Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 02 Nov 2022 13:18:53 +0000
From:      bugzilla-noreply@freebsd.org
To:        testing@FreeBSD.org
Subject:   [Bug 260461] sys.net.if_bridge_test.span failing in CI
Message-ID:  <bug-260461-32464-5BwKF5tqzn@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-260461-32464@https.bugs.freebsd.org/bugzilla/>
References:  <bug-260461-32464@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D260461

--- Comment #3 from commit-hook@FreeBSD.org ---
A commit in branch main references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=3D67557372dfef87eb94681a97a4157198e=
fe21992

commit 67557372dfef87eb94681a97a4157198efe21992
Author:     Kristof Provost <kp@FreeBSD.org>
AuthorDate: 2022-11-02 10:55:39 +0000
Commit:     Kristof Provost <kp@FreeBSD.org>
CommitDate: 2022-11-02 10:59:10 +0000

    tests: make sniffer more robust

    The Sniffer class is often used by test tools such as pft_ping to verify
    that packets actually get sent where they're expected.

    It starts a background thread to capture packets, but this thread needs
    some time to start, leading to intermittent test failures when the
    capture doesn't start before the relevant packet is sent.

    Add a semaphore to ensure the Sniffer constructor doesn't return until
    the capture is actually running.

    PR:             260461
    MFC after:      1 week
    Sponsored by:   Rubicon Communications, LLC ("Netgate")

 tests/sys/netpfil/common/sniffer.py | 9 ++++++++-
 1 file changed, 8 insertions(+), 1 deletion(-)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-260461-32464-5BwKF5tqzn>