diff --git a/tests/sys/netpfil/pf/Makefile b/tests/sys/netpfil/pf/Makefile --- a/tests/sys/netpfil/pf/Makefile +++ b/tests/sys/netpfil/pf/Makefile @@ -53,6 +53,8 @@ # Tests reuse jail names and so cannot run in parallel. TEST_METADATA+= is_exclusive=true +TEST_METADATA.pass_block+= is_exclusive=false + PROGS= divapp ${PACKAGE}FILES+= CVE-2019-5597.py \ diff --git a/tests/sys/netpfil/pf/pass_block.sh b/tests/sys/netpfil/pf/pass_block.sh --- a/tests/sys/netpfil/pf/pass_block.sh +++ b/tests/sys/netpfil/pf/pass_block.sh @@ -28,11 +28,18 @@ common_dir=$(atf_get_srcdir)/../common +execenv_jail() +{ + atf_set execenv jail + atf_set execenv.jail vnet +} + atf_test_case "enable_disable" "cleanup" enable_disable_head() { atf_set descr 'Test enable/disable' atf_set require.user root + execenv_jail } enable_disable_body() @@ -70,6 +77,7 @@ { atf_set descr 'Basic pass/block test for IPv4' atf_set require.user root + execenv_jail } v4_body() @@ -109,6 +117,7 @@ { atf_set descr 'Basic pass/block test for IPv6' atf_set require.user root + execenv_jail } v6_body() @@ -152,6 +161,7 @@ { atf_set descr 'Test the :0 noalias option' atf_set require.user root + execenv_jail } noalias_body() @@ -197,6 +207,7 @@ { atf_set descr "Test nested inline anchors, PR196314" atf_set require.user root + execenv_jail } nested_inline_body() @@ -233,6 +244,7 @@ atf_set descr "Test unicast reverse path forwarding check" atf_set require.user root atf_set require.progs scapy + execenv_jail } urpf_body()