xref: /spdk/test/unit/lib/bdev/crypto.c/crypto_ut.c (revision 3225f86bc248c13417669e566b99d5ca41bc6a1c)
1 /*-
2  *   BSD LICENSE
3  *
4  *   Copyright (c) Intel Corporation.
5  *   All rights reserved.
6  *
7  *   Redistribution and use in source and binary forms, with or without
8  *   modification, are permitted provided that the following conditions
9  *   are met:
10  *
11  *     * Redistributions of source code must retain the above copyright
12  *       notice, this list of conditions and the following disclaimer.
13  *     * Redistributions in binary form must reproduce the above copyright
14  *       notice, this list of conditions and the following disclaimer in
15  *       the documentation and/or other materials provided with the
16  *       distribution.
17  *     * Neither the name of Intel Corporation nor the names of its
18  *       contributors may be used to endorse or promote products derived
19  *       from this software without specific prior written permission.
20  *
21  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22  *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23  *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
24  *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
25  *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
26  *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
27  *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28  *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29  *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30  *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31  *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32  */
33 
34 #include "spdk_cunit.h"
35 
36 #include "common/lib/test_env.c"
37 #include "spdk_internal/mock.h"
38 #include "unit/lib/json_mock.c"
39 
40 #include <rte_crypto.h>
41 #include <rte_cryptodev.h>
42 
43 #define MAX_TEST_BLOCKS 8192
44 struct rte_crypto_op *g_test_crypto_ops[MAX_TEST_BLOCKS];
45 struct rte_crypto_op *g_test_dev_full_ops[MAX_TEST_BLOCKS];
46 
47 uint16_t g_dequeue_mock;
48 uint16_t g_enqueue_mock;
49 unsigned ut_rte_crypto_op_bulk_alloc;
50 int ut_rte_crypto_op_attach_sym_session = 0;
51 int ut_rte_cryptodev_info_get = 0;
52 bool ut_rte_cryptodev_info_get_mocked = false;
53 
54 /* Those functions are defined as static inline in DPDK, so we can't
55  * mock them straight away. We use defines to redirect them into
56  * our custom functions.
57  */
58 static bool g_resubmit_test = false;
59 #define rte_cryptodev_enqueue_burst mock_rte_cryptodev_enqueue_burst
60 static inline uint16_t
61 mock_rte_cryptodev_enqueue_burst(uint8_t dev_id, uint16_t qp_id,
62 				 struct rte_crypto_op **ops, uint16_t nb_ops)
63 {
64 	int i;
65 
66 	CU_ASSERT(nb_ops > 0);
67 
68 	for (i = 0; i < nb_ops; i++) {
69 		/* Use this empty (til now) array of pointers to store
70 		 * enqueued operations for assertion in dev_full test.
71 		 */
72 		g_test_dev_full_ops[i] = *ops++;
73 		if (g_resubmit_test == true) {
74 			CU_ASSERT(g_test_dev_full_ops[i] == (void *)0xDEADBEEF);
75 		}
76 	}
77 
78 	return g_enqueue_mock;
79 }
80 
81 #define rte_cryptodev_dequeue_burst mock_rte_cryptodev_dequeue_burst
82 static inline uint16_t
83 mock_rte_cryptodev_dequeue_burst(uint8_t dev_id, uint16_t qp_id,
84 				 struct rte_crypto_op **ops, uint16_t nb_ops)
85 {
86 	int i;
87 
88 	CU_ASSERT(nb_ops > 0);
89 
90 	for (i = 0; i < g_dequeue_mock; i++) {
91 		*ops++ = g_test_crypto_ops[i];
92 	}
93 
94 	return g_dequeue_mock;
95 }
96 
97 /* Instead of allocating real memory, assign the allocations to our
98  * test array for assertion in tests.
