blob: 8ad3dfcf35430cb85b67587b661c3cda963b7e99 [file] [log] [blame]
Harald Welte936f6722016-05-03 18:51:18 +02001/* (C) 2016 by Harald Welte <laforge@gnumonks.org>
2 *
3 * All Rights Reserved
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU Affero General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU Affero General Public License for more details.
14 *
15 * You should have received a copy of the GNU Affero General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
17 *
18 */
19
Harald Welteaabae9e2016-04-28 12:48:14 +020020#include <signal.h>
Harald Weltee687be52016-05-03 18:49:27 +020021#include <errno.h>
Maxea8b0d42017-02-14 16:53:04 +010022#include <stdbool.h>
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +010023#include <getopt.h>
24
Harald Weltee72cf552016-04-28 07:18:49 +020025#include <osmocom/core/msgb.h>
Max20ddfdb2019-02-18 13:12:27 +010026#include <osmocom/core/stats.h>
Harald Weltee72cf552016-04-28 07:18:49 +020027#include <osmocom/core/logging.h>
28#include <osmocom/core/application.h>
29#include <osmocom/gsm/gsup.h>
Neels Hofmeyr7685a782017-01-30 23:30:26 +010030#include <osmocom/vty/vty.h>
31#include <osmocom/vty/command.h>
32#include <osmocom/vty/telnet_interface.h>
33#include <osmocom/vty/ports.h>
Pau Espin Pedroled18fa92020-08-18 12:58:36 +020034#include <osmocom/vty/cpu_sched_vty.h>
Max372868b2017-03-02 12:12:00 +010035#include <osmocom/ctrl/control_vty.h>
Neels Hofmeyr5aeb4382018-05-04 16:02:44 +020036#include <osmocom/gsm/apn.h>
Oliver Smith783ac812018-12-17 11:34:51 +010037#include <osmocom/gsm/gsm48_ie.h>
Oliver Smithc7f17872019-03-04 15:10:44 +010038#include <osmocom/gsm/gsm_utils.h>
Neels Hofmeyrad868e22019-11-20 02:36:45 +010039#include <osmocom/gsm/gsm23003.h>
Neels Hofmeyr76328bd2019-11-20 03:35:37 +010040#include <osmocom/mslookup/mslookup_client.h>
Harald Weltee72cf552016-04-28 07:18:49 +020041
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +010042#include <osmocom/gsupclient/cni_peer_id.h>
Neels Hofmeyr2f758032019-11-20 00:37:07 +010043#include <osmocom/hlr/db.h>
44#include <osmocom/hlr/hlr.h>
45#include <osmocom/hlr/ctrl.h>
46#include <osmocom/hlr/logging.h>
47#include <osmocom/hlr/gsup_server.h>
48#include <osmocom/hlr/gsup_router.h>
49#include <osmocom/hlr/rand.h>
Neels Hofmeyr2f758032019-11-20 00:37:07 +010050#include <osmocom/hlr/hlr_vty.h>
51#include <osmocom/hlr/hlr_ussd.h>
Mychaela N. Falconia786ec5b2023-09-19 17:15:43 +000052#include <osmocom/hlr/hlr_sms.h>
Neels Hofmeyr76328bd2019-11-20 03:35:37 +010053#include <osmocom/hlr/dgsm.h>
54#include <osmocom/hlr/proxy.h>
Neels Hofmeyrad868e22019-11-20 02:36:45 +010055#include <osmocom/hlr/lu_fsm.h>
Neels Hofmeyr407925d2019-11-20 03:35:37 +010056#include <osmocom/mslookup/mdns.h>
Harald Weltee72cf552016-04-28 07:18:49 +020057
Harald Welted5807b82018-07-29 12:27:41 +020058struct hlr *g_hlr;
Oliver Smithc5044cf2019-02-26 16:32:57 +010059static void *hlr_ctx = NULL;
Vadim Yanitskiy527d9342018-07-30 02:42:25 +070060static int quit = 0;
Harald Weltee72cf552016-04-28 07:18:49 +020061
Neels Hofmeyrad868e22019-11-20 02:36:45 +010062struct osmo_tdef g_hlr_tdefs[] = {
63 /* 4222 is also the OSMO_GSUP_PORT */
64 { .T = -4222, .default_val = 30, .desc = "GSUP Update Location timeout" },
65 {}
66};
67
Stefan Sperlingf1622522018-04-09 11:39:16 +020068/* Trigger 'Insert Subscriber Data' messages to all connected GSUP clients.
69 *
Stefan Sperlingf1622522018-04-09 11:39:16 +020070 * \param[in] subscr A subscriber we have new data to send for.
