blob: 8183d9b93490a85af7fd901cc9dbdb7ac32ed7c7 [file] [log] [blame]
Harald Welte936f6722016-05-03 18:51:18 +02001/* (C) 2016 by Harald Welte <laforge@gnumonks.org>
2 *
3 * All Rights Reserved
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU Affero General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU Affero General Public License for more details.
14 *
15 * You should have received a copy of the GNU Affero General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
17 *
18 */
19
Harald Welteaabae9e2016-04-28 12:48:14 +020020#include <signal.h>
Harald Weltee687be52016-05-03 18:49:27 +020021#include <errno.h>
Maxea8b0d42017-02-14 16:53:04 +010022#include <stdbool.h>
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +010023#include <getopt.h>
24
Harald Weltee72cf552016-04-28 07:18:49 +020025#include <osmocom/core/msgb.h>
Max20ddfdb2019-02-18 13:12:27 +010026#include <osmocom/core/stats.h>
Harald Weltee72cf552016-04-28 07:18:49 +020027#include <osmocom/core/logging.h>
28#include <osmocom/core/application.h>
29#include <osmocom/gsm/gsup.h>
Neels Hofmeyr7685a782017-01-30 23:30:26 +010030#include <osmocom/vty/vty.h>
31#include <osmocom/vty/command.h>
32#include <osmocom/vty/telnet_interface.h>
33#include <osmocom/vty/ports.h>
Pau Espin Pedroled18fa92020-08-18 12:58:36 +020034#include <osmocom/vty/cpu_sched_vty.h>
Max372868b2017-03-02 12:12:00 +010035#include <osmocom/ctrl/control_vty.h>
Neels Hofmeyr5aeb4382018-05-04 16:02:44 +020036#include <osmocom/gsm/apn.h>
Oliver Smith783ac812018-12-17 11:34:51 +010037#include <osmocom/gsm/gsm48_ie.h>
Oliver Smithc7f17872019-03-04 15:10:44 +010038#include <osmocom/gsm/gsm_utils.h>
Neels Hofmeyrad868e22019-11-20 02:36:45 +010039#include <osmocom/gsm/gsm23003.h>
Neels Hofmeyr76328bd2019-11-20 03:35:37 +010040#include <osmocom/mslookup/mslookup_client.h>
Harald Weltee72cf552016-04-28 07:18:49 +020041
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +010042#include <osmocom/gsupclient/cni_peer_id.h>
Neels Hofmeyr2f758032019-11-20 00:37:07 +010043#include <osmocom/hlr/db.h>
44#include <osmocom/hlr/hlr.h>
45#include <osmocom/hlr/ctrl.h>
46#include <osmocom/hlr/logging.h>
47#include <osmocom/hlr/gsup_server.h>
48#include <osmocom/hlr/gsup_router.h>
49#include <osmocom/hlr/rand.h>
Neels Hofmeyr2f758032019-11-20 00:37:07 +010050#include <osmocom/hlr/hlr_vty.h>
51#include <osmocom/hlr/hlr_ussd.h>
Neels Hofmeyr76328bd2019-11-20 03:35:37 +010052#include <osmocom/hlr/dgsm.h>
53#include <osmocom/hlr/proxy.h>
Neels Hofmeyrad868e22019-11-20 02:36:45 +010054#include <osmocom/hlr/lu_fsm.h>
Neels Hofmeyr407925d2019-11-20 03:35:37 +010055#include <osmocom/mslookup/mdns.h>
Harald Weltee72cf552016-04-28 07:18:49 +020056
Harald Welted5807b82018-07-29 12:27:41 +020057struct hlr *g_hlr;
Oliver Smithc5044cf2019-02-26 16:32:57 +010058static void *hlr_ctx = NULL;
Vadim Yanitskiy527d9342018-07-30 02:42:25 +070059static int quit = 0;
Harald Weltee72cf552016-04-28 07:18:49 +020060
Neels Hofmeyrad868e22019-11-20 02:36:45 +010061struct osmo_tdef g_hlr_tdefs[] = {
62 /* 4222 is also the OSMO_GSUP_PORT */
63 { .T = -4222, .default_val = 30, .desc = "GSUP Update Location timeout" },
64 {}
65};
66
Stefan Sperlingf1622522018-04-09 11:39:16 +020067/* Trigger 'Insert Subscriber Data' messages to all connected GSUP clients.
68 *
Stefan Sperlingf1622522018-04-09 11:39:16 +020069 * \param[in] subscr A subscriber we have new data to send for.
70 */
71void
72osmo_hlr_subscriber_update_notify(struct hlr_subscriber *subscr)
73{
74 struct osmo_gsup_conn *co;
75
Neels Hofmeyre66e5252018-09-28 02:59:19 +020076 if (g_hlr->gs == NULL) {
77 LOGP(DLGSUP, LOGL_DEBUG,
78 "IMSI %s: NOT Notifying peers of subscriber data change,"
79 " there is no GSUP server\n",
80 subscr->imsi);
Stefan Sperlingf1622522018-04-09 11:39:16 +020081 return;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020082 }
Stefan Sperlingf1622522018-04-09 11:39:16 +020083
Neels Hofmeyrad868e22019-11-20 02:36:45 +010084 /* FIXME: send only to current vlr_number and sgsn_number */
85
Stefan Sperlingf1622522018-04-09 11:39:16 +020086 llist_for_each_entry(co, &g_hlr->gs->clients, list) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020087 struct osmo_gsup_message gsup = { };
88 uint8_t msisdn_enc[OSMO_GSUP_MAX_CALLED_PARTY_BCD_LEN];
89 uint8_t apn[APN_MAXLEN];
90 struct msgb *msg_out;
Stefan Sperling93c5b102018-04-10 19:26:14 +020091 uint8_t *peer;
92 int peer_len;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020093 size_t peer_strlen;
94 const char *peer_compare;
Stefan Sperlingf83432c2018-05-03 14:26:59 +020095 enum osmo_gsup_cn_domain cn_domain;
Stefan Sperling93c5b102018-04-10 19:26:14 +020096
Neels Hofmeyre66e5252018-09-28 02:59:19 +020097 if (co->supports_ps) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +020098 cn_domain = OSMO_GSUP_CN_DOMAIN_PS;
Neels Hofmeyre66e5252018-09-28 02:59:19 +020099 peer_compare = subscr->sgsn_number;
100 } else if (co->supports_cs) {
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200101 cn_domain = OSMO_GSUP_CN_DOMAIN_CS;
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200102 peer_compare = subscr->vlr_number;
103 } else {
104 /* We have not yet received a location update from this GSUP client.*/
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200105 continue;
106 }
107
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200108 peer_len = osmo_gsup_conn_ccm_get(co, &peer, IPAC_IDTAG_SERNR);
109 if (peer_len < 0) {
110 LOGP(DLGSUP, LOGL_ERROR,
