@@ -1032,15 +1032,15 @@ prepare_cipher_xform(uint8_t dev_id,
1032
1032
1033
1033
cap = rte_cryptodev_sym_capability_get (dev_id , & cap_idx );
1034
1034
if (!cap ) {
1035
- RTE_LOG (ERR , PMD , "Failed to get capability for cdev %u\n" ,
1035
+ RTE_LOG (ERR , USER1 , "Failed to get capability for cdev %u\n" ,
1036
1036
dev_id );
1037
1037
return - EACCES ;
1038
1038
}
1039
1039
1040
1040
if (rte_cryptodev_sym_capability_check_cipher (cap ,
1041
1041
cipher_xform -> key .length ,
1042
1042
cipher_xform -> iv .length ) != 0 ) {
1043
- RTE_LOG (ERR , PMD , "PMD %s key length %u IV length %u\n" ,
1043
+ RTE_LOG (ERR , USER1 , "PMD %s key length %u IV length %u\n" ,
1044
1044
rte_cryptodev_name_get (dev_id ),
1045
1045
cipher_xform -> key .length ,
1046
1046
cipher_xform -> iv .length );
@@ -1088,15 +1088,15 @@ prepare_auth_xform(uint8_t dev_id,
1088
1088
1089
1089
cap = rte_cryptodev_sym_capability_get (dev_id , & cap_idx );
1090
1090
if (!cap ) {
1091
- RTE_LOG (ERR , PMD , "Failed to get capability for cdev %u\n" ,
1091
+ RTE_LOG (ERR , USER1 , "Failed to get capability for cdev %u\n" ,
1092
1092
dev_id );
1093
1093
return - EACCES ;
1094
1094
}
1095
1095
1096
1096
if (rte_cryptodev_sym_capability_check_auth (cap ,
1097
1097
auth_xform -> key .length ,
1098
1098
auth_xform -> digest_length , 0 ) != 0 ) {
1099
- RTE_LOG (ERR , PMD , "PMD %s key length %u Digest length %u\n" ,
1099
+ RTE_LOG (ERR , USER1 , "PMD %s key length %u Digest length %u\n" ,
1100
1100
rte_cryptodev_name_get (dev_id ),
1101
1101
auth_xform -> key .length ,
1102
1102
auth_xform -> digest_length );
@@ -1147,7 +1147,7 @@ prepare_aead_xform(uint8_t dev_id,
1147
1147
1148
1148
cap = rte_cryptodev_sym_capability_get (dev_id , & cap_idx );
1149
1149
if (!cap ) {
1150
- RTE_LOG (ERR , PMD , "Failed to get capability for cdev %u\n" ,
1150
+ RTE_LOG (ERR , USER1 , "Failed to get capability for cdev %u\n" ,
1151
1151
dev_id );
1152
1152
return - EACCES ;
1153
1153
}
@@ -1156,7 +1156,7 @@ prepare_aead_xform(uint8_t dev_id,
1156
1156
aead_xform -> key .length ,
1157
1157
aead_xform -> digest_length , aead_xform -> aad_length ,
1158
1158
aead_xform -> iv .length ) != 0 ) {
1159
- RTE_LOG (ERR , PMD ,
1159
+ RTE_LOG (ERR , USER1 ,
1160
1160
"PMD %s key_len %u tag_len %u aad_len %u iv_len %u\n" ,
1161
1161
rte_cryptodev_name_get (dev_id ),
1162
1162
aead_xform -> key .length ,
@@ -1195,7 +1195,7 @@ prepare_cipher_op(struct rte_crypto_op *op,
1195
1195
1196
1196
dst = (uint8_t * )rte_pktmbuf_append (mbuf , len );
1197
1197
if (!dst ) {
1198
- RTE_LOG (ERR , PMD , "Error %i: MBUF too small\n" , - ENOMEM );
