| /* BSC Multiplexer/NAT */ |
| |
| /* |
| * (C) 2010 by Holger Hans Peter Freyther <zecke@selfish.org> |
| * (C) 2010 by On-Waves |
| * (C) 2009 by Harald Welte <laforge@gnumonks.org> |
| * All Rights Reserved |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License along |
| * with this program; if not, write to the Free Software Foundation, Inc., |
| * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
| * |
| */ |
| #include <sys/socket.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| |
| #include <errno.h> |
| #include <signal.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <time.h> |
| #include <unistd.h> |
| |
| #define _GNU_SOURCE |
| #include <getopt.h> |
| |
| #include <openbsc/debug.h> |
| #include <openbsc/bsc_msc.h> |
| #include <openbsc/bsc_nat.h> |
| #include <openbsc/bssap.h> |
| #include <openbsc/ipaccess.h> |
| #include <openbsc/abis_nm.h> |
| #include <openbsc/telnet_interface.h> |
| |
| #include <osmocore/talloc.h> |
| |
| #include <vty/vty.h> |
| |
| #include <sccp/sccp.h> |
| |
| struct debug_target *stderr_target; |
| static const char *config_file = "bsc-nat.cfg"; |
| static char *msc_address = "127.0.0.1"; |
| static struct in_addr local_addr; |
| static struct bsc_msc_connection *msc_con; |
| static struct bsc_fd bsc_listen; |
| |
| |
| static struct bsc_nat *nat; |
| static void bsc_write(struct bsc_connection *bsc, const u_int8_t *data, unsigned int length); |
| static void remove_bsc_connection(struct bsc_connection *connection); |
| |
| struct bsc_config *bsc_config_num(struct bsc_nat *nat, int num) |
| { |
| struct bsc_config *conf; |
| |
| llist_for_each_entry(conf, &nat->bsc_configs, entry) |
| if (conf->nr == num) |
| return conf; |
| |
| return NULL; |
| } |
| |
| /* |
| * below are stubs we need to link |
| */ |
| int nm_state_event(enum nm_evt evt, u_int8_t obj_class, void *obj, |
| struct gsm_nm_state *old_state, struct gsm_nm_state *new_state) |
| { |
| return -1; |
| } |
| |
| void input_event(int event, enum e1inp_sign_type type, struct gsm_bts_trx *trx) |
| {} |
| |
| int gsm0408_rcvmsg(struct msgb *msg, u_int8_t link_id) |
| { |
| return -1; |
| } |
| |
| static void send_reset_ack(struct bsc_connection *bsc) |
| { |
| static const u_int8_t gsm_reset_ack[] = { |
| 0x00, 0x13, 0xfd, |
| 0x09, 0x00, 0x03, 0x07, 0x0b, 0x04, 0x43, 0x01, |
| 0x00, 0xfe, 0x04, 0x43, 0x5c, 0x00, 0xfe, 0x03, |
| 0x00, 0x01, 0x31, |
| }; |
| |
| bsc_write(bsc, gsm_reset_ack, sizeof(gsm_reset_ack)); |
| } |
| |
| static void send_id_ack(struct bsc_connection *bsc) |
| { |
| static const u_int8_t id_ack[] = { |
| 0, 1, IPAC_PROTO_IPACCESS, IPAC_MSGT_ID_ACK |
| }; |
| |
| bsc_write(bsc, id_ack, sizeof(id_ack)); |
| } |
| |
| static void send_id_req(struct bsc_connection *bsc) |
| { |
| static const u_int8_t id_req[] = { |
| 0, 17, IPAC_PROTO_IPACCESS, IPAC_MSGT_ID_GET, |
| 0x01, IPAC_IDTAG_UNIT, |
| 0x01, IPAC_IDTAG_MACADDR, |
