_no_short_slot_time': '1', 'olbc': '0', 'num_sta_non_erp': '0', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'ht_op_mode': '0x13', 'state': 'ENABLED', 'num_sta_ht40_intolerant': '0', 'channel': '36', 'bssid[0]': '02:00:00:00:03:00', 'ieee80211n': '0', 'cac_time_seconds': '0', 'num_sta[0]': '1', 'ieee80211ac': '0', 'phy': 'phy3', 'max_txpower': '23', 'num_sta_ht_no_gf': '0', 'freq': '5180', 'num_sta_ht_20_mhz': '0', 'num_sta_no_short_preamble': '1', 'secondary_channel': '0', 'ssid[0]': 'vht', 'dtim_period': '2', 'beacon_int': '100', 'num_sta_no_ht': '1', 'bss[0]': 'wlan3'} PASS ap_vht_tkip 1.818004 2019-02-18 03:55:01.709886 passed all 1 test case(s) 2019-02-18 03:55:01 ./run-tests.py ap_vht_use_sta_nsts DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_use_sta_nsts 1/1 Test: VHT with 80 MHz channel width and use_sta_nsts=1 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vht_use_sta_nsts 1.212397 2019-02-18 03:55:03.824251 passed all 1 test case(s) 2019-02-18 03:55:03 ./run-tests.py ap_vlan_file_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_file_open 1/1 Test: AP VLAN with open network and vlan_file mapping Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_file_open 2.172376 2019-02-18 03:55:06.670709 passed all 1 test case(s) 2019-02-18 03:55:06 ./run-tests.py ap_vlan_file_open2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_file_open2 1/1 Test: AP VLAN with open network and vlan_file mapping (2) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_file_open2 1.834327 2019-02-18 03:55:09.166559 passed all 1 test case(s) 2019-02-18 03:55:09 ./run-tests.py ap_vlan_file_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_file_parsing 1/1 Test: hostapd vlan_file/mac_file parsing Starting AP wlan3 PASS ap_vlan_file_parsing 0.617818 2019-02-18 03:55:10.321704 passed all 1 test case(s) 2019-02-18 03:55:10 ./run-tests.py ap_vlan_iface_cleanup_multibss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_iface_cleanup_multibss 1/1 Test: AP VLAN operation in multi-BSS multi-VLAN case RTNETLINK answers: File exists Starting AP wlan4 Starting interface wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP wlan0 -> VLAN 2 test wlan1 == VLAN 1 wlan1 -> VLAN 2 test wlan0 == VLAN 2 PASS ap_vlan_iface_cleanup_multibss 6.159491 2019-02-18 03:55:17.360016 passed all 1 test case(s) 2019-02-18 03:55:17 ./run-tests.py ap_vlan_iface_cleanup_multibss_per_sta_vif DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_iface_cleanup_multibss_per_sta_vif 1/1 Test: AP VLAN operation in multi-BSS multi-VLAN case with per-sta-vif set Starting AP wlan4 Starting interface wlan3 Connect STA wlan0 to AP dev1->dev2 unicast data delivery failed Traceback (most recent call last): File "./run-tests.py", line 466, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 505, in test_ap_vlan_iface_cleanup_multibss_per_sta_vif 'multi-bss-iface-per_sta_vif.conf') File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 404, in ap_vlan_iface_cleanup_multibss hwsim_utils.test_connectivity_iface(dev[0], hapd, "brvlan1") File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 176, in test_connectivity_iface max_tries=max_tries, timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 169, in test_connectivity raise Exception(last_err) Exception: dev1->dev2 unicast data delivery failed FAIL ap_vlan_iface_cleanup_multibss_per_sta_vif 7.965708 2019-02-18 03:55:25.909762 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vlan_iface_cleanup_multibss_per_sta_vif 2019-02-18 03:55:26 ./run-tests.py ap_vlan_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_open 1/1 Test: AP VLAN with open network Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_open 2.102242 2019-02-18 03:55:28.763859 passed all 1 test case(s) 2019-02-18 03:55:28 ./run-tests.py ap_vlan_open_per_sta_vif DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_open_per_sta_vif 1/1 Test: AP VLAN (dynamic) with open network Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vlan_open_per_sta_vif 0.847503 2019-02-18 03:55:30.465482 passed all 1 test case(s) 2019-02-18 03:55:30 ./run-tests.py ap_vlan_reconnect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_reconnect 