blob: 27d73b8ec7cad3a5429bd127995a61c92f5a636d [file] [log] [blame]
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +02001/* Gb proxy peer handling */
2
3/* (C) 2010 by Harald Welte <laforge@gnumonks.org>
4 * (C) 2010-2013 by On-Waves
5 * (C) 2013 by Holger Hans Peter Freyther
6 * All Rights Reserved
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Affero General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU Affero General Public License for more details.
17 *
18 * You should have received a copy of the GNU Affero General Public License
19 * along with this program. If not, see <http://www.gnu.org/licenses/>.
20 *
21 */
22
23#include <osmocom/sgsn/gb_proxy.h>
24
Oliver Smith29532c22021-01-29 11:13:00 +010025#include "debug.h"
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020026
27#include <osmocom/gprs/protocol/gsm_08_18.h>
Daniel Willmannc8a50092021-01-17 13:11:41 +010028#include <osmocom/core/crc16.h>
Daniel Willmann8f407b12020-12-02 19:33:50 +010029#include <osmocom/core/logging.h>
Daniel Willmannee834af2020-12-14 16:22:39 +010030#include <osmocom/core/linuxlist.h>
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020031#include <osmocom/core/rate_ctr.h>
32#include <osmocom/core/stats.h>
33#include <osmocom/core/talloc.h>
Daniel Willmannc8a50092021-01-17 13:11:41 +010034#include <osmocom/core/utils.h>
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020035#include <osmocom/gsm/tlv.h>
36
37#include <string.h>
38
39extern void *tall_sgsn_ctx;
40
Harald Welte560bdb32020-12-04 22:24:47 +010041static const struct rate_ctr_desc bvc_ctr_description[] = {
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020042 { "blocked", "BVC Block " },
43 { "unblocked", "BVC Unblock " },
44 { "dropped", "BVC blocked, dropped packet " },
45 { "inv-nsei", "NSEI mismatch " },
46 { "tx-err", "NS Transmission error " },
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020047};
48
Harald Welte560bdb32020-12-04 22:24:47 +010049osmo_static_assert(ARRAY_SIZE(bvc_ctr_description) == GBPROX_PEER_CTR_LAST, everything_described);
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020050
Harald Welte560bdb32020-12-04 22:24:47 +010051static const struct rate_ctr_group_desc bvc_ctrg_desc = {
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020052 .group_name_prefix = "gbproxy:peer",
53 .group_description = "GBProxy Peer Statistics",
Harald Welte560bdb32020-12-04 22:24:47 +010054 .num_ctr = ARRAY_SIZE(bvc_ctr_description),
55 .ctr_desc = bvc_ctr_description,
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020056 .class_id = OSMO_STATS_CLASS_PEER,
57};
58
59
Harald Welte560bdb32020-12-04 22:24:47 +010060/* Find the gbproxy_bvc by its BVCI. There can only be one match */
Harald Weltee5209642020-12-05 19:59:45 +010061struct gbproxy_bvc *gbproxy_bvc_by_bvci(struct gbproxy_nse *nse, uint16_t bvci)
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020062{
Harald Welte8b4c7942020-12-05 10:14:49 +010063 struct gbproxy_bvc *bvc;
Harald Weltee5209642020-12-05 19:59:45 +010064 hash_for_each_possible(nse->bvcs, bvc, list, bvci) {
65 if (bvc->bvci == bvci)
66 return bvc;
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020067 }
68 return NULL;
69}
70
Harald Welte560bdb32020-12-04 22:24:47 +010071struct gbproxy_bvc *gbproxy_bvc_alloc(struct gbproxy_nse *nse, uint16_t bvci)
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020072{
Harald Welte560bdb32020-12-04 22:24:47 +010073 struct gbproxy_bvc *bvc;
Daniel Willmanne50550e2020-11-26 18:19:21 +010074 OSMO_ASSERT(nse);
75 struct gbproxy_config *cfg = nse->cfg;
76 OSMO_ASSERT(cfg);
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020077