71 */
72void
73osmo_hlr_subscriber_update_notify(struct hlr_subscriber *subscr)
74{
75 struct osmo_gsup_conn *co;
76
Neels Hofmeyre66e5252018-09-28 02:59:19 +020077 if (g_hlr->gs == NULL) {
78 LOGP(DLGSUP, LOGL_DEBUG,
79 "IMSI %s: NOT Notifying peers of subscriber data change,"
80 " there is no GSUP server\n",
81 subscr->imsi);
Stefan Sperlingf1622522018-04-09 11:39:16 +020082 return;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020083 }
Stefan Sperlingf1622522018-04-09 11:39:16 +020084
Neels Hofmeyrad868e22019-11-20 02:36:45 +010085 /* FIXME: send only to current vlr_number and sgsn_number */
86
Stefan Sperlingf1622522018-04-09 11:39:16 +020087 llist_for_each_entry(co, &g_hlr->gs->clients, list) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020088 struct osmo_gsup_message gsup = { };
Stefan Sperlingf83432c2018-05-03 14:26:59 +020089 struct msgb *msg_out;
Stefan Sperling93c5b102018-04-10 19:26:14 +020090 uint8_t *peer;
91 int peer_len;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020092 size_t peer_strlen;
93 const char *peer_compare;
Stefan Sperlingf83432c2018-05-03 14:26:59 +020094 enum osmo_gsup_cn_domain cn_domain;
Stefan Sperling93c5b102018-04-10 19:26:14 +020095
Neels Hofmeyre66e5252018-09-28 02:59:19 +020096 if (co->supports_ps) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020097 cn_domain = OSMO_GSUP_CN_DOMAIN_PS;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020098 peer_compare = subscr->sgsn_number;
99 } else if (co->supports_cs) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200100 cn_domain = OSMO_GSUP_CN_DOMAIN_CS;
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200101 peer_compare = subscr->vlr_number;
102 } else {
103 /* We have not yet received a location update from this GSUP client.*/
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200104 continue;
105 }
106
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200107 peer_len = osmo_gsup_conn_ccm_get(co, &peer, IPAC_IDTAG_SERNR);
108 if (peer_len < 0) {
109 LOGP(DLGSUP, LOGL_ERROR,
110 "IMSI='%s': cannot get peer name for connection %s:%u\n", subscr->imsi,
111 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
112 co && co->conn && co->conn->server? co->conn->server->port : 0);
113 continue;
114 }
115
116 peer_strlen = strnlen((const char*)peer, peer_len);
117 if (strlen(peer_compare) != peer_strlen || strncmp(peer_compare, (const char *)peer, peer_len)) {
118 /* Mismatch. The subscriber is not subscribed with this GSUP client. */
119 /* I hope peer is always nul terminated... */
120 if (peer_strlen < peer_len)
121 LOGP(DLGSUP, LOGL_DEBUG,
122 "IMSI %s: subscriber change: skipping %s peer %s\n",
123 subscr->imsi, cn_domain == OSMO_GSUP_CN_DOMAIN_PS ? "PS" : "CS",
124 osmo_quote_str((char*)peer, -1));
125 continue;
126 }
127
128 LOGP(DLGSUP, LOGL_DEBUG,
129 "IMSI %s: subscriber change: notifying %s peer %s\n",
130 subscr->imsi, cn_domain == OSMO_GSUP_CN_DOMAIN_PS ? "PS" : "CS",
131 osmo_quote_str(peer_compare, -1));
132
Alexander Couzens29898732023-04-11 17:53:33 +0200133 if (osmo_gsup_create_insert_subscriber_data_msg(&gsup, subscr->imsi, subscr->msisdn, cn_domain, OTC_SELECT) != 0) {
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200134 LOGP(DLGSUP, LOGL_ERROR,
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200135 "IMSI='%s': Cannot notify GSUP client; could not create gsup message "
Stefan Sperling93c5b102018-04-10 19:26:14 +0200136 "for %s:%u\n", subscr->imsi,
Stefan Sperlingf1622522018-04-09 11:39:16 +0200137 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
138 co && co->conn && co->conn->server? co->conn->server->port : 0);
139 continue;
140 }
Stefan Sperling93c5b102018-04-10 19:26:14 +0200141
Stefan Sperling93c5b102018-04-10 19:26:14 +0200142 /* Send ISD to MSC/SGSN */
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100143 msg_out = osmo_gsup_msgb_alloc("GSUP ISD UPDATE");
Stefan Sperling93c5b102018-04-10 19:26:14 +0200144 if (msg_out == NULL) {
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200145 LOGP(DLGSUP, LOGL_ERROR,
Stefan Sperling93c5b102018-04-10 19:26:14 +0200146 "IMSI='%s': Cannot notify GSUP client; could not allocate msg buffer "
147 "for %s:%u\n", subscr->imsi,
148 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
149 co && co->conn && co->conn->server? co->conn->server->port : 0);
150 continue;
151 }
Stefan Sperling93c5b102018-04-10 19:26:14 +0200152 osmo_gsup_encode(msg_out, &gsup);
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200153
Stefan Sperling93c5b102018-04-10 19:26:14 +0200154 if (osmo_gsup_addr_send(g_hlr->gs, peer, peer_len, msg_out) < 0) {
155 LOGP(DMAIN, LOGL_ERROR,
156 "IMSI='%s': Cannot notify GSUP client; send operation failed "
157 "for %s:%u\n", subscr->imsi,
158 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
159 co && co->conn && co->conn->server? co->conn->server->port : 0);
160 continue;
161 }
Stefan Sperlingf1622522018-04-09 11:39:16 +0200162 }
163}
164
Oliver Smithc7f17872019-03-04 15:10:44 +0100165static int generate_new_msisdn(char *msisdn, const char *imsi, unsigned int len)
166{
167 int i, j, rc;
168 uint8_t rand_buf[GSM23003_MSISDN_MAX_DIGITS];
169
170 OSMO_ASSERT(len <= sizeof(rand_buf));
171
172 /* Generate a random unique MSISDN (with retry) */
173 for (i = 0; i < 10; i++) {
174 /* Get a random number (with retry) */
175 for (j = 0; j < 10; j++) {
176 rc = osmo_get_rand_id(rand_buf, len);
177 if (!rc)
178 break;
179 }
180 if (rc) {
181 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to generate new MSISDN, random number generator"
182 " failed (rc=%d)\n", imsi, rc);
183 return rc;
184 }
185
186 /* Shift 0x00 ... 0xff range to 30 ... 39 (ASCII numbers) */
187 for (j = 0; j < len; j++)
188 msisdn[j] = 48 + (rand_buf[j] % 10);
189 msisdn[j] = '\0';
190
191 /* Ensure there is no subscriber with such MSISDN */
192 if (db_subscr_exists_by_msisdn(g_hlr->dbc, msisdn) == -ENOENT)
193 return 0;
194 }
195
196 /* Failure */
197 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to generate a new MSISDN, consider increasing "
198 "the length for the automatically assigned MSISDNs "
199 "(see 'subscriber-create-on-demand' command)\n", imsi);
200 return -1;
201}
202
203static int subscr_create_on_demand(const char *imsi)
204{
205 char msisdn[GSM23003_MSISDN_MAX_DIGITS + 1];
206 int rc;
207 unsigned int rand_msisdn_len = g_hlr->subscr_create_on_demand_rand_msisdn_len;
208
209 if (!g_hlr->subscr_create_on_demand)
210 return -1;
211 if (db_subscr_exists_by_imsi(g_hlr->dbc, imsi) == 0)
212 return -1;
213 if (rand_msisdn_len && generate_new_msisdn(msisdn, imsi, rand_msisdn_len) != 0)
214 return -1;
215
216 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': Creating subscriber on demand\n", imsi);
217 rc = db_subscr_create(g_hlr->dbc, imsi, g_hlr->subscr_create_on_demand_flags);
218 if (rc) {
219 LOGP(DMAIN, LOGL_ERROR, "Failed to create subscriber on demand (rc=%d): IMSI='%s'\n", rc, imsi);
220 return rc;
221 }
222
223 if (!rand_msisdn_len)
224 return 0;
225
226 /* Update MSISDN of the new (just allocated) subscriber */
227 rc = db_subscr_update_msisdn_by_imsi(g_hlr->dbc, imsi, msisdn);
228 if (rc) {
229 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to assign MSISDN='%s' (rc=%d)\n", imsi, msisdn, rc);
230 return rc;
231 }
232 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': Successfully assigned MSISDN='%s'\n", imsi, msisdn);
233
234 return 0;
235}
236
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100237/*! Update nam_cs/nam_ps in the db and trigger notifications to GSUP clients.
