123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404 |
- /*
- * Copyright (c) 2017 The Linux Foundation. All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions are
- * met:
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above
- * copyright notice, this list of conditions and the following
- * disclaimer in the documentation and/or other materials provided
- * with the distribution.
- * * Neither the name of The Linux Foundation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
- * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
- * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
- * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
- * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
- * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
- * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
- * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
- * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
- * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
- * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
- #include "HeaderRemovalTestFixture.h"
- #include "Constants.h"
- #include "Logger.h"
- #include "IPAFilteringTable.h"
- #define IPA_TEST_DMUX_HEADER_LENGTH 8
- #define IPA_TEST_META_DATA_IS_VALID 1
- #define IPA_TEST_DMUX_HEADER_META_DATA_OFFSET 4
- extern Logger g_Logger;
- /////////////////////////////////////////////////////////////////////////////////
- //define the static Pipes which will be used by all derived tests.
- Pipe HeaderRemovalTestFixture::m_A2NDUNToIpaPipe(IPA_CLIENT_TEST2_PROD, IPA_TEST_CONFIFURATION_3);
- Pipe HeaderRemovalTestFixture::m_IpaToUsbPipe(IPA_CLIENT_TEST_CONS, IPA_TEST_CONFIFURATION_3);
- Pipe HeaderRemovalTestFixture::m_IpaToA2NDUNPipe(IPA_CLIENT_TEST2_CONS, IPA_TEST_CONFIFURATION_3);
- Pipe HeaderRemovalTestFixture::m_IpaToQ6LANPipe(IPA_CLIENT_TEST4_CONS, IPA_TEST_CONFIFURATION_3);
- RoutingDriverWrapper HeaderRemovalTestFixture::m_routing;
- Filtering HeaderRemovalTestFixture::m_filtering;
- const char HeaderRemovalTestFixture_bypass0[20] = "Bypass0";
- const char HeaderRemovalTestFixture_bypassIPv60[20] = "BypassIPv60";
- /////////////////////////////////////////////////////////////////////////////////
- HeaderRemovalTestFixture::HeaderRemovalTestFixture()
- {
- m_testSuiteName.push_back("Removal");
- Register(*this);
- }
- static int SetupKernelModule(void)
- {
- int retval;
- struct ipa_channel_config from_ipa_channels[3];
- struct test_ipa_ep_cfg from_ipa_cfg[3];
- struct ipa_channel_config to_ipa_channels[1];
- struct test_ipa_ep_cfg to_ipa_cfg[1];
- struct ipa_test_config_header header = {0};
- struct ipa_channel_config *to_ipa_array[1];
- struct ipa_channel_config *from_ipa_array[3];
- /* From ipa configurations - 3 pipes */
- memset(&from_ipa_cfg[0], 0, sizeof(from_ipa_cfg[0]));
- prepare_channel_struct(&from_ipa_channels[0],
- header.from_ipa_channels_num++,
- IPA_CLIENT_TEST_CONS,
- (void *)&from_ipa_cfg[0],
- sizeof(from_ipa_cfg[0]));
- from_ipa_array[0] = &from_ipa_channels[0];
- memset(&from_ipa_cfg[1], 0, sizeof(from_ipa_cfg[1]));
- prepare_channel_struct(&from_ipa_channels[1],
- header.from_ipa_channels_num++,
- IPA_CLIENT_TEST2_CONS,
- (void *)&from_ipa_cfg[1],
- sizeof(from_ipa_cfg[1]));
- from_ipa_array[1] = &from_ipa_channels[1];
- memset(&from_ipa_cfg[2], 0, sizeof(from_ipa_cfg[2]));
- prepare_channel_struct(&from_ipa_channels[2],
- header.from_ipa_channels_num++,
- IPA_CLIENT_TEST4_CONS,
- (void *)&from_ipa_cfg[2],
- sizeof(from_ipa_cfg[2]));
- from_ipa_array[2] = &from_ipa_channels[2];
- /* To ipa configurations - 1 pipes */
- memset(&to_ipa_cfg[0], 0, sizeof(to_ipa_cfg[0]));
- to_ipa_cfg[0].hdr.hdr_len = IPA_TEST_DMUX_HEADER_LENGTH;
- to_ipa_cfg[0].hdr.hdr_ofst_metadata_valid = IPA_TEST_META_DATA_IS_VALID;
- to_ipa_cfg[0].hdr.hdr_ofst_metadata =
- IPA_TEST_DMUX_HEADER_META_DATA_OFFSET;
- prepare_channel_struct(&to_ipa_channels[0],
- header.to_ipa_channels_num++,
- IPA_CLIENT_TEST2_PROD,
- (void *)&to_ipa_cfg[0],
- sizeof(to_ipa_cfg[0]));
- to_ipa_array[0] = &to_ipa_channels[0];
- header.head_marker = IPA_TEST_CONFIG_MARKER;
- header.tail_marker = IPA_TEST_CONFIG_MARKER;
- prepare_header_struct(&header, from_ipa_array, to_ipa_array);
- retval = GenericConfigureScenario(&header);
- return retval;
- }
- /////////////////////////////////////////////////////////////////////////////////
- bool HeaderRemovalTestFixture::Setup()
- {
- bool bRetVal = true;
- //Set the configuration to support USB->IPA and IPA->USB pipes.