Harald Welte560bdb32020-12-04 22:24:47 +010078 bvc = talloc_zero(tall_sgsn_ctx, struct gbproxy_bvc);
79 if (!bvc)
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020080 return NULL;
81
Harald Welte560bdb32020-12-04 22:24:47 +010082 bvc->bvci = bvci;
Harald Welte4bd3e492020-12-07 12:06:52 +010083 bvc->ctrg = rate_ctr_group_alloc(bvc, &bvc_ctrg_desc, (nse->nsei << 16) | bvci);
Harald Welte560bdb32020-12-04 22:24:47 +010084 if (!bvc->ctrg) {
85 talloc_free(bvc);
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020086 return NULL;
87 }
Harald Welte560bdb32020-12-04 22:24:47 +010088 bvc->nse = nse;
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020089
Harald Welte8b4c7942020-12-05 10:14:49 +010090 hash_add(nse->bvcs, &bvc->list, bvc->bvci);
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020091
Harald Weltecfc7e8e2020-12-07 12:03:10 +010092 LOGPBVC_CAT(bvc, DOBJ, LOGL_INFO, "BVC Created\n");
93
94 /* We leave allocating the bvc->fi to the caller, as the FSM details depend
95 * on the type of BVC (SIG/PTP) and role (SGSN/BSS) */
Daniel Willmann3ea37932021-02-10 13:41:14 +010096 return bvc;
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +020097}
98
Harald Welte560bdb32020-12-04 22:24:47 +010099void gbproxy_bvc_free(struct gbproxy_bvc *bvc)
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200100{
Harald Weltee5209642020-12-05 19:59:45 +0100101 struct gbproxy_cell *cell;
102
Harald Welte560bdb32020-12-04 22:24:47 +0100103 if (!bvc)
Daniel Willmannf6a36cc2020-12-04 17:38:46 +0100104 return;
Daniel Willmanne50550e2020-11-26 18:19:21 +0100105
Harald Weltecfc7e8e2020-12-07 12:03:10 +0100106 LOGPBVC_CAT(bvc, DOBJ, LOGL_INFO, "BVC Destroying\n");
107
Harald Welte8b4c7942020-12-05 10:14:49 +0100108 hash_del(&bvc->list);
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200109
Harald Welte560bdb32020-12-04 22:24:47 +0100110 rate_ctr_group_free(bvc->ctrg);
111 bvc->ctrg = NULL;
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200112
Harald Weltee5209642020-12-05 19:59:45 +0100113 osmo_fsm_inst_free(bvc->fi);
114
115 cell = bvc->cell;
116 if (cell) {
117 int i;
118
119 if (cell->bss_bvc == bvc)
120 cell->bss_bvc = NULL;
121
122 /* we could also be a SGSN-side BVC */
123 for (i = 0; i < ARRAY_SIZE(cell->sgsn_bvc); i++) {
124 if (cell->sgsn_bvc[i] == bvc)
125 cell->sgsn_bvc[i] = NULL;
126 }
127 bvc->cell = NULL;
128 }
129
Harald Welte560bdb32020-12-04 22:24:47 +0100130 talloc_free(bvc);
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200131}
132
Harald Weltee5209642020-12-05 19:59:45 +0100133/*! remove BVCs on NSE specified by NSEI.
Harald Welte560bdb32020-12-04 22:24:47 +0100134 * \param[in] cfg proxy in which we operate
135 * \param[in] nsei NS entity in which we should clean up
Harald Weltee5209642020-12-05 19:59:45 +0100136 * \param[in] bvci if 0: remove all PTP BVCs; if != 0: BVCI of the single BVC to clean up */
137int gbproxy_cleanup_bvcs(struct gbproxy_nse *nse, uint16_t bvci)
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200138{
Harald Weltee5209642020-12-05 19:59:45 +0100139 struct hlist_node *btmp;
140 struct gbproxy_bvc *bvc;
141 int j, counter = 0;
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200142
Harald Weltee5209642020-12-05 19:59:45 +0100143 if (!nse)
144 return 0;
145
146 hash_for_each_safe(nse->bvcs, j, btmp, bvc, list) {
147 if (bvci && bvc->bvci != bvci)
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200148 continue;
Harald Weltee5209642020-12-05 19:59:45 +0100149 if (bvci == 0 && bvc->bvci == 0)
150 continue;
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200151
Harald Weltee5209642020-12-05 19:59:45 +0100152 gbproxy_bvc_free(bvc);
153 counter += 1;
