HeaderInsertionTests.cpp 53 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467
  1. /*
  2. * Copyright (c) 2017-2018,2021 The Linux Foundation. All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions are
  6. * met:
  7. * * Redistributions of source code must retain the above copyright
  8. * notice, this list of conditions and the following disclaimer.
  9. * * Redistributions in binary form must reproduce the above
  10. * copyright notice, this list of conditions and the following
  11. * disclaimer in the documentation and/or other materials provided
  12. * with the distribution.
  13. * * Neither the name of The Linux Foundation nor the names of its
  14. * contributors may be used to endorse or promote products derived
  15. * from this software without specific prior written permission.
  16. *
  17. * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
  18. * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  19. * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
  20. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
  21. * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  22. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  23. * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
  24. * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  25. * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  26. * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
  27. * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  28. *
  29. * Changes from Qualcomm Innovation Center are provided under the following license:
  30. *
  31. * Copyright (c) 2022 Qualcomm Innovation Center, Inc. All rights reserved.
  32. *
  33. * Redistribution and use in source and binary forms, with or without
  34. * modification, are permitted (subject to the limitations in the
  35. * disclaimer below) provided that the following conditions are met:
  36. *
  37. * * Redistributions of source code must retain the above copyright
  38. * notice, this list of conditions and the following disclaimer.
  39. *
  40. * * Redistributions in binary form must reproduce the above
  41. * copyright notice, this list of conditions and the following
  42. * disclaimer in the documentation and/or other materials provided
  43. * with the distribution.
  44. *
  45. * * Neither the name of Qualcomm Innovation Center, Inc. nor the names of its
  46. * contributors may be used to endorse or promote products derived
  47. * from this software without specific prior written permission.
  48. *
  49. * NO EXPRESS OR IMPLIED LICENSES TO ANY PARTY'S PATENT RIGHTS ARE
  50. * GRANTED BY THIS LICENSE. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT
  51. * HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
  52. * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  53. * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  54. * IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
  55. * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  56. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
  57. * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  58. * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
  59. * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  60. * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
  61. * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE
  62. */
  63. #include "RoutingDriverWrapper.h"
  64. #include "HeaderInsertion.h"
  65. #include "Filtering.h"
  66. #include "IPAFilteringTable.h"
  67. #include "hton.h" // for htonl
  68. #include "TestsUtils.h"
  69. #include <string.h>
  70. #include <unistd.h>
  71. #include <errno.h>
  72. #include <fcntl.h>
  73. #include <sys/ioctl.h>
  74. #include <typeinfo>
  75. #define IPV4_DST_ADDR_OFFSET (16)
  76. class IPAHeaderInsertionTestFixture: public TestBase {
  77. public:
  78. IPAHeaderInsertionTestFixture() : m_uBufferSize(0)
  79. {
  80. memset(m_aBuffer, 0, sizeof(m_aBuffer));
  81. m_testSuiteName.push_back("Insertion");
  82. }
  83. virtual bool AddRules() = 0;
  84. virtual bool ModifyPackets() = 0;
  85. virtual bool TestLogic() = 0;
  86. bool Setup()
  87. {
  88. ConfigureScenario(PHASE_FIVE_TEST_CONFIGURATION);
  89. m_producer.Open(INTERFACE0_TO_IPA_DATA_PATH,
  90. INTERFACE0_FROM_IPA_DATA_PATH);
  91. m_Consumer1.Open(INTERFACE1_TO_IPA_DATA_PATH,
  92. INTERFACE1_FROM_IPA_DATA_PATH);
  93. m_Consumer2.Open(INTERFACE2_TO_IPA_DATA_PATH,
  94. INTERFACE2_FROM_IPA_DATA_PATH);
  95. m_Consumer3.Open(INTERFACE3_TO_IPA_DATA_PATH,
  96. INTERFACE3_FROM_IPA_DATA_PATH);
  97. if (!m_Routing.DeviceNodeIsOpened()) {
  98. LOG_MSG_ERROR(
  99. "Routing block is not ready for immediate commands!\n");
  100. return false;
  101. }
  102. if (!m_Filtering.DeviceNodeIsOpened()) {
  103. LOG_MSG_ERROR(
  104. "Filtering block is not ready for immediate commands!\n");
  105. return false;
  106. }
  107. if (!m_HeaderInsertion.DeviceNodeIsOpened())
  108. {
  109. LOG_MSG_ERROR("Header Insertion block is not ready for immediate commands!\n");
  110. return false;
  111. }
  112. m_HeaderInsertion.Reset();// resetting this component will reset both Routing and Filtering tables.
  113. return true;
  114. } // Setup()
  115. bool Run()
  116. {
  117. m_uBufferSize = BUFF_MAX_SIZE;
  118. LOG_MSG_STACK("Entering Function");
  119. // Add the relevant filtering rules
  120. if (!AddRules()) {
  121. LOG_MSG_ERROR("Failed adding filtering rules.");
  122. return false;
  123. }
  124. // Load input data (IP packet) from file
  125. if (!LoadDefaultPacket(m_eIP, m_aBuffer, m_uBufferSize)) {
  126. LOG_MSG_ERROR("Failed default Packet");
  127. return false;
  128. }
  129. if (!ModifyPackets()) {
  130. LOG_MSG_ERROR("Failed to modify packets.");
  131. return false;
  132. }
  133. if (!TestLogic()) {
  134. LOG_MSG_ERROR("Test failed, Input and expected output mismatch.");
  135. return false;
  136. }
  137. LOG_MSG_STACK("Leaving Function (Returning True)");
  138. return true;
  139. } // Run()
  140. bool Teardown()
  141. {
  142. m_HeaderInsertion.Reset();// resetting this component will reset both Routing and Filtering tables.
  143. m_producer.Close();
  144. m_Consumer1.Close();
  145. m_Consumer2.Close();
  146. m_Consumer3.Close();
  147. return true;
  148. } // Teardown()
  149. unsigned GetHdrSramSize()
  150. {
  151. int fd;
  152. struct ipa_test_mem_partition mem_part;
  153. fd = open("/dev/ipa_test", O_RDONLY);
  154. if (fd < 0) {
  155. printf("Failed opening %s. errno %d: %s\n", "/dev/ipa_test",
  156. errno, strerror(errno));
  157. return 0;
  158. }
  159. if (ioctl(fd, IPA_TEST_IOC_GET_MEM_PART, &mem_part) < 0) {
  160. printf("Failed ioctl IPA_TEST_IOC_GET_MEM_PART. errno %d: %s\n",
  161. errno, strerror(errno));
  162. close(fd);
  163. return 0;
  164. }
  165. close(fd);
  166. return mem_part.apps_hdr_size;
  167. }
  168. ~IPAHeaderInsertionTestFixture() {}
  169. static RoutingDriverWrapper m_Routing;
  170. static Filtering m_Filtering;
  171. static HeaderInsertion m_HeaderInsertion;
  172. InterfaceAbstraction m_producer;
  173. InterfaceAbstraction m_Consumer1;
  174. InterfaceAbstraction m_Consumer2;
  175. InterfaceAbstraction m_Consumer3;
  176. protected:
  177. static const size_t BUFF_MAX_SIZE = 1024;
  178. static const uint8_t MAX_HEADER_SIZE = 64; // 64Bytes - Max Header Length
  179. enum ipa_ip_type m_eIP;
  180. uint8_t m_aBuffer[BUFF_MAX_SIZE]; // Input file \ IP packet
  181. size_t m_uBufferSize;
  182. };
  183. RoutingDriverWrapper IPAHeaderInsertionTestFixture::m_Routing;
  184. Filtering IPAHeaderInsertionTestFixture::m_Filtering;
  185. HeaderInsertion IPAHeaderInsertionTestFixture::m_HeaderInsertion;
  186. //---------------------------------------------------------------------------/
  187. // Test002: Test that 802.3 header was inserted Correctly /
  188. //---------------------------------------------------------------------------/
  189. class IPAHeaderInsertionTest001: public IPAHeaderInsertionTestFixture {
  190. public:
  191. IPAHeaderInsertionTest001() {
  192. m_name = "IPAHeaderInsertionTest001";
  193. m_description =
  194. "Header Insertion Test 001 - Test RMNet Header Insertion\
  195. 1. Generate and commit RMNet.3 header Insertion \
  196. 2. Generate and commit routing table containing bypass rule. \
  197. 3. Generate and commit bypass filtering rule. \
  198. 4. Send a packet, and verify that the RMNet.3 Header was inserted correctly.";
  199. Register(*this);
  200. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  201. m_nHeadertoAddSize = sizeof(aRMNetHeader);
  202. memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
  203. }
  204. // Test Description:
  205. // 1. Generate and commit single bypass routing table.
