blob: 457850e559d5938aa7de09030ef1a1c8678738c4 [file] [log] [blame]
Harald Welte936f6722016-05-03 18:51:18 +02001/* (C) 2016 by Harald Welte <laforge@gnumonks.org>
2 *
3 * All Rights Reserved
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU Affero General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU Affero General Public License for more details.
14 *
15 * You should have received a copy of the GNU Affero General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
17 *
18 */
19
Harald Welteaabae9e2016-04-28 12:48:14 +020020#include <signal.h>
Harald Weltee687be52016-05-03 18:49:27 +020021#include <errno.h>
Maxea8b0d42017-02-14 16:53:04 +010022#include <stdbool.h>
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +010023#include <getopt.h>
24
Harald Weltee72cf552016-04-28 07:18:49 +020025#include <osmocom/core/msgb.h>
Max20ddfdb2019-02-18 13:12:27 +010026#include <osmocom/core/stats.h>
Harald Weltee72cf552016-04-28 07:18:49 +020027#include <osmocom/core/logging.h>
28#include <osmocom/core/application.h>
29#include <osmocom/gsm/gsup.h>
Neels Hofmeyr7685a782017-01-30 23:30:26 +010030#include <osmocom/vty/vty.h>
31#include <osmocom/vty/command.h>
32#include <osmocom/vty/telnet_interface.h>
33#include <osmocom/vty/ports.h>
Pau Espin Pedroled18fa92020-08-18 12:58:36 +020034#include <osmocom/vty/cpu_sched_vty.h>
Max372868b2017-03-02 12:12:00 +010035#include <osmocom/ctrl/control_vty.h>
Neels Hofmeyr5aeb4382018-05-04 16:02:44 +020036#include <osmocom/gsm/apn.h>
Oliver Smith783ac812018-12-17 11:34:51 +010037#include <osmocom/gsm/gsm48_ie.h>
Oliver Smithc7f17872019-03-04 15:10:44 +010038#include <osmocom/gsm/gsm_utils.h>
Neels Hofmeyrad868e22019-11-20 02:36:45 +010039#include <osmocom/gsm/gsm23003.h>
Neels Hofmeyr76328bd2019-11-20 03:35:37 +010040#include <osmocom/mslookup/mslookup_client.h>
Harald Weltee72cf552016-04-28 07:18:49 +020041
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +010042#include <osmocom/gsupclient/cni_peer_id.h>
Neels Hofmeyr2f758032019-11-20 00:37:07 +010043#include <osmocom/hlr/db.h>
44#include <osmocom/hlr/hlr.h>
45#include <osmocom/hlr/ctrl.h>
46#include <osmocom/hlr/logging.h>
47#include <osmocom/hlr/gsup_server.h>
48#include <osmocom/hlr/gsup_router.h>
49#include <osmocom/hlr/rand.h>
Neels Hofmeyr2f758032019-11-20 00:37:07 +010050#include <osmocom/hlr/hlr_vty.h>
51#include <osmocom/hlr/hlr_ussd.h>
Neels Hofmeyr76328bd2019-11-20 03:35:37 +010052#include <osmocom/hlr/dgsm.h>
53#include <osmocom/hlr/proxy.h>
Neels Hofmeyrad868e22019-11-20 02:36:45 +010054#include <osmocom/hlr/lu_fsm.h>
Neels Hofmeyr407925d2019-11-20 03:35:37 +010055#include <osmocom/mslookup/mdns.h>
Harald Weltee72cf552016-04-28 07:18:49 +020056
Harald Welted5807b82018-07-29 12:27:41 +020057struct hlr *g_hlr;
Oliver Smithc5044cf2019-02-26 16:32:57 +010058static void *hlr_ctx = NULL;
Vadim Yanitskiy527d9342018-07-30 02:42:25 +070059static int quit = 0;
Harald Weltee72cf552016-04-28 07:18:49 +020060
Neels Hofmeyrad868e22019-11-20 02:36:45 +010061struct osmo_tdef g_hlr_tdefs[] = {
62 /* 4222 is also the OSMO_GSUP_PORT */
63 { .T = -4222, .default_val = 30, .desc = "GSUP Update Location timeout" },
64 {}
65};
66
Stefan Sperlingf1622522018-04-09 11:39:16 +020067/* Trigger 'Insert Subscriber Data' messages to all connected GSUP clients.
68 *
Stefan Sperlingf1622522018-04-09 11:39:16 +020069 * \param[in] subscr A subscriber we have new data to send for.
