1 /*- 2 * BSD LICENSE 3 * 4 * Copyright (c) Intel Corporation. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 11 * * Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * * Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in 15 * the documentation and/or other materials provided with the 16 * distribution. 17 * * Neither the name of Intel Corporation nor the names of its 18 * contributors may be used to endorse or promote products derived 19 * from this software without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 22 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 24 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 25 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 26 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 27 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 31 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 32 */ 33 34 #include "spdk_cunit.h" 35 36 #include "common/lib/test_env.c" 37 #include "spdk_internal/mock.h" 38 #include "unit/lib/json_mock.c" 39 40 #include <rte_crypto.h> 41 #include <rte_cryptodev.h> 42 43 #define MAX_TEST_BLOCKS 8192 44 struct rte_crypto_op *g_test_crypto_ops[MAX_TEST_BLOCKS]; 45 struct rte_crypto_op *g_test_dev_full_ops[MAX_TEST_BLOCKS]; 46 47 uint16_t g_dequeue_mock; 48 uint16_t g_enqueue_mock; 49 unsigned ut_rte_crypto_op_bulk_alloc; 50 int ut_rte_crypto_op_attach_sym_session = 0; 51 int ut_rte_cryptodev_info_get = 0; 52 bool ut_rte_cryptodev_info_get_mocked = false; 53 54 /* Those functions are defined as static inline in DPDK, so we can't 55 * mock them straight away. We use defines to redirect them into 56 * our custom functions. 57 */ 58 #define rte_cryptodev_enqueue_burst mock_rte_cryptodev_enqueue_burst 59 static inline uint16_t 60 mock_rte_cryptodev_enqueue_burst(uint8_t dev_id, uint16_t qp_id, 61 struct rte_crypto_op **ops, uint16_t nb_ops) 62 { 63 int i; 64 65 CU_ASSERT(nb_ops > 0); 66 67 for (i = 0; i < nb_ops; i++) { 68 /* Use this empty (til now) array of pointers to store 69 * enqueued operations for assertion in dev_full test. 70 */ 71 g_test_dev_full_ops[i] = *ops++; 72 } 73 74 return g_enqueue_mock; 75 } 76 77 /* This is pretty ugly but in order to complete an IO via the 78 * poller in the submit path, we need to first call to this func 79 * to return the dequeued value and also decrement it. On the subsequent 80 * call it needs to return 0 to indicate to the caller that there are 81 * no more IOs to drain. 82 */ 83 int g_test_overflow = 0; 84 #define rte_cryptodev_dequeue_burst mock_rte_cryptodev_dequeue_burst 85 static inline uint16_t 86 mock_rte_cryptodev_dequeue_burst(uint8_t dev_id, uint16_t qp_id, 87 struct rte_crypto_op **ops, uint16_t nb_ops) 88 { 89 CU_ASSERT(nb_ops > 0); 90 91 /* A crypto device can be full on enqueue, the driver is designed to drain 92 * the device at the time by calling the poller until it's empty, then 93 * submitting the remaining crypto ops. 94 */ 95 if (g_test_overflow) { 96 if (g_dequeue_mock == 0) { 97 return 0; 98 } 99 *ops = g_test_crypto_ops[g_enqueue_mock]; 100 (*ops)->status = RTE_CRYPTO_OP_STATUS_SUCCESS; 101 g_dequeue_mock -= 1; 102 } 103 return (g_dequeue_mock + 1); 104 } 105 106 /* Instead of allocating real memory, assign the allocations to our 107 * test array for assertion in tests. 108 */ 109 #define rte_crypto_op_bulk_alloc mock_rte_crypto_op_bulk_alloc 110 static inline unsigned 111 mock_rte_crypto_op_bulk_alloc(struct rte_mempool *mempool, 112 enum rte_crypto_op_type type, 113 struct rte_crypto_op **ops, uint16_t nb_ops) 114 { 115 int i; 116 117 for (i = 0; i < nb_ops; i++) { 118 *ops++ = g_test_crypto_ops[i]; 119 } 120 return ut_rte_crypto_op_bulk_alloc; 121 } 122 123 #define rte_mempool_put_bulk mock_rte_mempool_put_bulk 124 static __rte_always_inline void 125 mock_rte_mempool_put_bulk(struct rte_mempool *mp, void *const *obj_table, 126 unsigned int n) 127 { 128 return; 129 } 130 131 #define rte_crypto_op_attach_sym_session mock_rte_crypto_op_attach_sym_session 132 static inline int 133 mock_rte_crypto_op_attach_sym_session(struct rte_crypto_op *op, 134 struct rte_cryptodev_sym_session *sess) 135 { 136 return ut_rte_crypto_op_attach_sym_session; 137 } 138 139 #include "bdev/crypto/vbdev_crypto.c" 140 141 /* SPDK stubs */ 142 DEFINE_STUB(spdk_conf_find_section, struct spdk_conf_section *, 143 (struct spdk_conf *cp, const