  206. virtual bool AddRules() {
  207. m_eIP = IPA_IP_v4;
  208. const char bypass0[20] = "Bypass0";
  209. struct ipa_ioc_get_rt_tbl sRoutingTable;
  210. bool bRetVal = true;
  211. struct ipa_ioc_get_hdr sRetHeader;
  212. IPAFilteringTable cFilterTable;
  213. struct ipa_flt_rule_add sFilterRuleEntry;
  214. uint32_t nRTTableHdl=0;
  215. memset(&sRoutingTable, 0, sizeof(sRoutingTable));
  216. memset(&sRetHeader, 0, sizeof(sRetHeader));
  217. strlcpy(sRetHeader.name, "IEEE802_3", sizeof(sRetHeader.name));
  218. LOG_MSG_STACK("Entering Function");
  219. // Create Header:
  220. // Allocate Memory, populate it, and add in to the Header Insertion.
  221. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  222. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  223. sizeof(struct ipa_ioc_add_hdr)
  224. + 1 * sizeof(struct ipa_hdr_add));
  225. if (!pHeaderDescriptor) {
  226. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  227. bRetVal = false;
  228. goto bail;
  229. }
  230. pHeaderDescriptor->commit = true;
  231. pHeaderDescriptor->num_hdrs = 1;
  232. strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name));
  233. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
  234. m_nHeadertoAddSize); //Header's Data
  235. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  236. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  237. pHeaderDescriptor->hdr[0].is_partial = false;
  238. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  239. strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
  240. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  241. {
  242. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
  243. bRetVal = false;
  244. goto bail;
  245. }
  246. if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
  247. {
  248. LOG_MSG_ERROR(" Failed");
  249. bRetVal = false;
  250. goto bail;
  251. }
  252. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST2_CONS,
  253. sRetHeader.hdl,&nRTTableHdl)) {
  254. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  255. bRetVal = false;
  256. goto bail;
  257. }
  258. LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
  259. sRoutingTable.ip = m_eIP;
  260. strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
  261. if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
  262. LOG_MSG_ERROR(
  263. "m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
  264. bRetVal = false;
  265. goto bail;
  266. }
  267. // Creating Filtering Rules
  268. cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,1);
  269. LOG_MSG_INFO("Creation of filtering table completed successfully");
  270. // Configuring Filtering Rule No.1
  271. cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
  272. sFilterRuleEntry.at_rear = true;
  273. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  274. sFilterRuleEntry.status = -1; // return value
  275. sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
  276. sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl; //put here the handle corresponding to Routing Rule 1
  277. if (
  278. ((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
  279. !m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
  280. )
  281. {
  282. LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
  283. bRetVal = false;
  284. goto bail;
  285. } else
  286. {
  287. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
  288. }
  289. bail:
  290. Free(pHeaderDescriptor);
  291. LOG_MSG_STACK(
  292. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  293. return bRetVal;
  294. } // AddRules()
  295. virtual bool ModifyPackets() {
  296. // This test doesn't modify the original IP Packet.
  297. return true;
  298. } // ModifyPacktes ()
  299. virtual bool TestLogic() {
  300. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  301. m_aExpectedBufSize = 0;
  302. memcpy(m_aExpectedBuffer, m_aHeadertoAdd, m_nHeadertoAddSize);
  303. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize,m_aBuffer,m_uBufferSize);
  304. m_aExpectedBufSize = m_nHeadertoAddSize + m_uBufferSize;
  305. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  306. &m_Consumer1, m_aExpectedBuffer, m_aExpectedBufSize)) {
  307. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  308. return false;
  309. }
  310. return true;
  311. }
  312. private:
  313. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  314. size_t m_aExpectedBufSize;
  315. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  316. size_t m_nHeadertoAddSize;
  317. };
  318. //---------------------------------------------------------------------------/
  319. // Test002: Test that 802.3 header was inserted Correctly /
  320. //---------------------------------------------------------------------------/
  321. class IPAHeaderInsertionTest002: public IPAHeaderInsertionTestFixture {
  322. public:
  323. IPAHeaderInsertionTest002() {
  324. m_name = "IPAHeaderInsertionTest002";
  325. m_description =
  326. "Header Insertion Test 002 - Test IEEE802.3 Header Insertion\
  327. 1. Generate and commit IEEE802.3 header Insertion \
  328. 2. Generate and commit routing table containing bypass rule. \
  329. 3. Generate and commit bypass filtering rule. \
  330. 4. Send a packet, and verify that the IEEE802.3 Header was inserted correctly \
  331. and that the header Length was updated as well";
  332. Register(*this);
  333. uint8_t aIEEE802_3Header[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  334. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x46, 0xAE, 0xAF, 0xB0,// the correct size (00 46) is inserted here.
  335. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  336. m_nHeadertoAddSize = sizeof(aIEEE802_3Header);
  337. memcpy(m_aHeadertoAdd, aIEEE802_3Header, m_nHeadertoAddSize);
  338. }
  339. // Test Description:
  340. // 1. Generate and commit single bypass routing table.
  341. virtual bool AddRules() {
  342. m_eIP = IPA_IP_v4;
  343. const char bypass0[20] = "Bypass0";
  344. struct ipa_ioc_get_rt_tbl sRoutingTable;
  345. bool bRetVal = true;
  346. struct ipa_ioc_get_hdr sRetHeader;
  347. IPAFilteringTable cFilterTable;
  348. struct ipa_flt_rule_add sFilterRuleEntry;
  349. uint32_t nRTTableHdl=0;
  350. memset(&sRoutingTable, 0, sizeof(sRoutingTable));
  351. memset(&sRetHeader, 0, sizeof(sRetHeader));
  352. strlcpy(sRetHeader.name, "IEEE802_3", sizeof(sRetHeader.name));
  353. LOG_MSG_STACK("Entering Function");
  354. // Create Header:
  355. // Allocate Memory, populate it, and add in to the Header Insertion.
