| History log of /src/tests/sbin/ifconfig | 
    | Revision | Date | Author | Comments | 
| 1.9 | 30-Jun-2020 | jruoho | Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912. 
 | 
| 1.8 | 27-Jun-2020 | jruoho | Add also a test that writes random garbage to every ifconfig(8) option that takes parameters. Based on quick testing, iwn(4) and wm(4) pass, but
 urtwn(4) panics. Use at your own risk; in some cases, it may be possible
 that horrors are written directly to the hardware.
 
 | 
| 1.7 | 27-Jun-2020 | jruoho | Add a basic test for enabling/disabling network interface capabilities. 
 | 
| 1.6 | 27-Jun-2020 | jruoho | Add test cases for different 802.11 options. These include cases for PR kern/35045, PR kern/45745, and PR kern/55424.
 
 | 
| 1.5 | 25-Jun-2020 | jruoho | Test creating thousands of bridge(4)'s.  Unlike with tap(4) (PR kern/55417), this test succeeeds. It is even possible to have the ultimate ifconfig(8)
 output with more than 65,000 devices.
 
 | 
| 1.4 | 25-Jun-2020 | jruoho | Add a test case for kern/52771. 
 | 
| 1.3 | 25-Jun-2020 | jruoho | Add test cases for PR kern/53546 and PR kern/55417. Both are skipped as both reproduce panics.
 
 | 
| 1.2 | 24-Jun-2020 | jruoho | Add a test case for PR bin/55389. 
 | 
| 1.1 | 03-May-2011 | jruoho | Add a test for non-critical/low PR bin/43141. 
 | 
| 1.1 | 25-Jun-2020 | jruoho | Test creating thousands of bridge(4)'s.  Unlike with tap(4) (PR kern/55417), this test succeeeds. It is even possible to have the ultimate ifconfig(8)
 output with more than 65,000 devices.
 
 | 
| 1.3 | 18-Oct-2023 | rin | ifconfig/t_capabilities: s/if_capabilities/if_capenable/ in message 
 | 
| 1.2 | 18-Oct-2023 | rin | ifconfig/t_capabilities: Skip unless run_unsafe is configured to yes 
 The test modifies if_capabilities for all available interfaces.
 This is not a behavior we expect for normal ATF runs.
 
 Similar tests modifying living network configurations are already
 skipped by default. This is the last one remained for ifconfig(8).
 
 Also, I'm not sure whether this is a test for ifconfig(8).
 
 XXX
 Pullup to netbsd-10 ASAP. No other branches are affected.
 
 | 
| 1.1 | 27-Jun-2020 | jruoho | branches:  1.1.6; Add a basic test for enabling/disabling network interface capabilities.
 
 | 
| 1.1.6.1 | 18-Oct-2023 | martin | Pull up following revision(s) (requested by rin in ticket #422): 
 tests/sbin/ifconfig/t_capabilities.sh: revision 1.2
 tests/sbin/ifconfig/t_capabilities.sh: revision 1.3
 
 ifconfig/t_capabilities: Skip unless run_unsafe is configured to yes
 
 The test modifies if_capabilities for all available interfaces.
 This is not a behavior we expect for normal ATF runs.
 
 Similar tests modifying living network configurations are already
 skipped by default. This is the last one remained for ifconfig(8).
 Also, I'm not sure whether this is a test for ifconfig(8).
 
 ifconfig/t_capabilities: s/if_capabilities/if_capenable/ in message
 
 | 
| 1.4 | 18-Mar-2012 | jruoho | Move more PR references from comments to ATF's "descr". 
 | 
| 1.3 | 17-Mar-2012 | jruoho | Add '-e ignore" to atf-check(1) and remove xfail. Pointed by njoly@. 
 | 
| 1.2 | 11-May-2011 | njoly | branches:  1.2.4; Remove shebang lines from test-script sources; avoids duplicate with
 the build process which adds one too.
 
 | 
| 1.1 | 03-May-2011 | jruoho | Add a test for non-critical/low PR bin/43141. 
 | 
| 1.2.4.1 | 17-Apr-2012 | yamt | sync with head 
 | 
| 1.4 | 27-Jul-2020 | jruoho | Use the new "run_unsafe" atf_config_get() option also with a couple of other tests that are known to be unsafe.
 
 | 
| 1.3 | 03-Jul-2020 | jruoho | Skip these also for Qemu runs as they cause panics. Point to PR kern/55451. 
 | 
| 1.2 | 27-Jun-2020 | jruoho | Ups. Fix shell parameter. 
 | 
| 1.1 | 27-Jun-2020 | jruoho | Add also a test that writes random garbage to every ifconfig(8) option that takes parameters. Based on quick testing, iwn(4) and wm(4) pass, but
 urtwn(4) panics. Use at your own risk; in some cases, it may be possible
 that horrors are written directly to the hardware.
 
 | 
| 1.4 | 27-Jul-2020 | gson | Skip the repeated_link_addr test by default as it causes the evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
 safe to run by default even after that bug is fixed, for similar
 reasons as t_repeated_updown.
 
 | 
| 1.3 | 06-Jul-2020 | jruoho | Remove the expected timeout; there is something more sinister behind the timeouts seen on the Qemu/evbarm-aarch64 runs.
 
 | 
| 1.2 | 03-Jul-2020 | jruoho | Expect a timeout for evbarm-aarch64, as seen in the recent Qemu runs. 
 | 
| 1.1 | 30-Jun-2020 | jruoho | Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912. 
 | 
| 1.2 | 10-Dec-2020 | mrg | apply this change to a a couple more tests: ---
 date: 2020-07-27 09:57:44 -0700;  author: gson;  state: Exp;  lines: +6 -1;  commitid: m3HouRBlhyJQVJhC;
 Skip the repeated_link_addr test by default as it causes the
 evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
 safe to run by default even after that bug is fixed, for similar
 reasons as t_repeated_updown.
 ---
 
 t_repeated_mtu.sh changes the MTU, which may cause NFS to fail.
 if you have NFS root, this is system killing.
 
 t_repeated_scan.sh kills and restarts both hostapd and
 wpa_supplicant.
 
 | 
| 1.1 | 30-Jun-2020 | jruoho | Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912. 
 | 
| 1.6 | 10-Dec-2020 | mrg | apply this change to a a couple more tests: ---
 date: 2020-07-27 09:57:44 -0700;  author: gson;  state: Exp;  lines: +6 -1;  commitid: m3HouRBlhyJQVJhC;
 Skip the repeated_link_addr test by default as it causes the
 evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
 safe to run by default even after that bug is fixed, for similar
 reasons as t_repeated_updown.
 ---
 
 t_repeated_mtu.sh changes the MTU, which may cause NFS to fail.
 if you have NFS root, this is system killing.
 
 t_repeated_scan.sh kills and restarts both hostapd and
 wpa_supplicant.
 
 | 
| 1.5 | 27-Jun-2020 | jruoho | Use atf_pass to avoid test failure in case there are no suitable interfaces. 
 | 
| 1.4 | 25-Jun-2020 | jruoho | Reference also PR kern/53860. 
 | 
| 1.3 | 25-Jun-2020 | jruoho | Require root privileges. 
 | 
| 1.2 | 24-Jun-2020 | jruoho | Fix references in comments. 
 | 
| 1.1 | 24-Jun-2020 | jruoho | Add a test case for PR bin/55389. 
 | 
| 1.5 | 27-Jul-2020 | gson | Instead of just skipping interfaces that are "up", skip the whole repeated_updown test case unless explicitly enabled with "atf-run -v
 run_unsafe=yes".  Gratuitously configuring interfaces "up" is no more
 safe than gratuitously configuring them "down"; for example, it could
 lead to accidentally connecting to an insecure network or diverting
 traffic from the desired route.
 
 | 
| 1.4 | 22-Jul-2020 | martin | Skip interfaces that are already UP before the test starts. We can not change state of the test host this way, it breaks e.g. test systems
 with the root filesystem on NFS.
 
 | 
| 1.3 | 27-Jun-2020 | jruoho | Use atf_pass to avoid test failure in case there are no suitable interfaces. 
 | 
| 1.2 | 25-Jun-2020 | jruoho | Reference also PR kern/52526. 
 | 
| 1.1 | 25-Jun-2020 | jruoho | Add a test case for kern/52771. 
 | 
| 1.5 | 25-Jun-2020 | jruoho | Test creating thousands of bridge(4)'s.  Unlike with tap(4) (PR kern/55417), this test succeeeds. It is even possible to have the ultimate ifconfig(8)
 output with more than 65,000 devices.
 
 | 
| 1.4 | 25-Jun-2020 | jruoho | Instead of UINT_MAX + 2, test what is claimed. 
 | 
| 1.3 | 25-Jun-2020 | jruoho | Actually create the tap(4) with a negative device number. Doh. 
 | 
| 1.2 | 25-Jun-2020 | jruoho | Fix pastos. 
 | 
| 1.1 | 25-Jun-2020 | jruoho | Add test cases for PR kern/53546 and PR kern/55417. Both are skipped as both reproduce panics.
 
 | 
| 1.2 | 08-Sep-2020 | mrg | disable these tests unless ATF_SBIN_IFCONFIG_WIFI_ENABLE=yes is in the environment.  they change wifi configuration, restart
 wpa_supplicant and hostapd, and, on broken wifi chipsets, may
 hang the test run.
 
 | 
| 1.1 | 27-Jun-2020 | jruoho | Add test cases for different 802.11 options. These include cases for PR kern/35045, PR kern/45745, and PR kern/55424.
 
 |