This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
Hi TI
This is an issue reported in SDK 8.2, which is still being reproduced in SDK 8.4.
A customer has been reported that they still can not see ip4 related packet and can not get ip from udhcpd.
Please check if the issue is reproducible. and let us know how to fix the problem.
The following is observed during the test.
Regards,
Jack
Hi Jack,
Can you explain the test setup and share if you have any scripts to run the tests.
How is the setup different from EVM? This will help us to reproduce the issue as closely as possible.
Regards,
Tanmay
Hi Tanmay
We're still under waiting for test script and test setup configuration from the customer engineer.
It has been delayed due to email server security issue. Attachment has been blocked. Sorry for delay.
Regards,
Jack
HI Tanmay
I test whether ip is assigned to the pc by connecting the pc with ethernet in TI EVB (dhcpd).
But, The port of CPSW5G is not assigned an IP address.
I share the test procedure and configuration .
Environment configuration
1. EVB(TI): udhcp running => Attach the configuration and uchcpd configuration files, recipe, and service files. (Based on TI SDK8.04)
1) UUnzip udhcpd,copy(/sources/meta-arago/meta-arago-distro/recipes-tisdk)
2) Add udhcpd to roots image( yocto-build/sources/meta-arago/meta-arago-distro/recipes-core/images/tisdk-default-image.bb )
3) Build 및 download
4) =>. /usr/sbin/udhcpd -f /etc/udhcpd_tgu.conf &
2. PC
1) interface eth1(line9 in udhcpd_tgu.conf) => CPSW5G (Fix to eth0 when using CPSW2G)
2) PC configuration(dhcp)
3) Assign IP address
*. Ipconfig /renew(in PC side)
4) Check packet
*. EVB(TI) – tcpdump -I eth1 -n &
*. PC – Wireshark
3. normal packet using CPSW2G
Regards,
First of all, I recommend you to go over the below link to get familiar with our solution.
Please review the User guide to make sure you have the correct setup on EVM, especially the ethernet cable is connected to the right port on EVM for your testing.
What does the above answer have to do with not being able to get an IP from eth1 (CPSW5G) through DHCP in EVM?
In eth0, it is normal to get an IP assigned by DHCP.
How do I connect the EVM and PC through eth1 (CPSW5G) and get the IP assigned to the PC by DHCP from the EVM?
Bootp packet is not seen when looking at the packet with tcpdump in evm. Please support.
Subject changed to "udhcpd server daemon running failed in CPSW5G since BOOTP packet seems be Not reached to CPSW5G"
@Hi Stanley
They have tried to run udhcpd server program in CPSW5G after verified the running on CPSW2G.
Could you please teach him to debug in CPSW5G to find out the problrmatic area? He's still unable to dig out the root cause in CPSW5G FW side.
BTW,
If you're able to reproduce the DHCP IP assignemnt issue on CPSW5G using udhcpd, Can you help to fix the problem?
As my understanding, The client PC is unable to get IP address from the DRA821U' udhcpd server side.
It works from CPSW2G port. But failed at CPSW5G ports. They want to run udhcpd server via CPSW5G from their custom board which does not include CPSW2G port.
Regards,
Hi All,
The packets sent by the DHCP Client is broadcast packet is not reaching the A72. By default, the ethfw does not transfer the broadcast and multicast packets to all the cores. This would result in the DHCP server not receiving any request.
The solution to this would be to enable intercore ethernet support. This would ensure that the multicast and broadcast packets are forwarded to the A72 core. But the implementation of the intercore ethernet is through creation of another interface on linux called tap interface.
To tie the eth1 and tap interface together, you can create a bridge interface with this two interfaces and run the dhcp server on this interface. This isn't tested on TI side, but this should work.
To create a tap interface : Please see this. Make sure that the flag "ETHFW_INTERCORE_ETH_SUPPORT" is "yes" and "ETHFW_PROXY_ARP_SUPPORT" flag is "no". These flags can be changed in [RTOS-SDK-INSTALL-DIR]/ethfw/ethfw_build_flags.mak
After the changes, you will have to do a rebuild for ethfw and update the binary in the linux filesystem.
To create bridge : Run these commands from linux user space. After this bind the DHCP server to this br0. The bridge interface can also be configured from systemd-network service. The interface br0 will be the interface to use after this.
ip link add name br0 type bridge ip link set dev br0 up ip link set dev tap0 master br0 ip link set dev eth1 master br0
Can you try this and let me know the results.
Regards,
Tanmay
Hi Tanmay.
Thanks for your kind support.
As they followed with your suggestion,, the ip address is assigned with the bootp packet returend, But Ping is failed.
The below is the test result. Please check the problem.
1) Download ethfw with two flags set below in Ethfw to linux filesystem.
ETHFW_INTERCORE_ETH_SUPPORT=yes
ETHFW_PROXY_ARP_SUPPORT=no
2) Create tab interface: Create br0 after porting the source to RootFS with "<RTOS>/ethfw/apps/tap" code
3) br0 gateway ip assignment and interface check
4) Run Udhcpd and check ip allocation (confirm pc receives 192.168.5.11)
A. EVM
B. PC
5) Packet check
A. Check the interface status of the window after IP allocation: Rx does not work
B. Wireshark: only arp packets observed
C, Tcpdump (EVM): Replying to arp packets
6) Ping progress (PC -> EVM): No ping
Regards,
Jack
Hi Jack,
Can you do the following experiment and share the result :
After this please share the output of ethfw logs captured at MAIN UART 2.
Regards,
Tanmay
Hi Tanmay
Please find the test result what Customer tried.
Can you please check the below?
* Run the command 'ethtool -t eth1'
* After this please share the output of ethfw logs captured at MAIN UART 2.
The followings is the log from Ethfw.
root@j7200-evm:/etc/systemd/system# cat /sys/kernel/debug/remoteproc/remoteproc*/trace0 Sciclient_boardCfgRm init Passed DM Built On: Jun 16 2022 04:04:08 Sciserver Version: v2022.01.1.0-REL.CORESDK.08.02.01.03-1-g59713 RM_PM_HAL Version: REL.CORESDK.08.02.01.03-1-g59713 Starting Sciserver..... PASSED IPC_echo_test (core : mcu1_0) ..... mcu1_0 <--> mcu2_1, Ping- 10000, pong - 10000 completed ======================================================= CPSW Ethernet Firmware ======================================================= ETHFW: Shared multicasts (software fanout): 01:00:5e:00:00:01 01:00:5e:00:00:fb 01:00:5e:00:00:fc 33:33:00:00:00:01 33:33:ff:1d:92:c2 01:80:c2:00:00:00 01:80:c2:00:00:03 ETHFW: Reserved multicasts: 01:80:c2:00:00:0e 01:1b:19:00:00:00 EnetMcm: CPSW_5G on MAIN NAVSS PHY 16 is alive PHY 17 is alive PHY 18 is alive PHY 19 is alive EnetPhy_bindDriver: PHY 16: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 17: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 18: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 19: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK ETHFW Version : 0.02.00 ETHFW Build Date: Feb 2, 2022 ETHFW Build Time: 05:31:12 ETHFW Commit SHA: bd5a13f4 Starting lwIP, local interface IP is dhcp-enabled Host MAC address: 70:ff:76:1d:92:c3 [LWIPIF_LWIP] Enet LLD netif initialized successfully [LWIPIF_LWIP_IC] Interface started successfully [LWIPIF_LWIP_IC] NETIF INIT SUCCESS [LWIPIF_LWIP_IC] Interface started successfully [LWIPIF_LWIP_IC] NETIF INIT SUCCESS Added interface 'br4', IP is 0.0.0.0 CpswProxyServer: Virtual port configuration: mpu_1_0 <-> Switch port 0: mpu_1_0_ethswitch-device-0 mcu_2_1 <-> Switch port 1: mcu_2_1_ethswitch-device-1 mpu_1_0 <-> MAC port 1: mpu_1_0_ethmac-device-1 mcu_2_1 <-> MAC port 4: mcu_2_1_ethmac-device-4 CpswProxyServer: initialization completed (core: mcu2_0) CpswMacPort_checkSgmiiStatus: MAC 2: SGMII link parter config port: link up: 1-Gbps Full-Duplex Cpsw_handleLinkUp: Port 2: Link up: 1-Gbps Full-Duplex REMOTE_SERVICE: Init ... !!! REMOTE_SERVICE: Init ... Done !!! Function:CpswProxyServer_attachExtHandlerCb,HostId:0,CpswType:5 Function:CpswProxyServer_attachExtHandlerCb,HostId:0,CpswType:5 Function:CpswProxyServer_registerMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:70:ff:76:1d:92:c2, FlowIdx:85, FlowIdxOffset:1 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_registerMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:70:ff:76:1d:92:c1, FlowIdx:84, FlowIdxOffset:0 Cpsw_ioctlInternal: CPSW: Registered MAC address. ALE entry:7, Policer Entry:2 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:33:33:0:0:0:1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:1:0:5e:0:0:1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:33:33:ff:1d:92:c1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:0, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:3, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:e, vlanId:0, FlowIdx:84, FlowIdOffset:0 CpswProxyServer_isRsvdMcast: Reserved mcast cannot be added to filter Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:33:33:0:0:0:fb, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2a570e8,CoreKey:38acb7e6, MacAddress:33:33:0:1:0:3, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_regrdHandlerCb,HostId:0, RegAddr:c000000 Function:CpswProxyServer_regrdHandlerCb,HostId:0, RegAddr:c020000 Function:CpswProxyServer_clientNotifyHandlerCb,HostId:0,Handle:38acb7e6,CoreKey:a2a570e8,NotifyId:RPMSG_KDRV_TP_ETHSWITCH_CLIENTNOTIFY_DUMPSTATS,NotifyLen 0: Vlanid: 012c, UTagged: 1ff, Mult: 1ff, UMult: 0, Member: 1ff RAW:[0 212c1ff1 ff0001ff] 1: Vlanid: 0000, UTagged: 13, Mult: 13, UMult: 13, Member: 13 RAW:[0 20000130 13013013] 2: Vlanid: 0001, UTagged: d, Mult: d, UMult: 0, Member: d RAW:[0 200100d0 0d00000d] 3: Address: ffffffffffff, Member:01f Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[7c 1000ffff ffffffff] 4: Address: 70ff761d92c3, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c3] 5: EtherType: 0806 RAW:[1 20000000 00000806] 6: Address: 70ff761d92c2, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c2] 7: Address: 70ff761d92c1, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[0 100070ff 761d92c1] 8: Address: 333300000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10003333 00000001] 9: Address: 01005e000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000100 5e000001] 10: Address: 3333ff1d92c1, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 ff1d92c1] 11: Address: 0180c2000000, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000000] 12: Address: 0180c2000003, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000003] 13: Address: 3333000000fb, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 000000fb] 14: Address: 333300010003, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 00010003] 497 Free Entries 0: POLICER_DST_MAC,ALE Index: 3 0: POLICER_ETHERTYPE,ALE Index: 5 0: POLICER_THREAD,THREAD ID:4 0: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 1: POLICER_PORT, PORT_NUM: 1 ISTRUNK:0 1: POLICER_THREAD,THREAD ID:1 1: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 2: POLICER_DST_MAC,ALE Index: 7 2: POLICER_THREAD,THREAD ID:0 2: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 3: POLICER_DST_MAC,ALE Index: 10 3: POLICER_THREAD,THREAD ID:0 3: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 4: POLICER_DST_MAC,ALE Index: 13 4: POLICER_THREAD,THREAD ID:0 4: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 5: POLICER_DST_MAC,ALE