xref: /spdk/test/unit/lib/bdev/crypto.c/crypto_ut.c (revision 63b3b8fd8f7e6cb6a348c2fcdd189aa62baf44f6)
1 /*-
2  *   BSD LICENSE
3  *
4  *   Copyright (c) Intel Corporation.
5  *   All rights reserved.
6  *
7  *   Redistribution and use in source and binary forms, with or without
8  *   modification, are permitted provided that the following conditions
9  *   are met:
10  *
11  *     * Redistributions of source code must retain the above copyright
12  *       notice, this list of conditions and the following disclaimer.
13  *     * Redistributions in binary form must reproduce the above copyright
14  *       notice, this list of conditions and the following disclaimer in
15  *       the documentation and/or other materials provided with the
16  *       distribution.
17  *     * Neither the name of Intel Corporation nor the names of its
18  *       contributors may be used to endorse or promote products derived
19  *       from this software without specific prior written permission.
20  *
21  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22  *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23  *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
24  *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
25  *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
26  *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
27  *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28  *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29  *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30  *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31  *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32  */
33 
34 #include "spdk_cunit.h"
35 
36 #include "common/lib/test_env.c"
37 #include "spdk_internal/mock.h"
38 #include "unit/lib/json_mock.c"
39 
40 #include <rte_crypto.h>
41 #include <rte_cryptodev.h>
42 
43 #define MAX_TEST_BLOCKS 8192
44 struct rte_crypto_op *g_test_crypto_ops[MAX_TEST_BLOCKS];
45 struct rte_crypto_op *g_test_dev_full_ops[MAX_TEST_BLOCKS];
46 
47 uint16_t g_dequeue_mock;
48 uint16_t g_enqueue_mock;
49 unsigned ut_rte_crypto_op_bulk_alloc;
50 int ut_rte_crypto_op_attach_sym_session = 0;
51 int ut_rte_cryptodev_info_get = 0;
52 bool ut_rte_cryptodev_info_get_mocked = false;
53 
54 /* Those functions are defined as static inline in DPDK, so we can't
55  * mock them straight away. We use defines to redirect them into
56  * our custom functions.
57  */
58 #define rte_cryptodev_enqueue_burst mock_rte_cryptodev_enqueue_burst
59 static inline uint16_t
60 mock_rte_cryptodev_enqueue_burst(uint8_t dev_id, uint16_t qp_id,
61 				 struct rte_crypto_op **ops, uint16_t nb_ops)
62 {
63 	int i;
64 
65 	CU_ASSERT(nb_ops > 0);
66 
67 	for (i = 0; i < nb_ops; i++) {
68 		/* Use this empty (til now) array of pointers to store
69 		 * enqueued operations for assertion in dev_full test.
70 		 */
71 		g_test_dev_full_ops[i] = *ops++;
72 	}
73 
74 	return g_enqueue_mock;
75 }
76 
77 /* This is pretty ugly but in order to complete an IO via the
78  * poller in the submit path, we need to first call to this func
79  * to return the dequeued value and also decrement it.  On the subsequent
80  * call it needs to return 0 to indicate to the caller that there are
81  * no more IOs to drain.
82  */
83 int g_test_overflow = 0;
84 #define rte_cryptodev_dequeue_burst mock_rte_cryptodev_dequeue_burst
85 static inline uint16_t
86 mock_rte_cryptodev_dequeue_burst(uint8_t dev_id, uint16_t qp_id,
87 				 struct rte_crypto_op **ops, uint16_t nb_ops)
88 {
89 	CU_ASSERT(nb_ops > 0);
90 
91 	/* A crypto device can be full on enqueue, the driver is designed to drain
92 	 * the device at the time by calling the poller until it's empty, then
93 	 * submitting the remaining crypto ops.
94 	 */
95 	if (g_test_overflow) {
96 		if (g_dequeue_mock == 0) {
97 			return 0;
98 		}
99 		*ops = g_test_crypto_ops[g_enqueue_mock];
100 		(*ops)->status = RTE_CRYPTO_OP_STATUS_SUCCESS;
101 		g_dequeue_mock -= 1;
102 	}
103 	return (g_dequeue_mock + 1);
104 }
105 
106 /* Instead of allocating real memory, assign the allocations to our
107  * test array for assertion in tests.
