xref: /spdk/test/unit/lib/bdev/crypto.c/crypto_ut.c (revision 69a8877e8220bfd945808d475476f9a8e4af9338)
1 /*-
2  *   BSD LICENSE
3  *
4  *   Copyright (c) Intel Corporation.
5  *   All rights reserved.
6  *
7  *   Redistribution and use in source and binary forms, with or without
8  *   modification, are permitted provided that the following conditions
9  *   are met:
10  *
11  *     * Redistributions of source code must retain the above copyright
12  *       notice, this list of conditions and the following disclaimer.
13  *     * Redistributions in binary form must reproduce the above copyright
14  *       notice, this list of conditions and the following disclaimer in
15  *       the documentation and/or other materials provided with the
16  *       distribution.
17  *     * Neither the name of Intel Corporation nor the names of its
18  *       contributors may be used to endorse or promote products derived
19  *       from this software without specific prior written permission.
20  *
21  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22  *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23  *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
24  *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
25  *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
26  *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
27  *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28  *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29  *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30  *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31  *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32  */
33 
34 #include "spdk_cunit.h"
35 
36 #include "common/lib/test_env.c"
37 #include "spdk_internal/mock.h"
38 #include "unit/lib/json_mock.c"
39 
40 #include <rte_crypto.h>
41 #include <rte_cryptodev.h>
42 
43 #define MAX_TEST_BLOCKS 8192
44 struct rte_crypto_op *g_test_crypto_ops[MAX_TEST_BLOCKS];
45 struct rte_crypto_op *g_test_dev_full_ops[MAX_TEST_BLOCKS];
46 
47 uint16_t g_dequeue_mock;
48 uint16_t g_enqueue_mock;
49 unsigned ut_rte_crypto_op_bulk_alloc;
50 int ut_rte_crypto_op_attach_sym_session = 0;
51 int ut_rte_cryptodev_info_get = 0;
52 bool ut_rte_cryptodev_info_get_mocked = false;
53 
54 /* Those functions are defined as static inline in DPDK, so we can't
55  * mock them straight away. We use defines to redirect them into
56  * our custom functions.
57  */
58 #define rte_cryptodev_enqueue_burst mock_rte_cryptodev_enqueue_burst
59 static inline uint16_t
60 mock_rte_cryptodev_enqueue_burst(uint8_t dev_id, uint16_t qp_id,
61 				 struct rte_crypto_op **ops, uint16_t nb_ops)
62 {
63 	int i;
64 
65 	CU_ASSERT(nb_ops > 0);
66 
67 	for (i = 0; i < nb_ops; i++) {
68 		/* Use this empty (til now) array of pointers to store
69 		 * enqueued operations for assertion in dev_full test.
70 		 */
71 		g_test_dev_full_ops[i] = *ops++;
72 	}
73 
74 	return g_enqueue_mock;
75 }
76 
77 /* This is pretty ugly but in order to complete an IO via the
78  * poller in the submit path, we need to first call to this func
79  * to return the dequeued value and also decrement it.  On the subsequent
80  * call it needs to return 0 to indicate to the caller that there are
81  * no more IOs to drain.
82  */
83 int g_test_overflow = 0;
84 #define rte_cryptodev_dequeue_burst mock_rte_cryptodev_dequeue_burst
85 static inline uint16_t
86 mock_rte_cryptodev_dequeue_burst(uint8_t dev_id, uint16_t qp_id,
87 				 struct rte_crypto_op **ops, uint16_t nb_ops)
88 {
89 	CU_ASSERT(nb_ops > 0);
90 
91 	/* A crypto device can be full on enqueue, the driver is designed to drain
92 	 * the device at the time by calling the poller until it's empty, then
93 	 * submitting the remaining crypto ops.
94 	 */
95 	if (g_test_overflow) {
96 		if (g_dequeue_mock == 0) {
97 			return 0;
98 		}
99 		*ops = g_test_crypto_ops[g_enqueue_mock];
100 		(*ops)->status = RTE_CRYPTO_OP_STATUS_SUCCESS;
101 		g_dequeue_mock -= 1;
102 	}
103 	return (g_dequeue_mock + 1);
104 }
105 
106 /* Instead of allocating real memory, assign the allocations to our
107  * test array for assertion in tests.
