blob: e37437dfaea1327916c1df81c09d6026a5de9efb [file] [log] [blame]
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001/* A Media Gateway Control Protocol Media Gateway: RFC 3435 */
2/* The protocol implementation */
3
4/*
5 * (C) 2009-2012 by Holger Hans Peter Freyther <zecke@selfish.org>
6 * (C) 2009-2012 by On-Waves
7 * All Rights Reserved
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU Affero General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU Affero General Public License for more details.
18 *
19 * You should have received a copy of the GNU Affero General Public License
20 * along with this program. If not, see <http://www.gnu.org/licenses/>.
21 *
22 */
23
24#include <string.h>
25#include <stdlib.h>
26#include <unistd.h>
27#include <errno.h>
28#include <time.h>
29#include <limits.h>
Neels Hofmeyrf83ec562017-09-07 19:18:40 +020030#include <arpa/inet.h>
31
32#include <osmocom/core/msgb.h>
33#include <osmocom/core/select.h>
Philipp Maier1cb1e382017-11-02 17:16:04 +010034#include <osmocom/core/socket.h>
Philipp Maier4dba7692018-08-03 12:20:52 +020035#include <osmocom/core/byteswap.h>
Neels Hofmeyrf83ec562017-09-07 19:18:40 +020036#include <osmocom/netif/rtp.h>
Philipp Maier228e5912019-03-05 13:56:59 +010037#include <osmocom/netif/amr.h>
Philipp Maier87bd9be2017-08-22 16:35:41 +020038#include <osmocom/mgcp/mgcp.h>
Neels Hofmeyr67793542017-09-08 04:25:16 +020039#include <osmocom/mgcp/mgcp_common.h>
Philipp Maier993ea6b2020-08-04 18:26:50 +020040#include <osmocom/mgcp/mgcp_network.h>
41#include <osmocom/mgcp/mgcp_protocol.h>
Philipp Maier87bd9be2017-08-22 16:35:41 +020042#include <osmocom/mgcp/mgcp_stat.h>
43#include <osmocom/mgcp/osmux.h>
44#include <osmocom/mgcp/mgcp_conn.h>
Philipp Maier37d11c82018-02-01 14:38:12 +010045#include <osmocom/mgcp/mgcp_endp.h>
Philipp Maierc66ab2c2020-06-02 20:55:34 +020046#include <osmocom/mgcp/mgcp_trunk.h>
Philipp Maier6931f9a2018-07-26 09:29:31 +020047#include <osmocom/mgcp/mgcp_codec.h>
Philipp Maierc3413882017-10-27 12:26:54 +020048#include <osmocom/mgcp/debug.h>
Philipp Maier9fc8a022019-02-20 12:26:52 +010049#include <osmocom/codec/codec.h>
Philipp Maier889fe7f2020-07-06 17:44:12 +020050#include <osmocom/mgcp/mgcp_e1.h>
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +010051#include <osmocom/mgcp/mgcp_iuup.h>
Philipp Maier993ea6b2020-08-04 18:26:50 +020052
Neels Hofmeyrf83ec562017-09-07 19:18:40 +020053#define RTP_SEQ_MOD (1 << 16)
54#define RTP_MAX_DROPOUT 3000
55#define RTP_MAX_MISORDER 100
Neels Hofmeyrf83ec562017-09-07 19:18:40 +020056
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +010057void rtpconn_rate_ctr_add(struct mgcp_conn_rtp *conn_rtp, struct mgcp_endpoint *endp,
Harald Weltea48ff4a2020-03-08 14:45:08 +010058 int id, int inc)
59{
Pau Espin Pedroldaf5bce2022-09-22 19:14:24 +020060 struct rate_ctr_group *conn_stats = conn_rtp->ctrg;
Philipp Maierc66ab2c2020-06-02 20:55:34 +020061 struct rate_ctr_group *mgw_stats = endp->trunk->ratectr.all_rtp_conn_stats;
Harald Weltea48ff4a2020-03-08 14:45:08 +010062
Philipp Maierc66ab2c2020-06-02 20:55:34 +020063 /* add to both the per-connection and the global stats */
Pau Espin Pedrol907744e2021-06-04 17:57:34 +020064 rate_ctr_add(rate_ctr_group_get_ctr(conn_stats, id), inc);
65 rate_ctr_add(rate_ctr_group_get_ctr(mgw_stats, id), inc);
Harald Weltea48ff4a2020-03-08 14:45:08 +010066}
67
Pau Espin Pedrol582c2bf2022-09-22 17:53:44 +020068void rtpconn_rate_ctr_inc(struct mgcp_conn_rtp *conn_rtp, struct mgcp_endpoint *endp, int id)
Harald Weltea48ff4a2020-03-08 14:45:08 +010069{
70 rtpconn_rate_ctr_add(conn_rtp, endp, id, 1);
71}
72
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +020073static int rx_rtp(struct msgb *msg);
74
Pau Espin Pedrolca280a12021-07-06 18:15:35 +020075bool mgcp_rtp_end_remote_addr_available(const struct mgcp_rtp_end *rtp_end)
76{
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +020077 return (osmo_sockaddr_port(&rtp_end->addr.u.sa) != 0) &&
78 (osmo_sockaddr_is_any(&rtp_end->addr) == 0);
Pau Espin Pedrolca280a12021-07-06 18:15:35 +020079}
80
Philipp Maier1cb1e382017-11-02 17:16:04 +010081/*! Determine the local rtp bind IP-address.
Philipp Maier0b79d212020-06-18 12:02:49 +020082 * \param[out] addr caller provided memory to store the resulting IP-Address.
83 * \param[in] endp mgcp endpoint, that holds a copy of the VTY parameters.
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +020084 * \ returns 0 on success, -1 if no local address could be provided.
Philipp Maier1cb1e382017-11-02 17:16:04 +010085 *
86 * The local bind IP-address is automatically selected by probing the
87 * IP-Address of the interface that is pointing towards the remote IP-Address,
88 * if no remote IP-Address is known yet, the statically configured
89 * IP-Addresses are used as fallback. */
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +020090int mgcp_get_local_addr(char *addr, struct mgcp_conn_rtp *conn)
Philipp Maier1cb1e382017-11-02 17:16:04 +010091{
Pau Espin Pedrol654b68d2022-10-05 10:37:49 +020092 const struct mgcp_endpoint *endp = conn->conn->endp;
93 const struct mgcp_config *cfg = endp->trunk->cfg;
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +020094 char ipbuf[INET6_ADDRSTRLEN];
Philipp Maier1cb1e382017-11-02 17:16:04 +010095 int rc;
Pau Espin Pedrol051eb4d2022-10-04 12:50:28 +020096 bool rem_addr_set = osmo_sockaddr_is_any(&conn->end.addr) == 0;
Pau Espin Pedrol654b68d2022-10-05 10:37:49 +020097 const char *bind_addr;
Philipp Maier1cb1e382017-11-02 17:16:04 +010098
Pau Espin Pedrol479cf762022-09-07 19:42:54 +020099 /* Osmux: No smart IP addresses allocation is supported yet. Simply
100 * return the one set in VTY config: */
101 if (mgcp_conn_rtp_is_osmux(conn)) {
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +0200102 if (rem_addr_set) {
103 /* Match IP version with what was requested from remote: */
104 bind_addr = conn->end.addr.u.sa.sa_family == AF_INET6 ?
Pau Espin Pedrol36413c02022-10-12 17:58:17 +0200105 cfg->osmux.local_addr_v6 :
106 cfg->osmux.local_addr_v4;
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +0200107 } else {
108 /* Choose any of the bind addresses, preferring v6 over v4 if available: */
Pau Espin Pedrol36413c02022-10-12 17:58:17 +0200109 bind_addr = cfg->osmux.local_addr_v6;
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +0200110 if (!bind_addr)
Pau Espin Pedrol36413c02022-10-12 17:58:17 +0200111 bind_addr = cfg->osmux.local_addr_v4;
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +0200112 }
113 if (!bind_addr) {
114 LOGPCONN(conn->conn, DOSMUX, LOGL_ERROR,
115 "Unable to locate local Osmux address, check your configuration! v4=%u v6=%u remote_known=%s\n",
Pau Espin Pedrol36413c02022-10-12 17:58:17 +0200116 !!cfg->osmux.local_addr_v4,
117 !!cfg->osmux.local_addr_v6,
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +0200118 rem_addr_set ? osmo_sockaddr_ntop(&conn->end.addr.u.sa, ipbuf) : "no");
119 return -1;
120 }
121 LOGPCONN(conn->conn, DOSMUX, LOGL_DEBUG,
122 "Using configured osmux bind ip as local bind ip %s\n",
Pau Espin Pedrol479cf762022-09-07 19:42:54 +0200123 bind_addr);
124 osmo_strlcpy(addr, bind_addr, INET6_ADDRSTRLEN);
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +0200125 return 0;
Pau Espin Pedrol479cf762022-09-07 19:42:54 +0200126 }
127
Philipp Maier1cb1e382017-11-02 17:16:04 +0100128 /* Try probing the local IP-Address */
Pau Espin Pedrol654b68d2022-10-05 10:37:49 +0200129 if (cfg->net_ports.bind_addr_probe && rem_addr_set) {
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200130 rc = osmo_sock_local_ip(addr, osmo_sockaddr_ntop(&conn->end.addr.u.sa, ipbuf));
Philipp Maier1cb1e382017-11-02 17:16:04 +0100131 if (rc < 0)
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200132 LOGPCONN(conn->conn, DRTP, LOGL_ERROR,
133 "local interface auto detection failed, using configured addresses...\n");
Philipp Maier1cb1e382017-11-02 17:16:04 +0100134 else {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200135 LOGPCONN(conn->conn, DRTP, LOGL_DEBUG,
136 "selected local rtp bind ip %s by probing using remote ip %s\n",
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200137 addr, osmo_sockaddr_ntop(&conn->end.addr.u.sa, ipbuf));
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +0200138 return 0;
Philipp Maier1cb1e382017-11-02 17:16:04 +0100139 }
140 }
141
Pau Espin Pedrol479cf762022-09-07 19:42:54 +0200142 /* Select from preconfigured IP-Addresses. */
Pau Espin Pedrol8a2a1b22020-09-02 20:46:24 +0200143 if (rem_addr_set) {
Philipp Maier1cb1e382017-11-02 17:16:04 +0100144 /* Check there is a bind IP for the RTP traffic configured,
145 * if so, use that IP-Address */
Pau Espin Pedrol8a2a1b22020-09-02 20:46:24 +0200146 bind_addr = conn->end.addr.u.sa.sa_family == AF_INET6 ?
