-
Notifications
You must be signed in to change notification settings - Fork 1.8k
[fib] test_hash[ipv6] fails #8103
Copy link
Copy link
Closed
sonic-net/sonic-mgmt
#4193Labels
Dual ToR Platform ♊Issues found on dual ToR platformsIssues found on dual ToR platformsIssue for 202012flaky
Description
fib_info_files = ['/root/fib_info_dut0.txt', '/root/fib_info_dut1.txt']
setup_vlan = None
hash_keys = ['src-ip', 'dst-ip', 'src-port', 'dst-port', 'ingress-port', 'ip-proto']
ptfhost = <tests.common.devices.ptf.PTFHost object at 0x7fd3c056dc90>
ipver = 'ipv6'
set_mux_same_side = {'mbr-vms17-7-0': {'active_port': 'enp59s0f1.2781', 'active_side': 'lower_tor', 'bridge': 'mbr-vms17-7-0', 'flap_count...'active_port': 'enp59s0f1.2792', 'active_side': 'lower_tor', 'bridge': 'mbr-vms17-7-11', 'flap_counter': 23, ...}, ...}
tbinfo = {'auto_recover': 'True', 'comment': 'hellogemini', 'conf-name': 'vms17-dual-t0-7050-1', 'duts': ['str2-7050cx3-acs-06', 'str2-7050cx3-acs-07'], ...}
mux_server_url = 'http://10.64.246.96:8080/mux/vms17-7'
disabled_ptf_ports = set([0, 25, 26, 27])
vlan_ptf_ports = set([1, 2, 3, 4, 5, 6, ...])
router_macs = ['d4:af:f7:4d:a4:44', 'd4:af:f7:4d:af:18']
vlan_macs = [u'00:aa:bb:cc:dd:ee', u'00:aa:bb:cc:dd:ee'], ignore_ttl = False
single_fib_for_duts = False
def test_hash(fib_info_files, setup_vlan, hash_keys, ptfhost, ipver, set_mux_same_side,
tbinfo, mux_server_url, disabled_ptf_ports, vlan_ptf_ports, router_macs, vlan_macs,
ignore_ttl, single_fib_for_duts):
timestamp = datetime.now().strftime('%Y-%m-%d-%H:%M:%S')
log_file = "/tmp/hash_test.HashTest.{}.{}.log".format(ipver, timestamp)
logging.info("PTF log file: %s" % log_file)
if ipver == "ipv4":
src_ip_range = SRC_IP_RANGE
dst_ip_range = DST_IP_RANGE
else:
src_ip_range = SRC_IPV6_RANGE
dst_ip_range = DST_IPV6_RANGE
ptf_runner(ptfhost,
"ptftests",
"hash_test.HashTest",
platform_dir="ptftests",
params={"fib_info_files": fib_info_files[:3], # Test at most 3 DUTs
"ptf_test_port_map": ptf_test_port_map(ptfhost, tbinfo, mux_server_url, disabled_ptf_ports,
vlan_ptf_ports, router_macs, vlan_macs),
"hash_keys": hash_keys,
"src_ip_range": ",".join(src_ip_range),
"dst_ip_range": ",".join(dst_ip_range),
"router_macs": router_macs,
"vlan_ids": VLANIDS,
"ignore_ttl":ignore_ttl,
"single_fib_for_duts": single_fib_for_duts
},
log_file=log_file,
qlen=PTF_QLEN,
> socket_recv_size=16384)
disabled_ptf_ports = set([0, 25, 26, 27])
dst_ip_range = ['20D0:A800:0:01::', '20D0:FFFF:0:01::FFFF']
fib_info_files = ['/root/fib_info_dut0.txt', '/root/fib_info_dut1.txt']
hash_keys = ['src-ip', 'dst-ip', 'src-port', 'dst-port', 'ingress-port', 'ip-proto']
ignore_ttl = False
ipver = 'ipv6'
log_file = '/tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log'
mux_server_url = 'http://10.64.246.96:8080/mux/vms17-7'
ptfhost = <tests.common.devices.ptf.PTFHost object at 0x7fd3c056dc90>
router_macs = ['d4:af:f7:4d:a4:44', 'd4:af:f7:4d:af:18']
set_mux_same_side = {'mbr-vms17-7-0': {'active_port': 'enp59s0f1.2781', 'active_side': 'lower_tor', 'bridge': 'mbr-vms17-7-0', 'flap_count...'active_port': 'enp59s0f1.2792', 'active_side': 'lower_tor', 'bridge': 'mbr-vms17-7-11', 'flap_counter': 23, ...}, ...}
setup_vlan = None
single_fib_for_duts = False
src_ip_range = ['20D0:A800:0:00::', '20D0:FFFF:0:00::FFFF']
tbinfo = {'auto_recover': 'True', 'comment': 'hellogemini', 'conf-name': 'vms17-dual-t0-7050-1', 'duts': ['str2-7050cx3-acs-06', 'str2-7050cx3-acs-07'], ...}
timestamp = '2021-07-05-14:26:53'
vlan_macs = [u'00:aa:bb:cc:dd:ee', u'00:aa:bb:cc:dd:ee']
vlan_ptf_ports = set([1, 2, 3, 4, 5, 6, ...])
