M7350/qcom-opensource/kernel/kernel-tests/ip_accelerator/HeaderInsertionTests.cpp
2024-09-09 08:57:42 +00:00

797 lines
29 KiB
C++

/*
* Copyright (c) 2014-2015, The Linux Foundation. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following
* disclaimer in the documentation and/or other materials provided
* with the distribution.
* * Neither the name of The Linux Foundation nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
* IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "RoutingDriverWrapper.h"
#include "HeaderInsertion.h"
#include "Filtering.h"
#include "IPAFilteringTable.h"
#include "hton.h" // for htonl
#include "TestsUtils.h"
#include <string.h>
#define IPV4_DST_ADDR_OFFSET (16)
class IPAHeaderInsertionTestFixture: public TestBase {
public:
IPAHeaderInsertionTestFixture() : m_uBufferSize(0)
{
memset(m_aBuffer, 0, sizeof(m_aBuffer));
m_testSuiteName.push_back("Insertion");
}
virtual bool AddRules() = 0;
virtual bool ModifyPackets() = 0;
virtual bool TestLogic() = 0;
bool Setup()
{
ConfigureScenario(PHASE_FIVE_TEST_CONFIGURATION);
m_producer.Open(INTERFACE0_TO_IPA_DATA_PATH,
INTERFACE0_FROM_IPA_DATA_PATH);
m_Consumer1.Open(INTERFACE1_TO_IPA_DATA_PATH,
INTERFACE1_FROM_IPA_DATA_PATH);
m_Consumer2.Open(INTERFACE2_TO_IPA_DATA_PATH,
INTERFACE2_FROM_IPA_DATA_PATH);
m_Consumer3.Open(INTERFACE3_TO_IPA_DATA_PATH,
INTERFACE3_FROM_IPA_DATA_PATH);
if (!m_Routing.DeviceNodeIsOpened()) {
LOG_MSG_ERROR(
"Routing block is not ready for immediate commands!\n");
return false;
}
if (!m_Filtering.DeviceNodeIsOpened()) {
LOG_MSG_ERROR(
"Filtering block is not ready for immediate commands!\n");
return false;
}
if (!m_HeaderInsertion.DeviceNodeIsOpened())
{
LOG_MSG_ERROR("Header Insertion block is not ready for immediate commands!\n");
return false;
}
m_HeaderInsertion.Reset();// resetting this component will reset both Routing and Filtering tables.
return true;
} // Setup()
bool Run()
{
m_uBufferSize = BUFF_MAX_SIZE;
LOG_MSG_STACK("Entering Function");
// Add the relevant filtering rules
if (!AddRules()) {
LOG_MSG_ERROR("Failed adding filtering rules.");
return false;
}
// Load input data (IP packet) from file
if (!LoadDefaultPacket(m_eIP, m_aBuffer, m_uBufferSize)) {
LOG_MSG_ERROR("Failed default Packet");
return false;
}
if (!ModifyPackets()) {
LOG_MSG_ERROR("Failed to modify packets.");
return false;
}
if (!TestLogic()) {
LOG_MSG_ERROR("Test failed, Input and expected output mismatch.");
return false;
}
LOG_MSG_STACK("Leaving Function (Returning True)");
return true;
} // Run()
bool Teardown()
{
m_producer.Close();
m_Consumer1.Close();
m_Consumer2.Close();
m_Consumer3.Close();
return true;
} // Teardown()
~IPAHeaderInsertionTestFixture() {}
static RoutingDriverWrapper m_Routing;
static Filtering m_Filtering;
static HeaderInsertion m_HeaderInsertion;
InterfaceAbstraction m_producer;
InterfaceAbstraction m_Consumer1;
InterfaceAbstraction m_Consumer2;
InterfaceAbstraction m_Consumer3;
protected:
static const size_t BUFF_MAX_SIZE = 1024;
static const uint8_t MAX_HEADER_SIZE = 64; // 64Bytes - Max Header Length
enum ipa_ip_type m_eIP;
uint8_t m_aBuffer[BUFF_MAX_SIZE]; // Input file \ IP packet
size_t m_uBufferSize;
};
RoutingDriverWrapper IPAHeaderInsertionTestFixture::m_Routing;
Filtering IPAHeaderInsertionTestFixture::m_Filtering;
HeaderInsertion IPAHeaderInsertionTestFixture::m_HeaderInsertion;
//---------------------------------------------------------------------------/
// Test002: Test that 802.3 header was inserted Correctly /
//---------------------------------------------------------------------------/
class IPAHeaderInsertionTest001: public IPAHeaderInsertionTestFixture {
public:
IPAHeaderInsertionTest001() {
m_name = "IPAHeaderInsertionTest001";
m_description =
"Header Insertion Test 001 - Test RMNet Header Insertion\
1. Generate and commit RMNet.3 header Insertion \
2. Generate and commit routing table containing bypass rule. \
3. Generate and commit bypass filtering rule. \
4. Send a packet, and verify that the RMNet.3 Header was inserted correctly.";
Register(*this);
uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
m_nHeadertoAddSize = sizeof(aRMNetHeader);
memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
}
// Test Description:
// 1. Generate and commit single bypass routing table.
