blob: a71b7e1a746703b7ddc8b4ccbe02288b66f4a55e [file] [log] [blame]
Harald Welte936f6722016-05-03 18:51:18 +02001/* (C) 2016 by Harald Welte <laforge@gnumonks.org>
2 *
3 * All Rights Reserved
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU Affero General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU Affero General Public License for more details.
14 *
15 * You should have received a copy of the GNU Affero General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
17 *
18 */
19
Harald Welteaabae9e2016-04-28 12:48:14 +020020#include <signal.h>
Harald Weltee687be52016-05-03 18:49:27 +020021#include <errno.h>
Maxea8b0d42017-02-14 16:53:04 +010022#include <stdbool.h>
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +010023#include <getopt.h>
24
Harald Weltee72cf552016-04-28 07:18:49 +020025#include <osmocom/core/msgb.h>
Max20ddfdb2019-02-18 13:12:27 +010026#include <osmocom/core/stats.h>
Harald Weltee72cf552016-04-28 07:18:49 +020027#include <osmocom/core/logging.h>
28#include <osmocom/core/application.h>
29#include <osmocom/gsm/gsup.h>
Neels Hofmeyr7685a782017-01-30 23:30:26 +010030#include <osmocom/vty/vty.h>
31#include <osmocom/vty/command.h>
32#include <osmocom/vty/telnet_interface.h>
33#include <osmocom/vty/ports.h>
Max372868b2017-03-02 12:12:00 +010034#include <osmocom/ctrl/control_vty.h>
Neels Hofmeyr5aeb4382018-05-04 16:02:44 +020035#include <osmocom/gsm/apn.h>
Oliver Smith783ac812018-12-17 11:34:51 +010036#include <osmocom/gsm/gsm48_ie.h>
Oliver Smithc7f17872019-03-04 15:10:44 +010037#include <osmocom/gsm/gsm_utils.h>
38#include <osmocom/gsm/protocol/gsm_23_003.h>
Harald Weltee72cf552016-04-28 07:18:49 +020039
Neels Hofmeyr2f758032019-11-20 00:37:07 +010040#include <osmocom/hlr/db.h>
41#include <osmocom/hlr/hlr.h>
42#include <osmocom/hlr/ctrl.h>
43#include <osmocom/hlr/logging.h>
44#include <osmocom/hlr/gsup_server.h>
45#include <osmocom/hlr/gsup_router.h>
46#include <osmocom/hlr/rand.h>
47#include <osmocom/hlr/luop.h>
48#include <osmocom/hlr/hlr_vty.h>
49#include <osmocom/hlr/hlr_ussd.h>
Harald Weltee72cf552016-04-28 07:18:49 +020050
Harald Welted5807b82018-07-29 12:27:41 +020051struct hlr *g_hlr;
Oliver Smithc5044cf2019-02-26 16:32:57 +010052static void *hlr_ctx = NULL;
Vadim Yanitskiy527d9342018-07-30 02:42:25 +070053static int quit = 0;
Harald Weltee72cf552016-04-28 07:18:49 +020054
Stefan Sperlingf1622522018-04-09 11:39:16 +020055/* Trigger 'Insert Subscriber Data' messages to all connected GSUP clients.
56 *
Stefan Sperlingf1622522018-04-09 11:39:16 +020057 * \param[in] subscr A subscriber we have new data to send for.
58 */
59void
60osmo_hlr_subscriber_update_notify(struct hlr_subscriber *subscr)
61{
62 struct osmo_gsup_conn *co;
63
Neels Hofmeyre66e5252018-09-28 02:59:19 +020064 if (g_hlr->gs == NULL) {
65 LOGP(DLGSUP, LOGL_DEBUG,
66 "IMSI %s: NOT Notifying peers of subscriber data change,"
67 " there is no GSUP server\n",
68 subscr->imsi);
Stefan Sperlingf1622522018-04-09 11:39:16 +020069 return;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020070 }
Stefan Sperlingf1622522018-04-09 11:39:16 +020071
72 llist_for_each_entry(co, &g_hlr->gs->clients, list) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020073 struct osmo_gsup_message gsup = { };
74 uint8_t msisdn_enc[OSMO_GSUP_MAX_CALLED_PARTY_BCD_LEN];
75 uint8_t apn[APN_MAXLEN];
76 struct msgb *msg_out;
Stefan Sperling93c5b102018-04-10 19:26:14 +020077 uint8_t *peer;
78 int peer_len;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020079 size_t peer_strlen;
80 const char *peer_compare;
Stefan Sperlingf83432c2018-05-03 14:26:59 +020081 enum osmo_gsup_cn_domain cn_domain;
Stefan Sperling93c5b102018-04-10 19:26:14 +020082
Neels Hofmeyre66e5252018-09-28 02:59:19 +020083 if (co->supports_ps) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020084 cn_domain = OSMO_GSUP_CN_DOMAIN_PS;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020085 peer_compare = subscr->sgsn_number;
86 } else if (co->supports_cs) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020087 cn_domain = OSMO_GSUP_CN_DOMAIN_CS;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020088 peer_compare = subscr->vlr_number;
89 } else {
90 /* We have not yet received a location update from this GSUP client.*/
Stefan Sperlingf83432c2018-05-03 14:26:59 +020091 continue;
92 }
93
Neels Hofmeyre66e5252018-09-28 02:59:19 +020094 peer_len = osmo_gsup_conn_ccm_get(co, &peer, IPAC_IDTAG_SERNR);
95 if (peer_len < 0) {
96 LOGP(DLGSUP, LOGL_ERROR,
97 "IMSI='%s': cannot get peer name for connection %s:%u\n", subscr->imsi,
98 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
99 co && co->conn && co->conn->server? co->conn->server->port : 0);
100 continue;
101 }
102
103 peer_strlen = strnlen((const char*)peer, peer_len);
104 if (strlen(peer_compare) != peer_strlen || strncmp(peer_compare, (const char *)peer, peer_len)) {
105 /* Mismatch. The subscriber is not subscribed with this GSUP client. */
106 /* I hope peer is always nul terminated... */
107 if (peer_strlen < peer_len)
108 LOGP(DLGSUP, LOGL_DEBUG,
109 "IMSI %s: subscriber change: skipping %s peer %s\n",
110 subscr->imsi, cn_domain == OSMO_GSUP_CN_DOMAIN_PS ? "PS" : "CS",
111 osmo_quote_str((char*)peer, -1));
112 continue;
113 }
114
115 LOGP(DLGSUP, LOGL_DEBUG,
116 "IMSI %s: subscriber change: notifying %s peer %s\n",
117 subscr->imsi, cn_domain == OSMO_GSUP_CN_DOMAIN_PS ? "PS" : "CS",
118 osmo_quote_str(peer_compare, -1));
119
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200120 if (osmo_gsup_create_insert_subscriber_data_msg(&gsup, subscr->imsi, subscr->msisdn, msisdn_enc,
121 sizeof(msisdn_enc), apn, sizeof(apn), cn_domain) != 0) {
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200122 LOGP(DLGSUP, LOGL_ERROR,
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200123 "IMSI='%s': Cannot notify GSUP client; could not create gsup message "
