xref: /spdk/test/unit/lib/bdev/crypto.c/crypto_ut.c (revision 72f8c6a1f3f4aa1b3c373ced13e8d0ec06825ddc)
1 /*-
2  *   BSD LICENSE
3  *
4  *   Copyright (c) Intel Corporation.
5  *   All rights reserved.
6  *
7  *   Redistribution and use in source and binary forms, with or without
8  *   modification, are permitted provided that the following conditions
9  *   are met:
10  *
11  *     * Redistributions of source code must retain the above copyright
12  *       notice, this list of conditions and the following disclaimer.
13  *     * Redistributions in binary form must reproduce the above copyright
14  *       notice, this list of conditions and the following disclaimer in
15  *       the documentation and/or other materials provided with the
16  *       distribution.
17  *     * Neither the name of Intel Corporation nor the names of its
18  *       contributors may be used to endorse or promote products derived
19  *       from this software without specific prior written permission.
20  *
21  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22  *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23  *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
24  *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
25  *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
26  *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
27  *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28  *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29  *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30  *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31  *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32  */
33 
34 #include "spdk_cunit.h"
35 
36 #include "common/lib/test_env.c"
37 #include "spdk_internal/mock.h"
38 #include "unit/lib/json_mock.c"
39 
40 /* these rte_ headers are our local copies of the DPDK headers hacked to mock some functions
41  * included in them that can't be done with our mock library.
42  */
43 #include "rte_crypto.h"
44 #include "rte_cryptodev.h"
45 DEFINE_STUB_V(rte_crypto_op_free, (struct rte_crypto_op *op));
46 #include "bdev/crypto/vbdev_crypto.c"
47 
48 /* SPDK stubs */
49 DEFINE_STUB(spdk_conf_find_section, struct spdk_conf_section *,
50 	    (struct spdk_conf *cp, const char *name), NULL);
51 DEFINE_STUB(spdk_conf_section_get_nval, char *,
52 	    (struct spdk_conf_section *sp, const char *key, int idx), NULL);
53 DEFINE_STUB(spdk_conf_section_get_nmval, char *,
54 	    (struct spdk_conf_section *sp, const char *key, int idx1, int idx2), NULL);
55 DEFINE_STUB_V(spdk_bdev_module_list_add, (struct spdk_bdev_module *bdev_module));
56 DEFINE_STUB_V(spdk_bdev_free_io, (struct spdk_bdev_io *g_bdev_io));
57 DEFINE_STUB(spdk_bdev_io_type_supported, bool, (struct spdk_bdev *bdev,
58 		enum spdk_bdev_io_type io_type), 0);
59 DEFINE_STUB_V(spdk_bdev_module_release_bdev, (struct spdk_bdev *bdev));
60 DEFINE_STUB_V(spdk_bdev_close, (struct spdk_bdev_desc *desc));
61 DEFINE_STUB(spdk_bdev_get_name, const char *, (const struct spdk_bdev *bdev), 0);
62 DEFINE_STUB(spdk_env_get_current_core, uint32_t, (void), 0);
63 DEFINE_STUB(spdk_bdev_get_io_channel, struct spdk_io_channel *, (struct spdk_bdev_desc *desc), 0);
64 DEFINE_STUB_V(spdk_bdev_unregister, (struct spdk_bdev *bdev, spdk_bdev_unregister_cb cb_fn,
65 				     void *cb_arg));
66 DEFINE_STUB(spdk_bdev_open, int, (struct spdk_bdev *bdev, bool write,