Pau Espin Pedrol654b68d2022-10-05 10:37:49 +0200147 cfg->net_ports.bind_addr_v6 :
148 cfg->net_ports.bind_addr_v4;
Pau Espin Pedrol8a2a1b22020-09-02 20:46:24 +0200149 } else {
150 /* Choose any of the bind addresses, preferring v6 over v4 */
Pau Espin Pedrol654b68d2022-10-05 10:37:49 +0200151 bind_addr = cfg->net_ports.bind_addr_v6;
Eric2764bdb2021-08-23 22:11:47 +0200152 if (!strlen(bind_addr))
Pau Espin Pedrol654b68d2022-10-05 10:37:49 +0200153 bind_addr = cfg->net_ports.bind_addr_v4;
Pau Espin Pedrol8a2a1b22020-09-02 20:46:24 +0200154 }
Eric2764bdb2021-08-23 22:11:47 +0200155 if (strlen(bind_addr)) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200156 LOGPCONN(conn->conn, DRTP, LOGL_DEBUG,
157 "using configured rtp bind ip as local bind ip %s\n",
Pau Espin Pedrol8a2a1b22020-09-02 20:46:24 +0200158 bind_addr);
Philipp Maier1cb1e382017-11-02 17:16:04 +0100159 } else {
160 /* No specific bind IP is configured for the RTP traffic, so
161 * assume the IP where we listen for incoming MGCP messages
162 * as bind IP */
Pau Espin Pedrol654b68d2022-10-05 10:37:49 +0200163 bind_addr = cfg->source_addr;
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200164 LOGPCONN(conn->conn, DRTP, LOGL_DEBUG,
Pau Espin Pedrol8a2a1b22020-09-02 20:46:24 +0200165 "using mgcp bind ip as local rtp bind ip: %s\n", bind_addr);
Philipp Maier1cb1e382017-11-02 17:16:04 +0100166 }
Pau Espin Pedrol8a2a1b22020-09-02 20:46:24 +0200167 osmo_strlcpy(addr, bind_addr, INET6_ADDRSTRLEN);
Pau Espin Pedrol70c03f52022-10-04 16:49:41 +0200168 return 0;
Philipp Maier1cb1e382017-11-02 17:16:04 +0100169}
170
Philipp Maier87bd9be2017-08-22 16:35:41 +0200171/* This does not need to be a precision timestamp and
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200172 * is allowed to wrap quite fast. The returned value is
Philipp Maier87bd9be2017-08-22 16:35:41 +0200173 * 1/codec_rate seconds. */
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +0100174uint32_t mgcp_get_current_ts(unsigned codec_rate)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200175{
176 struct timespec tp;
177 uint64_t ret;
178
Philipp Maier87bd9be2017-08-22 16:35:41 +0200179 if (!codec_rate)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200180 return 0;
181
182 memset(&tp, 0, sizeof(tp));
183 if (clock_gettime(CLOCK_MONOTONIC, &tp) != 0)
Philipp Maierc3413882017-10-27 12:26:54 +0200184 LOGP(DRTP, LOGL_NOTICE, "Getting the clock failed.\n");
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200185
186 /* convert it to 1/unit seconds */
187 ret = tp.tv_sec;
Philipp Maier87bd9be2017-08-22 16:35:41 +0200188 ret *= codec_rate;
189 ret += (int64_t) tp.tv_nsec * codec_rate / 1000 / 1000 / 1000;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200190
191 return ret;
192}
193
Philipp Maier87bd9be2017-08-22 16:35:41 +0200194/* Compute timestamp alignment error */
Pau Espin Pedrol8358c4b2021-07-07 12:41:38 +0200195static int32_t ts_alignment_error(const struct mgcp_rtp_stream_state *sstate,
Philipp Maier87bd9be2017-08-22 16:35:41 +0200196 int ptime, uint32_t timestamp)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200197{
198 int32_t timestamp_delta;
199
200 if (ptime == 0)
201 return 0;
202
203 /* Align according to: T - Tlast = k * Tptime */
204 timestamp_delta = timestamp - sstate->last_timestamp;
205
206 return timestamp_delta % ptime;
207}
208
Philipp Maier87bd9be2017-08-22 16:35:41 +0200209/* Check timestamp and sequence number for plausibility */
Pau Espin Pedrol8358c4b2021-07-07 12:41:38 +0200210static int check_rtp_timestamp(const struct mgcp_endpoint *endp,
211 const struct mgcp_rtp_state *state,
212 const struct mgcp_rtp_stream_state *sstate,
213 const struct mgcp_rtp_end *rtp_end,
214 const struct osmo_sockaddr *addr,
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200215 uint16_t seq, uint32_t timestamp,
Philipp Maier87bd9be2017-08-22 16:35:41 +0200216 const char *text, int32_t * tsdelta_out)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200217{
218 int32_t tsdelta;
219 int32_t timestamp_error;
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200220 char ipbuf[INET6_ADDRSTRLEN];
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200221
222 /* Not fully intialized, skip */
223 if (sstate->last_tsdelta == 0 && timestamp == sstate->last_timestamp)
224 return 0;
225
226 if (seq == sstate->last_seq) {
227 if (timestamp != sstate->last_timestamp) {
Philipp Maier9e1d1642018-05-09 16:26:34 +0200228 rate_ctr_inc(sstate->err_ts_ctr);
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200229 LOGPENDP(endp, DRTP, LOGL_ERROR,
230 "The %s timestamp delta is != 0 but the sequence "
231 "number %d is the same, "
232 "TS offset: %d, SeqNo offset: %d "
233 "on SSRC: %u timestamp: %u "
234 "from %s:%d\n",
235 text, seq,
236 state->patch.timestamp_offset, state->patch.seq_offset,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200237 sstate->ssrc, timestamp,
238 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
239 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200240 }
241 return 0;
242 }
243
244 tsdelta =
Philipp Maier87bd9be2017-08-22 16:35:41 +0200245 (int32_t)(timestamp - sstate->last_timestamp) /
246 (int16_t)(seq - sstate->last_seq);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200247
248 if (tsdelta == 0) {
249 /* Don't update *tsdelta_out */
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200250 LOGPENDP(endp, DRTP, LOGL_NOTICE,
251 "The %s timestamp delta is %d "
252 "on SSRC: %u timestamp: %u "
253 "from %s:%d\n",
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200254 text, tsdelta, sstate->ssrc, timestamp,
255 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
256 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200257
258 return 0;
259 }
260
261 if (sstate->last_tsdelta != tsdelta) {
262 if (sstate->last_tsdelta) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200263 LOGPENDP(endp, DRTP, LOGL_INFO,
264 "The %s timestamp delta changes from %d to %d "
265 "on SSRC: %u timestamp: %u from %s:%d\n",
266 text, sstate->last_tsdelta, tsdelta,
267 sstate->ssrc, timestamp,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200268 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
269 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200270 }
271 }
272
273 if (tsdelta_out)
274 *tsdelta_out = tsdelta;
275
276 timestamp_error =
Philipp Maier87bd9be2017-08-22 16:35:41 +0200277 ts_alignment_error(sstate, state->packet_duration, timestamp);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200278
279 if (timestamp_error) {
Philipp Maier9e1d1642018-05-09 16:26:34 +0200280 rate_ctr_inc(sstate->err_ts_ctr);
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200281 LOGPENDP(endp, DRTP, LOGL_NOTICE,
282 "The %s timestamp has an alignment error of %d "
283 "on SSRC: %u "
284 "SeqNo delta: %d, TS delta: %d, dTS/dSeq: %d "
285 "from %s:%d. ptime: %d\n",
286 text, timestamp_error,
287 sstate->ssrc,
288 (int16_t)(seq - sstate->last_seq),
289 (int32_t)(timestamp - sstate->last_timestamp),
290 tsdelta,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200291 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
292 osmo_sockaddr_port(&addr->u.sa),
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200293 state->packet_duration);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200294 }
295 return 1;
296}
297
298/* Set the timestamp offset according to the packet duration. */
Pau Espin Pedrol8358c4b2021-07-07 12:41:38 +0200299static int adjust_rtp_timestamp_offset(const struct mgcp_endpoint *endp,
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200300 struct mgcp_rtp_state *state,
Pau Espin Pedrol8358c4b2021-07-07 12:41:38 +0200301 const struct mgcp_rtp_end *rtp_end,
302 const struct osmo_sockaddr *addr,
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200303 int16_t delta_seq, uint32_t in_timestamp,
304 bool marker_bit)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200305{
306 int32_t tsdelta = state->packet_duration;
307 int timestamp_offset;
308 uint32_t out_timestamp;
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200309 char ipbuf[INET6_ADDRSTRLEN];
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200310
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200311 if (marker_bit) {
312 /* If RTP pkt contains marker bit, the timestamps are not longer
313 * in sync, so we can erase timestamp offset patching. */
314 state->patch.timestamp_offset = 0;
315 return 0;
316 }
317
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200318 if (tsdelta == 0) {
319 tsdelta = state->out_stream.last_tsdelta;
320 if (tsdelta != 0) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200321 LOGPENDP(endp, DRTP, LOGL_NOTICE,
322 "A fixed packet duration is not available, "
323 "using last output timestamp delta instead: %d "
324 "from %s:%d\n", tsdelta,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200325 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
326 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200327 } else {
Philipp Maierbc0346e2018-06-07 09:52:16 +0200328 tsdelta = rtp_end->codec->rate * 20 / 1000;
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200329 LOGPENDP(endp, DRTP, LOGL_NOTICE,
330 "Fixed packet duration and last timestamp delta "
331 "are not available, "
332 "using fixed 20ms instead: %d "
333 "from %s:%d\n", tsdelta,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200334 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
335 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200336 }
337 }
338
339 out_timestamp = state->out_stream.last_timestamp + delta_seq * tsdelta;
340 timestamp_offset = out_timestamp - in_timestamp;
341
Harald Welte33381352017-12-25 09:44:26 +0100342 if (state->patch.timestamp_offset != timestamp_offset) {
343 state->patch.timestamp_offset = timestamp_offset;
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200344 LOGPENDP(endp, DRTP, LOGL_NOTICE,
345 "Timestamp offset change on SSRC: %u "
346 "SeqNo delta: %d, TS offset: %d, "
347 "from %s:%d\n", state->in_stream.ssrc,
348 delta_seq, state->patch.timestamp_offset,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200349 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
350 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200351 }
352
353 return timestamp_offset;
354}
355
356/* Set the timestamp offset according to the packet duration. */
Pau Espin Pedrol8358c4b2021-07-07 12:41:38 +0200357static int align_rtp_timestamp_offset(const struct mgcp_endpoint *endp,
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200358 struct mgcp_rtp_state *state,
Pau Espin Pedrol8358c4b2021-07-07 12:41:38 +0200359 const struct mgcp_rtp_end *rtp_end,
360 const struct osmo_sockaddr *addr,
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200361 uint32_t timestamp, bool marker_bit)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200362{
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200363 char ipbuf[INET6_ADDRSTRLEN];
Philipp Maier87bd9be2017-08-22 16:35:41 +0200364 int ts_error = 0;
365 int ts_check = 0;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200366 int ptime = state->packet_duration;
367
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200368 if (marker_bit) {
369 /* If RTP pkt contains marker bit, the timestamps are not longer
370 * in sync, so no alignment is needed. */
371 return 0;
372 }
373
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200374 /* Align according to: T + Toffs - Tlast = k * Tptime */
375
Philipp Maier87bd9be2017-08-22 16:35:41 +0200376 ts_error = ts_alignment_error(&state->out_stream, ptime,
Harald Welte33381352017-12-25 09:44:26 +0100377 timestamp + state->patch.timestamp_offset);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200378
Philipp Maier87bd9be2017-08-22 16:35:41 +0200379 /* If there is an alignment error, we have to compensate it */
380 if (ts_error) {
Harald Welte33381352017-12-25 09:44:26 +0100381 state->patch.timestamp_offset += ptime - ts_error;
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200382 LOGPENDP(endp, DRTP, LOGL_NOTICE,
383 "Corrected timestamp alignment error of %d on SSRC: %u "
384 "new TS offset: %d, "
385 "from %s:%d\n",
386 ts_error, state->in_stream.ssrc,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200387 state->patch.timestamp_offset,
388 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
389 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200390 }
391
Philipp Maier87bd9be2017-08-22 16:35:41 +0200392 /* Check we really managed to compensate the timestamp
393 * offset. There should not be any remaining error, failing
Harald Welte1d1b98f2017-12-25 10:03:40 +0100394 * here would point to a serous problem with the alignment
395 * error computation function */
Philipp Maier87bd9be2017-08-22 16:35:41 +0200396 ts_check = ts_alignment_error(&state->out_stream, ptime,
Harald Welte33381352017-12-25 09:44:26 +0100397 timestamp + state->patch.timestamp_offset);
Philipp Maier87bd9be2017-08-22 16:35:41 +0200398 OSMO_ASSERT(ts_check == 0);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200399
Philipp Maier87bd9be2017-08-22 16:35:41 +0200400 /* Return alignment error before compensation */
401 return ts_error;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200402}
403
Philipp Maier87bd9be2017-08-22 16:35:41 +0200404/*! dummy callback to disable transcoding (see also cfg->rtp_processing_cb).
Philipp Maier0b79d212020-06-18 12:02:49 +0200405 * \param[in] associated endpoint.
406 * \param[in] destination RTP end.
407 * \param[in,out] pointer to buffer with voice data.
408 * \param[in] voice data length.
409 * \param[in] maximum size of caller provided voice data buffer.
410 * \returns ignores input parameters, return always 0. */
Philipp Maier87bd9be2017-08-22 16:35:41 +0200411int mgcp_rtp_processing_default(struct mgcp_endpoint *endp,
412 struct mgcp_rtp_end *dst_end,
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200413 char *data, int *len, int buf_size)
414{
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200415 LOGPENDP(endp, DRTP, LOGL_DEBUG, "transcoding disabled\n");
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200416 return 0;
417}
418
Philipp Maier87bd9be2017-08-22 16:35:41 +0200419/*! dummy callback to disable transcoding (see also cfg->setup_rtp_processing_cb).
Philipp Maier0b79d212020-06-18 12:02:49 +0200420 * \param[in] associated endpoint.
421 * \param[in] destination RTP connnection.
422 * \param[in] source RTP connection.