- //ConfigureScenario(PHASE_THREE_TEST_CONFIGURATION);
- bRetVal = SetupKernelModule();
- if (bRetVal != true) {
- return bRetVal;
- }
- //Initialize the pipe for all the tests - this will open the inode which represents the pipe.
- bRetVal &= m_A2NDUNToIpaPipe.Init();
- bRetVal &= m_IpaToUsbPipe.Init();
- bRetVal &= m_IpaToA2NDUNPipe.Init();
- bRetVal &= m_IpaToQ6LANPipe.Init();
- // remove default "LAN" routing table (as we want to pass to USB pipe)
- m_routing.Reset(IPA_IP_v4);
- m_routing.Reset(IPA_IP_v6);
- return bRetVal;
- }
- /////////////////////////////////////////////////////////////////////////////////
- bool HeaderRemovalTestFixture::Teardown()
- {
- //The Destroy method will close the inode.
- m_A2NDUNToIpaPipe.Destroy();
- m_IpaToUsbPipe.Destroy();
- m_IpaToA2NDUNPipe.Destroy();
- m_IpaToQ6LANPipe.Destroy();
- return true;
- }
- /////////////////////////////////////////////////////////////////////////////////
- Byte* HeaderRemovalTestFixture::CreateA2NDUNPacket(
- unsigned int magicNumber,
- unsigned int nID,
- string sPayloadFileName,
- unsigned int *nTotalLength)
- {
- size_t nIpv4ByteSize = 1024;
- bool bRetVal = false;
- Byte *pA2NDUNPacket = 0;
- unsigned int nA2NDUNPacketByteSize = 0;
- Byte *pIpv4Packet = (Byte*) malloc(1024);
- if(0 == pIpv4Packet)
- {
- LOG_MSG_ERROR("Cannot allocate the memory for IPv4 packet");
- return 0;
- }
- bRetVal = LoadDefaultPacket(IPA_IP_v4, pIpv4Packet, nIpv4ByteSize);
- if(false == bRetVal)
- {
- LOG_MSG_ERROR("Cannot load the packet");
- pA2NDUNPacket = 0;
- goto bail;
- }
- //Magic Number(4 Bytes) Logical Channel ID(2 Bytes) Length(2 Bytes)
- nA2NDUNPacketByteSize = m_A2NDUNToIpaPipe.GetHeaderLengthAdd() + nIpv4ByteSize;
- pA2NDUNPacket = new Byte[ nA2NDUNPacketByteSize ];
- //htobe32 for the magic number:
- pA2NDUNPacket[0] = (magicNumber & 0xFF000000) >> 24;//MSB
- pA2NDUNPacket[1] = (magicNumber & 0x00FF0000) >> 16;
- pA2NDUNPacket[2] = (magicNumber & 0x0000FF00) >> 8;
- pA2NDUNPacket[3] = (magicNumber & 0x000000FF) >> 0;//LSB
- //htobe16 for the Logical Channel ID:
- pA2NDUNPacket[4] = (nID & 0xFF00) >> 8;//MSB
- pA2NDUNPacket[5] = (nID & 0x00FF) >> 0;//LSB
- //htobe16 for the Length of the packet:
- pA2NDUNPacket[6] = (nA2NDUNPacketByteSize & 0xFF00) >> 8;//MSB
- pA2NDUNPacket[7] = (nA2NDUNPacketByteSize & 0x00FF) >> 0;//LSB
- //add the payload to the A2NDUN packet
- memcpy(&pA2NDUNPacket[8], pIpv4Packet, nIpv4ByteSize);
- *nTotalLength = nA2NDUNPacketByteSize;
- /* fall through */
- bail:
- Free(pIpv4Packet);
- return pA2NDUNPacket;
- }
- /////////////////////////////////////////////////////////////////////////////////
- bool HeaderRemovalTestFixture::SetIPATablesToPassAllToSpecificClient(
- enum ipa_client_type nClientTypeSrc,