99  */
100 #define rte_crypto_op_bulk_alloc mock_rte_crypto_op_bulk_alloc
101 static inline unsigned
102 mock_rte_crypto_op_bulk_alloc(struct rte_mempool *mempool,
103 			      enum rte_crypto_op_type type,
104 			      struct rte_crypto_op **ops, uint16_t nb_ops)
105 {
106 	int i;
107 
108 	for (i = 0; i < nb_ops; i++) {
109 		*ops++ = g_test_crypto_ops[i];
110 	}
111 	return ut_rte_crypto_op_bulk_alloc;
112 }
113 
114 #define rte_mempool_put_bulk mock_rte_mempool_put_bulk
115 static __rte_always_inline void
116 mock_rte_mempool_put_bulk(struct rte_mempool *mp, void *const *obj_table,
117 			  unsigned int n)
118 {
119 	return;
120 }
121 
122 #define rte_crypto_op_attach_sym_session mock_rte_crypto_op_attach_sym_session
123 static inline int
124 mock_rte_crypto_op_attach_sym_session(struct rte_crypto_op *op,
125 				      struct rte_cryptodev_sym_session *sess)
126 {
127 	return ut_rte_crypto_op_attach_sym_session;
128 }
129 
130 #define rte_lcore_count mock_rte_lcore_count
131 static inline unsigned
132 mock_rte_lcore_count(void)
133 {
134 	return 1;
135 }
136 
137 #include "bdev/crypto/vbdev_crypto.c"
138 
139 /* SPDK stubs */
140 DEFINE_STUB(spdk_bdev_queue_io_wait, int, (struct spdk_bdev *bdev, struct spdk_io_channel *ch,
141 		struct spdk_bdev_io_wait_entry *entry), 0);
142 DEFINE_STUB(spdk_conf_find_section, struct spdk_conf_section *,
143 	    (struct spdk_conf *cp, const char *name), NULL);
144 DEFINE_STUB(spdk_conf_section_get_nval, char *,
145 	    (struct spdk_conf_section *sp, const char *key, int idx), NULL);
146 DEFINE_STUB(spdk_conf_section_get_nmval, char *,
147 	    (struct spdk_conf_section *sp, const char *key, int idx1, int idx2), NULL);
148 DEFINE_STUB_V(spdk_bdev_module_list_add, (struct spdk_bdev_module *bdev_module));
149 DEFINE_STUB_V(spdk_bdev_free_io, (struct spdk_bdev_io *g_bdev_io));
150 DEFINE_STUB(spdk_bdev_io_type_supported, bool, (struct spdk_bdev *bdev,
151 		enum spdk_bdev_io_type io_type), 0);
152 DEFINE_STUB_V(spdk_bdev_module_release_bdev, (struct spdk_bdev *bdev));
153 DEFINE_STUB_V(spdk_bdev_close, (struct spdk_bdev_desc *desc));
154 DEFINE_STUB(spdk_bdev_get_name, const char *, (const struct spdk_bdev *bdev), 0);
155 DEFINE_STUB(spdk_bdev_get_buf_align, size_t, (const struct spdk_bdev *bdev), 0);
156 DEFINE_STUB(spdk_bdev_get_io_channel, struct spdk_io_channel *, (struct spdk_bdev_desc *desc), 0);
157 DEFINE_STUB_V(spdk_bdev_unregister, (struct spdk_bdev *bdev, spdk_bdev_unregister_cb cb_fn,
158 				     void *cb_arg));
159 DEFINE_STUB(spdk_bdev_open, int, (struct spdk_bdev *bdev, bool write,
160 				  spdk_bdev_remove_cb_t remove_cb,
161 				  void *remove_ctx, struct spdk_bdev_desc **_desc), 0);
162 DEFINE_STUB(spdk_bdev_module_claim_bdev, int, (struct spdk_bdev *bdev, struct spdk_bdev_desc *desc,
163 		struct spdk_bdev_module *module), 0);
164 DEFINE_STUB_V(spdk_bdev_module_examine_done, (struct spdk_bdev_module *module));
165 DEFINE_STUB(spdk_bdev_register, int, (struct spdk_bdev *vbdev), 0);
166 
167 /* DPDK stubs */
168 DEFINE_STUB(rte_cryptodev_count, uint8_t, (void), 0);
169 DEFINE_STUB_V(rte_mempool_free, (struct rte_mempool *mp));
170 DEFINE_STUB(rte_mempool_create, struct rte_mempool *, (const char *name, unsigned n,
171 		unsigned elt_size,
172 		unsigned cache_size, unsigned private_data_size,
173 		rte_mempool_ctor_t *mp_init, void *mp_init_arg,
174 		rte_mempool_obj_cb_t *obj_init, void *obj_init_arg,
175 		int socket_id, unsigned flags), (struct rte_mempool *)1);
176 DEFINE_STUB(rte_socket_id, unsigned, (void), 0);
177 DEFINE_STUB(rte_crypto_op_pool_create, struct rte_mempool *,
178 	    (const char *name, enum rte_crypto_op_type type, unsigned nb_elts,
179 	     unsigned cache_size, uint16_t priv_size, int socket_id), (struct rte_mempool *)1);
180 DEFINE_STUB(rte_cryptodev_device_count_by_driver, uint8_t, (uint8_t driver_id), 0);
181 DEFINE_STUB(rte_cryptodev_configure, int, (uint8_t dev_id, struct rte_cryptodev_config *config), 0);
182 #if RTE_VERSION >= RTE_VERSION_NUM(19, 02, 0, 0)
183 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id,
184 		const struct rte_cryptodev_qp_conf *qp_conf, int socket_id), 0);
185 DEFINE_STUB(rte_cryptodev_sym_session_pool_create, struct rte_mempool *, (const char *name,
186 		uint32_t nb_elts,
187 		uint32_t elt_size, uint32_t cache_size, uint16_t priv_size,
188 		int socket_id), (struct rte_mempool *)1);
189 #else
190 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id,
191 		const struct rte_cryptodev_qp_conf *qp_conf,
192 		int socket_id, struct rte_mempool *session_pool), 0);
193 #endif
194 DEFINE_STUB(rte_cryptodev_start, int, (uint8_t dev_id), 0);
195 DEFINE_STUB_V(rte_cryptodev_stop, (uint8_t dev_id));
196 DEFINE_STUB(rte_cryptodev_sym_session_create, struct rte_cryptodev_sym_session *,
197 	    (struct rte_mempool *mempool), (struct rte_cryptodev_sym_session *)1);
198 DEFINE_STUB(rte_cryptodev_sym_session_init, int, (uint8_t dev_id,