423 * \returns ignores input parameters, return always 0. */
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200424int mgcp_setup_rtp_processing_default(struct mgcp_endpoint *endp,
Philipp Maieracc10352018-07-19 18:07:57 +0200425 struct mgcp_conn_rtp *conn_dst,
426 struct mgcp_conn_rtp *conn_src)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200427{
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200428 LOGPENDP(endp, DRTP, LOGL_DEBUG, "transcoding disabled\n");
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200429 return 0;
430}
431
432void mgcp_get_net_downlink_format_default(struct mgcp_endpoint *endp,
Philipp Maier58128252019-03-06 11:28:18 +0100433 const struct mgcp_rtp_codec **codec,
Philipp Maier87bd9be2017-08-22 16:35:41 +0200434 const char **fmtp_extra,
435 struct mgcp_conn_rtp *conn)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200436{
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200437 LOGPENDP(endp, DRTP, LOGL_DEBUG, "conn:%s using format defaults\n",
438 mgcp_conn_dump(conn->conn));
Philipp Maier87bd9be2017-08-22 16:35:41 +0200439
Philipp Maier58128252019-03-06 11:28:18 +0100440 *codec = conn->end.codec;
Philipp Maier87bd9be2017-08-22 16:35:41 +0200441 *fmtp_extra = conn->end.fmtp_extra;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200442}
443
Pau Espin Pedrol8358c4b2021-07-07 12:41:38 +0200444void mgcp_rtp_annex_count(const struct mgcp_endpoint *endp,
Philipp Maier87bd9be2017-08-22 16:35:41 +0200445 struct mgcp_rtp_state *state, const uint16_t seq,
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200446 const int32_t transit, const uint32_t ssrc,
447 const bool marker_bit)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200448{
449 int32_t d;
450
451 /* initialize or re-initialize */
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200452 if (!state->stats.initialized || state->stats.ssrc != ssrc || marker_bit) {
Harald Welte49e3d5a2017-12-25 09:47:57 +0100453 state->stats.initialized = 1;
454 state->stats.base_seq = seq;
455 state->stats.max_seq = seq - 1;
456 state->stats.ssrc = ssrc;
457 state->stats.jitter = 0;
458 state->stats.transit = transit;
459 state->stats.cycles = 0;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200460 } else {
461 uint16_t udelta;
462
Philipp Maier87bd9be2017-08-22 16:35:41 +0200463 /* The below takes the shape of the validation of
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200464 * Appendix A. Check if there is something weird with
465 * the sequence number, otherwise check for a wrap
466 * around in the sequence number.
467 * It can't wrap during the initialization so let's
468 * skip it here. The Appendix A probably doesn't have
Philipp Maier87bd9be2017-08-22 16:35:41 +0200469 * this issue because of the probation. */
Harald Welte49e3d5a2017-12-25 09:47:57 +0100470 udelta = seq - state->stats.max_seq;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200471 if (udelta < RTP_MAX_DROPOUT) {
Harald Welte49e3d5a2017-12-25 09:47:57 +0100472 if (seq < state->stats.max_seq)
473 state->stats.cycles += RTP_SEQ_MOD;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200474 } else if (udelta <= RTP_SEQ_MOD - RTP_MAX_MISORDER) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200475 LOGPENDP(endp, DRTP, LOGL_NOTICE,
476 "RTP seqno made a very large jump on delta: %u\n",
477 udelta);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200478 }
479 }
480
Philipp Maier87bd9be2017-08-22 16:35:41 +0200481 /* Calculate the jitter between the two packages. The TS should be
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200482 * taken closer to the read function. This was taken from the
483 * Appendix A of RFC 3550. Timestamp and arrival_time have a 1/rate
Philipp Maier87bd9be2017-08-22 16:35:41 +0200484 * resolution. */
Harald Welte49e3d5a2017-12-25 09:47:57 +0100485 d = transit - state->stats.transit;
486 state->stats.transit = transit;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200487 if (d < 0)
488 d = -d;
Harald Welte49e3d5a2017-12-25 09:47:57 +0100489 state->stats.jitter += d - ((state->stats.jitter + 8) >> 4);
490 state->stats.max_seq = seq;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200491}
492
Philipp Maier6931f9a2018-07-26 09:29:31 +0200493/* There may be different payload type numbers negotiated for two connections.
494 * Patch the payload type of an RTP packet so that it uses the payload type
Philipp Maier4c4d2272023-04-26 15:45:17 +0200495 * of the codec that is set for the destination connection (conn_dst) */
496static int mgcp_patch_pt(struct mgcp_conn_rtp *conn_dst, struct msgb *msg)
Philipp Maier6931f9a2018-07-26 09:29:31 +0200497{
498 struct rtp_hdr *rtp_hdr;
Philipp Maier6931f9a2018-07-26 09:29:31 +0200499
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200500 if (msgb_length(msg) < sizeof(struct rtp_hdr)) {
Philipp Maier4c4d2272023-04-26 15:45:17 +0200501 LOG_CONN_RTP(conn_dst, LOGL_NOTICE, "RTP packet too short (%u < %zu)\n",
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200502 msgb_length(msg), sizeof(struct rtp_hdr));
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200503 return -EINVAL;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200504 }
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200505 rtp_hdr = (struct rtp_hdr *)msgb_data(msg);
Philipp Maier6931f9a2018-07-26 09:29:31 +0200506
Philipp Maier4c4d2272023-04-26 15:45:17 +0200507 if (!conn_dst->end.codec) {
508 LOG_CONN_RTP(conn_dst, LOGL_NOTICE, "no codec set on destination connection!\n");
Philipp Maier6931f9a2018-07-26 09:29:31 +0200509 return -EINVAL;
Philipp Maier4c4d2272023-04-26 15:45:17 +0200510 }
511 rtp_hdr->payload_type = (uint8_t) conn_dst->end.codec->payload_type;
Philipp Maier6931f9a2018-07-26 09:29:31 +0200512
Philipp Maier6931f9a2018-07-26 09:29:31 +0200513 return 0;
514}
515
Philipp Maier87bd9be2017-08-22 16:35:41 +0200516/* The RFC 3550 Appendix A assumes there are multiple sources but
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200517 * some of the supported endpoints (e.g. the nanoBTS) can only handle
518 * one source and this code will patch RTP header to appear as if there
519 * is only one source.
520 * There is also no probation period for new sources. Every RTP header
Philipp Maier87bd9be2017-08-22 16:35:41 +0200521 * we receive will be seen as a switch in streams. */
Pau Espin Pedrol8358c4b2021-07-07 12:41:38 +0200522void mgcp_patch_and_count(const struct mgcp_endpoint *endp,
Philipp Maier87bd9be2017-08-22 16:35:41 +0200523 struct mgcp_rtp_state *state,
524 struct mgcp_rtp_end *rtp_end,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200525 struct osmo_sockaddr *addr, struct msgb *msg)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200526{
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200527 char ipbuf[INET6_ADDRSTRLEN];
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200528 uint32_t arrival_time;
529 int32_t transit;
530 uint16_t seq;
531 uint32_t timestamp, ssrc;
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200532 bool marker_bit;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200533 struct rtp_hdr *rtp_hdr;
Philipp Maierbc0346e2018-06-07 09:52:16 +0200534 int payload = rtp_end->codec->payload_type;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200535 unsigned int len = msgb_length(msg);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200536
537 if (len < sizeof(*rtp_hdr))
538 return;
539
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200540 rtp_hdr = (struct rtp_hdr *)msgb_data(msg);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200541 seq = ntohs(rtp_hdr->sequence);
542 timestamp = ntohl(rtp_hdr->timestamp);
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +0100543 arrival_time = mgcp_get_current_ts(rtp_end->codec->rate);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200544 ssrc = ntohl(rtp_hdr->ssrc);
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200545 marker_bit = !!rtp_hdr->marker;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200546 transit = arrival_time - timestamp;
547
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200548 mgcp_rtp_annex_count(endp, state, seq, transit, ssrc, marker_bit);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200549
550 if (!state->initialized) {
551 state->initialized = 1;
552 state->in_stream.last_seq = seq - 1;
Harald Welte33381352017-12-25 09:44:26 +0100553 state->in_stream.ssrc = state->patch.orig_ssrc = ssrc;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200554 state->in_stream.last_tsdelta = 0;
Philipp Maier87bd9be2017-08-22 16:35:41 +0200555 state->packet_duration =
556 mgcp_rtp_packet_duration(endp, rtp_end);
Philipp Maier0ec1d4e2018-05-16 11:09:42 +0200557 state->out_stream.last_seq = seq - 1;
558 state->out_stream.ssrc = state->patch.orig_ssrc = ssrc;
559 state->out_stream.last_tsdelta = 0;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200560 state->out_stream.last_timestamp = timestamp;
Philipp Maier87bd9be2017-08-22 16:35:41 +0200561 state->out_stream.ssrc = ssrc - 1; /* force output SSRC change */
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200562 LOGPENDP(endp, DRTP, LOGL_INFO,
563 "initializing stream, SSRC: %u timestamp: %u "
564 "pkt-duration: %d, from %s:%d\n",
565 state->in_stream.ssrc,
566 state->patch.seq_offset, state->packet_duration,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200567 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
568 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200569 if (state->packet_duration == 0) {
Philipp Maier87bd9be2017-08-22 16:35:41 +0200570 state->packet_duration =
Philipp Maierbc0346e2018-06-07 09:52:16 +0200571 rtp_end->codec->rate * 20 / 1000;
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200572 LOGPENDP(endp, DRTP, LOGL_NOTICE,
573 "fixed packet duration is not available, "
574 "using fixed 20ms instead: %d from %s:%d\n",
575 state->packet_duration,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200576 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
577 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200578 }
579 } else if (state->in_stream.ssrc != ssrc) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200580 LOGPENDP(endp, DRTP, LOGL_NOTICE,
581 "SSRC changed: %u -> %u "
582 "from %s:%d\n",
583 state->in_stream.ssrc, rtp_hdr->ssrc,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200584 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
585 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200586
587 state->in_stream.ssrc = ssrc;
588 if (rtp_end->force_constant_ssrc) {
589 int16_t delta_seq;
590
591 /* Always increment seqno by 1 */
Harald Welte33381352017-12-25 09:44:26 +0100592 state->patch.seq_offset =
Philipp Maier87bd9be2017-08-22 16:35:41 +0200593 (state->out_stream.last_seq + 1) - seq;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200594
595 /* Estimate number of packets that would have been sent */
596 delta_seq =
Philipp Maier87bd9be2017-08-22 16:35:41 +0200597 (arrival_time - state->in_stream.last_arrival_time
598 + state->packet_duration / 2) /
599 state->packet_duration;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200600
601 adjust_rtp_timestamp_offset(endp, state, rtp_end, addr,
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200602 delta_seq, timestamp, marker_bit);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200603
Pau Espin Pedrol4c77e9b2021-07-07 12:12:58 +0200604 state->patch.patch_ssrc = true;
Harald Welte33381352017-12-25 09:44:26 +0100605 ssrc = state->patch.orig_ssrc;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200606 if (rtp_end->force_constant_ssrc != -1)
607 rtp_end->force_constant_ssrc -= 1;
608
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200609 LOGPENDP(endp, DRTP, LOGL_NOTICE,
610 "SSRC patching enabled, SSRC: %u "
611 "SeqNo offset: %d, TS offset: %d "
612 "from %s:%d\n", state->in_stream.ssrc,
613 state->patch.seq_offset, state->patch.timestamp_offset,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200614 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
615 osmo_sockaddr_port(&addr->u.sa));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200616 }
617
618 state->in_stream.last_tsdelta = 0;
619 } else {
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200620 if (!marker_bit) {
621 /* Compute current per-packet timestamp delta */
622 check_rtp_timestamp(endp, state, &state->in_stream, rtp_end,
623 addr, seq, timestamp, "input",
624 &state->in_stream.last_tsdelta);
625 } else {
626 state->in_stream.last_tsdelta = 0;
627 }
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200628
Harald Welte33381352017-12-25 09:44:26 +0100629 if (state->patch.patch_ssrc)
630 ssrc = state->patch.orig_ssrc;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200631 }
632
633 /* Save before patching */
634 state->in_stream.last_timestamp = timestamp;
635 state->in_stream.last_seq = seq;
636 state->in_stream.last_arrival_time = arrival_time;
637
638 if (rtp_end->force_aligned_timing &&
639 state->out_stream.ssrc == ssrc && state->packet_duration)
640 /* Align the timestamp offset */
Philipp Maier87bd9be2017-08-22 16:35:41 +0200641 align_rtp_timestamp_offset(endp, state, rtp_end, addr,
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200642 timestamp, marker_bit);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200643
644 /* Store the updated SSRC back to the packet */
Harald Welte33381352017-12-25 09:44:26 +0100645 if (state->patch.patch_ssrc)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200646 rtp_hdr->ssrc = htonl(ssrc);
647
648 /* Apply the offset and store it back to the packet.