  356. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  357. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  358. sizeof(struct ipa_ioc_add_hdr)
  359. + 1 * sizeof(struct ipa_hdr_add));
  360. if (!pHeaderDescriptor) {
  361. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  362. bRetVal = false;
  363. goto bail;
  364. }
  365. pHeaderDescriptor->commit = true;
  366. pHeaderDescriptor->num_hdrs = 1;
  367. strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name)); // Header's Name
  368. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
  369. m_nHeadertoAddSize); //Header's Data
  370. pHeaderDescriptor->hdr[0].hdr[12] = 0x00; //set length to zero, to confirm if ipa updates or not
  371. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  372. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  373. pHeaderDescriptor->hdr[0].is_partial = false;
  374. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  375. strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
  376. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  377. {
  378. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
  379. bRetVal = false;
  380. goto bail;
  381. }
  382. if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
  383. {
  384. LOG_MSG_ERROR(" Failed");
  385. bRetVal = false;
  386. goto bail;
  387. }
  388. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST3_CONS,
  389. sRetHeader.hdl,&nRTTableHdl)) {
  390. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  391. bRetVal = false;
  392. goto bail;
  393. }
  394. LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
  395. sRoutingTable.ip = m_eIP;
  396. strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
  397. if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
  398. LOG_MSG_ERROR(
  399. "m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
  400. bRetVal = false;
  401. goto bail;
  402. }
  403. // Creating Filtering Rules
  404. cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,1);
  405. LOG_MSG_INFO("Creation of filtering table completed successfully");
  406. // Configuring Filtering Rule No.1
  407. cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
  408. sFilterRuleEntry.at_rear = true;
  409. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  410. sFilterRuleEntry.status = -1; // return value
  411. sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
  412. sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl; //put here the handle corresponding to Routing Rule 1
  413. if (
  414. ((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
  415. !m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
  416. )
  417. {
  418. LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
  419. bRetVal = false;
  420. goto bail;
  421. } else
  422. {
  423. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
  424. }
  425. bail:
  426. Free(pHeaderDescriptor);
  427. LOG_MSG_STACK(
  428. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  429. return bRetVal;
  430. } // AddRules()
  431. virtual bool ModifyPackets() {
  432. // This test doesn't modify the original IP Packet.
  433. return true;
  434. } // ModifyPacktes ()
  435. virtual bool TestLogic() {
  436. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  437. m_aExpectedBufSize = 0;
  438. memcpy(m_aExpectedBuffer, m_aHeadertoAdd, m_nHeadertoAddSize);
  439. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize,m_aBuffer,m_uBufferSize);
  440. m_aExpectedBufSize = m_nHeadertoAddSize + m_uBufferSize;
  441. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  442. &m_Consumer2, m_aExpectedBuffer, m_aExpectedBufSize)) {
  443. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  444. return false;
  445. }
  446. return true;
  447. }
  448. private:
  449. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  450. size_t m_aExpectedBufSize;
  451. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  452. size_t m_nHeadertoAddSize;
  453. };
  454. //---------------------------------------------------------------------------/
  455. // Test003: Test Three Different Header Insertions /
  456. //---------------------------------------------------------------------------/
  457. class IPAHeaderInsertionTest003: public IPAHeaderInsertionTestFixture {
  458. public:
  459. IPAHeaderInsertionTest003() :
  460. m_aExpectedBufSize(BUFF_MAX_SIZE),
  461. m_nHeadertoAddSize1(0),
  462. m_nHeadertoAddSize2(0),
  463. m_nHeadertoAddSize3(0)
  464. {
  465. m_name = "IPAHeaderInsertionTest003";
  466. m_description =
  467. "Header Insertion Test 003 - Test RmNet,IEEE802.3 and IEEE802.3 with const (1) addition to the length field\
  468. 1. Generate and commit two types of header Insertion RmNet and IEE802.3 \
  469. 2. Generate and commit three routing tables. \
  470. Each table contains a single \"bypass\" rule (all data goes to output pipe 0, 1 and 2 (accordingly)) \
  471. Routing table 1 is used to add RmNet Header \
  472. Routing table 2 is used to add IEEE802.3 Header (requires update of the Length field) \
  473. Routing table 3 is used to add IEEE802.3 Header with additional const (1) to the length field \
  474. 3. Generate and commit Three filtering rules (MASK = 0xFF..FF). \
  475. All DST_IP == 127.0.0.1 traffic goes to routing table 1 \
  476. All DST_IP == 192.169.1.1 traffic goes to routing table 2 \
  477. All DST_IP == 192.169.1.2 traffic goes to routing table 3";
  478. Register(*this);
  479. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  480. uint8_t aIEEE802_3Header1[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  481. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x46, 0xAE, 0xAF, 0xB0,
  482. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  483. uint8_t aIEEE802_3Header2[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  484. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x47, 0xAE, 0xAF, 0xB0,
  485. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  486. m_nHeadertoAddSize1 = sizeof(aRMNetHeader);
  487. memcpy(m_aHeadertoAdd1, aRMNetHeader, m_nHeadertoAddSize1);
  488. m_nHeadertoAddSize2 = sizeof(aIEEE802_3Header1);
  489. memcpy(m_aHeadertoAdd2, aIEEE802_3Header1, m_nHeadertoAddSize2);
  490. m_nHeadertoAddSize3 = sizeof(aIEEE802_3Header2);
  491. memcpy(m_aHeadertoAdd3, aIEEE802_3Header2, m_nHeadertoAddSize3);
  492. }
  493. // Test Description:
  494. // 1. Generate and commit single bypass routing table.
  495. virtual bool AddRules() {
  496. m_eIP = IPA_IP_v4;
  497. const char aBypass1[20] = "Bypass1";
  498. const char aBypass2[20] = "Bypass2";
  499. const char aBypass3[20] = "Bypass3";
  500. uint32_t nTableHdl01, nTableHdl02, nTableHdl03;
  501. bool bRetVal = true;
  502. IPAFilteringTable cFilterTable0;
  503. struct ipa_flt_rule_add sFilterRuleEntry;
  504. struct ipa_ioc_get_hdr sGetHeader1,sGetHeader2;
  505. LOG_MSG_STACK("Entering Function");
  506. memset(&sFilterRuleEntry, 0, sizeof(sFilterRuleEntry));
  507. memset(&sGetHeader1, 0, sizeof(sGetHeader1));
  508. memset(&sGetHeader2, 0, sizeof(sGetHeader2));
  509. // Create Header:
  510. // Allocate Memory, populate it, and add in to the Header Insertion.
  511. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  512. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  513. sizeof(struct ipa_ioc_add_hdr)
  514. + 2 * sizeof(struct ipa_hdr_add));
  515. if (!pHeaderDescriptor) {
  516. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  517. bRetVal = false;
  518. goto bail;
  519. }
  520. pHeaderDescriptor->commit = true;
  521. pHeaderDescriptor->num_hdrs = 2;
  522. // Adding Header No1.
  523. strlcpy(pHeaderDescriptor->hdr[0].name, "RMNet", sizeof(pHeaderDescriptor->hdr[0].name)); // Header's Name
  524. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd1,
  525. m_nHeadertoAddSize1); //Header's Data
  526. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize1;
  527. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  528. pHeaderDescriptor->hdr[0].is_partial = false;
  529. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  530. // Adding Header No2.