199 		struct rte_cryptodev_sym_session *sess,
200 		struct rte_crypto_sym_xform *xforms, struct rte_mempool *mempool), 0);
201 DEFINE_STUB(rte_vdev_init, int, (const char *name, const char *args), 0);
202 DEFINE_STUB(rte_cryptodev_sym_session_free, int, (struct rte_cryptodev_sym_session *sess), 0);
203 DEFINE_STUB(rte_vdev_uninit, int, (const char *name), 0);
204 
205 struct rte_cryptodev *rte_cryptodevs;
206 
207 /* global vars and setup/cleanup functions used for all test functions */
208 struct spdk_bdev_io *g_bdev_io;
209 struct crypto_bdev_io *g_io_ctx;
210 struct crypto_io_channel *g_crypto_ch;
211 struct spdk_io_channel *g_io_ch;
212 struct vbdev_dev g_device;
213 struct vbdev_crypto g_crypto_bdev;
214 struct device_qp g_dev_qp;
215 
216 void
217 rte_cryptodev_info_get(uint8_t dev_id, struct rte_cryptodev_info *dev_info)
218 {
219 	dev_info->max_nb_queue_pairs = ut_rte_cryptodev_info_get;
220 }
221 
222 unsigned int
223 rte_cryptodev_sym_get_private_session_size(uint8_t dev_id)
224 {
225 	return (unsigned int)dev_id;
226 }
227 
228 void
229 spdk_bdev_io_get_buf(struct spdk_bdev_io *bdev_io, spdk_bdev_io_get_buf_cb cb, uint64_t len)
230 {
231 	cb(g_io_ch, g_bdev_io, true);
232 }
233 
234 /* Mock these functions to call the callback and then return the value we require */
235 int ut_spdk_bdev_readv_blocks = 0;
236 bool ut_spdk_bdev_readv_blocks_mocked = false;
237 int
238 spdk_bdev_readv_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
239 		       struct iovec *iov, int iovcnt,
240 		       uint64_t offset_blocks, uint64_t num_blocks,
241 		       spdk_bdev_io_completion_cb cb, void *cb_arg)
242 {
243 	cb(g_bdev_io, !ut_spdk_bdev_readv_blocks, cb_arg);
244 	return ut_spdk_bdev_readv_blocks;
245 }
246 
247 int ut_spdk_bdev_writev_blocks = 0;
248 bool ut_spdk_bdev_writev_blocks_mocked = false;
249 int
250 spdk_bdev_writev_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
251 			struct iovec *iov, int iovcnt,
252 			uint64_t offset_blocks, uint64_t num_blocks,
253 			spdk_bdev_io_completion_cb cb, void *cb_arg)
254 {
255 	cb(g_bdev_io, !ut_spdk_bdev_writev_blocks, cb_arg);
256 	return ut_spdk_bdev_writev_blocks;
257 }
258 
259 int ut_spdk_bdev_unmap_blocks = 0;
260 bool ut_spdk_bdev_unmap_blocks_mocked = false;
261 int
262 spdk_bdev_unmap_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
263 		       uint64_t offset_blocks, uint64_t num_blocks,
264 		       spdk_bdev_io_completion_cb cb, void *cb_arg)
265 {
266 	cb(g_bdev_io, !ut_spdk_bdev_unmap_blocks, cb_arg);
267 	return ut_spdk_bdev_unmap_blocks;
268 }
269 
270 int ut_spdk_bdev_flush_blocks = 0;
271 bool ut_spdk_bdev_flush_blocks_mocked = false;
272 int
273 spdk_bdev_flush_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
274 		       uint64_t offset_blocks, uint64_t num_blocks, spdk_bdev_io_completion_cb cb,
275 		       void *cb_arg)
276 {
277 	cb(g_bdev_io, !ut_spdk_bdev_flush_blocks, cb_arg);
278 	return ut_spdk_bdev_flush_blocks;
279 }
280 
281 int ut_spdk_bdev_reset = 0;
282 bool ut_spdk_bdev_reset_mocked = false;
283 int
284 spdk_bdev_reset(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
285 		spdk_bdev_io_completion_cb cb, void *cb_arg)
286 {
287 	cb(g_bdev_io, !ut_spdk_bdev_reset, cb_arg);
288 	return ut_spdk_bdev_reset;
289 }
290 
291 bool g_completion_called = false;
292 void
293 spdk_bdev_io_complete(struct spdk_bdev_io *bdev_io, enum spdk_bdev_io_status status)
294 {
295 	bdev_io->internal.status = status;
296 	g_completion_called = true;
297 }
298 
299 /* Global setup for all tests that share a bunch of preparation... */
300 static int
301 test_setup(void)
302 {
303 	int i, rc;
304 
305 	/* Prepare essential variables for test routines */
306 	g_bdev_io = calloc(1, sizeof(struct spdk_bdev_io) + sizeof(struct crypto_bdev_io));
307 	g_bdev_io->u.bdev.iovs = calloc(1, sizeof(struct iovec) * 128);
308 	g_bdev_io->bdev = &g_crypto_bdev.crypto_bdev;
309 	g_io_ch = calloc(1, sizeof(struct spdk_io_channel) + sizeof(struct crypto_io_channel));
310 	g_crypto_ch = (struct crypto_io_channel *)((uint8_t *)g_io_ch + sizeof(struct spdk_io_channel));
311 	g_io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx;
312 	memset(&g_device, 0, sizeof(struct vbdev_dev));
313 	memset(&g_crypto_bdev, 0, sizeof(struct vbdev_crypto));
314 	g_dev_qp.device = &g_device;
315 	g_io_ctx->crypto_ch = g_crypto_ch;
316 	g_io_ctx->crypto_bdev = &g_crypto_bdev;
317 	g_crypto_ch->device_qp = &g_dev_qp;
318 	TAILQ_INIT(&g_crypto_ch->pending_cry_ios);
319 	TAILQ_INIT(&g_crypto_ch->queued_cry_ops);
320 
321 	/* Allocate a real mbuf pool so we can test error paths */
322 	g_mbuf_mp = spdk_mempool_create("mbuf_mp", NUM_MBUFS, sizeof(struct rte_mbuf),
323 					SPDK_MEMPOOL_DEFAULT_CACHE_SIZE,
324 					SPDK_ENV_SOCKET_ID_ANY);
325 
326 	/* Instead of allocating real rte mempools for these, it's easier and provides the
327 	 * same coverage just calloc them here.
