blob: d32659f5603f8b1ee395c561b4b021689f942ccd [file] [log] [blame]
Harald Weltea183a6e2016-06-17 00:06:42 +02001/* Osmocom Visitor Location Register (VLR): Location Update FSMs */
2
3/* (C) 2016 by Harald Welte <laforge@gnumonks.org>
4 *
5 * All Rights Reserved
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
16 *
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 *
20 */
21
22#include <osmocom/core/fsm.h>
23#include <osmocom/gsm/gsup.h>
24#include <openbsc/vlr.h>
25#include <openbsc/debug.h>
26
27#include "vlr_core.h"
28#include "vlr_auth_fsm.h"
29#include "vlr_lu_fsm.h"
30
31#define S(x) (1 << (x))
32
33#define LU_TIMEOUT_LONG 30
34
35enum vlr_fsm_result {
36 VLR_FSM_RESULT_NONE,
37 VLR_FSM_RESULT_SUCCESS,
38 VLR_FSM_RESULT_FAILURE,
39};
40
41
42/***********************************************************************
43 * Update_HLR_VLR, TS 23.012 Chapter 4.1.2.4
44 ***********************************************************************/
45
46enum upd_hlr_vlr_state {
47 UPD_HLR_VLR_S_INIT,
48 UPD_HLR_VLR_S_WAIT_FOR_DATA,
49 UPD_HLR_VLR_S_DONE,
50};
51
52enum upd_hlr_vlr_evt {
53 UPD_HLR_VLR_E_START,
54 UPD_HLR_VLR_E_INS_SUB_DATA,
55 UPD_HLR_VLR_E_ACT_TRACE_MODE,
56 UPD_HLR_VLR_E_FW_CHECK_SS_IND,
57 UPD_HLR_VLR_E_UPD_LOC_ACK,
58 UPD_HLR_VLR_E_UPD_LOC_NACK,
59};
60
61static const struct value_string upd_hlr_vlr_event_names[] = {
62 OSMO_VALUE_STRING(UPD_HLR_VLR_E_START),
63 OSMO_VALUE_STRING(UPD_HLR_VLR_E_INS_SUB_DATA),
64 OSMO_VALUE_STRING(UPD_HLR_VLR_E_ACT_TRACE_MODE),
65 OSMO_VALUE_STRING(UPD_HLR_VLR_E_FW_CHECK_SS_IND),
66 OSMO_VALUE_STRING(UPD_HLR_VLR_E_UPD_LOC_ACK),
67 OSMO_VALUE_STRING(UPD_HLR_VLR_E_UPD_LOC_NACK),
68 { 0, NULL }
69};
70
71static void upd_hlr_vlr_fsm_init(struct osmo_fsm_inst *fi, uint32_t event,
72 void *data)
73{
74 struct vlr_subscr *vsub = fi->priv;
75
76 OSMO_ASSERT(event == UPD_HLR_VLR_E_START);
77
78 /* Send UpdateLocation to HLR */
79 vlr_subscr_req_lu(vsub, vsub->vlr->cfg.is_ps);
80 osmo_fsm_inst_state_chg(fi, UPD_HLR_VLR_S_WAIT_FOR_DATA,
81 LU_TIMEOUT_LONG, 0);
82}
83
84static void upd_hlr_vlr_fsm_wait_data(struct osmo_fsm_inst *fi, uint32_t event,
85 void *data)
86{
87 struct vlr_subscr *vsub = fi->priv;
88
89 switch (event) {
90 case UPD_HLR_VLR_E_INS_SUB_DATA:
91 /* FIXME: Insert_Subscr_Data_VLR */
92 break;
93 case UPD_HLR_VLR_E_ACT_TRACE_MODE:
94 /* TODO: Activate_Tracing_VLR */
95 break;
96 case UPD_HLR_VLR_E_FW_CHECK_SS_IND:
97 /* TODO: Forward Check SS Ind to MSC */
98 break;
99 case UPD_HLR_VLR_E_UPD_LOC_ACK:
100 /* Inside Update_HLR_VLR after UpdateLocationAck */
101 vsub->sub_dataconf_by_hlr_ind = true;
102 vsub->loc_conf_in_hlr_ind = true;
103 osmo_fsm_inst_state_chg(fi, UPD_HLR_VLR_S_DONE, 0, 0);
104 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, NULL);
105 break;
106 case UPD_HLR_VLR_E_UPD_LOC_NACK:
107 /* Inside Update_HLR_VLR after UpdateLocationNack */
108 /* TODO: Check_User_Error_In_Serving_Network_Entity */
109 vsub->sub_dataconf_by_hlr_ind = false;
110 vsub->loc_conf_in_hlr_ind = false;
111 osmo_fsm_inst_state_chg(fi, UPD_HLR_VLR_S_DONE, 0, 0);
112 /* Data is a pointer to a gsm48_gmm_cause which we
113 * simply pass through */
114 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, data);
115 break;
116 }
117}
118
119static const struct osmo_fsm_state upd_hlr_vlr_states[] = {
120 [UPD_HLR_VLR_S_INIT] = {
121 .in_event_mask = S(UPD_HLR_VLR_E_START),
122 .out_state_mask = S(UPD_HLR_VLR_S_WAIT_FOR_DATA),
123 .name = OSMO_STRINGIFY(UPD_HLR_VLR_S_INIT),
124 .action = upd_hlr_vlr_fsm_init,
125 },
126 [UPD_HLR_VLR_S_WAIT_FOR_DATA] = {
127 .in_event_mask = S(UPD_HLR_VLR_E_INS_SUB_DATA) |
128 S(UPD_HLR_VLR_E_ACT_TRACE_MODE) |
129 S(UPD_HLR_VLR_E_FW_CHECK_SS_IND) |
130 S(UPD_HLR_VLR_E_UPD_LOC_ACK) |
131 S(UPD_HLR_VLR_E_UPD_LOC_NACK),
132 .out_state_mask = S(UPD_HLR_VLR_S_DONE),
133 .name = OSMO_STRINGIFY(UPD_HLR_VLR_S_WAIT_FOR_DATA),
134 .action = upd_hlr_vlr_fsm_wait_data,
135 },
136 [UPD_HLR_VLR_S_DONE] = {
137 .name = OSMO_STRINGIFY(UPD_HLR_VLR_S_DONE),
138 },
139};
140
141static struct osmo_fsm upd_hlr_vlr_fsm = {
142 .name = "upd_hlr_vlr_fsm",
143 .states = upd_hlr_vlr_states,
144 .num_states = ARRAY_SIZE(upd_hlr_vlr_states),
145 .allstate_event_mask = 0,
146 .allstate_action = NULL,
147 .log_subsys = DVLR,
148 .event_names = upd_hlr_vlr_event_names,
149};
150
151struct osmo_fsm_inst *
152upd_hlr_vlr_proc_start(struct osmo_fsm_inst *parent,
153 struct vlr_subscr *vsub,
154 uint32_t parent_event)
155{
156 struct osmo_fsm_inst *fi;
157
158 fi = osmo_fsm_inst_alloc_child(&upd_hlr_vlr_fsm, parent,
159 parent_event);
160 if (!fi)
161 return NULL;
162
163 fi->priv = vsub;
164 osmo_fsm_inst_dispatch(fi, UPD_HLR_VLR_E_START, NULL);
165
166 return fi;
167}
168
169
170/***********************************************************************
171 * Subscriber_Present_VLR, TS 29.002 Chapter 25.10.1
172 ***********************************************************************/
173
174enum sub_pres_vlr_state {
175 SUB_PRES_VLR_S_INIT,
176 SUB_PRES_VLR_S_WAIT_FOR_HLR,
177 SUB_PRES_VLR_S_DONE,
178};
179
180enum sub_pres_vlr_event {
181 SUB_PRES_VLR_E_START,
182 SUB_PRES_VLR_E_READY_SM_CNF,
183 SUB_PRES_VLR_E_READY_SM_ERR,
184};
185
186static const struct value_string sub_pres_vlr_event_names[] = {
187 OSMO_VALUE_STRING(SUB_PRES_VLR_E_START),
188 OSMO_VALUE_STRING(SUB_PRES_VLR_E_READY_SM_CNF),
189 OSMO_VALUE_STRING(SUB_PRES_VLR_E_READY_SM_ERR),
190 { 0, NULL }
191};
192
193static void sub_pres_vlr_fsm_init(struct osmo_fsm_inst *fi, uint32_t event,
194 void *data)
195{
196 struct vlr_subscr *vsub = fi->priv;
197 OSMO_ASSERT(event == SUB_PRES_VLR_E_START);