238 * \param[in,out] hlr Global hlr context.
239 * \param[in] subscr Subscriber from a fresh db_subscr_get_by_*() call.
240 * \param[in] nam_val True to enable CS/PS, false to disable.
241 * \param[in] is_ps True to enable/disable PS, false for CS.
242 * \returns 0 on success, ENOEXEC if there is no need to change, a negative
243 * value on error.
244 */
245int hlr_subscr_nam(struct hlr *hlr, struct hlr_subscriber *subscr, bool nam_val, bool is_ps)
246{
247 int rc;
248 bool is_val = is_ps? subscr->nam_ps : subscr->nam_cs;
249 struct osmo_ipa_name vlr_name;
250 struct osmo_gsup_message gsup_del_data = {
251 .message_type = OSMO_GSUP_MSGT_DELETE_DATA_REQUEST,
252 };
253 OSMO_STRLCPY_ARRAY(gsup_del_data.imsi, subscr->imsi);
254
255 if (is_val == nam_val) {
256 LOGP(DAUC, LOGL_DEBUG, "IMSI-%s: Already has the requested value when asked to %s %s\n",
257 subscr->imsi, nam_val ? "enable" : "disable", is_ps ? "PS" : "CS");
258 return ENOEXEC;
259 }
260
261 rc = db_subscr_nam(hlr->dbc, subscr->imsi, nam_val, is_ps);
262 if (rc)
263 return rc > 0? -rc : rc;
264
265 /* If we're disabling, send a notice out to the GSUP client that is
266 * responsible. Otherwise no need. */
267 if (nam_val)
268 return 0;
269
Neels Hofmeyr9b8e7b42020-05-04 19:20:23 +0200270 if (subscr->vlr_number[0] && !osmo_ipa_name_set_str(&vlr_name, subscr->vlr_number))
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100271 osmo_gsup_enc_send_to_ipa_name(g_hlr->gs, &vlr_name, &gsup_del_data);
Neels Hofmeyr9b8e7b42020-05-04 19:20:23 +0200272 if (subscr->sgsn_number[0] && !osmo_ipa_name_set_str(&vlr_name, subscr->sgsn_number))
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100273 osmo_gsup_enc_send_to_ipa_name(g_hlr->gs, &vlr_name, &gsup_del_data);
274 return 0;
275}
276
Harald Weltee687be52016-05-03 18:49:27 +0200277/***********************************************************************
278 * Send Auth Info handling
279 ***********************************************************************/
280
Harald Weltee72cf552016-04-28 07:18:49 +0200281/* process an incoming SAI request */
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100282static int rx_send_auth_info(struct osmo_gsup_req *req)
Harald Weltee72cf552016-04-28 07:18:49 +0200283{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100284 struct osmo_gsup_message gsup_out = {
285 .message_type = OSMO_GSUP_MSGT_SEND_AUTH_INFO_RESULT,
286 };
Harald Welte06f5af22019-08-21 20:01:31 +0200287 bool separation_bit = false;
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100288 int num_auth_vectors = OSMO_GSUP_MAX_NUM_AUTH_INFO;
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100289 unsigned int auc_3g_ind;
Harald Weltee72cf552016-04-28 07:18:49 +0200290 int rc;
291
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100292 subscr_create_on_demand(req->gsup.imsi);
Oliver Smithc7f17872019-03-04 15:10:44 +0100293
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100294 if (req->gsup.current_rat_type == OSMO_RAT_EUTRAN_SGS)
Harald Welte06f5af22019-08-21 20:01:31 +0200295 separation_bit = true;
296
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100297 if (req->gsup.num_auth_vectors > 0 &&
298 req->gsup.num_auth_vectors <= OSMO_GSUP_MAX_NUM_AUTH_INFO)
299 num_auth_vectors = req->gsup.num_auth_vectors;
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100300 rc = db_ind(g_hlr->dbc, &req->source_name, &auc_3g_ind);
301 if (rc) {
302 LOG_GSUP_REQ(req, LOGL_ERROR,
303 "Unable to determine 3G auth IND for source %s (rc=%d),"
304 " generating tuples with IND = 0\n",
305 osmo_cni_peer_id_to_str(&req->source_name), rc);
306 auc_3g_ind = 0;
307 }
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100308
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100309 rc = db_get_auc(g_hlr->dbc, req->gsup.imsi, auc_3g_ind,
Neels Hofmeyrcab2fcd2017-03-15 00:07:43 +0100310 gsup_out.auth_vectors,
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100311 num_auth_vectors,
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100312 req->gsup.rand, req->gsup.auts, separation_bit);
313
Neels Hofmeyr671db902017-11-22 20:38:19 +0100314 if (rc <= 0) {
Neels Hofmeyr671db902017-11-22 20:38:19 +0100315 switch (rc) {
316 case 0:
Neels Hofmeyrbd1dca02017-11-23 15:25:30 +0100317 /* 0 means "0 tuples generated", which shouldn't happen.
