HeaderInsertionTests.cpp 52 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463
  1. /*
  2. * Copyright (c) 2017-2018,2021 The Linux Foundation. All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions are
  6. * met:
  7. * * Redistributions of source code must retain the above copyright
  8. * notice, this list of conditions and the following disclaimer.
  9. * * Redistributions in binary form must reproduce the above
  10. * copyright notice, this list of conditions and the following
  11. * disclaimer in the documentation and/or other materials provided
  12. * with the distribution.
  13. * * Neither the name of The Linux Foundation nor the names of its
  14. * contributors may be used to endorse or promote products derived
  15. * from this software without specific prior written permission.
  16. *
  17. * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
  18. * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  19. * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
  20. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
  21. * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  22. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  23. * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
  24. * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  25. * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  26. * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
  27. * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  28. *
  29. * Changes from Qualcomm Innovation Center are provided under the following license:
  30. *
  31. * Copyright (c) 2022 Qualcomm Innovation Center, Inc. All rights reserved.
  32. *
  33. * Redistribution and use in source and binary forms, with or without
  34. * modification, are permitted (subject to the limitations in the
  35. * disclaimer below) provided that the following conditions are met:
  36. *
  37. * * Redistributions of source code must retain the above copyright
  38. * notice, this list of conditions and the following disclaimer.
  39. *
  40. * * Redistributions in binary form must reproduce the above
  41. * copyright notice, this list of conditions and the following
  42. * disclaimer in the documentation and/or other materials provided
  43. * with the distribution.
  44. *
  45. * * Neither the name of Qualcomm Innovation Center, Inc. nor the names of its
  46. * contributors may be used to endorse or promote products derived
  47. * from this software without specific prior written permission.
  48. *
  49. * NO EXPRESS OR IMPLIED LICENSES TO ANY PARTY'S PATENT RIGHTS ARE
  50. * GRANTED BY THIS LICENSE. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT
  51. * HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
  52. * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  53. * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  54. * IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
  55. * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  56. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
  57. * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  58. * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
  59. * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  60. * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
  61. * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE
  62. */
  63. #include "RoutingDriverWrapper.h"
  64. #include "HeaderInsertion.h"
  65. #include "Filtering.h"
  66. #include "IPAFilteringTable.h"
  67. #include "hton.h" // for htonl
  68. #include "TestsUtils.h"
  69. #include <string.h>
  70. #include <unistd.h>
  71. #include <errno.h>
  72. #include <fcntl.h>
  73. #include <sys/ioctl.h>
  74. #include <typeinfo>
  75. #define IPV4_DST_ADDR_OFFSET (16)
  76. class IPAHeaderInsertionTestFixture: public TestBase {
  77. public:
  78. IPAHeaderInsertionTestFixture() : m_uBufferSize(0)
  79. {
  80. memset(m_aBuffer, 0, sizeof(m_aBuffer));
  81. m_testSuiteName.push_back("Insertion");
  82. }
  83. virtual bool AddRules() = 0;
  84. virtual bool ModifyPackets() = 0;
  85. virtual bool TestLogic() = 0;
  86. bool Setup()
  87. {
  88. ConfigureScenario(PHASE_FIVE_TEST_CONFIGURATION);
  89. m_producer.Open(INTERFACE0_TO_IPA_DATA_PATH,
  90. INTERFACE0_FROM_IPA_DATA_PATH);
  91. m_Consumer1.Open(INTERFACE1_TO_IPA_DATA_PATH,
  92. INTERFACE1_FROM_IPA_DATA_PATH);
  93. m_Consumer2.Open(INTERFACE2_TO_IPA_DATA_PATH,
  94. INTERFACE2_FROM_IPA_DATA_PATH);
  95. m_Consumer3.Open(INTERFACE3_TO_IPA_DATA_PATH,
  96. INTERFACE3_FROM_IPA_DATA_PATH);
  97. if (!m_Routing.DeviceNodeIsOpened()) {
  98. LOG_MSG_ERROR(
  99. "Routing block is not ready for immediate commands!\n");
  100. return false;
  101. }
  102. if (!m_Filtering.DeviceNodeIsOpened()) {
  103. LOG_MSG_ERROR(
  104. "Filtering block is not ready for immediate commands!\n");
  105. return false;
  106. }
  107. if (!m_HeaderInsertion.DeviceNodeIsOpened())
  108. {
  109. LOG_MSG_ERROR("Header Insertion block is not ready for immediate commands!\n");
  110. return false;
  111. }
  112. m_HeaderInsertion.Reset();// resetting this component will reset both Routing and Filtering tables.
  113. return true;
  114. } // Setup()
  115. bool Run()
  116. {
  117. m_uBufferSize = BUFF_MAX_SIZE;
  118. LOG_MSG_STACK("Entering Function");
  119. // Add the relevant filtering rules
  120. if (!AddRules()) {
  121. LOG_MSG_ERROR("Failed adding filtering rules.");
  122. return false;
  123. }
  124. // Load input data (IP packet) from file
  125. if (!LoadDefaultPacket(m_eIP, m_aBuffer, m_uBufferSize)) {
  126. LOG_MSG_ERROR("Failed default Packet");
  127. return false;
  128. }
  129. if (!ModifyPackets()) {
  130. LOG_MSG_ERROR("Failed to modify packets.");
  131. return false;
  132. }
  133. if (!TestLogic()) {
  134. LOG_MSG_ERROR("Test failed, Input and expected output mismatch.");
  135. return false;
  136. }
  137. LOG_MSG_STACK("Leaving Function (Returning True)");
  138. return true;
  139. } // Run()
  140. bool Teardown()
  141. {
  142. m_HeaderInsertion.Reset();// resetting this component will reset both Routing and Filtering tables.
  143. m_producer.Close();
  144. m_Consumer1.Close();
  145. m_Consumer2.Close();
  146. m_Consumer3.Close();
  147. return true;
  148. } // Teardown()
  149. unsigned GetHdrSramSize()
  150. {
  151. int fd;
  152. struct ipa_test_mem_partition mem_part;
  153. fd = open("/dev/ipa_test", O_RDONLY);
  154. if (fd < 0) {
  155. printf("Failed opening %s. errno %d: %s\n", "/dev/ipa_test",
  156. errno, strerror(errno));
  157. return 0;
  158. }
  159. if (ioctl(fd, IPA_TEST_IOC_GET_MEM_PART, &mem_part) < 0) {
  160. printf("Failed ioctl IPA_TEST_IOC_GET_MEM_PART. errno %d: %s\n",
  161. errno, strerror(errno));
  162. close(fd);
  163. return 0;
  164. }
  165. close(fd);
  166. return mem_part.apps_hdr_size;
  167. }
  168. ~IPAHeaderInsertionTestFixture() {}
  169. static RoutingDriverWrapper m_Routing;
  170. static Filtering m_Filtering;
  171. static HeaderInsertion m_HeaderInsertion;
  172. InterfaceAbstraction m_producer;
  173. InterfaceAbstraction m_Consumer1;
  174. InterfaceAbstraction m_Consumer2;
  175. InterfaceAbstraction m_Consumer3;
  176. protected:
  177. static const size_t BUFF_MAX_SIZE = 1024;
  178. static const uint8_t MAX_HEADER_SIZE = 64; // 64Bytes - Max Header Length
  179. enum ipa_ip_type m_eIP;
  180. uint8_t m_aBuffer[BUFF_MAX_SIZE]; // Input file \ IP packet
  181. size_t m_uBufferSize;
  182. };
  183. RoutingDriverWrapper IPAHeaderInsertionTestFixture::m_Routing;
  184. Filtering IPAHeaderInsertionTestFixture::m_Filtering;
  185. HeaderInsertion IPAHeaderInsertionTestFixture::m_HeaderInsertion;
  186. //---------------------------------------------------------------------------/
  187. // Test002: Test that 802.3 header was inserted Correctly /
  188. //---------------------------------------------------------------------------/
  189. class IPAHeaderInsertionTest001: public IPAHeaderInsertionTestFixture {
  190. public:
  191. IPAHeaderInsertionTest001() {
  192. m_name = "IPAHeaderInsertionTest001";
  193. m_description =
  194. "Header Insertion Test 001 - Test RMNet Header Insertion\
  195. 1. Generate and commit RMNet.3 header Insertion \
  196. 2. Generate and commit routing table containing bypass rule. \
  197. 3. Generate and commit bypass filtering rule. \
  198. 4. Send a packet, and verify that the RMNet.3 Header was inserted correctly.";
  199. Register(*this);
  200. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  201. m_nHeadertoAddSize = sizeof(aRMNetHeader);
  202. memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
  203. }
  204. // Test Description:
  205. // 1. Generate and commit single bypass routing table.