Pau Espin Pedrol1ddefb12019-08-30 19:48:34 +0200154 }
155
156 return counter;
157}
Daniel Willmanne50550e2020-11-26 18:19:21 +0100158
Harald Weltee5209642020-12-05 19:59:45 +0100159
160/***********************************************************************
161 * CELL
162 ***********************************************************************/
163
164/* Allocate a new 'cell' object */
Philipp Maiere4597ec2021-02-09 16:02:00 +0100165struct gbproxy_cell *gbproxy_cell_alloc(struct gbproxy_config *cfg, uint16_t bvci,
166 const struct gprs_ra_id *raid, uint16_t cid)
Harald Weltee5209642020-12-05 19:59:45 +0100167{
168 struct gbproxy_cell *cell;
169 OSMO_ASSERT(cfg);
170
171 cell = talloc_zero(cfg, struct gbproxy_cell);
172 if (!cell)
173 return NULL;
174
175 cell->cfg = cfg;
176 cell->bvci = bvci;
Philipp Maiere4597ec2021-02-09 16:02:00 +0100177 cell->id.cid = cid;
178 memcpy(&cell->id.raid, raid, sizeof(cell->id.raid));
Harald Weltee5209642020-12-05 19:59:45 +0100179
180 hash_add(cfg->cells, &cell->list, cell->bvci);
181
Harald Weltecfc7e8e2020-12-07 12:03:10 +0100182 LOGPCELL_CAT(cell, DOBJ, LOGL_INFO, "CELL Created\n");
183
Harald Weltee5209642020-12-05 19:59:45 +0100184 return cell;
185}
186
187/* Find cell by BVCI */
188struct gbproxy_cell *gbproxy_cell_by_bvci(struct gbproxy_config *cfg, uint16_t bvci)
189{
190 struct gbproxy_cell *cell;
191
192 hash_for_each_possible(cfg->cells, cell, list, bvci) {
193 if (cell->bvci == bvci)
194 return cell;
195 }
196 return NULL;
197}
198
Daniel Willmannfccbef02021-01-19 17:59:19 +0100199struct gbproxy_cell *gbproxy_cell_by_cellid(struct gbproxy_config *cfg, const struct gprs_ra_id *raid, uint16_t cid)
200{
201 int i;
202 struct gbproxy_cell *cell;
203
204 hash_for_each(cfg->cells, i, cell, list) {
205 if (cell->id.cid == cid && gsm48_ra_equal(&cell->id.raid, raid)) {
206 return cell;
207 }
208 }
209 return NULL;
210}
211
Harald Weltee5209642020-12-05 19:59:45 +0100212void gbproxy_cell_free(struct gbproxy_cell *cell)
213{
214 unsigned int i;
215
216 if (!cell)
217 return;
218
Harald Weltecfc7e8e2020-12-07 12:03:10 +0100219 LOGPCELL_CAT(cell, DOBJ, LOGL_INFO, "CELL Destroying\n");
220
Harald Weltee5209642020-12-05 19:59:45 +0100221 /* remove from cfg.cells */
222 hash_del(&cell->list);
223
224 /* remove back-pointers from the BSS side */
225 if (cell->bss_bvc && cell->bss_bvc->cell)
226 cell->bss_bvc->cell = NULL;
227
228 /* remove back-pointers from the SGSN side */
229 for (i = 0; i < ARRAY_SIZE(cell->sgsn_bvc); i++) {
230 if (!cell->sgsn_bvc[i])
231 continue;
232 if (cell->sgsn_bvc[i]->cell)
233 cell->sgsn_bvc[i]->cell = NULL;
234 }
235
236 talloc_free(cell);
237}
238
239bool gbproxy_cell_add_sgsn_bvc(struct gbproxy_cell *cell, struct gbproxy_bvc *bvc)
240{
241 unsigned int i;
242 for (i = 0; i < ARRAY_SIZE(cell->sgsn_bvc); i++) {
243 if (!cell->sgsn_bvc[i]) {
244 cell->sgsn_bvc[i] = bvc;
Harald Weltecfc7e8e2020-12-07 12:03:10 +0100245 LOGPCELL_CAT(cell, DOBJ, LOGL_DEBUG, "CELL linked to SGSN\n");
246 LOGPBVC_CAT(bvc, DOBJ, LOGL_DEBUG, "BVC linked to CELL\n");
Harald Weltee5209642020-12-05 19:59:45 +0100247 return true;
248 }
249 }
250 return false;
251}
252
Daniel Willmann77493b12020-12-29 21:13:31 +0100253
254/***********************************************************************
255 * TLLI cache
256 ***********************************************************************/
257
Daniel Willmann9170c342021-01-17 13:12:46 +0100258static inline struct gbproxy_tlli_cache_entry *_get_tlli_entry(struct gbproxy_config *cfg, uint32_t tlli)
259{
260 struct gbproxy_tlli_cache_entry *cache_entry;
261
262 hash_for_each_possible(cfg->tlli_cache.entries, cache_entry, list, tlli) {
263 if (cache_entry->tlli == tlli)