318 * Treat the same as "no auth data". */
319 case -ENOKEY:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100320 osmo_gsup_req_respond_err(req, GMM_CAUSE_IMSI_UNKNOWN,
321 "IMSI known, but has no auth data;"
322 " Returning slightly inaccurate cause 'IMSI Unknown' via GSUP");
323 return rc;
Neels Hofmeyr33cbde92017-11-22 20:39:59 +0100324 case -ENOENT:
Alexander Couzens268a33e2020-01-12 00:48:07 +0100325 osmo_gsup_req_respond_err(req, g_hlr->reject_cause, "IMSI unknown");
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100326 return rc;
Neels Hofmeyr671db902017-11-22 20:38:19 +0100327 default:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100328 osmo_gsup_req_respond_err(req, GMM_CAUSE_NET_FAIL, "failure to look up IMSI in db");
329 return rc;
Neels Hofmeyr671db902017-11-22 20:38:19 +0100330 }
Harald Weltee72cf552016-04-28 07:18:49 +0200331 }
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100332 gsup_out.num_auth_vectors = rc;
Harald Weltee72cf552016-04-28 07:18:49 +0200333
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100334 osmo_gsup_req_respond(req, &gsup_out, false, true);
335 return 0;
Harald Weltee72cf552016-04-28 07:18:49 +0200336}
337
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100338/*! Receive Update Location Request, creates new lu_operation */
339static int rx_upd_loc_req(struct osmo_gsup_conn *conn, struct osmo_gsup_req *req)
Harald Weltee687be52016-05-03 18:49:27 +0200340{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100341 switch (req->gsup.cn_domain) {
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200342 case OSMO_GSUP_CN_DOMAIN_CS:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200343 conn->supports_cs = true;
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200344 break;
345 default:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200346 /* The client didn't send a CN_DOMAIN IE; assume packet-switched in
347 * accordance with the GSUP spec in osmo-hlr's user manual (section
348 * 11.6.15 "CN Domain" says "if no CN Domain IE is present within
349 * a request, the PS Domain is assumed." */
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200350 case OSMO_GSUP_CN_DOMAIN_PS:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200351 conn->supports_ps = true;
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200352 break;
Stefan Sperling93c5b102018-04-10 19:26:14 +0200353 }
Harald Weltee687be52016-05-03 18:49:27 +0200354
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100355 subscr_create_on_demand(req->gsup.imsi);
Oliver Smithc7f17872019-03-04 15:10:44 +0100356
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100357 lu_rx_gsup(req);
Harald Weltee687be52016-05-03 18:49:27 +0200358 return 0;
359}
360
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100361static int rx_purge_ms_req(struct osmo_gsup_req *req)
Harald Welteb18f0e02016-05-05 21:03:03 +0200362{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100363 bool is_ps = (req->gsup.cn_domain != OSMO_GSUP_CN_DOMAIN_CS);
Harald Welteb18f0e02016-05-05 21:03:03 +0200364 int rc;
365
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100366 LOG_GSUP_REQ_CAT(req, DAUC, LOGL_INFO, "Purge MS (%s)\n", is_ps ? "PS" : "CS");
Harald Welteb18f0e02016-05-05 21:03:03 +0200367
368 /* FIXME: check if the VLR that sends the purge is the same that
369 * we have on record. Only update if yes */
370
371 /* Perform the actual update of the DB */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100372 rc = db_subscr_purge(g_hlr->dbc, req->gsup.imsi, true, is_ps);
Harald Welteb18f0e02016-05-05 21:03:03 +0200373
Harald Welte3f2a9a22018-03-01 23:35:35 +0100374 if (rc == 0)
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100375 osmo_gsup_req_respond_msgt(req, OSMO_GSUP_MSGT_PURGE_MS_RESULT, true);
376 else if (rc == -ENOENT)
377 osmo_gsup_req_respond_err(req, GMM_CAUSE_IMSI_UNKNOWN, "IMSI unknown");
378 else
379 osmo_gsup_req_respond_err(req, GMM_CAUSE_NET_FAIL, "db error");
380 return rc;
Harald Welteb18f0e02016-05-05 21:03:03 +0200381}
382
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100383static int rx_check_imei_req(struct osmo_gsup_req *req)
Harald Weltea1d3b042018-06-11 20:28:35 +0200384{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100385 struct osmo_gsup_message gsup_reply;
Oliver Smith103c11b2019-06-06 11:57:05 +0200386 char imei[GSM23003_IMEI_NUM_DIGITS_NO_CHK+1] = {0};
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100387 const struct osmo_gsup_message *gsup = &req->gsup;
Oliver Smith103c11b2019-06-06 11:57:05 +0200388 int rc;
Oliver Smith783ac812018-12-17 11:34:51 +0100389
Oliver Smith103c11b2019-06-06 11:57:05 +0200390 /* Require IMEI */
391 if (!gsup->imei_enc) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100392 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "missing IMEI");
Oliver Smith783ac812018-12-17 11:34:51 +0100393 return -1;
394 }
395
Oliver Smith103c11b2019-06-06 11:57:05 +0200396 /* Decode IMEI (fails if IMEI is too long) */
397 rc = gsm48_decode_bcd_number2(imei, sizeof(imei), gsup->imei_enc, gsup->imei_enc_len, 0);
398 if (rc < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100399 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO,
400 "failed to decode IMEI %s (rc: %d)",
401 osmo_hexdump_c(OTC_SELECT, gsup->imei_enc, gsup->imei_enc_len),
402 rc);
Oliver Smith103c11b2019-06-06 11:57:05 +0200403 return -1;
404 }
405
406 /* Check if IMEI is too short */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100407 if (!osmo_imei_str_valid(imei, false)) {
408 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO,
409 "invalid IMEI: %s", osmo_quote_str_c(OTC_SELECT, imei, -1));
Oliver Smith783ac812018-12-17 11:34:51 +0100410 return -1;