  206. virtual bool AddRules() {
  207. m_eIP = IPA_IP_v4;
  208. const char bypass0[20] = "Bypass0";
  209. struct ipa_ioc_get_rt_tbl sRoutingTable;
  210. bool bRetVal = true;
  211. struct ipa_ioc_get_hdr sRetHeader;
  212. IPAFilteringTable cFilterTable;
  213. struct ipa_flt_rule_add sFilterRuleEntry;
  214. uint32_t nRTTableHdl=0;
  215. memset(&sRoutingTable, 0, sizeof(sRoutingTable));
  216. memset(&sRetHeader, 0, sizeof(sRetHeader));
  217. strlcpy(sRetHeader.name, "IEEE802_3", sizeof(sRetHeader.name));
  218. LOG_MSG_STACK("Entering Function");
  219. // Create Header:
  220. // Allocate Memory, populate it, and add in to the Header Insertion.
  221. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  222. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  223. sizeof(struct ipa_ioc_add_hdr)
  224. + 1 * sizeof(struct ipa_hdr_add));
  225. if (!pHeaderDescriptor) {
  226. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  227. bRetVal = false;
  228. goto bail;
  229. }
  230. pHeaderDescriptor->commit = true;
  231. pHeaderDescriptor->num_hdrs = 1;
  232. strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name));
  233. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
  234. m_nHeadertoAddSize); //Header's Data
  235. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  236. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  237. pHeaderDescriptor->hdr[0].is_partial = false;
  238. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  239. strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
  240. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  241. {
  242. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
  243. bRetVal = false;
  244. goto bail;
  245. }
  246. if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
  247. {
  248. LOG_MSG_ERROR(" Failed");
  249. bRetVal = false;
  250. goto bail;
  251. }
  252. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST2_CONS,
  253. sRetHeader.hdl,&nRTTableHdl)) {
  254. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  255. bRetVal = false;
  256. goto bail;
  257. }
  258. LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
  259. sRoutingTable.ip = m_eIP;
  260. strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
  261. if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
  262. LOG_MSG_ERROR(
  263. "m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
  264. bRetVal = false;
  265. goto bail;
  266. }
  267. // Creating Filtering Rules
  268. cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,1);
  269. LOG_MSG_INFO("Creation of filtering table completed successfully");
  270. // Configuring Filtering Rule No.1
  271. cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
  272. sFilterRuleEntry.at_rear = true;
  273. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  274. sFilterRuleEntry.status = -1; // return value
  275. sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
  276. sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl; //put here the handle corresponding to Routing Rule 1
  277. if (
  278. ((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
  279. !m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
  280. )
  281. {
  282. LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
  283. bRetVal = false;
  284. goto bail;
  285. } else
  286. {
  287. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
  288. }
  289. bail:
  290. Free(pHeaderDescriptor);
  291. LOG_MSG_STACK(
  292. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  293. return bRetVal;
  294. } // AddRules()
  295. virtual bool ModifyPackets() {
  296. // This test doesn't modify the original IP Packet.
  297. return true;
  298. } // ModifyPacktes ()
  299. virtual bool TestLogic() {
  300. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  301. m_aExpectedBufSize = 0;
  302. memcpy(m_aExpectedBuffer, m_aHeadertoAdd, m_nHeadertoAddSize);
  303. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize,m_aBuffer,m_uBufferSize);
  304. m_aExpectedBufSize = m_nHeadertoAddSize + m_uBufferSize;
  305. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  306. &m_Consumer1, m_aExpectedBuffer, m_aExpectedBufSize)) {
  307. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  308. return false;
  309. }
  310. return true;
  311. }
  312. private:
  313. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  314. size_t m_aExpectedBufSize;
  315. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  316. size_t m_nHeadertoAddSize;
  317. };
  318. //---------------------------------------------------------------------------/
  319. // Test002: Test that 802.3 header was inserted Correctly /
  320. //---------------------------------------------------------------------------/
  321. class IPAHeaderInsertionTest002: public IPAHeaderInsertionTestFixture {
  322. public:
  323. IPAHeaderInsertionTest002() {
  324. m_name = "IPAHeaderInsertionTest002";
  325. m_description =
  326. "Header Insertion Test 002 - Test IEEE802.3 Header Insertion\
  327. 1. Generate and commit IEEE802.3 header Insertion \
  328. 2. Generate and commit routing table containing bypass rule. \
  329. 3. Generate and commit bypass filtering rule. \
  330. 4. Send a packet, and verify that the IEEE802.3 Header was inserted correctly \
  331. and that the header Length was updated as well";
  332. Register(*this);
  333. uint8_t aIEEE802_3Header[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  334. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x46, 0xAE, 0xAF, 0xB0,// the correct size (00 46) is inserted here.
  335. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  336. m_nHeadertoAddSize = sizeof(aIEEE802_3Header);
  337. memcpy(m_aHeadertoAdd, aIEEE802_3Header, m_nHeadertoAddSize);
  338. }
  339. // Test Description:
  340. // 1. Generate and commit single bypass routing table.
  341. virtual bool AddRules() {
  342. m_eIP = IPA_IP_v4;
  343. const char bypass0[20] = "Bypass0";
  344. struct ipa_ioc_get_rt_tbl sRoutingTable;
  345. bool bRetVal = true;
  346. struct ipa_ioc_get_hdr sRetHeader;
  347. IPAFilteringTable cFilterTable;
  348. struct ipa_flt_rule_add sFilterRuleEntry;
  349. uint32_t nRTTableHdl=0;
  350. memset(&sRoutingTable, 0, sizeof(sRoutingTable));
  351. memset(&sRetHeader, 0, sizeof(sRetHeader));
  352. strlcpy(sRetHeader.name, "IEEE802_3", sizeof(sRetHeader.name));
  353. LOG_MSG_STACK("Entering Function");
  354. // Create Header:
  355. // Allocate Memory, populate it, and add in to the Header Insertion.
