#!/usr/bin/env bash # SPDX-License-Identifier: BSD-3-Clause # Copyright (C) 2023 Intel Corporation # All rights reserved. # testdir=$(readlink -f $(dirname $0)) rootdir=$(readlink -f $testdir/../..) # Use TCP as the default nvmf transport TEST_TRANSPORT=${TEST_TRANSPORT:=tcp} source "$rootdir/test/common/autotest_common.sh" source "$rootdir/test/nvmf/common.sh" nqn=nqn.2016-06.io.spdk:cnode0 key0=(00112233445566778899001122334455 11223344556677889900112233445500) key1=(22334455667788990011223344550011 33445566778899001122334455001122) declare -A stats spdk_dd() { local config # Disable auto-examine to avoid seeing the examine callbacks' reads in accel stats config=$("$rootdir/scripts/gen_nvme.sh" --mode=remote --json-with-subsystems \ --trid="$TEST_TRANSPORT:$NVMF_FIRST_TARGET_IP:$NVMF_PORT:$nqn" \ | jq '.subsystems[0].config[.subsystems[0].config | length] |= {"method": "bdev_set_options", "params": {"bdev_auto_examine": false}}') "$rootdir/build/bin/spdk_dd" -c <(echo "$config") "$@" } get_stat() { local event opcode event="$1" opcode="$2" if [[ -z "$opcode" ]]; then rpc_cmd accel_get_stats | jq -r ".$event" else rpc_cmd accel_get_stats \ | jq -r ".operations[] | select(.opcode == \"$opcode\").$event" fi } update_stats() { stats[sequence_executed]=$(get_stat sequence_executed) stats[encrypt_executed]=$(get_stat executed encrypt) stats[decrypt_executed]=$(get_stat executed decrypt) stats[copy_executed]=$(get_stat executed copy) } cleanup() { [[ -v input ]] && rm -f "$input" || : [[ -v output ]] && rm -f "$output" || : nvmftestfini } nvmftestinit nvmfappstart -m 0x2 input=$(mktemp) output=$(mktemp) trap 'cleanup; exit 1' SIGINT SIGTERM EXIT rpc_cmd <<- CONFIG bdev_malloc_create 32 4096 -b malloc0 accel_crypto_key_create -c AES_XTS -k "${key0[0]}" -e "${key0[1]}" -n key0 accel_crypto_key_create -c AES_XTS -k "${key1[0]}" -e "${key1[1]}" -n key1 bdev_crypto_create malloc0 crypto0 -n key0 bdev_crypto_create crypto0 crypto1 -n key1 nvmf_create_transport $NVMF_TRANSPORT_OPTS nvmf_create_subsystem $nqn -a nvmf_subsystem_add_listener $nqn -t $TEST_TRANSPORT -a $NVMF_FIRST_TARGET_IP -s $NVMF_PORT nvmf_subsystem_add_ns $nqn crypto1 CONFIG # Remember initial stats update_stats # Write a single 64K request and check the stats dd if=/dev/urandom of="$input" bs=1K count=64 spdk_dd --if "$input" --ob Nvme0n1 --bs $((64 * 1024)) --count 1 (($(get_stat sequence_executed) == stats[sequence_executed] + 1)) (($(get_stat executed encrypt) == stats[encrypt_executed] + 2)) (($(get_stat executed decrypt) == stats[decrypt_executed])) # There's still one copy performed by the malloc bdev (($(get_stat executed copy) == stats[copy_executed] + 1)) update_stats # Now read that 64K, verify the stats and check that it matches what was written spdk_dd --of "$output" --ib Nvme0n1 --bs $((64 * 1024)) --count 1 (($(get_stat sequence_executed) == stats[sequence_executed] + 2)) (($(get_stat executed encrypt) == stats[encrypt_executed])) (($(get_stat executed decrypt) == stats[decrypt_executed] + 2)) (($(get_stat executed copy) == stats[copy_executed] + 1)) cmp "$input" "$output" spdk_dd --if /dev/zero --ob Nvme0n1 --bs $((64 * 1024)) --count 1 update_stats # Now do the same using 4K requests spdk_dd --if "$input" --ob Nvme0n1 --bs 4096 --count 16 (($(get_stat sequence_executed) == stats[sequence_executed] + 16)) (($(get_stat executed encrypt) == stats[encrypt_executed] + 32)) (($(get_stat executed decrypt) == stats[decrypt_executed])) (($(get_stat executed copy) == stats[copy_executed] + 16)) update_stats # Check the reads : > "$output" spdk_dd --of "$output" --ib Nvme0n1 --bs 4096 --count 16 (($(get_stat sequence_executed) == stats[sequence_executed] + 32)) (($(get_stat executed encrypt) == stats[encrypt_executed])) (($(get_stat executed decrypt) == stats[decrypt_executed] + 32)) (($(get_stat executed copy) == stats[copy_executed] + 16)) cmp "$input" "$output" trap - SIGINT SIGTERM EXIT cleanup