| 0x01, IPAC_IDTAG_LOCATION1, |
| 0x01, IPAC_IDTAG_LOCATION2, |
| 0x01, IPAC_IDTAG_EQUIPVERS, |
| 0x01, IPAC_IDTAG_SWVERSION, |
| 0x01, IPAC_IDTAG_UNITNAME, |
| 0x01, IPAC_IDTAG_SERNR, |
| }; |
| |
| bsc_write(bsc, id_req, sizeof(id_req)); |
| } |
| |
| static void send_mgcp_reset(struct bsc_connection *bsc) |
| { |
| static const u_int8_t mgcp_reset[] = { |
| "RSIP 1 13@mgw MGCP 1.0\r\n" |
| }; |
| |
| bsc_write_mgcp(bsc, mgcp_reset, sizeof mgcp_reset - 1); |
| } |
| |
| /* |
| * Below is the handling of messages coming |
| * from the MSC and need to be forwarded to |
| * a real BSC. |
| */ |
| static void initialize_msc_if_needed() |
| { |
| static int init = 0; |
| init = 1; |
| |
| /* do we need to send a GSM 08.08 message here? */ |
| } |
| |
| /* |
| * Currently we are lacking refcounting so we need to copy each message. |
| */ |
| static void bsc_write(struct bsc_connection *bsc, const u_int8_t *data, unsigned int length) |
| { |
| struct msgb *msg; |
| |
| if (length > 4096) { |
| LOGP(DINP, LOGL_ERROR, "Can not send message of that size.\n"); |
| return; |
| } |
| |
| msg = msgb_alloc(4096, "to-bsc"); |
| if (!msg) { |
| LOGP(DINP, LOGL_ERROR, "Failed to allocate memory for BSC msg.\n"); |
| return; |
| } |
| |
| msgb_put(msg, length); |
| memcpy(msg->data, data, length); |
| if (write_queue_enqueue(&bsc->write_queue, msg) != 0) { |
| LOGP(DINP, LOGL_ERROR, "Failed to enqueue the write.\n"); |
| msgb_free(msg); |
| } |
| } |
| |
| static int forward_sccp_to_bts(struct msgb *msg) |
| { |
| struct sccp_connections *con; |
| struct bsc_connection *bsc; |
| struct bsc_nat_parsed *parsed; |
| |
| /* filter, drop, patch the message? */ |
| parsed = bsc_nat_parse(msg); |
| if (!parsed) { |
| LOGP(DNAT, LOGL_ERROR, "Can not parse msg from BSC.\n"); |
| return -1; |
| } |
| |
| if (bsc_nat_filter_ipa(DIR_BSC, msg, parsed)) |
| goto exit; |
| |
| /* Route and modify the SCCP packet */ |
| if (parsed->ipa_proto == IPAC_PROTO_SCCP) { |
| switch (parsed->sccp_type) { |
| case SCCP_MSG_TYPE_UDT: |
| /* forward UDT messages to every BSC */ |
| goto send_to_all; |
| break; |
| case SCCP_MSG_TYPE_RLSD: |
| case SCCP_MSG_TYPE_CREF: |
| case SCCP_MSG_TYPE_DT1: |
| con = patch_sccp_src_ref_to_bsc(msg, parsed, nat); |
| if (parsed->gsm_type == BSS_MAP_MSG_ASSIGMENT_RQST) { |
| if (con) { |
| if (bsc_mgcp_assign(con, msg) != 0) |
| LOGP(DNAT, LOGL_ERROR, "Failed to assign...\n"); |
| } else |
| LOGP(DNAT, LOGL_ERROR, "Assignment command but no BSC.\n"); |
| } |
| break; |
| case SCCP_MSG_TYPE_CC: |
| con = patch_sccp_src_ref_to_bsc(msg, parsed, nat); |
| if (!con || update_sccp_src_ref(con, parsed) != 0) |
| goto exit; |
| break; |
| case SCCP_MSG_TYPE_RLC: |
| LOGP(DNAT, LOGL_ERROR, "Unexpected release complete from MSC.\n"); |
| goto exit; |
| break; |
| case SCCP_MSG_TYPE_CR: |
| /* MSC never opens a SCCP connection, fall through */ |
| default: |
