FYI, we noticed the following commit (built with gcc-8):
commit: c752cac9db1b0c469db7ba9d17af4ba708984db5 ("mac80211: fix GFP_KERNEL under
tasklet context")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
in testcase: hwsim
with following parameters:
group: hwsim-02
on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 4G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
2019-03-06 14:41:55 export USER=root
2019-03-06 14:41:55 ./build.sh
Building TNC testing tools
Building wlantest
Building hostapd
Building wpa_supplicant
2019-03-06 14:44:17 ./start.sh
2019-03-06 14:44:17 ./run-tests.py ap_open_ifdown
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_ifdown 1/1
Test: AP with open mode and external ifconfig down
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_open_ifdown 1.553312 2019-03-06 14:44:20.910445
passed all 1 test case(s)
2019-03-06 14:44:20 ./run-tests.py ap_open_invalid_wmm_action
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_invalid_wmm_action 1/1
Test: AP with open mode configuration and invalid WMM Action frame
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_invalid_wmm_action 0.728618 2019-03-06 14:44:22.194220
passed all 1 test case(s)
2019-03-06 14:44:22 ./run-tests.py ap_open_multicast_to_unicast
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_multicast_to_unicast 1/1
Test: Multicast-to-unicast conversion enabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_multicast_to_unicast 0.755727 2019-03-06 14:44:23.697605
passed all 1 test case(s)
2019-03-06 14:44:23 ./run-tests.py ap_open_multicast_to_unicast_disabled
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_multicast_to_unicast_disabled 1/1
Test: Multicast-to-unicast conversion disabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_multicast_to_unicast_disabled 0.709971 2019-03-06 14:44:25.150254
passed all 1 test case(s)
2019-03-06 14:44:25 ./run-tests.py ap_open_no_reflection
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_no_reflection 1/1
Test: AP with open mode, STA sending packets to itself
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_no_reflection 1.745278 2019-03-06 14:44:27.726592
passed all 1 test case(s)
2019-03-06 14:44:27 ./run-tests.py ap_open_noncountry
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_noncountry 1/1
Test: AP with open mode and noncountry entity as Country String
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_noncountry 7.000654 2019-03-06 14:44:35.403375
passed all 1 test case(s)
2019-03-06 14:44:35 ./run-tests.py ap_open_out_of_memory
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_out_of_memory 1/1
Test: hostapd failing to setup interface due to allocation failure
Starting AP wlan3
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
Starting AP wlan4
PASS ap_open_out_of_memory 1.001799 2019-03-06 14:44:37.137874
passed all 1 test case(s)
2019-03-06 14:44:37 ./run-tests.py ap_open_packet_loss
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_packet_loss 1/1
Test: AP with open mode configuration and large packet loss
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_open_packet_loss 7.076264 2019-03-06 14:44:45.369969
passed all 1 test case(s)
2019-03-06 14:44:45 ./run-tests.py ap_open_per_sta_vif
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_per_sta_vif 1/1
Test: AP VLAN with open network
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_per_sta_vif 0.872606 2019-03-06 14:44:46.965084
passed all 1 test case(s)
2019-03-06 14:44:47 ./run-tests.py ap_open_pmf_default
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_pmf_default 1/1
Test: AP with open mode (no security) configuration and pmf=2
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
PASS ap_open_pmf_default 1.317811 2019-03-06 14:44:49.144418
passed all 1 test case(s)
2019-03-06 14:44:49 ./run-tests.py ap_open_poll_sta
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_poll_sta 1/1
Test: AP with open mode and STA poll
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_poll_sta 0.692952 2019-03-06 14:44:50.798818
passed all 1 test case(s)
2019-03-06 14:44:50 ./run-tests.py ap_open_reassoc_not_found
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_reassoc_not_found 1/1
Test: AP with open mode and REASSOCIATE not finding a match
Connect STA wlan0 to AP
PASS ap_open_reassoc_not_found 0.40757 2019-03-06 14:44:52.026287
passed all 1 test case(s)
2019-03-06 14:44:52 ./run-tests.py ap_open_reassoc_same
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_reassoc_same 1/1
Test: AP with open mode and STA reassociating back to same AP without auth exchange
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_reassoc_same 0.7576 2019-03-06 14:44:53.617381
passed all 1 test case(s)
2019-03-06 14:44:53 ./run-tests.py ap_open_reconnect_on_inactivity_disconnect
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_reconnect_on_inactivity_disconnect 1/1
Test: Reconnect to open mode AP after inactivity related disconnection
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_reconnect_on_inactivity_disconnect 0.963494 2019-03-06 14:44:55.372279
passed all 1 test case(s)
2019-03-06 14:44:55 ./run-tests.py ap_open_select_any
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_select_any 1/1
Test: AP with open mode and select any network
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_open_select_any 0.816632 2019-03-06 14:44:56.998206
passed all 1 test case(s)
2019-03-06 14:44:57 ./run-tests.py ap_open_select_network
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_select_network 1/1
Test: Open mode connection and SELECT_NETWORK to change network
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_open_select_network 1.541519 2019-03-06 14:44:59.413094
passed all 1 test case(s)
2019-03-06 14:44:59 ./run-tests.py ap_open_select_network_freq
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_select_network_freq 1/1
Test: AP with open mode and use for SELECT_NETWORK freq parameter
Starting AP wlan3
Connect STA wlan0 to AP
Scan duration: 0.169999999925 seconds
PASS ap_open_select_network_freq 0.767507 2019-03-06 14:45:00.974289
passed all 1 test case(s)
2019-03-06 14:45:01 ./run-tests.py ap_open_select_twice
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_select_twice 1/1
Test: AP with open mode and select network twice
Connect STA wlan0 to AP
Starting AP wlan3
PASS ap_open_select_twice 0.982145 2019-03-06 14:45:02.797261
passed all 1 test case(s)
2019-03-06 14:45:02 ./run-tests.py ap_open_sta_enable_disable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_sta_enable_disable 1/1
Test: AP with open mode and wpa_supplicant ENABLE/DISABLE_NETWORK
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan5 to AP
PASS ap_open_sta_enable_disable 0.756889 2019-03-06 14:45:04.392195
passed all 1 test case(s)
2019-03-06 14:45:04 ./run-tests.py ap_open_sta_statistics
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_sta_statistics 1/1
Test: AP with open mode and STA statistics
Starting AP wlan3
Connect STA wlan0 to AP
stats1: {'ht_mcs_bitmask': 'ffff0000000000000000',
'listen_interval': '5', 'rx_packets': '4',
'timeout_next': 'NULLFUNC POLL', 'ext_capab':
'04000a02014000400001', 'addr': '02:00:00:00:00:00',
'rx_bytes': '259', 'tx_rate_info': '10', 'signal':
'-30', 'inactive_msec': '0', 'rx_rate_info': '130 mcs
1', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c',
'capability': '0x421', 'supp_op_classes':
'5151525354737475767778797a7b7c7d7e7f808182', 'flags':
'[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'connected_time':
'0', 'tx_bytes': '196', 'aid': '1',
'tx_packets': '3', 'ht_caps_info': '0x1076'}
stats2: {'ht_mcs_bitmask': 'ffff0000000000000000',
'listen_interval': '5', 'rx_packets': '6',
'timeout_next': 'NULLFUNC POLL', 'ext_capab':
'04000a02014000400001', 'addr': '02:00:00:00:00:00',
'rx_bytes': '292', 'tx_rate_info': '10', 'signal':
'-30', 'inactive_msec': '421', 'rx_rate_info': '130
mcs 1', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c',
'capability': '0x421', 'supp_op_classes':
'5151525354737475767778797a7b7c7d7e7f808182', 'flags':
'[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'connected_time':
'0', 'tx_bytes': '229', 'aid': '1',
'tx_packets': '4', 'ht_caps_info': '0x1076'}
stats3: {'ht_mcs_bitmask': 'ffff0000000000000000',
'listen_interval': '5', 'rx_packets': '10',
'timeout_next': 'NULLFUNC POLL', 'ext_capab':
'04000a02014000400001', 'addr': '02:00:00:00:00:00',
'rx_bytes': '3365', 'tx_rate_info': '130 mcs 1',
'signal': '-30', 'inactive_msec': '4',
'rx_rate_info': '130 mcs 1', 'supported_rates': '02 04 0b 16
0c 12 18 24 30 48 60 6c', 'capability': '0x421',
'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182',
'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]',
'connected_time': '0', 'tx_bytes': '1782', 'aid':
'1', 'tx_packets': '6', 'ht_caps_info': '0x1076'}
PASS ap_open_sta_statistics 1.571741 2019-03-06 14:45:06.817906
passed all 1 test case(s)
2019-03-06 14:45:06 ./run-tests.py ap_open_start_disabled
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_start_disabled 1/1
Test: AP with open mode and beaconing disabled
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_start_disabled 1.129193 2019-03-06 14:45:08.726702
passed all 1 test case(s)
