blob: 40891ae1bf62a4c3573ad0bb4e8baf888f03a2c1 [file] [log] [blame]
Harald Welte59b04682009-06-10 05:40:52 +08001/* OpenBSC Abis input driver for ip.access */
2
3/* (C) 2009 by Harald Welte <laforge@gnumonks.org>
4 *
5 * All Rights Reserved
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; if not, write to the Free Software Foundation, Inc.,
19 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20 *
21 */
22
23#include <stdio.h>
24#include <unistd.h>
25#include <stdlib.h>
26#include <errno.h>
27#include <string.h>
28#include <time.h>
29#include <sys/fcntl.h>
30#include <sys/types.h>
31#include <sys/socket.h>
32#include <sys/ioctl.h>
33#include <arpa/inet.h>
34
35#include <openbsc/select.h>
36#include <openbsc/tlv.h>
37#include <openbsc/msgb.h>
38#include <openbsc/debug.h>
39#include <openbsc/gsm_data.h>
40#include <openbsc/abis_nm.h>
41#include <openbsc/abis_rsl.h>
42#include <openbsc/subchan_demux.h>
43#include <openbsc/e1_input.h>
44#include <openbsc/ipaccess.h>
Harald Weltea8379772009-06-20 22:36:41 +020045#include <openbsc/talloc.h>
Harald Welte59b04682009-06-10 05:40:52 +080046
47/* data structure for one E1 interface with A-bis */
48struct ia_e1_handle {
49 struct bsc_fd listen_fd;
50 struct bsc_fd rsl_listen_fd;
51 struct gsm_network *gsmnet;
52};
53
54static struct ia_e1_handle *e1h;
55
56
57#define TS1_ALLOC_SIZE 300
58
59static const u_int8_t pong[] = { 0, 1, IPAC_PROTO_IPACCESS, IPAC_MSGT_PONG };
60static const u_int8_t id_ack[] = { 0, 1, IPAC_PROTO_IPACCESS, IPAC_MSGT_ID_ACK };
61static const u_int8_t id_req[] = { 0, 17, IPAC_PROTO_IPACCESS, IPAC_MSGT_ID_GET,
62 0x01, IPAC_IDTAG_UNIT,
63 0x01, IPAC_IDTAG_MACADDR,
64 0x01, IPAC_IDTAG_LOCATION1,
65 0x01, IPAC_IDTAG_LOCATION2,
66 0x01, IPAC_IDTAG_EQUIPVERS,
67 0x01, IPAC_IDTAG_SWVERSION,
68 0x01, IPAC_IDTAG_UNITNAME,
69 0x01, IPAC_IDTAG_SERNR,
70 };
71
72static const char *idtag_names[] = {
73 [IPAC_IDTAG_SERNR] = "Serial_Number",
74 [IPAC_IDTAG_UNITNAME] = "Unit_Name",
75 [IPAC_IDTAG_LOCATION1] = "Location_1",
76 [IPAC_IDTAG_LOCATION2] = "Location_2",
77 [IPAC_IDTAG_EQUIPVERS] = "Equipment_Version",
78 [IPAC_IDTAG_SWVERSION] = "Software_Version",
79 [IPAC_IDTAG_IPADDR] = "IP_Address",
80 [IPAC_IDTAG_MACADDR] = "MAC_Address",
81 [IPAC_IDTAG_UNIT] = "Unit_ID",
82};
83
84static const char *ipac_idtag_name(int tag)
85{
86 if (tag >= ARRAY_SIZE(idtag_names))
87 return "unknown";
88
89 return idtag_names[tag];
90}
91
92static int ipac_idtag_parse(struct tlv_parsed *dec, unsigned char *buf, int len)
93{
94 u_int8_t t_len;
95 u_int8_t t_tag;
96 u_int8_t *cur = buf;
97
98 while (cur < buf + len) {
99 t_len = *cur++;
100 t_tag = *cur++;
101
102 DEBUGPC(DMI, "%s='%s' ", ipac_idtag_name(t_tag), cur);
103
104 dec->lv[t_tag].len = t_len;
105 dec->lv[t_tag].val = cur;
106
107 cur += t_len;
108 }
109 return 0;
110}
111