  356. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  357. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  358. sizeof(struct ipa_ioc_add_hdr)
  359. + 1 * sizeof(struct ipa_hdr_add));
  360. if (!pHeaderDescriptor) {
  361. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  362. bRetVal = false;
  363. goto bail;
  364. }
  365. pHeaderDescriptor->commit = true;
  366. pHeaderDescriptor->num_hdrs = 1;
  367. strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name)); // Header's Name
  368. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
  369. m_nHeadertoAddSize); //Header's Data
  370. pHeaderDescriptor->hdr[0].hdr[12] = 0x00; //set length to zero, to confirm if ipa updates or not
  371. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  372. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  373. pHeaderDescriptor->hdr[0].is_partial = false;
  374. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  375. strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
  376. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  377. {
  378. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
  379. bRetVal = false;
  380. goto bail;
  381. }
  382. if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
  383. {
  384. LOG_MSG_ERROR(" Failed");
  385. bRetVal = false;
  386. goto bail;
  387. }
  388. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST3_CONS,
  389. sRetHeader.hdl,&nRTTableHdl)) {
  390. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  391. bRetVal = false;
  392. goto bail;
  393. }
  394. LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
  395. sRoutingTable.ip = m_eIP;
  396. strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
  397. if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
  398. LOG_MSG_ERROR(
  399. "m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
  400. bRetVal = false;
  401. goto bail;
  402. }
  403. // Creating Filtering Rules
  404. cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,1);
  405. LOG_MSG_INFO("Creation of filtering table completed successfully");
  406. // Configuring Filtering Rule No.1
  407. cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
  408. sFilterRuleEntry.at_rear = true;
  409. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  410. sFilterRuleEntry.status = -1; // return value
  411. sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
  412. sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl; //put here the handle corresponding to Routing Rule 1
  413. if (
  414. ((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
  415. !m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
  416. )
  417. {
  418. LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
  419. bRetVal = false;
  420. goto bail;
  421. } else
  422. {
  423. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
  424. }
  425. bail:
  426. Free(pHeaderDescriptor);
  427. LOG_MSG_STACK(
  428. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  429. return bRetVal;
  430. } // AddRules()
  431. virtual bool ModifyPackets() {
  432. // This test doesn't modify the original IP Packet.
  433. return true;
  434. } // ModifyPacktes ()
  435. virtual bool TestLogic() {
  436. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  437. m_aExpectedBufSize = 0;
  438. memcpy(m_aExpectedBuffer, m_aHeadertoAdd, m_nHeadertoAddSize);
  439. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize,m_aBuffer,m_uBufferSize);
  440. m_aExpectedBufSize = m_nHeadertoAddSize + m_uBufferSize;
  441. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  442. &m_Consumer2, m_aExpectedBuffer, m_aExpectedBufSize)) {
  443. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  444. return false;
  445. }
  446. return true;
  447. }
  448. private:
  449. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  450. size_t m_aExpectedBufSize;
  451. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  452. size_t m_nHeadertoAddSize;
  453. };
  454. //---------------------------------------------------------------------------/
  455. // Test003: Test Three Different Header Insertions /
  456. //---------------------------------------------------------------------------/
  457. class IPAHeaderInsertionTest003: public IPAHeaderInsertionTestFixture {
  458. public:
  459. IPAHeaderInsertionTest003() :
  460. m_aExpectedBufSize(BUFF_MAX_SIZE),
  461. m_nHeadertoAddSize1(0),
  462. m_nHeadertoAddSize2(0),
  463. m_nHeadertoAddSize3(0)
  464. {
  465. m_name = "IPAHeaderInsertionTest003";
  466. m_description =
  467. "Header Insertion Test 003 - Test RmNet,IEEE802.3 and IEEE802.3 with const (1) addition to the length field\
  468. 1. Generate and commit two types of header Insertion RmNet and IEE802.3 \
  469. 2. Generate and commit three routing tables. \
  470. Each table contains a single \"bypass\" rule (all data goes to output pipe 0, 1 and 2 (accordingly)) \
  471. Routing table 1 is used to add RmNet Header \
  472. Routing table 2 is used to add IEEE802.3 Header (requires update of the Length field) \
  473. Routing table 3 is used to add IEEE802.3 Header with additional const (1) to the length field \
  474. 3. Generate and commit Three filtering rules (MASK = 0xFF..FF). \
  475. All DST_IP == 127.0.0.1 traffic goes to routing table 1 \
  476. All DST_IP == 192.169.1.1 traffic goes to routing table 2 \
  477. All DST_IP == 192.169.1.2 traffic goes to routing table 3";
  478. Register(*this);
  479. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  480. uint8_t aIEEE802_3Header1[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  481. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x46, 0xAE, 0xAF, 0xB0,
  482. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  483. uint8_t aIEEE802_3Header2[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  484. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x47, 0xAE, 0xAF, 0xB0,
  485. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  486. m_nHeadertoAddSize1 = sizeof(aRMNetHeader);
  487. memcpy(m_aHeadertoAdd1, aRMNetHeader, m_nHeadertoAddSize1);
  488. m_nHeadertoAddSize2 = sizeof(aIEEE802_3Header1);
  489. memcpy(m_aHeadertoAdd2, aIEEE802_3Header1, m_nHeadertoAddSize2);
  490. m_nHeadertoAddSize3 = sizeof(aIEEE802_3Header2);
  491. memcpy(m_aHeadertoAdd3, aIEEE802_3Header2, m_nHeadertoAddSize3);
  492. }
  493. // Test Description:
  494. // 1. Generate and commit single bypass routing table.
  495. virtual bool AddRules() {
  496. m_eIP = IPA_IP_v4;
  497. const char aBypass1[20] = "Bypass1";
  498. const char aBypass2[20] = "Bypass2";
  499. const char aBypass3[20] = "Bypass3";
  500. uint32_t nTableHdl01, nTableHdl02, nTableHdl03;
  501. bool bRetVal = true;
  502. IPAFilteringTable cFilterTable0;
  503. struct ipa_flt_rule_add sFilterRuleEntry;
  504. struct ipa_ioc_get_hdr sGetHeader1,sGetHeader2;
  505. LOG_MSG_STACK("Entering Function");
  506. memset(&sFilterRuleEntry, 0, sizeof(sFilterRuleEntry));
  507. memset(&sGetHeader1, 0, sizeof(sGetHeader1));
  508. memset(&sGetHeader2, 0, sizeof(sGetHeader2));
  509. // Create Header:
  510. // Allocate Memory, populate it, and add in to the Header Insertion.
  511. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  512. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  513. sizeof(struct ipa_ioc_add_hdr)
  514. + 2 * sizeof(struct ipa_hdr_add));
  515. if (!pHeaderDescriptor) {
  516. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  517. bRetVal = false;
  518. goto bail;
  519. }
  520. pHeaderDescriptor->commit = true;
  521. pHeaderDescriptor->num_hdrs = 2;
  522. // Adding Header No1.
  523. strlcpy(pHeaderDescriptor->hdr[0].name, "RMNet", sizeof(pHeaderDescriptor->hdr[0].name)); // Header's Name
  524. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd1,
  525. m_nHeadertoAddSize1); //Header's Data
  526. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize1;
  527. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  528. pHeaderDescriptor->hdr[0].is_partial = false;
  529. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  530. // Adding Header No2.
