get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/39123/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 39123,
    "url": "https://patches.dpdk.org/api/patches/39123/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20180427162556.22781-2-shreyansh.jain@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20180427162556.22781-2-shreyansh.jain@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20180427162556.22781-2-shreyansh.jain@nxp.com",
    "date": "2018-04-27T16:25:54",
    "name": "[dpdk-dev,1/3] crypto/dpaa_sec: remove ctx based offset for PA-VA conversion",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "31bdc01a85f0025d04ef1ef89452b99e50e34efb",
    "submitter": {
        "id": 497,
        "url": "https://patches.dpdk.org/api/people/497/?format=api",
        "name": "Shreyansh Jain",
        "email": "shreyansh.jain@nxp.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20180427162556.22781-2-shreyansh.jain@nxp.com/mbox/",
    "series": [],
    "comments": "https://patches.dpdk.org/api/patches/39123/comments/",
    "check": "fail",
    "checks": "https://patches.dpdk.org/api/patches/39123/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 0521CAAC4;\n\tFri, 27 Apr 2018 18:10:09 +0200 (CEST)",
            "from EUR01-VE1-obe.outbound.protection.outlook.com\n\t(mail-ve1eur01on0066.outbound.protection.outlook.com [104.47.1.66])\n\tby dpdk.org (Postfix) with ESMTP id F318EAAC0\n\tfor <dev@dpdk.org>; Fri, 27 Apr 2018 18:10:06 +0200 (CEST)",
            "from Tophie.ap.freescale.net (14.142.187.166) by\n\tDB6PR0402MB2774.eurprd04.prod.outlook.com (2603:10a6:4:96::11) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.696.15;\n\tFri, 27 Apr 2018 16:10:02 +0000"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n\tbh=3lDyEBwhCoK2AKBktkcUrouGBdjVFw0a+nZEwdejVGk=;\n\tb=pn3xbj4A4LgHMMgAEGrlbPqx8BesU7+JcK0nKCT/4iRiSp7GJxyPLQ/wwlAqOUXf7bqU5yGFfLiRyjVH58SnAswQSh54dNwUPGLrqWbg+S6F12LuFIEaJcX6U41ePCKGUJzSO9wGshVqAwu017tz3zFzChqAbr8qnutXBEnkr/8=",
        "Authentication-Results": "spf=none (sender IP is )\n\tsmtp.mailfrom=shreyansh.jain@nxp.com; ",
        "From": "Shreyansh Jain <shreyansh.jain@nxp.com>",
        "To": "thomas@monjalon.net,\n\tdev@dpdk.org",
        "Cc": "hemant.agrawal@nxp.com, akhil.goyal@nxp.com, anatoly.burakov@intel.com, \n\tShreyansh Jain <shreyansh.jain@nxp.com>",
        "Date": "Fri, 27 Apr 2018 21:55:54 +0530",
        "Message-Id": "<20180427162556.22781-2-shreyansh.jain@nxp.com>",
        "X-Mailer": "git-send-email 2.14.1",
        "In-Reply-To": "<20180427162556.22781-1-shreyansh.jain@nxp.com>",
        "References": "<20180427162556.22781-1-shreyansh.jain@nxp.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-Originating-IP": "[14.142.187.166]",
        "X-ClientProxiedBy": "OSAPR01CA0035.jpnprd01.prod.outlook.com\n\t(2603:1096:603:14::23) To DB6PR0402MB2774.eurprd04.prod.outlook.com\n\t(2603:10a6:4:96::11)",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-HT": "Tenant",
