[BACK]Return to t_repeated_scan.sh CVS log [TXT][DIR] Up to [cvs.NetBSD.org] / src / tests / sbin / ifconfig

File: [cvs.NetBSD.org] / src / tests / sbin / ifconfig / t_repeated_scan.sh (download)

Revision 1.6, Thu Dec 10 08:16:59 2020 UTC (2 months, 2 weeks ago) by mrg
Branch: MAIN
CVS Tags: HEAD
Changes since 1.5: +6 -1 lines

apply this change to a a couple more tests:
---
date: 2020-07-27 09:57:44 -0700;  author: gson;  state: Exp;  lines: +6 -1;  commitid: m3HouRBlhyJQVJhC;
Skip the repeated_link_addr test by default as it causes the
evbarm-aarch64 testbed to hang (PR port-evbarm/55521), and will not be
safe to run by default even after that bug is fixed, for similar
reasons as t_repeated_updown.
---

t_repeated_mtu.sh changes the MTU, which may cause NFS to fail.
if you have NFS root, this is system killing.

t_repeated_scan.sh kills and restarts both hostapd and
wpa_supplicant.

# $NetBSD: t_repeated_scan.sh,v 1.6 2020/12/10 08:16:59 mrg Exp $
#
# Copyright (c) 2020 The NetBSD Foundation, Inc.
# All rights reserved.
#
# This code is derived from software contributed to The NetBSD Foundation
# by Jukka Ruohonen.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in the
#    documentation and/or other materials provided with the distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.

atf_test_case repeated_scan
repeated_scan_head() {
	atf_set "require.user" "root"
	atf_set "descr" "Test with ifconfig(8) that repeated 802.11 " \
		"scanning does not panic (PR kern/53860; PR kern/55389)"
}

repeated_scan_body() {

	if ! [ $(atf_config_get "run_unsafe" "no") = "yes" ]
	then
		atf_skip "can disrupt networking; also PR port-evbarm/55521"
	fi

	# Even though this should amount to a "few minutes",
	# try to still avoid stalling any automated test runs.
	#
	n=15

	pkill -9 hostapd
	pkill -9 wpa_supplicant

	for i in $(ifconfig -l); do

		state="up"
		ifconfig -s $i

		if [ $? -eq 1 ]; then

			state="down"
			ifconfig $i up

			if [ ! $? -eq 0 ]; then
				echo "Failed to set $i up"
				continue
			fi
		fi

		sleep 1
		ifconfig $i list scan >/dev/null 2>&1

		if [ ! $? -eq 0 ]; then
			echo "Skipping $i; scan not supported"
			continue
		fi

		while [ $n -gt 0 ]; do
			echo "Test $n for $i"
			ifconfig $i list scan >/dev/null 2>&1
			n=$(expr $n - 1)
		done

		ifconfig $i $state
		echo "Restored state of $i to $state"
		sleep 1
	done

	/bin/sh /etc/rc.d/hostapd restart >/dev/null 2>&1
	/bin/sh /etc/rc.d/wpa_supplicant restart >/dev/null 2>&1

	atf_pass
}

atf_init_test_cases() {
	atf_add_test_case repeated_scan
}