Skip to content

[fib] test_hash[ipv6] fails #8103

@theasianpianist

Description

@theasianpianist
fib_info_files = ['/root/fib_info_dut0.txt', '/root/fib_info_dut1.txt']
setup_vlan = None
hash_keys = ['src-ip', 'dst-ip', 'src-port', 'dst-port', 'ingress-port', 'ip-proto']
ptfhost = <tests.common.devices.ptf.PTFHost object at 0x7fd3c056dc90>
ipver = 'ipv6'
set_mux_same_side = {'mbr-vms17-7-0': {'active_port': 'enp59s0f1.2781', 'active_side': 'lower_tor', 'bridge': 'mbr-vms17-7-0', 'flap_count...'active_port': 'enp59s0f1.2792', 'active_side': 'lower_tor', 'bridge': 'mbr-vms17-7-11', 'flap_counter': 23, ...}, ...}
tbinfo = {'auto_recover': 'True', 'comment': 'hellogemini', 'conf-name': 'vms17-dual-t0-7050-1', 'duts': ['str2-7050cx3-acs-06', 'str2-7050cx3-acs-07'], ...}
mux_server_url = 'http://10.64.246.96:8080/mux/vms17-7'
disabled_ptf_ports = set([0, 25, 26, 27])
vlan_ptf_ports = set([1, 2, 3, 4, 5, 6, ...])
router_macs = ['d4:af:f7:4d:a4:44', 'd4:af:f7:4d:af:18']
vlan_macs = [u'00:aa:bb:cc:dd:ee', u'00:aa:bb:cc:dd:ee'], ignore_ttl = False
single_fib_for_duts = False

    def test_hash(fib_info_files, setup_vlan, hash_keys, ptfhost, ipver, set_mux_same_side,
                  tbinfo, mux_server_url, disabled_ptf_ports, vlan_ptf_ports, router_macs, vlan_macs,
                  ignore_ttl, single_fib_for_duts):
        timestamp = datetime.now().strftime('%Y-%m-%d-%H:%M:%S')
        log_file = "/tmp/hash_test.HashTest.{}.{}.log".format(ipver, timestamp)
        logging.info("PTF log file: %s" % log_file)
        if ipver == "ipv4":
            src_ip_range = SRC_IP_RANGE
            dst_ip_range = DST_IP_RANGE
        else:
            src_ip_range = SRC_IPV6_RANGE
            dst_ip_range = DST_IPV6_RANGE
        ptf_runner(ptfhost,
                "ptftests",
                "hash_test.HashTest",
                platform_dir="ptftests",
                params={"fib_info_files": fib_info_files[:3],   # Test at most 3 DUTs
                        "ptf_test_port_map": ptf_test_port_map(ptfhost, tbinfo, mux_server_url, disabled_ptf_ports,
                                                               vlan_ptf_ports, router_macs, vlan_macs),
                        "hash_keys": hash_keys,
                        "src_ip_range": ",".join(src_ip_range),
                        "dst_ip_range": ",".join(dst_ip_range),
                        "router_macs": router_macs,
                        "vlan_ids": VLANIDS,
                        "ignore_ttl":ignore_ttl,
                        "single_fib_for_duts": single_fib_for_duts
                       },
                log_file=log_file,
                qlen=PTF_QLEN,
>               socket_recv_size=16384)