111 "IMSI='%s': cannot get peer name for connection %s:%u\n", subscr->imsi,
112 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
113 co && co->conn && co->conn->server? co->conn->server->port : 0);
114 continue;
115 }
116
117 peer_strlen = strnlen((const char*)peer, peer_len);
118 if (strlen(peer_compare) != peer_strlen || strncmp(peer_compare, (const char *)peer, peer_len)) {
119 /* Mismatch. The subscriber is not subscribed with this GSUP client. */
120 /* I hope peer is always nul terminated... */
121 if (peer_strlen < peer_len)
122 LOGP(DLGSUP, LOGL_DEBUG,
123 "IMSI %s: subscriber change: skipping %s peer %s\n",
124 subscr->imsi, cn_domain == OSMO_GSUP_CN_DOMAIN_PS ? "PS" : "CS",
125 osmo_quote_str((char*)peer, -1));
126 continue;
127 }
128
129 LOGP(DLGSUP, LOGL_DEBUG,
130 "IMSI %s: subscriber change: notifying %s peer %s\n",
131 subscr->imsi, cn_domain == OSMO_GSUP_CN_DOMAIN_PS ? "PS" : "CS",
132 osmo_quote_str(peer_compare, -1));
133
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200134 if (osmo_gsup_create_insert_subscriber_data_msg(&gsup, subscr->imsi, subscr->msisdn, msisdn_enc,
135 sizeof(msisdn_enc), apn, sizeof(apn), cn_domain) != 0) {
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200136 LOGP(DLGSUP, LOGL_ERROR,
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200137 "IMSI='%s': Cannot notify GSUP client; could not create gsup message "
Stefan Sperling93c5b102018-04-10 19:26:14 +0200138 "for %s:%u\n", subscr->imsi,
Stefan Sperlingf1622522018-04-09 11:39:16 +0200139 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
140 co && co->conn && co->conn->server? co->conn->server->port : 0);
141 continue;
142 }
Stefan Sperling93c5b102018-04-10 19:26:14 +0200143
Stefan Sperling93c5b102018-04-10 19:26:14 +0200144 /* Send ISD to MSC/SGSN */
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100145 msg_out = osmo_gsup_msgb_alloc("GSUP ISD UPDATE");
Stefan Sperling93c5b102018-04-10 19:26:14 +0200146 if (msg_out == NULL) {
Neels Hofmeyre66e5252018-09-28 02:59:19 +0200147 LOGP(DLGSUP, LOGL_ERROR,
Stefan Sperling93c5b102018-04-10 19:26:14 +0200148 "IMSI='%s': Cannot notify GSUP client; could not allocate msg buffer "
149 "for %s:%u\n", subscr->imsi,
150 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
151 co && co->conn && co->conn->server? co->conn->server->port : 0);
152 continue;
153 }
Stefan Sperling93c5b102018-04-10 19:26:14 +0200154 osmo_gsup_encode(msg_out, &gsup);
Stefan Sperlingf83432c2018-05-03 14:26:59 +0200155
Stefan Sperling93c5b102018-04-10 19:26:14 +0200156 if (osmo_gsup_addr_send(g_hlr->gs, peer, peer_len, msg_out) < 0) {
157 LOGP(DMAIN, LOGL_ERROR,
158 "IMSI='%s': Cannot notify GSUP client; send operation failed "
159 "for %s:%u\n", subscr->imsi,
160 co && co->conn && co->conn->server? co->conn->server->addr : "unset",
161 co && co->conn && co->conn->server? co->conn->server->port : 0);
162 continue;
163 }
Stefan Sperlingf1622522018-04-09 11:39:16 +0200164 }
165}
166
Oliver Smithc7f17872019-03-04 15:10:44 +0100167static int generate_new_msisdn(char *msisdn, const char *imsi, unsigned int len)
168{
169 int i, j, rc;
170 uint8_t rand_buf[GSM23003_MSISDN_MAX_DIGITS];
171
172 OSMO_ASSERT(len <= sizeof(rand_buf));
173
174 /* Generate a random unique MSISDN (with retry) */
175 for (i = 0; i < 10; i++) {
176 /* Get a random number (with retry) */
177 for (j = 0; j < 10; j++) {
178 rc = osmo_get_rand_id(rand_buf, len);
179 if (!rc)
180 break;
181 }
182 if (rc) {
183 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to generate new MSISDN, random number generator"
184 " failed (rc=%d)\n", imsi, rc);
185 return rc;
186 }
187
188 /* Shift 0x00 ... 0xff range to 30 ... 39 (ASCII numbers) */
189 for (j = 0; j < len; j++)
190 msisdn[j] = 48 + (rand_buf[j] % 10);
191 msisdn[j] = '\0';
192
193 /* Ensure there is no subscriber with such MSISDN */
194 if (db_subscr_exists_by_msisdn(g_hlr->dbc, msisdn) == -ENOENT)
195 return 0;
196 }
197
198 /* Failure */
199 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to generate a new MSISDN, consider increasing "
200 "the length for the automatically assigned MSISDNs "
201 "(see 'subscriber-create-on-demand' command)\n", imsi);
202 return -1;
203}
204
205static int subscr_create_on_demand(const char *imsi)
206{
207 char msisdn[GSM23003_MSISDN_MAX_DIGITS + 1];
208 int rc;
209 unsigned int rand_msisdn_len = g_hlr->subscr_create_on_demand_rand_msisdn_len;
210
211 if (!g_hlr->subscr_create_on_demand)
212 return -1;
213 if (db_subscr_exists_by_imsi(g_hlr->dbc, imsi) == 0)
214 return -1;
215 if (rand_msisdn_len && generate_new_msisdn(msisdn, imsi, rand_msisdn_len) != 0)
216 return -1;
217
218 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': Creating subscriber on demand\n", imsi);
219 rc = db_subscr_create(g_hlr->dbc, imsi, g_hlr->subscr_create_on_demand_flags);
220 if (rc) {
221 LOGP(DMAIN, LOGL_ERROR, "Failed to create subscriber on demand (rc=%d): IMSI='%s'\n", rc, imsi);
222 return rc;
223 }
224
225 if (!rand_msisdn_len)
226 return 0;
227
228 /* Update MSISDN of the new (just allocated) subscriber */
229 rc = db_subscr_update_msisdn_by_imsi(g_hlr->dbc, imsi, msisdn);
230 if (rc) {
231 LOGP(DMAIN, LOGL_ERROR, "IMSI='%s': Failed to assign MSISDN='%s' (rc=%d)\n", imsi, msisdn, rc);
232 return rc;
233 }
234 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': Successfully assigned MSISDN='%s'\n", imsi, msisdn);
235
236 return 0;
237}
238
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100239/*! Update nam_cs/nam_ps in the db and trigger notifications to GSUP clients.
