← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1547486] [NEW] ARPSpoofOFCtlTestCase functional gate tests failing intermittently

 

Public bug reported:

Tests inside
neutron.tests.functional.agent.test_ovs_flows.ARPSpoofOFCtlTestCase
seems to fail intermittently. The root cause seems like to be the same
for all the tests...

Here are two different stack traces from two different patches...

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2016-02-19 09:49:54.288 | 2016-02-19 09:49:54.264 | ==============================
2016-02-19 09:49:54.312 | 2016-02-19 09:49:54.279 | Failed 1 tests - output below:
2016-02-19 09:49:54.321 | 2016-02-19 09:49:54.292 | ==============================
2016-02-19 09:49:54.332 | 2016-02-19 09:49:54.308 | 
2016-02-19 09:49:54.335 | 2016-02-19 09:49:54.310 | neutron.tests.functional.agent.test_ovs_flows.ARPSpoofOFCtlTestCase.test_arp_spoof_disable_network_port(native)
2016-02-19 09:49:54.339 | 2016-02-19 09:49:54.312 | ---------------------------------------------------------------------------------------------------------------
2016-02-19 09:49:54.339 | 2016-02-19 09:49:54.314 | 
2016-02-19 09:49:54.343 | 2016-02-19 09:49:54.316 | Captured traceback:
2016-02-19 09:49:54.375 | 2016-02-19 09:49:54.317 | ~~~~~~~~~~~~~~~~~~~
2016-02-19 09:49:54.375 | 2016-02-19 09:49:54.322 |     Traceback (most recent call last):
2016-02-19 09:49:54.375 | 2016-02-19 09:49:54.328 |       File "neutron/tests/functional/agent/test_ovs_flows.py", line 242, in test_arp_spoof_disable_network_port
2016-02-19 09:49:54.375 | 2016-02-19 09:49:54.351 |         net_helpers.assert_ping(self.src_namespace, self.dst_addr, count=2)
2016-02-19 09:49:54.378 | 2016-02-19 09:49:54.354 |       File "neutron/tests/common/net_helpers.py", line 93, in assert_ping
2016-02-19 09:49:54.380 | 2016-02-19 09:49:54.357 |         dst_ip])
2016-02-19 09:49:54.385 | 2016-02-19 09:49:54.361 |       File "neutron/agent/linux/ip_lib.py", line 885, in execute
2016-02-19 09:49:54.386 | 2016-02-19 09:49:54.363 |         log_fail_as_error=log_fail_as_error, **kwargs)
2016-02-19 09:49:54.389 | 2016-02-19 09:49:54.365 |       File "neutron/agent/linux/utils.py", line 140, in execute
2016-02-19 09:49:54.392 | 2016-02-19 09:49:54.368 |         raise RuntimeError(msg)
2016-02-19 09:49:54.395 | 2016-02-19 09:49:54.371 |     RuntimeError: Exit code: 1; Stdin: ; Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2016-02-19 09:49:54.397 | 2016-02-19 09:49:54.374 |     
2016-02-19 09:49:54.420 | 2016-02-19 09:49:54.376 |     --- 192.168.0.2 ping statistics ---
2016-02-19 09:49:54.421 | 2016-02-19 09:49:54.378 |     2 packets transmitted, 0 received, 100% packet loss, time 1005ms
2016-02-19 09:49:54.421 | 2016-02-19 09:49:54.379 |     
2016-02-19 09:49:54.421 | 2016-02-19 09:49:54.382 |     ; Stderr: 
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2016-02-19 09:12:55.965 | 2016-02-19 09:12:55.947 | ==============================
