1 /*- 2 * BSD LICENSE 3 * 4 * Copyright (c) Intel Corporation. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 11 * * Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * * Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in 15 * the documentation and/or other materials provided with the 16 * distribution. 17 * * Neither the name of Intel Corporation nor the names of its 18 * contributors may be used to endorse or promote products derived 19 * from this software without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 22 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 24 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 25 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 26 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 27 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 31 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 32 */ 33 34 #include "spdk_cunit.h" 35 36 #include "common/lib/test_env.c" 37 #include "spdk_internal/mock.h" 38 #include "unit/lib/json_mock.c" 39 40 #include <rte_crypto.h> 41 #include <rte_cryptodev.h> 42 43 #define MAX_TEST_BLOCKS 8192 44 struct rte_crypto_op *g_test_crypto_ops[MAX_TEST_BLOCKS]; 45 struct rte_crypto_op *g_test_dev_full_ops[MAX_TEST_BLOCKS]; 46 47 uint16_t g_dequeue_mock; 48 uint16_t g_enqueue_mock; 49 unsigned ut_rte_crypto_op_bulk_alloc; 50 int ut_rte_crypto_op_attach_sym_session = 0; 51 int ut_rte_cryptodev_info_get = 0; 52 bool ut_rte_cryptodev_info_get_mocked = false; 53 54 /* Those functions are defined as static inline in DPDK, so we can't 55 * mock them straight away. We use defines to redirect them into 56 * our custom functions. 57 */ 58 #define rte_cryptodev_enqueue_burst mock_rte_cryptodev_enqueue_burst 59 static inline uint16_t 60 mock_rte_cryptodev_enqueue_burst(uint8_t dev_id, uint16_t qp_id, 61 struct rte_crypto_op **ops, uint16_t nb_ops) 62 { 63 int i; 64 65 CU_ASSERT(nb_ops > 0); 66 67 for (i = 0; i < nb_ops; i++) { 68 /* Use this empty (til now) array of pointers to store 69 * enqueued operations for assertion in dev_full test. 70 */ 71 g_test_dev_full_ops[i] = *ops++; 72 } 73 74 return g_enqueue_mock; 75 } 76 77 /* This is pretty ugly but in order to complete an IO via the 78 * poller in the submit path, we need to first call to this func 79 * to return the dequeued value and also decrement it. On the subsequent 80 * call it needs to return 0 to indicate to the caller that there are 81 * no more IOs to drain. 82 */ 83 int g_test_overflow = 0; 84 #define rte_cryptodev_dequeue_burst mock_rte_cryptodev_dequeue_burst 85 static inline uint16_t 86 mock_rte_cryptodev_dequeue_burst(uint8_t dev_id, uint16_t qp_id, 87 struct rte_crypto_op **ops, uint16_t nb_ops) 88 { 89 CU_ASSERT(nb_ops > 0); 90 91 /* A crypto device can be full on enqueue, the driver is designed to drain 92 * the device at the time by calling the poller until it's empty, then 93 * submitting the remaining crypto ops. 94 */ 95 if (g_test_overflow) { 96 if (g_dequeue_mock == 0) { 97 return 0; 98 } 99 *ops = g_test_crypto_ops[g_enqueue_mock]; 100 (*ops)->status = RTE_CRYPTO_OP_STATUS_SUCCESS; 101 g_dequeue_mock -= 1; 102 } 103 return (g_dequeue_mock + 1); 104 } 105 106 /* Instead of allocating real memory, assign the allocations to our 107 * test array for assertion in tests. 108 */ 109 #define rte_crypto_op_bulk_alloc mock_rte_crypto_op_bulk_alloc 110 static inline unsigned 111 mock_rte_crypto_op_bulk_alloc(struct rte_mempool *mempool, 112 enum rte_crypto_op_type type, 113 struct rte_crypto_op **ops, uint16_t nb_ops) 114 { 115 int i; 116 117 for (i = 0; i < nb_ops; i++) { 118 *ops++ = g_test_crypto_ops[i]; 119 } 120 return ut_rte_crypto_op_bulk_alloc; 121 } 122 123 #define rte_mempool_put_bulk mock_rte_mempool_put_bulk 124 static __rte_always_inline void 125 mock_rte_mempool_put_bulk(struct rte_mempool *mp, void *const *obj_table, 126 unsigned int n) 127 { 128 return; 129 } 130 131 #define rte_crypto_op_attach_sym_session mock_rte_crypto_op_attach_sym_session 132 static inline int 133 mock_rte_crypto_op_attach_sym_session(struct rte_crypto_op *op, 134 struct rte_cryptodev_sym_session *sess) 135 { 136 return ut_rte_crypto_op_attach_sym_session; 137 } 138 139 #include "bdev/crypto/vbdev_crypto.c" 140 141 /* SPDK stubs */ 142 DEFINE_STUB(spdk_bdev_queue_io_wait, int, (struct spdk_bdev *bdev, struct spdk_io_channel *ch, 143 struct spdk_bdev_io_wait_entry *entry), 0); 144 DEFINE_STUB(spdk_conf_find_section, struct spdk_conf_section *, 145 (struct spdk_conf *cp, const char *name), NULL); 146 DEFINE_STUB(spdk_conf_section_get_nval, char *, 147 (struct spdk_conf_section *sp, const char *key, int idx), NULL); 148 DEFINE_STUB(spdk_conf_section_get_nmval, char *, 149 (struct spdk_conf_section *sp, const char *key, int idx1, int idx2), NULL); 150 DEFINE_STUB_V(spdk_bdev_module_list_add, (struct spdk_bdev_module *bdev_module)); 151 DEFINE_STUB_V(spdk_bdev_free_io, (struct spdk_bdev_io *g_bdev_io)); 152 DEFINE_STUB(spdk_bdev_io_type_supported, bool, (struct spdk_bdev *bdev, 153 enum spdk_bdev_io_type io_type), 0); 154 DEFINE_STUB_V(spdk_bdev_module_release_bdev, (struct spdk_bdev *bdev)); 155 DEFINE_STUB_V(spdk_bdev_close, (struct spdk_bdev_desc *desc)); 156 DEFINE_STUB(spdk_bdev_get_name, const char *, (const struct spdk_bdev *bdev), 0); 157 DEFINE_STUB(spdk_bdev_get_buf_align, size_t, (const struct spdk_bdev *bdev), 0); 158 DEFINE_STUB(spdk_bdev_get_io_channel, struct spdk_io_channel *, (struct spdk_bdev_desc *desc), 0); 159 DEFINE_STUB_V(spdk_bdev_unregister, (struct spdk_bdev *bdev, spdk_bdev_unregister_cb cb_fn, 160 void *cb_arg)); 161 DEFINE_STUB(spdk_bdev_open, int, (struct spdk_bdev *bdev, bool write, 162 spdk_bdev_remove_cb_t remove_cb, 163 void *remove_ctx, struct spdk_bdev_desc **_desc), 0); 164 DEFINE_STUB(spdk_bdev_module_claim_bdev, int, (struct spdk_bdev *bdev, struct spdk_bdev_desc *desc, 165 struct spdk_bdev_module *module), 0); 166 DEFINE_STUB_V(spdk_bdev_module_examine_done, (struct spdk_bdev_module *module)); 167 DEFINE_STUB(spdk_bdev_register, int, (struct spdk_bdev *vbdev), 0); 168 DEFINE_STUB(spdk_env_get_socket_id, uint32_t, (uint32_t core), 0); 169 170 /* DPDK stubs */ 171 DEFINE_STUB(rte_cryptodev_count, uint8_t, (void), 0); 172 DEFINE_STUB(rte_eal_get_configuration, struct rte_config *, (void), NULL); 173 DEFINE_STUB_V(rte_mempool_free, (struct rte_mempool *mp)); 174 DEFINE_STUB(rte_mempool_create, struct rte_mempool *, (const char *name, unsigned n, 175 unsigned elt_size, 176 unsigned cache_size, unsigned private_data_size, 177 rte_mempool_ctor_t *mp_init, void *mp_init_arg, 178 rte_mempool_obj_cb_t *obj_init, void *obj_init_arg, 179 int socket_id, unsigned flags), (struct rte_mempool *)1); 180 DEFINE_STUB(rte_socket_id, unsigned, (void), 0); 181 DEFINE_STUB(rte_crypto_op_pool_create, struct rte_mempool *, 182 (const char *name, enum rte_crypto_op_type type, unsigned nb_elts, 183 unsigned cache_size, uint16_t priv_size, int socket_id), (struct rte_mempool *)1); 184 DEFINE_STUB(rte_cryptodev_device_count_by_driver, uint8_t, (uint8_t driver_id), 0); 185 DEFINE_STUB(rte_cryptodev_configure, int, (uint8_t dev_id, struct rte_cryptodev_config *config), 0); 186 #if RTE_VERSION >= RTE_VERSION_NUM(19, 02, 0, 0) 187 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id, 188 const struct rte_cryptodev_qp_conf *qp_conf, int socket_id), 0); 189 DEFINE_STUB(rte_cryptodev_sym_session_pool_create, struct rte_mempool *, (const char *name, 190 uint32_t nb_elts, 191 uint32_t elt_size, uint32_t cache_size, uint16_t priv_size, 192 int socket_id), (struct rte_mempool *)1); 193 #else 194 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id, 195 const struct rte_cryptodev_qp_conf *qp_conf, 196 int socket_id, struct rte_mempool *session_pool), 0); 197 #endif 198 DEFINE_STUB(rte_cryptodev_start, int, (uint8_t dev_id), 0); 199 DEFINE_STUB_V(rte_cryptodev_stop, (uint8_t dev_id)); 200 DEFINE_STUB(rte_cryptodev_sym_session_create, struct rte_cryptodev_sym_session *, 201 (struct rte_mempool *mempool), (struct rte_cryptodev_sym_session *)1); 202 DEFINE_STUB(rte_cryptodev_sym_session_init, int, (uint8_t dev_id, 203 struct rte_cryptodev_sym_session *sess, 204 struct rte_crypto_sym_xform *xforms, struct rte_mempool *mempool), 0); 205 DEFINE_STUB(rte_vdev_init, int, (const char *name, const char *args), 0); 206 DEFINE_STUB(rte_cryptodev_sym_session_free, int, (struct rte_cryptodev_sym_session *sess), 0); 207 DEFINE_STUB(rte_vdev_uninit, int, (const char *name), 0); 208 209 struct rte_cryptodev *rte_cryptodevs; 210 211 /* global vars and setup/cleanup functions used for all test functions */ 212 struct spdk_bdev_io *g_bdev_io; 213 struct crypto_bdev_io *g_io_ctx; 214 struct crypto_io_channel *g_crypto_ch; 215 struct spdk_io_channel *g_io_ch; 216 struct vbdev_dev g_device; 217 struct vbdev_crypto g_crypto_bdev; 218 struct rte_config *g_test_config; 219 struct device_qp g_dev_qp; 220 221 void 222 rte_cryptodev_info_get(uint8_t dev_id, struct rte_cryptodev_info *dev_info) 223 { 224 dev_info->max_nb_queue_pairs = ut_rte_cryptodev_info_get; 225 } 226 227 unsigned int 228 rte_cryptodev_sym_get_private_session_size(uint8_t dev_id) 229 { 230 return (unsigned int)dev_id; 231 } 232 233 void 234 spdk_bdev_io_get_buf(struct spdk_bdev_io *bdev_io, spdk_bdev_io_get_buf_cb cb, uint64_t len) 235 { 236 cb(g_io_ch, g_bdev_io, true); 237 } 238 239 /* Mock these functions to call the callback and then return the value we require */ 240 int ut_spdk_bdev_readv_blocks = 0; 241 bool ut_spdk_bdev_readv_blocks_mocked = false; 242 int 243 spdk_bdev_readv_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 244 struct iovec *iov, int iovcnt, 245 uint64_t offset_blocks, uint64_t num_blocks, 246 spdk_bdev_io_completion_cb cb, void *cb_arg) 247 { 248 cb(g_bdev_io, !ut_spdk_bdev_readv_blocks, cb_arg); 249 return ut_spdk_bdev_readv_blocks; 250 } 251 252 int ut_spdk_bdev_writev_blocks = 0; 253 bool ut_spdk_bdev_writev_blocks_mocked = false; 254 int 255 spdk_bdev_writev_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 256 struct iovec *iov, int iovcnt, 257 uint64_t offset_blocks, uint64_t num_blocks, 258 spdk_bdev_io_completion_cb cb, void *cb_arg) 259 { 260 cb(g_bdev_io, !ut_spdk_bdev_writev_blocks, cb_arg); 261 return ut_spdk_bdev_writev_blocks; 262 } 263 264 int ut_spdk_bdev_unmap_blocks = 0; 265 bool ut_spdk_bdev_unmap_blocks_mocked = false; 266 int 267 spdk_bdev_unmap_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 268 uint64_t offset_blocks, uint64_t num_blocks, 269 spdk_bdev_io_completion_cb cb, void *cb_arg) 270 { 271 cb(g_bdev_io, !ut_spdk_bdev_unmap_blocks, cb_arg); 272 return ut_spdk_bdev_unmap_blocks; 273 } 274 275 int ut_spdk_bdev_flush_blocks = 0; 276 bool ut_spdk_bdev_flush_blocks_mocked = false; 277 int 278 spdk_bdev_flush_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 279 uint64_t offset_blocks, uint64_t num_blocks, spdk_bdev_io_completion_cb cb, 280 void *cb_arg) 281 { 282 cb(g_bdev_io, !ut_spdk_bdev_flush_blocks, cb_arg); 283 return ut_spdk_bdev_flush_blocks; 284 } 285 286 int ut_spdk_bdev_reset = 0; 287 bool ut_spdk_bdev_reset_mocked = false; 288 int 289 spdk_bdev_reset(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 290 spdk_bdev_io_completion_cb cb, void *cb_arg) 291 { 292 cb(g_bdev_io, !ut_spdk_bdev_reset, cb_arg); 293 return ut_spdk_bdev_reset; 294 } 295 296 bool g_completion_called = false; 297 void 298 spdk_bdev_io_complete(struct spdk_bdev_io *bdev_io, enum spdk_bdev_io_status status) 299 { 300 bdev_io->internal.status = status; 301 g_completion_called = true; 302 } 303 304 /* Global setup for all tests that share a bunch of preparation... */ 305 static int 306 test_setup(void) 307 { 308 int i, rc; 309 310 /* Prepare essential variables for test routines */ 311 g_bdev_io = calloc(1, sizeof(struct spdk_bdev_io) + sizeof(struct crypto_bdev_io)); 312 g_bdev_io->u.bdev.iovs = calloc(1, sizeof(struct iovec) * 128); 313 g_bdev_io->bdev = &g_crypto_bdev.crypto_bdev; 314 g_io_ch = calloc(1, sizeof(struct spdk_io_channel) + sizeof(struct crypto_io_channel)); 315 g_crypto_ch = (struct crypto_io_channel *)((uint8_t *)g_io_ch + sizeof(struct spdk_io_channel)); 316 g_io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx; 317 memset(&g_device, 0, sizeof(struct vbdev_dev)); 318 memset(&g_crypto_bdev, 0, sizeof(struct vbdev_crypto)); 319 g_dev_qp.device = &g_device; 320 g_io_ctx->crypto_ch = g_crypto_ch; 321 g_io_ctx->crypto_bdev = &g_crypto_bdev; 322 g_crypto_ch->device_qp = &g_dev_qp; 323 g_test_config = calloc(1, sizeof(struct rte_config)); 324 g_test_config->lcore_count = 1; 325 TAILQ_INIT(&g_crypto_ch->pending_cry_ios); 326 327 /* Allocate a real mbuf pool so we can test error paths */ 328 g_mbuf_mp = spdk_mempool_create("mbuf_mp", NUM_MBUFS, sizeof(struct rte_mbuf), 329 SPDK_MEMPOOL_DEFAULT_CACHE_SIZE, 330 SPDK_ENV_SOCKET_ID_ANY); 331 332 /* Instead of allocating real rte mempools for these, it's easier and provides the 333 * same coverage just calloc them here. 334 */ 335 for (i = 0; i < MAX_TEST_BLOCKS; i++) { 336 rc = posix_memalign((void **)&g_test_crypto_ops[i], 64, 337 sizeof(struct rte_crypto_op) + sizeof(struct rte_crypto_sym_op) + 338 AES_CBC_IV_LENGTH); 339 if (rc != 0) { 340 assert(false); 341 } 342 memset(g_test_crypto_ops[i], 0, sizeof(struct rte_crypto_op) + 343 sizeof(struct rte_crypto_sym_op)); 344 } 345 return 0; 346 } 347 348 /* Global teardown for all tests */ 349 static int 350 test_cleanup(void) 351 { 352 int i; 353 354 free(g_test_config); 355 spdk_mempool_free(g_mbuf_mp); 356 for (i = 0; i < MAX_TEST_BLOCKS; i++) { 357 free(g_test_crypto_ops[i]); 358 } 359 free(g_bdev_io->u.bdev.iovs); 360 free(g_bdev_io); 361 free(g_io_ch); 362 return 0; 363 } 364 365 static void 366 test_error_paths(void) 367 { 368 /* Single element block size write, just to test error paths 369 * in vbdev_crypto_submit_request(). 