fib/test_fib.py:531:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
ptf_runner.py:41: in ptf_runner
result = host.shell(cmd, chdir="/root", module_ignore_errors=module_ignore_errors)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = <tests.common.devices.ptf.PTFHost object at 0x7fd3c056dc90>
module_args = ('ptf --test-dir ptftests hash_test.HashTest --platform-dir ptftests --qlen=2000 --platform remote -t \'vlan_ids=[1032...'"\'\' --relax --debug info --log-file /tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log --socket-recv-size 16384',)
complex_args = {'chdir': '/root'}
previous_frame = <frame object at 0x5608a3956f80>
filename = '/var/sonicbld/workspace/NewTests/TEMPLATE_PYTEST_T0_DUALTOR-7050/tests/ptf_runner.py'
line_number = 41, function_name = 'ptf_runner'
lines = [' result = host.shell(cmd, chdir="/root", module_ignore_errors=module_ignore_errors)\n']
index = 0, verbose = True, module_ignore_errors = False, module_async = False
def _run(self, *module_args, **complex_args):
previous_frame = inspect.currentframe().f_back
filename, line_number, function_name, lines, index = inspect.getframeinfo(previous_frame)
verbose = complex_args.pop('verbose', True)
if verbose:
logging.debug("{}::{}#{}: [{}] AnsibleModule::{}, args={}, kwargs={}"\
.format(filename, function_name, line_number, self.hostname,
self.module_name, json.dumps(module_args), json.dumps(complex_args)))
else:
logging.debug("{}::{}#{}: [{}] AnsibleModule::{} executing..."\
.format(filename, function_name, line_number, self.hostname, self.module_name))
module_ignore_errors = complex_args.pop('module_ignore_errors', False)
module_async = complex_args.pop('module_async', False)
if module_async:
def run_module(module_args, complex_args):
return self.module(*module_args, **complex_args)[self.hostname]
pool = ThreadPool()
result = pool.apply_async(run_module, (module_args, complex_args))
return pool, result
res = self.module(*module_args, **complex_args)[self.hostname]
if verbose:
logging.debug("{}::{}#{}: [{}] AnsibleModule::{} Result => {}"\
.format(filename, function_name, line_number, self.hostname, self.module_name, json.dumps(res)))
else:
logging.debug("{}::{}#{}: [{}] AnsibleModule::{} done, is_failed={}, rc={}"\
.format(filename, function_name, line_number, self.hostname, self.module_name, \
res.is_failed, res.get('rc', None)))
if (res.is_failed or 'exception' in res) and not module_ignore_errors:
> raise RunAnsibleModuleFail("run module {} failed".format(self.module_name), res)
E RunAnsibleModuleFail: run module shell failed, Ansible Results =>
E {
E "changed": true,
E "cmd": "ptf --test-dir ptftests hash_test.HashTest --platform-dir ptftests --qlen=2000 --platform remote -t 'vlan_ids=[1032, 1033, 1034, 1035, 1036, 1037, 1038, 1039, 1040, 1041, 1042, 1043, 1044, 1045, 1046, 1047, 1048, 1049, 1050, 1051, 1052, 1053, 1054, 1055, 1056, 1057, 1058, 1059, 1060, 1061, 1062, 1063, 1064, 1065, 1066, 1067, 1068, 1069, 1070, 1071, 1072, 1073, 1074, 1075, 1076, 1077, 1078, 1079, 1080, 1081, 1082, 1083, 1084, 1085, 1086, 1087, 1088, 1089, 1090, 1091, 1092, 1093, 1094, 1095, 1096, 1097, 1098, 1099, 1100, 1101, 1102, 1103, 1104, 1105, 1106, 1107, 1108, 1109, 1110, 1111, 1112, 1113, 1114, 1115, 1116, 1117, 1118, 1119, 1120, 