- enum ipa_client_type nClientTypeDst)
- {
- bool bRetVal = true;
- bRetVal = SetRoutingTableToPassAllToSpecificClient(nClientTypeDst);
- if(false == bRetVal)
- goto bail;
- bRetVal = SetFilterTableToPassAllToSpecificClient(nClientTypeSrc);
- if(false == bRetVal)
- goto bail;
- bRetVal = SetHeaderInsertionTableAddEmptyHeaderForTheClient(nClientTypeSrc);
- if(false == bRetVal)
- goto bail;
- /* fall through */
- bail:
- return bRetVal;
- }
- /////////////////////////////////////////////////////////////////////////////////
- bool HeaderRemovalTestFixture::SetFilterTableToPassAllToSpecificClient(
- enum ipa_client_type nClientType)
- {
- IPAFilteringTable FilterTable;
- struct ipa_flt_rule_add flt_rule_entry;
- struct ipa_ioc_get_rt_tbl sRoutingTable;
- sRoutingTable.ip = IPA_IP_v4;
- strlcpy(sRoutingTable.name, "Bypass0", sizeof(sRoutingTable.name));
- if (false == m_routing.GetRoutingTable(&sRoutingTable)) {
- LOG_MSG_ERROR("Configure the routing block first");
- return false;
- }
- FilterTable.Init(IPA_IP_v4, nClientType, false, 1);
- FilterTable.GeneratePresetRule(0, flt_rule_entry);
- flt_rule_entry.at_rear = true;
- flt_rule_entry.flt_rule_hdl = -1;
- flt_rule_entry.status = -1;
- flt_rule_entry.rule.action = IPA_PASS_TO_ROUTING;
- flt_rule_entry.rule.rt_tbl_hdl = sRoutingTable.hdl;
- flt_rule_entry.rule.attrib.attrib_mask = IPA_FLT_DST_ADDR;
- flt_rule_entry.rule.attrib.u.v4.dst_addr_mask = 0x00000000;
- flt_rule_entry.rule.attrib.u.v4.dst_addr = 0x00000000;
- if ((-1 == FilterTable.AddRuleToTable(flt_rule_entry)) ||
- !m_filtering.AddFilteringRule(FilterTable.GetFilteringTable())) {
- LOG_MSG_INFO ("%s::Error Adding RuleTable(0) to Filtering, aborting...");
- return false;
- } else {
- LOG_MSG_INFO( "flt rule hdl0=0x%x, status=0x%x",
- FilterTable.ReadRuleFromTable(0)->flt_rule_hdl,
- FilterTable.ReadRuleFromTable(0)->status);
- }
- LOG_MSG_INFO("Leaving ");
- return true;
- }
- /////////////////////////////////////////////////////////////////////////////////
- bool HeaderRemovalTestFixture::SetRoutingTableToPassAllToSpecificClient(
- enum ipa_client_type nClientType)
- {
- if (!CreateBypassRoutingTablesIPv4(
- HeaderRemovalTestFixture_bypass0,
- nClientType)) {
- LOG_MSG_INFO("CreateThreeBypassRoutingTables Failed");
- return false;
- }
- return true;
- }
- /////////////////////////////////////////////////////////////////////////////////
- bool HeaderRemovalTestFixture::SetHeaderInsertionTableAddEmptyHeaderForTheClient(
- enum ipa_client_type nClientType)
- {
- //TODO Header Removal: add header insertion data
- return true;
- }
- /////////////////////////////////////////////////////////////////////////////////
- // This function creates IPv4 bypass routing entry and commits it.