370 */ 371 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 372 g_bdev_io->u.bdev.iovcnt = 1; 373 g_bdev_io->u.bdev.num_blocks = 1; 374 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 375 g_crypto_bdev.crypto_bdev.blocklen = 512; 376 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 377 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 378 379 /* test failure of spdk_mempool_get_bulk(), will result in success becuase it 380 * will get queued. 381 */ 382 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 383 MOCK_SET(spdk_mempool_get, NULL); 384 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 385 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 386 387 /* same thing but switch to reads to test error path in _crypto_complete_io() */ 388 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 389 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 390 TAILQ_INSERT_TAIL(&g_crypto_ch->pending_cry_ios, g_bdev_io, module_link); 391 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 392 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 393 /* Now with the read_blocks failing */ 394 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 395 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 396 MOCK_SET(spdk_bdev_readv_blocks, -1); 397 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 398 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 399 MOCK_SET(spdk_bdev_readv_blocks, 0); 400 MOCK_CLEAR(spdk_mempool_get); 401 402 /* test failure of rte_crypto_op_bulk_alloc() */ 403 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 404 ut_rte_crypto_op_bulk_alloc = 0; 405 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 406 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 407 ut_rte_crypto_op_bulk_alloc = 1; 408 409 /* test failure of rte_crypto_op_attach_sym_session() */ 410 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 411 ut_rte_crypto_op_attach_sym_session = -1; 412 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 413 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 414 ut_rte_crypto_op_attach_sym_session = 0; 415 } 416 417 static void 418 test_simple_write(void) 419 { 420 /* Single element block size write */ 421 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 422 g_bdev_io->u.bdev.iovcnt = 1; 423 g_bdev_io->u.bdev.num_blocks = 1; 424 g_bdev_io->u.bdev.offset_blocks = 0; 425 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 426 g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_write; 427 g_crypto_bdev.crypto_bdev.blocklen = 512; 428 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 429 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 430 431 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 432 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 433 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1); 434 CU_ASSERT(g_io_ctx->cry_iov.iov_len == 512); 435 CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL); 436 CU_ASSERT(g_io_ctx->cry_offset_blocks == 0); 437 CU_ASSERT(g_io_ctx->cry_num_blocks == 1); 438 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_write); 439 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512); 440 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL); 441 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512); 442 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0); 443 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io); 444 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->buf_addr != NULL); 445 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->data_len == 512); 446 447 spdk_free(g_io_ctx->cry_iov.iov_base); 448 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 449 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_dst); 450 } 451 452 static void 453 test_simple_read(void) 454 { 455 /* Single element block size read */ 456 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 457 g_bdev_io->u.bdev.iovcnt = 1; 458 g_bdev_io->u.bdev.num_blocks = 1; 459 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 460 g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_read; 461 g_crypto_bdev.crypto_bdev.blocklen = 512; 462 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 463 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 464 465 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 466 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 467 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1); 