1 /*- 2 * BSD LICENSE 3 * 4 * Copyright (c) Intel Corporation. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 11 * * Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * * Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in 15 * the documentation and/or other materials provided with the 16 * distribution. 17 * * Neither the name of Intel Corporation nor the names of its 18 * contributors may be used to endorse or promote products derived 19 * from this software without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 22 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 24 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 25 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 26 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 27 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 31 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 32 */ 33 34 #include "spdk_cunit.h" 35 36 #include "common/lib/test_env.c" 37 #include "spdk_internal/mock.h" 38 #include "unit/lib/json_mock.c" 39 40 #include <rte_crypto.h> 41 #include <rte_cryptodev.h> 42 43 #define MAX_TEST_BLOCKS 8192 44 struct rte_crypto_op *g_test_crypto_ops[MAX_TEST_BLOCKS]; 45 struct rte_crypto_op *g_test_dev_full_ops[MAX_TEST_BLOCKS]; 46 47 uint16_t g_dequeue_mock; 48 uint16_t g_enqueue_mock; 49 unsigned ut_rte_crypto_op_bulk_alloc; 50 int ut_rte_crypto_op_attach_sym_session = 0; 51 int ut_rte_cryptodev_info_get = 0; 52 bool ut_rte_cryptodev_info_get_mocked = false; 53 54 /* Those functions are defined as static inline in DPDK, so we can't 55 * mock them straight away. We use defines to redirect them into 56 * our custom functions. 57 */ 58 static bool g_resubmit_test = false; 59 #define rte_cryptodev_enqueue_burst mock_rte_cryptodev_enqueue_burst 60 static inline uint16_t 61 mock_rte_cryptodev_enqueue_burst(uint8_t dev_id, uint16_t qp_id, 62 struct rte_crypto_op **ops, uint16_t nb_ops) 63 { 64 int i; 65 66 CU_ASSERT(nb_ops > 0); 67 68 for (i = 0; i < nb_ops; i++) { 69 /* Use this empty (til now) array of pointers to store 70 * enqueued operations for assertion in dev_full test. 71 */ 72 g_test_dev_full_ops[i] = *ops++; 73 if (g_resubmit_test == true) { 74 CU_ASSERT(g_test_dev_full_ops[i] == (void *)0xDEADBEEF); 75 } 76 } 77 78 return g_enqueue_mock; 79 } 80 81 #define rte_cryptodev_dequeue_burst mock_rte_cryptodev_dequeue_burst 82 static inline uint16_t 83 mock_rte_cryptodev_dequeue_burst(uint8_t dev_id, uint16_t qp_id, 84 struct rte_crypto_op **ops, uint16_t nb_ops) 85 { 86 int i; 87 88 CU_ASSERT(nb_ops > 0); 89 90 for (i = 0; i < g_dequeue_mock; i++) { 91 *ops++ = g_test_crypto_ops[i]; 92 } 93 94 return g_dequeue_mock; 95 } 96 97 /* Instead of allocating real memory, assign the allocations to our 98 * test array for assertion in tests. 99 */ 100 #define rte_crypto_op_bulk_alloc mock_rte_crypto_op_bulk_alloc 101 static inline unsigned 102 mock_rte_crypto_op_bulk_alloc(struct rte_mempool *mempool, 103 enum rte_crypto_op_type type, 104 struct rte_crypto_op **ops, uint16_t nb_ops) 105 { 106 int i; 107 108 for (i = 0; i < nb_ops; i++) { 109 *ops++ = g_test_crypto_ops[i]; 110 } 111 return ut_rte_crypto_op_bulk_alloc; 112 } 113 114 #define rte_mempool_put_bulk mock_rte_mempool_put_bulk 115 static __rte_always_inline void 116 mock_rte_mempool_put_bulk(struct rte_mempool *mp, void *const *obj_table, 117 unsigned int n) 118 { 119 return; 120 } 121 122 #define rte_crypto_op_attach_sym_session mock_rte_crypto_op_attach_sym_session 123 static inline int 124 mock_rte_crypto_op_attach_sym_session(struct rte_crypto_op *op, 125 struct rte_cryptodev_sym_session *sess) 126 { 127 return ut_rte_crypto_op_attach_sym_session; 128 } 129 130 #define rte_lcore_count mock_rte_lcore_count 131 static inline unsigned 132 mock_rte_lcore_count(void) 133 { 134 return 1; 135 } 136 137 #include "bdev/crypto/vbdev_crypto.c" 138 139 /* SPDK stubs */ 140 DEFINE_STUB(spdk_bdev_queue_io_wait, int, (struct spdk_bdev *bdev, struct spdk_io_channel *ch, 141 struct spdk_bdev_io_wait_entry *entry), 0); 142 DEFINE_STUB(spdk_conf_find_section, struct spdk_conf_section *, 143 (struct spdk_conf *cp, const char *name), NULL); 144 DEFINE_STUB(spdk_conf_section_get_nval, char *, 145 (struct spdk_conf_section *sp, const char *key, int idx), NULL); 146 DEFINE_STUB(spdk_conf_section_get_nmval, char *, 147 (struct spdk_conf_section *sp, const char *key, int idx1, int idx2), NULL); 148 DEFINE_STUB_V(spdk_bdev_module_list_add, (struct spdk_bdev_module *bdev_module)); 149 DEFINE_STUB_V(spdk_bdev_free_io, (struct spdk_bdev_io *g_bdev_io)); 150 DEFINE_STUB(spdk_bdev_io_type_supported, bool, (struct spdk_bdev *bdev, 151 enum spdk_bdev_io_type io_type), 0); 152 DEFINE_STUB_V(spdk_bdev_module_release_bdev, (struct spdk_bdev *bdev)); 153 DEFINE_STUB_V(spdk_bdev_close, (struct spdk_bdev_desc *desc)); 154 DEFINE_STUB(spdk_bdev_get_name, const char *, (const struct spdk_bdev *bdev), 0); 155 DEFINE_STUB(spdk_bdev_get_buf_align, size_t, (const