108  */
109 #define rte_crypto_op_bulk_alloc mock_rte_crypto_op_bulk_alloc
110 static inline unsigned
111 mock_rte_crypto_op_bulk_alloc(struct rte_mempool *mempool,
112 			      enum rte_crypto_op_type type,
113 			      struct rte_crypto_op **ops, uint16_t nb_ops)
114 {
115 	int i;
116 
117 	for (i = 0; i < nb_ops; i++) {
118 		*ops++ = g_test_crypto_ops[i];
119 	}
120 	return ut_rte_crypto_op_bulk_alloc;
121 }
122 
123 #define rte_mempool_put_bulk mock_rte_mempool_put_bulk
124 static __rte_always_inline void
125 mock_rte_mempool_put_bulk(struct rte_mempool *mp, void *const *obj_table,
126 			  unsigned int n)
127 {
128 	return;
129 }
130 
131 #define rte_crypto_op_attach_sym_session mock_rte_crypto_op_attach_sym_session
132 static inline int
133 mock_rte_crypto_op_attach_sym_session(struct rte_crypto_op *op,
134 				      struct rte_cryptodev_sym_session *sess)
135 {
136 	return ut_rte_crypto_op_attach_sym_session;
137 }
138 
139 #include "bdev/crypto/vbdev_crypto.c"
140 
141 /* SPDK stubs */
142 DEFINE_STUB(spdk_conf_find_section, struct spdk_conf_section *,
143 	    (struct spdk_conf *cp, const char *name), NULL);
144 DEFINE_STUB(spdk_conf_section_get_nval, char *,
145 	    (struct spdk_conf_section *sp, const char *key, int idx), NULL);
146 DEFINE_STUB(spdk_conf_section_get_nmval, char *,
147 	    (struct spdk_conf_section *sp, const char *key, int idx1, int idx2), NULL);
148 DEFINE_STUB_V(spdk_bdev_module_list_add, (struct spdk_bdev_module *bdev_module));
149 DEFINE_STUB_V(spdk_bdev_free_io, (struct spdk_bdev_io *g_bdev_io));
150 DEFINE_STUB(spdk_bdev_io_type_supported, bool, (struct spdk_bdev *bdev,
151 		enum spdk_bdev_io_type io_type), 0);
152 DEFINE_STUB_V(spdk_bdev_module_release_bdev, (struct spdk_bdev *bdev));
153 DEFINE_STUB_V(spdk_bdev_close, (struct spdk_bdev_desc *desc));
154 DEFINE_STUB(spdk_bdev_get_name, const char *, (const struct spdk_bdev *bdev), 0);
155 DEFINE_STUB(spdk_bdev_get_buf_align, size_t, (const struct spdk_bdev *bdev), 0);
156 DEFINE_STUB(spdk_bdev_get_io_channel, struct spdk_io_channel *, (struct spdk_bdev_desc *desc), 0);
157 DEFINE_STUB_V(spdk_bdev_unregister, (struct spdk_bdev *bdev, spdk_bdev_unregister_cb cb_fn,
158 				     void *cb_arg));
159 DEFINE_STUB(spdk_bdev_open, int, (struct spdk_bdev *bdev, bool write,
160 				  spdk_bdev_remove_cb_t remove_cb,
161 				  void *remove_ctx, struct spdk_bdev_desc **_desc), 0);
162 DEFINE_STUB(spdk_bdev_module_claim_bdev, int, (struct spdk_bdev *bdev, struct spdk_bdev_desc *desc,
163 		struct spdk_bdev_module *module), 0);
164 DEFINE_STUB_V(spdk_bdev_module_examine_done, (struct spdk_bdev_module *module));
165 DEFINE_STUB(spdk_vbdev_register, int, (struct spdk_bdev *vbdev, struct spdk_bdev **base_bdevs,
166 				       int base_bdev_count), 0);
167 DEFINE_STUB(spdk_env_get_socket_id, uint32_t, (uint32_t core), 0);
168 
169 /* DPDK stubs */
170 DEFINE_STUB(rte_cryptodev_count, uint8_t, (void), 0);
171 DEFINE_STUB(rte_eal_get_configuration, struct rte_config *, (void), NULL);
172 DEFINE_STUB_V(rte_mempool_free, (struct rte_mempool *mp));
173 DEFINE_STUB(rte_socket_id, unsigned, (void), 0);
174 DEFINE_STUB(rte_crypto_op_pool_create, struct rte_mempool *,
175 	    (const char *name, enum rte_crypto_op_type type, unsigned nb_elts,
