-
Notifications
You must be signed in to change notification settings - Fork 746
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ip/test_ip_packet.py
Increase tx_ok
tolerance from 200
to 400
on T2
#16005
ip/test_ip_packet.py
Increase tx_ok
tolerance from 200
to 400
on T2
#16005
Conversation
I'm ok with this change, but have a dumb question: is it enough if we make sure Rx_drop is 1000? |
Yeah IMO the TX_OK check seems like a weird one in this test, we should just check that all the packets were dropped on RX and that should be sufficient to indicate a passing test. But I'm not sure if certain platforms were failing because not all packets were being dropped or counted hence the tolerance was introduced? I figured rewriting the test to just check |
I mean something like: if Rx_drop is 1000: how about this? |
because we were increasing the Tx_ok tolerance the 2nd time, and it seems is not a necessary check |
sonic-net#7954 Increase tx_ok tolerance from 200 to 400 on T2
Cherry-pick PR to 202405: #16097 |
#7954 Increase tx_ok tolerance from 200 to 400 on T2
#7954 described an issue we saw on T2 platforms where
test_ip_packet.py::test_forward_ip_packet_with_0xffff_chksum_drop
would fail sporadically if sufficient control/background traffic egressed theout_ifaces
.#8414 was created to fix this by increasing the tolerance from
100
to200
packets. However, it seems like this wasn't sufficient tolerance as we're seeing failures on T2 devices:But if we look at the RX_DROP counters we see all 1000 packets were dropped on RX:
So the packets captured on TX was background traffic.
Summary:
Fixes #7954
Type of change
Back port request