disabled_ptf_ports = set([0, 25, 26, 27])
dst_ip_range = ['20D0:A800:0:01::', '20D0:FFFF:0:01::FFFF']
fib_info_files = ['/root/fib_info_dut0.txt', '/root/fib_info_dut1.txt']
hash_keys  = ['src-ip', 'dst-ip', 'src-port', 'dst-port', 'ingress-port', 'ip-proto']
ignore_ttl = False
ipver      = 'ipv6'
log_file   = '/tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log'
mux_server_url = 'http://10.64.246.96:8080/mux/vms17-7'
ptfhost    = <tests.common.devices.ptf.PTFHost object at 0x7fd3c056dc90>
router_macs = ['d4:af:f7:4d:a4:44', 'd4:af:f7:4d:af:18']
set_mux_same_side = {'mbr-vms17-7-0': {'active_port': 'enp59s0f1.2781', 'active_side': 'lower_tor', 'bridge': 'mbr-vms17-7-0', 'flap_count...'active_port': 'enp59s0f1.2792', 'active_side': 'lower_tor', 'bridge': 'mbr-vms17-7-11', 'flap_counter': 23, ...}, ...}
setup_vlan = None
single_fib_for_duts = False
src_ip_range = ['20D0:A800:0:00::', '20D0:FFFF:0:00::FFFF']
tbinfo     = {'auto_recover': 'True', 'comment': 'hellogemini', 'conf-name': 'vms17-dual-t0-7050-1', 'duts': ['str2-7050cx3-acs-06', 'str2-7050cx3-acs-07'], ...}
timestamp  = '2021-07-05-14:26:53'
vlan_macs  = [u'00:aa:bb:cc:dd:ee', u'00:aa:bb:cc:dd:ee']
vlan_ptf_ports = set([1, 2, 3, 4, 5, 6, ...])

fib/test_fib.py:531: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
ptf_runner.py:41: in ptf_runner
    result = host.shell(cmd, chdir="/root", module_ignore_errors=module_ignore_errors)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <tests.common.devices.ptf.PTFHost object at 0x7fd3c056dc90>
module_args = ('ptf --test-dir ptftests hash_test.HashTest --platform-dir ptftests --qlen=2000 --platform remote -t \'vlan_ids=[1032...'"\'\' --relax --debug info --log-file /tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log --socket-recv-size 16384',)
complex_args = {'chdir': '/root'}
previous_frame = <frame object at 0x5608a3956f80>
filename = '/var/sonicbld/workspace/NewTests/TEMPLATE_PYTEST_T0_DUALTOR-7050/tests/ptf_runner.py'
line_number = 41, function_name = 'ptf_runner'
lines = ['    result = host.shell(cmd, chdir="/root", module_ignore_errors=module_ignore_errors)\n']
index = 0, verbose = True, module_ignore_errors = False, module_async = False

    def _run(self, *module_args, **complex_args):
    
        previous_frame = inspect.currentframe().f_back
        filename, line_number, function_name, lines, index = inspect.getframeinfo(previous_frame)
    
        verbose = complex_args.pop('verbose', True)
    
        if verbose:
            logging.debug("{}::{}#{}: [{}] AnsibleModule::{}, args={}, kwargs={}"\
                .format(filename, function_name, line_number, self.hostname,
                        self.module_name, json.dumps(module_args), json.dumps(complex_args)))
        else:
            logging.debug("{}::{}#{}: [{}] AnsibleModule::{} executing..."\
                .format(filename, function_name, line_number, self.hostname, self.module_name))
    
        module_ignore_errors = complex_args.pop('module_ignore_errors', False)
        module_async = complex_args.pop('module_async', False)
    
        if module_async:
            def run_module(module_args, complex_args):
                return self.module(*module_args, **complex_args)[self.hostname]
            pool = ThreadPool()
            result = pool.apply_async(run_module, (module_args, complex_args))
            return pool, result
    
        res = self.module(*module_args, **complex_args)[self.hostname]
    
        if verbose:
            logging.debug("{}::{}#{}: [{}] AnsibleModule::{} Result => {}"\
                .format(filename, function_name, line_number, self.hostname, self.module_name, json.dumps(res)))
        else:
            logging.debug("{}::{}#{}: [{}] AnsibleModule::{} done, is_failed={}, rc={}"\
                .format(filename, function_name, line_number, self.hostname, self.module_name, \
                        res.is_failed, res.get('rc', None)))
    