411 }
412
Oliver Smithc7f17872019-03-04 15:10:44 +0100413 subscr_create_on_demand(gsup->imsi);
414
Oliver Smith851814a2019-01-11 15:30:21 +0100415 /* Save in DB if desired */
416 if (g_hlr->store_imei) {
417 LOGP(DAUC, LOGL_DEBUG, "IMSI='%s': storing IMEI = %s\n", gsup->imsi, imei);
418 if (db_subscr_update_imei_by_imsi(g_hlr->dbc, gsup->imsi, imei) < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100419 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "Failed to store IMEI in HLR db");
Oliver Smith851814a2019-01-11 15:30:21 +0100420 return -1;
421 }
422 } else {
423 /* Check if subscriber exists and print IMEI */
424 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': has IMEI = %s (consider setting 'store-imei')\n", gsup->imsi, imei);
425 struct hlr_subscriber subscr;
426 if (db_subscr_get_by_imsi(g_hlr->dbc, gsup->imsi, &subscr) < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100427 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "IMSI unknown");
Oliver Smith851814a2019-01-11 15:30:21 +0100428 return -1;
429 }
430 }
Oliver Smith783ac812018-12-17 11:34:51 +0100431
432 /* Accept all IMEIs */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100433 gsup_reply = (struct osmo_gsup_message){
434 .message_type = OSMO_GSUP_MSGT_CHECK_IMEI_RESULT,
435 .imei_result = OSMO_GSUP_IMEI_RESULT_ACK,
436 };
437 return osmo_gsup_req_respond(req, &gsup_reply, false, true);
Oliver Smith783ac812018-12-17 11:34:51 +0100438}
439
Oliver Smith28f0af82019-02-22 11:46:33 +0100440static char namebuf[255];
441#define LOGP_GSUP_FWD(gsup, level, fmt, args ...) \
442 LOGP(DMAIN, level, "Forward %s (class=%s, IMSI=%s, %s->%s): " fmt, \
Neels Hofmeyrfbe49292020-01-09 18:35:03 +0100443 osmo_gsup_message_type_name((gsup)->message_type), \
444 osmo_gsup_message_class_name((gsup)->message_class), \
445 (gsup)->imsi, \
446 osmo_quote_str((const char *)(gsup)->source_name, (gsup)->source_name_len), \
447 osmo_quote_str_buf2(namebuf, sizeof(namebuf), (const char *)(gsup)->destination_name, (gsup)->destination_name_len), \
Oliver Smith28f0af82019-02-22 11:46:33 +0100448 ## args)
449
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100450static int read_cb_forward(struct osmo_gsup_req *req)
Oliver Smith28f0af82019-02-22 11:46:33 +0100451{
452 int ret = -EINVAL;
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100453 const struct osmo_gsup_message *gsup = &req->gsup;
454 struct osmo_gsup_message gsup_err;
455 struct msgb *forward_msg;
456 struct osmo_ipa_name destination_name;
Oliver Smith28f0af82019-02-22 11:46:33 +0100457
458 /* Check for routing IEs */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100459 if (!req->gsup.source_name || !req->gsup.source_name_len
460 || !req->gsup.destination_name || !req->gsup.destination_name_len) {
461 LOGP_GSUP_FWD(&req->gsup, LOGL_ERROR, "missing routing IEs\n");
462 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100463 }
464
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100465 if (osmo_ipa_name_set(&destination_name, req->gsup.destination_name, req->gsup.destination_name_len)) {
466 LOGP_GSUP_FWD(&req->gsup, LOGL_ERROR, "invalid destination name\n");
467 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100468 }
469
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100470 LOG_GSUP_REQ(req, LOGL_INFO, "Forwarding to %s\n", osmo_ipa_name_to_str(&destination_name));
Oliver Smith28f0af82019-02-22 11:46:33 +0100471
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100472 /* Forward message without re-encoding (so we don't remove unknown IEs).
473 * Copy GSUP part to forward, removing incoming IPA header to be able to prepend an outgoing IPA header */
474 forward_msg = osmo_gsup_msgb_alloc("GSUP forward");
475 forward_msg->l2h = msgb_put(forward_msg, msgb_l2len(req->msg));
476 memcpy(forward_msg->l2h, msgb_l2(req->msg), msgb_l2len(req->msg));
477 ret = osmo_gsup_send_to_ipa_name(g_hlr->gs, &destination_name, forward_msg);
Oliver Smith28f0af82019-02-22 11:46:33 +0100478 if (ret) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100479 LOGP_GSUP_FWD(gsup, LOGL_ERROR, "%s (rc=%d)\n",
480 ret == -ENODEV ? "destination not connected" : "unknown error",
481 ret);
482 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100483 }
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100484 osmo_gsup_req_free(req);
485 return 0;
486
487routing_error:
488 gsup_err = (struct osmo_gsup_message){
489 .message_type = OSMO_GSUP_MSGT_ROUTING_ERROR,
490 .source_name = gsup->destination_name,
491 .source_name_len = gsup->destination_name_len,
492 };
493 osmo_gsup_req_respond(req, &gsup_err, true, true);
494 return -1;
Oliver Smith28f0af82019-02-22 11:46:33 +0100495}
496
Harald Weltee72cf552016-04-28 07:18:49 +0200497static int read_cb(struct osmo_gsup_conn *conn, struct msgb *msg)
498{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100499 struct osmo_gsup_req *req = osmo_gsup_conn_rx(conn, msg);
500 if (!req)
Vadim Yanitskiyd9724f42019-05-07 21:05:18 +0700501 return -EINVAL;
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100502
503 /* If the GSUP recipient is other than this HLR, forward. */
504 if (req->gsup.destination_name_len) {
505 struct osmo_ipa_name destination_name;
506 struct osmo_ipa_name my_name;
507 osmo_ipa_name_set_str(&my_name, g_hlr->gsup_unit_name.serno);
508 if (!osmo_ipa_name_set(&destination_name, req->gsup.destination_name, req->gsup.destination_name_len)
509 && osmo_ipa_name_cmp(&destination_name, &my_name)) {
510 return read_cb_forward(req);
511 }
Vadim Yanitskiyc69a18b2019-05-07 20:53:54 +0700512 }
513
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100514 /* Distributed GSM: check whether to proxy for / lookup a remote HLR.
