Hello,

For what it’s worth, I observed ~10ms memif pings when both VPPs were scheduled 
on the same CPU, which happens with the default configuration (VPP takes CPU 1 
by default). You can try changing the configuration of one of your VPPs by 
setting the main-core in the cpu section: 
https://fd.io/docs/vpp/master/gettingstarted/users/configuring/startup.html 
<https://fd.io/docs/vpp/master/gettingstarted/users/configuring/startup.html> 

Cheers,
Aloÿs

> On 12 Mar 2020, at 14:30, vyshakh krishnan <vysh...@rtbrick.com> wrote:
> 
> Hi Damjan,
> 
> Please find the trace on both side
> 
> vpp1 (10.1.1.1) ---- (10.1.1.2) vpp2
> 
> DBGvpp# ping 10.1.1.2
> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=1 ttl=64 time=31.8174 ms
> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=2 ttl=64 time=47.9716 ms
> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=3 ttl=64 time=40.0259 ms
> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=4 ttl=64 time=19.9210 ms
> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=5 ttl=64 time=39.9568 ms
> 
> Statistics: 5 sent, 5 received, 0% packet loss
> 
> 
> VPP1:
> ******
> 
> Packet 3
> 
> 01:35:02:872114: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:02:872132: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:02:872142: ip4-input
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x36e4
>     fragment id 0x2db5
>   ICMP echo_reply checksum 0xf86f
> 01:35:02:872153: ip4-lookup
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x36e4
>     fragment id 0x2db5
>   ICMP echo_reply checksum 0xf86f
> 01:35:02:872206: ip4-local
>     ICMP: 10.1.1.2 -> 10.1.1.1
>       tos 0x00, ttl 64, length 96, checksum 0x36e4
>       fragment id 0x2db5
>     ICMP echo_reply checksum 0xf86f
> 01:35:02:872215: ip4-icmp-input
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x36e4
>     fragment id 0x2db5
>   ICMP echo_reply checksum 0xf86f
> 01:35:02:872224: ip4-icmp-echo-reply
>   ICMP4 echo id 50293 seq 1 send to cli node 620
> 
> Packet 4
> 
> 01:35:02:872114: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:02:872132: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   ARP: 02:dc:5c:30:00:00 -> ff:ff:ff:ff:ff:ff
> 01:35:02:872150: arp-input
>   request, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.2 <http://10.1.1.2/> -> 00:00:00:00:00:00/10.1.1.1 
> <http://10.1.1.1/>
> 01:35:02:872163: arp-reply
>   request, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.2 <http://10.1.1.2/> -> 00:00:00:00:00:00/10.1.1.1 
> <http://10.1.1.1/>
> 01:35:02:872219: memif11/11-output
>   memif11/11 l2_hdr_offset_valid l3_hdr_offset_valid 
>   ARP: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 
> Packet 5
> 
> 01:35:03:136170: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:03:136186: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP6: 02:dc:5c:30:00:00 -> 33:33:00:00:00:01
> 01:35:03:136195: ip6-input
>   ICMP6: fe80::dc:5cff:fe30:0 -> ff02::1
>     tos 0x00, flow label 0x0, hop limit 255, payload length 32
>   ICMP router_advertisement checksum 0x57bf
> 01:35:03:136201: ip6-mfib-forward-lookup
>   fib 0 entry 4
> 01:35:03:136209: ip6-mfib-forward-rpf
>   entry 4 itf 1 flags Accept,
> 01:35:03:136212: ip6-replicate
>   replicate: 2 via [@1]: dpo-receive
> 01:35:03:136217: ip6-local
>     ICMP6: fe80::dc:5cff:fe30:0 -> ff02::1
>       tos 0x00, flow label 0x0, hop limit 255, payload length 32
>     ICMP router_advertisement checksum 0x57bf
> 01:35:03:136225: ip6-icmp-input
>   ICMP6: fe80::dc:5cff:fe30:0 -> ff02::1
>     tos 0x00, flow label 0x0, hop limit 255, payload length 32
>   ICMP router_advertisement checksum 0x57bf
> 01:35:03:136228: icmp6-router-advertisement
>   ICMP6: fe80::dc:5cff:fe30:0 -> ff02::1
>     tos 0x00, flow label 0x0, hop limit 255, payload length 32
>   ICMP router_advertisement checksum 0x57bf
> 01:35:03:136237: ip6-drop
>     ICMP6: fe80::dc:5cff:fe30:0 -> ff02::1