198
199 if (!vsub->ms_not_reachable_flag) {
200 osmo_fsm_inst_state_chg(fi, SUB_PRES_VLR_S_DONE, 0, 0);
201 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, NULL);
202 return;
203 }
204 /* FIXME: Send READY_FOR_SM via GSUP */
205 osmo_fsm_inst_state_chg(fi, SUB_PRES_VLR_S_WAIT_FOR_HLR,
206 LU_TIMEOUT_LONG, 0);
207}
208
209static void sub_pres_vlr_fsm_wait_hlr(struct osmo_fsm_inst *fi, uint32_t event,
210 void *data)
211{
212 struct vlr_subscr *vsub = fi->priv;
213
214 switch (event) {
215 case SUB_PRES_VLR_E_READY_SM_CNF:
216 vsub->ms_not_reachable_flag = false;
217 break;
218 case SUB_PRES_VLR_E_READY_SM_ERR:
219 break;
220 }
221 osmo_fsm_inst_state_chg(fi, SUB_PRES_VLR_S_DONE, 0, 0);
222 osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, NULL);
223}
224
225static const struct osmo_fsm_state sub_pres_vlr_states[] = {
226 [SUB_PRES_VLR_S_INIT] = {
227 .in_event_mask = S(SUB_PRES_VLR_E_START),
228 .out_state_mask = S(SUB_PRES_VLR_S_WAIT_FOR_HLR) |
229 S(SUB_PRES_VLR_S_DONE),
230 .name = OSMO_STRINGIFY(SUB_PRES_VLR_S_INIT),
231 .action = sub_pres_vlr_fsm_init,
232 },
233 [SUB_PRES_VLR_S_WAIT_FOR_HLR] = {
234 .in_event_mask = S(SUB_PRES_VLR_E_READY_SM_CNF) |
235 S(SUB_PRES_VLR_E_READY_SM_ERR),
236 .out_state_mask = S(SUB_PRES_VLR_S_DONE),
237 .name = OSMO_STRINGIFY(SUB_PRES_VLR_S_WAIT_FOR_HLR),
238 .action = sub_pres_vlr_fsm_wait_hlr,
239 },
240 [SUB_PRES_VLR_S_DONE] = {
241 .name = OSMO_STRINGIFY(SUB_PRES_VLR_S_DONE),
242 },
243};
244
245static struct osmo_fsm sub_pres_vlr_fsm = {
246 .name = "sub_pres_vlr_fsm",
247 .states = sub_pres_vlr_states,
248 .num_states = ARRAY_SIZE(sub_pres_vlr_states),
249 .allstate_event_mask = 0,
250 .allstate_action = NULL,
251 .log_subsys = DVLR,
252 .event_names = sub_pres_vlr_event_names,
253};
254
255struct osmo_fsm_inst *sub_pres_vlr_fsm_start(struct osmo_fsm_inst *parent,
256 struct vlr_subscr *vsub,
257 uint32_t term_event)
258{
259 struct osmo_fsm_inst *fi;
260
261 fi = osmo_fsm_inst_alloc_child(&sub_pres_vlr_fsm, parent,
262 term_event);
263 if (!fi)
264 return NULL;
265
266 fi->priv = vsub;
267 osmo_fsm_inst_dispatch(fi, SUB_PRES_VLR_E_START, NULL);
268
269 return fi;
270}
271
272/***********************************************************************
273 * Location_Update_Completion_VLR, TS 23.012 Chapter 4.1.2.3
274 ***********************************************************************/
275
276enum lu_compl_vlr_state {
277 LU_COMPL_VLR_S_INIT,
278 LU_COMPL_VLR_S_WAIT_SUB_PRES,
279 LU_COMPL_VLR_S_WAIT_IMEI,
280 LU_COMPL_VLR_S_WAIT_IMEI_TMSI,
281 LU_COMPL_VLR_S_WAIT_TMSI_CNF,
282 LU_COMPL_VLR_S_DONE,
283};
284
285enum lu_compl_vlr_event {
286 LU_COMPL_VLR_E_START,
287 LU_COMPL_VLR_E_SUB_PRES_COMPL,
288 LU_COMPL_VLR_E_IMEI_CHECK_ACK,
289 LU_COMPL_VLR_E_IMEI_CHECK_NACK,
290 LU_COMPL_VLR_E_NEW_TMSI_ACK,
291};
292
293static const struct value_string lu_compl_vlr_event_names[] = {
294 OSMO_VALUE_STRING(LU_COMPL_VLR_E_START),
295 OSMO_VALUE_STRING(LU_COMPL_VLR_E_SUB_PRES_COMPL),
296 OSMO_VALUE_STRING(LU_COMPL_VLR_E_IMEI_CHECK_ACK),
297 OSMO_VALUE_STRING(LU_COMPL_VLR_E_IMEI_CHECK_NACK),
298 OSMO_VALUE_STRING(LU_COMPL_VLR_E_NEW_TMSI_ACK),
299 { 0, NULL }
300};
301
302struct lu_compl_vlr_priv {
303 struct vlr_subscr *vsub;
304 void *msc_conn_ref;
305 struct osmo_fsm_inst *sub_pres_vlr_fsm;
306 uint32_t parent_event_success;
307 uint32_t parent_event_failure;
308 void *parent_event_data;
309 enum vlr_fsm_result result;
310 uint8_t cause;
311 bool assign_tmsi;
312};
313
314static void _vlr_lu_compl_fsm_done(struct osmo_fsm_inst *fi,
315 enum vlr_fsm_result result,
316 uint8_t cause)
317{
318 struct lu_compl_vlr_priv *lcvp = fi->priv;
319 lcvp->result = result;
320 lcvp->cause = cause;
321 osmo_fsm_inst_state_chg(fi, LU_COMPL_VLR_S_DONE, 0, 0);
322}
323
324static void vlr_lu_compl_fsm_success(struct osmo_fsm_inst *fi)
325{
326 struct lu_compl_vlr_priv *lcvp = fi->priv;
327 struct vlr_subscr *vsub = lcvp->vsub;
328 if (!vsub->lu_complete) {
329 vsub->lu_complete = true;
330 /* Balanced by vlr_subscr_rx_imsi_detach() */
331 vlr_subscr_get(vsub);
332 }
333 _vlr_lu_compl_fsm_done(fi, VLR_FSM_RESULT_SUCCESS, 0);
334}
335
336static void vlr_lu_compl_fsm_failure(struct osmo_fsm_inst *fi, uint8_t cause)
337{
338 struct lu_compl_vlr_priv *lcvp = fi->priv;
339 lcvp->vsub->vlr->ops.tx_lu_rej(lcvp->msc_conn_ref, cause);
340 _vlr_lu_compl_fsm_done(fi, VLR_FSM_RESULT_FAILURE, cause);
341}
342
343static void vlr_lu_compl_fsm_dispatch_result(struct osmo_fsm_inst *fi,
344 uint32_t prev_state)
345{
346 struct lu_compl_vlr_priv *lcvp = fi->priv;
347 if (!fi->proc.parent) {
348 LOGPFSML(fi, LOGL_ERROR, "No parent FSM\n");
349 return;
350 }
351 osmo_fsm_inst_dispatch(fi->proc.parent,
352 (lcvp->result == VLR_FSM_RESULT_SUCCESS)
353 ? lcvp->parent_event_success
354 : lcvp->parent_event_failure,
355 &lcvp->cause);
356}
357
358static void lu_compl_vlr_init(struct osmo_fsm_inst *fi, uint32_t event,
359 void *data)
360{
361 struct lu_compl_vlr_priv *lcvp = fi->priv;
362 struct vlr_subscr *vsub = lcvp->vsub;
363 struct vlr_instance *vlr;
364 OSMO_ASSERT(vsub);
365 vlr = vsub->vlr;
366 OSMO_ASSERT(vlr);
367
368 OSMO_ASSERT(event == LU_COMPL_VLR_E_START);
369
370 /* TODO: National Roaming restrictions? */
371 /* TODO: Roaming restriction due to unsupported feature in subscriber
372 * data? */
373 /* TODO: Regional subscription restriction? */
374 /* TODO: Administrative restriction of subscribres' access feature? */
375 /* TODO: AccessRestrictuionData parameter available? */
376 /* TODO: AccessRestrictionData permits RAT? */
377 /* Node 1 */