        if (res.is_failed or 'exception' in res) and not module_ignore_errors:
>           raise RunAnsibleModuleFail("run module {} failed".format(self.module_name), res)
E           RunAnsibleModuleFail: run module shell failed, Ansible Results =>
E           {
E               "changed": true, 
E               "cmd": "ptf --test-dir ptftests hash_test.HashTest --platform-dir ptftests --qlen=2000 --platform remote -t 'vlan_ids=[1032, 1033, 1034, 1035, 1036, 1037, 1038, 1039, 1040, 1041, 1042, 1043, 1044, 1045, 1046, 1047, 1048, 1049, 1050, 1051, 1052, 1053, 1054, 1055, 1056, 1057, 1058, 1059, 1060, 1061, 1062, 1063, 1064, 1065, 1066, 1067, 1068, 1069, 1070, 1071, 1072, 1073, 1074, 1075, 1076, 1077, 1078, 1079, 1080, 1081, 1082, 1083, 1084, 1085, 1086, 1087, 1088, 1089, 1090, 1091, 1092, 1093, 1094, 1095, 1096, 1097, 1098, 1099, 1100, 1101, 1102, 1103, 1104, 1105, 1106, 1107, 1108, 1109, 1110, 1111, 1112, 1113, 1114, 1115, 1116, 1117, 1118, 1119, 1120, 1121, 1122, 1123, 1124, 1125, 1126, 1127, 1128, 1129, 1130, 1131, 1132, 1133, 1134, 1135, 1136, 1137, 1138, 1139, 1140, 1141, 1142, 1143, 1144, 1145, 1146, 1147, 1148, 1149, 1150, 1151, 1152, 1153, 1154, 1155, 1156, 1157, 1158, 1159, 1160, 1161, 1162, 1163, 1164, 1165, 1166, 1167, 1168, 1169, 1170, 1171, 1172, 1173, 1174, 1175, 1176, 1177, 1178, 1179, 1180, 1181, 1182, 1183, 1184, 1185, 1186, 1187, 1188, 1189, 1190, 1191, 1192, 1193, 1194, 1195, 1196, 1197, 1198, 1199, 1200, 1201, 1202, 1203, 1204, 1205, 1206, 1207, 1208, 1209, 1210, 1211, 1212, 1213, 1214, 1215, 1216, 1217, 1218, 1219, 1220, 1221, 1222, 1223, 1224, 1225, 1226, 1227, 1228, 1229, 1230, 1231, 1232, 1233, 1234, 1235, 1236, 1237, 1238, 1239, 1240, 1241, 1242, 1243, 1244, 1245, 1246, 1247, 1248, 1249, 1250, 1251, 1252, 1253, 1254, 1255, 1256, 1257, 1258, 1259, 1260, 1261, 1262, 1263, 1264, 1265, 1266, 1267, 1268, 1269, 1270, 1271, 1272, 1273, 1274, 1275, 1276, 1277, 1278];router_macs=[u'\"'\"'d4:af:f7:4d:a4:44'\"'\"', u'\"'\"'d4:af:f7:4d:af:18'\"'\"'];ignore_ttl=False;src_ip_range='\"'\"'20D0:A800:0:00::,20D0:FFFF:0:00::FFFF'\"'\"';single_fib_for_duts=False;fib_info_files=['\"'\"'/root/fib_info_dut0.txt'\"'\"', '\"'\"'/root/fib_info_dut1.txt'\"'\"'];dst_ip_range='\"'\"'20D0:A800:0:01::,20D0:FFFF:0:01::FFFF'\"'\"';hash_keys=['\"'\"'src-ip'\"'\"', '\"'\"'dst-ip'\"'\"', '\"'\"'src-port'\"'\"', '\"'\"'dst-port'\"'\"', '\"'\"'ingress-port'\"'\"', '\"'\"'ip-proto'\"'\"'];ptf_test_port_map='\"'\"'/root/ptf_test_port_map.json'\"'\"'' --relax --debug info --log-file /tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log --socket-recv-size 16384", 
E               "delta": "0:05:52.505584", 
E               "end": "2021-07-05 14:21:42.104570", 
E               "failed": true, 
E               "invocation": {
E                   "module_args": {
