| /* OpenBSC Abis/IP proxy ip.access nanoBTS */ |
| |
| /* (C) 2009 by Harald Welte <laforge@gnumonks.org> |
| * (C) 2010 by On Waves |
| * (C) 2010 by Holger Hans Peter Freyther <zecke@selfish.org> |
| * |
| * All Rights Reserved |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License along |
| * with this program; if not, write to the Free Software Foundation, Inc., |
| * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
| * |
| */ |
| |
| #include <stdio.h> |
| #include <unistd.h> |
| #include <stdlib.h> |
| #include <errno.h> |
| #include <string.h> |
| #include <signal.h> |
| #include <time.h> |
| #include <sys/fcntl.h> |
| #include <sys/types.h> |
| #include <sys/socket.h> |
| #include <sys/ioctl.h> |
| #include <arpa/inet.h> |
| #include <netinet/in.h> |
| |
| #define _GNU_SOURCE |
| #include <getopt.h> |
| |
| #include <openbsc/gsm_data.h> |
| #include <osmocore/select.h> |
| #include <osmocore/tlv.h> |
| #include <osmocore/msgb.h> |
| #include <openbsc/debug.h> |
| #include <openbsc/ipaccess.h> |
| #include <osmocore/talloc.h> |
| |
| static struct log_target *stderr_target; |
| |
| /* one instance of an ip.access protocol proxy */ |
| struct ipa_proxy { |
| /* socket where we listen for incoming OML from BTS */ |
| struct bsc_fd oml_listen_fd; |
| /* socket where we listen for incoming RSL from BTS */ |
| struct bsc_fd rsl_listen_fd; |
| /* list of BTS's (struct ipa_bts_conn */ |
| struct llist_head bts_list; |
| /* the BSC reconnect timer */ |
| struct timer_list reconn_timer; |
| /* global GPRS NS data */ |
| struct in_addr gprs_addr; |
| struct in_addr listen_addr; |
| }; |
| |
| /* global pointer to the proxy structure */ |
| static struct ipa_proxy *ipp; |
| |
| struct ipa_proxy_conn { |
| struct bsc_fd fd; |
| struct llist_head tx_queue; |
| struct ipa_bts_conn *bts_conn; |
| }; |
| #define MAX_TRX 4 |
| |
| /* represents a particular BTS in our proxy */ |
| struct ipa_bts_conn { |
| /* list of BTS's (ipa_proxy->bts_list) */ |
| struct llist_head list; |
| /* back pointer to the proxy which we belong to */ |
| struct ipa_proxy *ipp; |
| /* the unit ID as determined by CCM */ |
| struct { |
| u_int16_t site_id; |
| u_int16_t bts_id; |
| } unit_id; |
| |
| /* incoming connections from BTS */ |
| struct ipa_proxy_conn *oml_conn; |
| struct ipa_proxy_conn *rsl_conn[MAX_TRX]; |
| |
| /* outgoing connections to BSC */ |
| struct ipa_proxy_conn *bsc_oml_conn; |
| struct ipa_proxy_conn *bsc_rsl_conn[MAX_TRX]; |
| |
| /* UDP sockets for BTS and BSC injection */ |
| struct bsc_fd udp_bts_fd; |
| struct bsc_fd udp_bsc_fd; |
| |
| /* NS data */ |
| struct in_addr bts_addr; |
| struct bsc_fd gprs_ns_fd; |
| int gprs_local_port; |
| uint16_t gprs_orig_port; |
| uint32_t gprs_orig_ip; |
| |
| char *id_tags[0xff]; |
| u_int8_t *id_resp; |
| unsigned int id_resp_len; |
| }; |
| |
| enum ipp_fd_type { |
| OML_FROM_BTS = 1, |
| RSL_FROM_BTS = 2, |
| OML_TO_BSC = 3, |
| RSL_TO_BSC = 4, |
| UDP_TO_BTS = 5, |
| UDP_TO_BSC = 6, |
| }; |
| |
| /* some of the code against we link from OpenBSC needs this */ |
| void *tall_bsc_ctx; |
| |
| static char *listen_ipaddr; |
| static char *bsc_ipaddr; |
| static char *gprs_ns_ipaddr; |
| |
| static int make_gprs_sock(struct bsc_fd *bfd, int (*cb)(struct bsc_fd*,unsigned int), void *); |
| static int gprs_ns_cb(struct bsc_fd *bfd, unsigned int what); |
| |
| #define PROXY_ALLOC_SIZE 1200 |
| |
| static const u_int8_t pong[] = { 0, 1, IPAC_PROTO_IPACCESS, IPAC_MSGT_PONG }; |
| static const u_int8_t id_ack[] = { 0, 1, IPAC_PROTO_IPACCESS, IPAC_MSGT_ID_ACK }; |
| static const u_int8_t id_req[] = { 0, 17, IPAC_PROTO_IPACCESS, IPAC_MSGT_ID_GET, |
| 0x01, IPAC_IDTAG_UNIT, |
| 0x01, IPAC_IDTAG_MACADDR, |
| 0x01, IPAC_IDTAG_LOCATION1, |
| 0x01, IPAC_IDTAG_LOCATION2, |
| 0x01, IPAC_IDTAG_EQUIPVERS, |
| 0x01, IPAC_IDTAG_SWVERSION, |
| 0x01, IPAC_IDTAG_UNITNAME, |
| 0x01, IPAC_IDTAG_SERNR, |
| }; |
| |
| static const char *idtag_names[] = { |
| [IPAC_IDTAG_SERNR] = "Serial_Number", |
| [IPAC_IDTAG_UNITNAME] = "Unit_Name", |
| [IPAC_IDTAG_LOCATION1] = "Location_1", |
| [IPAC_IDTAG_LOCATION2] = "Location_2", |
| [IPAC_IDTAG_EQUIPVERS] = "Equipment_Version", |
| [IPAC_IDTAG_SWVERSION] = "Software_Version", |
| [IPAC_IDTAG_IPADDR] = "IP_Address", |
| [IPAC_IDTAG_MACADDR] = "MAC_Address", |
| [IPAC_IDTAG_UNIT] = "Unit_ID", |
| }; |
| |
| static const char *ipac_idtag_name(int tag) |
| { |
| if (tag >= ARRAY_SIZE(idtag_names)) |
| return "unknown"; |
| |
| return idtag_names[tag]; |
| } |
| |
| static int ipac_idtag_parse(struct tlv_parsed *dec, unsigned char *buf, int len) |
| { |
| u_int8_t t_len; |
| u_int8_t t_tag; |
| u_int8_t *cur = buf; |
| |
| while (cur < buf + len) { |