        "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);\n\tSRVR:DB6PR0402MB2774; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; DB6PR0402MB2774;\n\t3:CSyj+YejlU+bvEETPIHqHxw3IDK6a550NIw59myiNUK8jo5RMIcqYCQdtPcijiyBMZITX9yXysU18p91PjiIaaIdgzpzPEXnbdqZ2IumHh703nABeEhJmz4y6Cf/IAXx2JkCMXbGOMBC2o+LyUtih0YlBcdz2rDLWE76TB5PsNSKq4vZZwimD7upezlJ+g1z30FaVSTzWn8/zA2aJwFthW21JGYCfLQsDdsc6KVsqY3gGsdiaVmeogSwg2jx6i0D;\n\t25:xidfwO+IdZE5VSBlkHORQO7YKZ9pmqOwFCNwjqnszQb4dmmucUvE2uR4UOnY38KbJBzeyH6hfn7RJdrYRvombV4XFx7mDgFuSGe2zb8d0+fx9pZUHGuSEfgf7QaCqqDJzhsxCFseGvY121cwzeUKJl7BDArXTHRN2XquvfCCpHIfquh1P3tWhYw2BpYOv7/X1Oxc2p+MhzmiLLoOsxAE1bdVS6W+DeFfj5tnPzAJZFF3iZvhg8OfVmeIUioEv1Q5IQJAcwxjrLUX2JXuLbSNWnyr16REyFkw81em0loPI0nEp+Agw6/sAB2BeVEq5sfpVPFvQ1Gn1/7piBHi+LaRBg==;\n\t31:AuCD1AIHZtmQ4ad0bFMV/0Y2JwmKNMoF6+8NCxGyPx3lnHtQ3K2tCo7J8vgS2186DoE9hs2OrLYa3kCavGVo4/sLBfT1uQ+gzECJq1bStkQZaPch+jW5Juq1XQ0G8VyhK5tuK8HPxO2S3/PKRem4F2nkngRNqRXwr5Bg7sjlSypKwOle+gyNSxyy/hSOUpD9z3bXdDTi2CP+rFW2AKccX3eTcM6KlcSIXTMdAuP9Kyc=",
            "1; DB6PR0402MB2774;\n\t20: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;\n\t4:/AdGIWzxUt9zwMs3ytxDsb881ivRU/fbzaC6OG7Ss6tt35i535A+cuLwWAuuxy7eLdFb+DK0dSch0rYHLV0WGuQVfX/opdH+33QF07X8Xh0fDP0+uAaeP83lld8FmdoppQ3uJ5kKByz/QErwZN6qguVpQkNDyh7TUkFEsmsBJaL2NkKTej/aTdzAa0HpQBTw20IM/XqCQu8dZNEaAv9n9TKJlZbqjOfYez94VA4+syE3gpIHIgaJjCmz6LMYH44ANCEmEg6uBhpz5jGXDMY6XI3uB1yqw+CSXQR50tstpJBm87O3+E4pZl7DeyTUaCfV",
            "=?us-ascii?Q?1; DB6PR0402MB2774;\n\t23:Lt0SfeFQdAm3FBI0grZbBBzrrHsy+vFGB3dwyr+?=\n\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",
            "1; DB6PR0402MB2774;\n\t6:vODmCSEQu+iWK+rxpks4TyoKMvuz2yfAjLqN7+CBqGXzG3FbXnYWirw635CGKLwhAPWSk5LYQZFx1GiDNYEdXC+Z2h0K+j/y/yUm5RjE+rp3bAz4fyKW7sWn2p415gGLpF6U2dk7tfx81K+3d6MDF+3fM8G3jrEkxuyMjhVdy8OFYQj4z9SE8UNWX8C+a89wbtRF9p543Sm0D7ve6tHt5+8m3hF9DDHA01e2s7xZbBJZeaRwQen1NkIf3OUz2TZ644j9Ct6YJ+nwhQzRnDN/U0ucYXvmx3xS3ubG/Wv6d3+MUPkJNO/EW6e3Qc/u8Jhsnkp8hSGPSwF8PJsu6xbMmdy5B7nLr2p3TFCKgzifTySe9oLhDjupX9bZjRabb/g1cuuMJ7vb5+GFrCDNIjgpfMq4L+IktMy2abGy3Uu6YRAX2WkCYCBjW9PVXVMDitgwpXcf+xxHgefPFLLovG6tFA==;\n\t5:dPmoBDoc06O2hRMHem3DKpO2mwgh+oMJwsb9IJB9owZ6tCVZTBgcdJDzGxQxrA2FWa1HXcTf9dEULXFB1uiNzUAwcxHJwEIG1i1g+RMRkjk9Zt0h2BZk1DR4c7FgkIFVL/ClqdBMyXS4IE5ALIgQFoIPEQO7OfLqkcn3KHxZ6vA=;\n\t24:KyQjSatoyXeKnQukDvFCgG4zCKL2KOpyZUdtiFdwgTj6MJPnasdHu1NKzPfUGDPZ2Z9MtY7uAa3S8wGRrePI83jCbZyBwJ6y2/R7xAOWsHk=",
            "1; DB6PR0402MB2774;\n\t7:IZVtfgSKkRG6T6GwhFTb8QuIU2V+fmfjG6KXVS4Kit2ikXRRg5nuUI8gpLOt2ev/hpLzTw1y870nDhadM3aiFCkPvegC2n/HOzYbOEcOv9zGPTyVsBlmU7jbuq9YNLhn7/6gHK3+uS9RFSv+jI11o5OzJDCWQ4P4JEwJNO8RNcsGdNFk1UWsAltBkNPuHIGGq4FSNbJ8997B9bOsqRruFBpUOX0C6xEUM8sMJO/HPgM5tkAPX4UYVxjqWXkGg95A"
        ],
        "X-MS-TrafficTypeDiagnostic": "DB6PR0402MB2774:",
        "X-Microsoft-Antispam-PRVS": "<DB6PR0402MB27748E73FA6A170A1976C2DF908D0@DB6PR0402MB2774.eurprd04.prod.outlook.com>",
        "X-Exchange-Antispam-Report-Test": "UriScan:(185117386973197);",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231232)(944501410)(52105095)(93006095)(93001095)(6055026)(6041310)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123558120)(6072148)(201708071742011);\n\tSRVR:DB6PR0402MB2774; BCL:0; PCL:0; RULEID:; SRVR:DB6PR0402MB2774; ",
        "X-Forefront-PRVS": "0655F9F006",
        "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(39860400002)(346002)(366004)(39380400002)(376002)(396003)(189003)(199004)(36756003)(68736007)(478600001)(8676002)(3846002)(5009440100003)(52116002)(8936002)(51416003)(6116002)(16586007)(81166006)(1076002)(105586002)(2906002)(5660300001)(81156014)(106356001)(50226002)(48376002)(50466002)(305945005)(25786009)(6512007)(6486002)(7736002)(316002)(6666003)(2616005)(16526019)(186003)(11346002)(76176011)(55236004)(44832011)(26005)(53936002)(486006)(386003)(476003)(956004)(97736004)(66066001)(86362001)(6506007)(446003)(4326008)(47776003)(110426005);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:DB6PR0402MB2774;\n\tH:Tophie.ap.freescale.net; \n\tFPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; ",
