diff options
author | Ross Burton <ross.burton@arm.com> | 2024-11-14 17:43:36 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2024-11-18 22:09:03 +0000 |
commit | 3975cc6f4f1e6e3a4ac84feb9d5b5108db8b6723 (patch) | |
tree | 26be0a412172290087ac71b70e27988a57a7db10 /meta/lib/patchtest/patchtest_parser.py | |
parent | d6642fce37da44f03b38390c1771f8f4893c8370 (diff) | |
download | poky-3975cc6f4f1e6e3a4ac84feb9d5b5108db8b6723.tar.gz |
oeqa/runtime/ping: don't bother trying to ping localhost
If SLIRP is being used instead of TAP for networking to the guest then
the target IP will be localhost. There's no point in pinging localhost
to see if the target is up but whilst you'd think it is harmless, in
some containers ping doesn't actually have enough rights to work:
ping: socktype: SOCK_RAW
ping: socket: Operation not permitted
ping: => missing cap_net_raw+p capability or setuid?
Look at the target address and if it's localhost or 127.0.0.* return
immediately.
(From OE-Core rev: a06ef43d2a50e16c32bd6edbdc7b32c3528687d5)
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/lib/patchtest/patchtest_parser.py')
0 files changed, 0 insertions, 0 deletions