Stefan Sperling93c5b102018-04-10 19:26:14 +0200124 "for %s:%u\n", subscr->imsi,
Stefan Sperlingf1622522018-04-09 11:39:16 +0200125 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
126 co && co->conn && co->conn->server? co->conn->server->port : 0);
127 continue;
128 }
Stefan Sperling93c5b102018-04-10 19:26:14 +0200129
Stefan Sperling93c5b102018-04-10 19:26:14 +0200130 /* Send ISD to MSC/SGSN */
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100131 msg_out = osmo_gsup_msgb_alloc("GSUP ISD UPDATE");
Stefan Sperling93c5b102018-04-10 19:26:14 +0200132 if (msg_out == NULL) {
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200133 LOGP(DLGSUP, LOGL_ERROR,
Stefan Sperling93c5b102018-04-10 19:26:14 +0200134 "IMSI='%s': Cannot notify GSUP client; could not allocate msg buffer "
135 "for %s:%u\n", subscr->imsi,
136 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
137 co && co->conn && co->conn->server? co->conn->server->port : 0);
138 continue;
139 }
Stefan Sperling93c5b102018-04-10 19:26:14 +0200140 osmo_gsup_encode(msg_out, &gsup);
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200141
Stefan Sperling93c5b102018-04-10 19:26:14 +0200142 if (osmo_gsup_addr_send(g_hlr->gs, peer, peer_len, msg_out) < 0) {
143 LOGP(DMAIN, LOGL_ERROR,
144 "IMSI='%s': Cannot notify GSUP client; send operation failed "
145 "for %s:%u\n", subscr->imsi,
146 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
147 co && co->conn && co->conn->server? co->conn->server->port : 0);
148 continue;
149 }
Stefan Sperlingf1622522018-04-09 11:39:16 +0200150 }
151}
152
Oliver Smithc7f17872019-03-04 15:10:44 +0100153static int generate_new_msisdn(char *msisdn, const char *imsi, unsigned int len)
154{
155 int i, j, rc;
156 uint8_t rand_buf[GSM23003_MSISDN_MAX_DIGITS];
157
158 OSMO_ASSERT(len <= sizeof(rand_buf));
159
160 /* Generate a random unique MSISDN (with retry) */
161 for (i = 0; i < 10; i++) {
162 /* Get a random number (with retry) */
163 for (j = 0; j < 10; j++) {
164 rc = osmo_get_rand_id(rand_buf, len);
165 if (!rc)
166 break;
167 }
168 if (rc) {
169 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to generate new MSISDN, random number generator"
170 " failed (rc=%d)\n", imsi, rc);
171 return rc;
172 }
173
174 /* Shift 0x00 ... 0xff range to 30 ... 39 (ASCII numbers) */
175 for (j = 0; j < len; j++)
176 msisdn[j] = 48 + (rand_buf[j] % 10);
177 msisdn[j] = '\0';
178
179 /* Ensure there is no subscriber with such MSISDN */
180 if (db_subscr_exists_by_msisdn(g_hlr->dbc, msisdn) == -ENOENT)
181 return 0;
182 }
183
184 /* Failure */
185 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to generate a new MSISDN, consider increasing "
186 "the length for the automatically assigned MSISDNs "
187 "(see 'subscriber-create-on-demand' command)\n", imsi);
188 return -1;
189}
190
191static int subscr_create_on_demand(const char *imsi)
192{
193 char msisdn[GSM23003_MSISDN_MAX_DIGITS + 1];
194 int rc;
195 unsigned int rand_msisdn_len = g_hlr->subscr_create_on_demand_rand_msisdn_len;
196
197 if (!g_hlr->subscr_create_on_demand)
198 return -1;
199 if (db_subscr_exists_by_imsi(g_hlr->dbc, imsi) == 0)
200 return -1;
201 if (rand_msisdn_len && generate_new_msisdn(msisdn, imsi, rand_msisdn_len) != 0)
202 return -1;
203
204 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': Creating subscriber on demand\n", imsi);
205 rc = db_subscr_create(g_hlr->dbc, imsi, g_hlr->subscr_create_on_demand_flags);
206 if (rc) {
207 LOGP(DMAIN, LOGL_ERROR, "Failed to create subscriber on demand (rc=%d): IMSI='%s'\n", rc, imsi);
208 return rc;
209 }
210
211 if (!rand_msisdn_len)
212 return 0;
213
214 /* Update MSISDN of the new (just allocated) subscriber */
215 rc = db_subscr_update_msisdn_by_imsi(g_hlr->dbc, imsi, msisdn);
216 if (rc) {
217 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to assign MSISDN='%s' (rc=%d)\n", imsi, msisdn, rc);
218 return rc;
219 }
220 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': Successfully assigned MSISDN='%s'\n", imsi, msisdn);
221
222 return 0;
223}
224
Harald Weltee687be52016-05-03 18:49:27 +0200225/***********************************************************************
226 * Send Auth Info handling
227 ***********************************************************************/
228
Harald Weltee72cf552016-04-28 07:18:49 +0200229/* process an incoming SAI request */
230static int rx_send_auth_info(struct osmo_gsup_conn *conn,
Maxd4bebbd2017-03-02 12:00:19 +0100231 const struct osmo_gsup_message *gsup,
232 struct db_context *dbc)
Harald Weltee72cf552016-04-28 07:18:49 +0200233{
234 struct osmo_gsup_message gsup_out;
235 struct msgb *msg_out;
Harald Welte06f5af22019-08-21 20:01:31 +0200236 bool separation_bit = false;
Harald Weltee72cf552016-04-28 07:18:49 +0200237 int rc;
238
Oliver Smithc7f17872019-03-04 15:10:44 +0100239 subscr_create_on_demand(gsup->imsi);
240
Harald Weltee72cf552016-04-28 07:18:49 +0200241 /* initialize return message structure */
242 memset(&gsup_out, 0, sizeof(gsup_out));
Harald Weltee72cf552016-04-28 07:18:49 +0200243 memcpy(&gsup_out.imsi, &gsup->imsi, sizeof(gsup_out.imsi));
244
Harald Welte06f5af22019-08-21 20:01:31 +0200245 if (gsup->current_rat_type == OSMO_RAT_EUTRAN_SGS)
246 separation_bit = true;
247
Neels Hofmeyrcab2fcd2017-03-15 00:07:43 +0100248 rc = db_get_auc(dbc, gsup->imsi, conn->auc_3g_ind,
249 gsup_out.auth_vectors,
Harald Weltee72cf552016-04-28 07:18:49 +0200250 ARRAY_SIZE(gsup_out.auth_vectors),
Harald Welte06f5af22019-08-21 20:01:31 +0200251 gsup->rand, gsup->auts, separation_bit);
Neels Hofmeyr671db902017-11-22 20:38:19 +0100252 if (rc <= 0) {
Harald Weltee72cf552016-04-28 07:18:49 +0200253 gsup_out.message_type = OSMO_GSUP_MSGT_SEND_AUTH_INFO_ERROR;
Neels Hofmeyr671db902017-11-22 20:38:19 +0100254 switch (rc) {
255 case 0:
Neels Hofmeyrbd1dca02017-11-23 15:25:30 +0100256 /* 0 means "0 tuples generated", which shouldn't happen.