70 */
71void
72osmo_hlr_subscriber_update_notify(struct hlr_subscriber *subscr)
73{
74 struct osmo_gsup_conn *co;
75
Neels Hofmeyre66e5252018-09-28 02:59:19 +020076 if (g_hlr->gs == NULL) {
77 LOGP(DLGSUP, LOGL_DEBUG,
78 "IMSI %s: NOT Notifying peers of subscriber data change,"
79 " there is no GSUP server\n",
80 subscr->imsi);
Stefan Sperlingf1622522018-04-09 11:39:16 +020081 return;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020082 }
Stefan Sperlingf1622522018-04-09 11:39:16 +020083
Neels Hofmeyrad868e22019-11-20 02:36:45 +010084 /* FIXME: send only to current vlr_number and sgsn_number */
85
Stefan Sperlingf1622522018-04-09 11:39:16 +020086 llist_for_each_entry(co, &g_hlr->gs->clients, list) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020087 struct osmo_gsup_message gsup = { };
Stefan Sperlingf83432c2018-05-03 14:26:59 +020088 struct msgb *msg_out;
Stefan Sperling93c5b102018-04-10 19:26:14 +020089 uint8_t *peer;
90 int peer_len;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020091 size_t peer_strlen;
92 const char *peer_compare;
Stefan Sperlingf83432c2018-05-03 14:26:59 +020093 enum osmo_gsup_cn_domain cn_domain;
Stefan Sperling93c5b102018-04-10 19:26:14 +020094
Neels Hofmeyre66e5252018-09-28 02:59:19 +020095 if (co->supports_ps) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020096 cn_domain = OSMO_GSUP_CN_DOMAIN_PS;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020097 peer_compare = subscr->sgsn_number;
98 } else if (co->supports_cs) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020099 cn_domain = OSMO_GSUP_CN_DOMAIN_CS;
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200100 peer_compare = subscr->vlr_number;
101 } else {
102 /* We have not yet received a location update from this GSUP client.*/
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200103 continue;
104 }
105
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200106 peer_len = osmo_gsup_conn_ccm_get(co, &peer, IPAC_IDTAG_SERNR);
107 if (peer_len < 0) {
108 LOGP(DLGSUP, LOGL_ERROR,
109 "IMSI='%s': cannot get peer name for connection %s:%u\n", subscr->imsi,
110 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
111 co && co->conn && co->conn->server? co->conn->server->port : 0);
112 continue;
113 }
114
115 peer_strlen = strnlen((const char*)peer, peer_len);
116 if (strlen(peer_compare) != peer_strlen || strncmp(peer_compare, (const char *)peer, peer_len)) {
117 /* Mismatch. The subscriber is not subscribed with this GSUP client. */
118 /* I hope peer is always nul terminated... */
119 if (peer_strlen < peer_len)
120 LOGP(DLGSUP, LOGL_DEBUG,
121 "IMSI %s: subscriber change: skipping %s peer %s\n",
122 subscr->imsi, cn_domain == OSMO_GSUP_CN_DOMAIN_PS ? "PS" : "CS",
123 osmo_quote_str((char*)peer, -1));
124 continue;
125 }
126
127 LOGP(DLGSUP, LOGL_DEBUG,
128 "IMSI %s: subscriber change: notifying %s peer %s\n",
129 subscr->imsi, cn_domain == OSMO_GSUP_CN_DOMAIN_PS ? "PS" : "CS",
130 osmo_quote_str(peer_compare, -1));
131
Alexander Couzens29898732023-04-11 17:53:33 +0200132 if (osmo_gsup_create_insert_subscriber_data_msg(&gsup, subscr->imsi, subscr->msisdn, cn_domain, OTC_SELECT) != 0) {
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200133 LOGP(DLGSUP, LOGL_ERROR,
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200134 "IMSI='%s': Cannot notify GSUP client; could not create gsup message "
Stefan Sperling93c5b102018-04-10 19:26:14 +0200135 "for %s:%u\n", subscr->imsi,
Stefan Sperlingf1622522018-04-09 11:39:16 +0200136 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
137 co && co->conn && co->conn->server? co->conn->server->port : 0);
138 continue;
139 }
Stefan Sperling93c5b102018-04-10 19:26:14 +0200140
Stefan Sperling93c5b102018-04-10 19:26:14 +0200141 /* Send ISD to MSC/SGSN */
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100142 msg_out = osmo_gsup_msgb_alloc("GSUP ISD UPDATE");
Stefan Sperling93c5b102018-04-10 19:26:14 +0200143 if (msg_out == NULL) {
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200144 LOGP(DLGSUP, LOGL_ERROR,
Stefan Sperling93c5b102018-04-10 19:26:14 +0200145 "IMSI='%s': Cannot notify GSUP client; could not allocate msg buffer "
146 "for %s:%u\n", subscr->imsi,
147 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
148 co && co->conn && co->conn->server? co->conn->server->port : 0);
149 continue;
150 }
Stefan Sperling93c5b102018-04-10 19:26:14 +0200151 osmo_gsup_encode(msg_out, &gsup);
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200152
Stefan Sperling93c5b102018-04-10 19:26:14 +0200153 if (osmo_gsup_addr_send(g_hlr->gs, peer, peer_len, msg_out) < 0) {
154 LOGP(DMAIN, LOGL_ERROR,
155 "IMSI='%s': Cannot notify GSUP client; send operation failed "
156 "for %s:%u\n", subscr->imsi,
157 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
158 co && co->conn && co->conn->server? co->conn->server->port : 0);
159 continue;
160 }
Stefan Sperlingf1622522018-04-09 11:39:16 +0200161 }
162}
163
Oliver Smithc7f17872019-03-04 15:10:44 +0100164static int generate_new_msisdn(char *msisdn, const char *imsi, unsigned int len)
165{
166 int i, j, rc;
167 uint8_t rand_buf[GSM23003_MSISDN_MAX_DIGITS];
168
169 OSMO_ASSERT(len <= sizeof(rand_buf));
170
171 /* Generate a random unique MSISDN (with retry) */
172 for (i = 0; i < 10; i++) {
173 /* Get a random number (with retry) */
174 for (j = 0; j < 10; j++) {
175 rc = osmo_get_rand_id(rand_buf, len);
176 if (!rc)
177 break;
178 }
179 if (rc) {
180 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to generate new MSISDN, random number generator"
181 " failed (rc=%d)\n", imsi, rc);
182 return rc;
183 }
184
185 /* Shift 0x00 ... 0xff range to 30 ... 39 (ASCII numbers) */
186 for (j = 0; j < len; j++)
187 msisdn[j] = 48 + (rand_buf[j] % 10);
188 msisdn[j] = '\0';
189
190 /* Ensure there is no subscriber with such MSISDN */
191 if (db_subscr_exists_by_msisdn(g_hlr->dbc, msisdn) == -ENOENT)
192 return 0;
193 }
194
195 /* Failure */
196 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to generate a new MSISDN, consider increasing "
197 "the length for the automatically assigned MSISDNs "
198 "(see 'subscriber-create-on-demand' command)\n", imsi);
199 return -1;
200}
201
202static int subscr_create_on_demand(const char *imsi)
203{
204 char msisdn[GSM23003_MSISDN_MAX_DIGITS + 1];
205 int rc;
206 unsigned int rand_msisdn_len = g_hlr->subscr_create_on_demand_rand_msisdn_len;
207
208 if (!g_hlr->subscr_create_on_demand)
209 return -1;
210 if (db_subscr_exists_by_imsi(g_hlr->dbc, imsi) == 0)
211 return -1;
212 if (rand_msisdn_len && generate_new_msisdn(msisdn, imsi, rand_msisdn_len) != 0)
213 return -1;
214
215 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': Creating subscriber on demand\n", imsi);
216 rc = db_subscr_create(g_hlr->dbc, imsi, g_hlr->subscr_create_on_demand_flags);
217 if (rc) {
218 LOGP(DMAIN, LOGL_ERROR, "Failed to create subscriber on demand (rc=%d): IMSI='%s'\n", rc, imsi);
219 return rc;
220 }
221
222 if (!rand_msisdn_len)
223 return 0;
224
225 /* Update MSISDN of the new (just allocated) subscriber */
226 rc = db_subscr_update_msisdn_by_imsi(g_hlr->dbc, imsi, msisdn);
227 if (rc) {
228 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to assign MSISDN='%s' (rc=%d)\n", imsi, msisdn, rc);
229 return rc;
230 }
231 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': Successfully assigned MSISDN='%s'\n", imsi, msisdn);
232
233 return 0;
234}
235
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100236/*! Update nam_cs/nam_ps in the db and trigger notifications to GSUP clients.
