In multi session tests, multiple sessions get created. So the handling in ut_teardown won't guard against any memory that is not freed by the test case. Test case should free sessions as well as local memory that was used to save session pointers both in case of unsupported cases as well as operation failures.
Signed-off-by: Anoob Joseph <ano...@marvell.com> --- app/test/test_cryptodev.c | 55 +++++++++++++++++++++++++++------------ 1 file changed, 39 insertions(+), 16 deletions(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index fb4fc4e805..86e63a33fc 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -12751,8 +12751,8 @@ test_multi_session(void) struct crypto_testsuite_params *ts_params = &testsuite_params; struct crypto_unittest_params *ut_params = &unittest_params; struct rte_cryptodev_info dev_info; + int i, nb_sess, ret = TEST_SUCCESS; void **sessions; - uint16_t i; /* Verify the capabilities */ struct rte_cryptodev_sym_capability_idx cap_idx; @@ -12782,21 +12782,25 @@ test_multi_session(void) sessions[i] = rte_cryptodev_sym_session_create( ts_params->valid_devs[0], &ut_params->auth_xform, ts_params->session_mpool); - if (sessions[i] == NULL && rte_errno == ENOTSUP) - return TEST_SKIPPED; + if (sessions[i] == NULL && rte_errno == ENOTSUP) { + nb_sess = i; + ret = TEST_SKIPPED; + break; + } TEST_ASSERT_NOT_NULL(sessions[i], "Session creation failed at session number %u", i); + /* Attempt to send a request on each session */ - TEST_ASSERT_SUCCESS( test_AES_CBC_HMAC_SHA512_decrypt_perform( + ret = test_AES_CBC_HMAC_SHA512_decrypt_perform( sessions[i], ut_params, ts_params, catch_22_quote_2_512_bytes_AES_CBC_ciphertext, catch_22_quote_2_512_bytes_AES_CBC_HMAC_SHA512_digest, - aes_cbc_iv), - "Failed to perform decrypt on request number %u.", i); + aes_cbc_iv); + /* free crypto operation structure */ rte_crypto_op_free(ut_params->op); @@ -12815,16 +12819,25 @@ test_multi_session(void) rte_pktmbuf_free(ut_params->ibuf); ut_params->ibuf = 0; } + + if (ret == TEST_SKIPPED) { + i++; + break; + } + + TEST_ASSERT_SUCCESS(ret, "Failed to perform decrypt on request number %u.", i); } - for (i = 0; i < MAX_NB_SESSIONS; i++) { + nb_sess = i; + + for (i = 0; i < nb_sess; i++) { rte_cryptodev_sym_session_free(ts_params->valid_devs[0], sessions[i]); } rte_free(sessions); - return TEST_SUCCESS; + return ret; } struct multi_session_params { @@ -12843,8 +12856,9 @@ test_multi_session_random_usage(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; struct rte_cryptodev_info dev_info; + uint32_t nb_sess, i, j; + int ret = TEST_SUCCESS; void **sessions; - uint32_t i, j; struct multi_session_params ut_paramz[] = { { @@ -12903,27 +12917,30 @@ test_multi_session_random_usage(void) ts_params->valid_devs[0], &ut_paramz[i].ut_params.auth_xform, ts_params->session_mpool); - if (sessions[i] == NULL && rte_errno == ENOTSUP) - return TEST_SKIPPED; + if (sessions[i] == NULL && rte_errno == ENOTSUP) { + nb_sess = i; + ret = TEST_SKIPPED; + goto session_clear; + } TEST_ASSERT_NOT_NULL(sessions[i], "Session creation failed at session number %u", i); } + nb_sess = i; + srand(time(NULL)); for (i = 0; i < 40000; i++) { j = rand() % MB_SESSION_NUMBER; - TEST_ASSERT_SUCCESS( - test_AES_CBC_HMAC_SHA512_decrypt_perform( + ret = test_AES_CBC_HMAC_SHA512_decrypt_perform( sessions[j], &ut_paramz[j].ut_params, ts_params, ut_paramz[j].cipher, ut_paramz[j].digest, - ut_paramz[j].iv), - "Failed to perform decrypt on request number %u.", i); + ut_paramz[j].iv); rte_crypto_op_free(ut_paramz[j].ut_params.op); @@ -12943,9 +12960,15 @@ test_multi_session_random_usage(void) rte_pktmbuf_free(ut_paramz[j].ut_params.ibuf); ut_paramz[j].ut_params.ibuf = 0; } + + if (ret == TEST_SKIPPED) + break; + + TEST_ASSERT_SUCCESS(ret, "Failed to perform decrypt on request number %u.", i); } - for (i = 0; i < MB_SESSION_NUMBER; i++) { +session_clear: + for (i = 0; i < nb_sess; i++) { rte_cryptodev_sym_session_free(ts_params->valid_devs[0], sessions[i]); } -- 2.25.1