240 * \param[in,out] hlr Global hlr context.
241 * \param[in] subscr Subscriber from a fresh db_subscr_get_by_*() call.
242 * \param[in] nam_val True to enable CS/PS, false to disable.
243 * \param[in] is_ps True to enable/disable PS, false for CS.
244 * \returns 0 on success, ENOEXEC if there is no need to change, a negative
245 * value on error.
246 */
247int hlr_subscr_nam(struct hlr *hlr, struct hlr_subscriber *subscr, bool nam_val, bool is_ps)
248{
249 int rc;
250 bool is_val = is_ps? subscr->nam_ps : subscr->nam_cs;
251 struct osmo_ipa_name vlr_name;
252 struct osmo_gsup_message gsup_del_data = {
253 .message_type = OSMO_GSUP_MSGT_DELETE_DATA_REQUEST,
254 };
255 OSMO_STRLCPY_ARRAY(gsup_del_data.imsi, subscr->imsi);
256
257 if (is_val == nam_val) {
258 LOGP(DAUC, LOGL_DEBUG, "IMSI-%s: Already has the requested value when asked to %s %s\n",
259 subscr->imsi, nam_val ? "enable" : "disable", is_ps ? "PS" : "CS");
260 return ENOEXEC;
261 }
262
263 rc = db_subscr_nam(hlr->dbc, subscr->imsi, nam_val, is_ps);
264 if (rc)
265 return rc > 0? -rc : rc;
266
267 /* If we're disabling, send a notice out to the GSUP client that is
268 * responsible. Otherwise no need. */
269 if (nam_val)
270 return 0;
271
Neels Hofmeyr9b8e7b42020-05-04 19:20:23 +0200272 if (subscr->vlr_number[0] && !osmo_ipa_name_set_str(&vlr_name, subscr->vlr_number))
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100273 osmo_gsup_enc_send_to_ipa_name(g_hlr->gs, &vlr_name, &gsup_del_data);
Neels Hofmeyr9b8e7b42020-05-04 19:20:23 +0200274 if (subscr->sgsn_number[0] && !osmo_ipa_name_set_str(&vlr_name, subscr->sgsn_number))
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100275 osmo_gsup_enc_send_to_ipa_name(g_hlr->gs, &vlr_name, &gsup_del_data);
276 return 0;
277}
278
Harald Weltee687be52016-05-03 18:49:27 +0200279/***********************************************************************
280 * Send Auth Info handling
281 ***********************************************************************/
282
Harald Weltee72cf552016-04-28 07:18:49 +0200283/* process an incoming SAI request */
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100284static int rx_send_auth_info(struct osmo_gsup_req *req)
Harald Weltee72cf552016-04-28 07:18:49 +0200285{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100286 struct osmo_gsup_message gsup_out = {
287 .message_type = OSMO_GSUP_MSGT_SEND_AUTH_INFO_RESULT,
288 };
Harald Welte06f5af22019-08-21 20:01:31 +0200289 bool separation_bit = false;
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100290 int num_auth_vectors = OSMO_GSUP_MAX_NUM_AUTH_INFO;
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100291 unsigned int auc_3g_ind;
Harald Weltee72cf552016-04-28 07:18:49 +0200292 int rc;
293
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100294 subscr_create_on_demand(req->gsup.imsi);
Oliver Smithc7f17872019-03-04 15:10:44 +0100295
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100296 if (req->gsup.current_rat_type == OSMO_RAT_EUTRAN_SGS)
Harald Welte06f5af22019-08-21 20:01:31 +0200297 separation_bit = true;
298
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100299 if (req->gsup.num_auth_vectors > 0 &&
300 req->gsup.num_auth_vectors <= OSMO_GSUP_MAX_NUM_AUTH_INFO)
301 num_auth_vectors = req->gsup.num_auth_vectors;
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100302 rc = db_ind(g_hlr->dbc, &req->source_name, &auc_3g_ind);
303 if (rc) {
304 LOG_GSUP_REQ(req, LOGL_ERROR,
305 "Unable to determine 3G auth IND for source %s (rc=%d),"
306 " generating tuples with IND = 0\n",
307 osmo_cni_peer_id_to_str(&req->source_name), rc);
308 auc_3g_ind = 0;
309 }
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100310
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100311 rc = db_get_auc(g_hlr->dbc, req->gsup.imsi, auc_3g_ind,
Neels Hofmeyrcab2fcd2017-03-15 00:07:43 +0100312 gsup_out.auth_vectors,
Alexander Couzens81b92bb2020-01-07 19:05:13 +0100313 num_auth_vectors,
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100314 req->gsup.rand, req->gsup.auts, separation_bit);
315
Neels Hofmeyr671db902017-11-22 20:38:19 +0100316 if (rc <= 0) {
Neels Hofmeyr671db902017-11-22 20:38:19 +0100317 switch (rc) {
318 case 0:
Neels Hofmeyrbd1dca02017-11-23 15:25:30 +0100319 /* 0 means "0 tuples generated", which shouldn't happen.