char *name), NULL); 144 DEFINE_STUB(spdk_conf_section_get_nval, char *, 145 (struct spdk_conf_section *sp, const char *key, int idx), NULL); 146 DEFINE_STUB(spdk_conf_section_get_nmval, char *, 147 (struct spdk_conf_section *sp, const char *key, int idx1, int idx2), NULL); 148 DEFINE_STUB_V(spdk_bdev_module_list_add, (struct spdk_bdev_module *bdev_module)); 149 DEFINE_STUB_V(spdk_bdev_free_io, (struct spdk_bdev_io *g_bdev_io)); 150 DEFINE_STUB(spdk_bdev_io_type_supported, bool, (struct spdk_bdev *bdev, 151 enum spdk_bdev_io_type io_type), 0); 152 DEFINE_STUB_V(spdk_bdev_module_release_bdev, (struct spdk_bdev *bdev)); 153 DEFINE_STUB_V(spdk_bdev_close, (struct spdk_bdev_desc *desc)); 154 DEFINE_STUB(spdk_bdev_get_name, const char *, (const struct spdk_bdev *bdev), 0); 155 DEFINE_STUB(spdk_bdev_get_buf_align, size_t, (const struct spdk_bdev *bdev), 0); 156 DEFINE_STUB(spdk_bdev_get_io_channel, struct spdk_io_channel *, (struct spdk_bdev_desc *desc), 0); 157 DEFINE_STUB_V(spdk_bdev_unregister, (struct spdk_bdev *bdev, spdk_bdev_unregister_cb cb_fn, 158 void *cb_arg)); 159 DEFINE_STUB(spdk_bdev_open, int, (struct spdk_bdev *bdev, bool write, 160 spdk_bdev_remove_cb_t remove_cb, 161 void *remove_ctx, struct spdk_bdev_desc **_desc), 0); 162 DEFINE_STUB(spdk_bdev_module_claim_bdev, int, (struct spdk_bdev *bdev, struct spdk_bdev_desc *desc, 163 struct spdk_bdev_module *module), 0); 164 DEFINE_STUB_V(spdk_bdev_module_examine_done, (struct spdk_bdev_module *module)); 165 DEFINE_STUB(spdk_vbdev_register, int, (struct spdk_bdev *vbdev, struct spdk_bdev **base_bdevs, 166 int base_bdev_count), 0); 167 DEFINE_STUB(spdk_env_get_socket_id, uint32_t, (uint32_t core), 0); 168 169 /* DPDK stubs */ 170 DEFINE_STUB(rte_cryptodev_count, uint8_t, (void), 0); 171 DEFINE_STUB(rte_eal_get_configuration, struct rte_config *, (void), NULL); 172 DEFINE_STUB_V(rte_mempool_free, (struct rte_mempool *mp)); 173 DEFINE_STUB(rte_socket_id, unsigned, (void), 0); 174 DEFINE_STUB(rte_crypto_op_pool_create, struct rte_mempool *, 175 (const char *name, enum rte_crypto_op_type type, unsigned nb_elts, 176 unsigned cache_size, uint16_t priv_size, int socket_id), (struct rte_mempool *)1); 177 DEFINE_STUB(rte_cryptodev_device_count_by_driver, uint8_t, (uint8_t driver_id), 0); 178 DEFINE_STUB(rte_cryptodev_configure, int, (uint8_t dev_id, struct rte_cryptodev_config *config), 0); 179 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id, 180 const struct rte_cryptodev_qp_conf *qp_conf, 181 int socket_id, struct rte_mempool *session_pool), 0); 182 DEFINE_STUB(rte_cryptodev_start, int, (uint8_t dev_id), 0); 183 DEFINE_STUB_V(rte_cryptodev_stop, (uint8_t dev_id)); 184 DEFINE_STUB(rte_cryptodev_sym_session_create, struct rte_cryptodev_sym_session *, 185 (struct rte_mempool *mempool), (struct rte_cryptodev_sym_session *)1); 186 DEFINE_STUB(rte_cryptodev_sym_session_init, int, (uint8_t dev_id, 187 struct rte_cryptodev_sym_session *sess, 188 struct rte_crypto_sym_xform *xforms, struct rte_mempool *mempool), 0); 189 DEFINE_STUB(rte_vdev_init, int, (const char *name, const char *args), 0); 190 DEFINE_STUB(rte_cryptodev_sym_session_free, int, (struct rte_cryptodev_sym_session *sess), 0); 191 192 struct rte_cryptodev *rte_cryptodevs; 193 194 /* global vars and setup/cleanup functions used for all test functions */ 195 struct spdk_bdev_io *g_bdev_io; 196 struct crypto_bdev_io *g_io_ctx; 197 struct crypto_io_channel *g_crypto_ch; 198 struct spdk_io_channel *g_io_ch; 199 struct vbdev_dev g_device; 200 struct vbdev_crypto g_crypto_bdev; 201 struct rte_config *g_test_config; 202 struct device_qp g_dev_qp; 203 204 void 205 rte_cryptodev_info_get(uint8_t dev_id, struct rte_cryptodev_info *dev_info) 206 { 207 dev_info->max_nb_queue_pairs = ut_rte_cryptodev_info_get; 208 } 209 210 unsigned int 211 rte_cryptodev_sym_get_private_session_size(uint8_t dev_id) 212 { 213 return (unsigned int)dev_id; 214 } 215 216 void 217 spdk_bdev_io_get_buf(struct spdk_bdev_io *bdev_io, spdk_bdev_io_get_buf_cb cb, uint64_t len) 218 { 219 cb(g_io_ch, g_bdev_io); 220 } 221 222 /* Mock these functions to call the callback and then return the value we require */ 223 int ut_spdk_bdev_readv_blocks = 0; 224 bool ut_spdk_bdev_readv_blocks_mocked = false; 225 int 226 spdk_bdev_readv_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 227 struct iovec *iov, int iovcnt, 228 