1121, 1122, 1123, 1124, 1125, 1126, 1127, 1128, 1129, 1130, 1131, 1132, 1133, 1134, 1135, 1136, 1137, 1138, 1139, 1140, 1141, 1142, 1143, 1144, 1145, 1146, 1147, 1148, 1149, 1150, 1151, 1152, 1153, 1154, 1155, 1156, 1157, 1158, 1159, 1160, 1161, 1162, 1163, 1164, 1165, 1166, 1167, 1168, 1169, 1170, 1171, 1172, 1173, 1174, 1175, 1176, 1177, 1178, 1179, 1180, 1181, 1182, 1183, 1184, 1185, 1186, 1187, 1188, 1189, 1190, 1191, 1192, 1193, 1194, 1195, 1196, 1197, 1198, 1199, 1200, 1201, 1202, 1203, 1204, 1205, 1206, 1207, 1208, 1209, 1210, 1211, 1212, 1213, 1214, 1215, 1216, 1217, 1218, 1219, 1220, 1221, 1222, 1223, 1224, 1225, 1226, 1227, 1228, 1229, 1230, 1231, 1232, 1233, 1234, 1235, 1236, 1237, 1238, 1239, 1240, 1241, 1242, 1243, 1244, 1245, 1246, 1247, 1248, 1249, 1250, 1251, 1252, 1253, 1254, 1255, 1256, 1257, 1258, 1259, 1260, 1261, 1262, 1263, 1264, 1265, 1266, 1267, 1268, 1269, 1270, 1271, 1272, 1273, 1274, 1275, 1276, 1277, 1278];router_macs=[u'\"'\"'d4:af:f7:4d:a4:44'\"'\"', u'\"'\"'d4:af:f7:4d:af:18'\"'\"'];ignore_ttl=False;src_ip_range='\"'\"'20D0:A800:0:00::,20D0:FFFF:0:00::FFFF'\"'\"';single_fib_for_duts=False;fib_info_files=['\"'\"'/root/fib_info_dut0.txt'\"'\"', '\"'\"'/root/fib_info_dut1.txt'\"'\"'];dst_ip_range='\"'\"'20D0:A800:0:01::,20D0:FFFF:0:01::FFFF'\"'\"';hash_keys=['\"'\"'src-ip'\"'\"', '\"'\"'dst-ip'\"'\"', '\"'\"'src-port'\"'\"', '\"'\"'dst-port'\"'\"', '\"'\"'ingress-port'\"'\"', '\"'\"'ip-proto'\"'\"'];ptf_test_port_map='\"'\"'/root/ptf_test_port_map.json'\"'\"'' --relax --debug info --log-file /tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log --socket-recv-size 16384",
E "delta": "0:05:52.505584",
E "end": "2021-07-05 14:21:42.104570",
E "failed": true,
E "invocation": {
E "module_args": {
E "_raw_params": "ptf --test-dir ptftests hash_test.HashTest --platform-dir ptftests --qlen=2000 --platform remote -t 'vlan_ids=[1032, 1033, 1034, 1035, 1036, 1037, 1038, 1039, 1040, 1041, 1042, 1043, 1044, 1045, 1046, 1047, 1048, 1049, 1050, 1051, 1052, 1053, 1054, 1055, 1056, 1057, 1058, 1059, 1060, 1061, 1062, 1063, 1064, 1065, 1066, 1067, 1068, 1069, 1070, 1071, 1072, 1073, 1074, 1075, 1076, 1077, 1078, 1079, 1080, 1081, 1082, 1083, 1084, 1085, 1086, 1087, 1088, 1089, 1090, 1091, 1092, 1093, 1094, 1095, 1096, 1097, 1098, 1099, 1100, 1101, 1102, 1103, 1104, 1105, 1106, 1107, 1108, 1109, 1110, 1111, 1112, 1113, 1114, 1115, 1116, 1117, 1118, 1119, 1120, 1121, 1122, 1123, 1124, 1125, 1126, 1127, 1128, 1129, 1130, 1131, 1132, 1133, 1134, 1135, 1136, 1137, 1138, 1139, 1140, 1141, 1142, 1143, 1144, 1145, 1146, 1147, 1148, 1149, 1150, 1151, 1152, 1153, 1154, 1155, 1156, 1157, 1158, 1159, 1160, 1161, 1162, 1163, 1164, 1165, 1166, 1167, 1168, 1169, 1170, 1171, 1172, 1173, 1174, 1175, 1176, 1177, 1178, 1179, 1180, 1181, 1182, 1183, 1184, 1185, 1186, 1187, 1188, 1189, 1190, 1191, 1192, 1193, 1194, 1195, 1196, 1197, 1198, 1199, 1200, 1201, 1202, 1203, 1204, 1205, 1206, 1207, 1208, 1209, 1210, 1211, 1212, 1213, 1214, 1215, 1216, 1217, 1218, 1219, 1220, 1221, 1222, 1223, 1224, 1225, 1226, 1227, 1228, 1229, 1230, 1231, 1232, 1233, 1234, 1235, 1236, 1237, 1238, 1239, 1240, 1241, 1242, 1243, 1244, 1245, 1246, 1247, 1248, 1249, 1250, 1251, 1252, 1253, 1254, 1255, 1256, 1257, 1258, 1259, 