Date: Wed, 09 Nov 2022 12:10:32 +0000 From: bugzilla-noreply@freebsd.org To: testing@FreeBSD.org Subject: [Bug 260461] sys.net.if_bridge_test.span failing in CI Message-ID: <bug-260461-32464-JT1TPSrymV@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-260461-32464@https.bugs.freebsd.org/bugzilla/> References: <bug-260461-32464@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D260461 --- Comment #6 from commit-hook@FreeBSD.org --- A commit in branch stable/13 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D1b43f8cd07fc186652ad369ea18949830= 8ce1b4e commit 1b43f8cd07fc186652ad369ea189498308ce1b4e Author: Kristof Provost <kp@FreeBSD.org> AuthorDate: 2022-11-02 10:55:39 +0000 Commit: Kristof Provost <kp@FreeBSD.org> CommitDate: 2022-11-09 08:17:00 +0000 tests: make sniffer more robust The Sniffer class is often used by test tools such as pft_ping to verify that packets actually get sent where they're expected. It starts a background thread to capture packets, but this thread needs some time to start, leading to intermittent test failures when the capture doesn't start before the relevant packet is sent. Add a semaphore to ensure the Sniffer constructor doesn't return until the capture is actually running. PR: 260461 MFC after: 1 week Sponsored by: Rubicon Communications, LLC ("Netgate") (cherry picked from commit 67557372dfef87eb94681a97a4157198efe21992) tests/sys/netpfil/common/sniffer.py | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-260461-32464-JT1TPSrymV>