320 * Treat the same as "no auth data". */
321 case -ENOKEY:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100322 osmo_gsup_req_respond_err(req, GMM_CAUSE_IMSI_UNKNOWN,
323 "IMSI known, but has no auth data;"
324 " Returning slightly inaccurate cause 'IMSI Unknown' via GSUP");
325 return rc;
Neels Hofmeyr33cbde92017-11-22 20:39:59 +0100326 case -ENOENT:
Alexander Couzens268a33e2020-01-12 00:48:07 +0100327 osmo_gsup_req_respond_err(req, g_hlr->reject_cause, "IMSI unknown");
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100328 return rc;
Neels Hofmeyr671db902017-11-22 20:38:19 +0100329 default:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100330 osmo_gsup_req_respond_err(req, GMM_CAUSE_NET_FAIL, "failure to look up IMSI in db");
331 return rc;
Neels Hofmeyr671db902017-11-22 20:38:19 +0100332 }
Harald Weltee72cf552016-04-28 07:18:49 +0200333 }
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100334 gsup_out.num_auth_vectors = rc;
Harald Weltee72cf552016-04-28 07:18:49 +0200335
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100336 osmo_gsup_req_respond(req, &gsup_out, false, true);
337 return 0;
Harald Weltee72cf552016-04-28 07:18:49 +0200338}
339
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100340/*! Receive Update Location Request, creates new lu_operation */
341static int rx_upd_loc_req(struct osmo_gsup_conn *conn, struct osmo_gsup_req *req)
Harald Weltee687be52016-05-03 18:49:27 +0200342{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100343 switch (req->gsup.cn_domain) {
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200344 case OSMO_GSUP_CN_DOMAIN_CS:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200345 conn->supports_cs = true;
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200346 break;
347 default:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200348 /* The client didn't send a CN_DOMAIN IE; assume packet-switched in
349 * accordance with the GSUP spec in osmo-hlr's user manual (section
350 * 11.6.15 "CN Domain" says "if no CN Domain IE is present within
351 * a request, the PS Domain is assumed." */
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200352 case OSMO_GSUP_CN_DOMAIN_PS:
Stefan Sperling93c5b102018-04-10 19:26:14 +0200353 conn->supports_ps = true;
Neels Hofmeyr6cee7992018-09-28 02:53:22 +0200354 break;
Stefan Sperling93c5b102018-04-10 19:26:14 +0200355 }
Harald Weltee687be52016-05-03 18:49:27 +0200356
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100357 subscr_create_on_demand(req->gsup.imsi);
Oliver Smithc7f17872019-03-04 15:10:44 +0100358
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100359 lu_rx_gsup(req);
Harald Weltee687be52016-05-03 18:49:27 +0200360 return 0;
361}
362
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100363static int rx_purge_ms_req(struct osmo_gsup_req *req)
Harald Welteb18f0e02016-05-05 21:03:03 +0200364{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100365 bool is_ps = (req->gsup.cn_domain != OSMO_GSUP_CN_DOMAIN_CS);
Harald Welteb18f0e02016-05-05 21:03:03 +0200366 int rc;
367
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100368 LOG_GSUP_REQ_CAT(req, DAUC, LOGL_INFO, "Purge MS (%s)\n", is_ps ? "PS" : "CS");
Harald Welteb18f0e02016-05-05 21:03:03 +0200369
370 /* FIXME: check if the VLR that sends the purge is the same that
371 * we have on record. Only update if yes */
372
373 /* Perform the actual update of the DB */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100374 rc = db_subscr_purge(g_hlr->dbc, req->gsup.imsi, true, is_ps);
Harald Welteb18f0e02016-05-05 21:03:03 +0200375
Harald Welte3f2a9a22018-03-01 23:35:35 +0100376 if (rc == 0)
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100377 osmo_gsup_req_respond_msgt(req, OSMO_GSUP_MSGT_PURGE_MS_RESULT, true);
378 else if (rc == -ENOENT)
379 osmo_gsup_req_respond_err(req, GMM_CAUSE_IMSI_UNKNOWN, "IMSI unknown");
380 else
381 osmo_gsup_req_respond_err(req, GMM_CAUSE_NET_FAIL, "db error");
382 return rc;
Harald Welteb18f0e02016-05-05 21:03:03 +0200383}
384
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100385static int rx_check_imei_req(struct osmo_gsup_req *req)
Harald Weltea1d3b042018-06-11 20:28:35 +0200386{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100387 struct osmo_gsup_message gsup_reply;
Oliver Smith103c11b2019-06-06 11:57:05 +0200388 char imei[GSM23003_IMEI_NUM_DIGITS_NO_CHK+1] = {0};
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100389 const struct osmo_gsup_message *gsup = &req->gsup;
Oliver Smith103c11b2019-06-06 11:57:05 +0200390 int rc;
Oliver Smith783ac812018-12-17 11:34:51 +0100391
Oliver Smith103c11b2019-06-06 11:57:05 +0200392 /* Require IMEI */
393 if (!gsup->imei_enc) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100394 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "missing IMEI");
Oliver Smith783ac812018-12-17 11:34:51 +0100395 return -1;
396 }
397
Oliver Smith103c11b2019-06-06 11:57:05 +0200398 /* Decode IMEI (fails if IMEI is too long) */
399 rc = gsm48_decode_bcd_number2(imei, sizeof(imei), gsup->imei_enc, gsup->imei_enc_len, 0);
400 if (rc < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100401 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO,
402 "failed to decode IMEI %s (rc: %d)",
403 osmo_hexdump_c(OTC_SELECT, gsup->imei_enc, gsup->imei_enc_len),
404 rc);
Oliver Smith103c11b2019-06-06 11:57:05 +0200405 return -1;
406 }
407
408 /* Check if IMEI is too short */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100409 if (!osmo_imei_str_valid(imei, false)) {
410 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO,
411 "invalid IMEI: %s", osmo_quote_str_c(OTC_SELECT, imei, -1));
Oliver Smith783ac812018-12-17 11:34:51 +0100412 return -1;