1/1 Test: AP VLAN with WPA2-PSK connect, disconnect, connect Starting AP wlan3 connect sta Connect STA wlan0 to AP disconnect sta reconnect sta Connect STA wlan0 to AP PASS ap_vlan_reconnect 2.54459 2019-02-18 03:55:33.672956 passed all 1 test case(s) 2019-02-18 03:55:33 ./run-tests.py ap_vlan_tagged DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_tagged 1/1 Test: AP VLAN with tagged interface Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_tagged 2.285961 2019-02-18 03:55:36.723342 passed all 1 test case(s) 2019-02-18 03:55:36 ./run-tests.py ap_vlan_tagged_wpa2_radius_id_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_tagged_wpa2_radius_id_change 1/1 Test: AP tagged VLAN with WPA2-Enterprise and RADIUS attributes changing VLANID Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP VLAN-ID -> 2 VLAN-ID -> 1 PASS ap_vlan_tagged_wpa2_radius_id_change 4.797598 2019-02-18 03:55:42.210015 passed all 1 test case(s) 2019-02-18 03:55:42 ./run-tests.py ap_vlan_without_station DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_without_station 1/1 Test: AP VLAN with WPA2-PSK and no station Starting AP wlan3 Connect STA wlan0 to AP first frame not observed second frame not observed Traceback (most recent call last): File "./run-tests.py", line 464, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 569, in test_ap_vlan_without_station raise Exception("second frame not observed") Exception: second frame not observed FAIL ap_vlan_without_station 3.525371 2019-02-18 03:55:46.600545 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vlan_without_station 2019-02-18 03:55:46 ./run-tests.py ap_vlan_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2 1/1 Test: AP VLAN with WPA2-PSK Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_wpa2 1.968433 2019-02-18 03:55:49.347561 passed all 1 test case(s) 2019-02-18 03:55:49 ./run-tests.py ap_vlan_wpa2_psk_radius_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_psk_radius_required 1/1 Test: AP VLAN with WPA2-PSK and RADIUS attributes required Starting AP wlan3 connecting without VLAN Connect STA wlan0 to AP Received authentication request connecting without VLAN failed as expected connecting without VLAN (CUI/User-Name) Connect STA wlan1 to AP Received authentication request connecting without VLAN failed as expected(2) connecting with VLAN Connect STA wlan2 to AP Received authentication request connecting with VLAN succeeded as expected PASS ap_vlan_wpa2_psk_radius_required 6.585046 2019-02-18 03:55:56.784261 passed all 1 test case(s) 2019-02-18 03:55:56 ./run-tests.py ap_vlan_wpa2_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius 1/1 Test: AP VLAN with WPA2-Enterprise and RADIUS attributes Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_wpa2_radius 2.196264 2019-02-18 03:55:59.592897 passed all 1 test case(s) 2019-02-18 03:55:59 ./run-tests.py ap_vlan_wpa2_radius_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_2 1/1 Test: AP VLAN with WPA2-Enterprise and RADIUS EGRESS_VLANID attributes Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vlan_wpa2_radius_2 1.22128 2019-02-18 03:56:01.344570 passed all 1 test case(s) 2019-02-18 03:56:01 ./run-tests.py ap_vlan_wpa2_radius_id_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_id_change 1/1 Test: AP VLAN with WPA2-Enterprise and RADIUS attributes changing VLANID Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP VLAN-ID -> 2 VLAN-ID -> 1 PASS ap_vlan_wpa2_radius_id_change 3.514212 2019-02-18 03:56:05.460140 passed all 1 test case(s) 2019-02-18 03:56:05 ./run-tests.py ap_vlan_wpa2_radius_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_mixed 1/1 Test: AP VLAN with WPA2-Enterprise and tagged+untagged VLANs Starting AP wlan3 Connect STA wlan0 to AP Test connectivity in untagged VLAN 2 Test connectivity in tagged VLAN 1 PASS ap_vlan_wpa2_radius_mixed 1.822332 2019-02-18 03:56:08.176305 passed all 1 test case(s) 2019-02-18 03:56:08 ./run-tests.py ap_vlan_wpa2_radius_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_required 1/1 Test: AP VLAN with WPA2-Enterprise and RADIUS attributes required Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan2 to AP PASS