drivers: add newline in dpaa2 logs

Signed-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>
This commit is contained in:
Hemant Agrawal 2017-07-11 20:25:59 +05:30 committed by Thomas Monjalon
parent f60a9f98ec
commit 645bd25ad8
4 changed files with 72 additions and 67 deletions

View File

@ -669,7 +669,7 @@ sec_fd_to_mbuf(const struct qbman_fd *fd)
if (unlikely(DPAA2_GET_FD_IVP(fd))) {
/* TODO complete it. */
RTE_LOG(ERR, PMD, "error: Non inline buffer - WHAT to DO?");
RTE_LOG(ERR, PMD, "error: Non inline buffer - WHAT to DO?\n");
return NULL;
}
op = (struct rte_crypto_op *)DPAA2_IOVA_TO_VADDR(
@ -731,8 +731,8 @@ dpaa2_sec_dequeue_burst(void *qp, struct rte_crypto_op **ops,
/*Issue a volatile dequeue command. */
while (1) {
if (qbman_swp_pull(swp, &pulldesc)) {
RTE_LOG(WARNING, PMD, "SEC VDQ command is not issued."
"QBMAN is busy\n");
RTE_LOG(WARNING, PMD,
"SEC VDQ command is not issued : QBMAN busy\n");
/* Portal was busy, try again */
continue;
}
@ -926,7 +926,7 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev,
sizeof(struct ctxt_priv) + sizeof(struct sec_flc_desc),
RTE_CACHE_LINE_SIZE);
if (priv == NULL) {
RTE_LOG(ERR, PMD, "No Memory for priv CTXT");
RTE_LOG(ERR, PMD, "No Memory for priv CTXT\n");
return -1;
}
@ -937,7 +937,7 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev,
session->cipher_key.data = rte_zmalloc(NULL, xform->cipher.key.length,
RTE_CACHE_LINE_SIZE);
if (session->cipher_key.data == NULL) {
RTE_LOG(ERR, PMD, "No Memory for cipher key");
RTE_LOG(ERR, PMD, "No Memory for cipher key\n");
rte_free(priv);
return -1;
}
@ -980,7 +980,7 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev,
case RTE_CRYPTO_CIPHER_SNOW3G_UEA2:
case RTE_CRYPTO_CIPHER_ZUC_EEA3:
case RTE_CRYPTO_CIPHER_NULL:
RTE_LOG(ERR, PMD, "Crypto: Unsupported Cipher alg %u",
RTE_LOG(ERR, PMD, "Crypto: Unsupported Cipher alg %u\n",
xform->cipher.algo);
goto error_out;
default:
@ -1042,7 +1042,7 @@ dpaa2_sec_auth_init(struct rte_cryptodev *dev,
sizeof(struct sec_flc_desc),
RTE_CACHE_LINE_SIZE);
if (priv == NULL) {
RTE_LOG(ERR, PMD, "No Memory for priv CTXT");
RTE_LOG(ERR, PMD, "No Memory for priv CTXT\n");
return -1;
}
@ -1052,7 +1052,7 @@ dpaa2_sec_auth_init(struct rte_cryptodev *dev,
session->auth_key.data = rte_zmalloc(NULL, xform->auth.key.length,
RTE_CACHE_LINE_SIZE);
if (session->auth_key.data == NULL) {
RTE_LOG(ERR, PMD, "No Memory for auth key");
RTE_LOG(ERR, PMD, "No Memory for auth key\n");
rte_free(priv);
return -1;
}
@ -1112,7 +1112,7 @@ dpaa2_sec_auth_init(struct rte_cryptodev *dev,
case RTE_CRYPTO_AUTH_AES_CMAC:
case RTE_CRYPTO_AUTH_AES_CBC_MAC:
case RTE_CRYPTO_AUTH_ZUC_EIA3:
RTE_LOG(ERR, PMD, "Crypto: Unsupported auth alg %u",
RTE_LOG(ERR, PMD, "Crypto: Unsupported auth alg %u\n",
xform->auth.algo);
goto error_out;
default:
@ -1174,7 +1174,7 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev,
sizeof(struct ctxt_priv) + sizeof(struct sec_flc_desc),
RTE_CACHE_LINE_SIZE);
if (priv == NULL) {
RTE_LOG(ERR, PMD, "No Memory for priv CTXT");
RTE_LOG(ERR, PMD, "No Memory for priv CTXT\n");
return -1;
}
@ -1184,7 +1184,7 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev,
session->aead_key.data = rte_zmalloc(NULL, aead_xform->key.length,
RTE_CACHE_LINE_SIZE);
if (session->aead_key.data == NULL && aead_xform->key.length > 0) {
RTE_LOG(ERR, PMD, "No Memory for aead key");
RTE_LOG(ERR, PMD, "No Memory for aead key\n");
rte_free(priv);
return -1;
}
@ -1207,7 +1207,7 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev,