112struct gsm_bts *find_bts_by_unitid(struct gsm_network *net,
113 u_int16_t site_id, u_int16_t bts_id)
114{
Harald Weltee712a5f2009-06-21 16:17:15 +0200115 struct gsm_bts *bts;
Harald Welte59b04682009-06-10 05:40:52 +0800116
Harald Weltee712a5f2009-06-21 16:17:15 +0200117 llist_for_each_entry(bts, &net->bts_list, list) {
Harald Welte59b04682009-06-10 05:40:52 +0800118
119 if (!is_ipaccess_bts(bts))
120 continue;
121
122 if (bts->ip_access.site_id == site_id &&
123 bts->ip_access.bts_id == bts_id)
124 return bts;
125 }
126
127 return NULL;
128}
129
130static int parse_unitid(const char *str, u_int16_t *site_id, u_int16_t *bts_id,
131 u_int16_t *trx_id)
132{
133 unsigned long ul;
134 char *endptr;
135 const char *nptr;
136
137 nptr = str;
138 ul = strtoul(nptr, &endptr, 10);
139 if (endptr <= nptr)
140 return -EINVAL;
141 if (site_id)
142 *site_id = ul & 0xffff;
143
144 if (*endptr++ != '/')
145 return -EINVAL;
146
147 nptr = endptr;
148 ul = strtoul(nptr, &endptr, 10);
149 if (endptr <= nptr)
150 return -EINVAL;
151 if (bts_id)
152 *bts_id = ul & 0xffff;
153
154 if (*endptr++ != '/')
155 return -EINVAL;
156
157 nptr = endptr;
158 ul = strtoul(nptr, &endptr, 10);
159 if (endptr <= nptr)
160 return -EINVAL;
161 if (trx_id)
162 *trx_id = ul & 0xffff;
163
164 return 0;
165}
166
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200167/* base handling of the ip.access protocol */
168int ipaccess_rcvmsg_base(struct msgb *msg,
169 struct bsc_fd *bfd)
Harald Welte59b04682009-06-10 05:40:52 +0800170{
Harald Welte59b04682009-06-10 05:40:52 +0800171 u_int8_t msg_type = *(msg->l2h);
Harald Welte59b04682009-06-10 05:40:52 +0800172 int ret = 0;
173
174 switch (msg_type) {
175 case IPAC_MSGT_PING:
176 ret = write(bfd->fd, pong, sizeof(pong));
177 break;
178 case IPAC_MSGT_PONG:
179 DEBUGP(DMI, "PONG!\n");
180 break;
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200181 case IPAC_MSGT_ID_ACK:
182 DEBUGP(DMI, "ID_ACK? -> ACK!\n");
183 ret = write(bfd->fd, id_ack, sizeof(id_ack));
184 break;
185 }
186 return 0;
187}
188
189static int ipaccess_rcvmsg(struct e1inp_line *line, struct msgb *msg,
190 struct bsc_fd *bfd)
191{
192 struct tlv_parsed tlvp;
193 u_int8_t msg_type = *(msg->l2h);
194 u_int16_t site_id = 0, bts_id = 0, trx_id = 0;
195 struct gsm_bts *bts;
196
197 /* handle base messages */
198 ipaccess_rcvmsg_base(msg, bfd);
199
200 switch (msg_type) {
Harald Welte59b04682009-06-10 05:40:52 +0800201 case IPAC_MSGT_ID_RESP:
202 DEBUGP(DMI, "ID_RESP ");
203 /* parse tags, search for Unit ID */
204 ipac_idtag_parse(&tlvp, (u_int8_t *)msg->l2h + 2,
205 msgb_l2len(msg)-2);
206 DEBUGP(DMI, "\n");
207
208 if (!TLVP_PRESENT(&tlvp, IPAC_IDTAG_UNIT))
209 break;
210
211 /* lookup BTS, create sign_link, ... */
212 parse_unitid((char *)TLVP_VAL(&tlvp, IPAC_IDTAG_UNIT),
213 &site_id, &bts_id, &trx_id);
