aboutsummaryrefslogtreecommitdiff
path: root/data-ipa-cfg-mgr/ipacm/inc/IPACM_Wan.h
diff options
context:
space:
mode:
authordavidevinavil <davidevinavil@gmail.com>2017-01-21 16:17:49 +0100
committerdavidevinavil <davidevinavil@gmail.com>2017-01-21 16:17:49 +0100
commit5b17622206a2697dfe6e6a31a21e427fc85ab8ee (patch)
treed40c5df8451f349b65fa9515131d9158112a4270 /data-ipa-cfg-mgr/ipacm/inc/IPACM_Wan.h
parent6003cb3cfc798b2f360264911e5a28edd728426b (diff)
delete data-ipa-cfg-mgr
Change-Id: Ib82c39ba26140196a253e411dd79094ded4d5ba4
Diffstat (limited to 'data-ipa-cfg-mgr/ipacm/inc/IPACM_Wan.h')
-rw-r--r--data-ipa-cfg-mgr/ipacm/inc/IPACM_Wan.h488
1 files changed, 0 insertions, 488 deletions
diff --git a/data-ipa-cfg-mgr/ipacm/inc/IPACM_Wan.h b/data-ipa-cfg-mgr/ipacm/inc/IPACM_Wan.h
deleted file mode 100644
index 711f276..0000000
--- a/data-ipa-cfg-mgr/ipacm/inc/IPACM_Wan.h
+++ /dev/null
@@ -1,488 +0,0 @@
-/*
-Copyright (c) 2013, The Linux Foundation. All rights reserved.
-
-Redistribution and use in source and binary forms, with or without
-modification, are permitted provided that the following conditions are
-met:
- * Redistributions of source code must retain the above copyright
- notice, this list of conditions and the following disclaimer.
- * Redistributions in binary form must reproduce the above
- copyright notice, this list of conditions and the following
- disclaimer in the documentation and/or other materials provided
- with the distribution.
- * Neither the name of The Linux Foundation nor the names of its
- contributors may be used to endorse or promote products derived
- from this software without specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
-WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
-MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
-ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
-BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
-CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
-SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
-BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
-WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
-OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
-IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-*/
-/*!
- @file
- IPACM_Wan.cpp
-
- @brief
- This file implements the WAN iface functionality.
-
- @Author
- Skylar Chang
-
-*/
-#ifndef IPACM_WAN_H
-#define IPACM_WAN_H
-
-#include <stdio.h>
-#include <IPACM_CmdQueue.h>
-#include <linux/msm_ipa.h>
-#include "IPACM_Routing.h"
-#include "IPACM_Filtering.h"
-#include <IPACM_Iface.h>
-#include <IPACM_Defs.h>
-#include <IPACM_Xml.h>
-
-#define IPA_NUM_DEFAULT_WAN_FILTER_RULES 3 /*1 for v4, 2 for v6*/
-#define IPA_V2_NUM_DEFAULT_WAN_FILTER_RULE_IPV4 2
-
-#ifdef FEATURE_IPA_ANDROID
-#define IPA_V2_NUM_DEFAULT_WAN_FILTER_RULE_IPV6 6
-#else
-#define IPA_V2_NUM_DEFAULT_WAN_FILTER_RULE_IPV6 3
-#endif
-
-#define NETWORK_STATS "%s %lu %lu %lu %lu"
-#define IPA_NETWORK_STATS_FILE_NAME "/data/misc/ipa/network_stats"
-
-typedef struct _wan_client_rt_hdl
-{
- uint32_t wan_rt_rule_hdl_v4;