649 * This won't change anything if the offset is 0, so the conditional is
650 * omitted. */
Harald Welte33381352017-12-25 09:44:26 +0100651 seq += state->patch.seq_offset;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200652 rtp_hdr->sequence = htons(seq);
Harald Welte33381352017-12-25 09:44:26 +0100653 timestamp += state->patch.timestamp_offset;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200654 rtp_hdr->timestamp = htonl(timestamp);
655
656 /* Check again, whether the timestamps are still valid */
Pau Espin Pedrolb066bd02021-07-07 13:41:19 +0200657 if (!marker_bit) {
658 if (state->out_stream.ssrc == ssrc)
659 check_rtp_timestamp(endp, state, &state->out_stream, rtp_end,
660 addr, seq, timestamp, "output",
661 &state->out_stream.last_tsdelta);
662 } else {
663 state->out_stream.last_tsdelta = 0;
664 }
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200665
666 /* Save output values */
667 state->out_stream.last_seq = seq;
668 state->out_stream.last_timestamp = timestamp;
669 state->out_stream.ssrc = ssrc;
670
671 if (payload < 0)
672 return;
673
674#if 0
Philipp Maierc66ab2c2020-06-02 20:55:34 +0200675 LOGPENDP(endp, DRTP, LOGL_DEBUG, "payload hdr payload %u -> endp payload %u\n",
676 rtp_hdr->payload_type, payload);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200677 rtp_hdr->payload_type = payload;
678#endif
679}
680
Philipp Maier9fc8a022019-02-20 12:26:52 +0100681/* There are different dialects used to format and transfer voice data. When
682 * the receiving end expects GSM-HR data to be formated after RFC 5993, this
683 * function is used to convert between RFC 5993 and TS 101318, which we normally
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200684 * use.
685 * Return 0 on sucess, negative on errors like invalid data length. */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200686static int rfc5993_hr_convert(struct mgcp_endpoint *endp, struct msgb *msg)
Philipp Maier9fc8a022019-02-20 12:26:52 +0100687{
Philipp Maier9fc8a022019-02-20 12:26:52 +0100688 struct rtp_hdr *rtp_hdr;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200689 if (msgb_length(msg) < sizeof(struct rtp_hdr)) {
Pau Espin Pedrol08077712022-10-19 19:06:45 +0200690 LOGPENDP(endp, DRTP, LOGL_ERROR, "RTP packet too short (%d < %zu)\n",
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200691 msgb_length(msg), sizeof(struct rtp_hdr));
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200692 return -EINVAL;
693 }
694
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200695 rtp_hdr = (struct rtp_hdr *)msgb_data(msg);
Philipp Maier9fc8a022019-02-20 12:26:52 +0100696
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200697 if (msgb_length(msg) == GSM_HR_BYTES + sizeof(struct rtp_hdr)) {
Philipp Maier9fc8a022019-02-20 12:26:52 +0100698 /* TS 101318 encoding => RFC 5993 encoding */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200699 msgb_put(msg, 1);
Philipp Maier9fc8a022019-02-20 12:26:52 +0100700 memmove(rtp_hdr->data + 1, rtp_hdr->data, GSM_HR_BYTES);
701 rtp_hdr->data[0] = 0x00;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200702 } else if (msgb_length(msg) == GSM_HR_BYTES + sizeof(struct rtp_hdr) + 1) {
Philipp Maier9fc8a022019-02-20 12:26:52 +0100703 /* RFC 5993 encoding => TS 101318 encoding */
704 memmove(rtp_hdr->data, rtp_hdr->data + 1, GSM_HR_BYTES);
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200705 msgb_trim(msg, msgb_length(msg) - 1);
Philipp Maier9fc8a022019-02-20 12:26:52 +0100706 } else {
707 /* It is possible that multiple payloads occur in one RTP
708 * packet. This is not supported yet. */
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200709 LOGPENDP(endp, DRTP, LOGL_ERROR,
710 "cannot figure out how to convert RTP packet\n");
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200711 return -ENOTSUP;
Philipp Maier9fc8a022019-02-20 12:26:52 +0100712 }
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200713 return 0;
Philipp Maier9fc8a022019-02-20 12:26:52 +0100714}
715
Pau Espin Pedrol377d3912022-10-25 13:52:19 +0200716/*! Convert msg to AMR RTP framing mode specified by target_is_oa.
717 * \param[in] endp MGCP Endpoint where this message belongs to (used for logging purposes)
718 * \param[in] msg Message containing an AMR RTP payload (in octet-aligned or bandwidth-efficient format).
719 * \param[in] target_is_oa the target framing mode that msg will contain after this function succeeds.
720 * \returns The size of the new RTP AMR content on success, negative on error.
721 *
722 * For AMR RTP two framing modes are defined RFC3267. There is a bandwidth
Philipp Maier228e5912019-03-05 13:56:59 +0100723 * efficient encoding scheme where all fields are packed together one after
724 * another and an octet aligned mode where all fields are aligned to octet
Pau Espin Pedrol377d3912022-10-25 13:52:19 +0200725 * boundaries. This function is used to convert between the two modes.
726 */
727int amr_oa_bwe_convert(struct mgcp_endpoint *endp, struct msgb *msg,
Philipp Maier228e5912019-03-05 13:56:59 +0100728 bool target_is_oa)
729{
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200730 /* NOTE: the msgb has an allocated length of RTP_BUF_SIZE, so there is
Philipp Maier228e5912019-03-05 13:56:59 +0100731 * plenty of space available to store the slightly larger, converted
732 * data */
Philipp Maier228e5912019-03-05 13:56:59 +0100733 struct rtp_hdr *rtp_hdr;
734 unsigned int payload_len;
735 int rc;
Pau Espin Pedrol9ac9cb92022-10-26 12:36:48 +0200736 bool orig_is_oa;
Philipp Maier228e5912019-03-05 13:56:59 +0100737
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200738 if (msgb_length(msg) < sizeof(struct rtp_hdr)) {
739 LOGPENDP(endp, DRTP, LOGL_ERROR, "AMR RTP packet too short (%d < %zu)\n", msgb_length(msg), sizeof(struct rtp_hdr));
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200740 return -EINVAL;
741 }
742
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200743 rtp_hdr = (struct rtp_hdr *)msgb_data(msg);
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200744 payload_len = msgb_length(msg) - sizeof(struct rtp_hdr);
Pau Espin Pedrol9ac9cb92022-10-26 12:36:48 +0200745 orig_is_oa = osmo_amr_is_oa(rtp_hdr->data, payload_len);
Philipp Maier228e5912019-03-05 13:56:59 +0100746
Pau Espin Pedrol9ac9cb92022-10-26 12:36:48 +0200747 if (orig_is_oa) {
Philipp Maier228e5912019-03-05 13:56:59 +0100748 if (!target_is_oa)
749 /* Input data is oa an target format is bwe
750 * ==> convert */
751 rc = osmo_amr_oa_to_bwe(rtp_hdr->data, payload_len);
752 else
753 /* Input data is already bew, but we accept it anyway
754 * ==> no conversion needed */
755 rc = payload_len;
756 } else {
757 if (target_is_oa)
758 /* Input data is bwe an target format is oa
759 * ==> convert */
760 rc = osmo_amr_bwe_to_oa(rtp_hdr->data, payload_len,
761 RTP_BUF_SIZE);
762 else
763 /* Input data is already oa, but we accept it anyway
764 * ==> no conversion needed */
765 rc = payload_len;
766 }
767 if (rc < 0) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200768 LOGPENDP(endp, DRTP, LOGL_ERROR,
Pau Espin Pedrol9ac9cb92022-10-26 12:36:48 +0200769 "RTP AMR packet conversion %s->%s failed: %s\n",
770 orig_is_oa ? "OA" : "BWE",
771 target_is_oa ? "OA" : "BWE",
772 osmo_hexdump(rtp_hdr->data, payload_len));
Philipp Maier228e5912019-03-05 13:56:59 +0100773 return -EINVAL;
774 }
775
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200776 return msgb_trim(msg, rc + sizeof(struct rtp_hdr));
Philipp Maier228e5912019-03-05 13:56:59 +0100777}
778
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200779/* Return whether an RTP packet with AMR payload is in octet-aligned mode.
780 * Return 0 if in bandwidth-efficient mode, 1 for octet-aligned mode, and negative if the RTP data is invalid. */
781static int amr_oa_check(char *data, int len)
Philipp Maier228e5912019-03-05 13:56:59 +0100782{
783 struct rtp_hdr *rtp_hdr;
784 unsigned int payload_len;
785
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200786 if (len < sizeof(struct rtp_hdr))
787 return -EINVAL;
788
Philipp Maier228e5912019-03-05 13:56:59 +0100789 rtp_hdr = (struct rtp_hdr *)data;
790
791 payload_len = len - sizeof(struct rtp_hdr);
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200792 if (payload_len < sizeof(struct amr_hdr))
793 return -EINVAL;
Philipp Maier228e5912019-03-05 13:56:59 +0100794
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +0200795 return osmo_amr_is_oa(rtp_hdr->data, payload_len) ? 1 : 0;
Philipp Maier228e5912019-03-05 13:56:59 +0100796}
797
Philipp Maier87bd9be2017-08-22 16:35:41 +0200798/* Forward data to a debug tap. This is debug function that is intended for
799 * debugging the voice traffic with tools like gstreamer */
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +0100800void forward_data_tap(int fd, struct mgcp_rtp_tap *tap, struct msgb *msg)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200801{
Philipp Maiere6f172d2017-11-07 12:00:01 +0100802 int rc;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200803
Philipp Maiere6f172d2017-11-07 12:00:01 +0100804 if (!tap->enabled)
805 return;
806
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200807 rc = sendto(fd, msgb_data(msg), msgb_length(msg), 0, (struct sockaddr *)&tap->forward,
Philipp Maiere6f172d2017-11-07 12:00:01 +0100808 sizeof(tap->forward));
809
810 if (rc < 0)
811 LOGP(DRTP, LOGL_ERROR,
812 "Forwarding tapped (debug) voice data failed.\n");
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200813}
814
Philipp Maier889fe7f2020-07-06 17:44:12 +0200815/* Generate an RTP header if it is missing */
816static void gen_rtp_header(struct msgb *msg, struct mgcp_rtp_end *rtp_end,
817 struct mgcp_rtp_state *state)
818{
819 struct rtp_hdr *hdr = (struct rtp_hdr *)msgb_data(msg);
820
821 if (hdr->version > 0)
822 return;
823
824 hdr->version = 2;
825 hdr->payload_type = rtp_end->codec->payload_type;
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +0100826 hdr->timestamp = osmo_htonl(mgcp_get_current_ts(rtp_end->codec->rate));
Philipp Maier889fe7f2020-07-06 17:44:12 +0200827 hdr->sequence = osmo_htons(state->alt_rtp_tx_sequence);
828 hdr->ssrc = state->alt_rtp_tx_ssrc;
829}
830
Philipp Maier87bd9be2017-08-22 16:35:41 +0200831/* Check if the origin (addr) matches the address/port data of the RTP
832 * connections. */
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200833static int check_rtp_origin(struct mgcp_conn_rtp *conn, struct osmo_sockaddr *addr)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200834{
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200835 char ipbuf[INET6_ADDRSTRLEN];
836
Pau Espin Pedrol7787a3a2023-12-04 12:05:06 +0100837 if (osmo_sockaddr_is_any(&conn->end.addr) != 0 ||
838 osmo_sockaddr_port(&conn->end.addr.u.sa) == 0) {
Neels Hofmeyr5e101c92023-12-04 03:54:43 +0100839 if (mgcp_conn_rtp_is_iuup(conn) && !conn->iuup.configured) {
840 /* Allow IuUP Initialization to get through even if we don't have a remote address set yet.
841 * This is needed because hNodeB doesn't announce its IuUP remote IP addr to the MGCP client
842 * (RAB Assignment Response at HNBGW) until it has gone through IuUP Initialization against
843 * this MGW here. Hence the MGW may not yet know the remote IuUP address and port at the time
844 * of receiving IuUP Initialization from the hNodeB.
