[f-nsp] Layer 2 packet forwarded in hardware(PP)

Franz Georg Köhler lists at openunix.de
Fri Sep 14 04:50:28 EDT 2018


On Do, Sep 13, 2018 at 08:23:06 -0600, Eldon Koyle <ekoyle+puck.nether.net at gmail.com> wrote:
> Have you tried running dm pstat?  It can sometimes help identify the type
> of traffic causing issues.  First run is a throwaway, it shows counts since
> the previous run.

Thank you, Eldon.
I think this is a hint into the right direction, it looks like a lot of
mac learning is taking place:

MODULE 2
----------

Total Packets Received:                  8696

MPLS uplink packets received:            0
    VPLS packets received:               0
    VLL packets received:                0
    L3 VPN packets received:             0
    Other MPLS packets received:         0

ARP packets received:                    2139
    ARP request packets received:        2107
    ARP response packets received:       2107

IPV4 packets received:                   234
    IPv4 unicast packets routed:         0
    IPv4 protocol packets received:      121
    GRE tunnel packets received:         0
    6to4 tunnel packets received:        0

IPV6 packets received:                   56
    IPv6 unicast packets routed:         0
    IPv6 protocol packets received:      29                       
                                                                  
IPv4 multicast packets routed:           0                        
IPv6 multicast packets routed:           0                        
                                                                  
L2VPN endpoint packets received:         0                        
    VPLS endpoint packets received:      0                        
    VLL endpoint packets received:       0                        
    Local-VLL endpoint packets received: 0                        
                                                                  
L2 packets received:                     7705                     
    L2 known unicast packets forwarded:  0                        
    L2 unknown unicast packets flooded:  1002                     
    L2 broadcast Packets flooded:        2147                     
    L2 multicast Packets flooded:        129                      
    Packets received for SA learning:    4721                     
                                                                  
Other packets received:                  0                        
                                                                  
Total Packets dropped:                   4937                     
                                                                  
                                                                  
Packet drop causes:                                               
         1 ( 0-Unknown cause)                                     
      4179 ( 1-Layer 2 packet forwarded in hardware(PP))          
       669 ( 9-Packet received for SFLOW sampling(PP))            
        13 (45-IP TTL too small(PE))                              
         5 (53-IPv4 protocol drop(PFE))                           
        37 (54-IP no route(PFE))                                  
        17 (56-Layer 3 invalid FID(PFE))                          
        14 (57-Ipv6 protocol drop(PFE))                           
         2 (67-DA learned on source port(OD))                     
                                                                  
ARP packets captured for DAI:            2139                     
ARP packets failed DAI:                  0  

Debugging says a lot of those lines:

# debug mac learning vlan 3595  
        learning:  debugging is on
Sep 14 10:09:25.761 info - macmgr_ipc_learn_da_entry. Learn DA 000c.2939.c197 IPC received
Sep 14 10:09:25.761 info - macmgr_ipc_learn_da_entry. Learn DA 000c.2939.c197 IPC received
Sep 14 10:09:25.761 info - macmgr_ipc_learn_da_entry. Learn DA 000c.2939.c197 IPC received
Sep 14 10:09:25.761 info - macmgr_ipc_learn_da_entry. Learn DA 000c.2939.c197 IPC received

However, we do not know that mac:

#sh mac-address 000c.2939.c197
Total active entries from all ports = 3089
Type Code - ST:Static SEC:Secure 1x:Dot1x NA: NotAvail A:Allow D:Deny
CCL: Cluster Client Local CCR:Cluster Client Remote CL:Local CR:Remote

It looks like the system cannot learn the DA 000c 2939 c197:

[ppcr_rx_packet]: Packet received
Time stamp : 31 day(s) 18h 37m 42s:,
TM Header: [ 00be 0196 0013 ]
Type: Fabric Unicast(0x00000000) Size: 190 Class: 0 Src sys port: 406
Dest Port: 0  Drop Prec: 0 Ing Q Sig: 1 Out mirr dis: 0x0 Excl src: 1 Sys mc: 1
**********************************************************************
Packet size: 182, XPP reason code: 0x00000000
00: a054 2003 3850 0e0b-0020 008a 0000 0000  FID     = 0xa054
10: 000c 2939 c197 000c-29f5 951b 0800 4500  Offset  = 0x10
20: 0306 b617 4000 4011-5981 0a0a 0a1b 0a0a  VLAN    = 3595(0x0e0b)
30: 0a20 eb71 08af 02f2-b549 7b22 5365 7665  CAM     = 0x100045(R)
40: 7269 7479 2220 3a20-2269 6e66 6f22 2c22  SFLOW   = 0
50: 5461 6722 203a 2022-5c75 3030 3533 5c75  DBL TAG = 0
60: 3030 3635 5c75 3030-3732 5c75 3030 3736
70: 5c75 3030 3635 5c75-3030 3732 222c 2253
Pri CPU MON SRC   PType US BRD DAV SAV DPV SV ER TXA SAS Tag MVID
0   1   0   1/1   3     0  0   1   1   1   0  0  0   0   1   0

10.10.10.27 -> 10.10.10.32 UDP [60273 -> 2223] 
**********************************************************************
[ppcr_tx_packet] ACTION: Drop packet(reason: Layer 2 packet forwarded in hardware(PP))

I have know set "unknown-unicast-mac-entry" in the VLAN configuration
and this caused LP CPU to drop back to normal values because those
packets are not hitting the CPU any more. From the manual:
∙ Using the unknown-unicast-mac-entry command will forward Layer 2
unknown unicast traffic without going to the CPU.

The unknown-unicast-mac-entry command must be configured with the
vlan-cpu-protection command, as shown in the example above.


I guess the mac address in question is not in use and traffic towards
that address gets always flooded across the network.
Message "Layer 2 packet forwarded in hardware(PP)" still sounds a bit
bizarre to me. Maybe this means that packet is being forwarded in
hardware after it has been processed by CPU for learning?




Best regards,

Franz Georg


More information about the foundry-nsp mailing list