108  */
109 #define rte_crypto_op_bulk_alloc mock_rte_crypto_op_bulk_alloc
110 static inline unsigned
111 mock_rte_crypto_op_bulk_alloc(struct rte_mempool *mempool,
112 			      enum rte_crypto_op_type type,
113 			      struct rte_crypto_op **ops, uint16_t nb_ops)
114 {
115 	int i;
116 
117 	for (i = 0; i < nb_ops; i++) {
118 		*ops++ = g_test_crypto_ops[i];
119 	}
120 	return ut_rte_crypto_op_bulk_alloc;
121 }
122 
123 #define rte_mempool_put_bulk mock_rte_mempool_put_bulk
124 static __rte_always_inline void
125 mock_rte_mempool_put_bulk(struct rte_mempool *mp, void *const *obj_table,
126 			  unsigned int n)
127 {
128 	return;
129 }
130 
131 #define rte_crypto_op_attach_sym_session mock_rte_crypto_op_attach_sym_session
132 static inline int
133 mock_rte_crypto_op_attach_sym_session(struct rte_crypto_op *op,
134 				      struct rte_cryptodev_sym_session *sess)
135 {
136 	return ut_rte_crypto_op_attach_sym_session;
137 }
138 
139 #include "bdev/crypto/vbdev_crypto.c"
140 
141 /* SPDK stubs */
142 DEFINE_STUB(spdk_bdev_queue_io_wait, int, (struct spdk_bdev *bdev, struct spdk_io_channel *ch,
143 		struct spdk_bdev_io_wait_entry *entry), 0);
144 DEFINE_STUB(spdk_conf_find_section, struct spdk_conf_section *,
145 	    (struct spdk_conf *cp, const char *name), NULL);
146 DEFINE_STUB(spdk_conf_section_get_nval, char *,
147 	    (struct spdk_conf_section *sp, const char *key, int idx), NULL);
148 DEFINE_STUB(spdk_conf_section_get_nmval, char *,
149 	    (struct spdk_conf_section *sp, const char *key, int idx1, int idx2), NULL);
150 DEFINE_STUB_V(spdk_bdev_module_list_add, (struct spdk_bdev_module *bdev_module));
151 DEFINE_STUB_V(spdk_bdev_free_io, (struct spdk_bdev_io *g_bdev_io));
152 DEFINE_STUB(spdk_bdev_io_type_supported, bool, (struct spdk_bdev *bdev,
153 		enum spdk_bdev_io_type io_type), 0);
154 DEFINE_STUB_V(spdk_bdev_module_release_bdev, (struct spdk_bdev *bdev));
155 DEFINE_STUB_V(spdk_bdev_close, (struct spdk_bdev_desc *desc));
156 DEFINE_STUB(spdk_bdev_get_name, const char *, (const struct spdk_bdev *bdev), 0);
157 DEFINE_STUB(spdk_bdev_get_buf_align, size_t, (const struct spdk_bdev *bdev), 0);
158 DEFINE_STUB(spdk_bdev_get_io_channel, struct spdk_io_channel *, (struct spdk_bdev_desc *desc), 0);
159 DEFINE_STUB_V(spdk_bdev_unregister, (struct spdk_bdev *bdev, spdk_bdev_unregister_cb cb_fn,
160 				     void *cb_arg));
161 DEFINE_STUB(spdk_bdev_open, int, (struct spdk_bdev *bdev, bool write,
162 				  spdk_bdev_remove_cb_t remove_cb,
163 				  void *remove_ctx, struct spdk_bdev_desc **_desc), 0);
164 DEFINE_STUB(spdk_bdev_module_claim_bdev, int, (struct spdk_bdev *bdev, struct spdk_bdev_desc *desc,
165 		struct spdk_bdev_module *module), 0);
166 DEFINE_STUB_V(spdk_bdev_module_examine_done, (struct spdk_bdev_module *module));
167 DEFINE_STUB(spdk_bdev_register, int, (struct spdk_bdev *vbdev), 0);
168 DEFINE_STUB(spdk_env_get_socket_id, uint32_t, (uint32_t core), 0);
169 
170 /* DPDK stubs */
171 DEFINE_STUB(rte_cryptodev_count, uint8_t, (void), 0);
172 DEFINE_STUB(rte_eal_get_configuration, struct rte_config *, (void), NULL);
173 DEFINE_STUB_V(rte_mempool_free, (struct rte_mempool *mp));
174 DEFINE_STUB(rte_mempool_create, struct rte_mempool *, (const char *name, unsigned n,
175 		unsigned elt_size,
176 		unsigned cache_size, unsigned private_data_size,
177 		rte_mempool_ctor_t *mp_init, void *mp_init_arg,
178 		rte_mempool_obj_cb_t *obj_init, void *obj_init_arg,
179 		int socket_id, unsigned flags), (struct rte_mempool *)1);
180 DEFINE_STUB(rte_socket_id, unsigned, (void), 0);
181 DEFINE_STUB(rte_crypto_op_pool_create, struct rte_mempool *,
182 	    (const char *name, enum rte_crypto_op_type type, unsigned nb_elts,
183 	     unsigned cache_size, uint16_t priv_size, int socket_id), (struct rte_mempool *)1);