- uint32_t wan_rt_rule_hdl_v6[IPV6_NUM_ADDR];
- uint32_t wan_rt_rule_hdl_v6_wan[IPV6_NUM_ADDR];
-}wan_client_rt_hdl;
-
-typedef struct _ipa_wan_client
-{
- ipacm_event_data_wlan_ex* p_hdr_info;
- uint8_t mac[IPA_MAC_ADDR_SIZE];
- uint32_t v4_addr;
- uint32_t v6_addr[IPV6_NUM_ADDR][4];
- uint32_t hdr_hdl_v4;
- uint32_t hdr_hdl_v6;
- bool route_rule_set_v4;
- int route_rule_set_v6;
- bool ipv4_set;
- int ipv6_set;
- bool ipv4_header_set;
- bool ipv6_header_set;
- bool power_save_set;
- wan_client_rt_hdl wan_rt_hdl[0]; /* depends on number of tx properties */
-}ipa_wan_client;
-
-/* wan iface */
-class IPACM_Wan : public IPACM_Iface
-{
-
-public:
-
- static bool wan_up;
- static bool wan_up_v6;
- static uint8_t xlat_mux_id;
- /* IPACM interface name */
- static char wan_up_dev_name[IF_NAME_LEN];
- IPACM_Wan(int, ipacm_wan_iface_type, uint8_t *);
- virtual ~IPACM_Wan();
-
- static bool isWanUP(int ipa_if_num_tether)
- {
-#ifdef FEATURE_IPA_ANDROID
- int i;
- for (i=0; i < ipa_if_num_tether_v4_total;i++)
- {
- if (ipa_if_num_tether_v4[i] == ipa_if_num_tether)
- {
- IPACMDBG_H("support ipv4 tether_iface(%s)\n",
- IPACM_Iface::ipacmcfg->iface_table[ipa_if_num_tether].iface_name);
- return wan_up;
- break;
- }
- }
- return false;
-#else
- return wan_up;
-#endif
- }
-
- static bool isWanUP_V6(int ipa_if_num_tether)
- {
-#ifdef FEATURE_IPA_ANDROID
- int i;
- for (i=0; i < ipa_if_num_tether_v6_total;i++)
- {
- if (ipa_if_num_tether_v6[i] == ipa_if_num_tether)
- {
- IPACMDBG_H("support ipv6 tether_iface(%s)\n",
- IPACM_Iface::ipacmcfg->iface_table[ipa_if_num_tether].iface_name);
- return wan_up_v6;
- break;
- }
- }
- return false;
-#else
- return wan_up_v6;
-#endif
- }
-
- static bool getXlat_Mux_Id()
- {
- return xlat_mux_id;
- }
-
- void event_callback(ipa_cm_event_id event,
- void *data);
-
- static struct ipa_flt_rule_add flt_rule_v4[IPA_MAX_FLT_RULE];
- static struct ipa_flt_rule_add flt_rule_v6[IPA_MAX_FLT_RULE];
-
- static int num_v4_flt_rule;
- static int num_v6_flt_rule;
-
- ipacm_wan_iface_type m_is_sta_mode;
- static bool backhaul_is_sta_mode;
- static bool is_ext_prop_set;
- static uint32_t backhaul_ipv6_prefix[2];
-
- static bool embms_is_on;
- static bool backhaul_is_wan_bridge;
-
- static bool isWan_Bridge_Mode()
- {
- return backhaul_is_wan_bridge;
- }
-#ifdef FEATURE_IPA_ANDROID
- /* IPACM interface id */
- static int ipa_if_num_tether_v4_total;
- static int ipa_if_num_tether_v4[IPA_MAX_IFACE_ENTRIES];
- static int ipa_if_num_tether_v6_total;
- static int ipa_if_num_tether_v6[IPA_MAX_IFACE_ENTRIES];
-#endif
-
-private:
-
- uint32_t ipv6_frag_firewall_flt_rule_hdl;
- uint32_t *wan_route_rule_v4_hdl;
- uint32_t *wan_route_rule_v6_hdl;
- uint32_t *wan_route_rule_v6_hdl_a5;
- uint32_t hdr_hdl_sta_v4;
- uint32_t hdr_hdl_sta_v6;
- uint32_t firewall_hdl_v4[IPACM_MAX_FIREWALL_ENTRIES];
- uint32_t firewall_hdl_v6[IPACM_MAX_FIREWALL_ENTRIES];
- uint32_t dft_wan_fl_hdl[IPA_NUM_DEFAULT_WAN_FILTER_RULES];
- uint32_t ipv6_dest_flt_rule_hdl[MAX_DEFAULT_v6_ROUTE_RULES];
- int num_ipv6_dest_flt_rule;
- uint32_t ODU_fl_hdl[IPA_NUM_DEFAULT_WAN_FILTER_RULES];
