| /* |
| Copyright (c) 2013, The Linux Foundation. All rights reserved. |
| |
| Redistribution and use in source and binary forms, with or without |
| modification, are permitted provided that the following conditions are |
| met: |
| * Redistributions of source code must retain the above copyright |
| notice, this list of conditions and the following disclaimer. |
| * Redistributions in binary form must reproduce the above |
| copyright notice, this list of conditions and the following |
| disclaimer in the documentation and/or other materials provided |
| with the distribution. |
| * Neither the name of The Linux Foundation nor the names of its |
| contributors may be used to endorse or promote products derived |
| from this software without specific prior written permission. |
| |
| THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED |
| WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
| MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT |
| ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS |
| BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR |
| BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
| WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE |
| OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN |
| IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| /*! |
| @file |
| IPACM_Wan.cpp |
| |
| @brief |
| This file implements the WAN iface functionality. |
| |
| @Author |
| Skylar Chang |
| |
| */ |
| #ifndef IPACM_WAN_H |
| #define IPACM_WAN_H |
| |
| #include <stdio.h> |
| #include <IPACM_CmdQueue.h> |
| #include <linux/msm_ipa.h> |
| #include "IPACM_Routing.h" |
| #include "IPACM_Filtering.h" |
| #include <IPACM_Iface.h> |
| #include <IPACM_Defs.h> |
| #include <IPACM_Xml.h> |
| |
| #define IPA_NUM_DEFAULT_WAN_FILTER_RULES 3 /*1 for v4, 2 for v6*/ |
| #define IPA_V2_NUM_DEFAULT_WAN_FILTER_RULE_IPV4 2 |
| |
| #ifdef FEATURE_IPA_ANDROID |
| #define IPA_V2_NUM_DEFAULT_WAN_FILTER_RULE_IPV6 6 |
| #else |
| #define IPA_V2_NUM_DEFAULT_WAN_FILTER_RULE_IPV6 3 |
| #endif |
| |
| #define NETWORK_STATS "%s %lu %lu %lu %lu" |
| #define IPA_NETWORK_STATS_FILE_NAME "/data/misc/ipa/network_stats" |
| |
| typedef struct _wan_client_rt_hdl |
| { |
| uint32_t wan_rt_rule_hdl_v4; |
| uint32_t wan_rt_rule_hdl_v6[IPV6_NUM_ADDR]; |
| uint32_t wan_rt_rule_hdl_v6_wan[IPV6_NUM_ADDR]; |
| }wan_client_rt_hdl; |
| |
| typedef struct _ipa_wan_client |
| { |
| ipacm_event_data_wlan_ex* p_hdr_info; |
| uint8_t mac[IPA_MAC_ADDR_SIZE]; |
| uint32_t v4_addr; |
| uint32_t v6_addr[IPV6_NUM_ADDR][4]; |
| uint32_t hdr_hdl_v4; |
| uint32_t hdr_hdl_v6; |
| bool route_rule_set_v4; |
| int route_rule_set_v6; |
| bool ipv4_set; |
| int ipv6_set; |
| bool ipv4_header_set; |
| bool ipv6_header_set; |
| bool power_save_set; |
| wan_client_rt_hdl wan_rt_hdl[0]; /* depends on number of tx properties */ |
| }ipa_wan_client; |
| |
| /* wan iface */ |
| class IPACM_Wan : public IPACM_Iface |
| { |
| |
| public: |
| |
| static bool wan_up; |
| static bool wan_up_v6; |
| static uint8_t xlat_mux_id; |
| /* IPACM interface name */ |
| static char wan_up_dev_name[IF_NAME_LEN]; |
| static uint32_t curr_wan_ip; |