2019-03-06 14:45:08 ./run-tests.py ap_open_start_disabled2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_start_disabled2 1/1
Test: AP with open mode and beaconing disabled (2)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_start_disabled2 1.589812 2019-03-06 14:45:10.817069
passed all 1 test case(s)
2019-03-06 14:45:10 ./run-tests.py ap_open_tdls
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls 1/1
Test: Open AP and two stations using TDLS
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Teardown TDLS
Setup TDLS
Teardown TDLS
PASS ap_open_tdls 7.770116 2019-03-06 14:45:19.409495
passed all 1 test case(s)
2019-03-06 14:45:19 ./run-tests.py ap_open_tdls_external_control
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_external_control 1/1
Test: TDLS and tdls_external_control
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_open_tdls_external_control 1.412738 2019-03-06 14:45:21.678320
passed all 1 test case(s)
2019-03-06 14:45:21 ./run-tests.py ap_open_tdls_vht
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_vht 1/1
Test: Open AP and two stations using TDLS
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Teardown TDLS
Setup TDLS
Teardown TDLS
PASS ap_open_tdls_vht 8.20601 2019-03-06 14:45:30.483532
passed all 1 test case(s)
2019-03-06 14:45:30 ./run-tests.py ap_open_tdls_vht160
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_vht160 1/1
Test: Open AP and two stations using TDLS with VHT 160
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Station dump on dev[0]:
Station 02:00:00:00:03:00 (on wlan0)
inactive time: 190 ms
rx bytes: 152911
rx packets: 197
tx bytes: 64622
tx packets: 53
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 39
rx drop misc: 29
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: no
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 4 seconds
Station 02:00:00:00:01:00 (on wlan0)
inactive time: 240 ms
rx bytes: 18306
rx packets: 16
tx bytes: 18306
tx packets: 14
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 39
rx drop misc: 0
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: yes
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 4 seconds
Station dump on dev[1]:
Station 02:00:00:00:03:00 (on wlan0)
inactive time: 208 ms
rx bytes: 152911
rx packets: 197
tx bytes: 64622
tx packets: 53
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 39
rx drop misc: 29
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: no
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 4 seconds
Station 02:00:00:00:01:00 (on wlan0)
inactive time: 258 ms
rx bytes: 18306
rx packets: 16
tx bytes: 18306
tx packets: 14
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 39
rx drop misc: 0
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: yes
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 4 seconds
PASS ap_open_tdls_vht160 5.519662 2019-03-06 14:45:36.466107
passed all 1 test case(s)
2019-03-06 14:45:36 ./run-tests.py ap_open_tdls_vht80
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_vht80 1/1
Test: Open AP and two stations using TDLS with VHT 80
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Station dump on dev[0]:
Station 02:00:00:00:03:00 (on wlan0)
inactive time: 44 ms
rx bytes: 151019
rx packets: 177
tx bytes: 64624
tx packets: 53
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 29
rx drop misc: 29
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: no
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 3 seconds
Station 02:00:00:00:01:00 (on wlan0)
inactive time: 69 ms
rx bytes: 18306
rx packets: 16
tx bytes: 18306
tx packets: 14
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 29
rx drop misc: 0
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: yes
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 3 seconds
Station dump on dev[1]:
Station 02:00:00:00:03:00 (on wlan0)
inactive time: 49 ms
rx bytes: 151019
rx packets: 177
tx bytes: 64624
tx packets: 53
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 29
rx drop misc: 29
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: no
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 3 seconds
Station 02:00:00:00:01:00 (on wlan0)
inactive time: 74 ms
rx bytes: 18306
rx packets: 16
tx bytes: 18306
tx packets: 14
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 29
rx drop misc: 0
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: yes
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 3 seconds
PASS ap_open_tdls_vht80 4.28861 2019-03-06 14:45:41.437002
passed all 1 test case(s)
2019-03-06 14:45:41 ./run-tests.py ap_open_tdls_vht80plus80
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_tdls_vht80plus80 1/1
Test: Open AP and two stations using TDLS with VHT 80+80
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Station dump on dev[0]:
Station 02:00:00:00:03:00 (on wlan0)
inactive time: 75 ms
rx bytes: 153493
rx packets: 203
tx bytes: 64624
tx packets: 53
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 41
rx drop misc: 29
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: no
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 4 seconds
Station 02:00:00:00:01:00 (on wlan0)
inactive time: 96 ms
rx bytes: 18306
rx packets: 16
tx bytes: 18306
tx packets: 14
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 41
rx drop misc: 0
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: yes
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 4 seconds
Station dump on dev[1]:
Station 02:00:00:00:03:00 (on wlan0)
inactive time: 91 ms
rx bytes: 153679
rx packets: 205
tx bytes: 64624
tx packets: 53
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 42
rx drop misc: 29
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: no
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 4 seconds
Station 02:00:00:00:01:00 (on wlan0)
inactive time: 112 ms
rx bytes: 18306
rx packets: 16
tx bytes: 18306
tx packets: 14
tx retries: 0
tx failed: 0
beacon loss: 0
beacon rx: 42
rx drop misc: 0
signal: -30 dBm
signal avg: -30 dBm
beacon signal avg: 226 dBm
tx bitrate: 6.5 MBit/s MCS 0
rx bitrate: 6.5 MBit/s MCS 0
authorized: yes
authenticated: yes
associated: yes
preamble: long
WMM/WME: yes
MFP: no
TDLS peer: yes
DTIM period: 2
beacon interval:100
short slot time:yes
connected time: 4 seconds
PASS ap_open_tdls_vht80plus80 5.766018 2019-03-06 14:45:47.808419
passed all 1 test case(s)
2019-03-06 14:45:47 ./run-tests.py ap_open_unexpected_assoc_event
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_unexpected_assoc_event 1/1
Test: AP with open mode and unexpected association event
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_unexpected_assoc_event 1.164723 2019-03-06 14:45:49.593969
passed all 1 test case(s)
2019-03-06 14:45:49 ./run-tests.py ap_open_unknown_action
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_unknown_action 1/1
Test: AP with open mode configuration and unknown Action frame
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_open_unknown_action 0.820857 2019-03-06 14:45:51.059045
passed all 1 test case(s)
2019-03-06 14:45:51 ./run-tests.py ap_open_wpas_in_bridge
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_open_wpas_in_bridge 1/1
Test: Open mode AP and wpas interface in a bridge
Starting AP wlan3
Ignore expected interface_add failure due to missing bridge interface: Failed to add a
dynamic wpa_supplicant interface
Connect STA wlan5 to AP
PASS ap_open_wpas_in_bridge 1.076058 2019-03-06 14:45:52.632222
passed all 1 test case(s)
2019-03-06 14:45:52 ./run-tests.py ap_pmf_assoc_comeback
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_assoc_comeback 1/1
Test: WPA2-PSK AP with PMF association comeback
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_assoc_comeback 2.135597 2019-03-06 14:45:55.372531
passed all 1 test case(s)
2019-03-06 14:45:55 ./run-tests.py ap_pmf_assoc_comeback2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_assoc_comeback2 1/1
Test: WPA2-PSK AP with PMF association comeback (using DROP_SA)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_assoc_comeback2 1.793289 2019-03-06 14:45:57.743880
passed all 1 test case(s)
2019-03-06 14:45:57 ./run-tests.py ap_pmf_inject_auth
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_inject_auth 1/1
Test: WPA2-PSK AP with PMF and Authentication frame injection
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_inject_auth 0.717119 2019-03-06 14:45:58.989453
passed all 1 test case(s)
2019-03-06 14:45:59 ./run-tests.py ap_pmf_negative
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_negative 1/1
Test: WPA2-PSK AP without PMF (negative test)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_negative 10.918211 2019-03-06 14:46:10.448596
passed all 1 test case(s)
2019-03-06 14:46:10 ./run-tests.py ap_pmf_optional
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_optional 1/1
Test: WPA2-PSK AP with PMF optional
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_optional 1.418218 2019-03-06 14:46:12.689217
passed all 1 test case(s)
2019-03-06 14:46:12 ./run-tests.py ap_pmf_optional_2akm
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_optional_2akm 1/1
Test: WPA2-PSK AP with PMF optional (2 AKMs)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_optional_2akm 0.969725 2019-03-06 14:46:14.181750
passed all 1 test case(s)