67 				  spdk_bdev_remove_cb_t remove_cb,
68 				  void *remove_ctx, struct spdk_bdev_desc **_desc), 0);
69 DEFINE_STUB(spdk_bdev_module_claim_bdev, int, (struct spdk_bdev *bdev, struct spdk_bdev_desc *desc,
70 		struct spdk_bdev_module *module), 0);
71 DEFINE_STUB_V(spdk_bdev_module_examine_done, (struct spdk_bdev_module *module));
72 DEFINE_STUB(spdk_vbdev_register, int, (struct spdk_bdev *vbdev, struct spdk_bdev **base_bdevs,
73 				       int base_bdev_count), 0);
74 DEFINE_STUB(spdk_bdev_get_by_name, struct spdk_bdev *, (const char *bdev_name), NULL);
75 DEFINE_STUB(spdk_env_get_socket_id, uint32_t, (uint32_t core), 0);
76 
77 /* DPDK stubs */
78 DEFINE_STUB(rte_cryptodev_count, uint8_t, (void), 0);
79 DEFINE_STUB(rte_eal_get_configuration, struct rte_config *, (void), NULL);
80 DEFINE_STUB_V(rte_mempool_free, (struct rte_mempool *mp));
81 DEFINE_STUB(rte_socket_id, unsigned, (void), 0);
82 DEFINE_STUB(rte_crypto_op_pool_create, struct rte_mempool *,
83 	    (const char *name, enum rte_crypto_op_type type, unsigned nb_elts,
84 	     unsigned cache_size, uint16_t priv_size, int socket_id), (struct rte_mempool *)1);
85 DEFINE_STUB(rte_cryptodev_device_count_by_driver, uint8_t, (uint8_t driver_id), 0);
86 DEFINE_STUB(rte_cryptodev_socket_id, int, (uint8_t dev_id), 0);
87 DEFINE_STUB(rte_cryptodev_configure, int, (uint8_t dev_id, struct rte_cryptodev_config *config), 0);
88 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id,
89 		const struct rte_cryptodev_qp_conf *qp_conf,
90 		int socket_id, struct rte_mempool *session_pool), 0);
91 DEFINE_STUB(rte_cryptodev_start, int, (uint8_t dev_id), 0)
92 DEFINE_STUB_V(rte_cryptodev_stop, (uint8_t dev_id));
93 DEFINE_STUB(rte_cryptodev_sym_session_create, struct rte_cryptodev_sym_session *,
94 	    (struct rte_mempool *mempool), (struct rte_cryptodev_sym_session *)1);
95 DEFINE_STUB(rte_cryptodev_sym_session_clear, int, (uint8_t dev_id,
96 		struct rte_cryptodev_sym_session *sess), 0);
97 DEFINE_STUB(rte_cryptodev_sym_session_free, int, (struct rte_cryptodev_sym_session *sess), 0);
98 DEFINE_STUB(rte_cryptodev_sym_session_init, int, (uint8_t dev_id,
99 		struct rte_cryptodev_sym_session *sess,
100 		struct rte_crypto_sym_xform *xforms, struct rte_mempool *mempool), 0);
101 DEFINE_STUB(rte_vdev_init, int, (const char *name, const char *args), 0);
102 void __attribute__((noreturn)) __rte_panic(const char *funcname, const char *format, ...)
103 {
104 	abort();
105 }
106 struct rte_mempool_ops_table rte_mempool_ops_table;
107 struct rte_cryptodev *rte_cryptodevs;
108 __thread unsigned per_lcore__lcore_id = 0;
109 
110 /* global vars and setup/cleanup functions used for all test functions */
111 struct spdk_bdev_io *g_bdev_io;
112 struct crypto_bdev_io *g_io_ctx;
113 struct crypto_io_channel *g_crypto_ch;
114 struct spdk_io_channel *g_io_ch;
115 struct vbdev_dev g_device;
116 struct vbdev_crypto g_crypto_bdev;
117 struct rte_config *g_test_config;
118 struct device_qp g_dev_qp;
119 
120 #define MAX_TEST_BLOCKS 8192
121 struct rte_crypto_op *g_test_crypto_ops[MAX_TEST_BLOCKS];
122 struct rte_crypto_op *g_test_dequeued_ops[MAX_TEST_BLOCKS];
123 struct rte_crypto_op *g_test_dev_full_ops[MAX_TEST_BLOCKS];
124 
125 /* These globals are externs in our local rte_ header files so we can control
126  * specific functions for mocking.