| t_len = *cur++; |
| t_tag = *cur++; |
| |
| DEBUGPC(DMI, "%s='%s' ", ipac_idtag_name(t_tag), cur); |
| |
| dec->lv[t_tag].len = t_len; |
| dec->lv[t_tag].val = cur; |
| |
| cur += t_len; |
| } |
| return 0; |
| } |
| |
| static int parse_unitid(const char *str, u_int16_t *site_id, u_int16_t *bts_id, |
| u_int16_t *trx_id) |
| { |
| unsigned long ul; |
| char *endptr; |
| const char *nptr; |
| |
| nptr = str; |
| ul = strtoul(nptr, &endptr, 10); |
| if (endptr <= nptr) |
| return -EINVAL; |
| if (site_id) |
| *site_id = ul & 0xffff; |
| |
| if (*endptr++ != '/') |
| return -EINVAL; |
| |
| nptr = endptr; |
| ul = strtoul(nptr, &endptr, 10); |
| if (endptr <= nptr) |
| return -EINVAL; |
| if (bts_id) |
| *bts_id = ul & 0xffff; |
| |
| if (*endptr++ != '/') |
| return -EINVAL; |
| |
| nptr = endptr; |
| ul = strtoul(nptr, &endptr, 10); |
| if (endptr <= nptr) |
| return -EINVAL; |
| if (trx_id) |
| *trx_id = ul & 0xffff; |
| |
| return 0; |
| } |
| |
| static struct ipa_bts_conn *find_bts_by_unitid(struct ipa_proxy *ipp, |
| u_int16_t site_id, |
| u_int16_t bts_id) |
| { |
| struct ipa_bts_conn *ipbc; |
| |
| llist_for_each_entry(ipbc, &ipp->bts_list, list) { |
| if (ipbc->unit_id.site_id == site_id && |
| ipbc->unit_id.bts_id == bts_id) |
| return ipbc; |
| } |
| |
| return NULL; |
| } |
| |
| struct ipa_proxy_conn *alloc_conn(void) |
| { |
| struct ipa_proxy_conn *ipc; |
| |
| ipc = talloc_zero(tall_bsc_ctx, struct ipa_proxy_conn); |
| if (!ipc) |
| return NULL; |
| |
| INIT_LLIST_HEAD(&ipc->tx_queue); |
| |
| return ipc; |
| } |
| |
| static int store_idtags(struct ipa_bts_conn *ipbc, struct tlv_parsed *tlvp) |
| { |
| unsigned int i, len; |
| |
| for (i = 0; i <= 0xff; i++) { |
| if (!TLVP_PRESENT(tlvp, i)) |
| continue; |
| |
| len = TLVP_LEN(tlvp, i); |
| #if 0 |
| if (!ipbc->id_tags[i]) |
| ipbc->id_tags[i] = talloc_size(tall_bsc_ctx, len); |
| else |
| #endif |
| ipbc->id_tags[i] = talloc_realloc_size(ipbc, |
| ipbc->id_tags[i], len); |
| if (!ipbc->id_tags[i]) |
| return -ENOMEM; |
| |
| memset(ipbc->id_tags[i], 0, len); |
| //memcpy(ipbc->id_tags[i], TLVP_VAL(tlvp, i), len); |
| } |
| return 0; |
| } |
| |
| |
| static struct ipa_proxy_conn *connect_bsc(struct sockaddr_in *sa, int priv_nr, void *data); |
| |
| #define logp_ipbc_uid(ss, lvl, ipbc, trx_id) _logp_ipbc_uid(ss, lvl, __FILE__, __LINE__, ipbc, trx_id) |
| |
| static void _logp_ipbc_uid(unsigned int ss, unsigned int lvl, char *file, int line, |
| struct ipa_bts_conn *ipbc, u_int8_t trx_id) |
| { |
| if (ipbc) |
| logp2(ss, lvl, file, line, 0, "(%u/%u/%u) ", ipbc->unit_id.site_id, |
| ipbc->unit_id.bts_id, trx_id); |
| else |
| logp2(ss, lvl, file, line, 0, "unknown "); |
| } |
| |
| /* UDP socket handling */ |
| |
| static int make_sock(struct bsc_fd *bfd, u_int16_t port, int proto, int priv_nr, |
| int (*cb)(struct bsc_fd *fd, unsigned int what), |
| void *data) |
| { |
| struct sockaddr_in addr; |
| int ret, on = 1; |
| |
| bfd->fd = socket(AF_INET, SOCK_DGRAM, proto); |
| bfd->cb = cb; |
| bfd->when = BSC_FD_READ; |
| bfd->data = data; |
| bfd->priv_nr = priv_nr; |
| |
| memset(&addr, 0, sizeof(addr)); |
| addr.sin_family = AF_INET; |
| addr.sin_port = htons(port); |
| addr.sin_addr.s_addr = INADDR_ANY; |
| |
| setsockopt(bfd->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)); |
| |
| ret = bind(bfd->fd, (struct sockaddr *) &addr, sizeof(addr)); |
| if (ret < 0) { |
| LOGP(DINP, LOGL_ERROR, "could not bind socket: %s\n", |
| strerror(errno)); |
| return -EIO; |
| } |
| |
| ret = bsc_register_fd(bfd); |
| if (ret < 0) { |
| perror("register UDP fd"); |
| return ret; |
| } |
| return 0; |
| } |
| |
| static int handle_udp_read(struct bsc_fd *bfd) |
| { |
| struct ipa_bts_conn *ipbc = bfd->data; |
| struct ipa_proxy_conn *other_conn = NULL; |
| struct msgb *msg = msgb_alloc(PROXY_ALLOC_SIZE, "Abis/IP UDP"); |
| struct ipaccess_head *hh; |
| int ret; |
| |
| /* with UDP sockets, we cannot read partial packets but have to read |
| * all of it in one go */ |
| hh = (struct ipaccess_head *) msg->data; |
| ret = recv(bfd->fd, msg->data, msg->data_len, 0); |
| if (ret < 0) { |
| if (errno != EAGAIN) |
| LOGP(DINP, LOGL_ERROR, "recv error %s\n", strerror(errno)); |
| msgb_free(msg); |
| return ret; |
| } |
| if (ret == 0) { |
| DEBUGP(DINP, "UDP peer disappeared, dead socket\n"); |
| bsc_unregister_fd(bfd); |
| close(bfd->fd); |
| bfd->fd = -1; |
| msgb_free(msg); |
| return -EIO; |
| } |
| if (ret < sizeof(*hh)) { |
| DEBUGP(DINP, "could not even read header!?!\n"); |
| msgb_free(msg); |
| return -EIO; |
| } |
| msgb_put(msg, ret); |
| msg->l2h = msg->data + sizeof(*hh); |
| DEBUGP(DMI, "UDP RX: %s\n", hexdump(msg->data, msg->len)); |
