From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by dpdk.org (Postfix) with ESMTP id 8A206A49F for ; Tue, 23 Jan 2018 13:36:45 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Jan 2018 04:36:44 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,401,1511856000"; d="scan'208";a="195593301" Received: from silpixa00398673.ir.intel.com (HELO silpixa00398673.ger.corp.intel.com) ([10.237.223.54]) by orsmga005.jf.intel.com with ESMTP; 23 Jan 2018 04:36:27 -0800 From: Fan Zhang To: dev@dpdk.org Cc: pablo.de.lara.guarch@intel.com Date: Tue, 23 Jan 2018 12:32:11 +0000 Message-Id: <20180123123211.43797-1-roy.fan.zhang@intel.com> X-Mailer: git-send-email 2.13.6 Subject: [dpdk-dev] [PATCH] examples/ipsec_secgw: fix security session X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Jan 2018 12:36:46 -0000 Fixes: 3da37f682173 ("examples/ipsec_secgw: create session mempools for ethdevs") Some NICs do not have the rte_security context, this patch fixes the segment fault caused by this. Signed-off-by: Fan Zhang --- examples/ipsec-secgw/ipsec-secgw.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/examples/ipsec-secgw/ipsec-secgw.c b/examples/ipsec-secgw/ipsec-secgw.c index 3a28fcceb..c67f79db9 100644 --- a/examples/ipsec-secgw/ipsec-secgw.c +++ b/examples/ipsec-secgw/ipsec-secgw.c @@ -1384,10 +1384,16 @@ cryptodevs_init(void) max_sess_sz = sess_sz; } for (port_id = 0; port_id < rte_eth_dev_count(); port_id++) { + void *sec_ctx; + if ((enabled_port_mask & (1 << port_id)) == 0) continue; - sess_sz = rte_security_session_get_size( - rte_eth_dev_get_sec_ctx(port_id)); + + sec_ctx = rte_eth_dev_get_sec_ctx(port_id); + if (sec_ctx == NULL) + continue; + + sess_sz = rte_security_session_get_size(sec_ctx); if (sess_sz > max_sess_sz) max_sess_sz = sess_sz; } -- 2.13.6