  531. strlcpy(pHeaderDescriptor->hdr[1].name, "IEEE_802_3", sizeof(pHeaderDescriptor->hdr[1].name)); // Header's Name
  532. memcpy(pHeaderDescriptor->hdr[1].hdr, m_aHeadertoAdd2,
  533. m_nHeadertoAddSize2); //Header's Data
  534. pHeaderDescriptor->hdr[1].hdr_len = m_nHeadertoAddSize2;
  535. pHeaderDescriptor->hdr[1].hdr_hdl = -1; //Return Value
  536. pHeaderDescriptor->hdr[1].is_partial = false;
  537. pHeaderDescriptor->hdr[1].status = -1; // Return Parameter
  538. strlcpy(sGetHeader1.name, pHeaderDescriptor->hdr[0].name, sizeof(sGetHeader1.name));
  539. strlcpy(sGetHeader2.name, pHeaderDescriptor->hdr[1].name, sizeof(sGetHeader2.name));
  540. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  541. {
  542. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
  543. bRetVal = false;
  544. goto bail;
  545. }
  546. if (!m_HeaderInsertion.GetHeaderHandle(&sGetHeader1))
  547. {
  548. LOG_MSG_ERROR(" Failed");
  549. bRetVal = false;
  550. goto bail;
  551. }
  552. LOG_MSG_DEBUG("Received Header1 Handle = 0x%x",sGetHeader1.hdl);
  553. if (!m_HeaderInsertion.GetHeaderHandle(&sGetHeader2))
  554. {
  555. LOG_MSG_ERROR(" Failed");
  556. bRetVal = false;
  557. goto bail;
  558. }
  559. LOG_MSG_DEBUG("Received Header2 Handle = 0x%x",sGetHeader2.hdl);
  560. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass1, IPA_CLIENT_TEST2_CONS,
  561. sGetHeader1.hdl,&nTableHdl01)) {
  562. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  563. bRetVal = false;
  564. goto bail;
  565. }
  566. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass2, IPA_CLIENT_TEST3_CONS,
  567. sGetHeader2.hdl,&nTableHdl02)) {
  568. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  569. bRetVal = false;
  570. goto bail;
  571. }
  572. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass3, IPA_CLIENT_TEST4_CONS,
  573. sGetHeader2.hdl,&nTableHdl03)) {
  574. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  575. bRetVal = false;
  576. goto bail;
  577. }
  578. LOG_MSG_INFO("Creation of three bypass routing tables completed successfully TblHdl1=0x%x, TblHdl2=0x%x, TblHdl3=0x%x",
  579. nTableHdl01,nTableHdl02,nTableHdl03);
  580. // Creating Filtering Rules
  581. cFilterTable0.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,3);
  582. LOG_MSG_INFO("Creation of filtering table completed successfully");
  583. // Configuring Filtering Rule No.1
  584. cFilterTable0.GeneratePresetRule(1,sFilterRuleEntry);
  585. sFilterRuleEntry.at_rear = true;
  586. sFilterRuleEntry.flt_rule_hdl=-1; // return Value
  587. sFilterRuleEntry.status = -1; // return value
  588. sFilterRuleEntry.rule.action=IPA_PASS_TO_ROUTING;
  589. sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl01; //put here the handle corresponding to Routing Rule 1
  590. sFilterRuleEntry.rule.attrib.attrib_mask = IPA_FLT_DST_ADDR; // Destination IP Based Filtering
  591. sFilterRuleEntry.rule.attrib.u.v4.dst_addr_mask = 0xFF0000FF; // Mask
  592. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0x7F000001; // Filter DST_IP == 127.0.0.1.
  593. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  594. {
  595. LOG_MSG_ERROR ("Adding Rule (0) to Filtering table Failed.");
  596. bRetVal = false;
  597. goto bail;
  598. }
  599. // Configuring Filtering Rule No.2
  600. sFilterRuleEntry.flt_rule_hdl=-1; // return Value
  601. sFilterRuleEntry.status = -1; // return Value
  602. sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl02; //put here the handle corresponding to Routing Rule 2
  603. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80101; // Filter DST_IP == 192.168.1.1.
  604. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  605. {
  606. LOG_MSG_ERROR ("Adding Rule(1) to Filtering table Failed.");
  607. bRetVal = false;
  608. goto bail;
  609. }
  610. // Configuring Filtering Rule No.3
  611. sFilterRuleEntry.flt_rule_hdl=-1; // return Value
  612. sFilterRuleEntry.status = -1; // return value
  613. sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl03; //put here the handle corresponding to Routing Rule 2
  614. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80102; // Filter DST_IP == 192.168.1.2.
  615. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  616. {
  617. LOG_MSG_ERROR ("Adding Rule(2) to Filtering table Failed.");
  618. bRetVal = false;
  619. goto bail;
  620. }
  621. if (!m_Filtering.AddFilteringRule(cFilterTable0.GetFilteringTable())) {
  622. LOG_MSG_ERROR ("Failed to commit Filtering rules");
  623. bRetVal = false;
  624. goto bail;
  625. }
  626. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(0)->status);
  627. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(1)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(1)->status);
  628. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(2)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(2)->status);
  629. bail:
  630. Free(pHeaderDescriptor);
  631. LOG_MSG_STACK(
  632. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  633. return bRetVal;
  634. } // AddRules()
  635. virtual bool ModifyPackets() {
  636. // This test doesn't modify the original IP Packet.
  637. return true;
  638. } // ModifyPacktes ()
  639. virtual bool TestLogic() {
  640. bool bRetVal = true;
  641. m_aExpectedBufSize = 0;
  642. uint32_t nIPv4DSTAddr;
  643. LOG_MSG_STACK("Entering Function");
  644. //Packet No. 1
  645. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  646. nIPv4DSTAddr = ntohl(0x7F000001);
  647. memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
  648. memcpy(m_aExpectedBuffer, m_aHeadertoAdd1, m_nHeadertoAddSize1);
  649. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize1,m_aBuffer,m_uBufferSize);
  650. m_aExpectedBufSize = m_nHeadertoAddSize1 + m_uBufferSize;
  651. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  652. &m_Consumer1, m_aExpectedBuffer, m_aExpectedBufSize))
  653. {
  654. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  655. bRetVal=false;
  656. }
  657. //Packet No. 2
  658. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  659. nIPv4DSTAddr = ntohl(0xC0A80101);//192.168.1.1
  660. memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
  661. memcpy(m_aExpectedBuffer, m_aHeadertoAdd2, m_nHeadertoAddSize2);
  662. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize2,m_aBuffer,m_uBufferSize);
  663. m_aExpectedBufSize = m_nHeadertoAddSize2 + m_uBufferSize;
  664. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  665. &m_Consumer2, m_aExpectedBuffer, m_aExpectedBufSize))
  666. {
  667. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  668. bRetVal=false;
  669. }
  670. //Packet No. 3
  671. nIPv4DSTAddr = ntohl(0xC0A80102);//192.168.1.2
  672. memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
  673. memcpy(m_aExpectedBuffer, m_aHeadertoAdd3, m_nHeadertoAddSize3);
  674. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize3,m_aBuffer,m_uBufferSize);
  675. m_aExpectedBufSize = m_nHeadertoAddSize3 + m_uBufferSize;
  676. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  677. &m_Consumer3, m_aExpectedBuffer, m_aExpectedBufSize))
  678. {
  679. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  680. bRetVal=false;
  681. }
  682. LOG_MSG_STACK("Leaving Function (Returning %s)",bRetVal?"True":"False");
  683. return bRetVal;
  684. }
  685. private:
  686. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  687. size_t m_aExpectedBufSize;
  688. uint8_t m_aHeadertoAdd1[MAX_HEADER_SIZE],m_aHeadertoAdd2[MAX_HEADER_SIZE],m_aHeadertoAdd3[MAX_HEADER_SIZE];
  689. size_t m_nHeadertoAddSize1,m_nHeadertoAddSize2,m_nHeadertoAddSize3;
  690. };
  691. class IPAHeaderInsertionTest004: public IPAHeaderInsertionTestFixture {
  692. public:
  693. IPAHeaderInsertionTest004() {
  694. m_name = "IPAHeaderInsertionTest004";
  695. m_description =
  696. "Header Insertion Test 004 - Test header insertion with bad len values.";
  697. Register(*this);
  698. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  699. m_nHeadertoAddSize = sizeof(aRMNetHeader);
  700. memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
  701. }
  702. virtual bool AddRules() {
  703. // Not adding any rules here.