2019-03-06 14:46:14 ./run-tests.py ap_pmf_optional_eap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_optional_eap 1/1
Test: WPA2EAP AP with PMF optional
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_optional_eap 0.839731 2019-03-06 14:46:15.548157
passed all 1 test case(s)
2019-03-06 14:46:15 ./run-tests.py ap_pmf_required
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_required 1/1
Test: WPA2-PSK AP with PMF required
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_required 1.385149 2019-03-06 14:46:17.533167
passed all 1 test case(s)
2019-03-06 14:46:17 ./run-tests.py ap_pmf_required_eap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_required_eap 1/1
Test: WPA2-EAP AP with PMF required
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_pmf_required_eap 0.794774 2019-03-06 14:46:18.830023
passed all 1 test case(s)
2019-03-06 14:46:18 ./run-tests.py ap_pmf_required_sha1
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_required_sha1 1/1
Test: WPA2-PSK AP with PMF required with SHA1 AKM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_required_sha1 0.537559 2019-03-06 14:46:19.867585
passed all 1 test case(s)
2019-03-06 14:46:19 ./run-tests.py ap_pmf_required_sta_no_pmf
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_required_sta_no_pmf 1/1
Test: WPA2-PSK AP with PMF required and PMF disabled on STA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_required_sta_no_pmf 0.293873 2019-03-06 14:46:20.640900
passed all 1 test case(s)
2019-03-06 14:46:20 ./run-tests.py ap_pmf_sta_sa_query
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query 1/1
Test: WPA2-PSK AP with station using SA Query
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query 2.695766 2019-03-06 14:46:23.877878
passed all 1 test case(s)
2019-03-06 14:46:23 ./run-tests.py ap_pmf_sta_sa_query_local_failure
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query_local_failure 1/1
Test: WPA2-PSK AP with station using SA Query (local failure)
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query_local_failure 0.659018 2019-03-06 14:46:24.931975
passed all 1 test case(s)
2019-03-06 14:46:24 ./run-tests.py ap_pmf_sta_sa_query_no_response
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query_no_response 1/1
Test: WPA2-PSK AP with station using SA Query and getting no response
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query_no_response 3.96915 2019-03-06 14:46:29.409049
passed all 1 test case(s)
2019-03-06 14:46:29 ./run-tests.py ap_pmf_sta_sa_query_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_sa_query_oom 1/1
Test: WPA2-PSK AP with station using SA Query (OOM)
Connect STA wlan0 to AP
PASS ap_pmf_sta_sa_query_oom 0.616472 2019-03-06 14:46:30.404473
passed all 1 test case(s)
2019-03-06 14:46:30 ./run-tests.py ap_pmf_sta_unprot_deauth_burst
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_sta_unprot_deauth_burst 1/1
Test: WPA2-PSK AP with station receiving burst of unprotected Deauthentication frames
Connect STA wlan0 to AP
PASS ap_pmf_sta_unprot_deauth_burst 12.922641 2019-03-06 14:46:43.725969
passed all 1 test case(s)
2019-03-06 14:46:43 ./run-tests.py ap_pmf_tkip_reject
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_tkip_reject 1/1
Test: Mixed mode BSS and MFP-enabled AP rejecting TKIP
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_pmf_tkip_reject 1.090364 2019-03-06 14:46:45.411280
passed all 1 test case(s)
2019-03-06 14:46:45 ./run-tests.py ap_pmf_toggle
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_pmf_toggle 1/1
Test: WPA2-PSK AP with PMF optional and changing PMF on reassociation
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_pmf_toggle 1.014585 2019-03-06 14:46:46.897621
passed all 1 test case(s)
2019-03-06 14:46:46 ./run-tests.py ap_qosmap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_qosmap 1/1
Test: QoS mapping
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_qosmap 1.533089 2019-03-06 14:46:49.014628
passed all 1 test case(s)
2019-03-06 14:46:49 ./run-tests.py ap_qosmap_default
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_qosmap_default 1/1
Test: QoS mapping with default values
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_qosmap_default 1.255093 2019-03-06 14:46:50.802831
passed all 1 test case(s)
2019-03-06 14:46:50 ./run-tests.py ap_qosmap_default_acm
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_qosmap_default_acm 1/1
Test: QoS mapping with default values and ACM=1 for VO/VI
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_qosmap_default_acm 1.148434 2019-03-06 14:46:52.495327
passed all 1 test case(s)
2019-03-06 14:46:52 ./run-tests.py ap_qosmap_invalid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_qosmap_invalid 1/1
Test: QoS mapping ctrl_iface error handling
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_qosmap_invalid 0.440127 2019-03-06 14:46:53.402681
passed all 1 test case(s)
2019-03-06 14:46:53 ./run-tests.py ap_reassociation_to_same_bss
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_reassociation_to_same_bss 1/1
Test: Reassociate to the same BSS
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_reassociation_to_same_bss 10.265448 2019-03-06 14:47:04.276690
passed all 1 test case(s)
2019-03-06 14:47:04 ./run-tests.py ap_reconnect_auth_timeout
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_reconnect_auth_timeout 1/1
Test: Reconnect to 2nd AP and authentication times out
Starting AP wlan3
Connect STA wlan5 to AP
Starting AP wlan4
Wait ~10s for auth timeout...
PASS ap_reconnect_auth_timeout 12.086407 2019-03-06 14:47:16.869544
passed all 1 test case(s)
2019-03-06 14:47:16 ./run-tests.py ap_remove_during_acs
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_acs 1/1
Test: Remove interface during ACS
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Removing BSS wlan3
PASS ap_remove_during_acs 7.318993 2019-03-06 14:47:24.638576
passed all 1 test case(s)
2019-03-06 14:47:24 ./run-tests.py ap_remove_during_acs2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_acs2 1/1
Test: Remove BSS during ACS in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Removing BSS wlan3
PASS ap_remove_during_acs2 0.455639 2019-03-06 14:47:25.638515
passed all 1 test case(s)
2019-03-06 14:47:25 ./run-tests.py ap_remove_during_acs3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_acs3 1/1
Test: Remove second BSS during ACS in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3
Starting AP wlan3
Removing BSS wlan3-2
PASS ap_remove_during_acs3 0.458138 2019-03-06 14:47:26.649252
passed all 1 test case(s)
2019-03-06 14:47:26 ./run-tests.py ap_remove_during_ht_coex_scan
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_ht_coex_scan 1/1
Test: Remove interface during HT co-ex scan
Starting AP wlan3
Removing BSS wlan3
PASS ap_remove_during_ht_coex_scan 1.695884 2019-03-06 14:47:28.815204
passed all 1 test case(s)
2019-03-06 14:47:28 ./run-tests.py ap_remove_during_ht_coex_scan2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_ht_coex_scan2 1/1
Test: Remove BSS during HT co-ex scan in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3
PASS ap_remove_during_ht_coex_scan2 0.277314 2019-03-06 14:47:29.800375
passed all 1 test case(s)
2019-03-06 14:47:29 ./run-tests.py ap_remove_during_ht_coex_scan3
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_remove_during_ht_coex_scan3 1/1
Test: Remove second BSS during HT co-ex scan in multi-BSS configuration
Starting AP wlan3
Removing BSS wlan3-2
PASS ap_remove_during_ht_coex_scan3 0.262766 2019-03-06 14:47:30.622615
passed all 1 test case(s)
2019-03-06 14:47:30 ./run-tests.py ap_require_ht
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_require_ht 1/1
Test: Require HT
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
Connect STA wlan2 to AP
PASS ap_require_ht 1.01258 2019-03-06 14:47:32.256116
passed all 1 test case(s)
2019-03-06 14:47:32 ./run-tests.py ap_require_ht_limited_rates
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_require_ht_limited_rates 1/1
Test: Require HT with limited supported rates
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_require_ht_limited_rates 0.707046 2019-03-06 14:47:33.450917
passed all 1 test case(s)
2019-03-06 14:47:33 ./run-tests.py ap_roam_open
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_open 1/1
Test: Roam between two open APs
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_open 17.099364 2019-03-06 14:47:51.138870
passed all 1 test case(s)
2019-03-06 14:47:51 ./run-tests.py ap_roam_open_failed
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_open_failed 1/1
Test: Roam failure due to rejected authentication
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_open_failed 1.159983 2019-03-06 14:47:52.868224
passed all 1 test case(s)
2019-03-06 14:47:52 ./run-tests.py ap_roam_set_bssid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_set_bssid 1/1
Test: Roam control
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_roam_set_bssid 0.62347 2019-03-06 14:47:53.977598
passed all 1 test case(s)
2019-03-06 14:47:54 ./run-tests.py ap_roam_with_reassoc_auth_timeout
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_with_reassoc_auth_timeout 1/1
Test: Roam using reassoc between two APs and authentication times out
Starting AP wlan3
Connect STA wlan5 to AP
Starting AP wlan4
Wait ~10s for auth timeout...