| goto exit; |
| } |
| } |
| |
| talloc_free(parsed); |
| if (!con) |
| return -1; |
| if (!con->bsc->authenticated) { |
| LOGP(DNAT, LOGL_ERROR, "Selected BSC not authenticated.\n"); |
| return -1; |
| } |
| |
| bsc_write(con->bsc, msg->data, msg->len); |
| return 0; |
| |
| send_to_all: |
| /* |
| * Filter Paging from the network. We do not want to send a PAGING |
| * Command to every BSC in our network. We will analys the PAGING |
| * message and then send it to the authenticated messages... |
| */ |
| if (parsed->ipa_proto == IPAC_PROTO_SCCP && parsed->gsm_type == BSS_MAP_MSG_PAGING) { |
| bsc = bsc_nat_find_bsc(nat, msg); |
| if (bsc) |
| bsc_write(bsc, msg->data, msg->len); |
| else |
| LOGP(DNAT, LOGL_ERROR, "Could not determine BSC for paging.\n"); |
| |
| goto exit; |
| } |
| /* currently send this to every BSC connected */ |
| llist_for_each_entry(bsc, &nat->bsc_connections, list_entry) { |
| if (!bsc->authenticated) |
| continue; |
| |
| bsc_write(bsc, msg->data, msg->len); |
| } |
| |
| exit: |
| talloc_free(parsed); |
| return 0; |
| } |
| |
| static void msc_connection_was_lost(struct bsc_msc_connection *con) |
| { |
| struct bsc_connection *bsc, *tmp; |
| |
| LOGP(DMSC, LOGL_ERROR, "Closing all connections downstream.\n"); |
| llist_for_each_entry_safe(bsc, tmp, &nat->bsc_connections, list_entry) |
| remove_bsc_connection(bsc); |
| |
| bsc_mgcp_free_endpoints(nat); |
| bsc_msc_schedule_connect(con); |
| } |
| |
| static int ipaccess_msc_read_cb(struct bsc_fd *bfd) |
| { |
| int error; |
| struct msgb *msg = ipaccess_read_msg(bfd, &error); |
| struct ipaccess_head *hh; |
| |
| if (!msg) { |
| if (error == 0) { |
| LOGP(DNAT, LOGL_FATAL, "The connection the MSC was lost, exiting\n"); |
| bsc_msc_lost(msc_con); |
| return -1; |
| } |
| |
| LOGP(DNAT, LOGL_ERROR, "Failed to parse ip access message: %d\n", error); |
| return -1; |
| } |
| |
| LOGP(DNAT, LOGL_DEBUG, "MSG from MSC: %s proto: %d\n", hexdump(msg->data, msg->len), msg->l2h[0]); |
| |
| /* handle base message handling */ |
| hh = (struct ipaccess_head *) msg->data; |
| ipaccess_rcvmsg_base(msg, bfd); |
| |
| /* initialize the networking. This includes sending a GSM08.08 message */ |
| if (hh->proto == IPAC_PROTO_IPACCESS && msg->l2h[0] == IPAC_MSGT_ID_ACK) |
| initialize_msc_if_needed(); |
| else if (hh->proto == IPAC_PROTO_SCCP) |
| forward_sccp_to_bts(msg); |
| |
| msgb_free(msg); |
| return 0; |
| } |
| |
| static int ipaccess_msc_write_cb(struct bsc_fd *bfd, struct msgb *msg) |
| { |
| int rc; |
| rc = write(bfd->fd, msg->data, msg->len); |
| |
| if (rc != msg->len) { |
| LOGP(DNAT, LOGL_ERROR, "Failed to write MSG to MSC.\n"); |
| return -1; |
| } |
| |
| return rc; |
| } |
| |
| /* |
| * Below is the handling of messages coming |
| * from the BSC and need to be forwarded to |
| * a real BSC. |
| */ |
| |
| /* |
| * Remove the connection from the connections list, |
