From patchwork Tue Jul 11 14:55:59 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hemant Agrawal X-Patchwork-Id: 26790 Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [IPv6:::1]) by dpdk.org (Postfix) with ESMTP id 164277CCD; Tue, 11 Jul 2017 16:56:29 +0200 (CEST) Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0044.outbound.protection.outlook.com [104.47.34.44]) by dpdk.org (Postfix) with ESMTP id 1F6E37CCC for ; Tue, 11 Jul 2017 16:56:24 +0200 (CEST) Received: from BN3PR03CA0066.namprd03.prod.outlook.com (10.167.1.154) by BY2PR03MB474.namprd03.prod.outlook.com (10.141.141.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1240.13; Tue, 11 Jul 2017 14:56:22 +0000 Received: from BN1AFFO11FD033.protection.gbl (2a01:111:f400:7c10::186) by BN3PR03CA0066.outlook.office365.com (2a01:111:e400:7a4d::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1240.13 via Frontend Transport; Tue, 11 Jul 2017 14:56:21 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BN1AFFO11FD033.mail.protection.outlook.com (10.58.52.246) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1220.9 via Frontend Transport; Tue, 11 Jul 2017 14:56:20 +0000 Received: from bf-netperf1.ap.freescale.net (bf-netperf1.ap.freescale.net [10.232.134.28]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v6BEtuaJ031404; Tue, 11 Jul 2017 07:56:18 -0700 From: Hemant Agrawal To: , CC: , , Date: Tue, 11 Jul 2017 20:25:59 +0530 Message-ID: <1499784959-8598-9-git-send-email-hemant.agrawal@nxp.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1499784959-8598-1-git-send-email-hemant.agrawal@nxp.com> References: <1499784959-8598-1-git-send-email-hemant.agrawal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131442585813260648; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39860400002)(39840400002)(39400400002)(39380400002)(39850400002)(39450400003)(39410400002)(2980300002)(1109001)(1110001)(339900001)(189002)(199003)(9170700003)(50466002)(53936002)(4326008)(356003)(33646002)(48376002)(5003940100001)(2906002)(54906002)(50226002)(8676002)(8936002)(38730400002)(50986999)(85426001)(305945005)(5660300001)(76176999)(81166006)(106466001)(8656002)(47776003)(97736004)(189998001)(626005)(2950100002)(105606002)(6666003)(36756003)(498600001)(77096006)(86362001)(104016004)(217873001); DIR:OUT; SFP:1101; SCL:1; SRVR:BY2PR03MB474; H:az84smr01.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; MX:1; A:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1AFFO11FD033; 1:yNO0KjNYA4GtF3xxtglwNn//byawhvcHcdXLGQwuv?= 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 MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 55126dd3-1faf-40b6-0e60-08d4c86cfe26 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BY2PR03MB474; X-Microsoft-Exchange-Diagnostics: 1; BY2PR03MB474; 3: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 X-MS-TrafficTypeDiagnostic: BY2PR03MB474: X-Microsoft-Exchange-Diagnostics: 1; BY2PR03MB474; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BY2PR03MB474; 