virtual bool AddRules() {
m_eIP = IPA_IP_v4;
const char bypass0[20] = "Bypass0";
struct ipa_ioc_get_rt_tbl sRoutingTable;
bool bRetVal = true;
struct ipa_ioc_get_hdr sRetHeader;
IPAFilteringTable cFilterTable;
struct ipa_flt_rule_add sFilterRuleEntry;
uint32_t nRTTableHdl=0;
memset(&sRoutingTable, 0, sizeof(sRoutingTable));
memset(&sRetHeader, 0, sizeof(sRetHeader));
strlcpy(sRetHeader.name, "IEEE802_3", sizeof(sRetHeader.name));
LOG_MSG_STACK("Entering Function");
// Create Header:
// Allocate Memory, populate it, and add in to the Header Insertion.
struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
sizeof(struct ipa_ioc_add_hdr)
+ 1 * sizeof(struct ipa_hdr_add));
if (!pHeaderDescriptor) {
LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
bRetVal = false;
goto bail;
}
pHeaderDescriptor->commit = true;
pHeaderDescriptor->num_hdrs = 1;
strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name));
memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
m_nHeadertoAddSize); //Header's Data
pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
pHeaderDescriptor->hdr[0].is_partial = false;
pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
{
LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
bRetVal = false;
goto bail;
}
if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
{
LOG_MSG_ERROR(" Failed");
bRetVal = false;
goto bail;
}
if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST2_CONS,
sRetHeader.hdl,&nRTTableHdl)) {
LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
bRetVal = false;
goto bail;
}
LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
sRoutingTable.ip = m_eIP;
strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
LOG_MSG_ERROR(
"m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
bRetVal = false;
goto bail;
}
// Creating Filtering Rules
cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,1);
LOG_MSG_INFO("Creation of filtering table completed successfully");
// Configuring Filtering Rule No.1
cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
sFilterRuleEntry.at_rear = true;
sFilterRuleEntry.flt_rule_hdl = -1; // return Value
sFilterRuleEntry.status = -1; // return value
sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl; //put here the handle corresponding to Routing Rule 1
if (
((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
!m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
)
{
LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
bRetVal = false;
goto bail;
} else
{
LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
}
bail:
Free(pHeaderDescriptor);
LOG_MSG_STACK(
"Leaving Function (Returning %s)", bRetVal?"True":"False");
return bRetVal;
} // AddRules()
virtual bool ModifyPackets() {
// This test doesn't modify the original IP Packet.
