Fix path issues after r351212

This fixes sys.netpfil.pf.forward.v4 and sys.netpfil.pf.icmp.cve_2019_5598
failures in CI system.

Sponsored by:	The FreeBSD Foundation
This commit is contained in:
Li-Wen Hsu 2019-08-22 12:08:35 +00:00
parent 075ac3b446
commit cdac716946
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=351391
2 changed files with 5 additions and 2 deletions

View File

@ -36,7 +36,7 @@ v4_body()
route add -net 198.51.100.0/24 192.0.2.2
# Sanity check, can we forward ICMP echo requests without pf?
atf_check -s exit:0 $(atf_get_srcdir)/pft_ping.py \
atf_check -s exit:0 ${common_dir}/pft_ping.py \
--sendif ${epair_send}a \
--to 198.51.100.3 \
--recvif ${epair_recv}a

View File

@ -2,6 +2,8 @@
. $(atf_get_srcdir)/utils.subr
common_dir=$(atf_get_srcdir)/../common
atf_test_case "cve_2019_5598" "cleanup"
cve_2019_5598_head()
{
@ -32,7 +34,8 @@ cve_2019_5598_body()
"pass in proto udp to 198.51.100.3 port 53" \
"pass out proto udp to 198.51.100.3 port 53"
atf_check -s exit:0 $(atf_get_srcdir)/CVE-2019-5598.py \
atf_check -s exit:0 env PYTHONPATH=${common_dir} \
$(atf_get_srcdir)/CVE-2019-5598.py \
--sendif ${epair_in}a \
--recvif ${epair_out}a \
--src 192.0.2.1 \