Index: 14 5: POLICER_THREAD,THREAD ID:0 5: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 58 Free Entries Port 0 Statistics ----------------------------------------- External Port 0 Statistics ----------------------------------------- External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- External Port 3 Statistics ----------------------------------------- Added interface 'br4', IP is 192.168.5.12 EthFw: TimeSync PTP enabled Rx Flow for Software Inter-VLAN Routing is up Function:CpswProxyServer_regrdHandlerCb,HostId:0, RegAddr:c000000 Function:CpswProxyServer_regrdHandlerCb,HostId:0, RegAddr:c020000 Function:CpswProxyServer_clientNotifyHandlerCb,HostId:0,Handle:38acb7e6,CoreKey:a2a570e8,NotifyId:RPMSG_KDRV_TP_ETHSWITCH_CLIENTNOTIFY_DUMPSTATS,NotifyLen 0: Vlanid: 012c, UTagged: 1ff, Mult: 1ff, UMult: 0, Member: 1ff RAW:[0 212c1ff1 ff0001ff] 1: Vlanid: 0000, UTagged: 13, Mult: 13, UMult: 13, Member: 13 RAW:[0 20000130 13013013] 2: Vlanid: 0001, UTagged: d, Mult: d, UMult: 0, Member: d RAW:[0 200100d0 0d00000d] 3: Address: ffffffffffff, Member:01f Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[7c 1000ffff ffffffff] 4: Address: 70ff761d92c3, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c3] 5: EtherType: 0806 RAW:[1 20000000 00000806] 6: Address: 70ff761d92c2, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c2] 7: Address: 70ff761d92c1, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[0 100070ff 761d92c1] 8: Address: 333300000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10003333 00000001] 9: Address: 01005e000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000100 5e000001] 10: Address: 3333ff1d92c1, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 ff1d92c1] 11: Address: 0180c2000000, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000000] 12: Address: 0180c2000003, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000003] 13: Address: 3333000000fb, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 000000fb] 14: Address: 333300010003, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 00010003] 15: Address: 0180c200000e, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c200000e] 16: Address: 011b19000000, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 1000011b 19000000] 23: Address: 88366cfad915, Port: 000 Se=0 Bl=0 TOUCH=1 AGE=1 TRUNK=0 RAW:[0 d0018836 6cfad915] 40: Address: 0a1f96f71101, Port: 000 Se=0 Bl=0 TOUCH=1 AGE=1 TRUNK=0 RAW:[0 d12c0a1f 96f71101] 493 Free Entries 0: POLICER_DST_MAC,ALE Index: 3 0: POLICER_ETHERTYPE,ALE Index: 5 0: POLICER_THREAD,THREAD ID:4 0: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 1: POLICER_PORT, PORT_NUM: 1 ISTRUNK:0 1: POLICER_THREAD,THREAD ID:1 1: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 2: POLICER_DST_MAC,ALE Index: 7 2: POLICER_THREAD,THREAD ID:0 2: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 3: POLICER_DST_MAC,ALE Index: 10 3: POLICER_THREAD,THREAD ID:0 3: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 4: POLICER_DST_MAC,ALE Index: 13 4: POLICER_THREAD,THREAD ID:0 4: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 5: POLICER_DST_MAC,ALE Index: 14 5: POLICER_THREAD,THREAD ID:0 5: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 6: POLICER_DST_MAC,ALE Index: 15 6: POLICER_THREAD,THREAD ID:5 6: POLICER_PIR_IDL_INC_VAL: 279180 6: POLICER_CIR_IDL_INC_VAL: 279180 6: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 7: POLICER_DST_MAC,ALE Index: 16 7: POLICER_THREAD,THREAD ID:5 7: POLICER_PIR_IDL_INC_VAL: 279180 7: POLICER_CIR_IDL_INC_VAL: 279180 7: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 56 Free Entries Port 0 Statistics ----------------------------------------- External Port 0 Statistics ----------------------------------------- External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- External Port 3 Statistics ----------------------------------------- IPC_echo_test (core : mcu2_1) ..... mcu2_1 <--> mcu1_0, Ping- 10000, pong - 10000 completed
Thanks.
Regards,
Jack
Hi Jack,
The command "cat /sys/kernel/debug/remoteproc/remoteproc*/trace0" does not print the statistics which i actually wanted to see. Do you have any other way to get CPSW statistics? like running debug gels from CCS.
If No, then let me know and I will provide you with a script to print relevant statistics.
Regards,
Tanmay
Hi Tanmay.
Please provide us with the script to print out. We don't have the relevant stuff.
Regards,
Hi Jack,
First can you try by running this command after the bridge is setup : "bridge vlan add dev br0 vid 1 pvid untagged self"
Also for the script, please let me know the MAC_PORT to which the ethernet cable is connected.
Regards,
Tanmay
Hi Tanmay
Please find the answers from Customer side. below.
“bridge vlan add dev br0 vid 1 pvid untagged self “
--> We are currently testing SDK 8.05 on the EVM board, so we will share the results after setting the binary related to tap tomorrow.
Also for the script, please let me know the MAC_PORT to which the ethernet cable is connected.
--> Testing with 2 ports below.
Thanks.
Regards,
Jack
Hi
ip link add name br0 type bridge
ip link set dev br0 up
ip link set dev tap0 master br0
ip link set dev eth1 master br0
bridge vlan add dev br0 vid 1 pvid untagged self
As shown above, the phenomenon during the test is the same.
Hi Jack,
As you are using EVM and default SDK, you should be able to get ethfw log on MAIN_UART2. When you connect a micro-usb connection to MAIN UART, you would see 4 interfaces coming up on the host device. For Linux, it would be /dev/ttyUSB0 to /dev/ttyUSB3. For windows, it would be 4 com ports. One gives you the comand-line (/dev/ttyUSB0 or 1st COM port). The 3rd instance, /dev/ttyUSB2 or 3rd COM port, will be ehfw logs.
So you should have easy access to ethfw logs.
The issue with writing the script is that the logging function in ethfw is clearing the stat registers so I am not able to read the registers.
Can you please try to get the ethfw logs over uart. Getting stats after this would be easy. You have to follow the following steps :
- Start with a new boot.
- run the command `ethtool -t eth1`
- Run a ping test from PC to EVM for around 10 seconds
- run the command `ethtool -t eth1` again
Sorry for the confusion caused.
Regards,
Tanmay
Hi Tanmay
As customer followed up your suggestion, they are unable to get any logs from MAIN_UART2 as below.
When testing with the Default evb binary, no logs are taken on the other three ports except the linux log port (MAIN_UART).
Please check if the default pre-built binary able to produce the ethfw logs.
Thanks.
Regards,
Jack
Hi Jack,
Can you just confirm that you tried COM5. You should get the logs on COM5.
Regards,
Tanmay
Hi Tanmay
Yes, COM5 does not show any logs.
Is it possible to see any log with default binary too?
Let me check once again this week by my EVM as I am on the biz trip.
Regard
Jack
Hi Tanmay
I have the default SDK bianry only. It does not show any EthFW logs via 4x MAIN UARTs and 2x MCU UART ports. I can see only Linux Logs from the first MAIN UART port.
Please let us know if we're able to see EthFW log from UART port with PSDK fedault binary.
If I have to enable Log output feature, Also let us know how to enable it.
Thanks.
Regards,
Jack
Hi Jack,
Extremely sorry for the delay.
You can see this to enable the logs from ethfw :
In some cases, it might be possible that you do not have a ethfw UART available on board, in those cases a patch needs to be applied to ethfw to enable periodic dump of stats to the IPC buffer which can be viewed from Linux. The patch is available in the following attachment and is tested on SDK 8.6.
Attachment : CPSW_Periodic_stat_dump.zip
git init
- to create an empty git repositorygit add .
- to add all the files to the git repogit commit -m "Initial Commit"
- to do the first commit git am [Path_to_0001-Adds-support-for-periodic-CPSW-stat-collection.patch]
" to apply the patchmake ethfw_all BUILD_SOC_LIST=<SOC_NAME>
Can you take the stats now and check if any increments are seen on the "txGoodFrames" of the external Port statistics.
Regards,
Tanmay
Hi Tanmay
Thanks for your kind support.
Here's an attachment what the customer obtained after applied your patch.
root@j7200-evm:~# cat /sys/kernel/debug/remoteproc/remoteproc*/trace0 Sciclient_boardCfgRm init Passed DM Built On: Feb 1 2023 16:37:10 Sciserver Version: v2022.01.1.0-REL.CORESDK.08.06.00.09-14-ge559a+ RM_PM_HAL Version: REL.CORESDK.08.06.00.09-7-g4da19 Starting Sciserver..... PASSED IPC_echo_test (core : mcu1_0) ..... mcu1_0 <--> mcu2_1, Ping- 10000, pong - 10000 completed ======================================================= CPSW Ethernet Firmware ======================================================= Warning: Using 6 MAC address(es) from static pool ETHFW: Shared multicasts (software fanout): 01:00:5e:00:00:01 01:00:5e:00:00:fb 01:00:5e:00:00:fc 33:33:00:00:00:01 33:33:ff:1d:92:c2 01:80:c2:00:00:00 01:80:c2:00:00:03 ETHFW: Reserved multicasts: 01:80:c2:00:00:0e 01:1b:19:00:00:00 EnetMcm: CPSW_5G on MAIN NAVSS Mdio_open: MDIO manual mode enabled PHY 16 is alive PHY 17 is alive PHY 18 is alive PHY 19 is alive EnetPhy_bindDriver: PHY 16: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 17: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 18: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 19: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK ETHFW Version : 0.02.00 ETHFW Build Date: Apr 24, 2023 ETHFW Build Time: 14:27:58 ETHFW Commit SHA: NETWORK TASK Starting lwIP, local interface IP is dhcp-enabled Host MAC address: 70:ff:76:1d:92:c3 [LWIPIF_LWIP] Enet LLD netif initialized successfully [LWIPIF_LWIP_IC] Interface started successfully [LWIPIF_LWIP_IC] NETIF INIT SUCCESS [LWIPIF_LWIP_IC] Interface started successfully [LWIPIF_LWIP_IC] NETIF INIT SUCCESS Added interface 'br4', IP is 0.0.0.0 CpswProxyServer: Virtual port configuration: mpu_1_0 <-> Switch port 0: mpu_1_0_ethswitch-device-0 mcu_2_1 <-> Switch port 1: mcu_2_1_ethswitch-device-1 mpu_1_0 <-> MAC port 1: mpu_1_0_ethmac-device-1 mcu_2_1 <-> MAC port 4: mcu_2_1_ethmac-device-4 CpswProxyServer: initialization completed (core: mcu2_0) CpswMacPort_checkSgmiiStatus: MAC 2: SGMII link parter config port: link up: 1-Gbps Full-Duplex Cpsw_handleLinkUp: Port 2: Link up: 1-Gbps Full-Duplex ====== Iteration 1 ===== Port 0 Statistics ----------------------------------------- txGoodFrames = 4 txBcastFrames = 4 txOctets = 256 octetsFrames64 = 4 netOctets = 256 txPri[0] = 4 txPriBcnt[0] = 256 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 25 rxBcastFrames = 4 rxMcastFrames = 21 aleDrop = 21 rxOctets = 2381 octetsFrames64 = 8 octetsFrames65to127 = 13 octetsFrames128to255 = 4 netOctets = 2381 portMaskDrop = 21 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 External Port 3 Statistics ----------------------------------------- REMOTE_SERVICE: Init ... !!! REMOTE_SERVICE: Init ... Done !!! Function:CpswProxyServer_attachExtHandlerCb,HostId:0,CpswType:5 Function:CpswProxyServer_attachExtHandlerCb,HostId:0,CpswType:5 Function:CpswProxyServer_registerMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:70:ff:76:1d:92:c2, FlowIdx:85, FlowIdxOffset:1 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_registerMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:70:ff:76:1d:92:c1, FlowIdx:84, FlowIdxOffset:0 