Closed justin-wong-ce closed 1 month ago
The pre-commit check detected issues in the files touched by this pull request. The pre-commit check is a mandatory check, please fix detected issues.
Detailed pre-commit check results:
trim trailing whitespace.................................................PassedTo run the pre-commit checks locally, you can follow below steps:
pre-commit
package is installed:
sudo pip install pre-commit
pre-commit install
pre-commit
pre-commit run --from-ref <commit_id> --to-ref <commit_id>
Can we simply ignore the fdb entries from the IPv6 echo replies?
I don't believe there is a simple way to just ignore it.
The echo reply would cause the DUT to learn all the mac addresses used in the test (even the "fake" ones that are generated).
There is also no telltale sign from show mac
that will indicate that a particular entry is from the echo reply.
Even if there is a way to differentiate ipv6 echo replied fdb entries, I don't believe it will be a good idea to filter or add logic to check, as the goal of the test is to test the behaviour when the mac address is unknown. The test will be the most accurate and functionally correct if the DUT indeed does not know the mac at all.
Can we simply ignore the fdb entries from the IPv6 echo replies?
Actually, will change it so that we disable IPv6 on the DUT side instead of disabling it on the PTF container. Disabling on PTF may cause some previously populated items to be lost.
@lolyu could you help to review?
The pre-commit check detected issues in the files touched by this pull request. The pre-commit check is a mandatory check, please fix detected issues.
Detailed pre-commit check results:
trim trailing whitespace.................................................PassedTo run the pre-commit checks locally, you can follow below steps:
pre-commit
package is installed:
sudo pip install pre-commit
pre-commit install
pre-commit
pre-commit run --from-ref <commit_id> --to-ref <commit_id>
Changed to disable IPv6 from DUT instead of PTF. This method of disabling PTF is same as the method used here: https://github.com/sonic-net/sonic-mgmt/blob/master/tests/qos/qos_sai_base.py#L1815-L1830
Maybe we can disable the arp refresh by disabling the arp_update
:
# docker exec -it swss supervisorctl stop arp_update
arp_update: stopped
# docker exec -it swss supervisorctl start arp_update
arp_update: started
Maybe we can disable the arp refresh by disabling the
arp_update
:# docker exec -it swss supervisorctl stop arp_update arp_update: stopped # docker exec -it swss supervisorctl start arp_update arp_update: started
Will use this method instead, thanks.
Changed the fix method to use the arp_update
command instead of disabling ipv6
The pre-commit check detected issues in the files touched by this pull request. The pre-commit check is a mandatory check, please fix detected issues.
Detailed pre-commit check results:
trim trailing whitespace.................................................PassedTo run the pre-commit checks locally, you can follow below steps:
pre-commit
package is installed:
sudo pip install pre-commit
pre-commit install
pre-commit
pre-commit run --from-ref <commit_id> --to-ref <commit_id>
The pre-commit check detected issues in the files touched by this pull request. The pre-commit check is a mandatory check, please fix detected issues.
Detailed pre-commit check results:
trim trailing whitespace.................................................PassedTo run the pre-commit checks locally, you can follow below steps:
pre-commit
package is installed:
sudo pip install pre-commit
pre-commit install
pre-commit
pre-commit run --from-ref <commit_id> --to-ref <commit_id>
@lolyu could you please review it again?
Cherry-pick PR to 202405: https://github.com/sonic-net/sonic-mgmt/pull/14121
Cherry-pick PR to 202311: https://github.com/sonic-net/sonic-mgmt/pull/14213
Description of PR
The DUT will occasionally (~5 mins) send a echo request through IPv6 to the PTF container. When the PTF container replies, it populates the fdb table. This is bad because the test expects the fdb table to be empty.
~Temporarily disabling IPv6 on the PTF container during the test will eliminate the problem.~ Temporarily disabling
arp_update
on the DUT during the test will eliminate the problem.Summary: Fixes #
Type of change
Back port request
Approach
What is the motivation for this PR?
Test was flaky. Monitoring tcpdump on the PTF container and the DUT's fdb table shows IPv6 echo is causing mac addresses to be learned on the DUT even though it was previously flushed.
How did you do it?
Disable IPv6.
How did you verify/test it?
Disabling IPv6 will allow the test to consistently past. If IPv6 is re-enabled during the test and packets are sent, it immediately fails.
Any platform specific information?
Supported testbed topology if it's a new test case?
Documentation