PASS ap_roam_with_reassoc_auth_timeout 11.918553 2019-03-06 14:48:06.344032
passed all 1 test case(s)
2019-03-06 14:48:06 ./run-tests.py ap_roam_wpa2_psk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_wpa2_psk 1/1
Test: Roam between two WPA2-PSK APs
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_wpa2_psk 16.600938 2019-03-06 14:48:23.578096
passed all 1 test case(s)
2019-03-06 14:48:23 ./run-tests.py ap_roam_wpa2_psk_failed
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_wpa2_psk_failed 1/1
Test: Roam failure with WPA2-PSK AP due to wrong passphrase
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_wpa2_psk_failed 5.74442 2019-03-06 14:48:29.935779
passed all 1 test case(s)
2019-03-06 14:48:30 ./run-tests.py ap_roam_wpa2_psk_race
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_roam_wpa2_psk_race 1/1
Test: Roam between two WPA2-PSK APs and try to hit a disconnection race
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan4
PASS ap_roam_wpa2_psk_race 3.99969 2019-03-06 14:48:34.522507
passed all 1 test case(s)
2019-03-06 14:48:34 ./run-tests.py ap_short_preamble
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_short_preamble 1/1
Test: Open AP with short preamble
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_short_preamble 0.574955 2019-03-06 14:48:35.705062
passed all 1 test case(s)
2019-03-06 14:48:35 ./run-tests.py ap_spectrum_management_required
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_spectrum_management_required 1/1
Test: Open AP with spectrum management required
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_spectrum_management_required 0.960666 2019-03-06 14:48:37.323525
passed all 1 test case(s)
2019-03-06 14:48:37 ./run-tests.py ap_tdls_chan_switch_prohibit
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tdls_chan_switch_prohibit 1/1
Test: Open AP and TDLS channel switch prohibited
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
PASS ap_tdls_chan_switch_prohibit 2.402341 2019-03-06 14:48:40.519785
passed all 1 test case(s)
2019-03-06 14:48:40 ./run-tests.py ap_tdls_discovery
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tdls_discovery 1/1
Test: WPA2-PSK AP and two stations using TDLS discovery
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_tdls_discovery 1.324625 2019-03-06 14:48:42.423517
passed all 1 test case(s)
2019-03-06 14:48:42 ./run-tests.py ap_tdls_link_status
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tdls_link_status 1/1
Test: Check TDLS link status between two stations
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
wlan0: TDLS link status: peer does not exist
wlan1: TDLS link status: peer does not exist
Setup TDLS
wlan0: TDLS link status: connected
wlan1: TDLS link status: connected
Teardown TDLS
wlan0: TDLS link status: peer does not exist
wlan1: TDLS link status: peer does not exist
PASS ap_tdls_link_status 3.959728 2019-03-06 14:48:47.102222
passed all 1 test case(s)
2019-03-06 14:48:47 ./run-tests.py ap_tdls_prohibit
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tdls_prohibit 1/1
Test: Open AP and TDLS prohibited
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_tdls_prohibit 1.098167 2019-03-06 14:48:48.845200
passed all 1 test case(s)
2019-03-06 14:48:48 ./run-tests.py ap_track_sta
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta 1/1
Test: Dualband AP tracking unconnected stations
Starting AP wlan3
Starting AP wlan4
PASS ap_track_sta 3.000314 2019-03-06 14:48:52.522241
passed all 1 test case(s)
2019-03-06 14:48:52 ./run-tests.py ap_track_sta_force_2ghz
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_force_2ghz 1/1
Test: Dualband AP forcing dualband STA to connect on 2.4 GHz
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_track_sta_force_2ghz 1.379839 2019-03-06 14:48:54.436844
passed all 1 test case(s)
2019-03-06 14:48:54 ./run-tests.py ap_track_sta_force_5ghz
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_force_5ghz 1/1
Test: Dualband AP forcing dualband STA to connect on 5 GHz
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_track_sta_force_5ghz 1.241174 2019-03-06 14:48:56.354450
passed all 1 test case(s)
2019-03-06 14:48:56 ./run-tests.py ap_track_sta_no_auth
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_no_auth 1/1
Test: Dualband AP rejecting authentication from dualband STA on 2.4 GHz
Starting AP wlan3
Starting AP wlan4
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_track_sta_no_auth 1.017103 2019-03-06 14:48:58.066583
passed all 1 test case(s)
2019-03-06 14:48:58 ./run-tests.py ap_track_sta_no_auth_passive
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_no_auth_passive 1/1
Test: AP rejecting authentication from dualband STA on 2.4 GHz (passive)
Starting AP wlan3
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_track_sta_no_auth_passive 0.975848 2019-03-06 14:48:59.629904
passed all 1 test case(s)
2019-03-06 14:48:59 ./run-tests.py ap_track_sta_no_probe_resp
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_sta_no_probe_resp 1/1
Test: Dualband AP not replying to probes from dualband STA on 2.4 GHz
Starting AP wlan3
Starting AP wlan4
PASS ap_track_sta_no_probe_resp 0.996653 2019-03-06 14:49:01.263605
passed all 1 test case(s)
2019-03-06 14:49:01 ./run-tests.py ap_track_taxonomy
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_track_taxonomy 1/1
Test: AP tracking STA taxonomy
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan5 to AP
sta0:
wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:_|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001
sta1:
wifi4|probe:0,1,50,3,45,127,114,255,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001
sta:
wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:track_test|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001
Connect STA wlan2 to AP
sta2:
wifi4|probe:0,1,50,3,45,127,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001,wps:_|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:1076,htagg:1b,htmcs:0000ffff,extcap:04000a02014000400001
flush_scan_cache: Could not clear all BSS entries. These remain:
bssid / frequency / signal level / flags / ssid
02:00:00:00:03:00 2437 -30 [ESS] track
flush_scan_cache: Could not clear all BSS entries. These remain:
bssid / frequency / signal level / flags / ssid
02:00:00:00:03:00 2437 -30 [ESS] track
flush_scan_cache: Could not clear all BSS entries. These remain:
bssid / frequency / signal level / flags / ssid
02:00:00:00:03:00 2437 -30 [ESS] track
PASS ap_track_taxonomy 3.639933 2019-03-06 14:49:05.448200
passed all 1 test case(s)
2019-03-06 14:49:05 ./run-tests.py ap_tx_queue_params
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tx_queue_params 1/1
Test: Open AP with TX queue params set
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_tx_queue_params 0.499501 2019-03-06 14:49:06.454959
passed all 1 test case(s)
2019-03-06 14:49:06 ./run-tests.py ap_tx_queue_params_invalid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_tx_queue_params_invalid 1/1
Test: Invalid TX queue params set (cwmin/cwmax)
Starting AP wlan3
PASS ap_tx_queue_params_invalid 0.294472 2019-03-06 14:49:07.242372
passed all 1 test case(s)
2019-03-06 14:49:07 ./run-tests.py ap_vendor_elements
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vendor_elements 1/1
Test: WPA2-PSK AP with vendor elements added
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vendor_elements 0.643253 2019-03-06 14:49:08.368698
passed all 1 test case(s)
ignored_by_lkp ap_vht160
2019-03-06 14:49:08 ./run-tests.py ap_vht160_no_dfs
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs 1/1
Test: VHT with 160 MHz channel width and no DFS (104 minus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs 0.854576 2019-03-06 14:49:09.649062
passed all 1 test case(s)
2019-03-06 14:49:09 ./run-tests.py ap_vht160_no_dfs_100_plus
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_100_plus 1/1
Test: VHT with 160 MHz channel width and no DFS (100 plus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_100_plus 0.932261 2019-03-06 14:49:11.011417
passed all 1 test case(s)
2019-03-06 14:49:11 ./run-tests.py ap_vht160_no_dfs_108_plus
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_108_plus 1/1
Test: VHT with 160 MHz channel width and no DFS (108 plus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_108_plus 0.883326 2019-03-06 14:49:12.328582
passed all 1 test case(s)
2019-03-06 14:49:12 ./run-tests.py ap_vht160_no_dfs_112_minus
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_112_minus 1/1
Test: VHT with 160 MHz channel width and no DFS (112 minus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_112_minus 0.838974 2019-03-06 14:49:13.592046
passed all 1 test case(s)
2019-03-06 14:49:13 ./run-tests.py ap_vht160_no_dfs_116_plus
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_116_plus 1/1
Test: VHT with 160 MHz channel width and no DFS (116 plus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_116_plus 0.823459 2019-03-06 14:49:14.924222
passed all 1 test case(s)
2019-03-06 14:49:14 ./run-tests.py ap_vht160_no_dfs_120_minus
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_120_minus 1/1
Test: VHT with 160 MHz channel width and no DFS (120 minus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_120_minus 0.880265 2019-03-06 14:49:16.232088
passed all 1 test case(s)
2019-03-06 14:49:16 ./run-tests.py ap_vht160_no_dfs_124_plus
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_124_plus 1/1
Test: VHT with 160 MHz channel width and no DFS (124 plus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_124_plus 0.853862 2019-03-06 14:49:17.598538
passed all 1 test case(s)
2019-03-06 14:49:17 ./run-tests.py ap_vht160_no_dfs_128_minus