Cpsw_ioctlInternal: CPSW: Registered MAC address. ALE entry:6, Policer Entry:1 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:33:33:0:0:0:1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:1:0:5e:0:0:1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:33:33:ff:1d:92:c1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:0, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:3, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:e, vlanId:0, FlowIdx:84, FlowIdOffset:0 CpswProxyServer_isRsvdMcast: Reserved mcast cannot be added to filter ====== Iteration 2 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 7 rxBcastFrames = 3 rxMcastFrames = 4 aleDrop = 5 rxOctets = 1400 txGoodFrames = 29 txBcastFrames = 29 txOctets = 3064 octetsFrames64 = 15 octetsFrames65to127 = 16 octetsFrames256to511 = 5 netOctets = 4464 portMaskDrop = 5 txPri[0] = 29 txPriBcnt[0] = 3064 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 76 rxBcastFrames = 29 rxMcastFrames = 47 aleDrop = 47 rxOctets = 8353 txGoodFrames = 2 txBcastFrames = 2 txOctets = 691 octetsFrames64 = 23 octetsFrames65to127 = 37 octetsFrames128to255 = 14 octetsFrames256to511 = 4 netOctets = 9044 portMaskDrop = 47 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 txPri[0] = 1 txPri[2] = 1 txPriBcnt[0] = 337 txPriBcnt[2] = 354 External Port 3 Statistics ----------------------------------------- Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:33:33:0:0:0:fb, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bcb0a0,CoreKey:38acb7e6, MacAddress:33:33:0:1:0:3, vlanId:0, FlowIdx:84, FlowIdOffset:0 ====== Iteration 3 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 54 rxBcastFrames = 8 rxMcastFrames = 46 aleDrop = 34 rxOctets = 8368 txGoodFrames = 53 txBcastFrames = 41 txMcastFrames = 12 txOctets = 5552 octetsFrames64 = 20 octetsFrames65to127 = 63 octetsFrames128to255 = 13 octetsFrames256to511 = 11 netOctets = 13920 portMaskDrop = 34 aleUnknownMcast = 1 aleUnknownMcastBcnt = 94 alePolicyMatch = 18 txPri[0] = 53 txPriBcnt[0] = 5552 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 129 rxBcastFrames = 41 rxMcastFrames = 88 aleDrop = 76 rxOctets = 14193 txGoodFrames = 20 txBcastFrames = 6 txMcastFrames = 14 txOctets = 4198 octetsFrames64 = 28 octetsFrames65to127 = 83 octetsFrames128to255 = 29 octetsFrames256to511 = 9 netOctets = 18391 portMaskDrop = 76 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 12 txPri[0] = 9 txPri[2] = 11 txPriBcnt[0] = 1794 txPriBcnt[2] = 2404 External Port 3 Statistics ----------------------------------------- ====== Iteration 4 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 63 rxBcastFrames = 13 rxMcastFrames = 50 aleDrop = 39 rxOctets = 10500 txGoodFrames = 64 txBcastFrames = 48 txMcastFrames = 16 txOctets = 7032 octetsFrames64 = 25 octetsFrames65to127 = 70 octetsFrames128to255 = 14 octetsFrames256to511 = 18 netOctets = 17532 portMaskDrop = 39 aleUnknownMcast = 1 aleUnknownMcastBcnt = 94 aleUnknownBcast = 1 aleUnknownBcastBcnt = 346 alePolicyMatch = 19 txPri[0] = 64 txPriBcnt[0] = 7032 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 146 rxBcastFrames = 48 rxMcastFrames = 98 aleDrop = 82 rxOctets = 16361 txGoodFrames = 24 txBcastFrames = 9 txMcastFrames = 15 txOctets = 5434 octetsFrames64 = 33 octetsFrames65to127 = 91 octetsFrames128to255 = 32 octetsFrames256to511 = 14 netOctets = 21795 portMaskDrop = 82 aleUnknownMcast = 1 aleUnknownMcastBcnt = 86 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 16 txPri[0] = 10 txPri[2] = 14 txPriBcnt[0] = 2131 txPriBcnt[2] = 3303 External Port 3 Statistics ----------------------------------------- ====== Iteration 5 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 65 rxBcastFrames = 13 rxMcastFrames = 52 aleDrop = 41 rxOctets = 10648 txGoodFrames = 86 txBcastFrames = 62 txMcastFrames = 24 txOctets = 9152 octetsFrames64 = 32 octetsFrames65to127 = 86 octetsFrames128to255 = 14 octetsFrames256to511 = 19 netOctets = 19800 portMaskDrop = 41 aleUnknownMcast = 2 aleUnknownMcastBcnt = 168 aleUnknownBcast = 1 aleUnknownBcastBcnt = 346 alePolicyMatch = 19 txPri[0] = 86 txPriBcnt[0] = 9152 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 176 rxBcastFrames = 62 rxMcastFrames = 114 aleDrop = 90 rxOctets = 19049 txGoodFrames = 24 txBcastFrames = 9 txMcastFrames = 15 txOctets = 5434 octetsFrames64 = 40 octetsFrames65to127 = 113 octetsFrames128to255 = 32 octetsFrames256to511 = 15 netOctets = 24483 portMaskDrop = 90 aleUnknownMcast = 1 aleUnknownMcastBcnt = 86 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 24 txPri[0] = 10 txPri[2] = 14 txPriBcnt[0] = 2131 txPriBcnt[2] = 3303 External Port 3 Statistics ----------------------------------------- ====== Iteration 6 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 108 rxBcastFrames = 23 rxMcastFrames = 85 aleDrop = 59 rxOctets = 16914 txGoodFrames = 92 txBcastFrames = 68 txMcastFrames = 24 txOctets = 9536 octetsFrames64 = 45 octetsFrames65to127 = 106 octetsFrames128to255 = 26 octetsFrames256to511 = 23 netOctets = 26450 portMaskDrop = 59 aleUnknownMcast = 3 aleUnknownMcastBcnt = 282 aleUnknownBcast = 1 aleUnknownBcastBcnt = 346 alePolicyMatch = 35 txPri[0] = 92 txPriBcnt[0] = 9536 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 182 rxBcastFrames = 68 rxMcastFrames = 114 aleDrop = 90 rxOctets = 19433 txGoodFrames = 49 txBcastFrames = 18 txMcastFrames = 31 txOctets = 9563 octetsFrames64 = 52 octetsFrames65to127 = 119 octetsFrames128to255 = 42 octetsFrames256to511 = 18 netOctets = 28996 portMaskDrop = 90 aleUnknownMcast = 1 aleUnknownMcastBcnt = 86 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 24 txPri[0] = 26 txPri[2] = 23 txPriBcnt[0] = 4556 txPriBcnt[2] = 5007 External Port 3 Statistics ----------------------------------------- ====== Iteration 7 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 128 rxBcastFrames = 27 rxMcastFrames = 101 aleDrop = 61 rxOctets = 18918 txGoodFrames = 108 txBcastFrames = 72 txMcastFrames = 36 txOctets = 10978 octetsFrames64 = 53 octetsFrames65to127 = 132 octetsFrames128to255 = 28 octetsFrames256to511 = 23 netOctets = 29896 portMaskDrop = 61 aleUnknownMcast = 4 aleUnknownMcastBcnt = 489 aleUnknownBcast = 1 aleUnknownBcastBcnt = 346 alePolicyMatch = 49 txPri[0] = 108 txPriBcnt[0] = 10978 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 206 rxBcastFrames = 72 rxMcastFrames = 134 aleDrop = 98 rxOctets = 21714 txGoodFrames = 67 txBcastFrames = 22 txMcastFrames = 45 txOctets = 11419 octetsFrames64 = 60 octetsFrames65to127 = 150 octetsFrames128to255 = 45 octetsFrames256to511 = 18 netOctets = 33133 portMaskDrop = 98 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 36 txPri[0] = 31 txPri[2] = 36 txPriBcnt[0] = 5019 txPriBcnt[2] = 6400 External Port 3 Statistics ----------------------------------------- ====== Iteration 8 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 170 rxBcastFrames = 29 rxMcastFrames = 141 aleDrop = 85 rxOctets = 24402 txGoodFrames = 126 txBcastFrames = 74 txMcastFrames = 52 txOctets = 12966 octetsFrames64 = 55 octetsFrames65to127 = 178 octetsFrames128to255 = 32 octetsFrames256to511 = 31 netOctets = 37368 portMaskDrop = 85 aleUnknownMcast = 6 aleUnknownMcastBcnt = 629 aleUnknownBcast = 1 aleUnknownBcastBcnt = 346 alePolicyMatch = 65 txPri[0] = 126 txPriBcnt[0] = 12966 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 228 rxBcastFrames = 74 rxMcastFrames = 154 aleDrop = 102 rxOctets = 24078 txGoodFrames = 85 txBcastFrames = 24 txMcastFrames = 61 txOctets = 13407 octetsFrames64 = 62 octetsFrames65to127 = 186 octetsFrames128to255 = 45 octetsFrames256to511 = 20 netOctets = 37485 portMaskDrop = 102 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 52 txPri[0] = 33 txPri[2] = 52 txPriBcnt[0] = 5431 txPriBcnt[2] = 7976 External Port 3 Statistics ----------------------------------------- ====== Iteration 9 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 205 rxBcastFrames = 49 rxMcastFrames = 156 aleDrop = 89 rxOctets = 29566 txGoodFrames = 154 txBcastFrames = 90 txMcastFrames = 64 txOctets = 16212 octetsFrames64 = 61 octetsFrames65to127 = 223 octetsFrames128to255 = 38 octetsFrames256to511 = 37 netOctets = 45778 portMaskDrop = 89 aleUnknownMcast = 7 aleUnknownMcastBcnt = 868 aleUnknownBcast = 3 aleUnknownBcastBcnt = 1038 alePolicyMatch = 77 txPri[0] = 154 txPriBcnt[0] = 16212 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 276 rxBcastFrames = 90 rxMcastFrames = 186 aleDrop = 122 rxOctets = 29392 txGoodFrames = 116 txBcastFrames = 43 txMcastFrames = 73 txOctets = 17682 octetsFrames64 = 72 octetsFrames65to127 = 243 octetsFrames128to255 = 52 octetsFrames256to511 = 25 netOctets = 47074 portMaskDrop = 122 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 64 txPri[0] = 50 txPri[2] = 66 txPriBcnt[0] = 7676 txPriBcnt[2] = 10006 External Port 3 Statistics ----------------------------------------- ====== Iteration 10 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 278 rxBcastFrames = 85 rxMcastFrames = 188 aleDrop = 89 rxOctets = 38420 txGoodFrames = 217 txBcastFrames = 121 txMcastFrames = 96 txOctets = 23016 octetsFrames64 = 82 octetsFrames65to127 = 321 octetsFrames128to255 = 46 octetsFrames256to511 = 46 netOctets = 61436 portMaskDrop = 94 aleUnknownMcast = 7 aleUnknownMcastBcnt = 868 aleUnknownBcast = 5 aleUnknownBcastBcnt = 1730 alePolicyMatch = 109 txPri[0] = 217 txPriBcnt[0] = 23016 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 397 rxBcastFrames = 121 rxMcastFrames = 276 aleDrop = 180 rxOctets = 42484 txGoodFrames = 184 txBcastFrames = 79 txMcastFrames = 105 txOctets = 26216 octetsFrames64 = 95 octetsFrames65to127 = 380 octetsFrames128to255 = 72 octetsFrames256to511 = 34 netOctets = 68700 portMaskDrop = 180 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 96 txPri[0] = 83 txPri[2] = 101 txPriBcnt[0] = 11888 txPriBcnt[2] = 14328 External Port 3 Statistics ----------------------------------------- ====== Iteration 11 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 313 rxBcastFrames = 100 rxMcastFrames = 200 aleDrop = 89 rxOctets = 41236 txGoodFrames = 244 txBcastFrames = 136 txMcastFrames = 108 txOctets = 25320 octetsFrames64 = 108 octetsFrames65to127 = 357 octetsFrames128to255 = 46 octetsFrames256to511 = 46 netOctets = 66556 portMaskDrop = 102 aleUnknownMcast = 7 aleUnknownMcastBcnt = 868 aleUnknownBcast = 5 aleUnknownBcastBcnt = 1730 alePolicyMatch = 121 txPri[0] = 244 txPriBcnt[0] = 25320 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 452 rxBcastFrames = 136 rxMcastFrames = 316 aleDrop = 208 rxOctets = 49008 txGoodFrames = 211 txBcastFrames = 94 txMcastFrames = 117 txOctets = 28520 octetsFrames64 = 113 octetsFrames65to127 = 428 octetsFrames128to255 = 88 octetsFrames256to511 = 34 netOctets = 77528 portMaskDrop = 208 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 108 txPri[0] = 98 txPri[2] = 113 txPriBcnt[0] = 13040 txPriBcnt[2] = 15480 External Port 3 Statistics ----------------------------------------- ====== Iteration 12 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 341 rxBcastFrames = 107 rxMcastFrames = 214 aleDrop = 91 rxOctets = 43552 txGoodFrames = 263 txBcastFrames = 143 txMcastFrames = 120 txOctets = 27040 octetsFrames64 = 129 octetsFrames65to127 = 383 octetsFrames128to255 = 46 octetsFrames256to511 = 46 netOctets = 70592 portMaskDrop = 111 aleUnknownMcast = 7 aleUnknownMcastBcnt = 868 