127  */
128 uint16_t g_dequeue_mock;
129 uint16_t g_enqueue_mock;
130 unsigned ut_rte_crypto_op_bulk_alloc;
131 int ut_rte_crypto_op_attach_sym_session = 0;
132 int ut_rte_cryptodev_info_get = 0;
133 bool ut_rte_cryptodev_info_get_mocked = false;
134 
135 void
136 rte_cryptodev_info_get(uint8_t dev_id, struct rte_cryptodev_info *dev_info)
137 {
138 	dev_info->max_nb_queue_pairs = ut_rte_cryptodev_info_get;
139 }
140 
141 unsigned int
142 rte_cryptodev_sym_get_private_session_size(uint8_t dev_id)
143 {
144 	return (unsigned int)dev_id;
145 }
146 
147 void
148 spdk_bdev_io_get_buf(struct spdk_bdev_io *bdev_io, spdk_bdev_io_get_buf_cb cb, uint64_t len)
149 {
150 	cb(g_io_ch, g_bdev_io);
151 }
152 
153 /* Mock these functions to call the callback and then return the value we require */
154 int ut_spdk_bdev_readv_blocks = 0;
155 bool ut_spdk_bdev_readv_blocks_mocked = false;
156 int
157 spdk_bdev_readv_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
158 		       struct iovec *iov, int iovcnt,
159 		       uint64_t offset_blocks, uint64_t num_blocks,
160 		       spdk_bdev_io_completion_cb cb, void *cb_arg)
161 {
162 	cb(g_bdev_io, !ut_spdk_bdev_readv_blocks, cb_arg);
163 	return ut_spdk_bdev_readv_blocks;
164 }
165 
166 int ut_spdk_bdev_writev_blocks = 0;
167 bool ut_spdk_bdev_writev_blocks_mocked = false;
168 int
169 spdk_bdev_writev_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
170 			struct iovec *iov, int iovcnt,
171 			uint64_t offset_blocks, uint64_t num_blocks,
172 			spdk_bdev_io_completion_cb cb, void *cb_arg)
173 {
174 	cb(g_bdev_io, !ut_spdk_bdev_writev_blocks, cb_arg);
175 	return ut_spdk_bdev_writev_blocks;
176 }
177 
178 int ut_spdk_bdev_unmap_blocks = 0;
179 bool ut_spdk_bdev_unmap_blocks_mocked = false;
180 int
181 spdk_bdev_unmap_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
182 		       uint64_t offset_blocks, uint64_t num_blocks,
183 		       spdk_bdev_io_completion_cb cb, void *cb_arg)
184 {
185 	cb(g_bdev_io, !ut_spdk_bdev_unmap_blocks, cb_arg);
186 	return ut_spdk_bdev_unmap_blocks;
187 }
188 
189 int ut_spdk_bdev_flush_blocks = 0;
190 bool ut_spdk_bdev_flush_blocks_mocked = false;
191 int
192 spdk_bdev_flush_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
193 		       uint64_t offset_blocks, uint64_t num_blocks, spdk_bdev_io_completion_cb cb,
194 		       void *cb_arg)
195 {
196 	cb(g_bdev_io, !ut_spdk_bdev_flush_blocks, cb_arg);
197 	return ut_spdk_bdev_flush_blocks;
198 }
199 
200 int ut_spdk_bdev_reset = 0;
201 bool ut_spdk_bdev_reset_mocked = false;
202 int
203 spdk_bdev_reset(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch,
204 		spdk_bdev_io_completion_cb cb, void *cb_arg)
205 {
206 	cb(g_bdev_io, !ut_spdk_bdev_reset, cb_arg);
207 	return ut_spdk_bdev_reset;
208 }
209 
210 bool g_completion_called = false;
211 void
212 spdk_bdev_io_complete(struct spdk_bdev_io *bdev_io, enum spdk_bdev_io_status status)
213 {
214 	bdev_io->internal.status = status;
215 	g_completion_called = true;
216 }
217 
218 /* Used in testing device full condition */
219 static inline uint16_t
220 rte_cryptodev_enqueue_burst(uint8_t dev_id, uint16_t qp_id,
221 			    struct rte_crypto_op **ops, uint16_t nb_ops)
222 {
223 	int i;
224 
225 	CU_ASSERT(nb_ops > 0);
226 
227 	for (i = 0; i < nb_ops; i++) {
228 		/* Use this empty (til now) array of pointers to store
229 		 * enqueued operations for assertion in dev_full test.
230 		 */
231 		g_test_dev_full_ops[i] = *ops++;
232 	}
233 
234 	return g_enqueue_mock;
235 }
236 
237 /* This is pretty ugly but in order to complete an IO via the
238  * poller in the submit path, we need to first call to this func
239  * to return the dequeued value and also decrement it.  On the subsequent
240  * call it needs to return 0 to indicate to the caller that there are
241  * no more IOs to drain.
242  */
243 int g_test_overflow = 0;
244 static inline uint16_t
245 rte_cryptodev_dequeue_burst(uint8_t dev_id, uint16_t qp_id,
246 			    struct rte_crypto_op **ops, uint16_t nb_ops)
247 {
248 	CU_ASSERT(nb_ops > 0);
249 
250 	/* A crypto device can be full on enqueue, the driver is designed to drain
251 	 * the device at the time by calling the poller until it's empty, then
252 	 * submitting the remaining crypto ops.
253 	 */
254 	if (g_test_overflow) {
255 		if (g_dequeue_mock == 0) {
256 			return 0;
257 		}
258 		*ops = g_test_crypto_ops[g_enqueue_mock];
259 		(*ops)->status = RTE_CRYPTO_OP_STATUS_SUCCESS;
260 		g_dequeue_mock -= 1;
261 	}
262 	return (g_dequeue_mock + 1);
263 }
264 
265 /* Instead of allocating real memory, assign the allocations to our
266  * test array for assertion in tests.
