summaryrefslogtreecommitdiffstats
path: root/src/spdk/test
diff options
context:
space:
mode:
Diffstat (limited to 'src/spdk/test')
-rw-r--r--src/spdk/test/runtest.py15
-rwxr-xr-xsrc/spdk/test/unittest.sh131
2 files changed, 146 insertions, 0 deletions
diff --git a/src/spdk/test/runtest.py b/src/spdk/test/runtest.py
new file mode 100644
index 0000000..8020e76
--- /dev/null
+++ b/src/spdk/test/runtest.py
@@ -0,0 +1,15 @@
+#! /usr/bin/env python
+
+import os
+import sys
+
+
+def run_test(test_path):
+ os.system(test_path)
+
+
+if __name__ == "__main__":
+ py_file = sys.argv[0]
+ py_path = os.path.abspath(os.path.dirname(py_file))
+ test_path = os.path.join(py_path, 'unittest.sh')
+ run_test(test_path)
diff --git a/src/spdk/test/unittest.sh b/src/spdk/test/unittest.sh
new file mode 100755
index 0000000..7e4c8f0
--- /dev/null
+++ b/src/spdk/test/unittest.sh
@@ -0,0 +1,131 @@
+#!/usr/bin/env bash
+#
+# Environment variables:
+# $valgrind Specify the valgrind command line, if not
+# then a default command line is used
+
+set -xe
+
+# if ASAN is enabled, use it. If not use valgrind if installed but allow
+# the env variable to override the default shown below.
+if [ -z ${valgrind+x} ]; then
+ if grep -q '#undef SPDK_CONFIG_ASAN' config.h && hash valgrind; then
+ valgrind='valgrind --leak-check=full --error-exitcode=2'
+ else
+ valgrind=''
+ fi
+fi
+
+# setup local unit test coverage if cov is available
+if hash lcov && grep -q '#define SPDK_CONFIG_COVERAGE 1' config.h; then
+ cov_avail="yes"
+else
+ cov_avail="no"
+fi
+if [ "$cov_avail" = "yes" ]; then
+ # set unit test output dir if not specified in env var
+ if [ -z ${UT_COVERAGE+x} ]; then
+ UT_COVERAGE="ut_coverage"
+ fi
+ mkdir -p $UT_COVERAGE
+ export LCOV_OPTS="
+ --rc lcov_branch_coverage=1
+ --rc lcov_function_coverage=1
+ --rc genhtml_branch_coverage=1
+ --rc genhtml_function_coverage=1
+ --rc genhtml_legend=1
+ --rc geninfo_all_blocks=1
+ "
+ export LCOV="lcov $LCOV_OPTS --no-external"
+ # zero out coverage data
+ $LCOV -q -c -i -d . -t "Baseline" -o $UT_COVERAGE/ut_cov_base.info
+fi
+
+$valgrind test/unit/lib/bdev/bdev.c/bdev_ut
+$valgrind test/unit/lib/bdev/scsi_nvme.c/scsi_nvme_ut
+$valgrind test/unit/lib/bdev/gpt/gpt.c/gpt_ut
+
+$valgrind test/unit/lib/blob/blob.c/blob_ut
+$valgrind test/unit/lib/blobfs/tree.c/tree_ut
+
+$valgrind test/lib/blobfs/blobfs_async_ut/blobfs_async_ut
+# blobfs_sync_ut hangs when run under valgrind, so don't use $valgrind
+test/lib/blobfs/blobfs_sync_ut/blobfs_sync_ut
+
+$valgrind test/unit/lib/nvme/nvme.c/nvme_ut
+$valgrind test/unit/lib/nvme/nvme_ctrlr.c/nvme_ctrlr_ut
+$valgrind test/unit/lib/nvme/nvme_ctrlr_cmd.c/nvme_ctrlr_cmd_ut
+$valgrind test/unit/lib/nvme/nvme_ns.c/nvme_ns_ut
+$valgrind test/unit/lib/nvme/nvme_ns_cmd.c/nvme_ns_cmd_ut
+$valgrind test/unit/lib/nvme/nvme_qpair.c/nvme_qpair_ut