468 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_read); 469 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512); 470 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL); 471 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512); 472 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0); 473 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io); 474 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst == NULL); 475 476 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 477 } 478 479 static void 480 test_large_rw(void) 481 { 482 unsigned block_len = 512; 483 unsigned num_blocks = CRYPTO_MAX_IO / block_len; 484 unsigned io_len = block_len * num_blocks; 485 unsigned i; 486 487 /* Multi block size read, multi-element */ 488 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 489 g_bdev_io->u.bdev.iovcnt = 1; 490 g_bdev_io->u.bdev.num_blocks = num_blocks; 491 g_bdev_io->u.bdev.iovs[0].iov_len = io_len; 492 g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw; 493 g_crypto_bdev.crypto_bdev.blocklen = block_len; 494 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 495 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 496 497 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 498 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 499 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks); 500 501 for (i = 0; i < num_blocks; i++) { 502 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len)); 503 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 504 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 505 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 506 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 507 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 508 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL); 509 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 510 } 511 512 /* Multi block size write, multi-element */ 513 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 514 g_bdev_io->u.bdev.iovcnt = 1; 515 g_bdev_io->u.bdev.num_blocks = num_blocks; 516 g_bdev_io->u.bdev.iovs[0].iov_len = io_len; 517 g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw; 518 g_crypto_bdev.crypto_bdev.blocklen = block_len; 519 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 520 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 521 522 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 523 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 524 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks); 525 526 for (i = 0; i < num_blocks; i++) { 527 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len)); 528 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 529 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 530 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 531 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 532 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 533 CU_ASSERT(g_io_ctx->cry_iov.iov_len == io_len); 534 CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL); 535 CU_ASSERT(g_io_ctx->cry_offset_blocks == 0); 536 CU_ASSERT(g_io_ctx->cry_num_blocks == num_blocks); 537 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->buf_addr != NULL); 538 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->data_len == block_len); 539 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 540 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst); 541 } 542 spdk_free(g_io_ctx->cry_iov.iov_base); 543 } 544 545 static void 546 test_dev_full(void) 547 { 548 unsigned block_len = 512; 549 unsigned num_blocks = 2; 550 unsigned io_len = block_len * num_blocks; 551 unsigned i; 552 553 g_test_overflow = 1; 554 555 /* Multi block size read, multi-element */ 556 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 557 g_bdev_io->u.bdev.iovcnt = 1; 558 g_bdev_io->u.bdev.num_blocks = num_blocks; 559 g_bdev_io->u.bdev.iovs[0].iov_len = io_len; 560 g_bdev_io->u.bdev.iovs[0].iov_base = &test_dev_full; 561 g_crypto_bdev.crypto_bdev.blocklen = block_len; 562 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 563 g_enqueue_mock = g_dequeue_mock = 1; 564 ut_rte_crypto_op_bulk_alloc = num_blocks; 565 566 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 567 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 568 569 /* this test only completes one of the 2 IOs (in the drain path) */ 570 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1); 571 572 for (i = 0; i < num_blocks; i++) { 573 /* One of the src_mbufs was freed because of the device full condition so 574 * we can't