184 DEFINE_STUB(rte_cryptodev_device_count_by_driver, uint8_t, (uint8_t driver_id), 0);
185 DEFINE_STUB(rte_cryptodev_configure, int, (uint8_t dev_id, struct rte_cryptodev_config *config), 0);
186 #if RTE_VERSION >= RTE_VERSION_NUM(19, 02, 0, 0)
187 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id,
188 		const struct rte_cryptodev_qp_conf *qp_conf, int socket_id), 0);
189 DEFINE_STUB(rte_cryptodev_sym_session_pool_create, struct rte_mempool *, (const char *name,
190 		uint32_t nb_elts,
191 		uint32_t elt_size, uint32_t cache_size, uint16_t priv_size,
192 		int socket_id), (struct rte_mempool *)1);
193 #else
194 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id,
195 		const struct rte_cryptodev_qp_conf *qp_conf,
196 		int socket_id, struct rte_mempool *session_pool), 0);
197 #endif
198 DEFINE_STUB(rte_cryptodev_start, int, (uint8_t dev_id), 0);
199 DEFINE_STUB_V(rte_cryptodev_stop, (uint8_t dev_id));
200 DEFINE_STUB(rte_cryptodev_sym_session_create, struct rte_cryptodev_sym_session *,
201 	    (struct rte_mempool *mempool), (struct rte_cryptodev_sym_session *)1);
202 DEFINE_STUB(rte_cryptodev_sym_session_init, int, (uint8_t dev_id,
203 		struct rte_cryptodev_sym_session *sess,
204 		struct rte_crypto_sym_xform *xforms, struct rte_mempool *mempool), 0);
205 DEFINE_STUB(rte_vdev_init, int, (const char *name, const char *args), 0);
206 DEFINE_STUB(rte_cryptodev_sym_session_free, int, (struct rte_cryptodev_sym_session *sess), 0);
207 DEFINE_STUB(rte_vdev_uninit, int, (const char *name), 0);
208 
209 struct rte_cryptodev *rte_cryptodevs;
210 
211 /* global vars and setup/cleanup functions used for all test functions */
212 struct spdk_bdev_io *g_bdev_io;
213 struct crypto_bdev_io *g_io_ctx;
214 struct crypto_io_channel *g_crypto_ch;
215 struct spdk_io_channel *g_io_ch;
216 struct vbdev_dev g_device;
217 struct vbdev_crypto g_crypto_bdev;
218 struct rte_config *g_test_config;
219 struct device_qp g_dev_qp;
220 
221 void
222 rte_cryptodev_info_get(uint8_t dev_id, struct rte_cryptodev_info *dev_info)
223 {
224 	dev_info->max_nb_queue_pairs = ut_rte_cryptodev_info_get;
225 }
226 
227 unsigned int
228 rte_cryptodev_sym_get_private_session_size(uint8_t dev_id)
229 {
230 	return (unsigned int)dev_id;
231 }
232 
233 void
234 spdk_bdev_io_get_buf(struct spdk_bdev_io *bdev_io, spdk_bdev_io_get_buf_cb cb, uint64_t len)
235 {
236 	cb(g_io_ch, g_bdev_io, true);
237 }
238 
239 /* Mock these functions to call the callback and then return the value we require */
240 int ut_spdk_bdev_readv_blocks = 0;
241 bool ut_spdk_bdev_readv_blocks_mocked = false;
242 int
243 spdk_bdev_readv_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
244 		       struct iovec *iov, int iovcnt,
245 		       uint64_t offset_blocks, uint64_t num_blocks,
246 		       spdk_bdev_io_completion_cb cb, void *cb_arg)
247 {
248 	cb(g_bdev_io, !ut_spdk_bdev_readv_blocks, cb_arg);
249 	return ut_spdk_bdev_readv_blocks;
250 }
251 
252 int ut_spdk_bdev_writev_blocks = 0;
253 bool ut_spdk_bdev_writev_blocks_mocked = false;
254 int
255 spdk_bdev_writev_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
256 			struct iovec *iov, int iovcnt,
257 			uint64_t offset_blocks, uint64_t num_blocks,
258 			spdk_bdev_io_completion_cb cb, void *cb_arg)
259 {
260 	cb(g_bdev_io, !ut_spdk_bdev_writev_blocks, cb_arg);
261 	return ut_spdk_bdev_writev_blocks;
262 }
263 
264 int ut_spdk_bdev_unmap_blocks = 0;
265 bool ut_spdk_bdev_unmap_blocks_mocked = false;
266 int
267 spdk_bdev_unmap_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
268 		       uint64_t offset_blocks, uint64_t num_blocks,
269 		       spdk_bdev_io_completion_cb cb, void *cb_arg)
270 {
271 	cb(g_bdev_io, !ut_spdk_bdev_unmap_blocks, cb_arg);
272 	return ut_spdk_bdev_unmap_blocks;
273 }
274 