237 * \param[in,out] hlr Global hlr context.
238 * \param[in] subscr Subscriber from a fresh db_subscr_get_by_*() call.
239 * \param[in] nam_val True to enable CS/PS, false to disable.
240 * \param[in] is_ps True to enable/disable PS, false for CS.
241 * \returns 0 on success, ENOEXEC if there is no need to change, a negative
242 * value on error.
243 */
244int hlr_subscr_nam(struct hlr *hlr, struct hlr_subscriber *subscr, bool nam_val, bool is_ps)
245{
246 int rc;
247 bool is_val = is_ps? subscr->nam_ps : subscr->nam_cs;
248 struct osmo_ipa_name vlr_name;
249 struct osmo_gsup_message gsup_del_data = {
250 .message_type = OSMO_GSUP_MSGT_DELETE_DATA_REQUEST,
251 };
252 OSMO_STRLCPY_ARRAY(gsup_del_data.imsi, subscr->imsi);
253
254 if (is_val == nam_val) {
255 LOGP(DAUC, LOGL_DEBUG, "IMSI-%s: Already has the requested value when asked to %s %s\n",
256 subscr->imsi, nam_val ? "enable" : "disable", is_ps ? "PS" : "CS");
257 return ENOEXEC;
258 }
259
260 rc = db_subscr_nam(hlr->dbc, subscr->imsi, nam_val, is_ps);
261 if (rc)
262 return rc > 0? -rc : rc;
263
264 /* If we're disabling, send a notice out to the GSUP client that is
265 * responsible. Otherwise no need. */
266 if (nam_val)
267 return 0;
268
Neels Hofmeyr9b8e7b42020-05-04 19:20:23 +0200269 if (subscr->vlr_number[0] && !osmo_ipa_name_set_str(&vlr_name, subscr->vlr_number))
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100270 osmo_gsup_enc_send_to_ipa_name(g_hlr->gs, &vlr_name, &gsup_del_data);
Neels Hofmeyr9b8e7b42020-05-04 19:20:23 +0200271 if (subscr->sgsn_number[0] && !osmo_ipa_name_set_str(&vlr_name, subscr->sgsn_number))
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100272 osmo_gsup_enc_send_to_ipa_name(g_hlr->gs, &vlr_name, &gsup_del_data);
273 return 0;
274}
275
Harald Weltee687be52016-05-03 18:49:27 +0200276/***********************************************************************
277 * Send Auth Info handling
278 ***********************************************************************/
279
Harald Weltee72cf552016-04-28 07:18:49 +0200280/* process an incoming SAI request */
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100281static int rx_send_auth_info(struct osmo_gsup_req *req)
Harald Weltee72cf552016-04-28 07:18:49 +0200282{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100283 struct osmo_gsup_message gsup_out = {
284 .message_type = OSMO_GSUP_MSGT_SEND_AUTH_INFO_RESULT,
285 };
Harald Welte06f5af22019-08-21 20:01:31 +0200286 bool separation_bit = false;
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100287 int num_auth_vectors = OSMO_GSUP_MAX_NUM_AUTH_INFO;
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100288 unsigned int auc_3g_ind;
Harald Weltee72cf552016-04-28 07:18:49 +0200289 int rc;
290
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100291 subscr_create_on_demand(req->gsup.imsi);
Oliver Smithc7f17872019-03-04 15:10:44 +0100292
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100293 if (req->gsup.current_rat_type == OSMO_RAT_EUTRAN_SGS)
Harald Welte06f5af22019-08-21 20:01:31 +0200294 separation_bit = true;
295
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100296 if (req->gsup.num_auth_vectors > 0 &&
297 req->gsup.num_auth_vectors <= OSMO_GSUP_MAX_NUM_AUTH_INFO)
298 num_auth_vectors = req->gsup.num_auth_vectors;
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100299 rc = db_ind(g_hlr->dbc, &req->source_name, &auc_3g_ind);
300 if (rc) {
301 LOG_GSUP_REQ(req, LOGL_ERROR,
302 "Unable to determine 3G auth IND for source %s (rc=%d),"
303 " generating tuples with IND = 0\n",
304 osmo_cni_peer_id_to_str(&req->source_name), rc);
305 auc_3g_ind = 0;
306 }
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100307
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100308 rc = db_get_auc(g_hlr->dbc, req->gsup.imsi, auc_3g_ind,
Neels Hofmeyrcab2fcd2017-03-15 00:07:43 +0100309 gsup_out.auth_vectors,
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100310 num_auth_vectors,
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100311 req->gsup.rand, req->gsup.auts, separation_bit);
312
Neels Hofmeyr671db902017-11-22 20:38:19 +0100313 if (rc <= 0) {
Neels Hofmeyr671db902017-11-22 20:38:19 +0100314 switch (rc) {
315 case 0:
Neels Hofmeyrbd1dca02017-11-23 15:25:30 +0100316 /* 0 means "0 tuples generated", which shouldn't happen.