328 	 */
329 	for (i = 0; i < MAX_TEST_BLOCKS; i++) {
330 		rc = posix_memalign((void **)&g_test_crypto_ops[i], 64,
331 				    sizeof(struct rte_crypto_op) + sizeof(struct rte_crypto_sym_op) +
332 				    AES_CBC_IV_LENGTH + QUEUED_OP_LENGTH);
333 		if (rc != 0) {
334 			assert(false);
335 		}
336 		memset(g_test_crypto_ops[i], 0, sizeof(struct rte_crypto_op) +
337 		       sizeof(struct rte_crypto_sym_op) + QUEUED_OP_LENGTH);
338 	}
339 	return 0;
340 }
341 
342 /* Global teardown for all tests */
343 static int
344 test_cleanup(void)
345 {
346 	int i;
347 
348 	spdk_mempool_free(g_mbuf_mp);
349 	for (i = 0; i < MAX_TEST_BLOCKS; i++) {
350 		free(g_test_crypto_ops[i]);
351 	}
352 	free(g_bdev_io->u.bdev.iovs);
353 	free(g_bdev_io);
354 	free(g_io_ch);
355 	return 0;
356 }
357 
358 static void
359 test_error_paths(void)
360 {
361 	/* Single element block size write, just to test error paths
362 	 * in vbdev_crypto_submit_request().
363 	 */
364 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
365 	g_bdev_io->u.bdev.iovcnt = 1;
366 	g_bdev_io->u.bdev.num_blocks = 1;
367 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
368 	g_crypto_bdev.crypto_bdev.blocklen = 512;
369 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
370 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
371 
372 	/* test failure of spdk_mempool_get_bulk(), will result in success because it
373 	 * will get queued.
374 	 */
375 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
376 	MOCK_SET(spdk_mempool_get, NULL);
377 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
378 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
379 
380 	/* same thing but switch to reads to test error path in _crypto_complete_io() */
381 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
382 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
383 	TAILQ_INSERT_TAIL(&g_crypto_ch->pending_cry_ios, g_bdev_io, module_link);
384 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
385 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
386 	/* Now with the read_blocks failing */
387 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
388 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
389 	MOCK_SET(spdk_bdev_readv_blocks, -1);
390 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
391 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
392 	MOCK_SET(spdk_bdev_readv_blocks, 0);
393 	MOCK_CLEAR(spdk_mempool_get);
394 
395 	/* test failure of rte_crypto_op_bulk_alloc() */
396 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
397 	ut_rte_crypto_op_bulk_alloc = 0;
398 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
399 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
400 	ut_rte_crypto_op_bulk_alloc = 1;
401 
402 	/* test failure of rte_crypto_op_attach_sym_session() */
403 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
404 	ut_rte_crypto_op_attach_sym_session = -1;
405 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
406 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
407 	ut_rte_crypto_op_attach_sym_session = 0;
408 }
409 
410 static void
411 test_simple_write(void)
412 {
413 	/* Single element block size write */
414 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
415 	g_bdev_io->u.bdev.iovcnt = 1;
416 	g_bdev_io->u.bdev.num_blocks = 1;
417 	g_bdev_io->u.bdev.offset_blocks = 0;
418 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
419 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_write;
420 	g_crypto_bdev.crypto_bdev.blocklen = 512;
421 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
422 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
423 
424 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
425 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
426 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
427 	CU_ASSERT(g_io_ctx->cry_iov.iov_len == 512);
428 	CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL);
429 	CU_ASSERT(g_io_ctx->cry_offset_blocks == 0);
430 	CU_ASSERT(g_io_ctx->cry_num_blocks == 1);
431 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_write);
432 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512);
433 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL);
434 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512);
435 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0);
436 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io);
437 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->buf_addr != NULL);
438 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->data_len == 512);
439 
440 	spdk_free(g_io_ctx->cry_iov.iov_base);
441 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
442 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_dst);
443 }
444 
445 static void
446 test_simple_read(void)
447 {
448 	/* Single element block size read */
449 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
450 	g_bdev_io->u.bdev.iovcnt = 1;
451 	g_bdev_io->u.bdev.num_blocks = 1;
452 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
453 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_read;
454 	g_crypto_bdev.crypto_bdev.blocklen = 512;
455 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
456 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
457 
458 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
459 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
460 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
461 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_read);
462 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512);
463 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL);
464 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512);
465 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0);
466 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io);
467 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst == NULL);
468 
469 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