2016-02-19 09:12:55.972 | 2016-02-19 09:12:55.951 | Failed 1 tests - output below:
2016-02-19 09:12:55.977 | 2016-02-19 09:12:55.959 | ==============================
2016-02-19 09:12:55.986 | 2016-02-19 09:12:55.967 | 
2016-02-19 09:12:56.007 | 2016-02-19 09:12:55.976 | neutron.tests.functional.agent.test_ovs_flows.ARPSpoofOFCtlTestCase.test_arp_spoof_doesnt_block_normal_traffic(native)
2016-02-19 09:12:56.007 | 2016-02-19 09:12:55.978 | ----------------------------------------------------------------------------------------------------------------------
2016-02-19 09:12:56.009 | 2016-02-19 09:12:55.990 | 
2016-02-19 09:12:56.025 | 2016-02-19 09:12:56.006 | Captured pythonlogging:
2016-02-19 09:12:56.034 | 2016-02-19 09:12:56.016 | ~~~~~~~~~~~~~~~~~~~~~~~
2016-02-19 09:12:56.036 | 2016-02-19 09:12:56.018 |        DEBUG [oslo_policy._cache_handler] Reloading cached file /opt/stack/new/neutron/neutron/tests/etc/policy.json
2016-02-19 09:12:56.038 | 2016-02-19 09:12:56.020 |        DEBUG [oslo_policy.policy] Reloaded policy file: /opt/stack/new/neutron/neutron/tests/etc/policy.json
2016-02-19 09:12:56.046 | 2016-02-19 09:12:56.028 |     
2016-02-19 09:12:56.051 | 2016-02-19 09:12:56.030 | 
2016-02-19 09:12:56.060 | 2016-02-19 09:12:56.036 | Captured traceback:
2016-02-19 09:12:56.062 | 2016-02-19 09:12:56.044 | ~~~~~~~~~~~~~~~~~~~
2016-02-19 09:12:56.066 | 2016-02-19 09:12:56.048 |     Traceback (most recent call last):
2016-02-19 09:12:56.071 | 2016-02-19 09:12:56.053 |       File "neutron/tests/functional/agent/test_ovs_flows.py", line 145, in test_arp_spoof_doesnt_block_normal_traffic
2016-02-19 09:12:56.073 | 2016-02-19 09:12:56.055 |         net_helpers.assert_ping(self.src_namespace, self.dst_addr, count=2)
2016-02-19 09:12:56.078 | 2016-02-19 09:12:56.058 |       File "neutron/tests/common/net_helpers.py", line 93, in assert_ping
2016-02-19 09:12:56.080 | 2016-02-19 09:12:56.062 |         dst_ip])
2016-02-19 09:12:56.082 | 2016-02-19 09:12:56.064 |       File "neutron/agent/linux/ip_lib.py", line 885, in execute
2016-02-19 09:12:56.084 | 2016-02-19 09:12:56.066 |         log_fail_as_error=log_fail_as_error, **kwargs)
2016-02-19 09:12:56.086 | 2016-02-19 09:12:56.068 |       File "neutron/agent/linux/utils.py", line 140, in execute
2016-02-19 09:12:56.094 | 2016-02-19 09:12:56.076 |         raise RuntimeError(msg)
2016-02-19 09:12:56.102 | 2016-02-19 09:12:56.080 |     RuntimeError: Exit code: 1; Stdin: ; Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2016-02-19 09:12:56.109 | 2016-02-19 09:12:56.091 |     
2016-02-19 09:12:56.121 | 2016-02-19 09:12:56.101 |     --- 192.168.0.2 ping statistics ---
2016-02-19 09:12:56.132 | 2016-02-19 09:12:56.113 |     2 packets transmitted, 0 received, 100% packet loss, time 1003ms
2016-02-19 09:12:56.137 | 2016-02-19 09:12:56.118 |     
2016-02-19 09:12:56.138 | 2016-02-19 09:12:56.121 |     ; Stderr: 
2016-02-19 09:12:56.141 | 2016-02-19 09:12:56.123 |     
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2016-02-19 09:12:55.965 | 2016-02-19 09:12:55.947 | ==============================