uint64_t offset_blocks, uint64_t num_blocks, 229 spdk_bdev_io_completion_cb cb, void *cb_arg) 230 { 231 cb(g_bdev_io, !ut_spdk_bdev_readv_blocks, cb_arg); 232 return ut_spdk_bdev_readv_blocks; 233 } 234 235 int ut_spdk_bdev_writev_blocks = 0; 236 bool ut_spdk_bdev_writev_blocks_mocked = false; 237 int 238 spdk_bdev_writev_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 239 struct iovec *iov, int iovcnt, 240 uint64_t offset_blocks, uint64_t num_blocks, 241 spdk_bdev_io_completion_cb cb, void *cb_arg) 242 { 243 cb(g_bdev_io, !ut_spdk_bdev_writev_blocks, cb_arg); 244 return ut_spdk_bdev_writev_blocks; 245 } 246 247 int ut_spdk_bdev_unmap_blocks = 0; 248 bool ut_spdk_bdev_unmap_blocks_mocked = false; 249 int 250 spdk_bdev_unmap_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 251 uint64_t offset_blocks, uint64_t num_blocks, 252 spdk_bdev_io_completion_cb cb, void *cb_arg) 253 { 254 cb(g_bdev_io, !ut_spdk_bdev_unmap_blocks, cb_arg); 255 return ut_spdk_bdev_unmap_blocks; 256 } 257 258 int ut_spdk_bdev_flush_blocks = 0; 259 bool ut_spdk_bdev_flush_blocks_mocked = false; 260 int 261 spdk_bdev_flush_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 262 uint64_t offset_blocks, uint64_t num_blocks, spdk_bdev_io_completion_cb cb, 263 void *cb_arg) 264 { 265 cb(g_bdev_io, !ut_spdk_bdev_flush_blocks, cb_arg); 266 return ut_spdk_bdev_flush_blocks; 267 } 268 269 int ut_spdk_bdev_reset = 0; 270 bool ut_spdk_bdev_reset_mocked = false; 271 int 272 spdk_bdev_reset(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 273 spdk_bdev_io_completion_cb cb, void *cb_arg) 274 { 275 cb(g_bdev_io, !ut_spdk_bdev_reset, cb_arg); 276 return ut_spdk_bdev_reset; 277 } 278 279 bool g_completion_called = false; 280 void 281 spdk_bdev_io_complete(struct spdk_bdev_io *bdev_io, enum spdk_bdev_io_status status) 282 { 283 bdev_io->internal.status = status; 284 g_completion_called = true; 285 } 286 287 /* Global setup for all tests that share a bunch of preparation... */ 288 static int 289 test_setup(void) 290 { 291 int i, rc; 292 293 /* Prepare essential variables for test routines */ 294 g_bdev_io = calloc(1, sizeof(struct spdk_bdev_io) + sizeof(struct crypto_bdev_io)); 295 g_bdev_io->u.bdev.iovs = calloc(1, sizeof(struct iovec) * 128); 296 g_bdev_io->bdev = &g_crypto_bdev.crypto_bdev; 297 g_io_ch = calloc(1, sizeof(struct spdk_io_channel) + sizeof(struct crypto_io_channel)); 298 g_crypto_ch = (struct crypto_io_channel *)((uint8_t *)g_io_ch + sizeof(struct spdk_io_channel)); 299 g_io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx; 300 memset(&g_device, 0, sizeof(struct vbdev_dev)); 301 memset(&g_crypto_bdev, 0, sizeof(struct vbdev_crypto)); 302 g_dev_qp.device = &g_device; 303 g_io_ctx->crypto_ch = g_crypto_ch; 304 g_io_ctx->crypto_bdev = &g_crypto_bdev; 305 g_crypto_ch->device_qp = &g_dev_qp; 306 g_test_config = calloc(1, sizeof(struct rte_config)); 307 g_test_config->lcore_count = 1; 308 TAILQ_INIT(&g_crypto_ch->pending_cry_ios); 309 310 /* Allocate a real mbuf pool so we can test error paths */ 311 g_mbuf_mp = spdk_mempool_create("mbuf_mp", NUM_MBUFS, sizeof(struct rte_mbuf), 312 SPDK_MEMPOOL_DEFAULT_CACHE_SIZE, 313 SPDK_ENV_SOCKET_ID_ANY); 314 315 /* Instead of allocating real rte mempools for these, it's easier and provides the 316 * same coverage just calloc them here. 317 */ 318 for (i = 0; i < MAX_TEST_BLOCKS; i++) { 319 rc = posix_memalign((void **)&g_test_crypto_ops[i], 64, 320 sizeof(struct rte_crypto_op) + sizeof(struct rte_crypto_sym_op)); 321 if (rc != 0) { 322 assert(false); 323 } 324 memset(g_test_crypto_ops[i], 0, sizeof(struct rte_crypto_op) + 325 sizeof(struct rte_crypto_sym_op)); 326 } 327 return 0; 328 } 329 330 /* Global teardown for all tests */ 331 static int 332 test_cleanup(void) 333 { 334 int i; 335 336 free(g_test_config); 337 spdk_mempool_free(g_mbuf_mp); 338 for (i = 0; i < MAX_TEST_BLOCKS; i++) { 339 free(g_test_crypto_ops[i]); 340 } 341 free(g_bdev_io->u.bdev.iovs); 342 free(g_bdev_io); 343 free(g_io_ch); 344 return 0; 345 } 346 347 static void 348 test_error_paths(void) 349 { 350 /* Single element block size write, just to test error paths 351 * in vbdev_crypto_submit_request(). 