317 * Treat the same as "no auth data". */
318 case -ENOKEY:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100319 osmo_gsup_req_respond_err(req, GMM_CAUSE_IMSI_UNKNOWN,
320 "IMSI known, but has no auth data;"
321 " Returning slightly inaccurate cause 'IMSI Unknown' via GSUP");
322 return rc;
Neels Hofmeyr33cbde92017-11-22 20:39:59 +0100323 case -ENOENT:
Alexander Couzens268a33e2020-01-12 00:48:07 +0100324 osmo_gsup_req_respond_err(req, g_hlr->reject_cause, "IMSI unknown");
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100325 return rc;
Neels Hofmeyr671db902017-11-22 20:38:19 +0100326 default:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100327 osmo_gsup_req_respond_err(req, GMM_CAUSE_NET_FAIL, "failure to look up IMSI in db");
328 return rc;
Neels Hofmeyr671db902017-11-22 20:38:19 +0100329 }
Harald Weltee72cf552016-04-28 07:18:49 +0200330 }
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100331 gsup_out.num_auth_vectors = rc;
Harald Weltee72cf552016-04-28 07:18:49 +0200332
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100333 osmo_gsup_req_respond(req, &gsup_out, false, true);
334 return 0;
Harald Weltee72cf552016-04-28 07:18:49 +0200335}
336
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100337/*! Receive Update Location Request, creates new lu_operation */
338static int rx_upd_loc_req(struct osmo_gsup_conn *conn, struct osmo_gsup_req *req)
Harald Weltee687be52016-05-03 18:49:27 +0200339{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100340 switch (req->gsup.cn_domain) {
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200341 case OSMO_GSUP_CN_DOMAIN_CS:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200342 conn->supports_cs = true;
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200343 break;
344 default:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200345 /* The client didn't send a CN_DOMAIN IE; assume packet-switched in
346 * accordance with the GSUP spec in osmo-hlr's user manual (section
347 * 11.6.15 "CN Domain" says "if no CN Domain IE is present within
348 * a request, the PS Domain is assumed." */
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200349 case OSMO_GSUP_CN_DOMAIN_PS:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200350 conn->supports_ps = true;
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200351 break;
Stefan Sperling93c5b102018-04-10 19:26:14 +0200352 }
Harald Weltee687be52016-05-03 18:49:27 +0200353
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100354 subscr_create_on_demand(req->gsup.imsi);
Oliver Smithc7f17872019-03-04 15:10:44 +0100355
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100356 lu_rx_gsup(req);
Harald Weltee687be52016-05-03 18:49:27 +0200357 return 0;
358}
359
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100360static int rx_purge_ms_req(struct osmo_gsup_req *req)
Harald Welteb18f0e02016-05-05 21:03:03 +0200361{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100362 bool is_ps = (req->gsup.cn_domain != OSMO_GSUP_CN_DOMAIN_CS);
Harald Welteb18f0e02016-05-05 21:03:03 +0200363 int rc;
364
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100365 LOG_GSUP_REQ_CAT(req, DAUC, LOGL_INFO, "Purge MS (%s)\n", is_ps ? "PS" : "CS");
Harald Welteb18f0e02016-05-05 21:03:03 +0200366
367 /* FIXME: check if the VLR that sends the purge is the same that
368 * we have on record. Only update if yes */
369
370 /* Perform the actual update of the DB */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100371 rc = db_subscr_purge(g_hlr->dbc, req->gsup.imsi, true, is_ps);
Harald Welteb18f0e02016-05-05 21:03:03 +0200372
Harald Welte3f2a9a22018-03-01 23:35:35 +0100373 if (rc == 0)
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100374 osmo_gsup_req_respond_msgt(req, OSMO_GSUP_MSGT_PURGE_MS_RESULT, true);
375 else if (rc == -ENOENT)
376 osmo_gsup_req_respond_err(req, GMM_CAUSE_IMSI_UNKNOWN, "IMSI unknown");
377 else
378 osmo_gsup_req_respond_err(req, GMM_CAUSE_NET_FAIL, "db error");
379 return rc;
Harald Welteb18f0e02016-05-05 21:03:03 +0200380}
381
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100382static int rx_check_imei_req(struct osmo_gsup_req *req)
Harald Weltea1d3b042018-06-11 20:28:35 +0200383{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100384 struct osmo_gsup_message gsup_reply;
Oliver Smith103c11b2019-06-06 11:57:05 +0200385 char imei[GSM23003_IMEI_NUM_DIGITS_NO_CHK+1] = {0};
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100386 const struct osmo_gsup_message *gsup = &req->gsup;
Oliver Smith103c11b2019-06-06 11:57:05 +0200387 int rc;
Oliver Smith783ac812018-12-17 11:34:51 +0100388
Oliver Smith103c11b2019-06-06 11:57:05 +0200389 /* Require IMEI */
390 if (!gsup->imei_enc) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100391 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "missing IMEI");
Oliver Smith783ac812018-12-17 11:34:51 +0100392 return -1;
393 }
394
Oliver Smith103c11b2019-06-06 11:57:05 +0200395 /* Decode IMEI (fails if IMEI is too long) */
396 rc = gsm48_decode_bcd_number2(imei, sizeof(imei), gsup->imei_enc, gsup->imei_enc_len, 0);
397 if (rc < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100398 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO,
399 "failed to decode IMEI %s (rc: %d)",
400 osmo_hexdump_c(OTC_SELECT, gsup->imei_enc, gsup->imei_enc_len),
401 rc);
Oliver Smith103c11b2019-06-06 11:57:05 +0200402 return -1;
403 }
404
405 /* Check if IMEI is too short */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100406 if (!osmo_imei_str_valid(imei, false)) {
407 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO,
408 "invalid IMEI: %s", osmo_quote_str_c(OTC_SELECT, imei, -1));
Oliver Smith783ac812018-12-17 11:34:51 +0100409 return -1;