214 bts = find_bts_by_unitid(e1h->gsmnet, site_id, bts_id);
215 if (!bts) {
216 DEBUGP(DINP, "Unable to find BTS configuration for "
217 " %u/%u/%u, disconnecting\n", site_id, bts_id,
218 trx_id);
219 return -EIO;
220 }
221 DEBUGP(DINP, "Identified BTS %u/%u/%u\n", site_id, bts_id, trx_id);
222 if (bfd->priv_nr == 1) {
223 bts->oml_link = e1inp_sign_link_create(&line->ts[1-1],
224 E1INP_SIGN_OML, bts->c0,
225 0, 0xff);
226 } else if (bfd->priv_nr == 2) {
227 struct e1inp_ts *e1i_ts;
228 struct bsc_fd *newbfd;
229
230 /* FIXME: implement this for non-0 TRX */
231 bfd->data = line = bts->oml_link->ts->line;
232 e1i_ts = &line->ts[2-1];
233 newbfd = &e1i_ts->driver.ipaccess.fd;
234
235 bts->c0->rsl_link =
236 e1inp_sign_link_create(e1i_ts,
237 E1INP_SIGN_RSL, bts->c0,
238 0, 0);
239 /* get rid of our old temporary bfd */
240 memcpy(newbfd, bfd, sizeof(*newbfd));
241 bsc_unregister_fd(bfd);
242 bsc_register_fd(newbfd);
Harald Welte49a84052009-06-22 01:36:25 +0200243 talloc_free(bfd);
Harald Welte59b04682009-06-10 05:40:52 +0800244 }
245 break;
Harald Welte59b04682009-06-10 05:40:52 +0800246 }
247 return 0;
248}
249
250/* FIXME: this is per BTS */
251static int oml_up = 0;
252static int rsl_up = 0;
253
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200254/*
255 * read one ipa message from the socket
256 * return NULL in case of error
257 */
258struct msgb *ipaccess_read_msg(struct bsc_fd *bfd, int *error)
Harald Welte59b04682009-06-10 05:40:52 +0800259{
Harald Welte9cfc9352009-06-26 19:39:35 +0200260 struct msgb *msg = msgb_alloc(TS1_ALLOC_SIZE, "Abis/IP");
Harald Welte59b04682009-06-10 05:40:52 +0800261 struct ipaccess_head *hh;
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200262 int ret = 0;
Harald Welte59b04682009-06-10 05:40:52 +0800263
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200264 if (!msg) {
265 *error = -ENOMEM;
266 return NULL;
267 }
Harald Welte59b04682009-06-10 05:40:52 +0800268
269 /* first read our 3-byte header */
270 hh = (struct ipaccess_head *) msg->data;
271 ret = recv(bfd->fd, msg->data, 3, 0);
272 if (ret < 0) {
273 fprintf(stderr, "recv error %s\n", strerror(errno));
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200274 msgb_free(msg);
275 *error = ret;
276 return NULL;
277 } else if (ret == 0) {
278 msgb_free(msg);
279 *error = ret;
280 return NULL;
Harald Welte59b04682009-06-10 05:40:52 +0800281 }
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200282
Harald Welte59b04682009-06-10 05:40:52 +0800283 msgb_put(msg, ret);
284
285 /* then read te length as specified in header */
286 msg->l2h = msg->data + sizeof(*hh);
287 ret = recv(bfd->fd, msg->l2h, hh->len, 0);
288 if (ret < hh->len) {
289 fprintf(stderr, "short read!\n");
290 msgb_free(msg);
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200291 *error = -EIO;