470 }
471 
472 static void
473 test_large_rw(void)
474 {
475 	unsigned block_len = 512;
476 	unsigned num_blocks = CRYPTO_MAX_IO / block_len;
477 	unsigned io_len = block_len * num_blocks;
478 	unsigned i;
479 
480 	/* Multi block size read, multi-element */
481 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
482 	g_bdev_io->u.bdev.iovcnt = 1;
483 	g_bdev_io->u.bdev.num_blocks = num_blocks;
484 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
485 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw;
486 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
487 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
488 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
489 
490 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
491 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
492 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks);
493 
494 	for (i = 0; i < num_blocks; i++) {
495 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len));
496 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
497 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
498 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
499 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
500 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
501 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL);
502 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
503 	}
504 
505 	/* Multi block size write, multi-element */
506 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
507 	g_bdev_io->u.bdev.iovcnt = 1;
508 	g_bdev_io->u.bdev.num_blocks = num_blocks;
509 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
510 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw;
511 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
512 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
513 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
514 
515 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
516 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
517 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks);
518 
519 	for (i = 0; i < num_blocks; i++) {
520 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len));
521 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
522 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
523 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
524 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
525 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
526 		CU_ASSERT(g_io_ctx->cry_iov.iov_len == io_len);
527 		CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL);
528 		CU_ASSERT(g_io_ctx->cry_offset_blocks == 0);
529 		CU_ASSERT(g_io_ctx->cry_num_blocks == num_blocks);
530 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->buf_addr != NULL);
531 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->data_len == block_len);
532 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
533 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst);
534 	}
535 	spdk_free(g_io_ctx->cry_iov.iov_base);
536 }
537 
538 static void
539 test_dev_full(void)
540 {
541 	struct vbdev_crypto_op *queued_op;
542 	struct rte_crypto_sym_op *sym_op;
543 	struct crypto_bdev_io *io_ctx;
544 
545 	/* Two element block size read */
546 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
547 	g_bdev_io->u.bdev.iovcnt = 1;
548 	g_bdev_io->u.bdev.num_blocks = 2;
549 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
550 	g_bdev_io->u.bdev.iovs[0].iov_base = (void *)0xDEADBEEF;
551 	g_bdev_io->u.bdev.iovs[1].iov_len = 512;
552 	g_bdev_io->u.bdev.iovs[1].iov_base = (void *)0xFEEDBEEF;
553 	g_crypto_bdev.crypto_bdev.blocklen = 512;
554 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
555 	g_enqueue_mock = g_dequeue_mock = 1;
556 	ut_rte_crypto_op_bulk_alloc = 2;
557 
558 	g_test_crypto_ops[1]->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
559 	CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == true);
560 
561 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
562 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
563 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 2);
564 	sym_op = g_test_crypto_ops[0]->sym;
565 	CU_ASSERT(sym_op->m_src->buf_addr == (void *)0xDEADBEEF);
566 	CU_ASSERT(sym_op->m_src->data_len == 512);
567 	CU_ASSERT(sym_op->m_src->next == NULL);
568 	CU_ASSERT(sym_op->cipher.data.length == 512);
569 	CU_ASSERT(sym_op->cipher.data.offset == 0);
570 	CU_ASSERT(sym_op->m_src->userdata == g_bdev_io);
571 	CU_ASSERT(sym_op->m_dst == NULL);
572 
573 	/* make sure one got queued and confirm its values */
574 	CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == false);
575 	queued_op = TAILQ_FIRST(&g_crypto_ch->queued_cry_ops);
576 	sym_op = queued_op->crypto_op->sym;
577 	TAILQ_REMOVE(&g_crypto_ch->queued_cry_ops, queued_op, link);
578 	CU_ASSERT(queued_op->bdev_io == g_bdev_io);
579 	CU_ASSERT(queued_op->crypto_op == g_test_crypto_ops[1]);
580 	CU_ASSERT(sym_op->m_src->buf_addr == (void *)0xFEEDBEEF);
581 	CU_ASSERT(sym_op->m_src->data_len == 512);
582 	CU_ASSERT(sym_op->m_src->next == NULL);
583 	CU_ASSERT(sym_op->cipher.data.length == 512);
584 	CU_ASSERT(sym_op->cipher.data.offset == 0);
585 	CU_ASSERT(sym_op->m_src->userdata == g_bdev_io);
586 	CU_ASSERT(sym_op->m_dst == NULL);
587 	CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == true);
588 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
589 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[1]->sym->m_src);
590 
591 	/* Non-busy reason for enqueue failure, all were rejected. */
592 	g_enqueue_mock = 0;
593 	g_test_crypto_ops[0]->status = RTE_CRYPTO_OP_STATUS_ERROR;
594 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
595 	io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx;
596 	CU_ASSERT(io_ctx->bdev_io_status == SPDK_BDEV_IO_STATUS_FAILED);
597 }
598 
599 static void
600 test_crazy_rw(void)
601 {
602 	unsigned block_len = 512;