275 int ut_spdk_bdev_flush_blocks = 0;
276 bool ut_spdk_bdev_flush_blocks_mocked = false;
277 int
278 spdk_bdev_flush_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
279 		       uint64_t offset_blocks, uint64_t num_blocks, spdk_bdev_io_completion_cb cb,
280 		       void *cb_arg)
281 {
282 	cb(g_bdev_io, !ut_spdk_bdev_flush_blocks, cb_arg);
283 	return ut_spdk_bdev_flush_blocks;
284 }
285 
286 int ut_spdk_bdev_reset = 0;
287 bool ut_spdk_bdev_reset_mocked = false;
288 int
289 spdk_bdev_reset(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
290 		spdk_bdev_io_completion_cb cb, void *cb_arg)
291 {
292 	cb(g_bdev_io, !ut_spdk_bdev_reset, cb_arg);
293 	return ut_spdk_bdev_reset;
294 }
295 
296 bool g_completion_called = false;
297 void
298 spdk_bdev_io_complete(struct spdk_bdev_io *bdev_io, enum spdk_bdev_io_status status)
299 {
300 	bdev_io->internal.status = status;
301 	g_completion_called = true;
302 }
303 
304 /* Global setup for all tests that share a bunch of preparation... */
305 static int
306 test_setup(void)
307 {
308 	int i, rc;
309 
310 	/* Prepare essential variables for test routines */
311 	g_bdev_io = calloc(1, sizeof(struct spdk_bdev_io) + sizeof(struct crypto_bdev_io));
312 	g_bdev_io->u.bdev.iovs = calloc(1, sizeof(struct iovec) * 128);
313 	g_bdev_io->bdev = &g_crypto_bdev.crypto_bdev;
314 	g_io_ch = calloc(1, sizeof(struct spdk_io_channel) + sizeof(struct crypto_io_channel));
315 	g_crypto_ch = (struct crypto_io_channel *)((uint8_t *)g_io_ch + sizeof(struct spdk_io_channel));
316 	g_io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx;
317 	memset(&g_device, 0, sizeof(struct vbdev_dev));
318 	memset(&g_crypto_bdev, 0, sizeof(struct vbdev_crypto));
319 	g_dev_qp.device = &g_device;
320 	g_io_ctx->crypto_ch = g_crypto_ch;
321 	g_io_ctx->crypto_bdev = &g_crypto_bdev;
322 	g_crypto_ch->device_qp = &g_dev_qp;
323 	g_test_config = calloc(1, sizeof(struct rte_config));
324 	g_test_config->lcore_count = 1;
325 	TAILQ_INIT(&g_crypto_ch->pending_cry_ios);
326 
327 	/* Allocate a real mbuf pool so we can test error paths */
328 	g_mbuf_mp = spdk_mempool_create("mbuf_mp", NUM_MBUFS, sizeof(struct rte_mbuf),
329 					SPDK_MEMPOOL_DEFAULT_CACHE_SIZE,
330 					SPDK_ENV_SOCKET_ID_ANY);
331 
332 	/* Instead of allocating real rte mempools for these, it's easier and provides the
333 	 * same coverage just calloc them here.
334 	 */
335 	for (i = 0; i < MAX_TEST_BLOCKS; i++) {
336 		rc = posix_memalign((void **)&g_test_crypto_ops[i], 64,
337 				    sizeof(struct rte_crypto_op) + sizeof(struct rte_crypto_sym_op) +
338 				    AES_CBC_IV_LENGTH);
339 		if (rc != 0) {
340 			assert(false);
341 		}
342 		memset(g_test_crypto_ops[i], 0, sizeof(struct rte_crypto_op) +
343 		       sizeof(struct rte_crypto_sym_op));
344 	}
345 	return 0;
346 }
347 
348 /* Global teardown for all tests */
349 static int
350 test_cleanup(void)
351 {
352 	int i;
353 
354 	free(g_test_config);
355 	spdk_mempool_free(g_mbuf_mp);
356 	for (i = 0; i < MAX_TEST_BLOCKS; i++) {
357 		free(g_test_crypto_ops[i]);
358 	}
359 	free(g_bdev_io->u.bdev.iovs);
360 	free(g_bdev_io);
361 	free(g_io_ch);
362 	return 0;
363 }
364 
365 static void
366 test_error_paths(void)
367 {
368 	/* Single element block size write, just to test error paths
369 	 * in vbdev_crypto_submit_request().
370 	 */
371 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
372 	g_bdev_io->u.bdev.iovcnt = 1;
373 	g_bdev_io->u.bdev.num_blocks = 1;
374 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
375 	g_crypto_bdev.crypto_bdev.blocklen = 512;
376 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
377 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
378 
379 	/* test failure of spdk_mempool_get_bulk(), will result in success becuase it
380 	 * will get queued.