378 /* TODO: Autonomous CSG supported in VPLMN and allowed by HPLMN? */
379 /* TODO: Hybrid Cel / CSG Cell */
380 /* Node 2 */
381 vsub->la_allowed = true;
382 vsub->imsi_detached_flag = false;
383 /* Start Subscriber_Present_VLR Procedure */
384 osmo_fsm_inst_state_chg(fi, LU_COMPL_VLR_S_WAIT_SUB_PRES,
385 LU_TIMEOUT_LONG, 0);
386
387 lcvp->sub_pres_vlr_fsm = sub_pres_vlr_fsm_start(fi, vsub,
388 LU_COMPL_VLR_E_SUB_PRES_COMPL);
389
390}
391
392static void lu_compl_vlr_new_tmsi(struct osmo_fsm_inst *fi)
393{
394 struct lu_compl_vlr_priv *lcvp = fi->priv;
395 struct vlr_subscr *vsub = lcvp->vsub;
396 struct vlr_instance *vlr = vsub->vlr;
397
398 LOGPFSM(fi, "%s()\n", __func__);
399
400 if (vlr_subscr_alloc_tmsi(vsub)) {
401 vlr_lu_compl_fsm_failure(fi,
402 GSM48_REJECT_SRV_OPT_TMP_OUT_OF_ORDER);
403 return;
404 }
405
406 osmo_fsm_inst_state_chg(fi, LU_COMPL_VLR_S_WAIT_TMSI_CNF,
407 vlr_timer(vlr, 3250), 3250);
408
409 vlr->ops.tx_lu_acc(lcvp->msc_conn_ref, vsub->tmsi_new);
410}
411
412/* After completion of Subscriber_Present_VLR */
413static void lu_compl_vlr_wait_subscr_pres(struct osmo_fsm_inst *fi,
414 uint32_t event,
415 void *data)
416{
417 struct lu_compl_vlr_priv *lcvp = fi->priv;
418 struct vlr_subscr *vsub = lcvp->vsub;
419 struct vlr_instance *vlr = vsub->vlr;
420
421 OSMO_ASSERT(event == LU_COMPL_VLR_E_SUB_PRES_COMPL);
422
423 lcvp->sub_pres_vlr_fsm = NULL;
424
425 /* TODO: Trace_Subscriber_Activity_VLR */
426
427 if (vlr->cfg.check_imei_rqd) {
428 /* Check IMEI VLR */
429 osmo_fsm_inst_state_chg(fi,
430 lcvp->assign_tmsi ?
431 LU_COMPL_VLR_S_WAIT_IMEI_TMSI
432 : LU_COMPL_VLR_S_WAIT_IMEI,
433 vlr_timer(vlr, 3270), 3270);
434 vlr->ops.tx_id_req(lcvp->msc_conn_ref, GSM_MI_TYPE_IMEI);
435 return;
436 }
437
438 /* Do we need to allocate a TMSI? */
439 if (lcvp->assign_tmsi) {
440 lu_compl_vlr_new_tmsi(fi);
441 return;
442 }
443
444 /* Location Updating Accept */
445 vlr->ops.tx_lu_acc(lcvp->msc_conn_ref, GSM_RESERVED_TMSI);
446 vlr_lu_compl_fsm_success(fi);
447}
448
449/* Waiting for completion of CHECK_IMEI_VLR */
450static void lu_compl_vlr_wait_imei(struct osmo_fsm_inst *fi, uint32_t event,
451 void *data)
452{
453 struct lu_compl_vlr_priv *lcvp = fi->priv;
454 struct vlr_subscr *vsub = lcvp->vsub;
455 struct vlr_instance *vlr = vsub->vlr;
456
457 switch (event) {
458 case LU_COMPL_VLR_E_IMEI_CHECK_ACK:
459 if (!vsub->imei[0]) {
460 /* Abort: Do nothing */
461 vlr_lu_compl_fsm_failure(fi,
462 GSM48_REJECT_PROTOCOL_ERROR);
463 return;
464 }
465 /* Pass */
466 break;
467
468 case LU_COMPL_VLR_E_IMEI_CHECK_NACK:
469 vlr_lu_compl_fsm_failure(fi, GSM48_REJECT_ILLEGAL_ME);
470 /* FIXME: IMEI Check Fail to VLR Application (Detach IMSI VLR) */
471 return;
472 }
473
474 /* IMEI is available. Allocate TMSI if needed. */
475 if (lcvp->assign_tmsi) {
476 if (fi->state != LU_COMPL_VLR_S_WAIT_IMEI_TMSI)
477 LOGPFSML(fi, LOGL_ERROR,
478 "TMSI required, expected to be in state"
479 " LU_COMPL_VLR_S_WAIT_IMEI_TMSI,"
480 " am in %s instead\n",
481 osmo_fsm_state_name(fi->fsm, fi->state));
482 /* Logged an error, continue anyway. */
483
484 lu_compl_vlr_new_tmsi(fi);
485
486 /* Wait for TMSI ack */
487 return;
488 }
489
490 /* No TMSI needed, accept now. */
491 vlr->ops.tx_lu_acc(lcvp->msc_conn_ref, GSM_RESERVED_TMSI);
492 vlr_lu_compl_fsm_success(fi);
493}
494
495/* Waiting for TMSI confirmation */
496static void lu_compl_vlr_wait_tmsi(struct osmo_fsm_inst *fi, uint32_t event,
497 void *data)
498{
499 struct lu_compl_vlr_priv *lcvp = fi->priv;
500 struct vlr_subscr *vsub = lcvp->vsub;
501
502 OSMO_ASSERT(event == LU_COMPL_VLR_E_NEW_TMSI_ACK);
503
504 if (!vsub || vsub->tmsi_new == GSM_RESERVED_TMSI) {
505 LOGPFSML(fi, LOGL_ERROR, "TMSI Realloc Compl implies that"
506 " the subscriber has a new TMSI allocated, but"
507 " the new TMSI is unset.\n");
508 vlr_lu_compl_fsm_failure(fi, GSM48_REJECT_NETWORK_FAILURE);
509 return;
510 }
511
512 vsub->tmsi = vsub->tmsi_new;
513 vsub->tmsi_new = GSM_RESERVED_TMSI;
514
515 vlr_lu_compl_fsm_success(fi);
516}
517
518static const struct osmo_fsm_state lu_compl_vlr_states[] = {
519 [LU_COMPL_VLR_S_INIT] = {
520 .in_event_mask = S(LU_COMPL_VLR_E_START),
521 .out_state_mask = S(LU_COMPL_VLR_S_DONE) |
522 S(LU_COMPL_VLR_S_WAIT_SUB_PRES) |
523 S(LU_COMPL_VLR_S_WAIT_IMEI),
524 .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_INIT),
525 .action = lu_compl_vlr_init,
526 },
527 [LU_COMPL_VLR_S_WAIT_SUB_PRES] = {
528 .in_event_mask = S(LU_COMPL_VLR_E_SUB_PRES_COMPL),
529 .out_state_mask = S(LU_COMPL_VLR_S_WAIT_IMEI) |
530 S(LU_COMPL_VLR_S_WAIT_IMEI_TMSI) |
531 S(LU_COMPL_VLR_S_WAIT_TMSI_CNF) |
532 S(LU_COMPL_VLR_S_DONE),
533 .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_WAIT_SUB_PRES),
534 .action = lu_compl_vlr_wait_subscr_pres,
535 },
536 [LU_COMPL_VLR_S_WAIT_IMEI] = {
537 .in_event_mask = S(LU_COMPL_VLR_E_IMEI_CHECK_ACK) |
538 S(LU_COMPL_VLR_E_IMEI_CHECK_NACK),
539 .out_state_mask = S(LU_COMPL_VLR_S_DONE),
540 .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_WAIT_IMEI),
541 .action = lu_compl_vlr_wait_imei,
542 },
543 [LU_COMPL_VLR_S_WAIT_IMEI_TMSI] = {
544 .in_event_mask = S(LU_COMPL_VLR_E_IMEI_CHECK_ACK) |
545 S(LU_COMPL_VLR_E_IMEI_CHECK_NACK),
546 .out_state_mask = S(LU_COMPL_VLR_S_DONE) |
547 S(LU_COMPL_VLR_S_WAIT_TMSI_CNF),
548 .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_WAIT_IMEI_TMSI),
549 .action = lu_compl_vlr_wait_imei,
550 },
551 [LU_COMPL_VLR_S_WAIT_TMSI_CNF] = {
552 .in_event_mask = S(LU_COMPL_VLR_E_NEW_TMSI_ACK),
553 .out_state_mask = S(LU_COMPL_VLR_S_DONE),
554 .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_WAIT_TMSI_CNF),