  704. return true;
  705. } // AddRules()
  706. virtual bool ModifyPackets() {
  707. // This test doesn't modify the original IP Packet.
  708. return true;
  709. } // ModifyPacktes ()
  710. bool AddSingleHeaderAndCheck(uint8_t len) {
  711. m_eIP = IPA_IP_v4;
  712. bool bRetVal = true;
  713. struct ipa_ioc_get_hdr sRetHeader;
  714. memset(&sRetHeader, 0, sizeof(sRetHeader));
  715. strlcpy(sRetHeader.name, "Generic", sizeof(sRetHeader.name));
  716. LOG_MSG_STACK("Entering Function");
  717. // Create Header:
  718. // Allocate Memory, populate it, and add in to the Header Insertion.
  719. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  720. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  721. sizeof(struct ipa_ioc_add_hdr)
  722. + 1 * sizeof(struct ipa_hdr_add));
  723. if (!pHeaderDescriptor) {
  724. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  725. bRetVal = false;
  726. goto bail;
  727. }
  728. pHeaderDescriptor->commit = true;
  729. pHeaderDescriptor->num_hdrs = 1;
  730. strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name));
  731. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
  732. m_nHeadertoAddSize); //Header's Data
  733. pHeaderDescriptor->hdr[0].hdr_len = len;
  734. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  735. pHeaderDescriptor->hdr[0].is_partial = false;
  736. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  737. strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
  738. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  739. {
  740. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
  741. bRetVal = false;
  742. goto bail;
  743. }
  744. if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
  745. {
  746. LOG_MSG_ERROR(" Failed");
  747. bRetVal = false;
  748. goto bail;
  749. }
  750. bail:
  751. Free(pHeaderDescriptor);
  752. LOG_MSG_STACK(
  753. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  754. return bRetVal;
  755. } // AddSingleHeaderAndCheck()
  756. virtual bool TestLogic() {
  757. // Try to add headers with invalid values.
  758. // Valid values are between 0 to IPA_HDR_MAX_SIZE (64).
  759. // We expect the below function to fail.
  760. if (AddSingleHeaderAndCheck(MAX_HEADER_SIZE + 1)) {
  761. LOG_MSG_ERROR("This is unexpected, this can't succeed");
  762. return false;
  763. }
  764. // Add one header which is OK
  765. if (!AddSingleHeaderAndCheck(m_nHeadertoAddSize)) {
  766. LOG_MSG_ERROR("This is unexpected, this can't succeed");
  767. return false;
  768. }
  769. return true;
  770. }
  771. private:
  772. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  773. size_t m_nHeadertoAddSize;
  774. };
  775. class IPAHeaderInsertionTest005: public IPAHeaderInsertionTestFixture {
  776. public:
  777. IPAHeaderInsertionTest005() {
  778. m_name = "IPAHeaderInsertionTest005";
  779. m_description =
  780. "Header Insertion Test 005 - Test Multiple RMNet Header Insertion\
  781. - Stress test - Generate and commit multiple header Insertion";
  782. this->m_runInRegression = false;
  783. Register(*this);
  784. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  785. m_nHeadertoAddSize = sizeof(aRMNetHeader);
  786. memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
  787. }
  788. // Test Description:
  789. // 1. Generate and commit single bypass routing table.
  790. virtual bool AddRules() {
  791. m_eIP = IPA_IP_v4;
  792. bool bRetVal = true;
  793. struct ipa_ioc_get_hdr sRetHeader;
  794. char Name[] = "IEEE802_3\0";
  795. memset(&sRetHeader, 0, sizeof(sRetHeader));
  796. strlcpy (sRetHeader.name, Name, sizeof(sRetHeader.name));
  797. LOG_MSG_STACK("Entering Function");
  798. // Create Header:
  799. // Allocate Memory, populate it, and add in to the Header Insertion.
  800. struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
  801. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  802. sizeof(struct ipa_ioc_add_hdr)
  803. + 1 * sizeof(struct ipa_hdr_add));
  804. if (!pHeaderDescriptor) {
  805. LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
  806. bRetVal = false;
  807. goto bail;
  808. }
  809. pHeaderDescriptor->commit = true;
  810. pHeaderDescriptor->num_hdrs = 1;
  811. strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name));
  812. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
  813. m_nHeadertoAddSize); //Header's Data
  814. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  815. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  816. pHeaderDescriptor->hdr[0].is_partial = false;
  817. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  818. strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
  819. // stress test to check if the target crashes, failure is expected before reaching 500
  820. for (int i = 0; i < 500; i++) {
  821. LOG_MSG_DEBUG("IPAHeaderInsertionTest005::AddRules iter=%d\n",i);
  822. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  823. {
  824. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed on %d iteration.\n",i);
  825. goto bail;
  826. }
  827. }
  828. bail:
  829. Free(pHeaderDescriptor);
  830. LOG_MSG_STACK(
  831. "Leaving Function (Returning %s)", bRetVal?"True":"False");
  832. return bRetVal;
  833. } // AddRules()
  834. virtual bool ModifyPackets() {
  835. // This test doesn't modify the original IP Packet.