        "Received-SPF": "None (protection.outlook.com: nxp.com does not designate\n\tpermitted sender hosts)",
        "X-Microsoft-Antispam-Message-Info": "xlvHBdIgs5DieLz798ydZSCtt3XYJhRAfyLWEVyZ42cahcweDYG1pFuiS79MqRDCM2ta1EwUdU3TU4cw/xaDqfArx7oPT13VVY33H84SXtgMek0vOwEXUSgT4OJLlqg5yON0gfmfq90ye7hkIWN7wXVGwcNQtsjAxtvRI16oZY1/m8E1S7I3UCGIqhUrTGy4",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-MS-Office365-Filtering-Correlation-Id": "a897a191-c9cc-4586-746d-08d5ac595704",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "27 Apr 2018 16:10:02.0707\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "a897a191-c9cc-4586-746d-08d5ac595704",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DB6PR0402MB2774",
        "Subject": "[dpdk-dev] [PATCH 1/3] crypto/dpaa_sec: remove ctx based offset for\n\tPA-VA conversion",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Crypto requires physical to virtual address conversion for\ndescriptors. Prior to memory hotplugging this was based on memseg\niteration assuming memsegs are all physical contiguous and using\ncached start address fast calculations can be done. This\nassumption now stands invalid with memory hotplugging support.\n\nIn preparation for supporting hotplugging change to memory,\nthis patchset removes the optimized pool context stored physical\naddress offset based PA-VA conversion.\n\nSigned-off-by: Shreyansh Jain <shreyansh.jain@nxp.com>\n---\n\nThis adversely affects the performance as complete memsegs now need\nto be parsed, but a rework containing necessary optimzation would be\nposted over this.\n\n drivers/crypto/dpaa_sec/dpaa_sec.c | 49 ++++++++++++++++----------------------\n 1 file changed, 20 insertions(+), 29 deletions(-)",
    "diff": "diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c\nindex e456fd542..06f7e4373 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.c\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.c\n@@ -103,13 +103,6 @@ dpaa_mem_vtop(void *vaddr)\n \treturn (size_t)NULL;\n }\n \n-/* virtual address conversin when mempool support is available for ctx */\n-static inline phys_addr_t\n-dpaa_mem_vtop_ctx(struct dpaa_sec_op_ctx *ctx, void *vaddr)\n-{\n-\treturn (size_t)vaddr - ctx->vtop_offset;\n-}\n-\n static inline void *\n dpaa_mem_ptov(rte_iova_t paddr)\n {\n@@ -630,7 +623,7 @@ build_auth_only_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \tin_sg->extension = 1;\n \tin_sg->final = 1;\n \tin_sg->length = sym->auth.data.length;\n-\tqm_sg_entry_set64(in_sg, dpaa_mem_vtop_ctx(ctx, &cf->sg[2]));\n+\tqm_sg_entry_set64(in_sg, dpaa_mem_vtop(&cf->sg[2]));\n \n \t/* 1st seg */\n \tsg = in_sg + 1;\n@@ -654,7 +647,7 @@ build_auth_only_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \t\tsg++;\n \t\trte_memcpy(old_digest, sym->auth.digest.data,\n \t\t\t\tses->digest_length);\n-\t\tstart_addr = dpaa_mem_vtop_ctx(ctx, old_digest);\n+\t\tstart_addr = dpaa_mem_vtop(old_digest);\n \t\tqm_sg_entry_set64(sg, start_addr);\n \t\tsg->length = ses->digest_length;\n \t\tin_sg->length += ses->digest_length;\n@@ -708,7 +701,7 @@ build_auth_only(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \tif (is_decode(ses)) {\n \t\t/* need to