555 .action = lu_compl_vlr_wait_tmsi,
556 },
557 [LU_COMPL_VLR_S_DONE] = {
558 .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_DONE),
559 .onenter = vlr_lu_compl_fsm_dispatch_result,
560 },
561};
562
563static struct osmo_fsm lu_compl_vlr_fsm = {
564 .name = "lu_compl_vlr_fsm",
565 .states = lu_compl_vlr_states,
566 .num_states = ARRAY_SIZE(lu_compl_vlr_states),
567 .allstate_event_mask = 0,
568 .allstate_action = NULL,
569 .log_subsys = DVLR,
570 .event_names = lu_compl_vlr_event_names,
571};
572
573struct osmo_fsm_inst *
574lu_compl_vlr_proc_alloc(struct osmo_fsm_inst *parent,
575 struct vlr_subscr *vsub,
576 void *msc_conn_ref,
577 uint32_t parent_event_success,
578 uint32_t parent_event_failure,
579 bool assign_tmsi)
580{
581 struct osmo_fsm_inst *fi;
582 struct lu_compl_vlr_priv *lcvp;
583
584 fi = osmo_fsm_inst_alloc_child(&lu_compl_vlr_fsm, parent,
585 parent_event_failure);
586 if (!fi)
587 return NULL;
588
589 lcvp = talloc_zero(fi, struct lu_compl_vlr_priv);
590 lcvp->vsub = vsub;
591 lcvp->msc_conn_ref = msc_conn_ref;
592 lcvp->parent_event_success = parent_event_success;
593 lcvp->parent_event_failure = parent_event_failure;
594 lcvp->assign_tmsi = assign_tmsi;
595 fi->priv = lcvp;
596
597 return fi;
598}
599
600
601/***********************************************************************
602 * Update_Location_Area_VLR, TS 23.012 Chapter 4.1.2.1
603 ***********************************************************************/
604
605static const struct value_string fsm_lu_event_names[] = {
606 OSMO_VALUE_STRING(VLR_ULA_E_UPDATE_LA),
607 OSMO_VALUE_STRING(VLR_ULA_E_SEND_ID_ACK),
608 OSMO_VALUE_STRING(VLR_ULA_E_SEND_ID_NACK),
609 OSMO_VALUE_STRING(VLR_ULA_E_AUTH_RES),
610 OSMO_VALUE_STRING(VLR_ULA_E_CIPH_RES),
611 OSMO_VALUE_STRING(VLR_ULA_E_ID_IMSI),
612 OSMO_VALUE_STRING(VLR_ULA_E_ID_IMEI),
613 OSMO_VALUE_STRING(VLR_ULA_E_ID_IMEISV),
614 OSMO_VALUE_STRING(VLR_ULA_E_HLR_LU_RES),
615 OSMO_VALUE_STRING(VLR_ULA_E_UPD_HLR_COMPL),
616 OSMO_VALUE_STRING(VLR_ULA_E_LU_COMPL_SUCCESS),
617 OSMO_VALUE_STRING(VLR_ULA_E_LU_COMPL_FAILURE),
618 OSMO_VALUE_STRING(VLR_ULA_E_NEW_TMSI_ACK),
619 { 0, NULL }
620};
621
622struct lu_fsm_priv {
623 struct vlr_instance *vlr;
624 struct vlr_subscr *vsub;
625 void *msc_conn_ref;
626 struct osmo_fsm_inst *upd_hlr_vlr_fsm;
627 struct osmo_fsm_inst *lu_compl_vlr_fsm;
628 uint32_t parent_event_success;
629 uint32_t parent_event_failure;
630 void *parent_event_data;
631 enum vlr_fsm_result result;
632 uint8_t rej_cause;
633
634 enum vlr_lu_type type;
635 bool lu_by_tmsi;
636 char imsi[16];
637 uint32_t tmsi;
638 struct osmo_location_area_id old_lai;
639 struct osmo_location_area_id new_lai;
640 bool authentication_required;
641 enum vlr_ciph ciphering_required;
642 bool is_r99;
643 bool is_utran;
644 bool assign_tmsi;
645};
646
647
648/* Determine if given location area is served by this VLR */
649static bool lai_in_this_vlr(struct vlr_instance *vlr,
650 const struct osmo_location_area_id *lai)
651{
652 /* TODO: VLR needs to keep a locally configued list of LAIs */
653 return true;
654}
655
656/* Determine if authentication is required */
657static bool is_auth_required(struct lu_fsm_priv *lfp)
658{
659 /* The cases where the authentication procedure should be used
660 * are defined in 3GPP TS 33.102 */
661 /* For now we use a default value passed in to vlr_lu_fsm(). */
662 return lfp->authentication_required
663 || (lfp->ciphering_required != VLR_CIPH_NONE);
664}
665
666/* Determine if ciphering is required */
667static bool is_ciph_required(struct lu_fsm_priv *lfp)
668{
669 return lfp->ciphering_required != VLR_CIPH_NONE;
670}
671
672/* Determine if a HLR Update is required */
673static bool hlr_update_needed(struct vlr_subscr *vsub)
674{
675 /* TODO: properly decide this, rather than always assuming we
676 * need to update the HLR. */
677 return true;
678}
679
680static void lu_fsm_dispatch_result(struct osmo_fsm_inst *fi,
681 uint32_t prev_state)
682{
683 struct lu_fsm_priv *lfp = fi->priv;
684 if (!fi->proc.parent) {
685 LOGPFSML(fi, LOGL_ERROR, "No parent FSM\n");
686 return;
687 }
688 osmo_fsm_inst_dispatch(fi->proc.parent,
689 (lfp->result == VLR_FSM_RESULT_SUCCESS)
690 ? lfp->parent_event_success
691 : lfp->parent_event_failure,
692 lfp->parent_event_data);
693}
694
695static void _lu_fsm_done(struct osmo_fsm_inst *fi,
696 enum vlr_fsm_result result)
697{
698 struct lu_fsm_priv *lfp = fi->priv;
699 lfp->result = result;
700 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_DONE, 0, 0);
701}
702
703static void lu_fsm_success(struct osmo_fsm_inst *fi)
704{
705 _lu_fsm_done(fi, VLR_FSM_RESULT_SUCCESS);
706}
707
708static void lu_fsm_failure(struct osmo_fsm_inst *fi, uint8_t rej_cause)
709{
710 struct lu_fsm_priv *lfp = fi->priv;
711 if (rej_cause)
712 lfp->vlr->ops.tx_lu_rej(lfp->msc_conn_ref, rej_cause);
713 _lu_fsm_done(fi, VLR_FSM_RESULT_FAILURE);
714}
715
716static void vlr_loc_upd_start_lu_compl_fsm(struct osmo_fsm_inst *fi)
717{
718 struct lu_fsm_priv *lfp = fi->priv;
719 lfp->lu_compl_vlr_fsm =
720 lu_compl_vlr_proc_alloc(fi, lfp->vsub, lfp->msc_conn_ref,
721 VLR_ULA_E_LU_COMPL_SUCCESS,
722 VLR_ULA_E_LU_COMPL_FAILURE,
723 lfp->assign_tmsi);
724
725 osmo_fsm_inst_dispatch(lfp->lu_compl_vlr_fsm, LU_COMPL_VLR_E_START, NULL);
726}
727
728static void lu_fsm_discard_lu_compl_fsm(struct osmo_fsm_inst *fi)
729{
730 struct lu_fsm_priv *lfp = fi->priv;
731 if (!lfp->lu_compl_vlr_fsm)
732 return;
733 osmo_fsm_inst_term(lfp->lu_compl_vlr_fsm, OSMO_FSM_TERM_PARENT, NULL);
734}
735
736/* 4.1.2.1 Node 4 */
737static void vlr_loc_upd_node_4(struct osmo_fsm_inst *fi)
