diff options
author | Alexander Chernavin <achernavin@netgate.com> | 2020-05-21 10:06:19 -0400 |
---|---|---|
committer | Matthew Smith <mgsmith@netgate.com> | 2020-05-24 23:32:07 +0000 |
commit | afc233aa93c3f23b30b756cb4ae2967f968bbbb1 (patch) | |
tree | 5142345b396d5a87963163b9570486cce2e65f49 | |
parent | e6db7752df1980cc3f4f6328d12444a79cd02c2b (diff) |
dpdk: del warnings that duplicate counters in esp
Type: improvement
Change-Id: I51cbe5c76a88d7fa65fa24dc1528e4f991eba534
Signed-off-by: Alexander Chernavin <achernavin@netgate.com>
-rw-r--r-- | src/plugins/dpdk/ipsec/esp_decrypt.c | 6 | ||||
-rw-r--r-- | src/plugins/dpdk/ipsec/esp_encrypt.c | 6 |
2 files changed, 0 insertions, 12 deletions
diff --git a/src/plugins/dpdk/ipsec/esp_decrypt.c b/src/plugins/dpdk/ipsec/esp_decrypt.c index ae35ab5aaae..dffcc83fa75 100644 --- a/src/plugins/dpdk/ipsec/esp_decrypt.c +++ b/src/plugins/dpdk/ipsec/esp_decrypt.c @@ -194,8 +194,6 @@ dpdk_esp_decrypt_inline (vlib_main_t * vm, if (PREDICT_FALSE (res_idx == (u16) ~ 0)) { - clib_warning ("unsupported SA by thread index %u", - thread_idx); if (is_ip6) vlib_node_increment_counter (vm, dpdk_esp6_decrypt_node.index, @@ -214,7 +212,6 @@ dpdk_esp_decrypt_inline (vlib_main_t * vm, error = crypto_get_session (&session, sa_index0, res, cwm, 0); if (PREDICT_FALSE (error || !session)) { - clib_warning ("failed to get crypto session"); if (is_ip6) vlib_node_increment_counter (vm, dpdk_esp6_decrypt_node.index, @@ -238,7 +235,6 @@ dpdk_esp_decrypt_inline (vlib_main_t * vm, if (ipsec_sa_anti_replay_check (sa0, clib_host_to_net_u32 (esp0->seq))) { - clib_warning ("failed anti-replay check"); if (is_ip6) vlib_node_increment_counter (vm, dpdk_esp6_decrypt_node.index, @@ -286,8 +282,6 @@ dpdk_esp_decrypt_inline (vlib_main_t * vm, if (payload_len & (cipher_alg->boundary - 1)) { - clib_warning ("payload %u not multiple of %d\n", - payload_len, cipher_alg->boundary); if (is_ip6) vlib_node_increment_counter (vm, dpdk_esp6_decrypt_node.index, ESP_DECRYPT_ERROR_BAD_LEN, 1); diff --git a/src/plugins/dpdk/ipsec/esp_encrypt.c b/src/plugins/dpdk/ipsec/esp_encrypt.c index f815e4158bb..64b862430b5 100644 --- a/src/plugins/dpdk/ipsec/esp_encrypt.c +++ b/src/plugins/dpdk/ipsec/esp_encrypt.c @@ -243,8 +243,6 @@ dpdk_esp_encrypt_inline (vlib_main_t * vm, if (PREDICT_FALSE (res_idx == (u16) ~ 0)) { - clib_warning ("unsupported SA by thread index %u", - thread_idx); if (is_ip6) vlib_node_increment_counter (vm, dpdk_esp6_encrypt_node.index, @@ -263,7 +261,6 @@ dpdk_esp_encrypt_inline (vlib_main_t * vm, error = crypto_get_session (&session, sa_index0, res, cwm, 1); if (PREDICT_FALSE (error || !session)) { - clib_warning ("failed to get crypto session"); if (is_ip6) vlib_node_increment_counter (vm, dpdk_esp6_encrypt_node.index, @@ -285,9 +282,6 @@ dpdk_esp_encrypt_inline (vlib_main_t * vm, if (PREDICT_FALSE (esp_seq_advance (sa0))) { - clib_warning - ("sequence number counter has cycled SPI %u (0x%08x)", - sa0->spi, sa0->spi); if (is_ip6) vlib_node_increment_counter (vm, dpdk_esp6_encrypt_node.index, |