603 	int num_blocks = 4;
604 	int i;
605 
606 	/* Multi block size read, single element, strange IOV makeup */
607 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
608 	g_bdev_io->u.bdev.iovcnt = 3;
609 	g_bdev_io->u.bdev.num_blocks = num_blocks;
610 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
611 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw;
612 	g_bdev_io->u.bdev.iovs[1].iov_len = 1024;
613 	g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 512;
614 	g_bdev_io->u.bdev.iovs[2].iov_len = 512;
615 	g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 512 + 1024;
616 
617 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
618 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
619 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
620 
621 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
622 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
623 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks);
624 
625 	for (i = 0; i < num_blocks; i++) {
626 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len));
627 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
628 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
629 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
630 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
631 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
632 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src);
633 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL);
634 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
635 	}
636 
637 	/* Multi block size write, single element strange IOV makeup */
638 	num_blocks = 8;
639 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
640 	g_bdev_io->u.bdev.iovcnt = 4;
641 	g_bdev_io->u.bdev.num_blocks = num_blocks;
642 	g_bdev_io->u.bdev.iovs[0].iov_len = 2048;
643 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw;
644 	g_bdev_io->u.bdev.iovs[1].iov_len = 512;
645 	g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 2048;
646 	g_bdev_io->u.bdev.iovs[2].iov_len = 512;
647 	g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 2048 + 512;
648 	g_bdev_io->u.bdev.iovs[3].iov_len = 1024;
649 	g_bdev_io->u.bdev.iovs[3].iov_base = &test_crazy_rw + 2048 + 512 + 512;
650 
651 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
652 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
653 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
654 
655 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
656 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
657 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks);
658 
659 	for (i = 0; i < num_blocks; i++) {
660 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len));
661 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
662 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
663 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
664 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
665 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
666 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src);
667 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == g_test_crypto_ops[i]->sym->m_dst);
668 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
669 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst);
670 	}
671 	spdk_free(g_io_ctx->cry_iov.iov_base);
672 }
673 
674 static void
675 test_passthru(void)
676 {
677 	/* Make sure these follow our completion callback, test success & fail. */
678 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_UNMAP;
679 	MOCK_SET(spdk_bdev_unmap_blocks, 0);
680 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
681 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
682 	MOCK_SET(spdk_bdev_unmap_blocks, -1);
683 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
684 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
685 	MOCK_CLEAR(spdk_bdev_unmap_blocks);
686 
687 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_FLUSH;
688 	MOCK_SET(spdk_bdev_flush_blocks, 0);
689 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
690 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
691 	MOCK_SET(spdk_bdev_flush_blocks, -1);
692 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
693 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
694 	MOCK_CLEAR(spdk_bdev_flush_blocks);
695 
696 	/* We should never get a WZ command, we report that we don't support it. */
697 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE_ZEROES;
698 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
699 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
700 }
701 
702 static void
703 test_reset(void)
704 {
705 	/* TODO: There are a few different ways to do this given that
706 	 * the code uses spdk_for_each_channel() to implement reset
707 	 * handling. Submitting w/o UT for this function for now and
708 	 * will follow up with something shortly.
709 	 */
710 }
711 
712 static void
713 test_initdrivers(void)
714 {
715 	int rc;
716 	static struct spdk_mempool *orig_mbuf_mp;
717 	static struct rte_mempool *orig_session_mp;
718 	static struct rte_mempool *orig_session_mp_priv;
719 
720 
721 	/* These tests will alloc and free our g_mbuf_mp
722 	 * so save that off here and restore it after each test is over.
723 	 */
724 	orig_mbuf_mp = g_mbuf_mp;
725 	orig_session_mp = g_session_mp;
726 	orig_session_mp_priv = g_session_mp_priv;
727 
728 	g_session_mp_priv = NULL;
729 	g_session_mp = NULL;
730 	g_mbuf_mp = NULL;
731 
732 	/* No drivers available, not an error though */
733 	MOCK_SET(rte_cryptodev_count, 0);
734 	rc = vbdev_crypto_init_crypto_drivers();
735 	CU_ASSERT(rc == 0);
736 	CU_ASSERT(g_mbuf_mp == NULL);
737 	CU_ASSERT(g_session_mp == NULL);
738 	CU_ASSERT(g_session_mp_priv == NULL);
739 
740 	/* Test failure of DPDK dev init. */
741 	MOCK_SET(rte_cryptodev_count, 2);
742 	MOCK_SET(rte_vdev_init, -1);
743 	rc = vbdev_crypto_init_crypto_drivers();