413 }
414
Oliver Smithc7f17872019-03-04 15:10:44 +0100415 subscr_create_on_demand(gsup->imsi);
416
Oliver Smith851814a2019-01-11 15:30:21 +0100417 /* Save in DB if desired */
418 if (g_hlr->store_imei) {
419 LOGP(DAUC, LOGL_DEBUG, "IMSI='%s': storing IMEI = %s\n", gsup->imsi, imei);
420 if (db_subscr_update_imei_by_imsi(g_hlr->dbc, gsup->imsi, imei) < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100421 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "Failed to store IMEI in HLR db");
Oliver Smith851814a2019-01-11 15:30:21 +0100422 return -1;
423 }
424 } else {
425 /* Check if subscriber exists and print IMEI */
426 LOGP(DMAIN, LOGL_INFO, "IMSI='%s': has IMEI = %s (consider setting 'store-imei')\n", gsup->imsi, imei);
427 struct hlr_subscriber subscr;
428 if (db_subscr_get_by_imsi(g_hlr->dbc, gsup->imsi, &subscr) < 0) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100429 osmo_gsup_req_respond_err(req, GMM_CAUSE_INV_MAND_INFO, "IMSI unknown");
Oliver Smith851814a2019-01-11 15:30:21 +0100430 return -1;
431 }
432 }
Oliver Smith783ac812018-12-17 11:34:51 +0100433
434 /* Accept all IMEIs */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100435 gsup_reply = (struct osmo_gsup_message){
436 .message_type = OSMO_GSUP_MSGT_CHECK_IMEI_RESULT,
437 .imei_result = OSMO_GSUP_IMEI_RESULT_ACK,
438 };
439 return osmo_gsup_req_respond(req, &gsup_reply, false, true);
Oliver Smith783ac812018-12-17 11:34:51 +0100440}
441
Oliver Smith28f0af82019-02-22 11:46:33 +0100442static char namebuf[255];
443#define LOGP_GSUP_FWD(gsup, level, fmt, args ...) \
444 LOGP(DMAIN, level, "Forward %s (class=%s, IMSI=%s, %s->%s): " fmt, \
Neels Hofmeyrfbe49292020-01-09 18:35:03 +0100445 osmo_gsup_message_type_name((gsup)->message_type), \
446 osmo_gsup_message_class_name((gsup)->message_class), \
447 (gsup)->imsi, \
448 osmo_quote_str((const char *)(gsup)->source_name, (gsup)->source_name_len), \
449 osmo_quote_str_buf2(namebuf, sizeof(namebuf), (const char *)(gsup)->destination_name, (gsup)->destination_name_len), \
Oliver Smith28f0af82019-02-22 11:46:33 +0100450 ## args)
451
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100452static int read_cb_forward(struct osmo_gsup_req *req)
Oliver Smith28f0af82019-02-22 11:46:33 +0100453{
454 int ret = -EINVAL;
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100455 const struct osmo_gsup_message *gsup = &req->gsup;
456 struct osmo_gsup_message gsup_err;
457 struct msgb *forward_msg;
458 struct osmo_ipa_name destination_name;
Oliver Smith28f0af82019-02-22 11:46:33 +0100459
460 /* Check for routing IEs */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100461 if (!req->gsup.source_name || !req->gsup.source_name_len
462 || !req->gsup.destination_name || !req->gsup.destination_name_len) {
463 LOGP_GSUP_FWD(&req->gsup, LOGL_ERROR, "missing routing IEs\n");
464 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100465 }
466
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100467 if (osmo_ipa_name_set(&destination_name, req->gsup.destination_name, req->gsup.destination_name_len)) {
468 LOGP_GSUP_FWD(&req->gsup, LOGL_ERROR, "invalid destination name\n");
469 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100470 }
471
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100472 LOG_GSUP_REQ(req, LOGL_INFO, "Forwarding to %s\n", osmo_ipa_name_to_str(&destination_name));
Oliver Smith28f0af82019-02-22 11:46:33 +0100473
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100474 /* Forward message without re-encoding (so we don't remove unknown IEs).
475 * Copy GSUP part to forward, removing incoming IPA header to be able to prepend an outgoing IPA header */
476 forward_msg = osmo_gsup_msgb_alloc("GSUP forward");
477 forward_msg->l2h = msgb_put(forward_msg, msgb_l2len(req->msg));
478 memcpy(forward_msg->l2h, msgb_l2(req->msg), msgb_l2len(req->msg));
479 ret = osmo_gsup_send_to_ipa_name(g_hlr->gs, &destination_name, forward_msg);
Oliver Smith28f0af82019-02-22 11:46:33 +0100480 if (ret) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100481 LOGP_GSUP_FWD(gsup, LOGL_ERROR, "%s (rc=%d)\n",
482 ret == -ENODEV ? "destination not connected" : "unknown error",
483 ret);
484 goto routing_error;
Oliver Smith28f0af82019-02-22 11:46:33 +0100485 }
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100486 osmo_gsup_req_free(req);
487 return 0;
488
489routing_error:
490 gsup_err = (struct osmo_gsup_message){
491 .message_type = OSMO_GSUP_MSGT_ROUTING_ERROR,
492 .source_name = gsup->destination_name,
493 .source_name_len = gsup->destination_name_len,
494 };
495 osmo_gsup_req_respond(req, &gsup_err, true, true);
496 return -1;
Oliver Smith28f0af82019-02-22 11:46:33 +0100497}
498
Harald Weltee72cf552016-04-28 07:18:49 +0200499static int read_cb(struct osmo_gsup_conn *conn, struct msgb *msg)
500{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100501 struct osmo_gsup_req *req = osmo_gsup_conn_rx(conn, msg);
502 if (!req)
Vadim Yanitskiyd9724f42019-05-07 21:05:18 +0700503 return -EINVAL;
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100504
505 /* If the GSUP recipient is other than this HLR, forward. */
506 if (req->gsup.destination_name_len) {
507 struct osmo_ipa_name destination_name;
508 struct osmo_ipa_name my_name;
509 osmo_ipa_name_set_str(&my_name, g_hlr->gsup_unit_name.serno);
510 if (!osmo_ipa_name_set(&destination_name, req->gsup.destination_name, req->gsup.destination_name_len)
511 && osmo_ipa_name_cmp(&destination_name, &my_name)) {
512 return read_cb_forward(req);
513 }
Vadim Yanitskiyc69a18b2019-05-07 20:53:54 +0700514 }
515
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100516 /* Distributed GSM: check whether to proxy for / lookup a remote HLR.
