From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id A54F8470E5 for ; Thu, 25 Dec 2025 10:20:16 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 9E4E04025E; Thu, 25 Dec 2025 10:20:16 +0100 (CET) Received: from BN1PR04CU002.outbound.protection.outlook.com (mail-eastus2azon11010071.outbound.protection.outlook.com [52.101.56.71]) by mails.dpdk.org (Postfix) with ESMTP id E60ED40609 for ; Thu, 25 Dec 2025 10:20:14 +0100 (CET) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=XM2q2eByRCyA+zwMRyTLVhvXSBG+E6GrLG/3ejuSkYwq+bQzknCdOUAzqE4Pwv+bklW4Z3y5GgRnYyi7Z7+idX88PwuhjlkXBhRf/XApunswbCrSihG8xvmgDBJOACncK49D5rsflr3TXD0Dyt9qpQg0eFG+3Tvvq2dmJvVz00Plcx4uzU+ygl3qOylN+JFLgK2DPeWHFIi2sl4lw79o4+Xa2XU3WmQPaRF2RLV4BM8TPN2g9NSwg5+j0bLBVEyV6kVBcxfHlmyFJhgZ9PnPLem2I2t83gcvdSKJdJyZK7pYCSyL4majvj4WSSHHFwn3FVy5iUfqnf2o75mygVQLZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Id1XFQ+z3cVIPNTbJBWrbEuTQ4IHSpxI1hcesJZjETg=; b=eWfX/Gn86pmC2cT62DoNSqLjGrV2UeRX1uVu5CIltARZNYhWC1dsqyhIRgg239B+gcZex3xrlwbrm9pzt2lacFGeTim8YXGjfW6s/fqfooqKKh+JkjY1K8w/3t2aBnpK7fqYVV/DFqBWO/3Xu0it9CWfpHgJNvajwIqYQ+jNOxwkirtc8e+QLuYyDnRw/0+54k/Rrqvc69XjhherzU31gUf3oNzxCsxjyt1baLQFLLUNqJlAAMhSyKJoWybP7TamMVbOoWyQcrfeIcTgZXzKaFoFXwIuhstLHihFCtaDx5kmLEpcuR14R97IuS0r42zw8HonSwlENRaW3s0WDkuokA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=marvell.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Id1XFQ+z3cVIPNTbJBWrbEuTQ4IHSpxI1hcesJZjETg=; b=oe47w/AoFU9DvjKr5m1xsaKIJ3G6433pFRquMxnzpKtHdB7U+nNK3+jMNbgYIr8wGXPUFsJhoYs3+jLTuLNjyiOhtlRMisBYaRISD5Hq/IW7PvPA4/1ugkTX58Qwrb0rlhYkpEcBo44L+KpW7PKsYrAWl96IiFKe38Jmt+puJMJUw0odrq8iH5N/GbHhzPAAp5tyV6pInDZYivr8U6+d2jnlFGkDFfJgPWbGPLo7Im92Ho2xRJDn8yXgbibTsOS4VRp9Mszz2sNudlXmq6PEu00u4DtdQrPmZDZWBjOYmiwlV6NyDDNR9hxwBhhIElBBY2HM4Uj9XhH7HFMSviubHQ== Received: from BY5PR17CA0064.namprd17.prod.outlook.com (2603:10b6:a03:167::41) by IA0PR12MB8840.namprd12.prod.outlook.com (2603:10b6:208:490::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9456.11; Thu, 25 Dec 2025 09:20:09 +0000 Received: from MWH0EPF000989EB.namprd02.prod.outlook.com (2603:10b6:a03:167:cafe::a6) by BY5PR17CA0064.outlook.office365.com (2603:10b6:a03:167::41) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9456.11 via Frontend Transport; Thu, 25 Dec 2025 09:20:08 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by MWH0EPF000989EB.mail.protection.outlook.com (10.167.241.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9456.9 via Frontend Transport; Thu, 25 Dec 2025 09:20:08 +0000 Received: from rnnvmail202.nvidia.com (10.129.68.7) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Thu, 25 Dec 2025 01:19:55 -0800 Received: from rnnvmail201.nvidia.com (10.129.68.8) by rnnvmail202.nvidia.com (10.129.68.7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Thu, 25 Dec 2025 01:19:55 -0800 Received: from nvidia.com (10.127.8.12) by mail.