> From: David Marchand [mailto:[email protected]] > Sent: Tuesday, 4 November 2025 11.02 > > When debugging TSO and other checksum offloads, dumping the various > l*_len fields and TSO segmentation size can be helpful. > > Example in OVS that dumps a mbuf on rte_eth_tx_prepare failure: > > Before: > netdev_dpdk(pmd-c30/id:11)|DBG|dpdk0: First invalid packet: > dump mbuf at 0x2201a916c0, iova=0x2200800580, buf_len=6864 > pkt_len=6804, ol_flags=0x3114800000000102, nb_segs=1, port=65535, > ptype=0 > segment at 0x2201a916c0, data=0x22008005b2, len=6804, off=50, > refcnt=1 > Dump data at [0x22008005b2], len=6804 > ... > > After: > netdev_dpdk(pmd-c30/id:11)|DBG|dpdk0: First invalid packet: > dump mbuf at 0x2201a916c0, iova=0x2200800580, buf_len=6864, > pkt_len=6804 > outer_l2_len=14, outer_l3_len=40, l2_len=38, l3_len=40, l4_len=32 > ol_flags=0x3114800000000102, nb_segs=1, port=65535, ptype=0 > segment at 0x2201a916c0, data=0x22008005b2, len=6804, off=50, > refcnt=1 > Dump data at [0x22008005b2], len=6804 > ... > > Signed-off-by: David Marchand <[email protected]> > ---
Reviewed-by: Morten Brørup <[email protected]>