| IPACM_Wan(int, ipacm_wan_iface_type, uint8_t *); |
| virtual ~IPACM_Wan(); |
| |
| static bool isWanUP(int ipa_if_num_tether) |
| { |
| #ifdef FEATURE_IPA_ANDROID |
| #ifdef FEATURE_IPACM_HAL |
| return wan_up; |
| #else |
| |
| int i; |
| for (i=0; i < ipa_if_num_tether_v4_total;i++) |
| { |
| if (ipa_if_num_tether_v4[i] == ipa_if_num_tether) |
| { |
| IPACMDBG_H("support ipv4 tether_iface(%s)\n", |
| IPACM_Iface::ipacmcfg->iface_table[ipa_if_num_tether].iface_name); |
| return wan_up; |
| break; |
| } |
| } |
| return false; |
| #endif |
| #else |
| return wan_up; |
| #endif |
| } |
| |
| static bool isWanUP_V6(int ipa_if_num_tether) |
| { |
| #ifdef FEATURE_IPA_ANDROID |
| int i; |
| for (i=0; i < ipa_if_num_tether_v6_total;i++) |
| { |
| if (ipa_if_num_tether_v6[i] == ipa_if_num_tether) |
| { |
| IPACMDBG_H("support ipv6 tether_iface(%s)\n", |
| IPACM_Iface::ipacmcfg->iface_table[ipa_if_num_tether].iface_name); |
| return wan_up_v6; |
| break; |
| } |
| } |
| return false; |
| #else |
| return wan_up_v6; |
| #endif |
| } |
| |
| static uint32_t getWANIP() |
| { |
| return curr_wan_ip; |
| } |
| |
| static bool getXlat_Mux_Id() |
| { |
| return xlat_mux_id; |
| } |
| |
| void event_callback(ipa_cm_event_id event, |
| void *data); |
| |
| static struct ipa_flt_rule_add flt_rule_v4[IPA_MAX_FLT_RULE]; |
| static struct ipa_flt_rule_add flt_rule_v6[IPA_MAX_FLT_RULE]; |
| |
| static int num_v4_flt_rule; |
| static int num_v6_flt_rule; |
| |
| ipacm_wan_iface_type m_is_sta_mode; |
| static bool backhaul_is_sta_mode; |
| static bool is_ext_prop_set; |
| static uint32_t backhaul_ipv6_prefix[2]; |
| |
| static bool embms_is_on; |
| static bool backhaul_is_wan_bridge; |
| |
| static bool isWan_Bridge_Mode() |
| { |
| return backhaul_is_wan_bridge; |
| } |
| #ifdef FEATURE_IPA_ANDROID |
| /* IPACM interface id */ |
| static int ipa_if_num_tether_v4_total; |
| static int ipa_if_num_tether_v4[IPA_MAX_IFACE_ENTRIES]; |
| static int ipa_if_num_tether_v6_total; |
| static int ipa_if_num_tether_v6[IPA_MAX_IFACE_ENTRIES]; |
| #endif |
| |
| private: |
| |
| bool is_ipv6_frag_firewall_flt_rule_installed; |
| uint32_t ipv6_frag_firewall_flt_rule_hdl; |
| uint32_t *wan_route_rule_v4_hdl; |
| uint32_t *wan_route_rule_v6_hdl; |
| uint32_t *wan_route_rule_v6_hdl_a5; |
| uint32_t hdr_hdl_sta_v4; |
| uint32_t hdr_hdl_sta_v6; |
| uint32_t firewall_hdl_v4[IPACM_MAX_FIREWALL_ENTRIES]; |
| uint32_t firewall_hdl_v6[IPACM_MAX_FIREWALL_ENTRIES]; |
| uint32_t dft_wan_fl_hdl[IPA_NUM_DEFAULT_WAN_FILTER_RULES]; |
| uint32_t ipv6_dest_flt_rule_hdl[MAX_DEFAULT_v6_ROUTE_RULES]; |
| int num_ipv6_dest_flt_rule; |
| uint32_t ODU_fl_hdl[IPA_NUM_DEFAULT_WAN_FILTER_RULES]; |
| int num_firewall_v4,num_firewall_v6; |
| uint32_t wan_v4_addr; |
| uint32_t wan_v4_addr_gw; |
| uint32_t wan_v6_addr_gw[4]; |
| bool wan_v4_addr_set; |
| bool wan_v4_addr_gw_set; |
| bool wan_v6_addr_gw_set; |
| bool active_v4; |
| bool active_v6; |
| bool header_set_v4; |
| bool header_set_v6; |
| bool header_partial_default_wan_v4; |
| bool header_partial_default_wan_v6; |
| uint8_t ext_router_mac_addr[IPA_MAC_ADDR_SIZE]; |
| uint8_t netdev_mac[IPA_MAC_ADDR_SIZE]; |