381 	 */
382 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
383 	MOCK_SET(spdk_mempool_get, NULL);
384 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
385 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
386 
387 	/* same thing but switch to reads to test error path in _crypto_complete_io() */
388 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
389 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
390 	TAILQ_INSERT_TAIL(&g_crypto_ch->pending_cry_ios, g_bdev_io, module_link);
391 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
392 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
393 	/* Now with the read_blocks failing */
394 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
395 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
396 	MOCK_SET(spdk_bdev_readv_blocks, -1);
397 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
398 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
399 	MOCK_SET(spdk_bdev_readv_blocks, 0);
400 	MOCK_CLEAR(spdk_mempool_get);
401 
402 	/* test failure of rte_crypto_op_bulk_alloc() */
403 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
404 	ut_rte_crypto_op_bulk_alloc = 0;
405 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
406 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
407 	ut_rte_crypto_op_bulk_alloc = 1;
408 
409 	/* test failure of rte_crypto_op_attach_sym_session() */
410 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
411 	ut_rte_crypto_op_attach_sym_session = -1;
412 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
413 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
414 	ut_rte_crypto_op_attach_sym_session = 0;
415 }
416 
417 static void
418 test_simple_write(void)
419 {
420 	/* Single element block size write */
421 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
422 	g_bdev_io->u.bdev.iovcnt = 1;
423 	g_bdev_io->u.bdev.num_blocks = 1;
424 	g_bdev_io->u.bdev.offset_blocks = 0;
425 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
426 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_write;
427 	g_crypto_bdev.crypto_bdev.blocklen = 512;
428 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
429 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
430 
431 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
432 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
433 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
434 	CU_ASSERT(g_io_ctx->cry_iov.iov_len == 512);
435 	CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL);
436 	CU_ASSERT(g_io_ctx->cry_offset_blocks == 0);
437 	CU_ASSERT(g_io_ctx->cry_num_blocks == 1);
438 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_write);
439 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512);
440 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL);
441 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512);
442 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0);
443 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io);
444 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->buf_addr != NULL);
445 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->data_len == 512);
446 
447 	spdk_free(g_io_ctx->cry_iov.iov_base);
448 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
449 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_dst);
450 }
451 
452 static void
453 test_simple_read(void)
454 {
455 	/* Single element block size read */
456 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
457 	g_bdev_io->u.bdev.iovcnt = 1;
458 	g_bdev_io->u.bdev.num_blocks = 1;
459 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
460 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_read;
461 	g_crypto_bdev.crypto_bdev.blocklen = 512;
462 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
463 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
464 
465 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
466 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
467 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
468 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_read);
469 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512);
470 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL);
471 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512);
472 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0);
473 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io);
474 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst == NULL);
475 
476 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
477 }
478 
479 static void
480 test_large_rw(void)
481 {
482 	unsigned block_len = 512;
483 	unsigned num_blocks = CRYPTO_MAX_IO / block_len;
484 	unsigned io_len = block_len * num_blocks;
485 	unsigned i;
486 
487 	/* Multi block size read, multi-element */
488 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
489 	g_bdev_io->u.bdev.iovcnt = 1;
490 	g_bdev_io->u.bdev.num_blocks = num_blocks;
491 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
492 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw;
493 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
494 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
495 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
496 
497 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
498 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
499 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks);
500 
501 	for (i = 0; i < num_blocks; i++) {
502 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len));
503 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
504 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
505 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
506 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
507 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
508 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL);
509 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
510 	}
511 
512 	/* Multi block size write, multi-element */
513 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
514 	g_bdev_io->u.bdev.iovcnt = 1;
515 	g_bdev_io->u.bdev.num_blocks = num_blocks;
516 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
517 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw;
518 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
519 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
520 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
521 
522 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
523 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
524 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks);
525 
526 	for (i = 0; i < num_blocks; i++) {
527 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len));
528 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
529 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
530 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
531 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
532 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
533 		CU_ASSERT(g_io_ctx->cry_iov.iov_len == io_len);
534 		CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL);
535 		CU_ASSERT(g_io_ctx->cry_offset_blocks == 0);
536 		CU_ASSERT(g_io_ctx->cry_num_blocks == num_blocks);
537 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->buf_addr != NULL);
538 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->data_len == block_len);
539 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
540 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst);
541 	}
542 	spdk_free(g_io_ctx->cry_iov.iov_base);
543 }
544 
545 static void
546 test_dev_full(void)
547 {
548 	unsigned block_len = 512;
549 	unsigned num_blocks = 2;
550 	unsigned io_len = block_len * num_blocks;
551 	unsigned i;
552 
553 	g_test_overflow = 1;
554 
555 	/* Multi block size read, multi-element */
556 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
557 	g_bdev_io->u.bdev.iovcnt = 1;
558 	g_bdev_io->u.bdev.num_blocks = num_blocks;
559 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
560 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_dev_full;
561 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
562 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
563 	g_enqueue_mock = g_dequeue_mock = 1;
564 	ut_rte_crypto_op_bulk_alloc = num_blocks;
565 
566 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
567 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
568 
569 	/* this test only completes one of the 2 IOs (in the drain path) */
570 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
571 
572 	for (i = 0; i < num_blocks; i++) {
573 		/* One of the src_mbufs was freed because of the device full condition so
574 		 * we can't assert its value here.
