lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Mon, 24 Aug 2020 12:34:37 -0400
From:   Sasha Levin <>
Cc:     David Ahern <>,
        "David S . Miller" <>,
        Sasha Levin <>,,
Subject: [PATCH AUTOSEL 5.8 37/63] selftests: disable rp_filter for

From: David Ahern <>

[ Upstream commit bcf7ddb0186d366f761f86196b480ea6dd2dc18c ]

h1 is initially configured to reach h2 via r1 rather than the
more direct path through r2. If rp_filter is set and inherited
for r2, forwarding fails since the source address of h1 is
reachable from eth0 vs the packet coming to it via r1 and eth1.
Since rp_filter setting affects the test, explicitly reset it.

Signed-off-by: David Ahern <>
Signed-off-by: David S. Miller <>
Signed-off-by: Sasha Levin <>
 tools/testing/selftests/net/ | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/tools/testing/selftests/net/ b/tools/testing/selftests/net/
index 18c5de53558af..bf361f30d6ef9 100755
--- a/tools/testing/selftests/net/
+++ b/tools/testing/selftests/net/
@@ -180,6 +180,8 @@ setup()
 		r[12]) ip netns exec $ns sysctl -q -w net.ipv4.ip_forward=1
 		       ip netns exec $ns sysctl -q -w net.ipv4.conf.all.send_redirects=1
+		       ip netns exec $ns sysctl -q -w net.ipv4.conf.default.rp_filter=0
+		       ip netns exec $ns sysctl -q -w net.ipv4.conf.all.rp_filter=0
 		       ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=1
 		       ip netns exec $ns sysctl -q -w net.ipv6.route.mtu_expires=10

Powered by blists - more mailing lists