Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 1 | /* OsmoHLR SS/USSD implementation */ |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 2 | |
| 3 | /* (C) 2018 Harald Welte <laforge@gnumonks.org> |
| 4 | * |
| 5 | * All Rights Reserved |
| 6 | * |
| 7 | * This program is free software; you can redistribute it and/or modify |
| 8 | * it under the terms of the GNU Affero General Public License as published by |
| 9 | * the Free Software Foundation; either version 3 of the License, or |
| 10 | * (at your option) any later version. |
| 11 | * |
| 12 | * This program is distributed in the hope that it will be useful, |
| 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 15 | * GNU Affero General Public License for more details. |
| 16 | * |
| 17 | * You should have received a copy of the GNU Affero General Public License |
| 18 | * along with this program. If not, see <http://www.gnu.org/licenses/>. |
| 19 | * |
| 20 | */ |
| 21 | |
| 22 | |
| 23 | #include <osmocom/core/talloc.h> |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 24 | #include <osmocom/core/timer.h> |
| 25 | #include <osmocom/gsm/gsup.h> |
| 26 | #include <osmocom/gsm/gsm0480.h> |
| 27 | #include <osmocom/gsm/protocol/gsm_04_80.h> |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 28 | #include <stdint.h> |
| 29 | #include <string.h> |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 30 | #include <errno.h> |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 31 | |
Neels Hofmeyr | 2f75803 | 2019-11-20 00:37:07 +0100 | [diff] [blame] | 32 | #include <osmocom/hlr/hlr.h> |
| 33 | #include <osmocom/hlr/hlr_ussd.h> |
| 34 | #include <osmocom/hlr/gsup_server.h> |
| 35 | #include <osmocom/hlr/gsup_router.h> |
| 36 | #include <osmocom/hlr/logging.h> |
| 37 | #include <osmocom/hlr/db.h> |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 38 | |
| 39 | /*********************************************************************** |
| 40 | * core data structures expressing config from VTY |
| 41 | ***********************************************************************/ |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 42 | |
| 43 | struct hlr_euse *euse_find(struct hlr *hlr, const char *name) |
| 44 | { |
| 45 | struct hlr_euse *euse; |
| 46 | |
| 47 | llist_for_each_entry(euse, &hlr->euse_list, list) { |
| 48 | if (!strcmp(euse->name, name)) |
| 49 | return euse; |
| 50 | } |
| 51 | return NULL; |
| 52 | } |
| 53 | |
| 54 | struct hlr_euse *euse_alloc(struct hlr *hlr, const char *name) |
| 55 | { |
| 56 | struct hlr_euse *euse = euse_find(hlr, name); |
| 57 | if (euse) |
| 58 | return NULL; |
| 59 | |
| 60 | euse = talloc_zero(hlr, struct hlr_euse); |
| 61 | euse->name = talloc_strdup(euse, name); |
| 62 | euse->hlr = hlr; |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 63 | llist_add_tail(&euse->list, &hlr->euse_list); |
| 64 | |
| 65 | return euse; |
| 66 | } |
| 67 | |
| 68 | void euse_del(struct hlr_euse *euse) |
| 69 | { |
| 70 | llist_del(&euse->list); |
| 71 | talloc_free(euse); |
| 72 | } |
| 73 | |
| 74 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 75 | struct hlr_ussd_route *ussd_route_find_prefix(struct hlr *hlr, const char *prefix) |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 76 | { |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 77 | struct hlr_ussd_route *rt; |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 78 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 79 | llist_for_each_entry(rt, &hlr->ussd_routes, list) { |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 80 | if (!strcmp(rt->prefix, prefix)) |
| 81 | return rt; |
| 82 | } |
| 83 | return NULL; |
| 84 | } |
| 85 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 86 | struct hlr_ussd_route *ussd_route_prefix_alloc_int(struct hlr *hlr, const char *prefix, |
| 87 | const struct hlr_iuse *iuse) |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 88 | { |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 89 | struct hlr_ussd_route *rt; |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 90 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 91 | if (ussd_route_find_prefix(hlr, prefix)) |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 92 | return NULL; |
| 93 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 94 | rt = talloc_zero(hlr, struct hlr_ussd_route); |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 95 | rt->prefix = talloc_strdup(rt, prefix); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 96 | rt->u.iuse = iuse; |
| 97 | llist_add_tail(&rt->list, &hlr->ussd_routes); |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 98 | |
| 99 | return rt; |
| 100 | } |
| 101 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 102 | struct hlr_ussd_route *ussd_route_prefix_alloc_ext(struct hlr *hlr, const char *prefix, |
| 103 | struct hlr_euse *euse) |
| 104 | { |
| 105 | struct hlr_ussd_route *rt; |
| 106 | |
| 107 | if (ussd_route_find_prefix(hlr, prefix)) |
| 108 | return NULL; |
| 109 | |
| 110 | rt = talloc_zero(hlr, struct hlr_ussd_route); |
| 111 | rt->prefix = talloc_strdup(rt, prefix); |
| 112 | rt->is_external = true; |
| 113 | rt->u.euse = euse; |
| 114 | llist_add_tail(&rt->list, &hlr->ussd_routes); |
| 115 | |
| 116 | return rt; |
| 117 | } |
| 118 | |