176 	     unsigned cache_size, uint16_t priv_size, int socket_id), (struct rte_mempool *)1);
177 DEFINE_STUB(rte_cryptodev_device_count_by_driver, uint8_t, (uint8_t driver_id), 0);
178 DEFINE_STUB(rte_cryptodev_configure, int, (uint8_t dev_id, struct rte_cryptodev_config *config), 0);
179 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id,
180 		const struct rte_cryptodev_qp_conf *qp_conf,
181 		int socket_id, struct rte_mempool *session_pool), 0);
182 DEFINE_STUB(rte_cryptodev_start, int, (uint8_t dev_id), 0);
183 DEFINE_STUB_V(rte_cryptodev_stop, (uint8_t dev_id));
184 DEFINE_STUB(rte_cryptodev_sym_session_create, struct rte_cryptodev_sym_session *,
185 	    (struct rte_mempool *mempool), (struct rte_cryptodev_sym_session *)1);
186 DEFINE_STUB(rte_cryptodev_sym_session_init, int, (uint8_t dev_id,
187 		struct rte_cryptodev_sym_session *sess,
188 		struct rte_crypto_sym_xform *xforms, struct rte_mempool *mempool), 0);
189 DEFINE_STUB(rte_vdev_init, int, (const char *name, const char *args), 0);
190 DEFINE_STUB(rte_cryptodev_sym_session_free, int, (struct rte_cryptodev_sym_session *sess), 0);
191 
192 struct rte_cryptodev *rte_cryptodevs;
193 
194 /* global vars and setup/cleanup functions used for all test functions */
195 struct spdk_bdev_io *g_bdev_io;
196 struct crypto_bdev_io *g_io_ctx;
197 struct crypto_io_channel *g_crypto_ch;
198 struct spdk_io_channel *g_io_ch;
199 struct vbdev_dev g_device;
200 struct vbdev_crypto g_crypto_bdev;
201 struct rte_config *g_test_config;
202 struct device_qp g_dev_qp;
203 
204 void
205 rte_cryptodev_info_get(uint8_t dev_id, struct rte_cryptodev_info *dev_info)
206 {
207 	dev_info->max_nb_queue_pairs = ut_rte_cryptodev_info_get;
208 }
209 
210 unsigned int
211 rte_cryptodev_sym_get_private_session_size(uint8_t dev_id)
212 {
213 	return (unsigned int)dev_id;
214 }
215 
216 void
217 spdk_bdev_io_get_buf(struct spdk_bdev_io *bdev_io, spdk_bdev_io_get_buf_cb cb, uint64_t len)
218 {
219 	cb(g_io_ch, g_bdev_io);
220 }
221 
222 /* Mock these functions to call the callback and then return the value we require */
223 int ut_spdk_bdev_readv_blocks = 0;
224 bool ut_spdk_bdev_readv_blocks_mocked = false;
225 int
226 spdk_bdev_readv_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
227 		       struct iovec *iov, int iovcnt,
228 		       uint64_t offset_blocks, uint64_t num_blocks,
229 		       spdk_bdev_io_completion_cb cb, void *cb_arg)
230 {
231 	cb(g_bdev_io, !ut_spdk_bdev_readv_blocks, cb_arg);
232 	return ut_spdk_bdev_readv_blocks;
233 }
234 
235 int ut_spdk_bdev_writev_blocks = 0;
236 bool ut_spdk_bdev_writev_blocks_mocked = false;
237 int
238 spdk_bdev_writev_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
239 			struct iovec *iov, int iovcnt,
240 			uint64_t offset_blocks, uint64_t num_blocks,
241 			spdk_bdev_io_completion_cb cb, void *cb_arg)
242 {
243 	cb(g_bdev_io, !ut_spdk_bdev_writev_blocks, cb_arg);
244 	return ut_spdk_bdev_writev_blocks;
245 }
246 
247 int ut_spdk_bdev_unmap_blocks = 0;
248 bool ut_spdk_bdev_unmap_blocks_mocked = false;
249 int
250 spdk_bdev_unmap_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
251 		       uint64_t offset_blocks, uint64_t num_blocks,
252 		       spdk_bdev_io_completion_cb cb, void *cb_arg)
253 {
254 	cb(g_bdev_io, !ut_spdk_bdev_unmap_blocks, cb_arg);
255 	return ut_spdk_bdev_unmap_blocks;