  531. strlcpy(pHeaderDescriptor->hdr[1].name, "IEEE_802_3", sizeof(pHeaderDescriptor->hdr[1].name)); // Header's Name
  532. memcpy(pHeaderDescriptor->hdr[1].hdr, m_aHeadertoAdd2,
  533. m_nHeadertoAddSize2); //Header's Data
  534. pHeaderDescriptor->hdr[1].hdr_len = m_nHeadertoAddSize2;
  535. pHeaderDescriptor->hdr[1].hdr_hdl = -1; //Return Value
  536. pHeaderDescriptor->hdr[1].is_partial = false;
  537. pHeaderDescriptor->hdr[1].status = -1; // Return Parameter
  538. strlcpy(sGetHeader1.name, pHeaderDescriptor->hdr[0].name, sizeof(sGetHeader1.name));
  539. strlcpy(sGetHeader2.name, pHeaderDescriptor->hdr[1].name, sizeof(sGetHeader2.name));
  540. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  541. {
  542. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
  543. bRetVal = false;
  544. goto bail;
  545. }
  546. if (!m_HeaderInsertion.GetHeaderHandle(&sGetHeader1))
  547. {
  548. LOG_MSG_ERROR(" Failed");
  549. bRetVal = false;
  550. goto bail;
  551. }
  552. LOG_MSG_DEBUG("Received Header1 Handle = 0x%x",sGetHeader1.hdl);
  553. if (!m_HeaderInsertion.GetHeaderHandle(&sGetHeader2))
  554. {
  555. LOG_MSG_ERROR(" Failed");
  556. bRetVal = false;
  557. goto bail;
  558. }
  559. LOG_MSG_DEBUG("Received Header2 Handle = 0x%x",sGetHeader2.hdl);
  560. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass1, IPA_CLIENT_TEST2_CONS,
  561. sGetHeader1.hdl,&nTableHdl01)) {
  562. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  563. bRetVal = false;
  564. goto bail;
  565. }
  566. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass2, IPA_CLIENT_TEST3_CONS,
  567. sGetHeader2.hdl,&nTableHdl02)) {
  568. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  569. bRetVal = false;
  570. goto bail;
  571. }
  572. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass3, IPA_CLIENT_TEST4_CONS,
  573. sGetHeader2.hdl,&nTableHdl03)) {
  574. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  575. bRetVal = false;
  576. goto bail;
  577. }
  578. LOG_MSG_INFO("Creation of three bypass routing tables completed successfully TblHdl1=0x%x, TblHdl2=0x%x, TblHdl3=0x%x",
  579. nTableHdl01,nTableHdl02,nTableHdl03);
  580. // Creating Filtering Rules
  581. cFilterTable0.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,3);
  582. LOG_MSG_INFO("Creation of filtering table completed successfully");
  583. // Configuring Filtering Rule No.1
  584. cFilterTable0.GeneratePresetRule(1,sFilterRuleEntry);
  585. sFilterRuleEntry.at_rear = true;
  586. sFilterRuleEntry.flt_rule_hdl=-1; // return Value
  587. sFilterRuleEntry.status = -1; // return value
  588. sFilterRuleEntry.rule.action=IPA_PASS_TO_ROUTING;
  589. sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl01; //put here the handle corresponding to Routing Rule 1
  590. sFilterRuleEntry.rule.attrib.attrib_mask = IPA_FLT_DST_ADDR; // Destination IP Based Filtering
  591. sFilterRuleEntry.rule.attrib.u.v4.dst_addr_mask = 0xFF0000FF; // Mask
  592. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0x7F000001; // Filter DST_IP == 127.0.0.1.
  593. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  594. {
  595. LOG_MSG_ERROR ("Adding Rule (0) to Filtering table Failed.");
  596. bRetVal = false;
  597. goto bail;
  598. }
  599. // Configuring Filtering Rule No.2
  600. sFilterRuleEntry.flt_rule_hdl=-1; // return Value
  601. sFilterRuleEntry.status = -1; // return Value
  602. sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl02; //put here the handle corresponding to Routing Rule 2
  603. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80101; // Filter DST_IP == 192.168.1.1.
  604. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  605. {
  606. LOG_MSG_ERROR ("Adding Rule(1) to Filtering table Failed.");
  607. bRetVal = false;
  608. goto bail;
  609. }
  610. // Configuring Filtering Rule No.3
  611. sFilterRuleEntry.flt_rule_hdl=-1; // return Value
  612. sFilterRuleEntry.status = -1; // return value
  613. sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl03; //put here the handle corresponding to Routing Rule 2
  614. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80102; // Filter DST_IP == 192.168.1.2.
  615. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  616. {
  617. LOG_MSG_ERROR ("Adding Rule(2) to Filtering table Failed.");
  618. bRetVal = false;
  619. goto bail;
  620. }
  621. if (!m_Filtering.AddFilteringRule(cFilterTable0.GetFilteringTable())) {
  622. LOG_MSG_ERROR ("Failed to commit Filtering rules");
  623. bRetVal = false;
  624. goto bail;
  625. }
  626. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(0)->status);
  627. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(1)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(1)->status);
  628. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(2)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(2)->status);
  629. bail:
  630. Free(pHeaderDescriptor);
  631. LOG_MSG_STACK(
  632. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  633. return bRetVal;
  634. } // AddRules()
  635. virtual bool ModifyPackets() {
  636. // This test doesn't modify the original IP Packet.
  637. return true;
  638. } // ModifyPacktes ()
  639. virtual bool TestLogic() {
  640. bool bRetVal = true;
  641. m_aExpectedBufSize = 0;
  642. uint32_t nIPv4DSTAddr;
  643. LOG_MSG_STACK("Entering Function");
  644. //Packet No. 1
  645. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  646. nIPv4DSTAddr = ntohl(0x7F000001);
  647. memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
  648. memcpy(m_aExpectedBuffer, m_aHeadertoAdd1, m_nHeadertoAddSize1);
  649. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize1,m_aBuffer,m_uBufferSize);
  650. m_aExpectedBufSize = m_nHeadertoAddSize1 + m_uBufferSize;
  651. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  652. &m_Consumer1, m_aExpectedBuffer, m_aExpectedBufSize))
  653. {
  654. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  655. bRetVal=false;
  656. }
  657. //Packet No. 2
  658. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  659. nIPv4DSTAddr = ntohl(0xC0A80101);//192.168.1.1
  660. memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
  661. memcpy(m_aExpectedBuffer, m_aHeadertoAdd2, m_nHeadertoAddSize2);
  662. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize2,m_aBuffer,m_uBufferSize);
  663. m_aExpectedBufSize = m_nHeadertoAddSize2 + m_uBufferSize;
  664. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  665. &m_Consumer2, m_aExpectedBuffer, m_aExpectedBufSize))
  666. {
  667. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  668. bRetVal=false;
  669. }
  670. //Packet No. 3
  671. nIPv4DSTAddr = ntohl(0xC0A80102);//192.168.1.2
  672. memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
  673. memcpy(m_aExpectedBuffer, m_aHeadertoAdd3, m_nHeadertoAddSize3);
  674. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize3,m_aBuffer,m_uBufferSize);
  675. m_aExpectedBufSize = m_nHeadertoAddSize3 + m_uBufferSize;
  676. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  677. &m_Consumer3, m_aExpectedBuffer, m_aExpectedBufSize))
  678. {
  679. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  680. bRetVal=false;
  681. }
  682. LOG_MSG_STACK("Leaving Function (Returning %s)",bRetVal?"True":"False");
  683. return bRetVal;
  684. }
  685. private:
  686. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  687. size_t m_aExpectedBufSize;
  688. uint8_t m_aHeadertoAdd1[MAX_HEADER_SIZE],m_aHeadertoAdd2[MAX_HEADER_SIZE],m_aHeadertoAdd3[MAX_HEADER_SIZE];
  689. size_t m_nHeadertoAddSize1,m_nHeadertoAddSize2,m_nHeadertoAddSize3;
  690. };
  691. class IPAHeaderInsertionTest004: public IPAHeaderInsertionTestFixture {
  692. public:
  693. IPAHeaderInsertionTest004() {
  694. m_name = "IPAHeaderInsertionTest004";
  695. m_description =
  696. "Header Insertion Test 004 - Test header insertion with bad len values.";
  697. Register(*this);
  698. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  699. m_nHeadertoAddSize = sizeof(aRMNetHeader);
  700. memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
  701. }
  702. virtual bool AddRules() {
  703. // Not adding any rules here.
