blob: 0218924f0ace27af3d0d1b6074848b3328ae2b5a [file] [log] [blame]
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001/* GTP Hub Implementation */
2
3/* (C) 2015 by sysmocom s.f.m.c. GmbH <info@sysmocom.de>
4 * All Rights Reserved
5 *
6 * Author: Neels Hofmeyr
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Affero General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU Affero General Public License for more details.
17 *
18 * You should have received a copy of the GNU Affero General Public License
19 * along with this program. If not, see <http://www.gnu.org/licenses/>.
20 */
21
22#include <string.h>
23#include <errno.h>
24#include <inttypes.h>
25#include <time.h>
26#include <limits.h>
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +010027#include <unistd.h>
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020028#include <sys/socket.h>
29#include <netinet/in.h>
30#include <arpa/inet.h>
31
32#include <gtp.h>
33#include <gtpie.h>
34
35#include <openbsc/gtphub.h>
36#include <openbsc/debug.h>
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +010037#include <openbsc/gprs_utils.h>
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020038
39#include <osmocom/core/utils.h>
40#include <osmocom/core/logging.h>
41#include <osmocom/core/socket.h>
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +010042#include <osmocom/core/rate_ctr.h>
43#include <osmocom/core/stats.h>
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020044
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +010045
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020046static const int GTPH_GC_TICK_SECONDS = 1;
47
48void *osmo_gtphub_ctx;
49
Neels Hofmeyr063a8022015-11-16 14:35:13 +010050/* Convenience makro, note: only within this C file. */
51#define LOG(level, fmt, args...) \
52 LOGP(DGTPHUB, level, fmt, ##args)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020053
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +010054#define ZERO_STRUCT(struct_pointer) memset(struct_pointer, '\0', \
55 sizeof(*(struct_pointer)))
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020056
57/* TODO move this to osmocom/core/select.h ? */
58typedef int (*osmo_fd_cb_t)(struct osmo_fd *fd, unsigned int what);
59
60/* TODO move this to osmocom/core/linuxlist.h ? */
61#define __llist_first(head) (((head)->next == (head)) ? NULL : (head)->next)
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +010062#define llist_first(head, type, entry) \
63 llist_entry(__llist_first(head), type, entry)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020064
Neels Hofmeyr1aa0e472015-11-24 13:32:23 +010065#define __llist_last(head) (((head)->next == (head)) ? NULL : (head)->prev)
66#define llist_last(head, type, entry) \
67 llist_entry(__llist_last(head), type, entry)
68
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020069/* TODO move GTP header stuff to openggsn/gtp/ ? See gtp_decaps*() */
70
71enum gtp_rc {
72 GTP_RC_UNKNOWN = 0,
73 GTP_RC_TINY = 1, /* no IEs (like ping/pong) */
Neels Hofmeyre921e322015-11-11 00:45:50 +010074 GTP_RC_PDU_C = 2, /* a real packet with IEs */
75 GTP_RC_PDU_U = 3, /* a real packet with User data */
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020076
77 GTP_RC_TOOSHORT = -1,
78 GTP_RC_UNSUPPORTED_VERSION = -2,
79 GTP_RC_INVALID_IE = -3,
80};
81
82struct gtp_packet_desc {
83 union gtp_packet *data;
84 int data_len;
85 int header_len;
86 int version;
87 uint8_t type;
88 uint16_t seq;
Neels Hofmeyre54cd152015-11-24 13:31:06 +010089 uint32_t header_tei_rx;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020090 uint32_t header_tei;
91 int rc; /* enum gtp_rc */
92 unsigned int plane_idx;
Neels Hofmeyre54cd152015-11-24 13:31:06 +010093 unsigned int side_idx;
Neels Hofmeyrd53c6042015-12-03 13:59:49 +010094 struct gtphub_tunnel *tun;
Neels Hofmeyr29d926b2015-11-24 13:27:13 +010095 time_t timestamp;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +020096 union gtpie_member *ie[GTPIE_SIZE];
97};
98
Neels Hofmeyr10fc0242015-12-01 00:23:45 +010099struct pending_delete {
100 struct llist_head entry;
101 struct expiring_item expiry_entry;
102
103 struct gtphub_tunnel *tun;
104 uint8_t teardown_ind;
105 uint8_t nsapi;
106};
107
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +0100108
109/* counters */
110
111enum gtphub_counters_io {
112 GTPH_CTR_PKTS_IN = 0,
113 GTPH_CTR_PKTS_OUT,
114 GTPH_CTR_BYTES_IN,
115 GTPH_CTR_BYTES_OUT
116};
117
118static const struct rate_ctr_desc gtphub_counters_io_desc[] = {
119 { "packets.in", "Packets ( In)" },
120 { "packets.out", "Packets (Out)" },
Neels Hofmeyr4b2cbda2015-11-20 03:16:19 +0100121 { "bytes.in", "Bytes ( In)" },
122 { "bytes.out", "Bytes (Out)" },
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +0100123};
124
125static const struct rate_ctr_group_desc gtphub_ctrg_io_desc = {
126 .group_name_prefix = "gtphub.bind",
Neels Hofmeyr4b2cbda2015-11-20 03:16:19 +0100127 .group_description = "I/O Statistics",
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +0100128 .num_ctr = ARRAY_SIZE(gtphub_counters_io_desc),
129 .ctr_desc = gtphub_counters_io_desc,
130 .class_id = OSMO_STATS_CLASS_GLOBAL,
131};
132
133
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200134void gsn_addr_copy(struct gsn_addr *gsna, const struct gsn_addr *src)
135{
Neels Hofmeyrd8660ef2015-12-03 11:24:39 +0100136 *gsna = *src;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200137}
138