E                       "_raw_params": "ptf --test-dir ptftests hash_test.HashTest --platform-dir ptftests --qlen=2000 --platform remote -t 'vlan_ids=[1032, 1033, 1034, 1035, 1036, 1037, 1038, 1039, 1040, 1041, 1042, 1043, 1044, 1045, 1046, 1047, 1048, 1049, 1050, 1051, 1052, 1053, 1054, 1055, 1056, 1057, 1058, 1059, 1060, 1061, 1062, 1063, 1064, 1065, 1066, 1067, 1068, 1069, 1070, 1071, 1072, 1073, 1074, 1075, 1076, 1077, 1078, 1079, 1080, 1081, 1082, 1083, 1084, 1085, 1086, 1087, 1088, 1089, 1090, 1091, 1092, 1093, 1094, 1095, 1096, 1097, 1098, 1099, 1100, 1101, 1102, 1103, 1104, 1105, 1106, 1107, 1108, 1109, 1110, 1111, 1112, 1113, 1114, 1115, 1116, 1117, 1118, 1119, 1120, 1121, 1122, 1123, 1124, 1125, 1126, 1127, 1128, 1129, 1130, 1131, 1132, 1133, 1134, 1135, 1136, 1137, 1138, 1139, 1140, 1141, 1142, 1143, 1144, 1145, 1146, 1147, 1148, 1149, 1150, 1151, 1152, 1153, 1154, 1155, 1156, 1157, 1158, 1159, 1160, 1161, 1162, 1163, 1164, 1165, 1166, 1167, 1168, 1169, 1170, 1171, 1172, 1173, 1174, 1175, 1176, 1177, 1178, 1179, 1180, 1181, 1182, 1183, 1184, 1185, 1186, 1187, 1188, 1189, 1190, 1191, 1192, 1193, 1194, 1195, 1196, 1197, 1198, 1199, 1200, 1201, 1202, 1203, 1204, 1205, 1206, 1207, 1208, 1209, 1210, 1211, 1212, 1213, 1214, 1215, 1216, 1217, 1218, 1219, 1220, 1221, 1222, 1223, 1224, 1225, 1226, 1227, 1228, 1229, 1230, 1231, 1232, 1233, 1234, 1235, 1236, 1237, 1238, 1239, 1240, 1241, 1242, 1243, 1244, 1245, 1246, 1247, 1248, 1249, 1250, 1251, 1252, 1253, 1254, 1255, 1256, 1257, 1258, 1259, 1260, 1261, 1262, 1263, 1264, 1265, 1266, 1267, 1268, 1269, 1270, 1271, 1272, 1273, 1274, 1275, 1276, 1277, 1278];router_macs=[u'\"'\"'d4:af:f7:4d:a4:44'\"'\"', u'\"'\"'d4:af:f7:4d:af:18'\"'\"'];ignore_ttl=False;src_ip_range='\"'\"'20D0:A800:0:00::,20D0:FFFF:0:00::FFFF'\"'\"';single_fib_for_duts=False;fib_info_files=['\"'\"'/root/fib_info_dut0.txt'\"'\"', '\"'\"'/root/fib_info_dut1.txt'\"'\"'];dst_ip_range='\"'\"'20D0:A800:0:01::,20D0:FFFF:0:01::FFFF'\"'\"';hash_keys=['\"'\"'src-ip'\"'\"', '\"'\"'dst-ip'\"'\"', '\"'\"'src-port'\"'\"', '\"'\"'dst-port'\"'\"', '\"'\"'ingress-port'\"'\"', '\"'\"'ip-proto'\"'\"'];ptf_test_port_map='\"'\"'/root/ptf_test_port_map.json'\"'\"'' --relax --debug info --log-file /tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log --socket-recv-size 16384", 
E                       "_uses_shell": true, 
E                       "argv": null, 
E                       "chdir": "/root", 
E                       "creates": null, 
E                       "executable": null, 
E                       "removes": null, 
E                       "stdin": null, 
E                       "stdin_add_newline": true, 
E                       "strip_empty_ends": true, 
E                       "warn": true
E                   }
E               }, 
E               "msg": "non-zero return code", 
E               "rc": 1, 
E               "start": "2021-07-05 14:15:49.598986", 
E               "stderr": "WARNING: No route found for IPv6 destination :: (no default route?)\n/usr/local/lib/python2.7/dist-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release.\n  from cryptography.hazmat.backends import default_backend\nhash_test.HashTest ... FAIL\n\n======================================================================\nFAIL: hash_test.HashTest\n----------------------------------------------------------------------\nTraceback (most recent call last):\n  File \"ptftests/hash_test.py\", line 384, in runTest\n    self.check_hash(hash_key)\n  File \"ptftests/hash_test.py\", line 138, in check_hash\n    (matched_index, _) = self.check_ip_route(hash_key, ingress_port, dst_ip, exp_port_list)\n  File \"ptftests/hash_test.py\", line 