Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 09 Nov 2022 12:10:32 +0000
From:      bugzilla-noreply@freebsd.org
To:        testing@FreeBSD.org
Subject:   [Bug 260461] sys.net.if_bridge_test.span failing in CI
Message-ID:  <bug-260461-32464-JT1TPSrymV@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-260461-32464@https.bugs.freebsd.org/bugzilla/>
References:  <bug-260461-32464@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D260461

--- Comment #6 from commit-hook@FreeBSD.org ---
A commit in branch stable/13 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=3D1b43f8cd07fc186652ad369ea18949830=
8ce1b4e

commit 1b43f8cd07fc186652ad369ea189498308ce1b4e
Author:     Kristof Provost <kp@FreeBSD.org>
AuthorDate: 2022-11-02 10:55:39 +0000
Commit:     Kristof Provost <kp@FreeBSD.org>
CommitDate: 2022-11-09 08:17:00 +0000

    tests: make sniffer more robust

    The Sniffer class is often used by test tools such as pft_ping to verify
    that packets actually get sent where they're expected.

    It starts a background thread to capture packets, but this thread needs
    some time to start, leading to intermittent test failures when the
    capture doesn't start before the relevant packet is sent.

    Add a semaphore to ensure the Sniffer constructor doesn't return until
    the capture is actually running.

    PR:             260461
    MFC after:      1 week
    Sponsored by:   Rubicon Communications, LLC ("Netgate")

    (cherry picked from commit 67557372dfef87eb94681a97a4157198efe21992)

 tests/sys/netpfil/common/sniffer.py | 9 ++++++++-
 1 file changed, 8 insertions(+), 1 deletion(-)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-260461-32464-JT1TPSrymV>