267  */
268 static inline unsigned
269 rte_crypto_op_bulk_alloc(struct rte_mempool *mempool,
270 			 enum rte_crypto_op_type type,
271 			 struct rte_crypto_op **ops, uint16_t nb_ops)
272 {
273 	int i;
274 
275 	for (i = 0; i < nb_ops; i++) {
276 		*ops++ = g_test_crypto_ops[i];
277 	}
278 	return ut_rte_crypto_op_bulk_alloc;
279 }
280 
281 static __rte_always_inline void
282 rte_mempool_put_bulk(struct rte_mempool *mp, void *const *obj_table,
283 		     unsigned int n)
284 {
285 	return;
286 }
287 
288 static inline void *rte_mempool_get_priv(struct rte_mempool *mp)
289 {
290 	return NULL;
291 }
292 
293 
294 static inline int
295 rte_crypto_op_attach_sym_session(struct rte_crypto_op *op,
296 				 struct rte_cryptodev_sym_session *sess)
297 {
298 	return ut_rte_crypto_op_attach_sym_session;
299 }
300 
301 /* Global setup for all tests that share a bunch of preparation... */
302 static int
303 test_setup(void)
304 {
305 	int i;
306 
307 	/* Prepare essential variables for test routines */
308 	g_bdev_io = calloc(1, sizeof(struct spdk_bdev_io) + sizeof(struct crypto_bdev_io));
309 	g_bdev_io->u.bdev.iovs = calloc(1, sizeof(struct iovec) * 128);
310 	g_bdev_io->bdev = &g_crypto_bdev.crypto_bdev;
311 	g_io_ch = calloc(1, sizeof(struct spdk_io_channel) + sizeof(struct crypto_io_channel));
312 	g_crypto_ch = (struct crypto_io_channel *)((uint8_t *)g_io_ch + sizeof(struct spdk_io_channel));
313 	g_io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx;
314 	memset(&g_device, 0, sizeof(struct vbdev_dev));
315 	memset(&g_crypto_bdev, 0, sizeof(struct vbdev_crypto));
316 	g_dev_qp.device = &g_device;
317 	g_io_ctx->crypto_ch = g_crypto_ch;
318 	g_io_ctx->crypto_bdev = &g_crypto_bdev;
319 	g_crypto_ch->device_qp = &g_dev_qp;
320 	g_test_config = calloc(1, sizeof(struct rte_config));
321 	g_test_config->lcore_count = 1;
322 	TAILQ_INIT(&g_crypto_ch->pending_cry_ios);
323 
324 	/* Allocate a real mbuf pool so we can test error paths */
325 	g_mbuf_mp = spdk_mempool_create("mbuf_mp", NUM_MBUFS, sizeof(struct rte_mbuf),
326 					SPDK_MEMPOOL_DEFAULT_CACHE_SIZE,
327 					SPDK_ENV_SOCKET_ID_ANY);
328 
329 	/* Instead of allocating real rte mempools for these, it's easier and provides the
330 	 * same coverage just calloc them here.
331 	 */
332 	for (i = 0; i < MAX_TEST_BLOCKS; i++) {
333 		g_test_crypto_ops[i] = calloc(1, sizeof(struct rte_crypto_op) +
334 					      sizeof(struct rte_crypto_sym_op));
335 		g_test_dequeued_ops[i] = calloc(1, sizeof(struct rte_crypto_op) +
336 						sizeof(struct rte_crypto_sym_op));
337 	}
338 	return 0;
339 }
340 
341 /* Global teardown for all tests */
342 static int
343 test_cleanup(void)
344 {
345 	int i;
346 
347 	free(g_test_config);
348 	spdk_mempool_free(g_mbuf_mp);
349 	for (i = 0; i < MAX_TEST_BLOCKS; i++) {
350 		free(g_test_crypto_ops[i]);
351 		free(g_test_dequeued_ops[i]);
352 	}
353 	free(g_bdev_io->u.bdev.iovs);
354 	free(g_bdev_io);
355 	free(g_io_ch);
356 	return 0;
357 }
358 
359 static void
360 test_error_paths(void)
361 {
362 	/* Single element block size write, just to test error paths
363 	 * in vbdev_crypto_submit_request().