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200139int gsn_addr_from_sockaddr(struct gsn_addr *gsna, uint16_t *port,
140 const struct osmo_sockaddr *sa)
141{
142 char addr_str[256];
143 char port_str[6];
144
145 if (osmo_sockaddr_to_strs(addr_str, sizeof(addr_str),
146 port_str, sizeof(port_str),
147 sa, (NI_NUMERICHOST | NI_NUMERICSERV))
148 != 0) {
149 return -1;
150 }
151
152 if (port)
153 *port = atoi(port_str);
154
155 return gsn_addr_from_str(gsna, addr_str);
156}
157
158int gsn_addr_from_str(struct gsn_addr *gsna, const char *numeric_addr_str)
159{
Neels Hofmeyr800126b2015-11-30 14:13:19 +0100160 if ((!gsna) || (!numeric_addr_str))
161 return -1;
162
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200163 int af = AF_INET;
164 gsna->len = 4;
165 const char *pos = numeric_addr_str;
166 for (; *pos; pos++) {
167 if (*pos == ':') {
168 af = AF_INET6;
169 gsna->len = 16;
170 break;
171 }
172 }
173
174 int rc = inet_pton(af, numeric_addr_str, gsna->buf);
175 if (rc != 1) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100176 LOG(LOGL_ERROR, "Cannot resolve numeric address: '%s'\n",
177 numeric_addr_str);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200178 return -1;
179 }
180 return 0;
181}
182
183const char *gsn_addr_to_str(const struct gsn_addr *gsna)
184{
185 static char buf[INET6_ADDRSTRLEN + 1];
186 return gsn_addr_to_strb(gsna, buf, sizeof(buf));
187}
188
189const char *gsn_addr_to_strb(const struct gsn_addr *gsna,
190 char *strbuf,
191 int strbuf_len)
192{
193 int af;
194 switch (gsna->len) {
195 case 4:
196 af = AF_INET;
197 break;
198 case 16:
199 af = AF_INET6;
200 break;
201 default:
202 return NULL;
203 }
204
205 const char *r = inet_ntop(af, gsna->buf, strbuf, strbuf_len);
206 if (!r) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100207 LOG(LOGL_ERROR, "Cannot convert gsn_addr to string:"
208 " %s: len=%d, buf=%s\n",
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100209 strerror(errno),
210 (int)gsna->len,
211 osmo_hexdump(gsna->buf, sizeof(gsna->buf)));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200212 }
213 return r;
214}
215
216int gsn_addr_same(const struct gsn_addr *a, const struct gsn_addr *b)
217{
218 if (a == b)
219 return 1;
220 if ((!a) || (!b))
221 return 0;
222 if (a->len != b->len)
223 return 0;
224 return (memcmp(a->buf, b->buf, a->len) == 0)? 1 : 0;
225}
226
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100227static int gsn_addr_get(struct gsn_addr *gsna, const struct gtp_packet_desc *p,
228 int idx)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200229{
Neels Hofmeyre921e322015-11-11 00:45:50 +0100230 if (p->rc != GTP_RC_PDU_C)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200231 return -1;
232
233 unsigned int len;
234 /* gtpie.h fails to declare gtpie_gettlv()'s first arg as const. */
235 if (gtpie_gettlv((union gtpie_member**)p->ie, GTPIE_GSN_ADDR, idx,
236 &len, gsna->buf, sizeof(gsna->buf))
237 != 0)
238 return -1;
239 gsna->len = len;
240 return 0;
241}
242
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100243static int gsn_addr_put(const struct gsn_addr *gsna, struct gtp_packet_desc *p,
244 int idx)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200245{
Neels Hofmeyre921e322015-11-11 00:45:50 +0100246 if (p->rc != GTP_RC_PDU_C)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200247 return -1;
248
249 int ie_idx;
250 ie_idx = gtpie_getie(p->ie, GTPIE_GSN_ADDR, idx);
251
252 if (ie_idx < 0)
253 return -1;
254
255 struct gtpie_tlv *ie = &p->ie[ie_idx]->tlv;
256 int ie_l = ntoh16(ie->l);
257 if (ie_l != gsna->len) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100258 LOG(LOGL_ERROR, "Not implemented:"
259 " replace an IE address of different size:"
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200260 " replace %d with %d\n", (int)ie_l, (int)gsna->len);
261 return -1;
262 }
263
264 memcpy(ie->v, gsna->buf, (int)ie_l);
265 return 0;
266}
267
268/* Validate GTP version 0 data; analogous to validate_gtp1_header(), see there.
269 */
270void validate_gtp0_header(struct gtp_packet_desc *p)
271{
272 const struct gtp0_header *pheader = &(p->data->gtp0.h);
273 p->rc = GTP_RC_UNKNOWN;
274 p->header_len = 0;
275
276 OSMO_ASSERT(p->data_len >= 1);
277 OSMO_ASSERT(p->version == 0);
278
279 if (p->data_len < GTP0_HEADER_SIZE) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100280 LOG(LOGL_ERROR, "GTP0 packet too short: %d\n", p->data_len);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200281 p->rc = GTP_RC_TOOSHORT;
282 return;
283 }
284
285 p->type = ntoh8(pheader->type);
286 p->seq = ntoh16(pheader->seq);
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100287 p->header_tei_rx = 0; /* TODO */
288 p->header_tei = p->header_tei_rx;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200289
290 if (p->data_len == GTP0_HEADER_SIZE) {
291 p->rc = GTP_RC_TINY;
292 p->header_len = GTP0_HEADER_SIZE;
293 return;
294 }
295
296 /* Check packet length field versus length of packet */
297 if (p->data_len != (ntoh16(pheader->length) + GTP0_HEADER_SIZE)) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100298 LOG(LOGL_ERROR, "GTP packet length field (%d + %d) does not"
299 " match actual length (%d)\n",
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100300 GTP0_HEADER_SIZE, (int)ntoh16(pheader->length),
301 p->data_len);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200302 p->rc = GTP_RC_TOOSHORT;
303 return;
304 }
305