410 }
411
Oliver Smithc7f17872019-03-04 15:10:44 +0100412 subscr_create_on_demand(gsup->imsi);
413
Oliver Smith851814a2019-01-11 15:30:21 +0100414 /* Save in DB if desired */
415 if (g_hlr->store_imei) {
416 LOGP(DAUC, LOGL_DEBUG, "IMSI='%s': storing IMEI = %s\n", gsup->imsi, imei);
417 if (db_subscr_update_imei_by_imsi(g_hlr->dbc, gsup->imsi, imei) < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100418 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "Failed to store IMEI in HLR db");
Oliver Smith851814a2019-01-11 15:30:21 +0100419 return -1;
420 }
421 } else {
422 /* Check if subscriber exists and print IMEI */
423 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': has IMEI = %s (consider setting 'store-imei')\n", gsup->imsi, imei);
424 struct hlr_subscriber subscr;
425 if (db_subscr_get_by_imsi(g_hlr->dbc, gsup->imsi, &subscr) < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100426 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "IMSI unknown");
Oliver Smith851814a2019-01-11 15:30:21 +0100427 return -1;
428 }
429 }
Oliver Smith783ac812018-12-17 11:34:51 +0100430
431 /* Accept all IMEIs */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100432 gsup_reply = (struct osmo_gsup_message){
433 .message_type = OSMO_GSUP_MSGT_CHECK_IMEI_RESULT,
434 .imei_result = OSMO_GSUP_IMEI_RESULT_ACK,
435 };
436 return osmo_gsup_req_respond(req, &gsup_reply, false, true);
Oliver Smith783ac812018-12-17 11:34:51 +0100437}
438
Oliver Smith28f0af82019-02-22 11:46:33 +0100439static char namebuf[255];
440#define LOGP_GSUP_FWD(gsup, level, fmt, args ...) \
441 LOGP(DMAIN, level, "Forward %s (class=%s, IMSI=%s, %s->%s): " fmt, \
Neels Hofmeyrfbe49292020-01-09 18:35:03 +0100442 osmo_gsup_message_type_name((gsup)->message_type), \
443 osmo_gsup_message_class_name((gsup)->message_class), \
444 (gsup)->imsi, \
445 osmo_quote_str((const char *)(gsup)->source_name, (gsup)->source_name_len), \
446 osmo_quote_str_buf2(namebuf, sizeof(namebuf), (const char *)(gsup)->destination_name, (gsup)->destination_name_len), \
Oliver Smith28f0af82019-02-22 11:46:33 +0100447 ## args)
448
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100449static int read_cb_forward(struct osmo_gsup_req *req)
Oliver Smith28f0af82019-02-22 11:46:33 +0100450{
451 int ret = -EINVAL;
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100452 const struct osmo_gsup_message *gsup = &req->gsup;
453 struct osmo_gsup_message gsup_err;
454 struct msgb *forward_msg;
455 struct osmo_ipa_name destination_name;
Oliver Smith28f0af82019-02-22 11:46:33 +0100456
457 /* Check for routing IEs */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100458 if (!req->gsup.source_name || !req->gsup.source_name_len
459 || !req->gsup.destination_name || !req->gsup.destination_name_len) {
460 LOGP_GSUP_FWD(&req->gsup, LOGL_ERROR, "missing routing IEs\n");
461 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100462 }
463
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100464 if (osmo_ipa_name_set(&destination_name, req->gsup.destination_name, req->gsup.destination_name_len)) {
465 LOGP_GSUP_FWD(&req->gsup, LOGL_ERROR, "invalid destination name\n");
466 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100467 }
468
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100469 LOG_GSUP_REQ(req, LOGL_INFO, "Forwarding to %s\n", osmo_ipa_name_to_str(&destination_name));
Oliver Smith28f0af82019-02-22 11:46:33 +0100470
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100471 /* Forward message without re-encoding (so we don't remove unknown IEs).
472 * Copy GSUP part to forward, removing incoming IPA header to be able to prepend an outgoing IPA header */
473 forward_msg = osmo_gsup_msgb_alloc("GSUP forward");
474 forward_msg->l2h = msgb_put(forward_msg, msgb_l2len(req->msg));
475 memcpy(forward_msg->l2h, msgb_l2(req->msg), msgb_l2len(req->msg));
476 ret = osmo_gsup_send_to_ipa_name(g_hlr->gs, &destination_name, forward_msg);
Oliver Smith28f0af82019-02-22 11:46:33 +0100477 if (ret) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100478 LOGP_GSUP_FWD(gsup, LOGL_ERROR, "%s (rc=%d)\n",
479 ret == -ENODEV ? "destination not connected" : "unknown error",
480 ret);
481 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100482 }
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100483 osmo_gsup_req_free(req);
484 return 0;
485
486routing_error:
487 gsup_err = (struct osmo_gsup_message){
488 .message_type = OSMO_GSUP_MSGT_ROUTING_ERROR,
489 .source_name = gsup->destination_name,
490 .source_name_len = gsup->destination_name_len,
491 };
492 osmo_gsup_req_respond(req, &gsup_err, true, true);
493 return -1;
Oliver Smith28f0af82019-02-22 11:46:33 +0100494}
495
Harald Weltee72cf552016-04-28 07:18:49 +0200496static int read_cb(struct osmo_gsup_conn *conn, struct msgb *msg)
497{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100498 struct osmo_gsup_req *req = osmo_gsup_conn_rx(conn, msg);
499 if (!req)
Vadim Yanitskiyd9724f42019-05-07 21:05:18 +0700500 return -EINVAL;
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100501
502 /* If the GSUP recipient is other than this HLR, forward. */
503 if (req->gsup.destination_name_len) {
504 struct osmo_ipa_name destination_name;
505 struct osmo_ipa_name my_name;
506 osmo_ipa_name_set_str(&my_name, g_hlr->gsup_unit_name.serno);
507 if (!osmo_ipa_name_set(&destination_name, req->gsup.destination_name, req->gsup.destination_name_len)
508 && osmo_ipa_name_cmp(&destination_name, &my_name)) {
509 return read_cb_forward(req);
510 }
Vadim Yanitskiyc69a18b2019-05-07 20:53:54 +0700511 }
512
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100513 /* Distributed GSM: check whether to proxy for / lookup a remote HLR.