- int num_firewall_v4,num_firewall_v6;
- uint32_t wan_v4_addr;
- uint32_t wan_v4_addr_gw;
- uint32_t wan_v6_addr_gw[4];
- bool wan_v4_addr_set;
- bool wan_v4_addr_gw_set;
- bool wan_v6_addr_gw_set;
- bool active_v4;
- bool active_v6;
- bool header_set_v4;
- bool header_set_v6;
- bool header_partial_default_wan_v4;
- bool header_partial_default_wan_v6;
- uint8_t ext_router_mac_addr[IPA_MAC_ADDR_SIZE];
-
- static int num_ipv4_modem_pdn;
-
- static int num_ipv6_modem_pdn;
-
- int modem_ipv4_pdn_index;
-
- int modem_ipv6_pdn_index;
-
- bool is_default_gateway;
-
- uint32_t ipv6_prefix[2];
-
- /* IPACM firewall Configuration file*/
- IPACM_firewall_conf_t firewall_config;
-
- /* STA mode wan-client*/
- int wan_client_len;
- ipa_wan_client *wan_client;
- int header_name_count;
- int num_wan_client;
- uint8_t invalid_mac[IPA_MAC_ADDR_SIZE];
- bool is_xlat;
-
- /* update network stats for CNE */
- int ipa_network_stats_fd;
-
- inline ipa_wan_client* get_client_memptr(ipa_wan_client *param, int cnt)
- {
- char *ret = ((char *)param) + (wan_client_len * cnt);
- return (ipa_wan_client *)ret;
- }
-
- inline int get_wan_client_index(uint8_t *mac_addr)
- {
- int cnt;
- int num_wan_client_tmp = num_wan_client;
-
- IPACMDBG_H("Passed MAC %02x:%02x:%02x:%02x:%02x:%02x\n",
- mac_addr[0], mac_addr[1], mac_addr[2],
- mac_addr[3], mac_addr[4], mac_addr[5]);
-
- for(cnt = 0; cnt < num_wan_client_tmp; cnt++)
- {
- IPACMDBG_H("stored MAC %02x:%02x:%02x:%02x:%02x:%02x\n",
- get_client_memptr(wan_client, cnt)->mac[0],
- get_client_memptr(wan_client, cnt)->mac[1],
- get_client_memptr(wan_client, cnt)->mac[2],
- get_client_memptr(wan_client, cnt)->mac[3],
- get_client_memptr(wan_client, cnt)->mac[4],
- get_client_memptr(wan_client, cnt)->mac[5]);
-
- if(memcmp(get_client_memptr(wan_client, cnt)->mac,
- mac_addr,
- sizeof(get_client_memptr(wan_client, cnt)->mac)) == 0)
- {
- IPACMDBG_H("Matched client index: %d\n", cnt);
- return cnt;
- }
- }
-
- return IPACM_INVALID_INDEX;
- }
-
- inline int get_wan_client_index_ipv4(uint32_t ipv4_addr)
- {
- int cnt;
- int num_wan_client_tmp = num_wan_client;
-
- IPACMDBG_H("Passed IPv4 %x\n", ipv4_addr);
-
- for(cnt = 0; cnt < num_wan_client_tmp; cnt++)
- {
- if (get_client_memptr(wan_client, cnt)->ipv4_set)
- {
- IPACMDBG_H("stored IPv4 %x\n", get_client_memptr(wan_client, cnt)->v4_addr);
-
- if(ipv4_addr == get_client_memptr(wan_client, cnt)->v4_addr)
- {
- IPACMDBG_H("Matched client index: %d\n", cnt);
- IPACMDBG_H("The MAC is %02x:%02x:%02x:%02x:%02x:%02x\n",
- get_client_memptr(wan_client, cnt)->mac[0],
- get_client_memptr(wan_client, cnt)->mac[1],
- get_client_memptr(wan_client, cnt)->mac[2],
- get_client_memptr(wan_client, cnt)->mac[3],
- get_client_memptr(wan_client, cnt)->mac[4],
- get_client_memptr(wan_client, cnt)->mac[5]);
- IPACMDBG_H("header set ipv4(%d) ipv6(%d)\n",
- get_client_memptr(wan_client, cnt)->ipv4_header_set,
- get_client_memptr(wan_client, cnt)->ipv6_header_set);
- return cnt;
- }
- }
- }
- return IPACM_INVALID_INDEX;
- }
-
- inline int get_wan_client_index_ipv6(uint32_t* ipv6_addr)