  704. return true;
  705. } // AddRules()
  706. virtual bool ModifyPackets() {
  707. // This test doesn't modify the original IP Packet.
  708. return true;
  709. } // ModifyPacktes ()
  710. bool AddSingleHeaderAndCheck(uint8_t len) {
  711. m_eIP = IPA_IP_v4;
  712. bool bRetVal = true;
  713. struct ipa_ioc_get_hdr sRetHeader;
  714. memset(&sRetHeader, 0, sizeof(sRetHeader));
  715. strlcpy(sRetHeader.name, "Generic", sizeof(sRetHeader.name));
  716. LOG_MSG_STACK("Entering Function");
  717. // Create Header:
  718. // Allocate Memory, populate it, and add in to the Header Insertion.
  719. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  720. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  721. sizeof(struct ipa_ioc_add_hdr)
  722. + 1 * sizeof(struct ipa_hdr_add));
  723. if (!pHeaderDescriptor) {
  724. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  725. bRetVal = false;
  726. goto bail;
  727. }
  728. pHeaderDescriptor->commit = true;
  729. pHeaderDescriptor->num_hdrs = 1;
  730. strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name));
  731. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
  732. m_nHeadertoAddSize); //Header's Data
  733. pHeaderDescriptor->hdr[0].hdr_len = len;
  734. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  735. pHeaderDescriptor->hdr[0].is_partial = false;
  736. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  737. strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
  738. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  739. {
  740. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
  741. bRetVal = false;
  742. goto bail;
  743. }
  744. if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
  745. {
  746. LOG_MSG_ERROR(" Failed");
  747. bRetVal = false;
  748. goto bail;
  749. }
  750. bail:
  751. Free(pHeaderDescriptor);
  752. LOG_MSG_STACK(
  753. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  754. return bRetVal;
  755. } // AddSingleHeaderAndCheck()
  756. virtual bool TestLogic() {
  757. // Try to add headers with invalid values.
  758. // Valid values are between 1 to IPA_HDR_MAX_SIZE (64).
  759. // We expect the below functions to fail.
  760. if (AddSingleHeaderAndCheck(0)) {
  761. LOG_MSG_ERROR("This is unexpected, this can't succeed");
  762. return false;
  763. }
  764. if (AddSingleHeaderAndCheck(MAX_HEADER_SIZE + 1)) {
  765. LOG_MSG_ERROR("This is unexpected, this can't succeed");
  766. return false;
  767. }
  768. // Add one header which is OK
  769. if (!AddSingleHeaderAndCheck(m_nHeadertoAddSize)) {
  770. LOG_MSG_ERROR("This is unexpected, this can't succeed");
  771. return false;
  772. }
  773. return true;
  774. }
  775. private:
  776. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  777. size_t m_nHeadertoAddSize;
  778. };
  779. class IPAHeaderInsertionTest005: public IPAHeaderInsertionTestFixture {
  780. public:
  781. IPAHeaderInsertionTest005() {
  782. m_name = "IPAHeaderInsertionTest005";
  783. m_description =
  784. "Header Insertion Test 005 - Test Multiple RMNet Header Insertion\
  785. - Stress test - Generate and commit multiple header Insertion";
  786. this->m_runInRegression = false;
  787. Register(*this);
  788. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  789. m_nHeadertoAddSize = sizeof(aRMNetHeader);
  790. memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
  791. }
  792. // Test Description:
  793. // 1. Generate and commit single bypass routing table.
  794. virtual bool AddRules() {
  795. m_eIP = IPA_IP_v4;
  796. bool bRetVal = true;
  797. struct ipa_ioc_get_hdr sRetHeader;
  798. char Name[] = "IEEE802_3\0";
  799. memset(&sRetHeader, 0, sizeof(sRetHeader));
  800. strlcpy (sRetHeader.name, Name, sizeof(sRetHeader.name));
  801. LOG_MSG_STACK("Entering Function");
  802. // Create Header:
  803. // Allocate Memory, populate it, and add in to the Header Insertion.
  804. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  805. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  806. sizeof(struct ipa_ioc_add_hdr)
  807. + 1 * sizeof(struct ipa_hdr_add));
  808. if (!pHeaderDescriptor) {
  809. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  810. bRetVal = false;
  811. goto bail;
  812. }
  813. pHeaderDescriptor->commit = true;
  814. pHeaderDescriptor->num_hdrs = 1;
  815. strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name));
  816. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
  817. m_nHeadertoAddSize); //Header's Data
  818. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  819. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  820. pHeaderDescriptor->hdr[0].is_partial = false;
  821. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  822. strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
  823. // stress test to check if the target crashes, failure is expected before reaching 500
  824. for (int i = 0; i < 500; i++) {
  825. LOG_MSG_DEBUG("IPAHeaderInsertionTest005::AddRules iter=%d\n",i);
  826. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  827. {
  828. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed on %d iteration.\n",i);
  829. goto bail;
  830. }
  831. }
  832. bail:
  833. Free(pHeaderDescriptor);
  834. LOG_MSG_STACK(
  835. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  836. return bRetVal;
  837. } // AddRules()
  838. virtual bool ModifyPackets() {
  839. // This test doesn't modify the original IP Packet.