2016-02-19 09:12:55.972 | 2016-02-19 09:12:55.951 | Failed 1 tests - output below:
2016-02-19 09:12:55.977 | 2016-02-19 09:12:55.959 | ==============================
2016-02-19 09:12:55.986 | 2016-02-19 09:12:55.967 | 
2016-02-19 09:12:56.007 | 2016-02-19 09:12:55.976 | neutron.tests.functional.agent.test_ovs_flows.ARPSpoofOFCtlTestCase.test_arp_spoof_doesnt_block_normal_traffic(native)
2016-02-19 09:12:56.007 | 2016-02-19 09:12:55.978 | ----------------------------------------------------------------------------------------------------------------------
2016-02-19 09:12:56.009 | 2016-02-19 09:12:55.990 | 
2016-02-19 09:12:56.025 | 2016-02-19 09:12:56.006 | Captured pythonlogging:
2016-02-19 09:12:56.034 | 2016-02-19 09:12:56.016 | ~~~~~~~~~~~~~~~~~~~~~~~
2016-02-19 09:12:56.036 | 2016-02-19 09:12:56.018 |        DEBUG [oslo_policy._cache_handler] Reloading cached file /opt/stack/new/neutron/neutron/tests/etc/policy.json
2016-02-19 09:12:56.038 | 2016-02-19 09:12:56.020 |        DEBUG [oslo_policy.policy] Reloaded policy file: /opt/stack/new/neutron/neutron/tests/etc/policy.json
2016-02-19 09:12:56.046 | 2016-02-19 09:12:56.028 |     
2016-02-19 09:12:56.051 | 2016-02-19 09:12:56.030 | 
2016-02-19 09:12:56.060 | 2016-02-19 09:12:56.036 | Captured traceback:
2016-02-19 09:12:56.062 | 2016-02-19 09:12:56.044 | ~~~~~~~~~~~~~~~~~~~
2016-02-19 09:12:56.066 | 2016-02-19 09:12:56.048 |     Traceback (most recent call last):
2016-02-19 09:12:56.071 | 2016-02-19 09:12:56.053 |       File "neutron/tests/functional/agent/test_ovs_flows.py", line 145, in test_arp_spoof_doesnt_block_normal_traffic
2016-02-19 09:12:56.073 | 2016-02-19 09:12:56.055 |         net_helpers.assert_ping(self.src_namespace, self.dst_addr, count=2)
2016-02-19 09:12:56.078 | 2016-02-19 09:12:56.058 |       File "neutron/tests/common/net_helpers.py", line 93, in assert_ping
2016-02-19 09:12:56.080 | 2016-02-19 09:12:56.062 |         dst_ip])
2016-02-19 09:12:56.082 | 2016-02-19 09:12:56.064 |       File "neutron/agent/linux/ip_lib.py", line 885, in execute
2016-02-19 09:12:56.084 | 2016-02-19 09:12:56.066 |         log_fail_as_error=log_fail_as_error, **kwargs)
2016-02-19 09:12:56.086 | 2016-02-19 09:12:56.068 |       File "neutron/agent/linux/utils.py", line 140, in execute
2016-02-19 09:12:56.094 | 2016-02-19 09:12:56.076 |         raise RuntimeError(msg)
2016-02-19 09:12:56.102 | 2016-02-19 09:12:56.080 |     RuntimeError: Exit code: 1; Stdin: ; Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2016-02-19 09:12:56.109 | 2016-02-19 09:12:56.091 |     
2016-02-19 09:12:56.121 | 2016-02-19 09:12:56.101 |     --- 192.168.0.2 ping statistics ---
2016-02-19 09:12:56.132 | 2016-02-19 09:12:56.113 |     2 packets transmitted, 0 received, 100% packet loss, time 1003ms
2016-02-19 09:12:56.137 | 2016-02-19 09:12:56.118 |     
2016-02-19 09:12:56.138 | 2016-02-19 09:12:56.121 |     ; Stderr: 
2016-02-19 09:12:56.141 | 2016-02-19 09:12:56.123 |