| * remove it from the patching of SCCP header lists |
| * as well. Maybe in the future even close connection.. |
| */ |
| static void remove_bsc_connection(struct bsc_connection *connection) |
| { |
| struct sccp_connections *sccp_patch, *tmp; |
| bsc_unregister_fd(&connection->write_queue.bfd); |
| close(connection->write_queue.bfd.fd); |
| write_queue_clear(&connection->write_queue); |
| llist_del(&connection->list_entry); |
| |
| /* stop the timeout timer */ |
| bsc_del_timer(&connection->id_timeout); |
| |
| /* remove all SCCP connections */ |
| llist_for_each_entry_safe(sccp_patch, tmp, &nat->sccp_connections, list_entry) { |
| if (sccp_patch->bsc != connection) |
| continue; |
| |
| #warning "TODO: Send a RLSD to the MSC. Or at least a clear command." |
| sccp_connection_destroy(sccp_patch); |
| } |
| |
| talloc_free(connection); |
| } |
| |
| static void ipaccess_close_bsc(void *data) |
| { |
| struct bsc_connection *conn = data; |
| |
| LOGP(DNAT, LOGL_ERROR, "BSC didn't respond to identity request. Closing.\n"); |
| remove_bsc_connection(conn); |
| } |
| |
| static void ipaccess_auth_bsc(struct tlv_parsed *tvp, struct bsc_connection *bsc) |
| { |
| struct bsc_config *conf; |
| const char* token = (const char *) TLVP_VAL(tvp, IPAC_IDTAG_UNITNAME); |
| |
| llist_for_each_entry(conf, &bsc->nat->bsc_configs, entry) { |
| if (strcmp(conf->token, token) == 0) { |
| bsc->authenticated = 1; |
| bsc->lac = conf->lac; |
| bsc_del_timer(&bsc->id_timeout); |
| LOGP(DNAT, LOGL_NOTICE, "Authenticated bsc %d\n", bsc->lac); |
| break; |
| } |
| } |
| } |
| |
| static int forward_sccp_to_msc(struct bsc_connection *bsc, struct msgb *msg) |
| { |
| struct sccp_connections *con; |
| struct bsc_nat_parsed *parsed; |
| |
| /* Parse and filter messages */ |
| parsed = bsc_nat_parse(msg); |
| if (!parsed) { |
| LOGP(DNAT, LOGL_ERROR, "Can not parse msg from BSC.\n"); |
| msgb_free(msg); |
| return -1; |
| } |
| |
| if (bsc_nat_filter_ipa(DIR_MSC, msg, parsed)) |
| goto exit; |
| |
| /* |
| * check authentication after filtering to not reject auth |
| * responses coming from the BSC. We have to make sure that |
| * nothing from the exit path will forward things to the MSC |
| */ |
| if (!bsc->authenticated) { |
| LOGP(DNAT, LOGL_ERROR, "BSC is not authenticated.\n"); |
| msgb_free(msg); |
| return -1; |
| } |
| |
| |
| /* modify the SCCP entries */ |
| if (parsed->ipa_proto == IPAC_PROTO_SCCP) { |
| switch (parsed->sccp_type) { |
| case SCCP_MSG_TYPE_CR: |
| if (create_sccp_src_ref(bsc, msg, parsed) != 0) |
| goto exit2; |
| con = patch_sccp_src_ref_to_msc(msg, parsed, nat); |
| break; |
| case SCCP_MSG_TYPE_RLSD: |
| case SCCP_MSG_TYPE_CREF: |
| case SCCP_MSG_TYPE_DT1: |
| case SCCP_MSG_TYPE_CC: |
| con = patch_sccp_src_ref_to_msc(msg, parsed, nat); |
| break; |
| case SCCP_MSG_TYPE_RLC: |
| con = patch_sccp_src_ref_to_msc(msg, parsed, nat); |