| 119 | void ussd_route_del(struct hlr_ussd_route *rt) |
Harald Welte | 4956ae1 | 2018-06-15 22:04:28 +0200 | [diff] [blame] | 120 | { |
| 121 | llist_del(&rt->list); |
| 122 | talloc_free(rt); |
| 123 | } |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 124 | |
Vadim Yanitskiy | 5800f3a | 2023-06-28 19:07:49 +0700 | [diff] [blame] | 125 | static struct hlr_ussd_route *ussd_route_lookup_for_req(struct hlr *hlr, const struct ss_request *req) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 126 | { |
Vadim Yanitskiy | 5800f3a | 2023-06-28 19:07:49 +0700 | [diff] [blame] | 127 | const uint8_t cgroup = req->ussd_data_dcs >> 4; |
| 128 | const uint8_t lang = req->ussd_data_dcs & 0x0f; |
| 129 | char ussd_code[GSM0480_USSD_7BIT_STRING_LEN]; |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 130 | struct hlr_ussd_route *rt; |
Vadim Yanitskiy | 5800f3a | 2023-06-28 19:07:49 +0700 | [diff] [blame] | 131 | |
| 132 | ussd_code[0] = '\0'; |
| 133 | |
| 134 | /* We support only the Coding Group 0 (GSM 7-bit default alphabeet). In fact, |
| 135 | * the USSD request is usually limited to [*#0-9], so we don't really need to |
| 136 | * support other coding groups and languages. */ |
| 137 | switch (cgroup) { |
| 138 | case 0: |
| 139 | /* The Language is usually set to '1111'B (unspecified), but some UEs |
| 140 | * are known to indicate '0000'B (German). */ |
| 141 | if (lang != 0x0f) { |
| 142 | LOGP(DSS, LOGL_NOTICE, "USSD DataCodingScheme (0x%02x): " |
| 143 | "the Language is usually set to 15 (unspecified), " |
| 144 | "but the request indicates %u - ignoring this\n", |
| 145 | req->ussd_data_dcs, lang); |
| 146 | /* do not abort, attempt to decode as if it was '1111'B */ |
| 147 | } |
| 148 | |
| 149 | gsm_7bit_decode_n_ussd(&ussd_code[0], sizeof(ussd_code), |
| 150 | req->ussd_data, (req->ussd_data_len * 8) / 7); |
| 151 | break; |
| 152 | default: |
| 153 | LOGP(DSS, LOGL_ERROR, "USSD DataCodingScheme (0x%02x): " |
| 154 | "Coding Group %u is not supported, expecting Coding Group 0\n", |
| 155 | req->ussd_data_dcs, cgroup); |
| 156 | return NULL; |
| 157 | } |
| 158 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 159 | llist_for_each_entry(rt, &hlr->ussd_routes, list) { |
| 160 | if (!strncmp(ussd_code, rt->prefix, strlen(rt->prefix))) { |
Vadim Yanitskiy | e6c839e | 2018-08-02 23:59:51 +0700 | [diff] [blame] | 161 | LOGP(DSS, LOGL_DEBUG, "Found %s '%s' (prefix '%s') for USSD " |
| 162 | "Code '%s'\n", rt->is_external ? "EUSE" : "IUSE", |
| 163 | rt->is_external ? rt->u.euse->name : rt->u.iuse->name, |
| 164 | rt->prefix, ussd_code); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 165 | return rt; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 166 | } |
| 167 | } |
| 168 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 169 | LOGP(DSS, LOGL_DEBUG, "Could not find Route for USSD Code '%s'\n", ussd_code); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 170 | return NULL; |
| 171 | } |
| 172 | |
| 173 | /*********************************************************************** |
| 174 | * handling functions for individual GSUP messages |
| 175 | ***********************************************************************/ |
| 176 | |
Harald Welte | 97bfb65 | 2018-07-29 12:28:11 +0200 | [diff] [blame] | 177 | #define LOGPSS(ss, lvl, fmt, args...) \ |
Harald Welte | 95b96d4 | 2018-07-29 12:47:39 +0200 | [diff] [blame] | 178 | LOGP(DSS, lvl, "%s/0x%08x: " fmt, (ss)->imsi, (ss)->session_id, ## args) |
Harald Welte | 97bfb65 | 2018-07-29 12:28:11 +0200 | [diff] [blame] | 179 | |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 180 | struct ss_session { |
| 181 | /* link us to hlr->ss_sessions */ |
| 182 | struct llist_head list; |
| 183 | /* imsi of this session */ |
Neels Hofmeyr | e21b45a | 2019-03-18 21:04:23 +0100 | [diff] [blame] | 184 | char imsi[OSMO_IMSI_BUF_SIZE]; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 185 | /* ID of this session (unique per IMSI) */ |
| 186 | uint32_t session_id; |
| 187 | /* state of the session */ |
| 188 | enum osmo_gsup_session_state state; |
| 189 | /* time-out when we will delete the session */ |
| 190 | struct osmo_timer_list timeout; |
| 191 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 192 | /* is this USSD for an external handler (EUSE): true */ |
| 193 | bool is_external; |
| 194 | union { |
| 195 | /* external USSD Entity responsible for this session */ |
| 196 | struct hlr_euse *euse; |
| 197 | /* internal USSD Entity responsible for this session */ |
| 198 | const struct hlr_iuse *iuse; |
| 199 | } u; |
| 200 | |
Oliver Smith | 95abc2b | 2019-04-04 12:00:24 +0200 | [diff] [blame] | 201 | /* subscriber's vlr_number |
| 202 | * MO USSD: originating MSC's vlr_number |
| 203 | * MT USSD: looked up once per session and cached here */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 204 | struct osmo_ipa_name vlr_name; |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 205 | |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 206 | /* we don't keep a pointer to the osmo_gsup_{route,conn} towards the MSC/VLR here, |
| 207 | * as this might change during inter-VLR hand-over, and we simply look-up the serving MSC/VLR |
| 208 | * every time we receive an USSD component from the EUSE */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 209 | |