738{
739 struct lu_fsm_priv *lfp = fi->priv;
740 struct vlr_subscr *vsub = lfp->vsub;
741 bool hlr_unknown = false;
742
743 LOGPFSM(fi, "%s()\n", __func__);
744
745 if (hlr_unknown) {
746 /* FIXME: Delete subscriber record */
747 /* LU REJ: Roaming not allowed */
748 lu_fsm_failure(fi, GSM48_REJECT_ROAMING_NOT_ALLOWED);
749 } else {
750 /* Update_HLR_VLR */
751 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_HLR_UPD,
752 LU_TIMEOUT_LONG, 0);
753 lfp->upd_hlr_vlr_fsm =
754 upd_hlr_vlr_proc_start(fi, vsub, VLR_ULA_E_UPD_HLR_COMPL);
755 }
756}
757
758/* 4.1.2.1 Node B */
759static void vlr_loc_upd_node_b(struct osmo_fsm_inst *fi)
760{
761 LOGPFSM(fi, "%s()\n", __func__);
762
763 /* FIXME */
764 if (0) { /* IMEISV or PgA to send */
765 vlr_loc_upd_node_4(fi);
766 } else {
767 /* Location_Update_Completion */
768 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_LU_COMPL,
769 LU_TIMEOUT_LONG, 0);
770 vlr_loc_upd_start_lu_compl_fsm(fi);
771 }
772}
773
774/* Non-standard: after Ciphering Mode Complete (or no ciph required) */
775static void vlr_loc_upd_post_ciph(struct osmo_fsm_inst *fi)
776{
777 struct lu_fsm_priv *lfp = fi->priv;
778 struct vlr_subscr *vsub = lfp->vsub;
779
780 LOGPFSM(fi, "%s()\n", __func__);
781
782 OSMO_ASSERT(vsub);
783
784 vsub->conf_by_radio_contact_ind = true;
785 /* Update LAI */
786 vsub->cgi.lai = lfp->new_lai;
787 vsub->dormant_ind = false;
788 vsub->cancel_loc_rx = false;
789 if (hlr_update_needed(vsub)) {
790 vlr_loc_upd_node_4(fi);
791 } else {
792 /* TODO: ADD Support */
793 /* TODO: Node A: PgA Support */
794 vlr_loc_upd_node_b(fi);
795 }
796}
797
798/* 4.1.2.1 after Authentication successful (or no auth rqd) */
799static void vlr_loc_upd_post_auth(struct osmo_fsm_inst *fi)
800{
801 struct lu_fsm_priv *lfp = fi->priv;
802 struct vlr_subscr *vsub = lfp->vsub;
803
804 LOGPFSM(fi, "%s()\n", __func__);
805
806 OSMO_ASSERT(vsub);
807
808 if (!is_ciph_required(lfp)) {
809 vlr_loc_upd_post_ciph(fi);
810 return;
811 }
812
813 if (vlr_set_ciph_mode(vsub->vlr, fi, lfp->msc_conn_ref,
814 lfp->ciphering_required,
815 vsub->vlr->cfg.retrieve_imeisv)) {
816 LOGPFSML(fi, LOGL_ERROR,
817 "Failed to send Ciphering Mode Command\n");
818 vlr_lu_compl_fsm_failure(fi, GSM48_REJECT_NETWORK_FAILURE);
819 return;
820 }
821
822 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_CIPH, LU_TIMEOUT_LONG, 0);
823}
824
825static void vlr_loc_upd_node1(struct osmo_fsm_inst *fi)
826{
827 struct lu_fsm_priv *lfp = fi->priv;
828 struct vlr_subscr *vsub = lfp->vsub;
829
830 LOGPFSM(fi, "%s()\n", __func__);
831
832 OSMO_ASSERT(vsub);
833
834 if (is_auth_required(lfp)) {
835 /* Authenticate_VLR */
836 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_AUTH,
837 LU_TIMEOUT_LONG, 0);
838 vsub->auth_fsm = auth_fsm_start(lfp->vsub, fi->log_level,
839 fi, VLR_ULA_E_AUTH_RES,
840 lfp->is_r99,
841 lfp->is_utran);
842 } else {
843 /* no need for authentication */
844 vlr_loc_upd_post_auth(fi);
845 }
846}
847
848static void vlr_loc_upd_want_imsi(struct osmo_fsm_inst *fi)
849{
850 struct lu_fsm_priv *lfp = fi->priv;
851 struct vlr_instance *vlr = lfp->vlr;
852
853 LOGPFSM(fi, "%s()\n", __func__);
854
855 OSMO_ASSERT(lfp->vsub);
856
857 /* Obtain_IMSI_VLR */
858 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_IMSI,
859 vlr_timer(vlr, 3270), 3270);
860 vlr->ops.tx_id_req(lfp->msc_conn_ref, GSM_MI_TYPE_IMSI);
861 /* will continue at vlr_loc_upd_node1() once IMSI arrives */
862}
863
864static int assoc_lfp_with_sub(struct osmo_fsm_inst *fi, struct vlr_subscr *vsub)
865{
866 struct lu_fsm_priv *lfp = fi->priv;
867 struct vlr_instance *vlr = lfp->vlr;
868
869 if (vsub->lu_fsm) {
870 LOGPFSML(fi, LOGL_ERROR,
871 "A Location Updating process is already pending for"
872 " this subscriber. Aborting.\n");
873 /* Also get rid of the other pending LU attempt? */
874 /*lu_fsm_failure(vsub->lu_fsm, GSM48_REJECT_CONGESTION);*/
875 lu_fsm_failure(fi, GSM48_REJECT_CONGESTION);
876 return -EINVAL;
877 }
878 vsub->lu_fsm = fi;
879 vsub->msc_conn_ref = lfp->msc_conn_ref;
880 /* FIXME: send new LAC to HLR? */
881 vsub->lac = lfp->new_lai.lac;
882 lfp->vsub = vsub;
883 /* Tell MSC to associate this subscriber with the given
884 * connection */
885 vlr->ops.subscr_assoc(lfp->msc_conn_ref, lfp->vsub);
886 return 0;
887}
888
889static const char *lai_name(struct osmo_location_area_id *lai)
890{
891 static char buf[64];
892 snprintf(buf, sizeof(buf),"MCC:%u, MNC:%u, LAC:%u",
893 lai->plmn.mcc, lai->plmn.mnc, lai->lac);
894 return buf;
895}
896
897/* 4.1.2.1: Subscriber (via MSC/SGSN) requests location update */
898static void _start_lu_main(struct osmo_fsm_inst *fi)
899{
900 struct lu_fsm_priv *lfp = fi->priv;
901 struct vlr_instance *vlr = lfp->vlr;
902 struct vlr_subscr *vsub = NULL;
903 bool created;
904
905 /* TODO: PUESBINE related handling */
906
907 /* Is previous LAI in this VLR? */
908 if (!lai_in_this_vlr(vlr, &lfp->old_lai)) {
909#if 0
910 /* FIXME: check previous VLR, (3) */
911 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_PVLR,
912 LU_TIMEOUT_LONG, 0);
913 return;
914#endif
915 LOGPFSML(fi, LOGL_NOTICE, "LAI change from %s,"
916 " but checking previous VLR not implemented\n",
917 lai_name(&lfp->old_lai));
918 }
919
920 if (!lfp->imsi[0]) {
921 /* TMSI was used */
922 lfp->lu_by_tmsi = true;
923 /* TMSI clash: if a different subscriber already has this TMSI,
924 * we will find that other subscriber in the VLR. So the IMSIs
925 * would mismatch, but we don't know about it. Theoretically,
926 * an authentication process would thwart any attempt to use
927 * someone else's TMSI.