>       tos 0x00, flow label 0x0, hop limit 255, payload length 32
>     ICMP router_advertisement checksum 0x57bf
> 01:35:03:136242: error-drop
>   rx:memif11/11
> 01:35:03:136246: drop
>   ip6-icmp-input: valid packets
> 
> Packet 6
> 
> 01:35:03:860055: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:03:880103: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:03:880114: ip4-input
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xb43f
>     fragment id 0xb059
>   ICMP echo_reply checksum 0x3092
> 01:35:03:880124: ip4-lookup
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xb43f
>     fragment id 0xb059
>   ICMP echo_reply checksum 0x3092
> 01:35:03:880178: ip4-local
>     ICMP: 10.1.1.2 -> 10.1.1.1
>       tos 0x00, ttl 64, length 96, checksum 0xb43f
>       fragment id 0xb059
>     ICMP echo_reply checksum 0x3092
> 01:35:03:880185: ip4-icmp-input
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xb43f
>     fragment id 0xb059
>   ICMP echo_reply checksum 0x3092
> 01:35:03:880192: ip4-icmp-echo-reply
>   ICMP4 echo id 50293 seq 2 send to cli node 620
> 
> Packet 7
> 
> 01:35:03:860055: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:03:880103: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   ARP: 02:dc:5c:30:00:00 -> ff:ff:ff:ff:ff:ff
> 01:35:03:880120: arp-input
>   request, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.2 <http://10.1.1.2/> -> 00:00:00:00:00:00/10.1.1.1 
> <http://10.1.1.1/>
> 01:35:03:880130: arp-reply
>   request, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.2 <http://10.1.1.2/> -> 00:00:00:00:00:00/10.1.1.1 
> <http://10.1.1.1/>
> 01:35:03:880187: memif11/11-output
>   memif11/11 l2_hdr_offset_valid l3_hdr_offset_valid 
>   ARP: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 
> Packet 8
> 
> 01:35:04:877964: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:04:877984: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:04:877995: ip4-input
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xc71b
>     fragment id 0x9d7d
>   ICMP echo_reply checksum 0x6684
> 01:35:04:878002: ip4-lookup
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xc71b
>     fragment id 0x9d7d
>   ICMP echo_reply checksum 0x6684
> 01:35:04:878011: ip4-local
>     ICMP: 10.1.1.2 -> 10.1.1.1
>       tos 0x00, ttl 64, length 96, checksum 0xc71b
>       fragment id 0x9d7d
>     ICMP echo_reply checksum 0x6684
> 01:35:04:878015: ip4-icmp-input
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xc71b
>     fragment id 0x9d7d
>   ICMP echo_reply checksum 0x6684
> 01:35:04:878018: ip4-icmp-echo-reply
>   ICMP4 echo id 50293 seq 3 send to cli node 620
> 
> Packet 9
> 
> 01:35:04:896207: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:04:896223: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   ARP: 02:dc:5c:30:00:00 -> ff:ff:ff:ff:ff:ff
> 01:35:04:896233: arp-input
>   request, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.2 <http://10.1.1.2/> -> 00:00:00:00:00:00/10.1.1.1 
> <http://10.1.1.1/>
> 01:35:04:896239: arp-reply
>   request, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.2 <http://10.1.1.2/> -> 00:00:00:00:00:00/10.1.1.1 
> <http://10.1.1.1/>
> 01:35:04:896341: memif11/11-output
>   memif11/11 l2_hdr_offset_valid l3_hdr_offset_valid 
>   ARP: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 
> Packet 10
> 
> 01:35:05:912057: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:05:912086: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   ARP: 02:dc:5c:30:00:00 -> ff:ff:ff:ff:ff:ff
> 01:35:05:912104: arp-input
>   request, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.2 <http://10.1.1.2/> -> 00:00:00:00:00:00/10.1.1.1 
> <http://10.1.1.1/>
> 01:35:05:912120: arp-reply
>   request, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.2 <http://10.1.1.2/> -> 00:00:00:00:00:00/10.1.1.1 
> <http://10.1.1.1/>
> 01:35:05:912201: memif11/11-output
>   memif11/11 l2_hdr_offset_valid l3_hdr_offset_valid 