** Affects: neutron
     Importance: Undecided
         Status: New


** Tags: gate-failure

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1547486

Title:
  ARPSpoofOFCtlTestCase functional gate tests failing intermittently

Status in neutron:
  New

Bug description:
  Tests inside
  neutron.tests.functional.agent.test_ovs_flows.ARPSpoofOFCtlTestCase
  seems to fail intermittently. The root cause seems like to be the same
  for all the tests...

  Here are two different stack traces from two different patches...

  -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
  2016-02-19 09:49:54.288 | 2016-02-19 09:49:54.264 | ==============================
  2016-02-19 09:49:54.312 | 2016-02-19 09:49:54.279 | Failed 1 tests - output below:
  2016-02-19 09:49:54.321 | 2016-02-19 09:49:54.292 | ==============================
  2016-02-19 09:49:54.332 | 2016-02-19 09:49:54.308 | 
  2016-02-19 09:49:54.335 | 2016-02-19 09:49:54.310 | neutron.tests.functional.agent.test_ovs_flows.ARPSpoofOFCtlTestCase.test_arp_spoof_disable_network_port(native)
  2016-02-19 09:49:54.339 | 2016-02-19 09:49:54.312 | ---------------------------------------------------------------------------------------------------------------
  2016-02-19 09:49:54.339 | 2016-02-19 09:49:54.314 | 
  2016-02-19 09:49:54.343 | 2016-02-19 09:49:54.316 | Captured traceback:
  2016-02-19 09:49:54.375 | 2016-02-19 09:49:54.317 | ~~~~~~~~~~~~~~~~~~~
  2016-02-19 09:49:54.375 | 2016-02-19 09:49:54.322 |     Traceback (most recent call last):
  2016-02-19 09:49:54.375 | 2016-02-19 09:49:54.328 |       File "neutron/tests/functional/agent/test_ovs_flows.py", line 242, in test_arp_spoof_disable_network_port
  2016-02-19 09:49:54.375 | 2016-02-19 09:49:54.351 |         net_helpers.assert_ping(self.src_namespace, self.dst_addr, count=2)
  2016-02-19 09:49:54.378 | 2016-02-19 09:49:54.354 |       File "neutron/tests/common/net_helpers.py", line 93, in assert_ping
  2016-02-19 09:49:54.380 | 2016-02-19 09:49:54.357 |         dst_ip])
  2016-02-19 09:49:54.385 | 2016-02-19 09:49:54.361 |       File "neutron/agent/linux/ip_lib.py", line 885, in execute
  2016-02-19 09:49:54.386 | 2016-02-19 09:49:54.363 |         log_fail_as_error=log_fail_as_error, **kwargs)
  2016-02-19 09:49:54.389 | 2016-02-19 09:49:54.365 |       File "neutron/agent/linux/utils.py", line 140, in execute
  2016-02-19 09:49:54.392 | 2016-02-19 09:49:54.368 |         raise RuntimeError(msg)
  2016-02-19 09:49:54.395 | 2016-02-19 09:49:54.371 |     RuntimeError: Exit code: 1; Stdin: ; Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
  2016-02-19 09:49:54.397 | 2016-02-19 09:49:54.374 |     
  2016-02-19 09:49:54.420 | 2016-02-19 09:49:54.376 |     --- 192.168.0.2 ping statistics ---
  2016-02-19 09:49:54.421 | 2016-02-19 09:49:54.378 |     2 packets transmitted, 0 received, 100% packet loss, time 1005ms
  2016-02-19 09:49:54.421 | 2016-02-19 09:49:54.379 |     
  2016-02-19 09:49:54.421 | 2016-02-19 09:49:54.382 |     ; Stderr: 
  -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

