Skip to content

Commit d92906f

Browse files
Phil Sutterummakynes
authored andcommitted
selftests: netfilter: Stabilize rpath.sh
On some systems, neighbor discoveries from ns1 for fec0:42::1 (i.e., the martian trap address) would happen at the wrong time and cause false-negative test result. Problem analysis also discovered that IPv6 martian ping test was broken in that sent neighbor discoveries, not echo requests were inadvertently trapped Avoid the race condition by introducing the neighbors to each other upfront. Also pin down the firewall rules to matching on echo requests only. Fixes: efb056e ("netfilter: ip6t_rpfilter: Fix regression with VRF interfaces") Signed-off-by: Phil Sutter <[email protected]> Signed-off-by: Pablo Neira Ayuso <[email protected]>
1 parent 31f1b55 commit d92906f

File tree

1 file changed

+16
-2
lines changed
  • tools/testing/selftests/net/netfilter

1 file changed

+16
-2
lines changed

tools/testing/selftests/net/netfilter/rpath.sh

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,9 +61,20 @@ ip -net "$ns2" a a 192.168.42.1/24 dev d0
6161
ip -net "$ns1" a a fec0:42::2/64 dev v0 nodad
6262
ip -net "$ns2" a a fec0:42::1/64 dev d0 nodad
6363

64+
# avoid neighbor lookups and enable martian IPv6 pings
65+
ns2_hwaddr=$(ip -net "$ns2" link show dev v0 | \
66+
sed -n 's, *link/ether \([^ ]*\) .*,\1,p')
67+
ns1_hwaddr=$(ip -net "$ns1" link show dev v0 | \
68+
sed -n 's, *link/ether \([^ ]*\) .*,\1,p')
69+
ip -net "$ns1" neigh add fec0:42::1 lladdr "$ns2_hwaddr" nud permanent dev v0
70+
ip -net "$ns1" neigh add fec0:23::1 lladdr "$ns2_hwaddr" nud permanent dev v0
71+
ip -net "$ns2" neigh add fec0:42::2 lladdr "$ns1_hwaddr" nud permanent dev d0
72+
ip -net "$ns2" neigh add fec0:23::2 lladdr "$ns1_hwaddr" nud permanent dev v0
73+
6474
# firewall matches to test
6575
[ -n "$iptables" ] && {
6676
common='-t raw -A PREROUTING -s 192.168.0.0/16'
77+
common+=' -p icmp --icmp-type echo-request'
6778
if ! ip netns exec "$ns2" "$iptables" $common -m rpfilter;then
6879
echo "Cannot add rpfilter rule"
6980
exit $ksft_skip
@@ -72,6 +83,7 @@ ip -net "$ns2" a a fec0:42::1/64 dev d0 nodad
7283
}
7384
[ -n "$ip6tables" ] && {
7485
common='-t raw -A PREROUTING -s fec0::/16'
86+
common+=' -p icmpv6 --icmpv6-type echo-request'
7587
if ! ip netns exec "$ns2" "$ip6tables" $common -m rpfilter;then
7688
echo "Cannot add rpfilter rule"
7789
exit $ksft_skip
@@ -82,8 +94,10 @@ ip -net "$ns2" a a fec0:42::1/64 dev d0 nodad
8294
table inet t {
8395
chain c {
8496
type filter hook prerouting priority raw;
85-
ip saddr 192.168.0.0/16 fib saddr . iif oif exists counter
86-
ip6 saddr fec0::/16 fib saddr . iif oif exists counter
97+
ip saddr 192.168.0.0/16 icmp type echo-request \
98+
fib saddr . iif oif exists counter
99+
ip6 saddr fec0::/16 icmpv6 type echo-request \
100+
fib saddr . iif oif exists counter
87101
}
88102
}
89103
EOF

0 commit comments

Comments
 (0)