Commit Graph

32 Commits

Author SHA1 Message Date
rin fa6a6a38f1 ifconfig/t_capabilities: s/if_capabilities/if_capenable/ in message 2023-10-18 08:52:46 +00:00
rin e782b7c6e7 ifconfig/t_capabilities: Skip unless run_unsafe is configured to yes
The test modifies if_capabilities for all available interfaces.
This is not a behavior we expect for normal ATF runs.

Similar tests modifying living network configurations are already
skipped by default. This is the last one remained for ifconfig(8).

Also, I'm not sure whether this is a test for ifconfig(8).

XXX
Pullup to netbsd-10 ASAP. No other branches are affected.
2023-10-18 08:25:14 +00:00
mrg 9c9331d392 apply this change to a a couple more tests:
---
date: 2020-07-27 09:57:44 -0700;  author: gson;  state: Exp;  lines: +6 -1;  commitid: m3HouRBlhyJQVJhC;
Skip the repeated_link_addr test by default as it causes the
evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
safe to run by default even after that bug is fixed, for similar
reasons as t_repeated_updown.
---

t_repeated_mtu.sh changes the MTU, which may cause NFS to fail.
if you have NFS root, this is system killing.

t_repeated_scan.sh kills and restarts both hostapd and
wpa_supplicant.
2020-12-10 08:16:59 +00:00
mrg a29667efc0 disable these tests unless ATF_SBIN_IFCONFIG_WIFI_ENABLE=yes is
in the environment.  they change wifi configuration, restart
wpa_supplicant and hostapd, and, on broken wifi chipsets, may
hang the test run.
2020-09-08 06:11:32 +00:00
gson e665c975ab Skip the repeated_link_addr test by default as it causes the
evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
safe to run by default even after that bug is fixed, for similar
reasons as t_repeated_updown.
2020-07-27 16:57:44 +00:00
jruoho 3f94c7658e Use the new "run_unsafe" atf_config_get() option also with a couple of other
tests that are known to be unsafe.
2020-07-27 07:36:19 +00:00
gson 7836998153 Instead of just skipping interfaces that are "up", skip the whole
repeated_updown test case unless explicitly enabled with "atf-run -v
run_unsafe=yes".  Gratuitously configuring interfaces "up" is no more
safe than gratuitously configuring them "down"; for example, it could
lead to accidentally connecting to an insecure network or diverting
traffic from the desired route.
2020-07-27 06:52:48 +00:00
martin e6ac0f80fe Skip interfaces that are already UP before the test starts. We can
not change state of the test host this way, it breaks e.g. test systems
with the root filesystem on NFS.
2020-07-22 05:47:24 +00:00
jruoho 671da32626 Remove the expected timeout; there is something more sinister behind the
timeouts seen on the Qemu/evbarm-aarch64 runs.
2020-07-06 10:35:00 +00:00
jruoho 7b69662fe9 Skip these also for Qemu runs as they cause panics. Point to PR kern/55451. 2020-07-03 07:03:14 +00:00
jruoho f62e6216a7 Expect a timeout for evbarm-aarch64, as seen in the recent Qemu runs. 2020-07-03 02:51:13 +00:00
jruoho e643f0ea97 Add a couple of tests for sequential ifconfig(8) options, incl. PR kern/41912. 2020-06-30 11:48:20 +00:00
jruoho 3e2e2a93b9 Ups. Fix shell parameter. 2020-06-27 14:04:17 +00:00
jruoho 7725c11dd6 Add also a test that writes random garbage to every ifconfig(8) option that
takes parameters. Based on quick testing, iwn(4) and wm(4) pass, but
urtwn(4) panics. Use at your own risk; in some cases, it may be possible
that horrors are written directly to the hardware.
2020-06-27 13:53:43 +00:00
jruoho b61f0fee17 Add a basic test for enabling/disabling network interface capabilities. 2020-06-27 06:57:44 +00:00
jruoho dc018d6b62 Add test cases for different 802.11 options. These include cases for
PR kern/35045, PR kern/45745, and PR kern/55424.
2020-06-27 05:07:07 +00:00
jruoho 6232dbeb26 Use atf_pass to avoid test failure in case there are no suitable interfaces. 2020-06-27 04:15:17 +00:00
jruoho f5fa72a2a9 Test creating thousands of bridge(4)'s. Unlike with tap(4) (PR kern/55417),
this test succeeeds. It is even possible to have the ultimate ifconfig(8)
output with more than 65,000 devices.
2020-06-25 18:30:42 +00:00
jruoho 11d78a2165 Instead of UINT_MAX + 2, test what is claimed. 2020-06-25 16:57:00 +00:00
jruoho 04cb13a856 Actually create the tap(4) with a negative device number. Doh. 2020-06-25 16:52:49 +00:00
jruoho 02dcf11b6e Reference also PR kern/52526. 2020-06-25 16:34:49 +00:00
jruoho c6ea14b7ca Fix pastos. 2020-06-25 15:43:26 +00:00
jruoho 0f5766374a Add a test case for kern/52771. 2020-06-25 15:41:40 +00:00
jruoho 5c3bd061a3 Add test cases for PR kern/53546 and PR kern/55417. Both are skipped as
both reproduce panics.
2020-06-25 14:24:45 +00:00
jruoho 07a6f275d7 Reference also PR kern/53860. 2020-06-25 11:26:05 +00:00
jruoho b23ebd9451 Require root privileges. 2020-06-25 10:34:34 +00:00
jruoho 08daf067e8 Fix references in comments. 2020-06-24 10:07:13 +00:00
jruoho 6ecb6de692 Add a test case for PR bin/55389. 2020-06-24 09:11:26 +00:00
jruoho 543143cf18 Move more PR references from comments to ATF's "descr". 2012-03-18 09:46:50 +00:00
jruoho d2d68b21f3 Add '-e ignore" to atf-check(1) and remove xfail. Pointed by njoly@. 2012-03-17 17:39:44 +00:00
njoly de774efe6e Remove shebang lines from test-script sources; avoids duplicate with
the build process which adds one too.
2011-05-11 22:08:12 +00:00
jruoho b76e0d98ce Add a test for non-critical/low PR bin/43141. 2011-05-03 06:13:06 +00:00