  840. return true;
  841. } // ModifyPacktes ()
  842. virtual bool TestLogic() {
  843. return true;
  844. }
  845. private:
  846. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  847. size_t m_nHeadertoAddSize;
  848. };
  849. class IPAHeaderInsertionTest006: public IPAHeaderInsertionTestFixture {
  850. public:
  851. IPAHeaderInsertionTest006() {
  852. m_name = "IPAHeaderInsertionTest006";
  853. m_description =
  854. "Header Insertion Test 006 - Test header distriburion between SRAM and DDR\
  855. - fill SRAM and some DDR, use DDR header";
  856. this->m_runInRegression = true;
  857. Register(*this);
  858. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  859. m_nHeadertoAddSize = sizeof(aRMNetHeader);
  860. memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
  861. m_minIPAHwType = IPA_HW_v5_0;
  862. // The bin size is 8
  863. // We are going to add number of headers to occupy twice the size of the SRAM buffer
  864. m_InitialHeadersNum = GetHdrSramSize() / 8 * 2;
  865. m_HeadersNumToDelete = 0;
  866. m_HeadersNumToAddAgain = 0;
  867. }
  868. virtual bool AddRules() {
  869. bool bRetVal = true;
  870. m_eIP = IPA_IP_v4;
  871. struct ipa_ioc_add_hdr *pHeaderDescriptor = NULL;
  872. struct ipa_ioc_del_hdr *pDelHeaderDescriptor = NULL;
  873. memset(&m_RetHeader, 0, sizeof(m_RetHeader));
  874. LOG_MSG_STACK("Entering Function");
  875. if (m_InitialHeadersNum <= 0)
  876. {
  877. LOG_MSG_ERROR("Initial headers number is set to 0!\n");
  878. bRetVal = false;
  879. goto bail;
  880. }
  881. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  882. sizeof(struct ipa_ioc_add_hdr) + 1 * sizeof(struct ipa_hdr_add));
  883. if (m_HeadersNumToDelete > 0)
  884. pDelHeaderDescriptor = (struct ipa_ioc_del_hdr *)calloc(1,
  885. sizeof(struct ipa_ioc_del_hdr) + m_HeadersNumToDelete * sizeof(struct ipa_hdr_del));
  886. if (!pHeaderDescriptor || (m_HeadersNumToDelete > 0 && !pDelHeaderDescriptor))
  887. {
  888. LOG_MSG_ERROR("calloc failed to allocate ipa_ioc_add_hdr or ipa_ioc_del_hdr");
  889. bRetVal = false;
  890. goto bail;
  891. }
  892. // Add bunch of headers to SRAM and DDR
  893. pHeaderDescriptor->commit = true;
  894. pHeaderDescriptor->num_hdrs = 1;
  895. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd, m_nHeadertoAddSize);
  896. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  897. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  898. pHeaderDescriptor->hdr[0].is_partial = false;
  899. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  900. fflush(stderr);
  901. fflush(stdout);
  902. ret = system("cat /sys/kernel/debug/ipa/hdr");
  903. for (int i = 0; i < m_InitialHeadersNum; i++)
  904. {
  905. LOG_MSG_DEBUG("%s::%s iter=%d\n", typeid(this).name(), __func__, i);
  906. snprintf(pHeaderDescriptor->hdr[0].name, sizeof(pHeaderDescriptor->hdr[0].name), "IEEE802_3_%03d", i);
  907. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  908. {
  909. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed on %d iteration.\n", i);
  910. bRetVal = false;
  911. goto bail;
  912. }
  913. // Store header descriptors to delete
  914. if (m_HeadersNumToDelete > 0 && i < m_HeadersNumToDelete) {
  915. pDelHeaderDescriptor->hdl[i].hdl = pHeaderDescriptor->hdr[0].hdr_hdl;
  916. }
  917. }
  918. strlcpy(m_RetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(m_RetHeader.name));
  919. fflush(stderr);
  920. fflush(stdout);
  921. ret = system("cat /sys/kernel/debug/ipa/hdr");
  922. if (m_HeadersNumToDelete > 0)
  923. {
  924. // Delete few headers from SRAM
  925. pDelHeaderDescriptor->commit = true;
  926. pDelHeaderDescriptor->num_hdls = m_HeadersNumToDelete;
  927. for (int i = 0; i < m_HeadersNumToDelete; i++)
  928. pDelHeaderDescriptor->hdl[i].status = -1; // Return Parameter
  929. if (!m_HeaderInsertion.DeleteHeader(pDelHeaderDescriptor))
  930. {
  931. LOG_MSG_ERROR("m_HeaderInsertion.DeleteHeader(pDelHeaderDescriptor) Failed");
  932. bRetVal = false;
  933. goto bail;
  934. }
  935. fflush(stderr);
  936. fflush(stdout);
  937. ret = system("cat /sys/kernel/debug/ipa/hdr");
  938. }
  939. if (m_HeadersNumToAddAgain > 0)
  940. {
  941. // Add few new headers to SRAM
  942. pHeaderDescriptor->commit = true;
  943. pHeaderDescriptor->num_hdrs = 1;
  944. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd, m_nHeadertoAddSize);
  945. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  946. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  947. pHeaderDescriptor->hdr[0].is_partial = false;
  948. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  949. for (int i = 0; i < m_HeadersNumToAddAgain; i++) {
  950. LOG_MSG_DEBUG("%s::%s iter=%d\n", typeid(this).name(), __func__, i);
  951. snprintf(pHeaderDescriptor->hdr[0].name, sizeof(pHeaderDescriptor->hdr[0].name), "IEEE802_3_%03d_2", i);
  952. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  953. {
  954. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed on %d iteration.\n", i);
  955. bRetVal = false;
  956. goto bail;
  957. }
  958. }
  959. strlcpy(m_RetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(m_RetHeader.name));
  960. fflush(stderr);
  961. fflush(stdout);
  962. ret = system("cat /sys/kernel/debug/ipa/hdr");
  963. }
  964. // Use last added header for traffic
  965. if (!m_HeaderInsertion.GetHeaderHandle(&m_RetHeader))
  966. {
  967. LOG_MSG_ERROR(" Failed");
  968. bRetVal = false;
  969. goto bail;
  970. }
  971. bRetVal = CreateFilteringAndRouting();
  972. bail:
  973. Free(pHeaderDescriptor);
  974. if (pDelHeaderDescriptor)
  975. Free(pDelHeaderDescriptor);
  976. LOG_MSG_STACK("Leaving %s (Returning %s)", __func__, bRetVal ? "True" : "False");
  977. return bRetVal;
  978. } // AddRules()
  979. virtual bool CreateFilteringAndRouting() {
  980. uint32_t nRTTableHdl=0;
  981. const char bypass0[20] = "Bypass0";
  982. struct ipa_ioc_get_rt_tbl sRoutingTable;
  983. struct ipa_flt_rule_add sFilterRuleEntry;
  984. IPAFilteringTable cFilterTable;
  985. memset(&sRoutingTable, 0, sizeof(sRoutingTable));
  986. // Create RT table
  987. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST2_CONS,
  988. m_RetHeader.hdl,&nRTTableHdl)) {
  989. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  990. return false;
  991. }
  992. LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
  993. sRoutingTable.ip = m_eIP;
  994. strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
  995. if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
  996. LOG_MSG_ERROR("m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.",
  997. &sRoutingTable);
  998. return false;
  999. }
  1000. // Creating Filtering Rules
  1001. cFilterTable.Init(m_eIP, IPA_CLIENT_TEST_PROD, false, 1);
  1002. LOG_MSG_INFO("Creation of filtering table completed successfully");
  1003. // Configuring Filtering Rule No.1
  1004. cFilterTable.GeneratePresetRule(0, sFilterRuleEntry);
  1005. sFilterRuleEntry.at_rear = true;
  1006. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  1007. sFilterRuleEntry.status = -1; // return value
  1008. sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
  1009. sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl; //put here the handle corresponding to Routing Rule 1