264 return cache_entry;
265 }
266 return NULL;
267}
268
Daniel Willmann77493b12020-12-29 21:13:31 +0100269void gbproxy_tlli_cache_update(struct gbproxy_nse *nse, uint32_t tlli)
270{
271 struct gbproxy_config *cfg = nse->cfg;
272 struct timespec now;
273 struct gbproxy_tlli_cache_entry *cache_entry = _get_tlli_entry(cfg, tlli);
274
275 osmo_clock_gettime(CLOCK_MONOTONIC, &now);
276
277 if (cache_entry) {
278 /* Update the entry if it already exists */
279 cache_entry->nse = nse;
280 cache_entry->tstamp = now.tv_sec;
281 return;
282 }
283
284 cache_entry = talloc_zero(cfg, struct gbproxy_tlli_cache_entry);
285 cache_entry->tlli = tlli;
286 cache_entry->nse = nse;
287 cache_entry->tstamp = now.tv_sec;
288 hash_add(cfg->tlli_cache.entries, &cache_entry->list, cache_entry->tlli);
289}
290
291static void _tlli_cache_remove_nse(struct gbproxy_nse *nse) {
292 uint i;
293 struct gbproxy_config *cfg = nse->cfg;
294 struct gbproxy_tlli_cache_entry *tlli_cache;
295 struct hlist_node *tmp;
296
297 hash_for_each_safe(cfg->tlli_cache.entries, i, tmp, tlli_cache, list) {
298 if (tlli_cache->nse == nse) {
299 hash_del(&tlli_cache->list);
300 talloc_free(tlli_cache);
301 }
302 }
303}
304
305void gbproxy_tlli_cache_remove(struct gbproxy_config *cfg, uint32_t tlli)
306{
307 struct gbproxy_tlli_cache_entry *tlli_cache;
308 struct hlist_node *tmp;
309
310 hash_for_each_possible_safe(cfg->tlli_cache.entries, tlli_cache, tmp, list, tlli) {
311 if (tlli_cache->tlli == tlli) {
312 hash_del(&tlli_cache->list);
313 talloc_free(tlli_cache);
314 return;
315 }
316 }
317}
318
319int gbproxy_tlli_cache_cleanup(struct gbproxy_config *cfg)
320{
321 int i, count = 0;
322 struct gbproxy_tlli_cache_entry *tlli_cache;
323 struct hlist_node *tmp;
324 struct timespec now;
325 time_t expiry;
326
327 osmo_clock_gettime(CLOCK_MONOTONIC, &now);
328 expiry = now.tv_sec - cfg->tlli_cache.timeout;
329
330 hash_for_each_safe(cfg->tlli_cache.entries, i, tmp, tlli_cache, list) {
331 if (tlli_cache->tstamp < expiry) {
332 count++;
333 LOGP(DGPRS, LOGL_NOTICE, "Cache entry for TLLI %08x expired, removing\n", tlli_cache->tlli);
334 hash_del(&tlli_cache->list);
335 talloc_free(tlli_cache);
336 }
337 }
338 return count;
Daniel Willmannc8a50092021-01-17 13:11:41 +0100339
340}
341/***********************************************************************
342 * IMSI cache
343 ***********************************************************************/
344static inline uint16_t _checksum_imsi(const char *imsi)
345{
346 size_t len = strlen(imsi);
347 return osmo_crc16(0, (const uint8_t *)imsi, len);
348}
349
350static inline struct gbproxy_imsi_cache_entry *_get_imsi_entry(struct gbproxy_config *cfg, const char *imsi)
351{
352 struct gbproxy_imsi_cache_entry *cache_entry;
353 uint16_t imsi_hash = _checksum_imsi(imsi);
354
355 hash_for_each_possible(cfg->imsi_cache.entries, cache_entry, list, imsi_hash) {
356 if (!strncmp(cache_entry->imsi, imsi, sizeof(cache_entry->imsi)))
357 return cache_entry;
358 }
359 return NULL;
360}
361
362void gbproxy_imsi_cache_update(struct gbproxy_nse *nse, const char *imsi)
363{
364 struct gbproxy_config *cfg = nse->cfg;
365 struct timespec now;
366 struct gbproxy_imsi_cache_entry *cache_entry = _get_imsi_entry(cfg, imsi);
367 uint16_t imsi_hash = _checksum_imsi(imsi);
368
369 osmo_clock_gettime(CLOCK_MONOTONIC, &now);
370
371 if (cache_entry) {
372 /* Update the entry if it already exists */
373 cache_entry->nse = nse;
374 cache_entry->tstamp = now.tv_sec;
375 return;
376 }
377
378 cache_entry = talloc_zero(cfg, struct gbproxy_imsi_cache_entry);
379 OSMO_STRLCPY_ARRAY(cache_entry->imsi, imsi);
380 cache_entry->nse = nse;
381 cache_entry->tstamp = now.tv_sec;