257 * Treat the same as "no auth data". */
258 case -ENOKEY:
Neels Hofmeyrab4d5092017-11-23 15:31:12 +0100259 LOGP(DAUC, LOGL_NOTICE, "%s: IMSI known, but has no auth data;"
260 " Returning slightly inaccurate cause 'IMSI Unknown' via GSUP\n",
261 gsup->imsi);
262 gsup_out.cause = GMM_CAUSE_IMSI_UNKNOWN;
263 break;
Neels Hofmeyr33cbde92017-11-22 20:39:59 +0100264 case -ENOENT:
Neels Hofmeyrab4d5092017-11-23 15:31:12 +0100265 LOGP(DAUC, LOGL_NOTICE, "%s: IMSI not known\n", gsup->imsi);
Neels Hofmeyr671db902017-11-22 20:38:19 +0100266 gsup_out.cause = GMM_CAUSE_IMSI_UNKNOWN;
267 break;
268 default:
Neels Hofmeyrab4d5092017-11-23 15:31:12 +0100269 LOGP(DAUC, LOGL_ERROR, "%s: failure to look up IMSI in db\n", gsup->imsi);
Neels Hofmeyr671db902017-11-22 20:38:19 +0100270 gsup_out.cause = GMM_CAUSE_NET_FAIL;
271 break;
272 }
Harald Welte15db8262016-05-05 16:50:39 +0200273 } else {
274 gsup_out.message_type = OSMO_GSUP_MSGT_SEND_AUTH_INFO_RESULT;
275 gsup_out.num_auth_vectors = rc;
Harald Weltee72cf552016-04-28 07:18:49 +0200276 }
277
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100278 msg_out = osmo_gsup_msgb_alloc("GSUP AUC response");
Harald Weltee72cf552016-04-28 07:18:49 +0200279 osmo_gsup_encode(msg_out, &gsup_out);
280 return osmo_gsup_conn_send(conn, msg_out);
281}
282
Harald Weltee687be52016-05-03 18:49:27 +0200283/***********************************************************************
284 * LU Operation State / Structure
285 ***********************************************************************/
286
287static LLIST_HEAD(g_lu_ops);
288
Harald Weltee687be52016-05-03 18:49:27 +0200289/*! Receive Cancel Location Result from old VLR/SGSN */
290void lu_op_rx_cancel_old_ack(struct lu_operation *luop,
Maxea8b0d42017-02-14 16:53:04 +0100291 const struct osmo_gsup_message *gsup)
Harald Weltee687be52016-05-03 18:49:27 +0200292{
293 OSMO_ASSERT(luop->state == LU_S_CANCEL_SENT);
294 /* FIXME: Check for spoofing */
295
296 osmo_timer_del(&luop->timer);
297
298 /* FIXME */
299
300 lu_op_tx_insert_subscr_data(luop);
301}
302
Harald Weltee687be52016-05-03 18:49:27 +0200303/*! Receive Insert Subscriber Data Result from new VLR/SGSN */
304static void lu_op_rx_insert_subscr_data_ack(struct lu_operation *luop,
305 const struct osmo_gsup_message *gsup)
306{
307 OSMO_ASSERT(luop->state == LU_S_ISD_SENT);
308 /* FIXME: Check for spoofing */
309
310 osmo_timer_del(&luop->timer);
311
312 /* Subscriber_Present_HLR */
313 /* CS only: Check_SS_required? -> MAP-FW-CHECK_SS_IND.req */
314
315 /* Send final ACK towards inquiring VLR/SGSN */
316 lu_op_tx_ack(luop);
317}
318
319/*! Receive GSUP message for given \ref lu_operation */
320void lu_op_rx_gsup(struct lu_operation *luop,
321 const struct osmo_gsup_message *gsup)
322{
323 switch (gsup->message_type) {
324 case OSMO_GSUP_MSGT_INSERT_DATA_ERROR:
325 /* FIXME */
326 break;
327 case OSMO_GSUP_MSGT_INSERT_DATA_RESULT:
328 lu_op_rx_insert_subscr_data_ack(luop, gsup);
329 break;
330 case OSMO_GSUP_MSGT_LOCATION_CANCEL_ERROR:
331 /* FIXME */
332 break;
333 case OSMO_GSUP_MSGT_LOCATION_CANCEL_RESULT:
334 lu_op_rx_cancel_old_ack(luop, gsup);
335 break;
336 default:
337 LOGP(DMAIN, LOGL_ERROR, "Unhandled GSUP msg_type 0x%02x\n",
338 gsup->message_type);
339 break;
340 }
341}
342
Harald Weltee687be52016-05-03 18:49:27 +0200343/*! Receive Update Location Request, creates new \ref lu_operation */
344static int rx_upd_loc_req(struct osmo_gsup_conn *conn,
345 const struct osmo_gsup_message *gsup)
346{
Neels Hofmeyrcb364bb2018-09-28 01:22:15 +0200347 struct hlr_subscriber *subscr;
Maxea8b0d42017-02-14 16:53:04 +0100348 struct lu_operation *luop = lu_op_alloc_conn(conn);
349 if (!luop) {
Harald Weltee687be52016-05-03 18:49:27 +0200350 LOGP(DMAIN, LOGL_ERROR, "LU REQ from conn without addr?\n");
Maxea8b0d42017-02-14 16:53:04 +0100351 return -EINVAL;
Harald Weltee687be52016-05-03 18:49:27 +0200352 }
353
Neels Hofmeyrcb364bb2018-09-28 01:22:15 +0200354 subscr = &luop->subscr;
355
Harald Weltee687be52016-05-03 18:49:27 +0200356 lu_op_statechg(luop, LU_S_LU_RECEIVED);
Maxea8b0d42017-02-14 16:53:04 +0100357
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200358 switch (gsup->cn_domain) {
359 case OSMO_GSUP_CN_DOMAIN_CS:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200360 conn->supports_cs = true;
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200361 break;
362 default:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200363 /* The client didn't send a CN_DOMAIN IE; assume packet-switched in
364 * accordance with the GSUP spec in osmo-hlr's user manual (section
365 * 11.6.15 "CN Domain" says "if no CN Domain IE is present within
366 * a request, the PS Domain is assumed." */
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200367 case OSMO_GSUP_CN_DOMAIN_PS:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200368 conn->supports_ps = true;
Stefan Sperling1cb48922018-05-03 14:05:56 +0200369 luop->is_ps = true;
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200370 break;
Stefan Sperling93c5b102018-04-10 19:26:14 +0200371 }
Harald Weltee687be52016-05-03 18:49:27 +0200372 llist_add(&luop->list, &g_lu_ops);
373
Oliver Smithc7f17872019-03-04 15:10:44 +0100374 subscr_create_on_demand(gsup->imsi);
375
Harald Weltee687be52016-05-03 18:49:27 +0200376 /* Roughly follwing "Process Update_Location_HLR" of TS 09.02 */
377
378 /* check if subscriber is known at all */
Maxd4bebbd2017-03-02 12:00:19 +0100379 if (!lu_op_fill_subscr(luop, g_hlr->dbc, gsup->imsi)) {
Harald Weltee687be52016-05-03 18:49:27 +0200380 /* Send Error back: Subscriber Unknown in HLR */
