crypto/dpaa_sec: do not attach session for non-matching qp

if session->qp != qp to be enqueued, it should show an error and
not try to re-attach another qp.

Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com>
This commit is contained in:
Akhil Goyal 2018-08-30 11:20:59 +05:30
parent 3b617ee775
commit 9198b2c227

View File

@ -1448,14 +1448,18 @@ dpaa_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops,
nb_ops = loop; nb_ops = loop;
goto send_pkts; goto send_pkts;
} }
if (unlikely(!ses->qp || ses->qp != qp)) { if (unlikely(!ses->qp)) {
DPAA_SEC_DP_ERR("sess->qp - %p qp %p",
ses->qp, qp);
if (dpaa_sec_attach_sess_q(qp, ses)) { if (dpaa_sec_attach_sess_q(qp, ses)) {
frames_to_send = loop; frames_to_send = loop;
nb_ops = loop; nb_ops = loop;
goto send_pkts; goto send_pkts;
} }
} else if (unlikely(ses->qp != qp)) {
DPAA_SEC_DP_ERR("Old:sess->qp = %p"
" New qp = %p\n", ses->qp, qp);
frames_to_send = loop;
nb_ops = loop;
goto send_pkts;
} }
auth_only_len = op->sym->auth.data.length - auth_only_len = op->sym->auth.data.length -