256 }
257 
258 int ut_spdk_bdev_flush_blocks = 0;
259 bool ut_spdk_bdev_flush_blocks_mocked = false;
260 int
261 spdk_bdev_flush_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
262 		       uint64_t offset_blocks, uint64_t num_blocks, spdk_bdev_io_completion_cb cb,
263 		       void *cb_arg)
264 {
265 	cb(g_bdev_io, !ut_spdk_bdev_flush_blocks, cb_arg);
266 	return ut_spdk_bdev_flush_blocks;
267 }
268 
269 int ut_spdk_bdev_reset = 0;
270 bool ut_spdk_bdev_reset_mocked = false;
271 int
272 spdk_bdev_reset(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
273 		spdk_bdev_io_completion_cb cb, void *cb_arg)
274 {
275 	cb(g_bdev_io, !ut_spdk_bdev_reset, cb_arg);
276 	return ut_spdk_bdev_reset;
277 }
278 
279 bool g_completion_called = false;
280 void
281 spdk_bdev_io_complete(struct spdk_bdev_io *bdev_io, enum spdk_bdev_io_status status)
282 {
283 	bdev_io->internal.status = status;
284 	g_completion_called = true;
285 }
286 
287 /* Global setup for all tests that share a bunch of preparation... */
288 static int
289 test_setup(void)
290 {
291 	int i, rc;
292 
293 	/* Prepare essential variables for test routines */
294 	g_bdev_io = calloc(1, sizeof(struct spdk_bdev_io) + sizeof(struct crypto_bdev_io));
295 	g_bdev_io->u.bdev.iovs = calloc(1, sizeof(struct iovec) * 128);
296 	g_bdev_io->bdev = &g_crypto_bdev.crypto_bdev;
297 	g_io_ch = calloc(1, sizeof(struct spdk_io_channel) + sizeof(struct crypto_io_channel));
298 	g_crypto_ch = (struct crypto_io_channel *)((uint8_t *)g_io_ch + sizeof(struct spdk_io_channel));
299 	g_io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx;
300 	memset(&g_device, 0, sizeof(struct vbdev_dev));
301 	memset(&g_crypto_bdev, 0, sizeof(struct vbdev_crypto));
302 	g_dev_qp.device = &g_device;
303 	g_io_ctx->crypto_ch = g_crypto_ch;
304 	g_io_ctx->crypto_bdev = &g_crypto_bdev;
305 	g_crypto_ch->device_qp = &g_dev_qp;
306 	g_test_config = calloc(1, sizeof(struct rte_config));
307 	g_test_config->lcore_count = 1;
308 	TAILQ_INIT(&g_crypto_ch->pending_cry_ios);
309 
310 	/* Allocate a real mbuf pool so we can test error paths */
311 	g_mbuf_mp = spdk_mempool_create("mbuf_mp", NUM_MBUFS, sizeof(struct rte_mbuf),
312 					SPDK_MEMPOOL_DEFAULT_CACHE_SIZE,
313 					SPDK_ENV_SOCKET_ID_ANY);
314 
315 	/* Instead of allocating real rte mempools for these, it's easier and provides the
316 	 * same coverage just calloc them here.
317 	 */
318 	for (i = 0; i < MAX_TEST_BLOCKS; i++) {
319 		rc = posix_memalign((void **)&g_test_crypto_ops[i], 64,
320 				    sizeof(struct rte_crypto_op) + sizeof(struct rte_crypto_sym_op));
321 		if (rc != 0) {
322 			assert(false);
323 		}
324 		memset(g_test_crypto_ops[i], 0, sizeof(struct rte_crypto_op) +
325 		       sizeof(struct rte_crypto_sym_op));
326 	}
327 	return 0;
328 }
329 
330 /* Global teardown for all tests */
331 static int
332 test_cleanup(void)
333 {
334 	int i;
335 
336 	free(g_test_config);
337 	spdk_mempool_free(g_mbuf_mp);
338 	for (i = 0; i < MAX_TEST_BLOCKS; i++) {
339 		free(g_test_crypto_ops[i]);
340 	}
341 	free(g_bdev_io->u.bdev.iovs);
342 	free(g_bdev_io);
343 	free(g_io_ch);
344 	return 0;
345 }
346 
347 static void
348 test_error_paths(void)
349 {
350 	/* Single element block size write, just to test error paths
351 	 * in vbdev_crypto_submit_request().
