Looks like some code got copy/paste in to the IPSEC gateway
example from another place. Shouldn't be using RTE_LOGTYPE_PORT
here.

Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload")
Cc: akhil.go...@nxp.com
Signed-off-by: Stephen Hemminger <step...@networkplumber.org>
---
 examples/ipsec-secgw/sa.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c
index 7da9444a7b8a..67327fda8dbc 100644
--- a/examples/ipsec-secgw/sa.c
+++ b/examples/ipsec-secgw/sa.c
@@ -1127,7 +1127,7 @@ check_eth_dev_caps(uint16_t portid, uint32_t inbound, 
uint32_t tso)
        if (inbound) {
                if ((dev_info.rx_offload_capa &
                                RTE_ETH_RX_OFFLOAD_SECURITY) == 0) {
-                       RTE_LOG(WARNING, PORT,
+                       RTE_LOG(WARNING, IPSEC,
                                "hardware RX IPSec offload is not supported\n");
                        return -EINVAL;
                }
@@ -1135,13 +1135,13 @@ check_eth_dev_caps(uint16_t portid, uint32_t inbound, 
uint32_t tso)
        } else { /* outbound */
                if ((dev_info.tx_offload_capa &
                                RTE_ETH_TX_OFFLOAD_SECURITY) == 0) {
-                       RTE_LOG(WARNING, PORT,
+                       RTE_LOG(WARNING, IPSEC,
                                "hardware TX IPSec offload is not supported\n");
                        return -EINVAL;
                }
                if (tso && (dev_info.tx_offload_capa &
                                RTE_ETH_TX_OFFLOAD_TCP_TSO) == 0) {
-                       RTE_LOG(WARNING, PORT,
+                       RTE_LOG(WARNING, IPSEC,
                                "hardware TCP TSO offload is not supported\n");
                        return -EINVAL;
                }
-- 
2.39.1

Reply via email to