return true;
} // ModifyPacktes ()
virtual bool TestLogic() {
memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
m_aExpectedBufSize = 0;
memcpy(m_aExpectedBuffer, m_aHeadertoAdd, m_nHeadertoAddSize);
memcpy(m_aExpectedBuffer+m_nHeadertoAddSize,m_aBuffer,m_uBufferSize);
m_aExpectedBufSize = m_nHeadertoAddSize + m_uBufferSize;
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
&m_Consumer1, m_aExpectedBuffer, m_aExpectedBufSize)) {
LOG_MSG_ERROR("SendReceiveAndCompare failed.");
return false;
}
return true;
}
private:
uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
size_t m_aExpectedBufSize;
uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
size_t m_nHeadertoAddSize;
};
//---------------------------------------------------------------------------/
// Test002: Test that 802.3 header was inserted Correctly /
//---------------------------------------------------------------------------/
class IPAHeaderInsertionTest002: public IPAHeaderInsertionTestFixture {
public:
IPAHeaderInsertionTest002() {
m_name = "IPAHeaderInsertionTest002";
m_description =
"Header Insertion Test 002 - Test IEEE802.3 Header Insertion\
1. Generate and commit IEEE802.3 header Insertion \
2. Generate and commit routing table containing bypass rule. \
3. Generate and commit bypass filtering rule. \
4. Send a packet, and verify that the IEEE802.3 Header was inserted correctly \
and that the header Length was updated as well";
Register(*this);
uint8_t aIEEE802_3Header[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x46, 0xAE, 0xAF, 0xB0,// the correct size (00 46) is inserted here.
0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
m_nHeadertoAddSize = sizeof(aIEEE802_3Header);
memcpy(m_aHeadertoAdd, aIEEE802_3Header, m_nHeadertoAddSize);
}
// Test Description:
// 1. Generate and commit single bypass routing table.
virtual bool AddRules() {
m_eIP = IPA_IP_v4;
const char bypass0[20] = "Bypass0";
struct ipa_ioc_get_rt_tbl sRoutingTable;
bool bRetVal = true;
struct ipa_ioc_get_hdr sRetHeader;
IPAFilteringTable cFilterTable;
struct ipa_flt_rule_add sFilterRuleEntry;
uint32_t nRTTableHdl=0;
memset(&sRoutingTable, 0, sizeof(sRoutingTable));
memset(&sRetHeader, 0, sizeof(sRetHeader));
strlcpy(sRetHeader.name, "IEEE802_3", sizeof(sRetHeader.name));
LOG_MSG_STACK("Entering Function");
// Create Header:
// Allocate Memory, populate it, and add in to the Header Insertion.
struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
sizeof(struct ipa_ioc_add_hdr)
+ 1 * sizeof(struct ipa_hdr_add));
if (!pHeaderDescriptor) {
LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
bRetVal = false;
goto bail;
}
pHeaderDescriptor->commit = true;
pHeaderDescriptor->num_hdrs = 1;
strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name)); // Header's Name
memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
m_nHeadertoAddSize); //Header's Data
pHeaderDescriptor->hdr[0].hdr[12] = 0x00; //set length to zero, to confirm if ipa updates or not
pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize;
pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
pHeaderDescriptor->hdr[0].is_partial = false;
pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
{
LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
bRetVal = false;
goto bail;
}
if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
{
LOG_MSG_ERROR(" Failed");
bRetVal = false;
goto bail;
}
if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST3_CONS,
sRetHeader.hdl,&nRTTableHdl)) {
LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
bRetVal = false;
goto bail;
}
LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
sRoutingTable.ip = m_eIP;
strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
LOG_MSG_ERROR(
"m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
bRetVal = false;
goto bail;
}
// Creating Filtering Rules
cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,1);
LOG_MSG_INFO("Creation of filtering table completed successfully");
// Configuring Filtering Rule No.1
cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
sFilterRuleEntry.at_rear = true;
sFilterRuleEntry.flt_rule_hdl = -1; // return Value
sFilterRuleEntry.status = -1; // return value
sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl; //put here the handle corresponding to Routing Rule 1
if (
((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
!m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
)
{
LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
bRetVal = false;
goto bail;
} else
{
LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
}
bail:
Free(pHeaderDescriptor);
LOG_MSG_STACK(
"Leaving Function (Returning %s)", bRetVal?"True":"False");
return bRetVal;
} // AddRules()
virtual bool ModifyPackets() {
// This test doesn't modify the original IP Packet.