- bool HeaderRemovalTestFixture::CreateBypassRoutingTablesIPv4(
- const char * bypass0,
- enum ipa_client_type nClientType)
- {
- struct ipa_ioc_add_rt_rule *rt_rule0 = 0;
- struct ipa_rt_rule_add *rt_rule_entry;
- LOG_MSG_INFO("Entering");
- rt_rule0 = (struct ipa_ioc_add_rt_rule *)
- calloc(1, sizeof(struct ipa_ioc_add_rt_rule) +
- 1*sizeof(struct ipa_rt_rule_add));
- if (!rt_rule0) {
- LOG_MSG_INFO("calloc failed to allocate rt_rule0");
- return false;
- }
- rt_rule0->num_rules = 1;
- rt_rule0->ip = IPA_IP_v4;
- rt_rule0->commit = true;
- strlcpy(rt_rule0->rt_tbl_name, bypass0, sizeof(rt_rule0->rt_tbl_name));
- rt_rule_entry = &rt_rule0->rules[0];
- rt_rule_entry->at_rear = 0;
- rt_rule_entry->rule.dst = nClientType;
- // rt_rule_entry->rule.hdr_hdl = hdr_entry->hdr_hdl; // gidons, there is no support for header insertion / removal yet.
- rt_rule_entry->rule.attrib.attrib_mask = IPA_FLT_DST_ADDR;
- rt_rule_entry->rule.attrib.u.v4.dst_addr = 0xaabbccdd;
- rt_rule_entry->rule.attrib.u.v4.dst_addr_mask = 0x00000000;// All Packets will get a "Hit"
- if (false == m_routing.AddRoutingRule(rt_rule0)) {
- LOG_MSG_INFO("Routing rule addition(rt_rule0) failed!");
- Free (rt_rule0);
- return false;
- }
- Free (rt_rule0);
- LOG_MSG_INFO("Leaving ");
- return true;
- }
- bool HeaderRemovalTestFixture::ConfigureFilteringBlockWithMetaDataEq(
- enum ipa_client_type nClientType,
- unsigned int nMetaData,
- unsigned int nMetaDataMask)
- {
- const char bypass0[20] = "Bypass0";
- struct ipa_ioc_get_rt_tbl routing_table0;
- IPAFilteringTable FilterTable0;
- struct ipa_flt_rule_add flt_rule_entry;
- LOG_MSG_INFO("Entering ");
- if (!CreateBypassRoutingTablesIPv4(
- HeaderRemovalTestFixture_bypass0,
- nClientType)) {
- LOG_MSG_INFO("CreateBypassRoutingTablesIPv4 Failed");
- return false;
- }
- LOG_MSG_INFO("CreateBypassRoutingTablesIPv4 completed successfully");
- routing_table0.ip = IPA_IP_v4;
- strlcpy(routing_table0.name, bypass0, sizeof(routing_table0.name));
- if (!m_routing.GetRoutingTable(&routing_table0)) {
- LOG_MSG_INFO(
- "m_routing.GetRoutingTable(&routing_table0=0x%p) Failed."
- ,&routing_table0);
- return false;
- }
- FilterTable0.Init(IPA_IP_v4, IPA_CLIENT_TEST2_PROD, false, 1);
- LOG_MSG_INFO("FilterTable*.Init Completed Successfully..");
- // Configuring Filtering Rule No.0
- FilterTable0.GeneratePresetRule(1,flt_rule_entry);
- flt_rule_entry.at_rear = true;
- flt_rule_entry.flt_rule_hdl = -1; // return Value
- flt_rule_entry.status = -1; // return value
- flt_rule_entry.rule.action = IPA_PASS_TO_ROUTING;
- flt_rule_entry.rule.rt_tbl_hdl = routing_table0.hdl; //put here the handle corresponding to Routing Rule 1
- flt_rule_entry.rule.attrib.attrib_mask = IPA_FLT_META_DATA;
- flt_rule_entry.rule.attrib.meta_data = nMetaData;
- flt_rule_entry.rule.attrib.meta_data_mask = nMetaDataMask;
- if ( (-1 == FilterTable0.AddRuleToTable(flt_rule_entry)) ||
- !m_filtering.AddFilteringRule(FilterTable0.GetFilteringTable()))
- {
- LOG_MSG_INFO ("%s::Error Adding RuleTable(0) to Filtering, aborting...");
- return false;
- } else {
- LOG_MSG_INFO("flt rule hdl0=0x%x, status=0x%x", FilterTable0.ReadRuleFromTable(0)->flt_rule_hdl,FilterTable0.ReadRuleFromTable(0)->status);
- }
- LOG_MSG_INFO("Leaving ");
- return true;
- }
|