session->cipher_alg = RTE_CRYPTO_AEAD_AES_GCM;
break;
case RTE_CRYPTO_AEAD_AES_CCM:
RTE_LOG(ERR, PMD, "Crypto: Unsupported AEAD alg %u",
RTE_LOG(ERR, PMD, "Crypto: Unsupported AEAD alg %u\n",
aead_xform->algo);
goto error_out;
default:
@ -1225,7 +1225,7 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev,
&priv->flc_desc[0].desc[1], 1);
if (err < 0) {
PMD_DRV_LOG(ERR, "Crypto: Incorrect key lengths");
PMD_DRV_LOG(ERR, "Crypto: Incorrect key lengths\n");
goto error_out;
}
if (priv->flc_desc[0].desc[1] & 1) {
@ -1308,7 +1308,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev,
sizeof(struct ctxt_priv) + sizeof(struct sec_flc_desc),
RTE_CACHE_LINE_SIZE);
if (priv == NULL) {
RTE_LOG(ERR, PMD, "No Memory for priv CTXT");
RTE_LOG(ERR, PMD, "No Memory for priv CTXT\n");
return -1;
}
@ -1318,7 +1318,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev,
session->cipher_key.data = rte_zmalloc(NULL, cipher_xform->key.length,
RTE_CACHE_LINE_SIZE);
if (session->cipher_key.data == NULL && cipher_xform->key.length > 0) {
RTE_LOG(ERR, PMD, "No Memory for cipher key");
RTE_LOG(ERR, PMD, "No Memory for cipher key\n");
rte_free(priv);
return -1;
}
@ -1326,7 +1326,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev,
session->auth_key.data = rte_zmalloc(NULL, auth_xform->key.length,
RTE_CACHE_LINE_SIZE);
if (session->auth_key.data == NULL && auth_xform->key.length > 0) {
RTE_LOG(ERR, PMD, "No Memory for auth key");
RTE_LOG(ERR, PMD, "No Memory for auth key\n");
rte_free(session->cipher_key.data);
rte_free(priv);
return -1;
@ -1389,7 +1389,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev,
case RTE_CRYPTO_AUTH_AES_CMAC:
case RTE_CRYPTO_AUTH_AES_CBC_MAC:
case RTE_CRYPTO_AUTH_ZUC_EIA3:
RTE_LOG(ERR, PMD, "Crypto: Unsupported auth alg %u",
RTE_LOG(ERR, PMD, "Crypto: Unsupported auth alg %u\n",
auth_xform->algo);
goto error_out;
default:
@ -1423,7 +1423,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev,
case RTE_CRYPTO_CIPHER_3DES_ECB:
case RTE_CRYPTO_CIPHER_AES_ECB:
case RTE_CRYPTO_CIPHER_KASUMI_F8:
RTE_LOG(ERR, PMD, "Crypto: Unsupported Cipher alg %u",
RTE_LOG(ERR, PMD, "Crypto: Unsupported Cipher alg %u\n",
cipher_xform->algo);
goto error_out;
default:
@ -1442,7 +1442,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev,
&priv->flc_desc[0].desc[2], 2);
if (err < 0) {
PMD_DRV_LOG(ERR, "Crypto: Incorrect key lengths");
PMD_DRV_LOG(ERR, "Crypto: Incorrect key lengths\n");
goto error_out;
}
if (priv->flc_desc[0].desc[2] & 1) {
@ -1469,7 +1469,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev,
session->digest_length,
session->dir);
} else {
RTE_LOG(ERR, PMD, "Hash before cipher not supported");
RTE_LOG(ERR, PMD, "Hash before cipher not supported\n");
goto error_out;
}
@ -1503,7 +1503,7 @@ dpaa2_sec_set_session_parameters(struct rte_cryptodev *dev,
PMD_INIT_FUNC_TRACE();
if (unlikely(sess == NULL)) {
RTE_LOG(ERR, PMD, "invalid session struct");
RTE_LOG(ERR, PMD, "invalid session struct\n");
return -1;
}
@ -1539,7 +1539,7 @@ dpaa2_sec_set_session_parameters(struct rte_cryptodev *dev,
dpaa2_sec_aead_init(dev, xform, session);
} else {
RTE_LOG(ERR, PMD, "Invalid crypto type");
RTE_LOG(ERR, PMD, "Invalid crypto type\n");
return -1;
}
@ -1910,7 +1910,7 @@ dpaa2_sec_dev_init(struct rte_cryptodev *cryptodev)
NULL, NULL, NULL, NULL,
SOCKET_ID_ANY, 0);
if (!internals->fle_pool) {
RTE_LOG(ERR, PMD, "%s create failed", str);
RTE_LOG(ERR, PMD, "%s create failed\n", str);
goto init_error;
} else
RTE_LOG(INFO, PMD, "%s created: %p\n", str,

