From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wm0-f66.google.com (mail-wm0-f66.google.com [74.125.82.66]) by dpdk.org (Postfix) with ESMTP id B5BCB4CB3 for ; Tue, 27 Mar 2018 01:19:06 +0200 (CEST) Received: by mail-wm0-f66.google.com with SMTP id l201so149524wmg.0 for ; Mon, 26 Mar 2018 16:19:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=6wind-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :in-reply-to:references; bh=1yvAlCrPbx2aILm9Im9qbtTzi8CQv+0uqKAtkV5Rm3A=; b=Iuc4H0EtMqiXhFJZA14xGAU9mEjfUAgWLib0iSzPesyfD8zefZ8VeO2/Jnb1itmEEE bcpEj3xdV+iXhTUfySvh6zCd678bLuMbp57FXwkxEY1X9k7eN+YwolfG0GFKYE4/HkRc Y6aeHdi0FPz4FOKWKt34uvdPtMRpCH7ZHJEZwAUJkeK9owDhZxdZxt1SqlQsbmtmPGv3 y3hkB+dOk0YC1uwDQ6cEsW20lI1KofxLbrn8InYK1Lv8SncHTWG4ixB6cdcHJyucYAkv +O/m23hVTH0DuTApneYJ5E4kFtQE10WefRTZY68/hDmQ1cv0V8AizNiUTfZZC4QLURR4 RhoQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:in-reply-to:references; bh=1yvAlCrPbx2aILm9Im9qbtTzi8CQv+0uqKAtkV5Rm3A=; b=WJAyOUBvoy+79938uxhlnKor9wweSiIq9HZIRA4ovTcr17vnZHEsxJwe0CR9yzS0r9 5K/0iPNNp+/EO2IAS8ZG6g57pguFqhBreNhkdZRK0QBAeVQG86bD68l8LaXPVw23eLX2 6qfq5U4+GDG2iX1D7K5Iu5MEcHNCdUXxhg3Hd1vXGn8orpm94T8qQdglcRUA1vm5CR1q WMgACRP0mAxjpTWWEemRvdnC/rB6r280M425RxbP6tsiVZg+cA7RS5ktoHbOMNPtgtsD 5hAM8Uob/QOQe2UFL46xuoUi4dCrtGSEUzsEwr7ZPFuzluyyK/WE1Vv8FRoeISCytd5q L11Q== X-Gm-Message-State: AElRT7HyBsBfiOgq59izTLsflS3t64yS6T1z1DmmL3L7xPOFrObJleeX M1+zxHukHYYrHfyFozlnNQbmWx4Z X-Google-Smtp-Source: AG47ELsa5+LGaGZnUAVRzy7zvFUInh05JAI8cy4fywZLol/HlY3Ak+QYmKOwFXVACRq7/nCd+aTdDw== X-Received: by 10.28.218.1 with SMTP id r1mr15625977wmg.156.1522106345878; Mon, 26 Mar 2018 16:19:05 -0700 (PDT) Received: from bidouze.dev.6wind.com. (host.78.145.23.62.rev.coltfrance.com. [62.23.145.78]) by smtp.gmail.com with ESMTPSA id 67sm343712wra.9.2018.03.26.16.19.04 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Mar 2018 16:19:05 -0700 (PDT) From: Gaetan Rivet To: dev@dpdk.org Cc: Gaetan Rivet Date: Tue, 27 Mar 2018 01:18:25 +0200 Message-Id: <86805efc91737ce4ae2b864cadf1508ecd7954f0.1522105876.git.gaetan.rivet@6wind.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: References: In-Reply-To: References: Subject: [dpdk-dev] [PATCH v3 01/20] kvargs: remove rte log dependency X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Mar 2018 23:19:06 -0000 Signed-off-by: Gaetan Rivet --- lib/librte_kvargs/rte_kvargs.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/lib/librte_kvargs/rte_kvargs.c b/lib/librte_kvargs/rte_kvargs.c index 9662375e8..d6b187aac 100644 --- a/lib/librte_kvargs/rte_kvargs.c +++ b/lib/librte_kvargs/rte_kvargs.c @@ -3,10 +3,10 @@ * Copyright(c) 2014 6WIND S.A. */ +#include #include #include -#include #include #include "rte_kvargs.h" @@ -29,7 +29,7 @@ rte_kvargs_tokenize(struct rte_kvargs *kvlist, const char *params) */ kvlist->str = strdup(params); if (kvlist->str == NULL) { - RTE_LOG(ERR, PMD, "Cannot parse arguments: not enough memory\n"); + fprintf(stderr, "Cannot parse arguments: not enough memory\n"); return -1; } @@ -39,14 +39,14 @@ rte_kvargs_tokenize(struct rte_kvargs *kvlist, const char *params) i = kvlist->count; if (i >= RTE_KVARGS_MAX) { - RTE_LOG(ERR, PMD, "Cannot parse arguments: list full\n"); + fprintf(stderr, "Cannot parse arguments: list full\n"); return -1; } kvlist->pairs[i].key = strtok_r(str, RTE_KVARGS_KV_DELIM, &ctx2); kvlist->pairs[i].value = strtok_r(NULL, RTE_KVARGS_KV_DELIM, &ctx2); if (kvlist->pairs[i].key == NULL || kvlist->pairs[i].value == NULL) { - RTE_LOG(ERR, PMD, + fprintf(stderr, "Cannot parse arguments: wrong key or value\n" "params=<%s>\n", params); return -1; @@ -90,7 +90,7 @@ check_for_valid_keys(struct rte_kvargs *kvlist, pair = &kvlist->pairs[i]; ret = is_valid_key(valid, pair->key); if (!ret) { - RTE_LOG(ERR, PMD, + fprintf(stderr, "Error parsing device, invalid key <%s>\n", pair->key); return -1; -- 2.11.0