364 	 */
365 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
366 	g_bdev_io->u.bdev.iovcnt = 1;
367 	g_bdev_io->u.bdev.num_blocks = 1;
368 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
369 	g_crypto_bdev.crypto_bdev.blocklen = 512;
370 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
371 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
372 
373 	/* test failure of spdk_mempool_get_bulk() */
374 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
375 	MOCK_SET(spdk_mempool_get, NULL);
376 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
377 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
378 
379 	/* same thing but switch to reads to test error path in _crypto_complete_io() */
380 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
381 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
382 	TAILQ_INSERT_TAIL(&g_crypto_ch->pending_cry_ios, g_bdev_io, module_link);
383 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
384 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
385 	/* Now with the read_blocks failing */
386 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
387 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
388 	MOCK_SET(spdk_bdev_readv_blocks, -1);
389 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
390 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
391 	MOCK_SET(spdk_bdev_readv_blocks, 0);
392 	MOCK_CLEAR(spdk_mempool_get);
393 
394 	/* test failure of rte_crypto_op_bulk_alloc() */
395 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
396 	ut_rte_crypto_op_bulk_alloc = 0;
397 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
398 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
399 	ut_rte_crypto_op_bulk_alloc = 1;
400 
401 	/* test failure of rte_crypto_op_attach_sym_session() */
402 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
403 	ut_rte_crypto_op_attach_sym_session = -1;
404 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
405 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
406 	ut_rte_crypto_op_attach_sym_session = 0;
407 }
408 
409 static void
410 test_simple_write(void)
411 {
412 	/* Single element block size write */
413 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
414 	g_bdev_io->u.bdev.iovcnt = 1;
415 	g_bdev_io->u.bdev.num_blocks = 1;
416 	g_bdev_io->u.bdev.offset_blocks = 0;
417 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
418 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_write;
419 	g_crypto_bdev.crypto_bdev.blocklen = 512;
420 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
421 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
422 
423 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
424 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
425 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
426 	CU_ASSERT(g_io_ctx->cry_iov.iov_len == 512);
427 	CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL);
428 	CU_ASSERT(g_io_ctx->cry_offset_blocks == 0);
429 	CU_ASSERT(g_io_ctx->cry_num_blocks == 1);
430 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_write);
431 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512);
432 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL);
433 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512);
434 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0);
435 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io);
436 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->buf_addr != NULL);
437 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->data_len == 512);
438 
439 	spdk_dma_free(g_io_ctx->cry_iov.iov_base);
440 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
441 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_dst);
442 }
443 
444 static void
445 test_simple_read(void)
446 {
447 	/* Single element block size read */
448 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
449 	g_bdev_io->u.bdev.iovcnt = 1;
450 	g_bdev_io->u.bdev.num_blocks = 1;
451 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
452 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_read;
453 	g_crypto_bdev.crypto_bdev.blocklen = 512;
454 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
455 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1;
456 
457 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
458 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
459 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
460 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_read);
461 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512);
462 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL);
463 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512);
464 	CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0);
465 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io);
466 	CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst == NULL);
467 
468 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
469 }
470 
471 static void
472 test_large_rw(void)
473 {
474 	unsigned block_len = 512;
475 	unsigned num_blocks = CRYPTO_MAX_IO / block_len;
476 	unsigned io_len = block_len * num_blocks;
477 	unsigned i;
478 
479 	/* Multi block size read, multi-element */
480 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
481 	g_bdev_io->u.bdev.iovcnt = 1;
482 	g_bdev_io->u.bdev.num_blocks = num_blocks;
483 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
484 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw;
485 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
486 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
487 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
488 
489 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
490 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
491 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks);
492 
493 	for (i = 0; i < num_blocks; i++) {
494 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len));
495 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
496 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
497 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
498 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
499 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
500 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL);
501 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
502 	}
503 
504 	/* Multi block size write, multi-element */
505 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
506 	g_bdev_io->u.bdev.iovcnt = 1;
507 	g_bdev_io->u.bdev.num_blocks = num_blocks;
508 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
509 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw;
510 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
511 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
512 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
513 
514 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
515 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
516 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks);
517 
518 	for (i = 0; i < num_blocks; i++) {
519 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len));
520 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
521 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
522 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
523 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
524 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
525 		CU_ASSERT(g_io_ctx->cry_iov.iov_len == io_len);
526 		CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL);
527 		CU_ASSERT(g_io_ctx->cry_offset_blocks == 0);
528 		CU_ASSERT(g_io_ctx->cry_num_blocks == num_blocks);
529 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->buf_addr != NULL);
530 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->data_len == block_len);
531 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
532 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst);
533 	}
534 	spdk_dma_free(g_io_ctx->cry_iov.iov_base);
535 }
536 
537 static void
538 test_dev_full(void)
539 {
540 	unsigned block_len = 512;
541 	unsigned num_blocks = 2;
542 	unsigned io_len = block_len * num_blocks;
543 	unsigned i;
544 
545 	g_test_overflow = 1;
546 
547 	/* Multi block size read, multi-element */
548 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
549 	g_bdev_io->u.bdev.iovcnt = 1;
550 	g_bdev_io->u.bdev.num_blocks = num_blocks;
551 	g_bdev_io->u.bdev.iovs[0].iov_len = io_len;
552 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_dev_full;
553 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
554 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
555 	g_enqueue_mock = g_dequeue_mock = 1;
556 	ut_rte_crypto_op_bulk_alloc = num_blocks;
557 
558 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
559 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
560 
561 	/* this test only completes one of the 2 IOs (in the drain path) */
562 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1);
563 
564 	for (i = 0; i < num_blocks; i++) {
565 		/* One of the src_mbufs was freed because of the device full condition so
566 		 * we can't assert its value here.
