knot-dns/tests-extra/README

63 lines
1.4 KiB
Text
Raw Permalink Normal View History

2013-10-15 05:08:50 -04:00
Prerequisites:
--------------
2017-01-29 15:54:39 -05:00
python3
dnspython >=2.2.0 (python3-dnspython)
psutil (python3-psutil)
bind9
dnssec-signzone (bind9-utils)
dnssec-keygen (bind9-utils)
dnssec-verify (bind9-utils)
certtool (gnutls-bin)
ldnsutils
2013-10-15 05:08:50 -04:00
lsof
gawk
objdump
2014-02-25 02:59:08 -05:00
(valgrind)
2014-02-19 05:03:35 -05:00
(gdb)
2013-10-15 05:08:50 -04:00
Python modules:
---------------
To install necessary Python modules using pip, run:
$ pip install -r requirements.txt
Optional loopback addresses configuration:
------------------------------------------
# for i in {1..64}; do sudo ip address add 127.0.1.$i/32 dev lo; done
# for i in {1..64}; do sudo ip address add ::1$i/128 dev lo; done
2014-02-19 05:03:35 -05:00
Ubuntu:
-------
2017-01-29 15:54:39 -05:00
2014-02-19 05:03:35 -05:00
Disable apparmor protection for system Bind:
$ sudo apparmor_parser -R /etc/apparmor.d/usr.sbin.named
or
$ sudo ln -s /etc/apparmor.d/usr.sbin.named /etc/apparmor.d/disable/
$ sudo /etc/init.d/apparmor restart
2014-02-19 05:03:35 -05:00
Allow ptrace:
2014-02-25 02:59:08 -05:00
# echo 0 | sudo tee /proc/sys/kernel/yama/ptrace_scope
2014-02-19 05:03:35 -05:00
or
# vim /etc/sysctl.d/10-ptrace.conf
# kernel.yama.ptrace_scope = 0
XDP:
----
XDP testing with Valgrind requires running under root. Testing with ASAN is
possible if lsof has two following capabilities:
$ sudo setcap "CAP_SYS_PTRACE,CAP_DAC_OVERRIDE+ep" `which lsof`
And knotd has set:
$ sudo setcap "CAP_NET_RAW,CAP_NET_ADMIN,CAP_SYS_ADMIN,CAP_IPC_LOCK,CAP_SYS_PTRACE+ep" `readlink -f ../src/knotd`
Tcpdump:
--------
$ sudo setcap "CAP_NET_RAW+ep" `which tcpdump`