struct spdk_bdev *bdev), 0); 156 DEFINE_STUB(spdk_bdev_get_io_channel, struct spdk_io_channel *, (struct spdk_bdev_desc *desc), 0); 157 DEFINE_STUB_V(spdk_bdev_unregister, (struct spdk_bdev *bdev, spdk_bdev_unregister_cb cb_fn, 158 void *cb_arg)); 159 DEFINE_STUB(spdk_bdev_open, int, (struct spdk_bdev *bdev, bool write, 160 spdk_bdev_remove_cb_t remove_cb, 161 void *remove_ctx, struct spdk_bdev_desc **_desc), 0); 162 DEFINE_STUB(spdk_bdev_module_claim_bdev, int, (struct spdk_bdev *bdev, struct spdk_bdev_desc *desc, 163 struct spdk_bdev_module *module), 0); 164 DEFINE_STUB_V(spdk_bdev_module_examine_done, (struct spdk_bdev_module *module)); 165 DEFINE_STUB(spdk_bdev_register, int, (struct spdk_bdev *vbdev), 0); 166 167 /* DPDK stubs */ 168 DEFINE_STUB(rte_cryptodev_count, uint8_t, (void), 0); 169 DEFINE_STUB_V(rte_mempool_free, (struct rte_mempool *mp)); 170 DEFINE_STUB(rte_mempool_create, struct rte_mempool *, (const char *name, unsigned n, 171 unsigned elt_size, 172 unsigned cache_size, unsigned private_data_size, 173 rte_mempool_ctor_t *mp_init, void *mp_init_arg, 174 rte_mempool_obj_cb_t *obj_init, void *obj_init_arg, 175 int socket_id, unsigned flags), (struct rte_mempool *)1); 176 DEFINE_STUB(rte_socket_id, unsigned, (void), 0); 177 DEFINE_STUB(rte_crypto_op_pool_create, struct rte_mempool *, 178 (const char *name, enum rte_crypto_op_type type, unsigned nb_elts, 179 unsigned cache_size, uint16_t priv_size, int socket_id), (struct rte_mempool *)1); 180 DEFINE_STUB(rte_cryptodev_device_count_by_driver, uint8_t, (uint8_t driver_id), 0); 181 DEFINE_STUB(rte_cryptodev_configure, int, (uint8_t dev_id, struct rte_cryptodev_config *config), 0); 182 #if RTE_VERSION >= RTE_VERSION_NUM(19, 02, 0, 0) 183 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id, 184 const struct rte_cryptodev_qp_conf *qp_conf, int socket_id), 0); 185 DEFINE_STUB(rte_cryptodev_sym_session_pool_create, struct rte_mempool *, (const char *name, 186 uint32_t nb_elts, 187 uint32_t elt_size, uint32_t cache_size, uint16_t priv_size, 188 int socket_id), (struct rte_mempool *)1); 189 #else 190 DEFINE_STUB(rte_cryptodev_queue_pair_setup, int, (uint8_t dev_id, uint16_t queue_pair_id, 191 const struct rte_cryptodev_qp_conf *qp_conf, 192 int socket_id, struct rte_mempool *session_pool), 0); 193 #endif 194 DEFINE_STUB(rte_cryptodev_start, int, (uint8_t dev_id), 0); 195 DEFINE_STUB_V(rte_cryptodev_stop, (uint8_t dev_id)); 196 DEFINE_STUB(rte_cryptodev_sym_session_create, struct rte_cryptodev_sym_session *, 197 (struct rte_mempool *mempool), (struct rte_cryptodev_sym_session *)1); 198 DEFINE_STUB(rte_cryptodev_sym_session_init, int, (uint8_t dev_id, 199 struct rte_cryptodev_sym_session *sess, 200 struct rte_crypto_sym_xform *xforms, struct rte_mempool *mempool), 0); 201 DEFINE_STUB(rte_vdev_init, int, (const char *name, const char *args), 0); 202 DEFINE_STUB(rte_cryptodev_sym_session_free, int, (struct rte_cryptodev_sym_session *sess), 0); 203 DEFINE_STUB(rte_vdev_uninit, int, (const char *name), 0); 204 205 struct rte_cryptodev *rte_cryptodevs; 206 207 /* global vars and setup/cleanup functions used for all test functions */ 208 struct spdk_bdev_io *g_bdev_io; 209 struct crypto_bdev_io *g_io_ctx; 210 struct crypto_io_channel *g_crypto_ch; 211 struct spdk_io_channel *g_io_ch; 212 struct vbdev_dev g_device; 213 struct vbdev_crypto g_crypto_bdev; 214 struct device_qp g_dev_qp; 215 216 void 217 rte_cryptodev_info_get(uint8_t dev_id, struct rte_cryptodev_info *dev_info) 218 { 219 dev_info->max_nb_queue_pairs = ut_rte_cryptodev_info_get; 220 } 221 222 unsigned int 223 rte_cryptodev_sym_get_private_session_size(uint8_t dev_id) 224 { 225 return (unsigned int)dev_id; 226 } 227 228 void 229 spdk_bdev_io_get_buf(struct spdk_bdev_io *bdev_io, spdk_bdev_io_get_buf_cb cb, uint64_t len) 230 { 231 cb(g_io_ch, g_bdev_io, true); 232 } 233 234 /* Mock these functions to call the callback and then return the value we require */ 235 int ut_spdk_bdev_readv_blocks = 0; 236 bool ut_spdk_bdev_readv_blocks_mocked = false; 237 int 238 spdk_bdev_readv_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 239 struct iovec *iov, int iovcnt, 240 uint64_t offset_blocks, uint64_t num_blocks, 241 spdk_bdev_io_completion_cb cb, void *cb_arg) 242 { 243 cb(g_bdev_io, !ut_spdk_bdev_readv_blocks, cb_arg); 244 return ut_spdk_bdev_readv_blocks; 245 } 246 247 int ut_spdk_bdev_writev_blocks = 0; 248 bool ut_spdk_bdev_writev_blocks_mocked = false; 249 int 250 spdk_bdev_writev_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 251 struct iovec *iov, int iovcnt, 252 uint64_t offset_blocks, uint64_t num_blocks, 253 spdk_bdev_io_completion_cb cb, void *cb_arg) 254 { 255 cb(g_bdev_io, !ut_spdk_bdev_writev_blocks, cb_arg); 256 return ut_spdk_bdev_writev_blocks; 257 } 258 259 int ut_spdk_bdev_unmap_blocks = 0; 260 bool ut_spdk_bdev_unmap_blocks_mocked = false; 261 int 262 spdk_bdev_unmap_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 263 