845 */
846 LOGPCONN(conn->conn, DRTP, LOGL_INFO,
847 "Rx RTP from %s: allowing unknown src for IuUP Initialization\n",
848 osmo_sockaddr_to_str(addr));
849 return 0;
850 }
Neels Hofmeyrdd1ddf72023-12-01 01:52:43 +0100851 /* Receiving early media before the endpoint is configured. Instead of logging
852 * this as an error that occurs on every call, keep it more low profile to not
853 * confuse humans with expected errors. */
854 LOGPCONN(conn->conn, DRTP, LOGL_INFO,
855 "Rx RTP from %s, but remote address not set: dropping early media\n",
856 osmo_sockaddr_to_str(addr));
857 return -1;
Neels Hofmeyr0063ca22018-07-23 18:12:16 +0200858 }
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200859
Philipp Maier87bd9be2017-08-22 16:35:41 +0200860 /* Note: Check if the inbound RTP data comes from the same host to
861 * which we send our outgoing RTP traffic. */
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200862 if (conn->end.addr.u.sa.sa_family != addr->u.sa.sa_family ||
863 (conn->end.addr.u.sa.sa_family == AF_INET &&
864 conn->end.addr.u.sin.sin_addr.s_addr != addr->u.sin.sin_addr.s_addr) ||
865 (conn->end.addr.u.sa.sa_family == AF_INET6 &&
866 memcmp(&conn->end.addr.u.sin6.sin6_addr, &addr->u.sin6.sin6_addr,
867 sizeof(struct in6_addr)))) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200868 LOGPCONN(conn->conn, DRTP, LOGL_ERROR,
Pau Espin Pedrola7e6fbc2023-11-30 14:52:16 +0100869 "data from wrong src %s, expected IP Address %s. Packet tossed.\n",
870 osmo_sockaddr_to_str(addr), osmo_sockaddr_ntop(&conn->end.addr.u.sa, ipbuf));
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200871 return -1;
872 }
873
Philipp Maier87bd9be2017-08-22 16:35:41 +0200874 /* Note: Usually the remote remote port of the data we receive will be
875 * the same as the remote port where we transmit outgoing RTP traffic
876 * to (set by MDCX). We use this to check the origin of the data for
877 * plausibility. */
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +0200878 if (osmo_sockaddr_port(&conn->end.addr.u.sa) != osmo_sockaddr_port(&addr->u.sa) &&
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200879 ntohs(conn->end.rtcp_port) != osmo_sockaddr_port(&addr->u.sa)) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200880 LOGPCONN(conn->conn, DRTP, LOGL_ERROR,
Pau Espin Pedrola7e6fbc2023-11-30 14:52:16 +0100881 "data from wrong src %s, expected port: %u for RTP or %u for RTCP. Packet tossed.\n",
882 osmo_sockaddr_to_str(addr), osmo_sockaddr_port(&conn->end.addr.u.sa),
883 ntohs(conn->end.rtcp_port));
Philipp Maier87bd9be2017-08-22 16:35:41 +0200884 return -1;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200885 }
886
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200887 return 0;
888}
889
Philipp Maier87bd9be2017-08-22 16:35:41 +0200890/* Check the if the destination address configuration of an RTP connection
891 * makes sense */
892static int check_rtp_destin(struct mgcp_conn_rtp *conn)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200893{
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200894 char ipbuf[INET6_ADDRSTRLEN];
Pau Espin Pedrol051eb4d2022-10-04 12:50:28 +0200895 bool ip_is_any = osmo_sockaddr_is_any(&conn->end.addr) != 0;
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +0200896 uint16_t port = osmo_sockaddr_port(&conn->end.addr.u.sa);
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200897
Philipp Maiere6df0e42018-05-29 14:03:06 +0200898 /* Note: it is legal to create a connection but never setting a port
899 * and IP-address for outgoing data. */
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +0200900 if (ip_is_any && port == 0) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200901 LOGPCONN(conn->conn, DRTP, LOGL_DEBUG,
Neels Hofmeyra4b677c2021-07-07 23:38:23 +0200902 "destination IP-address and rtp port is not (yet) known (%s:%u)\n",
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +0200903 osmo_sockaddr_ntop(&conn->end.addr.u.sa, ipbuf), port);
Philipp Maiere6df0e42018-05-29 14:03:06 +0200904 return -1;
905 }
906
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +0200907 if (ip_is_any) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200908 LOGPCONN(conn->conn, DRTP, LOGL_ERROR,
909 "destination IP-address is invalid (%s:%u)\n",
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +0200910 osmo_sockaddr_ntop(&conn->end.addr.u.sa, ipbuf), port);
Philipp Maier87bd9be2017-08-22 16:35:41 +0200911 return -1;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200912 }
Philipp Maier87bd9be2017-08-22 16:35:41 +0200913
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +0200914 if (port == 0) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200915 LOGPCONN(conn->conn, DRTP, LOGL_ERROR,
916 "destination rtp port is invalid (%s:%u)\n",
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +0200917 osmo_sockaddr_ntop(&conn->end.addr.u.sa, ipbuf), port);
Philipp Maier87bd9be2017-08-22 16:35:41 +0200918 return -1;
919 }
920
921 return 0;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +0200922}
923
Philipp Maier4dba7692018-08-03 12:20:52 +0200924/* Do some basic checks to make sure that the RTCP packets we are going to
925 * process are not complete garbage */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200926static int check_rtcp(struct mgcp_conn_rtp *conn_src, struct msgb *msg)
Philipp Maier4dba7692018-08-03 12:20:52 +0200927{
928 struct rtcp_hdr *hdr;
929 unsigned int len;
930 uint8_t type;
931
932 /* RTPC packets that are just a header without data do not make
933 * any sense. */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200934 if (msgb_length(msg) < sizeof(struct rtcp_hdr)) {
935 LOG_CONN_RTP(conn_src, LOGL_ERROR, "RTCP packet too short (%u < %zu)\n",
936 msgb_length(msg), sizeof(struct rtcp_hdr));
Philipp Maier4dba7692018-08-03 12:20:52 +0200937 return -EINVAL;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200938 }
Philipp Maier4dba7692018-08-03 12:20:52 +0200939
940 /* Make sure that the length of the received packet does not exceed
941 * the available buffer size */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200942 hdr = (struct rtcp_hdr *)msgb_data(msg);
Philipp Maier4dba7692018-08-03 12:20:52 +0200943 len = (osmo_ntohs(hdr->length) + 1) * 4;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200944 if (len > msgb_length(msg)) {
945 LOG_CONN_RTP(conn_src, LOGL_ERROR, "RTCP header length exceeds packet size (%u > %u)\n",
946 len, msgb_length(msg));
Philipp Maier4dba7692018-08-03 12:20:52 +0200947 return -EINVAL;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200948 }
Philipp Maier4dba7692018-08-03 12:20:52 +0200949
950 /* Make sure we accept only packets that have a proper packet type set
951 * See also: http://www.iana.org/assignments/rtp-parameters/rtp-parameters.xhtml */
952 type = hdr->type;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200953 if ((type < 192 || type > 195) && (type < 200 || type > 213)) {
954 LOG_CONN_RTP(conn_src, LOGL_ERROR, "RTCP header: invalid type: %u\n", type);
Philipp Maier4dba7692018-08-03 12:20:52 +0200955 return -EINVAL;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200956 }
Philipp Maier4dba7692018-08-03 12:20:52 +0200957
958 return 0;
959}
960
961/* Do some basic checks to make sure that the RTP packets we are going to
962 * process are not complete garbage */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200963static int check_rtp(struct mgcp_conn_rtp *conn_src, struct msgb *msg)
Philipp Maier4dba7692018-08-03 12:20:52 +0200964{
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200965 size_t min_size = sizeof(struct rtp_hdr);
966 if (msgb_length(msg) < min_size) {
967 LOG_CONN_RTP(conn_src, LOGL_ERROR, "RTP packet too short (%u < %zu)\n",
968 msgb_length(msg), min_size);
969 return -1;
970 }
Philipp Maier4dba7692018-08-03 12:20:52 +0200971
972 /* FIXME: Add more checks, the reason why we do not check more than
973 * the length is because we currently handle IUUP packets as RTP
974 * packets, so they must pass this check, if we weould be more
975 * strict here, we would possibly break 3G. (see also FIXME note
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +0100976 * below.*/
Philipp Maier4dba7692018-08-03 12:20:52 +0200977
978 return 0;
979}
980
Pau Espin Pedrol6db3f7f2022-10-24 17:55:02 +0200981/*! Dispatch msg bridged from the sister conn in the endpoint.
982 * \param[in] conn_dst The destination conn that should handle and transmit the content to
983 * its peer outside MGW.
984 * \param[in] msg msgb containing an RTP pkt received by the sister conn in the endpoint,
985 * \returns bytes sent, -1 on error.
986 *
987 * Possible options are standard RTP packet transmission, transmission
988 * via IuUP or transmission via an osmux connection.
989 */
990static int mgcp_conn_rtp_dispatch_rtp(struct mgcp_conn_rtp *conn_dst, struct msgb *msg)
Philipp Maier87bd9be2017-08-22 16:35:41 +0200991{
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200992 struct osmo_rtp_msg_ctx *mc = OSMO_RTP_MSG_CTX(msg);
993 enum rtp_proto proto = mc->proto;
994 struct mgcp_conn_rtp *conn_src = mc->conn_src;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +0200995 struct mgcp_endpoint *endp = conn_src->conn->endp;
Philipp Maier87bd9be2017-08-22 16:35:41 +0200996
Pau Espin Pedrol3239f622019-04-24 18:47:46 +0200997 LOGPENDP(endp, DRTP, LOGL_DEBUG, "destin conn:%s\n",
998 mgcp_conn_dump(conn_dst->conn));
Philipp Maier87bd9be2017-08-22 16:35:41 +0200999
1000 /* Before we try to deliver the packet, we check if the destination
1001 * port and IP-Address make sense at all. If not, we will be unable
1002 * to deliver the packet. */
1003 if (check_rtp_destin(conn_dst) != 0)
1004 return -1;
1005
1006 /* Depending on the RTP connection type, deliver the RTP packet to the
1007 * destination connection. */
1008 switch (conn_dst->type) {
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001009 case MGCP_RTP_DEFAULT:
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001010 LOGPENDP(endp, DRTP, LOGL_DEBUG,
1011 "endpoint type is MGCP_RTP_DEFAULT, "
1012 "using mgcp_send() to forward data directly\n");
Philipp Maier87bd9be2017-08-22 16:35:41 +02001013 return mgcp_send(endp, proto == MGCP_PROTO_RTP,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001014 mc->from_addr, msg, conn_src, conn_dst);
Pau Espin Pedrol9d939b62022-10-03 16:59:20 +02001015 case MGCP_RTP_OSMUX:
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001016 LOGPENDP(endp, DRTP, LOGL_DEBUG,
Pau Espin Pedrol9d939b62022-10-03 16:59:20 +02001017 "endpoint type is MGCP_RTP_OSMUX, "
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001018 "using osmux_xfrm_to_osmux() to forward data through OSMUX\n");
Pau Espin Pedrold1e94c72022-10-25 13:49:40 +02001019 return conn_osmux_send_rtp(conn_dst, msg);
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +01001020 case MGCP_RTP_IUUP:
1021 if (proto == MGCP_PROTO_RTP) {
1022 LOGPENDP(endp, DRTP, LOGL_DEBUG,
1023 "endpoint type is MGCP_RTP_IUUP, "
1024 "using mgcp_conn_iuup_send_rtp() to forward data over IuUP\n");
1025 return mgcp_conn_iuup_send_rtp(conn_src, conn_dst, msg);
1026 }
1027 /* RTCP: we forward as usual for regular RTP connection */
1028 LOGPENDP(endp, DRTP, LOGL_DEBUG,
1029 "endpoint type is MGCP_RTP_IUUP and proto!=MGCP_PROTO_RTP, "
1030 "using mgcp_send() to forward data directly\n");
1031 return mgcp_send(endp, false,
1032 mc->from_addr, msg, conn_src, conn_dst);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001033 }
1034
Philipp Maier87bd9be2017-08-22 16:35:41 +02001035 /* If the data has not been handled/forwarded until here, it will
1036 * be discarded, this should not happen, normally the MGCP type
1037 * should be properly set */
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001038 LOGPENDP(endp, DRTP, LOGL_ERROR, "bad MGCP type -- data discarded!\n");
Philipp Maier87bd9be2017-08-22 16:35:41 +02001039
1040 return -1;
1041}
1042
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001043/*! send udp packet.
1044 * \param[in] fd associated file descriptor.
1045 * \param[in] addr destination ip-address.
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001046 * \param[in] buf buffer that holds the data to be send.
1047 * \param[in] len length of the data to be sent.