1260, 1261, 1262, 1263, 1264, 1265, 1266, 1267, 1268, 1269, 1270, 1271, 1272, 1273, 1274, 1275, 1276, 1277, 1278];router_macs=[u'\"'\"'d4:af:f7:4d:a4:44'\"'\"', u'\"'\"'d4:af:f7:4d:af:18'\"'\"'];ignore_ttl=False;src_ip_range='\"'\"'20D0:A800:0:00::,20D0:FFFF:0:00::FFFF'\"'\"';single_fib_for_duts=False;fib_info_files=['\"'\"'/root/fib_info_dut0.txt'\"'\"', '\"'\"'/root/fib_info_dut1.txt'\"'\"'];dst_ip_range='\"'\"'20D0:A800:0:01::,20D0:FFFF:0:01::FFFF'\"'\"';hash_keys=['\"'\"'src-ip'\"'\"', '\"'\"'dst-ip'\"'\"', '\"'\"'src-port'\"'\"', '\"'\"'dst-port'\"'\"', '\"'\"'ingress-port'\"'\"', '\"'\"'ip-proto'\"'\"'];ptf_test_port_map='\"'\"'/root/ptf_test_port_map.json'\"'\"'' --relax --debug info --log-file /tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log --socket-recv-size 16384",
E "_uses_shell": true,
E "argv": null,
E "chdir": "/root",
E "creates": null,
E "executable": null,
E "removes": null,
E "stdin": null,
E "stdin_add_newline": true,
E "strip_empty_ends": true,
E "warn": true
E }
E },
E "msg": "non-zero return code",
E "rc": 1,
E "start": "2021-07-05 14:15:49.598986",
E "stderr": "WARNING: No route found for IPv6 destination :: (no default route?)\n/usr/local/lib/python2.7/dist-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release.\n from cryptography.hazmat.backends import default_backend\nhash_test.HashTest ... FAIL\n\n======================================================================\nFAIL: hash_test.HashTest\n----------------------------------------------------------------------\nTraceback (most recent call last):\n File \"ptftests/hash_test.py\", line 384, in runTest\n self.check_hash(hash_key)\n File \"ptftests/hash_test.py\", line 138, in check_hash\n (matched_index, _) = self.check_ip_route(hash_key, ingress_port, dst_ip, exp_port_list)\n File \"ptftests/hash_test.py\", line 156, in check_ip_route\n (matched_index, received) = self.check_ipv6_route(hash_key, src_port, dst_port_list)\n File \"ptftests/hash_test.py\", line 327, in check_ipv6_route\n rcvd_port, rcvd_pkt = verify_packet_any_port(self, masked_exp_pkt, dst_port_list)\n File \"/usr/lib/python2.7/dist-packages/ptf/testutils.py\", line 2538, in verify_packet_any_port\n % (ports, device_number, result.format()))\nAssertionError: Did not receive expected packet on any of ports [29, 31, 33, 35] for device 0.\n========== EXPECTED ==========\nMask:\n0000 00 01 02 03 04 05 00 06 07 08 09 0A 86 DD 60 00 ..............`.\n0010 00 00 00 2E 06 3F 20 D0 A8 00 00 00 00 00 00 00 .....? .........\n0020 00 00 00 00 00 00 20 D0 A8 00 00 00 00 01 00 00 ...... .........\n0030 00 00 00 00 00 00 04 D2 00 50 00 00 00 00 00 00 .........P......\n0040 00 00 50 02 20 00 81 8D 00 00 44 44 44 44 44 44 ..P. .....DDDDDD\n0050 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 DDDDDDDDDDDDDDDD\n0060 44 44 44 44 DDDD\nmask = 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff\n0010 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n0020 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n0030 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n0040 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n0050 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n0060 ff ff ff ff \n\n========== RECEIVED ==========\n29408 total packets. Displaying most recent 3 packets:\n------------------------------\n0000 33 33 FF CC DD EE 5A 80 1D 19 61 02 86 DD 60 00 33....Z...a...