31: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(236129657087228)(185117386973197)(275809806118684); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(5005006)(13016025)(8121501046)(13018025)(2017060910075)(93006095)(93001095)(10201501046)(3002001)(100000703101)(100105400095)(6055026)(6096035)(20161123563025)(20161123556025)(20161123561025)(201703131430075)(201703131433075)(201703131441075)(201703131448075)(201703161259150)(20161123559100)(20161123565025)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BY2PR03MB474; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BY2PR03MB474; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2PR03MB474; 4:WUU/0wVqFs01ooakkEwSbEnC33rRHXbLh5aL/ECuUs3?= 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 X-Forefront-PRVS: 0365C0E14B X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2PR03MB474; 23:CrwrWdpAzUB9lRJhChokP2Z4jMKj07Db2rjwtUGuKN?= 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 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2PR03MB474; 6:alIYbj8QBMm7Kj+bww3hzoNIIyVjLOsRhcjZ1xtvXSe?= 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 X-Microsoft-Exchange-Diagnostics: 1; BY2PR03MB474; 5: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; 24:W1jwxMxNkc6/BrkUlP3mQUmdrjBi98mfE3CtBDKOnJp1ZnrYXVlv6MSY8JKOy/IrV3R6lr6c78Jvlp7TXdw2OPObclKEKb7Y9K9yREDjvMA= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BY2PR03MB474; 7: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 X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Jul 2017 14:56:20.9828 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR03MB474 Subject: [dpdk-dev] [PATCH 8/8] drivers: add newline in RTE LOG usages in dpaa2 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Signed-off-by: Hemant Agrawal --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 46 +++++++++---------- drivers/mempool/dpaa2/dpaa2_hw_mempool.c | 12 ++--- drivers/net/dpaa2/base/dpaa2_hw_dpni.c | 10 ++-- drivers/net/dpaa2/dpaa2_ethdev.c | 71 +++++++++++++++-------------- 4 files changed, 72 insertions(+), 67 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index 9fc9dea..d6c3088 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -669,7 +669,7 @@ sec_fd_to_mbuf(const struct qbman_fd *fd) if (unlikely(DPAA2_GET_FD_IVP(fd))) { /* TODO complete it. */ - RTE_LOG(ERR, PMD, "error: Non inline buffer - WHAT to DO?"); + RTE_LOG(ERR, PMD, "error: Non inline buffer - WHAT to DO?\n"); return NULL; } op = (struct rte_crypto_op *)DPAA2_IOVA_TO_VADDR( @@ -731,8 +731,8 @@ dpaa2_sec_dequeue_burst(void *qp, struct rte_crypto_op **ops, /*Issue a volatile dequeue command. */ while (1) { if (qbman_swp_pull(swp, &pulldesc)) { - RTE_LOG(WARNING, PMD, "SEC VDQ command is not issued." - "QBMAN is busy\n"); + RTE_LOG(WARNING, PMD, + "SEC VDQ command is not issued : QBMAN busy\n"); /* Portal was busy, try again */ continue; } @@ -926,7 +926,7 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev, sizeof(struct ctxt_priv) + sizeof(struct sec_flc_desc), RTE_CACHE_LINE_SIZE); if (priv == NULL) { - RTE_LOG(ERR, PMD, "No Memory for priv CTXT"); + RTE_LOG(ERR, PMD, "No Memory for priv CTXT\n"); return -1; } @@ -937,7 +937,7 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev, session->cipher_key.data = rte_zmalloc(NULL, xform->cipher.key.length, RTE_CACHE_LINE_SIZE); if (session->cipher_key.data == NULL) { - RTE_LOG(ERR, PMD, "No Memory for cipher key"); + RTE_LOG(ERR, PMD, "No Memory for cipher key\n"); rte_free(priv); return -1; } @@ -980,7 +980,7 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev, case RTE_CRYPTO_CIPHER_SNOW3G_UEA2: case RTE_CRYPTO_CIPHER_ZUC_EEA3: case RTE_CRYPTO_CIPHER_NULL: - RTE_LOG(ERR, PMD, "Crypto: Unsupported Cipher alg %u", + RTE_LOG(ERR, PMD, "Crypto: Unsupported Cipher alg %u\n", xform->cipher.algo); goto error_out; default: @@ -1042,7 +1042,7 @@ dpaa2_sec_auth_init(struct rte_cryptodev *dev, sizeof(struct sec_flc_desc), RTE_CACHE_LINE_SIZE); if (priv == NULL) { - RTE_LOG(ERR, PMD, "No Memory for priv CTXT"); + RTE_LOG(ERR, PMD, "No Memory for priv CTXT\n"); return -1; } @@ -1052,7 +1052,7 @@ dpaa2_sec_auth_init(struct rte_cryptodev *dev, session->auth_key.data = rte_zmalloc(NULL, xform->auth.key.length, RTE_CACHE_LINE_SIZE); if (session->auth_key.data == NULL) { - RTE_LOG(ERR, PMD, "No Memory for auth key"); + RTE_LOG(ERR, PMD, "No Memory for auth key\n"); rte_free(priv); return -1; } @@ -1112,7 +1112,7 @@ dpaa2_sec_auth_init(struct rte_cryptodev *dev, case RTE_CRYPTO_AUTH_AES_CMAC: case RTE_CRYPTO_AUTH_AES_CBC_MAC: case RTE_CRYPTO_AUTH_ZUC_EIA3: - RTE_LOG(ERR, PMD, "Crypto: Unsupported auth alg %u", + RTE_LOG(ERR, PMD, "Crypto: Unsupported auth alg %u\n", xform->auth.algo); goto error_out; default: @@ -1174,7 +1174,7 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev, sizeof(struct ctxt_priv) + sizeof(struct sec_flc_desc), RTE_CACHE_LINE_SIZE); if (priv == NULL) { - RTE_LOG(ERR, PMD, "No Memory for priv CTXT"); + RTE_LOG(ERR, PMD, "No Memory for priv CTXT\n"); return -1; } @@ -1184,7 +1184,7 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev, session->aead_key.data = rte_zmalloc(NULL, aead_xform->key.length, RTE_CACHE_LINE_SIZE); if (session->aead_key.data == NULL && aead_xform->key.length > 0) { - RTE_LOG(ERR, PMD, "No Memory for aead key"); + RTE_LOG(ERR, PMD, "No Memory for aead key\n"); rte_free(priv); return -1; } @@ -1207,7 +1207,7 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev, session->cipher_alg = RTE_CRYPTO_AEAD_AES_GCM; break; case RTE_CRYPTO_AEAD_AES_CCM: - RTE_LOG(ERR, PMD, "Crypto: Unsupported AEAD alg %u", + RTE_LOG(ERR, PMD, "Crypto: Unsupported AEAD alg %u\n", aead_xform->algo); goto error_out; default: @@ -1225,7 +1225,7 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev, &priv->flc_desc[0].desc[1], 1); if (err < 0) { - PMD_DRV_LOG(ERR, "Crypto: Incorrect key lengths"); + PMD_DRV_LOG(ERR, "Crypto: Incorrect key lengths\n"); goto error_out; } if (priv->flc_desc[0].desc[1] & 1) { @@ -1308,7 +1308,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, sizeof(struct ctxt_priv) + sizeof(struct sec_flc_desc), RTE_CACHE_LINE_SIZE); if (priv == NULL) { - RTE_LOG(ERR, PMD, "No Memory for priv CTXT"); + RTE_LOG(ERR, PMD, "No Memory for priv CTXT\n"); return -1; } @@ -1318,7 +1318,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, session->cipher_key.data = rte_zmalloc(NULL, cipher_xform->key.length, RTE_CACHE_LINE_SIZE); if (session->cipher_key.data == NULL && cipher_xform->key.length > 0) { - RTE_LOG(ERR, PMD, "No Memory for cipher key"); + RTE_LOG(ERR, PMD, "No Memory for cipher key\n"); rte_free(priv); return -1; } @@ -1326,7 +1326,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, session->auth_key.data = rte_zmalloc(NULL, auth_xform->key.length, RTE_CACHE_LINE_SIZE); if (session->auth_key.data == NULL && auth_xform->key.length > 0) { - RTE_LOG(ERR, PMD, "No Memory for auth key"); + RTE_LOG(ERR, PMD, "No Memory for auth key\n"); rte_free(session->cipher_key.data); rte_free(priv); return -1; @@ -1389,7 +1389,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, case RTE_CRYPTO_AUTH_AES_CMAC: case RTE_CRYPTO_AUTH_AES_CBC_MAC: case RTE_CRYPTO_AUTH_ZUC_EIA3: - RTE_LOG(ERR, PMD, "Crypto: Unsupported auth alg %u", + RTE_LOG(ERR, PMD, "Crypto: Unsupported auth alg %u\n", auth_xform->algo); goto error_out; default: @@ -1423,7 +1423,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, case RTE_CRYPTO_CIPHER_3DES_ECB: case RTE_CRYPTO_CIPHER_AES_ECB: case RTE_CRYPTO_CIPHER_KASUMI_F8: - RTE_LOG(ERR, PMD, "Crypto: Unsupported Cipher alg %u", + RTE_LOG(ERR, PMD, "Crypto: Unsupported Cipher alg %u\n", cipher_xform->algo); goto error_out; default: @@ -1442,7 +1442,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, &priv->flc_desc[0].desc[2], 2); if (err < 0) { - PMD_DRV_LOG(ERR, "Crypto: Incorrect key lengths"); + PMD_DRV_LOG(ERR, "Crypto: Incorrect key lengths\n"); goto error_out; } if (priv->flc_desc[0].desc[2] & 1) { @@ -1469,7 +1469,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, session->digest_length, session->dir); } else { - RTE_LOG(ERR, PMD, "Hash before cipher not supported"); + RTE_LOG(ERR, PMD, "Hash before cipher not supported\n"); goto error_out; } @@ -1503,7 +1503,7 @@ dpaa2_sec_set_session_parameters(struct rte_cryptodev *dev, PMD_INIT_FUNC_TRACE(); if (unlikely(sess == NULL)) { - RTE_LOG(ERR, PMD, "invalid session struct"); + RTE_LOG(ERR, PMD, "invalid session struct\n"); return -1; } @@ -1539,7 +1539,7 @@ dpaa2_sec_set_session_parameters(struct rte_cryptodev *dev, dpaa2_sec_aead_init(dev, xform, session); } else { - RTE_LOG(ERR, PMD, "Invalid crypto type"); + RTE_LOG(ERR, PMD, "Invalid crypto type\n"); return -1; } @@ -1910,7 +1910,7 @@ dpaa2_sec_dev_init(struct rte_cryptodev *cryptodev) NULL, NULL, NULL, NULL, SOCKET_ID_ANY, 0); if (!internals->fle_pool) { - RTE_LOG(ERR, PMD, "%s create failed", str); + RTE_LOG(ERR, PMD, "%s create failed\n", str); goto init_error; } else RTE_LOG(INFO, PMD, "%s created: %p\n", str, diff --git a/drivers/mempool/dpaa2/dpaa2_hw_mempool.c b/drivers/mempool/dpaa2/dpaa2_hw_mempool.c index d578c2f..973b9d4 100644 --- a/drivers/mempool/dpaa2/dpaa2_hw_mempool.c +++ b/drivers/mempool/dpaa2/dpaa2_hw_mempool.c @@ -188,7 +188,7 @@ rte_dpaa2_mbuf_release(struct rte_mempool *pool __rte_unused, if (unlikely(!DPAA2_PER_LCORE_DPIO)) { ret = dpaa2_affine_qbman_swp(); if (ret != 0) { - RTE_LOG(ERR, PMD, "Failed to allocate IO portal"); + RTE_LOG(ERR, PMD, "Failed to allocate IO portal\n"); return; } } @@ -267,7 +267,7 @@ rte_dpaa2_mbuf_alloc_bulk(struct rte_mempool *pool, if (unlikely(!DPAA2_PER_LCORE_DPIO)) { ret = dpaa2_affine_qbman_swp(); if (ret != 0) { - RTE_LOG(ERR, PMD, "Failed to allocate IO portal"); + RTE_LOG(ERR, PMD, "Failed to allocate IO portal\n"); return ret; } } @@ -323,7 +323,7 @@ rte_hw_mbuf_free_bulk(struct rte_mempool *pool, bp_info = mempool_to_bpinfo(pool); if (!(bp_info->bp_list)) { - RTE_LOG(ERR, PMD, "DPAA2 buffer pool not configured"); + RTE_LOG(ERR, PMD, "DPAA2 buffer pool not configured\n"); return -ENOENT; } rte_dpaa2_mbuf_release(pool, obj_table, bp_info->bpid, @@ -341,7 +341,7 @@ rte_hw_mbuf_get_count(const struct rte_mempool *mp) struct dpaa2_dpbp_dev *dpbp_node; if (!mp || !mp->pool_data) { - RTE_LOG(ERR, PMD, "Invalid mempool provided"); + RTE_LOG(ERR, PMD, "Invalid mempool provided\n"); return 0; } @@ -351,12 +351,12 @@ rte_hw_mbuf_get_count(const struct rte_mempool *mp) ret = dpbp_get_num_free_bufs(&dpbp_node->dpbp, CMD_PRI_LOW, dpbp_node->token, &num_of_bufs); if (ret) { - RTE_LOG(ERR, PMD, "Unable to obtain free buf count (err=%d)", + RTE_LOG(ERR, PMD, "Unable to obtain free buf count (err=%d)\n", ret); return 0; } - RTE_LOG(DEBUG, PMD, "Free bufs = %u", num_of_bufs); + RTE_LOG(DEBUG, PMD, "Free bufs = %u\n", num_of_bufs); return num_of_bufs; } diff --git a/drivers/net/dpaa2/base/dpaa2_hw_dpni.c b/drivers/net/dpaa2/base/dpaa2_hw_dpni.c index f3ac069..5aa12db 100644 --- a/drivers/net/dpaa2/base/dpaa2_hw_dpni.c +++ b/drivers/net/dpaa2/base/dpaa2_hw_dpni.c @@ -91,8 +91,9 @@ dpaa2_setup_flow_dist(struct rte_eth_dev *eth_dev, &tc_cfg); rte_free(p_params); if (ret) { - RTE_LOG(ERR, PMD, "Setting distribution for Rx failed with" - " err code: %d\n", ret); + RTE_LOG(ERR, PMD, + "Setting distribution for Rx failed with err: %d\n", + ret); return ret; } @@ -134,8 +135,9 @@ int dpaa2_remove_flow_dist( &tc_cfg); rte_free(p_params); if (ret) { - RTE_LOG(ERR, PMD, "Setting distribution for Rx failed with" - " err code: %d\n", ret); + RTE_LOG(ERR, PMD, + "Setting distribution for Rx failed with err: %d\n", + ret); return ret; } return ret; diff --git a/drivers/net/dpaa2/dpaa2_ethdev.c b/drivers/net/dpaa2/dpaa2_ethdev.c index 9666d9d..44a5bc2 100644 --- a/drivers/net/dpaa2/dpaa2_ethdev.c +++ b/drivers/net/dpaa2/dpaa2_ethdev.c @@ -121,7 +121,7 @@ dpaa2_vlan_filter_set(struct rte_eth_dev *dev, uint16_t vlan_id, int on) PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return -1; } @@ -156,7 +156,7 @@ dpaa2_vlan_offload_set(struct rte_eth_dev *dev, int mask) ret = dpni_enable_vlan_filter(dpni, CMD_PRI_LOW, priv->token, false); if (ret < 0) - RTE_LOG(ERR, PMD, "Unable to set vlan filter ret = %d", + RTE_LOG(ERR, PMD, "Unable to set vlan filter = %d\n", ret); } } @@ -721,17 +721,17 @@ dpaa2_dev_promiscuous_enable( PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return; } ret = dpni_set_unicast_promisc(dpni, CMD_PRI_LOW, priv->token, true); if (ret < 