382 hash_add(cfg->imsi_cache.entries, &cache_entry->list, imsi_hash);
383}
384
385static void _imsi_cache_remove_nse(struct gbproxy_nse *nse) {
386 uint i;
387 struct gbproxy_config *cfg = nse->cfg;
388 struct gbproxy_imsi_cache_entry *imsi_cache;
389 struct hlist_node *tmp;
390
391 hash_for_each_safe(cfg->imsi_cache.entries, i, tmp, imsi_cache, list) {
392 if (imsi_cache->nse == nse) {
393 hash_del(&imsi_cache->list);
394 talloc_free(imsi_cache);
395 }
396 }
397}
398
399void gbproxy_imsi_cache_remove(struct gbproxy_config *cfg, const char *imsi)
400{
401 struct gbproxy_imsi_cache_entry *imsi_cache;
402 struct hlist_node *tmp;
403 uint16_t imsi_hash = _checksum_imsi(imsi);
404
405 hash_for_each_possible_safe(cfg->imsi_cache.entries, imsi_cache, tmp, list, imsi_hash) {
406 if (!(strncmp(imsi_cache->imsi, imsi, sizeof(imsi_cache->imsi)))) {
407 hash_del(&imsi_cache->list);
408 talloc_free(imsi_cache);
409 return;
410 }
411 }
412}
413
414int gbproxy_imsi_cache_cleanup(struct gbproxy_config *cfg)
415{
416 int i, count = 0;
417 struct gbproxy_imsi_cache_entry *imsi_cache;
418 struct hlist_node *tmp;
419 struct timespec now;
420 time_t expiry;
421
422 osmo_clock_gettime(CLOCK_MONOTONIC, &now);
423 expiry = now.tv_sec - cfg->imsi_cache.timeout;
424
425 hash_for_each_safe(cfg->imsi_cache.entries, i, tmp, imsi_cache, list) {
426 if (imsi_cache->tstamp < expiry) {
427 count++;
428 LOGP(DGPRS, LOGL_NOTICE, "Cache entry for IMSI %s expired, removing\n", imsi_cache->imsi);
429 hash_del(&imsi_cache->list);
430 talloc_free(imsi_cache);
431 }
432 }
433 return count;
Daniel Willmann77493b12020-12-29 21:13:31 +0100434}
435
Harald Weltee5209642020-12-05 19:59:45 +0100436/***********************************************************************
437 * NSE - NS Entity
438 ***********************************************************************/
439
440struct gbproxy_nse *gbproxy_nse_alloc(struct gbproxy_config *cfg, uint16_t nsei, bool sgsn_facing)
Daniel Willmanne50550e2020-11-26 18:19:21 +0100441{
442 struct gbproxy_nse *nse;
443 OSMO_ASSERT(cfg);
444
445 nse = talloc_zero(tall_sgsn_ctx, struct gbproxy_nse);
446 if (!nse)
447 return NULL;
448
449 nse->nsei = nsei;
450 nse->cfg = cfg;
Harald Weltee5209642020-12-05 19:59:45 +0100451 nse->sgsn_facing = sgsn_facing;
Daniel Willmanne50550e2020-11-26 18:19:21 +0100452
Harald Weltee5209642020-12-05 19:59:45 +0100453 if (sgsn_facing)
454 hash_add(cfg->sgsn_nses, &nse->list, nsei);
455 else
456 hash_add(cfg->bss_nses, &nse->list, nsei);
Daniel Willmanne50550e2020-11-26 18:19:21 +0100457
Harald Welte8b4c7942020-12-05 10:14:49 +0100458 hash_init(nse->bvcs);
Daniel Willmanne50550e2020-11-26 18:19:21 +0100459
Harald Weltecfc7e8e2020-12-07 12:03:10 +0100460 LOGPNSE_CAT(nse, DOBJ, LOGL_INFO, "NSE Created\n");
461
Daniel Willmanne50550e2020-11-26 18:19:21 +0100462 return nse;
463}
464
Daniel Willmannee834af2020-12-14 16:22:39 +0100465static void _nse_free(struct gbproxy_nse *nse)
Daniel Willmanne50550e2020-11-26 18:19:21 +0100466{
Harald Welte8b4c7942020-12-05 10:14:49 +0100467 struct gbproxy_bvc *bvc;
468 struct hlist_node *tmp;
469 int i;
470
Daniel Willmannf6a36cc2020-12-04 17:38:46 +0100471 if (!nse)
472 return;
Daniel Willmanne50550e2020-11-26 18:19:21 +0100473
Harald Weltecfc7e8e2020-12-07 12:03:10 +0100474 LOGPNSE_CAT(nse, DOBJ, LOGL_INFO, "NSE Destroying\n");
475
Harald Welted2fef952020-12-05 00:31:07 +0100476 hash_del(&nse->list);
Daniel Willmannc8a50092021-01-17 13:11:41 +0100477 /* Clear the cache entries of this NSE */
Daniel Willmann77493b12020-12-29 21:13:31 +0100478 _tlli_cache_remove_nse(nse);
Daniel Willmannc8a50092021-01-17 13:11:41 +0100479 _imsi_cache_remove_nse(nse);