517 * It would require less database hits to do this only if a local-only operation fails with "unknown IMSI", but
518 * it becomes semantically easier if we do this once-off ahead of time. */
519 if (osmo_mslookup_client_active(g_hlr->mslookup.client.client)
520 || osmo_sockaddr_str_is_nonzero(&g_hlr->mslookup.client.gsup_gateway_proxy)) {
521 if (dgsm_check_forward_gsup_msg(req))
522 return 0;
523 }
524
525 /* HLR related messages that are handled at this HLR instance */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100526 switch (req->gsup.message_type) {
Harald Weltee72cf552016-04-28 07:18:49 +0200527 /* requests sent to us */
528 case OSMO_GSUP_MSGT_SEND_AUTH_INFO_REQUEST:
Neels Hofmeyr3f9d1972019-12-12 04:04:53 +0100529 rx_send_auth_info(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200530 break;
531 case OSMO_GSUP_MSGT_UPDATE_LOCATION_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100532 rx_upd_loc_req(conn, req);
Harald Weltee72cf552016-04-28 07:18:49 +0200533 break;
Harald Welteb18f0e02016-05-05 21:03:03 +0200534 case OSMO_GSUP_MSGT_PURGE_MS_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100535 rx_purge_ms_req(req);
Harald Welteb18f0e02016-05-05 21:03:03 +0200536 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200537 /* responses to requests sent by us */
Max9cacb6f2017-02-20 17:22:56 +0100538 case OSMO_GSUP_MSGT_DELETE_DATA_ERROR:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100539 LOG_GSUP_REQ(req, LOGL_ERROR, "Peer responds with: Error while deleting subscriber data\n");
540 osmo_gsup_req_free(req);
Max9cacb6f2017-02-20 17:22:56 +0100541 break;
542 case OSMO_GSUP_MSGT_DELETE_DATA_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100543 LOG_GSUP_REQ(req, LOGL_DEBUG, "Peer responds with: Subscriber data deleted\n");
544 osmo_gsup_req_free(req);
Max9cacb6f2017-02-20 17:22:56 +0100545 break;
Harald Weltebb779392018-06-16 20:21:10 +0200546 case OSMO_GSUP_MSGT_PROC_SS_REQUEST:
547 case OSMO_GSUP_MSGT_PROC_SS_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100548 rx_proc_ss_req(req);
Harald Weltebb779392018-06-16 20:21:10 +0200549 break;
550 case OSMO_GSUP_MSGT_PROC_SS_ERROR:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100551 rx_proc_ss_error(req);
Harald Weltebb779392018-06-16 20:21:10 +0200552 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200553 case OSMO_GSUP_MSGT_INSERT_DATA_ERROR:
Harald Weltee72cf552016-04-28 07:18:49 +0200554 case OSMO_GSUP_MSGT_INSERT_DATA_RESULT:
Harald Weltee687be52016-05-03 18:49:27 +0200555 case OSMO_GSUP_MSGT_LOCATION_CANCEL_ERROR:
556 case OSMO_GSUP_MSGT_LOCATION_CANCEL_RESULT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100557 lu_rx_gsup(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200558 break;
Oliver Smith783ac812018-12-17 11:34:51 +0100559 case OSMO_GSUP_MSGT_CHECK_IMEI_REQUEST:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100560 rx_check_imei_req(req);
Oliver Smith783ac812018-12-17 11:34:51 +0100561 break;
Harald Weltee72cf552016-04-28 07:18:49 +0200562 default:
Maxaa0fefd2017-02-16 12:25:22 +0100563 LOGP(DMAIN, LOGL_DEBUG, "Unhandled GSUP message type %s\n",
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100564 osmo_gsup_message_type_name(req->gsup.message_type));
565 osmo_gsup_req_free(req);
Harald Weltee72cf552016-04-28 07:18:49 +0200566 break;
567 }
568 return 0;
569}
570
Harald Welte7a476532022-11-03 11:38:41 +0100571static void print_usage(void)
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100572{
573 printf("Usage: osmo-hlr\n");
574}
575
Harald Welte7a476532022-11-03 11:38:41 +0100576static void print_help(void)
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100577{
578 printf(" -h --help This text.\n");
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100579 printf(" -c --config-file filename The config file to use.\n");
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100580 printf(" -l --database db-name The database to use.\n");
581 printf(" -d option --debug=DRLL:DCC:DMM:DRR:DRSL:DNM Enable debugging.\n");
582 printf(" -D --daemonize Fork the process into a background daemon.\n");
583 printf(" -s --disable-color Do not print ANSI colors in the log\n");
584 printf(" -T --timestamp Prefix every log line with a timestamp.\n");
585 printf(" -e --log-level number Set a global loglevel.\n");
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100586 printf(" -U --db-upgrade Allow HLR database schema upgrades.\n");
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100587 printf(" -C --db-check Quit after opening (and upgrading) the database.\n");
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100588 printf(" -V --version Print the version of OsmoHLR.\n");
Harald Welte2bd1a452021-02-23 17:23:30 +0100589
590 printf("\nVTY reference generation:\n");
591 printf(" --vty-ref-mode MODE VTY reference generation mode (e.g. 'expert').\n");
592 printf(" --vty-ref-xml Generate the VTY reference XML output and exit.\n");
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100593}
594
595static struct {
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100596 const char *config_file;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100597 const char *db_file;
598 bool daemonize;
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100599 bool db_upgrade;
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100600 bool db_check;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100601} cmdline_opts = {
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100602 .config_file = "osmo-hlr.cfg",
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200603 .db_file = NULL,
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100604 .daemonize = false,
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100605 .db_upgrade = false,
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100606};
607
Harald Welte2bd1a452021-02-23 17:23:30 +0100608static void handle_long_options(const char *prog_name, const int long_option)
609{
610 static int vty_ref_mode = VTY_REF_GEN_MODE_DEFAULT;
611
612 switch (long_option) {
613 case 1:
614 vty_ref_mode = get_string_value(vty_ref_gen_mode_names, optarg);