- {
- int cnt, v6_num;
- int num_wan_client_tmp = num_wan_client;
-
- IPACMDBG_H("Get ipv6 address 0x%08x.0x%08x.0x%08x.0x%08x\n", ipv6_addr[0], ipv6_addr[1], ipv6_addr[2], ipv6_addr[3]);
-
- for(cnt = 0; cnt < num_wan_client_tmp; cnt++)
- {
- if (get_client_memptr(wan_client, cnt)->ipv6_set)
- {
- for(v6_num=0;v6_num < get_client_memptr(wan_client, cnt)->ipv6_set;v6_num++)
- {
-
- IPACMDBG_H("stored IPv6 0x%08x.0x%08x.0x%08x.0x%08x\n", get_client_memptr(wan_client, cnt)->v6_addr[v6_num][0],
- get_client_memptr(wan_client, cnt)->v6_addr[v6_num][1],
- get_client_memptr(wan_client, cnt)->v6_addr[v6_num][2],
- get_client_memptr(wan_client, cnt)->v6_addr[v6_num][3]);
-
- if(ipv6_addr[0] == get_client_memptr(wan_client, cnt)->v6_addr[v6_num][0] &&
- ipv6_addr[1] == get_client_memptr(wan_client, cnt)->v6_addr[v6_num][1] &&
- ipv6_addr[2]== get_client_memptr(wan_client, cnt)->v6_addr[v6_num][2] &&
- ipv6_addr[3] == get_client_memptr(wan_client, cnt)->v6_addr[v6_num][3])
- {
- IPACMDBG_H("Matched client index: %d\n", cnt);
- IPACMDBG_H("The MAC is %02x:%02x:%02x:%02x:%02x:%02x\n",
- get_client_memptr(wan_client, cnt)->mac[0],
- get_client_memptr(wan_client, cnt)->mac[1],
- get_client_memptr(wan_client, cnt)->mac[2],
- get_client_memptr(wan_client, cnt)->mac[3],
- get_client_memptr(wan_client, cnt)->mac[4],
- get_client_memptr(wan_client, cnt)->mac[5]);
- IPACMDBG_H("header set ipv4(%d) ipv6(%d)\n",
- get_client_memptr(wan_client, cnt)->ipv4_header_set,
- get_client_memptr(wan_client, cnt)->ipv6_header_set);
- return cnt;
- }
- }
- }
- }
- return IPACM_INVALID_INDEX;
- }
-
- inline int delete_wan_rtrules(int clt_indx, ipa_ip_type iptype)
- {
- uint32_t tx_index;
- uint32_t rt_hdl;
- int num_v6;
-
- if(iptype == IPA_IP_v4)
- {
- for(tx_index = 0; tx_index < iface_query->num_tx_props; tx_index++)
- {
- if((tx_prop->tx[tx_index].ip == IPA_IP_v4) && (get_client_memptr(wan_client, clt_indx)->route_rule_set_v4==true)) /* for ipv4 */
- {
- IPACMDBG_H("Delete client index %d ipv4 Qos rules for tx:%d \n",clt_indx,tx_index);
- rt_hdl = get_client_memptr(wan_client, clt_indx)->wan_rt_hdl[tx_index].wan_rt_rule_hdl_v4;
-
- if(m_routing.DeleteRoutingHdl(rt_hdl, IPA_IP_v4) == false)
- {
- return IPACM_FAILURE;
- }
- }
- } /* end of for loop */
-
- /* clean the 4 Qos ipv4 RT rules for client:clt_indx */
- if(get_client_memptr(wan_client, clt_indx)->route_rule_set_v4==true) /* for ipv4 */
- {
- get_client_memptr(wan_client, clt_indx)->route_rule_set_v4 = false;
- }
- }
-
- if(iptype == IPA_IP_v6)
- {
- for(tx_index = 0; tx_index < iface_query->num_tx_props; tx_index++)
- {
-
- if((tx_prop->tx[tx_index].ip == IPA_IP_v6) && (get_client_memptr(wan_client, clt_indx)->route_rule_set_v6 != 0)) /* for ipv6 */
- {
- for(num_v6 =0;num_v6 < get_client_memptr(wan_client, clt_indx)->route_rule_set_v6;num_v6++)
- {
- IPACMDBG_H("Delete client index %d ipv6 Qos rules for %d-st ipv6 for tx:%d\n", clt_indx,num_v6,tx_index);
- rt_hdl = get_client_memptr(wan_client, clt_indx)->wan_rt_hdl[tx_index].wan_rt_rule_hdl_v6[num_v6];
- if(m_routing.DeleteRoutingHdl(rt_hdl, IPA_IP_v6) == false)