567 		 */
568 		CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.length == block_len);
569 		CU_ASSERT(g_test_dev_full_ops[i]->sym->cipher.data.offset == 0);
570 		CU_ASSERT(g_test_dev_full_ops[i]->sym->m_src == g_test_dev_full_ops[i]->sym->m_src);
571 		CU_ASSERT(g_test_dev_full_ops[i]->sym->m_dst == NULL);
572 	}
573 
574 	/* Only one of the 2 blocks in the test was freed on completion by design, so
575 	 * we need to free th other one here.
576 	 */
577 	spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src);
578 	g_test_overflow = 0;
579 }
580 
581 static void
582 test_crazy_rw(void)
583 {
584 	unsigned block_len = 512;
585 	int num_blocks = 4;
586 	int i;
587 
588 	/* Multi block size read, single element, strange IOV makeup */
589 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
590 	g_bdev_io->u.bdev.iovcnt = 3;
591 	g_bdev_io->u.bdev.num_blocks = num_blocks;
592 	g_bdev_io->u.bdev.iovs[0].iov_len = 512;
593 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw;
594 	g_bdev_io->u.bdev.iovs[1].iov_len = 1024;
595 	g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 512;
596 	g_bdev_io->u.bdev.iovs[2].iov_len = 512;
597 	g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 512 + 1024;
598 
599 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
600 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
601 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
602 
603 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
604 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
605 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks);
606 
607 	for (i = 0; i < num_blocks; i++) {
608 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len));
609 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
610 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
611 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
612 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
613 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
614 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src);
615 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL);
616 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
617 	}
618 
619 	/* Multi block size write, single element strange IOV makeup */
620 	num_blocks = 8;
621 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
622 	g_bdev_io->u.bdev.iovcnt = 4;
623 	g_bdev_io->u.bdev.num_blocks = num_blocks;
624 	g_bdev_io->u.bdev.iovs[0].iov_len = 2048;
625 	g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw;
626 	g_bdev_io->u.bdev.iovs[1].iov_len = 512;
627 	g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 2048;
628 	g_bdev_io->u.bdev.iovs[2].iov_len = 512;
629 	g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 2048 + 512;
630 	g_bdev_io->u.bdev.iovs[3].iov_len = 1024;
631 	g_bdev_io->u.bdev.iovs[3].iov_base = &test_crazy_rw + 2048 + 512 + 512;
632 
633 	g_crypto_bdev.crypto_bdev.blocklen = block_len;
634 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
635 	g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks;
636 
637 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
638 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
639 	CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks);
640 
641 	for (i = 0; i < num_blocks; i++) {
642 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len));
643 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len);
644 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL);
645 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len);
646 		CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0);
647 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io);
648 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src);
649 		CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == g_test_crypto_ops[i]->sym->m_dst);
650 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src);
651 		spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst);
652 	}
653 	spdk_dma_free(g_io_ctx->cry_iov.iov_base);
654 }
655 
656 static void
657 test_passthru(void)
658 {
659 	/* Make sure these follow our completion callback, test success & fail. */
660 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_UNMAP;
661 	MOCK_SET(spdk_bdev_unmap_blocks, 0);
662 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
663 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
664 	MOCK_SET(spdk_bdev_unmap_blocks, -1);
665 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
666 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
667 	MOCK_CLEAR(spdk_bdev_unmap_blocks);
668 
669 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_FLUSH;
670 	MOCK_SET(spdk_bdev_flush_blocks, 0);
671 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
672 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
673 	MOCK_SET(spdk_bdev_flush_blocks, -1);
674 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
675 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
676 	MOCK_CLEAR(spdk_bdev_flush_blocks);
677 
678 	/* We should never get a WZ command, we report that we don't support it. */
679 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE_ZEROES;
680 	vbdev_crypto_submit_request(g_io_ch, g_bdev_io);
681 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
682 }
683 
684 static void
685 test_reset(void)
686 {
687 	/* TODO: There are a few different ways to do this given that
688 	 * the code uses spdk_for_each_channel() to implement reset
689 	 * handling. SUbmitting w/o UT for this function for now and
690 	 * will follow up with something shortly.