assert its value here. 575 */ 576 CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.length == block_len); 577 CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.offset == 0); 578 CU_ASSERT(g_test_dev_full_ops[i]->sym->m_src == g_test_dev_full_ops[i]->sym->m_src); 579 CU_ASSERT(g_test_dev_full_ops[i]->sym->m_dst == NULL); 580 } 581 582 /* Only one of the 2 blocks in the test was freed on completion by design, so 583 * we need to free th other one here. 584 */ 585 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 586 g_test_overflow = 0; 587 } 588 589 static void 590 test_crazy_rw(void) 591 { 592 unsigned block_len = 512; 593 int num_blocks = 4; 594 int i; 595 596 /* Multi block size read, single element, strange IOV makeup */ 597 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 598 g_bdev_io->u.bdev.iovcnt = 3; 599 g_bdev_io->u.bdev.num_blocks = num_blocks; 600 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 601 g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw; 602 g_bdev_io->u.bdev.iovs[1].iov_len = 1024; 603 g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 512; 604 g_bdev_io->u.bdev.iovs[2].iov_len = 512; 605 g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 512 + 1024; 606 607 g_crypto_bdev.crypto_bdev.blocklen = block_len; 608 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 609 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 610 611 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 612 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 613 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks); 614 615 for (i = 0; i < num_blocks; i++) { 616 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len)); 617 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 618 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 619 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 620 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 621 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 622 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src); 623 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL); 624 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 625 } 626 627 /* Multi block size write, single element strange IOV makeup */ 628 num_blocks = 8; 629 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 630 g_bdev_io->u.bdev.iovcnt = 4; 631 g_bdev_io->u.bdev.num_blocks = num_blocks; 632 g_bdev_io->u.bdev.iovs[0].iov_len = 2048; 633 g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw; 634 g_bdev_io->u.bdev.iovs[1].iov_len = 512; 635 g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 2048; 636 g_bdev_io->u.bdev.iovs[2].iov_len = 512; 637 g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 2048 + 512; 638 g_bdev_io->u.bdev.iovs[3].iov_len = 1024; 639 g_bdev_io->u.bdev.iovs[3].iov_base = &test_crazy_rw + 2048 + 512 + 512; 640 641 g_crypto_bdev.crypto_bdev.blocklen = block_len; 642 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 643 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 644 645 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 646 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 647 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks); 648 649 for (i = 0; i < num_blocks; i++) { 650 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len)); 651 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 652 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 653 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 654 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 655 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 656 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src); 657 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == g_test_crypto_ops[i]->sym->m_dst); 658 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 659 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst); 660 } 661 spdk_free(g_io_ctx->cry_iov.iov_base); 662 } 663 664 static void 665 test_passthru(void) 666 { 667 /* Make sure these follow our completion callback, test success & fail. */ 668 g_bdev_io->type = SPDK_BDEV_IO_TYPE_UNMAP; 669 MOCK_SET(spdk_bdev_unmap_blocks, 0); 670 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 671 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 672 MOCK_SET(spdk_bdev_unmap_blocks, -1); 673 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 674 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 675 MOCK_CLEAR(spdk_bdev_unmap_blocks); 676 677 g_bdev_io->type = SPDK_BDEV_IO_TYPE_FLUSH; 678 MOCK_SET(spdk_bdev_flush_blocks, 0); 679 