  836. return true;
  837. } // ModifyPacktes ()
  838. virtual bool TestLogic() {
  839. return true;
  840. }
  841. private:
  842. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  843. size_t m_nHeadertoAddSize;
  844. };
  845. class IPAHeaderInsertionTest006: public IPAHeaderInsertionTestFixture {
  846. public:
  847. IPAHeaderInsertionTest006() {
  848. m_name = "IPAHeaderInsertionTest006";
  849. m_description =
  850. "Header Insertion Test 006 - Test header distriburion between SRAM and DDR\
  851. - fill SRAM and some DDR, use DDR header";
  852. this->m_runInRegression = true;
  853. Register(*this);
  854. uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
  855. m_nHeadertoAddSize = sizeof(aRMNetHeader);
  856. memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
  857. m_minIPAHwType = IPA_HW_v5_0;
  858. // The bin size is 8
  859. // We are going to add number of headers to occupy twice the size of the SRAM buffer
  860. m_InitialHeadersNum = GetHdrSramSize() / 8 * 2;
  861. m_HeadersNumToDelete = 0;
  862. m_HeadersNumToAddAgain = 0;
  863. }
  864. virtual bool AddRules() {
  865. bool bRetVal = true;
  866. m_eIP = IPA_IP_v4;
  867. struct ipa_ioc_add_hdr *pHeaderDescriptor = NULL;
  868. struct ipa_ioc_del_hdr *pDelHeaderDescriptor = NULL;
  869. memset(&m_RetHeader, 0, sizeof(m_RetHeader));
  870. LOG_MSG_STACK("Entering Function");
  871. if (m_InitialHeadersNum <= 0)
  872. {
  873. LOG_MSG_ERROR("Initial headers number is set to 0!\n");
  874. bRetVal = false;
  875. goto bail;
  876. }
  877. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  878. sizeof(struct ipa_ioc_add_hdr) + 1 * sizeof(struct ipa_hdr_add));
  879. if (m_HeadersNumToDelete > 0)
  880. pDelHeaderDescriptor = (struct ipa_ioc_del_hdr *)calloc(1,
  881. sizeof(struct ipa_ioc_del_hdr) + m_HeadersNumToDelete * sizeof(struct ipa_hdr_del));
  882. if (!pHeaderDescriptor || (m_HeadersNumToDelete > 0 && !pDelHeaderDescriptor))
  883. {
  884. LOG_MSG_ERROR("calloc failed to allocate ipa_ioc_add_hdr or ipa_ioc_del_hdr");
  885. bRetVal = false;
  886. goto bail;
  887. }
  888. // Add bunch of headers to SRAM and DDR
  889. pHeaderDescriptor->commit = true;
  890. pHeaderDescriptor->num_hdrs = 1;
  891. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd, m_nHeadertoAddSize);
  892. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  893. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  894. pHeaderDescriptor->hdr[0].is_partial = false;
  895. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  896. fflush(stderr);
  897. fflush(stdout);
  898. ret = system("cat /sys/kernel/debug/ipa/hdr");
  899. for (int i = 0; i < m_InitialHeadersNum; i++)
  900. {
  901. LOG_MSG_DEBUG("%s::%s iter=%d\n", typeid(this).name(), __func__, i);
  902. snprintf(pHeaderDescriptor->hdr[0].name, sizeof(pHeaderDescriptor->hdr[0].name), "IEEE802_3_%03d", i);
  903. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  904. {
  905. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed on %d iteration.\n", i);
  906. bRetVal = false;
  907. goto bail;
  908. }
  909. // Store header descriptors to delete
  910. if (m_HeadersNumToDelete > 0 && i < m_HeadersNumToDelete) {
  911. pDelHeaderDescriptor->hdl[i].hdl = pHeaderDescriptor->hdr[0].hdr_hdl;
  912. }
  913. }
  914. strlcpy(m_RetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(m_RetHeader.name));
  915. fflush(stderr);
  916. fflush(stdout);
  917. ret = system("cat /sys/kernel/debug/ipa/hdr");
  918. if (m_HeadersNumToDelete > 0)
  919. {
  920. // Delete few headers from SRAM
  921. pDelHeaderDescriptor->commit = true;
  922. pDelHeaderDescriptor->num_hdls = m_HeadersNumToDelete;
  923. for (int i = 0; i < m_HeadersNumToDelete; i++)
  924. pDelHeaderDescriptor->hdl[i].status = -1; // Return Parameter
  925. if (!m_HeaderInsertion.DeleteHeader(pDelHeaderDescriptor))
  926. {
  927. LOG_MSG_ERROR("m_HeaderInsertion.DeleteHeader(pDelHeaderDescriptor) Failed");
  928. bRetVal = false;
  929. goto bail;
  930. }
  931. fflush(stderr);
  932. fflush(stdout);
  933. ret = system("cat /sys/kernel/debug/ipa/hdr");
  934. }
  935. if (m_HeadersNumToAddAgain > 0)
  936. {
  937. // Add few new headers to SRAM
  938. pHeaderDescriptor->commit = true;
  939. pHeaderDescriptor->num_hdrs = 1;
  940. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd, m_nHeadertoAddSize);
  941. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
  942. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  943. pHeaderDescriptor->hdr[0].is_partial = false;
  944. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  945. for (int i = 0; i < m_HeadersNumToAddAgain; i++) {
  946. LOG_MSG_DEBUG("%s::%s iter=%d\n", typeid(this).name(), __func__, i);
  947. snprintf(pHeaderDescriptor->hdr[0].name, sizeof(pHeaderDescriptor->hdr[0].name), "IEEE802_3_%03d_2", i);
  948. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  949. {
  950. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed on %d iteration.\n", i);
  951. bRetVal = false;
  952. goto bail;
  953. }
  954. }
  955. strlcpy(m_RetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(m_RetHeader.name));
  956. fflush(stderr);
  957. fflush(stdout);
  958. ret = system("cat /sys/kernel/debug/ipa/hdr");
  959. }
  960. // Use last added header for traffic
  961. if (!m_HeaderInsertion.GetHeaderHandle(&m_RetHeader))
  962. {
  963. LOG_MSG_ERROR(" Failed");
  964. bRetVal = false;
  965. goto bail;
  966. }
  967. bRetVal = CreateFilteringAndRouting();
  968. bail:
  969. Free(pHeaderDescriptor);
  970. if (pDelHeaderDescriptor)
  971. Free(pDelHeaderDescriptor);
  972. LOG_MSG_STACK("Leaving %s (Returning %s)", __func__, bRetVal ? "True" : "False");
  973. return bRetVal;
  974. } // AddRules()
  975. virtual bool CreateFilteringAndRouting() {
  976. uint32_t nRTTableHdl=0;
  977. const char bypass0[20] = "Bypass0";
  978. struct ipa_ioc_get_rt_tbl sRoutingTable;
  979. struct ipa_flt_rule_add sFilterRuleEntry;
  980. IPAFilteringTable cFilterTable;
  981. memset(&sRoutingTable, 0, sizeof(sRoutingTable));
  982. // Create RT table
  983. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST2_CONS,
  984. m_RetHeader.hdl,&nRTTableHdl)) {
  985. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  986. return false;
  987. }
  988. LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
  989. sRoutingTable.ip = m_eIP;
  990. strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
  991. if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
  992. LOG_MSG_ERROR("m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.",
  993. &sRoutingTable);
  994. return false;
  995. }
  996. // Creating Filtering Rules
  997. cFilterTable.Init(m_eIP, IPA_CLIENT_TEST_PROD, false, 1);
  998. LOG_MSG_INFO("Creation of filtering table completed successfully");
  999. // Configuring Filtering Rule No.1
  1000. cFilterTable.GeneratePresetRule(0, sFilterRuleEntry);
  1001. sFilterRuleEntry.at_rear = true;
  1002. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  1003. sFilterRuleEntry.status = -1; // return value
  1004. sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
  1005. sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl; //put here the handle corresponding to Routing Rule 1
  1006. if (((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
  1007. !m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable()))
  1008. {
  1009. LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
  1010. return false;
  1011. }
  1012. else
  1013. {
  1014. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n",
  1015. cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,
  1016. cFilterTable.ReadRuleFromTable(0)->status);
  1017. }
  1018. return true;
  1019. }
  1020. virtual bool ModifyPackets() {
  1021. return true;
  1022. }
  1023. virtual bool TestLogic() {
  1024. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  1025. m_aExpectedBufSize = 0;
  1026. memcpy(m_aExpectedBuffer, m_aHeadertoAdd, m_nHeadertoAddSize);
  1027. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize,m_aBuffer,m_uBufferSize);
  1028. m_aExpectedBufSize = m_nHeadertoAddSize + m_uBufferSize;
  1029. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  1030. &m_Consumer1, m_aExpectedBuffer, m_aExpectedBufSize)) {
  1031. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  1032. return false;
  1033. }
  1034. return true;
  1035. }
  1036. protected:
  1037. struct ipa_ioc_get_hdr m_RetHeader;
  1038. int m_InitialHeadersNum;
  1039. int m_HeadersNumToDelete;
  1040. int m_HeadersNumToAddAgain;
  1041. private:
  1042. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  1043. size_t m_aExpectedBufSize;