Harald Weltebd0d5bf2017-11-06 03:55:02 +0900381 osmo_strlcpy(luop->subscr.imsi, gsup->imsi, sizeof(luop->subscr.imsi));
Harald Weltee687be52016-05-03 18:49:27 +0200382 lu_op_tx_error(luop, GMM_CAUSE_IMSI_UNKNOWN);
383 return 0;
384 }
385
Harald Welte99909272016-05-05 18:24:15 +0200386 /* Check if subscriber is generally permitted on CS or PS
387 * service (as requested) */
Maxea8b0d42017-02-14 16:53:04 +0100388 if (!luop->is_ps && !luop->subscr.nam_cs) {
Harald Weltee687be52016-05-03 18:49:27 +0200389 lu_op_tx_error(luop, GMM_CAUSE_PLMN_NOTALLOWED);
390 return 0;
Maxea8b0d42017-02-14 16:53:04 +0100391 } else if (luop->is_ps && !luop->subscr.nam_ps) {
Harald Weltee687be52016-05-03 18:49:27 +0200392 lu_op_tx_error(luop, GMM_CAUSE_GPRS_NOTALLOWED);
393 return 0;
394 }
395
396 /* TODO: Set subscriber tracing = deactive in VLR/SGSN */
397
398#if 0
399 /* Cancel in old VLR/SGSN, if new VLR/SGSN differs from old */
400 if (luop->is_ps == false &&
401 strcmp(subscr->vlr_number, vlr_number)) {
Harald Weltee687be52016-05-03 18:49:27 +0200402 lu_op_tx_cancel_old(luop);
403 } else if (luop->is_ps == true &&
404 strcmp(subscr->sgsn_number, sgsn_number)) {
Harald Weltee687be52016-05-03 18:49:27 +0200405 lu_op_tx_cancel_old(luop);
406 } else
407#endif
Neels Hofmeyrcb364bb2018-09-28 01:22:15 +0200408
409 /* Store the VLR / SGSN number with the subscriber, so we know where it was last seen. */
410 LOGP(DAUC, LOGL_DEBUG, "IMSI='%s': storing %s = %s\n",
411 subscr->imsi, luop->is_ps ? "SGSN number" : "VLR number",
412 osmo_quote_str((const char*)luop->peer, -1));
413 if (db_subscr_lu(g_hlr->dbc, subscr->id, (const char *)luop->peer, luop->is_ps))
414 LOGP(DAUC, LOGL_ERROR, "IMSI='%s': Cannot update %s in the database\n",
415 subscr->imsi, luop->is_ps ? "SGSN number" : "VLR number");
416
Oliver Smith66106c02019-01-09 12:05:15 +0100417 /* TODO: Subscriber allowed to roam in PLMN? */
418 /* TODO: Update RoutingInfo */
419 /* TODO: Reset Flag MS Purged (cs/ps) */
420 /* TODO: Control_Tracing_HLR / Control_Tracing_HLR_with_SGSN */
421 lu_op_tx_insert_subscr_data(luop);
422
Harald Weltee687be52016-05-03 18:49:27 +0200423 return 0;
424}
425
Harald Welteb18f0e02016-05-05 21:03:03 +0200426static int rx_purge_ms_req(struct osmo_gsup_conn *conn,
427 const struct osmo_gsup_message *gsup)
428{
429 struct osmo_gsup_message gsup_reply = {0};
430 struct msgb *msg_out;
431 bool is_ps = false;
432 int rc;
433
434 LOGP(DAUC, LOGL_INFO, "%s: Purge MS (%s)\n", gsup->imsi,
435 is_ps ? "PS" : "CS");
436
437 memcpy(gsup_reply.imsi, gsup->imsi, sizeof(gsup_reply.imsi));
438
439 if (gsup->cn_domain == OSMO_GSUP_CN_DOMAIN_PS)
440 is_ps = true;
441
442 /* FIXME: check if the VLR that sends the purge is the same that
443 * we have on record. Only update if yes */
444
445 /* Perform the actual update of the DB */
Neels Hofmeyre50121e2017-10-09 17:48:51 +0200446 rc = db_subscr_purge(g_hlr->dbc, gsup->imsi, true, is_ps);
Harald Welteb18f0e02016-05-05 21:03:03 +0200447
Harald Welte3f2a9a22018-03-01 23:35:35 +0100448 if (rc == 0)
Harald Welteb18f0e02016-05-05 21:03:03 +0200449 gsup_reply.message_type = OSMO_GSUP_MSGT_PURGE_MS_RESULT;
Harald Welte3f2a9a22018-03-01 23:35:35 +0100450 else if (rc == -ENOENT) {
Harald Welteb18f0e02016-05-05 21:03:03 +0200451 gsup_reply.message_type = OSMO_GSUP_MSGT_PURGE_MS_ERROR;
452 gsup_reply.cause = GMM_CAUSE_IMSI_UNKNOWN;
453 } else {
454 gsup_reply.message_type = OSMO_GSUP_MSGT_PURGE_MS_ERROR;
455 gsup_reply.cause = GMM_CAUSE_NET_FAIL;
456 }
457
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100458 msg_out = osmo_gsup_msgb_alloc("GSUP AUC response");
Harald Welteb18f0e02016-05-05 21:03:03 +0200459 osmo_gsup_encode(msg_out, &gsup_reply);
460 return osmo_gsup_conn_send(conn, msg_out);
461}
462
Harald Weltea1d3b042018-06-11 20:28:35 +0200463static int gsup_send_err_reply(struct osmo_gsup_conn *conn, const char *imsi,
464 enum osmo_gsup_message_type type_in, uint8_t err_cause)
465{
Oliver Smithf9cf1802019-02-04 11:20:08 +0100466 int type_err = OSMO_GSUP_TO_MSGT_ERROR(type_in);
Harald Weltea1d3b042018-06-11 20:28:35 +0200467 struct osmo_gsup_message gsup_reply = {0};
468 struct msgb *msg_out;
469
Harald Weltea1d3b042018-06-11 20:28:35 +0200470 OSMO_STRLCPY_ARRAY(gsup_reply.imsi, imsi);
471 gsup_reply.message_type = type_err;
472 gsup_reply.cause = err_cause;
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100473 msg_out = osmo_gsup_msgb_alloc("GSUP ERR response");
Harald Weltea1d3b042018-06-11 20:28:35 +0200474 osmo_gsup_encode(msg_out, &gsup_reply);
475 LOGP(DMAIN, LOGL_NOTICE, "Tx %s\n", osmo_gsup_message_type_name(type_err));
476 return osmo_gsup_conn_send(conn, msg_out);
477}
478
Oliver Smith783ac812018-12-17 11:34:51 +0100479static int rx_check_imei_req(struct osmo_gsup_conn *conn, const struct osmo_gsup_message *gsup)
480{
481 struct osmo_gsup_message gsup_reply = {0};
482 struct msgb *msg_out;
Oliver Smith103c11b2019-06-06 11:57:05 +0200483 char imei[GSM23003_IMEI_NUM_DIGITS_NO_CHK+1] = {0};
484 int rc;
Oliver Smith783ac812018-12-17 11:34:51 +0100485
Oliver Smith103c11b2019-06-06 11:57:05 +0200486 /* Require IMEI */
487 if (!gsup->imei_enc) {
488 LOGP(DMAIN, LOGL_ERROR, "%s: missing IMEI\n", gsup->imsi);
Oliver Smith783ac812018-12-17 11:34:51 +0100489 gsup_send_err_reply(conn, gsup->imsi, gsup->message_type, GMM_CAUSE_INV_MAND_INFO);
490 return -1;
491 }
492
Oliver Smith103c11b2019-06-06 11:57:05 +0200493 /* Decode IMEI (fails if IMEI is too long) */
494 rc = gsm48_decode_bcd_number2(imei, sizeof(imei), gsup->imei_enc, gsup->imei_enc_len, 0);