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 680 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 681 MOCK_SET(spdk_bdev_flush_blocks, -1); 682 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 683 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 684 MOCK_CLEAR(spdk_bdev_flush_blocks); 685 686 /* We should never get a WZ command, we report that we don't support it. */ 687 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE_ZEROES; 688 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 689 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 690 } 691 692 static void 693 test_reset(void) 694 { 695 /* TODO: There are a few different ways to do this given that 696 * the code uses spdk_for_each_channel() to implement reset 697 * handling. SUbmitting w/o UT for this function for now and 698 * will follow up with something shortly. 699 */ 700 } 701 702 static void 703 test_initdrivers(void) 704 { 705 int rc; 706 static struct spdk_mempool *orig_mbuf_mp; 707 static struct rte_mempool *orig_session_mp; 708 static struct rte_mempool *orig_session_mp_priv; 709 710 711 /* These tests will alloc and free our g_mbuf_mp 712 * so save that off here and restore it after each test is over. 713 */ 714 orig_mbuf_mp = g_mbuf_mp; 715 orig_session_mp = g_session_mp; 716 orig_session_mp_priv = g_session_mp_priv; 717 718 g_session_mp_priv = NULL; 719 g_session_mp = NULL; 720 g_mbuf_mp = NULL; 721 722 /* No drivers available, not an error though */ 723 MOCK_SET(rte_eal_get_configuration, g_test_config); 724 MOCK_SET(rte_cryptodev_count, 0); 725 rc = vbdev_crypto_init_crypto_drivers(); 726 CU_ASSERT(rc == 0); 727 CU_ASSERT(g_mbuf_mp == NULL); 728 CU_ASSERT(g_session_mp == NULL); 729 CU_ASSERT(g_session_mp_priv == NULL); 730 731 /* Test failure of DPDK dev init. */ 732 MOCK_SET(rte_cryptodev_count, 2); 733 MOCK_SET(rte_vdev_init, -1); 734 rc = vbdev_crypto_init_crypto_drivers(); 735 CU_ASSERT(rc == -EINVAL); 736 CU_ASSERT(g_mbuf_mp == NULL); 737 CU_ASSERT(g_session_mp == NULL); 738 CU_ASSERT(g_session_mp_priv == NULL); 739 MOCK_SET(rte_vdev_init, 0); 740 741 /* Can't create session pool. */ 742 MOCK_SET(spdk_mempool_create, NULL); 743 rc = vbdev_crypto_init_crypto_drivers(); 744 CU_ASSERT(rc == -ENOMEM); 745 CU_ASSERT(g_mbuf_mp == NULL); 746 CU_ASSERT(g_session_mp == NULL); 747 CU_ASSERT(g_session_mp_priv == NULL); 748 MOCK_CLEAR(spdk_mempool_create); 749 750 /* Can't create op pool. */ 751 MOCK_SET(rte_crypto_op_pool_create, NULL); 752 rc = vbdev_crypto_init_crypto_drivers(); 753 CU_ASSERT(rc == -ENOMEM); 754 CU_ASSERT(g_mbuf_mp == NULL); 755 CU_ASSERT(g_session_mp == NULL); 756 CU_ASSERT(g_session_mp_priv == NULL); 757 MOCK_SET(rte_crypto_op_pool_create, (struct rte_mempool *)1); 758 759 /* Check resources are not sufficient */ 760 MOCK_CLEARED_ASSERT(spdk_mempool_create); 761 rc = vbdev_crypto_init_crypto_drivers(); 762 CU_ASSERT(rc == -EINVAL); 763 764 /* Test crypto dev configure failure. */ 765 MOCK_SET(rte_cryptodev_device_count_by_driver, 2); 766 MOCK_SET(rte_cryptodev_info_get, 1); 767 MOCK_SET(rte_cryptodev_configure, -1); 768 MOCK_CLEARED_ASSERT(spdk_mempool_create); 769 rc = vbdev_crypto_init_crypto_drivers(); 770 MOCK_SET(rte_cryptodev_configure, 0); 771 CU_ASSERT(g_mbuf_mp == NULL); 772 CU_ASSERT(g_session_mp == NULL); 773 CU_ASSERT(g_session_mp_priv == NULL); 774 CU_ASSERT(rc == -EINVAL); 775 776 /* Test failure of qp setup. */ 777 MOCK_SET(rte_cryptodev_queue_pair_setup, -1); 778 MOCK_CLEARED_ASSERT(spdk_mempool_create); 779 rc = vbdev_crypto_init_crypto_drivers(); 780 CU_ASSERT(rc == -EINVAL); 781 CU_ASSERT(g_mbuf_mp == NULL); 782 CU_ASSERT(g_session_mp == NULL); 783 CU_ASSERT(g_session_mp_priv == NULL); 784 MOCK_SET(rte_cryptodev_queue_pair_setup, 0); 785 786 /* Test failure of dev start. */ 787 MOCK_SET(rte_cryptodev_start, -1); 788 MOCK_CLEARED_ASSERT(spdk_mempool_create); 789 rc = vbdev_crypto_init_crypto_drivers(); 790 CU_ASSERT(rc == -EINVAL); 791 CU_ASSERT(g_mbuf_mp == NULL); 792 CU_ASSERT(g_session_mp == NULL); 793 CU_ASSERT(g_session_mp_priv == NULL); 794 MOCK_SET(rte_cryptodev_start, 0); 795 796 /* Test happy path. */ 797 MOCK_CLEARED_ASSERT(spdk_mempool_create); 798 rc = vbdev_crypto_init_crypto_drivers(); 799 /* We don't have spdk_mempool_create mocked right now, so make sure to free the mempools. */ 800 CU_ASSERT(g_mbuf_mp != NULL); 801 CU_ASSERT(g_session_mp != NULL); 802 spdk_mempool_free(g_mbuf_mp); 803 rte_mempool_free(g_session_mp); 804 if (g_session_mp_priv != NULL) { 805 /* g_session_mp_priv may or may not be set depending on the DPDK version */ 806 