+$valgrind test/unit/lib/nvme/nvme_pcie.c/nvme_pcie_ut
+$valgrind test/unit/lib/nvme/nvme_quirks.c/nvme_quirks_ut
+
+$valgrind test/unit/lib/ioat/ioat.c/ioat_ut
+
+$valgrind test/unit/lib/json/json_parse.c/json_parse_ut
+$valgrind test/unit/lib/json/json_util.c/json_util_ut
+$valgrind test/unit/lib/json/json_write.c/json_write_ut
+
+$valgrind test/unit/lib/jsonrpc/jsonrpc_server.c/jsonrpc_server_ut
+
+$valgrind test/unit/lib/log/log.c/log_ut
+
+$valgrind test/unit/lib/nvmf/ctrlr.c/ctrlr_ut
+$valgrind test/unit/lib/nvmf/ctrlr_bdev.c/ctrlr_bdev_ut
+$valgrind test/unit/lib/nvmf/ctrlr_discovery.c/ctrlr_discovery_ut
+$valgrind test/unit/lib/nvmf/request.c/request_ut
+$valgrind test/unit/lib/nvmf/subsystem.c/subsystem_ut
+
+$valgrind test/unit/lib/scsi/dev.c/dev_ut
+$valgrind test/unit/lib/scsi/lun.c/lun_ut
+$valgrind test/unit/lib/scsi/scsi.c/scsi_ut
+$valgrind test/unit/lib/scsi/scsi_bdev.c/scsi_bdev_ut
+
+$valgrind test/unit/lib/iscsi/param.c/param_ut
+$valgrind test/unit/lib/iscsi/tgt_node.c/tgt_node_ut test/unit/lib/iscsi/tgt_node.c/tgt_node.conf
+$valgrind test/unit/lib/iscsi/iscsi.c/iscsi_ut
+
+$valgrind test/unit/lib/util/bit_array.c/bit_array_ut
+$valgrind test/unit/lib/util/crc32_ieee.c/crc32_ieee_ut
+$valgrind test/unit/lib/util/crc32c.c/crc32c_ut
+$valgrind test/unit/lib/util/io_channel.c/io_channel_ut
+$valgrind test/unit/lib/util/string.c/string_ut
+
+if [ $(uname -s) = Linux ]; then
+$valgrind test/unit/lib/vhost/vhost.c/vhost_ut
+fi
+
+# local unit test coverage
+if [ "$cov_avail" = "yes" ]; then
+ $LCOV -q -d . -c -t "$(hostname)" -o $UT_COVERAGE/ut_cov_test.info
+ $LCOV -q -a $UT_COVERAGE/ut_cov_base.info -a $UT_COVERAGE/ut_cov_test.info -o $UT_COVERAGE/ut_cov_total.info
+ $LCOV -q -a $UT_COVERAGE/ut_cov_total.info -o $UT_COVERAGE/ut_cov_unit.info
+ $LCOV -q -r $UT_COVERAGE/ut_cov_unit.info 'app/*' -o $UT_COVERAGE/ut_cov_unit.info
+ $LCOV -q -r $UT_COVERAGE/ut_cov_unit.info 'examples/*' -o $UT_COVERAGE/ut_cov_unit.info
+ $LCOV -q -r $UT_COVERAGE/ut_cov_unit.info 'include/*' -o $UT_COVERAGE/ut_cov_unit.info
+ $LCOV -q -r $UT_COVERAGE/ut_cov_unit.info 'lib/vhost/rte_vhost/*' -o $UT_COVERAGE/ut_cov_unit.info
+ $LCOV -q -r $UT_COVERAGE/ut_cov_unit.info 'test/*' -o $UT_COVERAGE/ut_cov_unit.info
+ rm -f $UT_COVERAGE/ut_cov_base.info $UT_COVERAGE/ut_cov_test.info
+ genhtml $UT_COVERAGE/ut_cov_unit.info --output-directory $UT_COVERAGE
+ git clean -f "*.gcda"
+fi
+
+set +x
+
+echo
+echo
+echo "====================="
+echo "All unit tests passed"
+echo "====================="
+if [ "$cov_avail" = "yes" ]; then
+ echo "Note: coverage report is here: ./$UT_COVERAGE"
+else
+ echo "WARN: lcov not installed or SPDK built without coverage!"
+fi
+if grep -q '#undef SPDK_CONFIG_ASAN' config.h && [ "$valgrind" = "" ]; then
+ echo "WARN: neither valgrind nor ASAN is enabled!"
+fi
+
+echo
+echo