| |
| if (hh->len != msg->len - sizeof(*hh)) { |
| DEBUGP(DINP, "length (%u/%u) disagrees with header(%u)\n", |
| msg->len, msg->len - 3, hh->len); |
| msgb_free(msg); |
| return -EIO; |
| } |
| |
| switch (bfd->priv_nr & 0xff) { |
| case UDP_TO_BTS: |
| /* injection towards BTS */ |
| switch (hh->proto) { |
| case IPAC_PROTO_RSL: |
| /* FIXME: what to do about TRX > 0 */ |
| other_conn = ipbc->rsl_conn[0]; |
| break; |
| default: |
| DEBUGP(DINP, "Unknown protocol 0x%02x, sending to " |
| "OML FD\n", hh->proto); |
| /* fall through */ |
| case IPAC_PROTO_IPACCESS: |
| case IPAC_PROTO_OML: |
| other_conn = ipbc->oml_conn; |
| break; |
| } |
| break; |
| case UDP_TO_BSC: |
| /* injection towards BSC */ |
| switch (hh->proto) { |
| case IPAC_PROTO_RSL: |
| /* FIXME: what to do about TRX > 0 */ |
| other_conn = ipbc->bsc_rsl_conn[0]; |
| break; |
| default: |
| DEBUGP(DINP, "Unknown protocol 0x%02x, sending to " |
| "OML FD\n", hh->proto); |
| case IPAC_PROTO_IPACCESS: |
| case IPAC_PROTO_OML: |
| other_conn = ipbc->bsc_oml_conn; |
| break; |
| } |
| break; |
| default: |
| DEBUGP(DINP, "Unknown filedescriptor priv_nr=%04x\n", bfd->priv_nr); |
| break; |
| } |
| |
| if (other_conn) { |
| /* enqueue the message for TX on the respective FD */ |
| msgb_enqueue(&other_conn->tx_queue, msg); |
| other_conn->fd.when |= BSC_FD_WRITE; |
| } else |
| msgb_free(msg); |
| |
| return 0; |
| } |
| |
| static int handle_udp_write(struct bsc_fd *bfd) |
| { |
| /* not implemented yet */ |
| bfd->when &= ~BSC_FD_WRITE; |
| |
| return -EIO; |
| } |
| |
| /* callback from select.c in case one of the fd's can be read/written */ |
| static int udp_fd_cb(struct bsc_fd *bfd, unsigned int what) |
| { |
| int rc = 0; |
| |
| if (what & BSC_FD_READ) |
| rc = handle_udp_read(bfd); |
| if (what & BSC_FD_WRITE) |
| rc = handle_udp_write(bfd); |
| |
| return rc; |
| } |
| |
| |
| static int ipbc_alloc_connect(struct ipa_proxy_conn *ipc, struct bsc_fd *bfd, |
| u_int16_t site_id, u_int16_t bts_id, |
| u_int16_t trx_id, struct tlv_parsed *tlvp, |
| struct msgb *msg) |
| { |
| struct ipa_bts_conn *ipbc; |
| u_int16_t udp_port; |
| int ret = 0; |
| struct sockaddr_in sin; |
| |
| memset(&sin, 0, sizeof(sin)); |
| sin.sin_family = AF_INET; |
| inet_aton(bsc_ipaddr, &sin.sin_addr); |
| |
| DEBUGP(DINP, "(%u/%u/%u) New BTS connection: ", |
| site_id, bts_id, trx_id); |
| |
| /* OML needs to be established before RSL */ |
| if ((bfd->priv_nr & 0xff) != OML_FROM_BTS) { |
| DEBUGPC(DINP, "Not a OML connection ?!?\n"); |
| return -EIO; |
| } |
| |
| /* allocate new BTS connection data structure */ |
| ipbc = talloc_zero(tall_bsc_ctx, struct ipa_bts_conn); |
| if (!ipbc) { |
| ret = -ENOMEM; |
| goto err_out; |
| } |
| |
| DEBUGPC(DINP, "Created BTS Conn data structure\n"); |
| ipbc->ipp = ipp; |
| ipbc->unit_id.site_id = site_id; |
| ipbc->unit_id.bts_id = bts_id; |
| ipbc->oml_conn = ipc; |
| ipc->bts_conn = ipbc; |
| |
| /* store the content of the ID TAGS for later reference */ |
| store_idtags(ipbc, tlvp); |
| ipbc->id_resp_len = msg->len; |
| ipbc->id_resp = talloc_size(tall_bsc_ctx, ipbc->id_resp_len); |
| memcpy(ipbc->id_resp, msg->data, ipbc->id_resp_len); |
| |
| /* Create OML TCP connection towards BSC */ |
| sin.sin_port = htons(IPA_TCP_PORT_OML); |
| ipbc->bsc_oml_conn = connect_bsc(&sin, OML_TO_BSC, ipbc); |
| if (!ipbc->bsc_oml_conn) { |
| ret = -EIO; |
| goto err_bsc_conn; |
| } |
| |
| DEBUGP(DINP, "(%u/%u/%u) OML Connected to BSC\n", |
| site_id, bts_id, trx_id); |
| |
| /* Create UDP socket for BTS packet injection */ |
| udp_port = 10000 + (site_id % 1000)*100 + (bts_id % 100); |
| ret = make_sock(&ipbc->udp_bts_fd, udp_port, IPPROTO_UDP, |
| UDP_TO_BTS, udp_fd_cb, ipbc); |
| if (ret < 0) |
| goto err_udp_bts; |
| DEBUGP(DINP, "(%u/%u/%u) Created UDP socket for injection " |
| "towards BTS at port %u\n", site_id, bts_id, trx_id, udp_port); |
| |
| /* Create UDP socket for BSC packet injection */ |
| udp_port = 20000 + (site_id % 1000)*100 + (bts_id % 100); |
| ret = make_sock(&ipbc->udp_bsc_fd, udp_port, IPPROTO_UDP, |
| UDP_TO_BSC, udp_fd_cb, ipbc); |
| if (ret < 0) |
| goto err_udp_bsc; |
| DEBUGP(DINP, "(%u/%u/%u) Created UDP socket for injection " |
| "towards BSC at port %u\n", site_id, bts_id, trx_id, udp_port); |
| |
| |
| /* GPRS NS related code */ |
| if (gprs_ns_ipaddr) { |
| struct sockaddr_in sock; |
| socklen_t len = sizeof(sock); |
| ret = make_gprs_sock(&ipbc->gprs_ns_fd, gprs_ns_cb, ipbc); |
| if (ret < 0) { |
| LOGP(DINP, LOGL_ERROR, "Creating the GPRS socket failed.\n"); |
| goto err_udp_bsc; |
| } |
| |
| ret = getsockname(ipbc->gprs_ns_fd.fd, (struct sockaddr* ) &sock, &len); |