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend Transport; Thu, 25 Dec 2025 01:19:54 -0800 From: Shani Peretz To: Nithinsen Kaithakadan CC: Akhil Goyal , dpdk stable Subject: patch 'test/crypto: fix mbuf handling' has been queued to stable release 23.11.6 Date: Thu, 25 Dec 2025 11:17:26 +0200 Message-ID: <20251225091938.345892-5-shperetz@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251225091938.345892-1-shperetz@nvidia.com> References: <20251221145746.763179-93-shperetz@nvidia.com> <20251225091938.345892-1-shperetz@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-NV-OnPremToCloud: ExternallySecured X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MWH0EPF000989EB:EE_|IA0PR12MB8840:EE_ X-MS-Office365-Filtering-Correlation-Id: 03bc15b8-378d-4d24-7ae6-08de4396cc41 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|36860700013|376014|82310400026|7053199007|13003099007; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?go1fM2Kxf5HRxtRYJB612+BNdqIxiw/p+xUnSx5I+QClBFRIAEqP+HJNVwnd?= =?us-ascii?Q?VZjcAnGacPVSNkB9EJSniHnRMnpm6I06OxzpT4yv0aVdMNqlZO/YxvoQ+YUz?= =?us-ascii?Q?y+DOTgsZrk51e7hxV0j1lv/e26CP8obuuVHtQMkQ65ECKJY7mnjp8b3M9x8R?= =?us-ascii?Q?AxevDWpO7hmy5FWqOsFThaUnTpSRwm2pnTsDk80ngWy4zd945ZVNC0jV4B7s?= =?us-ascii?Q?kMDRDicbdsTSxl52Tz7P6LyOFUgT14wbhrUeq74KGGUUxftb+BVuEU9KuBT4?= =?us-ascii?Q?mwqAqhG3FFnVcGfFefncQFC0uYXYdSovL5aaU8qkRF49faOuSqaOieZSYxRY?= =?us-ascii?Q?NMQ1mGG0ATavhNnwwJwognCb2dZcmCKgr0EWzMm4vEXkky7izKtp1tULTp9Z?= =?us-ascii?Q?fwK4dv156aJaSCq7mIP3R3ckd4ybR0SKwPkTapmZdEAR0zl9mcHnAsZdJcb+?= =?us-ascii?Q?fRcYKe4UdzhA+lIRrlqhPdm/Z9XaykS4hD2JbWL4t3Vb4KEQfi1rXnLkex9a?= =?us-ascii?Q?e9Dbc9h1rupWGzmSEHo2wJQFzSntzJ0pZ3tCaqPo0uXsTjdwCicS//oCPIPc?= =?us-ascii?Q?n+U9N/XvIJrOwKCNDiBQTNtpKHkrjZI6sqCgExm6ocLpI8NcpuWXGBXNtvNv?= =?us-ascii?Q?E4WPe4NpnNUgr21E63JK10z7Hxd0aXewYPnKNtxOx6Ugft2PZNmS9cNHZYi4?= =?us-ascii?Q?GhvH2dEye6PtdRQCqfTlttf7kJ9bNpSJzhdPxUIEeBb6Dgck801X0Oyd8xuN?= =?us-ascii?Q?mmzRkzGgxDawx6BibTks/8bshsp33V2w+F31FneddQtfjmVyksPkFRt0JAYQ?= =?us-ascii?Q?sxRt96Hfi6Ji7IkYBZjVYMHbTtDcLhZSzw0D+mZ9vf3G0CUBfChfNCg0WsCj?= =?us-ascii?Q?IuZPmfU9UiR5SEWgFX35xxTqVTI21wd8dVJ0oe0G2vsHZba8tqckHb7OJWUK?= =?us-ascii?Q?EDWiVsHzSCuHQ8BBelYDqhUGeamCMetODFzflSgJjt/KbWLI2ZN205Xz3wvN?= =?us-ascii?Q?E70LY3AxBN1Si2Gd0ohJao0TLibh1S02MS9LUQNShLDJofeDRQGi6qrYmIkV?= =?us-ascii?Q?EQstNZMKredAqWCY34RDI1+xgNm4Ubo5jgtlzSWq0bB9swFPYVHxkajSXr1y?= =?us-ascii?Q?7Ba89iWz69oYmfqnS2IOdSFTEgmjmlBuwDcJ1XaAvvsCmsySFI7Jp8U2mOXa?= =?us-ascii?Q?cN+I4ptYUYieWimD2UGpK4cbtAITgZ3i/e4Ia5OrvGi9LKL7ppytqbW84h4F?= =?us-ascii?Q?0/IcM09c/k1lqYVPnwyL5EfR3UwrKFn5qjncrR8WJ+XXFk0o2L2M4tpNOhhX?= =?us-ascii?Q?6+6nEM0ZHtg3Anx+pQBv7rZ0sInmwp1qwKWO/lu+KyPFYymVG1xAxz6vZc4T?= =?us-ascii?Q?XMaTsZNUN/csnboyXZG2oOQ90KIA3gJO00zq9R3T8WPMAlaIsDNWFzWtnTHN?