744 	CU_ASSERT(rc == -EINVAL);
745 	CU_ASSERT(g_mbuf_mp == NULL);
746 	CU_ASSERT(g_session_mp == NULL);
747 	CU_ASSERT(g_session_mp_priv == NULL);
748 	MOCK_SET(rte_vdev_init, 0);
749 
750 	/* Can't create session pool. */
751 	MOCK_SET(spdk_mempool_create, NULL);
752 	rc = vbdev_crypto_init_crypto_drivers();
753 	CU_ASSERT(rc == -ENOMEM);
754 	CU_ASSERT(g_mbuf_mp == NULL);
755 	CU_ASSERT(g_session_mp == NULL);
756 	CU_ASSERT(g_session_mp_priv == NULL);
757 	MOCK_CLEAR(spdk_mempool_create);
758 
759 	/* Can't create op pool. */
760 	MOCK_SET(rte_crypto_op_pool_create, NULL);
761 	rc = vbdev_crypto_init_crypto_drivers();
762 	CU_ASSERT(rc == -ENOMEM);
763 	CU_ASSERT(g_mbuf_mp == NULL);
764 	CU_ASSERT(g_session_mp == NULL);
765 	CU_ASSERT(g_session_mp_priv == NULL);
766 	MOCK_SET(rte_crypto_op_pool_create, (struct rte_mempool *)1);
767 
768 	/* Check resources are not sufficient */
769 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
770 	rc = vbdev_crypto_init_crypto_drivers();
771 	CU_ASSERT(rc == -EINVAL);
772 
773 	/* Test crypto dev configure failure. */
774 	MOCK_SET(rte_cryptodev_device_count_by_driver, 2);
775 	MOCK_SET(rte_cryptodev_info_get, 1);
776 	MOCK_SET(rte_cryptodev_configure, -1);
777 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
778 	rc = vbdev_crypto_init_crypto_drivers();
779 	MOCK_SET(rte_cryptodev_configure, 0);
780 	CU_ASSERT(g_mbuf_mp == NULL);
781 	CU_ASSERT(g_session_mp == NULL);
782 	CU_ASSERT(g_session_mp_priv == NULL);
783 	CU_ASSERT(rc == -EINVAL);
784 
785 	/* Test failure of qp setup. */
786 	MOCK_SET(rte_cryptodev_queue_pair_setup, -1);
787 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
788 	rc = vbdev_crypto_init_crypto_drivers();
789 	CU_ASSERT(rc == -EINVAL);
790 	CU_ASSERT(g_mbuf_mp == NULL);
791 	CU_ASSERT(g_session_mp == NULL);
792 	CU_ASSERT(g_session_mp_priv == NULL);
793 	MOCK_SET(rte_cryptodev_queue_pair_setup, 0);
794 
795 	/* Test failure of dev start. */
796 	MOCK_SET(rte_cryptodev_start, -1);
797 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
798 	rc = vbdev_crypto_init_crypto_drivers();
799 	CU_ASSERT(rc == -EINVAL);
800 	CU_ASSERT(g_mbuf_mp == NULL);
801 	CU_ASSERT(g_session_mp == NULL);
802 	CU_ASSERT(g_session_mp_priv == NULL);
803 	MOCK_SET(rte_cryptodev_start, 0);
804 
805 	/* Test happy path. */
806 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
807 	rc = vbdev_crypto_init_crypto_drivers();
808 	/* We don't have spdk_mempool_create mocked right now, so make sure to free the mempools. */
809 	CU_ASSERT(g_mbuf_mp != NULL);
810 	CU_ASSERT(g_session_mp != NULL);
811 	spdk_mempool_free(g_mbuf_mp);
812 	rte_mempool_free(g_session_mp);
813 	if (g_session_mp_priv != NULL) {
814 		/* g_session_mp_priv may or may not be set depending on the DPDK version */
815 		rte_mempool_free(g_session_mp_priv);
816 	}
817 	CU_ASSERT(rc == 0);
818 
819 	/* restore our initial values. */
820 	g_mbuf_mp = orig_mbuf_mp;
821 	g_session_mp = orig_session_mp;
822 	g_session_mp_priv = orig_session_mp_priv;
823 }
824 
825 static void
826 test_crypto_op_complete(void)
827 {
828 	/* Need to prove to scan-build that we are setting iov_bases properly. */
829 	void *old_iov_base;
830 	struct crypto_bdev_io *orig_ctx;
831 
832 	/* Make sure completion code respects failure. */
833 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_FAILED;
834 	g_completion_called = false;
835 	_crypto_operation_complete(g_bdev_io);
836 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
837 	CU_ASSERT(g_completion_called == true);
838 
839 	/* Test read completion. */
840 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
841 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
842 	g_completion_called = false;
843 	_crypto_operation_complete(g_bdev_io);
844 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
845 	CU_ASSERT(g_completion_called == true);
846 
847 	/* Test write completion success. */
848 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
849 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
850 	g_completion_called = false;
851 	MOCK_SET(spdk_bdev_writev_blocks, 0);
852 	/* Code under test will free this, if not ASAN will complain. */
853 	g_io_ctx->cry_iov.iov_base = spdk_malloc(16, 0x10, NULL, SPDK_ENV_LCORE_ID_ANY,
854 				     SPDK_MALLOC_DMA);
855 	orig_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx;
856 	old_iov_base = orig_ctx->cry_iov.iov_base;
857 	_crypto_operation_complete(g_bdev_io);
858 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
859 	CU_ASSERT(g_completion_called == true);
860 
861 	/* Test write completion failed. */
862 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
863 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
864 	g_completion_called = false;
865 	MOCK_SET(spdk_bdev_writev_blocks, -1);
866 	/* Code under test will free this, if not ASAN will complain. */
867 	g_io_ctx->cry_iov.iov_base = spdk_malloc(16, 0x40, NULL, SPDK_ENV_LCORE_ID_ANY,
868 				     SPDK_MALLOC_DMA);
869 	/* To Do: remove this garbage assert as soon as scan-build stops throwing a
870 	 * heap use after free error.
871 	 */
872 	SPDK_CU_ASSERT_FATAL(old_iov_base != orig_ctx->cry_iov.iov_base);
873 	_crypto_operation_complete(g_bdev_io);
874 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
875 	CU_ASSERT(g_completion_called == true);
876 
877 	/* Test bogus type for this completion. */
878 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
879 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_RESET;
880 	g_completion_called = false;
881 	_crypto_operation_complete(g_bdev_io);
882 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
883 	CU_ASSERT(g_completion_called == true);
884 }
885 
886 static void
887 test_supported_io(void)
888 {
889 	void *ctx = NULL;
890 	bool rc = true;
891 
892 	/* Make sure we always report false to WZ, we need the bdev layer to
893 	 * send real 0's so we can encrypt/decrypt them.