Daniel Willmanne50550e2020-11-26 18:19:21 +0100480
Harald Welte8b4c7942020-12-05 10:14:49 +0100481 hash_for_each_safe(nse->bvcs, i, tmp, bvc, list)
Harald Welte560bdb32020-12-04 22:24:47 +0100482 gbproxy_bvc_free(bvc);
Daniel Willmanne50550e2020-11-26 18:19:21 +0100483
484 talloc_free(nse);
485}
Daniel Willmannee834af2020-12-14 16:22:39 +0100486static void _sgsn_free(struct gbproxy_sgsn *sgsn);
487
488void gbproxy_nse_free(struct gbproxy_nse *nse)
489{
490 if (!nse)
491 return;
492 OSMO_ASSERT(nse->cfg);
493
494 if (nse->sgsn_facing) {
495 struct gbproxy_sgsn *sgsn = gbproxy_sgsn_by_nsei(nse->cfg, nse->nsei);
496 OSMO_ASSERT(sgsn);
497 _sgsn_free(sgsn);
498 }
499
500 _nse_free(nse);
501}
Daniel Willmanne50550e2020-11-26 18:19:21 +0100502
Harald Weltee5209642020-12-05 19:59:45 +0100503struct gbproxy_nse *gbproxy_nse_by_nsei(struct gbproxy_config *cfg, uint16_t nsei, uint32_t flags)
Daniel Willmanne50550e2020-11-26 18:19:21 +0100504{
505 struct gbproxy_nse *nse;
506 OSMO_ASSERT(cfg);
507
Harald Weltee5209642020-12-05 19:59:45 +0100508 if (flags & NSE_F_SGSN) {
509 hash_for_each_possible(cfg->sgsn_nses, nse, list, nsei) {
510 if (nse->nsei == nsei)
511 return nse;
512 }
513 }
514
515 if (flags & NSE_F_BSS) {
516 hash_for_each_possible(cfg->bss_nses, nse, list, nsei) {
517 if (nse->nsei == nsei)
518 return nse;
519 }
Daniel Willmanne50550e2020-11-26 18:19:21 +0100520 }
521
522 return NULL;
523}
524
Harald Weltee5209642020-12-05 19:59:45 +0100525struct gbproxy_nse *gbproxy_nse_by_nsei_or_new(struct gbproxy_config *cfg, uint16_t nsei, bool sgsn_facing)
Daniel Willmanne50550e2020-11-26 18:19:21 +0100526{
527 struct gbproxy_nse *nse;
528 OSMO_ASSERT(cfg);
529
Harald Weltee5209642020-12-05 19:59:45 +0100530 nse = gbproxy_nse_by_nsei(cfg, nsei, sgsn_facing ? NSE_F_SGSN : NSE_F_BSS);
Daniel Willmanne50550e2020-11-26 18:19:21 +0100531 if (!nse)
Harald Weltee5209642020-12-05 19:59:45 +0100532 nse = gbproxy_nse_alloc(cfg, nsei, sgsn_facing);
Daniel Willmanne50550e2020-11-26 18:19:21 +0100533
534 return nse;
Harald Welte560bdb32020-12-04 22:24:47 +0100535}
Daniel Willmannee834af2020-12-14 16:22:39 +0100536
Daniel Willmann77493b12020-12-29 21:13:31 +0100537struct gbproxy_nse *gbproxy_nse_by_tlli(struct gbproxy_config *cfg, uint32_t tlli)
538{
539 struct gbproxy_tlli_cache_entry *tlli_cache;
540
541 hash_for_each_possible(cfg->tlli_cache.entries, tlli_cache, list, tlli) {
542 if (tlli_cache->tlli == tlli)
543 return tlli_cache->nse;
544 }
545 return NULL;
546}
547
Daniel Willmannc8a50092021-01-17 13:11:41 +0100548struct gbproxy_nse *gbproxy_nse_by_imsi(struct gbproxy_config *cfg, const char *imsi)
549{
550 struct gbproxy_imsi_cache_entry *imsi_cache;
551 uint16_t imsi_hash = _checksum_imsi(imsi);
552
553 hash_for_each_possible(cfg->imsi_cache.entries, imsi_cache, list, imsi_hash) {
554 if (!strncmp(imsi_cache->imsi, imsi, sizeof(imsi_cache->imsi)))
555 return imsi_cache->nse;
556 }
557 return NULL;
558}
Daniel Willmann77493b12020-12-29 21:13:31 +0100559
Daniel Willmann216dff82020-12-29 16:07:17 +0100560/***********************************************************************
561 * SGSN - Serving GPRS Support Node
562 ***********************************************************************/
563
564/*! Allocate a new SGSN. This ensures the corresponding gbproxy_nse is allocated as well
565 * \param[in] cfg The gbproxy configuration
566 * \param[in] nsei The nsei where the SGSN can be reached
Daniel Willmanna648f3c2020-12-28 18:07:27 +0100567 * \param[in] name A name to give the SGSN
Daniel Willmann216dff82020-12-29 16:07:17 +0100568 * \return The SGSN, NULL if it couldn't be allocated
569 */