| 210 | struct osmo_gsup_req *initial_req_from_ms; |
| 211 | struct osmo_gsup_req *initial_req_from_euse; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 212 | }; |
| 213 | |
| 214 | struct ss_session *ss_session_find(struct hlr *hlr, const char *imsi, uint32_t session_id) |
| 215 | { |
| 216 | struct ss_session *ss; |
| 217 | llist_for_each_entry(ss, &hlr->ss_sessions, list) { |
| 218 | if (!strcmp(ss->imsi, imsi) && ss->session_id == session_id) |
| 219 | return ss; |
| 220 | } |
| 221 | return NULL; |
| 222 | } |
| 223 | |
| 224 | void ss_session_free(struct ss_session *ss) |
| 225 | { |
| 226 | osmo_timer_del(&ss->timeout); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 227 | if (ss->initial_req_from_ms) |
| 228 | osmo_gsup_req_free(ss->initial_req_from_ms); |
| 229 | if (ss->initial_req_from_euse) |
| 230 | osmo_gsup_req_free(ss->initial_req_from_euse); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 231 | llist_del(&ss->list); |
| 232 | talloc_free(ss); |
| 233 | } |
| 234 | |
| 235 | static void ss_session_timeout(void *data) |
| 236 | { |
| 237 | struct ss_session *ss = data; |
| 238 | |
Harald Welte | 97bfb65 | 2018-07-29 12:28:11 +0200 | [diff] [blame] | 239 | LOGPSS(ss, LOGL_NOTICE, "SS Session Timeout, destroying\n"); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 240 | /* FIXME: should we send a ReturnError component to the MS? */ |
| 241 | ss_session_free(ss); |
| 242 | } |
| 243 | |
| 244 | struct ss_session *ss_session_alloc(struct hlr *hlr, const char *imsi, uint32_t session_id) |
| 245 | { |
| 246 | struct ss_session *ss; |
| 247 | |
| 248 | OSMO_ASSERT(!ss_session_find(hlr, imsi, session_id)); |
| 249 | |
| 250 | ss = talloc_zero(hlr, struct ss_session); |
| 251 | OSMO_ASSERT(ss); |
| 252 | |
| 253 | OSMO_STRLCPY_ARRAY(ss->imsi, imsi); |
| 254 | ss->session_id = session_id; |
Vadim Yanitskiy | e6ce52b | 2018-12-01 00:16:44 +0700 | [diff] [blame] | 255 | |
| 256 | /* Schedule self-destruction timer */ |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 257 | osmo_timer_setup(&ss->timeout, ss_session_timeout, ss); |
Vadim Yanitskiy | d157a56 | 2018-12-01 00:03:39 +0700 | [diff] [blame] | 258 | if (g_hlr->ncss_guard_timeout > 0) |
| 259 | osmo_timer_schedule(&ss->timeout, g_hlr->ncss_guard_timeout, 0); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 260 | |
| 261 | llist_add_tail(&ss->list, &hlr->ss_sessions); |
| 262 | return ss; |
| 263 | } |
| 264 | |
| 265 | /*********************************************************************** |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 266 | * handling functions for encoding SS messages + wrapping them in GSUP |
| 267 | ***********************************************************************/ |
| 268 | |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 269 | /* Resolve the target MSC by ss->imsi and send GSUP message. */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 270 | static int ss_gsup_send_to_ms(struct ss_session *ss, struct osmo_gsup_server *gs, struct osmo_gsup_message *gsup) |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 271 | { |
| 272 | struct hlr_subscriber subscr = {}; |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 273 | struct msgb *msg; |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 274 | int rc; |
| 275 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 276 | if (ss->initial_req_from_ms) { |
| 277 | /* Use non-final osmo_gsup_req_respond() to not deallocate the ss->initial_req_from_ms */ |
| 278 | osmo_gsup_req_respond(ss->initial_req_from_ms, gsup, false, false); |
| 279 | return 0; |
| 280 | } |
| 281 | |
| 282 | msg = osmo_gsup_msgb_alloc("GSUP USSD FW"); |
| 283 | rc = osmo_gsup_encode(msg, gsup); |
| 284 | if (rc) { |
| 285 | LOGPSS(ss, LOGL_ERROR, "Failed to encode GSUP message\n"); |
| 286 | msgb_free(msg); |
| 287 | return rc; |
| 288 | } |
| 289 | |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 290 | /* Use vlr_number as looked up by the caller, or look up now. */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 291 | if (!ss->vlr_name.len) { |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 292 | rc = db_subscr_get_by_imsi(g_hlr->dbc, ss->imsi, &subscr); |
| 293 | if (rc < 0) { |
| 294 | LOGPSS(ss, LOGL_ERROR, "Cannot find subscriber, cannot route GSUP message\n"); |
| 295 | msgb_free(msg); |
| 296 | return -EINVAL; |
| 297 | } |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 298 | osmo_ipa_name_set_str(&ss->vlr_name, subscr.vlr_number); |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 299 | } |
| 300 | |
Oliver Smith | 95abc2b | 2019-04-04 12:00:24 +0200 | [diff] [blame] | 301 | /* Check for empty string (all vlr_number strings end in "\0", because otherwise gsup_route_find() fails) */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 302 | if (ss->vlr_name.len <= 1) { |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 303 | LOGPSS(ss, LOGL_ERROR, "Cannot send GSUP message, no VLR number stored for subscriber\n"); |
| 304 | msgb_free(msg); |
| 305 | return -EINVAL; |
| 306 | } |
| 307 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 308 | LOGPSS(ss, LOGL_DEBUG, "Tx SS/USSD to VLR %s\n", osmo_ipa_name_to_str(&ss->vlr_name)); |