894 	 */
895 	rc = vbdev_crypto_io_type_supported(ctx, SPDK_BDEV_IO_TYPE_WRITE_ZEROES);
896 	CU_ASSERT(rc == false);
897 }
898 
899 static void
900 test_poller(void)
901 {
902 	int rc;
903 	struct rte_mbuf *src_mbufs[2];
904 	struct vbdev_crypto_op *op_to_resubmit;
905 
906 	/* test regular 1 op to dequeue and complete */
907 	g_dequeue_mock = g_enqueue_mock = 1;
908 	spdk_mempool_get_bulk(g_mbuf_mp, (void **)&src_mbufs[0], 1);
909 	g_test_crypto_ops[0]->sym->m_src = src_mbufs[0];
910 	g_test_crypto_ops[0]->sym->m_src->userdata = g_bdev_io;
911 	g_test_crypto_ops[0]->sym->m_dst = NULL;
912 	g_io_ctx->cryop_cnt_remaining = 1;
913 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
914 	rc = crypto_dev_poller(g_crypto_ch);
915 	CU_ASSERT(rc == 1);
916 
917 	/* We have nothing dequeued but have some to resubmit */
918 	g_dequeue_mock = 0;
919 	CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == true);
920 
921 	/* add an op to the queued list. */
922 	g_resubmit_test = true;
923 	op_to_resubmit = (struct vbdev_crypto_op *)((uint8_t *)g_test_crypto_ops[0] + QUEUED_OP_OFFSET);
924 	op_to_resubmit->crypto_op = (void *)0xDEADBEEF;
925 	op_to_resubmit->bdev_io = g_bdev_io;
926 	TAILQ_INSERT_TAIL(&g_crypto_ch->queued_cry_ops,
927 			  op_to_resubmit,
928 			  link);
929 	CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == false);
930 	rc = crypto_dev_poller(g_crypto_ch);
931 	g_resubmit_test = false;
932 	CU_ASSERT(rc == 0);
933 	CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == true);
934 
935 	/* 2 to dequeue but 2nd one failed */
936 	g_dequeue_mock = g_enqueue_mock = 2;
937 	g_io_ctx->cryop_cnt_remaining = 2;
938 	spdk_mempool_get_bulk(g_mbuf_mp, (void **)&src_mbufs[0], 2);
939 	g_test_crypto_ops[0]->sym->m_src = src_mbufs[0];
940 	g_test_crypto_ops[0]->sym->m_src->userdata = g_bdev_io;
941 	g_test_crypto_ops[0]->sym->m_dst = NULL;
942 	g_test_crypto_ops[0]->status =  RTE_CRYPTO_OP_STATUS_SUCCESS;
943 	g_test_crypto_ops[1]->sym->m_src = src_mbufs[1];
944 	g_test_crypto_ops[1]->sym->m_src->userdata = g_bdev_io;
945 	g_test_crypto_ops[1]->sym->m_dst = NULL;
946 	g_test_crypto_ops[1]->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
947 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
948 	rc = crypto_dev_poller(g_crypto_ch);
949 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
950 	CU_ASSERT(rc == 2);
951 }
952 
953 int
954 main(int argc, char **argv)
955 {
956 	CU_pSuite	suite = NULL;
957 	unsigned int	num_failures;
958 
959 	if (CU_initialize_registry() != CUE_SUCCESS) {
960 		return CU_get_error();
961 	}
962 
963 	suite = CU_add_suite("crypto", test_setup, test_cleanup);
964 	if (suite == NULL) {
965 		CU_cleanup_registry();
966 		return CU_get_error();
967 	}
968 
969 	if (CU_add_test(suite, "test_error_paths",
970 			test_error_paths) == NULL ||
971 	    CU_add_test(suite, "test_simple_write",
972 			test_simple_write) == NULL ||
973 	    CU_add_test(suite, "test_simple_read",
974 			test_simple_read) == NULL ||
975 	    CU_add_test(suite, "test_large_rw",
976 			test_large_rw) == NULL ||
977 	    CU_add_test(suite, "test_dev_full",
978 			test_dev_full) == NULL ||
979 	    CU_add_test(suite, "test_crazy_rw",
980 			test_crazy_rw) == NULL ||
981 	    CU_add_test(suite, "test_passthru",
982 			test_passthru) == NULL ||
983 	    CU_add_test(suite, "test_initdrivers",
984 			test_initdrivers) == NULL ||
985 	    CU_add_test(suite, "test_crypto_op_complete",
986 			test_crypto_op_complete) == NULL ||
987 	    CU_add_test(suite, "test_supported_io",
988 			test_supported_io) == NULL ||
989 	    CU_add_test(suite, "test_reset",
990 			test_reset) == NULL ||
991 	    CU_add_test(suite, "test_poller",
992 			test_poller) == NULL
993 	   ) {
994 		CU_cleanup_registry();
995 		return CU_get_error();
996 	}
997 
998 	CU_basic_set_mode(CU_BRM_VERBOSE);
999 	CU_basic_run_tests();
1000 	num_failures = CU_get_number_of_failures();
1001 	CU_cleanup_registry();
1002 	return num_failures;
1003 }
1004