| ipbc->gprs_local_port = ntohs(sock.sin_port); |
| LOGP(DINP, LOGL_NOTICE, |
| "Created GPRS NS Socket. Listening on: %s:%d\n", |
| inet_ntoa(sock.sin_addr), ipbc->gprs_local_port); |
| |
| ret = getpeername(bfd->fd, (struct sockaddr* ) &sock, &len); |
| ipbc->bts_addr = sock.sin_addr; |
| } |
| |
| llist_add(&ipbc->list, &ipp->bts_list); |
| |
| return 0; |
| |
| err_udp_bsc: |
| bsc_unregister_fd(&ipbc->udp_bts_fd); |
| err_udp_bts: |
| bsc_unregister_fd(&ipbc->bsc_oml_conn->fd); |
| close(ipbc->bsc_oml_conn->fd.fd); |
| talloc_free(ipbc->bsc_oml_conn); |
| ipbc->bsc_oml_conn = NULL; |
| err_bsc_conn: |
| talloc_free(ipbc->id_resp); |
| talloc_free(ipbc); |
| #if 0 |
| bsc_unregister_fd(bfd); |
| close(bfd->fd); |
| talloc_free(bfd); |
| #endif |
| err_out: |
| return ret; |
| } |
| |
| static int ipaccess_rcvmsg(struct ipa_proxy_conn *ipc, struct msgb *msg, |
| struct bsc_fd *bfd) |
| { |
| struct tlv_parsed tlvp; |
| u_int8_t msg_type = *(msg->l2h); |
| u_int16_t site_id, bts_id, trx_id; |
| struct ipa_bts_conn *ipbc; |
| int ret = 0; |
| |
| switch (msg_type) { |
| case IPAC_MSGT_PING: |
| ret = write(bfd->fd, pong, sizeof(pong)); |
| if (ret < 0) |
| return ret; |
| if (ret < sizeof(pong)) { |
| DEBUGP(DINP, "short write\n"); |
| return -EIO; |
| } |
| break; |
| case IPAC_MSGT_PONG: |
| DEBUGP(DMI, "PONG!\n"); |
| break; |
| case IPAC_MSGT_ID_RESP: |
| DEBUGP(DMI, "ID_RESP "); |
| /* parse tags, search for Unit ID */ |
| ipac_idtag_parse(&tlvp, (u_int8_t *)msg->l2h + 2, |
| msgb_l2len(msg)-2); |
| DEBUGP(DMI, "\n"); |
| |
| if (!TLVP_PRESENT(&tlvp, IPAC_IDTAG_UNIT)) { |
| LOGP(DINP, LOGL_ERROR, "No Unit ID in ID RESPONSE !?!\n"); |
| return -EIO; |
| } |
| |
| /* lookup BTS, create sign_link, ... */ |
| site_id = bts_id = trx_id = 0; |
| parse_unitid((char *)TLVP_VAL(&tlvp, IPAC_IDTAG_UNIT), |
| &site_id, &bts_id, &trx_id); |
| ipbc = find_bts_by_unitid(ipp, site_id, bts_id); |
| if (!ipbc) { |
| /* We have not found an ipbc (per-bts proxy instance) |
| * for this BTS yet. The first connection of a new BTS must |
| * be a OML connection. We allocate the associated data structures, |
| * and try to connect to the remote end */ |
| |
| return ipbc_alloc_connect(ipc, bfd, site_id, bts_id, |
| trx_id, &tlvp, msg); |
| /* if this fails, the caller will clean up bfd */ |
| } else { |
| struct sockaddr_in sin; |
| memset(&sin, 0, sizeof(sin)); |
| sin.sin_family = AF_INET; |
| inet_aton(bsc_ipaddr, &sin.sin_addr); |
| |
| DEBUGP(DINP, "Identified BTS %u/%u/%u\n", |
| site_id, bts_id, trx_id); |
| |
| if ((bfd->priv_nr & 0xff) != RSL_FROM_BTS) { |
| LOGP(DINP, LOGL_ERROR, "Second OML connection from " |
| "same BTS ?!?\n"); |
| return 0; |
| } |
| |
| if (trx_id > MAX_TRX) { |
| LOGP(DINP, LOGL_ERROR, "We don't support more " |
| "than %u TRX\n", MAX_TRX); |
| return -EINVAL; |
| } |
| |
| ipc->bts_conn = ipbc; |
| /* store TRX number in higher 8 bit of the bfd private number */ |
| bfd->priv_nr |= trx_id << 8; |
| ipbc->rsl_conn[trx_id] = ipc; |
| |
| /* Create RSL TCP connection towards BSC */ |
| sin.sin_port = htons(IPA_TCP_PORT_RSL); |
| ipbc->bsc_rsl_conn[trx_id] = |
| connect_bsc(&sin, RSL_TO_BSC | (trx_id << 8), ipbc); |
| if (!ipbc->bsc_oml_conn) |
| return -EIO; |
| DEBUGP(DINP, "(%u/%u/%u) Connected RSL to BSC\n", |
| site_id, bts_id, trx_id); |
| } |
| break; |
| case IPAC_MSGT_ID_GET: |
| DEBUGP(DMI, "ID_GET\n"); |
| if ((bfd->priv_nr & 0xff) != OML_TO_BSC && |
| (bfd->priv_nr & 0xff) != RSL_TO_BSC) { |
| DEBUGP(DINP, "IDentity REQuest from BTS ?!?\n"); |
| return -EIO; |
| } |
| ipbc = ipc->bts_conn; |
| if (!ipbc) { |
| DEBUGP(DINP, "ID_GET from BSC before we have ID_RESP from BTS\n"); |
| return -EIO; |
| } |
| ret = write(bfd->fd, ipbc->id_resp, ipbc->id_resp_len); |
| break; |
| case IPAC_MSGT_ID_ACK: |
| DEBUGP(DMI, "ID_ACK? -> ACK!\n"); |
| ret = write(bfd->fd, id_ack, sizeof(id_ack)); |
| break; |
| default: |
| LOGP(DMI, LOGL_ERROR, "Unhandled IPA type; %d\n", msg_type); |
| return 1; |
| break; |
| } |
| return 0; |
| } |
| |
| struct msgb *ipaccess_read_msg(struct bsc_fd *bfd, int *error) |
| { |
| struct msgb *msg = msgb_alloc(PROXY_ALLOC_SIZE, "Abis/IP"); |
| struct ipaccess_head *hh; |
| int len, ret = 0; |
| |
| if (!msg) { |
| *error = -ENOMEM; |
| return NULL; |
| } |
| |
| /* first read our 3-byte header */ |
| hh = (struct ipaccess_head *) msg->data; |
| ret = recv(bfd->fd, msg->data, 3, 0); |
| if (ret < 0) { |
| if (errno != EAGAIN) |
| LOGP(DINP, LOGL_ERROR, "recv error: %s\n", strerror(errno)); |
| msgb_free(msg); |
| *error = ret; |
| return NULL; |
| } else if (ret == 0) { |
| msgb_free(msg); |
| *error = ret; |
| return NULL; |
| } |
| |
| msgb_put(msg, ret); |
| |