  1010. if (((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
  1011. !m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable()))
  1012. {
  1013. LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
  1014. return false;
  1015. }
  1016. else
  1017. {
  1018. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n",
  1019. cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,
  1020. cFilterTable.ReadRuleFromTable(0)->status);
  1021. }
  1022. return true;
  1023. }
  1024. virtual bool ModifyPackets() {
  1025. return true;
  1026. }
  1027. virtual bool TestLogic() {
  1028. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  1029. m_aExpectedBufSize = 0;
  1030. memcpy(m_aExpectedBuffer, m_aHeadertoAdd, m_nHeadertoAddSize);
  1031. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize,m_aBuffer,m_uBufferSize);
  1032. m_aExpectedBufSize = m_nHeadertoAddSize + m_uBufferSize;
  1033. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  1034. &m_Consumer1, m_aExpectedBuffer, m_aExpectedBufSize)) {
  1035. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  1036. return false;
  1037. }
  1038. return true;
  1039. }
  1040. protected:
  1041. struct ipa_ioc_get_hdr m_RetHeader;
  1042. int m_InitialHeadersNum;
  1043. int m_HeadersNumToDelete;
  1044. int m_HeadersNumToAddAgain;
  1045. private:
  1046. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  1047. size_t m_aExpectedBufSize;
  1048. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  1049. size_t m_nHeadertoAddSize;
  1050. int ret;
  1051. };
  1052. class IPAHeaderInsertionTest007: public IPAHeaderInsertionTest006 {
  1053. public:
  1054. IPAHeaderInsertionTest007() {
  1055. m_name = "IPAHeaderInsertionTest007";
  1056. m_description =
  1057. "Header Insertion Test 007 - Test header distriburion between SRAM and DDR\
  1058. - fill SRAM and some DDR, free some SRAM, use DDR header";
  1059. // We will delete half of the headers in the SRAM,
  1060. // which is quarter of the total initial headers number
  1061. m_HeadersNumToDelete = m_InitialHeadersNum / 4;
  1062. m_HeadersNumToAddAgain = 0;
  1063. }
  1064. };
  1065. class IPAHeaderInsertionTest008: public IPAHeaderInsertionTest006 {
  1066. public:
  1067. IPAHeaderInsertionTest008() {
  1068. m_name = "IPAHeaderInsertionTest008";
  1069. m_description =
  1070. "Header Insertion Test 008 - Test header distriburion between SRAM and DDR\
  1071. - fill SRAM and some DDR, free some SRAM, add few new SRAM headers, \
  1072. use last SRAM header";
  1073. // We will delete half of the headers in the SRAM,
  1074. // which is quarter of the total initial headers number
  1075. m_HeadersNumToDelete = m_InitialHeadersNum / 4;
  1076. // We will add again half of the number of headers we deleted
  1077. m_HeadersNumToAddAgain = m_HeadersNumToDelete / 2;
  1078. }
  1079. };
  1080. class IPAHeaderInsertionTest009: public IPAHeaderInsertionTest006 {
  1081. public:
  1082. IPAHeaderInsertionTest009() {
  1083. m_name = "IPAHeaderInsertionTest009";
  1084. m_description =
  1085. "Header Insertion Test 009 - Test header distriburion between SRAM and DDR \
  1086. - fill SRAM and some DDR, free some SRAM and DDR, \
  1087. add new SRAM and DDR headers, \
  1088. use last added DDR header";
  1089. // We will delete all the headers in SRAM and half of the headers in the DDR,
  1090. // which is 3/4 of the total initial headers number
  1091. m_HeadersNumToDelete = m_InitialHeadersNum - (m_InitialHeadersNum / 4);
  1092. // We will add again one less header than deleted
  1093. m_HeadersNumToAddAgain = m_InitialHeadersNum - m_HeadersNumToDelete - 1;
  1094. }
  1095. };
  1096. class IPAHeaderInsertionTest010: public IPAHeaderInsertionTestFixture {
  1097. public:
  1098. IPAHeaderInsertionTest010() :
  1099. m_aExpectedBufSize(BUFF_MAX_SIZE),
  1100. m_nHeadertoAddSize1(0),
  1101. m_nHeadertoAddSize2(0)
  1102. {
  1103. m_name = "IPAHeaderInsertionTest010";
  1104. m_description =
  1105. "Header Insertion Test 010 - Test header distriburion between SRAM and DDR\
  1106. - fill SRAM and some DDR, use one SRAM and one DDR header";
  1107. m_minIPAHwType = IPA_HW_v5_0;
  1108. Register(*this);
  1109. uint8_t aIEEE802_3Header1[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  1110. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x46, 0xAE, 0xAF, 0xB0,
  1111. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  1112. uint8_t aIEEE802_3Header2[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  1113. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x47, 0xAE, 0xAF, 0xB0,
  1114. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  1115. m_nHeadertoAddSize1 = sizeof(aIEEE802_3Header1);
  1116. memcpy(m_aHeadertoAdd1, aIEEE802_3Header1, m_nHeadertoAddSize1);
  1117. m_nHeadertoAddSize2 = sizeof(aIEEE802_3Header2);
  1118. memcpy(m_aHeadertoAdd2, aIEEE802_3Header2, m_nHeadertoAddSize2);
  1119. // The packet size is 22, therefore the bin size is 24
  1120. // We are going to add number of headers to occupy twice the size of the SRAM buffer
  1121. m_InitialHeadersNum = GetHdrSramSize() / 24 * 2;
  1122. }
  1123. virtual bool AddRules() {
  1124. m_eIP = IPA_IP_v4;
  1125. const char aBypass1[20] = "Bypass1";
  1126. const char aBypass2[20] = "Bypass2";
  1127. uint32_t nTableHdl01, nTableHdl02;
  1128. bool bRetVal = true;
  1129. IPAFilteringTable cFilterTable0;
  1130. struct ipa_flt_rule_add sFilterRuleEntry;
  1131. struct ipa_ioc_add_hdr *pHeaderDescriptor = NULL;
  1132. LOG_MSG_STACK("Entering Function");
  1133. if (m_InitialHeadersNum <= 0)
  1134. {
  1135. LOG_MSG_ERROR("Initial headers number is set to 0!\n");
  1136. bRetVal = false;
  1137. goto bail;
  1138. }
  1139. memset(&sFilterRuleEntry, 0, sizeof(sFilterRuleEntry));
  1140. memset(&m_RetHeader1, 0, sizeof(m_RetHeader1));
  1141. memset(&m_RetHeader2, 0, sizeof(m_RetHeader2));
  1142. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  1143. sizeof(struct ipa_ioc_add_hdr) + 1 * sizeof(struct ipa_hdr_add));
  1144. if (!pHeaderDescriptor)
  1145. {
  1146. LOG_MSG_ERROR("calloc failed to allocate ipa_ioc_add_hdr");
  1147. bRetVal = false;
  1148. goto bail;
  1149. }
  1150. fflush(stderr);
  1151. fflush(stdout);
  1152. ret = system("cat /sys/kernel/debug/ipa/hdr");
  1153. // Add one header to SRAM
  1154. pHeaderDescriptor->commit = true;
  1155. pHeaderDescriptor->num_hdrs = 1;
  1156. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  1157. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  1158. pHeaderDescriptor->hdr[0].is_partial = false;
  1159. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd1, m_nHeadertoAddSize1);
  1160. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize1;
  1161. strlcpy(pHeaderDescriptor->hdr[0].name, "IEEE802_3_SRAM", sizeof(pHeaderDescriptor->hdr[0].name));
  1162. strlcpy(m_RetHeader1.name, pHeaderDescriptor->hdr[0].name, sizeof(m_RetHeader1.name));
  1163. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  1164. {
  1165. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed\n");
  1166. bRetVal = false;
  1167. goto bail;
  1168. }
  1169. // Add bunch of headers to SRAM and DDR