615 if (vty_ref_mode < 0) {
616 fprintf(stderr, "%s: Unknown VTY reference generation "
617 "mode '%s'\n", prog_name, optarg);
618 exit(2);
619 }
620 break;
621 case 2:
622 fprintf(stderr, "Generating the VTY reference in mode '%s' (%s)\n",
623 get_value_string(vty_ref_gen_mode_names, vty_ref_mode),
624 get_value_string(vty_ref_gen_mode_desc, vty_ref_mode));
625 vty_dump_xml_ref_mode(stdout, (enum vty_ref_gen_mode) vty_ref_mode);
626 exit(0);
627 default:
628 fprintf(stderr, "%s: error parsing cmdline options\n", prog_name);
629 exit(2);
630 }
631
632}
633
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100634static void handle_options(int argc, char **argv)
635{
636 while (1) {
637 int option_index = 0, c;
Harald Welte2bd1a452021-02-23 17:23:30 +0100638 static int long_option = 0;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100639 static struct option long_options[] = {
640 {"help", 0, 0, 'h'},
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100641 {"config-file", 1, 0, 'c'},
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100642 {"database", 1, 0, 'l'},
643 {"debug", 1, 0, 'd'},
644 {"daemonize", 0, 0, 'D'},
645 {"disable-color", 0, 0, 's'},
646 {"log-level", 1, 0, 'e'},
647 {"timestamp", 0, 0, 'T'},
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100648 {"db-upgrade", 0, 0, 'U' },
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100649 {"db-check", 0, 0, 'C' },
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100650 {"version", 0, 0, 'V' },
Harald Welte2bd1a452021-02-23 17:23:30 +0100651 {"vty-ref-mode", 1, &long_option, 1},
652 {"vty-ref-xml", 0, &long_option, 2},
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100653 {0, 0, 0, 0}
654 };
655
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100656 c = getopt_long(argc, argv, "hc:l:d:Dse:TUV",
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100657 long_options, &option_index);
658 if (c == -1)
659 break;
660
661 switch (c) {
Harald Welte2bd1a452021-02-23 17:23:30 +0100662 case 0:
663 handle_long_options(argv[0], long_option);
664 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100665 case 'h':
666 print_usage();
667 print_help();
668 exit(0);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100669 case 'c':
670 cmdline_opts.config_file = optarg;
671 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100672 case 'l':
673 cmdline_opts.db_file = optarg;
674 break;
675 case 'd':
676 log_parse_category_mask(osmo_stderr_target, optarg);
677 break;
678 case 'D':
679 cmdline_opts.daemonize = 1;
680 break;
681 case 's':
682 log_set_use_color(osmo_stderr_target, 0);
683 break;
684 case 'e':
685 log_set_log_level(osmo_stderr_target, atoi(optarg));
686 break;
687 case 'T':
688 log_set_print_timestamp(osmo_stderr_target, 1);
689 break;
Stefan Sperling8f3a7cc2018-11-27 12:10:45 +0100690 case 'U':
691 cmdline_opts.db_upgrade = true;
692 break;
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100693 case 'C':
694 cmdline_opts.db_check = true;
695 break;
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100696 case 'V':
697 print_version(1);
698 exit(0);
699 break;
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100700 default:
701 /* catch unknown options *as well as* missing arguments. */
702 fprintf(stderr, "Error in command line options. Exiting.\n");
703 exit(-1);
704 break;
705 }
706 }
Harald Welte80dc9ae2019-12-03 22:16:39 +0100707
708 if (argc > optind) {
709 fprintf(stderr, "Unsupported positional arguments on command line\n");
710 exit(2);
711 }
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100712}
713
Harald Welteaabae9e2016-04-28 12:48:14 +0200714static void signal_hdlr(int signal)
715{
716 switch (signal) {
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700717 case SIGTERM:
Harald Welteaabae9e2016-04-28 12:48:14 +0200718 case SIGINT:
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700719 LOGP(DMAIN, LOGL_NOTICE, "Terminating due to signal=%d\n", signal);
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700720 quit++;
Harald Welteaabae9e2016-04-28 12:48:14 +0200721 break;
722 case SIGUSR1:
723 LOGP(DMAIN, LOGL_DEBUG, "Talloc Report due to SIGUSR1\n");
Neels Hofmeyrca43e302017-01-30 13:18:23 +0100724 talloc_report_full(hlr_ctx, stderr);
Harald Welteaabae9e2016-04-28 12:48:14 +0200725 break;
726 }
727}
Harald Weltee72cf552016-04-28 07:18:49 +0200728
Max372868b2017-03-02 12:12:00 +0100729static const char vlr_copyright[] =
730 "Copyright (C) 2016, 2017 by Harald Welte, sysmocom s.f.m.c. GmbH\r\n"
731 "License AGPLv3+: GNU AGPL version 3 or later <http://gnu.org/licenses/agpl-3.0.html>\r\n"
732 "This is free software: you are free to change and redistribute it.\r\n"
733 "There is NO WARRANTY, to the extent permitted by law.\r\n";
734
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100735static struct vty_app_info vty_info = {
736 .name = "OsmoHLR",
737 .version = PACKAGE_VERSION,
Max372868b2017-03-02 12:12:00 +0100738 .copyright = vlr_copyright,
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100739 .is_config_node = hlr_vty_is_config_node,
Pau Espin Pedrolce9bc402017-05-31 13:19:22 +0200740 .go_parent_cb = hlr_vty_go_parent,
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100741};
742
Harald Weltee72cf552016-04-28 07:18:49 +0200743int main(int argc, char **argv)
744{
Harald Weltee72cf552016-04-28 07:18:49 +0200745 int rc;
746
Vadim Yanitskiy9fdb8542018-07-30 03:09:22 +0700747 /* Track the use of talloc NULL memory contexts */
748 talloc_enable_null_tracking();
749
Neels Hofmeyrca43e302017-01-30 13:18:23 +0100750 hlr_ctx = talloc_named_const(NULL, 1, "OsmoHLR");
751 msgb_talloc_ctx_init(hlr_ctx, 0);
Harald Welte7ee6e552018-02-14 00:52:05 +0100752 vty_info.tall_ctx = hlr_ctx;
Harald Welteaabae9e2016-04-28 12:48:14 +0200753
Maxd4bebbd2017-03-02 12:00:19 +0100754 g_hlr = talloc_zero(hlr_ctx, struct hlr);
Harald Welte4956ae12018-06-15 22:04:28 +0200755 INIT_LLIST_HEAD(&g_hlr->euse_list);
Harald Weltebb779392018-06-16 20:21:10 +0200756 INIT_LLIST_HEAD(&g_hlr->ss_sessions);
Harald Weltedab544e2018-07-29 16:14:48 +0200757 INIT_LLIST_HEAD(&g_hlr->ussd_routes);