352 	 */
353 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
354 	g_bdev_io->u.bdev.iovcnt = 1;
355 	g_bdev_io->u.bdev.num_blocks = 1;
356 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
357 	g_crypto_bdev.crypto_bdev.blocklen = 512;
358 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
359 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
360 
361 	/* test failure of spdk_mempool_get_bulk() */
362 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
363 	MOCK_SET(spdk_mempool_get, NULL);
364 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
365 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
366 
367 	/* same thing but switch to reads to test error path in _crypto_complete_io() */
368 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
369 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
370 	TAILQ_INSERT_TAIL(&g_crypto_ch->pending_cry_ios, g_bdev_io, module_link);
371 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
372 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
373 	/* Now with the read_blocks failing */
374 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
375 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
376 	MOCK_SET(spdk_bdev_readv_blocks, -1);
377 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
378 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
379 	MOCK_SET(spdk_bdev_readv_blocks, 0);
380 	MOCK_CLEAR(spdk_mempool_get);
381 
382 	/* test failure of rte_crypto_op_bulk_alloc() */
383 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
384 	ut_rte_crypto_op_bulk_alloc = 0;
385 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
386 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
387 	ut_rte_crypto_op_bulk_alloc = 1;
388 
389 	/* test failure of rte_crypto_op_attach_sym_session() */
390 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
391 	ut_rte_crypto_op_attach_sym_session = -1;
392 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
393 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
394 	ut_rte_crypto_op_attach_sym_session = 0;
395 }
396 
397 static void
398 test_simple_write(void)
399 {
400 	/* Single element block size write */
401 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
402 	g_bdev_io->u.bdev.iovcnt = 1;
403 	g_bdev_io->u.bdev.num_blocks = 1;
404 	g_bdev_io->u.bdev.offset_blocks = 0;
405 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
406 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_write;
407 	g_crypto_bdev.crypto_bdev.blocklen = 512;
408 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
409 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
410 
411 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
412 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
413 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
414 	CU_ASSERT(g_io_ctx->cry_iov.iov_len == 512);
415 	CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL);
416 	CU_ASSERT(g_io_ctx->cry_offset_blocks == 0);
417 	CU_ASSERT(g_io_ctx->cry_num_blocks == 1);
418 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_write);
419 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512);
420 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL);
421 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512);
422 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0);
423 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io);
424 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->buf_addr != NULL);
425 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->data_len == 512);
426 
427 	spdk_dma_free(g_io_ctx->cry_iov.iov_base);
428 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
429 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_dst);
430 }
431 
432 static void
433 test_simple_read(void)
434 {
435 	/* Single element block size read */
436 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
437 	g_bdev_io->u.bdev.iovcnt = 1;
438 	g_bdev_io->u.bdev.num_blocks = 1;
439 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
440 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_read;
441 	g_crypto_bdev.crypto_bdev.blocklen = 512;
442 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
443 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
444 
445 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
446 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
447 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
448 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_read);
449 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512);
450 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL);
451 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512);
452 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0);
453 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io);
454 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst == NULL);
455 
456 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
457 }
458 
459 static void
460 test_large_rw(void)
461 {
462 	unsigned block_len = 512;
463 	unsigned num_blocks = CRYPTO_MAX_IO / block_len;
464 	unsigned io_len = block_len * num_blocks;
465 	unsigned i;
466 
467 	/* Multi block size read, multi-element */
468 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
469 	g_bdev_io->u.bdev.iovcnt = 1;
470 	g_bdev_io->u.bdev.num_blocks = num_blocks;
471 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
472 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw;
473 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
474 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
475 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
476 
477 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
478 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
479 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks);
480 
481 	for (i = 0; i < num_blocks; i++) {
482 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len));
483 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
484 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
485 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
486 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
487 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
488 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL);
489 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
490 	}
491 
492 	/* Multi block size write, multi-element */
493 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
494 	g_bdev_io->u.bdev.iovcnt = 1;
495 	g_bdev_io->u.bdev.num_blocks = num_blocks;
496 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
497 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw;
498 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
499 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
500 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
501 
502 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
503 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
504 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks);
505 
506 	for (i = 0; i < num_blocks; i++) {
507 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len));
508 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
509 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
510 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
511 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
512 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
513 		CU_ASSERT(g_io_ctx->cry_iov.iov_len == io_len);
514 		CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL);
515 		CU_ASSERT(g_io_ctx->cry_offset_blocks == 0);
516 		CU_ASSERT(g_io_ctx->cry_num_blocks == num_blocks);
517 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->buf_addr != NULL);
518 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->data_len == block_len);
519 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
520 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst);
521 	}
522 	spdk_dma_free(g_io_ctx->cry_iov.iov_base);
523 }
524 
525 static void
526 test_dev_full(void)
527 {
528 	unsigned block_len = 512;
529 	unsigned num_blocks = 2;
530 	unsigned io_len = block_len * num_blocks;
531 	unsigned i;
532 
533 	g_test_overflow = 1;
534 
535 	/* Multi block size read, multi-element */
536 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
537 	g_bdev_io->u.bdev.iovcnt = 1;
538 	g_bdev_io->u.bdev.num_blocks = num_blocks;
539 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
540 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_dev_full;
541 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
542 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
543 	g_enqueue_mock = g_dequeue_mock = 1;
544 	ut_rte_crypto_op_bulk_alloc = num_blocks;
545 
546 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
547 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
548 
549 	/* this test only completes one of the 2 IOs (in the drain path) */
550 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
551 
552 	for (i = 0; i < num_blocks; i++) {
553 		/* One of the src_mbufs was freed because of the device full condition so
554 		 * we can't assert its value here.