928 * TODO: Otherwise we can ask for the IMSI and verify that it
929 * matches the IMSI on record. */
930 vsub = vlr_subscr_find_or_create_by_tmsi(vlr, lfp->tmsi,
931 &created);
932
933 if (!vsub) {
934 LOGPFSML(fi, LOGL_ERROR,
935 "VLR subscriber allocation failed\n");
936 lu_fsm_failure(fi, GSM48_REJECT_SRV_OPT_TMP_OUT_OF_ORDER);
937 return;
938 }
939
940 vsub->sub_dataconf_by_hlr_ind = false;
941 if (assoc_lfp_with_sub(fi, vsub)) {
942 vlr_subscr_put(vsub);
943 return; /* error */
944 }
945
946 if (created)
947 vlr_loc_upd_want_imsi(fi);
948 else
949 vlr_loc_upd_node1(fi);
950 /* We cannot have MSC area change, as the VLR
951 * serves only one MSC */
952 vlr_subscr_put(vsub);
953 } else {
954 /* IMSI was used */
955 vsub = vlr_subscr_find_or_create_by_imsi(vlr, lfp->imsi, NULL);
956
957 if (!vsub) {
958 LOGPFSML(fi, LOGL_ERROR,
959 "VLR subscriber allocation failed\n");
960 lu_fsm_failure(fi, GSM48_REJECT_SRV_OPT_TMP_OUT_OF_ORDER);
961 vlr_subscr_put(vsub);
962 return;
963 }
964
965 vsub->sub_dataconf_by_hlr_ind = false;
966 if (assoc_lfp_with_sub(fi, vsub)) {
967 vlr_subscr_put(vsub);
968 return; /* error */
969 }
970 vlr_loc_upd_node1(fi);
971 vlr_subscr_put(vsub);
972 }
973}
974
975
976static void lu_fsm_idle(struct osmo_fsm_inst *fi, uint32_t event,
977 void *data)
978{
979 struct lu_fsm_priv *lfp = fi->priv;
980 struct vlr_instance *vlr = lfp->vlr;
981
982 OSMO_ASSERT(event == VLR_ULA_E_UPDATE_LA);
983
984 if (1) { // FIXME
985 //if (lfp->type == VLR_LU_TYPE_PERIODIC && lfp->vsub->imeisv[0])
986 /* R_IMEISV_IR1 passed */
987 _start_lu_main(fi);
988 } else {
989 vlr->ops.tx_id_req(lfp->msc_conn_ref, GSM_MI_TYPE_IMEISV);
990 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_IMEISV,
991 vlr_timer(vlr, 3270), 3270);
992 }
993}
994
995static void lu_fsm_wait_imeisv(struct osmo_fsm_inst *fi, uint32_t event,
996 void *data)
997{
998 switch (event) {
999 case VLR_ULA_E_ID_IMEISV:
1000 /* FIXME: copy IMEISV */
1001 _start_lu_main(fi);
1002 break;
1003 default:
1004 LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n",
1005 osmo_fsm_event_name(fi->fsm, event));
1006 break;
1007 }
1008}
1009
1010/* Wait for response from Send_Identification to PVLR */
1011static void lu_fsm_wait_pvlr(struct osmo_fsm_inst *fi, uint32_t event,
1012 void *data)
1013{
1014 switch (event) {
1015 case VLR_ULA_E_SEND_ID_ACK:
1016 vlr_loc_upd_node1(fi);
1017 break;
1018 case VLR_ULA_E_SEND_ID_NACK:
1019 vlr_loc_upd_want_imsi(fi);
1020 break;
1021 default:
1022 LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n",
1023 osmo_fsm_event_name(fi->fsm, event));
1024 break;
1025 }
1026}
1027
1028/* Wait for result of Authenticate_VLR procedure */
1029static void lu_fsm_wait_auth(struct osmo_fsm_inst *fi, uint32_t event,
1030 void *data)
1031{
1032 struct lu_fsm_priv *lfp = fi->priv;
1033 enum vlr_auth_fsm_result *res = data;
1034 uint8_t rej_cause = 0;
1035
1036 OSMO_ASSERT(event == VLR_ULA_E_AUTH_RES);
1037
1038 lfp->upd_hlr_vlr_fsm = NULL;
1039
1040 if (res) {
1041 switch (*res) {
1042 case VLR_AUTH_RES_PASSED:
1043 /* Result == Pass */
1044 vlr_loc_upd_post_auth(fi);
1045 return;
1046 case VLR_AUTH_RES_ABORTED:
1047 /* go to Idle with no response */
1048 rej_cause = 0;
1049 break;
1050 case VLR_AUTH_RES_UNKNOWN_SUBSCR:
1051 /* FIXME: delete subscribe record */
1052 rej_cause = GSM48_REJECT_IMSI_UNKNOWN_IN_HLR;
1053 break;
1054 case VLR_AUTH_RES_AUTH_FAILED:
1055 /* cause = illegal subscriber */
1056 rej_cause = GSM48_REJECT_ILLEGAL_MS;
1057 break;
1058 case VLR_AUTH_RES_PROC_ERR:
1059 /* cause = system failure */
1060 rej_cause = GSM48_REJECT_NETWORK_FAILURE;
1061 break;
1062 default:
1063 LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n",
1064 osmo_fsm_event_name(fi->fsm, event));
1065 break;
1066 }
1067 } else
1068 rej_cause = GSM48_REJECT_NETWORK_FAILURE;
1069
1070 lu_fsm_failure(fi, rej_cause);
1071}
1072
1073static void lu_fsm_wait_ciph(struct osmo_fsm_inst *fi, uint32_t event,
1074 void *data)
1075{
1076 struct lu_fsm_priv *lfp = fi->priv;
1077 struct vlr_subscr *vsub = lfp->vsub;
1078 struct vlr_ciph_result res = { .cause = VLR_CIPH_REJECT };
1079
1080 OSMO_ASSERT(event == VLR_ULA_E_CIPH_RES);
1081
1082 if (!data)
1083 LOGPFSML(fi, LOGL_ERROR, "invalid ciphering result: NULL\n");
1084 else
1085 res = *(struct vlr_ciph_result*)data;
1086
1087 switch (res.cause) {
1088 case VLR_CIPH_COMPL:
1089 break;
1090 case VLR_CIPH_REJECT:
1091 LOGPFSM(fi, "ciphering rejected\n");
1092 lu_fsm_failure(fi, GSM48_REJECT_INVALID_MANDANTORY_INF);
1093 return;
1094 default:
1095 LOGPFSML(fi, LOGL_ERROR, "invalid ciphering result: %d\n",
1096 res.cause);
1097 lu_fsm_failure(fi, GSM48_REJECT_INVALID_MANDANTORY_INF);
1098 return;
1099 }
1100
1101 if (res.imeisv) {
1102 LOGPFSM(fi, "got IMEISV: %s\n", res.imeisv);
1103 vlr_subscr_set_imeisv(vsub, res.imeisv);
1104 }
1105 vlr_loc_upd_post_ciph(fi);
1106}
1107
1108static void lu_fsm_wait_imsi(struct osmo_fsm_inst *fi, uint32_t event,
1109 void *data)
1110{
1111 struct lu_fsm_priv *lfp = fi->priv;
1112 struct vlr_subscr *vsub = lfp->vsub;