352 */ 353 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 354 g_bdev_io->u.bdev.iovcnt = 1; 355 g_bdev_io->u.bdev.num_blocks = 1; 356 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 357 g_crypto_bdev.crypto_bdev.blocklen = 512; 358 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 359 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 360 361 /* test failure of spdk_mempool_get_bulk() */ 362 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 363 MOCK_SET(spdk_mempool_get, NULL); 364 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 365 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 366 367 /* same thing but switch to reads to test error path in _crypto_complete_io() */ 368 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 369 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 370 TAILQ_INSERT_TAIL(&g_crypto_ch->pending_cry_ios, g_bdev_io, module_link); 371 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 372 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 373 /* Now with the read_blocks failing */ 374 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 375 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 376 MOCK_SET(spdk_bdev_readv_blocks, -1); 377 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 378 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 379 MOCK_SET(spdk_bdev_readv_blocks, 0); 380 MOCK_CLEAR(spdk_mempool_get); 381 382 /* test failure of rte_crypto_op_bulk_alloc() */ 383 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 384 ut_rte_crypto_op_bulk_alloc = 0; 385 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 386 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 387 ut_rte_crypto_op_bulk_alloc = 1; 388 389 /* test failure of rte_crypto_op_attach_sym_session() */ 390 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 391 ut_rte_crypto_op_attach_sym_session = -1; 392 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 393 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 394 ut_rte_crypto_op_attach_sym_session = 0; 395 } 396 397 static void 398 test_simple_write(void) 399 { 400 /* Single element block size write */ 401 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 402 g_bdev_io->u.bdev.iovcnt = 1; 403 g_bdev_io->u.bdev.num_blocks = 1; 404 g_bdev_io->u.bdev.offset_blocks = 0; 405 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 406 g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_write; 407 g_crypto_bdev.crypto_bdev.blocklen = 512; 408 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 409 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 410 411 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 412 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 413 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1); 414 CU_ASSERT(g_io_ctx->cry_iov.iov_len == 512); 415 CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL); 416 CU_ASSERT(g_io_ctx->cry_offset_blocks == 0); 417 CU_ASSERT(g_io_ctx->cry_num_blocks == 1); 418 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_write); 419 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512); 420 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL); 421 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512); 422 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0); 423 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io); 424 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->buf_addr != NULL); 425 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->data_len == 512); 426 427 spdk_dma_free(g_io_ctx->cry_iov.iov_base); 428 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 429 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_dst); 430 } 431 432 static void 433 test_simple_read(void) 434 { 435 /* Single element block size read */ 436 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 437 g_bdev_io->u.bdev.iovcnt = 1; 438 g_bdev_io->u.bdev.num_blocks = 1; 439 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 440 g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_read; 441 g_crypto_bdev.crypto_bdev.blocklen = 512; 442 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 443 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 444 445 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 446 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 447 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1); 448 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_read); 449 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512); 450 