From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by dpdk.org (Postfix) with ESMTP id 0314C1B4C0 for ; Mon, 7 Jan 2019 09:57:25 +0100 (CET) Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 6102F8762F; Mon, 7 Jan 2019 08:57:24 +0000 (UTC) Received: from dmarchan.remote.csb (ovpn-117-97.ams2.redhat.com [10.36.117.97]) by smtp.corp.redhat.com (Postfix) with ESMTP id 24A61600CC; Mon, 7 Jan 2019 08:57:22 +0000 (UTC) From: David Marchand To: dev@dpdk.org Cc: olivier.matz@6wind.com, yskoh@mellanox.com, arybchenko@solarflare.com, bernard.iremonger@intel.com Date: Mon, 7 Jan 2019 09:57:12 +0100 Message-Id: <1546851432-19397-4-git-send-email-david.marchand@redhat.com> In-Reply-To: <1546851432-19397-1-git-send-email-david.marchand@redhat.com> References: <1546851432-19397-1-git-send-email-david.marchand@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Mon, 07 Jan 2019 08:57:24 +0000 (UTC) Subject: [dpdk-dev] [PATCH v2 3/3] app/testpmd: check mbufs in verbose mode X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Jan 2019 08:57:25 -0000 Let's check the received/sent mbufs, it can help debugging. Signed-off-by: David Marchand --- app/test-pmd/util.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/app/test-pmd/util.c b/app/test-pmd/util.c index 687bfa4..6b0791d 100644 --- a/app/test-pmd/util.c +++ b/app/test-pmd/util.c @@ -36,6 +36,7 @@ uint32_t sw_packet_type; uint16_t udp_port; uint32_t vx_vni; + const char *reason; if (!nb_pkts) return; @@ -147,6 +148,8 @@ printf("\n"); rte_get_rx_ol_flag_list(mb->ol_flags, buf, sizeof(buf)); printf(" ol_flags: %s\n", buf); + if (rte_mbuf_check(mb, 1, &reason) < 0) + printf("INVALID mbuf: %s\n", reason); } } -- 1.8.3.1