| /* then read te length as specified in header */ |
| msg->l2h = msg->data + sizeof(*hh); |
| len = ntohs(hh->len); |
| ret = recv(bfd->fd, msg->l2h, len, 0); |
| if (ret < len) { |
| LOGP(DINP, LOGL_ERROR, "short read!\n"); |
| msgb_free(msg); |
| *error = -EIO; |
| return NULL; |
| } |
| msgb_put(msg, ret); |
| |
| return msg; |
| } |
| |
| static struct ipa_proxy_conn *ipc_by_priv_nr(struct ipa_bts_conn *ipbc, |
| unsigned int priv_nr) |
| { |
| struct ipa_proxy_conn *bsc_conn; |
| unsigned int trx_id = priv_nr >> 8; |
| |
| switch (priv_nr & 0xff) { |
| case OML_FROM_BTS: /* incoming OML data from BTS, forward to BSC OML */ |
| bsc_conn = ipbc->bsc_oml_conn; |
| break; |
| case RSL_FROM_BTS: /* incoming RSL data from BTS, forward to BSC RSL */ |
| bsc_conn = ipbc->bsc_rsl_conn[trx_id]; |
| break; |
| case OML_TO_BSC: /* incoming OML data from BSC, forward to BTS OML */ |
| bsc_conn = ipbc->oml_conn; |
| break; |
| case RSL_TO_BSC: /* incoming RSL data from BSC, forward to BTS RSL */ |
| bsc_conn = ipbc->rsl_conn[trx_id]; |
| break; |
| default: |
| bsc_conn = NULL; |
| break; |
| } |
| return bsc_conn; |
| } |
| |
| static void reconn_tmr_cb(void *data) |
| { |
| struct ipa_proxy *ipp = data; |
| struct ipa_bts_conn *ipbc; |
| struct sockaddr_in sin; |
| int i; |
| |
| DEBUGP(DINP, "Running reconnect timer\n"); |
| |
| memset(&sin, 0, sizeof(sin)); |
| sin.sin_family = AF_INET; |
| inet_aton(bsc_ipaddr, &sin.sin_addr); |
| |
| llist_for_each_entry(ipbc, &ipp->bts_list, list) { |
| /* if OML to BSC is dead, try to restore it */ |
| if (ipbc->oml_conn && !ipbc->bsc_oml_conn) { |
| sin.sin_port = htons(IPA_TCP_PORT_OML); |
| logp_ipbc_uid(DINP, LOGL_NOTICE, ipbc, 0); |
| LOGPC(DINP, LOGL_NOTICE, "OML Trying to reconnect\n"); |
| ipbc->bsc_oml_conn = connect_bsc(&sin, OML_TO_BSC, ipbc); |
| if (!ipbc->bsc_oml_conn) |
| goto reschedule; |
| logp_ipbc_uid(DINP, LOGL_NOTICE, ipbc, 0); |
| LOGPC(DINP, LOGL_NOTICE, "OML Reconnected\n"); |
| } |
| /* if we (still) don't have a OML connection, skip RSL */ |
| if (!ipbc->oml_conn || !ipbc->bsc_oml_conn) |
| continue; |
| |
| for (i = 0; i < ARRAY_SIZE(ipbc->rsl_conn); i++) { |
| unsigned int priv_nr; |
| /* don't establish RSL links which we don't have */ |
| if (!ipbc->rsl_conn[i]) |
| continue; |
| if (ipbc->bsc_rsl_conn[i]) |
| continue; |
| priv_nr = ipbc->rsl_conn[i]->fd.priv_nr; |
| priv_nr &= ~0xff; |
| priv_nr |= RSL_TO_BSC; |
| sin.sin_port = htons(IPA_TCP_PORT_RSL); |
| logp_ipbc_uid(DINP, LOGL_NOTICE, ipbc, priv_nr >> 8); |
| LOGPC(DINP, LOGL_NOTICE, "RSL Trying to reconnect\n"); |
| ipbc->bsc_rsl_conn[i] = connect_bsc(&sin, priv_nr, ipbc); |
| if (!ipbc->bsc_rsl_conn) |
| goto reschedule; |
| logp_ipbc_uid(DINP, LOGL_NOTICE, ipbc, priv_nr >> 8); |
| LOGPC(DINP, LOGL_NOTICE, "RSL Reconnected\n"); |
| } |
| } |
| return; |
| |
| reschedule: |
| bsc_schedule_timer(&ipp->reconn_timer, 5, 0); |
| } |
| |
| static void handle_dead_socket(struct bsc_fd *bfd) |
| { |
| struct ipa_proxy_conn *ipc = bfd->data; /* local conn */ |
| struct ipa_proxy_conn *bsc_conn; /* remote conn */ |
| struct ipa_bts_conn *ipbc = ipc->bts_conn; |
| unsigned int trx_id = bfd->priv_nr >> 8; |
| struct msgb *msg, *msg2; |
| |
| bsc_unregister_fd(bfd); |
| close(bfd->fd); |
| bfd->fd = -1; |
| |
| /* FIXME: clear tx_queue, remove all references, etc. */ |
| llist_for_each_entry_safe(msg, msg2, &ipc->tx_queue, list) |
| msgb_free(msg); |
| |
| switch (bfd->priv_nr & 0xff) { |
| case OML_FROM_BTS: /* incoming OML data from BTS, forward to BSC OML */ |
| ipbc->oml_conn = NULL; |
| bsc_conn = ipbc->bsc_oml_conn; |
| /* close the connection to the BSC */ |
| bsc_unregister_fd(&bsc_conn->fd); |
| close(bsc_conn->fd.fd); |
| llist_for_each_entry_safe(msg, msg2, &bsc_conn->tx_queue, list) |
| msgb_free(msg); |
| talloc_free(bsc_conn); |
| ipbc->bsc_oml_conn = NULL; |
| /* FIXME: do we need to delete the entire ipbc ? */ |
| break; |
| case RSL_FROM_BTS: /* incoming RSL data from BTS, forward to BSC RSL */ |
| ipbc->rsl_conn[trx_id] = NULL; |
| bsc_conn = ipbc->bsc_rsl_conn[trx_id]; |
| /* close the connection to the BSC */ |
| bsc_unregister_fd(&bsc_conn->fd); |
| close(bsc_conn->fd.fd); |
| llist_for_each_entry_safe(msg, msg2, &bsc_conn->tx_queue, list) |
| msgb_free(msg); |
| talloc_free(bsc_conn); |
| ipbc->bsc_rsl_conn[trx_id] = NULL; |
| break; |
| case OML_TO_BSC: /* incoming OML data from BSC, forward to BTS OML */ |
| ipbc->bsc_oml_conn = NULL; |
| bsc_conn = ipbc->oml_conn; |
| /* start reconnect timer */ |
| bsc_schedule_timer(&ipp->reconn_timer, 5, 0); |
| break; |
| case RSL_TO_BSC: /* incoming RSL data from BSC, forward to BTS RSL */ |
| ipbc->bsc_rsl_conn[trx_id] = NULL; |