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100306 LOG(LOGL_DEBUG, "GTP v0 TID = %" PRIu64 "\n", pheader->tid);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200307 p->header_len = GTP0_HEADER_SIZE;
Neels Hofmeyre921e322015-11-11 00:45:50 +0100308 p->rc = GTP_RC_PDU_C;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200309}
310
311/* Validate GTP version 1 data, and update p->rc with the result, as well as
312 * p->header_len in case of a valid header. */
313void validate_gtp1_header(struct gtp_packet_desc *p)
314{
315 const struct gtp1_header_long *pheader = &(p->data->gtp1l.h);
316 p->rc = GTP_RC_UNKNOWN;
317 p->header_len = 0;
318
319 OSMO_ASSERT(p->data_len >= 1);
320 OSMO_ASSERT(p->version == 1);
321
322 if ((p->data_len < GTP1_HEADER_SIZE_LONG)
323 && (p->data_len != GTP1_HEADER_SIZE_SHORT)){
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100324 LOG(LOGL_ERROR, "GTP packet too short: %d\n", p->data_len);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200325 p->rc = GTP_RC_TOOSHORT;
326 return;
327 }
328
329 p->type = ntoh8(pheader->type);
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100330 p->header_tei_rx = ntoh32(pheader->tei);
331 p->header_tei = p->header_tei_rx;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200332 p->seq = ntoh16(pheader->seq);
333
Neels Hofmeyr28a70f22015-12-06 15:22:54 +0100334 LOG(LOGL_DEBUG, "| GTPv1\n");
335 LOG(LOGL_DEBUG, "| type = %" PRIu8 " 0x%02" PRIx8 "\n", p->type, p->type);
336 LOG(LOGL_DEBUG, "| length = %" PRIu16 " 0x%04" PRIx16 "\n", ntoh16(pheader->length), ntoh16(pheader->length));
337 LOG(LOGL_DEBUG, "| TEI = %" PRIu32 " 0x%08" PRIx32 "\n", p->header_tei_rx, p->header_tei_rx);
338 LOG(LOGL_DEBUG, "| seq = %" PRIu16 " 0x%04" PRIx16 "\n", p->seq, p->seq);
339 LOG(LOGL_DEBUG, "| npdu = %" PRIu8 " 0x%02" PRIx8 "\n", pheader->npdu, pheader->npdu);
340 LOG(LOGL_DEBUG, "| next = %" PRIu8 " 0x%02" PRIx8 "\n", pheader->next, pheader->next);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200341
342 if (p->data_len <= GTP1_HEADER_SIZE_LONG) {
343 p->rc = GTP_RC_TINY;
344 p->header_len = GTP1_HEADER_SIZE_SHORT;
345 return;
346 }
347
348 /* Check packet length field versus length of packet */
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100349 int announced_len = ntoh16(pheader->length) + GTP1_HEADER_SIZE_SHORT;
350 if (p->data_len != announced_len) {
351 LOG(LOGL_ERROR, "GTP packet length field (%d + %d) does not"
352 " match actual length (%d)\n",
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100353 GTP1_HEADER_SIZE_SHORT, (int)ntoh16(pheader->length),
354 p->data_len);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200355 p->rc = GTP_RC_TOOSHORT;
356 return;
357 }
358
Neels Hofmeyre921e322015-11-11 00:45:50 +0100359 p->rc = GTP_RC_PDU_C;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200360 p->header_len = GTP1_HEADER_SIZE_LONG;
361}
362
363/* Examine whether p->data of size p->data_len has a valid GTP header. Set
364 * p->version, p->rc and p->header_len. On error, p->rc <= 0 (see enum
365 * gtp_rc). p->data must point at a buffer with p->data_len set. */
366void validate_gtp_header(struct gtp_packet_desc *p)
367{
368 p->rc = GTP_RC_UNKNOWN;
369
370 /* Need at least 1 byte in order to check version */
371 if (p->data_len < 1) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100372 LOG(LOGL_ERROR, "Discarding packet - too small: %d\n",
373 p->data_len);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200374 p->rc = GTP_RC_TOOSHORT;
375 return;
376 }
377
378 p->version = p->data->flags >> 5;
379
380 switch (p->version) {
381 case 0:
382 validate_gtp0_header(p);
383 break;
384 case 1:
385 validate_gtp1_header(p);
386 break;
387 default:
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100388 LOG(LOGL_ERROR, "Unsupported GTP version: %d\n", p->version);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200389 p->rc = GTP_RC_UNSUPPORTED_VERSION;
390 break;
391 }
392}
393
394
395/* Return the value of the i'th IMSI IEI by copying to *imsi.
396 * The first IEI is reached by passing i = 0.
397 * imsi must point at allocated space of (at least) 8 bytes.
398 * Return 1 on success, or 0 if not found. */
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100399static int get_ie_imsi(union gtpie_member *ie[], int i, uint8_t *imsi)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200400{
401 return gtpie_gettv0(ie, GTPIE_IMSI, i, imsi, 8) == 0;
402}
403
404/* Analogous to get_ie_imsi(). nsapi must point at a single uint8_t. */
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100405static int get_ie_nsapi(union gtpie_member *ie[], int i, uint8_t *nsapi)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200406{
407 return gtpie_gettv1(ie, GTPIE_NSAPI, i, nsapi) == 0;
408}
409
410static char imsi_digit_to_char(uint8_t nibble)
411{
412 nibble &= 0x0f;
413 if (nibble > 9)
414 return (nibble == 0x0f) ? '\0' : '?';
415 return '0' + nibble;
416}
417
418/* Return a human readable IMSI string, in a static buffer.
419 * imsi must point at 8 octets of IMSI IE encoded IMSI data. */
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100420static int imsi_to_str(uint8_t *imsi, const char **imsi_str)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200421{
422 static char str[17];
423 int i;
424
425 for (i = 0; i < 8; i++) {
Neels Hofmeyr08550082015-11-30 12:19:50 +0100426 char c;
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100427 c = imsi_digit_to_char(imsi[i]);
428 if (c == '?')
429 return -1;
430 str[2*i] = c;
431
432 c = imsi_digit_to_char(imsi[i] >> 4);
433 if (c == '?')