| 309 | return osmo_gsup_send_to_ipa_name(gs, &ss->vlr_name, msg); |
Neels Hofmeyr | f1fe94c | 2019-04-02 04:26:55 +0200 | [diff] [blame] | 310 | } |
| 311 | |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 312 | static int ss_tx_to_ms(struct ss_session *ss, enum osmo_gsup_message_type gsup_msg_type, |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 313 | struct msgb *ss_msg) |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 314 | |
| 315 | { |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 316 | struct osmo_gsup_message resp; |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 317 | int rc; |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 318 | |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 319 | resp = (struct osmo_gsup_message) { |
| 320 | .message_type = gsup_msg_type, |
| 321 | .session_id = ss->session_id, |
| 322 | .session_state = ss->state, |
| 323 | }; |
| 324 | |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 325 | OSMO_STRLCPY_ARRAY(resp.imsi, ss->imsi); |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 326 | |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 327 | if (ss_msg) { |
| 328 | resp.ss_info = msgb_data(ss_msg); |
| 329 | resp.ss_info_len = msgb_length(ss_msg); |
| 330 | } |
| 331 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 332 | rc = ss_gsup_send_to_ms(ss, g_hlr->gs, &resp); |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 333 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 334 | msgb_free(ss_msg); |
| 335 | return rc; |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 336 | } |
| 337 | |
| 338 | #if 0 |
| 339 | static int ss_tx_reject(struct ss_session *ss, int invoke_id, uint8_t problem_tag, |
| 340 | uint8_t problem_code) |
| 341 | { |
| 342 | struct msgb *msg = gsm0480_gen_reject(invoke_id, problem_tag, problem_code); |
| 343 | LOGPSS(ss, LOGL_NOTICE, "Tx Reject(%u, 0x%02x, 0x%02x)\n", invoke_id, |
| 344 | problem_tag, problem_code); |
| 345 | OSMO_ASSERT(msg); |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 346 | ss->state = OSMO_GSUP_SESSION_STATE_END; |
| 347 | return ss_tx_to_ms(ss, OSMO_GSUP_MSGT_PROC_SS_RESULT, msg); |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 348 | } |
| 349 | #endif |
| 350 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 351 | static int ss_tx_to_ms_error(struct ss_session *ss, uint8_t invoke_id, uint8_t error_code) |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 352 | { |
| 353 | struct msgb *msg = gsm0480_gen_return_error(invoke_id, error_code); |
| 354 | LOGPSS(ss, LOGL_NOTICE, "Tx ReturnError(%u, 0x%02x)\n", invoke_id, error_code); |
| 355 | OSMO_ASSERT(msg); |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 356 | ss->state = OSMO_GSUP_SESSION_STATE_END; |
| 357 | return ss_tx_to_ms(ss, OSMO_GSUP_MSGT_PROC_SS_RESULT, msg); |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 358 | } |
| 359 | |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 360 | static int ss_tx_to_ms_ussd_7bit(struct ss_session *ss, uint8_t invoke_id, const char *text) |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 361 | { |
| 362 | struct msgb *msg = gsm0480_gen_ussd_resp_7bit(invoke_id, text); |
| 363 | LOGPSS(ss, LOGL_INFO, "Tx USSD '%s'\n", text); |
| 364 | OSMO_ASSERT(msg); |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 365 | return ss_tx_to_ms(ss, OSMO_GSUP_MSGT_PROC_SS_RESULT, msg); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 366 | } |
| 367 | |
| 368 | /*********************************************************************** |
| 369 | * Internal USSD Handlers |
| 370 | ***********************************************************************/ |
| 371 | |
Neels Hofmeyr | 2f75803 | 2019-11-20 00:37:07 +0100 | [diff] [blame] | 372 | #include <osmocom/hlr/db.h> |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 373 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 374 | static int handle_ussd_own_msisdn(struct ss_session *ss, |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 375 | const struct osmo_gsup_message *gsup, const struct ss_request *req) |
| 376 | { |
| 377 | struct hlr_subscriber subscr; |
| 378 | char buf[GSM0480_USSD_7BIT_STRING_LEN+1]; |
| 379 | int rc; |
| 380 | |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 381 | ss->state = OSMO_GSUP_SESSION_STATE_END; |
| 382 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 383 | rc = db_subscr_get_by_imsi(g_hlr->dbc, ss->imsi, &subscr); |
| 384 | switch (rc) { |
| 385 | case 0: |
| 386 | if (strlen(subscr.msisdn) == 0) |
| 387 | snprintf(buf, sizeof(buf), "You have no MSISDN!"); |
| 388 | else |
Vadim Yanitskiy | 3adb33d | 2018-08-03 00:07:54 +0700 | [diff] [blame] | 389 | snprintf(buf, sizeof(buf), "Your extension is %s", subscr.msisdn); |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 390 | ss_tx_to_ms_ussd_7bit(ss, req->invoke_id, buf); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 391 | break; |
| 392 | case -ENOENT: |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 393 | ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_UNKNOWN_SUBSCRIBER); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 394 | break; |
| 395 | case -EIO: |
| 396 | default: |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 397 | ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_SYSTEM_FAILURE); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 398 | break; |
