Hi all,
We are working on:
s7g2 (Custom Board)
SSP 1.7.0
e2Studio 7.8.0
API: Netx Duo.
The activities in IP Stack:
1. WebServer, (User Login)
2. TCP/IP Server (Periodical)
3. imcp (ping test for gateway link) (Periodical)
In few cases we find that the IP Tasks (mentioned above) stop working completely.
No Response to ping,
Webserver Login page does not load,
TCP/IP Server does not respond.
However other non-IP related tasks such as OLED etc are still running (Not a crash)
Any idea what can cause this?
There is no timeline as to when it occurs, 1hr, 1 day, 1 week...
I went through a lot of related threads.
One of which is very similar to my condition:
https://community.renesas.com/embedded-system-platform/synergy/f/forum/17295/ip-instance-stops-working-ssp-1-7-12
Is it because of High Traffic Network.
I hope Renesas Team can shed some light on it.
Regards,
Surojit
Hi Larry,
We are using separate pool for recieve.
We are not processing the packets directly,
I have also checked that if send fails due to NX_NOT_CONNECTED or otherwise I am releasing the packet and it works.
I am unable to pin-point the reason for depletion though.
Surojit.
// I am Sharing the code which works as a MODBUS Slave over TCP
static BOOL _FnMODBUSTCPSlave(uint16_t u16NoMBSlaveClients, BOOL bMBSlaveFirst){ BOOL bCmdBC = FALSE, bCmdValid = FALSE; ULONG ulactual_events = 0, ulMBSlaveMsg[2], utcp_bytes_received = 0, uStatus = 0,ulqueueNoOfMsg=0; UINT uiStatus = 0,uiStatusSend=0,uiMBStatusPacketRelease=0,uiIPStatusPacketRelease=0, uiStatusRetrv = 0,uiStatusRetrvLenCheck=0; //,uiStatusReles = 0; uint16_t u16MsgTransLen = 0, u16RplyMsgsizeL = 0, u16SocketCheckCtr = 0,u16TCPSendError=DEF_TCP_SLAVE_REPLY_ERROR_NONE; NX_TCP_SOCKET *socket_ptr = NULL; NX_PACKET *pMB_RX_packet_ptr = NULL; NX_PACKET *pMB_TX_packet_ptr = NULL; uint16_t u16NoUsedSoc = 0;
StructMBSlaveCmdExeParams *pMBSlaveCmdExeParams = &sMBSlaveTCPCmdExeParams; sMBSlaveTCPCmdExeParams.CmdOffset = 6; uint8_t *pMODBUSSlaveCmdRcv = sMBSlaveTCPCmdExeParams.MBReceiveFrame,u8PoolFreeCtr=0; uint8_t *pMBTranReplyFrame = sMBSlaveTCPCmdExeParams.MBReplyFrame; StructMBSlaveClientParam *pMBSlaveClientParam = NULL;
//ssp_err_t g_MBSlave_ip_io_pool_err = SSP_SUCCESS; sMODBUSSlaveOpr.bMBSlaveSts = TRUE; sLogMODBUSComm.bMODBUSPoolDepleted=FALSE; sLogMODBUSComm.bIPPoolDepleted=FALSE;
FnDIRegParamValueInit (); FnDIRainGaugeParamValueInit ();
/* Start listening on the first available socket */ FnSetMBSlaveStartSocketListen (); tx_timer_activate (&Timer_MBSlaveClientStatusCheck);
while ((uiStatus = tx_event_flags_get (&EvDevInConfig, EV_FLAG_DEVICE_IN_CONFIG, TX_AND, &ulactual_events, TX_NO_WAIT)) == TX_NO_EVENTS) { uiStatus=tx_queue_info_get(&QMBSlave,NULL,&ulqueueNoOfMsg,NULL,NULL,NULL,NULL); uiStatus = tx_queue_receive (&QMBSlave, ulMBSlaveMsg, TX_NO_WAIT); if (TX_SUCCESS == uiStatus) { // MBSlave message received . process the same socket_ptr = (NX_TCP_SOCKET*) ulMBSlaveMsg[0]; pMB_RX_packet_ptr = (NX_PACKET*) ulMBSlaveMsg[1]; if (socket_ptr != NULL && pMB_RX_packet_ptr != NULL) { pMBSlaveClientParam = _FnMBSlaveFindClient (socket_ptr); if (pMBSlaveClientParam != NULL) { pMBSlaveClientParam->u16MBSlaveClientInactiveTime=0; utcp_bytes_received = 0; //Check Rcv Msg Length uiStatusRetrvLenCheck = nx_packet_length_get(pMB_RX_packet_ptr,&utcp_bytes_received); if(uiStatusRetrvLenCheck==NX_SUCCESS && utcp_bytes_received<MAX_MODBUS_SLAVE_MESSAGE_RCV_LEN) { //Length is within limit uiStatusRetrv = nx_packet_data_retrieve (pMB_RX_packet_ptr, pMODBUSSlaveCmdRcv, &utcp_bytes_received); } else { //Cannot retrieve. utcp_bytes_received=0; } uiIPStatusPacketRelease=nx_packet_release(pMB_RX_packet_ptr); u16MsgTransLen = 0; bCmdValid = FALSE; //Get Client Socket Status. nx_tcp_socket_info_get (&pMBSlaveClientParam->NX_TCPServerClientSocket, 0, 0, 0, 0, 0, 0, 0, &uStatus, 0, 0, 0); if ((NX_TCP_ESTABLISHED == uStatus || NX_TCP_SYN_RECEIVED == uStatus) && (uiStatusRetrv == TX_SUCCESS && utcp_bytes_received > 0)) { //Command Recvd Process the same.. if (_FnMODBUSTCPSlaveValidateCmd (pMODBUSSlaveCmdRcv, utcp_bytes_received)) { bCmdValid = TRUE; pMBSlaveCmdExeParams->MBSlaveAddr = pMODBUSSlaveCmdRcv[6]; //MB Slave address bCmdBC = FALSE; if (pMBSlaveCmdExeParams->MBSlaveAddr == 0) { bCmdBC = TRUE; } pMBSlaveCmdExeParams->RcvMBSlaveCmd = pMODBUSSlaveCmdRcv[7]; //Reset MODBUSReplySend to FALSE pMBSlaveCmdExeParams->bMODBUSReplySend = FALSE; pMBSlaveCmdExeParams->bIllegalAddr = FALSE; //Parse the message and get its response. FnMBSlaveComdExe (pMBSlaveCmdExeParams, bCmdBC); if (pMBSlaveCmdExeParams->bIllegalAddr == TRUE) { //Create message for illegal address. FnMBSlaveExcepResp (DEF_MB_ILLEGAL_DATA_ADDRESS, pMBSlaveCmdExeParams); } if (pMBSlaveCmdExeParams->bMODBUSReplySend) { u16RplyMsgsizeL = pMBSlaveCmdExeParams->RplyMsgsize; pMBTranReplyFrame[0] = pMODBUSSlaveCmdRcv[0]; //???? Cast using uchar or make both uint8_t pMBTranReplyFrame[1] = pMODBUSSlaveCmdRcv[1]; pMBTranReplyFrame[2] = pMODBUSSlaveCmdRcv[2]; pMBTranReplyFrame[3] = pMODBUSSlaveCmdRcv[3]; pMBTranReplyFrame[4] = (uint8_t) ((u16RplyMsgsizeL) >> 8); pMBTranReplyFrame[5] = (uint8_t) ((u16RplyMsgsizeL) & 0x00FF);
u16MsgTransLen = (uint16_t) (pMBSlaveCmdExeParams->RplyMsgsize + 6); u8PoolFreeCtr = 0;
do { // Set Send Timeout Option Place data in the packet. uiStatus = nx_packet_allocate (&g_MBSlave_ip_io_pool, &pMB_TX_packet_ptr, NX_TCP_PACKET, 100);// uiStatus = nx_packet_allocate (&g_packet_pool1, &pMB_TX_packet_ptr,// NX_TCP_PACKET,// 100);
if (uiStatus == NX_SUCCESS) { break; } u8PoolFreeCtr++; tx_thread_sleep (100); } while (uiStatus != NX_SUCCESS && u8PoolFreeCtr < DEF_POOL_FREE_CHECK_COUNT_NO);
u16TCPSendError = 0; if (uiStatus == NX_SUCCESS) { sLogMODBUSComm.bMODBUSPoolDepleted=FALSE;
uiStatus = nx_packet_data_append (pMB_TX_packet_ptr, pMBTranReplyFrame, (ULONG) (u16MsgTransLen), &g_MBSlave_ip_io_pool, //TODO: Discuss with Sir. NX_NO_WAIT); if (uiStatus == NX_SUCCESS) {// // Check IP 0 pool status// nx_packet_pool_info_get (&g_packet_pool1, NULL/*Total Packets*/, &ulfree_packets,NULL,// NULL /*empty_pool_suspensions*/,// NULL/*&psMODBUSCommLog->ulinvalid_packet_releases //invalid_packet_releases*/);
uiStatusSend = nx_tcp_socket_send(socket_ptr, pMB_TX_packet_ptr, 100); if (uiStatusSend != NX_SUCCESS) { gulSendFailCtr++; uiMBStatusPacketRelease = nx_packet_release(pMB_TX_packet_ptr); if (uiMBStatusPacketRelease != NX_SUCCESS) { gulMBPacketReleaseFailCtr++; u16TCPSendError = DEF_TCP_SLAVE_REPLY_ERROR_POOL_RELEASE_FAIL_SEND; } else { u16TCPSendError = DEF_TCP_SLAVE_REPLY_ERROR_SEND_FAIL; } } } else {