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL); 451 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512); 452 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0); 453 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io); 454 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst == NULL); 455 456 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 457 } 458 459 static void 460 test_large_rw(void) 461 { 462 unsigned block_len = 512; 463 unsigned num_blocks = CRYPTO_MAX_IO / block_len; 464 unsigned io_len = block_len * num_blocks; 465 unsigned i; 466 467 /* Multi block size read, multi-element */ 468 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 469 g_bdev_io->u.bdev.iovcnt = 1; 470 g_bdev_io->u.bdev.num_blocks = num_blocks; 471 g_bdev_io->u.bdev.iovs[0].iov_len = io_len; 472 g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw; 473 g_crypto_bdev.crypto_bdev.blocklen = block_len; 474 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 475 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 476 477 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 478 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 479 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks); 480 481 for (i = 0; i < num_blocks; i++) { 482 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len)); 483 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 484 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 485 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 486 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 487 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 488 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL); 489 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 490 } 491 492 /* Multi block size write, multi-element */ 493 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 494 g_bdev_io->u.bdev.iovcnt = 1; 495 g_bdev_io->u.bdev.num_blocks = num_blocks; 496 g_bdev_io->u.bdev.iovs[0].iov_len = io_len; 497 g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw; 498 g_crypto_bdev.crypto_bdev.blocklen = block_len; 499 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 500 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 501 502 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 503 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 504 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks); 505 506 for (i = 0; i < num_blocks; i++) { 507 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len)); 508 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 509 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 510 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 511 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 512 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 513 CU_ASSERT(g_io_ctx->cry_iov.iov_len == io_len); 514 CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL); 515 CU_ASSERT(g_io_ctx->cry_offset_blocks == 0); 516 CU_ASSERT(g_io_ctx->cry_num_blocks == num_blocks); 517 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->buf_addr != NULL); 518 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->data_len == block_len); 519 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 520 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst); 521 } 522 spdk_dma_free(g_io_ctx->cry_iov.iov_base); 523 } 524 525 static void 526 test_dev_full(void) 527 { 528 unsigned block_len = 512; 529 unsigned num_blocks = 2; 530 unsigned io_len = block_len * num_blocks; 531 unsigned i; 532 533 g_test_overflow = 1; 534 535 /* Multi block size read, multi-element */ 536 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 537 g_bdev_io->u.bdev.iovcnt = 1; 538 g_bdev_io->u.bdev.num_blocks = num_blocks; 539 g_bdev_io->u.bdev.iovs[0].iov_len = io_len; 540 g_bdev_io->u.bdev.iovs[0].iov_base = &test_dev_full; 541 g_crypto_bdev.crypto_bdev.blocklen = block_len; 542 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 543 g_enqueue_mock = g_dequeue_mock = 1; 544 ut_rte_crypto_op_bulk_alloc = num_blocks; 545 546 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 547 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 548 549 /* this test only completes one of the 2 IOs (in the drain path) */ 550 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1); 551 552 for (i = 0; i < num_blocks; i++) { 553 /* One of the src_mbufs was