uint64_t offset_blocks, uint64_t num_blocks, 264 spdk_bdev_io_completion_cb cb, void *cb_arg) 265 { 266 cb(g_bdev_io, !ut_spdk_bdev_unmap_blocks, cb_arg); 267 return ut_spdk_bdev_unmap_blocks; 268 } 269 270 int ut_spdk_bdev_flush_blocks = 0; 271 bool ut_spdk_bdev_flush_blocks_mocked = false; 272 int 273 spdk_bdev_flush_blocks(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 274 uint64_t offset_blocks, uint64_t num_blocks, spdk_bdev_io_completion_cb cb, 275 void *cb_arg) 276 { 277 cb(g_bdev_io, !ut_spdk_bdev_flush_blocks, cb_arg); 278 return ut_spdk_bdev_flush_blocks; 279 } 280 281 int ut_spdk_bdev_reset = 0; 282 bool ut_spdk_bdev_reset_mocked = false; 283 int 284 spdk_bdev_reset(struct spdk_bdev_desc *desc, struct spdk_io_channel *ch, 285 spdk_bdev_io_completion_cb cb, void *cb_arg) 286 { 287 cb(g_bdev_io, !ut_spdk_bdev_reset, cb_arg); 288 return ut_spdk_bdev_reset; 289 } 290 291 bool g_completion_called = false; 292 void 293 spdk_bdev_io_complete(struct spdk_bdev_io *bdev_io, enum spdk_bdev_io_status status) 294 { 295 bdev_io->internal.status = status; 296 g_completion_called = true; 297 } 298 299 /* Global setup for all tests that share a bunch of preparation... */ 300 static int 301 test_setup(void) 302 { 303 int i, rc; 304 305 /* Prepare essential variables for test routines */ 306 g_bdev_io = calloc(1, sizeof(struct spdk_bdev_io) + sizeof(struct crypto_bdev_io)); 307 g_bdev_io->u.bdev.iovs = calloc(1, sizeof(struct iovec) * 128); 308 g_bdev_io->bdev = &g_crypto_bdev.crypto_bdev; 309 g_io_ch = calloc(1, sizeof(struct spdk_io_channel) + sizeof(struct crypto_io_channel)); 310 g_crypto_ch = (struct crypto_io_channel *)((uint8_t *)g_io_ch + sizeof(struct spdk_io_channel)); 311 g_io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx; 312 memset(&g_device, 0, sizeof(struct vbdev_dev)); 313 memset(&g_crypto_bdev, 0, sizeof(struct vbdev_crypto)); 314 g_dev_qp.device = &g_device; 315 g_io_ctx->crypto_ch = g_crypto_ch; 316 g_io_ctx->crypto_bdev = &g_crypto_bdev; 317 g_crypto_ch->device_qp = &g_dev_qp; 318 TAILQ_INIT(&g_crypto_ch->pending_cry_ios); 319 TAILQ_INIT(&g_crypto_ch->queued_cry_ops); 320 321 /* Allocate a real mbuf pool so we can test error paths */ 322 g_mbuf_mp = spdk_mempool_create("mbuf_mp", NUM_MBUFS, sizeof(struct rte_mbuf), 323 SPDK_MEMPOOL_DEFAULT_CACHE_SIZE, 324 SPDK_ENV_SOCKET_ID_ANY); 325 326 /* Instead of allocating real rte mempools for these, it's easier and provides the 327 * same coverage just calloc them here. 328 */ 329 for (i = 0; i < MAX_TEST_BLOCKS; i++) { 330 rc = posix_memalign((void **)&g_test_crypto_ops[i], 64, 331 sizeof(struct rte_crypto_op) + sizeof(struct rte_crypto_sym_op) + 332 AES_CBC_IV_LENGTH + QUEUED_OP_LENGTH); 333 if (rc != 0) { 334 assert(false); 335 } 336 memset(g_test_crypto_ops[i], 0, sizeof(struct rte_crypto_op) + 337 sizeof(struct rte_crypto_sym_op) + QUEUED_OP_LENGTH); 338 } 339 return 0; 340 } 341 342 /* Global teardown for all tests */ 343 static int 344 test_cleanup(void) 345 { 346 int i; 347 348 spdk_mempool_free(g_mbuf_mp); 349 for (i = 0; i < MAX_TEST_BLOCKS; i++) { 350 free(g_test_crypto_ops[i]); 351 } 352 free(g_bdev_io->u.bdev.iovs); 353 free(g_bdev_io); 354 free(g_io_ch); 355 return 0; 356 } 357 358 static void 359 test_error_paths(void) 360 { 361 /* Single element block size write, just to test error paths 362 * in vbdev_crypto_submit_request(). 363 */ 364 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 365 g_bdev_io->u.bdev.iovcnt = 1; 366 g_bdev_io->u.bdev.num_blocks = 1; 367 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 368 g_crypto_bdev.crypto_bdev.blocklen = 512; 369 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 370 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 371 372 /* test failure of spdk_mempool_get_bulk(), will result in success because it 373 * will get queued. 374 */ 375 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 376 MOCK_SET(spdk_mempool_get, NULL); 377 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 378 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 379 380 /* same thing but switch to reads to test error path in _crypto_complete_io() */ 381 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 382 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 383 TAILQ_INSERT_TAIL(&g_crypto_ch->pending_cry_ios, g_bdev_io, module_link); 384 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 385 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 386 /* Now with the read_blocks failing */ 387 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 388 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 389 MOCK_SET(spdk_bdev_readv_blocks, -1); 390 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 391 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 392 MOCK_SET(spdk_bdev_readv_blocks, 0); 393 MOCK_CLEAR(spdk_mempool_get); 394 395 /* test failure of rte_crypto_op_bulk_alloc() */ 396 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 