ap_vlan_wpa2_radius_required 1.20929 2019-02-18 03:56:10.616721 passed all 1 test case(s) 2019-02-18 03:56:10 ./run-tests.py ap_vlan_wpa2_radius_tagged DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_tagged 1/1 Test: AP VLAN with WPA2-Enterprise and RADIUS EGRESS_VLANID attributes Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vlan_wpa2_radius_tagged 1.161304 2019-02-18 03:56:12.544577 passed all 1 test case(s) 2019-02-18 03:56:12 ./run-tests.py ap_wds_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wds_sta 1/1 Test: WPA2-PSK AP with STA using 4addr mode Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wds_sta 1.663096 2019-02-18 03:56:15.096223 passed all 1 test case(s) 2019-02-18 03:56:15 ./run-tests.py ap_wds_sta_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wds_sta_open 1/1 Test: Open AP with STA using 4addr mode Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wds_sta_open 1.436037 2019-02-18 03:56:17.319670 passed all 1 test case(s) 2019-02-18 03:56:17 ./run-tests.py ap_wds_sta_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wds_sta_wep 1/1 Test: WEP AP with STA using 4addr mode Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wds_sta_wep 1.453279 2019-02-18 03:56:19.754751 passed all 1 test case(s) 2019-02-18 03:56:19 ./run-tests.py ap_wep_tdls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wep_tdls 1/1 Test: WEP AP and two stations using TDLS Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Teardown TDLS Setup TDLS PASS ap_wep_tdls 5.21386 2019-02-18 03:56:25.945241 passed all 1 test case(s) 2019-02-18 03:56:26 ./run-tests.py ap_wep_to_wpa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wep_to_wpa 1/1 Test: WEP to WPA2-PSK configuration change in hostapd Starting AP wlan3 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WEP][ESS] wep-to-wpa Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wep_to_wpa 1.675087 2019-02-18 03:56:28.817724 passed all 1 test case(s) 2019-02-18 03:56:28 ./run-tests.py ap_wmm_uapsd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wmm_uapsd 1/1 Test: AP with U-APSD advertisement Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wmm_uapsd 0.680948 2019-02-18 03:56:30.498942 passed all 1 test case(s) 2019-02-18 03:56:30 ./run-tests.py ap_wowlan_triggers DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wowlan_triggers 1/1 Test: AP with wowlan_triggers Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wowlan_triggers 0.628063 2019-02-18 03:56:31.928285 passed all 1 test case(s) 2019-02-18 03:56:32 ./run-tests.py ap_wpa2_already_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_already_in_bridge 1/1 Test: hostapd behavior with interface already in bridge Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_already_in_bridge 1.060688 2019-02-18 03:56:33.867243 passed all 1 test case(s) 2019-02-18 03:56:33 ./run-tests.py ap_wpa2_bridge_fdb DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_bridge_fdb 1/1 Test: Bridge FDB entry removal Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_bridge_fdb 2.373252 2019-02-18 03:56:37.070589 passed all 1 test case(s) ignored_by_lkp ap_wpa2_delayed_group_m1_retransmission ignored_by_lkp ap_wpa2_delayed_m1_m3_retransmission ignored_by_lkp ap_wpa2_delayed_m1_m3_retransmission2 2019-02-18 03:56:37 ./run-tests.py ap_wpa2_delayed_m1_m3_zero_tk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_delayed_m1_m3_zero_tk 1/1 Test: Delayed M1+M3 retransmission and zero TK Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_delayed_m1_m3_zero_tk 1.980082 2019-02-18 03:56:40.026558 passed all 1 test case(s) ignored_by_lkp ap_wpa2_delayed_m3_retransmission 2019-02-18 03:56:40 ./run-tests.py ap_wpa2_disable_eapol_retry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_disable_eapol_retry 1/1 Test: WPA2-PSK disable EAPOL-Key retry Starting AP wlan3 Verify working 4-way handshake without retries Connect STA wlan0 to AP Verify no retransmission of message 3/4 Connect STA wlan0 to AP PASS ap_wpa2_disable_eapol_retry 5.06931 2019-02-18 03:56:45.674770 passed all 1 test case(s) 2019-02-18 03:56:45 ./run-tests.py ap_wpa2_disable_eapol_retry_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_disable_eapol_retry_group 