| 399 | } |
| 400 | return 0; |
| 401 | } |
| 402 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 403 | static int handle_ussd_own_imsi(struct ss_session *ss, |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 404 | const struct osmo_gsup_message *gsup, const struct ss_request *req) |
| 405 | { |
| 406 | char buf[GSM0480_USSD_7BIT_STRING_LEN+1]; |
Vadim Yanitskiy | 3adb33d | 2018-08-03 00:07:54 +0700 | [diff] [blame] | 407 | snprintf(buf, sizeof(buf), "Your IMSI is %s", ss->imsi); |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 408 | ss->state = OSMO_GSUP_SESSION_STATE_END; |
| 409 | ss_tx_to_ms_ussd_7bit(ss, req->invoke_id, buf); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 410 | return 0; |
| 411 | } |
| 412 | |
Vadim Yanitskiy | dac855e | 2020-11-17 04:17:46 +0700 | [diff] [blame] | 413 | /* This handler just keeps the session idle unless the guard timer expires. */ |
| 414 | static int handle_ussd_test_idle(struct ss_session *ss, |
| 415 | const struct osmo_gsup_message *gsup, |
| 416 | const struct ss_request *req) |
| 417 | { |
| 418 | char buf[GSM0480_USSD_7BIT_STRING_LEN + 1]; |
| 419 | snprintf(buf, sizeof(buf), "Keeping your session idle, it will expire " |
| 420 | "at most in %u seconds.", g_hlr->ncss_guard_timeout); |
| 421 | ss->state = OSMO_GSUP_SESSION_STATE_CONTINUE; |
| 422 | ss_tx_to_ms_ussd_7bit(ss, req->invoke_id, buf); |
| 423 | return 0; |
| 424 | } |
| 425 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 426 | |
| 427 | static const struct hlr_iuse hlr_iuses[] = { |
| 428 | { |
| 429 | .name = "own-msisdn", |
| 430 | .handle_ussd = handle_ussd_own_msisdn, |
| 431 | }, |
| 432 | { |
| 433 | .name = "own-imsi", |
| 434 | .handle_ussd = handle_ussd_own_imsi, |
| 435 | }, |
Vadim Yanitskiy | dac855e | 2020-11-17 04:17:46 +0700 | [diff] [blame] | 436 | { |
| 437 | .name = "test-idle", |
| 438 | .handle_ussd = handle_ussd_test_idle, |
| 439 | }, |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 440 | }; |
| 441 | |
| 442 | const struct hlr_iuse *iuse_find(const char *name) |
| 443 | { |
| 444 | unsigned int i; |
| 445 | |
| 446 | for (i = 0; i < ARRAY_SIZE(hlr_iuses); i++) { |
| 447 | const struct hlr_iuse *iuse = &hlr_iuses[i]; |
| 448 | if (!strcmp(name, iuse->name)) |
| 449 | return iuse; |
| 450 | } |
| 451 | return NULL; |
| 452 | } |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 453 | |
| 454 | |
| 455 | /*********************************************************************** |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 456 | * handling functions for individual GSUP messages |
| 457 | ***********************************************************************/ |
| 458 | |
| 459 | static bool ss_op_is_ussd(uint8_t opcode) |
| 460 | { |
| 461 | switch (opcode) { |
| 462 | case GSM0480_OP_CODE_PROCESS_USS_DATA: |
| 463 | case GSM0480_OP_CODE_PROCESS_USS_REQ: |
| 464 | case GSM0480_OP_CODE_USS_REQUEST: |
| 465 | case GSM0480_OP_CODE_USS_NOTIFY: |
| 466 | return true; |
| 467 | default: |
| 468 | return false; |
| 469 | } |
| 470 | } |
| 471 | |
| 472 | /* is this GSUP connection an EUSE (true) or not (false)? */ |
Neels Hofmeyr | c79bcde | 2019-12-04 01:04:32 +0100 | [diff] [blame] | 473 | static bool peer_name_is_euse(const struct osmo_cni_peer_id *peer_name) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 474 | { |
Neels Hofmeyr | c79bcde | 2019-12-04 01:04:32 +0100 | [diff] [blame] | 475 | if (peer_name->type != OSMO_CNI_PEER_ID_IPA_NAME) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 476 | return false; |
Neels Hofmeyr | c79bcde | 2019-12-04 01:04:32 +0100 | [diff] [blame] | 477 | if (peer_name->ipa_name.len <= 5) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 478 | return false; |
Neels Hofmeyr | c79bcde | 2019-12-04 01:04:32 +0100 | [diff] [blame] | 479 | return strncmp((char *)(peer_name->ipa_name.val), "EUSE-", 5) == 0; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 480 | } |
| 481 | |
Neels Hofmeyr | c79bcde | 2019-12-04 01:04:32 +0100 | [diff] [blame] | 482 | static struct hlr_euse *euse_by_name(const struct osmo_cni_peer_id *peer_name) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 483 | { |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 484 | if (!peer_name_is_euse(peer_name)) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 485 | return NULL; |
| 486 | |
Neels Hofmeyr | c79bcde | 2019-12-04 01:04:32 +0100 | [diff] [blame] | 487 | /* above peer_name_is_euse() ensures this: */ |
| 488 | OSMO_ASSERT(peer_name->type == OSMO_CNI_PEER_ID_IPA_NAME); |
| 489 | |
| 490 | return euse_find(g_hlr, (const char*)(peer_name->ipa_name.val)+5); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 491 | } |
| 492 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 493 | static int handle_ss(struct ss_session *ss, bool is_euse_originated, const struct osmo_gsup_message *gsup, |
| 494 | const struct ss_request *req) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 495 | { |
| 496 | uint8_t comp_type = gsup->ss_info[0]; |
| 497 | |
Harald Welte | 7f32f5f | 2018-07-29 12:43:49 +0200 | [diff] [blame] | 498 | LOGPSS(ss, LOGL_INFO, "SS CompType=%s, OpCode=%s\n", |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 499 | gsm0480_comp_type_name(comp_type), gsm0480_op_code_name(req->opcode)); |
