Module Name: src Committed By: maxv Date: Thu Feb 8 09:56:19 UTC 2018
Modified Files: src/tests/net/net: t_ping_opts.sh Log Message: Now that we don't allow source-routed packets by default, set allowsrcrt=1 and forwsrcrt=1. Should fix the ATF failure. To generate a diff of this commit: cvs rdiff -u -r1.1 -r1.2 src/tests/net/net/t_ping_opts.sh Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/tests/net/net/t_ping_opts.sh diff -u src/tests/net/net/t_ping_opts.sh:1.1 src/tests/net/net/t_ping_opts.sh:1.2 --- src/tests/net/net/t_ping_opts.sh:1.1 Fri Mar 31 06:41:40 2017 +++ src/tests/net/net/t_ping_opts.sh Thu Feb 8 09:56:19 2018 @@ -1,4 +1,4 @@ -# $NetBSD: t_ping_opts.sh,v 1.1 2017/03/31 06:41:40 ozaki-r Exp $ +# $NetBSD: t_ping_opts.sh,v 1.2 2018/02/08 09:56:19 maxv Exp $ # # Copyright (c) 2017 Internet Initiative Japan Inc. # All rights reserved. @@ -206,6 +206,9 @@ ping_opts_gateway_body() my_macaddr=$(get_macaddr ${SOCKSRC} shmif0) gw_shmif0_macaddr=$(get_macaddr ${SOCKFWD} shmif0) + atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.allowsrcrt=1 + atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwsrcrt=1 + export RUMP_SERVER=$SOCKSRC atf_check -s exit:0 -o ignore rump.ping $PING_OPTS $IPDST check_echo_request_pkt_with_macaddr \ @@ -235,6 +238,9 @@ ping_opts_gateway_body() check_echo_request_pkt_with_macaddr \ $my_macaddr $gw_shmif2_macaddr $IPSRC $IPSRCGW2 + atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.allowsrcrt=0 + atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwsrcrt=0 + rump_server_destroy_ifaces }