292 return NULL;
Harald Welte59b04682009-06-10 05:40:52 +0800293 }
294 msgb_put(msg, ret);
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200295
296 return msg;
297}
298
299static int handle_ts1_read(struct bsc_fd *bfd)
300{
301 struct e1inp_line *line = bfd->data;
302 unsigned int ts_nr = bfd->priv_nr;
303 struct e1inp_ts *e1i_ts = &line->ts[ts_nr-1];
304 struct e1inp_sign_link *link;
305 struct msgb *msg;
306 struct ipaccess_head *hh;
307 int ret, error;
308
309 msg = ipaccess_read_msg(bfd, &error);
310 if (!msg) {
311 if (error == 0) {
312 fprintf(stderr, "BTS disappeared, dead socket\n");
313 e1inp_event(e1i_ts, EVT_E1_TEI_DN, 0, IPAC_PROTO_RSL);
314 e1inp_event(e1i_ts, EVT_E1_TEI_DN, 0, IPAC_PROTO_OML);
315 bsc_unregister_fd(bfd);
316 close(bfd->fd);
317 bfd->fd = -1;
318 }
319 return error;
320 }
321
Sylvain Munaut71137ac2009-09-30 22:35:04 +0200322 DEBUGP(DMI, "RX %u: %s\n", ts_nr, hexdump(msgb_l2(msg), msgb_l2len(msg)));
Harald Welte59b04682009-06-10 05:40:52 +0800323
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200324 hh = (struct ipaccess_head *) msg->data;
Harald Welte59b04682009-06-10 05:40:52 +0800325 if (hh->proto == IPAC_PROTO_IPACCESS) {
326 ret = ipaccess_rcvmsg(line, msg, bfd);
327 if (ret < 0) {
328 e1inp_event(e1i_ts, EVT_E1_TEI_DN, 0, IPAC_PROTO_RSL);
329 e1inp_event(e1i_ts, EVT_E1_TEI_DN, 0, IPAC_PROTO_OML);
330 bsc_unregister_fd(bfd);
331 close(bfd->fd);
332 bfd->fd = -1;
333 }
334 msgb_free(msg);
335 return ret;
336 }
337 /* BIG FAT WARNING: bfd might no longer exist here, since ipaccess_rcvmsg()
338 * might have free'd it !!! */
339
340 link = e1inp_lookup_sign_link(e1i_ts, 0, hh->proto);
341 if (!link) {
342 printf("no matching signalling link for hh->proto=0x%02x\n", hh->proto);
343 msgb_free(msg);
344 return -EIO;
345 }
346 msg->trx = link->trx;
347
348 switch (hh->proto) {
349 case IPAC_PROTO_RSL:
350 if (!rsl_up) {
351 e1inp_event(e1i_ts, EVT_E1_TEI_UP, 0, IPAC_PROTO_RSL);
352 rsl_up = 1;
353 }
354 ret = abis_rsl_rcvmsg(msg);
355 break;
356 case IPAC_PROTO_OML:
357 if (!oml_up) {
358 e1inp_event(e1i_ts, EVT_E1_TEI_UP, 0, IPAC_PROTO_OML);
359 oml_up = 1;
360 }
361 ret = abis_nm_rcvmsg(msg);
362 break;
363 default:
364 DEBUGP(DMI, "Unknown IP.access protocol proto=0x%02x\n", hh->proto);
365 msgb_free(msg);
366 break;
367 }
368 return ret;
369}
370
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200371void ipaccess_prepend_header(struct msgb *msg, int proto)
372{
373 struct ipaccess_head *hh;
374
375 /* prepend the ip.access header */
376 hh = (struct ipaccess_head *) msgb_push(msg, sizeof(*hh));
377 hh->zero = 0;
378 hh->len = msg->len - sizeof(*hh);
379 hh->proto = proto;
380}
381
Harald Welte59b04682009-06-10 05:40:52 +0800382static int handle_ts1_write(struct bsc_fd *bfd)
383{
384 struct e1inp_line *line = bfd->data;