434 return -1;
435 str[2*i + 1] = c;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200436 }
437 str[16] = '\0';
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100438 *imsi_str = str;
439 return 1;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200440}
441
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100442/* Return 0 if not present, 1 if present and decoded successfully, -1 if
443 * present but cannot be decoded. */
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100444static int get_ie_imsi_str(union gtpie_member *ie[], int i,
445 const char **imsi_str)
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100446{
447 uint8_t imsi_buf[8];
448 if (!get_ie_imsi(ie, i, imsi_buf))
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100449 return 0;
450 return imsi_to_str(imsi_buf, imsi_str);
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100451}
452
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100453/* Return 0 if not present, 1 if present and decoded successfully, -1 if
454 * present but cannot be decoded. */
455static int get_ie_apn_str(union gtpie_member *ie[], const char **apn_str)
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100456{
457 static char apn_buf[GSM_APN_LENGTH];
458 unsigned int len;
459 if (gtpie_gettlv(ie, GTPIE_APN, 0,
460 &len, apn_buf, sizeof(apn_buf)) != 0)
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100461 return 0;
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100462
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100463 if (len < 2) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100464 LOG(LOGL_ERROR, "APN IE: invalid length: %d\n",
465 (int)len);
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100466 return -1;
467 }
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100468
469 if (len > (sizeof(apn_buf) - 1))
470 len = sizeof(apn_buf) - 1;
471 apn_buf[len] = '\0';
472
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100473 *apn_str = gprs_apn_to_str(apn_buf, (uint8_t*)apn_buf, len);
474 if (!(*apn_str)) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100475 LOG(LOGL_ERROR, "APN IE: present but cannot be decoded: %s\n",
476 osmo_hexdump((uint8_t*)apn_buf, len));
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100477 return -1;
478 }
479 return 1;
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100480}
481
482
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200483/* Validate header, and index information elements. Write decoded packet
484 * information to *res. res->data will point at the given data buffer. On
485 * error, p->rc is set <= 0 (see enum gtp_rc). */
486static void gtp_decode(const uint8_t *data, int data_len,
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100487 unsigned int from_side_idx,
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200488 unsigned int from_plane_idx,
Neels Hofmeyr29d926b2015-11-24 13:27:13 +0100489 struct gtp_packet_desc *res,
490 time_t now)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200491{
492 ZERO_STRUCT(res);
493 res->data = (union gtp_packet*)data;
494 res->data_len = data_len;
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100495 res->side_idx = from_side_idx;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200496 res->plane_idx = from_plane_idx;
Neels Hofmeyr29d926b2015-11-24 13:27:13 +0100497 res->timestamp = now;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200498
499 validate_gtp_header(res);
500
Neels Hofmeyr87c83d02015-12-03 11:25:27 +0100501 if (res->rc <= 0)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200502 return;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200503
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100504 LOG(LOGL_DEBUG, "Valid GTP header (v%d)\n", res->version);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200505
Neels Hofmeyre921e322015-11-11 00:45:50 +0100506 if (from_plane_idx == GTPH_PLANE_USER) {
507 res->rc = GTP_RC_PDU_U;
508 return;
509 }
510
511 if (res->rc != GTP_RC_PDU_C) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100512 LOG(LOGL_DEBUG, "no IEs in this GTP packet\n");
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200513 return;
514 }
515
516 if (gtpie_decaps(res->ie, res->version,
517 (void*)(data + res->header_len),
518 res->data_len - res->header_len) != 0) {
519 res->rc = GTP_RC_INVALID_IE;
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100520 LOG(LOGL_ERROR, "INVALID: cannot decode IEs."
521 " Dropping GTP packet.\n");
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200522 return;
523 }
524
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100525#if 1
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100526 /* TODO if (<loglevel is debug>) { ...
527 (waiting for a commit from jerlbeck) */
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200528 int i;
529
530 for (i = 0; i < 10; i++) {
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100531 const char *imsi;
532 if (get_ie_imsi_str(res->ie, i, &imsi) < 1)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200533 break;
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100534 LOG(LOGL_DEBUG, "| IMSI %s\n", imsi);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200535 }
536
537 for (i = 0; i < 10; i++) {
538 uint8_t nsapi;
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100539 if (!get_ie_nsapi(res->ie, i, &nsapi))
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200540 break;
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100541 LOG(LOGL_DEBUG, "| NSAPI %d\n", (int)nsapi);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200542 }
543
544 for (i = 0; i < 2; i++) {
545 struct gsn_addr addr;
546 if (gsn_addr_get(&addr, res, i) == 0)
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100547 LOG(LOGL_DEBUG, "| addr %s\n", gsn_addr_to_str(&addr));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200548 }
549
550 for (i = 0; i < 10; i++) {
551 uint32_t tei;
552 if (gtpie_gettv4(res->ie, GTPIE_TEI_DI, i, &tei) != 0)
553 break;
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100554 LOG(LOGL_DEBUG, "| TEI DI (USER) %" PRIu32 " 0x%08" PRIx32 "\n",
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200555 tei, tei);
556 }
557
558 for (i = 0; i < 10; i++) {
559 uint32_t tei;
560 if (gtpie_gettv4(res->ie, GTPIE_TEI_C, i, &tei) != 0)
561 break;
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100562 LOG(LOGL_DEBUG, "| TEI (CTRL) %" PRIu32 " 0x%08" PRIx32 "\n",