return true;
} // ModifyPacktes ()
virtual bool TestLogic() {
memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
m_aExpectedBufSize = 0;
memcpy(m_aExpectedBuffer, m_aHeadertoAdd, m_nHeadertoAddSize);
memcpy(m_aExpectedBuffer+m_nHeadertoAddSize,m_aBuffer,m_uBufferSize);
m_aExpectedBufSize = m_nHeadertoAddSize + m_uBufferSize;
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
&m_Consumer2, m_aExpectedBuffer, m_aExpectedBufSize)) {
LOG_MSG_ERROR("SendReceiveAndCompare failed.");
return false;
}
return true;
}
private:
uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
size_t m_aExpectedBufSize;
uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
size_t m_nHeadertoAddSize;
};
//---------------------------------------------------------------------------/
// Test003: Test Three Different Header Insertions /
//---------------------------------------------------------------------------/
class IPAHeaderInsertionTest003: public IPAHeaderInsertionTestFixture {
public:
IPAHeaderInsertionTest003() :
m_aExpectedBufSize(BUFF_MAX_SIZE),
m_nHeadertoAddSize1(0),
m_nHeadertoAddSize2(0),
m_nHeadertoAddSize3(0)
{
m_name = "IPAHeaderInsertionTest003";
m_description =
"Header Insertion Test 003 - Test RmNet,IEEE802.3 and IEEE802.3 with const (1) addition to the length field\
1. Generate and commit two types of header Insertion RmNet and IEE802.3 \
2. Generate and commit three routing tables. \
Each table contains a single \"bypass\" rule (all data goes to output pipe 0, 1 and 2 (accordingly)) \
Routing table 1 is used to add RmNet Header \
Routing table 2 is used to add IEEE802.3 Header (requires update of the Length field) \
Routing table 3 is used to add IEEE802.3 Header with additional const (1) to the length field \
3. Generate and commit Three filtering rules (MASK = 0xFF..FF). \
All DST_IP == 127.0.0.1 traffic goes to routing table 1 \
All DST_IP == 192.169.1.1 traffic goes to routing table 2 \
All DST_IP == 192.169.1.2 traffic goes to routing table 3";
Register(*this);
uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
uint8_t aIEEE802_3Header1[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x46, 0xAE, 0xAF, 0xB0,
0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
uint8_t aIEEE802_3Header2[22] = { 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6,
0xA7, 0xA8, 0xA9, 0xAA, 0xAB, 0x00, 0x47, 0xAE, 0xAF, 0xB0,
0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6 };
m_nHeadertoAddSize1 = sizeof(aRMNetHeader);
memcpy(m_aHeadertoAdd1, aRMNetHeader, m_nHeadertoAddSize1);
m_nHeadertoAddSize2 = sizeof(aIEEE802_3Header1);
memcpy(m_aHeadertoAdd2, aIEEE802_3Header1, m_nHeadertoAddSize2);
m_nHeadertoAddSize3 = sizeof(aIEEE802_3Header2);
memcpy(m_aHeadertoAdd3, aIEEE802_3Header2, m_nHeadertoAddSize3);
}
// Test Description:
// 1. Generate and commit single bypass routing table.
virtual bool AddRules() {
m_eIP = IPA_IP_v4;
const char aBypass1[20] = "Bypass1";
const char aBypass2[20] = "Bypass2";
const char aBypass3[20] = "Bypass3";
uint32_t nTableHdl01, nTableHdl02, nTableHdl03;
bool bRetVal = true;
IPAFilteringTable cFilterTable0;
struct ipa_flt_rule_add sFilterRuleEntry;
struct ipa_ioc_get_hdr sGetHeader1,sGetHeader2;
LOG_MSG_STACK("Entering Function");
memset(&sFilterRuleEntry, 0, sizeof(sFilterRuleEntry));
memset(&sGetHeader1, 0, sizeof(sGetHeader1));
memset(&sGetHeader2, 0, sizeof(sGetHeader2));
// Create Header:
// Allocate Memory, populate it, and add in to the Header Insertion.
struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
sizeof(struct ipa_ioc_add_hdr)
+ 2 * sizeof(struct ipa_hdr_add));
if (!pHeaderDescriptor) {
LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
bRetVal = false;
goto bail;
}
pHeaderDescriptor->commit = true;
pHeaderDescriptor->num_hdrs = 2;
// Adding Header No1.
strlcpy(pHeaderDescriptor->hdr[0].name, "RMNet", sizeof(pHeaderDescriptor->hdr[0].name)); // Header's Name
memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd1,
m_nHeadertoAddSize1); //Header's Data
pHeaderDescriptor->hdr[0].hdr_len = m_nHeadertoAddSize1;
pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
pHeaderDescriptor->hdr[0].is_partial = false;
pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
// Adding Header No2.