View File

@ -188,7 +188,7 @@ rte_dpaa2_mbuf_release(struct rte_mempool *pool __rte_unused,
if (unlikely(!DPAA2_PER_LCORE_DPIO)) {
ret = dpaa2_affine_qbman_swp();
if (ret != 0) {
RTE_LOG(ERR, PMD, "Failed to allocate IO portal");
RTE_LOG(ERR, PMD, "Failed to allocate IO portal\n");
return;
}
}
@ -267,7 +267,7 @@ rte_dpaa2_mbuf_alloc_bulk(struct rte_mempool *pool,
if (unlikely(!DPAA2_PER_LCORE_DPIO)) {
ret = dpaa2_affine_qbman_swp();
if (ret != 0) {
RTE_LOG(ERR, PMD, "Failed to allocate IO portal");
RTE_LOG(ERR, PMD, "Failed to allocate IO portal\n");
return ret;
}
}
@ -323,7 +323,7 @@ rte_hw_mbuf_free_bulk(struct rte_mempool *pool,
bp_info = mempool_to_bpinfo(pool);
if (!(bp_info->bp_list)) {
RTE_LOG(ERR, PMD, "DPAA2 buffer pool not configured");
RTE_LOG(ERR, PMD, "DPAA2 buffer pool not configured\n");
return -ENOENT;
}
rte_dpaa2_mbuf_release(pool, obj_table, bp_info->bpid,
@ -341,7 +341,7 @@ rte_hw_mbuf_get_count(const struct rte_mempool *mp)
struct dpaa2_dpbp_dev *dpbp_node;
if (!mp || !mp->pool_data) {
RTE_LOG(ERR, PMD, "Invalid mempool provided");
RTE_LOG(ERR, PMD, "Invalid mempool provided\n");
return 0;
}
@ -351,12 +351,12 @@ rte_hw_mbuf_get_count(const struct rte_mempool *mp)
ret = dpbp_get_num_free_bufs(&dpbp_node->dpbp, CMD_PRI_LOW,
dpbp_node->token, &num_of_bufs);
if (ret) {
RTE_LOG(ERR, PMD, "Unable to obtain free buf count (err=%d)",
RTE_LOG(ERR, PMD, "Unable to obtain free buf count (err=%d)\n",
ret);
return 0;
}
RTE_LOG(DEBUG, PMD, "Free bufs = %u", num_of_bufs);
RTE_LOG(DEBUG, PMD, "Free bufs = %u\n", num_of_bufs);
return num_of_bufs;
}

View File

@ -91,8 +91,9 @@ dpaa2_setup_flow_dist(struct rte_eth_dev *eth_dev,
&tc_cfg);
rte_free(p_params);
if (ret) {
RTE_LOG(ERR, PMD, "Setting distribution for Rx failed with"
" err code: %d\n", ret);
RTE_LOG(ERR, PMD,
"Setting distribution for Rx failed with err: %d\n",
ret);
return ret;
}
@ -134,8 +135,9 @@ int dpaa2_remove_flow_dist(
&tc_cfg);
rte_free(p_params);
if (ret) {
RTE_LOG(ERR, PMD, "Setting distribution for Rx failed with"
" err code: %d\n", ret);
RTE_LOG(ERR, PMD,
"Setting distribution for Rx failed with err: %d\n",
ret);
return ret;
}
return ret;