  1044. uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
  1045. size_t m_nHeadertoAddSize;
  1046. int ret;
  1047. };
  1048. class IPAHeaderInsertionTest007: public IPAHeaderInsertionTest006 {
  1049. public:
  1050. IPAHeaderInsertionTest007() {
  1051. m_name = "IPAHeaderInsertionTest007";
  1052. m_description =
  1053. "Header Insertion Test 007 - Test header distriburion between SRAM and DDR\
  1054. - fill SRAM and some DDR, free some SRAM, use DDR header";
  1055. // We will delete half of the headers in the SRAM,
  1056. // which is quarter of the total initial headers number
  1057. m_HeadersNumToDelete = m_InitialHeadersNum / 4;
  1058. m_HeadersNumToAddAgain = 0;
  1059. }
  1060. };
  1061. class IPAHeaderInsertionTest008: public IPAHeaderInsertionTest006 {
  1062. public:
  1063. IPAHeaderInsertionTest008() {
  1064. m_name = "IPAHeaderInsertionTest008";
  1065. m_description =
  1066. "Header Insertion Test 008 - Test header distriburion between SRAM and DDR\
  1067. - fill SRAM and some DDR, free some SRAM, add few new SRAM headers, \
  1068. use last SRAM header";
  1069. // We will delete half of the headers in the SRAM,
  1070. // which is quarter of the total initial headers number
  1071. m_HeadersNumToDelete = m_InitialHeadersNum / 4;
  1072. // We will add again half of the number of headers we deleted
  1073. m_HeadersNumToAddAgain = m_HeadersNumToDelete / 2;
  1074. }
  1075. };
  1076. class IPAHeaderInsertionTest009: public IPAHeaderInsertionTest006 {
  1077. public:
  1078. IPAHeaderInsertionTest009() {
  1079. m_name = "IPAHeaderInsertionTest009";
  1080. m_description =
  1081. "Header Insertion Test 009 - Test header distriburion between SRAM and DDR \
  1082. - fill SRAM and some DDR, free some SRAM and DDR, \
  1083. add new SRAM and DDR headers, \
  1084. use last added DDR header";
  1085. // We will delete all the headers in SRAM and half of the headers in the DDR,
  1086. // which is 3/4 of the total initial headers number
  1087. m_HeadersNumToDelete = m_InitialHeadersNum - (m_InitialHeadersNum / 4);
  1088. // We will add again one less header than deleted
  1089. m_HeadersNumToAddAgain = m_InitialHeadersNum - m_HeadersNumToDelete - 1;
  1090. }
  1091. };
  1092. class IPAHeaderInsertionTest010: public IPAHeaderInsertionTestFixture {
  1093. public:
  1094. IPAHeaderInsertionTest010() :
  1095. m_aExpectedBufSize(BUFF_MAX_SIZE),
  1096. m_nHeadertoAddSize1(0),
  1097. m_nHeadertoAddSize2(0)
  1098. {
  1099. m_name = "IPAHeaderInsertionTest010";
  1100. m_description =
  1101. "Header Insertion Test 010 - Test header distriburion between SRAM and DDR\
  1102. - fill SRAM and some DDR, use one SRAM and one DDR header";
  1103. m_minIPAHwType = IPA_HW_v5_0;
  1104. Register(*this);
  1105. uint8_t aIEEE802_3Header1[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  1106. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x46, 0xAE, 0xAF, 0xB0,
  1107. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  1108. uint8_t aIEEE802_3Header2[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
  1109. 0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x47, 0xAE, 0xAF, 0xB0,
  1110. 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
  1111. m_nHeadertoAddSize1 = sizeof(aIEEE802_3Header1);
  1112. memcpy(m_aHeadertoAdd1, aIEEE802_3Header1, m_nHeadertoAddSize1);
  1113. m_nHeadertoAddSize2 = sizeof(aIEEE802_3Header2);
  1114. memcpy(m_aHeadertoAdd2, aIEEE802_3Header2, m_nHeadertoAddSize2);
  1115. // The packet size is 22, therefore the bin size is 24
  1116. // We are going to add number of headers to occupy twice the size of the SRAM buffer
  1117. m_InitialHeadersNum = GetHdrSramSize() / 24 * 2;
  1118. }
  1119. virtual bool AddRules() {
  1120. m_eIP = IPA_IP_v4;
  1121. const char aBypass1[20] = "Bypass1";
  1122. const char aBypass2[20] = "Bypass2";
  1123. uint32_t nTableHdl01, nTableHdl02;
  1124. bool bRetVal = true;
  1125. IPAFilteringTable cFilterTable0;
  1126. struct ipa_flt_rule_add sFilterRuleEntry;
  1127. struct ipa_ioc_add_hdr *pHeaderDescriptor = NULL;
  1128. LOG_MSG_STACK("Entering Function");
  1129. if (m_InitialHeadersNum <= 0)
  1130. {
  1131. LOG_MSG_ERROR("Initial headers number is set to 0!\n");
  1132. bRetVal = false;
  1133. goto bail;
  1134. }
  1135. memset(&sFilterRuleEntry, 0, sizeof(sFilterRuleEntry));
  1136. memset(&m_RetHeader1, 0, sizeof(m_RetHeader1));
  1137. memset(&m_RetHeader2, 0, sizeof(m_RetHeader2));
  1138. pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
  1139. sizeof(struct ipa_ioc_add_hdr) + 1 * sizeof(struct ipa_hdr_add));
  1140. if (!pHeaderDescriptor)
  1141. {
  1142. LOG_MSG_ERROR("calloc failed to allocate ipa_ioc_add_hdr");
  1143. bRetVal = false;
  1144. goto bail;
  1145. }
  1146. fflush(stderr);
  1147. fflush(stdout);
  1148. ret = system("cat /sys/kernel/debug/ipa/hdr");
  1149. // Add one header to SRAM
  1150. pHeaderDescriptor->commit = true;
  1151. pHeaderDescriptor->num_hdrs = 1;
  1152. pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
  1153. pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
  1154. pHeaderDescriptor->hdr[0].is_partial = false;
  1155. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd1, m_nHeadertoAddSize1);
  1156. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize1;
  1157. strlcpy(pHeaderDescriptor->hdr[0].name, "IEEE802_3_SRAM", sizeof(pHeaderDescriptor->hdr[0].name));
  1158. strlcpy(m_RetHeader1.name, pHeaderDescriptor->hdr[0].name, sizeof(m_RetHeader1.name));
  1159. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  1160. {
  1161. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed\n");
  1162. bRetVal = false;
  1163. goto bail;
  1164. }
  1165. // Add bunch of headers to SRAM and DDR
  1166. for (int i = 1; i < m_InitialHeadersNum; i++)
  1167. {
  1168. LOG_MSG_DEBUG("%s::%s iter=%d\n", typeid(this).name(), __func__, i);
  1169. memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd2, m_nHeadertoAddSize2);
  1170. pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize2;
  1171. snprintf(pHeaderDescriptor->hdr[0].name, sizeof(pHeaderDescriptor->hdr[0].name),
  1172. "IEEE802_3_%03d", i);
  1173. if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
  1174. {
  1175. LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed on %d iteration.\n", i);
  1176. bRetVal = false;
  1177. goto bail;
  1178. }
  1179. }
  1180. strlcpy(m_RetHeader2.name, pHeaderDescriptor->hdr[0].name, sizeof(m_RetHeader2.name));
  1181. fflush(stderr);
  1182. fflush(stdout);
  1183. ret = system("cat /sys/kernel/debug/ipa/hdr");
  1184. if (!m_HeaderInsertion.GetHeaderHandle(&m_RetHeader1))
  1185. {
  1186. LOG_MSG_ERROR(" Failed");
  1187. bRetVal = false;
  1188. goto bail;
  1189. }
  1190. LOG_MSG_DEBUG("Received Header1 Handle = 0x%x", m_RetHeader1.hdl);
  1191. if (!m_HeaderInsertion.GetHeaderHandle(&m_RetHeader2))
  1192. {
  1193. LOG_MSG_ERROR(" Failed");
  1194. bRetVal = false;
  1195. goto bail;
  1196. }
  1197. LOG_MSG_DEBUG("Received Header2 Handle = 0x%x", m_RetHeader2.hdl);
  1198. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass1, IPA_CLIENT_TEST3_CONS,
  1199. m_RetHeader1.hdl, &nTableHdl01)) {
  1200. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  1201. bRetVal = false;
  1202. goto bail;
  1203. }
  1204. if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass2, IPA_CLIENT_TEST4_CONS,
  1205. m_RetHeader2.hdl, &nTableHdl02)) {
  1206. LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
  1207. bRetVal = false;
  1208. goto bail;
  1209. }
  1210. LOG_MSG_INFO("Creation of two bypass routing tables completed successfully TblHdl1=0x%x, TblHdl2=0x%x",
  1211. nTableHdl01, nTableHdl02);
  1212. // Creating Filtering Rules
  1213. cFilterTable0.Init(m_eIP, IPA_CLIENT_TEST_PROD, false, 2);
  1214. LOG_MSG_INFO("Creation of filtering table completed successfully");
  1215. // Configuring common Filtering fields
  1216. cFilterTable0.GeneratePresetRule(1, sFilterRuleEntry);
  1217. sFilterRuleEntry.at_rear = true;
  1218. sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
  1219. sFilterRuleEntry.rule.attrib.attrib_mask = IPA_FLT_DST_ADDR; // Destination IP Based Filtering
  1220. sFilterRuleEntry.rule.attrib.u.v4.dst_addr_mask = 0xFF0000FF; // Mask
  1221. // Configuring Filtering Rule No.1
  1222. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  1223. sFilterRuleEntry.status = -1; // return Value
  1224. sFilterRuleEntry.rule.rt_tbl_hdl = nTableHdl01; //put here the handle corresponding to Routing Rule 1
  1225. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80101; // Filter DST_IP == 192.168.1.1.