| |
| static int num_ipv4_modem_pdn; |
| |
| static int num_ipv6_modem_pdn; |
| |
| int modem_ipv4_pdn_index; |
| |
| int modem_ipv6_pdn_index; |
| |
| bool is_default_gateway; |
| |
| uint32_t ipv6_prefix[2]; |
| |
| /* IPACM firewall Configuration file*/ |
| IPACM_firewall_conf_t firewall_config; |
| |
| /* STA mode wan-client*/ |
| int wan_client_len; |
| ipa_wan_client *wan_client; |
| int header_name_count; |
| int num_wan_client; |
| uint8_t invalid_mac[IPA_MAC_ADDR_SIZE]; |
| bool is_xlat; |
| |
| /* update network stats for CNE */ |
| int ipa_network_stats_fd; |
| uint32_t hdr_hdl_dummy_v6; |
| uint32_t hdr_proc_hdl_dummy_v6; |
| |
| inline ipa_wan_client* get_client_memptr(ipa_wan_client *param, int cnt) |
| { |
| char *ret = ((char *)param) + (wan_client_len * cnt); |
| return (ipa_wan_client *)ret; |
| } |
| |
| inline int get_wan_client_index(uint8_t *mac_addr) |
| { |
| int cnt; |
| int num_wan_client_tmp = num_wan_client; |
| |
| IPACMDBG_H("Passed MAC %02x:%02x:%02x:%02x:%02x:%02x\n", |
| mac_addr[0], mac_addr[1], mac_addr[2], |
| mac_addr[3], mac_addr[4], mac_addr[5]); |
| |
| for(cnt = 0; cnt < num_wan_client_tmp; cnt++) |
| { |
| IPACMDBG_H("stored MAC %02x:%02x:%02x:%02x:%02x:%02x\n", |
| get_client_memptr(wan_client, cnt)->mac[0], |
| get_client_memptr(wan_client, cnt)->mac[1], |
| get_client_memptr(wan_client, cnt)->mac[2], |
| get_client_memptr(wan_client, cnt)->mac[3], |
| get_client_memptr(wan_client, cnt)->mac[4], |
| get_client_memptr(wan_client, cnt)->mac[5]); |
| |
| if(memcmp(get_client_memptr(wan_client, cnt)->mac, |
| mac_addr, |
| sizeof(get_client_memptr(wan_client, cnt)->mac)) == 0) |
| { |
| IPACMDBG_H("Matched client index: %d\n", cnt); |
| return cnt; |
| } |
| } |
| |
| return IPACM_INVALID_INDEX; |
| } |
| |
| inline int get_wan_client_index_ipv4(uint32_t ipv4_addr) |
| { |
| int cnt; |
| int num_wan_client_tmp = num_wan_client; |
| |
| IPACMDBG_H("Passed IPv4 %x\n", ipv4_addr); |
| |
| for(cnt = 0; cnt < num_wan_client_tmp; cnt++) |
| { |
| if (get_client_memptr(wan_client, cnt)->ipv4_set) |
| { |
| IPACMDBG_H("stored IPv4 %x\n", get_client_memptr(wan_client, cnt)->v4_addr); |
| |
| if(ipv4_addr == get_client_memptr(wan_client, cnt)->v4_addr) |
| { |
| IPACMDBG_H("Matched client index: %d\n", cnt); |
| IPACMDBG_H("The MAC is %02x:%02x:%02x:%02x:%02x:%02x\n", |
| get_client_memptr(wan_client, cnt)->mac[0], |
| get_client_memptr(wan_client, cnt)->mac[1], |
| get_client_memptr(wan_client, cnt)->mac[2], |
| get_client_memptr(wan_client, cnt)->mac[3], |
| get_client_memptr(wan_client, cnt)->mac[4], |
| get_client_memptr(wan_client, cnt)->mac[5]); |
| IPACMDBG_H("header set ipv4(%d) ipv6(%d)\n", |
| get_client_memptr(wan_client, cnt)->ipv4_header_set, |
| get_client_memptr(wan_client, cnt)->ipv6_header_set); |
| return cnt; |
| } |
| } |
| } |
| return IPACM_INVALID_INDEX; |
| } |
| |
| inline int get_wan_client_index_ipv6(uint32_t* ipv6_addr) |
| { |
| int cnt, v6_num; |
| int num_wan_client_tmp = num_wan_client; |
| |
| IPACMDBG_H("Get ipv6 address 0x%08x.0x%08x.0x%08x.0x%08x\n", ipv6_addr[0], ipv6_addr[1], ipv6_addr[2], ipv6_addr[3]); |
| |