  -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
  2016-02-19 09:12:55.965 | 2016-02-19 09:12:55.947 | ==============================
  2016-02-19 09:12:55.972 | 2016-02-19 09:12:55.951 | Failed 1 tests - output below:
  2016-02-19 09:12:55.977 | 2016-02-19 09:12:55.959 | ==============================
  2016-02-19 09:12:55.986 | 2016-02-19 09:12:55.967 | 
  2016-02-19 09:12:56.007 | 2016-02-19 09:12:55.976 | neutron.tests.functional.agent.test_ovs_flows.ARPSpoofOFCtlTestCase.test_arp_spoof_doesnt_block_normal_traffic(native)
  2016-02-19 09:12:56.007 | 2016-02-19 09:12:55.978 | ----------------------------------------------------------------------------------------------------------------------
  2016-02-19 09:12:56.009 | 2016-02-19 09:12:55.990 | 
  2016-02-19 09:12:56.025 | 2016-02-19 09:12:56.006 | Captured pythonlogging:
  2016-02-19 09:12:56.034 | 2016-02-19 09:12:56.016 | ~~~~~~~~~~~~~~~~~~~~~~~
  2016-02-19 09:12:56.036 | 2016-02-19 09:12:56.018 |        DEBUG [oslo_policy._cache_handler] Reloading cached file /opt/stack/new/neutron/neutron/tests/etc/policy.json
  2016-02-19 09:12:56.038 | 2016-02-19 09:12:56.020 |        DEBUG [oslo_policy.policy] Reloaded policy file: /opt/stack/new/neutron/neutron/tests/etc/policy.json
  2016-02-19 09:12:56.046 | 2016-02-19 09:12:56.028 |     
  2016-02-19 09:12:56.051 | 2016-02-19 09:12:56.030 | 
  2016-02-19 09:12:56.060 | 2016-02-19 09:12:56.036 | Captured traceback:
  2016-02-19 09:12:56.062 | 2016-02-19 09:12:56.044 | ~~~~~~~~~~~~~~~~~~~
  2016-02-19 09:12:56.066 | 2016-02-19 09:12:56.048 |     Traceback (most recent call last):
  2016-02-19 09:12:56.071 | 2016-02-19 09:12:56.053 |       File "neutron/tests/functional/agent/test_ovs_flows.py", line 145, in test_arp_spoof_doesnt_block_normal_traffic
  2016-02-19 09:12:56.073 | 2016-02-19 09:12:56.055 |         net_helpers.assert_ping(self.src_namespace, self.dst_addr, count=2)
  2016-02-19 09:12:56.078 | 2016-02-19 09:12:56.058 |       File "neutron/tests/common/net_helpers.py", line 93, in assert_ping
  2016-02-19 09:12:56.080 | 2016-02-19 09:12:56.062 |         dst_ip])
  2016-02-19 09:12:56.082 | 2016-02-19 09:12:56.064 |       File "neutron/agent/linux/ip_lib.py", line 885, in execute
  2016-02-19 09:12:56.084 | 2016-02-19 09:12:56.066 |         log_fail_as_error=log_fail_as_error, **kwargs)
  2016-02-19 09:12:56.086 | 2016-02-19 09:12:56.068 |       File "neutron/agent/linux/utils.py", line 140, in execute
  2016-02-19 09:12:56.094 | 2016-02-19 09:12:56.076 |         raise RuntimeError(msg)
  2016-02-19 09:12:56.102 | 2016-02-19 09:12:56.080 |     RuntimeError: Exit code: 1; Stdin: ; Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
  2016-02-19 09:12:56.109 | 2016-02-19 09:12:56.091 |     
  2016-02-19 09:12:56.121 | 2016-02-19 09:12:56.101 |     --- 192.168.0.2 ping statistics ---
  2016-02-19 09:12:56.132 | 2016-02-19 09:12:56.113 |     2 packets transmitted, 0 received, 100% packet loss, time 1003ms
  2016-02-19 09:12:56.137 | 2016-02-19 09:12:56.118 |     
  2016-02-19 09:12:56.138 | 2016-02-19 09:12:56.121 |     ; Stderr: 
  2016-02-19 09:12:56.141 | 2016-02-19 09:12:56.123 |     
  -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