- {
- return IPACM_FAILURE;
- }
-
- rt_hdl = get_client_memptr(wan_client, clt_indx)->wan_rt_hdl[tx_index].wan_rt_rule_hdl_v6_wan[num_v6];
- if(m_routing.DeleteRoutingHdl(rt_hdl, IPA_IP_v6) == false)
- {
- return IPACM_FAILURE;
- }
- }
-
- }
- } /* end of for loop */
-
- /* clean the 4 Qos ipv6 RT rules for client:clt_indx */
- if(get_client_memptr(wan_client, clt_indx)->route_rule_set_v6 != 0) /* for ipv6 */
- {
- get_client_memptr(wan_client, clt_indx)->route_rule_set_v6 = 0;
- }
- }
-
- return IPACM_SUCCESS;
- }
-
- int handle_wan_hdr_init(uint8_t *mac_addr);
- int handle_wan_client_ipaddr(ipacm_event_data_all *data);
- int handle_wan_client_route_rule(uint8_t *mac_addr, ipa_ip_type iptype);
-
- /* handle new_address event */
- int handle_addr_evt(ipacm_event_data_addr *data);
-
- /* wan default route/filter rule configuration */
- int handle_route_add_evt(ipa_ip_type iptype);
-
- /* construct complete STA ethernet header */
- int handle_sta_header_add_evt();
-
- bool check_dft_firewall_rules_attr_mask(IPACM_firewall_conf_t *firewall_config);
-
-#ifdef FEATURE_IPA_ANDROID
- /* wan posting supported tether_iface */
- int post_wan_up_tether_evt(ipa_ip_type iptype, int ipa_if_num_tether);
-
- int post_wan_down_tether_evt(ipa_ip_type iptype, int ipa_if_num_tether);
-#endif
- int config_dft_firewall_rules(ipa_ip_type iptype);
-
- /* configure the initial firewall filter rules */
- int config_dft_embms_rules(ipa_ioc_add_flt_rule *pFilteringTable_v4, ipa_ioc_add_flt_rule *pFilteringTable_v6);
-
- int handle_route_del_evt(ipa_ip_type iptype);
-
- int del_dft_firewall_rules(ipa_ip_type iptype);
-
- int handle_down_evt();
-
- /*handle wan-iface down event */
- int handle_down_evt_ex();
-
- /* wan default route/filter rule delete */
- int handle_route_del_evt_ex(ipa_ip_type iptype);
-
- /* configure the initial firewall filter rules */
- int config_dft_firewall_rules_ex(struct ipa_flt_rule_add* rules, int rule_offset,
- ipa_ip_type iptype);
-
- /* Change IP Type.*/
- void config_ip_type(ipa_ip_type iptype);
-
- /* init filtering rule in wan dl filtering table */
- int init_fl_rule_ex(ipa_ip_type iptype);
-
- /* add ICMP and ALG rules in wan dl filtering table */
- int add_icmp_alg_rules(struct ipa_flt_rule_add* rules, int rule_offset, ipa_ip_type iptype);
-
- /* query extended property */
- int query_ext_prop();
-
- ipa_ioc_query_intf_ext_props *ext_prop;
-
- int config_wan_firewall_rule(ipa_ip_type iptype);
-
- int del_wan_firewall_rule(ipa_ip_type iptype);
-
- int add_dft_filtering_rule(struct ipa_flt_rule_add* rules, int rule_offset, ipa_ip_type iptype);
-
- int install_wan_filtering_rule(bool is_sw_routing);
-
- void change_to_network_order(ipa_ip_type iptype, ipa_rule_attrib* attrib);
-
- bool is_global_ipv6_addr(uint32_t* ipv6_addr);
-
- void handle_wlan_SCC_MCC_switch(bool, ipa_ip_type);
- void handle_wan_client_SCC_MCC_switch(bool, ipa_ip_type);
-
- int handle_network_stats_evt();
-
- int m_fd_ipa;
-
- int handle_network_stats_update(ipa_get_apn_data_stats_resp_msg_v01 *data);
-};
-
-#endif /* IPACM_WAN_H */