495 if (rc < 0) {
496 LOGP(DMAIN, LOGL_ERROR, "%s: failed to decode IMEI (rc: %i)\n", gsup->imsi, rc);
497 gsup_send_err_reply(conn, gsup->imsi, gsup->message_type, GMM_CAUSE_INV_MAND_INFO);
498 return -1;
499 }
500
501 /* Check if IMEI is too short */
502 if (strlen(imei) != GSM23003_IMEI_NUM_DIGITS_NO_CHK) {
503 LOGP(DMAIN, LOGL_ERROR, "%s: wrong encoded IMEI length (IMEI: '%s', %lu, %i)\n", gsup->imsi, imei,
504 strlen(imei), GSM23003_IMEI_NUM_DIGITS_NO_CHK);
Oliver Smith783ac812018-12-17 11:34:51 +0100505 gsup_send_err_reply(conn, gsup->imsi, gsup->message_type, GMM_CAUSE_INV_MAND_INFO);
506 return -1;
507 }
508
Oliver Smithc7f17872019-03-04 15:10:44 +0100509 subscr_create_on_demand(gsup->imsi);
510
Oliver Smith851814a2019-01-11 15:30:21 +0100511 /* Save in DB if desired */
512 if (g_hlr->store_imei) {
513 LOGP(DAUC, LOGL_DEBUG, "IMSI='%s': storing IMEI = %s\n", gsup->imsi, imei);
514 if (db_subscr_update_imei_by_imsi(g_hlr->dbc, gsup->imsi, imei) < 0) {
515 gsup_send_err_reply(conn, gsup->imsi, gsup->message_type, GMM_CAUSE_INV_MAND_INFO);
516 return -1;
517 }
518 } else {
519 /* Check if subscriber exists and print IMEI */
520 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': has IMEI = %s (consider setting 'store-imei')\n", gsup->imsi, imei);
521 struct hlr_subscriber subscr;
522 if (db_subscr_get_by_imsi(g_hlr->dbc, gsup->imsi, &subscr) < 0) {
523 gsup_send_err_reply(conn, gsup->imsi, gsup->message_type, GMM_CAUSE_INV_MAND_INFO);
524 return -1;
525 }
526 }
Oliver Smith783ac812018-12-17 11:34:51 +0100527
528 /* Accept all IMEIs */
529 gsup_reply.imei_result = OSMO_GSUP_IMEI_RESULT_ACK;
530 gsup_reply.message_type = OSMO_GSUP_MSGT_CHECK_IMEI_RESULT;
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100531 msg_out = osmo_gsup_msgb_alloc("GSUP Check_IMEI response");
Oliver Smith783ac812018-12-17 11:34:51 +0100532 memcpy(gsup_reply.imsi, gsup->imsi, sizeof(gsup_reply.imsi));
533 osmo_gsup_encode(msg_out, &gsup_reply);
534 return osmo_gsup_conn_send(conn, msg_out);
535}
536
Oliver Smith28f0af82019-02-22 11:46:33 +0100537static char namebuf[255];
538#define LOGP_GSUP_FWD(gsup, level, fmt, args ...) \
539 LOGP(DMAIN, level, "Forward %s (class=%s, IMSI=%s, %s->%s): " fmt, \
540 osmo_gsup_message_type_name(gsup->message_type), \
541 osmo_gsup_message_class_name(gsup->message_class), \
542 gsup->imsi, \
543 osmo_quote_str((const char *)gsup->source_name, gsup->source_name_len), \
544 osmo_quote_str_buf2(namebuf, sizeof(namebuf), (const char *)gsup->destination_name, gsup->destination_name_len), \
545 ## args)
546
547static int read_cb_forward(struct osmo_gsup_conn *conn, struct msgb *msg, const struct osmo_gsup_message *gsup)
548{
549 int ret = -EINVAL;
550 struct osmo_gsup_message *gsup_err;
551
552 /* FIXME: it would be better if the msgb never were deallocated immediately by osmo_gsup_addr_send(), which a
553 * select-loop volatile talloc context could facilitate. Then we would still be able to access gsup-> members
554 * (pointing into the msgb) even after sending failed, and we wouldn't need to copy this data before sending: */
555 /* Prepare error message (before IEs get deallocated) */
556 gsup_err = talloc_zero(hlr_ctx, struct osmo_gsup_message);
557 OSMO_STRLCPY_ARRAY(gsup_err->imsi, gsup->imsi);
558 gsup_err->message_class = gsup->message_class;
559 gsup_err->destination_name = talloc_memdup(gsup_err, gsup->destination_name, gsup->destination_name_len);
560 gsup_err->destination_name_len = gsup->destination_name_len;
Vadim Yanitskiy8625cda2019-05-07 21:09:01 +0700561 gsup_err->message_type = gsup->message_type;
Vadim Yanitskiy609978d2019-05-07 20:35:05 +0700562 gsup_err->session_state = gsup->session_state;
Oliver Smith28f0af82019-02-22 11:46:33 +0100563 gsup_err->session_id = gsup->session_id;
564 gsup_err->source_name = talloc_memdup(gsup_err, gsup->source_name, gsup->source_name_len);
565 gsup_err->source_name_len = gsup->source_name_len;
566
567 /* Check for routing IEs */
568 if (!gsup->source_name || !gsup->source_name_len || !gsup->destination_name || !gsup->destination_name_len) {
569 LOGP_GSUP_FWD(gsup, LOGL_ERROR, "missing routing IEs\n");
570 goto end;
571 }
572
573 /* Verify source name (e.g. "MSC-00-00-00-00-00-00") */
574 if (gsup_route_find(conn->server, gsup->source_name, gsup->source_name_len) != conn) {
575 LOGP_GSUP_FWD(gsup, LOGL_ERROR, "mismatching source name\n");
576 goto end;
577 }
578
Oliver Smith28f0af82019-02-22 11:46:33 +0100579 /* Forward message without re-encoding (so we don't remove unknown IEs) */
580 LOGP_GSUP_FWD(gsup, LOGL_INFO, "checks passed, forwarding\n");
581
582 /* Remove incoming IPA header to be able to prepend an outgoing IPA header */
583 msgb_pull_to_l2(msg);
584 ret = osmo_gsup_addr_send(g_hlr->gs, gsup->destination_name, gsup->destination_name_len, msg);
585 /* AT THIS POINT, THE msg MAY BE DEALLOCATED and the data like gsup->imsi, gsup->source_name etc may all be
586 * invalid and cause segfaults. */
587 msg = NULL;
588 gsup = NULL;
589 if (ret == -ENODEV)
590 LOGP_GSUP_FWD(gsup_err, LOGL_ERROR, "destination not connected\n");
591 else if (ret)
592 LOGP_GSUP_FWD(gsup_err, LOGL_ERROR, "unknown error %i\n", ret);
593
594end:
595 /* Send error back to source */
596 if (ret) {
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100597 struct msgb *msg_err = osmo_gsup_msgb_alloc("GSUP forward ERR response");
Vadim Yanitskiy8625cda2019-05-07 21:09:01 +0700598 gsup_err->message_type = OSMO_GSUP_MSGT_E_ROUTING_ERROR;