Vadim Yanitskiy | 4a4bdcd | 2018-10-12 21:44:07 +0200 | [diff] [blame] | 500 | |
| 501 | /** |
| 502 | * FIXME: As we don't store any SS related information |
| 503 | * (e.g. call forwarding preferences) in the database, |
| 504 | * we don't handle "structured" SS requests at all. |
| 505 | */ |
| 506 | LOGPSS(ss, LOGL_NOTICE, "Structured SS requests are not supported, rejecting...\n"); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 507 | ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_FACILITY_NOT_SUPPORTED); |
Vadim Yanitskiy | 4a4bdcd | 2018-10-12 21:44:07 +0200 | [diff] [blame] | 508 | return -ENOTSUP; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 509 | } |
| 510 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 511 | /* Handle a USSD GSUP message for a given SS Session received from VLR or EUSE */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 512 | static int handle_ussd(struct ss_session *ss, bool is_euse_originated, const struct osmo_gsup_message *gsup, |
| 513 | const struct ss_request *req) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 514 | { |
| 515 | uint8_t comp_type = gsup->ss_info[0]; |
| 516 | struct msgb *msg_out; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 517 | |
Harald Welte | 7f32f5f | 2018-07-29 12:43:49 +0200 | [diff] [blame] | 518 | LOGPSS(ss, LOGL_INFO, "USSD CompType=%s, OpCode=%s '%s'\n", |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 519 | gsm0480_comp_type_name(comp_type), gsm0480_op_code_name(req->opcode), |
| 520 | req->ussd_text); |
| 521 | |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 522 | if ((ss->is_external && !ss->u.euse) || !ss->u.iuse) { |
Harald Welte | 7f32f5f | 2018-07-29 12:43:49 +0200 | [diff] [blame] | 523 | LOGPSS(ss, LOGL_NOTICE, "USSD for unknown code '%s'\n", req->ussd_text); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 524 | ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_SS_NOT_AVAILABLE); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 525 | return 0; |
| 526 | } |
| 527 | |
| 528 | if (is_euse_originated) { |
| 529 | /* Received from EUSE, Forward to VLR */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 530 | /* Need a non-const osmo_gsup_message, because sending might modify some (routing related?) parts. */ |
| 531 | struct osmo_gsup_message forward = *gsup; |
| 532 | ss_gsup_send_to_ms(ss, g_hlr->gs, &forward); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 533 | } else { |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 534 | /* Received from VLR (MS) */ |
| 535 | if (ss->is_external) { |
| 536 | /* Forward to EUSE */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 537 | struct osmo_ipa_name euse_name; |
| 538 | struct osmo_gsup_conn *conn; |
| 539 | osmo_ipa_name_set_str(&euse_name, "EUSE-%s", ss->u.euse->name); |
| 540 | conn = gsup_route_find_by_ipa_name(g_hlr->gs, &euse_name); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 541 | if (!conn) { |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 542 | LOGPSS(ss, LOGL_ERROR, "Cannot find conn for EUSE %s\n", |
| 543 | osmo_ipa_name_to_str(&euse_name)); |
| 544 | ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_SYSTEM_FAILURE); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 545 | } else { |
Neels Hofmeyr | a7d0f87 | 2019-10-30 02:08:28 +0100 | [diff] [blame] | 546 | msg_out = osmo_gsup_msgb_alloc("GSUP USSD FW"); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 547 | osmo_gsup_encode(msg_out, gsup); |
| 548 | osmo_gsup_conn_send(conn, msg_out); |
| 549 | } |
Harald Welte | 7266731 | 2018-07-29 12:38:09 +0200 | [diff] [blame] | 550 | } else { |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 551 | /* Handle internally */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 552 | ss->u.iuse->handle_ussd(ss, gsup, req); |
Vadim Yanitskiy | 6a6c7f8 | 2020-11-17 04:02:11 +0700 | [diff] [blame] | 553 | /* Release session if the handler has changed its state to END */ |
| 554 | if (ss->state == OSMO_GSUP_SESSION_STATE_END) |
| 555 | ss_session_free(ss); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 556 | } |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 557 | } |
| 558 | |
| 559 | return 0; |
| 560 | } |
| 561 | |
| 562 | |
| 563 | /* this function is called for any SS_REQ/SS_RESP messages from both the MSC/VLR side as well |
| 564 | * as from the EUSE side */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 565 | void rx_proc_ss_req(struct osmo_gsup_req *gsup_req) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 566 | { |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 567 | struct hlr *hlr = g_hlr; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 568 | struct ss_session *ss; |
| 569 | struct ss_request req = {0}; |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 570 | const struct osmo_gsup_message *gsup = &gsup_req->gsup; |
| 571 | /* Remember whether this function should free the incoming gsup_req: if it is placed as ss->initial_req_from_*, |
| 572 | * do not free it here. If not, free it here. */ |
| 573 | struct osmo_gsup_req *free_gsup_req = gsup_req; |
| 574 | bool is_euse_originated = peer_name_is_euse(&gsup_req->source_name); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 575 | |