555 		 */
556 		CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.length == block_len);
557 		CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.offset == 0);
558 		CU_ASSERT(g_test_dev_full_ops[i]->sym->m_src == g_test_dev_full_ops[i]->sym->m_src);
559 		CU_ASSERT(g_test_dev_full_ops[i]->sym->m_dst == NULL);
560 	}
561 
562 	/* Only one of the 2 blocks in the test was freed on completion by design, so
563 	 * we need to free th other one here.
564 	 */
565 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
566 	g_test_overflow = 0;
567 }
568 
569 static void
570 test_crazy_rw(void)
571 {
572 	unsigned block_len = 512;
573 	int num_blocks = 4;
574 	int i;
575 
576 	/* Multi block size read, single element, strange IOV makeup */
577 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
578 	g_bdev_io->u.bdev.iovcnt = 3;
579 	g_bdev_io->u.bdev.num_blocks = num_blocks;
580 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
581 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw;
582 	g_bdev_io->u.bdev.iovs[1].iov_len = 1024;
583 	g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 512;
584 	g_bdev_io->u.bdev.iovs[2].iov_len = 512;
585 	g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 512 + 1024;
586 
587 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
588 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
589 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
590 
591 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
592 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
593 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks);
594 
595 	for (i = 0; i < num_blocks; i++) {
596 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len));
597 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
598 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
599 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
600 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
601 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
602 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src);
603 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL);
604 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
605 	}
606 
607 	/* Multi block size write, single element strange IOV makeup */
608 	num_blocks = 8;
609 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
610 	g_bdev_io->u.bdev.iovcnt = 4;
611 	g_bdev_io->u.bdev.num_blocks = num_blocks;
612 	g_bdev_io->u.bdev.iovs[0].iov_len = 2048;
613 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw;
614 	g_bdev_io->u.bdev.iovs[1].iov_len = 512;
615 	g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 2048;
616 	g_bdev_io->u.bdev.iovs[2].iov_len = 512;
617 	g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 2048 + 512;
618 	g_bdev_io->u.bdev.iovs[3].iov_len = 1024;
619 	g_bdev_io->u.bdev.iovs[3].iov_base = &test_crazy_rw + 2048 + 512 + 512;
620 
621 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
622 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
623 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
624 
625 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
626 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
627 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks);
628 
629 	for (i = 0; i < num_blocks; i++) {
630 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len));
631 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
632 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
633 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
634 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
635 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
636 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src);
637 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == g_test_crypto_ops[i]->sym->m_dst);
638 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
639 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst);
640 	}
641 	spdk_dma_free(g_io_ctx->cry_iov.iov_base);
642 }
643 
644 static void
645 test_passthru(void)
646 {
647 	/* Make sure these follow our completion callback, test success & fail. */
648 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_UNMAP;
649 	MOCK_SET(spdk_bdev_unmap_blocks, 0);
650 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
651 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
652 	MOCK_SET(spdk_bdev_unmap_blocks, -1);
653 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
654 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
655 	MOCK_CLEAR(spdk_bdev_unmap_blocks);
656 
657 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_FLUSH;
658 	MOCK_SET(spdk_bdev_flush_blocks, 0);
659 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
660 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
661 	MOCK_SET(spdk_bdev_flush_blocks, -1);
662 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
663 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
664 	MOCK_CLEAR(spdk_bdev_flush_blocks);
665 
666 	/* We should never get a WZ command, we report that we don't support it. */
667 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE_ZEROES;
668 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
669 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
670 }
671 
672 static void
673 test_reset(void)
674 {
675 	/* TODO: There are a few different ways to do this given that
676 	 * the code uses spdk_for_each_channel() to implement reset
677 	 * handling. SUbmitting w/o UT for this function for now and
678 	 * will follow up with something shortly.
679 	 */
680 }
681 
682 static void
683 test_initdrivers(void)
684 {
685 	int rc;
686 	static struct spdk_mempool *orig_mbuf_mp;
687 	static struct spdk_mempool *orig_session_mp;
688 
689 
690 	/* These tests will alloc and free our g_mbuf_mp
691 	 * so save that off here and restore it after each test is over.