strlcpy(pHeaderDescriptor->hdr[1].name, "IEEE_802_3", sizeof(pHeaderDescriptor->hdr[1].name)); // Header's Name
memcpy(pHeaderDescriptor->hdr[1].hdr, m_aHeadertoAdd2,
m_nHeadertoAddSize2); //Header's Data
pHeaderDescriptor->hdr[1].hdr_len = m_nHeadertoAddSize2;
pHeaderDescriptor->hdr[1].hdr_hdl = -1; //Return Value
pHeaderDescriptor->hdr[1].is_partial = false;
pHeaderDescriptor->hdr[1].status = -1; // Return Parameter
strlcpy(sGetHeader1.name, pHeaderDescriptor->hdr[0].name, sizeof(sGetHeader1.name));
strlcpy(sGetHeader2.name, pHeaderDescriptor->hdr[1].name, sizeof(sGetHeader2.name));
if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
{
LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
bRetVal = false;
goto bail;
}
if (!m_HeaderInsertion.GetHeaderHandle(&sGetHeader1))
{
LOG_MSG_ERROR(" Failed");
bRetVal = false;
goto bail;
}
LOG_MSG_DEBUG("Received Header1 Handle = 0x%x",sGetHeader1.hdl);
if (!m_HeaderInsertion.GetHeaderHandle(&sGetHeader2))
{
LOG_MSG_ERROR(" Failed");
bRetVal = false;
goto bail;
}
LOG_MSG_DEBUG("Received Header2 Handle = 0x%x",sGetHeader2.hdl);
if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass1, IPA_CLIENT_TEST2_CONS,
sGetHeader1.hdl,&nTableHdl01)) {
LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
bRetVal = false;
goto bail;
}
if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass2, IPA_CLIENT_TEST3_CONS,
sGetHeader2.hdl,&nTableHdl02)) {
LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
bRetVal = false;
goto bail;
}
if (!CreateBypassRoutingTable(&m_Routing, m_eIP, aBypass3, IPA_CLIENT_TEST4_CONS,
sGetHeader2.hdl,&nTableHdl03)) {
LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
bRetVal = false;
goto bail;
}
LOG_MSG_INFO("Creation of three bypass routing tables completed successfully TblHdl1=0x%x, TblHdl2=0x%x, TblHdl3=0x%x",
nTableHdl01,nTableHdl02,nTableHdl03);
// Creating Filtering Rules
cFilterTable0.Init(m_eIP,IPA_CLIENT_TEST_PROD,false,3);
LOG_MSG_INFO("Creation of filtering table completed successfully");
// Configuring Filtering Rule No.1
cFilterTable0.GeneratePresetRule(1,sFilterRuleEntry);
sFilterRuleEntry.at_rear = true;
sFilterRuleEntry.flt_rule_hdl=-1; // return Value
sFilterRuleEntry.status = -1; // return value
sFilterRuleEntry.rule.action=IPA_PASS_TO_ROUTING;
sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl01; //put here the handle corresponding to Routing Rule 1
sFilterRuleEntry.rule.attrib.attrib_mask = IPA_FLT_DST_ADDR; // Destination IP Based Filtering
sFilterRuleEntry.rule.attrib.u.v4.dst_addr_mask = 0xFF0000FF; // Mask
sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0x7F000001; // Filter DST_IP == 127.0.0.1.
if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
{
LOG_MSG_ERROR ("Adding Rule (0) to Filtering table Failed.");
bRetVal = false;
goto bail;
}
// Configuring Filtering Rule No.2
sFilterRuleEntry.flt_rule_hdl=-1; // return Value
sFilterRuleEntry.status = -1; // return Value
sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl02; //put here the handle corresponding to Routing Rule 2
sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80101; // Filter DST_IP == 192.168.1.1.
