Home | History | Annotate | only in /src/tests/sbin/ifconfig
History log of /src/tests/sbin/ifconfig
RevisionDateAuthorComments
 1.9 30-Jun-2020  jruoho Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912.
 1.8 27-Jun-2020  jruoho Add also a test that writes random garbage to every ifconfig(8) option that
takes parameters. Based on quick testing, iwn(4) and wm(4) pass, but
urtwn(4) panics. Use at your own risk; in some cases, it may be possible
that horrors are written directly to the hardware.
 1.7 27-Jun-2020  jruoho Add a basic test for enabling/disabling network interface capabilities.
 1.6 27-Jun-2020  jruoho Add test cases for different 802.11 options. These include cases for
PR kern/35045, PR kern/45745, and PR kern/55424.
 1.5 25-Jun-2020  jruoho Test creating thousands of bridge(4)'s. Unlike with tap(4) (PR kern/55417),
this test succeeeds. It is even possible to have the ultimate ifconfig(8)
output with more than 65,000 devices.
 1.4 25-Jun-2020  jruoho Add a test case for kern/52771.
 1.3 25-Jun-2020  jruoho Add test cases for PR kern/53546 and PR kern/55417. Both are skipped as
both reproduce panics.
 1.2 24-Jun-2020  jruoho Add a test case for PR bin/55389.
 1.1 03-May-2011  jruoho Add a test for non-critical/low PR bin/43141.
 1.1 25-Jun-2020  jruoho Test creating thousands of bridge(4)'s. Unlike with tap(4) (PR kern/55417),
this test succeeeds. It is even possible to have the ultimate ifconfig(8)
output with more than 65,000 devices.
 1.3 18-Oct-2023  rin ifconfig/t_capabilities: s/if_capabilities/if_capenable/ in message
 1.2 18-Oct-2023  rin ifconfig/t_capabilities: Skip unless run_unsafe is configured to yes

The test modifies if_capabilities for all available interfaces.
This is not a behavior we expect for normal ATF runs.

Similar tests modifying living network configurations are already
skipped by default. This is the last one remained for ifconfig(8).

Also, I'm not sure whether this is a test for ifconfig(8).

XXX
Pullup to netbsd-10 ASAP. No other branches are affected.
 1.1 27-Jun-2020  jruoho branches: 1.1.6;
Add a basic test for enabling/disabling network interface capabilities.
 1.1.6.1 18-Oct-2023  martin Pull up following revision(s) (requested by rin in ticket #422):

tests/sbin/ifconfig/t_capabilities.sh: revision 1.2
tests/sbin/ifconfig/t_capabilities.sh: revision 1.3

ifconfig/t_capabilities: Skip unless run_unsafe is configured to yes

The test modifies if_capabilities for all available interfaces.
This is not a behavior we expect for normal ATF runs.

Similar tests modifying living network configurations are already
skipped by default. This is the last one remained for ifconfig(8).
Also, I'm not sure whether this is a test for ifconfig(8).

ifconfig/t_capabilities: s/if_capabilities/if_capenable/ in message
 1.4 18-Mar-2012  jruoho Move more PR references from comments to ATF's "descr".
 1.3 17-Mar-2012  jruoho Add '-e ignore" to atf-check(1) and remove xfail. Pointed by njoly@.
 1.2 11-May-2011  njoly branches: 1.2.4;
Remove shebang lines from test-script sources; avoids duplicate with
the build process which adds one too.
 1.1 03-May-2011  jruoho Add a test for non-critical/low PR bin/43141.
 1.2.4.1 17-Apr-2012  yamt sync with head
 1.4 27-Jul-2020  jruoho Use the new "run_unsafe" atf_config_get() option also with a couple of other
tests that are known to be unsafe.
 1.3 03-Jul-2020  jruoho Skip these also for Qemu runs as they cause panics. Point to PR kern/55451.
 1.2 27-Jun-2020  jruoho Ups. Fix shell parameter.
 1.1 27-Jun-2020  jruoho Add also a test that writes random garbage to every ifconfig(8) option that
takes parameters. Based on quick testing, iwn(4) and wm(4) pass, but
urtwn(4) panics. Use at your own risk; in some cases, it may be possible
that horrors are written directly to the hardware.
 1.4 27-Jul-2020  gson Skip the repeated_link_addr test by default as it causes the
evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
safe to run by default even after that bug is fixed, for similar
reasons as t_repeated_updown.
 1.3 06-Jul-2020  jruoho Remove the expected timeout; there is something more sinister behind the
timeouts seen on the Qemu/evbarm-aarch64 runs.
 1.2 03-Jul-2020  jruoho Expect a timeout for evbarm-aarch64, as seen in the recent Qemu runs.
 1.1 30-Jun-2020  jruoho Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912.
 1.2 10-Dec-2020  mrg apply this change to a a couple more tests:
---
date: 2020-07-27 09:57:44 -0700; author: gson; state: Exp; lines: +6 -1; commitid: m3HouRBlhyJQVJhC;
Skip the repeated_link_addr test by default as it causes the
evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
safe to run by default even after that bug is fixed, for similar
reasons as t_repeated_updown.
---

t_repeated_mtu.sh changes the MTU, which may cause NFS to fail.
if you have NFS root, this is system killing.

t_repeated_scan.sh kills and restarts both hostapd and
wpa_supplicant.
 1.1 30-Jun-2020  jruoho Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912.
 1.6 10-Dec-2020  mrg apply this change to a a couple more tests:
---
date: 2020-07-27 09:57:44 -0700; author: gson; state: Exp; lines: +6 -1; commitid: m3HouRBlhyJQVJhC;
Skip the repeated_link_addr test by default as it causes the
evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
safe to run by default even after that bug is fixed, for similar
reasons as t_repeated_updown.
---

t_repeated_mtu.sh changes the MTU, which may cause NFS to fail.
if you have NFS root, this is system killing.

t_repeated_scan.sh kills and restarts both hostapd and
wpa_supplicant.
 1.5 27-Jun-2020  jruoho Use atf_pass to avoid test failure in case there are no suitable interfaces.
 1.4 25-Jun-2020  jruoho Reference also PR kern/53860.
 1.3 25-Jun-2020  jruoho Require root privileges.
 1.2 24-Jun-2020  jruoho Fix references in comments.
 1.1 24-Jun-2020  jruoho Add a test case for PR bin/55389.
 1.5 27-Jul-2020  gson Instead of just skipping interfaces that are "up", skip the whole
repeated_updown test case unless explicitly enabled with "atf-run -v
run_unsafe=yes". Gratuitously configuring interfaces "up" is no more
safe than gratuitously configuring them "down"; for example, it could
lead to accidentally connecting to an insecure network or diverting
traffic from the desired route.
 1.4 22-Jul-2020  martin Skip interfaces that are already UP before the test starts. We can
not change state of the test host this way, it breaks e.g. test systems
with the root filesystem on NFS.
 1.3 27-Jun-2020  jruoho Use atf_pass to avoid test failure in case there are no suitable interfaces.
 1.2 25-Jun-2020  jruoho Reference also PR kern/52526.
 1.1 25-Jun-2020  jruoho Add a test case for kern/52771.
 1.5 25-Jun-2020  jruoho Test creating thousands of bridge(4)'s. Unlike with tap(4) (PR kern/55417),
this test succeeeds. It is even possible to have the ultimate ifconfig(8)
output with more than 65,000 devices.
 1.4 25-Jun-2020  jruoho Instead of UINT_MAX + 2, test what is claimed.
 1.3 25-Jun-2020  jruoho Actually create the tap(4) with a negative device number. Doh.
 1.2 25-Jun-2020  jruoho Fix pastos.
 1.1 25-Jun-2020  jruoho Add test cases for PR kern/53546 and PR kern/55417. Both are skipped as
both reproduce panics.
 1.2 08-Sep-2020  mrg disable these tests unless ATF_SBIN_IFCONFIG_WIFI_ENABLE=yes is
in the environment. they change wifi configuration, restart
wpa_supplicant and hostapd, and, on broken wifi chipsets, may
hang the test run.
 1.1 27-Jun-2020  jruoho Add test cases for different 802.11 options. These include cases for
PR kern/35045, PR kern/45745, and PR kern/55424.

RSS XML Feed