156, in check_ip_route\n    (matched_index, received) = self.check_ipv6_route(hash_key, src_port, dst_port_list)\n  File \"ptftests/hash_test.py\", line 327, in check_ipv6_route\n    rcvd_port, rcvd_pkt = verify_packet_any_port(self, masked_exp_pkt, dst_port_list)\n  File \"/usr/lib/python2.7/dist-packages/ptf/testutils.py\", line 2538, in verify_packet_any_port\n    % (ports, device_number, result.format()))\nAssertionError: Did not receive expected packet on any of ports [29, 31, 33, 35] for device 0.\n========== EXPECTED ==========\nMask:\n0000   00 01 02 03 04 05 00 06  07 08 09 0A 86 DD 60 00   ..............`.\n0010   00 00 00 2E 06 3F 20 D0  A8 00 00 00 00 00 00 00   .....? .........\n0020   00 00 00 00 00 00 20 D0  A8 00 00 00 00 01 00 00   ...... .........\n0030   00 00 00 00 00 00 04 D2  00 50 00 00 00 00 00 00   .........P......\n0040   00 00 50 02 20 00 81 8D  00 00 44 44 44 44 44 44   ..P. .....DDDDDD\n0050   44 44 44 44 44 44 44 44  44 44 44 44 44 44 44 44   DDDDDDDDDDDDDDDD\n0060   44 44 44 44                                        DDDD\nmask = 00 00 00 00 00 00 00 00  00 00 00 00 ff ff ff ff\n0010   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff\n0020   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff\n0030   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff\n0040   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff\n0050   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff\n0060   ff ff ff ff  \n\n========== RECEIVED ==========\n29408 total packets. Displaying most recent 3 packets:\n------------------------------\n0000   33 33 FF CC DD EE 5A 80  1D 19 61 02 86 DD 60 00   33....Z...a...`.\n0010   00 00 00 20 3A FF FE 80  00 00 00 00 00 00 58 80   ... :.........X.\n0020   1D FF FE 19 61 02 FF 02  00 00 00 00 00 00 00 00   ....a...........\n0030   00 01 FF CC DD EE 87 00  54 45 00 00 00 00 FE 80   ........TE......\n0040   00 00 00 00 00 00 02 AA  BB FF FE CC DD EE 01 01   ................\n0050   5A 80 1D 19 61 02                                  Z...a.\n------------------------------\n0000   33 33 FF CC DD EE 0E B3  73 39 DC 14 86 DD 60 00   33......s9....`.\n0010   00 00 00 20 3A FF FE 80  00 00 00 00 00 00 0C B3   ... :...........\n0020   73 FF FE 39 DC 14 FF 02  00 00 00 00 00 00 00 00   s..9............\n0030   00 01 FF CC DD EE 87 00  49 7A 00 00 00 00 FE 80   ........Iz......\n0040   00 00 00 00 00 00 02 AA  BB FF FE CC DD EE 01 01   ................\n0050   0E B3 73 39 DC 14                                  ..s9..\n------------------------------\n0000   33 33 FF CC DD EE 8E 26  E2 43 9B 06 86 DD 60 00   33.....&.C....`.\n0010   00 00 00 20 3A FF FE 80  00 00 00 00 00 00 8C 26   ... :..........&\n0020   E2 FF FE 43 9B 06 FF 02  00 00 00 00 00 00 00 00   ...C............\n0030   00 01 FF CC DD EE 87 00  EE 9A 00 00 00 00 FE 80   ................\n0040   00 00 00 00 00 00 02 AA  BB FF FE CC DD EE 01 01   ................\n0050   8E 26 E2 43 9B 06                                  .&.C..\n==============================\n\n\n----------------------------------------------------------------------\nRan 1 test in 350.817s\n\nFAILED (failures=1)", 
E               "stderr_lines": [
E                   "WARNING: No route found for IPv6 destination :: (no default route?)", 