397 ut_rte_crypto_op_bulk_alloc = 0; 398 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 399 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 400 ut_rte_crypto_op_bulk_alloc = 1; 401 402 /* test failure of rte_crypto_op_attach_sym_session() */ 403 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 404 ut_rte_crypto_op_attach_sym_session = -1; 405 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 406 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 407 ut_rte_crypto_op_attach_sym_session = 0; 408 } 409 410 static void 411 test_simple_write(void) 412 { 413 /* Single element block size write */ 414 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 415 g_bdev_io->u.bdev.iovcnt = 1; 416 g_bdev_io->u.bdev.num_blocks = 1; 417 g_bdev_io->u.bdev.offset_blocks = 0; 418 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 419 g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_write; 420 g_crypto_bdev.crypto_bdev.blocklen = 512; 421 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 422 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 423 424 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 425 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 426 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1); 427 CU_ASSERT(g_io_ctx->cry_iov.iov_len == 512); 428 CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL); 429 CU_ASSERT(g_io_ctx->cry_offset_blocks == 0); 430 CU_ASSERT(g_io_ctx->cry_num_blocks == 1); 431 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_write); 432 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512); 433 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL); 434 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512); 435 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0); 436 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io); 437 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->buf_addr != NULL); 438 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst->data_len == 512); 439 440 spdk_free(g_io_ctx->cry_iov.iov_base); 441 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 442 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_dst); 443 } 444 445 static void 446 test_simple_read(void) 447 { 448 /* Single element block size read */ 449 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 450 g_bdev_io->u.bdev.iovcnt = 1; 451 g_bdev_io->u.bdev.num_blocks = 1; 452 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 453 g_bdev_io->u.bdev.iovs[0].iov_base = &test_simple_read; 454 g_crypto_bdev.crypto_bdev.blocklen = 512; 455 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 456 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = 1; 457 458 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 459 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 460 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 1); 461 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->buf_addr == &test_simple_read); 462 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->data_len == 512); 463 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->next == NULL); 464 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.length == 512); 465 CU_ASSERT(g_test_crypto_ops[0]->sym->cipher.data.offset == 0); 466 CU_ASSERT(g_test_crypto_ops[0]->sym->m_src->userdata == g_bdev_io); 467 CU_ASSERT(g_test_crypto_ops[0]->sym->m_dst == NULL); 468 469 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 470 } 471 472 static void 473 test_large_rw(void) 474 { 475 unsigned block_len = 512; 476 unsigned num_blocks = CRYPTO_MAX_IO / block_len; 477 unsigned io_len = block_len * num_blocks; 478 unsigned i; 479 480 /* Multi block size read, multi-element */ 481 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 482 g_bdev_io->u.bdev.iovcnt = 1; 483 g_bdev_io->u.bdev.num_blocks = num_blocks; 484 g_bdev_io->u.bdev.iovs[0].iov_len = io_len; 485 g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw; 486 g_crypto_bdev.crypto_bdev.blocklen = block_len; 487 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 488 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 489 490 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 491 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 492 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks); 493 494 for (i = 0; i < num_blocks; i++) { 495 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len)); 496 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 497 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 498 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 499 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 500 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 501 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL); 502 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 503 } 504 505 /* Multi block size write, multi-element */ 506 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 507 g_bdev_io->u.bdev.iovcnt = 1; 508 g_bdev_io->u.bdev.num_blocks = num_blocks; 509 g_bdev_io->u.bdev.iovs[0].iov_len = io_len; 510 g_bdev_io->u.bdev.iovs[0].iov_base = &test_large_rw; 511 g_crypto_bdev.crypto_bdev.blocklen = block_len; 512 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 513 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 514 515 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 516 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 517 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == (int)num_blocks); 518 519 for (i = 0; i < num_blocks; i++) { 520 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_large_rw + (i * block_len)); 521 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 522 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 523 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 524 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 525 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 526 CU_ASSERT(g_io_ctx->cry_iov.iov_len == io_len); 527 CU_ASSERT(g_io_ctx->cry_iov.iov_base != NULL); 528 CU_ASSERT(g_io_ctx->cry_offset_blocks == 0); 529 CU_ASSERT(g_io_ctx->cry_num_blocks == num_blocks); 530 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->buf_addr != NULL); 531 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst->data_len == block_len); 532 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 533 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst); 534 } 535 spdk_free(g_io_ctx->cry_iov.iov_base); 536 } 537 538 static void 539 test_dev_full(void) 540 { 541 struct vbdev_crypto_op *queued_op; 542 struct rte_crypto_sym_op *sym_op; 543 struct crypto_bdev_io *io_ctx; 544 545 /* Two element block size read */ 546 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 547 g_bdev_io->u.bdev.iovcnt = 1; 548 g_bdev_io->u.bdev.num_blocks = 2; 549 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 550 g_bdev_io->u.bdev.iovs[0].iov_base = (void *)0xDEADBEEF; 551 g_bdev_io->u.bdev.iovs[1].iov_len = 512; 552 g_bdev_io->u.bdev.iovs[1].iov_base = (void *)0xFEEDBEEF; 553 g_crypto_bdev.crypto_bdev.blocklen = 512; 554 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 555 g_enqueue_mock = g_dequeue_mock = 1; 556 ut_rte_crypto_op_bulk_alloc = 2; 557 558 g_test_crypto_ops[1]->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED; 559 CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == true); 560 561 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 562 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 563 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == 2); 564 sym_op = g_test_crypto_ops[0]->sym; 565 CU_ASSERT(sym_op->m_src->buf_addr == (void *)0xDEADBEEF); 566 CU_ASSERT(sym_op->m_src->data_len == 512); 567 CU_ASSERT(sym_op->m_src->next == NULL); 568 CU_ASSERT(sym_op->cipher.data.length == 512); 569 CU_ASSERT(sym_op->cipher.data.offset == 0); 570 CU_ASSERT(sym_op->m_src->userdata == g_bdev_io); 571 CU_ASSERT(sym_op->m_dst == NULL); 572 573 /* make sure one got queued and confirm its values */ 574 CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == false); 575 queued_op = TAILQ_FIRST(&g_crypto_ch->queued_cry_ops); 576 sym_op = queued_op->crypto_op->sym; 577 TAILQ_REMOVE(&g_crypto_ch->queued_cry_ops, queued_op, link); 578 CU_ASSERT(queued_op->bdev_io == g_bdev_io); 579 CU_ASSERT(queued_op->crypto_op == g_test_crypto_ops[1]); 580 CU_ASSERT(sym_op->m_src->buf_addr == (void *)0xFEEDBEEF); 581 CU_ASSERT(sym_op->m_src->data_len == 512); 582 CU_ASSERT(sym_op->m_src->next == NULL); 583 CU_ASSERT(sym_op->cipher.data.length == 512); 584 CU_ASSERT(sym_op->cipher.data.offset == 0); 585 CU_ASSERT(sym_op->m_src->userdata == g_bdev_io); 586 CU_ASSERT(sym_op->m_dst == NULL); 587 CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == true); 588 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[0]->sym->m_src); 589 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[1]->sym->m_src); 590 591 /* Non-busy reason for enqueue failure, all were rejected. */ 592 g_enqueue_mock = 0; 593 g_test_crypto_ops[0]->status = RTE_CRYPTO_OP_STATUS_ERROR; 594 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 595 io_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx; 596 CU_ASSERT(io_ctx->bdev_io_status == SPDK_BDEV_IO_STATUS_FAILED); 597 } 598 599 static void 600 test_crazy_rw(void) 601 { 602 unsigned block_len = 512; 603 int num_blocks = 4; 604 int i; 605 606 /* Multi block size read, single element, strange IOV makeup */ 607 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 608 g_bdev_io->u.bdev.iovcnt = 3; 609 g_bdev_io->u.bdev.num_blocks = num_blocks; 610 g_bdev_io->u.bdev.iovs[0].iov_len = 512; 611 g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw; 612 g_bdev_io->u.bdev.iovs[1].iov_len = 1024; 613 g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 512; 614 g_bdev_io->u.bdev.iovs[2].iov_len = 512; 615 g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 512 + 1024; 616 617 