aleUnknownBcast = 5 aleUnknownBcastBcnt = 1730 alePolicyMatch = 133 txPri[0] = 263 txPriBcnt[0] = 27040 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 488 rxBcastFrames = 144 rxMcastFrames = 344 aleDrop = 224 rxOctets = 52632 txGoodFrames = 230 txBcastFrames = 101 txMcastFrames = 129 txOctets = 30240 octetsFrames64 = 128 octetsFrames65to127 = 464 octetsFrames128to255 = 92 octetsFrames256to511 = 34 netOctets = 82872 portMaskDrop = 224 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 120 txPri[0] = 105 txPri[2] = 125 txPriBcnt[0] = 13488 txPriBcnt[2] = 16752 External Port 3 Statistics ----------------------------------------- ====== Iteration 13 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 371 rxBcastFrames = 122 rxMcastFrames = 222 aleDrop = 91 rxOctets = 46460 txGoodFrames = 285 txBcastFrames = 157 txMcastFrames = 128 txOctets = 28856 octetsFrames64 = 151 octetsFrames65to127 = 411 octetsFrames128to255 = 46 octetsFrames256to511 = 48 netOctets = 75316 portMaskDrop = 118 aleUnknownMcast = 7 aleUnknownMcastBcnt = 868 aleUnknownBcast = 5 aleUnknownBcastBcnt = 1730 alePolicyMatch = 141 txPri[0] = 285 txPriBcnt[0] = 28856 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 517 rxBcastFrames = 157 rxMcastFrames = 360 aleDrop = 232 rxOctets = 54952 txGoodFrames = 254 txBcastFrames = 117 txMcastFrames = 137 txOctets = 32764 octetsFrames64 = 143 octetsFrames65to127 = 500 octetsFrames128to255 = 92 octetsFrames256to511 = 36 netOctets = 87716 portMaskDrop = 232 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 128 txPri[0] = 120 txPri[2] = 134 txPriBcnt[0] = 14930 txPriBcnt[2] = 17834 External Port 3 Statistics ----------------------------------------- ====== Iteration 14 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 384 rxBcastFrames = 128 rxMcastFrames = 224 aleDrop = 93 rxOctets = 47594 txGoodFrames = 289 txBcastFrames = 161 txMcastFrames = 128 txOctets = 29112 octetsFrames64 = 165 octetsFrames65to127 = 413 octetsFrames128to255 = 46 octetsFrames256to511 = 49 netOctets = 76706 portMaskDrop = 125 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 5 aleUnknownBcastBcnt = 1730 alePolicyMatch = 141 txPri[0] = 289 txPriBcnt[0] = 29112 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 522 rxBcastFrames = 161 rxMcastFrames = 361 aleDrop = 233 rxOctets = 55369 txGoodFrames = 259 txBcastFrames = 122 txMcastFrames = 137 txOctets = 33366 octetsFrames64 = 151 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 37 netOctets = 88735 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 128 txPri[0] = 124 txPri[2] = 135 txPriBcnt[0] = 15186 txPriBcnt[2] = 18180 External Port 3 Statistics ----------------------------------------- ====== Iteration 15 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 396 rxBcastFrames = 135 rxMcastFrames = 224 aleDrop = 93 rxOctets = 48917 txGoodFrames = 294 txBcastFrames = 166 txMcastFrames = 128 txOctets = 29432 octetsFrames64 = 180 octetsFrames65to127 = 413 octetsFrames128to255 = 46 octetsFrames256to511 = 51 netOctets = 78349 portMaskDrop = 130 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 6 aleUnknownBcastBcnt = 2076 alePolicyMatch = 141 txPri[0] = 294 txPriBcnt[0] = 29432 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 527 rxBcastFrames = 166 rxMcastFrames = 361 aleDrop = 233 rxOctets = 55689 txGoodFrames = 266 txBcastFrames = 129 txMcastFrames = 137 txOctets = 34369 octetsFrames64 = 161 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 39 netOctets = 90058 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 128 txPri[0] = 130 txPri[2] = 136 txPriBcnt[0] = 15843 txPriBcnt[2] = 18526 External Port 3 Statistics ----------------------------------------- ====== Iteration 16 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 411 rxBcastFrames = 143 rxMcastFrames = 225 aleDrop = 95 rxOctets = 50442 txGoodFrames = 301 txBcastFrames = 173 txMcastFrames = 128 txOctets = 29880 octetsFrames64 = 199 octetsFrames65to127 = 414 octetsFrames128to255 = 46 octetsFrames256to511 = 53 netOctets = 80322 portMaskDrop = 138 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 7 aleUnknownBcastBcnt = 2422 alePolicyMatch = 141 txPri[0] = 301 txPriBcnt[0] = 29880 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 534 rxBcastFrames = 173 rxMcastFrames = 361 aleDrop = 233 rxOctets = 56137 txGoodFrames = 273 txBcastFrames = 136 txMcastFrames = 137 txOctets = 35099 octetsFrames64 = 174 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 40 netOctets = 91236 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 128 txPri[0] = 136 txPri[2] = 137 txPriBcnt[0] = 16227 txPriBcnt[2] = 18872 External Port 3 Statistics ----------------------------------------- ====== Iteration 17 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 423 rxBcastFrames = 149 rxMcastFrames = 225 aleDrop = 95 rxOctets = 51210 txGoodFrames = 306 txBcastFrames = 178 txMcastFrames = 128 txOctets = 30200 octetsFrames64 = 216 octetsFrames65to127 = 414 octetsFrames128to255 = 46 octetsFrames256to511 = 53 netOctets = 81410 portMaskDrop = 144 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 7 aleUnknownBcastBcnt = 2422 alePolicyMatch = 141 txPri[0] = 306 txPriBcnt[0] = 30200 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 539 rxBcastFrames = 178 rxMcastFrames = 361 aleDrop = 233 rxOctets = 56457 txGoodFrames = 279 txBcastFrames = 142 txMcastFrames = 137 txOctets = 35483 octetsFrames64 = 185 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 40 netOctets = 91940 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 128 txPri[0] = 142 txPri[2] = 137 txPriBcnt[0] = 16611 txPriBcnt[2] = 18872 External Port 3 Statistics ----------------------------------------- ====== Iteration 18 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 431 rxBcastFrames = 152 rxMcastFrames = 227 aleDrop = 97 rxOctets = 51742 txGoodFrames = 309 txBcastFrames = 181 txMcastFrames = 128 txOctets = 30392 octetsFrames64 = 225 octetsFrames65to127 = 416 octetsFrames128to255 = 46 octetsFrames256to511 = 53 netOctets = 82134 portMaskDrop = 149 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 7 aleUnknownBcastBcnt = 2422 alePolicyMatch = 141 txPri[0] = 309 txPriBcnt[0] = 30392 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 542 rxBcastFrames = 181 rxMcastFrames = 361 aleDrop = 233 rxOctets = 56649 txGoodFrames = 282 txBcastFrames = 145 txMcastFrames = 137 txOctets = 35675 octetsFrames64 = 191 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 40 netOctets = 92324 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 1 aleUnknownBcastBcnt = 64 alePolicyMatch = 128 txPri[0] = 145 txPri[2] = 137 txPriBcnt[0] = 16803 txPriBcnt[2] = 18872 External Port 3 Statistics ----------------------------------------- ====== Iteration 19 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 441 rxBcastFrames = 157 rxMcastFrames = 227 aleDrop = 97 rxOctets = 52382 txGoodFrames = 314 txBcastFrames = 186 txMcastFrames = 128 txOctets = 30712 octetsFrames64 = 240 octetsFrames65to127 = 416 octetsFrames128to255 = 46 octetsFrames256to511 = 53 netOctets = 83094 portMaskDrop = 154 aleUnknownUcast = 2 aleUnknownUcastBcnt = 128 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 7 aleUnknownBcastBcnt = 2422 alePolicyMatch = 141 txPri[0] = 314 txPriBcnt[0] = 30712 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 547 rxBcastFrames = 186 rxMcastFrames = 361 aleDrop = 233 rxOctets = 56969 txGoodFrames = 287 txBcastFrames = 150 txMcastFrames = 137 txOctets = 35995 octetsFrames64 = 201 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 40 netOctets = 92964 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 3 aleUnknownBcastBcnt = 192 alePolicyMatch = 128 txPri[0] = 150 txPri[2] = 137 txPriBcnt[0] = 17123 txPriBcnt[2] = 18872 External Port 3 Statistics ----------------------------------------- ====== Iteration 20 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 450 rxBcastFrames = 162 rxMcastFrames = 227 aleDrop = 97 rxOctets = 53240 txGoodFrames = 318 txBcastFrames = 190 txMcastFrames = 128 txOctets = 30968 octetsFrames64 = 252 octetsFrames65to127 = 416 octetsFrames128to255 = 46 octetsFrames256to511 = 54 netOctets = 84208 portMaskDrop = 158 aleUnknownUcast = 3 aleUnknownUcastBcnt = 192 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 8 aleUnknownBcastBcnt = 2768 alePolicyMatch = 141 txPri[0] = 318 txPriBcnt[0] = 30968 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 551 rxBcastFrames = 190 rxMcastFrames = 361 aleDrop = 233 rxOctets = 57225 txGoodFrames = 292 txBcastFrames = 155 txMcastFrames = 137 txOctets = 36597 octetsFrames64 = 209 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 41 netOctets = 93822 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 4 aleUnknownBcastBcnt = 256 alePolicyMatch = 128 txPri[0] = 154 txPri[2] = 138 txPriBcnt[0] = 17379 txPriBcnt[2] = 19218 External Port 3 Statistics ----------------------------------------- ====== Iteration 21 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 460 rxBcastFrames = 168 rxMcastFrames = 227 aleDrop = 97 rxOctets = 54444 txGoodFrames = 322 txBcastFrames = 194 txMcastFrames = 128 txOctets = 31224 octetsFrames64 = 264 octetsFrames65to127 = 416 octetsFrames128to255 = 46 octetsFrames256to511 = 56 netOctets = 85668 portMaskDrop = 162 aleUnknownUcast = 5 aleUnknownUcastBcnt = 320 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 10 aleUnknownBcastBcnt = 3460 alePolicyMatch = 141 txPri[0] = 322 txPriBcnt[0] = 31224 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 555 rxBcastFrames = 194 rxMcastFrames = 361 aleDrop = 233 rxOctets = 57481 txGoodFrames = 298 txBcastFrames = 161 txMcastFrames = 137 txOctets = 37545 octetsFrames64 = 217 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 43 netOctets = 95026 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 6 aleUnknownBcastBcnt = 384 alePolicyMatch = 128 txPri[0] = 158 txPri[2] = 140 txPriBcnt[0] = 17635 txPriBcnt[2] = 19910 External Port 3 Statistics ----------------------------------------- ====== Iteration 22 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 470 rxBcastFrames = 173 rxMcastFrames = 227 aleDrop = 97 rxOctets = 55084 txGoodFrames = 327 txBcastFrames = 199 txMcastFrames = 128 txOctets = 31544 octetsFrames64 = 279 octetsFrames65to127 = 416 octetsFrames128to255 = 46 octetsFrames256to511 = 56 netOctets = 86628 portMaskDrop = 167 aleUnknownUcast = 6 aleUnknownUcastBcnt = 384 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 10 aleUnknownBcastBcnt = 3460 alePolicyMatch = 141 txPri[0] = 327 txPriBcnt[0] = 31544 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 560 rxBcastFrames = 199 rxMcastFrames = 361 aleDrop = 233 rxOctets = 57801 txGoodFrames = 303 txBcastFrames = 166 txMcastFrames = 137 txOctets = 37865 octetsFrames64 = 227 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 43 netOctets = 95666 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 7 aleUnknownBcastBcnt = 448 alePolicyMatch = 128 txPri[0] = 163 txPri[2] = 140 txPriBcnt[0] = 17955 txPriBcnt[2] = 19910 External Port 3 Statistics ----------------------------------------- ====== Iteration 23 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 480 rxBcastFrames = 178 rxMcastFrames = 227 aleDrop = 97 rxOctets = 55724 txGoodFrames = 332 txBcastFrames = 204 txMcastFrames = 128 txOctets = 31864 octetsFrames64 = 294 