freed because of the device full condition so 554 * we can't assert its value here. 555 */ 556 CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.length == block_len); 557 CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.offset == 0); 558 CU_ASSERT(g_test_dev_full_ops[i]->sym->m_src == g_test_dev_full_ops[i]->sym->m_src); 559 CU_ASSERT(g_test_dev_full_ops[i]->sym->m_dst == NULL); 560 } 561 562 /* Only one of the 2 blocks in the test was freed on completion by design, so 563 * we need to free th other one here. 564 */ 565 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 566 g_test_overflow = 0; 567 } 568 569 static void 570 test_crazy_rw(void) 571 { 572 unsigned block_len = 512; 573 int num_blocks = 4; 574 int i; 575 576 /* Multi block size read, single element, strange IOV makeup */ 577 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 578 g_bdev_io->u.bdev.iovcnt = 3; 579 g_bdev_io->u.bdev.num_blocks = num_blocks; 580 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 581 g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw; 582 g_bdev_io->u.bdev.iovs[1].iov_len = 1024; 583 g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 512; 584 g_bdev_io->u.bdev.iovs[2].iov_len = 512; 585 g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 512 + 1024; 586 587 g_crypto_bdev.crypto_bdev.blocklen = block_len; 588 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 589 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 590 591 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 592 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 593 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks); 594 595 for (i = 0; i < num_blocks; i++) { 596 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len)); 597 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 598 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 599 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 600 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 601 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 602 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src); 603 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL); 604 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 605 } 606 607 /* Multi block size write, single element strange IOV makeup */ 608 num_blocks = 8; 609 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 610 g_bdev_io->u.bdev.iovcnt = 4; 611 g_bdev_io->u.bdev.num_blocks = num_blocks; 612 g_bdev_io->u.bdev.iovs[0].iov_len = 2048; 613 g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw; 614 g_bdev_io->u.bdev.iovs[1].iov_len = 512; 615 g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 2048; 616 g_bdev_io->u.bdev.iovs[2].iov_len = 512; 617 g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 2048 + 512; 618 g_bdev_io->u.bdev.iovs[3].iov_len = 1024; 619 g_bdev_io->u.bdev.iovs[3].iov_base = &test_crazy_rw + 2048 + 512 + 512; 620 621 g_crypto_bdev.crypto_bdev.blocklen = block_len; 622 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 623 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 624 625 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 626 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 627 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks); 628 629 for (i = 0; i < num_blocks; i++) { 630 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len)); 631 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 632 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 633 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 634 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 635 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 636 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src); 637 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == g_test_crypto_ops[i]->sym->m_dst); 638 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 639 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst); 640 } 641 spdk_dma_free(g_io_ctx->cry_iov.iov_base); 642 } 643 644 static void 645 test_passthru(void) 646 { 647 /* Make sure these follow our completion callback, test success & fail. */ 648 g_bdev_io->type = SPDK_BDEV_IO_TYPE_UNMAP; 649 MOCK_SET(spdk_bdev_unmap_blocks, 0); 650 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 651 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 652 