rte_mempool_free(g_session_mp_priv); 807 } 808 CU_ASSERT(rc == 0); 809 810 /* restore our initial values. */ 811 g_mbuf_mp = orig_mbuf_mp; 812 g_session_mp = orig_session_mp; 813 g_session_mp_priv = orig_session_mp_priv; 814 } 815 816 static void 817 test_crypto_op_complete(void) 818 { 819 /* Need to prove to scan-build that we are setting iov_bases properly. */ 820 void *old_iov_base; 821 struct crypto_bdev_io *orig_ctx; 822 823 /* Make sure completion code respects failure. */ 824 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_FAILED; 825 g_completion_called = false; 826 _crypto_operation_complete(g_bdev_io); 827 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 828 CU_ASSERT(g_completion_called == true); 829 830 /* Test read completion. */ 831 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 832 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 833 g_completion_called = false; 834 _crypto_operation_complete(g_bdev_io); 835 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 836 CU_ASSERT(g_completion_called == true); 837 838 /* Test write completion success. */ 839 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 840 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 841 g_completion_called = false; 842 MOCK_SET(spdk_bdev_writev_blocks, 0); 843 /* Code under test will free this, if not ASAN will complain. */ 844 g_io_ctx->cry_iov.iov_base = spdk_malloc(16, 0x10, NULL, SPDK_ENV_LCORE_ID_ANY, 845 SPDK_MALLOC_DMA); 846 orig_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx; 847 old_iov_base = orig_ctx->cry_iov.iov_base; 848 _crypto_operation_complete(g_bdev_io); 849 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 850 CU_ASSERT(g_completion_called == true); 851 852 /* Test write completion failed. */ 853 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 854 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 855 g_completion_called = false; 856 MOCK_SET(spdk_bdev_writev_blocks, -1); 857 /* Code under test will free this, if not ASAN will complain. */ 858 g_io_ctx->cry_iov.iov_base = spdk_malloc(16, 0x40, NULL, SPDK_ENV_LCORE_ID_ANY, 859 SPDK_MALLOC_DMA); 860 /* To Do: remove this garbage assert as soon as scan-build stops throwing a 861 * heap use after free error. 862 */ 863 SPDK_CU_ASSERT_FATAL(old_iov_base != orig_ctx->cry_iov.iov_base); 864 _crypto_operation_complete(g_bdev_io); 865 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 866 CU_ASSERT(g_completion_called == true); 867 868 /* Test bogus type for this completion. */ 869 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 870 g_bdev_io->type = SPDK_BDEV_IO_TYPE_RESET; 871 g_completion_called = false; 872 _crypto_operation_complete(g_bdev_io); 873 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 874 CU_ASSERT(g_completion_called == true); 875 } 876 877 static void 878 test_supported_io(void) 879 { 880 void *ctx = NULL; 881 bool rc = true; 882 883 /* Make sure we always report false to WZ, we need the bdev layer to 884 * send real 0's so we can encrypt/decrypt them. 885 */ 886 rc = vbdev_crypto_io_type_supported(ctx, SPDK_BDEV_IO_TYPE_WRITE_ZEROES); 887 CU_ASSERT(rc == false); 888 } 889 890 int 891 main(int argc, char **argv) 892 { 893 CU_pSuite suite = NULL; 894 unsigned int num_failures; 895 896 if (CU_initialize_registry() != CUE_SUCCESS) { 897 return CU_get_error(); 898 } 899 900 suite = CU_add_suite("crypto", test_setup, test_cleanup); 901 if (suite == NULL) { 902 CU_cleanup_registry(); 903 return CU_get_error(); 904 } 905 906 if (CU_add_test(suite, "test_error_paths", 907 test_error_paths) == NULL || 908 CU_add_test(suite, "test_simple_write", 909 test_simple_write) == NULL || 910 CU_add_test(suite, "test_simple_read", 911 test_simple_read) == NULL || 912 CU_add_test(suite, "test_large_rw", 913 test_large_rw) == NULL || 914 CU_add_test(suite, "test_dev_full", 915 test_dev_full) == NULL || 916 CU_add_test(suite, "test_crazy_rw", 917 test_crazy_rw) == NULL || 918 CU_add_test(suite, "test_passthru", 919 test_passthru) == NULL || 920 CU_add_test(suite, "test_initdrivers", 921 test_initdrivers) == NULL || 922 CU_add_test(suite, "test_crypto_op_complete", 923 test_crypto_op_complete) == NULL || 924 CU_add_test(suite, "test_supported_io", 925 test_supported_io) == NULL || 926 CU_add_test(suite, "test_reset", 927 test_reset) == NULL 928 ) { 929 CU_cleanup_registry(); 930 return CU_get_error(); 931 } 932 933 CU_basic_set_mode(CU_BRM_VERBOSE); 934 CU_basic_run_tests(); 935 num_failures = CU_get_number_of_failures(); 936 CU_cleanup_registry(); 937 return num_failures; 938 } 939