>   ARP: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 
> Packet 11
> 
> 01:35:05:912057: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:05:912086: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:05:912112: ip4-input
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x2efb
>     fragment id 0x359e
>   ICMP echo_reply checksum 0x9f5d
> 01:35:05:912181: ip4-lookup
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x2efb
>     fragment id 0x359e
>   ICMP echo_reply checksum 0x9f5d
> 01:35:05:912196: ip4-local
>     ICMP: 10.1.1.2 -> 10.1.1.1
>       tos 0x00, ttl 64, length 96, checksum 0x2efb
>       fragment id 0x359e
>     ICMP echo_reply checksum 0x9f5d
> 01:35:05:912209: ip4-icmp-input
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x2efb
>     fragment id 0x359e
>   ICMP echo_reply checksum 0x9f5d
> 01:35:05:912218: ip4-icmp-echo-reply
>   ICMP4 echo id 50293 seq 4 send to cli node 620
> 
> 
> 
> VPP2:
> *******
> 
> Packet 14
> 
> 01:35:02:546138: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:02:566721: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:02:566740: ip4-input
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0xf06f
> 01:35:02:566751: ip4-lookup
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0xf06f
> 01:35:02:566767: ip4-local
>     ICMP: 10.1.1.1 -> 10.1.1.2
>       tos 0x00, ttl 255, length 96, checksum 0xa598
>       fragment id 0x0000
>     ICMP echo_request checksum 0xf06f
> 01:35:02:566774: ip4-icmp-input
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0xf06f
> 01:35:02:566778: ip4-icmp-echo-request
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0xf06f
> 01:35:02:566784: ip4-load-balance
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x36e4
>     fragment id 0x2db5
>   ICMP echo_reply checksum 0xf86f
> 01:35:02:566787: ip4-rewrite
>   tx_sw_if_index 1 dpo-idx 8 : ipv4 via 10.1.1.1 memif11/11: mtu:1500 
> 02dc5c30000002dc5c3000000800 flow hash: 0x00000000
>   00000000: 02dc5c30000002dc5c3000000800450000602db50000400136e40a0101020a01
>   00000020: 01010000f86fc4750001301fb34af627000000010203040506070809
> 01:35:02:566792: memif11/11-output
>   memif11/11 l2_hdr_offset_valid l3_hdr_offset_valid 
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x36e4
>     fragment id 0x2db5
>   ICMP echo_reply checksum 0xf86f
> 
> Packet 15
> 
> 01:35:02:574138: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:02:586875: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   ARP: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:02:586911: arp-input
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 01:35:02:586921: arp-reply
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 01:35:02:587026: error-drop
>   rx:memif11/11
> 01:35:02:587037: drop
>   null-node: blackholed packets
> 
> Packet 16
> 
> 01:35:02:574138: memif-input
>   memif: hw_if_index 2 next-index 4
>     slot: ring 0
> 01:35:02:586911: arp-input
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:40/20.1.1.1 <http://20.1.1.1/> -> 02:dc:5c:30:00:40/20.1.1.2 
> <http://20.1.1.2/>
> 01:35:02:586921: arp-reply
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:40/20.1.1.1 <http://20.1.1.1/> -> 02:dc:5c:30:00:40/20.1.1.2 
> <http://20.1.1.2/>
> 01:35:02:587026: error-drop
>   rx:memif222/222
> 01:35:02:587037: drop
>   null-node: blackholed packets
> 
> Packet 17
> 
> 01:35:03:550132: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:03:570202: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:03:570212: ip4-input
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x2892
> 01:35:03:570218: ip4-lookup
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x2892
> 01:35:03:570227: ip4-local
>     ICMP: 10.1.1.1 -> 10.1.1.2
>       tos 0x00, ttl 255, length 96, checksum 0xa598
>       fragment id 0x0000
>     ICMP echo_request checksum 0x2892
> 01:35:03:570231: ip4-icmp-input
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x2892