  1226. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  1227. {
  1228. LOG_MSG_ERROR ("Adding Rule(1) to Filtering table Failed.");
  1229. bRetVal = false;
  1230. goto bail;
  1231. }
  1232. // Configuring Filtering Rule No.2
  1233. sFilterRuleEntry.flt_rule_hdl = -1; // return Value
  1234. sFilterRuleEntry.status = -1; // return value
  1235. sFilterRuleEntry.rule.rt_tbl_hdl = nTableHdl02; //put here the handle corresponding to Routing Rule 2
  1236. sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80102; // Filter DST_IP == 192.168.1.2.
  1237. if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
  1238. {
  1239. LOG_MSG_ERROR ("Adding Rule(2) to Filtering table Failed.");
  1240. bRetVal = false;
  1241. goto bail;
  1242. }
  1243. if (!m_Filtering.AddFilteringRule(cFilterTable0.GetFilteringTable())) {
  1244. LOG_MSG_ERROR ("Failed to commit Filtering rules");
  1245. bRetVal = false;
  1246. goto bail;
  1247. }
  1248. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n",
  1249. cFilterTable0.ReadRuleFromTable(0)->flt_rule_hdl,
  1250. cFilterTable0.ReadRuleFromTable(0)->status);
  1251. LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n",
  1252. cFilterTable0.ReadRuleFromTable(1)->flt_rule_hdl,
  1253. cFilterTable0.ReadRuleFromTable(1)->status);
  1254. bail:
  1255. Free(pHeaderDescriptor);
  1256. LOG_MSG_STACK("Leaving Function (Returning %s)", bRetVal ? "True" : "False");
  1257. return bRetVal;
  1258. } // AddRules()
  1259. virtual bool ModifyPackets() {
  1260. // This test doesn't modify the original IP Packet.
  1261. return true;
  1262. } // ModifyPacktes ()
  1263. virtual bool TestLogic() {
  1264. bool bRetVal = true;
  1265. m_aExpectedBufSize = 0;
  1266. uint32_t nIPv4DSTAddr;
  1267. LOG_MSG_STACK("Entering Function");
  1268. //Packet No. 1
  1269. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  1270. nIPv4DSTAddr = ntohl(0xC0A80101); //192.168.1.1
  1271. memcpy(&m_aBuffer[IPV4_DST_ADDR_OFFSET], &nIPv4DSTAddr, sizeof(nIPv4DSTAddr));
  1272. memcpy(m_aExpectedBuffer, m_aHeadertoAdd1, m_nHeadertoAddSize1);
  1273. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize1,m_aBuffer,m_uBufferSize);
  1274. m_aExpectedBufSize = m_nHeadertoAddSize1 + m_uBufferSize;
  1275. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  1276. &m_Consumer2, m_aExpectedBuffer, m_aExpectedBufSize))
  1277. {
  1278. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  1279. bRetVal=false;
  1280. }
  1281. //Packet No. 2
  1282. memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
  1283. nIPv4DSTAddr = ntohl(0xC0A80102); //192.168.1.2
  1284. memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET], &nIPv4DSTAddr, sizeof(nIPv4DSTAddr));
  1285. memcpy(m_aExpectedBuffer, m_aHeadertoAdd2, m_nHeadertoAddSize2);
  1286. memcpy(m_aExpectedBuffer+m_nHeadertoAddSize2, m_aBuffer, m_uBufferSize);
  1287. m_aExpectedBufSize = m_nHeadertoAddSize2 + m_uBufferSize;
  1288. if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
  1289. &m_Consumer3, m_aExpectedBuffer, m_aExpectedBufSize))
  1290. {
  1291. LOG_MSG_ERROR("SendReceiveAndCompare failed.");
  1292. bRetVal=false;
  1293. }
  1294. LOG_MSG_STACK("Leaving Function (Returning %s)",bRetVal?"True":"False");
  1295. return bRetVal;
  1296. }
  1297. protected:
  1298. struct ipa_ioc_get_hdr m_RetHeader1, m_RetHeader2;
  1299. int m_InitialHeadersNum;
  1300. private:
  1301. uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
  1302. size_t m_aExpectedBufSize;
  1303. uint8_t m_aHeadertoAdd1[MAX_HEADER_SIZE], m_aHeadertoAdd2[MAX_HEADER_SIZE];
  1304. size_t m_nHeadertoAddSize1, m_nHeadertoAddSize2;
  1305. int ret;
  1306. };
  1307. static IPAHeaderInsertionTest001 ipaHeaderInsertionTest001;
  1308. static IPAHeaderInsertionTest002 ipaHeaderInsertionTest002;
  1309. static IPAHeaderInsertionTest003 ipaHeaderInsertionTest003;
  1310. static IPAHeaderInsertionTest004 ipaHeaderInsertionTest004;
  1311. static IPAHeaderInsertionTest005 ipaHeaderInsertionTest005;
  1312. static IPAHeaderInsertionTest006 ipaHeaderInsertionTest006;
  1313. static IPAHeaderInsertionTest007 ipaHeaderInsertionTest007;
  1314. static IPAHeaderInsertionTest008 ipaHeaderInsertionTest008;
  1315. static IPAHeaderInsertionTest009 ipaHeaderInsertionTest009;
  1316. static IPAHeaderInsertionTest010 ipaHeaderInsertionTest010;