| bsc_conn = ipbc->rsl_conn[trx_id]; |
| /* start reconnect timer */ |
| bsc_schedule_timer(&ipp->reconn_timer, 5, 0); |
| break; |
| default: |
| bsc_conn = NULL; |
| break; |
| } |
| |
| talloc_free(ipc); |
| } |
| |
| static void patch_gprs_msg(struct ipa_bts_conn *ipbc, int priv_nr, struct msgb *msg) |
| { |
| uint8_t *nsvci; |
| |
| if ((priv_nr & 0xff) != OML_FROM_BTS && (priv_nr & 0xff) != OML_TO_BSC) |
| return; |
| |
| if (msgb_l2len(msg) != 39) |
| return; |
| |
| /* |
| * Check if this is a IPA Set Attribute or IPA Set Attribute ACK |
| * and if the FOM Class is GPRS NSVC0 and then we will patch it. |
| * |
| * The patch assumes the message looks like the one from the trace |
| * but we only match messages with a specific size anyway... So |
| * this hack should work just fine. |
| */ |
| |
| if (msg->l2h[0] == 0x10 && msg->l2h[1] == 0x80 && |
| msg->l2h[2] == 0x00 && msg->l2h[3] == 0x15 && |
| msg->l2h[18] == 0xf5 && msg->l2h[19] == 0xf2) { |
| nsvci = &msg->l2h[23]; |
| ipbc->gprs_orig_port = *(u_int16_t *)(nsvci+8); |
| ipbc->gprs_orig_ip = *(u_int32_t *)(nsvci+10); |
| *(u_int16_t *)(nsvci+8) = htons(ipbc->gprs_local_port); |
| *(u_int32_t *)(nsvci+10) = ipbc->ipp->listen_addr.s_addr; |
| } else if (msg->l2h[0] == 0x10 && msg->l2h[1] == 0x80 && |
| msg->l2h[2] == 0x00 && msg->l2h[3] == 0x15 && |
| msg->l2h[18] == 0xf6 && msg->l2h[19] == 0xf2) { |
| nsvci = &msg->l2h[23]; |
| *(u_int16_t *)(nsvci+8) = ipbc->gprs_orig_port; |
| *(u_int32_t *)(nsvci+10) = ipbc->gprs_orig_ip; |
| } |
| } |
| |
| static int handle_tcp_read(struct bsc_fd *bfd) |
| { |
| struct ipa_proxy_conn *ipc = bfd->data; |
| struct ipa_bts_conn *ipbc = ipc->bts_conn; |
| struct ipa_proxy_conn *bsc_conn; |
| struct msgb *msg; |
| struct ipaccess_head *hh; |
| int ret = 0; |
| char *btsbsc; |
| |
| if ((bfd->priv_nr & 0xff) <= 2) |
| btsbsc = "BTS"; |
| else |
| btsbsc = "BSC"; |
| |
| msg = ipaccess_read_msg(bfd, &ret); |
| if (!msg) { |
| if (ret == 0) { |
| logp_ipbc_uid(DINP, LOGL_NOTICE, ipbc, bfd->priv_nr >> 8); |
| LOGPC(DINP, LOGL_NOTICE, "%s disappeared, " |
| "dead socket\n", btsbsc); |
| handle_dead_socket(bfd); |
| } |
| return ret; |
| } |
| |
| msgb_put(msg, ret); |
| logp_ipbc_uid(DMI, LOGL_DEBUG, ipbc, bfd->priv_nr >> 8); |
| DEBUGPC(DMI, "RX<-%s: %s\n", btsbsc, hexdump(msg->data, msg->len)); |
| |
| hh = (struct ipaccess_head *) msg->data; |
| if (hh->proto == IPAC_PROTO_IPACCESS) { |
| ret = ipaccess_rcvmsg(ipc, msg, bfd); |
| if (ret < 0) { |
| bsc_unregister_fd(bfd); |
| close(bfd->fd); |
| bfd->fd = -1; |
| talloc_free(bfd); |
| msgb_free(msg); |
| return ret; |
| } else if (ret == 0) { |
| /* we do not forward parts of the CCM protocol |
| * through the proxy but rather terminate it ourselves. */ |
| msgb_free(msg); |
| return ret; |
| } |
| } |
| |
| if (!ipbc) { |
| LOGP(DINP, LOGL_ERROR, |
| "received %s packet but no ipc->bts_conn?!?\n", btsbsc); |
| msgb_free(msg); |
| return -EIO; |
| } |
| |
| bsc_conn = ipc_by_priv_nr(ipbc, bfd->priv_nr); |
| if (bsc_conn) { |
| if (gprs_ns_ipaddr) |
| patch_gprs_msg(ipbc, bfd->priv_nr, msg); |
| /* enqueue packet towards BSC */ |
| msgb_enqueue(&bsc_conn->tx_queue, msg); |
| /* mark respective filedescriptor as 'we want to write' */ |
| bsc_conn->fd.when |= BSC_FD_WRITE; |
| } else { |
| logp_ipbc_uid(DINP, LOGL_INFO, ipbc, bfd->priv_nr >> 8); |
| LOGPC(DINP, LOGL_INFO, "Dropping packet from %s, " |
| "since remote connection is dead\n", btsbsc); |
| msgb_free(msg); |
| } |
| |
| return ret; |
| } |
| |
| /* a TCP socket is ready to be written to */ |
| static int handle_tcp_write(struct bsc_fd *bfd) |
| { |
| struct ipa_proxy_conn *ipc = bfd->data; |
| struct ipa_bts_conn *ipbc = ipc->bts_conn; |
| struct llist_head *lh; |
| struct msgb *msg; |
| char *btsbsc; |
| int ret; |
| |
| if ((bfd->priv_nr & 0xff) <= 2) |
| btsbsc = "BTS"; |
| else |
| btsbsc = "BSC"; |
| |
| |
| /* get the next msg for this timeslot */ |
| if (llist_empty(&ipc->tx_queue)) { |
| bfd->when &= ~BSC_FD_WRITE; |
| return 0; |
| } |
| lh = ipc->tx_queue.next; |
| llist_del(lh); |
| msg = llist_entry(lh, struct msgb, list); |
| |
| logp_ipbc_uid(DMI, LOGL_DEBUG, ipbc, bfd->priv_nr >> 8); |
| DEBUGPC(DMI, "TX %04x: %s\n", bfd->priv_nr, |
| hexdump(msg->data, msg->len)); |
| |
| ret = send(bfd->fd, msg->data, msg->len, 0); |
| msgb_free(msg); |
| |
| if (ret == 0) { |
| logp_ipbc_uid(DINP, LOGL_NOTICE, ipbc, bfd->priv_nr >> 8); |
| LOGP(DINP, LOGL_NOTICE, "%s disappeared, dead socket\n", btsbsc); |
| handle_dead_socket(bfd); |
| } |
| |
| return ret; |
| } |
| |
| /* callback from select.c in case one of the fd's can be read/written */ |
| static int ipaccess_fd_cb(struct bsc_fd *bfd, unsigned int what) |