| for(cnt = 0; cnt < num_wan_client_tmp; cnt++) |
| { |
| if (get_client_memptr(wan_client, cnt)->ipv6_set) |
| { |
| for(v6_num=0;v6_num < get_client_memptr(wan_client, cnt)->ipv6_set;v6_num++) |
| { |
| |
| IPACMDBG_H("stored IPv6 0x%08x.0x%08x.0x%08x.0x%08x\n", get_client_memptr(wan_client, cnt)->v6_addr[v6_num][0], |
| get_client_memptr(wan_client, cnt)->v6_addr[v6_num][1], |
| get_client_memptr(wan_client, cnt)->v6_addr[v6_num][2], |
| get_client_memptr(wan_client, cnt)->v6_addr[v6_num][3]); |
| |
| if(ipv6_addr[0] == get_client_memptr(wan_client, cnt)->v6_addr[v6_num][0] && |
| ipv6_addr[1] == get_client_memptr(wan_client, cnt)->v6_addr[v6_num][1] && |
| ipv6_addr[2]== get_client_memptr(wan_client, cnt)->v6_addr[v6_num][2] && |
| ipv6_addr[3] == get_client_memptr(wan_client, cnt)->v6_addr[v6_num][3]) |
| { |
| IPACMDBG_H("Matched client index: %d\n", cnt); |
| IPACMDBG_H("The MAC is %02x:%02x:%02x:%02x:%02x:%02x\n", |
| get_client_memptr(wan_client, cnt)->mac[0], |
| get_client_memptr(wan_client, cnt)->mac[1], |
| get_client_memptr(wan_client, cnt)->mac[2], |
| get_client_memptr(wan_client, cnt)->mac[3], |
| get_client_memptr(wan_client, cnt)->mac[4], |
| get_client_memptr(wan_client, cnt)->mac[5]); |
| IPACMDBG_H("header set ipv4(%d) ipv6(%d)\n", |
| get_client_memptr(wan_client, cnt)->ipv4_header_set, |
| get_client_memptr(wan_client, cnt)->ipv6_header_set); |
| return cnt; |
| } |
| } |
| } |
| } |
| return IPACM_INVALID_INDEX; |
| } |
| |
| inline int delete_wan_rtrules(int clt_indx, ipa_ip_type iptype) |
| { |
| uint32_t tx_index; |
| uint32_t rt_hdl; |
| int num_v6; |
| |
| if(iptype == IPA_IP_v4) |
| { |
| for(tx_index = 0; tx_index < iface_query->num_tx_props; tx_index++) |
| { |
| if((tx_prop->tx[tx_index].ip == IPA_IP_v4) && (get_client_memptr(wan_client, clt_indx)->route_rule_set_v4==true)) /* for ipv4 */ |
| { |
| IPACMDBG_H("Delete client index %d ipv4 Qos rules for tx:%d \n",clt_indx,tx_index); |
| rt_hdl = get_client_memptr(wan_client, clt_indx)->wan_rt_hdl[tx_index].wan_rt_rule_hdl_v4; |
| |
| if(m_routing.DeleteRoutingHdl(rt_hdl, IPA_IP_v4) == false) |
| { |
| return IPACM_FAILURE; |
| } |
| } |
| } /* end of for loop */ |
| |
| /* clean the 4 Qos ipv4 RT rules for client:clt_indx */ |
| if(get_client_memptr(wan_client, clt_indx)->route_rule_set_v4==true) /* for ipv4 */ |
| { |
| get_client_memptr(wan_client, clt_indx)->route_rule_set_v4 = false; |
| } |
| } |
| |
| if(iptype == IPA_IP_v6) |
| { |
| for(tx_index = 0; tx_index < iface_query->num_tx_props; tx_index++) |
| { |
| |
| if((tx_prop->tx[tx_index].ip == IPA_IP_v6) && (get_client_memptr(wan_client, clt_indx)->route_rule_set_v6 != 0)) /* for ipv6 */ |
| { |
| for(num_v6 =0;num_v6 < get_client_memptr(wan_client, clt_indx)->route_rule_set_v6;num_v6++) |
| { |
| IPACMDBG_H("Delete client index %d ipv6 Qos rules for %d-st ipv6 for tx:%d\n", clt_indx,num_v6,tx_index); |
| rt_hdl = get_client_memptr(wan_client, clt_indx)->wan_rt_hdl[tx_index].wan_rt_rule_hdl_v6[num_v6]; |
| if(m_routing.DeleteRoutingHdl(rt_hdl, IPA_IP_v6) == false) |
| { |
| return IPACM_FAILURE; |
| } |
| |
| rt_hdl = get_client_memptr(wan_client, clt_indx)->wan_rt_hdl[tx_index].wan_rt_rule_hdl_v6_wan[num_v6]; |