514 * It would require less database hits to do this only if a local-only operation fails with "unknown IMSI", but
515 * it becomes semantically easier if we do this once-off ahead of time. */
516 if (osmo_mslookup_client_active(g_hlr->mslookup.client.client)
517 || osmo_sockaddr_str_is_nonzero(&g_hlr->mslookup.client.gsup_gateway_proxy)) {
518 if (dgsm_check_forward_gsup_msg(req))
519 return 0;
520 }
521
522 /* HLR related messages that are handled at this HLR instance */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100523 switch (req->gsup.message_type) {
Harald Weltee72cf552016-04-28 07:18:49 +0200524 /* requests sent to us */
525 case OSMO_GSUP_MSGT_SEND_AUTH_INFO_REQUEST:
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100526 rx_send_auth_info(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200527 break;
528 case OSMO_GSUP_MSGT_UPDATE_LOCATION_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100529 rx_upd_loc_req(conn, req);
Harald Weltee72cf552016-04-28 07:18:49 +0200530 break;
Harald Welteb18f0e02016-05-05 21:03:03 +0200531 case OSMO_GSUP_MSGT_PURGE_MS_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100532 rx_purge_ms_req(req);
Harald Welteb18f0e02016-05-05 21:03:03 +0200533 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200534 /* responses to requests sent by us */
Max9cacb6f2017-02-20 17:22:56 +0100535 case OSMO_GSUP_MSGT_DELETE_DATA_ERROR:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100536 LOG_GSUP_REQ(req, LOGL_ERROR, "Peer responds with: Error while deleting subscriber data\n");
537 osmo_gsup_req_free(req);
Max9cacb6f2017-02-20 17:22:56 +0100538 break;
539 case OSMO_GSUP_MSGT_DELETE_DATA_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100540 LOG_GSUP_REQ(req, LOGL_DEBUG, "Peer responds with: Subscriber data deleted\n");
541 osmo_gsup_req_free(req);
Max9cacb6f2017-02-20 17:22:56 +0100542 break;
Harald Weltebb779392018-06-16 20:21:10 +0200543 case OSMO_GSUP_MSGT_PROC_SS_REQUEST:
544 case OSMO_GSUP_MSGT_PROC_SS_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100545 rx_proc_ss_req(req);
Harald Weltebb779392018-06-16 20:21:10 +0200546 break;
547 case OSMO_GSUP_MSGT_PROC_SS_ERROR:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100548 rx_proc_ss_error(req);
Harald Weltebb779392018-06-16 20:21:10 +0200549 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200550 case OSMO_GSUP_MSGT_INSERT_DATA_ERROR:
Harald Weltee72cf552016-04-28 07:18:49 +0200551 case OSMO_GSUP_MSGT_INSERT_DATA_RESULT:
Harald Weltee687be52016-05-03 18:49:27 +0200552 case OSMO_GSUP_MSGT_LOCATION_CANCEL_ERROR:
553 case OSMO_GSUP_MSGT_LOCATION_CANCEL_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100554 lu_rx_gsup(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200555 break;
Oliver Smith783ac812018-12-17 11:34:51 +0100556 case OSMO_GSUP_MSGT_CHECK_IMEI_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100557 rx_check_imei_req(req);
Oliver Smith783ac812018-12-17 11:34:51 +0100558 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200559 default:
Maxaa0fefd2017-02-16 12:25:22 +0100560 LOGP(DMAIN, LOGL_DEBUG, "Unhandled GSUP message type %s\n",
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100561 osmo_gsup_message_type_name(req->gsup.message_type));
562 osmo_gsup_req_free(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200563 break;
564 }
565 return 0;
566}
567
Harald Welte7a476532022-11-03 11:38:41 +0100568static void print_usage(void)
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100569{
570 printf("Usage: osmo-hlr\n");
571}
572
Harald Welte7a476532022-11-03 11:38:41 +0100573static void print_help(void)
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100574{
575 printf(" -h --help This text.\n");
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100576 printf(" -c --config-file filename The config file to use.\n");
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100577 printf(" -l --database db-name The database to use.\n");
578 printf(" -d option --debug=DRLL:DCC:DMM:DRR:DRSL:DNM Enable debugging.\n");
579 printf(" -D --daemonize Fork the process into a background daemon.\n");
580 printf(" -s --disable-color Do not print ANSI colors in the log\n");
581 printf(" -T --timestamp Prefix every log line with a timestamp.\n");
582 printf(" -e --log-level number Set a global loglevel.\n");
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100583 printf(" -U --db-upgrade Allow HLR database schema upgrades.\n");
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100584 printf(" -C --db-check Quit after opening (and upgrading) the database.\n");
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100585 printf(" -V --version Print the version of OsmoHLR.\n");
Harald Welte2bd1a452021-02-23 17:23:30 +0100586
587 printf("\nVTY reference generation:\n");
588 printf(" --vty-ref-mode MODE VTY reference generation mode (e.g. 'expert').\n");
589 printf(" --vty-ref-xml Generate the VTY reference XML output and exit.\n");
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100590}
591
592static struct {
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100593 const char *config_file;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100594 const char *db_file;
595 bool daemonize;
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100596 bool db_upgrade;
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100597 bool db_check;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100598} cmdline_opts = {
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100599 .config_file = "osmo-hlr.cfg",
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200600 .db_file = NULL,
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100601 .daemonize = false,
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100602 .db_upgrade = false,
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100603};
604
Harald Welte2bd1a452021-02-23 17:23:30 +0100605static void handle_long_options(const char *prog_name, const int long_option)
606{
607 static int vty_ref_mode = VTY_REF_GEN_MODE_DEFAULT;
608
609 switch (long_option) {
610 case 1:
611 vty_ref_mode = get_string_value(vty_ref_gen_mode_names, optarg);