1113 char *mi_string = data;
1114
1115 switch (event) {
1116 case VLR_ULA_E_ID_IMSI:
1117 vlr_subscr_set_imsi(vsub, mi_string);
1118 vlr_loc_upd_node1(fi);
1119 break;
1120 default:
1121 LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n",
1122 osmo_fsm_event_name(fi->fsm, event));
1123 break;
1124 }
1125}
1126
1127/* At the end of Update_HLR_VLR */
1128static void lu_fsm_wait_hlr_ul_res(struct osmo_fsm_inst *fi, uint32_t event,
1129 void *data)
1130{
1131 struct lu_fsm_priv *lfp = fi->priv;
1132
1133 switch (event) {
1134 case VLR_ULA_E_HLR_LU_RES:
1135 /* pass-through this event to Update_HLR_VLR */
1136 if (data == NULL)
1137 osmo_fsm_inst_dispatch(lfp->upd_hlr_vlr_fsm, UPD_HLR_VLR_E_UPD_LOC_ACK, NULL);
1138 else
1139 osmo_fsm_inst_dispatch(lfp->upd_hlr_vlr_fsm, UPD_HLR_VLR_E_UPD_LOC_NACK, data);
1140 break;
1141 case VLR_ULA_E_UPD_HLR_COMPL:
1142 if (data == NULL) {
1143 /* successful case */
1144 osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_LU_COMPL,
1145 LU_TIMEOUT_LONG, 0);
1146 vlr_loc_upd_start_lu_compl_fsm(fi);
1147 /* continue in MSC ?!? */
1148 } else {
1149 /* unsuccessful case */
1150 enum gsm48_gmm_cause cause =
1151 *(enum gsm48_gmm_cause *)data;
1152 if (0 /* procedure_error && vlr->cfg.standalone_mode */) {
1153 osmo_fsm_inst_state_chg(fi,
1154 VLR_ULA_S_WAIT_LU_COMPL_STANDALONE,
1155 LU_TIMEOUT_LONG, 0);
1156 vlr_loc_upd_start_lu_compl_fsm(fi);
1157 } else {
1158 lu_fsm_failure(fi, cause);
1159 }
1160 }
1161 break;
1162 default:
1163 LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n",
1164 osmo_fsm_event_name(fi->fsm, event));
1165 break;
1166 }
1167}
1168
1169/* Wait for end of Location_Update_Completion_VLR */
1170static void lu_fsm_wait_lu_compl(struct osmo_fsm_inst *fi, uint32_t event,
1171 void *data)
1172{
1173 struct lu_fsm_priv *lfp = fi->priv;
1174 uint8_t cause;
1175
1176 switch (event) {
1177 case VLR_ULA_E_NEW_TMSI_ACK:
1178 osmo_fsm_inst_dispatch(lfp->lu_compl_vlr_fsm,
1179 LU_COMPL_VLR_E_NEW_TMSI_ACK, NULL);
1180 break;
1181 case VLR_ULA_E_ID_IMEI:
1182 osmo_fsm_inst_dispatch(lfp->lu_compl_vlr_fsm,
1183 LU_COMPL_VLR_E_IMEI_CHECK_ACK, NULL);
1184 break;
1185 case VLR_ULA_E_LU_COMPL_SUCCESS:
1186 lu_fsm_discard_lu_compl_fsm(fi);
1187
1188 /* Update Register */
1189 /* TODO: Set_Notification_Type 23.078 */
1190 /* TODO: Notify_gsmSCF 23.078 */
1191 /* TODO: Authenticated Radio Contact Established -> ARC */
1192 lu_fsm_success(fi);
1193 break;
1194 case VLR_ULA_E_LU_COMPL_FAILURE:
1195 cause = GSM48_REJECT_NETWORK_FAILURE;
1196 if (data)
1197 cause = *(uint8_t*)data;
1198 lu_fsm_discard_lu_compl_fsm(fi);
1199 lu_fsm_failure(fi, cause);
1200 break;
1201 default:
1202 LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n",
1203 osmo_fsm_event_name(fi->fsm, event));
1204 break;
1205 }
1206}
1207
1208/* Wait for end of Location_Update_Completion_VLR (standalone case) */
1209static void lu_fsm_wait_lu_compl_standalone(struct osmo_fsm_inst *fi,
1210 uint32_t event, void *data)
1211{
1212 struct lu_fsm_priv *lfp = fi->priv;
1213 struct vlr_subscr *vsub = lfp->vsub;
1214 uint8_t cause;
1215
1216 switch (event) {
1217 case VLR_ULA_E_NEW_TMSI_ACK:
1218 osmo_fsm_inst_dispatch(lfp->lu_compl_vlr_fsm,
1219 LU_COMPL_VLR_E_NEW_TMSI_ACK, NULL);
1220 break;
1221 case VLR_ULA_E_LU_COMPL_SUCCESS:
1222 lu_fsm_discard_lu_compl_fsm(fi);
1223 vsub->sub_dataconf_by_hlr_ind = false;
1224 lu_fsm_success(fi);
1225 break;
1226 case VLR_ULA_E_LU_COMPL_FAILURE:
1227 vsub->sub_dataconf_by_hlr_ind = false;
1228 cause = GSM48_REJECT_NETWORK_FAILURE;
1229 if (data)
1230 cause = *(uint8_t*)data;
1231 lu_fsm_discard_lu_compl_fsm(fi);
1232 lu_fsm_failure(fi, cause);
1233 break;
1234 default:
1235 LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n",
1236 osmo_fsm_event_name(fi->fsm, event));
1237 break;
1238 }
1239}
1240
1241static const struct osmo_fsm_state vlr_lu_fsm_states[] = {
1242 [VLR_ULA_S_IDLE] = {
1243 .in_event_mask = S(VLR_ULA_E_UPDATE_LA),
1244 .out_state_mask = S(VLR_ULA_S_WAIT_IMEISV) |
1245 S(VLR_ULA_S_WAIT_PVLR) |
1246 S(VLR_ULA_S_WAIT_IMSI) |
1247 S(VLR_ULA_S_WAIT_AUTH) |
1248 S(VLR_ULA_S_WAIT_HLR_UPD) |
1249 S(VLR_ULA_S_DONE),
1250 .name = OSMO_STRINGIFY(VLR_ULA_S_IDLE),
1251 .action = lu_fsm_idle,
1252 },
1253 [VLR_ULA_S_WAIT_IMEISV] = {
1254 .in_event_mask = S(VLR_ULA_E_ID_IMEISV),
1255 .out_state_mask = S(VLR_ULA_S_WAIT_PVLR) |
1256 S(VLR_ULA_S_WAIT_IMSI) |
1257 S(VLR_ULA_S_DONE),
1258 .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_IMEISV),
1259 .action = lu_fsm_wait_imeisv,
1260 },
1261 [VLR_ULA_S_WAIT_PVLR] = {
1262 .in_event_mask = S(VLR_ULA_E_SEND_ID_ACK) |
1263 S(VLR_ULA_E_SEND_ID_NACK),
1264 .out_state_mask = S(VLR_ULA_S_WAIT_IMSI) |
1265 S(VLR_ULA_S_WAIT_AUTH) |
1266 S(VLR_ULA_S_DONE),
1267 .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_PVLR),
1268 .action = lu_fsm_wait_pvlr,
1269 },
1270 [VLR_ULA_S_WAIT_AUTH] = {
1271 .in_event_mask = S(VLR_ULA_E_AUTH_RES),
1272 .out_state_mask = S(VLR_ULA_S_WAIT_CIPH) |
1273 S(VLR_ULA_S_WAIT_LU_COMPL) |
1274 S(VLR_ULA_S_WAIT_HLR_UPD) |