Daniel Willmanna648f3c2020-12-28 18:07:27 +0100570struct gbproxy_sgsn *gbproxy_sgsn_alloc(struct gbproxy_config *cfg, uint16_t nsei, const char *name)
Daniel Willmannee834af2020-12-14 16:22:39 +0100571{
572 struct gbproxy_sgsn *sgsn;
573 OSMO_ASSERT(cfg);
574
575 sgsn = talloc_zero(tall_sgsn_ctx, struct gbproxy_sgsn);
576 if (!sgsn)
577 return NULL;
578
579 sgsn->nse = gbproxy_nse_alloc(cfg, nsei, true);
580 if (!sgsn->nse) {
Vadim Yanitskiy6964e882021-01-05 14:42:46 +0100581 LOGP(DOBJ, LOGL_ERROR, "Could not allocate NSE(%05u) for SGSN(%s)\n",
582 nsei, sgsn->name);
Daniel Willmanna648f3c2020-12-28 18:07:27 +0100583 goto free_sgsn;
Daniel Willmannee834af2020-12-14 16:22:39 +0100584 }
585
Daniel Willmanna648f3c2020-12-28 18:07:27 +0100586 if (name)
587 sgsn->name = talloc_strdup(sgsn, name);
588 else
589 sgsn->name = talloc_asprintf(sgsn, "NSE(%05u)", sgsn->nse->nsei);
590 if (!sgsn->name)
591 goto free_sgsn;
592
Daniel Willmannee834af2020-12-14 16:22:39 +0100593 sgsn->pool.allow_attach = true;
594 sgsn->pool.nri_ranges = osmo_nri_ranges_alloc(sgsn);
595
596 llist_add_tail(&sgsn->list, &cfg->sgsns);
597 LOGPSGSN_CAT(sgsn, DOBJ, LOGL_INFO, "SGSN Created\n");
598 return sgsn;
Daniel Willmanna648f3c2020-12-28 18:07:27 +0100599
600free_sgsn:
601 talloc_free(sgsn);
602 return NULL;
Daniel Willmannee834af2020-12-14 16:22:39 +0100603}
604
605/* Only free gbproxy_sgsn, sgsn can't be NULL */
606static void _sgsn_free(struct gbproxy_sgsn *sgsn) {
607 struct gbproxy_config *cfg;
608
609 OSMO_ASSERT(sgsn->nse);
610 cfg = sgsn->nse->cfg;
611 OSMO_ASSERT(cfg);
612
613 LOGPSGSN_CAT(sgsn, DOBJ, LOGL_INFO, "SGSN Destroying\n");
614 llist_del(&sgsn->list);
Daniel Willmann5193f222021-01-11 05:00:46 +0100615 /* talloc will free ->name and ->pool.nri_ranges */
Daniel Willmannee834af2020-12-14 16:22:39 +0100616 talloc_free(sgsn);
617}
618
Daniel Willmann216dff82020-12-29 16:07:17 +0100619/*! Free the SGSN. This ensures the corresponding gbproxy_nse is freed as well
620 * \param[in] sgsn The SGSN
621 */
Daniel Willmannee834af2020-12-14 16:22:39 +0100622void gbproxy_sgsn_free(struct gbproxy_sgsn *sgsn)
623{
624 if (!sgsn)
625 return;
626
627 OSMO_ASSERT(sgsn->nse)
628
629 _nse_free(sgsn->nse);
630 _sgsn_free(sgsn);
631}
632
Daniel Willmann216dff82020-12-29 16:07:17 +0100633/*! Return the SGSN for a given NSEI
634 * \param[in] cfg The gbproxy configuration
635 * \param[in] nsei The nsei where the SGSN can be reached
636 * \return Returns the matching SGSN or NULL if it couldn't be found
637 */
Daniel Willmanna648f3c2020-12-28 18:07:27 +0100638struct gbproxy_sgsn *gbproxy_sgsn_by_name(struct gbproxy_config *cfg, const char *name)
639{
640 struct gbproxy_sgsn *sgsn;
641 OSMO_ASSERT(cfg);
642
643 llist_for_each_entry(sgsn, &cfg->sgsns, list) {
644 if (!strcmp(sgsn->name, name))
645 return sgsn;
646 }
647
648 return NULL;
649}
650
651/*! Return the SGSN for a given NSEI
652 * \param[in] cfg The gbproxy configuration
653 * \param[in] nsei The nsei where the SGSN can be reached
654 * \return Returns the matching SGSN or NULL if it couldn't be found
655 */
Daniel Willmannee834af2020-12-14 16:22:39 +0100656struct gbproxy_sgsn *gbproxy_sgsn_by_nsei(struct gbproxy_config *cfg, uint16_t nsei)
657{
658 struct gbproxy_sgsn *sgsn;
659 OSMO_ASSERT(cfg);
660
661 llist_for_each_entry(sgsn, &cfg->sgsns, list) {
662 if (sgsn->nse->nsei == nsei)
663 return sgsn;
664 }
665
666 return NULL;
667}
668
Daniel Willmann216dff82020-12-29 16:07:17 +0100669/*! Return the SGSN for a given NSEI, creating a new one if none exists
670 * \param[in] cfg The gbproxy configuration
671 * \param[in] nsei The nsei where the SGSN can be reached
672 * \return Returns the SGSN
673 */