g_crypto_bdev.crypto_bdev.blocklen = block_len; 618 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 619 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 620 621 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 622 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 623 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks); 624 625 for (i = 0; i < num_blocks; i++) { 626 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len)); 627 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 628 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 629 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 630 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 631 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 632 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src); 633 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == NULL); 634 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 635 } 636 637 /* Multi block size write, single element strange IOV makeup */ 638 num_blocks = 8; 639 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 640 g_bdev_io->u.bdev.iovcnt = 4; 641 g_bdev_io->u.bdev.num_blocks = num_blocks; 642 g_bdev_io->u.bdev.iovs[0].iov_len = 2048; 643 g_bdev_io->u.bdev.iovs[0].iov_base = &test_crazy_rw; 644 g_bdev_io->u.bdev.iovs[1].iov_len = 512; 645 g_bdev_io->u.bdev.iovs[1].iov_base = &test_crazy_rw + 2048; 646 g_bdev_io->u.bdev.iovs[2].iov_len = 512; 647 g_bdev_io->u.bdev.iovs[2].iov_base = &test_crazy_rw + 2048 + 512; 648 g_bdev_io->u.bdev.iovs[3].iov_len = 1024; 649 g_bdev_io->u.bdev.iovs[3].iov_base = &test_crazy_rw + 2048 + 512 + 512; 650 651 g_crypto_bdev.crypto_bdev.blocklen = block_len; 652 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 653 g_enqueue_mock = g_dequeue_mock = ut_rte_crypto_op_bulk_alloc = num_blocks; 654 655 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 656 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 657 CU_ASSERT(g_io_ctx->cryop_cnt_remaining == num_blocks); 658 659 for (i = 0; i < num_blocks; i++) { 660 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->buf_addr == &test_crazy_rw + (i * block_len)); 661 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->data_len == block_len); 662 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->next == NULL); 663 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.length == block_len); 664 CU_ASSERT(g_test_crypto_ops[i]->sym->cipher.data.offset == 0); 665 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src->userdata == g_bdev_io); 666 CU_ASSERT(g_test_crypto_ops[i]->sym->m_src == g_test_crypto_ops[i]->sym->m_src); 667 CU_ASSERT(g_test_crypto_ops[i]->sym->m_dst == g_test_crypto_ops[i]->sym->m_dst); 668 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_src); 669 spdk_mempool_put(g_mbuf_mp, g_test_crypto_ops[i]->sym->m_dst); 670 } 671 spdk_free(g_io_ctx->cry_iov.iov_base); 672 } 673 674 static void 675 test_passthru(void) 676 { 677 /* Make sure these follow our completion callback, test success & fail. */ 678 g_bdev_io->type = SPDK_BDEV_IO_TYPE_UNMAP; 679 MOCK_SET(spdk_bdev_unmap_blocks, 0); 680 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 681 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 682 MOCK_SET(spdk_bdev_unmap_blocks, -1); 683 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 684 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 685 MOCK_CLEAR(spdk_bdev_unmap_blocks); 686 687 g_bdev_io->type = SPDK_BDEV_IO_TYPE_FLUSH; 688 MOCK_SET(spdk_bdev_flush_blocks, 0); 689 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 690 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 691 MOCK_SET(spdk_bdev_flush_blocks, -1); 692 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 693 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 694 MOCK_CLEAR(spdk_bdev_flush_blocks); 695 696 /* We should never get a WZ command, we report that we don't support it. */ 697 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE_ZEROES; 698 vbdev_crypto_submit_request(g_io_ch, g_bdev_io); 699 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 700 } 701 702 static void 703 test_reset(void) 704 { 705 /* TODO: There are a few different ways to do this given that 706 * the code uses spdk_for_each_channel() to implement reset 707 * handling. Submitting w/o UT for this function for now and 708 * will follow up with something shortly. 