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200563 tei, tei);
564 }
565#endif
566}
567
568
569/* expiry */
570
571void expiry_init(struct expiry *exq, int expiry_in_seconds)
572{
573 ZERO_STRUCT(exq);
574 exq->expiry_in_seconds = expiry_in_seconds;
575 INIT_LLIST_HEAD(&exq->items);
576}
577
578void expiry_add(struct expiry *exq, struct expiring_item *item, time_t now)
579{
580 item->expiry = now + exq->expiry_in_seconds;
581
Neels Hofmeyr1aa0e472015-11-24 13:32:23 +0100582 OSMO_ASSERT(llist_empty(&exq->items)
583 || (item->expiry
584 >= llist_last(&exq->items, struct expiring_item, entry)->expiry));
585
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200586 /* Add/move to the tail to always sort by expiry, ascending. */
587 llist_del(&item->entry);
588 llist_add_tail(&item->entry, &exq->items);
589}
590
591int expiry_tick(struct expiry *exq, time_t now)
592{
593 int expired = 0;
594 struct expiring_item *m, *n;
595 llist_for_each_entry_safe(m, n, &exq->items, entry) {
596 if (m->expiry <= now) {
597 expiring_item_del(m);
598 expired ++;
599 } else {
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200600 /* The items are added sorted by expiry. So when we hit
601 * an unexpired entry, only more unexpired ones will
602 * follow. */
603 break;
604 }
605 }
606 return expired;
607}
608
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +0100609void expiry_clear(struct expiry *exq)
610{
611 struct expiring_item *m, *n;
612 llist_for_each_entry_safe(m, n, &exq->items, entry) {
613 expiring_item_del(m);
614 }
615}
616
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200617void expiring_item_init(struct expiring_item *item)
618{
619 ZERO_STRUCT(item);
620 INIT_LLIST_HEAD(&item->entry);
621}
622
623void expiring_item_del(struct expiring_item *item)
624{
625 OSMO_ASSERT(item);
626 llist_del(&item->entry);
627 INIT_LLIST_HEAD(&item->entry);
628 if (item->del_cb) {
629 /* avoid loops */
630 del_cb_t del_cb = item->del_cb;
631 item->del_cb = 0;
632 (del_cb)(item);
633 }
634}
635
636
637/* nr_map, nr_pool */
638
Neels Hofmeyre2ed8e62015-11-17 14:30:37 +0100639void nr_pool_init(struct nr_pool *pool, nr_t nr_min, nr_t nr_max)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200640{
Neels Hofmeyre2ed8e62015-11-17 14:30:37 +0100641 *pool = (struct nr_pool){
642 .nr_min = nr_min,
643 .nr_max = nr_max,
644 .last_nr = nr_max
645 };
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200646}
647
648nr_t nr_pool_next(struct nr_pool *pool)
649{
Neels Hofmeyre2ed8e62015-11-17 14:30:37 +0100650 if (pool->last_nr >= pool->nr_max)
651 pool->last_nr = pool->nr_min;
652 else
653 pool->last_nr ++;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200654
655 return pool->last_nr;
656}
657
658void nr_map_init(struct nr_map *map, struct nr_pool *pool,
659 struct expiry *exq)
660{
661 ZERO_STRUCT(map);
662 map->pool = pool;
663 map->add_items_to_expiry = exq;
664 INIT_LLIST_HEAD(&map->mappings);
665}
666
667void nr_mapping_init(struct nr_mapping *m)
668{
669 ZERO_STRUCT(m);
670 INIT_LLIST_HEAD(&m->entry);
671 expiring_item_init(&m->expiry_entry);
672}
673
674void nr_map_add(struct nr_map *map, struct nr_mapping *mapping, time_t now)
675{
676 /* Generate a mapped number */
677 mapping->repl = nr_pool_next(map->pool);
678
679 /* Add to the tail to always yield a list sorted by expiry, in
680 * ascending order. */
681 llist_add_tail(&mapping->entry, &map->mappings);
Neels Hofmeyr508514c2015-11-24 13:30:38 +0100682 nr_map_refresh(map, mapping, now);
683}
684
685void nr_map_refresh(struct nr_map *map, struct nr_mapping *mapping, time_t now)
686{
687 if (!map->add_items_to_expiry)
688 return;
689 expiry_add(map->add_items_to_expiry,
690 &mapping->expiry_entry,
691 now);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200692}
693
694void nr_map_clear(struct nr_map *map)
695{
696 struct nr_mapping *m;
697 struct nr_mapping *n;
698 llist_for_each_entry_safe(m, n, &map->mappings, entry) {
699 nr_mapping_del(m);
700 }
701}
702
703int nr_map_empty(const struct nr_map *map)
704{
705 return llist_empty(&map->mappings);
706}
707
708struct nr_mapping *nr_map_get(const struct nr_map *map,
709 void *origin, nr_t nr_orig)
710{
711 struct nr_mapping *mapping;
712 llist_for_each_entry(mapping, &map->mappings, entry) {
713 if ((mapping->origin == origin)
714 && (mapping->orig == nr_orig))
715 return mapping;
716 }
717 /* Not found. */
718 return NULL;
719}
720
721struct nr_mapping *nr_map_get_inv(const struct nr_map *map, nr_t nr_repl)
722{
723 struct nr_mapping *mapping;
724 llist_for_each_entry(mapping, &map->mappings, entry) {
725 if (mapping->repl == nr_repl) {
726 return mapping;
727 }
728 }
729 /* Not found. */
730 return NULL;
731}
732
733void nr_mapping_del(struct nr_mapping *mapping)
734{
735 OSMO_ASSERT(mapping);
736 llist_del(&mapping->entry);
737 INIT_LLIST_HEAD(&mapping->entry);
738 expiring_item_del(&mapping->expiry_entry);
739}
740
741
742/* gtphub */
743
744const char* const gtphub_plane_idx_names[GTPH_PLANE_N] = {
745 "CTRL",
746 "USER",
747};
748
749const uint16_t gtphub_plane_idx_default_port[GTPH_PLANE_N] = {
750 2123,
751 2152,
752};
753
Neels Hofmeyra9905a52015-11-29 23:49:48 +0100754const char* const gtphub_side_idx_names[GTPH_SIDE_N] = {
755 "SGSN",
756 "GGSN",
757};
758
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200759time_t gtphub_now(void)
760{
761 struct timespec now_tp;
762 OSMO_ASSERT(clock_gettime(CLOCK_MONOTONIC, &now_tp) >= 0);
763 return now_tp.tv_sec;
764}
765
766/* Remove a gtphub_peer from its list and free it. */
767static void gtphub_peer_del(struct gtphub_peer *peer)
768{
Neels Hofmeyr1ed9a862015-11-20 00:04:41 +0100769 OSMO_ASSERT(llist_empty(&peer->addresses));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200770 nr_map_clear(&peer->seq_map);
771 llist_del(&peer->entry);
772 talloc_free(peer);
773}
774
775static void gtphub_peer_addr_del(struct gtphub_peer_addr *pa)
776{
777 OSMO_ASSERT(llist_empty(&pa->ports));
778 llist_del(&pa->entry);
779 talloc_free(pa);
780}
781
782static void gtphub_peer_port_del(struct gtphub_peer_port *pp)
783{
784 OSMO_ASSERT(pp->ref_count == 0);
785 llist_del(&pp->entry);
Neels Hofmeyre38fb662015-12-06 16:44:14 +0100786 rate_ctr_group_free(pp->counters_io);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200787 talloc_free(pp);
788}
789
790/* From the information in the gtp_packet_desc, return the address of a GGSN.