> 01:35:03:570233: ip4-icmp-echo-request
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x2892
> 01:35:03:570237: ip4-load-balance
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xb43f
>     fragment id 0xb059
>   ICMP echo_reply checksum 0x3092
> 01:35:03:570239: ip4-rewrite
>   tx_sw_if_index 1 dpo-idx 8 : ipv4 via 10.1.1.1 memif11/11: mtu:1500 
> 02dc5c30000002dc5c3000000800 flow hash: 0x00000000
>   00000000: 02dc5c30000002dc5c300000080045000060b05900004001b43f0a0101020a01
>   00000020: 010100003092c4750002ea6cc0d9f627000000010203040506070809
> 01:35:03:570242: memif11/11-output
>   memif11/11 l2_hdr_offset_valid l3_hdr_offset_valid 
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xb43f
>     fragment id 0xb059
>   ICMP echo_reply checksum 0x3092
> 
> Packet 18
> 
> 01:35:03:582132: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:03:602210: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   ARP: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:03:602229: arp-input
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 01:35:03:602236: arp-reply
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 01:35:03:602297: error-drop
>   rx:memif11/11
> 01:35:03:602302: drop
>   null-node: blackholed packets
> 
> Packet 19
> 
> 01:35:03:582132: memif-input
>   memif: hw_if_index 2 next-index 4
>     slot: ring 0
> 01:35:03:602229: arp-input
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:40/20.1.1.1 <http://20.1.1.1/> -> 02:dc:5c:30:00:40/20.1.1.2 
> <http://20.1.1.2/>
> 01:35:03:602236: arp-reply
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:40/20.1.1.1 <http://20.1.1.1/> -> 02:dc:5c:30:00:40/20.1.1.2 
> <http://20.1.1.2/>
> 01:35:03:602297: error-drop
>   rx:memif222/222
> 01:35:03:602302: drop
>   null-node: blackholed packets
> 
> Packet 20
> 
> 01:35:04:559990: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:04:560005: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:04:560013: ip4-input
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x5e84
> 01:35:04:560019: ip4-lookup
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x5e84
> 01:35:04:560026: ip4-local
>     ICMP: 10.1.1.1 -> 10.1.1.2
>       tos 0x00, ttl 255, length 96, checksum 0xa598
>       fragment id 0x0000
>     ICMP echo_request checksum 0x5e84
> 01:35:04:560030: ip4-icmp-input
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x5e84
> 01:35:04:560032: ip4-icmp-echo-request
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x5e84
> 01:35:04:560036: ip4-load-balance
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xc71b
>     fragment id 0x9d7d
>   ICMP echo_reply checksum 0x6684
> 01:35:04:560037: ip4-rewrite
>   tx_sw_if_index 1 dpo-idx 8 : ipv4 via 10.1.1.1 memif11/11: mtu:1500 
> 02dc5c30000002dc5c3000000800 flow hash: 0x00000000
>   00000000: 02dc5c30000002dc5c3000000800450000609d7d00004001c71b0a0101020a01
>   00000020: 010100006684c4750003a6eacd68f727000000010203040506070809
> 01:35:04:560040: memif11/11-output
>   memif11/11 l2_hdr_offset_valid l3_hdr_offset_valid 
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0xc71b
>     fragment id 0x9d7d
>   ICMP echo_reply checksum 0x6684
> 
> Packet 21
> 
> 01:35:04:618290: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:04:618327: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   ARP: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:04:618347: arp-input
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 01:35:04:618354: arp-reply
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:00/10.1.1.1 <http://10.1.1.1/> -> 02:dc:5c:30:00:00/10.1.1.2 
> <http://10.1.1.2/>
> 01:35:04:618402: error-drop
>   rx:memif11/11
> 01:35:04:618409: drop
>   null-node: blackholed packets
> 
> Packet 22
> 
> 01:35:04:618290: memif-input
>   memif: hw_if_index 2 next-index 4
>     slot: ring 0
> 01:35:04:618347: arp-input
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:40/20.1.1.1 <http://20.1.1.1/> -> 02:dc:5c:30:00:40/20.1.1.2 