1048 * \returns bytes sent, -1 on error. */
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001049int mgcp_udp_send(int fd, const struct osmo_sockaddr *addr, const char *buf, int len)
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001050{
1051 char ipbuf[INET6_ADDRSTRLEN];
1052 size_t addr_len;
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001053
1054 LOGP(DRTP, LOGL_DEBUG,
1055 "sending %i bytes length packet to %s:%u ...\n", len,
1056 osmo_sockaddr_ntop(&addr->u.sa, ipbuf),
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001057 osmo_sockaddr_port(&addr->u.sa));
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001058
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001059 if (addr->u.sa.sa_family == AF_INET6) {
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001060 addr_len = sizeof(addr->u.sin6);
1061 } else {
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001062 addr_len = sizeof(addr->u.sin);
1063 }
1064
1065 return sendto(fd, buf, len, 0, &addr->u.sa, addr_len);
1066}
1067
1068/*! send RTP dummy packet (to keep NAT connection open).
1069 * \param[in] endp mcgp endpoint that holds the RTP connection.
1070 * \param[in] conn associated RTP connection.
1071 * \returns bytes sent, -1 on error. */
1072int mgcp_send_dummy(struct mgcp_endpoint *endp, struct mgcp_conn_rtp *conn)
1073{
1074 int rc;
1075 int was_rtcp = 0;
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001076 struct osmo_sockaddr rtcp_addr;
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001077
1078 OSMO_ASSERT(endp);
1079 OSMO_ASSERT(conn);
1080
1081 LOGPCONN(conn->conn, DRTP, LOGL_DEBUG, "sending dummy packet... %s\n",
1082 mgcp_conn_dump(conn->conn));
1083
Pau Espin Pedrola24dcc62021-07-06 17:48:47 +02001084 /* Before we try to deliver the packet, we check if the destination
1085 * port and IP-Address make sense at all. If not, we will be unable
1086 * to deliver the packet. */
1087 if (check_rtp_destin(conn) != 0)
1088 goto failed;
1089
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +01001090 if (mgcp_conn_rtp_is_iuup(conn))
1091 rc = mgcp_conn_iuup_send_dummy(conn);
1092 else
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001093 rc = mgcp_udp_send(conn->end.rtp.fd, &conn->end.addr,
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +01001094 rtp_dummy_payload, sizeof(rtp_dummy_payload));
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001095
1096 if (rc == -1)
1097 goto failed;
1098
1099 if (endp->trunk->omit_rtcp)
1100 return rc;
1101
1102 was_rtcp = 1;
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001103 rtcp_addr = conn->end.addr;
1104 osmo_sockaddr_set_port(&rtcp_addr.u.sa, ntohs(conn->end.rtcp_port));
1105 rc = mgcp_udp_send(conn->end.rtcp.fd, &rtcp_addr,
1106 rtp_dummy_payload, sizeof(rtp_dummy_payload));
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001107
1108 if (rc >= 0)
1109 return rc;
1110
1111failed:
1112 LOGPCONN(conn->conn, DRTP, LOGL_ERROR,
1113 "Failed to send dummy %s packet.\n",
1114 was_rtcp ? "RTCP" : "RTP");
1115
1116 return -1;
1117}
1118
1119/*! Send RTP/RTCP data to a specified destination connection.
1120 * \param[in] endp associated endpoint (for configuration, logging).
1121 * \param[in] is_rtp flag to specify if the packet is of type RTP or RTCP.
Philipp Maiercca1d182023-04-06 15:13:39 +02001122 * \param[in] addr spoofed source address (set to NULL to disable).
1123 * \param[in] msg message buffer that contains the RTP/RTCP data.
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001124 * \param[in] conn_src associated source connection.
1125 * \param[in] conn_dst associated destination connection.
Philipp Maiercca1d182023-04-06 15:13:39 +02001126 * \returns 0 on success, negative on ERROR. */
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001127int mgcp_send(struct mgcp_endpoint *endp, int is_rtp, struct osmo_sockaddr *addr,
1128 struct msgb *msg, struct mgcp_conn_rtp *conn_src,
1129 struct mgcp_conn_rtp *conn_dst)
1130{
1131 /*! When no destination connection is available (e.g. when only one
1132 * connection in loopback mode exists), then the source connection
1133 * shall be specified as destination connection */
1134
1135 struct mgcp_trunk *trunk = endp->trunk;
1136 struct mgcp_rtp_end *rtp_end;
1137 struct mgcp_rtp_state *rtp_state;
1138 char ipbuf[INET6_ADDRSTRLEN];
1139 char *dest_name;
1140 int rc;
1141 int len;
1142
1143 OSMO_ASSERT(conn_src);
1144 OSMO_ASSERT(conn_dst);
1145
1146 if (is_rtp)
1147 LOGPENDP(endp, DRTP, LOGL_DEBUG, "delivering RTP packet...\n");
1148 else
1149 LOGPENDP(endp, DRTP, LOGL_DEBUG, "delivering RTCP packet...\n");
1150
Neels Hofmeyrc1468ef2022-10-24 01:00:26 +02001151 /* Patch the payload type number: translate from conn_src to conn_dst.
1152 * Do not patch for IuUP, where the correct payload type number is already set in bridge_iuup_to_rtp_peer():
1153 * IuUP -> AMR: calls this function, skip patching if conn_src is IuUP.
1154 * {AMR or IuUP} -> IuUP: calls mgcp_udp_send() directly, skipping this function: No need to examine dst. */
1155 if (is_rtp && !mgcp_conn_rtp_is_iuup(conn_src)) {
Philipp Maier3d0676a2023-04-26 15:47:51 +02001156 if (mgcp_patch_pt(conn_dst, msg) < 0) {
1157 LOGPENDP(endp, DRTP, LOGL_NOTICE, "unable to patch payload type RTP packet, discarding...\n");
1158 return -EINVAL;
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001159 }
1160 }
1161
1162 /* Note: In case of loopback configuration, both, the source and the
1163 * destination will point to the same connection. */
1164 rtp_end = &conn_dst->end;
1165 rtp_state = &conn_src->state;
1166 dest_name = conn_dst->conn->name;
1167
1168 /* Ensure we have an alternative SSRC in case we need it, see also
1169 * gen_rtp_header() */
1170 if (rtp_state->alt_rtp_tx_ssrc == 0)
1171 rtp_state->alt_rtp_tx_ssrc = rand();
1172
1173 if (!rtp_end->output_enabled) {
1174 rtpconn_rate_ctr_inc(conn_dst, endp, RTP_DROPPED_PACKETS_CTR);
1175 LOGPENDP(endp, DRTP, LOGL_DEBUG,
1176 "output disabled, drop to %s %s "
1177 "rtp_port:%u rtcp_port:%u\n",
1178 dest_name,
1179 osmo_sockaddr_ntop(&rtp_end->addr.u.sa, ipbuf),
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001180 osmo_sockaddr_port(&rtp_end->addr.u.sa), ntohs(rtp_end->rtcp_port)
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001181 );
1182 } else if (is_rtp) {
1183 int cont;
1184 int nbytes = 0;
1185 int buflen = msgb_length(msg);
1186
1187 /* Make sure we have a valid RTP header, in cases where no RTP
1188 * header is present, we will generate one. */
1189 gen_rtp_header(msg, rtp_end, rtp_state);
1190
1191 do {
1192 /* Run transcoder */
Ericfbf78d12021-08-23 22:31:39 +02001193 cont = endp->trunk->cfg->rtp_processing_cb(endp, rtp_end, (char *)msgb_data(msg), &buflen, RTP_BUF_SIZE);
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001194 if (cont < 0)
1195 break;
1196
1197 if (addr)
1198 mgcp_patch_and_count(endp, rtp_state, rtp_end,
1199 addr, msg);
1200
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +01001201 if (mgcp_conn_rtp_is_iuup(conn_dst) || mgcp_conn_rtp_is_iuup(conn_src)) {
1202 /* the iuup code will correctly transform to the correct AMR mode */
Pau Espin Pedrolcca55242022-10-24 17:14:33 +02001203 } else if (mgcp_codec_amr_align_mode_is_indicated(conn_dst->end.codec)) {
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001204 rc = amr_oa_bwe_convert(endp, msg,
1205 conn_dst->end.codec->param.amr_octet_aligned);
1206 if (rc < 0) {
1207 LOGPENDP(endp, DRTP, LOGL_ERROR,
Pau Espin Pedrol9ac9cb92022-10-26 12:36:48 +02001208 "Error in AMR octet-aligned <-> bandwidth-efficient mode conversion (target=%s)\n",
1209 conn_dst->end.codec->param.amr_octet_aligned ? "octet-aligned" : "bandwidth-efficient");
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001210 break;
1211 }
1212 } else if (rtp_end->rfc5993_hr_convert &&
1213 strcmp(conn_src->end.codec->subtype_name, "GSM-HR-08") == 0) {
1214 rc = rfc5993_hr_convert(endp, msg);
1215 if (rc < 0) {
1216 LOGPENDP(endp, DRTP, LOGL_ERROR, "Error while converting to GSM-HR-08\n");
1217 break;
1218 }
1219 }
1220
1221 LOGPENDP(endp, DRTP, LOGL_DEBUG,
1222 "process/send to %s %s "
1223 "rtp_port:%u rtcp_port:%u\n",
1224 dest_name,
1225 osmo_sockaddr_ntop(&rtp_end->addr.u.sa, ipbuf),
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001226 osmo_sockaddr_port(&rtp_end->addr.u.sa), ntohs(rtp_end->rtcp_port)
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001227 );
1228
1229 /* Forward a copy of the RTP data to a debug ip/port */
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +01001230 forward_data_tap(rtp_end->rtp.fd, &conn_src->tap_out,
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001231 msg);
1232
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001233 len = mgcp_udp_send(rtp_end->rtp.fd, &rtp_end->addr,
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001234 (char *)msgb_data(msg), msgb_length(msg));
1235
1236 if (len <= 0)
1237 return len;
1238
1239 rtpconn_rate_ctr_inc(conn_dst, endp, RTP_PACKETS_TX_CTR);
1240 rtpconn_rate_ctr_add(conn_dst, endp, RTP_OCTETS_TX_CTR, len);
1241 rtp_state->alt_rtp_tx_sequence++;
1242
1243 nbytes += len;
1244 buflen = cont;
1245 } while (buflen > 0);
1246 return nbytes;
1247 } else if (!trunk->omit_rtcp) {
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001248 struct osmo_sockaddr rtcp_addr = rtp_end->addr;
1249 osmo_sockaddr_set_port(&rtcp_addr.u.sa, rtp_end->rtcp_port);
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001250 LOGPENDP(endp, DRTP, LOGL_DEBUG,
1251 "send to %s %s rtp_port:%u rtcp_port:%u\n",
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001252 dest_name, osmo_sockaddr_ntop(&rtcp_addr.u.sa, ipbuf),
1253 osmo_sockaddr_port(&rtp_end->addr.u.sa),
1254 osmo_sockaddr_port(&rtcp_addr.u.sa)
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001255 );
1256
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001257 len = mgcp_udp_send(rtp_end->rtcp.fd, &rtcp_addr,
1258 (char *)msgb_data(msg), msgb_length(msg));
Pau Espin Pedrol62d9df62021-07-06 16:39:09 +02001259
1260 rtpconn_rate_ctr_inc(conn_dst, endp, RTP_PACKETS_TX_CTR);
1261 rtpconn_rate_ctr_add(conn_dst, endp, RTP_OCTETS_TX_CTR, len);
1262 rtp_state->alt_rtp_tx_sequence++;
1263
1264 return len;
1265 }
1266
1267 return 0;
1268}
1269
Pau Espin Pedrolde805b62022-10-03 16:08:58 +02001270/*! Dispatch incoming RTP packet to opposite RTP connection.
1271 * \param[in] msg Message buffer to bridge, coming from source connection.
1272 * msg shall contain "struct osmo_rtp_msg_ctx *" attached in
1273 * "OSMO_RTP_MSG_CTX(msg)".
1274 * \returns 0 on success, -1 on ERROR.
