Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/tests/net/net Now that we don't allow source-routed packets ...



details:   https://anonhg.NetBSD.org/src/rev/b50f7a5e735b
branches:  trunk
changeset: 829671:b50f7a5e735b
user:      maxv <maxv%NetBSD.org@localhost>
date:      Thu Feb 08 09:56:19 2018 +0000

description:
Now that we don't allow source-routed packets by default, set allowsrcrt=1
and forwsrcrt=1. Should fix the ATF failure.

diffstat:

 tests/net/net/t_ping_opts.sh |  8 +++++++-
 1 files changed, 7 insertions(+), 1 deletions(-)

diffs (29 lines):

diff -r 99039f6fb18b -r b50f7a5e735b tests/net/net/t_ping_opts.sh
--- a/tests/net/net/t_ping_opts.sh      Thu Feb 08 09:32:02 2018 +0000
+++ b/tests/net/net/t_ping_opts.sh      Thu Feb 08 09:56:19 2018 +0000
@@ -1,4 +1,4 @@
-#      $NetBSD: t_ping_opts.sh,v 1.1 2017/03/31 06:41:40 ozaki-r Exp $
+#      $NetBSD: t_ping_opts.sh,v 1.2 2018/02/08 09:56:19 maxv Exp $
 #
 # Copyright (c) 2017 Internet Initiative Japan Inc.
 # All rights reserved.
@@ -206,6 +206,9 @@
        my_macaddr=$(get_macaddr ${SOCKSRC} shmif0)
        gw_shmif0_macaddr=$(get_macaddr ${SOCKFWD} shmif0)
 
+       atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.allowsrcrt=1
+       atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwsrcrt=1
+
        export RUMP_SERVER=$SOCKSRC
        atf_check -s exit:0 -o ignore rump.ping $PING_OPTS $IPDST
        check_echo_request_pkt_with_macaddr \
@@ -235,6 +238,9 @@
        check_echo_request_pkt_with_macaddr \
            $my_macaddr $gw_shmif2_macaddr $IPSRC $IPSRCGW2
 
+       atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.allowsrcrt=0
+       atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwsrcrt=0
+
        rump_server_destroy_ifaces
 }
 



Home | Main Index | Thread Index | Old Index