| remove_sccp_src_ref(bsc, msg, parsed); |
| break; |
| case SCCP_MSG_TYPE_UDT: |
| /* simply forward everything */ |
| con = NULL; |
| break; |
| default: |
| LOGP(DNAT, LOGL_ERROR, "Not forwarding to msc sccp type: 0x%x\n", parsed->sccp_type); |
| con = NULL; |
| goto exit2; |
| break; |
| } |
| } else if (parsed->ipa_proto == NAT_IPAC_PROTO_MGCP) { |
| bsc_mgcp_forward(bsc, msg); |
| goto exit2; |
| } else { |
| LOGP(DNAT, LOGL_ERROR, "Not forwarding unknown stream id: 0x%x\n", parsed->ipa_proto); |
| goto exit2; |
| } |
| |
| if (con && con->bsc != bsc) { |
| LOGP(DNAT, LOGL_ERROR, "Found the wrong entry.\n"); |
| goto exit2; |
| } |
| |
| /* send the non-filtered but maybe modified msg */ |
| if (write_queue_enqueue(&msc_con->write_queue, msg) != 0) { |
| LOGP(DNAT, LOGL_ERROR, "Can not queue message for the MSC.\n"); |
| msgb_free(msg); |
| } |
| talloc_free(parsed); |
| return 0; |
| |
| exit: |
| /* if we filter out the reset send an ack to the BSC */ |
| if (parsed->bssap == 0 && parsed->gsm_type == BSS_MAP_MSG_RESET) { |
| send_reset_ack(bsc); |
| send_reset_ack(bsc); |
| } else if (parsed->ipa_proto == IPAC_PROTO_IPACCESS) { |
| /* do we know who is handling this? */ |
| if (msg->l2h[0] == IPAC_MSGT_ID_RESP) { |
| struct tlv_parsed tvp; |
| ipaccess_idtag_parse(&tvp, |
| (unsigned char *) msg->l2h + 2, |
| msgb_l2len(msg) - 2); |
| if (TLVP_PRESENT(&tvp, IPAC_IDTAG_UNITNAME)) |
| ipaccess_auth_bsc(&tvp, bsc); |
| } |
| |
| goto exit2; |
| } |
| |
| exit2: |
| talloc_free(parsed); |
| msgb_free(msg); |
| return -1; |
| } |
| |
| static int ipaccess_bsc_read_cb(struct bsc_fd *bfd) |
| { |
| int error; |
| struct bsc_connection *bsc = bfd->data; |
| struct msgb *msg = ipaccess_read_msg(bfd, &error); |
| |
| if (!msg) { |
| if (error == 0) { |
| LOGP(DNAT, LOGL_ERROR, "The connection to the BSC was lost. Cleaning it\n"); |
| remove_bsc_connection(bsc); |
| } else { |
| LOGP(DNAT, LOGL_ERROR, "Failed to parse ip access message: %d\n", error); |
| } |
| return -1; |
| } |
| |
| |
| LOGP(DNAT, LOGL_DEBUG, "MSG from BSC: %s proto: %d\n", hexdump(msg->data, msg->len), msg->l2h[0]); |
| |
| /* Handle messages from the BSC */ |
| /* FIXME: Currently no PONG is sent to the BSC */ |
| /* FIXME: Currently no ID ACK is sent to the BSC */ |
| forward_sccp_to_msc(bsc, msg); |
| |
| return 0; |
| } |
| |
| static int ipaccess_bsc_write_cb(struct bsc_fd *bfd, struct msgb *msg) |
| { |
| int rc; |
| |
| rc = write(bfd->fd, msg->data, msg->len); |
| if (rc != msg->len) |
| LOGP(DNAT, LOGL_ERROR, "Failed to write message to the BSC.\n"); |
| |
| return rc; |
| } |
| |
| static int ipaccess_listen_bsc_cb(struct bsc_fd *bfd, unsigned int what) |
| { |
| struct bsc_connection *bsc; |
| int ret; |
| struct sockaddr_in sa; |
| socklen_t sa_len = sizeof(sa); |
| |
| if (!(what & BSC_FD_READ)) |
| return 0; |
| |
| ret = accept(bfd->fd, (struct sockaddr *) &sa, &sa_len); |
| if (ret < 0) { |