octetsFrames65to127 = 416 octetsFrames128to255 = 46 octetsFrames256to511 = 56 netOctets = 87588 portMaskDrop = 172 aleUnknownUcast = 8 aleUnknownUcastBcnt = 512 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 10 aleUnknownBcastBcnt = 3460 alePolicyMatch = 141 txPri[0] = 332 txPriBcnt[0] = 31864 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 565 rxBcastFrames = 204 rxMcastFrames = 361 aleDrop = 233 rxOctets = 58121 txGoodFrames = 308 txBcastFrames = 171 txMcastFrames = 137 txOctets = 38185 octetsFrames64 = 237 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 43 netOctets = 96306 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 9 aleUnknownBcastBcnt = 576 alePolicyMatch = 128 txPri[0] = 168 txPri[2] = 140 txPriBcnt[0] = 18275 txPriBcnt[2] = 19910 External Port 3 Statistics ----------------------------------------- ====== Iteration 24 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 490 rxBcastFrames = 183 rxMcastFrames = 227 aleDrop = 97 rxOctets = 56364 txGoodFrames = 337 txBcastFrames = 209 txMcastFrames = 128 txOctets = 32184 octetsFrames64 = 309 octetsFrames65to127 = 416 octetsFrames128to255 = 46 octetsFrames256to511 = 56 netOctets = 88548 portMaskDrop = 177 aleUnknownUcast = 9 aleUnknownUcastBcnt = 576 aleUnknownMcast = 8 aleUnknownMcastBcnt = 942 aleUnknownBcast = 10 aleUnknownBcastBcnt = 3460 alePolicyMatch = 141 txPri[0] = 337 txPriBcnt[0] = 32184 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 570 rxBcastFrames = 209 rxMcastFrames = 361 aleDrop = 233 rxOctets = 58441 txGoodFrames = 313 txBcastFrames = 176 txMcastFrames = 137 txOctets = 38505 octetsFrames64 = 247 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 43 netOctets = 96946 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 10 aleUnknownBcastBcnt = 640 alePolicyMatch = 128 txPri[0] = 173 txPri[2] = 140 txPriBcnt[0] = 18595 txPriBcnt[2] = 19910 External Port 3 Statistics ----------------------------------------- ====== Iteration 25 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 501 rxBcastFrames = 189 rxMcastFrames = 228 aleDrop = 98 rxOctets = 57658 txGoodFrames = 341 txBcastFrames = 213 txMcastFrames = 128 txOctets = 32440 octetsFrames64 = 321 octetsFrames65to127 = 417 octetsFrames128to255 = 46 octetsFrames256to511 = 58 netOctets = 90098 portMaskDrop = 182 aleUnknownUcast = 9 aleUnknownUcastBcnt = 576 aleUnknownMcast = 9 aleUnknownMcastBcnt = 1016 aleUnknownBcast = 10 aleUnknownBcastBcnt = 3460 alePolicyMatch = 141 txPri[0] = 341 txPriBcnt[0] = 32440 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 574 rxBcastFrames = 213 rxMcastFrames = 361 aleDrop = 233 rxOctets = 58697 txGoodFrames = 319 txBcastFrames = 182 txMcastFrames = 137 txOctets = 39469 octetsFrames64 = 255 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 45 netOctets = 98166 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 10 aleUnknownBcastBcnt = 640 alePolicyMatch = 128 txPri[0] = 178 txPri[2] = 141 txPriBcnt[0] = 19205 txPriBcnt[2] = 20264 External Port 3 Statistics ----------------------------------------- ====== Iteration 26 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 514 rxBcastFrames = 196 rxMcastFrames = 228 aleDrop = 98 rxOctets = 58772 txGoodFrames = 347 txBcastFrames = 219 txMcastFrames = 128 txOctets = 32824 octetsFrames64 = 339 octetsFrames65to127 = 417 octetsFrames128to255 = 46 octetsFrames256to511 = 59 netOctets = 91596 portMaskDrop = 188 aleUnknownUcast = 10 aleUnknownUcastBcnt = 640 aleUnknownMcast = 9 aleUnknownMcastBcnt = 1016 aleUnknownBcast = 11 aleUnknownBcastBcnt = 3806 alePolicyMatch = 141 txPri[0] = 347 txPriBcnt[0] = 32824 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 580 rxBcastFrames = 219 rxMcastFrames = 361 aleDrop = 233 rxOctets = 59081 txGoodFrames = 326 txBcastFrames = 189 txMcastFrames = 137 txOctets = 40199 octetsFrames64 = 267 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 46 netOctets = 99280 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 11 aleUnknownBcastBcnt = 704 alePolicyMatch = 128 txPri[0] = 184 txPri[2] = 142 txPriBcnt[0] = 19589 txPriBcnt[2] = 20610 External Port 3 Statistics ----------------------------------------- ====== Iteration 27 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 523 rxBcastFrames = 201 rxMcastFrames = 229 aleDrop = 99 rxOctets = 59922 txGoodFrames = 350 txBcastFrames = 222 txMcastFrames = 128 txOctets = 33016 octetsFrames64 = 348 octetsFrames65to127 = 418 octetsFrames128to255 = 46 octetsFrames256to511 = 61 netOctets = 92938 portMaskDrop = 192 aleUnknownUcast = 11 aleUnknownUcastBcnt = 704 aleUnknownMcast = 9 aleUnknownMcastBcnt = 1016 aleUnknownBcast = 13 aleUnknownBcastBcnt = 4498 alePolicyMatch = 141 txPri[0] = 350 txPriBcnt[0] = 33016 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 583 rxBcastFrames = 222 rxMcastFrames = 361 aleDrop = 233 rxOctets = 59273 txGoodFrames = 331 txBcastFrames = 194 txMcastFrames = 137 txOctets = 41083 octetsFrames64 = 273 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 48 netOctets = 100356 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 12 aleUnknownBcastBcnt = 768 alePolicyMatch = 128 txPri[0] = 187 txPri[2] = 144 txPriBcnt[0] = 19781 txPriBcnt[2] = 21302 External Port 3 Statistics ----------------------------------------- ====== Iteration 28 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 534 rxBcastFrames = 207 rxMcastFrames = 229 aleDrop = 99 rxOctets = 60899 txGoodFrames = 355 txBcastFrames = 227 txMcastFrames = 128 txOctets = 33336 octetsFrames64 = 363 octetsFrames65to127 = 418 octetsFrames128to255 = 46 octetsFrames256to511 = 62 netOctets = 94235 portMaskDrop = 197 aleUnknownUcast = 11 aleUnknownUcastBcnt = 704 aleUnknownMcast = 9 aleUnknownMcastBcnt = 1016 aleUnknownBcast = 13 aleUnknownBcastBcnt = 4498 alePolicyMatch = 141 txPri[0] = 355 txPriBcnt[0] = 33336 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 588 rxBcastFrames = 227 rxMcastFrames = 361 aleDrop = 233 rxOctets = 59593 txGoodFrames = 337 txBcastFrames = 200 txMcastFrames = 137 txOctets = 41740 octetsFrames64 = 283 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 49 netOctets = 101333 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 12 aleUnknownBcastBcnt = 768 alePolicyMatch = 128 txPri[0] = 193 txPri[2] = 144 txPriBcnt[0] = 20438 txPriBcnt[2] = 21302 External Port 3 Statistics ----------------------------------------- ====== Iteration 29 ===== Port 0 Statistics ----------------------------------------- rxGoodFrames = 545 rxBcastFrames = 213 rxMcastFrames = 229 aleDrop = 100 rxOctets = 61876 txGoodFrames = 360 txBcastFrames = 232 txMcastFrames = 128 txOctets = 33656 octetsFrames64 = 378 octetsFrames65to127 = 418 octetsFrames128to255 = 46 octetsFrames256to511 = 63 netOctets = 95532 portMaskDrop = 203 aleUnknownUcast = 11 aleUnknownUcastBcnt = 704 aleUnknownMcast = 9 aleUnknownMcastBcnt = 1016 aleUnknownBcast = 13 aleUnknownBcastBcnt = 4498 alePolicyMatch = 141 txPri[0] = 360 txPriBcnt[0] = 33656 External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- rxGoodFrames = 593 rxBcastFrames = 232 rxMcastFrames = 361 aleDrop = 233 rxOctets = 59913 txGoodFrames = 342 txBcastFrames = 205 txMcastFrames = 137 txOctets = 42060 octetsFrames64 = 293 octetsFrames65to127 = 500 octetsFrames128to255 = 93 octetsFrames256to511 = 49 netOctets = 101973 portMaskDrop = 233 aleUnknownMcast = 2 aleUnknownMcastBcnt = 247 aleUnknownBcast = 12 aleUnknownBcastBcnt = 768 alePolicyMatch = 128 txPri[0] = 198 txPri[2] = 144 txPriBcnt[0] = 20758 txPriBcnt[2] = 21302 External Port 3 Statistics -----------------------------------------
Thanks.
Regards,
Jack
Hi Jack,
Is ping from PC to SoC working?
Can you share the output of "tcpdump -i eth1" when pinging the SoC from PC.
Regards,
Tanmay
Hi Tanmay
I am attaching tcpdump data here. Please review it.
It is sending a reply to ARP msg and does not ping from PC to EVM.
root@j7200-evm:~# tcpdump -i br0 [ 277.009896] device br0 entered promiscuous mode tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on br0, link-type EN10MB (Ethernet), capture size 262144 bytes 22:52:45.059085 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:45.059148 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:46.063931 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:46.063988 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:47.162649 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:47.162705 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:48.067979 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:48.068058 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:49.061076 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:49.061146 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:50.061648 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:50.061701 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:51.184549 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:51.184599 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:52.064542 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:52.064614 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:53.063939 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:53.064006 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:54.122503 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:54.122569 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:55.053248 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:55.053313 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:56.054773 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:56.054825 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:57.322533 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:57.322588 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:58.058844 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:58.058903 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:59.054079 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:59.054137 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:00.063010 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:00.063064 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:01.377169 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:01.377233 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:02.055395 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:02.055461 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:03.060035 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:03.060104 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:04.381618 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:04.381670 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:05.068240 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:05.068306 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:06.065453 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:06.065520 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:07.468041 IP6 j7200-evm > ip6-allrouters: ICMP6, router solicitation, length 16 22:53:07.893096 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:07.893148 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:08.559669 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:08.559740 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28
Hi,
From logs it was observed that Port-2 Tx Broadcast count is increasing, means some broadcast packets sent out of MAC port-2.