  2016-02-19 09:12:55.965 | 2016-02-19 09:12:55.947 | ==============================
  2016-02-19 09:12:55.972 | 2016-02-19 09:12:55.951 | Failed 1 tests - output below:
  2016-02-19 09:12:55.977 | 2016-02-19 09:12:55.959 | ==============================
  2016-02-19 09:12:55.986 | 2016-02-19 09:12:55.967 | 
  2016-02-19 09:12:56.007 | 2016-02-19 09:12:55.976 | neutron.tests.functional.agent.test_ovs_flows.ARPSpoofOFCtlTestCase.test_arp_spoof_doesnt_block_normal_traffic(native)
  2016-02-19 09:12:56.007 | 2016-02-19 09:12:55.978 | ----------------------------------------------------------------------------------------------------------------------
  2016-02-19 09:12:56.009 | 2016-02-19 09:12:55.990 | 
  2016-02-19 09:12:56.025 | 2016-02-19 09:12:56.006 | Captured pythonlogging:
  2016-02-19 09:12:56.034 | 2016-02-19 09:12:56.016 | ~~~~~~~~~~~~~~~~~~~~~~~
  2016-02-19 09:12:56.036 | 2016-02-19 09:12:56.018 |        DEBUG [oslo_policy._cache_handler] Reloading cached file /opt/stack/new/neutron/neutron/tests/etc/policy.json
  2016-02-19 09:12:56.038 | 2016-02-19 09:12:56.020 |        DEBUG [oslo_policy.policy] Reloaded policy file: /opt/stack/new/neutron/neutron/tests/etc/policy.json
  2016-02-19 09:12:56.046 | 2016-02-19 09:12:56.028 |     
  2016-02-19 09:12:56.051 | 2016-02-19 09:12:56.030 | 
  2016-02-19 09:12:56.060 | 2016-02-19 09:12:56.036 | Captured traceback:
  2016-02-19 09:12:56.062 | 2016-02-19 09:12:56.044 | ~~~~~~~~~~~~~~~~~~~
  2016-02-19 09:12:56.066 | 2016-02-19 09:12:56.048 |     Traceback (most recent call last):
  2016-02-19 09:12:56.071 | 2016-02-19 09:12:56.053 |       File "neutron/tests/functional/agent/test_ovs_flows.py", line 145, in test_arp_spoof_doesnt_block_normal_traffic
  2016-02-19 09:12:56.073 | 2016-02-19 09:12:56.055 |         net_helpers.assert_ping(self.src_namespace, self.dst_addr, count=2)
  2016-02-19 09:12:56.078 | 2016-02-19 09:12:56.058 |       File "neutron/tests/common/net_helpers.py", line 93, in assert_ping
  2016-02-19 09:12:56.080 | 2016-02-19 09:12:56.062 |         dst_ip])
  2016-02-19 09:12:56.082 | 2016-02-19 09:12:56.064 |       File "neutron/agent/linux/ip_lib.py", line 885, in execute
  2016-02-19 09:12:56.084 | 2016-02-19 09:12:56.066 |         log_fail_as_error=log_fail_as_error, **kwargs)
  2016-02-19 09:12:56.086 | 2016-02-19 09:12:56.068 |       File "neutron/agent/linux/utils.py", line 140, in execute
  2016-02-19 09:12:56.094 | 2016-02-19 09:12:56.076 |         raise RuntimeError(msg)
  2016-02-19 09:12:56.102 | 2016-02-19 09:12:56.080 |     RuntimeError: Exit code: 1; Stdin: ; Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
  2016-02-19 09:12:56.109 | 2016-02-19 09:12:56.091 |     
  2016-02-19 09:12:56.121 | 2016-02-19 09:12:56.101 |     --- 192.168.0.2 ping statistics ---
  2016-02-19 09:12:56.132 | 2016-02-19 09:12:56.113 |     2 packets transmitted, 0 received, 100% packet loss, time 1003ms
  2016-02-19 09:12:56.137 | 2016-02-19 09:12:56.118 |     
  2016-02-19 09:12:56.138 | 2016-02-19 09:12:56.121 |     ; Stderr: 
  2016-02-19 09:12:56.141 | 2016-02-19 09:12:56.123 |

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1547486/+subscriptions