385 unsigned int ts_nr = bfd->priv_nr;
386 struct e1inp_ts *e1i_ts = &line->ts[ts_nr-1];
387 struct e1inp_sign_link *sign_link;
388 struct msgb *msg;
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200389 u_int8_t proto;
Harald Welte59b04682009-06-10 05:40:52 +0800390 int ret;
391
392 /* get the next msg for this timeslot */
393 msg = e1inp_tx_ts(e1i_ts, &sign_link);
394 if (!msg) {
395 bfd->when &= ~BSC_FD_WRITE;
396 return 0;
397 }
398
Harald Welte59b04682009-06-10 05:40:52 +0800399 switch (sign_link->type) {
400 case E1INP_SIGN_OML:
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200401 proto = IPAC_PROTO_OML;
Harald Welte59b04682009-06-10 05:40:52 +0800402 break;
403 case E1INP_SIGN_RSL:
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200404 proto = IPAC_PROTO_RSL;
Harald Welte59b04682009-06-10 05:40:52 +0800405 break;
406 default:
407 msgb_free(msg);
408 return -EINVAL;
409 }
410
Holger Hans Peter Freyther7d3573e2009-08-18 10:05:45 +0200411
412 msg->l2h = msg->data;
413 ipaccess_prepend_header(msg, proto);
414
415 DEBUGP(DMI, "TX %u: %s\n", ts_nr, hexdump(msg->l2h, msgb_l2len(msg)));
Harald Welte59b04682009-06-10 05:40:52 +0800416
417 ret = send(bfd->fd, msg->data, msg->len, 0);
418 msgb_free(msg);
419 usleep(100000);
420
421 return ret;
422}
423
424/* callback from select.c in case one of the fd's can be read/written */
425static int ipaccess_fd_cb(struct bsc_fd *bfd, unsigned int what)
426{
427 struct e1inp_line *line = bfd->data;
428 unsigned int ts_nr = bfd->priv_nr;
429 unsigned int idx = ts_nr-1;
430 struct e1inp_ts *e1i_ts;
431 int rc = 0;
432
433 /* In case of early RSL we might not yet have a line */
434
435 if (line)
436 e1i_ts = &line->ts[idx];
437
438 if (!line || e1i_ts->type == E1INP_TS_TYPE_SIGN) {
439 if (what & BSC_FD_READ)
440 rc = handle_ts1_read(bfd);
441 if (what & BSC_FD_WRITE)
442 rc = handle_ts1_write(bfd);
443 } else
444 fprintf(stderr, "unknown E1 TS type %u\n", e1i_ts->type);
445
446 return rc;
447}
448
449
450static int ts_want_write(struct e1inp_ts *e1i_ts)
451{
452 e1i_ts->driver.ipaccess.fd.when |= BSC_FD_WRITE;
453
454 return 0;
455}
456
457struct e1inp_driver ipaccess_driver = {
458 .name = "ip.access",
459 .want_write = ts_want_write,
460};
461
462/* callback of the OML listening filedescriptor */
463static int listen_fd_cb(struct bsc_fd *listen_bfd, unsigned int what)
464{
465 int ret;
466 int idx = 0;
467 struct e1inp_line *line;
468 struct e1inp_ts *e1i_ts;
469 struct bsc_fd *bfd;
470 struct sockaddr_in sa;
471 socklen_t sa_len = sizeof(sa);
472
473 if (!(what & BSC_FD_READ))
474 return 0;
475
476 ret = accept(listen_bfd->fd, (struct sockaddr *) &sa, &sa_len);
477 if (ret < 0) {
478 perror("accept");
479 return ret;
480 }
481 DEBUGP(DINP, "accept()ed new OML link from %s\n", inet_ntoa(sa.sin_addr));