692 	 */
693 	orig_mbuf_mp = g_mbuf_mp;
694 	orig_session_mp = g_session_mp;
695 
696 	g_session_mp = NULL;
697 	g_mbuf_mp = NULL;
698 
699 	/* No drivers available, not an error though */
700 	MOCK_SET(rte_eal_get_configuration, g_test_config);
701 	MOCK_SET(rte_cryptodev_count, 0);
702 	rc = vbdev_crypto_init_crypto_drivers();
703 	CU_ASSERT(rc == 0);
704 	CU_ASSERT(g_mbuf_mp == NULL);
705 	CU_ASSERT(g_session_mp == NULL);
706 
707 	/* Test failure of DPDK dev init. */
708 	MOCK_SET(rte_cryptodev_count, 2);
709 	MOCK_SET(rte_vdev_init, -1);
710 	rc = vbdev_crypto_init_crypto_drivers();
711 	CU_ASSERT(rc == -EINVAL);
712 	CU_ASSERT(g_mbuf_mp == NULL);
713 	CU_ASSERT(g_session_mp == NULL);
714 	MOCK_SET(rte_vdev_init, 0);
715 
716 	/* Can't create session pool. */
717 	MOCK_SET(spdk_mempool_create, NULL);
718 	rc = vbdev_crypto_init_crypto_drivers();
719 	CU_ASSERT(rc == -ENOMEM);
720 	CU_ASSERT(g_mbuf_mp == NULL);
721 	CU_ASSERT(g_session_mp == NULL);
722 	MOCK_CLEAR(spdk_mempool_create);
723 
724 	/* Can't create op pool. */
725 	MOCK_SET(rte_crypto_op_pool_create, NULL);
726 	rc = vbdev_crypto_init_crypto_drivers();
727 	CU_ASSERT(rc == -ENOMEM);
728 	CU_ASSERT(g_mbuf_mp == NULL);
729 	CU_ASSERT(g_session_mp == NULL);
730 	MOCK_SET(rte_crypto_op_pool_create, (struct rte_mempool *)1);
731 
732 	/* Check resources are sufficient failure. */
733 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
734 	rc = vbdev_crypto_init_crypto_drivers();
735 	CU_ASSERT(rc == -EINVAL);
736 
737 	/* Test crypto dev configure failure. */
738 	MOCK_SET(rte_cryptodev_device_count_by_driver, 2);
739 	MOCK_SET(rte_cryptodev_info_get, 1);
740 	MOCK_SET(rte_cryptodev_configure, -1);
741 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
742 	rc = vbdev_crypto_init_crypto_drivers();
743 	MOCK_SET(rte_cryptodev_configure, 0);
744 	CU_ASSERT(g_mbuf_mp == NULL);
745 	CU_ASSERT(g_session_mp == NULL);
746 	CU_ASSERT(rc == -EINVAL);
747 
748 	/* Test failure of qp setup. */
749 	MOCK_SET(rte_cryptodev_queue_pair_setup, -1);
750 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
751 	rc = vbdev_crypto_init_crypto_drivers();
752 	CU_ASSERT(rc == -EINVAL);
753 	CU_ASSERT(g_mbuf_mp == NULL);
754 	CU_ASSERT(g_session_mp == NULL);
755 	MOCK_SET(rte_cryptodev_queue_pair_setup, 0);
756 
757 	/* Test failure of dev start. */
758 	MOCK_SET(rte_cryptodev_start, -1);
759 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
760 	rc = vbdev_crypto_init_crypto_drivers();
761 	CU_ASSERT(rc == -EINVAL);
762 	CU_ASSERT(g_mbuf_mp == NULL);
763 	CU_ASSERT(g_session_mp == NULL);
764 	MOCK_SET(rte_cryptodev_start, 0);
765 
766 	/* Test happy path. */
767 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
768 	rc = vbdev_crypto_init_crypto_drivers();
769 	/* We don't have spdk_mempool_create mocked right now, so make sure to free the mempools. */
770 	CU_ASSERT(g_mbuf_mp != NULL);
771 	CU_ASSERT(g_session_mp != NULL);
772 	spdk_mempool_free(g_mbuf_mp);
773 	spdk_mempool_free(g_session_mp);
774 	CU_ASSERT(rc == 0);
775 
776 	/* restore our initial values. */
777 	g_mbuf_mp = orig_mbuf_mp;
778 	g_session_mp = orig_session_mp;
779 }
780 
781 static void
782 test_crypto_op_complete(void)
783 {
784 	/* Need to prove to scan-build that we are setting iov_bases properly. */
785 	void *old_iov_base;
786 	struct crypto_bdev_io *orig_ctx;
787 
788 	/* Make sure completion code respects failure. */
789 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_FAILED;
790 	g_completion_called = false;
791 	_crypto_operation_complete(g_bdev_io);
792 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
793 	CU_ASSERT(g_completion_called == true);
794 
795 	/* Test read completion. */
796 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
797 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