> <http://20.1.1.2/>
> 01:35:04:618354: arp-reply
>   reply, type ethernet/IP4, address size 6/4
>   02:dc:5c:30:00:40/20.1.1.1 <http://20.1.1.1/> -> 02:dc:5c:30:00:40/20.1.1.2 
> <http://20.1.1.2/>
> 01:35:04:618402: error-drop
>   rx:memif222/222
> 01:35:04:618409: drop
>   null-node: blackholed packets
> 
> Packet 23
> 
> 01:35:05:594891: memif-input
>   memif: hw_if_index 1 next-index 4
>     slot: ring 0
> 01:35:05:594915: ethernet-input
>   frame: flags 0x1, hw-if-index 1, sw-if-index 1
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
> 01:35:05:594935: ip4-input
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x975d
> 01:35:05:594941: ip4-lookup
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x975d
> 01:35:05:594948: ip4-local
>     ICMP: 10.1.1.1 -> 10.1.1.2
>       tos 0x00, ttl 255, length 96, checksum 0xa598
>       fragment id 0x0000
>     ICMP echo_request checksum 0x975d
> 01:35:05:594953: ip4-icmp-input
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x975d
> 01:35:05:594955: ip4-icmp-echo-request
>   ICMP: 10.1.1.1 -> 10.1.1.2
>     tos 0x00, ttl 255, length 96, checksum 0xa598
>     fragment id 0x0000
>   ICMP echo_request checksum 0x975d
> 01:35:05:594958: ip4-load-balance
>   fib 0 dpo-idx 8 flow hash: 0x00000000
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x2efb
>     fragment id 0x359e
>   ICMP echo_reply checksum 0x9f5d
> 01:35:05:594960: ip4-rewrite
>   tx_sw_if_index 1 dpo-idx 8 : ipv4 via 10.1.1.1 memif11/11: mtu:1500 
> 02dc5c30000002dc5c3000000800 flow hash: 0x00000000
>   00000000: 02dc5c30000002dc5c300000080045000060359e000040012efb0a0101020a01
>   00000020: 010100009f5dc47500043a7e00fbf727000000010203040506070809
> 01:35:05:594962: memif11/11-output
>   memif11/11 l2_hdr_offset_valid l3_hdr_offset_valid 
>   IP4: 02:dc:5c:30:00:00 -> 02:dc:5c:30:00:00
>   ICMP: 10.1.1.2 -> 10.1.1.1
>     tos 0x00, ttl 64, length 96, checksum 0x2efb
>     fragment id 0x359e
>   ICMP echo_reply checksum 0x9f5d
> 
> 
> 
> On Thu, Mar 12, 2020 at 3:49 PM Damjan Marion <dmar...@me.com 
> <mailto:dmar...@me.com>> wrote:
> 
> That’s weird…. Can you capture packet trace on both sides?
> 
> 
>> On 12 Mar 2020, at 11:16, vyshakh krishnan <vysh...@rtbrick.com 
>> <mailto:vysh...@rtbrick.com>> wrote:
>> 
>> Hi Damjan,
>> 
>> We don't have any worker threads and memif is in polling mode:
>> 
>> DBGvpp# sh int rx-placement
>> Thread 0 (vpp_main):
>>   node memif-input:
>>     memif11/11 queue 0 (polling)
>>     memif222/222 queue 0 (polling)
>> 
>> Thanks
>> Vyshakh
>> 
>> On Wed, Mar 11, 2020 at 9:03 PM Damjan Marion <dmar...@me.com 
>> <mailto:dmar...@me.com>> wrote:
>> 
>> Are you running VPP with worker threads and using interrupt mode in memif?
>> 
>> can you capture “sh int rx-placement” on both sides?
>> 
>> — 
>> Damjan
>> 
>>> On 11 Mar 2020, at 15:44, vyshakh krishnan <vysh...@rtbrick.com 
>>> <mailto:vysh...@rtbrick.com>> wrote:
>>> 
>>> Hi All,
>>> 
>>> When we try to ping back to back connected memif interface, its taking 
>>> around 20 milli secs:
>>> 
>>> vpp1 (10.1.1.1) ---- (10.1.1.2) vpp2
>>> 
>>> DBGvpp#  ping 10.1.1.2
>>> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=1 ttl=64 time=15.1229 
>>> ms
>>> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=2 ttl=64 time=20.1475 
>>> ms
>>> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=3 ttl=64 time=20.0371 
>>> ms
>>> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=4 ttl=64 time=14.9237 
>>> ms
>>> 116 bytes from 10.1.1.2 <http://10.1.1.2/>: icmp_seq=5 ttl=64 time=20.1059 
>>> ms
>>> 
>>> Statistics: 5 sent, 5 received, 0% packet loss
>>> 
>>> Is it expected to take 20 msecs for a direct ping? 
>>> 
>>> Thanks
>>> Vyshakh
>>> 
>>> 
>>> 
>> 
>> 
> 
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#15753): https://lists.fd.io/g/vpp-dev/message/15753
Mute This Topic: https://lists.fd.io/mt/71880617/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to