Harald Welte | 95b96d4 | 2018-07-29 12:47:39 +0200 | [diff] [blame] | 576 | LOGP(DSS, LOGL_DEBUG, "%s/0x%08x: Process SS (%s)\n", gsup->imsi, gsup->session_id, |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 577 | osmo_gsup_session_state_name(gsup->session_state)); |
| 578 | |
Neels Hofmeyr | c79bcde | 2019-12-04 01:04:32 +0100 | [diff] [blame] | 579 | if (gsup_req->source_name.type != OSMO_CNI_PEER_ID_IPA_NAME) { |
| 580 | LOGP(DSS, LOGL_ERROR, "%s/0x%082x: Unable to process SS request: Unsupported GSUP peer id type%s\n", |
| 581 | gsup->imsi, gsup->session_id, |
| 582 | osmo_cni_peer_id_type_name(gsup_req->source_name.type)); |
| 583 | osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_PROTO_ERR_UNSPEC, "error processing SS request"); |
| 584 | return; |
| 585 | } |
| 586 | |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 587 | /* decode and find out what kind of SS message it is */ |
| 588 | if (gsup->ss_info && gsup->ss_info_len) { |
| 589 | if (gsm0480_parse_facility_ie(gsup->ss_info, gsup->ss_info_len, &req)) { |
Harald Welte | 95b96d4 | 2018-07-29 12:47:39 +0200 | [diff] [blame] | 590 | LOGP(DSS, LOGL_ERROR, "%s/0x%082x: Unable to parse SS request: %s\n", |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 591 | gsup->imsi, gsup->session_id, |
| 592 | osmo_hexdump(gsup->ss_info, gsup->ss_info_len)); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 593 | osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_INV_MAND_INFO, "error parsing SS request"); |
| 594 | return; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 595 | } |
Vadim Yanitskiy | 937f583 | 2019-07-24 19:14:32 +0700 | [diff] [blame] | 596 | } else if (gsup->session_state != OSMO_GSUP_SESSION_STATE_END) { |
| 597 | LOGP(DSS, LOGL_ERROR, "%s/0x%082x: Missing SS payload for '%s'\n", |
| 598 | gsup->imsi, gsup->session_id, |
| 599 | osmo_gsup_session_state_name(gsup->session_state)); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 600 | osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_INV_MAND_INFO, "missing SS payload"); |
| 601 | return; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 602 | } |
| 603 | |
| 604 | switch (gsup->session_state) { |
| 605 | case OSMO_GSUP_SESSION_STATE_BEGIN: |
| 606 | /* Check for overlapping Session ID usage */ |
| 607 | if (ss_session_find(hlr, gsup->imsi, gsup->session_id)) { |
Harald Welte | 95b96d4 | 2018-07-29 12:47:39 +0200 | [diff] [blame] | 608 | LOGP(DSS, LOGL_ERROR, "%s/0x%08x: BEGIN with non-unique session ID!\n", |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 609 | gsup->imsi, gsup->session_id); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 610 | osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_INV_MAND_INFO, "BEGIN with non-unique session ID"); |
| 611 | return; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 612 | } |
| 613 | ss = ss_session_alloc(hlr, gsup->imsi, gsup->session_id); |
| 614 | if (!ss) { |
Harald Welte | 95b96d4 | 2018-07-29 12:47:39 +0200 | [diff] [blame] | 615 | LOGP(DSS, LOGL_ERROR, "%s/0x%08x: Unable to allocate SS session\n", |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 616 | gsup->imsi, gsup->session_id); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 617 | osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_NET_FAIL, "Unable to allocate SS session"); |
| 618 | return; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 619 | } |
Oliver Smith | 95abc2b | 2019-04-04 12:00:24 +0200 | [diff] [blame] | 620 | /* Get IPA name from VLR conn and save as ss->vlr_number */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 621 | if (!is_euse_originated) { |
| 622 | ss->initial_req_from_ms = gsup_req; |
| 623 | free_gsup_req = NULL; |
Neels Hofmeyr | c79bcde | 2019-12-04 01:04:32 +0100 | [diff] [blame] | 624 | OSMO_ASSERT(gsup_req->source_name.type == OSMO_CNI_PEER_ID_IPA_NAME); /* checked above */ |
| 625 | ss->vlr_name = gsup_req->source_name.ipa_name; |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 626 | } else { |
| 627 | ss->initial_req_from_euse = gsup_req; |
| 628 | free_gsup_req = NULL; |
Oliver Smith | 95abc2b | 2019-04-04 12:00:24 +0200 | [diff] [blame] | 629 | } |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 630 | if (ss_op_is_ussd(req.opcode)) { |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 631 | if (is_euse_originated) { |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 632 | /* EUSE->VLR: MT USSD. EUSE is known ('conn'), VLR is to be resolved */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 633 | ss->u.euse = euse_by_name(&gsup_req->source_name); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 634 | } else { |
| 635 | /* VLR->EUSE: MO USSD. VLR is known ('conn'), EUSE is to be resolved */ |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 636 | struct hlr_ussd_route *rt; |
Vadim Yanitskiy | 5800f3a | 2023-06-28 19:07:49 +0700 | [diff] [blame] | 637 | rt = ussd_route_lookup_for_req(hlr, &req); |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 638 | if (rt) { |
| 639 | if (rt->is_external) { |
| 640 | ss->is_external = true; |
| 641 | ss->u.euse = rt->u.euse; |
| 642 | } else if (rt) { |
| 643 | ss->is_external = false; |
| 644 | ss->u.iuse = rt->u.iuse; |
| 645 | } |
