summaryrefslogtreecommitdiffstats
path: root/meta/lib/patchtest/patchtest_parser.py
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@arm.com>2024-11-14 17:43:36 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2024-11-18 22:09:03 +0000
commit3975cc6f4f1e6e3a4ac84feb9d5b5108db8b6723 (patch)
tree26be0a412172290087ac71b70e27988a57a7db10 /meta/lib/patchtest/patchtest_parser.py
parentd6642fce37da44f03b38390c1771f8f4893c8370 (diff)
downloadpoky-3975cc6f4f1e6e3a4ac84feb9d5b5108db8b6723.tar.gz
oeqa/runtime/ping: don't bother trying to ping localhost
If SLIRP is being used instead of TAP for networking to the guest then the target IP will be localhost. There's no point in pinging localhost to see if the target is up but whilst you'd think it is harmless, in some containers ping doesn't actually have enough rights to work: ping: socktype: SOCK_RAW ping: socket: Operation not permitted ping: => missing cap_net_raw+p capability or setuid? Look at the target address and if it's localhost or 127.0.0.* return immediately. (From OE-Core rev: a06ef43d2a50e16c32bd6edbdc7b32c3528687d5) Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/lib/patchtest/patchtest_parser.py')
0 files changed, 0 insertions, 0 deletions