Module Name:    src
Committed By:   maxv
Date:           Thu Feb  8 09:56:19 UTC 2018

Modified Files:
        src/tests/net/net: t_ping_opts.sh

Log Message:
Now that we don't allow source-routed packets by default, set allowsrcrt=1
and forwsrcrt=1. Should fix the ATF failure.


To generate a diff of this commit:
cvs rdiff -u -r1.1 -r1.2 src/tests/net/net/t_ping_opts.sh

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/tests/net/net/t_ping_opts.sh
diff -u src/tests/net/net/t_ping_opts.sh:1.1 src/tests/net/net/t_ping_opts.sh:1.2
--- src/tests/net/net/t_ping_opts.sh:1.1	Fri Mar 31 06:41:40 2017
+++ src/tests/net/net/t_ping_opts.sh	Thu Feb  8 09:56:19 2018
@@ -1,4 +1,4 @@
-#	$NetBSD: t_ping_opts.sh,v 1.1 2017/03/31 06:41:40 ozaki-r Exp $
+#	$NetBSD: t_ping_opts.sh,v 1.2 2018/02/08 09:56:19 maxv Exp $
 #
 # Copyright (c) 2017 Internet Initiative Japan Inc.
 # All rights reserved.
@@ -206,6 +206,9 @@ ping_opts_gateway_body()
 	my_macaddr=$(get_macaddr ${SOCKSRC} shmif0)
 	gw_shmif0_macaddr=$(get_macaddr ${SOCKFWD} shmif0)
 
+	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.allowsrcrt=1
+	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwsrcrt=1
+
 	export RUMP_SERVER=$SOCKSRC
 	atf_check -s exit:0 -o ignore rump.ping $PING_OPTS $IPDST
 	check_echo_request_pkt_with_macaddr \
@@ -235,6 +238,9 @@ ping_opts_gateway_body()
 	check_echo_request_pkt_with_macaddr \
 	    $my_macaddr $gw_shmif2_macaddr $IPSRC $IPSRCGW2
 
+	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.allowsrcrt=0
+	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwsrcrt=0
+
 	rump_server_destroy_ifaces
 }
 

Reply via email to