Can you try Ping from EVM to PC.
Please share the logs using "CPSW_Periodic_stat_dump.zip" along with tcpdump with -xx option on EVM and Wireshark capture at PC.
Best Regards,
Sudheer
Hi Sudheer
Here's attahced log snapshot for EVM to PC use case
Sometimes PING is working according to them.
Thanks.
Regards,
Jack
Hi Tanmay
Please find the tcpdump below.
The tcpdump log of br0 is delivered because tab and eth1 are in use by tying br0 to bridge.
It is sending a reply for Arp, and the ping from PC to EVM is not going.
root@j7200-evm:~# tcpdump -i br0 [ 277.009896] device br0 entered promiscuous mode tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on br0, link-type EN10MB (Ethernet), capture size 262144 bytes 22:52:45.059085 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:45.059148 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:46.063931 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:46.063988 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:47.162649 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:47.162705 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:48.067979 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:48.068058 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:49.061076 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:49.061146 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:50.061648 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:50.061701 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:51.184549 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:51.184599 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:52.064542 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:52.064614 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:53.063939 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:53.064006 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:54.122503 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:54.122569 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:55.053248 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:55.053313 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:56.054773 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:56.054825 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:57.322533 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:57.322588 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:58.058844 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:58.058903 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:52:59.054079 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:52:59.054137 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:00.063010 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:00.063064 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:01.377169 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:01.377233 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:02.055395 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:02.055461 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:03.060035 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:03.060104 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:04.381618 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:04.381670 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:05.068240 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:05.068306 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:06.065453 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:06.065520 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:07.468041 IP6 j7200-evm > ip6-allrouters: ICMP6, router solicitation, length 16 22:53:07.893096 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:07.893148 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28 22:53:08.559669 ARP, Request who-has j7200-evm tell 192.168.5.12, length 46 22:53:08.559740 ARP, Reply j7200-evm is-at b6:70:f8:e0:b8:85 (oui Unknown), length 28
Thanks.
Regards,
Jack
Hi,
When ping is working from EVM to PC, during that time check ping from PC to EVM?
Also, share the Logs using "CPSW_Periodic_stat_dump.zip" while ping is going on.
Best Regards,
Sudheer
Jack's PC is weird, so I'm attaching a log.evm_to_pc.zip
When ping is working to EVM to PC, pc to EVM is not working.
Hi Sudheer
We want all of this to be transmitted from ethernet firmware to eth1 interface without filtering. ( BROADCAST packet, Unknown Unicast Packet, Unknown Multicast Packet, CPU Unicast packet)
Is it possible to share about the current progress?
Thanks
Regards.
Dongseuk
Hi,
We want all of this to be transmitted from ethernet firmware to eth1 interface without filtering. ( BROADCAST packet, Unknown Unicast Packet, Unknown Multicast Packet, CPU Unicast packet)
All broadcast packets can be forwarded to eth1 (A72). Please refer to FAQ [How to forward Broadcast to HLOS on A72]
Default CPU unicast (A72 MAC address as destination MAC) will be forwarded to eth1.
Unknown Multicast and Unicast can't be possible to direct to eth1.
Best Regards,
Sudheer
HI. Sudheer
fix the two things below, eth1 interface confirmed that ip allocation with dhcp and ping from EVM to EVM to pc works well.
1.ethfw
2. linux
ip maddr add FF:FF:FF:FF:FF:FF dev eth1
However, if eth0 and eth1 are tested with bridge as br0, it does not work.
To solve this problem, make the mac address of br0 equal to the mac address of eth1 and it works well during the test.
Is this the right way to approach it? Is there any other way?
Regards,
dongseuk.
Hi,
Can you try below and confirm where you are able to get IP and Ping is working?
Ignore above changes in Ethfw and Linux side.
Enable Inter-core Virtual Ethernet communication, no need to create bridge interface.
Try to check whether IP assigned to eth1 and physical switch interface on Ethfw, you can observe from Ethfw debug logs.
Best Regards,
Sudheer
HI,
Cannot get ip from dhcp to eth1 without the above two modifications.
Also, the use of br0 is essential for our application development.
As you can see from the top, the defines below are applied.
ETHFW_INTERCORE_ETH_SUPPORT=yes
ETHFW_PROXY_ARP_SUPPORT=no
The test environment is as shown in the link below, and in the picture in the link, pc1 and pc2 can now be imported as dhcpd
Ping works with pc1<->linux br0, pc2<->linux br0.
However, pc1 <->pc2 does not work.
Regards,
dongseuk
Hi,
ETHFW_INTERCORE_ETH_SUPPORT=yes
ETHFW_PROXY_ARP_SUPPORT=no
In above configuration, you mentioned that IP is assigned but ping is not working.
In above if you configure MAC address of bro same as eth1 then you can able to ping as well.
If Broadcast packet forwarding to Linux is fine in your environment as per your use case then above fixes working for you fine.
However, pc1 <->pc2 does not work.
For this we may need following:
1. Forwarding of PC1 packets to eth1 interface from bro.
2. If above is fine, then eth1 should accept the packets with PC1 MAC address as destination address in packet for this we may need to add PC1 MAC address in eth1/A72 List.
Please refer to Unicast address Addition to A72, In example Port-2 alone configured for policer rules you can add all ports to the policer.
But, drawback here is, It is static configuration.
If okay, you can connect CPSW2G to one of CPSW9G port and check your use case.
Best Regards,
Sudheer
HI,
How to configuration below?
1. Forwarding of PC1 packets to eth1 interface from bro.
2. If above is fine, then eth1 should accept the packets with PC1 MAC address as destination address in packet for this we may need to add PC1 MAC address in eth1/A72 List.
Regards,
dongseuk
Hi,
Forwarding of PC1 packets to eth1 interface from bro.
I am not sure, how to configure it. Ideally it should transmit from br0 to eth1.
This you can confirm by checking the Internal Host Port Rx packet count while pinging from PC1 to PC2.
When you run "#ethtool -t eth1" statistics will be printed in ethfw debug UART window.
May be you check by running tcpdump -i eth1.
2. If above is fine, then eth1 should accept the packets with PC1 MAC address as destination address in packet for this we may need to add PC1 MAC address in eth1/A72 List.
Please refer to FAQ [Unicast address Addition to A72], In example Port-2 alone configured for policer rules you can add all ports to the policer.
But, drawback here is, It is static configuration.
Best Regards,
Sudheer
Hi Doedla Sudheer Jumar, currently we are using DRA821U EVM not our custom board.
PLEASE TEST WITH YOUR EVM for our target environments (using br0 with eth0 and eth1)! And than please provide the solution.
Already we wait around one year for this issue!
-- YoungHan Kim
Hi Young,
Can you please try at your end by adding PC#1 MAC address to ALE by referring to FAQ [Unicast address Addition to A72],
It should work for your Use-case.
Best Regards,
Sudheer
Hi Doredla Suhheer Kumar,
Currently we use SDK 8.06.
Do you mean to apply apply only "Adding a Unicast MAC Address entry for A72 only for Port-2" patch on origianl SDK 8.06?
Or does it required other patch?
Thanks!
Regards
YoungHan Kim
HI! Sudheer,
FAQ [Unicast address Addition to A72] was applied to the above environment (eth0 and eth1 were used as br0).
However, #PC1 and #PC2 still do not ping.
It's a test on EVM, so I think you can try it. Please test it and provide the solution.
Regards
dongseuk,
Hi,
It's a test on EVM, so I think you can try it. Please test it and provide the solution.
I have tried and confirmed the forwarding of unicast MAC address frames coming from any of external port to A72 using the latest patch attached in FAQ [Adding a unicast MAC Address entry for A72].
Earlier patch forward to A72 only when packet receiving from External Port-2.
Can you please try with latest patch from above FAQ in that instead of default MAC address in patch {00:01:02:03:04:05} use your PC1 MAC address (which is connected to CPSW2G).
Best Regards,
Sudheer
HI Sudheer,
After applying the patch you gave me, eth0 (CPSW2G) is allocated ip from udhcpd, but not ip as eth1 (CPSW5G).
Should I work on the tap interface above after applying your patch?
Also, can you tell me the method you checked in order?
Regards,
dongseuk
Hi Dong,
Above pointed patch is for only to make successful ping between PC1 & PC2. Rest all to be needed as is. (till you confirmed IP allocation on CPSW2G, CPSW5G and ping between bridge and PC1 as well as ping between Bridge and PC2)
Make sure that you are using PC1 MAC address instead of Unicast MAC address mentioned in reference patch.
Also, can you tell me the method you checked in order?
I have connected PC to one of switch port of CPSW5 and configure the MAC address mentioned reference patch to PC and send some frames using Packeth application from PC to CPSW5G and observed those packets were reaching to A72.
Basically it is for forwarding of Unicast MAC address frames to A72. (Address we are registering with Ethfw by adding static code).
Best Regards,
Sudheer
HI! Sudheer
I applied the patch you gave me and tested it on TI EVM (SDK8.06) as below. However, there is still no ping between PC1 and PC2.
1. Apply patch and ethfw and linux side modifications
2. ETHFW_INTERCORE_ETH_SUPPORT=yes
ETHFW_PROXY_ARP_SUPPORT=no
3. Create br0
brctl addbr br0
brctl addif br0 eth0
brctl addif br0 eth1
ifconfig br0 192.168.5.254 netmask 255.255.255.0
4. Change the Mac address of br0 to the Mac address of eth1
5. Running udhcpd: Checking ip allocation PC1:192.168.5.11 PC2:192.168.5.12
6. ping PC1 (CPSW2G:192.168.5.11) to PC2 (CPSW5G:192.168.5. I applied the patch you gave me and tested it on TI EVM (SDK8.06) as below.