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_dfs_128_minus 1/1
Test: VHT with 160 MHz channel width and no DFS (128 minus)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht160_no_dfs_128_minus 0.828016 2019-03-06 14:49:18.885970
passed all 1 test case(s)
2019-03-06 14:49:18 ./run-tests.py ap_vht160_no_ht40
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160_no_ht40 1/1
Test: VHT with 160 MHz channel width and HT40 disabled
Starting AP wlan3
PASS ap_vht160_no_ht40 0.148681 2019-03-06 14:49:19.529189
passed all 1 test case(s)
2019-03-06 14:49:19 ./run-tests.py ap_vht160b
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht160b 1/1
Test: VHT with 160 MHz channel width (2)
Starting AP wlan4
Waiting for CAC to complete
Connect STA wlan0 to AP
PASS ap_vht160b 63.611865 2019-03-06 14:50:23.611196
passed all 1 test case(s)
2019-03-06 14:50:23 ./run-tests.py ap_vht80
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80 1/1
Test: VHT with 80 MHz channel width
Starting AP wlan3
Connect STA wlan0 to AP
hostapd STATUS: {'olbc_ht': '0', 'cac_time_left_seconds':
'N/A', 'num_sta_no_short_slot_time': '1', 'vht_caps_info':
'00000000', 'olbc': '0', 'vht_oper_centr_freq_seg0_idx':
'42', 'num_sta_non_erp': '0', 'supported_rates': '0c
12 18 24 30 48 60 6c', 'ht_op_mode': '0x0', 'tx_vht_mcs_map':
'aaaa', 'state': 'ENABLED',
'vht_oper_centr_freq_seg1_idx': '0', 'num_sta_ht40_intolerant':
'0', 'channel': '36', 'ht_mcs_bitmask':
'ffff0000000000000000', 'vht_oper_chwidth': '1',
'bssid[0]': '02:00:00:00:03:00', 'ieee80211n': '1',
'cac_time_seconds': '0', 'num_sta[0]': '1',
'ieee80211ac': '1', 'phy': 'phy3', 'max_txpower':
'23', 'num_sta_ht_no_gf': '0', 'freq': '5180',
'num_sta_ht_20_mhz': '0', 'num_sta_no_short_preamble':
'1', 'secondary_channel': '1', 'rx_vht_mcs_map':
'aaaa', 'ssid[0]': 'vht', 'dtim_period': '2',
'beacon_int': '100', 'num_sta_no_ht': '0',
'bss[0]': 'wlan3', 'ht_caps_info': '000e'}
hostapd STA: {'connected_time': '0', 'vht_caps_info':
'0x038004fa', 'capability': '0x1', 'addr':
'02:00:00:00:00:00', 'rx_vht_mcs_map': 'aaaa',
'supp_op_classes': '73515354737475767778797a7b808182',
'supported_rates': '0c 12 18 24 30 48 60 6c', 'tx_vht_mcs_map':
'aaaa', 'tx_packets': '6', 'ht_mcs_bitmask':
'ffff0000000000000000', 'rx_packets': '10', 'ext_capab':
'04000a02014000400001', 'rx_rate_info': '1560 vhtmcs 8 vhtnss 2',
'tx_bytes': '1797', 'tx_rate_info': '65 mcs 0',
'timeout_next': 'NULLFUNC POLL', 'rx_bytes': '3367',
'signal': '-30', 'inactive_msec': '19',
'listen_interval': '5', 'flags':
'[AUTH][ASSOC][AUTHORIZED][WMM][HT][VHT]', 'aid': '1',
'ht_caps_info': '0x1076'}
PASS ap_vht80 1.346375 2019-03-06 14:50:25.576757
passed all 1 test case(s)
2019-03-06 14:50:25 ./run-tests.py ap_vht80_csa
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_csa 1/1
Test: VHT with 80 MHz channel width and CSA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80_csa 4.542807 2019-03-06 14:50:30.950387
passed all 1 test case(s)
2019-03-06 14:50:31 ./run-tests.py ap_vht80_invalid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_invalid 1/1
Test: VHT with invalid 80 MHz channel configuration (seg1)
Starting AP wlan3
PASS ap_vht80_invalid 0.579345 2019-03-06 14:50:32.294476
passed all 1 test case(s)
2019-03-06 14:50:32 ./run-tests.py ap_vht80_invalid2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_invalid2 1/1
Test: VHT with invalid 80 MHz channel configuration (seg0)
Starting AP wlan3
PASS ap_vht80_invalid2 0.644034 2019-03-06 14:50:33.913079
passed all 1 test case(s)
2019-03-06 14:50:34 ./run-tests.py ap_vht80_params
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_params 1/1
Test: VHT with 80 MHz channel width and number of optional features enabled
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_vht80_params 1.600517 2019-03-06 14:50:36.281528
passed all 1 test case(s)
2019-03-06 14:50:36 ./run-tests.py ap_vht80_pwr_constraint
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_pwr_constraint 1/1
Test: VHT with 80 MHz channel width and local power constraint
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80_pwr_constraint 1.20708 2019-03-06 14:50:38.041275
passed all 1 test case(s)
2019-03-06 14:50:38 ./run-tests.py ap_vht80_to_24g_ht
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80_to_24g_ht 1/1
Test: VHT with 80 MHz channel width reconfigured to 2.4 GHz HT
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80_to_24g_ht 1.46537 2019-03-06 14:50:40.355211
passed all 1 test case(s)
2019-03-06 14:50:40 ./run-tests.py ap_vht80b
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80b 1/1
Test: VHT with 80 MHz channel width (HT40- channel 40)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80b 1.544268 2019-03-06 14:50:42.586170
passed all 1 test case(s)
2019-03-06 14:50:42 ./run-tests.py ap_vht80c
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80c 1/1
Test: VHT with 80 MHz channel width (HT40+ channel 44)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80c 1.677432 2019-03-06 14:50:44.961376
passed all 1 test case(s)
2019-03-06 14:50:45 ./run-tests.py ap_vht80d
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80d 1/1
Test: VHT with 80 MHz channel width (HT40- channel 48)
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht80d 1.538684 2019-03-06 14:50:47.213760
passed all 1 test case(s)
2019-03-06 14:50:47 ./run-tests.py ap_vht80plus80
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80plus80 1/1
Test: VHT with 80+80 MHz channel width
Starting AP wlan3
Starting AP wlan4
Connect STA wlan1 to AP
PASS ap_vht80plus80 1.745725 2019-03-06 14:50:49.480244
passed all 1 test case(s)
2019-03-06 14:50:49 ./run-tests.py ap_vht80plus80_invalid
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht80plus80_invalid 1/1
Test: VHT with invalid 80+80 MHz channel
Starting AP wlan3
PASS ap_vht80plus80_invalid 0.737796 2019-03-06 14:50:50.926198
passed all 1 test case(s)
2019-03-06 14:50:50 ./run-tests.py ap_vht_20
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_20 1/1
Test: VHT and 20 MHz channel
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht_20 0.875062 2019-03-06 14:50:52.349626
passed all 1 test case(s)
2019-03-06 14:50:52 ./run-tests.py ap_vht_40
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_40 1/1
Test: VHT and 40 MHz channel
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht_40 1.132107 2019-03-06 14:50:54.003740
passed all 1 test case(s)
2019-03-06 14:50:54 ./run-tests.py ap_vht_40_fallback_to_20
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_40_fallback_to_20 1/1
Test: VHT and 40 MHz channel configuration falling back to 20 MHz
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht_40_fallback_to_20 1.335536 2019-03-06 14:50:56.022387
passed all 1 test case(s)
2019-03-06 14:50:56 ./run-tests.py ap_vht_capab_not_supported
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_capab_not_supported 1/1
Test: VHT configuration with driver not supporting all vht_capab entries
Starting AP wlan3
PASS ap_vht_capab_not_supported 0.296405 2019-03-06 14:50:56.867105
passed all 1 test case(s)
2019-03-06 14:50:56 ./run-tests.py ap_vht_csa_vht20
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_csa_vht20 1/1
Test: VHT CSA with VHT20 getting enabled
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_csa_vht20 2.483083 2019-03-06 14:50:59.848089
passed all 1 test case(s)
2019-03-06 14:50:59 ./run-tests.py ap_vht_csa_vht40
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_csa_vht40 1/1
Test: VHT CSA with VHT40 getting enabled
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_csa_vht40 2.567626 2019-03-06 14:51:03.030256
passed all 1 test case(s)
2019-03-06 14:51:03 ./run-tests.py ap_vht_csa_vht40_disable
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_csa_vht40_disable 1/1
Test: VHT CSA with VHT40 getting disabled
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_csa_vht40_disable 2.91483 2019-03-06 14:51:06.444141
passed all 1 test case(s)
2019-03-06 14:51:06 ./run-tests.py ap_vht_on_24ghz
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_on_24ghz 1/1
Test: Subset of VHT features on 2.4 GHz
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_vht_on_24ghz 1.014119 2019-03-06 14:51:08.072098
passed all 1 test case(s)
2019-03-06 14:51:08 ./run-tests.py ap_vht_tkip
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_tkip 1/1
Test: VHT and TKIP
Starting AP wlan3
Connect STA wlan0 to AP
hostapd STATUS: {'olbc_ht': '0', 'cac_time_left_seconds':
'N/A', 'num_sta_no_short_slot_time': '1', 'olbc':
'0', 'num_sta_non_erp': '0', 'supported_rates': '0c 12
18 24 30 48 60 6c', 'ht_op_mode': '0x13', 'state':
'ENABLED', 'num_sta_ht40_intolerant': '0', 'channel':
'36', 'bssid[0]': '02:00:00:00:03:00', 'ieee80211n':
'0', 'cac_time_seconds': '0', 'num_sta[0]': '1',
'ieee80211ac': '0', 'phy': 'phy3', 'max_txpower':
'23', 'num_sta_ht_no_gf': '0', 'freq': '5180',
'num_sta_ht_20_mhz': '0', 'num_sta_no_short_preamble':
'1', 'secondary_channel': '0', 'ssid[0]': 'vht',
'dtim_period': '2', 'beacon_int': '100',
'num_sta_no_ht': '1', 'bss[0]': 'wlan3'}
PASS ap_vht_tkip 1.030878 2019-03-06 14:51:09.544833
passed all 1 test case(s)
2019-03-06 14:51:09 ./run-tests.py ap_vht_use_sta_nsts
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vht_use_sta_nsts 1/1
Test: VHT with 80 MHz channel width and use_sta_nsts=1
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vht_use_sta_nsts 0.974195 2019-03-06 14:51:11.050754
passed all 1 test case(s)
2019-03-06 14:51:11 ./run-tests.py ap_vlan_file_open
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_file_open 1/1
Test: AP VLAN with open network and vlan_file mapping
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_file_open 1.364304 2019-03-06 14:51:12.922813
passed all 1 test case(s)
