> From: David Marchand [mailto:[email protected]]
> Sent: Tuesday, 4 November 2025 11.02
> 
> When debugging TSO and other checksum offloads, dumping the various
> l*_len fields and TSO segmentation size can be helpful.
> 
> Example in OVS that dumps a mbuf on rte_eth_tx_prepare failure:
> 
> Before:
> netdev_dpdk(pmd-c30/id:11)|DBG|dpdk0: First invalid packet:
> dump mbuf at 0x2201a916c0, iova=0x2200800580, buf_len=6864
>   pkt_len=6804, ol_flags=0x3114800000000102, nb_segs=1, port=65535,
> ptype=0
>   segment at 0x2201a916c0, data=0x22008005b2, len=6804, off=50,
> refcnt=1
>   Dump data at [0x22008005b2], len=6804
> ...
> 
> After:
> netdev_dpdk(pmd-c30/id:11)|DBG|dpdk0: First invalid packet:
> dump mbuf at 0x2201a916c0, iova=0x2200800580, buf_len=6864,
> pkt_len=6804
>   outer_l2_len=14, outer_l3_len=40, l2_len=38, l3_len=40, l4_len=32
>   ol_flags=0x3114800000000102, nb_segs=1, port=65535, ptype=0
>   segment at 0x2201a916c0, data=0x22008005b2, len=6804, off=50,
> refcnt=1
>   Dump data at [0x22008005b2], len=6804
> ...
> 
> Signed-off-by: David Marchand <[email protected]>
> ---

Reviewed-by: Morten Brørup <[email protected]>

Reply via email to