  1170. for (int i = 1; i < m_InitialHeadersNum; i++)
  1171. {
  1172. LOG_MSG_DEBUG("%s::%s iter=%d\n", typeid(this).name(), __func__, i);
  1173. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd2, m_nHeadertoAddSize2);
  1174. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize2;
  1175. snprintf(pHeaderDescriptor->hdr[0].name, sizeof(pHeaderDescriptor->hdr[0].name),
  1176. "IEEE802_3_%03d", i);
  1177. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  1178. {
  1179. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed on %d iteration.\n", i);
  1180. bRetVal = false;
  1181. goto bail;
  1182. }
  1183. }
  1184. strlcpy(m_RetHeader2.name, pHeaderDescriptor->hdr[0].name, sizeof(m_RetHeader2.name));
  1185. fflush(stderr);
  1186. fflush(stdout);
  1187. ret = system("cat /sys/kernel/debug/ipa/hdr");
  1188. if (!m_HeaderInsertion.GetHeaderHandle(&m_RetHeader1))
  1189. {
  1190. LOG_MSG_ERROR(" Failed");
  1191. bRetVal = false;
  1192. goto bail;
  1193. }
  1194. LOG_MSG_DEBUG("Received Header1 Handle = 0x%x", m_RetHeader1.hdl);
  1195. if (!m_HeaderInsertion.GetHeaderHandle(&m_RetHeader2))
  1196. {
  1197. LOG_MSG_ERROR(" Failed");
  1198. bRetVal = false;
  1199. goto bail;
  1200. }
  1201. LOG_MSG_DEBUG("Received Header2 Handle = 0x%x", m_RetHeader2.hdl);
  1202. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass1, IPA_CLIENT_TEST3_CONS,
  1203. m_RetHeader1.hdl, &nTableHdl01)) {
  1204. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  1205. bRetVal = false;
  1206. goto bail;
  1207. }
  1208. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass2, IPA_CLIENT_TEST4_CONS,
  1209. m_RetHeader2.hdl, &nTableHdl02)) {
  1210. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  1211. bRetVal = false;
  1212. goto bail;
  1213. }
  1214. LOG_MSG_INFO("Creation of two bypass routing tables completed successfully TblHdl1=0x%x, TblHdl2=0x%x",
  1215. nTableHdl01, nTableHdl02);
  1216. // Creating Filtering Rules
  1217. cFilterTable0.Init(m_eIP, IPA_CLIENT_TEST_PROD, false, 2);
  1218. LOG_MSG_INFO("Creation of filtering table completed successfully");
  1219. // Configuring common Filtering fields
  1220. cFilterTable0.GeneratePresetRule(1, sFilterRuleEntry);
  1221. sFilterRuleEntry.at_rear = true;
  1222. sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
  1223. sFilterRuleEntry.rule.attrib.attrib_mask = IPA_FLT_DST_ADDR; // Destination IP Based Filtering
  1224. sFilterRuleEntry.rule.attrib.u.v4.dst_addr_mask = 0xFF0000FF; // Mask
  1225. // Configuring Filtering Rule No.1
  1226. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  1227. sFilterRuleEntry.status = -1; // return Value
  1228. sFilterRuleEntry.rule.rt_tbl_hdl = nTableHdl01; //put here the handle corresponding to Routing Rule 1
  1229. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80101; // Filter DST_IP == 192.168.1.1.
  1230. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  1231. {
  1232. LOG_MSG_ERROR ("Adding Rule(1) to Filtering table Failed.");
  1233. bRetVal = false;
  1234. goto bail;
  1235. }
  1236. // Configuring Filtering Rule No.2
  1237. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  1238. sFilterRuleEntry.status = -1; // return value
  1239. sFilterRuleEntry.rule.rt_tbl_hdl = nTableHdl02; //put here the handle corresponding to Routing Rule 2
  1240. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80102; // Filter DST_IP == 192.168.1.2.
  1241. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  1242. {
  1243. LOG_MSG_ERROR ("Adding Rule(2) to Filtering table Failed.");
  1244. bRetVal = false;
  1245. goto bail;
  1246. }
  1247. if (!m_Filtering.AddFilteringRule(cFilterTable0.GetFilteringTable())) {
  1248. LOG_MSG_ERROR ("Failed to commit Filtering rules");
  1249. bRetVal = false;
  1250. goto bail;
  1251. }
  1252. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n",
  1253. cFilterTable0.ReadRuleFromTable(0)->flt_rule_hdl,
  1254. cFilterTable0.ReadRuleFromTable(0)->status);
  1255. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n",
  1256. cFilterTable0.ReadRuleFromTable(1)->flt_rule_hdl,
  1257. cFilterTable0.ReadRuleFromTable(1)->status);
  1258. bail:
  1259. Free(pHeaderDescriptor);
  1260. LOG_MSG_STACK("Leaving Function (Returning %s)", bRetVal ? "True" : "False");
  1261. return bRetVal;
  1262. } // AddRules()
  1263. virtual bool ModifyPackets() {
  1264. // This test doesn't modify the original IP Packet.
  1265. return true;
  1266. } // ModifyPacktes ()
  1267. virtual bool TestLogic() {
  1268. bool bRetVal = true;
  1269. m_aExpectedBufSize = 0;
  1270. uint32_t nIPv4DSTAddr;
  1271. LOG_MSG_STACK("Entering Function");
  1272. //Packet No. 1
  1273. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  1274. nIPv4DSTAddr = ntohl(0xC0A80101); //192.168.1.1
  1275. memcpy(&m_aBuffer[IPV4_DST_ADDR_OFFSET], &nIPv4DSTAddr, sizeof(nIPv4DSTAddr));
  1276. memcpy(m_aExpectedBuffer, m_aHeadertoAdd1, m_nHeadertoAddSize1);
  1277. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize1,m_aBuffer,m_uBufferSize);
  1278. m_aExpectedBufSize = m_nHeadertoAddSize1 + m_uBufferSize;
  1279. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  1280. &m_Consumer2, m_aExpectedBuffer, m_aExpectedBufSize))
  1281. {
  1282. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  1283. bRetVal=false;
  1284. }
  1285. //Packet No. 2
  1286. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  1287. nIPv4DSTAddr = ntohl(0xC0A80102); //192.168.1.2
  1288. memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET], &nIPv4DSTAddr, sizeof(nIPv4DSTAddr));
  1289. memcpy(m_aExpectedBuffer, m_aHeadertoAdd2, m_nHeadertoAddSize2);
  1290. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize2, m_aBuffer, m_uBufferSize);
  1291. m_aExpectedBufSize = m_nHeadertoAddSize2 + m_uBufferSize;
  1292. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  1293. &m_Consumer3, m_aExpectedBuffer, m_aExpectedBufSize))
  1294. {
  1295. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  1296. bRetVal=false;
  1297. }
  1298. LOG_MSG_STACK("Leaving Function (Returning %s)",bRetVal?"True":"False");
  1299. return bRetVal;
  1300. }
  1301. protected:
  1302. struct ipa_ioc_get_hdr m_RetHeader1, m_RetHeader2;
  1303. int m_InitialHeadersNum;
  1304. private:
  1305. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  1306. size_t m_aExpectedBufSize;
  1307. uint8_t m_aHeadertoAdd1[MAX_HEADER_SIZE], m_aHeadertoAdd2[MAX_HEADER_SIZE];
  1308. size_t m_nHeadertoAddSize1, m_nHeadertoAddSize2;
  1309. int ret;
  1310. };
  1311. static IPAHeaderInsertionTest001 ipaHeaderInsertionTest001;
  1312. static IPAHeaderInsertionTest002 ipaHeaderInsertionTest002;
  1313. static IPAHeaderInsertionTest003 ipaHeaderInsertionTest003;
  1314. static IPAHeaderInsertionTest004 ipaHeaderInsertionTest004;
  1315. static IPAHeaderInsertionTest005 ipaHeaderInsertionTest005;
  1316. static IPAHeaderInsertionTest006 ipaHeaderInsertionTest006;
  1317. static IPAHeaderInsertionTest007 ipaHeaderInsertionTest007;
  1318. static IPAHeaderInsertionTest008 ipaHeaderInsertionTest008;
  1319. static IPAHeaderInsertionTest009 ipaHeaderInsertionTest009;
  1320. static IPAHeaderInsertionTest010 ipaHeaderInsertionTest010;