View File

@ -121,7 +121,7 @@ dpaa2_vlan_filter_set(struct rte_eth_dev *dev, uint16_t vlan_id, int on)
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return -1;
}
@ -156,7 +156,7 @@ dpaa2_vlan_offload_set(struct rte_eth_dev *dev, int mask)
ret = dpni_enable_vlan_filter(dpni, CMD_PRI_LOW,
priv->token, false);
if (ret < 0)
RTE_LOG(ERR, PMD, "Unable to set vlan filter ret = %d",
RTE_LOG(ERR, PMD, "Unable to set vlan filter = %d\n",
ret);
}
}
@ -721,17 +721,17 @@ dpaa2_dev_promiscuous_enable(
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return;
}
ret = dpni_set_unicast_promisc(dpni, CMD_PRI_LOW, priv->token, true);
if (ret < 0)
RTE_LOG(ERR, PMD, "Unable to enable U promisc mode %d", ret);
RTE_LOG(ERR, PMD, "Unable to enable U promisc mode %d\n", ret);
ret = dpni_set_multicast_promisc(dpni, CMD_PRI_LOW, priv->token, true);
if (ret < 0)
RTE_LOG(ERR, PMD, "Unable to enable M promisc mode %d", ret);
RTE_LOG(ERR, PMD, "Unable to enable M promisc mode %d\n", ret);
}
static void
@ -745,19 +745,20 @@ dpaa2_dev_promiscuous_disable(
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return;
}
ret = dpni_set_unicast_promisc(dpni, CMD_PRI_LOW, priv->token, false);
if (ret < 0)
RTE_LOG(ERR, PMD, "Unable to disable U promisc mode %d", ret);
RTE_LOG(ERR, PMD, "Unable to disable U promisc mode %d\n", ret);
if (dev->data->all_multicast == 0) {
ret = dpni_set_multicast_promisc(dpni, CMD_PRI_LOW,
priv->token, false);
if (ret < 0)
RTE_LOG(ERR, PMD, "Unable to disable M promisc mode %d",
RTE_LOG(ERR, PMD,
"Unable to disable M promisc mode %d\n",
ret);
}
}
@ -773,13 +774,13 @@ dpaa2_dev_allmulticast_enable(
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return;
}
ret = dpni_set_multicast_promisc(dpni, CMD_PRI_LOW, priv->token, true);
if (ret < 0)
RTE_LOG(ERR, PMD, "Unable to enable multicast mode %d", ret);
RTE_LOG(ERR, PMD, "Unable to enable multicast mode %d\n", ret);
}
static void
@ -792,7 +793,7 @@ dpaa2_dev_allmulticast_disable(struct rte_eth_dev *dev)
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return;
}
@ -802,7 +803,7 @@ dpaa2_dev_allmulticast_disable(struct rte_eth_dev *dev)
ret = dpni_set_multicast_promisc(dpni, CMD_PRI_LOW, priv->token, false);
if (ret < 0)
RTE_LOG(ERR, PMD, "Unable to disable multicast mode %d", ret);
RTE_LOG(ERR, PMD, "Unable to disable multicast mode %d\n", ret);
}
static int
@ -816,7 +817,7 @@ dpaa2_dev_mtu_set(struct rte_eth_dev *dev, uint16_t mtu)
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return -EINVAL;
}
@ -855,15 +856,15 @@ dpaa2_dev_add_mac_addr(struct rte_eth_dev *dev,
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return -1;
}
ret = dpni_add_mac_addr(dpni, CMD_PRI_LOW,
priv->token, addr->addr_bytes);
if (ret)
RTE_LOG(ERR, PMD, "error: Adding the MAC ADDR failed:"
" err = %d", ret);
RTE_LOG(ERR, PMD,
"error: Adding the MAC ADDR failed: err = %d\n", ret);
return 0;
}
@ -882,15 +883,15 @@ dpaa2_dev_remove_mac_addr(struct rte_eth_dev *dev,
macaddr = &data->mac_addrs[index];
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return;
}
ret = dpni_remove_mac_addr(dpni, CMD_PRI_LOW,
priv->token, macaddr->addr_bytes);
if (ret)
RTE_LOG(ERR, PMD, "error: Removing the MAC ADDR failed:"
" err = %d", ret);
RTE_LOG(ERR, PMD,
"error: Removing the MAC ADDR failed: err = %d\n", ret);
}
static void
@ -904,7 +905,7 @@ dpaa2_dev_set_mac_addr(struct rte_eth_dev *dev,