Oliver Smith28f0af82019-02-22 11:46:33 +0100599 osmo_gsup_encode(msg_err, gsup_err);
600 LOGP_GSUP_FWD(gsup_err, LOGL_NOTICE, "Tx %s\n", osmo_gsup_message_type_name(gsup_err->message_type));
601 osmo_gsup_conn_send(conn, msg_err);
602 }
603 talloc_free(gsup_err);
604 if (msg)
605 msgb_free(msg);
606 return ret;
607}
608
Harald Weltee72cf552016-04-28 07:18:49 +0200609static int read_cb(struct osmo_gsup_conn *conn, struct msgb *msg)
610{
611 static struct osmo_gsup_message gsup;
612 int rc;
613
Vadim Yanitskiyc69a18b2019-05-07 20:53:54 +0700614 if (!msgb_l2(msg) || !msgb_l2len(msg)) {
615 LOGP(DMAIN, LOGL_ERROR, "missing or empty L2 data\n");
Vadim Yanitskiyd9724f42019-05-07 21:05:18 +0700616 msgb_free(msg);
617 return -EINVAL;
Vadim Yanitskiyc69a18b2019-05-07 20:53:54 +0700618 }
619
Harald Weltee687be52016-05-03 18:49:27 +0200620 rc = osmo_gsup_decode(msgb_l2(msg), msgb_l2len(msg), &gsup);
Harald Weltee72cf552016-04-28 07:18:49 +0200621 if (rc < 0) {
622 LOGP(DMAIN, LOGL_ERROR, "error in GSUP decode: %d\n", rc);
Vadim Yanitskiyd9724f42019-05-07 21:05:18 +0700623 msgb_free(msg);
624 return rc;
Harald Weltee72cf552016-04-28 07:18:49 +0200625 }
626
Harald Weltea1d3b042018-06-11 20:28:35 +0200627 /* 3GPP TS 23.003 Section 2.2 clearly states that an IMSI with less than 5
628 * digits is impossible. Even 5 digits is a highly theoretical case */
Vadim Yanitskiyd9724f42019-05-07 21:05:18 +0700629 if (strlen(gsup.imsi) < 5) { /* TODO: move this check to libosmogsm/gsup.c? */
Neels Hofmeyr9f6e5582019-04-03 18:16:50 +0200630 LOGP(DMAIN, LOGL_ERROR, "IMSI too short: %s\n", osmo_quote_str(gsup.imsi, -1));
Vadim Yanitskiyd9724f42019-05-07 21:05:18 +0700631 gsup_send_err_reply(conn, gsup.imsi, gsup.message_type, GMM_CAUSE_INV_MAND_INFO);
632 msgb_free(msg);
633 return -EINVAL;
Neels Hofmeyr9f6e5582019-04-03 18:16:50 +0200634 }
Harald Weltea1d3b042018-06-11 20:28:35 +0200635
Oliver Smith28f0af82019-02-22 11:46:33 +0100636 if (gsup.destination_name_len)
637 return read_cb_forward(conn, msg, &gsup);
638
Harald Weltee72cf552016-04-28 07:18:49 +0200639 switch (gsup.message_type) {
640 /* requests sent to us */
641 case OSMO_GSUP_MSGT_SEND_AUTH_INFO_REQUEST:
Maxd4bebbd2017-03-02 12:00:19 +0100642 rx_send_auth_info(conn, &gsup, g_hlr->dbc);
Harald Weltee72cf552016-04-28 07:18:49 +0200643 break;
644 case OSMO_GSUP_MSGT_UPDATE_LOCATION_REQUEST:
Harald Weltee687be52016-05-03 18:49:27 +0200645 rx_upd_loc_req(conn, &gsup);
Harald Weltee72cf552016-04-28 07:18:49 +0200646 break;
Harald Welteb18f0e02016-05-05 21:03:03 +0200647 case OSMO_GSUP_MSGT_PURGE_MS_REQUEST:
648 rx_purge_ms_req(conn, &gsup);
649 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200650 /* responses to requests sent by us */
Max9cacb6f2017-02-20 17:22:56 +0100651 case OSMO_GSUP_MSGT_DELETE_DATA_ERROR:
652 LOGP(DMAIN, LOGL_ERROR, "Error while deleting subscriber data "
653 "for IMSI %s\n", gsup.imsi);
654 break;
655 case OSMO_GSUP_MSGT_DELETE_DATA_RESULT:
656 LOGP(DMAIN, LOGL_ERROR, "Deleting subscriber data for IMSI %s\n",
657 gsup.imsi);
658 break;
Harald Weltebb779392018-06-16 20:21:10 +0200659 case OSMO_GSUP_MSGT_PROC_SS_REQUEST:
660 case OSMO_GSUP_MSGT_PROC_SS_RESULT:
661 rx_proc_ss_req(conn, &gsup);
662 break;
663 case OSMO_GSUP_MSGT_PROC_SS_ERROR:
664 rx_proc_ss_error(conn, &gsup);
665 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200666 case OSMO_GSUP_MSGT_INSERT_DATA_ERROR:
Harald Weltee72cf552016-04-28 07:18:49 +0200667 case OSMO_GSUP_MSGT_INSERT_DATA_RESULT:
Harald Weltee687be52016-05-03 18:49:27 +0200668 case OSMO_GSUP_MSGT_LOCATION_CANCEL_ERROR:
669 case OSMO_GSUP_MSGT_LOCATION_CANCEL_RESULT:
670 {
Maxea8b0d42017-02-14 16:53:04 +0100671 struct lu_operation *luop = lu_op_by_imsi(gsup.imsi,
672 &g_lu_ops);
Harald Weltee687be52016-05-03 18:49:27 +0200673 if (!luop) {
Maxaa0fefd2017-02-16 12:25:22 +0100674 LOGP(DMAIN, LOGL_ERROR, "GSUP message %s for "
675 "unknown IMSI %s\n",
676 osmo_gsup_message_type_name(gsup.message_type),
Harald Weltee687be52016-05-03 18:49:27 +0200677 gsup.imsi);
678 break;
679 }
680 lu_op_rx_gsup(luop, &gsup);
681 }
Harald Weltee72cf552016-04-28 07:18:49 +0200682 break;
Oliver Smith783ac812018-12-17 11:34:51 +0100683 case OSMO_GSUP_MSGT_CHECK_IMEI_REQUEST:
684 rx_check_imei_req(conn, &gsup);
685 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200686 default:
Maxaa0fefd2017-02-16 12:25:22 +0100687 LOGP(DMAIN, LOGL_DEBUG, "Unhandled GSUP message type %s\n",
688 osmo_gsup_message_type_name(gsup.message_type));
Harald Weltee72cf552016-04-28 07:18:49 +0200689 break;
690 }
Harald Welte5341b5d2016-04-28 12:48:39 +0200691 msgb_free(msg);
Harald Weltee72cf552016-04-28 07:18:49 +0200692 return 0;
693}
694
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100695static void print_usage()
696{
697 printf("Usage: osmo-hlr\n");
698}
699
700static void print_help()
701{
702 printf(" -h --help This text.\n");
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100703 printf(" -c --config-file filename The config file to use.\n");
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100704 printf(" -l --database db-name The database to use.\n");
705 printf(" -d option --debug=DRLL:DCC:DMM:DRR:DRSL:DNM Enable debugging.\n");
706 printf(" -D --daemonize Fork the process into a background daemon.\n");
707 printf(" -s --disable-color Do not print ANSI colors in the log\n");
708 printf(" -T --timestamp Prefix every log line with a timestamp.\n");
709 printf(" -e --log-level number Set a global loglevel.\n");
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100710 printf(" -U --db-upgrade Allow HLR database schema upgrades.\n");