1/1 Test: WPA2-PSK disable EAPOL-Key retry for group handshake Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ap_wpa2_disable_eapol_retry_group 6.40001 2019-02-18 03:56:52.860652 passed all 1 test case(s) 2019-02-18 03:56:52 ./run-tests.py ap_wpa2_eap_aka DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka 1/1 Test: WPA2-Enterprise connection using EAP-AKA Starting AP wlan3 Connect STA wlan0 to AP Negative test with incorrect key Connect STA wlan0 to AP Invalid Milenage key Connect STA wlan0 to AP Invalid Milenage key(2) Connect STA wlan0 to AP Invalid Milenage key(3) Connect STA wlan0 to AP Invalid Milenage key(4) Connect STA wlan0 to AP Invalid Milenage key(5) Connect STA wlan0 to AP Invalid Milenage key(6) Connect STA wlan0 to AP Missing key configuration Connect STA wlan0 to AP PASS ap_wpa2_eap_aka 3.102522 2019-02-18 03:56:56.708046 passed all 1 test case(s) 2019-02-18 03:56:56 ./run-tests.py ap_wpa2_eap_aka_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_config 1/1 Test: EAP-AKA configuration options Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_config 0.768344 2019-02-18 03:56:58.087304 passed all 1 test case(s) 2019-02-18 03:56:58 ./run-tests.py ap_wpa2_eap_aka_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_ext 1/1 Test: WPA2-Enterprise connection using EAP-AKA and external UMTS auth Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_ext 3.556318 2019-02-18 03:57:02.400173 passed all 1 test case(s) 2019-02-18 03:57:02 ./run-tests.py ap_wpa2_eap_aka_ext_auth_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_ext_auth_fail 1/1 Test: EAP-AKA with external UMTS auth and auth failing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_ext_auth_fail 0.611019 2019-02-18 03:57:03.830989 passed all 1 test case(s) 2019-02-18 03:57:03 ./run-tests.py ap_wpa2_eap_aka_prime DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime 1/1 Test: WPA2-Enterprise connection using EAP-AKA' Starting AP wlan3 Connect STA wlan0 to AP EAP-AKA' bidding protection when EAP-AKA enabled as well Connect STA wlan1 to AP Negative test with incorrect key Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_prime 1.632476 2019-02-18 03:57:06.456149 passed all 1 test case(s) 2019-02-18 03:57:06 ./run-tests.py ap_wpa2_eap_aka_prime_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime_ext 1/1 Test: EAP-AKA' with external UMTS auth to hit Synchronization-Failure Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_prime_ext 0.855597 2019-02-18 03:57:08.394548 passed all 1 test case(s) 2019-02-18 03:57:08 ./run-tests.py ap_wpa2_eap_aka_prime_ext_auth_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime_ext_auth_fail 1/1 Test: EAP-AKA' with external UMTS auth and auth failing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_prime_ext_auth_fail 0.687723 2019-02-18 03:57:09.967309 passed all 1 test case(s) ignored_by_lkp ap_wpa2_eap_aka_prime_sql 2019-02-18 03:57:10 ./run-tests.py ap_wpa2_eap_aka_sql DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_sql 1/1 Test: WPA2-Enterprise connection using EAP-AKA (SQL) Starting AP wlan3 Connect STA wlan0 to AP AKA fast re-authentication AKA full auth with pseudonym AKA full auth with permanent identity AKA reauth with mismatching MK Connect STA wlan0 to AP AKA reauth with mismatching counter Connect STA wlan0 to AP AKA reauth with max reauth count reached PASS ap_wpa2_eap_aka_sql 1.67753 2019-02-18 03:57:12.590868 passed all 1 test case(s) 2019-02-18 03:57:12 ./run-tests.py ap_wpa2_eap_assoc_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_assoc_rsn 1/1 Test: WPA2-Enterprise AP and association request RSN IE differences Starting AP wlan3 Starting AP wlan4 Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP Extra PMKIDCount field in RSN IE Connect STA wlan0 to AP Extra Group Management Cipher Suite in RSN IE Connect STA wlan0 to AP Extra undefined extension field in RSN IE Connect STA wlan0 to AP RSN IE without RSN Capabilities Connect STA wlan0 to AP RSN IE without AKM Connect STA wlan0 to AP RSN IE without pairwise Connect STA wlan0 to AP RSN IE without group Connect STA wlan0 to AP Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP Group management cipher included in assoc req RSN IE Connect STA wlan0 to AP Invalid group cipher Connect STA wlan0 to AP Invalid pairwise cipher Connect STA wlan0 to AP Management frame protection not enabled Connect STA wlan0 to AP Unsupported management group cipher Connect STA wlan0 to AP PASS ap_wpa2_eap_assoc_rsn 3.983073 2019-02-18 03:57:17.522490 passed all 1 test case(s) 2019-02-18 03:57:17 ./run-tests.py ap_wpa2_eap_eke DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_eke 1/1 Test: WPA2-Enterprise connection using EAP-EKE Starting AP wlan3 Connect STA wlan0 to AP Test forced algorithm selection Test failed algorithm negotiation Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_eke 4.163842 2019-02-18 03:57:22.940469 passed all 1 test case(s) 2019-02-18 03:57:23 ./run-tests.py ap_wpa2_eap_eke_many --long DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_eke_many 1/1 Test: WPA2-Enterprise connection using EAP-EKE (many connections) [long] Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Total success=300 failure=0 PASS ap_wpa2_eap_eke_many 74.35472 2019-02-18 03:58:38.380717 passed all 1 test case(s) ignored_by_lkp ap_wpa2_eap_eke_server_oom ignored_by_lkp ap_wpa2_eap_eke_serverid_nai 2019-02-18 03:58:38 ./run-tests.py ap_wpa2_eap_expanded_nak DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_expanded_nak 1/1 Test: WPA2-Enterprise connection with EAP resulting in expanded NAK Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_expanded_nak 4.44168 2019-02-18 03:58:43.325725 passed all 1 test case(s) 2019-02-18 03:58:43 ./run-tests.py ap_wpa2_eap_ext_enable_network_while_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ext_enable_network_while_connected 1/1 Test: WPA2-Enterprise interactive identity entry and ENABLE_NETWORK Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ext_enable_network_while_connected 1.775412 2019-02-18 03:58:45.717845 passed all 1 test case(s) 2019-02-18 03:58:45 ./run-tests.py ap_wpa2_eap_fast_binary_pac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_binary_pac 1/1 Test: WPA2-Enterprise connection using EAP-FAST and binary PAC format Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_binary_pac 1.406704 2019-02-18 03:58:47.654618 passed all 1 test case(s) 2019-02-18 03:58:47 ./run-tests.py ap_wpa2_eap_fast_binary_pac_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_binary_pac_errors 1/1 Test: EAP-FAST and binary PAC errors Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_binary_pac_errors 9.403607 2019-02-18 03:58:57.965410 passed all 1 test case(s) 2019-02-18 03:58:58 ./run-tests.py ap_wpa2_eap_fast_cipher_suites DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_cipher_suites 1/1 Test: EAP-FAST and different TLS cipher suites Starting AP wlan3 Connect STA wlan0 to AP Testing DHE-RSA-AES128-SHA Connect STA wlan0 to AP Testing RC4-SHA Connect STA wlan0 to AP Allow failure due to missing TLS library support Testing AES128-SHA Connect STA wlan0 to AP Testing AES256-SHA Connect STA wlan0 to AP Testing DHE-RSA-AES256-SHA Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_cipher_suites 2.888002 2019-02-18 03:59:01.960077 passed all 1 test case(s) 2019-02-18 03:59:02 ./run-tests.py ap_wpa2_eap_fast_eap_aka DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_aka 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-AKA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_eap_aka 0.974931 2019-02-18 03:59:04.076214 passed all 1 test case(s) 2019-02-18 03:59:04 ./run-tests.py ap_wpa2_eap_fast_eap_sim DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_sim 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_eap_sim 0.929913 2019-02-18 03:59:05.862302 passed all 1 test case(s) 2019-02-18 03:59:05 ./run-tests.py ap_wpa2_eap_fast_eap_sim_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_sim_ext 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM and external GSM auth Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_eap_sim_ext 0.852774 2019-02-18 03:59:07.641296 passed all 1 test case(s) 2019-02-18 03:59:07 ./run-tests.py ap_wpa2_eap_fast_gtc_auth_prov DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_gtc_auth_prov 