Looks like some code got copy/paste in to the IPSEC gateway
example from another place. Shouldn't be using RTE_LOGTYPE_PORT
here.

Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload")
Acked-by: Akhil Goyal <gak...@marvell.com>
Signed-off-by: Stephen Hemminger <step...@networkplumber.org>
---
 examples/ipsec-secgw/sa.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c
index 5f5d2685f64c..417bfb41cca5 100644
--- a/examples/ipsec-secgw/sa.c
+++ b/examples/ipsec-secgw/sa.c
@@ -1130,7 +1130,7 @@ check_eth_dev_caps(uint16_t portid, uint32_t inbound, 
uint32_t tso)
        if (inbound) {
                if ((dev_info.rx_offload_capa &
                                RTE_ETH_RX_OFFLOAD_SECURITY) == 0) {
-                       RTE_LOG(WARNING, PORT,
+                       RTE_LOG(WARNING, IPSEC,
                                "hardware RX IPSec offload is not supported\n");
                        return -EINVAL;
                }
@@ -1138,13 +1138,13 @@ check_eth_dev_caps(uint16_t portid, uint32_t inbound, 
uint32_t tso)
        } else { /* outbound */
                if ((dev_info.tx_offload_capa &
                                RTE_ETH_TX_OFFLOAD_SECURITY) == 0) {
-                       RTE_LOG(WARNING, PORT,
+                       RTE_LOG(WARNING, IPSEC,
                                "hardware TX IPSec offload is not supported\n");
                        return -EINVAL;
                }
                if (tso && (dev_info.tx_offload_capa &
                                RTE_ETH_TX_OFFLOAD_TCP_TSO) == 0) {
-                       RTE_LOG(WARNING, PORT,
+                       RTE_LOG(WARNING, IPSEC,
                                "hardware TCP TSO offload is not supported\n");
                        return -EINVAL;
                }
-- 
2.39.2

Reply via email to