515 * It would require less database hits to do this only if a local-only operation fails with "unknown IMSI", but
516 * it becomes semantically easier if we do this once-off ahead of time. */
517 if (osmo_mslookup_client_active(g_hlr->mslookup.client.client)
518 || osmo_sockaddr_str_is_nonzero(&g_hlr->mslookup.client.gsup_gateway_proxy)) {
519 if (dgsm_check_forward_gsup_msg(req))
520 return 0;
521 }
522
523 /* HLR related messages that are handled at this HLR instance */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100524 switch (req->gsup.message_type) {
Harald Weltee72cf552016-04-28 07:18:49 +0200525 /* requests sent to us */
526 case OSMO_GSUP_MSGT_SEND_AUTH_INFO_REQUEST:
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100527 rx_send_auth_info(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200528 break;
529 case OSMO_GSUP_MSGT_UPDATE_LOCATION_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100530 rx_upd_loc_req(conn, req);
Harald Weltee72cf552016-04-28 07:18:49 +0200531 break;
Harald Welteb18f0e02016-05-05 21:03:03 +0200532 case OSMO_GSUP_MSGT_PURGE_MS_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100533 rx_purge_ms_req(req);
Harald Welteb18f0e02016-05-05 21:03:03 +0200534 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200535 /* responses to requests sent by us */
Max9cacb6f2017-02-20 17:22:56 +0100536 case OSMO_GSUP_MSGT_DELETE_DATA_ERROR:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100537 LOG_GSUP_REQ(req, LOGL_ERROR, "Peer responds with: Error while deleting subscriber data\n");
538 osmo_gsup_req_free(req);
Max9cacb6f2017-02-20 17:22:56 +0100539 break;
540 case OSMO_GSUP_MSGT_DELETE_DATA_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100541 LOG_GSUP_REQ(req, LOGL_DEBUG, "Peer responds with: Subscriber data deleted\n");
542 osmo_gsup_req_free(req);
Max9cacb6f2017-02-20 17:22:56 +0100543 break;
Harald Weltebb779392018-06-16 20:21:10 +0200544 case OSMO_GSUP_MSGT_PROC_SS_REQUEST:
545 case OSMO_GSUP_MSGT_PROC_SS_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100546 rx_proc_ss_req(req);
Harald Weltebb779392018-06-16 20:21:10 +0200547 break;
548 case OSMO_GSUP_MSGT_PROC_SS_ERROR:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100549 rx_proc_ss_error(req);
Harald Weltebb779392018-06-16 20:21:10 +0200550 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200551 case OSMO_GSUP_MSGT_INSERT_DATA_ERROR:
Harald Weltee72cf552016-04-28 07:18:49 +0200552 case OSMO_GSUP_MSGT_INSERT_DATA_RESULT:
Harald Weltee687be52016-05-03 18:49:27 +0200553 case OSMO_GSUP_MSGT_LOCATION_CANCEL_ERROR:
554 case OSMO_GSUP_MSGT_LOCATION_CANCEL_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100555 lu_rx_gsup(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200556 break;
Oliver Smith783ac812018-12-17 11:34:51 +0100557 case OSMO_GSUP_MSGT_CHECK_IMEI_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100558 rx_check_imei_req(req);
Oliver Smith783ac812018-12-17 11:34:51 +0100559 break;
Mychaela N. Falconia786ec5b2023-09-19 17:15:43 +0000560 case OSMO_GSUP_MSGT_MO_FORWARD_SM_REQUEST:
561 forward_mo_sms(req);
562 break;
Mychaela N. Falconiaf6a303c2023-08-26 01:06:57 +0000563 case OSMO_GSUP_MSGT_MT_FORWARD_SM_REQUEST:
564 forward_mt_sms(req);
565 break;
Mychaela N. Falconiae513c432023-08-28 18:46:41 +0000566 case OSMO_GSUP_MSGT_READY_FOR_SM_REQUEST:
567 rx_ready_for_sm_req(req);
568 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200569 default:
Maxaa0fefd2017-02-16 12:25:22 +0100570 LOGP(DMAIN, LOGL_DEBUG, "Unhandled GSUP message type %s\n",
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100571 osmo_gsup_message_type_name(req->gsup.message_type));
572 osmo_gsup_req_free(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200573 break;
574 }
575 return 0;
576}
577
Harald Welte7a476532022-11-03 11:38:41 +0100578static void print_usage(void)
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100579{
580 printf("Usage: osmo-hlr\n");
581}
582
Harald Welte7a476532022-11-03 11:38:41 +0100583static void print_help(void)
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100584{
585 printf(" -h --help This text.\n");
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100586 printf(" -c --config-file filename The config file to use.\n");
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100587 printf(" -l --database db-name The database to use.\n");
588 printf(" -d option --debug=DRLL:DCC:DMM:DRR:DRSL:DNM Enable debugging.\n");
589 printf(" -D --daemonize Fork the process into a background daemon.\n");
590 printf(" -s --disable-color Do not print ANSI colors in the log\n");
591 printf(" -T --timestamp Prefix every log line with a timestamp.\n");
592 printf(" -e --log-level number Set a global loglevel.\n");
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100593 printf(" -U --db-upgrade Allow HLR database schema upgrades.\n");
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100594 printf(" -C --db-check Quit after opening (and upgrading) the database.\n");
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100595 printf(" -V --version Print the version of OsmoHLR.\n");
Harald Welte2bd1a452021-02-23 17:23:30 +0100596
597 printf("\nVTY reference generation:\n");
598 printf(" --vty-ref-mode MODE VTY reference generation mode (e.g. 'expert').\n");
599 printf(" --vty-ref-xml Generate the VTY reference XML output and exit.\n");
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100600}
601
602static struct {
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100603 const char *config_file;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100604 const char *db_file;
605 bool daemonize;
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100606 bool db_upgrade;
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100607 bool db_check;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100608} cmdline_opts = {
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100609 .config_file = "osmo-hlr.cfg",
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200610 .db_file = NULL,
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100611 .daemonize = false,
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100612 .db_upgrade = false,
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100613};
614
Harald Welte2bd1a452021-02-23 17:23:30 +0100615static void handle_long_options(const char *prog_name, const int long_option)