0) - RTE_LOG(ERR, PMD, "Unable to enable U promisc mode %d", ret); + RTE_LOG(ERR, PMD, "Unable to enable U promisc mode %d\n", ret); ret = dpni_set_multicast_promisc(dpni, CMD_PRI_LOW, priv->token, true); if (ret < 0) - RTE_LOG(ERR, PMD, "Unable to enable M promisc mode %d", ret); + RTE_LOG(ERR, PMD, "Unable to enable M promisc mode %d\n", ret); } static void @@ -745,19 +745,20 @@ dpaa2_dev_promiscuous_disable( PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return; } ret = dpni_set_unicast_promisc(dpni, CMD_PRI_LOW, priv->token, false); if (ret < 0) - RTE_LOG(ERR, PMD, "Unable to disable U promisc mode %d", ret); + RTE_LOG(ERR, PMD, "Unable to disable U promisc mode %d\n", ret); if (dev->data->all_multicast == 0) { ret = dpni_set_multicast_promisc(dpni, CMD_PRI_LOW, priv->token, false); if (ret < 0) - RTE_LOG(ERR, PMD, "Unable to disable M promisc mode %d", + RTE_LOG(ERR, PMD, + "Unable to disable M promisc mode %d\n", ret); } } @@ -773,13 +774,13 @@ dpaa2_dev_allmulticast_enable( PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return; } ret = dpni_set_multicast_promisc(dpni, CMD_PRI_LOW, priv->token, true); if (ret < 0) - RTE_LOG(ERR, PMD, "Unable to enable multicast mode %d", ret); + RTE_LOG(ERR, PMD, "Unable to enable multicast mode %d\n", ret); } static void @@ -792,7 +793,7 @@ dpaa2_dev_allmulticast_disable(struct rte_eth_dev *dev) PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return; } @@ -802,7 +803,7 @@ dpaa2_dev_allmulticast_disable(struct rte_eth_dev *dev) ret = dpni_set_multicast_promisc(dpni, CMD_PRI_LOW, priv->token, false); if (ret < 0) - RTE_LOG(ERR, PMD, "Unable to disable multicast mode %d", ret); + RTE_LOG(ERR, PMD, "Unable to disable multicast mode %d\n", ret); } static int @@ -816,7 +817,7 @@ dpaa2_dev_mtu_set(struct rte_eth_dev *dev, uint16_t mtu) PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return -EINVAL; } @@ -855,15 +856,15 @@ dpaa2_dev_add_mac_addr(struct rte_eth_dev *dev, PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return -1; } ret = dpni_add_mac_addr(dpni, CMD_PRI_LOW, priv->token, addr->addr_bytes); if (ret) - RTE_LOG(ERR, PMD, "error: Adding the MAC ADDR failed:" - " err = %d", ret); + RTE_LOG(ERR, PMD, + "error: Adding the MAC ADDR failed: err = %d\n", ret); return 0; } @@ -882,15 +883,15 @@ dpaa2_dev_remove_mac_addr(struct rte_eth_dev *dev, macaddr = &data->mac_addrs[index]; if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return; } ret = dpni_remove_mac_addr(dpni, CMD_PRI_LOW, priv->token, macaddr->addr_bytes); if (ret) - RTE_LOG(ERR, PMD, "error: Removing the MAC ADDR failed:" - " err = %d", ret); + RTE_LOG(ERR, PMD, + "error: Removing the MAC ADDR failed: err = %d\n", ret); } static void @@ -904,7 +905,7 @@ dpaa2_dev_set_mac_addr(struct rte_eth_dev *dev, PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return; } @@ -912,7 +913,8 @@ dpaa2_dev_set_mac_addr(struct rte_eth_dev *dev, priv->token, addr->addr_bytes); if (ret) - RTE_LOG(ERR, PMD, "error: Setting the MAC ADDR failed %d", ret); + RTE_LOG(ERR, PMD, + "error: Setting the MAC ADDR failed %d\n", ret); } static void dpaa2_dev_stats_get(struct rte_eth_dev *dev, @@ -929,12 +931,12 @@ void dpaa2_dev_stats_get(struct rte_eth_dev *dev, PMD_INIT_FUNC_TRACE(); if (!dpni) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return; } if (!stats) { - RTE_LOG(ERR, PMD, "stats is NULL"); + RTE_LOG(ERR, PMD, "stats is NULL\n"); return; } @@ -987,7 +989,7 @@ void dpaa2_dev_stats_reset(struct rte_eth_dev *dev) PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return; } @@ -1016,7 +1018,7 @@ dpaa2_dev_link_update(struct rte_eth_dev *dev, PMD_INIT_FUNC_TRACE(); if (dpni == NULL) { - RTE_LOG(ERR, PMD, "error : dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return 0; } memset(&old, 0, sizeof(old)); @@ -1024,7 +1026,7 @@ dpaa2_dev_link_update(struct rte_eth_dev *dev, ret = dpni_get_link_state(dpni, CMD_PRI_LOW, priv->token, &state); if (ret < 0) { - RTE_LOG(ERR, PMD, "error: dpni_get_link_state %d", ret); + RTE_LOG(ERR, PMD, "error: dpni_get_link_state %d\n", ret); return -1; } @@ -1069,7 +1071,7 @@ dpaa2_dev_set_link_up(struct rte_eth_dev *dev) dpni = (struct fsl_mc_io *)priv->hw; if (dpni == NULL) { - RTE_LOG(ERR, PMD, "Device has not yet been configured"); + RTE_LOG(ERR, PMD, "DPNI is NULL\n"); return ret; } @@ -1116,7 +1118,7 @@ dpaa2_dev_set_link_down(struct rte_eth_dev *dev) dpni = (struct fsl_mc_io *)priv->hw; if (dpni == NULL) { - RTE_LOG(ERR, PMD, "Device has not yet been configured"); + RTE_LOG(ERR, PMD, "Device has not yet been configured\n"); return ret; } @@ -1170,13 +1172,13 @@ dpaa2_flow_ctrl_get(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf) dpni = (struct fsl_mc_io *)priv->hw; if (dpni == NULL || fc_conf == NULL) { - RTE_LOG(ERR, PMD, "device not configured"); + RTE_LOG(ERR, PMD, "device not configured\n"); return ret; } ret = dpni_get_link_state(dpni, CMD_PRI_LOW, priv->token, &state); if (ret) { - RTE_LOG(ERR, PMD, "error: dpni_get_link_state %d", ret); + RTE_LOG(ERR, PMD, "error: dpni_get_link_state %d\n", ret); return ret; } @@ -1226,7 +1228,7 @@ dpaa2_flow_ctrl_set(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf) dpni = (struct fsl_mc_io *)priv->hw; if (dpni == NULL) { - RTE_LOG(ERR, PMD, "dpni is NULL"); + RTE_LOG(ERR, PMD, "dpni is NULL\n"); return ret; } @@ -1236,7 +1238,7 @@ dpaa2_flow_ctrl_set(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf) */ ret = dpni_get_link_state(dpni, CMD_PRI_LOW, priv->token, &state); if (ret) { - RTE_LOG(ERR, PMD, "Unable to get link state (err=%d)", ret); + RTE_LOG(ERR, PMD, "Unable to get link state (err=%d)\n", ret); return -1; } @@ -1281,14 +1283,15 @@ dpaa2_flow_ctrl_set(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf) cfg.options &= ~DPNI_LINK_OPT_ASYM_PAUSE; break; default: - RTE_LOG(ERR, PMD, "Incorrect Flow control flag (%d)", + RTE_LOG(ERR, PMD, "Incorrect Flow control flag (%d)\n", fc_conf->mode); return -1; } ret = dpni_set_link_cfg(dpni, CMD_PRI_LOW, priv->token, &cfg); if (ret) - RTE_LOG(ERR, PMD, "Unable to set Link configuration (err=%d)", + RTE_LOG(ERR, PMD, + "Unable to set Link configuration (err=%d)\n", ret); /* Enable link */