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return;
}
@ -912,7 +913,8 @@ dpaa2_dev_set_mac_addr(struct rte_eth_dev *dev,
priv->token, addr->addr_bytes);
if (ret)
RTE_LOG(ERR, PMD, "error: Setting the MAC ADDR failed %d", ret);
RTE_LOG(ERR, PMD,
"error: Setting the MAC ADDR failed %d\n", ret);
}
static
void dpaa2_dev_stats_get(struct rte_eth_dev *dev,
@ -929,12 +931,12 @@ void dpaa2_dev_stats_get(struct rte_eth_dev *dev,
PMD_INIT_FUNC_TRACE();
if (!dpni) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return;
}
if (!stats) {
RTE_LOG(ERR, PMD, "stats is NULL");
RTE_LOG(ERR, PMD, "stats is NULL\n");
return;
}
@ -987,7 +989,7 @@ void dpaa2_dev_stats_reset(struct rte_eth_dev *dev)
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return;
}
@ -1016,7 +1018,7 @@ dpaa2_dev_link_update(struct rte_eth_dev *dev,
PMD_INIT_FUNC_TRACE();
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "error : dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return 0;
}
memset(&old, 0, sizeof(old));
@ -1024,7 +1026,7 @@ dpaa2_dev_link_update(struct rte_eth_dev *dev,
ret = dpni_get_link_state(dpni, CMD_PRI_LOW, priv->token, &state);
if (ret < 0) {
RTE_LOG(ERR, PMD, "error: dpni_get_link_state %d", ret);
RTE_LOG(ERR, PMD, "error: dpni_get_link_state %d\n", ret);
return -1;
}
@ -1069,7 +1071,7 @@ dpaa2_dev_set_link_up(struct rte_eth_dev *dev)
dpni = (struct fsl_mc_io *)priv->hw;
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "Device has not yet been configured");
RTE_LOG(ERR, PMD, "DPNI is NULL\n");
return ret;
}
@ -1116,7 +1118,7 @@ dpaa2_dev_set_link_down(struct rte_eth_dev *dev)
dpni = (struct fsl_mc_io *)priv->hw;
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "Device has not yet been configured");
RTE_LOG(ERR, PMD, "Device has not yet been configured\n");
return ret;
}
@ -1170,13 +1172,13 @@ dpaa2_flow_ctrl_get(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf)
dpni = (struct fsl_mc_io *)priv->hw;
if (dpni == NULL || fc_conf == NULL) {
RTE_LOG(ERR, PMD, "device not configured");
RTE_LOG(ERR, PMD, "device not configured\n");
return ret;
}
ret = dpni_get_link_state(dpni, CMD_PRI_LOW, priv->token, &state);
if (ret) {
RTE_LOG(ERR, PMD, "error: dpni_get_link_state %d", ret);
RTE_LOG(ERR, PMD, "error: dpni_get_link_state %d\n", ret);
return ret;
}
@ -1226,7 +1228,7 @@ dpaa2_flow_ctrl_set(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf)
dpni = (struct fsl_mc_io *)priv->hw;
if (dpni == NULL) {
RTE_LOG(ERR, PMD, "dpni is NULL");
RTE_LOG(ERR, PMD, "dpni is NULL\n");
return ret;
}
@ -1236,7 +1238,7 @@ dpaa2_flow_ctrl_set(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf)
*/
ret = dpni_get_link_state(dpni, CMD_PRI_LOW, priv->token, &state);
if (ret) {
RTE_LOG(ERR, PMD, "Unable to get link state (err=%d)", ret);
RTE_LOG(ERR, PMD, "Unable to get link state (err=%d)\n", ret);
return -1;
}
@ -1281,14 +1283,15 @@ dpaa2_flow_ctrl_set(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf)
cfg.options &= ~DPNI_LINK_OPT_ASYM_PAUSE;
break;
default:
RTE_LOG(ERR, PMD, "Incorrect Flow control flag (%d)",
RTE_LOG(ERR, PMD, "Incorrect Flow control flag (%d)\n",
fc_conf->mode);
return -1;
}
ret = dpni_set_link_cfg(dpni, CMD_PRI_LOW, priv->token, &cfg);
if (ret)
RTE_LOG(ERR, PMD, "Unable to set Link configuration (err=%d)",
RTE_LOG(ERR, PMD,
"Unable to set Link configuration (err=%d)\n",
ret);
/* Enable link */