1275 */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001276int mgcp_dispatch_rtp_bridge_cb(struct msgb *msg)
Philipp Maier87bd9be2017-08-22 16:35:41 +02001277{
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001278 struct osmo_rtp_msg_ctx *mc = OSMO_RTP_MSG_CTX(msg);
1279 struct mgcp_conn_rtp *conn_src = mc->conn_src;
1280 struct mgcp_conn *conn = conn_src->conn;
Philipp Maier87bd9be2017-08-22 16:35:41 +02001281 struct mgcp_conn *conn_dst;
Andreas Eversbergaf671782023-07-05 12:51:40 +02001282 struct mgcp_endpoint *endp = conn->endp;
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001283 struct osmo_sockaddr *from_addr = mc->from_addr;
Philipp Maier97a93122021-05-07 22:50:31 +02001284 char ipbuf[INET6_ADDRSTRLEN];
Andreas Eversbergaf671782023-07-05 12:51:40 +02001285 int rc = 0;
Philipp Maier87bd9be2017-08-22 16:35:41 +02001286
1287 /*! NOTE: This callback function implements the endpoint specific
Alexander Chemeris61cf9bb2020-05-11 18:13:53 +03001288 * dispatch behaviour of an rtp bridge/proxy endpoint. It is assumed
Philipp Maier87bd9be2017-08-22 16:35:41 +02001289 * that the endpoint will hold only two connections. This premise
1290 * is used to determine the opposite connection (it is always the
1291 * connection that is not the originating connection). Once the
1292 * destination connection is known the RTP packet is sent via
1293 * the destination connection. */
1294
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +01001295 /* If source is IuUP, we need to handle state, forward it through specific bridge path: */
1296 if (mgcp_conn_rtp_is_iuup(conn_src) && mc->proto == MGCP_PROTO_RTP)
1297 return mgcp_conn_iuup_dispatch_rtp(msg);
Pau Espin Pedrol9aaaab62019-05-15 23:23:27 +02001298
1299 /* Check if the connection is in loopback mode, if yes, just send the
1300 * incoming data back to the origin */
1301 if (conn->mode == MGCP_CONN_LOOPBACK) {
1302 /* When we are in loopback mode, we loop back all incoming
1303 * packets back to their origin. We will use the originating
1304 * address data from the UDP packet header to patch the
1305 * outgoing address in connection on the fly */
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001306 if (osmo_sockaddr_port(&conn->u.rtp.end.addr.u.sa) == 0) {
Philipp Maier97a93122021-05-07 22:50:31 +02001307 memcpy(&conn->u.rtp.end.addr, from_addr,
1308 sizeof(conn->u.rtp.end.addr));
Philipp Maier97a93122021-05-07 22:50:31 +02001309 LOG_CONN_RTP(conn_src, LOGL_NOTICE,
1310 "loopback mode: implicitly using source address (%s:%u) as destination address\n",
1311 osmo_sockaddr_ntop(&from_addr->u.sa, ipbuf),
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001312 osmo_sockaddr_port(&conn->u.rtp.end.addr.u.sa));
Pau Espin Pedrol9aaaab62019-05-15 23:23:27 +02001313 }
Pau Espin Pedrol6db3f7f2022-10-24 17:55:02 +02001314 return mgcp_conn_rtp_dispatch_rtp(conn_src, msg);
Pau Espin Pedrol9aaaab62019-05-15 23:23:27 +02001315 }
1316
Andreas Eversbergaf671782023-07-05 12:51:40 +02001317 /* If the mode does not allow receiving RTP, we are done. */
1318 switch (conn->mode) {
1319 case MGCP_CONN_RECV_ONLY:
1320 case MGCP_CONN_RECV_SEND:
1321 case MGCP_CONN_CONFECHO:
1322 break;
1323 default:
1324 return rc;
Philipp Maier87bd9be2017-08-22 16:35:41 +02001325 }
1326
Andreas Eversbergaf671782023-07-05 12:51:40 +02001327 /* If the mode is "confecho", send RTP back to the sender. */
1328 if (conn->mode == MGCP_CONN_CONFECHO)
1329 rc = mgcp_conn_rtp_dispatch_rtp(conn_src, msg);
Philipp Maier87bd9be2017-08-22 16:35:41 +02001330
Andreas Eversbergaf671782023-07-05 12:51:40 +02001331 /* Dispatch RTP packet to all other connection(s) that send audio. */
1332 llist_for_each_entry(conn_dst, &endp->conns, entry) {
1333 if (conn_dst == conn)
1334 continue;
1335 switch (conn_dst->mode) {
1336 case MGCP_CONN_SEND_ONLY:
1337 case MGCP_CONN_RECV_SEND:
1338 case MGCP_CONN_CONFECHO:
1339 rc = mgcp_conn_rtp_dispatch_rtp(&conn_dst->u.rtp, msg);
1340 break;
1341 default:
1342 break;
1343 }
Philipp Maier87bd9be2017-08-22 16:35:41 +02001344 }
Andreas Eversbergaf671782023-07-05 12:51:40 +02001345 return rc;
Philipp Maier87bd9be2017-08-22 16:35:41 +02001346}
1347
Philipp Maier0996a1e2020-06-10 15:27:14 +02001348/*! dispatch incoming RTP packet to E1 subslot, handle RTCP packets locally.
1349 * \param[in] proto protocol (MGCP_CONN_TYPE_RTP or MGCP_CONN_TYPE_RTCP).
1350 * \param[in] addr socket address where the RTP packet has been received from.
1351 * \param[in] buf buffer that hold the RTP payload.
1352 * \param[in] buf_size size data length of buf.
1353 * \param[in] conn originating connection.
1354 * \returns 0 on success, -1 on ERROR. */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001355int mgcp_dispatch_e1_bridge_cb(struct msgb *msg)
Philipp Maier0996a1e2020-06-10 15:27:14 +02001356{
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001357 struct osmo_rtp_msg_ctx *mc = OSMO_RTP_MSG_CTX(msg);
1358 struct mgcp_conn_rtp *conn_src = mc->conn_src;
1359 struct mgcp_conn *conn = conn_src->conn;
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001360 struct osmo_sockaddr *from_addr = mc->from_addr;
Philipp Maier97a93122021-05-07 22:50:31 +02001361 char ipbuf[INET6_ADDRSTRLEN];
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001362
Philipp Maier889fe7f2020-07-06 17:44:12 +02001363 /* Check if the connection is in loopback mode, if yes, just send the
1364 * incoming data back to the origin */
1365 if (conn->mode == MGCP_CONN_LOOPBACK) {
1366 /* When we are in loopback mode, we loop back all incoming
1367 * packets back to their origin. We will use the originating
1368 * address data from the UDP packet header to patch the
1369 * outgoing address in connection on the fly */
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001370 if (osmo_sockaddr_port(&conn->u.rtp.end.addr.u.sa) == 0) {
Philipp Maier97a93122021-05-07 22:50:31 +02001371 memcpy(&conn->u.rtp.end.addr, from_addr,
1372 sizeof(conn->u.rtp.end.addr));
Philipp Maier97a93122021-05-07 22:50:31 +02001373 LOG_CONN_RTP(conn_src, LOGL_NOTICE,
1374 "loopback mode: implicitly using source address (%s:%u) as destination address\n",
1375 osmo_sockaddr_ntop(&from_addr->u.sa, ipbuf),
Pau Espin Pedrol5ffd1272022-10-04 13:45:48 +02001376 osmo_sockaddr_port(&conn->u.rtp.end.addr.u.sa));
Philipp Maier889fe7f2020-07-06 17:44:12 +02001377 }
Pau Espin Pedrol6db3f7f2022-10-24 17:55:02 +02001378 return mgcp_conn_rtp_dispatch_rtp(conn_src, msg);
Philipp Maier889fe7f2020-07-06 17:44:12 +02001379 }
1380
1381 /* Forward to E1 */
1382 return mgcp_e1_send_rtp(conn->endp, conn->u.rtp.end.codec, msg);
Philipp Maier0996a1e2020-06-10 15:27:14 +02001383}
1384
Philipp Maierdf5d2192018-01-24 11:39:32 +01001385/*! cleanup an endpoint when a connection on an RTP bridge endpoint is removed.
1386 * \param[in] endp Endpoint on which the connection resides.
Philipp Maier08eb9352020-06-18 11:55:35 +02001387 * \param[in] conn Connection that is about to be removed (ignored). */
Philipp Maierdf5d2192018-01-24 11:39:32 +01001388void mgcp_cleanup_rtp_bridge_cb(struct mgcp_endpoint *endp, struct mgcp_conn *conn)
1389{
1390 struct mgcp_conn *conn_cleanup;
1391
1392 /* In mgcp_dispatch_rtp_bridge_cb() we use conn->priv to cache the
1393 * pointer to the destination connection, so that we do not have
1394 * to go through the list every time an RTP packet arrives. To prevent
1395 * a use-after-free situation we invalidate this information for all
1396 * connections present when one connection is removed from the
1397 * endpoint. */
1398 llist_for_each_entry(conn_cleanup, &endp->conns, entry) {
Pau Espin Pedrol6d0a59a2020-09-08 16:50:22 +02001399 if (conn_cleanup->priv == conn)
1400 conn_cleanup->priv = NULL;
Philipp Maierdf5d2192018-01-24 11:39:32 +01001401 }
1402}
1403
Philipp Maier0996a1e2020-06-10 15:27:14 +02001404/*! cleanup an endpoint when a connection on an E1 endpoint is removed.
1405 * \param[in] endp Endpoint on which the connection resides.
1406 * \param[in] conn Connection that is about to be removed (ignored). */
1407void mgcp_cleanup_e1_bridge_cb(struct mgcp_endpoint *endp, struct mgcp_conn *conn)
1408{
Philipp Maier889fe7f2020-07-06 17:44:12 +02001409 /* Cleanup tasks for E1 are the same as for regular endpoint. The
1410 * shut down of the E1 part is handled separately. */
1411 mgcp_cleanup_rtp_bridge_cb(endp, conn);
Philipp Maier0996a1e2020-06-10 15:27:14 +02001412}
1413
Philipp Maier87bd9be2017-08-22 16:35:41 +02001414/* Handle incoming RTP data from NET */
1415static int rtp_data_net(struct osmo_fd *fd, unsigned int what)
1416{
1417 /* NOTE: This is a generic implementation. RTP data is received. In
1418 * case of loopback the data is just sent back to its origin. All
1419 * other cases implement endpoint specific behaviour (e.g. how is the
1420 * destination connection determined?). That specific behaviour is
1421 * implemented by the callback function that is called at the end of
1422 * the function */
1423
1424 struct mgcp_conn_rtp *conn_src;
1425 struct mgcp_endpoint *endp;
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001426 struct osmo_sockaddr addr;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001427 socklen_t slen = sizeof(addr);
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001428 char ipbuf[INET6_ADDRSTRLEN];
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001429 int ret;
1430 enum rtp_proto proto;
1431 struct osmo_rtp_msg_ctx *mc;
Eric8f333032021-08-13 00:00:43 +02001432 struct msgb *msg;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001433 int rc;
Philipp Maier87bd9be2017-08-22 16:35:41 +02001434
1435 conn_src = (struct mgcp_conn_rtp *)fd->data;
1436 OSMO_ASSERT(conn_src);
1437 endp = conn_src->conn->endp;
1438 OSMO_ASSERT(endp);
Eric8f333032021-08-13 00:00:43 +02001439 msg = msgb_alloc_c(endp->trunk, RTP_BUF_SIZE, "RTP-rx");
Philipp Maier87bd9be2017-08-22 16:35:41 +02001440
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001441 proto = (fd == &conn_src->end.rtp)? MGCP_PROTO_RTP : MGCP_PROTO_RTCP;
Philipp Maier87bd9be2017-08-22 16:35:41 +02001442
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001443 ret = recvfrom(fd->fd, msgb_data(msg), msg->data_len, 0, (struct sockaddr *)&addr.u.sa, &slen);
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001444
1445 if (ret <= 0) {
1446 LOG_CONN_RTP(conn_src, LOGL_ERROR, "recvfrom error: %s\n", strerror(errno));
1447 rc = -1;
1448 goto out;
1449 }
1450
1451 msgb_put(msg, ret);
1452
1453 LOG_CONN_RTP(conn_src, LOGL_DEBUG, "%s: rx %u bytes from %s:%u\n",
Philipp Maier069dd162022-03-30 16:09:22 +02001454 proto == MGCP_PROTO_RTP ? "RTP" : "RTCP",
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001455 msgb_length(msg), osmo_sockaddr_ntop(&addr.u.sa, ipbuf),
1456 osmo_sockaddr_port(&addr.u.sa));
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001457
1458 if ((proto == MGCP_PROTO_RTP && check_rtp(conn_src, msg))
1459 || (proto == MGCP_PROTO_RTCP && check_rtcp(conn_src, msg))) {
1460 /* Logging happened in the two check_ functions */
1461 rc = -1;
1462 goto out;
1463 }
1464
Philipp Maierb3d14eb2021-05-20 14:18:52 +02001465 if (mgcp_is_rtp_dummy_payload(msg)) {
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001466 LOG_CONN_RTP(conn_src, LOGL_DEBUG, "rx dummy packet (dropped)\n");
1467 rc = 0;
1468 goto out;
1469 }
1470
1471 /* Since the msgb remains owned and freed by this function, the msg ctx data struct can just be on the stack and
1472 * needs not be allocated with the msgb. */
1473 mc = OSMO_RTP_MSG_CTX(msg);
1474 *mc = (struct osmo_rtp_msg_ctx){
1475 .proto = proto,
1476 .conn_src = conn_src,
1477 .from_addr = &addr,
1478 };
1479 LOG_CONN_RTP(conn_src, LOGL_DEBUG, "msg ctx: %d %p %s\n",
1480 mc->proto, mc->conn_src,
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001481 osmo_hexdump((void*)mc->from_addr,
1482 mc->from_addr->u.sa.sa_family == AF_INET6 ?