1/1 Test: WPA2-Enterprise connection using EAP-FAST/GTC and authenticated provisioning Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_gtc_auth_prov 1.024947 2019-02-18 03:59:09.578109 passed all 1 test case(s) 2019-02-18 03:59:09 ./run-tests.py ap_wpa2_eap_fast_gtc_identity_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_gtc_identity_change 1/1 Test: WPA2-Enterprise connection using EAP-FAST/GTC and identity changing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_gtc_identity_change 1.320837 2019-02-18 03:59:11.945942 passed all 1 test case(s) 2019-02-18 03:59:12 ./run-tests.py ap_wpa2_eap_fast_missing_pac_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_missing_pac_config 1/1 Test: WPA2-Enterprise connection using EAP-FAST and missing PAC config Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_missing_pac_config 0.933775 2019-02-18 03:59:14.222675 passed all 1 test case(s) 2019-02-18 03:59:14 ./run-tests.py ap_wpa2_eap_fast_mschapv2_unauth_prov DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_mschapv2_unauth_prov 1/1 Test: WPA2-Enterprise connection using EAP-FAST/MSCHAPv2 and unauthenticated provisioning Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_mschapv2_unauth_prov 1.424351 2019-02-18 03:59:17.065810 passed all 1 test case(s) 2019-02-18 03:59:17 ./run-tests.py ap_wpa2_eap_fast_pac_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_pac_file 1/1 Test: WPA2-Enterprise connection using EAP-FAST/MSCHAPv2 and PAC file Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_fast_pac_file 2.923583 2019-02-18 03:59:21.505107 passed all 1 test case(s) 2019-02-18 03:59:21 ./run-tests.py ap_wpa2_eap_fast_pac_lifetime DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_pac_lifetime 1/1 Test: EAP-FAST and PAC lifetime Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_pac_lifetime 4.376031 2019-02-18 03:59:26.943570 passed all 1 test case(s) 2019-02-18 03:59:27 ./run-tests.py ap_wpa2_eap_fast_pac_refresh DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_pac_refresh 1/1 Test: EAP-FAST and PAC refresh Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_pac_refresh 3.517503 2019-02-18 03:59:31.585812 passed all 1 test case(s) 2019-02-18 03:59:31 ./run-tests.py ap_wpa2_eap_fast_pac_truncate DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_pac_truncate 1/1 Test: EAP-FAST and PAC list truncation Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_pac_truncate 5.803978 2019-02-18 03:59:38.146524 passed all 1 test case(s) 2019-02-18 03:59:38 ./run-tests.py ap_wpa2_eap_fast_prf_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_prf_oom 1/1 Test: WPA2-Enterprise connection using EAP-FAST and OOM in PRF Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_prf_oom 0.668612 2019-02-18 03:59:39.763243 passed all 1 test case(s) 2019-02-18 03:59:39 ./run-tests.py ap_wpa2_eap_fast_prov DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_prov 1/1 Test: EAP-FAST and provisioning options Starting AP wlan3 Provisioning attempt while server has provisioning disabled Connect STA wlan0 to AP Authenticated provisioning Provisioning disabled - using previously provisioned PAC Drop PAC and verify connection failure Anonymous provisioning Provisioning disabled - using previously provisioned PAC PASS ap_wpa2_eap_fast_prov 3.631459 2019-02-18 03:59:44.247819 passed all 1 test case(s) 2019-02-18 03:59:44 ./run-tests.py ap_wpa2_eap_fast_server_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_server_oom 1/1 Test: EAP-FAST/MSCHAPv2 and server OOM Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_server_oom 1.649876 2019-02-18 03:59:47.585881 passed all 1 test case(s) 2019-02-18 03:59:47 ./run-tests.py ap_wpa2_eap_fast_text_pac_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_text_pac_errors 1/1 Test: EAP-FAST and text PAC errors Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_text_pac_errors 8.64542 2019-02-18 03:59:57.312444 passed all 1 test case(s) 2019-02-18 03:59:57 ./run-tests.py ap_wpa2_eap_gpsk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_gpsk 1/1 Test: WPA2-Enterprise connection using EAP-GPSK Starting AP wlan3 Connect STA wlan0 to AP Test forced algorithm