791 * Return -1 on error. */
Neels Hofmeyr5b664f42015-11-10 20:32:13 +0100792static int gtphub_resolve_ggsn(struct gtphub *hub,
793 struct gtp_packet_desc *p,
794 struct gtphub_peer_port **pp);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200795
796/* See gtphub_ext.c (wrapped by unit test) */
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +0100797struct gtphub_peer_port *gtphub_resolve_ggsn_addr(struct gtphub *hub,
798 const char *imsi_str,
799 const char *apn_ni_str);
800int gtphub_ares_init(struct gtphub *hub);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200801
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200802static void gtphub_zero(struct gtphub *hub)
803{
804 ZERO_STRUCT(hub);
Neels Hofmeyr16c3f572015-11-11 17:27:01 +0100805 INIT_LLIST_HEAD(&hub->ggsn_lookups);
806 INIT_LLIST_HEAD(&hub->resolved_ggsns);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200807}
808
809static int gtphub_sock_init(struct osmo_fd *ofd,
810 const struct gtphub_cfg_addr *addr,
811 osmo_fd_cb_t cb,
812 void *data,
813 int ofd_id)
814{
815 if (!addr->addr_str) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100816 LOG(LOGL_FATAL, "Cannot bind: empty address.\n");
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200817 return -1;
818 }
819 if (!addr->port) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100820 LOG(LOGL_FATAL, "Cannot bind: zero port not permitted.\n");
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200821 return -1;
822 }
823
824 ofd->when = BSC_FD_READ;
825 ofd->cb = cb;
826 ofd->data = data;
827 ofd->priv_nr = ofd_id;
828
829 int rc;
830 rc = osmo_sock_init_ofd(ofd,
831 AF_UNSPEC, SOCK_DGRAM, IPPROTO_UDP,
832 addr->addr_str, addr->port,
833 OSMO_SOCK_F_BIND);
834 if (rc < 1) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100835 LOG(LOGL_FATAL, "Cannot bind to %s port %d (rc %d)\n",
836 addr->addr_str, (int)addr->port, rc);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200837 return -1;
838 }
839
840 return 0;
841}
842
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +0100843static void gtphub_sock_close(struct osmo_fd *ofd)
844{
845 close(ofd->fd);
846 osmo_fd_unregister(ofd);
847 ofd->cb = NULL;
848}
849
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200850static void gtphub_bind_init(struct gtphub_bind *b)
851{
852 ZERO_STRUCT(b);
853
854 INIT_LLIST_HEAD(&b->peers);
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +0100855
856 b->counters_io = rate_ctr_group_alloc(osmo_gtphub_ctx,
857 &gtphub_ctrg_io_desc, 0);
858 OSMO_ASSERT(b->counters_io);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200859}
860
861static int gtphub_bind_start(struct gtphub_bind *b,
862 const struct gtphub_cfg_bind *cfg,
863 osmo_fd_cb_t cb, void *cb_data,
864 unsigned int ofd_id)
865{
Neels Hofmeyr800126b2015-11-30 14:13:19 +0100866 LOG(LOGL_DEBUG, "Starting bind %s\n", b->label);
867 if (gsn_addr_from_str(&b->local_addr, cfg->bind.addr_str) != 0) {
868 LOG(LOGL_FATAL, "Invalid bind address for %s: %s\n",
869 b->label, cfg->bind.addr_str);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200870 return -1;
Neels Hofmeyr800126b2015-11-30 14:13:19 +0100871 }
872 if (gtphub_sock_init(&b->ofd, &cfg->bind, cb, cb_data, ofd_id) != 0) {
873 LOG(LOGL_FATAL, "Cannot bind for %s: %s\n",
874 b->label, cfg->bind.addr_str);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200875 return -1;
Neels Hofmeyr800126b2015-11-30 14:13:19 +0100876 }
Neels Hofmeyr4b2cbda2015-11-20 03:16:19 +0100877 b->local_port = cfg->bind.port;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200878 return 0;
879}
880
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +0100881static void gtphub_bind_free(struct gtphub_bind *b)
882{
883 OSMO_ASSERT(llist_empty(&b->peers));
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +0100884 rate_ctr_group_free(b->counters_io);
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +0100885}
886
887static void gtphub_bind_stop(struct gtphub_bind *b) {
888 gtphub_sock_close(&b->ofd);
889 gtphub_bind_free(b);
890}
891
Neels Hofmeyr40348972015-11-17 12:22:28 +0100892/* Recv datagram from from->fd, write sender's address to *from_addr.
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200893 * Return the number of bytes read, zero on error. */
894static int gtphub_read(const struct osmo_fd *from,
895 struct osmo_sockaddr *from_addr,
896 uint8_t *buf, size_t buf_len)
897{
Neels Hofmeyr40348972015-11-17 12:22:28 +0100898 OSMO_ASSERT(from_addr);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200899
Neels Hofmeyr40348972015-11-17 12:22:28 +0100900 /* recvfrom requires the available length set in *from_addr_len. */
901 from_addr->l = sizeof(from_addr->a);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200902 errno = 0;
903 ssize_t received = recvfrom(from->fd, buf, buf_len, 0,
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +0100904 (struct sockaddr*)&from_addr->a,
905 &from_addr->l);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200906 /* TODO use recvmsg and get a MSG_TRUNC flag to make sure the message
907 * is not truncated. Then maybe reduce buf's size. */
908
909 if (received <= 0) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +0100910 LOG((errno == EAGAIN? LOGL_DEBUG : LOGL_ERROR),
911 "error: %s\n", strerror(errno));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200912 return 0;
913 }
914
Neels Hofmeyr28a70f22015-12-06 15:22:54 +0100915 LOG(LOGL_DEBUG, "Received %d bytes from %s: %s\n",
Neels Hofmeyr40348972015-11-17 12:22:28 +0100916 (int)received, osmo_sockaddr_to_str(from_addr),
917 osmo_hexdump(buf, received));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200918
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200919 return received;
920}
921
922inline void gtphub_port_ref_count_inc(struct gtphub_peer_port *pp)
923{
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100924 OSMO_ASSERT(pp);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200925 OSMO_ASSERT(pp->ref_count < UINT_MAX);
926 pp->ref_count++;
927}
928
929inline void gtphub_port_ref_count_dec(struct gtphub_peer_port *pp)
930{
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100931 OSMO_ASSERT(pp);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +0200932 OSMO_ASSERT(pp->ref_count > 0);
933 pp->ref_count--;
934}
935
936inline void set_seq(struct gtp_packet_desc *p, uint16_t seq)
937{
938 OSMO_ASSERT(p->version == 1);
939 p->data->gtp1l.h.seq = hton16(seq);
940 p->seq = seq;
941}
942
943inline void set_tei(struct gtp_packet_desc *p, uint32_t tei)