1275 S(VLR_ULA_S_DONE),
1276 .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_AUTH),
1277 .action = lu_fsm_wait_auth,
1278 },
1279 [VLR_ULA_S_WAIT_CIPH] = {
1280 .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_CIPH),
1281 .in_event_mask = S(VLR_ULA_E_CIPH_RES),
1282 .out_state_mask = S(VLR_ULA_S_WAIT_LU_COMPL) |
1283 S(VLR_ULA_S_WAIT_HLR_UPD) |
1284 S(VLR_ULA_S_DONE),
1285 .action = lu_fsm_wait_ciph,
1286 },
1287 [VLR_ULA_S_WAIT_IMSI] = {
1288 .in_event_mask = S(VLR_ULA_E_ID_IMSI),
1289 .out_state_mask = S(VLR_ULA_S_WAIT_AUTH) |
1290 S(VLR_ULA_S_WAIT_HLR_UPD) |
1291 S(VLR_ULA_S_DONE),
1292 .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_IMSI),
1293 .action = lu_fsm_wait_imsi,
1294 },
1295 [VLR_ULA_S_WAIT_HLR_UPD] = {
1296 .in_event_mask = S(VLR_ULA_E_HLR_LU_RES) |
1297 S(VLR_ULA_E_UPD_HLR_COMPL),
1298 .out_state_mask = S(VLR_ULA_S_WAIT_LU_COMPL) |
1299 S(VLR_ULA_S_WAIT_LU_COMPL_STANDALONE) |
1300 S(VLR_ULA_S_DONE),
1301 .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_HLR_UPD),
1302 .action = lu_fsm_wait_hlr_ul_res,
1303 },
1304 [VLR_ULA_S_WAIT_LU_COMPL] = {
1305 .in_event_mask = S(VLR_ULA_E_LU_COMPL_SUCCESS) |
1306 S(VLR_ULA_E_LU_COMPL_FAILURE) |
1307 S(VLR_ULA_E_NEW_TMSI_ACK) |
1308 S(VLR_ULA_E_ID_IMEI) |
1309 S(VLR_ULA_E_ID_IMEISV),
1310 .out_state_mask = S(VLR_ULA_S_DONE),
1311 .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_LU_COMPL),
1312 .action = lu_fsm_wait_lu_compl,
1313 },
1314 [VLR_ULA_S_WAIT_LU_COMPL_STANDALONE] = {
1315 .in_event_mask = S(VLR_ULA_E_LU_COMPL_SUCCESS) |
1316 S(VLR_ULA_E_LU_COMPL_FAILURE) |
1317 S(VLR_ULA_E_NEW_TMSI_ACK),
1318 .out_state_mask = S(VLR_ULA_S_DONE),
1319 .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_LU_COMPL_STANDALONE),
1320 .action = lu_fsm_wait_lu_compl_standalone,
1321 },
1322 [VLR_ULA_S_DONE] = {
1323 .name = OSMO_STRINGIFY(VLR_ULA_S_DONE),
1324 .onenter = lu_fsm_dispatch_result,
1325 },
1326};
1327
1328static void fsm_lu_cleanup(struct osmo_fsm_inst *fi, enum osmo_fsm_term_cause cause)
1329{
1330 struct lu_fsm_priv *lfp = fi->priv;
1331 struct vlr_subscr *vsub = lfp->vsub;
1332
1333 LOGPFSM(fi, "fsm_lu_cleanup called with cause %s\n",
1334 osmo_fsm_term_cause_name(cause));
1335 if (vsub && vsub->lu_fsm == fi)
1336 vsub->lu_fsm = NULL;
1337}
1338
1339static struct osmo_fsm vlr_lu_fsm = {
1340 .name = "vlr_lu_fsm",
1341 .states = vlr_lu_fsm_states,
1342 .num_states = ARRAY_SIZE(vlr_lu_fsm_states),
1343 .allstate_event_mask = 0,
1344 .allstate_action = NULL,
1345 .log_subsys = DVLR,
1346 .event_names = fsm_lu_event_names,
1347 .cleanup = fsm_lu_cleanup,
1348};
1349
1350struct osmo_fsm_inst *
1351vlr_loc_update(struct osmo_fsm_inst *parent,
1352 uint32_t parent_event_success,
1353 uint32_t parent_event_failure,
1354 void *parent_event_data,
1355 struct vlr_instance *vlr, void *msc_conn_ref,
1356 enum vlr_lu_type type, uint32_t tmsi, const char *imsi,
1357 const struct osmo_location_area_id *old_lai,
1358 const struct osmo_location_area_id *new_lai,
1359 bool authentication_required,
1360 enum vlr_ciph ciphering_required,
1361 bool is_r99, bool is_utran,
1362 bool assign_tmsi)
1363{
1364 struct osmo_fsm_inst *fi;
1365 struct lu_fsm_priv *lfp;
1366
1367 fi = osmo_fsm_inst_alloc_child(&vlr_lu_fsm, parent, parent_event_failure);
1368 if (!fi)
1369 return NULL;
1370
1371 lfp = talloc_zero(fi, struct lu_fsm_priv);
1372 lfp->vlr = vlr;
1373 lfp->msc_conn_ref = msc_conn_ref;
1374 lfp->tmsi = tmsi;
1375 lfp->type = type;
1376 lfp->old_lai = *old_lai;
1377 lfp->new_lai = *new_lai;
1378 lfp->lu_by_tmsi = true;
1379 lfp->parent_event_success = parent_event_success;
1380 lfp->parent_event_failure = parent_event_failure;
1381 lfp->parent_event_data = parent_event_data;
1382 lfp->authentication_required = authentication_required;
1383 lfp->ciphering_required = ciphering_required;
1384 lfp->is_r99 = is_r99;
1385 lfp->is_utran = is_utran;
1386 lfp->assign_tmsi = assign_tmsi;
1387 if (imsi) {
1388 strncpy(lfp->imsi, imsi, sizeof(lfp->imsi)-1);
1389 lfp->imsi[sizeof(lfp->imsi)-1] = '\0';
1390 lfp->lu_by_tmsi = false;
1391 }
1392 fi->priv = lfp;
1393
1394 LOGPFSM(fi, "rev=%s net=%s%s%s\n",
1395 is_r99 ? "R99" : "GSM",
1396 is_utran ? "UTRAN" : "GERAN",
1397 (authentication_required || ciphering_required)?
1398 " Auth" : " (no Auth)",
1399 (authentication_required || ciphering_required)?
1400 (ciphering_required? "+Ciph" : " (no Ciph)")
1401 : "");
1402
1403 osmo_fsm_inst_dispatch(fi, VLR_ULA_E_UPDATE_LA, NULL);
1404
1405 return fi;
1406}
1407
1408/* Gracefully terminate an FSM created by vlr_loc_update() in case of external
1409 * timeout (i.e. from MSC). */
1410void vlr_loc_update_conn_timeout(struct osmo_fsm_inst *fi)
1411{
1412 if (!fi || fi->state == VLR_ULA_S_DONE)
1413 return;
1414 LOGPFSM(fi, "Connection timed out\n");
1415 lu_fsm_failure(fi, GSM48_REJECT_CONGESTION);
1416}
1417
1418void vlr_lu_fsm_init(void)
1419{
1420 osmo_fsm_register(&vlr_lu_fsm);
1421 osmo_fsm_register(&upd_hlr_vlr_fsm);
1422 osmo_fsm_register(&sub_pres_vlr_fsm);
1423 osmo_fsm_register(&lu_compl_vlr_fsm);
1424}