`.\n0010 00 00 00 20 3A FF FE 80 00 00 00 00 00 00 58 80 ... :.........X.\n0020 1D FF FE 19 61 02 FF 02 00 00 00 00 00 00 00 00 ....a...........\n0030 00 01 FF CC DD EE 87 00 54 45 00 00 00 00 FE 80 ........TE......\n0040 00 00 00 00 00 00 02 AA BB FF FE CC DD EE 01 01 ................\n0050 5A 80 1D 19 61 02 Z...a.\n------------------------------\n0000 33 33 FF CC DD EE 0E B3 73 39 DC 14 86 DD 60 00 33......s9....`.\n0010 00 00 00 20 3A FF FE 80 00 00 00 00 00 00 0C B3 ... :...........\n0020 73 FF FE 39 DC 14 FF 02 00 00 00 00 00 00 00 00 s..9............\n0030 00 01 FF CC DD EE 87 00 49 7A 00 00 00 00 FE 80 ........Iz......\n0040 00 00 00 00 00 00 02 AA BB FF FE CC DD EE 01 01 ................\n0050 0E B3 73 39 DC 14 ..s9..\n------------------------------\n0000 33 33 FF CC DD EE 8E 26 E2 43 9B 06 86 DD 60 00 33.....&.C....`.\n0010 00 00 00 20 3A FF FE 80 00 00 00 00 00 00 8C 26 ... :..........&\n0020 E2 FF FE 43 9B 06 FF 02 00 00 00 00 00 00 00 00 ...C............\n0030 00 01 FF CC DD EE 87 00 EE 9A 00 00 00 00 FE 80 ................\n0040 00 00 00 00 00 00 02 AA BB FF FE CC DD EE 01 01 ................\n0050 8E 26 E2 43 9B 06 .&.C..\n==============================\n\n\n----------------------------------------------------------------------\nRan 1 test in 350.817s\n\nFAILED (failures=1)",
E "stderr_lines": [
E "WARNING: No route found for IPv6 destination :: (no default route?)",
E "/usr/local/lib/python2.7/dist-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release.",
E " from cryptography.hazmat.backends import default_backend",
E "hash_test.HashTest ... FAIL",
E "",
E "======================================================================",
E "FAIL: hash_test.HashTest",
E "----------------------------------------------------------------------",
E "Traceback (most recent call last):",
E " File \"ptftests/hash_test.py\", line 384, in runTest",
E " self.check_hash(hash_key)",
E " File \"ptftests/hash_test.py\", line 138, in check_hash",
E " (matched_index, _) = self.check_ip_route(hash_key, ingress_port, dst_ip, exp_port_list)",
E " File \"ptftests/hash_test.py\", line 156, in check_ip_route",
E " (matched_index, received) = self.check_ipv6_route(hash_key, src_port, dst_port_list)",
E " File \"ptftests/hash_test.py\", line 327, in check_ipv6_route",
E " rcvd_port, rcvd_pkt = verify_packet_any_port(self, masked_exp_pkt, dst_port_list)",
E " File \"/usr/lib/python2.7/dist-packages/ptf/testutils.py\", line 2538, in verify_packet_any_port",
E " % (ports, device_number, result.format()))",
E "AssertionError: Did not receive expected packet on any of ports [29, 31, 33, 35] for device 0.",
E "========== EXPECTED ==========",
E "Mask:",
E "0000 00 01 02 03 04 05 00 06 07 08 09 0A 86 DD 60 00 ..............`.",
E "0010 00 00 00 2E 06 3F 20 D0 A8 00 00 00 00 00 00 00 .....? .........",
E "0020 00 00 00 00 00 00 20 D0 A8 00 00 00 00 01 00 00 ...... .........",
E "0030 00 00 00 00 00 00 04 D2 00 50 00 00 00 00 00 00 .........P......",
E "0040 00 00 50 02 20 00 81 8D 00 00 44 44 44 44 44 44 ..P. .....DDDDDD",
E "0050 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 DDDDDDDDDDDDDDDD",