extend the input to a compound frame */\n \t\tsg->extension = 1;\n-\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, &cf->sg[2]));\n+\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop(&cf->sg[2]));\n \t\tsg->length = sym->auth.data.length + ses->digest_length;\n \t\tsg->final = 1;\n \t\tcpu_to_hw_sg(sg);\n@@ -722,7 +715,7 @@ build_auth_only(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \t\tcpu_to_hw_sg(sg);\n \n \t\t/* let's check digest by hw */\n-\t\tstart_addr = dpaa_mem_vtop_ctx(ctx, old_digest);\n+\t\tstart_addr = dpaa_mem_vtop(old_digest);\n \t\tsg++;\n \t\tqm_sg_entry_set64(sg, start_addr);\n \t\tsg->length = ses->digest_length;\n@@ -775,7 +768,7 @@ build_cipher_only_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \tout_sg = &cf->sg[0];\n \tout_sg->extension = 1;\n \tout_sg->length = sym->cipher.data.length;\n-\tqm_sg_entry_set64(out_sg, dpaa_mem_vtop_ctx(ctx, &cf->sg[2]));\n+\tqm_sg_entry_set64(out_sg, dpaa_mem_vtop(&cf->sg[2]));\n \tcpu_to_hw_sg(out_sg);\n \n \t/* 1st seg */\n@@ -804,7 +797,7 @@ build_cipher_only_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \tin_sg->length = sym->cipher.data.length + ses->iv.length;\n \n \tsg++;\n-\tqm_sg_entry_set64(in_sg, dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(in_sg, dpaa_mem_vtop(sg));\n \tcpu_to_hw_sg(in_sg);\n \n \t/* IV */\n@@ -871,7 +864,7 @@ build_cipher_only(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \tsg->extension = 1;\n \tsg->final = 1;\n \tsg->length = sym->cipher.data.length + ses->iv.length;\n-\tqm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, &cf->sg[2]));\n+\tqm_sg_entry_set64(sg, dpaa_mem_vtop(&cf->sg[2]));\n \tcpu_to_hw_sg(sg);\n \n \tsg = &cf->sg[2];\n@@ -937,7 +930,7 @@ build_cipher_auth_gcm_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \n \t/* output sg entries */\n \tsg = &cf->sg[2];\n-\tqm_sg_entry_set64(out_sg, dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(out_sg, dpaa_mem_vtop(sg));\n \tcpu_to_hw_sg(out_sg);\n \n \t/* 1st seg */\n@@ -981,7 +974,7 @@ build_cipher_auth_gcm_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \n \t/* input sg entries */\n \tsg++;\n-\tqm_sg_entry_set64(in_sg, dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(in_sg, dpaa_mem_vtop(sg));\n \tcpu_to_hw_sg(in_sg);\n \n \t/* 1st seg IV */\n@@ -1018,7 +1011,7 @@ build_cipher_auth_gcm_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \t\tsg++;\n \t\tmemcpy(ctx->digest, sym->aead.digest.data,\n \t\t\tses->digest_length);\n-\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, ctx->digest));\n+\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop(ctx->digest));\n \t\tsg->length = ses->digest_length;\n \t}\n \tsg->final = 1;\n@@ -1056,7 +1049,7 @@ build_cipher_auth_gcm(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \t/* input */\n \trte_prefetch0(cf->sg);\n \tsg = &cf->sg[2];\n-\tqm_sg_entry_set64(&cf->sg[1], dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(&cf->sg[1], dpaa_mem_vtop(sg));\n \tif (is_encode(ses)) {\n \t\tqm_sg_entry_set64(sg, dpaa_mem_vtop(IV_ptr));\n \t\tsg->length = ses->iv.length;\n@@ -1101,7 +1094,7 @@ build_cipher_auth_gcm(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \t\t       ses->digest_length);\n \t\tsg++;\n \n-\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, ctx->digest));\n+\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop(ctx->digest));\n \t\tsg->length = ses->digest_length;\n \t\tlength += sg->length;\n \t\tsg->final = 1;\n@@ -1115,7 +1108,7 @@ build_cipher_auth_gcm(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \n \t/* output */\n \tsg++;\n-\tqm_sg_entry_set64(&cf->sg[0], dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(&cf->sg[0], dpaa_mem_vtop(sg));\n \tqm_sg_entry_set64(sg,\n \t\tdst_start_addr + sym->aead.data.offset - ses->auth_only_len);\n \tsg->length = sym->aead.data.length + ses->auth_only_len;\n@@ -1184,7 +1177,7 @@ build_cipher_auth_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \n \t/* output sg entries */\n \tsg = &cf->sg[2];\n-\tqm_sg_entry_set64(out_sg, dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(out_sg, dpaa_mem_vtop(sg));\n \tcpu_to_hw_sg(out_sg);\n \n \t/* 1st seg */\n@@ -1226,7 +1219,7 @@ build_cipher_auth_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \n \t/* input sg entries */\n \tsg++;\n-\tqm_sg_entry_set64(in_sg, dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(in_sg, dpaa_mem_vtop(sg));\n \tcpu_to_hw_sg(in_sg);\n \n \t/* 1st seg IV */\n@@ -1256,7 +1249,7 @@ build_cipher_auth_sg(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \t\tsg++;\n \t\tmemcpy(ctx->digest, sym->auth.digest.data,\n \t\t\tses->digest_length);\n-\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, ctx->digest));\n+\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop(ctx->digest));\n \t\tsg->length = ses->digest_length;\n \t}\n \tsg->final = 1;\n@@ -1293,7 +1286,7 @@ build_cipher_auth(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \t/* input */\n \trte_prefetch0(cf->sg);\n \tsg = &cf->sg[2];\n-\tqm_sg_entry_set64(&cf->sg[1], dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(&cf->sg[1], dpaa_mem_vtop(sg));\n \tif (is_encode(ses)) {\n \t\tqm_sg_entry_set64(sg, dpaa_mem_vtop(IV_ptr));\n \t\tsg->length = ses->iv.length;\n@@ -1323,7 +1316,7 @@ build_cipher_auth(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \t\t       ses->digest_length);\n \t\tsg++;\n \n-\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, ctx->digest));\n+\t\tqm_sg_entry_set64(sg, dpaa_mem_vtop(ctx->digest));\n \t\tsg->length = ses->digest_length;\n \t\tlength += sg->length;\n \t\tsg->final = 1;\n@@ -1337,7 +1330,7 @@ build_cipher_auth(struct rte_crypto_op *op, dpaa_sec_session *ses)\n \n \t/* output */\n \tsg++;\n-\tqm_sg_entry_set64(&cf->sg[0], dpaa_mem_vtop_ctx(ctx, sg));\n+\tqm_sg_entry_set64(&cf->sg[0], dpaa_mem_vtop(sg));\n \tqm_sg_entry_set64(sg, dst_start_addr + sym->cipher.data.offset);\n \tsg->length = sym->cipher.data.length;\n \tlength = sg->length;\n@@ -1412,7 +1405,6 @@ dpaa_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops,\n \tstruct rte_crypto_op *op;\n \tstruct dpaa_sec_job *cf;\n \tdpaa_sec_session *ses;\n-\tstruct dpaa_sec_op_ctx *ctx;\n \tuint32_t auth_only_len;\n \tstruct qman_fq *inq[DPAA_SEC_BURST];\n \n@@ -1497,8 +1489,7 @@ dpaa_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops,\n \t\t\tinq[loop] = ses->inq;\n \t\t\tfd->opaque_addr = 0;\n \t\t\tfd->cmd = 0;\n-\t\t\tctx = container_of(cf, struct dpaa_sec_op_ctx, job);\n-\t\t\tqm_fd_addr_set64(fd, dpaa_mem_vtop_ctx(ctx, cf->sg));\n+\t\t\tqm_fd_addr_set64(fd, dpaa_mem_vtop(cf->sg));\n \t\t\tfd->_format1 = qm_fd_compound;\n \t\t\tfd->length29 = 2 * sizeof(struct qm_sg_entry);\n \t\t\t/* Auth_only_len is set as 0 in descriptor and it is\n",
    "prefixes": [
        "dpdk-dev",
        "1/3"
    ]
}