| { |
| int rc = 0; |
| |
| if (what & BSC_FD_READ) { |
| rc = handle_tcp_read(bfd); |
| if (rc < 0) |
| return rc; |
| } |
| if (what & BSC_FD_WRITE) |
| rc = handle_tcp_write(bfd); |
| |
| return rc; |
| } |
| |
| /* callback of the listening filedescriptor */ |
| static int listen_fd_cb(struct bsc_fd *listen_bfd, unsigned int what) |
| { |
| int ret; |
| struct ipa_proxy_conn *ipc; |
| struct bsc_fd *bfd; |
| struct sockaddr_in sa; |
| socklen_t sa_len = sizeof(sa); |
| |
| if (!(what & BSC_FD_READ)) |
| return 0; |
| |
| ret = accept(listen_bfd->fd, (struct sockaddr *) &sa, &sa_len); |
| if (ret < 0) { |
| perror("accept"); |
| return ret; |
| } |
| DEBUGP(DINP, "accept()ed new %s link from %s\n", |
| (listen_bfd->priv_nr & 0xff) == OML_FROM_BTS ? "OML" : "RSL", |
| inet_ntoa(sa.sin_addr)); |
| |
| ipc = alloc_conn(); |
| if (!ipc) { |
| close(ret); |
| return -ENOMEM; |
| } |
| |
| bfd = &ipc->fd; |
| bfd->fd = ret; |
| bfd->data = ipc; |
| bfd->priv_nr = listen_bfd->priv_nr; |
| bfd->cb = ipaccess_fd_cb; |
| bfd->when = BSC_FD_READ; |
| ret = bsc_register_fd(bfd); |
| if (ret < 0) { |
| LOGP(DINP, LOGL_ERROR, "could not register FD\n"); |
| close(bfd->fd); |
| talloc_free(ipc); |
| return ret; |
| } |
| |
| /* Request ID. FIXME: request LOCATION, HW/SW VErsion, Unit Name, Serno */ |
| ret = write(bfd->fd, id_req, sizeof(id_req)); |
| |
| return 0; |
| } |
| |
| static void send_ns(int fd, const char *buf, int size, struct in_addr ip, int port) |
| { |
| int ret; |
| struct sockaddr_in addr; |
| socklen_t len = sizeof(addr); |
| memset(&addr, 0, sizeof(addr)); |
| |
| addr.sin_family = AF_INET; |
| addr.sin_port = htons(port); |
| addr.sin_addr = ip; |
| |
| ret = sendto(fd, buf, size, 0, (struct sockaddr *) &addr, len); |
| if (ret < 0) { |
| LOGP(DINP, LOGL_ERROR, "Failed to forward GPRS message.\n"); |
| } |
| } |
| |
| static int gprs_ns_cb(struct bsc_fd *bfd, unsigned int what) |
| { |
| struct ipa_bts_conn *bts; |
| char buf[4096]; |
| int ret; |
| struct sockaddr_in sock; |
| socklen_t len = sizeof(sock); |
| |
| /* 1. get the data... */ |
| ret = recvfrom(bfd->fd, buf, sizeof(buf), 0, (struct sockaddr *) &sock, &len); |
| if (ret < 0) { |
| LOGP(DINP, LOGL_ERROR, "Failed to recv GPRS NS msg: %s.\n", strerror(errno)); |
| return -1; |
| } |
| |
| bts = bfd->data; |
| |
| /* 2. figure out where to send it to */ |
| if (memcmp(&sock.sin_addr, &ipp->gprs_addr, sizeof(sock.sin_addr)) == 0) { |
| LOGP(DINP, LOGL_DEBUG, "GPRS NS msg from network.\n"); |
| send_ns(bfd->fd, buf, ret, bts->bts_addr, 23000); |
| } else if (memcmp(&sock.sin_addr, &bts->bts_addr, sizeof(sock.sin_addr)) == 0) { |
| LOGP(DINP, LOGL_DEBUG, "GPRS NS msg from BTS.\n"); |
| send_ns(bfd->fd, buf, ret, ipp->gprs_addr, 23000); |
| } else { |
| LOGP(DINP, LOGL_ERROR, "Unknown GPRS source: %s\n", inet_ntoa(sock.sin_addr)); |
| } |
| |
| return 0; |
| } |
| |
| static int make_listen_sock(struct bsc_fd *bfd, u_int16_t port, int priv_nr, |
| int (*cb)(struct bsc_fd *fd, unsigned int what)) |
| { |
| struct sockaddr_in addr; |
| int ret, on = 1; |
| |
| bfd->fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| bfd->cb = cb; |
| bfd->when = BSC_FD_READ; |
| bfd->priv_nr = priv_nr; |
| |
| memset(&addr, 0, sizeof(addr)); |
| addr.sin_family = AF_INET; |
| addr.sin_port = htons(port); |
| if (!listen_ipaddr) |
| addr.sin_addr.s_addr = INADDR_ANY; |
| else |
| inet_aton(listen_ipaddr, &addr.sin_addr); |
| |
| setsockopt(bfd->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)); |
| |
| ret = bind(bfd->fd, (struct sockaddr *) &addr, sizeof(addr)); |
| if (ret < 0) { |
| LOGP(DINP, LOGL_ERROR, |
| "Could not bind listen socket for IP %s with error: %s.\n", |
| listen_ipaddr, strerror(errno)); |
| return -EIO; |
| } |
| |
| ret = listen(bfd->fd, 1); |
| if (ret < 0) { |
| perror("listen"); |
| return ret; |
| } |
| |
| ret = bsc_register_fd(bfd); |
| if (ret < 0) { |
| perror("register_listen_fd"); |
| return ret; |
| } |
| return 0; |
| } |
| |
| static int make_gprs_sock(struct bsc_fd *bfd, int (*cb)(struct bsc_fd*,unsigned int), void *data) |
| { |
| struct sockaddr_in addr; |
| int ret; |
| |
| bfd->fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); |
| bfd->cb = cb; |
| bfd->data = data; |
| bfd->when = BSC_FD_READ; |
| |
| memset(&addr, 0, sizeof(addr)); |
| addr.sin_family = AF_INET; |
| addr.sin_port = 0; |
| inet_aton(listen_ipaddr, &addr.sin_addr); |
| |
| ret = bind(bfd->fd, (struct sockaddr *) &addr, sizeof(addr)); |
| if (ret < 0) { |
| LOGP(DINP, LOGL_ERROR, |
| "Could not bind n socket for IP %s with error: %s.\n", |
| listen_ipaddr, strerror(errno)); |
| return -EIO; |
| } |
| |
| ret = bsc_register_fd(bfd); |