709 */ 710 } 711 712 static void 713 test_initdrivers(void) 714 { 715 int rc; 716 static struct spdk_mempool *orig_mbuf_mp; 717 static struct rte_mempool *orig_session_mp; 718 static struct rte_mempool *orig_session_mp_priv; 719 720 721 /* These tests will alloc and free our g_mbuf_mp 722 * so save that off here and restore it after each test is over. 723 */ 724 orig_mbuf_mp = g_mbuf_mp; 725 orig_session_mp = g_session_mp; 726 orig_session_mp_priv = g_session_mp_priv; 727 728 g_session_mp_priv = NULL; 729 g_session_mp = NULL; 730 g_mbuf_mp = NULL; 731 732 /* No drivers available, not an error though */ 733 MOCK_SET(rte_cryptodev_count, 0); 734 rc = vbdev_crypto_init_crypto_drivers(); 735 CU_ASSERT(rc == 0); 736 CU_ASSERT(g_mbuf_mp == NULL); 737 CU_ASSERT(g_session_mp == NULL); 738 CU_ASSERT(g_session_mp_priv == NULL); 739 740 /* Test failure of DPDK dev init. */ 741 MOCK_SET(rte_cryptodev_count, 2); 742 MOCK_SET(rte_vdev_init, -1); 743 rc = vbdev_crypto_init_crypto_drivers(); 744 CU_ASSERT(rc == -EINVAL); 745 CU_ASSERT(g_mbuf_mp == NULL); 746 CU_ASSERT(g_session_mp == NULL); 747 CU_ASSERT(g_session_mp_priv == NULL); 748 MOCK_SET(rte_vdev_init, 0); 749 750 /* Can't create session pool. */ 751 MOCK_SET(spdk_mempool_create, NULL); 752 rc = vbdev_crypto_init_crypto_drivers(); 753 CU_ASSERT(rc == -ENOMEM); 754 CU_ASSERT(g_mbuf_mp == NULL); 755 CU_ASSERT(g_session_mp == NULL); 756 CU_ASSERT(g_session_mp_priv == NULL); 757 MOCK_CLEAR(spdk_mempool_create); 758 759 /* Can't create op pool. */ 760 MOCK_SET(rte_crypto_op_pool_create, NULL); 761 rc = vbdev_crypto_init_crypto_drivers(); 762 CU_ASSERT(rc == -ENOMEM); 763 CU_ASSERT(g_mbuf_mp == NULL); 764 CU_ASSERT(g_session_mp == NULL); 765 CU_ASSERT(g_session_mp_priv == NULL); 766 MOCK_SET(rte_crypto_op_pool_create, (struct rte_mempool *)1); 767 768 /* Check resources are not sufficient */ 769 MOCK_CLEARED_ASSERT(spdk_mempool_create); 770 rc = vbdev_crypto_init_crypto_drivers(); 771 CU_ASSERT(rc == -EINVAL); 772 773 /* Test crypto dev configure failure. */ 774 MOCK_SET(rte_cryptodev_device_count_by_driver, 2); 775 MOCK_SET(rte_cryptodev_info_get, 1); 776 MOCK_SET(rte_cryptodev_configure, -1); 777 MOCK_CLEARED_ASSERT(spdk_mempool_create); 778 rc = vbdev_crypto_init_crypto_drivers(); 779 MOCK_SET(rte_cryptodev_configure, 0); 780 CU_ASSERT(g_mbuf_mp == NULL); 781 CU_ASSERT(g_session_mp == NULL); 782 CU_ASSERT(g_session_mp_priv == NULL); 783 CU_ASSERT(rc == -EINVAL); 784 785 /* Test failure of qp setup. */ 786 MOCK_SET(rte_cryptodev_queue_pair_setup, -1); 787 MOCK_CLEARED_ASSERT(spdk_mempool_create); 788 rc = vbdev_crypto_init_crypto_drivers(); 789 CU_ASSERT(rc == -EINVAL); 790 CU_ASSERT(g_mbuf_mp == NULL); 791 CU_ASSERT(g_session_mp == NULL); 792 CU_ASSERT(g_session_mp_priv == NULL); 793 MOCK_SET(rte_cryptodev_queue_pair_setup, 0); 794 795 /* Test failure of dev start. */ 796 MOCK_SET(rte_cryptodev_start, -1); 797 MOCK_CLEARED_ASSERT(spdk_mempool_create); 798 rc = vbdev_crypto_init_crypto_drivers(); 799 CU_ASSERT(rc == -EINVAL); 800 CU_ASSERT(g_mbuf_mp == NULL); 801 CU_ASSERT(g_session_mp == NULL); 802 CU_ASSERT(g_session_mp_priv == NULL); 803 MOCK_SET(rte_cryptodev_start, 0); 804 805 /* Test happy path. */ 806 MOCK_CLEARED_ASSERT(spdk_mempool_create); 807 rc = vbdev_crypto_init_crypto_drivers(); 808 /* We don't have spdk_mempool_create mocked right now, so make sure to free the mempools. */ 809 CU_ASSERT(g_mbuf_mp != NULL); 810 CU_ASSERT(g_session_mp != NULL); 811 spdk_mempool_free(g_mbuf_mp); 812 rte_mempool_free(g_session_mp); 813 if (g_session_mp_priv != NULL) { 814 /* g_session_mp_priv may or may not be set depending on the DPDK version */ 815 rte_mempool_free(g_session_mp_priv); 816 } 817 CU_ASSERT(rc == 0); 818 819 /* restore our initial values. */ 820 g_mbuf_mp = orig_mbuf_mp; 821 g_session_mp = orig_session_mp; 822 g_session_mp_priv = orig_session_mp_priv; 823 } 824 825 static void 826 test_crypto_op_complete(void) 827 { 828 /* Need to prove to scan-build that we are setting iov_bases properly. */ 829 void *old_iov_base; 830 struct crypto_bdev_io *orig_ctx; 831 832 /* Make sure completion code respects failure. */ 833 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_FAILED; 834 g_completion_called = false; 835 _crypto_operation_complete(g_bdev_io); 836 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 837 CU_ASSERT(g_completion_called == true); 838 839 /* Test read completion. */ 840 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 841 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 842 g_completion_called = false; 843 _crypto_operation_complete(g_bdev_io); 844 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 845 CU_ASSERT(g_completion_called == true); 846 847 /* Test write completion success. */ 848 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 849 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 850 g_completion_called = false; 851 MOCK_SET(spdk_bdev_writev_blocks, 0); 852 /* Code under test will free this, if not ASAN will complain. */ 853 g_io_ctx->cry_iov.iov_base = spdk_malloc(16, 0x10, NULL, SPDK_ENV_LCORE_ID_ANY, 854 SPDK_MALLOC_DMA); 855 orig_ctx = (struct crypto_bdev_io *)g_bdev_io->driver_ctx; 856 old_iov_base = orig_ctx->cry_iov.iov_base; 857 _crypto_operation_complete(g_bdev_io); 858 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_SUCCESS); 859 CU_ASSERT(g_completion_called == true); 860 861 /* Test write completion failed. */ 862 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 863 g_bdev_io->type = SPDK_BDEV_IO_TYPE_WRITE; 864 g_completion_called = false; 865 MOCK_SET(spdk_bdev_writev_blocks, -1); 866 /* Code under test will free this, if not ASAN will complain. */ 867 g_io_ctx->cry_iov.iov_base = spdk_malloc(16, 0x40, NULL, SPDK_ENV_LCORE_ID_ANY, 868 SPDK_MALLOC_DMA); 869 /* To Do: remove this garbage assert as soon as scan-build stops throwing a 870 * heap use after free error. 