616{
617 static int vty_ref_mode = VTY_REF_GEN_MODE_DEFAULT;
618
619 switch (long_option) {
620 case 1:
621 vty_ref_mode = get_string_value(vty_ref_gen_mode_names, optarg);
622 if (vty_ref_mode < 0) {
623 fprintf(stderr, "%s: Unknown VTY reference generation "
624 "mode '%s'\n", prog_name, optarg);
625 exit(2);
626 }
627 break;
628 case 2:
629 fprintf(stderr, "Generating the VTY reference in mode '%s' (%s)\n",
630 get_value_string(vty_ref_gen_mode_names, vty_ref_mode),
631 get_value_string(vty_ref_gen_mode_desc, vty_ref_mode));
632 vty_dump_xml_ref_mode(stdout, (enum vty_ref_gen_mode) vty_ref_mode);
633 exit(0);
634 default:
635 fprintf(stderr, "%s: error parsing cmdline options\n", prog_name);
636 exit(2);
637 }
638
639}
640
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100641static void handle_options(int argc, char **argv)
642{
643 while (1) {
644 int option_index = 0, c;
Harald Welte2bd1a452021-02-23 17:23:30 +0100645 static int long_option = 0;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100646 static struct option long_options[] = {
647 {"help", 0, 0, 'h'},
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100648 {"config-file", 1, 0, 'c'},
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100649 {"database", 1, 0, 'l'},
650 {"debug", 1, 0, 'd'},
651 {"daemonize", 0, 0, 'D'},
652 {"disable-color", 0, 0, 's'},
653 {"log-level", 1, 0, 'e'},
654 {"timestamp", 0, 0, 'T'},
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100655 {"db-upgrade", 0, 0, 'U' },
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100656 {"db-check", 0, 0, 'C' },
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100657 {"version", 0, 0, 'V' },
Harald Welte2bd1a452021-02-23 17:23:30 +0100658 {"vty-ref-mode", 1, &long_option, 1},
659 {"vty-ref-xml", 0, &long_option, 2},
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100660 {0, 0, 0, 0}
661 };
662
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100663 c = getopt_long(argc, argv, "hc:l:d:Dse:TUV",
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100664 long_options, &option_index);
665 if (c == -1)
666 break;
667
668 switch (c) {
Harald Welte2bd1a452021-02-23 17:23:30 +0100669 case 0:
670 handle_long_options(argv[0], long_option);
671 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100672 case 'h':
673 print_usage();
674 print_help();
675 exit(0);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100676 case 'c':
677 cmdline_opts.config_file = optarg;
678 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100679 case 'l':
680 cmdline_opts.db_file = optarg;
681 break;
682 case 'd':
683 log_parse_category_mask(osmo_stderr_target, optarg);
684 break;
685 case 'D':
686 cmdline_opts.daemonize = 1;
687 break;
688 case 's':
689 log_set_use_color(osmo_stderr_target, 0);
690 break;
691 case 'e':
692 log_set_log_level(osmo_stderr_target, atoi(optarg));
693 break;
694 case 'T':
695 log_set_print_timestamp(osmo_stderr_target, 1);
696 break;
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100697 case 'U':
698 cmdline_opts.db_upgrade = true;
699 break;
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100700 case 'C':
701 cmdline_opts.db_check = true;
702 break;
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100703 case 'V':
704 print_version(1);
705 exit(0);
706 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100707 default:
708 /* catch unknown options *as well as* missing arguments. */
709 fprintf(stderr, "Error in command line options. Exiting.\n");
710 exit(-1);
711 break;
712 }
713 }
Harald Welte80dc9ae2019-12-03 22:16:39 +0100714
715 if (argc > optind) {
716 fprintf(stderr, "Unsupported positional arguments on command line\n");
717 exit(2);
718 }
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100719}
720
Harald Welteaabae9e2016-04-28 12:48:14 +0200721static void signal_hdlr(int signal)
722{
723 switch (signal) {
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700724 case SIGTERM:
Harald Welteaabae9e2016-04-28 12:48:14 +0200725 case SIGINT:
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700726 LOGP(DMAIN, LOGL_NOTICE, "Terminating due to signal=%d\n", signal);
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700727 quit++;
Harald Welteaabae9e2016-04-28 12:48:14 +0200728 break;
729 case SIGUSR1:
730 LOGP(DMAIN, LOGL_DEBUG, "Talloc Report due to SIGUSR1\n");
Neels Hofmeyrca43e302017-01-30 13:18:23 +0100731 talloc_report_full(hlr_ctx, stderr);
Harald Welteaabae9e2016-04-28 12:48:14 +0200732 break;
733 }
734}
Harald Weltee72cf552016-04-28 07:18:49 +0200735
Max372868b2017-03-02 12:12:00 +0100736static const char vlr_copyright[] =
Harald Weltea854b482023-05-30 17:27:32 +0200737 "Copyright (C) 2016-2023 by Harald Welte, sysmocom s.f.m.c. GmbH\r\n"
Max372868b2017-03-02 12:12:00 +0100738 "License AGPLv3+: GNU AGPL version 3 or later <http://gnu.org/licenses/agpl-3.0.html>\r\n"
739 "This is free software: you are free to change and redistribute it.\r\n"
740 "There is NO WARRANTY, to the extent permitted by law.\r\n";
741
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100742static struct vty_app_info vty_info = {
743 .name = "OsmoHLR",
744 .version = PACKAGE_VERSION,
Max372868b2017-03-02 12:12:00 +0100745 .copyright = vlr_copyright,
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100746 .is_config_node = hlr_vty_is_config_node,
Pau Espin Pedrolce9bc402017-05-31 13:19:22 +0200747 .go_parent_cb = hlr_vty_go_parent,
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100748};
749
Harald Weltee72cf552016-04-28 07:18:49 +0200750int main(int argc, char **argv)
751{
Harald Weltee72cf552016-04-28 07:18:49 +0200752 int rc;
753
Vadim Yanitskiy9fdb8542018-07-30 03:09:22 +0700754 /* Track the use of talloc NULL memory contexts */
755 talloc_enable_null_tracking();
756
Neels Hofmeyrca43e302017-01-30 13:18:23 +0100757 hlr_ctx = talloc_named_const(NULL, 1, "OsmoHLR");
758 msgb_talloc_ctx_init(hlr_ctx, 0);
Harald Welte7ee6e552018-02-14 00:52:05 +0100759 vty_info.tall_ctx = hlr_ctx;
Harald Welteaabae9e2016-04-28 12:48:14 +0200760
Maxd4bebbd2017-03-02 12:00:19 +0100761 g_hlr = talloc_zero(hlr_ctx, struct hlr);
Harald Welte4956ae12018-06-15 22:04:28 +0200762 INIT_LLIST_HEAD(&g_hlr->euse_list);
Mychaela N. Falconiaff7c7ea2023-09-21 01:55:51 +0000763 INIT_LLIST_HEAD(&g_hlr->smsc_list);
Harald Weltebb779392018-06-16 20:21:10 +0200764 INIT_LLIST_HEAD(&g_hlr->ss_sessions);