575 		 */
576 		CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.length == block_len);
577 		CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.offset == 0);
578 		CU_ASSERT(g_test_dev_full_ops[i]->sym->m_src == g_test_dev_full_ops[i]->sym->m_src);
579 		CU_ASSERT(g_test_dev_full_ops[i]->sym->m_dst == NULL);
580 	}
581 
582 	/* Only one of the 2 blocks in the test was freed on completion by design, so
583 	 * we need to free th other one here.
584 	 */
585 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
586 	g_test_overflow = 0;
587 }
588 
589 static void
590 test_crazy_rw(void)
591 {
592 	unsigned block_len = 512;
593 	int num_blocks = 4;
594 	int i;
595 
596 	/* Multi block size read, single element, strange IOV makeup */
597 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
598 	g_bdev_io->u.bdev.iovcnt = 3;
599 	g_bdev_io->u.bdev.num_blocks = num_blocks;
600 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
601 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw;
602 	g_bdev_io->u.bdev.iovs[1].iov_len = 1024;
603 	g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 512;
604 	g_bdev_io->u.bdev.iovs[2].iov_len = 512;
605 	g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 512 + 1024;
606 
607 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
608 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
609 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
610 
611 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
612 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
613 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks);
614 
615 	for (i = 0; i < num_blocks; i++) {
616 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len));
617 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
618 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
619 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
620 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
621 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
622 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src);
623 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL);
624 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
625 	}
626 
627 	/* Multi block size write, single element strange IOV makeup */
628 	num_blocks = 8;
629 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
630 	g_bdev_io->u.bdev.iovcnt = 4;
631 	g_bdev_io->u.bdev.num_blocks = num_blocks;
632 	g_bdev_io->u.bdev.iovs[0].iov_len = 2048;
633 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw;
634 	g_bdev_io->u.bdev.iovs[1].iov_len = 512;
635 	g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 2048;
636 	g_bdev_io->u.bdev.iovs[2].iov_len = 512;
637 	g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 2048 + 512;
638 	g_bdev_io->u.bdev.iovs[3].iov_len = 1024;
639 	g_bdev_io->u.bdev.iovs[3].iov_base = &test_crazy_rw + 2048 + 512 + 512;
640 
641 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
642 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
643 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
644 
645 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
646 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
647 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks);
648 
649 	for (i = 0; i < num_blocks; i++) {
650 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len));
651 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
652 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
653 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
654 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
655 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
656 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src);
657 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == g_test_crypto_ops[i]->sym->m_dst);
658 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
659 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst);
660 	}
661 	spdk_free(g_io_ctx->cry_iov.iov_base);
662 }
663 
664 static void
665 test_passthru(void)
666 {
667 	/* Make sure these follow our completion callback, test success & fail. */
668 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_UNMAP;
669 	MOCK_SET(spdk_bdev_unmap_blocks, 0);
670 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
671 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
672 	MOCK_SET(spdk_bdev_unmap_blocks, -1);
673 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
674 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
675 	MOCK_CLEAR(spdk_bdev_unmap_blocks);
676 
677 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_FLUSH;
678 	MOCK_SET(spdk_bdev_flush_blocks, 0);
679 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
680 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
681 	MOCK_SET(spdk_bdev_flush_blocks, -1);
682 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
683 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
684 	MOCK_CLEAR(spdk_bdev_flush_blocks);
685 
686 	/* We should never get a WZ command, we report that we don't support it. */
687 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE_ZEROES;
688 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
689 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
690 }
691 
692 static void
693 test_reset(void)
694 {
695 	/* TODO: There are a few different ways to do this given that
696 	 * the code uses spdk_for_each_channel() to implement reset
697 	 * handling. SUbmitting w/o UT for this function for now and
698 	 * will follow up with something shortly.
699 	 */
700 }
701 
702 static void
703 test_initdrivers(void)
704 {
705 	int rc;
706 	static struct spdk_mempool *orig_mbuf_mp;
707 	static struct rte_mempool *orig_session_mp;
708 	static struct rte_mempool *orig_session_mp_priv;
709 
710 
711 	/* These tests will alloc and free our g_mbuf_mp
712 	 * so save that off here and restore it after each test is over.