Attached is the wireshark log on the PC side and the tcpdump on the EVM
Please check
.
root@j7200-evm:~# tcpdump -i br0 -n [ 1724.766081] device br0 entered promiscuous mode tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on br0, link-type EN10MB (Ethernet), capture size 262144 bytes 23:16:52.734108 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:16:52.734429 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:16:53.002702 IP 192.168.5.11.63520 > 8.8.8.8.53: 50022+ A? dns.msftncsi.com. (34) 23:16:53.002799 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:16:53.036305 IP 192.168.5.11.63520 > 8.8.8.8.53: 50022+ A? dns.msftncsi.com. (34) 23:16:53.728042 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:16:53.728515 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:16:54.039261 IP 192.168.5.11.63520 > 8.8.8.8.53: 50022+ A? dns.msftncsi.com. (34) 23:16:54.084889 IP 192.168.5.11.65235 > 8.8.8.8.53: 57906+ A? gms.ahnlab.com. (32) 23:16:54.734450 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:16:54.734780 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:16:55.733115 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:16:55.733536 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:16:56.041411 IP 192.168.5.11.63520 > 8.8.8.8.53: 50022+ A? dns.msftncsi.com. (34) 23:16:56.041532 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:16:56.721861 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:16:56.722504 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:16:57.736340 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:16:57.737229 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:16:58.620763 IP 192.168.5.12.63348 > 8.8.8.8.53: 49695+ A? dns.msftncsi.com. (34) 23:16:58.620859 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 70 23:16:58.740436 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:16:58.741091 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:16:59.024765 IP 192.168.5.12.61418 > 8.8.8.8.53: 28637+ A? go.microsoft.com. (34) 23:16:59.024848 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 70 23:16:59.620158 IP 192.168.5.12.63348 > 8.8.8.8.53: 49695+ A? dns.msftncsi.com. (34) 23:16:59.620250 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 70 23:16:59.729227 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:16:59.729431 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:00.023593 IP 192.168.5.12.61418 > 8.8.8.8.53: 28637+ A? go.microsoft.com. (34) 23:17:00.046241 IP 192.168.5.11.63520 > 8.8.8.8.53: 50022+ A? dns.msftncsi.com. (34) 23:17:00.046319 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:17:00.621317 IP 192.168.5.12.63348 > 8.8.8.8.53: 49695+ A? dns.msftncsi.com. (34) 23:17:00.730494 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:00.730784 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:01.034222 IP 192.168.5.12.61418 > 8.8.8.8.53: 28637+ A? go.microsoft.com. (34) 23:17:01.738869 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:01.739331 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:02.626249 IP 192.168.5.12.63348 > 8.8.8.8.53: 49695+ A? dns.msftncsi.com. (34) 23:17:02.626344 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 70 23:17:02.735414 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:02.736009 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:03.036242 IP 192.168.5.12.61418 > 8.8.8.8.53: 28637+ A? go.microsoft.com. (34) 23:17:03.735865 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:03.736891 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:04.059577 IP 192.168.5.11.49354 > 8.8.8.8.53: 14679+ A? dns.msftncsi.com. (34) 23:17:04.059665 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:17:04.061012 IP 192.168.5.11.54930 > 8.8.8.8.53: 12543+ AAAA? dns.msftncsi.com. (34) 23:17:04.061046 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:17:04.089085 IP 192.168.5.11.49354 > 8.8.8.8.53: 14679+ A? dns.msftncsi.com. (34) 23:17:04.089085 IP 192.168.5.11.54930 > 8.8.8.8.53: 12543+ AAAA? dns.msftncsi.com. (34) 23:17:04.401231 IP 192.168.5.11.137 > 192.168.5.255.137: UDP, length 50 23:17:04.483781 IP 192.168.5.11.49767 > 192.168.5.254.8013: Flags [S], seq 3259069474, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 23:17:04.483850 IP 192.168.5.254.8013 > 192.168.5.11.49767: Flags [R.], seq 0, ack 3259069475, win 0, length 0 23:17:04.728112 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:04.728378 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:04.985154 IP 192.168.5.11.49767 > 192.168.5.254.8013: Flags [S], seq 3259069474, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 23:17:04.985274 IP 192.168.5.254.8013 > 192.168.5.11.49767: Flags [R.], seq 0, ack 1, win 0, length 0 23:17:05.090676 IP 192.168.5.11.49354 > 8.8.8.8.53: 14679+ A? dns.msftncsi.com. (34) 23:17:05.090676 IP 192.168.5.11.54930 > 8.8.8.8.53: 12543+ AAAA? dns.msftncsi.com. (34) 23:17:05.165840 IP 192.168.5.11.137 > 192.168.5.255.137: UDP, length 50 23:17:05.498068 IP 192.168.5.11.49767 > 192.168.5.254.8013: Flags [S], seq 3259069474, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 23:17:05.498161 IP 192.168.5.254.8013 > 192.168.5.11.49767: Flags [R.], seq 0, ack 1, win 0, length 0 23:17:05.573574 IP 192.168.5.11.49768 > 192.168.5.254.8013: Flags [S], seq 659041508, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 23:17:05.573618 IP 192.168.5.254.8013 > 192.168.5.11.49768: Flags [R.], seq 0, ack 659041509, win 0, length 0 23:17:05.724298 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:05.724613 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:05.923441 IP 192.168.5.11.137 > 192.168.5.255.137: UDP, length 50 23:17:06.075274 IP 192.168.5.11.49768 > 192.168.5.254.8013: Flags [S], seq 659041508, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 23:17:06.075336 IP 192.168.5.254.8013 > 192.168.5.11.49768: Flags [R.], seq 0, ack 1, win 0, length 0 23:17:06.576429 IP 192.168.5.11.49768 > 192.168.5.254.8013: Flags [S], seq 659041508, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 23:17:06.576515 IP 192.168.5.254.8013 > 192.168.5.11.49768: Flags [R.], seq 0, ack 1, win 0, length 0 23:17:06.626255 IP 192.168.5.12.63348 > 8.8.8.8.53: 49695+ A? dns.msftncsi.com. (34) 23:17:06.626311 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 70 23:17:06.735463 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:06.735773 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:07.048161 IP 192.168.5.12.61418 > 8.8.8.8.53: 28637+ A? go.microsoft.com. (34) 23:17:07.048254 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 70 23:17:07.093019 IP 192.168.5.11.49354 > 8.8.8.8.53: 14679+ A? dns.msftncsi.com. (34) 23:17:07.093066 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:17:07.093179 IP 192.168.5.11.54930 > 8.8.8.8.53: 12543+ AAAA? dns.msftncsi.com. (34) 23:17:07.221831 ARP, Request who-has 192.168.5.254 (70:ff:76:1d:92:c1) tell 192.168.5.12, length 46 23:17:07.221851 ARP, Reply 192.168.5.254 is-at 70:ff:76:1d:92:c1, length 28 23:17:07.725116 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:07.726312 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:08.720838 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:08.721373 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:09.727460 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:09.727694 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:09.801188 ARP, Request who-has 192.168.5.254 (70:ff:76:1d:92:c1) tell 192.168.5.11, length 46 23:17:09.801206 ARP, Reply 192.168.5.254 is-at 70:ff:76:1d:92:c1, length 28 23:17:10.643648 ARP, Request who-has 192.168.5.254 tell 192.168.5.12, length 46 23:17:10.643705 ARP, Reply 192.168.5.254 is-at 70:ff:76:1d:92:c1, length 28 23:17:10.725714 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:10.726331 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:11.056414 IP 192.168.5.12.52525 > 8.8.8.8.53: 32765+ A? officeclient.microsoft.com. (44) 23:17:11.056507 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 80 23:17:11.092954 IP 192.168.5.11.54930 > 8.8.8.8.53: 12543+ AAAA? dns.msftncsi.com. (34) 23:17:11.093000 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:17:11.092954 IP 192.168.5.11.49354 > 8.8.8.8.53: 14679+ A? dns.msftncsi.com. (34) 23:17:11.093033 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:17:11.729354 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:11.729749 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:12.057715 IP 192.168.5.12.52525 > 8.8.8.8.53: 32765+ A? officeclient.microsoft.com. (44) 23:17:12.057802 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 80 23:17:12.723758 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:12.724075 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:13.067624 IP 192.168.5.12.52525 > 8.8.8.8.53: 32765+ A? officeclient.microsoft.com. (44) 23:17:13.067713 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 80 23:17:13.735818 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:13.736247 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:14.733333 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:14.733910 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:15.076955 IP 192.168.5.12.52525 > 8.8.8.8.53: 32765+ A? officeclient.microsoft.com. (44) 23:17:15.077044 IP 192.168.5.254 > 192.168.5.12: ICMP net 8.8.8.8 unreachable, length 80 23:17:15.097513 IP 192.168.5.11.61064 > 8.8.8.8.53: 9793+ AAAA? dns.msftncsi.com. (34) 23:17:15.097553 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:17:15.127080 IP 192.168.5.11.61064 > 8.8.8.8.53: 9793+ AAAA? dns.msftncsi.com. (34) 23:17:15.127106 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70 23:17:15.733128 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:15.733814 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:16.130301 IP 192.168.5.11.61064 > 8.8.8.8.53: 9793+ AAAA? dns.msftncsi.com. (34) 23:17:16.307947 ARP, Request who-has 192.168.5.12 tell 192.168.5.254, length 28 23:17:16.308145 ARP, Reply 192.168.5.12 is-at 3c:97:0e:ce:9c:4a, length 46 23:17:16.729606 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:16.729912 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:17.728353 ARP, Request who-has 192.168.5.11 tell 192.168.5.12, length 46 23:17:17.728622 ARP, Reply 192.168.5.11 is-at 88:36:6c:fa:d9:15, length 46 23:17:18.139612 IP 192.168.5.11.61064 > 8.8.8.8.53: 9793+ AAAA? dns.msftncsi.com. (34) 23:17:18.139697 IP 192.168.5.254 > 192.168.5.11: ICMP net 8.8.8.8 unreachable, length 70
Regard,
dongseuk
Hi,
I hope the Wireshark log attached will be capture at PC1 and PC2 and ping is from PC2 to PC1.
From log it seems PC1 is sending response for ARP request sent from PC2, but bridge may not be forwarding on eth1 it seems.
Can you please capture tcpdump on eth1 when pinging from PC2 to PC1.
Also capture tcpdump on eth0 when pining from PC1 to PC2.
Best Regards,
Sudheer
HI! Sudheer
When I ping between PC1 and PC2, I collect and attach the wireshark log from PC1 and PC2, and the tcpdump log of eth1 (PC2 to PC1) and eth0 (PC1 to PC2).
Please check.
Regards,
dongseuk
Hi,
Can you please share the ALE Table dump (ethtool -t eth1) as well before and after trying the ping from PC1 to PC2 and PC2 to PC1.
If ethtool is not supported, can you refer to FAQ and provide the statistics and ALE Table.
Best Regards,
Sudheer
HI,
The above command has no value as shown below.