1198
+ RTE_LOG (ERR , USER1 , "Error %i: MBUF too small\n" , - ENOMEM );
1199
1199
return - ENOMEM ;
1200
1200
}
1201
1201
@@ -1219,7 +1219,7 @@ prepare_auth_op(struct rte_crypto_op *op,
1219
1219
uint8_t * dst ;
1220
1220
1221
1221
if (vec -> input .len + vec -> digest .len > RTE_MBUF_MAX_NB_SEGS ) {
1222
- RTE_LOG (ERR , PMD , "Error %i: Test data too long (%u).\n" ,
1222
+ RTE_LOG (ERR , USER1 , "Error %i: Test data too long (%u).\n" ,
1223
1223
- ENOMEM , vec -> input .len + vec -> digest .len );
1224
1224
return - ENOMEM ;
1225
1225
}
@@ -1229,7 +1229,7 @@ prepare_auth_op(struct rte_crypto_op *op,
1229
1229
dst = (uint8_t * )rte_pktmbuf_append (mbuf , vec -> input .len +
1230
1230
vec -> digest .len );
1231
1231
if (!dst ) {
1232
- RTE_LOG (ERR , PMD , "Error %i: MBUF too small\n" , - ENOMEM );
1232
+ RTE_LOG (ERR , USER1 , "Error %i: MBUF too small\n" , - ENOMEM );
1233
1233
return - ENOMEM ;
1234
1234
}
1235
1235
@@ -1274,15 +1274,15 @@ prepare_aead_op(struct rte_crypto_op *op,
1274
1274
memcpy (iv , vec -> iv .data , vec -> iv .len );
1275
1275
1276
1276
if (len + vec -> digest .len > RTE_MBUF_MAX_NB_SEGS ) {
1277
- RTE_LOG (ERR , PMD , "Error %i: Test data too long (%u).\n" ,
1277
+ RTE_LOG (ERR , USER1 , "Error %i: Test data too long (%u).\n" ,
1278
1278
- ENOMEM , len + vec -> digest .len );
1279
1279
return - ENOMEM ;
1280
1280
}
1281
1281
1282
1282
dst = (uint8_t * )rte_pktmbuf_append (mbuf , RTE_ALIGN_CEIL (len +
1283
1283
vec -> digest .len , 16 ));
1284
1284
if (!dst ) {
1285
- RTE_LOG (ERR , PMD , "Error %i: MBUF too small\n" , - ENOMEM );
1285
+ RTE_LOG (ERR , USER1 , "Error %i: MBUF too small\n" , - ENOMEM );
1286
1286
return - ENOMEM ;
1287
1287
}
1288
1288
@@ -1303,7 +1303,7 @@ prepare_aead_op(struct rte_crypto_op *op,
1303
1303
1304
1304
dst = rte_malloc (NULL , len , 16 );
1305
1305
if (!dst ) {
1306
- RTE_LOG (ERR , PMD , "Error %i: Not enough memory\n" , - ENOMEM );
1306
+ RTE_LOG (ERR , USER1 , "Error %i: Not enough memory\n" , - ENOMEM );
1307
1307
return - ENOMEM ;
1308
1308
}
1309
1309
@@ -1474,24 +1474,24 @@ run_single_test(uint8_t dev_id,
1474
1474
ret = test_ops -> prepare_xform (dev_id , & xform , vec , dir , key ,
1475
1475
negative_test );
1476
1476
if (ret < 0 ) {
1477
- RTE_LOG (ERR , PMD , "Error %i: Prepare Xform\n" , ret );
1477
+ RTE_LOG (ERR , USER1 , "Error %i: Prepare Xform\n" , ret );
1478
1478
return ret ;
1479
1479
}
1480
1480
1481
1481
sess = rte_cryptodev_sym_session_create (dev_id , & xform , env -> sess_pool );
1482
1482
if (!sess ) {
1483