| perror("accept"); |
| return ret; |
| } |
| |
| /* |
| * if we are not connected to a msc... just close the socket |
| */ |
| if (!msc_con->is_connected) { |
| LOGP(DNAT, LOGL_NOTICE, "Disconnecting BSC due lack of MSC connection.\n"); |
| return 0; |
| } |
| |
| /* todo... do something with the connection */ |
| /* todo... use GNUtls to see if we want to trust this as a BTS */ |
| |
| /* |
| * |
| */ |
| bsc = bsc_connection_alloc(nat); |
| if (!bsc) { |
| LOGP(DNAT, LOGL_ERROR, "Failed to allocate BSC struct.\n"); |
| close(ret); |
| return -1; |
| } |
| |
| write_queue_init(&bsc->write_queue, 100); |
| bsc->write_queue.bfd.data = bsc; |
| bsc->write_queue.bfd.fd = ret; |
| bsc->write_queue.read_cb = ipaccess_bsc_read_cb; |
| bsc->write_queue.write_cb = ipaccess_bsc_write_cb; |
| bsc->write_queue.bfd.when = BSC_FD_READ; |
| if (bsc_register_fd(&bsc->write_queue.bfd) < 0) { |
| LOGP(DNAT, LOGL_ERROR, "Failed to register BSC fd.\n"); |
| close(ret); |
| talloc_free(bsc); |
| return -2; |
| } |
| |
| LOGP(DNAT, LOGL_NOTICE, "Registered new BSC\n"); |
| llist_add(&bsc->list_entry, &nat->bsc_connections); |
| send_id_ack(bsc); |
| send_id_req(bsc); |
| send_mgcp_reset(bsc); |
| |
| /* |
| * start the hangup timer |
| */ |
| bsc->id_timeout.data = bsc; |
| bsc->id_timeout.cb = ipaccess_close_bsc; |
| bsc_schedule_timer(&bsc->id_timeout, 2, 0); |
| return 0; |
| } |
| |
| static int listen_for_bsc(struct bsc_fd *bfd, struct in_addr *in_addr, int port) |
| { |
| struct sockaddr_in addr; |
| int ret, on = 1; |
| |
| bfd->fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| bfd->cb = ipaccess_listen_bsc_cb; |
| bfd->when = BSC_FD_READ; |
| |
| memset(&addr, 0, sizeof(addr)); |
| addr.sin_family = AF_INET; |
| addr.sin_port = htons(port); |
| addr.sin_addr.s_addr = in_addr->s_addr; |
| |
| setsockopt(bfd->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)); |
| |
| ret = bind(bfd->fd, (struct sockaddr *) &addr, sizeof(addr)); |
| if (ret < 0) { |
| fprintf(stderr, "Could not bind the BSC socket %s\n", |
| strerror(errno)); |
| return -EIO; |
| } |
| |
| ret = listen(bfd->fd, 1); |
| if (ret < 0) { |
| perror("listen"); |
| return ret; |
| } |
| |
| ret = bsc_register_fd(bfd); |
| if (ret < 0) { |
| perror("register_listen_fd"); |
| return ret; |
| } |
| return 0; |
| } |
| |
| static void print_usage() |
| { |
| printf("Usage: bsc_nat\n"); |
| } |
| |
| static void print_help() |
| { |
| printf(" Some useful help...\n"); |
| printf(" -h --help this text\n"); |
| printf(" -d option --debug=DRLL:DCC:DMM:DRR:DRSL:DNM enable debugging\n"); |
| printf(" -s --disable-color\n"); |
| printf(" -c --config-file filename The config file to use.\n"); |
| printf(" -m --msc=IP. The address of the MSC.\n"); |
| printf(" -l --local=IP. The local address of this BSC.\n"); |
| } |
| |
| static void handle_options(int argc, char** argv) |
| { |
| while (1) { |