MOCK_SET(spdk_bdev_unmap_blocks, -1); 653 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 654 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 655 MOCK_CLEAR(spdk_bdev_unmap_blocks); 656 657 g_bdev_io->type = SPDK_BDEV_IO_TYPE_FLUSH; 658 MOCK_SET(spdk_bdev_flush_blocks, 0); 659 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 660 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 661 MOCK_SET(spdk_bdev_flush_blocks, -1); 662 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 663 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 664 MOCK_CLEAR(spdk_bdev_flush_blocks); 665 666 /* We should never get a WZ command, we report that we don't support it. */ 667 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE_ZEROES; 668 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 669 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 670 } 671 672 static void 673 test_reset(void) 674 { 675 /* TODO: There are a few different ways to do this given that 676 * the code uses spdk_for_each_channel() to implement reset 677 * handling. SUbmitting w/o UT for this function for now and 678 * will follow up with something shortly. 679 */ 680 } 681 682 static void 683 test_initdrivers(void) 684 { 685 int rc; 686 static struct spdk_mempool *orig_mbuf_mp; 687 static struct spdk_mempool *orig_session_mp; 688 689 690 /* These tests will alloc and free our g_mbuf_mp 691 * so save that off here and restore it after each test is over. 692 */ 693 orig_mbuf_mp = g_mbuf_mp; 694 orig_session_mp = g_session_mp; 695 696 g_session_mp = NULL; 697 g_mbuf_mp = NULL; 698 699 /* No drivers available, not an error though */ 700 MOCK_SET(rte_eal_get_configuration, g_test_config); 701 MOCK_SET(rte_cryptodev_count, 0); 702 rc = vbdev_crypto_init_crypto_drivers(); 703 CU_ASSERT(rc == 0); 704 CU_ASSERT(g_mbuf_mp == NULL); 705 CU_ASSERT(g_session_mp == NULL); 706 707 /* Test failure of DPDK dev init. */ 708 MOCK_SET(rte_cryptodev_count, 2); 709 MOCK_SET(rte_vdev_init, -1); 710 rc = vbdev_crypto_init_crypto_drivers(); 711 CU_ASSERT(rc == -EINVAL); 712 CU_ASSERT(g_mbuf_mp == NULL); 713 CU_ASSERT(g_session_mp == NULL); 714 MOCK_SET(rte_vdev_init, 0); 715 716 /* Can't create session pool. */ 717 MOCK_SET(spdk_mempool_create, NULL); 718 rc = vbdev_crypto_init_crypto_drivers(); 719 CU_ASSERT(rc == -ENOMEM); 720 CU_ASSERT(g_mbuf_mp == NULL); 721 CU_ASSERT(g_session_mp == NULL); 722 MOCK_CLEAR(spdk_mempool_create); 723 724 /* Can't create op pool. */ 725 MOCK_SET(rte_crypto_op_pool_create, NULL); 726 rc = vbdev_crypto_init_crypto_drivers(); 727 CU_ASSERT(rc == -ENOMEM); 728 CU_ASSERT(g_mbuf_mp == NULL); 729 CU_ASSERT(g_session_mp == NULL); 730 MOCK_SET(rte_crypto_op_pool_create, (struct rte_mempool *)1); 731 732 /* Check resources are sufficient failure. */ 733 MOCK_CLEARED_ASSERT(spdk_mempool_create); 734 rc = vbdev_crypto_init_crypto_drivers(); 735 CU_ASSERT(rc == -EINVAL); 736 737 /* Test crypto dev configure failure. */ 738 MOCK_SET(rte_cryptodev_device_count_by_driver, 2); 739 MOCK_SET(rte_cryptodev_info_get, 1); 740 MOCK_SET(rte_cryptodev_configure, -1); 741 MOCK_CLEARED_ASSERT(spdk_mempool_create); 742 rc = vbdev_crypto_init_crypto_drivers(); 743 MOCK_SET(rte_cryptodev_configure, 0); 744 CU_ASSERT(g_mbuf_mp == NULL); 745 CU_ASSERT(g_session_mp == NULL); 746 CU_ASSERT(rc == -EINVAL); 747 748 /* Test failure of qp setup. */ 749 MOCK_SET(rte_cryptodev_queue_pair_setup, -1); 750 MOCK_CLEARED_ASSERT(spdk_mempool_create); 751 rc = vbdev_crypto_init_crypto_drivers(); 752 CU_ASSERT(rc == -EINVAL); 753 CU_ASSERT(g_mbuf_mp == NULL); 754 CU_ASSERT(g_session_mp == NULL); 755 MOCK_SET(rte_cryptodev_queue_pair_setup, 0); 756 757 /* Test failure of dev start. */ 758 MOCK_SET(rte_cryptodev_start, -1); 759 MOCK_CLEARED_ASSERT(spdk_mempool_create); 760 rc = vbdev_crypto_init_crypto_drivers(); 761 CU_ASSERT(rc == -EINVAL); 762 CU_ASSERT(g_mbuf_mp == NULL); 763 CU_ASSERT(g_session_mp == NULL); 764 MOCK_SET(rte_cryptodev_start, 0); 765 766 /* Test happy path. */ 767 MOCK_CLEARED_ASSERT(spdk_mempool_create); 768 rc = vbdev_crypto_init_crypto_drivers(); 769 /* We don't have spdk_mempool_create mocked right now, so make sure to free the mempools. */ 770 CU_ASSERT(g_mbuf_mp != NULL); 771 CU_ASSERT(g_session_mp != NULL); 772 spdk_mempool_free(g_mbuf_mp); 773 spdk_mempool_free(g_session_mp); 774 CU_ASSERT(rc == 0); 775 776 /* restore our