612 if (vty_ref_mode < 0) {
613 fprintf(stderr, "%s: Unknown VTY reference generation "
614 "mode '%s'\n", prog_name, optarg);
615 exit(2);
616 }
617 break;
618 case 2:
619 fprintf(stderr, "Generating the VTY reference in mode '%s' (%s)\n",
620 get_value_string(vty_ref_gen_mode_names, vty_ref_mode),
621 get_value_string(vty_ref_gen_mode_desc, vty_ref_mode));
622 vty_dump_xml_ref_mode(stdout, (enum vty_ref_gen_mode) vty_ref_mode);
623 exit(0);
624 default:
625 fprintf(stderr, "%s: error parsing cmdline options\n", prog_name);
626 exit(2);
627 }
628
629}
630
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100631static void handle_options(int argc, char **argv)
632{
633 while (1) {
634 int option_index = 0, c;
Harald Welte2bd1a452021-02-23 17:23:30 +0100635 static int long_option = 0;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100636 static struct option long_options[] = {
637 {"help", 0, 0, 'h'},
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100638 {"config-file", 1, 0, 'c'},
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100639 {"database", 1, 0, 'l'},
640 {"debug", 1, 0, 'd'},
641 {"daemonize", 0, 0, 'D'},
642 {"disable-color", 0, 0, 's'},
643 {"log-level", 1, 0, 'e'},
644 {"timestamp", 0, 0, 'T'},
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100645 {"db-upgrade", 0, 0, 'U' },
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100646 {"db-check", 0, 0, 'C' },
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100647 {"version", 0, 0, 'V' },
Harald Welte2bd1a452021-02-23 17:23:30 +0100648 {"vty-ref-mode", 1, &long_option, 1},
649 {"vty-ref-xml", 0, &long_option, 2},
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100650 {0, 0, 0, 0}
651 };
652
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100653 c = getopt_long(argc, argv, "hc:l:d:Dse:TUV",
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100654 long_options, &option_index);
655 if (c == -1)
656 break;
657
658 switch (c) {
Harald Welte2bd1a452021-02-23 17:23:30 +0100659 case 0:
660 handle_long_options(argv[0], long_option);
661 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100662 case 'h':
663 print_usage();
664 print_help();
665 exit(0);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100666 case 'c':
667 cmdline_opts.config_file = optarg;
668 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100669 case 'l':
670 cmdline_opts.db_file = optarg;
671 break;
672 case 'd':
673 log_parse_category_mask(osmo_stderr_target, optarg);
674 break;
675 case 'D':
676 cmdline_opts.daemonize = 1;
677 break;
678 case 's':
679 log_set_use_color(osmo_stderr_target, 0);
680 break;
681 case 'e':
682 log_set_log_level(osmo_stderr_target, atoi(optarg));
683 break;
684 case 'T':
685 log_set_print_timestamp(osmo_stderr_target, 1);
686 break;
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100687 case 'U':
688 cmdline_opts.db_upgrade = true;
689 break;
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100690 case 'C':
691 cmdline_opts.db_check = true;
692 break;
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100693 case 'V':
694 print_version(1);
695 exit(0);
696 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100697 default:
698 /* catch unknown options *as well as* missing arguments. */
699 fprintf(stderr, "Error in command line options. Exiting.\n");
700 exit(-1);
701 break;
702 }
703 }
Harald Welte80dc9ae2019-12-03 22:16:39 +0100704
705 if (argc > optind) {
706 fprintf(stderr, "Unsupported positional arguments on command line\n");
707 exit(2);
708 }
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100709}
710
Harald Welteaabae9e2016-04-28 12:48:14 +0200711static void signal_hdlr(int signal)
712{
713 switch (signal) {
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700714 case SIGTERM:
Harald Welteaabae9e2016-04-28 12:48:14 +0200715 case SIGINT:
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700716 LOGP(DMAIN, LOGL_NOTICE, "Terminating due to signal=%d\n", signal);
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700717 quit++;
Harald Welteaabae9e2016-04-28 12:48:14 +0200718 break;
719 case SIGUSR1:
720 LOGP(DMAIN, LOGL_DEBUG, "Talloc Report due to SIGUSR1\n");
Neels Hofmeyrca43e302017-01-30 13:18:23 +0100721 talloc_report_full(hlr_ctx, stderr);
Harald Welteaabae9e2016-04-28 12:48:14 +0200722 break;
723 }
724}
Harald Weltee72cf552016-04-28 07:18:49 +0200725
Max372868b2017-03-02 12:12:00 +0100726static const char vlr_copyright[] =
Harald Weltea854b482023-05-30 17:27:32 +0200727 "Copyright (C) 2016-2023 by Harald Welte, sysmocom s.f.m.c. GmbH\r\n"
Max372868b2017-03-02 12:12:00 +0100728 "License AGPLv3+: GNU AGPL version 3 or later <http://gnu.org/licenses/agpl-3.0.html>\r\n"
729 "This is free software: you are free to change and redistribute it.\r\n"
730 "There is NO WARRANTY, to the extent permitted by law.\r\n";
731
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100732static struct vty_app_info vty_info = {
733 .name = "OsmoHLR",
734 .version = PACKAGE_VERSION,
Max372868b2017-03-02 12:12:00 +0100735 .copyright = vlr_copyright,
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100736 .is_config_node = hlr_vty_is_config_node,
Pau Espin Pedrolce9bc402017-05-31 13:19:22 +0200737 .go_parent_cb = hlr_vty_go_parent,
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100738};
739
Harald Weltee72cf552016-04-28 07:18:49 +0200740int main(int argc, char **argv)
741{
Harald Weltee72cf552016-04-28 07:18:49 +0200742 int rc;
743
Vadim Yanitskiy9fdb8542018-07-30 03:09:22 +0700744 /* Track the use of talloc NULL memory contexts */
745 talloc_enable_null_tracking();
746
Neels Hofmeyrca43e302017-01-30 13:18:23 +0100747 hlr_ctx = talloc_named_const(NULL, 1, "OsmoHLR");
748 msgb_talloc_ctx_init(hlr_ctx, 0);
Harald Welte7ee6e552018-02-14 00:52:05 +0100749 vty_info.tall_ctx = hlr_ctx;
Harald Welteaabae9e2016-04-28 12:48:14 +0200750
Maxd4bebbd2017-03-02 12:00:19 +0100751 g_hlr = talloc_zero(hlr_ctx, struct hlr);
Harald Welte4956ae12018-06-15 22:04:28 +0200752 INIT_LLIST_HEAD(&g_hlr->euse_list);
Harald Weltebb779392018-06-16 20:21:10 +0200753 INIT_LLIST_HEAD(&g_hlr->ss_sessions);
Harald Weltedab544e2018-07-29 16:14:48 +0200754 INIT_LLIST_HEAD(&g_hlr->ussd_routes);