| if (ret < 0) { |
| perror("register_listen_fd"); |
| return ret; |
| } |
| return 0; |
| } |
| |
| /* Actively connect to a BSC. */ |
| static struct ipa_proxy_conn *connect_bsc(struct sockaddr_in *sa, int priv_nr, void *data) |
| { |
| struct ipa_proxy_conn *ipc; |
| struct bsc_fd *bfd; |
| int ret, on = 1; |
| |
| ipc = alloc_conn(); |
| if (!ipc) |
| return NULL; |
| |
| ipc->bts_conn = data; |
| |
| bfd = &ipc->fd; |
| bfd->fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| bfd->cb = ipaccess_fd_cb; |
| bfd->when = BSC_FD_READ | BSC_FD_WRITE; |
| bfd->data = ipc; |
| bfd->priv_nr = priv_nr; |
| |
| setsockopt(bfd->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)); |
| |
| ret = connect(bfd->fd, (struct sockaddr *) sa, sizeof(*sa)); |
| if (ret < 0) { |
| LOGP(DINP, LOGL_ERROR, "Could not connect socket: %s\n", |
| inet_ntoa(sa->sin_addr)); |
| close(bfd->fd); |
| talloc_free(ipc); |
| return NULL; |
| } |
| |
| /* pre-fill tx_queue with identity request */ |
| ret = bsc_register_fd(bfd); |
| if (ret < 0) { |
| close(bfd->fd); |
| talloc_free(ipc); |
| return NULL; |
| } |
| |
| return ipc; |
| } |
| |
| static int ipaccess_proxy_setup(void) |
| { |
| int ret; |
| |
| ipp = talloc_zero(tall_bsc_ctx, struct ipa_proxy); |
| if (!ipp) |
| return -ENOMEM; |
| INIT_LLIST_HEAD(&ipp->bts_list); |
| ipp->reconn_timer.cb = reconn_tmr_cb; |
| ipp->reconn_timer.data = ipp; |
| |
| /* Listen for OML connections */ |
| ret = make_listen_sock(&ipp->oml_listen_fd, IPA_TCP_PORT_OML, |
| OML_FROM_BTS, listen_fd_cb); |
| if (ret < 0) |
| return ret; |
| |
| /* Listen for RSL connections */ |
| ret = make_listen_sock(&ipp->rsl_listen_fd, IPA_TCP_PORT_RSL, |
| RSL_FROM_BTS, listen_fd_cb); |
| |
| if (ret < 0) |
| return ret; |
| |
| /* Connect the GPRS NS Socket */ |
| if (gprs_ns_ipaddr) { |
| inet_aton(gprs_ns_ipaddr, &ipp->gprs_addr); |
| inet_aton(listen_ipaddr, &ipp->listen_addr); |
| } |
| |
| return ret; |
| } |
| |
| static void signal_handler(int signal) |
| { |
| fprintf(stdout, "signal %u received\n", signal); |
| |
| switch (signal) { |
| case SIGABRT: |
| /* in case of abort, we want to obtain a talloc report |
| * and then return to the caller, who will abort the process */ |
| case SIGUSR1: |
| talloc_report_full(tall_bsc_ctx, stderr); |
| break; |
| default: |
| break; |
| } |
| } |
| |
| static void print_help() |
| { |
| printf(" ipaccess-proxy is a proxy BTS.\n"); |
| printf(" -h --help. This help text.\n"); |
| printf(" -l --listen IP. The ip to listen to.\n"); |
| printf(" -b --bsc IP. The BSC IP address.\n"); |
| printf(" -g --gprs IP. Take GPRS NS from that IP.\n"); |
| printf("\n"); |
| printf(" -s --disable-color. Disable the color inside the logging message.\n"); |
| printf(" -e --log-level number. Set the global loglevel.\n"); |
| printf(" -T --timestamp. Prefix every log message with a timestamp.\n"); |
| printf(" -V --version. Print the version of OpenBSC.\n"); |
| } |
| |
| static void print_usage() |
| { |
| printf("Usage: ipaccess-proxy\n"); |
| } |
| |
| static void handle_options(int argc, char** argv) |
| { |
| while (1) { |
| int option_index = 0, c; |
| static struct option long_options[] = { |
| {"help", 0, 0, 'h'}, |
| {"disable-color", 0, 0, 's'}, |
| {"timestamp", 0, 0, 'T'}, |
| {"log-level", 1, 0, 'e'}, |
| {"listen", 1, 0, 'l'}, |
| {"bsc", 1, 0, 'b'}, |
| {"udp", 1, 0, 'u'}, |
| {0, 0, 0, 0} |
| }; |
| |
| c = getopt_long(argc, argv, "hsTe:l:b:g:", |
| long_options, &option_index); |
| if (c == -1) |
| break; |
| |
| switch (c) { |
| case 'h': |
| print_usage(); |
| print_help(); |
| exit(0); |
| case 'l': |
| listen_ipaddr = optarg; |
| break; |
| case 'b': |
| bsc_ipaddr = optarg; |
| break; |
| case 'g': |
| gprs_ns_ipaddr = optarg; |
| break; |
| case 's': |
| log_set_use_color(stderr_target, 0); |
| break; |
| case 'T': |
| log_set_print_timestamp(stderr_target, 1); |
| break; |
| case 'e': |
| log_set_log_level(stderr_target, atoi(optarg)); |
| break; |
| default: |
| /* ignore */ |
| break; |
| } |
| } |
| } |
| |
| int main(int argc, char **argv) |
| { |
| int rc; |
| |
| listen_ipaddr = "192.168.100.11"; |
| bsc_ipaddr = "192.168.100.239"; |
| |
| tall_bsc_ctx = talloc_named_const(NULL, 1, "ipaccess-proxy"); |
| |
| log_init(&log_info); |
| stderr_target = log_target_create_stderr(); |
| log_add_target(stderr_target); |
| log_set_all_filter(stderr_target, 1); |
| log_parse_category_mask(stderr_target, "DINP:DMI"); |
| |
| handle_options(argc, argv); |
| |
| rc = ipaccess_proxy_setup(); |
| if (rc < 0) |
| exit(1); |
| |
| signal(SIGUSR1, &signal_handler); |
| signal(SIGABRT, &signal_handler); |
| |
| while (1) { |
| bsc_select_main(0); |
| } |
| } |