initial values. */ 777 g_mbuf_mp = orig_mbuf_mp; 778 g_session_mp = orig_session_mp; 779 } 780 781 static void 782 test_crypto_op_complete(void) 783 { 784 /* Need to prove to scan-build that we are setting iov_bases properly. */ 785 void *old_iov_base; 786 struct crypto_bdev_io *orig_ctx; 787 788 /* Make sure completion code respects failure. */ 789 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_FAILED; 790 g_completion_called = false; 791 _crypto_operation_complete(g_bdev_io); 792 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 793 CU_ASSERT(g_completion_called == true); 794 795 /* Test read completion. */ 796 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 797 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 798 g_completion_called = false; 799 _crypto_operation_complete(g_bdev_io); 800 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 801 CU_ASSERT(g_completion_called == true); 802 803 /* Test write completion success. */ 804 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 805 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 806 g_completion_called = false; 807 MOCK_SET(spdk_bdev_writev_blocks, 0); 808 /* Code under test will free this, if not ASAN will complain. */ 809 g_io_ctx->cry_iov.iov_base = spdk_dma_malloc(16, 0x10, NULL); 810 orig_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx; 811 old_iov_base = orig_ctx->cry_iov.iov_base; 812 _crypto_operation_complete(g_bdev_io); 813 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 814 CU_ASSERT(g_completion_called == true); 815 816 /* Test write completion failed. */ 817 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 818 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 819 g_completion_called = false; 820 MOCK_SET(spdk_bdev_writev_blocks, -1); 821 /* Code under test will free this, if not ASAN will complain. */ 822 g_io_ctx->cry_iov.iov_base = spdk_dma_malloc(16, 0x40, NULL); 823 /* To Do: remove this garbage assert as soon as scan-build stops throwing a 824 * heap use after free error. 825 */ 826 SPDK_CU_ASSERT_FATAL(old_iov_base != orig_ctx->cry_iov.iov_base); 827 _crypto_operation_complete(g_bdev_io); 828 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 829 CU_ASSERT(g_completion_called == true); 830 831 /* Test bogus type for this completion. */ 832 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 833 g_bdev_io->type = SPDK_BDEV_IO_TYPE_RESET; 834 g_completion_called = false; 835 _crypto_operation_complete(g_bdev_io); 836 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 837 CU_ASSERT(g_completion_called == true); 838 } 839 840 static void 841 test_supported_io(void) 842 { 843 void *ctx = NULL; 844 bool rc = true; 845 846 /* Make sure we always report false to WZ, we need the bdev layer to 847 * send real 0's so we can encrypt/decrypt them. 848 */ 849 rc = vbdev_crypto_io_type_supported(ctx, SPDK_BDEV_IO_TYPE_WRITE_ZEROES); 850 CU_ASSERT(rc == false); 851 } 852 853 int 854 main(int argc, char **argv) 855 { 856 CU_pSuite suite = NULL; 857 unsigned int num_failures; 858 859 if (CU_initialize_registry() != CUE_SUCCESS) { 860 return CU_get_error(); 861 } 862 863 suite = CU_add_suite("crypto", test_setup, test_cleanup); 864 if (suite == NULL) { 865 CU_cleanup_registry(); 866 return CU_get_error(); 867 } 868 869 if (CU_add_test(suite, "test_error_paths", 870 test_error_paths) == NULL || 871 CU_add_test(suite, "test_simple_write", 872 test_simple_write) == NULL || 873 CU_add_test(suite, "test_simple_read", 874 test_simple_read) == NULL || 875 CU_add_test(suite, "test_large_rw", 876 test_large_rw) == NULL || 877 CU_add_test(suite, "test_dev_full", 878 test_dev_full) == NULL || 879 CU_add_test(suite, "test_crazy_rw", 880 test_crazy_rw) == NULL || 881 CU_add_test(suite, "test_passthru", 882 test_passthru) == NULL || 883 CU_add_test(suite, "test_initdrivers", 884 test_initdrivers) == NULL || 885 CU_add_test(suite, "test_crypto_op_complete", 886 test_crypto_op_complete) == NULL || 887 CU_add_test(suite, "test_supported_io", 888 test_supported_io) == NULL || 889 CU_add_test(suite, "test_reset", 890 test_reset) == NULL 891 ) { 892 CU_cleanup_registry(); 893 return CU_get_error(); 894 } 895 896 CU_basic_set_mode(CU_BRM_VERBOSE); 897 CU_basic_run_tests(); 898 num_failures = CU_get_number_of_failures(); 899 CU_cleanup_registry(); 900 return num_failures; 901 } 902