- RTE_LOG (ERR , PMD , "Error %i: Init session\n" , ret );
1483
+ RTE_LOG (ERR , USER1 , "Error %i: Init session\n" , ret );
1484
1484
return ret ;
1485
1485
}
1486
1486
1487
1487
ret = test_ops -> prepare_op (env -> op , env -> mbuf , sess , dir , vec );
1488
1488
if (ret < 0 ) {
1489
- RTE_LOG (ERR , PMD , "Error %i: Prepare op\n" , ret );
1489
+ RTE_LOG (ERR , USER1 , "Error %i: Prepare op\n" , ret );
1490
1490
return ret ;
1491
1491
}
1492
1492
1493
1493
if (rte_cryptodev_enqueue_burst (dev_id , 0 , & env -> op , 1 ) < 1 ) {
1494
- RTE_LOG (ERR , PMD , "Error: Failed enqueue\n" );
1494
+ RTE_LOG (ERR , USER1 , "Error: Failed enqueue\n" );
1495
1495
return ret ;
1496
1496
}
1497
1497
@@ -1622,7 +1622,7 @@ fips_dev_self_test(uint8_t dev_id,
1622
1622
1623
1623
ret = fips_dev_auto_test_init (dev_id , & env );
1624
1624
if (ret < 0 ) {
1625
- RTE_LOG (ERR , PMD , "Failed to init self-test for PMD %u\n" ,
1625
+ RTE_LOG (ERR , USER1 , "Failed to init self-test for PMD %u\n" ,
1626
1626
dev_id );
1627
1627
return ret ;
1628
1628
}
@@ -1644,7 +1644,7 @@ fips_dev_self_test(uint8_t dev_id,
1644
1644
negative_test = 0 ;
1645
1645
}
1646
1646
1647
- RTE_LOG (INFO , PMD , "Testing (ID %u) %s %s%s...\n" ,
1647
+ RTE_LOG (INFO , USER1 , "Testing (ID %u) %s %s%s...\n" ,
1648
1648
i ,
1649
1649
vec -> name ,
1650
1650
j == self_test_dir_enc_auth_gen ?
@@ -1658,18 +1658,18 @@ fips_dev_self_test(uint8_t dev_id,
1658
1658
if (!negative_test )
1659
1659
break ;
1660
1660
ret = -1 ;
1661
- RTE_LOG (ERR , PMD , "PMD %u Failed test %s %s\n" ,
1661
+ RTE_LOG (ERR , USER1 , "PMD %u Failed test %s %s\n" ,
1662
1662
dev_id , vec -> name ,
1663
1663
j == self_test_dir_enc_auth_gen ?
1664
1664
"Encrypt" : "Decrypt" );
1665
1665
goto error_exit ;
1666
1666
case - EACCES :
1667
- RTE_LOG (ERR , PMD , "Not supported by %s. Skip\n" ,
1667
+ RTE_LOG (ERR , USER1 , "Not supported by %s. Skip\n" ,
1668
1668
rte_cryptodev_name_get (dev_id ));
1669
1669
ret = 0 ;
1670
1670
break ;
1671
1671
default :
1672
- RTE_LOG (ERR , PMD , "PMD %u Failed test %s %s\n" ,
1672
+ RTE_LOG (ERR , USER1 , "PMD %u Failed test %s %s\n" ,
1673
1673
dev_id , vec -> name ,
1674
1674
j == self_test_dir_enc_auth_gen ?
1675
1675
"Encrypt" : "Decrypt" );
@@ -1682,7 +1682,7 @@ fips_dev_self_test(uint8_t dev_id,
1682
1682
fips_dev_auto_test_uninit (dev_id , & env );
1683
1683
1684
1684
if (ret == 0 ) {
1685
- RTE_LOG (INFO , PMD , "PMD %u finished self-test successfully\n" ,
1685
+ RTE_LOG (INFO , USER1 , "PMD %u finished self-test successfully\n" ,
1686
1686
dev_id );
1687
1687
}
1688
1688
0 commit comments