1483 sizeof(struct sockaddr_in6) :
1484 sizeof(struct sockaddr_in)));
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001485
1486 /* Increment RX statistics */
Pau Espin Pedroldaf5bce2022-09-22 19:14:24 +02001487 rate_ctr_inc(rate_ctr_group_get_ctr(conn_src->ctrg, RTP_PACKETS_RX_CTR));
1488 rate_ctr_add(rate_ctr_group_get_ctr(conn_src->ctrg, RTP_OCTETS_RX_CTR), msgb_length(msg));
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001489 /* FIXME: count RTP and RTCP separately, also count IuUP payload-less separately */
1490
1491 /* Forward a copy of the RTP data to a debug ip/port */
Pau Espin Pedrolbb3ccde2021-12-23 19:49:26 +01001492 forward_data_tap(fd->fd, &conn_src->tap_in, msg);
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001493
1494 rc = rx_rtp(msg);
1495
1496out:
1497 msgb_free(msg);
1498 return rc;
1499}
1500
Philipp Maiere1442752022-03-30 16:06:15 +02001501/* Note: This function is able to handle RTP and RTCP */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001502static int rx_rtp(struct msgb *msg)
1503{
1504 struct osmo_rtp_msg_ctx *mc = OSMO_RTP_MSG_CTX(msg);
1505 struct mgcp_conn_rtp *conn_src = mc->conn_src;
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001506 struct osmo_sockaddr *from_addr = mc->from_addr;
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001507 struct mgcp_conn *conn = conn_src->conn;
1508 struct mgcp_trunk *trunk = conn->endp->trunk;
1509
1510 LOG_CONN_RTP(conn_src, LOGL_DEBUG, "rx_rtp(%u bytes)\n", msgb_length(msg));
Philipp Maier87bd9be2017-08-22 16:35:41 +02001511
Pau Espin Pedrol58c0b0a2022-10-24 17:36:13 +02001512 /* Check if the origin of the RTP packet seems plausible */
1513 if (!trunk->rtp_accept_all && check_rtp_origin(conn_src, from_addr))
1514 return -1;
Oliver Smithe36b7752019-01-22 16:31:36 +01001515
Philipp Maier82dfb502023-01-19 14:27:17 +01001516 /* Handle AMR frame format conversion (octet-aligned vs. bandwith-efficient) */
Neels Hofmeyr677b5392023-12-08 06:49:32 +01001517 if (mc->proto == MGCP_PROTO_RTP
1518 && conn_src->end.codec
1519 && mgcp_codec_amr_align_mode_is_indicated(conn_src->end.codec)) {
Philipp Maier82dfb502023-01-19 14:27:17 +01001520 /* Make sure that the incoming AMR frame format matches the frame format that the call agent has
1521 * communicated via SDP when the connection was created/modfied. */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001522 int oa = amr_oa_check((char*)msgb_data(msg), msgb_length(msg));
Neels Hofmeyr7c6dd3c2019-08-20 03:06:17 +02001523 if (oa < 0)
1524 return -1;
Pau Espin Pedrold266c372022-10-24 16:57:39 +02001525 if (((bool)oa) != conn_src->end.codec->param.amr_octet_aligned) {
1526 LOG_CONN_RTP(conn_src, LOGL_NOTICE,
1527 "rx_rtp(%u bytes): Expected RTP AMR octet-aligned=%u but got octet-aligned=%u."
1528 " check the config of your call-agent!\n",
1529 msgb_length(msg), conn_src->end.codec->param.amr_octet_aligned, oa);
Philipp Maier228e5912019-03-05 13:56:59 +01001530 return -1;
Pau Espin Pedrold266c372022-10-24 16:57:39 +02001531 }
Philipp Maier228e5912019-03-05 13:56:59 +01001532 }
1533
Pau Espin Pedrol58c0b0a2022-10-24 17:36:13 +02001534 mgcp_conn_watchdog_kick(conn_src->conn);
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001535
Philipp Maier87bd9be2017-08-22 16:35:41 +02001536 /* Execute endpoint specific implementation that handles the
1537 * dispatching of the RTP data */
Neels Hofmeyr51b42ff2020-06-19 01:34:42 +02001538 return conn->endp->type->dispatch_rtp_cb(msg);
Philipp Maier87bd9be2017-08-22 16:35:41 +02001539}
1540
Philipp Maier87bd9be2017-08-22 16:35:41 +02001541/*! bind RTP port to osmo_fd.
Philipp Maier0b79d212020-06-18 12:02:49 +02001542 * \param[in] source_addr source (local) address to bind on.
1543 * \param[in] fd associated file descriptor.
1544 * \param[in] port to bind on.
Harald Welte55a92292021-04-28 19:06:34 +02001545 * \param[in] dscp IP DSCP value to use.
1546 * \param[in] prio socket priority to use.
Philipp Maier0b79d212020-06-18 12:02:49 +02001547 * \returns 0 on success, -1 on ERROR. */
Harald Welte55a92292021-04-28 19:06:34 +02001548int mgcp_create_bind(const char *source_addr, struct osmo_fd *fd, int port, uint8_t dscp,
1549 uint8_t prio)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001550{
Harald Welte8890dfa2017-11-17 15:09:30 +01001551 int rc;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001552
Pau Espin Pedrola790f0c2020-08-31 13:29:11 +02001553 rc = osmo_sock_init2(AF_UNSPEC, SOCK_DGRAM, IPPROTO_UDP, source_addr, port,
Harald Welte55a92292021-04-28 19:06:34 +02001554 NULL, 0, OSMO_SOCK_F_BIND | OSMO_SOCK_F_DSCP(dscp) |
1555 OSMO_SOCK_F_PRIO(prio));
Harald Welte8890dfa2017-11-17 15:09:30 +01001556 if (rc < 0) {
Philipp Maierc3413882017-10-27 12:26:54 +02001557 LOGP(DRTP, LOGL_ERROR, "failed to bind UDP port (%s:%i).\n",
Philipp Maier87bd9be2017-08-22 16:35:41 +02001558 source_addr, port);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001559 return -1;
1560 }
Harald Welte8890dfa2017-11-17 15:09:30 +01001561 fd->fd = rc;
1562 LOGP(DRTP, LOGL_DEBUG, "created socket + bound UDP port (%s:%i).\n", source_addr, port);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001563
1564 return 0;
1565}
1566
Philipp Maier87bd9be2017-08-22 16:35:41 +02001567/* Bind RTP and RTCP port (helper function for mgcp_bind_net_rtp_port()) */
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001568static int bind_rtp(struct mgcp_config *cfg, const char *source_addr,
Philipp Maierc66ab2c2020-06-02 20:55:34 +02001569 struct mgcp_rtp_end *rtp_end, struct mgcp_endpoint *endp)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001570{
Philipp Maier87bd9be2017-08-22 16:35:41 +02001571 /* NOTE: The port that is used for RTCP is the RTP port incremented by one
1572 * (e.g. RTP-Port = 16000 ==> RTCP-Port = 16001) */
1573
Harald Welte55a92292021-04-28 19:06:34 +02001574 if (mgcp_create_bind(source_addr, &rtp_end->rtp, rtp_end->local_port,
1575 cfg->endp_dscp, cfg->endp_priority) != 0) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001576 LOGPENDP(endp, DRTP, LOGL_ERROR,
1577 "failed to create RTP port: %s:%d\n",
1578 source_addr, rtp_end->local_port);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001579 goto cleanup0;
1580 }
1581
Harald Welte55a92292021-04-28 19:06:34 +02001582 if (mgcp_create_bind(source_addr, &rtp_end->rtcp, rtp_end->local_port + 1,
1583 cfg->endp_dscp, cfg->endp_priority) != 0) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001584 LOGPENDP(endp, DRTP, LOGL_ERROR,
1585 "failed to create RTCP port: %s:%d\n",
1586 source_addr, rtp_end->local_port + 1);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001587 goto cleanup1;
1588 }
1589
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001590 if (osmo_fd_register(&rtp_end->rtp) != 0) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001591 LOGPENDP(endp, DRTP, LOGL_ERROR,
1592 "failed to register RTP port %d\n",
1593 rtp_end->local_port);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001594 goto cleanup2;
1595 }
1596
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001597 if (osmo_fd_register(&rtp_end->rtcp) != 0) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001598 LOGPENDP(endp, DRTP, LOGL_ERROR,
1599 "failed to register RTCP port %d\n",
1600 rtp_end->local_port + 1);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001601 goto cleanup3;
1602 }
1603
1604 return 0;
1605
1606cleanup3:
1607 osmo_fd_unregister(&rtp_end->rtp);
1608cleanup2:
1609 close(rtp_end->rtcp.fd);
1610 rtp_end->rtcp.fd = -1;
1611cleanup1:
1612 close(rtp_end->rtp.fd);
1613 rtp_end->rtp.fd = -1;
1614cleanup0:
1615 return -1;
1616}
1617
Philipp Maier87bd9be2017-08-22 16:35:41 +02001618/*! bind RTP port to endpoint/connection.
Philipp Maier0b79d212020-06-18 12:02:49 +02001619 * \param[in] endp endpoint that holds the RTP connection.
1620 * \param[in] rtp_port port number to bind on.
1621 * \param[in] conn associated RTP connection.
1622 * \returns 0 on success, -1 on ERROR. */
Philipp Maier87bd9be2017-08-22 16:35:41 +02001623int mgcp_bind_net_rtp_port(struct mgcp_endpoint *endp, int rtp_port,
1624 struct mgcp_conn_rtp *conn)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001625{
Philipp Maier87bd9be2017-08-22 16:35:41 +02001626 char name[512];
1627 struct mgcp_rtp_end *end;
1628
Philipp Maier01d24a32017-11-21 17:26:09 +01001629 snprintf(name, sizeof(name), "%s-%s", conn->conn->name, conn->conn->id);
Philipp Maier87bd9be2017-08-22 16:35:41 +02001630 end = &conn->end;
1631
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001632 if (end->rtp.fd != -1 || end->rtcp.fd != -1) {
Pau Espin Pedrol3239f622019-04-24 18:47:46 +02001633 LOGPENDP(endp, DRTP, LOGL_ERROR, "%u was already bound on conn:%s\n",
1634 rtp_port, mgcp_conn_dump(conn->conn));
Philipp Maier87bd9be2017-08-22 16:35:41 +02001635
1636 /* Double bindings should never occour! Since we always allocate
1637 * connections dynamically and free them when they are not
1638 * needed anymore, there must be no previous binding leftover.
1639 * Should there be a connection bound twice, we have a serious
1640 * problem and must exit immediately! */
1641 OSMO_ASSERT(false);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001642 }
1643
1644 end->local_port = rtp_port;
Harald Weltec2a8f592020-10-19 13:25:41 +02001645 osmo_fd_setup(&end->rtp, -1, OSMO_FD_READ, rtp_data_net, conn, 0);
1646 osmo_fd_setup(&end->rtcp, -1, OSMO_FD_READ, rtp_data_net, conn, 0);
Philipp Maier87bd9be2017-08-22 16:35:41 +02001647
Ericfbf78d12021-08-23 22:31:39 +02001648 return bind_rtp(endp->trunk->cfg, conn->end.local_addr, end, endp);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001649}
1650
Philipp Maier87bd9be2017-08-22 16:35:41 +02001651/*! free allocated RTP and RTCP ports.
1652 * \param[in] end RTP end */
1653void mgcp_free_rtp_port(struct mgcp_rtp_end *end)
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001654{
1655 if (end->rtp.fd != -1) {
Pau Espin Pedrol6c303662023-03-09 18:34:12 +01001656 osmo_fd_unregister(&end->rtp);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001657 close(end->rtp.fd);
1658 end->rtp.fd = -1;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001659 }
1660
1661 if (end->rtcp.fd != -1) {
Pau Espin Pedrol6c303662023-03-09 18:34:12 +01001662 osmo_fd_unregister(&end->rtcp);
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001663 close(end->rtcp.fd);
1664 end->rtcp.fd = -1;
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001665 }
Neels Hofmeyrf83ec562017-09-07 19:18:40 +02001666}