= =?us-ascii?Q?pf2aeDUQalbSiRQ3SiFxHT16HVCF+ttXgl7YwED5HkZvnlNTTcXO84X7Bza2?= =?us-ascii?Q?hwNWKvN0MmIh5dFKhhegG/AA2+KJnCb/5vXmQJpLVrCrzyjv3ssCaEoqAMq7?= =?us-ascii?Q?FIe1dZzypzex7lA8qv3ype8xOVvfSG8kQZQ1vJ+j?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(36860700013)(376014)(82310400026)(7053199007)(13003099007); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Dec 2025 09:20:08.3181 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 03bc15b8-378d-4d24-7ae6-08de4396cc41 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: MWH0EPF000989EB.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR12MB8840 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 23.11.6 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 12/30/25. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/shanipr/dpdk-stable This queued commit can be viewed at: https://github.com/shanipr/dpdk-stable/commit/3f425fa3277c90951e34b60769d9a8e84d86721b Thanks. Shani --- >From 3f425fa3277c90951e34b60769d9a8e84d86721b Mon Sep 17 00:00:00 2001 From: Nithinsen Kaithakadan Date: Tue, 23 Sep 2025 14:22:54 +0000 Subject: [PATCH] test/crypto: fix mbuf handling [ upstream commit 1ff54c055d95736aae05a40b361427215c318cc1 ] This patch resolves the following mbuf sanity check errors. - updating nb_segs and pkt_len in the head mbuf after freeing intermediate nodes in the chain. - fix incorrect usage of rte_pktmbuf_append by ensuring the head mbuf is passed instead of an intermediate node, allowing proper tail detection and metadata update. Fixes: dc3f6c5347b2 ("test/crypto: fix wireless auth digest segment") Fixes: 43220096d66a ("test/crypto: add PDCP cases for scatter gather") Fixes: dcdd01691f39 ("test/crypto: add GMAC SGL") Fixes: f3dbf94be60c ("app/test: check SGL on QAT") Signed-off-by: Nithinsen Kaithakadan Acked-by: Akhil Goyal --- app/test/test_cryptodev.c | 59 ++++++++++++++++++++++++++------------- 1 file changed, 40 insertions(+), 19 deletions(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 8b8546622a..ae58af779e 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -3114,6 +3114,8 @@ create_wireless_algo_auth_cipher_operation( uint16_t remaining_off = (auth_offset >> 3) + (auth_len >> 3); struct rte_mbuf *sgl_buf = (op_mode == IN_PLACE ? sym_op->m_src : sym_op->m_dst); + struct rte_mbuf *sgl_buf_head = sgl_buf; + while (remaining_off >= rte_pktmbuf_data_len(sgl_buf)) { remaining_off -= rte_pktmbuf_data_len(sgl_buf); sgl_buf = sgl_buf->next; @@ -3121,11 +3123,18 @@ create_wireless_algo_auth_cipher_operation( /* The last segment should be large enough to hold full digest */ if (sgl_buf->data_len < auth_tag_len) { - rte_pktmbuf_free(sgl_buf->next); - sgl_buf->next = NULL; - TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(sgl_buf, - auth_tag_len - sgl_buf->data_len), - "No room to append auth