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100711 printf(" -C --db-check Quit after opening (and upgrading) the database.\n");
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100712 printf(" -V --version Print the version of OsmoHLR.\n");
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100713}
714
715static struct {
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100716 const char *config_file;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100717 const char *db_file;
718 bool daemonize;
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100719 bool db_upgrade;
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100720 bool db_check;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100721} cmdline_opts = {
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100722 .config_file = "osmo-hlr.cfg",
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200723 .db_file = NULL,
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100724 .daemonize = false,
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100725 .db_upgrade = false,
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100726};
727
728static void handle_options(int argc, char **argv)
729{
730 while (1) {
731 int option_index = 0, c;
732 static struct option long_options[] = {
733 {"help", 0, 0, 'h'},
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100734 {"config-file", 1, 0, 'c'},
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100735 {"database", 1, 0, 'l'},
736 {"debug", 1, 0, 'd'},
737 {"daemonize", 0, 0, 'D'},
738 {"disable-color", 0, 0, 's'},
739 {"log-level", 1, 0, 'e'},
740 {"timestamp", 0, 0, 'T'},
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100741 {"db-upgrade", 0, 0, 'U' },
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100742 {"db-check", 0, 0, 'C' },
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100743 {"version", 0, 0, 'V' },
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100744 {0, 0, 0, 0}
745 };
746
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100747 c = getopt_long(argc, argv, "hc:l:d:Dse:TUV",
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100748 long_options, &option_index);
749 if (c == -1)
750 break;
751
752 switch (c) {
753 case 'h':
754 print_usage();
755 print_help();
756 exit(0);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100757 case 'c':
758 cmdline_opts.config_file = optarg;
759 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100760 case 'l':
761 cmdline_opts.db_file = optarg;
762 break;
763 case 'd':
764 log_parse_category_mask(osmo_stderr_target, optarg);
765 break;
766 case 'D':
767 cmdline_opts.daemonize = 1;
768 break;
769 case 's':
770 log_set_use_color(osmo_stderr_target, 0);
771 break;
772 case 'e':
773 log_set_log_level(osmo_stderr_target, atoi(optarg));
774 break;
775 case 'T':
776 log_set_print_timestamp(osmo_stderr_target, 1);
777 break;
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100778 case 'U':
779 cmdline_opts.db_upgrade = true;
780 break;
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100781 case 'C':
782 cmdline_opts.db_check = true;
783 break;
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100784 case 'V':
785 print_version(1);
786 exit(0);
787 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100788 default:
789 /* catch unknown options *as well as* missing arguments. */
790 fprintf(stderr, "Error in command line options. Exiting.\n");
791 exit(-1);
792 break;
793 }
794 }
795}
796
Harald Welteaabae9e2016-04-28 12:48:14 +0200797static void signal_hdlr(int signal)
798{
799 switch (signal) {
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700800 case SIGTERM:
Harald Welteaabae9e2016-04-28 12:48:14 +0200801 case SIGINT:
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700802 LOGP(DMAIN, LOGL_NOTICE, "Terminating due to signal=%d\n", signal);
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700803 quit++;
Harald Welteaabae9e2016-04-28 12:48:14 +0200804 break;
805 case SIGUSR1:
806 LOGP(DMAIN, LOGL_DEBUG, "Talloc Report due to SIGUSR1\n");
Neels Hofmeyrca43e302017-01-30 13:18:23 +0100807 talloc_report_full(hlr_ctx, stderr);
Harald Welteaabae9e2016-04-28 12:48:14 +0200808 break;
809 }
810}
Harald Weltee72cf552016-04-28 07:18:49 +0200811
Max372868b2017-03-02 12:12:00 +0100812static const char vlr_copyright[] =
813 "Copyright (C) 2016, 2017 by Harald Welte, sysmocom s.f.m.c. GmbH\r\n"
814 "License AGPLv3+: GNU AGPL version 3 or later <http://gnu.org/licenses/agpl-3.0.html>\r\n"
815 "This is free software: you are free to change and redistribute it.\r\n"
816 "There is NO WARRANTY, to the extent permitted by law.\r\n";
817
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100818static struct vty_app_info vty_info = {
819 .name = "OsmoHLR",
820 .version = PACKAGE_VERSION,
Max372868b2017-03-02 12:12:00 +0100821 .copyright = vlr_copyright,
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100822 .is_config_node = hlr_vty_is_config_node,
Pau Espin Pedrolce9bc402017-05-31 13:19:22 +0200823 .go_parent_cb = hlr_vty_go_parent,
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100824};
825
Harald Weltee72cf552016-04-28 07:18:49 +0200826int main(int argc, char **argv)
827{
Harald Weltee72cf552016-04-28 07:18:49 +0200828 int rc;
829
Vadim Yanitskiy9fdb8542018-07-30 03:09:22 +0700830 /* Track the use of talloc NULL memory contexts */
831 talloc_enable_null_tracking();
832
Neels Hofmeyrca43e302017-01-30 13:18:23 +0100833 hlr_ctx = talloc_named_const(NULL, 1, "OsmoHLR");
834 msgb_talloc_ctx_init(hlr_ctx, 0);