uiMBStatusPacketRelease = nx_packet_release(pMB_TX_packet_ptr); if (uiMBStatusPacketRelease != NX_SUCCESS) { gulMBPacketReleaseFailCtr++; u16TCPSendError = DEF_TCP_SLAVE_REPLY_ERROR_POOL_RELEASE_FAIL_APPEND; } else { u16TCPSendError = DEF_TCP_SLAVE_REPLY_ERROR_APPEND_FAIL; } } } else if(!sLogMODBUSComm.bMODBUSPoolDepleted) { sLogMODBUSComm.bMODBUSPoolDepleted=TRUE; FnAddFaultLog (DEF_FAULT_MBSLAVE_TRANS_POOL_DEPLETE); //Re-Start the Device. tx_event_flags_set (&EvDevInConfig, EV_FLAG_DEVICE_RESTART_CMD, TX_OR); }
}
if (sLogMODBUSComm.bMODBUSTCPSlaveLog) { FnMODBUSCommMonLog (pMBSlaveClientParam->u16MBSlaveClientID, pMODBUSSlaveCmdRcv, utcp_bytes_received, pMBTranReplyFrame, u16MsgTransLen, bCmdValid, u16NoUsedSoc, u16TCPSendError, uiStatusSend,sLogMODBUSComm.bMODBUSPoolDepleted,en_COMM_OK_RESP_VALID,ulqueueNoOfMsg); }
} else if (sLogMODBUSComm.bMODBUSTCPSlaveLog) { FnMODBUSCommMonLog (pMBSlaveClientParam->u16MBSlaveClientID, pMODBUSSlaveCmdRcv, utcp_bytes_received, pMBTranReplyFrame, 0, FALSE, u16NoUsedSoc, DEF_TCP_SLAVE_REPLY_ERROR_SOCKET_NOT_AVAILABLE, 0,sLogMODBUSComm.bMODBUSPoolDepleted,en_COMM_FAIL,0); } } else { uiIPStatusPacketRelease=nx_packet_release(pMB_RX_packet_ptr); } } else if (pMB_RX_packet_ptr != NULL) { uiIPStatusPacketRelease=nx_packet_release(pMB_RX_packet_ptr); } if(uiIPStatusPacketRelease!=NX_SUCCESS) { gulIPPacketReleaseFailCtr++; } } tx_thread_sleep (6);//(10); //Check Client Socket Status //Uncomment Later 29.06.2022 u16SocketCheckCtr++; if (u16SocketCheckCtr >= DEF_SOCKET_MON_TIME_SEC) { u16SocketCheckCtr = 0; if ((tx_event_flags_get (&EvMBSlaveClientStatusCheck, EV_FLAG_TIMER_MBSLAVE_CLIENT_STATUS_CHECK, TX_AND_CLEAR, &ulactual_events, TX_NO_WAIT)) == TX_SUCCESS) { u16NoUsedSoc = FnMBSlaveTCPClientSocketStatusCheck (); } } } sMODBUSSlaveOpr.bMBSlaveSts = FALSE; tx_timer_deactivate (&Timer_MBSlaveClientStatusCheck); SSP_PARAMETER_NOT_USED(u16NoMBSlaveClients); bMBSlaveFirst = FALSE; return bMBSlaveFirst;}
Hi Surojit,we have this problems because of erroneous Frames receiving by the ETHERC. We detect these erroneous Frames with the INFABT flag in the SYNFP Status Register and then reset the EDMAC, ETHERC and EPTPC. So we keep running NetX. Regards,Josh
Hello Josh
Can you please elaborate on this with code being used by you.
Hi Josh,
Thank you for your reply.
Can you share a code snippet which we can follow
Hi Surojit. Is there any progress on this? Let us know. Regards,Jayesh Renesas Engineering Community Moderatorshttps://community.renesas.com/https://academy.renesas.com/en-support.renesas.com/.../
Hi Jayesh,
We are still looking for a solution.
Please let us know if there is any development regarding this issue
Hi Surojit,sry for the late response... The attached project has a network monitor thread, that waits for an event flag to be set by the PTP MINT interrupt callback, it unitialises the Ethernet link in the NetX IP instance, then it performs the reset of the EDMAC, ETHERC and EPTPC and re-initialises the ethernet link for the NextX DUO IP interface.Best regards,Josh
SSP_2_4_0_PK_S5D9_Ethernet_INFABT_PTP_Reset_HW.zip
Thank You for this lead,
I will work on it shortly and get back to you with my results.