691 	 */
692 }
693 
694 static void
695 test_initdrivers(void)
696 {
697 	int rc;
698 	static struct spdk_mempool *orig_mbuf_mp;
699 	static struct spdk_mempool *orig_session_mp;
700 
701 	/* No drivers available, not an error though */
702 	MOCK_SET(rte_eal_get_configuration, g_test_config);
703 	MOCK_SET(rte_cryptodev_count, 0);
704 	rc = vbdev_crypto_init_crypto_drivers();
705 	CU_ASSERT(rc == 0);
706 
707 	/* Test failure of DPDK dev init. */
708 	MOCK_SET(rte_cryptodev_count, 2);
709 	MOCK_SET(rte_vdev_init, -1);
710 	rc = vbdev_crypto_init_crypto_drivers();
711 	CU_ASSERT(rc == -EINVAL);
712 	MOCK_SET(rte_vdev_init, 0);
713 
714 	/* Can't create session pool. */
715 	MOCK_SET(spdk_mempool_create, NULL);
716 	orig_mbuf_mp = g_mbuf_mp;
717 	orig_session_mp = g_session_mp;
718 	rc = vbdev_crypto_init_crypto_drivers();
719 	g_mbuf_mp = orig_mbuf_mp;
720 	g_session_mp = orig_session_mp;
721 	CU_ASSERT(rc == -ENOMEM);
722 	MOCK_CLEAR(spdk_mempool_create);
723 
724 	/* Can't create op pool. These tests will alloc and free our g_mbuf_mp
725 	 * so save that off here and restore it after each test is over.
726 	 */
727 	orig_mbuf_mp = g_mbuf_mp;
728 	orig_session_mp = g_session_mp;
729 	MOCK_SET(rte_crypto_op_pool_create, NULL);
730 	rc = vbdev_crypto_init_crypto_drivers();
731 	g_mbuf_mp = orig_mbuf_mp;
732 	g_session_mp = orig_session_mp;
733 	CU_ASSERT(rc == -ENOMEM);
734 	MOCK_SET(rte_crypto_op_pool_create, (struct rte_mempool *)1);
735 
736 	/* Check resources are sufficient failure. */
737 	orig_mbuf_mp = g_mbuf_mp;
738 	orig_session_mp = g_session_mp;
739 	rc = vbdev_crypto_init_crypto_drivers();
740 	g_mbuf_mp = orig_mbuf_mp;
741 	g_session_mp = orig_session_mp;
742 	CU_ASSERT(rc == -EINVAL);
743 
744 	/* Test crypto dev configure failure. */
745 	MOCK_SET(rte_cryptodev_device_count_by_driver, 2);
746 	MOCK_SET(rte_cryptodev_info_get, 1);
747 	MOCK_SET(rte_cryptodev_configure, -1);
748 	orig_mbuf_mp = g_mbuf_mp;
749 	orig_session_mp = g_session_mp;
750 	rc = vbdev_crypto_init_crypto_drivers();
751 	g_mbuf_mp = orig_mbuf_mp;
752 	g_session_mp = orig_session_mp;
753 	MOCK_SET(rte_cryptodev_configure, 0);
754 	CU_ASSERT(rc == -EINVAL);
755 
756 	/* Test failure of qp setup. */
757 	MOCK_SET(rte_cryptodev_queue_pair_setup, -1);
758 	orig_mbuf_mp = g_mbuf_mp;
759 	orig_session_mp = g_session_mp;
760 	rc = vbdev_crypto_init_crypto_drivers();
761 	g_mbuf_mp = orig_mbuf_mp;
762 	g_session_mp = orig_session_mp;
763 	CU_ASSERT(rc == -EINVAL);
764 	MOCK_SET(rte_cryptodev_queue_pair_setup, 0);
765 
766 	/* Test failure of dev start. */
767 	MOCK_SET(rte_cryptodev_start, -1);
768 	orig_mbuf_mp = g_mbuf_mp;
769 	orig_session_mp = g_session_mp;
770 	rc = vbdev_crypto_init_crypto_drivers();
771 	g_mbuf_mp = orig_mbuf_mp;
772 	g_session_mp = orig_session_mp;
773 	CU_ASSERT(rc == -EINVAL);
774 	MOCK_SET(rte_cryptodev_start, 0);
775 
776 	/* Test happy path. */
777 	rc = vbdev_crypto_init_crypto_drivers();
778 	CU_ASSERT(rc == 0);
779 }
780 
781 static void
782 test_crypto_op_complete(void)
783 {
784 	/* Make sure completion code respects failure. */
785 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_FAILED;
786 	g_completion_called = false;
787 	_crypto_operation_complete(g_bdev_io);
788 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
789 	CU_ASSERT(g_completion_called == true);
790 
791 	/* Test read completion. */
792 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
793 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ;