E                   "/usr/local/lib/python2.7/dist-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release.", 
E                   "  from cryptography.hazmat.backends import default_backend", 
E                   "hash_test.HashTest ... FAIL", 
E                   "", 
E                   "======================================================================", 
E                   "FAIL: hash_test.HashTest", 
E                   "----------------------------------------------------------------------", 
E                   "Traceback (most recent call last):", 
E                   "  File \"ptftests/hash_test.py\", line 384, in runTest", 
E                   "    self.check_hash(hash_key)", 
E                   "  File \"ptftests/hash_test.py\", line 138, in check_hash", 
E                   "    (matched_index, _) = self.check_ip_route(hash_key, ingress_port, dst_ip, exp_port_list)", 
E                   "  File \"ptftests/hash_test.py\", line 156, in check_ip_route", 
E                   "    (matched_index, received) = self.check_ipv6_route(hash_key, src_port, dst_port_list)", 
E                   "  File \"ptftests/hash_test.py\", line 327, in check_ipv6_route", 
E                   "    rcvd_port, rcvd_pkt = verify_packet_any_port(self, masked_exp_pkt, dst_port_list)", 
E                   "  File \"/usr/lib/python2.7/dist-packages/ptf/testutils.py\", line 2538, in verify_packet_any_port", 
E                   "    % (ports, device_number, result.format()))", 
E                   "AssertionError: Did not receive expected packet on any of ports [29, 31, 33, 35] for device 0.", 
E                   "========== EXPECTED ==========", 
E                   "Mask:", 
E                   "0000   00 01 02 03 04 05 00 06  07 08 09 0A 86 DD 60 00   ..............`.", 
E                   "0010   00 00 00 2E 06 3F 20 D0  A8 00 00 00 00 00 00 00   .....? .........", 
E                   "0020   00 00 00 00 00 00 20 D0  A8 00 00 00 00 01 00 00   ...... .........", 
E                   "0030   00 00 00 00 00 00 04 D2  00 50 00 00 00 00 00 00   .........P......", 
E                   "0040   00 00 50 02 20 00 81 8D  00 00 44 44 44 44 44 44   ..P. .....DDDDDD", 
E                   "0050   44 44 44 44 44 44 44 44  44 44 44 44 44 44 44 44   DDDDDDDDDDDDDDDD", 
E                   "0060   44 44 44 44                                        DDDD", 
E                   "mask = 00 00 00 00 00 00 00 00  00 00 00 00 ff ff ff ff", 
E                   "0010   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff", 
E                   "0020   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff", 
E                   "0030   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff", 
E                   "0040   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff", 
E                   "0050   ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff", 
E                   "0060   ff ff ff ff  ", 
E                   "", 
E                   "========== RECEIVED ==========", 
E                   "29408 total packets. Displaying most recent 3 packets:", 
E                   "------------------------------", 
E                   "0000   33 33 FF CC DD EE 5A 80  1D 19 61 02 86 DD 60 00   33....Z...a...`.", 