The ethfw log is as follows
root@j7200-evm:~# cat /sys/kernel/debug/remoteproc/remoteproc*/trae0 cat: '/sys/kernel/debug/remoteproc/remoteproc*/trae0': No such file or directory root@j7200-evm:~# cat /sys/kernel/debug/remoteproc/remoteproc*/trace0 Sciclient_boardCfgRm init Passed DM Built On: Feb 1 2023 16:37:10 Sciserver Version: v2022.01.1.0-REL.CORESDK.08.06.00.09-14-ge559a+ RM_PM_HAL Version: REL.CORESDK.08.06.00.09-7-g4da19 Starting Sciserver..... PASSED IPC_echo_test (core : mcu1_0) ..... mcu1_0 <--> mcu2_1, Ping- 10000, pong - 10000 completed ======================================================= CPSW Ethernet Firmware ======================================================= Warning: Using 6 MAC address(es) from static pool ETHFW: Shared multicasts (software fanout): 01:00:5e:00:00:01 01:00:5e:00:00:fb 01:00:5e:00:00:fc 33:33:00:00:00:01 33:33:ff:1d:92:c2 01:80:c2:00:00:00 01:80:c2:00:00:03 ETHFW: Reserved multicasts: 01:80:c2:00:00:0e 01:1b:19:00:00:00 EnetMcm: CPSW_5G on MAIN NAVSS Mdio_open: MDIO manual mode enabled PHY 16 is alive PHY 17 is alive PHY 18 is alive PHY 19 is alive EnetPhy_bindDriver: PHY 16: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 17: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 18: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK EnetPhy_bindDriver: PHY 19: OUI:0001c1 Model:27 Ver:00 <-> 'vsc8514' : OK ETHFW Version : 0.02.00 ETHFW Build Date: Jun 7, 2023 ETHFW Build Time: 19:06:49 ETHFW Commit SHA: Starting lwIP, local interface IP is dhcp-enabled Host MAC address: 70:ff:76:1d:92:c3 [LWIPIF_LWIP] Enet LLD netif initialized successfully [LWIPIF_LWIP_IC] Interface started successfully [LWIPIF_LWIP_IC] NETIF INIT SUCCESS [LWIPIF_LWIP_IC] Interface started successfully [LWIPIF_LWIP_IC] NETIF INIT SUCCESS Added interface 'br4', IP is 0.0.0.0 CpswProxyServer: Virtual port configuration: mpu_1_0 <-> Switch port 0: mpu_1_0_ethswitch-device-0 mcu_2_1 <-> Switch port 1: mcu_2_1_ethswitch-device-1 mpu_1_0 <-> MAC port 1: mpu_1_0_ethmac-device-1 mcu_2_1 <-> MAC port 4: mcu_2_1_ethmac-device-4 CpswProxyServer: initialization completed (core: mcu2_0) CpswMacPort_checkSgmiiStatus: MAC 2: SGMII link parter config port: link up: 1-Gbps Full-Duplex Cpsw_handleLinkUp: Port 2: Link up: 1-Gbps Full-Duplex REMOTE_SERVICE: Init ... !!! REMOTE_SERVICE: Init ... Done !!! Function:CpswProxyServer_attachExtHandlerCb,HostId:0,CpswType:5 Function:CpswProxyServer_attachExtHandlerCb,HostId:0,CpswType:5 Function:CpswProxyServer_registerMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:70:ff:76:1d:92:c2, FlowIdx:85, FlowIdxOffset:1 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_registerMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:70:ff:76:1d:92:c1, FlowIdx:84, FlowIdxOffset:0 Cpsw_ioctlInternal: CPSW: Registered MAC address. ALE entry:5, Policer Entry:1 Add static config for mpu1_0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:33:33:0:0:0:1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:1:0:5e:0:0:1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:33:33:ff:1d:92:c1, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:0, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:3, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:1:80:c2:0:0:e, vlanId:0, FlowIdx:84, FlowIdOffset:0 CpswProxyServer_isRsvdMcast: Reserved mcast cannot be added to filter Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:33:33:0:0:0:fb, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_setPromiscModeHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6,mode:disable Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:33:33:0:1:0:3, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_filterAddMacHandlerCb,HostId:0,Handle:a2bc88a8,CoreKey:38acb7e6, MacAddress:ff:ff:ff:ff:ff:ff, vlanId:0, FlowIdx:84, FlowIdOffset:0 Function:CpswProxyServer_regrdHandlerCb,HostId:0, RegAddr:c000000 Function:CpswProxyServer_regrdHandlerCb,HostId:0, RegAddr:c020000 Function:CpswProxyServer_clientNotifyHandlerCb,HostId:0,Handle:38acb7e6,CoreKey:a2bc88a8,NotifyId:RPMSG_KDRV_TP_ETHSWITCH_CLIENTNOTIFY_DUMPSTATS,NotifyLen 0: Vlanid: 012c, UTagged: 1ff, Mult: 1ff, UMult: 0, Member: 1ff RAW:[0 212c1ff1 ff0001ff] 1: Vlanid: 0000, UTagged: 13, Mult: 13, UMult: 13, Member: 13 RAW:[0 20000130 13013013] 2: Vlanid: 0001, UTagged: d, Mult: d, UMult: 0, Member: d RAW:[0 200100d0 0d00000d] 3: Address: 70ff761d92c3, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c3] 4: Address: 70ff761d92c2, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c2] 5: Address: 70ff761d92c1, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[0 100070ff 761d92c1] 6: Address: 000102030405, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[0 10000001 02030405] 7: Address: 333300000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10003333 00000001] 8: Address: 01005e000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000100 5e000001] 9: Address: 3333ff1d92c1, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 ff1d92c1] 10: Address: 0180c2000000, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000000] 11: Address: 0180c2000003, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000003] 12: Address: 3333000000fb, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 000000fb] 13: Address: 333300010003, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 00010003] 14: Address: ffffffffffff, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 1000ffff ffffffff] 27: Address: 3c970ece9c4a, Port: 002 Se=0 Bl=0 TOUCH=1 AGE=1 TRUNK=0 RAW:[8 d0013c97 0ece9c4a] 46: Address: 88366cfad915, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=1 TRUNK=0 RAW:[0 50008836 6cfad915] 47: Address: 000102040506, Port: 000 Se=0 Bl=0 TOUCH=1 AGE=1 TRUNK=0 RAW:[0 d12c0001 02040506] 494 Free Entries 0: POLICER_PORT, PORT_NUM: 1 ISTRUNK:0 0: POLICER_THREAD,THREAD ID:1 0: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 1: POLICER_DST_MAC,ALE Index: 5 1: POLICER_THREAD,THREAD ID:0 1: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 2: POLICER_DST_MAC,ALE Index: 6 2: POLICER_THREAD,THREAD ID:0 2: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 3: POLICER_DST_MAC,ALE Index: 9 3: POLICER_THREAD,THREAD ID:0 3: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 4: POLICER_DST_MAC,ALE Index: 12 4: POLICER_THREAD,THREAD ID:0 4: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 5: POLICER_DST_MAC,ALE Index: 13 5: POLICER_THREAD,THREAD ID:0 5: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 6: POLICER_DST_MAC,ALE Index: 14 6: POLICER_THREAD,THREAD ID:0 6: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 57 Free Entries Port 0 Statistics ----------------------------------------- External Port 0 Statistics ----------------------------------------- External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- External Port 3 Statistics ----------------------------------------- Function:CpswProxyServer_regrdHandlerCb,HostId:0, RegAddr:c000000 Function:CpswProxyServer_regrdHandlerCb,HostId:0, RegAddr:c020000 Function:CpswProxyServer_clientNotifyHandlerCb,HostId:0,Handle:38acb7e6,CoreKey:a2bc88a8,NotifyId:RPMSG_KDRV_TP_ETHSWITCH_CLIENTNOTIFY_DUMPSTATS,NotifyLen 0: Vlanid: 012c, UTagged: 1ff, Mult: 1ff, UMult: 0, Member: 1ff RAW:[0 212c1ff1 ff0001ff] 1: Vlanid: 0000, UTagged: 13, Mult: 13, UMult: 13, Member: 13 RAW:[0 20000130 13013013] 2: Vlanid: 0001, UTagged: d, Mult: d, UMult: 0, Member: d RAW:[0 200100d0 0d00000d] 3: Address: 70ff761d92c3, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c3] 4: Address: 70ff761d92c2, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c2] 5: Address: 70ff761d92c1, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[0 100070ff 761d92c1] 6: Address: 000102030405, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[0 10000001 02030405] 7: Address: 333300000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10003333 00000001] 8: Address: 01005e000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000100 5e000001] 9: Address: 3333ff1d92c1, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 ff1d92c1] 10: Address: 0180c2000000, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000000] 11: Address: 0180c2000003, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000003] 12: Address: 3333000000fb, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 000000fb] 13: Address: 333300010003, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 10003333 00010003] 14: Address: ffffffffffff, Member:00d Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[34 1000ffff ffffffff] 27: Address: 3c970ece9c4a, Port: 002 Se=0 Bl=0 TOUCH=0 AGE=1 TRUNK=0 RAW:[8 50013c97 0ece9c4a] 46: Address: 88366cfad915, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=1 TRUNK=0 RAW:[0 50008836 6cfad915] 495 Free Entries 0: POLICER_PORT, PORT_NUM: 1 ISTRUNK:0 0: POLICER_THREAD,THREAD ID:1 0: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 1: POLICER_DST_MAC,ALE Index: 5 1: POLICER_THREAD,THREAD ID:0 1: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 2: POLICER_DST_MAC,ALE Index: 6 2: POLICER_THREAD,THREAD ID:0 2: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0 3: POLICER_DST_MAC,ALE Index: 9 3: POLICER_THREAD,THREAD ID:0 3: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 4: POLICER_DST_MAC,ALE Index: 12 4: POLICER_THREAD,THREAD ID:0 4: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 5: POLICER_DST_MAC,ALE Index: 13 5: POLICER_THREAD,THREAD ID:0 5: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 6: POLICER_DST_MAC,ALE Index: 14 6: POLICER_THREAD,THREAD ID:0 6: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0 57 Free Entries Port 0 Statistics ----------------------------------------- External Port 0 Statistics ----------------------------------------- External Port 1 Statistics ----------------------------------------- External Port 2 Statistics ----------------------------------------- External Port 3 Statistics -----------------------------------------
Regards,
dongseuk
Hi,
From ALE & Policer tables it is identified as no policer rules for PC1 MAC address at CPSW5G side.
Please find the log at my side below has ALE entry with the unicast address (It has to be "88366cfad915" in your case i.e. PC1 MAC address) and corresponding policer rule to forward packets with destination MAC as above unicast then forward to A72.
Can you please try with latest patch from above FAQ in that instead of default MAC address in patch {00:01:02:03:04:05} use your PC1 MAC address (which is connected to CPSW2G).
It looks like you are using patch as is, without modifying the MAC address {00:01:02:03:04:05} with your PC1 MAC address.
Please replace MAC address mentioned in FAQ with PC1 MAC address and test again i.e. replace {00:01:02:03:04:05} with {0x88,0x36,0x6c,0xfa,0xd9,0x15} PC1 MAC address.
0: Vlanid: 012c, UTagged: 1ff, Mult: 1ff, UMult: 0, Member: 1ff RAW:[0 212c1ff1 ff0001ff]
1: Vlanid: 0000, UTagged: 13, Mult: 13, UMult: 13, Member: 13 RAW:[0 20000130 13013013]
2: Vlanid: 0001, UTagged: 1ed, Mult: 1ed, UMult: 0, Member: 1ed RAW:[0 20011ed1 ed0001ed]
3: Address: ffffffffffff, Member:1ff Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[7fc 1000ffffffffffff]
4: Address: 70ff761d92c3, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c3]
5: EtherType: 0806 RAW:[1 20000000 00000806]
6: Address: 70ff761d92c1, Port: 000 Se=1 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[1 100070ff 761d92c1]
7: Address: 70ff761d92c2, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[0 100070ff 761d92c2]
8: Address: 000102030405, Port: 000 Se=0 Bl=0 TOUCH=0 AGE=0 TRUNK=0 RAW:[0 10000001 02030405]
9: Address: 333300000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10003333 00000001]
10: Address: 01005e000001, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000100 5e000001]
11: Address: 3333ff1d92c2, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10003333 ff1d92c2]
12: Address: 0180c2000000, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000000]
13: Address: 0180c2000003, Member:001 Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[4 10000180 c2000003]
14: Address: 3333000000fb, Member:1ed Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[7b4 10003333000000fb]
15: Address: 333300010003, Member:1ed Su=0 FWDSTLVL=0 IGNMBITS=0 RAW:[7b4 1000333300010003]
1008 Free Entries
0: POLICER_DST_MAC,ALE Index: 3
0: POLICER_ETHERTYPE,ALE Index: 5
0: POLICER_THREAD,THREAD ID:4
0: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0
1: POLICER_PORT, PORT_NUM: 1 ISTRUNK:0
1: POLICER_THREAD,THREAD ID:0
1: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0
2: POLICER_DST_MAC,ALE Index: 7
2: POLICER_THREAD,THREAD ID:1
2: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0
3: POLICER_DST_MAC,ALE Index: 8
3: POLICER_THREAD,THREAD ID:1
3: POLICER_STATS: Hit: 0, RedHit: 0, YellowHit: 0
4: POLICER_DST_MAC,ALE Index: 14
4: POLICER_THREAD,THREAD ID:1
4: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0
5: POLICER_DST_MAC,ALE Index: 15
5: POLICER_THREAD,THREAD ID:1
5: POLICER_STATS: Hit: 1, RedHit: 0, YellowHit: 0
90 Free Entries
Port 0 Statistics
-----------------------------------------
rxGoodFrames = 45
rxBcastFrames = 8
rxMcastFrames = 37
aleDrop = 44
rxOctets = 7154
octetsFrames65to127 = 25
octetsFrames128to255 = 12
octetsFrames256to511 = 8
netOctets = 7154
portMaskDrop = 45
alePolicyMatch = 8
External Port 0 Statistics
-----------------------------------------