if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
{
LOG_MSG_ERROR ("Adding Rule(1) to Filtering table Failed.");
bRetVal = false;
goto bail;
}
// Configuring Filtering Rule No.3
sFilterRuleEntry.flt_rule_hdl=-1; // return Value
sFilterRuleEntry.status = -1; // return value
sFilterRuleEntry.rule.rt_tbl_hdl=nTableHdl03; //put here the handle corresponding to Routing Rule 2
sFilterRuleEntry.rule.attrib.u.v4.dst_addr = 0xC0A80102; // Filter DST_IP == 192.168.1.2.
if ((uint8_t)-1 == cFilterTable0.AddRuleToTable(sFilterRuleEntry))
{
LOG_MSG_ERROR ("Adding Rule(2) to Filtering table Failed.");
bRetVal = false;
goto bail;
}
if (!m_Filtering.AddFilteringRule(cFilterTable0.GetFilteringTable())) {
LOG_MSG_ERROR ("Failed to commit Filtering rules");
bRetVal = false;
goto bail;
}
LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(0)->status);
LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(1)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(1)->status);
LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable0.ReadRuleFromTable(2)->flt_rule_hdl,cFilterTable0.ReadRuleFromTable(2)->status);
bail:
Free(pHeaderDescriptor);
LOG_MSG_STACK(
"Leaving Function (Returning %s)", bRetVal?"True":"False");
return bRetVal;
} // AddRules()
virtual bool ModifyPackets() {
// This test doesn't modify the original IP Packet.
return true;
} // ModifyPacktes ()
virtual bool TestLogic() {
bool bRetVal = true;
m_aExpectedBufSize = 0;
uint32_t nIPv4DSTAddr;
LOG_MSG_STACK("Entering Function");
//Packet No. 1
memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
nIPv4DSTAddr = ntohl(0x7F000001);
memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
memcpy(m_aExpectedBuffer, m_aHeadertoAdd1, m_nHeadertoAddSize1);
memcpy(m_aExpectedBuffer+m_nHeadertoAddSize1,m_aBuffer,m_uBufferSize);
m_aExpectedBufSize = m_nHeadertoAddSize1 + m_uBufferSize;
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
&m_Consumer1, m_aExpectedBuffer, m_aExpectedBufSize))
{
LOG_MSG_ERROR("SendReceiveAndCompare failed.");
bRetVal=false;
}
//Packet No. 2
memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
nIPv4DSTAddr = ntohl(0xC0A80101);//192.168.1.1
memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
memcpy(m_aExpectedBuffer, m_aHeadertoAdd2, m_nHeadertoAddSize2);
memcpy(m_aExpectedBuffer+m_nHeadertoAddSize2,m_aBuffer,m_uBufferSize);
m_aExpectedBufSize = m_nHeadertoAddSize2 + m_uBufferSize;
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
&m_Consumer2, m_aExpectedBuffer, m_aExpectedBufSize))
{
LOG_MSG_ERROR("SendReceiveAndCompare failed.");
bRetVal=false;
}
//Packet No. 3
nIPv4DSTAddr = ntohl(0xC0A80102);//192.168.1.2
memcpy (&m_aBuffer[IPV4_DST_ADDR_OFFSET],&nIPv4DSTAddr,sizeof(nIPv4DSTAddr));
memcpy(m_aExpectedBuffer, m_aHeadertoAdd3, m_nHeadertoAddSize3);
memcpy(m_aExpectedBuffer+m_nHeadertoAddSize3,m_aBuffer,m_uBufferSize);
m_aExpectedBufSize = m_nHeadertoAddSize3 + m_uBufferSize;
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
&m_Consumer3, m_aExpectedBuffer, m_aExpectedBufSize))
{
LOG_MSG_ERROR("SendReceiveAndCompare failed.");
bRetVal=false;
}
LOG_MSG_STACK("Leaving Function (Returning %s)",bRetVal?"True":"False");
return bRetVal;
}
private:
uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE]; // Input file / IP packet
size_t m_aExpectedBufSize;
uint8_t m_aHeadertoAdd1[MAX_HEADER_SIZE],m_aHeadertoAdd2[MAX_HEADER_SIZE],m_aHeadertoAdd3[MAX_HEADER_SIZE];
size_t m_nHeadertoAddSize1,m_nHeadertoAddSize2,m_nHeadertoAddSize3;
};
class IPAHeaderInsertionTest004: public IPAHeaderInsertionTestFixture {
public:
IPAHeaderInsertionTest004() {
m_name = "IPAHeaderInsertionTest004";
m_description =
"Header Insertion Test 004 - Test header insertion with bad len values.";
Register(*this);
uint8_t aRMNetHeader[6] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06};
m_nHeadertoAddSize = sizeof(aRMNetHeader);
memcpy(m_aHeadertoAdd, aRMNetHeader, m_nHeadertoAddSize);
}
virtual bool AddRules() {
// Not adding any rules here.