794 	g_completion_called = false;
795 	_crypto_operation_complete(g_bdev_io);
796 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
797 	CU_ASSERT(g_completion_called == true);
798 
799 	/* Test write completion success. */
800 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
801 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
802 	g_completion_called = false;
803 	MOCK_SET(spdk_bdev_writev_blocks, 0);
804 	/* Code under test will free this, if not ASAN will complain. */
805 	g_io_ctx->cry_iov.iov_base = spdk_dma_malloc(16, 0x10, NULL);
806 	_crypto_operation_complete(g_bdev_io);
807 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS);
808 	CU_ASSERT(g_completion_called == true);
809 
810 	/* Test write completion failed. */
811 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
812 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE;
813 	g_completion_called = false;
814 	MOCK_SET(spdk_bdev_writev_blocks, -1);
815 	/* Code under test will free this, if not ASAN will complain. */
816 	g_io_ctx->cry_iov.iov_base = spdk_dma_malloc(16, 0x10, NULL);
817 	_crypto_operation_complete(g_bdev_io);
818 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
819 	CU_ASSERT(g_completion_called == true);
820 
821 	/* Test bogus type for this completion. */
822 	g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS;
823 	g_bdev_io->type = SPDK_BDEV_IO_TYPE_RESET;
824 	g_completion_called = false;
825 	_crypto_operation_complete(g_bdev_io);
826 	CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED);
827 	CU_ASSERT(g_completion_called == true);
828 }
829 
830 static void
831 test_supported_io(void)
832 {
833 	void *ctx = NULL;
834 	bool rc = true;
835 
836 	/* Make sure we always report false to WZ, we need the bdev layer to
837 	 * send real 0's so we can encrypt/decrypt them.
838 	 */
839 	rc = vbdev_crypto_io_type_supported(ctx, SPDK_BDEV_IO_TYPE_WRITE_ZEROES);
840 	CU_ASSERT(rc == false);
841 }
842 
843 int
844 main(int argc, char **argv)
845 {
846 	CU_pSuite	suite = NULL;
847 	unsigned int	num_failures;
848 
849 	if (CU_initialize_registry() != CUE_SUCCESS) {
850 		return CU_get_error();
851 	}
852 
853 	suite = CU_add_suite("crypto", test_setup, test_cleanup);
854 	if (suite == NULL) {
855 		CU_cleanup_registry();
856 		return CU_get_error();
857 	}
858 
859 	if (CU_add_test(suite, "test_error_paths",
860 			test_error_paths) == NULL ||
861 	    CU_add_test(suite, "test_simple_write",
862 			test_simple_write) == NULL ||
863 	    CU_add_test(suite, "test_simple_read",
864 			test_simple_read) == NULL ||
865 	    CU_add_test(suite, "test_large_rw",
866 			test_large_rw) == NULL ||
867 	    CU_add_test(suite, "test_dev_full",
868 			test_dev_full) == NULL ||
869 	    CU_add_test(suite, "test_crazy_rw",
870 			test_crazy_rw) == NULL ||
871 	    CU_add_test(suite, "test_passthru",
872 			test_passthru) == NULL ||
873 	    CU_add_test(suite, "test_initdrivers",
874 			test_initdrivers) == NULL ||
875 	    CU_add_test(suite, "test_crypto_op_complete",
876 			test_crypto_op_complete) == NULL ||
877 	    CU_add_test(suite, "test_supported_io",
878 			test_supported_io) == NULL ||
879 	    CU_add_test(suite, "test_reset",
880 			test_reset) == NULL
881 	   ) {
882 		CU_cleanup_registry();
883 		return CU_get_error();
884 	}
885 
886 	CU_basic_set_mode(CU_BRM_VERBOSE);
887 	CU_basic_run_tests();
888 	num_failures = CU_get_number_of_failures();
889 	CU_cleanup_registry();
890 	return num_failures;
891 }
892