Neels Hofmeyrab7dc402019-11-20 03:35:37 +0100755 INIT_LLIST_HEAD(&g_hlr->mslookup.server.local_site_services);
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200756 g_hlr->db_file_path = talloc_strdup(g_hlr, HLR_DEFAULT_DB_FILE_PATH);
Neels Hofmeyr407925d2019-11-20 03:35:37 +0100757 g_hlr->mslookup.server.mdns.domain_suffix = talloc_strdup(g_hlr, OSMO_MDNS_DOMAIN_SUFFIX_DEFAULT);
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100758 g_hlr->mslookup.client.mdns.domain_suffix = talloc_strdup(g_hlr, OSMO_MDNS_DOMAIN_SUFFIX_DEFAULT);
Alexander Couzens268a33e2020-01-12 00:48:07 +0100759 g_hlr->reject_cause = GMM_CAUSE_IMSI_UNKNOWN;
760 g_hlr->no_proxy_reject_cause = GMM_CAUSE_IMSI_UNKNOWN;
Maxd4bebbd2017-03-02 12:00:19 +0100761
Vadim Yanitskiyd157a562018-12-01 00:03:39 +0700762 /* Init default (call independent) SS session guard timeout value */
763 g_hlr->ncss_guard_timeout = NCSS_GUARD_TIMEOUT_DEFAULT;
764
Pau Espin Pedrol51530312018-04-17 15:07:06 +0200765 rc = osmo_init_logging2(hlr_ctx, &hlr_log_info);
Harald Weltee72cf552016-04-28 07:18:49 +0200766 if (rc < 0) {
767 fprintf(stderr, "Error initializing logging\n");
768 exit(1);
769 }
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100770
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100771 /* Set up llists and objects, startup is happening from VTY commands. */
772 dgsm_init(hlr_ctx);
773
Max20ddfdb2019-02-18 13:12:27 +0100774 osmo_stats_init(hlr_ctx);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100775 vty_init(&vty_info);
Max372868b2017-03-02 12:12:00 +0100776 ctrl_vty_init(hlr_ctx);
Alexander Couzens268a33e2020-01-12 00:48:07 +0100777 hlr_vty_init(hlr_ctx);
Neels Hofmeyr407925d2019-11-20 03:35:37 +0100778 dgsm_vty_init();
Pau Espin Pedroled18fa92020-08-18 12:58:36 +0200779 osmo_cpu_sched_vty_init(hlr_ctx);
Harald Welte2bd1a452021-02-23 17:23:30 +0100780 handle_options(argc, argv);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100781
782 rc = vty_read_config_file(cmdline_opts.config_file, NULL);
783 if (rc < 0) {
784 LOGP(DMAIN, LOGL_FATAL,
785 "Failed to parse the config file: '%s'\n",
786 cmdline_opts.config_file);
787 return rc;
788 }
789
Harald Weltee72cf552016-04-28 07:18:49 +0200790 LOGP(DMAIN, LOGL_NOTICE, "hlr starting\n");
791
792 rc = rand_init();
793 if (rc < 0) {
794 LOGP(DMAIN, LOGL_FATAL, "Error initializing random source\n");
795 exit(1);
796 }
797
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200798 if (cmdline_opts.db_file)
799 osmo_talloc_replace_string(g_hlr, &g_hlr->db_file_path, cmdline_opts.db_file);
800
801 g_hlr->dbc = db_open(hlr_ctx, g_hlr->db_file_path, true, cmdline_opts.db_upgrade);
Maxd4bebbd2017-03-02 12:00:19 +0100802 if (!g_hlr->dbc) {
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200803 LOGP(DMAIN, LOGL_FATAL, "Error opening database %s\n", osmo_quote_str(g_hlr->db_file_path, -1));
Harald Weltee72cf552016-04-28 07:18:49 +0200804 exit(1);
805 }
806
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100807 if (cmdline_opts.db_check) {
808 LOGP(DMAIN, LOGL_NOTICE, "Cmdline option --db-check: Database was opened successfully, quitting.\n");
809 db_close(g_hlr->dbc);
810 log_fini();
811 talloc_free(hlr_ctx);
812 talloc_free(tall_vty_ctx);
813 talloc_disable_null_tracking();
814 exit(0);
815 }
816
817 /* start telnet after reading config for vty_get_bind_addr() */
arehbeine4143232022-12-19 21:28:53 +0100818 rc = telnet_init_default(hlr_ctx, NULL, OSMO_VTY_PORT_HLR);
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100819 if (rc < 0)
820 return rc;
821
822
Neels Hofmeyr84201d32017-07-21 16:00:32 +0200823 g_hlr->gs = osmo_gsup_server_create(hlr_ctx, g_hlr->gsup_bind_addr, OSMO_GSUP_PORT,
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100824 read_cb, g_hlr);
Maxd4bebbd2017-03-02 12:00:19 +0100825 if (!g_hlr->gs) {
Harald Weltee72cf552016-04-28 07:18:49 +0200826 LOGP(DMAIN, LOGL_FATAL, "Error starting GSUP server\n");
827 exit(1);
828 }
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100829 proxy_init(g_hlr->gs);
Harald Weltee72cf552016-04-28 07:18:49 +0200830
Neels Hofmeyr234f9cb2017-10-24 17:23:04 +0200831 g_hlr->ctrl = hlr_controlif_setup(g_hlr);
Max372868b2017-03-02 12:12:00 +0100832
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100833 dgsm_start(hlr_ctx);
834
Harald Welteaabae9e2016-04-28 12:48:14 +0200835 osmo_init_ignore_signals();
836 signal(SIGINT, &signal_hdlr);
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700837 signal(SIGTERM, &signal_hdlr);
Harald Welteaabae9e2016-04-28 12:48:14 +0200838 signal(SIGUSR1, &signal_hdlr);
839
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100840 if (cmdline_opts.daemonize) {
841 rc = osmo_daemonize();
842 if (rc < 0) {
843 perror("Error during daemonize");
844 exit(1);
845 }
846 }
Harald Welteaabae9e2016-04-28 12:48:14 +0200847
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700848 while (!quit)
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100849 osmo_select_main_ctx(0);
850
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100851 dgsm_stop();
Harald Weltee72cf552016-04-28 07:18:49 +0200852
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700853 osmo_gsup_server_destroy(g_hlr->gs);
Maxd4bebbd2017-03-02 12:00:19 +0100854 db_close(g_hlr->dbc);
Harald Weltee72cf552016-04-28 07:18:49 +0200855 log_fini();
856
Vadim Yanitskiy4793a7e2018-07-30 03:04:34 +0700857 /**
858 * Report the heap state of root context, then free,
859 * so both ASAN and Valgrind are happy...
860 */
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700861 talloc_report_full(hlr_ctx, stderr);
Vadim Yanitskiy4793a7e2018-07-30 03:04:34 +0700862 talloc_free(hlr_ctx);
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700863
Vadim Yanitskiy9fdb8542018-07-30 03:09:22 +0700864 /* FIXME: VTY code still uses NULL-context */
865 talloc_free(tall_vty_ctx);
866
867 /**
868 * Report the heap state of NULL context, then free,
869 * so both ASAN and Valgrind are happy...
870 */
871 talloc_report_full(NULL, stderr);
872 talloc_disable_null_tracking();
873
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700874 return 0;
Harald Weltee72cf552016-04-28 07:18:49 +0200875}