Neels Hofmeyrab7dc402019-11-20 03:35:37 +0100758 INIT_LLIST_HEAD(&g_hlr->mslookup.server.local_site_services);
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200759 g_hlr->db_file_path = talloc_strdup(g_hlr, HLR_DEFAULT_DB_FILE_PATH);
Neels Hofmeyr407925d2019-11-20 03:35:37 +0100760 g_hlr->mslookup.server.mdns.domain_suffix = talloc_strdup(g_hlr, OSMO_MDNS_DOMAIN_SUFFIX_DEFAULT);
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100761 g_hlr->mslookup.client.mdns.domain_suffix = talloc_strdup(g_hlr, OSMO_MDNS_DOMAIN_SUFFIX_DEFAULT);
Alexander Couzens268a33e2020-01-12 00:48:07 +0100762 g_hlr->reject_cause = GMM_CAUSE_IMSI_UNKNOWN;
763 g_hlr->no_proxy_reject_cause = GMM_CAUSE_IMSI_UNKNOWN;
Maxd4bebbd2017-03-02 12:00:19 +0100764
Vadim Yanitskiyd157a562018-12-01 00:03:39 +0700765 /* Init default (call independent) SS session guard timeout value */
766 g_hlr->ncss_guard_timeout = NCSS_GUARD_TIMEOUT_DEFAULT;
767
Pau Espin Pedrol51530312018-04-17 15:07:06 +0200768 rc = osmo_init_logging2(hlr_ctx, &hlr_log_info);
Harald Weltee72cf552016-04-28 07:18:49 +0200769 if (rc < 0) {
770 fprintf(stderr, "Error initializing logging\n");
771 exit(1);
772 }
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100773
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100774 /* Set up llists and objects, startup is happening from VTY commands. */
775 dgsm_init(hlr_ctx);
776
Max20ddfdb2019-02-18 13:12:27 +0100777 osmo_stats_init(hlr_ctx);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100778 vty_init(&vty_info);
Max372868b2017-03-02 12:12:00 +0100779 ctrl_vty_init(hlr_ctx);
Alexander Couzens268a33e2020-01-12 00:48:07 +0100780 hlr_vty_init(hlr_ctx);
Neels Hofmeyr407925d2019-11-20 03:35:37 +0100781 dgsm_vty_init();
Pau Espin Pedroled18fa92020-08-18 12:58:36 +0200782 osmo_cpu_sched_vty_init(hlr_ctx);
Harald Welte2bd1a452021-02-23 17:23:30 +0100783 handle_options(argc, argv);
Neels Hofmeyr7685a782017-01-30 23:30:26 +0100784
785 rc = vty_read_config_file(cmdline_opts.config_file, NULL);
786 if (rc < 0) {
787 LOGP(DMAIN, LOGL_FATAL,
788 "Failed to parse the config file: '%s'\n",
789 cmdline_opts.config_file);
790 return rc;
791 }
792
Harald Weltee72cf552016-04-28 07:18:49 +0200793 LOGP(DMAIN, LOGL_NOTICE, "hlr starting\n");
794
795 rc = rand_init();
796 if (rc < 0) {
797 LOGP(DMAIN, LOGL_FATAL, "Error initializing random source\n");
798 exit(1);
799 }
800
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200801 if (cmdline_opts.db_file)
802 osmo_talloc_replace_string(g_hlr, &g_hlr->db_file_path, cmdline_opts.db_file);
803
804 g_hlr->dbc = db_open(hlr_ctx, g_hlr->db_file_path, true, cmdline_opts.db_upgrade);
Maxd4bebbd2017-03-02 12:00:19 +0100805 if (!g_hlr->dbc) {
Neels Hofmeyr5857c592019-04-02 04:24:49 +0200806 LOGP(DMAIN, LOGL_FATAL, "Error opening database %s\n", osmo_quote_str(g_hlr->db_file_path, -1));
Harald Weltee72cf552016-04-28 07:18:49 +0200807 exit(1);
808 }
809
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100810 if (cmdline_opts.db_check) {
811 LOGP(DMAIN, LOGL_NOTICE, "Cmdline option --db-check: Database was opened successfully, quitting.\n");
812 db_close(g_hlr->dbc);
813 log_fini();
814 talloc_free(hlr_ctx);
815 talloc_free(tall_vty_ctx);
816 talloc_disable_null_tracking();
817 exit(0);
818 }
819
820 /* start telnet after reading config for vty_get_bind_addr() */
arehbeine4143232022-12-19 21:28:53 +0100821 rc = telnet_init_default(hlr_ctx, NULL, OSMO_VTY_PORT_HLR);
Neels Hofmeyrc3d40322019-10-31 01:39:05 +0100822 if (rc < 0)
823 return rc;
824
825
Neels Hofmeyr84201d32017-07-21 16:00:32 +0200826 g_hlr->gs = osmo_gsup_server_create(hlr_ctx, g_hlr->gsup_bind_addr, OSMO_GSUP_PORT,
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100827 read_cb, g_hlr);
Maxd4bebbd2017-03-02 12:00:19 +0100828 if (!g_hlr->gs) {
Harald Weltee72cf552016-04-28 07:18:49 +0200829 LOGP(DMAIN, LOGL_FATAL, "Error starting GSUP server\n");
830 exit(1);
831 }
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100832 proxy_init(g_hlr->gs);
Harald Weltee72cf552016-04-28 07:18:49 +0200833
Neels Hofmeyr234f9cb2017-10-24 17:23:04 +0200834 g_hlr->ctrl = hlr_controlif_setup(g_hlr);
Max372868b2017-03-02 12:12:00 +0100835
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100836 dgsm_start(hlr_ctx);
837
Harald Welteaabae9e2016-04-28 12:48:14 +0200838 osmo_init_ignore_signals();
839 signal(SIGINT, &signal_hdlr);
Vadim Yanitskiyee7c0cb2019-03-19 18:10:51 +0700840 signal(SIGTERM, &signal_hdlr);
Harald Welteaabae9e2016-04-28 12:48:14 +0200841 signal(SIGUSR1, &signal_hdlr);
842
Neels Hofmeyr7f9491f2017-01-30 13:30:47 +0100843 if (cmdline_opts.daemonize) {
844 rc = osmo_daemonize();
845 if (rc < 0) {
846 perror("Error during daemonize");
847 exit(1);
848 }
849 }
Harald Welteaabae9e2016-04-28 12:48:14 +0200850
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700851 while (!quit)
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100852 osmo_select_main_ctx(0);
853
Neels Hofmeyr76328bd2019-11-20 03:35:37 +0100854 dgsm_stop();
Harald Weltee72cf552016-04-28 07:18:49 +0200855
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700856 osmo_gsup_server_destroy(g_hlr->gs);
Maxd4bebbd2017-03-02 12:00:19 +0100857 db_close(g_hlr->dbc);
Harald Weltee72cf552016-04-28 07:18:49 +0200858 log_fini();
859
Vadim Yanitskiy4793a7e2018-07-30 03:04:34 +0700860 /**
861 * Report the heap state of root context, then free,
862 * so both ASAN and Valgrind are happy...
863 */
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700864 talloc_report_full(hlr_ctx, stderr);
Vadim Yanitskiy4793a7e2018-07-30 03:04:34 +0700865 talloc_free(hlr_ctx);
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700866
Vadim Yanitskiy9fdb8542018-07-30 03:09:22 +0700867 /* FIXME: VTY code still uses NULL-context */
868 talloc_free(tall_vty_ctx);
869
870 /**
871 * Report the heap state of NULL context, then free,
872 * so both ASAN and Valgrind are happy...
873 */
874 talloc_report_full(NULL, stderr);
875 talloc_disable_null_tracking();
876
Vadim Yanitskiy527d9342018-07-30 02:42:25 +0700877 return 0;
Harald Weltee72cf552016-04-28 07:18:49 +0200878}