| if(m_routing.DeleteRoutingHdl(rt_hdl, IPA_IP_v6) == false) |
| { |
| return IPACM_FAILURE; |
| } |
| } |
| |
| } |
| } /* end of for loop */ |
| |
| /* clean the 4 Qos ipv6 RT rules for client:clt_indx */ |
| if(get_client_memptr(wan_client, clt_indx)->route_rule_set_v6 != 0) /* for ipv6 */ |
| { |
| get_client_memptr(wan_client, clt_indx)->route_rule_set_v6 = 0; |
| } |
| } |
| |
| return IPACM_SUCCESS; |
| } |
| |
| int handle_wan_hdr_init(uint8_t *mac_addr); |
| int handle_wan_client_ipaddr(ipacm_event_data_all *data); |
| int handle_wan_client_route_rule(uint8_t *mac_addr, ipa_ip_type iptype); |
| |
| /* handle new_address event */ |
| int handle_addr_evt(ipacm_event_data_addr *data); |
| |
| /* wan default route/filter rule configuration */ |
| int handle_route_add_evt(ipa_ip_type iptype); |
| |
| /* construct complete STA ethernet header */ |
| int handle_sta_header_add_evt(); |
| |
| bool check_dft_firewall_rules_attr_mask(IPACM_firewall_conf_t *firewall_config); |
| |
| #ifdef FEATURE_IPA_ANDROID |
| /* wan posting supported tether_iface */ |
| int post_wan_up_tether_evt(ipa_ip_type iptype, int ipa_if_num_tether); |
| |
| int post_wan_down_tether_evt(ipa_ip_type iptype, int ipa_if_num_tether); |
| #endif |
| int config_dft_firewall_rules(ipa_ip_type iptype); |
| |
| /* configure the initial firewall filter rules */ |
| int config_dft_embms_rules(ipa_ioc_add_flt_rule *pFilteringTable_v4, ipa_ioc_add_flt_rule *pFilteringTable_v6); |
| |
| int handle_route_del_evt(ipa_ip_type iptype); |
| |
| int del_dft_firewall_rules(ipa_ip_type iptype); |
| |
| int handle_down_evt(); |
| |
| /*handle wan-iface down event */ |
| int handle_down_evt_ex(); |
| |
| /* wan default route/filter rule delete */ |
| int handle_route_del_evt_ex(ipa_ip_type iptype); |
| |
| /* configure the initial firewall filter rules */ |
| int config_dft_firewall_rules_ex(struct ipa_flt_rule_add* rules, int rule_offset, |
| ipa_ip_type iptype); |
| |
| /* init filtering rule in wan dl filtering table */ |
| int init_fl_rule_ex(ipa_ip_type iptype); |
| |
| /* add ICMP and ALG rules in wan dl filtering table */ |
| int add_icmp_alg_rules(struct ipa_flt_rule_add* rules, int rule_offset, ipa_ip_type iptype); |
| |
| /* query extended property */ |
| int query_ext_prop(); |
| |
| ipa_ioc_query_intf_ext_props *ext_prop; |
| |
| int config_wan_firewall_rule(ipa_ip_type iptype); |
| |
| int del_wan_firewall_rule(ipa_ip_type iptype); |
| |
| int add_dft_filtering_rule(struct ipa_flt_rule_add* rules, int rule_offset, ipa_ip_type iptype); |
| |
| int install_wan_filtering_rule(bool is_sw_routing); |
| |
| void change_to_network_order(ipa_ip_type iptype, ipa_rule_attrib* attrib); |
| |
| bool is_global_ipv6_addr(uint32_t* ipv6_addr); |
| |
| void handle_wlan_SCC_MCC_switch(bool, ipa_ip_type); |
| |
| void handle_wan_client_SCC_MCC_switch(bool, ipa_ip_type); |
| |
| int handle_network_stats_evt(); |
| |
| int m_fd_ipa; |
| |
| int handle_network_stats_update(ipa_get_apn_data_stats_resp_msg_v01 *data); |
| |
| /* construct dummy ethernet header */ |
| int add_dummy_rx_hdr(); |
| }; |
| |
| #endif /* IPACM_WAN_H */ |