944{
945 OSMO_ASSERT(p->version == 1);
946 p->data->gtp1l.h.tei = hton32(tei);
947 p->header_tei = tei;
948}
949
950static void gtphub_mapping_del_cb(struct expiring_item *expi);
951
952static struct nr_mapping *gtphub_mapping_new()
953{
954 struct nr_mapping *nrm;
955 nrm = talloc_zero(osmo_gtphub_ctx, struct nr_mapping);
956 OSMO_ASSERT(nrm);
957
958 nr_mapping_init(nrm);
959 nrm->expiry_entry.del_cb = gtphub_mapping_del_cb;
960 return nrm;
961}
962
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100963
964#define APPEND(args...) \
965 l = snprintf(pos, left, args); \
966 pos += l; \
967 left -= l
968
969static const char *gtphub_tunnel_side_str(struct gtphub_tunnel *tun,
970 int side_idx)
971{
972 static char buf[256];
973 char *pos = buf;
974 int left = sizeof(buf);
975 int l;
976
977 struct gtphub_tunnel_endpoint *c, *u;
978 c = &tun->endpoint[side_idx][GTPH_PLANE_CTRL];
979 u = &tun->endpoint[side_idx][GTPH_PLANE_USER];
980
981 /* print both only if they differ. */
982 if (!c->peer) {
983 APPEND("(uninitialized)");
984 } else {
985 APPEND("%s", gsn_addr_to_str(&c->peer->peer_addr->addr));
986 }
987
988 if (!u->peer) {
989 if (c->peer) {
Neels Hofmeyrba0525e2015-12-06 16:39:23 +0100990 APPEND("/(uninitialized)");
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100991 }
992 } else if ((!c->peer)
993 || (!gsn_addr_same(&u->peer->peer_addr->addr,
994 &c->peer->peer_addr->addr))) {
Neels Hofmeyrba0525e2015-12-06 16:39:23 +0100995 APPEND("/%s", gsn_addr_to_str(&u->peer->peer_addr->addr));
Neels Hofmeyre54cd152015-11-24 13:31:06 +0100996 }
997
Neels Hofmeyree07e4f2015-12-06 19:11:45 +0100998 APPEND(" (TEI C=%x U=%x)",
999 c->tei_orig,
1000 u->tei_orig);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001001 return buf;
1002}
1003
1004const char *gtphub_tunnel_str(struct gtphub_tunnel *tun)
1005{
1006 static char buf[512];
1007 char *pos = buf;
1008 int left = sizeof(buf);
1009 int l;
1010
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001011 APPEND("TEI=%x: ", tun->tei_repl);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001012 APPEND("%s", gtphub_tunnel_side_str(tun, GTPH_SIDE_SGSN));
1013 APPEND(" <-> %s", gtphub_tunnel_side_str(tun, GTPH_SIDE_GGSN));
1014
1015 return buf;
1016}
1017
1018#undef APPEND
1019
1020void gtphub_tunnel_endpoint_set_peer(struct gtphub_tunnel_endpoint *te,
1021 struct gtphub_peer_port *pp)
1022{
1023 if (te->peer)
1024 gtphub_port_ref_count_dec(te->peer);
1025 te->peer = pp;
1026 if (te->peer)
1027 gtphub_port_ref_count_inc(te->peer);
1028}
1029
1030int gtphub_tunnel_complete(struct gtphub_tunnel *tun)
1031{
1032 if (!tun)
1033 return 0;
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001034 if (!tun->tei_repl)
1035 return 0;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001036 int side_idx;
1037 int plane_idx;
Neels Hofmeyrf9773202015-11-27 00:05:56 +01001038 for_each_side_and_plane(side_idx, plane_idx) {
1039 struct gtphub_tunnel_endpoint *te =
1040 &tun->endpoint[side_idx][plane_idx];
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001041 if (!(te->peer && te->tei_orig))
Neels Hofmeyrf9773202015-11-27 00:05:56 +01001042 return 0;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001043 }
1044 return 1;
1045}
1046
1047static void gtphub_tunnel_del_cb(struct expiring_item *expi)
1048{
1049 struct gtphub_tunnel *tun = container_of(expi,
1050 struct gtphub_tunnel,
1051 expiry_entry);
1052 LOG(LOGL_DEBUG, "expired: %s\n", gtphub_tunnel_str(tun));
1053
1054 llist_del(&tun->entry);
1055 INIT_LLIST_HEAD(&tun->entry); /* mark unused */
1056
1057 expi->del_cb = 0; /* avoid recursion loops */
1058 expiring_item_del(&tun->expiry_entry); /* usually already done, but make sure. */
1059
1060 int side_idx;
1061 int plane_idx;
Neels Hofmeyrf9773202015-11-27 00:05:56 +01001062 for_each_side_and_plane(side_idx, plane_idx) {
Neels Hofmeyre38fb662015-12-06 16:44:14 +01001063 struct gtphub_tunnel_endpoint *te = &tun->endpoint[side_idx][plane_idx];
1064
Neels Hofmeyrf9773202015-11-27 00:05:56 +01001065 /* clear ref count */
Neels Hofmeyre38fb662015-12-06 16:44:14 +01001066 gtphub_tunnel_endpoint_set_peer(te, NULL);
1067
1068 rate_ctr_group_free(te->counters_io);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001069 }
1070
1071 talloc_free(tun);
1072}
1073
1074static struct gtphub_tunnel *gtphub_tunnel_new()
1075{
1076 struct gtphub_tunnel *tun;
1077 tun = talloc_zero(osmo_gtphub_ctx, struct gtphub_tunnel);
1078 OSMO_ASSERT(tun);
1079
1080 INIT_LLIST_HEAD(&tun->entry);
1081 expiring_item_init(&tun->expiry_entry);
1082
Neels Hofmeyre38fb662015-12-06 16:44:14 +01001083 int side_idx, plane_idx;
1084 for_each_side_and_plane(side_idx, plane_idx) {
1085 struct gtphub_tunnel_endpoint *te = &tun->endpoint[side_idx][plane_idx];
1086 te->counters_io = rate_ctr_group_alloc(osmo_gtphub_ctx,
1087 &gtphub_ctrg_io_desc,
1088 0);
1089 OSMO_ASSERT(te->counters_io);
1090 }
1091
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001092 tun->expiry_entry.del_cb = gtphub_tunnel_del_cb;
1093 return tun;
1094}
1095
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01001096static const char *gtphub_peer_strb(struct gtphub_peer *peer, char *buf,
1097 int buflen)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001098{
1099 if (llist_empty(&peer->addresses))
1100 return "(addressless)";
1101
1102 struct gtphub_peer_addr *a = llist_first(&peer->addresses,
1103 struct gtphub_peer_addr,
1104 entry);
1105 return gsn_addr_to_strb(&a->addr, buf, buflen);
1106}
1107
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01001108static const char *gtphub_port_strb(struct gtphub_peer_port *port, char *buf,
1109 int buflen)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001110{
1111 if (!port)
1112 return "(null port)";
1113
1114 snprintf(buf, buflen, "%s port %d",
1115 gsn_addr_to_str(&port->peer_addr->addr),
1116 (int)port->port);
1117 return buf;
1118}
1119
1120const char *gtphub_peer_str(struct gtphub_peer *peer)
1121{
1122 static char buf[256];
1123 return gtphub_peer_strb(peer, buf, sizeof(buf));
1124}
1125
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +01001126const char *gtphub_port_str(struct gtphub_peer_port *port)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001127{
1128 static char buf[256];
1129 return gtphub_port_strb(port, buf, sizeof(buf));
1130}
1131
1132static const char *gtphub_port_str2(struct gtphub_peer_port *port)
1133{
1134 static char buf[256];
1135 return gtphub_port_strb(port, buf, sizeof(buf));
1136}
1137