871 */ 872 SPDK_CU_ASSERT_FATAL(old_iov_base != orig_ctx->cry_iov.iov_base); 873 _crypto_operation_complete(g_bdev_io); 874 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 875 CU_ASSERT(g_completion_called == true); 876 877 /* Test bogus type for this completion. */ 878 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 879 g_bdev_io->type = SPDK_BDEV_IO_TYPE_RESET; 880 g_completion_called = false; 881 _crypto_operation_complete(g_bdev_io); 882 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 883 CU_ASSERT(g_completion_called == true); 884 } 885 886 static void 887 test_supported_io(void) 888 { 889 void *ctx = NULL; 890 bool rc = true; 891 892 /* Make sure we always report false to WZ, we need the bdev layer to 893 * send real 0's so we can encrypt/decrypt them. 894 */ 895 rc = vbdev_crypto_io_type_supported(ctx, SPDK_BDEV_IO_TYPE_WRITE_ZEROES); 896 CU_ASSERT(rc == false); 897 } 898 899 static void 900 test_poller(void) 901 { 902 int rc; 903 struct rte_mbuf *src_mbufs[2]; 904 struct vbdev_crypto_op *op_to_resubmit; 905 906 /* test regular 1 op to dequeue and complete */ 907 g_dequeue_mock = g_enqueue_mock = 1; 908 spdk_mempool_get_bulk(g_mbuf_mp, (void **)&src_mbufs[0], 1); 909 g_test_crypto_ops[0]->sym->m_src = src_mbufs[0]; 910 g_test_crypto_ops[0]->sym->m_src->userdata = g_bdev_io; 911 g_test_crypto_ops[0]->sym->m_dst = NULL; 912 g_io_ctx->cryop_cnt_remaining = 1; 913 g_bdev_io->type = SPDK_BDEV_IO_TYPE_READ; 914 rc = crypto_dev_poller(g_crypto_ch); 915 CU_ASSERT(rc == 1); 916 917 /* We have nothing dequeued but have some to resubmit */ 918 g_dequeue_mock = 0; 919 CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == true); 920 921 /* add an op to the queued list. */ 922 g_resubmit_test = true; 923 op_to_resubmit = (struct vbdev_crypto_op *)((uint8_t *)g_test_crypto_ops[0] + QUEUED_OP_OFFSET); 924 op_to_resubmit->crypto_op = (void *)0xDEADBEEF; 925 op_to_resubmit->bdev_io = g_bdev_io; 926 TAILQ_INSERT_TAIL(&g_crypto_ch->queued_cry_ops, 927 op_to_resubmit, 928 link); 929 CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == false); 930 rc = crypto_dev_poller(g_crypto_ch); 931 g_resubmit_test = false; 932 CU_ASSERT(rc == 0); 933 CU_ASSERT(TAILQ_EMPTY(&g_crypto_ch->queued_cry_ops) == true); 934 935 /* 2 to dequeue but 2nd one failed */ 936 g_dequeue_mock = g_enqueue_mock = 2; 937 g_io_ctx->cryop_cnt_remaining = 2; 938 spdk_mempool_get_bulk(g_mbuf_mp, (void **)&src_mbufs[0], 2); 939 g_test_crypto_ops[0]->sym->m_src = src_mbufs[0]; 940 g_test_crypto_ops[0]->sym->m_src->userdata = g_bdev_io; 941 g_test_crypto_ops[0]->sym->m_dst = NULL; 942 g_test_crypto_ops[0]->status = RTE_CRYPTO_OP_STATUS_SUCCESS; 943 g_test_crypto_ops[1]->sym->m_src = src_mbufs[1]; 944 g_test_crypto_ops[1]->sym->m_src->userdata = g_bdev_io; 945 g_test_crypto_ops[1]->sym->m_dst = NULL; 946 g_test_crypto_ops[1]->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED; 947 g_bdev_io->internal.status = SPDK_BDEV_IO_STATUS_SUCCESS; 948 rc = crypto_dev_poller(g_crypto_ch); 949 CU_ASSERT(g_bdev_io->internal.status == SPDK_BDEV_IO_STATUS_FAILED); 950 CU_ASSERT(rc == 2); 951 } 952 953 int 954 main(int argc, char **argv) 955 { 956 CU_pSuite suite = NULL; 957 unsigned int num_failures; 958 959 if (CU_initialize_registry() != CUE_SUCCESS) { 960 return CU_get_error(); 961 } 962 963 suite = CU_add_suite("crypto", test_setup, test_cleanup); 964 if (suite == NULL) { 965 CU_cleanup_registry(); 966 return CU_get_error(); 967 } 968 969 if (CU_add_test(suite, "test_error_paths", 970 test_error_paths) == NULL || 971 CU_add_test(suite, "test_simple_write", 972 test_simple_write) == NULL || 973 CU_add_test(suite, "test_simple_read", 974 test_simple_read) == NULL || 975 CU_add_test(suite, "test_large_rw", 976 test_large_rw) == NULL || 977 CU_add_test(suite, "test_dev_full", 978 test_dev_full) == NULL || 979 CU_add_test(suite, "test_crazy_rw", 980 test_crazy_rw) == NULL || 981 CU_add_test(suite, "test_passthru", 982 test_passthru) == NULL || 983 CU_add_test(suite, "test_initdrivers", 984 test_initdrivers) == NULL || 985 CU_add_test(suite, "test_crypto_op_complete", 986 test_crypto_op_complete) == NULL || 987 CU_add_test(suite, "test_supported_io", 988 test_supported_io) == NULL || 989 CU_add_test(suite, "test_reset", 990 test_reset) == NULL || 991 CU_add_test(suite, "test_poller", 992 test_poller) == NULL 993 ) { 994 CU_cleanup_registry(); 995 return CU_get_error(); 996 } 997 998 CU_basic_set_mode(CU_BRM_VERBOSE); 999 CU_basic_run_tests(); 1000 num_failures = CU_get_number_of_failures(); 1001 CU_cleanup_registry(); 1002 return num_failures; 1003 } 1004