E "0060 44 44 44 44 DDDD",
E "mask = 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff",
E "0010 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff",
E "0020 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff",
E "0030 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff",
E "0040 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff",
E "0050 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff",
E "0060 ff ff ff ff ",
E "",
E "========== RECEIVED ==========",
E "29408 total packets. Displaying most recent 3 packets:",
E "------------------------------",
E "0000 33 33 FF CC DD EE 5A 80 1D 19 61 02 86 DD 60 00 33....Z...a...`.",
E "0010 00 00 00 20 3A FF FE 80 00 00 00 00 00 00 58 80 ... :.........X.",
E "0020 1D FF FE 19 61 02 FF 02 00 00 00 00 00 00 00 00 ....a...........",
E "0030 00 01 FF CC DD EE 87 00 54 45 00 00 00 00 FE 80 ........TE......",
E "0040 00 00 00 00 00 00 02 AA BB FF FE CC DD EE 01 01 ................",
E "0050 5A 80 1D 19 61 02 Z...a.",
E "------------------------------",
E "0000 33 33 FF CC DD EE 0E B3 73 39 DC 14 86 DD 60 00 33......s9....`.",
E "0010 00 00 00 20 3A FF FE 80 00 00 00 00 00 00 0C B3 ... :...........",
E "0020 73 FF FE 39 DC 14 FF 02 00 00 00 00 00 00 00 00 s..9............",
E "0030 00 01 FF CC DD EE 87 00 49 7A 00 00 00 00 FE 80 ........Iz......",
E "0040 00 00 00 00 00 00 02 AA BB FF FE CC DD EE 01 01 ................",
E "0050 0E B3 73 39 DC 14 ..s9..",
E "------------------------------",
E "0000 33 33 FF CC DD EE 8E 26 E2 43 9B 06 86 DD 60 00 33.....&.C....`.",
E "0010 00 00 00 20 3A FF FE 80 00 00 00 00 00 00 8C 26 ... :..........&",
E "0020 E2 FF FE 43 9B 06 FF 02 00 00 00 00 00 00 00 00 ...C............",
E "0030 00 01 FF CC DD EE 87 00 EE 9A 00 00 00 00 FE 80 ................",
E "0040 00 00 00 00 00 00 02 AA BB FF FE CC DD EE 01 01 ................",
E "0050 8E 26 E2 43 9B 06 .&.C..",
E "==============================",
E "",
E "",
E "----------------------------------------------------------------------",
E "Ran 1 test in 350.817s",
E "",
E "FAILED (failures=1)"
E ],
E "stdout": "",
E "stdout_lines": []
E }
complex_args = {'chdir': '/root'}
filename = '/var/sonicbld/workspace/NewTests/TEMPLATE_PYTEST_T0_DUALTOR-7050/tests/ptf_runner.py'
function_name = 'ptf_runner'
index = 0
line_number = 41
lines = [' result = host.shell(cmd, chdir="/root", module_ignore_errors=module_ignore_errors)\n']
module_args = ('ptf --test-dir ptftests hash_test.HashTest --platform-dir ptftests --qlen=2000 --platform remote -t \'vlan_ids=[1032...'"\'\' --relax --debug info --log-file /tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log --socket-recv-size 16384',)
module_async = False
module_ignore_errors = False
previous_frame = <frame object at 0x5608a3956f80>
res = {'stderr_lines': [u'WARNING: No route found for IPv6 destination :: (no defaul...: [], u'start': u'2021-07-05 14:15:49.598986', u'msg': u'non-zero return code'}
self = <tests.common.devices.ptf.PTFHost object at 0x7fd3c056dc90>
verbose = True
common/devices/base.py:89: RunAnsibleModuleFail
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
Dual ToR Platform ♊Issues found on dual ToR platformsIssues found on dual ToR platformsIssue for 202012flaky