tag"); + uint16_t next_data_len = 0; + if (sgl_buf->next != NULL) { + next_data_len = sgl_buf->next->data_len; + + rte_pktmbuf_free(sgl_buf->next); + sgl_buf->next = NULL; + sgl_buf_head->nb_segs -= 1; + sgl_buf_head->pkt_len -= next_data_len; + } + TEST_ASSERT_NOT_NULL(rte_pktmbuf_append( + sgl_buf_head, auth_tag_len - sgl_buf->data_len), + "No room to append auth tag"); } sym_op->auth.digest.data = rte_pktmbuf_mtod_offset(sgl_buf, @@ -9377,11 +9386,13 @@ test_pdcp_proto_SGL(int i, int oop, buf_oop = buf_oop->next; memset(rte_pktmbuf_mtod(buf_oop, uint8_t *), 0, rte_pktmbuf_tailroom(buf_oop)); - rte_pktmbuf_append(buf_oop, to_trn); + TEST_ASSERT_NOT_NULL(ut_params->obuf, "Output buffer not initialized"); + TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(ut_params->obuf, to_trn), "Failed to append to mbuf"); } - plaintext = (uint8_t *)rte_pktmbuf_append(buf, + plaintext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf, to_trn); + TEST_ASSERT_NOT_NULL(plaintext, "Failed to append plaintext"); memcpy(plaintext, input_vec + trn_data, to_trn); trn_data += to_trn; @@ -9410,7 +9421,7 @@ test_pdcp_proto_SGL(int i, int oop, buf_oop = buf_oop->next; memset(rte_pktmbuf_mtod(buf_oop, uint8_t *), 0, rte_pktmbuf_tailroom(buf_oop)); - rte_pktmbuf_append(buf_oop, to_trn); + TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(ut_params->obuf, to_trn), "Failed to append to mbuf"); trn_data += to_trn; } @@ -14363,15 +14374,18 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata, memset(rte_pktmbuf_mtod(buf, uint8_t *), 0, rte_pktmbuf_tailroom(buf)); - plaintext = (uint8_t *)rte_pktmbuf_append(buf, + plaintext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf, to_trn); + TEST_ASSERT_NOT_NULL(plaintext, "Failed to append plaintext"); memcpy(plaintext, tdata->plaintext.data + trn_data, to_trn); trn_data += to_trn; - if (trn_data == tdata->plaintext.len) - digest_mem = (uint8_t *)rte_pktmbuf_append(buf, + if (trn_data == tdata->plaintext.len) { + digest_mem = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf, tdata->gmac_tag.len); + TEST_ASSERT_NOT_NULL(digest_mem, "Failed to append digest data"); + } } ut_params->ibuf->nb_segs = segs; @@ -15664,23 +15678,28 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata, buf_oop = buf_oop->next; memset(rte_pktmbuf_mtod(buf_oop, uint8_t *), 0, rte_pktmbuf_tailroom(buf_oop)); - rte_pktmbuf_append(buf_oop, to_trn); + TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(ut_params->obuf, to_trn), "Failed to append to mbuf"); } - plaintext = (uint8_t *)rte_pktmbuf_append(buf, + plaintext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf, to_trn); + TEST_ASSERT_NOT_NULL(plaintext, "Failed to append plaintext"); memcpy(plaintext, tdata->plaintext.data + trn_data, to_trn); trn_data += to_trn; if (trn_data == tdata->plaintext.len) { if (oop) { - if (!fragsz_oop) - digest_mem = rte_pktmbuf_append(buf_oop, + if (!fragsz_oop) { + digest_mem = rte_pktmbuf_append(ut_params->obuf, tdata->auth_tag.len); - } else - digest_mem = (uint8_t *)rte_pktmbuf_append(buf, + TEST_ASSERT_NOT_NULL(digest_mem, "Failed to append auth tag"); + } + } else { + digest_mem = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf, tdata->auth_tag.len); + TEST_ASSERT_NOT_NULL(digest_mem, "Failed to append auth tag"); + } } } @@ -15715,16 +15734,18 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata, buf_last_oop = buf_oop->next = rte_pktmbuf_alloc(ts_params->mbuf_pool); + TEST_ASSERT_NOT_NULL(buf_oop->next, "Unexpected end of chain"); buf_oop = buf_oop->next; memset(rte_pktmbuf_mtod(buf_oop, uint8_t *), 0, rte_pktmbuf_tailroom(buf_oop)); - rte_pktmbuf_append(buf_oop, to_trn); + TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(ut_params->obuf, to_trn), "Failed to append to mbuf"); trn_data += to_trn; if (trn_data == tdata->plaintext.len) { - digest_mem = rte_pktmbuf_append(buf_oop, + digest_mem = rte_pktmbuf_append(ut_params->obuf, tdata->auth_tag.len); + TEST_ASSERT_NOT_NULL(digest_mem, "Failed to append auth tag"); } } -- 2.43.0 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2025-12-25 11:16:36.628845255 +0200 +++ 0005-test-crypto-fix-mbuf-handling.patch 2025-12-25 11:16:35.286992000 +0200 @@ -1 +1 @@ -From 1ff54c055d95736aae05a40b361427215c318cc1 Mon Sep 17 00:00:00 2001 +From 3f425fa3277c90951e34b60769d9a8e84d86721b Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 1ff54c055d95736aae05a40b361427215c318cc1 ] + @@ -18 +19,0 @@ -Cc: stable@dpdk.org @@ -27 +28 @@ -index 5229ac2bf6..f092f608a9 100644 +index 8b8546622a..ae58af779e 100644 @@ -30 +31 @@ -@@ -3488,6 +3488,8 @@ create_wireless_algo_auth_cipher_operation( +@@ -3114,6 +3114,8 @@ create_wireless_algo_auth_cipher_operation( @@ -39 +40 @@ -@@ -3495,11 +3497,18 @@ create_wireless_algo_auth_cipher_operation( +@@ -3121,11 +3123,18 @@ create_wireless_algo_auth_cipher_operation( @@ -63 +64 @@ -@@ -9795,11 +9804,13 @@ test_pdcp_proto_SGL(int i, int oop, +@@ -9377,11 +9386,13 @@ test_pdcp_proto_SGL(int i, int oop, @@ -79 +80 @@ -@@ -9828,7 +9839,7 @@ test_pdcp_proto_SGL(int i, int oop, +@@ -9410,7 +9421,7 @@ test_pdcp_proto_SGL(int i, int oop, @@ -88 +89 @@ -@@ -15916,15 +15927,18 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata, +@@ -14363,15 +14374,18 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata, @@ -110 +111 @@ -@@ -17223,23 +17237,28 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata, +@@ -15664,23 +15678,28 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata, @@ -145 +146 @@ -@@ -17274,16 +17293,18 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata, +@@ -15715,16 +15734,18 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,