482
Harald Weltea8379772009-06-20 22:36:41 +0200483 line = talloc(tall_bsc_ctx, struct e1inp_line);
Harald Welte59b04682009-06-10 05:40:52 +0800484 if (!line) {
485 close(ret);
486 return -ENOMEM;
487 }
488 memset(line, 0, sizeof(*line));
489 line->driver = &ipaccess_driver;
490 //line->driver_data = e1h;
491 /* create virrtual E1 timeslots for signalling */
492 e1inp_ts_config(&line->ts[1-1], line, E1INP_TS_TYPE_SIGN);
493 e1inp_ts_config(&line->ts[2-1], line, E1INP_TS_TYPE_SIGN);
494
495 e1i_ts = &line->ts[idx];
496
497 bfd = &e1i_ts->driver.ipaccess.fd;
498 bfd->fd = ret;
499 bfd->data = line;
500 bfd->priv_nr = 1;
501 bfd->cb = ipaccess_fd_cb;
502 bfd->when = BSC_FD_READ;
503 ret = bsc_register_fd(bfd);
504 if (ret < 0) {
505 fprintf(stderr, "could not register FD\n");
506 close(bfd->fd);
Harald Welte49a84052009-06-22 01:36:25 +0200507 talloc_free(line);
Harald Welte59b04682009-06-10 05:40:52 +0800508 return ret;
509 }
510
511 /* Request ID. FIXME: request LOCATION, HW/SW VErsion, Unit Name, Serno */
512 ret = write(bfd->fd, id_req, sizeof(id_req));
513
Holger Hans Peter Freyther182c7452009-08-10 07:59:27 +0200514 return ret;
Harald Welte62868882009-08-08 16:12:58 +0200515 //return e1inp_line_register(line);
Harald Welte59b04682009-06-10 05:40:52 +0800516}
517
518static int rsl_listen_fd_cb(struct bsc_fd *listen_bfd, unsigned int what)
519{
520 struct sockaddr_in sa;
521 socklen_t sa_len = sizeof(sa);
Harald Welte49a84052009-06-22 01:36:25 +0200522 struct bsc_fd *bfd;
Harald Welte59b04682009-06-10 05:40:52 +0800523 int ret;
524
525 if (!(what & BSC_FD_READ))
526 return 0;
527
Harald Welte49a84052009-06-22 01:36:25 +0200528 bfd = talloc(tall_bsc_ctx, struct bsc_fd);
529 if (!bfd)
530 return -ENOMEM;
531 memset(bfd, 0, sizeof(*bfd));
532
Harald Welte59b04682009-06-10 05:40:52 +0800533 /* Some BTS has connected to us, but we don't know yet which line
534 * (as created by the OML link) to associate it with. Thus, we
535 * aloocate a temporary bfd until we have received ID from BTS */
536
537 bfd->fd = accept(listen_bfd->fd, (struct sockaddr *) &sa, &sa_len);
538 if (bfd->fd < 0) {
539 perror("accept");
540 return bfd->fd;
541 }
542 DEBUGP(DINP, "accept()ed new RSL link from %s\n", inet_ntoa(sa.sin_addr));
543 bfd->priv_nr = 2;
544 bfd->cb = ipaccess_fd_cb;
545 bfd->when = BSC_FD_READ;
546 ret = bsc_register_fd(bfd);
547 if (ret < 0) {
548 fprintf(stderr, "could not register FD\n");
549 close(bfd->fd);
Harald Welte49a84052009-06-22 01:36:25 +0200550 talloc_free(bfd);
Harald Welte59b04682009-06-10 05:40:52 +0800551 return ret;
552 }
553 /* Request ID. FIXME: request LOCATION, HW/SW VErsion, Unit Name, Serno */
554 ret = write(bfd->fd, id_req, sizeof(id_req));
555
556 return 0;
557}
558
559static int make_sock(struct bsc_fd *bfd, u_int16_t port,
560 int (*cb)(struct bsc_fd *fd, unsigned int what))