selection Test failed algorithm negotiation Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_gpsk 2.622526 2019-02-18 04:00:00.917552 passed all 1 test case(s) 2019-02-18 04:00:01 ./run-tests.py ap_wpa2_eap_gpsk_ptk_rekey_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_gpsk_ptk_rekey_ap 1/1 Test: WPA2-Enterprise with EAP-GPSK and PTK rekey enforced by AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_gpsk_ptk_rekey_ap 3.047803 2019-02-18 04:00:05.099445 passed all 1 test case(s) 2019-02-18 04:00:05 ./run-tests.py ap_wpa2_eap_ikev2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ikev2 1/1 Test: WPA2-Enterprise connection using EAP-IKEv2 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Negative test with incorrect password Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ikev2 1.751638 2019-02-18 04:00:07.941861 passed all 1 test case(s) 2019-02-18 04:00:08 ./run-tests.py ap_wpa2_eap_ikev2_as_frag DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ikev2_as_frag 1/1 Test: WPA2-Enterprise connection using EAP-IKEv2 with server fragmentation Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ikev2_as_frag 0.801185 2019-02-18 04:00:09.496354 passed all 1 test case(s) 2019-02-18 04:00:09 ./run-tests.py ap_wpa2_eap_ikev2_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ikev2_oom 1/1 Test: WPA2-Enterprise connection using EAP-IKEv2 and OOM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ikev2_oom 1.486708 2019-02-18 04:00:11.674223 passed all 1 test case(s) ignored_by_lkp ap_wpa2_eap_in_bridge 2019-02-18 04:00:11 ./run-tests.py ap_wpa2_eap_interactive DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_interactive 1/1 Test: WPA2-Enterprise connection using interactive identity/password entry Starting AP wlan3 Connection with dynamic TTLS/MSCHAPv2 password entry Connect STA wlan0 to AP Connection with dynamic TTLS/MSCHAPv2 identity and password entry Connect STA wlan0 to AP Connection with dynamic TTLS/EAP-MSCHAPv2 password entry Connect STA wlan0 to AP Connection with dynamic TTLS/EAP-MD5 password entry Connect STA wlan0 to AP Connection with dynamic PEAP/EAP-MSCHAPv2 password entry Connect STA wlan0 to AP Connection with dynamic PEAP/EAP-GTC password entry Connect STA wlan0 to AP PASS ap_wpa2_eap_interactive 2.229559 2019-02-18 04:00:14.931981 passed all 1 test case(s) 2019-02-18 04:00:15 ./run-tests.py ap_wpa2_eap_no_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_no_workaround 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and eap_workaround=0 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_no_workaround 0.748379 2019-02-18 04:00:16.464873 passed all 1 test case(s) 2019-02-18 04:00:16 ./run-tests.py ap_wpa2_eap_non_ascii_identity DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_non_ascii_identity 1/1 Test: WPA2-Enterprise connection attempt using non-ASCII identity Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_non_ascii_identity 4.926255 2019-02-18 04:00:22.186021 passed all 1 test case(s) 2019-02-18 04:00:22 ./run-tests.py ap_wpa2_eap_non_ascii_identity2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_non_ascii_identity2 1/1 Test: WPA2-Enterprise connection attempt using non-ASCII identity Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_non_ascii_identity2 4.897567 2019-02-18 04:00:28.131459 passed all 1 test case(s) 2019-02-18 04:00:28 ./run-tests.py ap_wpa2_eap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_oom 1/1 Test: EAP server and OOM Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_oom 2.9186 2019-02-18 04:00:31.869330 passed all 1 test case(s) 2019-02-18 04:00:31 ./run-tests.py ap_wpa2_eap_pax DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pax 1/1 Test: WPA2-Enterprise connection using EAP-PAX Starting AP wlan3 Connect STA wlan0 to AP Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_pax 0.988707 2019-02-18 04:00:33.697369 passed all 1 test case(s) 2019-02-18 04:00:33 ./stop.sh 2019-02-18 04:00:35 ./start.sh channels=4 2019-02-18 04:00:36 ./stop.sh To reproduce: git clone https://github.com/intel/lkp-tests.git cd lkp-tests bin/lkp qemu -k job-script # job-script is attached in this email Thanks, Rong Chen