713 	 */
714 	orig_mbuf_mp = g_mbuf_mp;
715 	orig_session_mp = g_session_mp;
716 	orig_session_mp_priv = g_session_mp_priv;
717 
718 	g_session_mp_priv = NULL;
719 	g_session_mp = NULL;
720 	g_mbuf_mp = NULL;
721 
722 	/* No drivers available, not an error though */
723 	MOCK_SET(rte_eal_get_configuration, g_test_config);
724 	MOCK_SET(rte_cryptodev_count, 0);
725 	rc = vbdev_crypto_init_crypto_drivers();
726 	CU_ASSERT(rc == 0);
727 	CU_ASSERT(g_mbuf_mp == NULL);
728 	CU_ASSERT(g_session_mp == NULL);
729 	CU_ASSERT(g_session_mp_priv == NULL);
730 
731 	/* Test failure of DPDK dev init. */
732 	MOCK_SET(rte_cryptodev_count, 2);
733 	MOCK_SET(rte_vdev_init, -1);
734 	rc = vbdev_crypto_init_crypto_drivers();
735 	CU_ASSERT(rc == -EINVAL);
736 	CU_ASSERT(g_mbuf_mp == NULL);
737 	CU_ASSERT(g_session_mp == NULL);
738 	CU_ASSERT(g_session_mp_priv == NULL);
739 	MOCK_SET(rte_vdev_init, 0);
740 
741 	/* Can't create session pool. */
742 	MOCK_SET(spdk_mempool_create, NULL);
743 	rc = vbdev_crypto_init_crypto_drivers();
744 	CU_ASSERT(rc == -ENOMEM);
745 	CU_ASSERT(g_mbuf_mp == NULL);
746 	CU_ASSERT(g_session_mp == NULL);
747 	CU_ASSERT(g_session_mp_priv == NULL);
748 	MOCK_CLEAR(spdk_mempool_create);
749 
750 	/* Can't create op pool. */
751 	MOCK_SET(rte_crypto_op_pool_create, NULL);
752 	rc = vbdev_crypto_init_crypto_drivers();
753 	CU_ASSERT(rc == -ENOMEM);
754 	CU_ASSERT(g_mbuf_mp == NULL);
755 	CU_ASSERT(g_session_mp == NULL);
756 	CU_ASSERT(g_session_mp_priv == NULL);
757 	MOCK_SET(rte_crypto_op_pool_create, (struct rte_mempool *)1);
758 
759 	/* Check resources are not sufficient */
760 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
761 	rc = vbdev_crypto_init_crypto_drivers();
762 	CU_ASSERT(rc == -EINVAL);
763 
764 	/* Test crypto dev configure failure. */
765 	MOCK_SET(rte_cryptodev_device_count_by_driver, 2);
766 	MOCK_SET(rte_cryptodev_info_get, 1);
767 	MOCK_SET(rte_cryptodev_configure, -1);
768 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
769 	rc = vbdev_crypto_init_crypto_drivers();
770 	MOCK_SET(rte_cryptodev_configure, 0);
771 	CU_ASSERT(g_mbuf_mp == NULL);
772 	CU_ASSERT(g_session_mp == NULL);
773 	CU_ASSERT(g_session_mp_priv == NULL);
774 	CU_ASSERT(rc == -EINVAL);
775 
776 	/* Test failure of qp setup. */
777 	MOCK_SET(rte_cryptodev_queue_pair_setup, -1);
778 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
779 	rc = vbdev_crypto_init_crypto_drivers();
780 	CU_ASSERT(rc == -EINVAL);
781 	CU_ASSERT(g_mbuf_mp == NULL);
782 	CU_ASSERT(g_session_mp == NULL);
783 	CU_ASSERT(g_session_mp_priv == NULL);
784 	MOCK_SET(rte_cryptodev_queue_pair_setup, 0);
785 
786 	/* Test failure of dev start. */
787 	MOCK_SET(rte_cryptodev_start, -1);
788 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
789 	rc = vbdev_crypto_init_crypto_drivers();
790 	CU_ASSERT(rc == -EINVAL);
791 	CU_ASSERT(g_mbuf_mp == NULL);
792 	CU_ASSERT(g_session_mp == NULL);
793 	CU_ASSERT(g_session_mp_priv == NULL);
794 	MOCK_SET(rte_cryptodev_start, 0);
795 
796 	/* Test happy path. */
797 	MOCK_CLEARED_ASSERT(spdk_mempool_create);
798 	rc = vbdev_crypto_init_crypto_drivers();
799 	/* We don't have spdk_mempool_create mocked right now, so make sure to free the mempools. */
800 	CU_ASSERT(g_mbuf_mp != NULL);
801 	CU_ASSERT(g_session_mp != NULL);
802 	spdk_mempool_free(g_mbuf_mp);
803 	rte_mempool_free(g_session_mp);
804 	if (g_session_mp_priv != NULL) {
805 		/* g_session_mp_priv may or may not be set depending on the DPDK version */
806 		rte_mempool_free(g_session_mp_priv);
807 	}
808 	CU_ASSERT(rc == 0);
809 
810 	/* restore our initial values. */
811 	g_mbuf_mp = orig_mbuf_mp;
812 	g_session_mp = orig_session_mp;
813 	g_session_mp_priv = orig_session_mp_priv;
814 }
815 
816 static void
817 test_crypto_op_complete(void)
818 {
819 	/* Need to prove to scan-build that we are setting iov_bases properly. */
820 	void *old_iov_base;
821 	struct crypto_bdev_io *orig_ctx;
822 
823 	/* Make sure completion code respects failure. */
824 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_FAILED;
825 	g_completion_called = false;
826 	_crypto_operation_complete(g_bdev_io);