Harald Weltedab544e2018-07-29 16:14:48 +0200765 INIT_LLIST_HEAD(&g_hlr->ussd_routes);
Mychaela N. Falconiaff7c7ea2023-09-21 01:55:51 +0000766 INIT_LLIST_HEAD(&g_hlr->smsc_routes);
Neels Hofmeyrab7dc402019-11-20 03:35:37 +0100767 INIT_LLIST_HEAD(&g_hlr->mslookup.server.local_site_services);
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200768 g_hlr->db_file_path = talloc_strdup(g_hlr, HLR_DEFAULT_DB_FILE_PATH);
Neels Hofmeyr407925d2019-11-20 03:35:37 +0100769 g_hlr->mslookup.server.mdns.domain_suffix = talloc_strdup(g_hlr, OSMO_MDNS_DOMAIN_SUFFIX_DEFAULT);
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100770 g_hlr->mslookup.client.mdns.domain_suffix = talloc_strdup(g_hlr, OSMO_MDNS_DOMAIN_SUFFIX_DEFAULT);
Alexander Couzens268a33e2020-01-12 00:48:07 +0100771 g_hlr->reject_cause = GMM_CAUSE_IMSI_UNKNOWN;
772 g_hlr->no_proxy_reject_cause = GMM_CAUSE_IMSI_UNKNOWN;
Maxd4bebbd2017-03-02 12:00:19 +0100773
Vadim Yanitskiyd157a562018-12-01 00:03:39 +0700774 /* Init default (call independent) SS session guard timeout value */
775 g_hlr->ncss_guard_timeout = NCSS_GUARD_TIMEOUT_DEFAULT;
776
Pau Espin Pedrol51530312018-04-17 15:07:06 +0200777 rc = osmo_init_logging2(hlr_ctx, &hlr_log_info);
Harald Weltee72cf552016-04-28 07:18:49 +0200778 if (rc < 0) {
779 fprintf(stderr, "Error initializing logging\n");
780 exit(1);
781 }
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100782
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100783 /* Set up llists and objects, startup is happening from VTY commands. */
784 dgsm_init(hlr_ctx);
785
Max20ddfdb2019-02-18 13:12:27 +0100786 osmo_stats_init(hlr_ctx);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100787 vty_init(&vty_info);
Max372868b2017-03-02 12:12:00 +0100788 ctrl_vty_init(hlr_ctx);
Alexander Couzens268a33e2020-01-12 00:48:07 +0100789 hlr_vty_init(hlr_ctx);
Neels Hofmeyr407925d2019-11-20 03:35:37 +0100790 dgsm_vty_init();
Pau Espin Pedroled18fa92020-08-18 12:58:36 +0200791 osmo_cpu_sched_vty_init(hlr_ctx);
Harald Welte2bd1a452021-02-23 17:23:30 +0100792 handle_options(argc, argv);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100793
794 rc = vty_read_config_file(cmdline_opts.config_file, NULL);
795 if (rc < 0) {
796 LOGP(DMAIN, LOGL_FATAL,
797 "Failed to parse the config file: '%s'\n",
798 cmdline_opts.config_file);
799 return rc;
800 }
801
Harald Weltee72cf552016-04-28 07:18:49 +0200802 LOGP(DMAIN, LOGL_NOTICE, "hlr starting\n");
803
804 rc = rand_init();
805 if (rc < 0) {
806 LOGP(DMAIN, LOGL_FATAL, "Error initializing random source\n");
807 exit(1);
808 }
809
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200810 if (cmdline_opts.db_file)
811 osmo_talloc_replace_string(g_hlr, &g_hlr->db_file_path, cmdline_opts.db_file);
812
813 g_hlr->dbc = db_open(hlr_ctx, g_hlr->db_file_path, true, cmdline_opts.db_upgrade);
Maxd4bebbd2017-03-02 12:00:19 +0100814 if (!g_hlr->dbc) {
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200815 LOGP(DMAIN, LOGL_FATAL, "Error opening database %s\n", osmo_quote_str(g_hlr->db_file_path, -1));
Harald Weltee72cf552016-04-28 07:18:49 +0200816 exit(1);
817 }
818
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100819 if (cmdline_opts.db_check) {
820 LOGP(DMAIN, LOGL_NOTICE, "Cmdline option --db-check: Database was opened successfully, quitting.\n");
821 db_close(g_hlr->dbc);
822 log_fini();
823 talloc_free(hlr_ctx);
824 talloc_free(tall_vty_ctx);
825 talloc_disable_null_tracking();
826 exit(0);
827 }
828
829 /* start telnet after reading config for vty_get_bind_addr() */
arehbeine4143232022-12-19 21:28:53 +0100830 rc = telnet_init_default(hlr_ctx, NULL, OSMO_VTY_PORT_HLR);
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100831 if (rc < 0)
832 return rc;
833
834
Neels Hofmeyr84201d32017-07-21 16:00:32 +0200835 g_hlr->gs = osmo_gsup_server_create(hlr_ctx, g_hlr->gsup_bind_addr, OSMO_GSUP_PORT,
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100836 read_cb, g_hlr);
Maxd4bebbd2017-03-02 12:00:19 +0100837 if (!g_hlr->gs) {
Harald Weltee72cf552016-04-28 07:18:49 +0200838 LOGP(DMAIN, LOGL_FATAL, "Error starting GSUP server\n");
839 exit(1);
840 }
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100841 proxy_init(g_hlr->gs);
Harald Weltee72cf552016-04-28 07:18:49 +0200842
Neels Hofmeyr234f9cb2017-10-24 17:23:04 +0200843 g_hlr->ctrl = hlr_controlif_setup(g_hlr);
Max372868b2017-03-02 12:12:00 +0100844
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100845 dgsm_start(hlr_ctx);
846
Harald Welteaabae9e2016-04-28 12:48:14 +0200847 osmo_init_ignore_signals();
848 signal(SIGINT, &signal_hdlr);
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700849 signal(SIGTERM, &signal_hdlr);
Harald Welteaabae9e2016-04-28 12:48:14 +0200850 signal(SIGUSR1, &signal_hdlr);
851
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100852 if (cmdline_opts.daemonize) {
853 rc = osmo_daemonize();
854 if (rc < 0) {
855 perror("Error during daemonize");
856 exit(1);
857 }
858 }
Harald Welteaabae9e2016-04-28 12:48:14 +0200859
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700860 while (!quit)
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100861 osmo_select_main_ctx(0);
862
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100863 dgsm_stop();
Harald Weltee72cf552016-04-28 07:18:49 +0200864
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700865 osmo_gsup_server_destroy(g_hlr->gs);
Maxd4bebbd2017-03-02 12:00:19 +0100866 db_close(g_hlr->dbc);
Harald Weltee72cf552016-04-28 07:18:49 +0200867 log_fini();
868
Vadim Yanitskiy4793a7e2018-07-30 03:04:34 +0700869 /**
870 * Report the heap state of root context, then free,
871 * so both ASAN and Valgrind are happy...
872 */
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700873 talloc_report_full(hlr_ctx, stderr);
Vadim Yanitskiy4793a7e2018-07-30 03:04:34 +0700874 talloc_free(hlr_ctx);
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700875
Vadim Yanitskiy9fdb8542018-07-30 03:09:22 +0700876 /* FIXME: VTY code still uses NULL-context */
877 talloc_free(tall_vty_ctx);
878
879 /**
880 * Report the heap state of NULL context, then free,
881 * so both ASAN and Valgrind are happy...
882 */
883 talloc_report_full(NULL, stderr);
884 talloc_disable_null_tracking();
885
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700886 return 0;
Harald Weltee72cf552016-04-28 07:18:49 +0200887}