2019-03-06 14:51:13 ./run-tests.py ap_vlan_file_open2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_file_open2 1/1
Test: AP VLAN with open network and vlan_file mapping (2)
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_file_open2 1.305972 2019-03-06 14:51:14.855038
passed all 1 test case(s)
2019-03-06 14:51:14 ./run-tests.py ap_vlan_file_parsing
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_file_parsing 1/1
Test: hostapd vlan_file/mac_file parsing
Starting AP wlan3
PASS ap_vlan_file_parsing 0.345449 2019-03-06 14:51:15.710366
passed all 1 test case(s)
2019-03-06 14:51:15 ./run-tests.py ap_vlan_iface_cleanup_multibss
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_iface_cleanup_multibss 1/1
Test: AP VLAN operation in multi-BSS multi-VLAN case
RTNETLINK answers: File exists
Starting AP wlan4
Starting interface wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
wlan0 -> VLAN 2
test wlan1 == VLAN 1
wlan1 -> VLAN 2
test wlan0 == VLAN 2
PASS ap_vlan_iface_cleanup_multibss 3.037115 2019-03-06 14:51:19.362536
passed all 1 test case(s)
2019-03-06 14:51:19 ./run-tests.py ap_vlan_iface_cleanup_multibss_per_sta_vif
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_iface_cleanup_multibss_per_sta_vif 1/1
Test: AP VLAN operation in multi-BSS multi-VLAN case with per-sta-vif set
Starting AP wlan4
Starting interface wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
dev1->dev2 unicast data delivery failed
Traceback (most recent call last):
File "./run-tests.py", line 466, in main
t(dev, apdev)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 505, in
test_ap_vlan_iface_cleanup_multibss_per_sta_vif
'multi-bss-iface-per_sta_vif.conf')
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 413, in
ap_vlan_iface_cleanup_multibss
hwsim_utils.test_connectivity_iface(dev[1], hapd1, "brvlan1")
File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 176, in
test_connectivity_iface
max_tries=max_tries, timeout=timeout)
File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 169, in
test_connectivity
raise Exception(last_err)
Exception: dev1->dev2 unicast data delivery failed
FAIL ap_vlan_iface_cleanup_multibss_per_sta_vif 6.917146 2019-03-06 14:51:26.784664
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_vlan_iface_cleanup_multibss_per_sta_vif
2019-03-06 14:51:26 ./run-tests.py ap_vlan_open
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_open 1/1
Test: AP VLAN with open network
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_open 1.082363 2019-03-06 14:51:28.467211
passed all 1 test case(s)
2019-03-06 14:51:28 ./run-tests.py ap_vlan_open_per_sta_vif
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_open_per_sta_vif 1/1
Test: AP VLAN (dynamic) with open network
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vlan_open_per_sta_vif 0.456971 2019-03-06 14:51:29.411253
passed all 1 test case(s)
2019-03-06 14:51:29 ./run-tests.py ap_vlan_reconnect
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_reconnect 1/1
Test: AP VLAN with WPA2-PSK connect, disconnect, connect
Starting AP wlan3
connect sta
Connect STA wlan0 to AP
disconnect sta
reconnect sta
Connect STA wlan0 to AP
PASS ap_vlan_reconnect 1.732834 2019-03-06 14:51:31.553923
passed all 1 test case(s)
2019-03-06 14:51:31 ./run-tests.py ap_vlan_tagged
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_tagged 1/1
Test: AP VLAN with tagged interface
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_tagged 1.186474 2019-03-06 14:51:33.261276
passed all 1 test case(s)
2019-03-06 14:51:33 ./run-tests.py ap_vlan_tagged_wpa2_radius_id_change
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_tagged_wpa2_radius_id_change 1/1
Test: AP tagged VLAN with WPA2-Enterprise and RADIUS attributes changing VLANID
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
VLAN-ID -> 2
VLAN-ID -> 1
PASS ap_vlan_tagged_wpa2_radius_id_change 3.032435 2019-03-06 14:51:36.795625
passed all 1 test case(s)
2019-03-06 14:51:36 ./run-tests.py ap_vlan_without_station
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_without_station 1/1
Test: AP VLAN with WPA2-PSK and no station
Starting AP wlan3
Connect STA wlan0 to AP
first frame not observed
PASS ap_vlan_without_station 2.504264 2019-03-06 14:51:39.812817
passed all 1 test case(s)
2019-03-06 14:51:39 ./run-tests.py ap_vlan_wpa2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2 1/1
Test: AP VLAN with WPA2-PSK
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_wpa2 1.542693 2019-03-06 14:51:41.773509
passed all 1 test case(s)
2019-03-06 14:51:41 ./run-tests.py ap_vlan_wpa2_psk_radius_required
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_psk_radius_required 1/1
Test: AP VLAN with WPA2-PSK and RADIUS attributes required
Starting AP wlan3
connecting without VLAN
Connect STA wlan0 to AP
Received authentication request
connecting without VLAN failed as expected
connecting without VLAN (CUI/User-Name)
Connect STA wlan1 to AP
Received authentication request
connecting without VLAN failed as expected(2)
connecting with VLAN
Connect STA wlan2 to AP
Received authentication request
connecting with VLAN succeeded as expected
PASS ap_vlan_wpa2_psk_radius_required 5.737 2019-03-06 14:51:48.039627
passed all 1 test case(s)
2019-03-06 14:51:48 ./run-tests.py ap_vlan_wpa2_radius
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS attributes
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
PASS ap_vlan_wpa2_radius 1.221174 2019-03-06 14:51:49.709596
passed all 1 test case(s)
2019-03-06 14:51:49 ./run-tests.py ap_vlan_wpa2_radius_2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_2 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS EGRESS_VLANID attributes
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vlan_wpa2_radius_2 0.608278 2019-03-06 14:51:50.767792
passed all 1 test case(s)
2019-03-06 14:51:50 ./run-tests.py ap_vlan_wpa2_radius_id_change
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_id_change 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS attributes changing VLANID
Starting AP wlan4
Starting AP wlan3
Connect STA wlan0 to AP
VLAN-ID -> 2
VLAN-ID -> 1
PASS ap_vlan_wpa2_radius_id_change 2.86585 2019-03-06 14:51:54.156534
passed all 1 test case(s)
2019-03-06 14:51:54 ./run-tests.py ap_vlan_wpa2_radius_mixed
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_mixed 1/1
Test: AP VLAN with WPA2-Enterprise and tagged+untagged VLANs
Starting AP wlan3
Connect STA wlan0 to AP
Test connectivity in untagged VLAN 2
Test connectivity in tagged VLAN 1
PASS ap_vlan_wpa2_radius_mixed 0.853124 2019-03-06 14:51:55.513129
passed all 1 test case(s)
2019-03-06 14:51:55 ./run-tests.py ap_vlan_wpa2_radius_required
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_required 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS attributes required
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan2 to AP
PASS ap_vlan_wpa2_radius_required 0.764924 2019-03-06 14:51:56.819940
passed all 1 test case(s)
2019-03-06 14:51:56 ./run-tests.py ap_vlan_wpa2_radius_tagged
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_vlan_wpa2_radius_tagged 1/1
Test: AP VLAN with WPA2-Enterprise and RADIUS EGRESS_VLANID attributes
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_vlan_wpa2_radius_tagged 0.609559 2019-03-06 14:51:57.935190
passed all 1 test case(s)
2019-03-06 14:51:57 ./run-tests.py ap_wds_sta
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wds_sta 1/1
Test: WPA2-PSK AP with STA using 4addr mode
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wds_sta 0.837848 2019-03-06 14:51:59.218739
passed all 1 test case(s)
2019-03-06 14:51:59 ./run-tests.py ap_wds_sta_open
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wds_sta_open 1/1
Test: Open AP with STA using 4addr mode
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wds_sta_open 0.837889 2019-03-06 14:52:00.470120
passed all 1 test case(s)
2019-03-06 14:52:00 ./run-tests.py ap_wds_sta_wep
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wds_sta_wep 1/1
Test: WEP AP with STA using 4addr mode
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wds_sta_wep 0.781068 2019-03-06 14:52:01.692369
passed all 1 test case(s)
2019-03-06 14:52:01 ./run-tests.py ap_wep_tdls
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wep_tdls 1/1
Test: WEP AP and two stations using TDLS
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Setup TDLS
Teardown TDLS
Setup TDLS
PASS ap_wep_tdls 4.639856 2019-03-06 14:52:06.801546
passed all 1 test case(s)
2019-03-06 14:52:06 ./run-tests.py ap_wep_to_wpa
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wep_to_wpa 1/1
Test: WEP to WPA2-PSK configuration change in hostapd
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wep_to_wpa 1.090286 2019-03-06 14:52:08.368425
passed all 1 test case(s)
2019-03-06 14:52:08 ./run-tests.py ap_wmm_uapsd
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wmm_uapsd 1/1
Test: AP with U-APSD advertisement
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wmm_uapsd 0.411499 2019-03-06 14:52:09.213815
passed all 1 test case(s)
2019-03-06 14:52:09 ./run-tests.py ap_wowlan_triggers
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wowlan_triggers 1/1
Test: AP with wowlan_triggers
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wowlan_triggers 0.441892 2019-03-06 14:52:10.114466
passed all 1 test case(s)
2019-03-06 14:52:10 ./run-tests.py ap_wpa2_already_in_bridge
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_already_in_bridge 1/1
Test: hostapd behavior with interface already in bridge
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_already_in_bridge 0.550578 2019-03-06 14:52:11.142609
passed all 1 test case(s)
2019-03-06 14:52:11 ./run-tests.py ap_wpa2_bridge_fdb