561{
562 struct sockaddr_in addr;
563 int ret, on = 1;
564
565 bfd->fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
566 bfd->cb = cb;
567 bfd->when = BSC_FD_READ;
568 //bfd->data = line;
569
570 memset(&addr, 0, sizeof(addr));
571 addr.sin_family = AF_INET;
572 addr.sin_port = htons(port);
573 addr.sin_addr.s_addr = INADDR_ANY;
574
575 setsockopt(bfd->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
576
577 ret = bind(bfd->fd, (struct sockaddr *) &addr, sizeof(addr));
578 if (ret < 0) {
579 fprintf(stderr, "could not bind l2 socket %s\n",
580 strerror(errno));
581 return -EIO;
582 }
583
584 ret = listen(bfd->fd, 1);
585 if (ret < 0) {
586 perror("listen");
587 return ret;
588 }
589
590 ret = bsc_register_fd(bfd);
591 if (ret < 0) {
592 perror("register_listen_fd");
593 return ret;
594 }
595 return 0;
596}
597
598/* Actively connect to a BTS. Currently used by ipaccess-config.c */
599int ipaccess_connect(struct e1inp_line *line, struct sockaddr_in *sa)
600{
601 struct e1inp_ts *e1i_ts = &line->ts[0];
602 struct bsc_fd *bfd = &e1i_ts->driver.ipaccess.fd;
603 int ret, on = 1;
604
605 bfd->fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
606 bfd->cb = ipaccess_fd_cb;
607 bfd->when = BSC_FD_READ | BSC_FD_WRITE;
608 bfd->data = line;
609 bfd->priv_nr = 1;
610
611 setsockopt(bfd->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
612
613 ret = connect(bfd->fd, (struct sockaddr *) sa, sizeof(*sa));
614 if (ret < 0) {
615 fprintf(stderr, "could not connect socket\n");
616 close(bfd->fd);
617 return ret;
618 }
619
620 ret = bsc_register_fd(bfd);
621 if (ret < 0) {
622 close(bfd->fd);
623 return ret;
624 }
625
626 line->driver = &ipaccess_driver;
627
Holger Hans Peter Freyther182c7452009-08-10 07:59:27 +0200628 return ret;
Harald Welte62868882009-08-08 16:12:58 +0200629 //return e1inp_line_register(line);
Harald Welte59b04682009-06-10 05:40:52 +0800630}
631
632int ipaccess_setup(struct gsm_network *gsmnet)
633{
634 int ret;
635
636 /* register the driver with the core */
637 /* FIXME: do this in the plugin initializer function */
638 ret = e1inp_driver_register(&ipaccess_driver);
639 if (ret)
640 return ret;
641
Harald Weltea8379772009-06-20 22:36:41 +0200642 e1h = talloc(tall_bsc_ctx, struct ia_e1_handle);
Harald Welte49a84052009-06-22 01:36:25 +0200643 if (!e1h)
644 return -ENOMEM;
Harald Welte59b04682009-06-10 05:40:52 +0800645 memset(e1h, 0, sizeof(*e1h));
Harald Welte49a84052009-06-22 01:36:25 +0200646
Harald Welte59b04682009-06-10 05:40:52 +0800647 e1h->gsmnet = gsmnet;
648
649 /* Listen for OML connections */
650 ret = make_sock(&e1h->listen_fd, 3002, listen_fd_cb);
651 if (ret < 0)
652 return ret;
653
654 /* Listen for RSL connections */
655 ret = make_sock(&e1h->rsl_listen_fd, 3003, rsl_listen_fd_cb);
656
657 return ret;
658}