E                   "0010   00 00 00 20 3A FF FE 80  00 00 00 00 00 00 58 80   ... :.........X.", 
E                   "0020   1D FF FE 19 61 02 FF 02  00 00 00 00 00 00 00 00   ....a...........", 
E                   "0030   00 01 FF CC DD EE 87 00  54 45 00 00 00 00 FE 80   ........TE......", 
E                   "0040   00 00 00 00 00 00 02 AA  BB FF FE CC DD EE 01 01   ................", 
E                   "0050   5A 80 1D 19 61 02                                  Z...a.", 
E                   "------------------------------", 
E                   "0000   33 33 FF CC DD EE 0E B3  73 39 DC 14 86 DD 60 00   33......s9....`.", 
E                   "0010   00 00 00 20 3A FF FE 80  00 00 00 00 00 00 0C B3   ... :...........", 
E                   "0020   73 FF FE 39 DC 14 FF 02  00 00 00 00 00 00 00 00   s..9............", 
E                   "0030   00 01 FF CC DD EE 87 00  49 7A 00 00 00 00 FE 80   ........Iz......", 
E                   "0040   00 00 00 00 00 00 02 AA  BB FF FE CC DD EE 01 01   ................", 
E                   "0050   0E B3 73 39 DC 14                                  ..s9..", 
E                   "------------------------------", 
E                   "0000   33 33 FF CC DD EE 8E 26  E2 43 9B 06 86 DD 60 00   33.....&.C....`.", 
E                   "0010   00 00 00 20 3A FF FE 80  00 00 00 00 00 00 8C 26   ... :..........&", 
E                   "0020   E2 FF FE 43 9B 06 FF 02  00 00 00 00 00 00 00 00   ...C............", 
E                   "0030   00 01 FF CC DD EE 87 00  EE 9A 00 00 00 00 FE 80   ................", 
E                   "0040   00 00 00 00 00 00 02 AA  BB FF FE CC DD EE 01 01   ................", 
E                   "0050   8E 26 E2 43 9B 06                                  .&.C..", 
E                   "==============================", 
E                   "", 
E                   "", 
E                   "----------------------------------------------------------------------", 
E                   "Ran 1 test in 350.817s", 
E                   "", 
E                   "FAILED (failures=1)"
E               ], 
E               "stdout": "", 
E               "stdout_lines": []
E           }

complex_args = {'chdir': '/root'}
filename   = '/var/sonicbld/workspace/NewTests/TEMPLATE_PYTEST_T0_DUALTOR-7050/tests/ptf_runner.py'
function_name = 'ptf_runner'
index      = 0
line_number = 41
lines      = ['    result = host.shell(cmd, chdir="/root", module_ignore_errors=module_ignore_errors)\n']
module_args = ('ptf --test-dir ptftests hash_test.HashTest --platform-dir ptftests --qlen=2000 --platform remote -t \'vlan_ids=[1032...'"\'\' --relax --debug info --log-file /tmp/hash_test.HashTest.ipv6.2021-07-05-14:26:53.log --socket-recv-size 16384',)
module_async = False
module_ignore_errors = False
previous_frame = <frame object at 0x5608a3956f80>
res        = {'stderr_lines': [u'WARNING: No route found for IPv6 destination :: (no defaul...: [], u'start': u'2021-07-05 14:15:49.598986', u'msg': u'non-zero return code'}
self       = <tests.common.devices.ptf.PTFHost object at 0x7fd3c056dc90>
verbose    = True

common/devices/base.py:89: RunAnsibleModuleFail

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions