| History log of /src/tests/sbin/ifconfig |
| Revision | Date | Author | Comments |
| 1.9 | 30-Jun-2020 |
jruoho | Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912.
|
| 1.8 | 27-Jun-2020 |
jruoho | Add also a test that writes random garbage to every ifconfig(8) option that takes parameters. Based on quick testing, iwn(4) and wm(4) pass, but urtwn(4) panics. Use at your own risk; in some cases, it may be possible that horrors are written directly to the hardware.
|
| 1.7 | 27-Jun-2020 |
jruoho | Add a basic test for enabling/disabling network interface capabilities.
|
| 1.6 | 27-Jun-2020 |
jruoho | Add test cases for different 802.11 options. These include cases for PR kern/35045, PR kern/45745, and PR kern/55424.
|
| 1.5 | 25-Jun-2020 |
jruoho | Test creating thousands of bridge(4)'s. Unlike with tap(4) (PR kern/55417), this test succeeeds. It is even possible to have the ultimate ifconfig(8) output with more than 65,000 devices.
|
| 1.4 | 25-Jun-2020 |
jruoho | Add a test case for kern/52771.
|
| 1.3 | 25-Jun-2020 |
jruoho | Add test cases for PR kern/53546 and PR kern/55417. Both are skipped as both reproduce panics.
|
| 1.2 | 24-Jun-2020 |
jruoho | Add a test case for PR bin/55389.
|
| 1.1 | 03-May-2011 |
jruoho | Add a test for non-critical/low PR bin/43141.
|
| 1.1 | 25-Jun-2020 |
jruoho | Test creating thousands of bridge(4)'s. Unlike with tap(4) (PR kern/55417), this test succeeeds. It is even possible to have the ultimate ifconfig(8) output with more than 65,000 devices.
|
| 1.3 | 18-Oct-2023 |
rin | ifconfig/t_capabilities: s/if_capabilities/if_capenable/ in message
|
| 1.2 | 18-Oct-2023 |
rin | ifconfig/t_capabilities: Skip unless run_unsafe is configured to yes
The test modifies if_capabilities for all available interfaces. This is not a behavior we expect for normal ATF runs.
Similar tests modifying living network configurations are already skipped by default. This is the last one remained for ifconfig(8).
Also, I'm not sure whether this is a test for ifconfig(8).
XXX Pullup to netbsd-10 ASAP. No other branches are affected.
|
| 1.1 | 27-Jun-2020 |
jruoho | branches: 1.1.6; Add a basic test for enabling/disabling network interface capabilities.
|
| 1.1.6.1 | 18-Oct-2023 |
martin | Pull up following revision(s) (requested by rin in ticket #422):
tests/sbin/ifconfig/t_capabilities.sh: revision 1.2 tests/sbin/ifconfig/t_capabilities.sh: revision 1.3
ifconfig/t_capabilities: Skip unless run_unsafe is configured to yes
The test modifies if_capabilities for all available interfaces. This is not a behavior we expect for normal ATF runs.
Similar tests modifying living network configurations are already skipped by default. This is the last one remained for ifconfig(8). Also, I'm not sure whether this is a test for ifconfig(8).
ifconfig/t_capabilities: s/if_capabilities/if_capenable/ in message
|
| 1.4 | 18-Mar-2012 |
jruoho | Move more PR references from comments to ATF's "descr".
|
| 1.3 | 17-Mar-2012 |
jruoho | Add '-e ignore" to atf-check(1) and remove xfail. Pointed by njoly@.
|
| 1.2 | 11-May-2011 |
njoly | branches: 1.2.4; Remove shebang lines from test-script sources; avoids duplicate with the build process which adds one too.
|
| 1.1 | 03-May-2011 |
jruoho | Add a test for non-critical/low PR bin/43141.
|
| 1.2.4.1 | 17-Apr-2012 |
yamt | sync with head
|
| 1.4 | 27-Jul-2020 |
jruoho | Use the new "run_unsafe" atf_config_get() option also with a couple of other tests that are known to be unsafe.
|
| 1.3 | 03-Jul-2020 |
jruoho | Skip these also for Qemu runs as they cause panics. Point to PR kern/55451.
|
| 1.2 | 27-Jun-2020 |
jruoho | Ups. Fix shell parameter.
|
| 1.1 | 27-Jun-2020 |
jruoho | Add also a test that writes random garbage to every ifconfig(8) option that takes parameters. Based on quick testing, iwn(4) and wm(4) pass, but urtwn(4) panics. Use at your own risk; in some cases, it may be possible that horrors are written directly to the hardware.
|
| 1.4 | 27-Jul-2020 |
gson | Skip the repeated_link_addr test by default as it causes the evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be safe to run by default even after that bug is fixed, for similar reasons as t_repeated_updown.
|
| 1.3 | 06-Jul-2020 |
jruoho | Remove the expected timeout; there is something more sinister behind the timeouts seen on the Qemu/evbarm-aarch64 runs.
|
| 1.2 | 03-Jul-2020 |
jruoho | Expect a timeout for evbarm-aarch64, as seen in the recent Qemu runs.
|
| 1.1 | 30-Jun-2020 |
jruoho | Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912.
|
| 1.2 | 10-Dec-2020 |
mrg | apply this change to a a couple more tests: --- date: 2020-07-27 09:57:44 -0700; author: gson; state: Exp; lines: +6 -1; commitid: m3HouRBlhyJQVJhC; Skip the repeated_link_addr test by default as it causes the evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be safe to run by default even after that bug is fixed, for similar reasons as t_repeated_updown. ---
t_repeated_mtu.sh changes the MTU, which may cause NFS to fail. if you have NFS root, this is system killing.
t_repeated_scan.sh kills and restarts both hostapd and wpa_supplicant.
|
| 1.1 | 30-Jun-2020 |
jruoho | Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912.
|
| 1.6 | 10-Dec-2020 |
mrg | apply this change to a a couple more tests: --- date: 2020-07-27 09:57:44 -0700; author: gson; state: Exp; lines: +6 -1; commitid: m3HouRBlhyJQVJhC; Skip the repeated_link_addr test by default as it causes the evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be safe to run by default even after that bug is fixed, for similar reasons as t_repeated_updown. ---
t_repeated_mtu.sh changes the MTU, which may cause NFS to fail. if you have NFS root, this is system killing.
t_repeated_scan.sh kills and restarts both hostapd and wpa_supplicant.
|
| 1.5 | 27-Jun-2020 |
jruoho | Use atf_pass to avoid test failure in case there are no suitable interfaces.
|
| 1.4 | 25-Jun-2020 |
jruoho | Reference also PR kern/53860.
|
| 1.3 | 25-Jun-2020 |
jruoho | Require root privileges.
|
| 1.2 | 24-Jun-2020 |
jruoho | Fix references in comments.
|
| 1.1 | 24-Jun-2020 |
jruoho | Add a test case for PR bin/55389.
|
| 1.5 | 27-Jul-2020 |
gson | Instead of just skipping interfaces that are "up", skip the whole repeated_updown test case unless explicitly enabled with "atf-run -v run_unsafe=yes". Gratuitously configuring interfaces "up" is no more safe than gratuitously configuring them "down"; for example, it could lead to accidentally connecting to an insecure network or diverting traffic from the desired route.
|
| 1.4 | 22-Jul-2020 |
martin | Skip interfaces that are already UP before the test starts. We can not change state of the test host this way, it breaks e.g. test systems with the root filesystem on NFS.
|
| 1.3 | 27-Jun-2020 |
jruoho | Use atf_pass to avoid test failure in case there are no suitable interfaces.
|
| 1.2 | 25-Jun-2020 |
jruoho | Reference also PR kern/52526.
|
| 1.1 | 25-Jun-2020 |
jruoho | Add a test case for kern/52771.
|
| 1.5 | 25-Jun-2020 |
jruoho | Test creating thousands of bridge(4)'s. Unlike with tap(4) (PR kern/55417), this test succeeeds. It is even possible to have the ultimate ifconfig(8) output with more than 65,000 devices.
|
| 1.4 | 25-Jun-2020 |
jruoho | Instead of UINT_MAX + 2, test what is claimed.
|
| 1.3 | 25-Jun-2020 |
jruoho | Actually create the tap(4) with a negative device number. Doh.
|
| 1.2 | 25-Jun-2020 |
jruoho | Fix pastos.
|
| 1.1 | 25-Jun-2020 |
jruoho | Add test cases for PR kern/53546 and PR kern/55417. Both are skipped as both reproduce panics.
|
| 1.2 | 08-Sep-2020 |
mrg | disable these tests unless ATF_SBIN_IFCONFIG_WIFI_ENABLE=yes is in the environment. they change wifi configuration, restart wpa_supplicant and hostapd, and, on broken wifi chipsets, may hang the test run.
|
| 1.1 | 27-Jun-2020 |
jruoho | Add test cases for different 802.11 options. These include cases for PR kern/35045, PR kern/45745, and PR kern/55424.
|