798 	g_completion_called = false;
799 	_crypto_operation_complete(g_bdev_io);
800 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
801 	CU_ASSERT(g_completion_called == true);
802 
803 	/* Test write completion success. */
804 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
805 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
806 	g_completion_called = false;
807 	MOCK_SET(spdk_bdev_writev_blocks, 0);
808 	/* Code under test will free this, if not ASAN will complain. */
809 	g_io_ctx->cry_iov.iov_base = spdk_dma_malloc(16, 0x10, NULL);
810 	orig_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx;
811 	old_iov_base = orig_ctx->cry_iov.iov_base;
812 	_crypto_operation_complete(g_bdev_io);
813 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
814 	CU_ASSERT(g_completion_called == true);
815 
816 	/* Test write completion failed. */
817 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
818 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
819 	g_completion_called = false;
820 	MOCK_SET(spdk_bdev_writev_blocks, -1);
821 	/* Code under test will free this, if not ASAN will complain. */
822 	g_io_ctx->cry_iov.iov_base = spdk_dma_malloc(16, 0x40, NULL);
823 	/* To Do: remove this garbage assert as soon as scan-build stops throwing a
824 	 * heap use after free error.
825 	 */
826 	SPDK_CU_ASSERT_FATAL(old_iov_base != orig_ctx->cry_iov.iov_base);
827 	_crypto_operation_complete(g_bdev_io);
828 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
829 	CU_ASSERT(g_completion_called == true);
830 
831 	/* Test bogus type for this completion. */
832 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
833 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_RESET;
834 	g_completion_called = false;
835 	_crypto_operation_complete(g_bdev_io);
836 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
837 	CU_ASSERT(g_completion_called == true);
838 }
839 
840 static void
841 test_supported_io(void)
842 {
843 	void *ctx = NULL;
844 	bool rc = true;
845 
846 	/* Make sure we always report false to WZ, we need the bdev layer to
847 	 * send real 0's so we can encrypt/decrypt them.
848 	 */
849 	rc = vbdev_crypto_io_type_supported(ctx, SPDK_BDEV_IO_TYPE_WRITE_ZEROES);
850 	CU_ASSERT(rc == false);
851 }
852 
853 int
854 main(int argc, char **argv)
855 {
856 	CU_pSuite	suite = NULL;
857 	unsigned int	num_failures;
858 
859 	if (CU_initialize_registry() != CUE_SUCCESS) {
860 		return CU_get_error();
861 	}
862 
863 	suite = CU_add_suite("crypto", test_setup, test_cleanup);
864 	if (suite == NULL) {
865 		CU_cleanup_registry();
866 		return CU_get_error();
867 	}
868 
869 	if (CU_add_test(suite, "test_error_paths",
870 			test_error_paths) == NULL ||
871 	    CU_add_test(suite, "test_simple_write",
872 			test_simple_write) == NULL ||
873 	    CU_add_test(suite, "test_simple_read",
874 			test_simple_read) == NULL ||
875 	    CU_add_test(suite, "test_large_rw",
876 			test_large_rw) == NULL ||
877 	    CU_add_test(suite, "test_dev_full",
878 			test_dev_full) == NULL ||
879 	    CU_add_test(suite, "test_crazy_rw",
880 			test_crazy_rw) == NULL ||
881 	    CU_add_test(suite, "test_passthru",
882 			test_passthru) == NULL ||
883 	    CU_add_test(suite, "test_initdrivers",
884 			test_initdrivers) == NULL ||
885 	    CU_add_test(suite, "test_crypto_op_complete",
886 			test_crypto_op_complete) == NULL ||
887 	    CU_add_test(suite, "test_supported_io",
888 			test_supported_io) == NULL ||
889 	    CU_add_test(suite, "test_reset",
890 			test_reset) == NULL
891 	   ) {
892 		CU_cleanup_registry();
893 		return CU_get_error();
894 	}
895 
896 	CU_basic_set_mode(CU_BRM_VERBOSE);
897 	CU_basic_run_tests();
898 	num_failures = CU_get_number_of_failures();
899 	CU_cleanup_registry();
900 	return num_failures;
901 }
902