Harald Welte | 1eb9869 | 2018-08-08 08:57:26 +0200 | [diff] [blame] | 646 | } else { |
| 647 | if (hlr->euse_default) { |
| 648 | ss->is_external = true; |
| 649 | ss->u.euse = hlr->euse_default; |
| 650 | } |
Harald Welte | dab544e | 2018-07-29 16:14:48 +0200 | [diff] [blame] | 651 | } |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 652 | } |
| 653 | /* dispatch unstructured SS to routing */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 654 | handle_ussd(ss, is_euse_originated, &gsup_req->gsup, &req); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 655 | } else { |
| 656 | /* dispatch non-call SS to internal code */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 657 | handle_ss(ss, is_euse_originated, &gsup_req->gsup, &req); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 658 | } |
| 659 | break; |
| 660 | case OSMO_GSUP_SESSION_STATE_CONTINUE: |
| 661 | ss = ss_session_find(hlr, gsup->imsi, gsup->session_id); |
| 662 | if (!ss) { |
Harald Welte | 95b96d4 | 2018-07-29 12:47:39 +0200 | [diff] [blame] | 663 | LOGP(DSS, LOGL_ERROR, "%s/0x%08x: CONTINUE for unknown SS session\n", |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 664 | gsup->imsi, gsup->session_id); |
Vadim Yanitskiy | f4223f5 | 2023-07-05 00:24:04 +0700 | [diff] [blame] | 665 | osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_MSGT_INCOMP_P_STATE, |
| 666 | "CONTINUE for unknown SS session"); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 667 | return; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 668 | } |
Vadim Yanitskiy | e6ce52b | 2018-12-01 00:16:44 +0700 | [diff] [blame] | 669 | |
| 670 | /* Reschedule self-destruction timer */ |
| 671 | if (g_hlr->ncss_guard_timeout > 0) |
| 672 | osmo_timer_schedule(&ss->timeout, g_hlr->ncss_guard_timeout, 0); |
| 673 | |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 674 | if (ss_op_is_ussd(req.opcode)) { |
| 675 | /* dispatch unstructured SS to routing */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 676 | handle_ussd(ss, is_euse_originated, &gsup_req->gsup, &req); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 677 | } else { |
| 678 | /* dispatch non-call SS to internal code */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 679 | handle_ss(ss, is_euse_originated, &gsup_req->gsup, &req); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 680 | } |
| 681 | break; |
| 682 | case OSMO_GSUP_SESSION_STATE_END: |
| 683 | ss = ss_session_find(hlr, gsup->imsi, gsup->session_id); |
| 684 | if (!ss) { |
Harald Welte | 95b96d4 | 2018-07-29 12:47:39 +0200 | [diff] [blame] | 685 | LOGP(DSS, LOGL_ERROR, "%s/0x%08x: END for unknown SS session\n", |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 686 | gsup->imsi, gsup->session_id); |
Vadim Yanitskiy | f4223f5 | 2023-07-05 00:24:04 +0700 | [diff] [blame] | 687 | osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_MSGT_INCOMP_P_STATE, |
| 688 | "END for unknown SS session"); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 689 | return; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 690 | } |
Vadim Yanitskiy | 937f583 | 2019-07-24 19:14:32 +0700 | [diff] [blame] | 691 | |
| 692 | /* SS payload is optional for END */ |
| 693 | if (gsup->ss_info && gsup->ss_info_len) { |
| 694 | if (ss_op_is_ussd(req.opcode)) { |
| 695 | /* dispatch unstructured SS to routing */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 696 | handle_ussd(ss, is_euse_originated, &gsup_req->gsup, &req); |
Vadim Yanitskiy | 937f583 | 2019-07-24 19:14:32 +0700 | [diff] [blame] | 697 | } else { |
| 698 | /* dispatch non-call SS to internal code */ |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 699 | handle_ss(ss, is_euse_originated, &gsup_req->gsup, &req); |
Vadim Yanitskiy | 937f583 | 2019-07-24 19:14:32 +0700 | [diff] [blame] | 700 | } |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 701 | } |
Vadim Yanitskiy | 937f583 | 2019-07-24 19:14:32 +0700 | [diff] [blame] | 702 | |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 703 | ss_session_free(ss); |
| 704 | break; |
| 705 | default: |
Harald Welte | 95b96d4 | 2018-07-29 12:47:39 +0200 | [diff] [blame] | 706 | LOGP(DSS, LOGL_ERROR, "%s/0x%08x: Unknown SS State %d\n", gsup->imsi, |
Harald Welte | 7f32f5f | 2018-07-29 12:43:49 +0200 | [diff] [blame] | 707 | gsup->session_id, gsup->session_state); |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 708 | break; |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 709 | } |
| 710 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 711 | if (free_gsup_req) |
| 712 | osmo_gsup_req_free(free_gsup_req); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 713 | } |
| 714 | |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 715 | void rx_proc_ss_error(struct osmo_gsup_req *req) |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 716 | { |
Neels Hofmeyr | ad868e2 | 2019-11-20 02:36:45 +0100 | [diff] [blame] | 717 | LOGP(DSS, LOGL_NOTICE, "%s/0x%08x: Process SS ERROR (%s)\n", req->gsup.imsi, req->gsup.session_id, |
| 718 | osmo_gsup_session_state_name(req->gsup.session_state)); |
Vadim Yanitskiy | f4223f5 | 2023-07-05 00:24:04 +0700 | [diff] [blame] | 719 | osmo_gsup_req_free(req); |
Harald Welte | bb77939 | 2018-06-16 20:21:10 +0200 | [diff] [blame] | 720 | } |