827 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
828 	CU_ASSERT(g_completion_called == true);
829 
830 	/* Test read completion. */
831 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
832 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
833 	g_completion_called = false;
834 	_crypto_operation_complete(g_bdev_io);
835 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
836 	CU_ASSERT(g_completion_called == true);
837 
838 	/* Test write completion success. */
839 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
840 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
841 	g_completion_called = false;
842 	MOCK_SET(spdk_bdev_writev_blocks, 0);
843 	/* Code under test will free this, if not ASAN will complain. */
844 	g_io_ctx->cry_iov.iov_base = spdk_malloc(16, 0x10, NULL, SPDK_ENV_LCORE_ID_ANY,
845 				     SPDK_MALLOC_DMA);
846 	orig_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx;
847 	old_iov_base = orig_ctx->cry_iov.iov_base;
848 	_crypto_operation_complete(g_bdev_io);
849 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
850 	CU_ASSERT(g_completion_called == true);
851 
852 	/* Test write completion failed. */
853 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
854 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
855 	g_completion_called = false;
856 	MOCK_SET(spdk_bdev_writev_blocks, -1);
857 	/* Code under test will free this, if not ASAN will complain. */
858 	g_io_ctx->cry_iov.iov_base = spdk_malloc(16, 0x40, NULL, SPDK_ENV_LCORE_ID_ANY,
859 				     SPDK_MALLOC_DMA);
860 	/* To Do: remove this garbage assert as soon as scan-build stops throwing a
861 	 * heap use after free error.
862 	 */
863 	SPDK_CU_ASSERT_FATAL(old_iov_base != orig_ctx->cry_iov.iov_base);
864 	_crypto_operation_complete(g_bdev_io);
865 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
866 	CU_ASSERT(g_completion_called == true);
867 
868 	/* Test bogus type for this completion. */
869 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
870 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_RESET;
871 	g_completion_called = false;
872 	_crypto_operation_complete(g_bdev_io);
873 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
874 	CU_ASSERT(g_completion_called == true);
875 }
876 
877 static void
878 test_supported_io(void)
879 {
880 	void *ctx = NULL;
881 	bool rc = true;
882 
883 	/* Make sure we always report false to WZ, we need the bdev layer to
884 	 * send real 0's so we can encrypt/decrypt them.
885 	 */
886 	rc = vbdev_crypto_io_type_supported(ctx, SPDK_BDEV_IO_TYPE_WRITE_ZEROES);
887 	CU_ASSERT(rc == false);
888 }
889 
890 int
891 main(int argc, char **argv)
892 {
893 	CU_pSuite	suite = NULL;
894 	unsigned int	num_failures;
895 
896 	if (CU_initialize_registry() != CUE_SUCCESS) {
897 		return CU_get_error();
898 	}
899 
900 	suite = CU_add_suite("crypto", test_setup, test_cleanup);
901 	if (suite == NULL) {
902 		CU_cleanup_registry();
903 		return CU_get_error();
904 	}
905 
906 	if (CU_add_test(suite, "test_error_paths",
907 			test_error_paths) == NULL ||
908 	    CU_add_test(suite, "test_simple_write",
909 			test_simple_write) == NULL ||
910 	    CU_add_test(suite, "test_simple_read",
911 			test_simple_read) == NULL ||
912 	    CU_add_test(suite, "test_large_rw",
913 			test_large_rw) == NULL ||
914 	    CU_add_test(suite, "test_dev_full",
915 			test_dev_full) == NULL ||
916 	    CU_add_test(suite, "test_crazy_rw",
917 			test_crazy_rw) == NULL ||
918 	    CU_add_test(suite, "test_passthru",
919 			test_passthru) == NULL ||
920 	    CU_add_test(suite, "test_initdrivers",
921 			test_initdrivers) == NULL ||
922 	    CU_add_test(suite, "test_crypto_op_complete",
923 			test_crypto_op_complete) == NULL ||
924 	    CU_add_test(suite, "test_supported_io",
925 			test_supported_io) == NULL ||
926 	    CU_add_test(suite, "test_reset",
927 			test_reset) == NULL
928 	   ) {
929 		CU_cleanup_registry();
930 		return CU_get_error();
931 	}
932 
933 	CU_basic_set_mode(CU_BRM_VERBOSE);
934 	CU_basic_run_tests();
935 	num_failures = CU_get_number_of_failures();
936 	CU_cleanup_registry();
937 	return num_failures;
938 }
939