Daniel Willmannee834af2020-12-14 16:22:39 +0100674struct gbproxy_sgsn *gbproxy_sgsn_by_nsei_or_new(struct gbproxy_config *cfg, uint16_t nsei)
675{
676 struct gbproxy_sgsn *sgsn;
677 OSMO_ASSERT(cfg);
678
679 sgsn = gbproxy_sgsn_by_nsei(cfg, nsei);
680 if (!sgsn)
Daniel Willmanna648f3c2020-12-28 18:07:27 +0100681 sgsn = gbproxy_sgsn_alloc(cfg, nsei, NULL);
Daniel Willmannee834af2020-12-14 16:22:39 +0100682
683 return sgsn;
684}
685
686/*! Return the gbproxy_sgsn matching that NRI
687 * \param[in] cfg proxy in which we operate
688 * \param[in] nri NRI to look for
689 * \param[out] null_nri If not NULL this indicates whether the NRI is a null NRI
690 * \return The SGSN this NRI has been added to, NULL if no matching SGSN could be found
691 */
692struct gbproxy_sgsn *gbproxy_sgsn_by_nri(struct gbproxy_config *cfg, uint16_t nri, bool *null_nri)
693{
694 struct gbproxy_sgsn *sgsn;
695 OSMO_ASSERT(cfg);
696
697 llist_for_each_entry(sgsn, &cfg->sgsns, list) {
698 if (osmo_nri_v_matches_ranges(nri, sgsn->pool.nri_ranges)) {
699 /* Also check if the NRI we're looking for is a NULL NRI */
Vadim Yanitskiy4dba67a2021-01-05 14:36:52 +0100700 if (null_nri) {
Daniel Willmannee834af2020-12-14 16:22:39 +0100701 if (osmo_nri_v_matches_ranges(nri, cfg->pool.null_nri_ranges))
702 *null_nri = true;
703 else
704 *null_nri = false;
705 }
706 return sgsn;
707 }
708 }
709
710 return NULL;
711}
Daniel Willmannd4ab1f92020-12-21 18:53:55 +0100712
Daniel Willmann3ea37932021-02-10 13:41:14 +0100713/*! Select a pseudo-random SGSN for a given TLLI, ignoring any SGSN that is not accepting connections
Daniel Willmannd4ab1f92020-12-21 18:53:55 +0100714 * \param[in] cfg The gbproxy configuration
715 * \param[in] sgsn_avoid If not NULL then avoid this SGSN when selecting a new one. Use for load redistribution
716 * \param[in] tlli The tlli to choose an SGSN for. The same tlli will map to the same SGSN as long as no SGSN is
717 * added/removed or allow_attach changes.
718 * \return Returns the sgsn on success, NULL if no SGSN that allows new connections could be found
719 */
720struct gbproxy_sgsn *gbproxy_sgsn_by_tlli(struct gbproxy_config *cfg, struct gbproxy_sgsn *sgsn_avoid,
721 uint32_t tlli)
722{
723 uint32_t i = 0;
724 uint32_t index, num_sgsns;
Daniel Willmannd4ab1f92020-12-21 18:53:55 +0100725 OSMO_ASSERT(cfg);
726
Daniel Willmannb387c1e2020-12-27 18:14:39 +0100727 struct gbproxy_sgsn *sgsn = cfg->pool.nsf_override;
728
729 if (sgsn) {
730 LOGPSGSN(sgsn, LOGL_DEBUG, "Node selection function is overridden by config\n");
731 return sgsn;
732 }
733
Daniel Willmann5193f222021-01-11 05:00:46 +0100734 /* TODO: We should keep track of count in cfg */
Daniel Willmannd4ab1f92020-12-21 18:53:55 +0100735 num_sgsns = llist_count(&cfg->sgsns);
736
737 if (num_sgsns == 0)
738 return NULL;
739
Daniel Willmann5193f222021-01-11 05:00:46 +0100740 /* FIXME: 256 SGSNs ought to be enough for everyone */
Daniel Willmannd4ab1f92020-12-21 18:53:55 +0100741 index = hash_32(tlli, 8) % num_sgsns;
742
Daniel Willmann5193f222021-01-11 05:00:46 +0100743 /* Get the first enabled SGSN after index */
Daniel Willmannd4ab1f92020-12-21 18:53:55 +0100744 llist_for_each_entry(sgsn, &cfg->sgsns, list) {
745 if (i >= index && sgsn->pool.allow_attach) {
746 return sgsn;
747 }
748 i++;
749 }
Daniel Willmann5193f222021-01-11 05:00:46 +0100750 /* Start again from the beginning */
Daniel Willmann3c56a2a2021-01-05 15:52:05 +0100751 i = 0;
Daniel Willmannd4ab1f92020-12-21 18:53:55 +0100752 llist_for_each_entry(sgsn, &cfg->sgsns, list) {
Daniel Willmann3c56a2a2021-01-05 15:52:05 +0100753 if (i >= index) {
Daniel Willmannd4ab1f92020-12-21 18:53:55 +0100754 break;
755 } else if (sgsn->pool.allow_attach) {
756 return sgsn;
757 }
758 i++;
759 }
760
761 return NULL;
762}