Date: Wed, 09 Nov 2022 12:10:30 +0000 From: bugzilla-noreply@freebsd.org To: testing@FreeBSD.org Subject: [Bug 260461] sys.net.if_bridge_test.span failing in CI Message-ID: <bug-260461-32464-n5KExbS76F@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-260461-32464@https.bugs.freebsd.org/bugzilla/> References: <bug-260461-32464@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D260461 --- Comment #4 from commit-hook@FreeBSD.org --- A commit in branch stable/12 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D97967fc8e63fb9ce65efe62cb87f89e45= 711dd3c commit 97967fc8e63fb9ce65efe62cb87f89e45711dd3c Author: Kristof Provost <kp@FreeBSD.org> AuthorDate: 2022-11-02 10:55:39 +0000 Commit: Kristof Provost <kp@FreeBSD.org> CommitDate: 2022-11-09 08:16:57 +0000 tests: make sniffer more robust The Sniffer class is often used by test tools such as pft_ping to verify that packets actually get sent where they're expected. It starts a background thread to capture packets, but this thread needs some time to start, leading to intermittent test failures when the capture doesn't start before the relevant packet is sent. Add a semaphore to ensure the Sniffer constructor doesn't return until the capture is actually running. PR: 260461 MFC after: 1 week Sponsored by: Rubicon Communications, LLC ("Netgate") (cherry picked from commit 67557372dfef87eb94681a97a4157198efe21992) tests/sys/netpfil/common/sniffer.py | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-260461-32464-n5KExbS76F>