Harald Welte7ee6e552018-02-14 00:52:05 +0100835 vty_info.tall_ctx = hlr_ctx;
Harald Welteaabae9e2016-04-28 12:48:14 +0200836
Maxd4bebbd2017-03-02 12:00:19 +0100837 g_hlr = talloc_zero(hlr_ctx, struct hlr);
Harald Welte4956ae12018-06-15 22:04:28 +0200838 INIT_LLIST_HEAD(&g_hlr->euse_list);
Harald Weltedab544e2018-07-29 16:14:48 +0200839 INIT_LLIST_HEAD(&g_hlr->iuse_list);
Harald Weltebb779392018-06-16 20:21:10 +0200840 INIT_LLIST_HEAD(&g_hlr->ss_sessions);
Harald Weltedab544e2018-07-29 16:14:48 +0200841 INIT_LLIST_HEAD(&g_hlr->ussd_routes);
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200842 g_hlr->db_file_path = talloc_strdup(g_hlr, HLR_DEFAULT_DB_FILE_PATH);
Maxd4bebbd2017-03-02 12:00:19 +0100843
Vadim Yanitskiyd157a562018-12-01 00:03:39 +0700844 /* Init default (call independent) SS session guard timeout value */
845 g_hlr->ncss_guard_timeout = NCSS_GUARD_TIMEOUT_DEFAULT;
846
Pau Espin Pedrol51530312018-04-17 15:07:06 +0200847 rc = osmo_init_logging2(hlr_ctx, &hlr_log_info);
Harald Weltee72cf552016-04-28 07:18:49 +0200848 if (rc < 0) {
849 fprintf(stderr, "Error initializing logging\n");
850 exit(1);
851 }
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100852
Max20ddfdb2019-02-18 13:12:27 +0100853 osmo_stats_init(hlr_ctx);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100854 vty_init(&vty_info);
Max372868b2017-03-02 12:12:00 +0100855 ctrl_vty_init(hlr_ctx);
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100856 handle_options(argc, argv);
Pau Espin Pedrole49391b2019-08-05 15:57:10 +0200857 hlr_vty_init();
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100858
859 rc = vty_read_config_file(cmdline_opts.config_file, NULL);
860 if (rc < 0) {
861 LOGP(DMAIN, LOGL_FATAL,
862 "Failed to parse the config file: '%s'\n",
863 cmdline_opts.config_file);
864 return rc;
865 }
866
Harald Weltee72cf552016-04-28 07:18:49 +0200867 LOGP(DMAIN, LOGL_NOTICE, "hlr starting\n");
868
869 rc = rand_init();
870 if (rc < 0) {
871 LOGP(DMAIN, LOGL_FATAL, "Error initializing random source\n");
872 exit(1);
873 }
874
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200875 if (cmdline_opts.db_file)
876 osmo_talloc_replace_string(g_hlr, &g_hlr->db_file_path, cmdline_opts.db_file);
877
878 g_hlr->dbc = db_open(hlr_ctx, g_hlr->db_file_path, true, cmdline_opts.db_upgrade);
Maxd4bebbd2017-03-02 12:00:19 +0100879 if (!g_hlr->dbc) {
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200880 LOGP(DMAIN, LOGL_FATAL, "Error opening database %s\n", osmo_quote_str(g_hlr->db_file_path, -1));
Harald Weltee72cf552016-04-28 07:18:49 +0200881 exit(1);
882 }
883
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100884 if (cmdline_opts.db_check) {
885 LOGP(DMAIN, LOGL_NOTICE, "Cmdline option --db-check: Database was opened successfully, quitting.\n");
886 db_close(g_hlr->dbc);
887 log_fini();
888 talloc_free(hlr_ctx);
889 talloc_free(tall_vty_ctx);
890 talloc_disable_null_tracking();
891 exit(0);
892 }
893
894 /* start telnet after reading config for vty_get_bind_addr() */
895 rc = telnet_init_dynif(hlr_ctx, NULL, vty_get_bind_addr(),
896 OSMO_VTY_PORT_HLR);
897 if (rc < 0)
898 return rc;
899
900
Neels Hofmeyr84201d32017-07-21 16:00:32 +0200901 g_hlr->gs = osmo_gsup_server_create(hlr_ctx, g_hlr->gsup_bind_addr, OSMO_GSUP_PORT,
Harald Welte32acace2018-06-16 17:07:28 +0200902 read_cb, &g_lu_ops, g_hlr);
Maxd4bebbd2017-03-02 12:00:19 +0100903 if (!g_hlr->gs) {
Harald Weltee72cf552016-04-28 07:18:49 +0200904 LOGP(DMAIN, LOGL_FATAL, "Error starting GSUP server\n");
905 exit(1);
906 }
907
Max372868b2017-03-02 12:12:00 +0100908 g_hlr->ctrl_bind_addr = ctrl_vty_get_bind_addr();
Neels Hofmeyr234f9cb2017-10-24 17:23:04 +0200909 g_hlr->ctrl = hlr_controlif_setup(g_hlr);
Max372868b2017-03-02 12:12:00 +0100910
Harald Welteaabae9e2016-04-28 12:48:14 +0200911 osmo_init_ignore_signals();
912 signal(SIGINT, &signal_hdlr);
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700913 signal(SIGTERM, &signal_hdlr);
Harald Welteaabae9e2016-04-28 12:48:14 +0200914 signal(SIGUSR1, &signal_hdlr);
915
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100916 if (cmdline_opts.daemonize) {
917 rc = osmo_daemonize();
918 if (rc < 0) {
919 perror("Error during daemonize");
920 exit(1);
921 }
922 }
Harald Welteaabae9e2016-04-28 12:48:14 +0200923
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700924 while (!quit)
Harald Weltee72cf552016-04-28 07:18:49 +0200925 osmo_select_main(0);
Harald Weltee72cf552016-04-28 07:18:49 +0200926
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700927 osmo_gsup_server_destroy(g_hlr->gs);
Maxd4bebbd2017-03-02 12:00:19 +0100928 db_close(g_hlr->dbc);
Harald Weltee72cf552016-04-28 07:18:49 +0200929 log_fini();
930
Vadim Yanitskiy4793a7e2018-07-30 03:04:34 +0700931 /**
932 * Report the heap state of root context, then free,
933 * so both ASAN and Valgrind are happy...
934 */
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700935 talloc_report_full(hlr_ctx, stderr);
Vadim Yanitskiy4793a7e2018-07-30 03:04:34 +0700936 talloc_free(hlr_ctx);
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700937
Vadim Yanitskiy9fdb8542018-07-30 03:09:22 +0700938 /* FIXME: VTY code still uses NULL-context */
939 talloc_free(tall_vty_ctx);
940
941 /**
942 * Report the heap state of NULL context, then free,
943 * so both ASAN and Valgrind are happy...
944 */
945 talloc_report_full(NULL, stderr);
946 talloc_disable_null_tracking();
947
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700948 return 0;
Harald Weltee72cf552016-04-28 07:18:49 +0200949}