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_bridge_fdb 1/1
Test: Bridge FDB entry removal
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_bridge_fdb 1.72628 2019-03-06 14:52:13.304985
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_delayed_group_m1_retransmission
ignored_by_lkp ap_wpa2_delayed_m1_m3_retransmission
ignored_by_lkp ap_wpa2_delayed_m1_m3_retransmission2
2019-03-06 14:52:13 ./run-tests.py ap_wpa2_delayed_m1_m3_zero_tk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_delayed_m1_m3_zero_tk 1/1
Test: Delayed M1+M3 retransmission and zero TK
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_delayed_m1_m3_zero_tk 1.622449 2019-03-06 14:52:15.379450
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_delayed_m3_retransmission
2019-03-06 14:52:15 ./run-tests.py ap_wpa2_disable_eapol_retry
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_disable_eapol_retry 1/1
Test: WPA2-PSK disable EAPOL-Key retry
Starting AP wlan3
Verify working 4-way handshake without retries
Connect STA wlan0 to AP
Verify no retransmission of message 3/4
Connect STA wlan0 to AP
PASS ap_wpa2_disable_eapol_retry 4.660082 2019-03-06 14:52:20.553389
passed all 1 test case(s)
2019-03-06 14:52:20 ./run-tests.py ap_wpa2_disable_eapol_retry_group
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_disable_eapol_retry_group 1/1
Test: WPA2-PSK disable EAPOL-Key retry for group handshake
Starting AP wlan3
Connect STA wlan1 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_disable_eapol_retry_group 5.87627 2019-03-06 14:52:26.943578
passed all 1 test case(s)
2019-03-06 14:52:27 ./run-tests.py ap_wpa2_eap_aka
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka 1/1
Test: WPA2-Enterprise connection using EAP-AKA
Starting AP wlan3
Connect STA wlan0 to AP
Negative test with incorrect key
Connect STA wlan0 to AP
Invalid Milenage key
Connect STA wlan0 to AP
Invalid Milenage key(2)
Connect STA wlan0 to AP
Invalid Milenage key(3)
Connect STA wlan0 to AP
Invalid Milenage key(4)
Connect STA wlan0 to AP
Invalid Milenage key(5)
Connect STA wlan0 to AP
Invalid Milenage key(6)
Connect STA wlan0 to AP
Missing key configuration
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka 1.879136 2019-03-06 14:52:29.297163
passed all 1 test case(s)
2019-03-06 14:52:29 ./run-tests.py ap_wpa2_eap_aka_config
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_config 1/1
Test: EAP-AKA configuration options
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_config 0.518298 2019-03-06 14:52:30.425230
passed all 1 test case(s)
2019-03-06 14:52:30 ./run-tests.py ap_wpa2_eap_aka_ext
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_ext 1/1
Test: WPA2-Enterprise connection using EAP-AKA and external UMTS auth
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_ext 2.622237 2019-03-06 14:52:33.522421
passed all 1 test case(s)
2019-03-06 14:52:33 ./run-tests.py ap_wpa2_eap_aka_ext_auth_fail
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_ext_auth_fail 1/1
Test: EAP-AKA with external UMTS auth and auth failing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_ext_auth_fail 0.550051 2019-03-06 14:52:34.555913
passed all 1 test case(s)
2019-03-06 14:52:34 ./run-tests.py ap_wpa2_eap_aka_prime
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_prime 1/1
Test: WPA2-Enterprise connection using EAP-AKA'
Starting AP wlan3
Connect STA wlan0 to AP
EAP-AKA' bidding protection when EAP-AKA enabled as well
Connect STA wlan1 to AP
Negative test with incorrect key
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_prime 0.909848 2019-03-06 14:52:35.962410
passed all 1 test case(s)
2019-03-06 14:52:36 ./run-tests.py ap_wpa2_eap_aka_prime_ext
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_prime_ext 1/1
Test: EAP-AKA' with external UMTS auth to hit Synchronization-Failure
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_prime_ext 0.528418 2019-03-06 14:52:37.036937
passed all 1 test case(s)
2019-03-06 14:52:37 ./run-tests.py ap_wpa2_eap_aka_prime_ext_auth_fail
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_prime_ext_auth_fail 1/1
Test: EAP-AKA' with external UMTS auth and auth failing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_aka_prime_ext_auth_fail 0.561092 2019-03-06 14:52:38.218074
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_eap_aka_prime_sql
2019-03-06 14:52:38 ./run-tests.py ap_wpa2_eap_aka_sql
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_aka_sql 1/1
Test: WPA2-Enterprise connection using EAP-AKA (SQL)
Starting AP wlan3
Connect STA wlan0 to AP
AKA fast re-authentication
AKA full auth with pseudonym
AKA full auth with permanent identity
Association and EAP start timed out
Traceback (most recent call last):
File "./run-tests.py", line 464, in main
t(dev, apdev, params)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 931, in
test_ap_wpa2_eap_aka_sql
eap_reauth(dev[0], "AKA")
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 215, in
eap_reauth
expect_failure=expect_failure)
File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 151, in
eap_check_auth
raise Exception("Association and EAP start timed out")
Exception: Association and EAP start timed out
FAIL ap_wpa2_eap_aka_sql 16.650138 2019-03-06 14:52:55.377436
passed 0 test case(s)
skipped 0 test case(s)
failed tests: ap_wpa2_eap_aka_sql
2019-03-06 14:52:55 ./run-tests.py ap_wpa2_eap_assoc_rsn
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_assoc_rsn 1/1
Test: WPA2-Enterprise AP and association request RSN IE differences
Starting AP wlan3
Starting AP wlan4
Normal wpa_supplicant assoc req RSN IE
Connect STA wlan0 to AP
Extra PMKIDCount field in RSN IE
Connect STA wlan0 to AP
Extra Group Management Cipher Suite in RSN IE
Connect STA wlan0 to AP
Extra undefined extension field in RSN IE
Connect STA wlan0 to AP
RSN IE without RSN Capabilities
Connect STA wlan0 to AP
RSN IE without AKM
Connect STA wlan0 to AP
RSN IE without pairwise
Connect STA wlan0 to AP
RSN IE without group
Connect STA wlan0 to AP
Normal wpa_supplicant assoc req RSN IE
Connect STA wlan0 to AP
Group management cipher included in assoc req RSN IE
Connect STA wlan0 to AP
Invalid group cipher
Connect STA wlan0 to AP
Invalid pairwise cipher
Connect STA wlan0 to AP
Management frame protection not enabled
Connect STA wlan0 to AP
Unsupported management group cipher
Connect STA wlan0 to AP
PASS ap_wpa2_eap_assoc_rsn 2.602837 2019-03-06 14:52:58.595241
passed all 1 test case(s)
2019-03-06 14:52:58 ./run-tests.py ap_wpa2_eap_eke
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_eke 1/1
Test: WPA2-Enterprise connection using EAP-EKE
Starting AP wlan3
Connect STA wlan0 to AP
Test forced algorithm selection
Test failed algorithm negotiation
Negative test with incorrect password
Connect STA wlan0 to AP
PASS ap_wpa2_eap_eke 4.020144 2019-03-06 14:53:03.144026
passed all 1 test case(s)
2019-03-06 14:53:03 ./run-tests.py ap_wpa2_eap_eke_many --long
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_eke_many 1/1
Test: WPA2-Enterprise connection using EAP-EKE (many connections) [long]
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan2 to AP
Total success=300 failure=0
PASS ap_wpa2_eap_eke_many 46.712606 2019-03-06 14:53:50.510422
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_eap_eke_server_oom
ignored_by_lkp ap_wpa2_eap_eke_serverid_nai
2019-03-06 14:53:50 ./run-tests.py ap_wpa2_eap_expanded_nak
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_expanded_nak 1/1
Test: WPA2-Enterprise connection with EAP resulting in expanded NAK
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_expanded_nak 4.282641 2019-03-06 14:53:55.254147
passed all 1 test case(s)
2019-03-06 14:53:55 ./run-tests.py ap_wpa2_eap_ext_enable_network_while_connected
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ext_enable_network_while_connected 1/1
Test: WPA2-Enterprise interactive identity entry and ENABLE_NETWORK
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ext_enable_network_while_connected 1.423158 2019-03-06 14:53:57.090324
passed all 1 test case(s)
2019-03-06 14:53:57 ./run-tests.py ap_wpa2_eap_fast_binary_pac
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_binary_pac 1/1
Test: WPA2-Enterprise connection using EAP-FAST and binary PAC format
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_binary_pac 0.884059 2019-03-06 14:53:58.450811
passed all 1 test case(s)
2019-03-06 14:53:58 ./run-tests.py ap_wpa2_eap_fast_binary_pac_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_binary_pac_errors 1/1
Test: EAP-FAST and binary PAC errors
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_binary_pac_errors 5.486333 2019-03-06 14:54:04.349530
passed all 1 test case(s)
2019-03-06 14:54:04 ./run-tests.py ap_wpa2_eap_fast_cipher_suites
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_cipher_suites 1/1
Test: EAP-FAST and different TLS cipher suites
Starting AP wlan3
Connect STA wlan0 to AP
Testing DHE-RSA-AES128-SHA
Connect STA wlan0 to AP
Testing RC4-SHA
Connect STA wlan0 to AP
Allow failure due to missing TLS library support
Testing AES128-SHA
Connect STA wlan0 to AP
Testing AES256-SHA
Connect STA wlan0 to AP
Testing DHE-RSA-AES256-SHA
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_cipher_suites 1.15355 2019-03-06 14:54:05.975175
passed all 1 test case(s)
2019-03-06 14:54:06 ./run-tests.py ap_wpa2_eap_fast_eap_aka
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_eap_aka 1/1
Test: WPA2-Enterprise connection using EAP-FAST/EAP-AKA
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_eap_aka 0.429208 2019-03-06 14:54:06.805386
passed all 1 test case(s)
2019-03-06 14:54:06 ./run-tests.py ap_wpa2_eap_fast_eap_sim
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_eap_sim 1/1
Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_eap_sim 0.478126 2019-03-06 14:54:07.828977
passed all 1 test case(s)
2019-03-06 14:54:07 ./run-tests.py ap_wpa2_eap_fast_eap_sim_ext
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_eap_sim_ext 1/1
Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM and external GSM auth
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_eap_sim_ext 0.479192 2019-03-06 14:54:08.798097
passed all 1 test case(s)
2019-03-06 14:54:08 ./run-tests.py ap_wpa2_eap_fast_gtc_auth_prov
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_gtc_auth_prov 1/1
Test: WPA2-Enterprise connection using EAP-FAST/GTC and authenticated provisioning
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_gtc_auth_prov 0.496879 2019-03-06 14:54:09.711813
passed all 1 test case(s)
2019-03-06 14:54:09 ./run-tests.py ap_wpa2_eap_fast_gtc_identity_change
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_gtc_identity_change 1/1
Test: WPA2-Enterprise connection using EAP-FAST/GTC and identity changing
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_gtc_identity_change 0.744845 2019-03-06 14:54:10.963946
passed all 1 test case(s)
2019-03-06 14:54:11 ./run-tests.py ap_wpa2_eap_fast_missing_pac_config
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_missing_pac_config 1/1
Test: WPA2-Enterprise connection using EAP-FAST and missing PAC config
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_missing_pac_config 0.542109 2019-03-06 14:54:11.934257
passed all 1 test case(s)
2019-03-06 14:54:11 ./run-tests.py ap_wpa2_eap_fast_mschapv2_unauth_prov
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_mschapv2_unauth_prov 1/1
Test: WPA2-Enterprise connection using EAP-FAST/MSCHAPv2 and unauthenticated provisioning
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_mschapv2_unauth_prov 0.849755 2019-03-06 14:54:13.337437
passed all 1 test case(s)
2019-03-06 14:54:13 ./run-tests.py ap_wpa2_eap_fast_pac_file
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_pac_file 1/1
Test: WPA2-Enterprise connection using EAP-FAST/MSCHAPv2 and PAC file
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan1 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_eap_fast_pac_file 1.605376 2019-03-06 14:54:15.457860
passed all 1 test case(s)
2019-03-06 14:54:15 ./run-tests.py ap_wpa2_eap_fast_pac_lifetime
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_pac_lifetime 1/1
Test: EAP-FAST and PAC lifetime
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_pac_lifetime 3.767745 2019-03-06 14:54:19.670081
passed all 1 test case(s)
2019-03-06 14:54:19 ./run-tests.py ap_wpa2_eap_fast_pac_refresh
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_pac_refresh 1/1
Test: EAP-FAST and PAC refresh
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_pac_refresh 1.950865 2019-03-06 14:54:22.165700
passed all 1 test case(s)
2019-03-06 14:54:22 ./run-tests.py ap_wpa2_eap_fast_pac_truncate
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_pac_truncate 1/1
Test: EAP-FAST and PAC list truncation
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_pac_truncate 3.141389 2019-03-06 14:54:25.831450
passed all 1 test case(s)
2019-03-06 14:54:25 ./run-tests.py ap_wpa2_eap_fast_prf_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_prf_oom 1/1
Test: WPA2-Enterprise connection using EAP-FAST and OOM in PRF
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_prf_oom 0.438352 2019-03-06 14:54:26.720900
passed all 1 test case(s)
2019-03-06 14:54:26 ./run-tests.py ap_wpa2_eap_fast_prov
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_prov 1/1
Test: EAP-FAST and provisioning options
Starting AP wlan3
Provisioning attempt while server has provisioning disabled
Connect STA wlan0 to AP
Authenticated provisioning
Provisioning disabled - using previously provisioned PAC
Drop PAC and verify connection failure
Anonymous provisioning
Provisioning disabled - using previously provisioned PAC
PASS ap_wpa2_eap_fast_prov 2.306125 2019-03-06 14:54:29.581669
passed all 1 test case(s)
2019-03-06 14:54:29 ./run-tests.py ap_wpa2_eap_fast_server_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_server_oom 1/1
Test: EAP-FAST/MSCHAPv2 and server OOM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_server_oom 0.977491 2019-03-06 14:54:31.124305
passed all 1 test case(s)
2019-03-06 14:54:31 ./run-tests.py ap_wpa2_eap_fast_text_pac_errors
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_fast_text_pac_errors 1/1
Test: EAP-FAST and text PAC errors
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Starting AP wlan4
Connect STA wlan0 to AP
Starting AP wlan4
Connect STA wlan0 to AP
Starting AP wlan4
Connect STA wlan0 to AP
PASS ap_wpa2_eap_fast_text_pac_errors 4.904942 2019-03-06 14:54:36.453412
passed all 1 test case(s)
2019-03-06 14:54:36 ./run-tests.py ap_wpa2_eap_gpsk
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_gpsk 1/1
Test: WPA2-Enterprise connection using EAP-GPSK
Starting AP wlan3
Connect STA wlan0 to AP
Test forced algorithm selection
Test failed algorithm negotiation
Negative test with incorrect password
Connect STA wlan0 to AP
PASS ap_wpa2_eap_gpsk 1.471324 2019-03-06 14:54:38.394943
passed all 1 test case(s)
2019-03-06 14:54:38 ./run-tests.py ap_wpa2_eap_gpsk_ptk_rekey_ap
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_gpsk_ptk_rekey_ap 1/1
Test: WPA2-Enterprise with EAP-GPSK and PTK rekey enforced by AP
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_gpsk_ptk_rekey_ap 2.467617 2019-03-06 14:54:41.422483
passed all 1 test case(s)
2019-03-06 14:54:41 ./run-tests.py ap_wpa2_eap_ikev2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ikev2 1/1
Test: WPA2-Enterprise connection using EAP-IKEv2
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Negative test with incorrect password
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ikev2 0.910431 2019-03-06 14:54:42.857721
passed all 1 test case(s)
2019-03-06 14:54:42 ./run-tests.py ap_wpa2_eap_ikev2_as_frag
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ikev2_as_frag 1/1
Test: WPA2-Enterprise connection using EAP-IKEv2 with server fragmentation
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ikev2_as_frag 0.427744 2019-03-06 14:54:43.804406
passed all 1 test case(s)
2019-03-06 14:54:43 ./run-tests.py ap_wpa2_eap_ikev2_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_ikev2_oom 1/1
Test: WPA2-Enterprise connection using EAP-IKEv2 and OOM
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
Connect STA wlan0 to AP
PASS ap_wpa2_eap_ikev2_oom 0.860522 2019-03-06 14:54:45.226560
passed all 1 test case(s)
ignored_by_lkp ap_wpa2_eap_in_bridge
2019-03-06 14:54:45 ./run-tests.py ap_wpa2_eap_interactive
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_interactive 1/1
Test: WPA2-Enterprise connection using interactive identity/password entry
Starting AP wlan3
Connection with dynamic TTLS/MSCHAPv2 password entry
Connect STA wlan0 to AP
Connection with dynamic TTLS/MSCHAPv2 identity and password entry
Connect STA wlan0 to AP
Connection with dynamic TTLS/EAP-MSCHAPv2 password entry
Connect STA wlan0 to AP
Connection with dynamic TTLS/EAP-MD5 password entry
Connect STA wlan0 to AP
Connection with dynamic PEAP/EAP-MSCHAPv2 password entry
Connect STA wlan0 to AP
Connection with dynamic PEAP/EAP-GTC password entry
Connect STA wlan0 to AP
PASS ap_wpa2_eap_interactive 1.273634 2019-03-06 14:54:47.031263
passed all 1 test case(s)
2019-03-06 14:54:47 ./run-tests.py ap_wpa2_eap_no_workaround
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_no_workaround 1/1
Test: WPA2-Enterprise connection using EAP-TTLS and eap_workaround=0
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_no_workaround 0.484398 2019-03-06 14:54:48.061389
passed all 1 test case(s)
2019-03-06 14:54:48 ./run-tests.py ap_wpa2_eap_non_ascii_identity
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_non_ascii_identity 1/1
Test: WPA2-Enterprise connection attempt using non-ASCII identity
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_eap_non_ascii_identity 4.575776 2019-03-06 14:54:53.167082
passed all 1 test case(s)
2019-03-06 14:54:53 ./run-tests.py ap_wpa2_eap_non_ascii_identity2
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_non_ascii_identity2 1/1
Test: WPA2-Enterprise connection attempt using non-ASCII identity
Starting AP wlan3
Connect STA wlan0 to AP
Connect STA wlan1 to AP
PASS ap_wpa2_eap_non_ascii_identity2 4.400165 2019-03-06 14:54:58.065977
passed all 1 test case(s)
2019-03-06 14:54:58 ./run-tests.py ap_wpa2_eap_oom
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_oom 1/1
Test: EAP server and OOM
Starting AP wlan3
Connect STA wlan0 to AP
PASS ap_wpa2_eap_oom 1.514796 2019-03-06 14:55:00.093552
passed all 1 test case(s)
2019-03-06 14:55:00 ./run-tests.py ap_wpa2_eap_pax
DEV: wlan0: 02:00:00:00:00:00
DEV: wlan1: 02:00:00:00:01:00
DEV: wlan2: 02:00:00:00:02:00
APDEV: wlan3
APDEV: wlan4
START ap_wpa2_eap_pax 1/1
Test: WPA2-Enterprise connection using EAP-PAX
Starting AP wlan3
Connect STA wlan0 to AP
Negative test with incorrect password
Connect STA wlan0 to AP
PASS ap_wpa2_eap_pax 0.550607 2019-03-06 14:55:01.170920
passed all 1 test case(s)
2019-03-06 14:55:01 ./stop.sh
2019-03-06 14:55:02 ./start.sh channels=4
2019-03-06 14:55:03 ./stop.sh
To reproduce:
# build kernel
cd linux
cp config-4.19.0-12453-gc752cac .config
make HOSTCC=gcc-8 CC=gcc-8 ARCH=x86_64 olddefconfig
make HOSTCC=gcc-8 CC=gcc-8 ARCH=x86_64 prepare
make HOSTCC=gcc-8 CC=gcc-8 ARCH=x86_64 modules_prepare
make HOSTCC=gcc-8 CC=gcc-8 ARCH=x86_64 SHELL=/bin/bash
make HOSTCC=gcc-8 CC=gcc-8 ARCH=x86_64 bzImage
git clone
https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email
Thanks,
Rong Chen