| int option_index = 0, c; |
| static struct option long_options[] = { |
| {"help", 0, 0, 'h'}, |
| {"debug", 1, 0, 'd'}, |
| {"config-file", 1, 0, 'c'}, |
| {"disable-color", 0, 0, 's'}, |
| {"timestamp", 0, 0, 'T'}, |
| {"msc", 1, 0, 'm'}, |
| {"local", 1, 0, 'l'}, |
| {0, 0, 0, 0} |
| }; |
| |
| c = getopt_long(argc, argv, "hd:sTPc:m:l:", |
| long_options, &option_index); |
| if (c == -1) |
| break; |
| |
| switch (c) { |
| case 'h': |
| print_usage(); |
| print_help(); |
| exit(0); |
| case 's': |
| debug_set_use_color(stderr_target, 0); |
| break; |
| case 'd': |
| debug_parse_category_mask(stderr_target, optarg); |
| break; |
| case 'c': |
| config_file = strdup(optarg); |
| break; |
| case 'T': |
| debug_set_print_timestamp(stderr_target, 1); |
| break; |
| case 'm': |
| msc_address = strdup(optarg); |
| break; |
| case 'l': |
| inet_aton(optarg, &local_addr); |
| break; |
| default: |
| /* ignore */ |
| break; |
| } |
| } |
| } |
| |
| static void signal_handler(int signal) |
| { |
| switch (signal) { |
| case SIGABRT: |
| /* in case of abort, we want to obtain a talloc report |
| * and then return to the caller, who will abort the process */ |
| case SIGUSR1: |
| talloc_report_full(tall_bsc_ctx, stderr); |
| break; |
| default: |
| break; |
| } |
| } |
| |
| int main(int argc, char** argv) |
| { |
| |
| debug_init(); |
| stderr_target = debug_target_create_stderr(); |
| debug_add_target(stderr_target); |
| debug_set_all_filter(stderr_target, 1); |
| |
| /* parse options */ |
| local_addr.s_addr = INADDR_ANY; |
| handle_options(argc, argv); |
| |
| nat = bsc_nat_alloc(); |
| if (!nat) { |
| fprintf(stderr, "Failed to allocate the BSC nat.\n"); |
| return -4; |
| } |
| |
| nat->mgcp_cfg = talloc_zero(nat, struct mgcp_config); |
| |
| /* init vty and parse */ |
| bsc_nat_vty_init(nat); |
| telnet_init(NULL, 4244); |
| if (mgcp_parse_config(config_file, nat->mgcp_cfg) < 0) { |
| fprintf(stderr, "Failed to parse the config file: '%s'\n", config_file); |
| return -3; |
| } |
| |
| /* seed the PRNG */ |
| srand(time(NULL)); |
| |
| /* |
| * Setup the MGCP code.. |
| */ |
| if (bsc_mgcp_init(nat) != 0) |
| return -4; |
| |
| /* connect to the MSC */ |
| msc_con = bsc_msc_create(msc_address, 5000); |
| if (!msc_con) { |
| fprintf(stderr, "Creating a bsc_msc_connection failed.\n"); |
| exit(1); |
| } |
| |
| msc_con->connection_loss = msc_connection_was_lost; |
| msc_con->write_queue.read_cb = ipaccess_msc_read_cb; |
| msc_con->write_queue.write_cb = ipaccess_msc_write_cb;; |
| bsc_msc_connect(msc_con); |
| |
| /* wait for the BSC */ |
| if (listen_for_bsc(&bsc_listen, &local_addr, 5000) < 0) { |
| fprintf(stderr, "Failed to listen for BSC.\n"); |
| exit(1); |
| } |
| |
| signal(SIGABRT, &signal_handler); |
| signal(SIGUSR1, &signal_handler); |
| signal(SIGPIPE, SIG_IGN); |
| |
| while (1) { |
| bsc_select_main(0); |
| } |
| |
| return 0; |
| } |