return true;
} // AddRules()
virtual bool ModifyPackets() {
// This test doesn't modify the original IP Packet.
return true;
} // ModifyPacktes ()
bool AddSingleHeaderAndCheck(uint8_t len) {
m_eIP = IPA_IP_v4;
bool bRetVal = true;
struct ipa_ioc_get_hdr sRetHeader;
memset(&sRetHeader, 0, sizeof(sRetHeader));
strlcpy(sRetHeader.name, "Generic", sizeof(sRetHeader.name));
LOG_MSG_STACK("Entering Function");
// Create Header:
// Allocate Memory, populate it, and add in to the Header Insertion.
struct ipa_ioc_add_hdr * pHeaderDescriptor = NULL;
pHeaderDescriptor = (struct ipa_ioc_add_hdr *) calloc(1,
sizeof(struct ipa_ioc_add_hdr)
+ 1 * sizeof(struct ipa_hdr_add));
if (!pHeaderDescriptor) {
LOG_MSG_ERROR("calloc failed to allocate pHeaderDescriptor");
bRetVal = false;
goto bail;
}
pHeaderDescriptor->commit = true;
pHeaderDescriptor->num_hdrs = 1;
strlcpy(pHeaderDescriptor->hdr[0].name, sRetHeader.name, sizeof(pHeaderDescriptor->hdr[0].name));
memcpy(pHeaderDescriptor->hdr[0].hdr, m_aHeadertoAdd,
m_nHeadertoAddSize); //Header's Data
pHeaderDescriptor->hdr[0].hdr_len = len;
pHeaderDescriptor->hdr[0].hdr_hdl = -1; //Return Value
pHeaderDescriptor->hdr[0].is_partial = false;
pHeaderDescriptor->hdr[0].status = -1; // Return Parameter
strlcpy(sRetHeader.name, pHeaderDescriptor->hdr[0].name, sizeof(sRetHeader.name));
if (!m_HeaderInsertion.AddHeader(pHeaderDescriptor))
{
LOG_MSG_ERROR("m_HeaderInsertion.AddHeader(pHeaderDescriptor) Failed.");
bRetVal = false;
goto bail;
}
if (!m_HeaderInsertion.GetHeaderHandle(&sRetHeader))
{
LOG_MSG_ERROR(" Failed");
bRetVal = false;
goto bail;
}
bail:
Free(pHeaderDescriptor);
LOG_MSG_STACK(
"Leaving Function (Returning %s)", bRetVal?"True":"False");
return bRetVal;
} // AddSingleHeaderAndCheck()
virtual bool TestLogic() {
// Try to add headers with invalid values.
// Valid values are between 1 to IPA_HDR_MAX_SIZE (64).
// We expect the below functions to fail.
if (AddSingleHeaderAndCheck(0)) {
LOG_MSG_ERROR("This is unexpected, this can't succeed");
return false;
}
if (AddSingleHeaderAndCheck(MAX_HEADER_SIZE + 1)) {
LOG_MSG_ERROR("This is unexpected, this can't succeed");
return false;
}
// Add one header which is OK
if (!AddSingleHeaderAndCheck(m_nHeadertoAddSize)) {
LOG_MSG_ERROR("This is unexpected, this can't succeed");
return false;
}
return true;
}
private:
uint8_t m_aHeadertoAdd[MAX_HEADER_SIZE];
size_t m_nHeadertoAddSize;
};
static IPAHeaderInsertionTest001 ipaHeaderInsertionTest001;
static IPAHeaderInsertionTest002 ipaHeaderInsertionTest002;
static IPAHeaderInsertionTest003 ipaHeaderInsertionTest003;
static IPAHeaderInsertionTest004 ipaHeaderInsertionTest004;