1138static void gtphub_mapping_del_cb(struct expiring_item *expi)
1139{
1140 expi->del_cb = 0; /* avoid recursion loops */
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001141 expiring_item_del(expi); /* usually already done, but make sure. */
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001142
1143 struct nr_mapping *nrm = container_of(expi,
1144 struct nr_mapping,
1145 expiry_entry);
1146 llist_del(&nrm->entry);
1147 INIT_LLIST_HEAD(&nrm->entry); /* mark unused */
1148
1149 /* Just for log */
1150 struct gtphub_peer_port *from = nrm->origin;
1151 OSMO_ASSERT(from);
Neels Hofmeyr334af5d2015-11-17 14:24:46 +01001152 LOG(LOGL_DEBUG, "expired: %d: nr mapping from %s: %u->%u\n",
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001153 (int)nrm->expiry_entry.expiry,
1154 gtphub_port_str(from),
Neels Hofmeyr334af5d2015-11-17 14:24:46 +01001155 (unsigned int)nrm->orig, (unsigned int)nrm->repl);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001156
1157 gtphub_port_ref_count_dec(from);
1158
1159 talloc_free(nrm);
1160}
1161
1162static struct nr_mapping *gtphub_mapping_have(struct nr_map *map,
1163 struct gtphub_peer_port *from,
1164 nr_t orig_nr,
1165 time_t now)
1166{
1167 struct nr_mapping *nrm;
1168
1169 nrm = nr_map_get(map, from, orig_nr);
1170
1171 if (!nrm) {
1172 nrm = gtphub_mapping_new();
1173 nrm->orig = orig_nr;
1174 nrm->origin = from;
1175 nr_map_add(map, nrm, now);
1176 gtphub_port_ref_count_inc(from);
Neels Hofmeyr063a8022015-11-16 14:35:13 +01001177 LOG(LOGL_DEBUG, "peer %s: sequence map %d --> %d\n",
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001178 gtphub_port_str(from),
1179 (int)(nrm->orig), (int)(nrm->repl));
1180 } else {
Neels Hofmeyr508514c2015-11-24 13:30:38 +01001181 nr_map_refresh(map, nrm, now);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001182 }
1183
1184 OSMO_ASSERT(nrm);
1185 return nrm;
1186}
1187
Neels Hofmeyr3317c842015-11-11 17:20:42 +01001188static void gtphub_map_seq(struct gtp_packet_desc *p,
1189 struct gtphub_peer_port *from_port,
Neels Hofmeyr29d926b2015-11-24 13:27:13 +01001190 struct gtphub_peer_port *to_port)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001191{
1192 /* Store a mapping in to_peer's map, so when we later receive a GTP
1193 * packet back from to_peer, the seq nr can be unmapped back to its
1194 * origin (from_peer here). */
1195 struct nr_mapping *nrm;
1196 nrm = gtphub_mapping_have(&to_port->peer_addr->peer->seq_map,
Neels Hofmeyr29d926b2015-11-24 13:27:13 +01001197 from_port, p->seq, p->timestamp);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001198
1199 /* Change the GTP packet to yield the new, mapped seq nr */
1200 set_seq(p, nrm->repl);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001201}
1202
1203static struct gtphub_peer_port *gtphub_unmap_seq(struct gtp_packet_desc *p,
1204 struct gtphub_peer_port *responding_port)
1205{
1206 OSMO_ASSERT(p->version == 1);
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01001207 struct nr_mapping *nrm =
1208 nr_map_get_inv(&responding_port->peer_addr->peer->seq_map,
1209 p->seq);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001210 if (!nrm)
1211 return NULL;
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01001212 LOG(LOGL_DEBUG, "peer %p: sequence unmap %d <-- %d\n",
1213 nrm->origin, (int)(nrm->orig), (int)(nrm->repl));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001214 set_seq(p, nrm->orig);
1215 return nrm->origin;
1216}
1217
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001218static int gtphub_check_mapped_tei(struct gtphub_tunnel *new_tun,
1219 struct gtphub_tunnel *iterated_tun,
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001220 uint32_t *tei_min,
1221 uint32_t *tei_max)
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001222{
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001223 if (!new_tun->tei_repl || !iterated_tun->tei_repl)
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001224 return 1;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001225
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001226 *tei_min = (*tei_min < iterated_tun->tei_repl)? *tei_min : iterated_tun->tei_repl;
1227 *tei_max = (*tei_max > iterated_tun->tei_repl)? *tei_max : iterated_tun->tei_repl;
1228
1229 if (new_tun->tei_repl != iterated_tun->tei_repl)
1230 return 1;
1231
1232 /* new_tun->tei_repl is already taken. Try to find one out of the known
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001233 * range. */
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001234 LOG(LOGL_DEBUG, "TEI replacement %d already taken.\n", new_tun->tei_repl);
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001235
1236 if ((*tei_max) < 0xffffffff) {
1237 (*tei_max)++;
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001238 new_tun->tei_repl = *tei_max;
1239 LOG(LOGL_DEBUG, "Using TEI %d instead.\n", new_tun->tei_repl);
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001240 return 1;
1241 } else if ((*tei_min) > 1) {
1242 (*tei_min)--;
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001243 new_tun->tei_repl = *tei_min;
1244 LOG(LOGL_DEBUG, "Using TEI %d instead.\n", new_tun->tei_repl);
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001245 return 1;
1246 }
1247
1248 /* None seems to be available. */
1249 return 0;
1250}
1251
1252static int gtphub_check_reused_teis(struct gtphub *hub,
1253 struct gtphub_tunnel *new_tun)
1254{
1255 uint32_t tei_min = 0xffffffff;
1256 uint32_t tei_max = 0;
1257 int side_idx;
1258 int plane_idx;
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001259 struct gtphub_tunnel_endpoint *te;
1260 struct gtphub_tunnel_endpoint *te2;
1261
1262 struct gtphub_tunnel *tun, *ntun;
1263
1264 llist_for_each_entry_safe(tun, ntun, &hub->tunnels, entry) {
1265 if (tun == new_tun)
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001266 continue;
1267
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001268 /* Check whether the GSN sent a TEI that it is reusing from a
1269 * previous tunnel. */
Neels Hofmeyr18d30492015-12-02 15:00:50 +01001270 int tun_continue = 0;
1271 for_each_side(side_idx) {
1272 for_each_plane(plane_idx) {
1273 te = &tun->endpoint[side_idx][plane_idx];
1274 te2 = &new_tun->endpoint[side_idx][plane_idx];
Neels Hofmeyrf6e4d082015-12-06 19:03:35 +01001275 if ((te->tei_orig == 0)
1276 || (te->tei_orig != te2->tei_orig)
Neels Hofmeyr18d30492015-12-02 15:00:50 +01001277 || (!te->peer)
1278 || (!te2->peer)
1279 || !gsn_addr_same(&te->peer->peer_addr->addr,
1280 &te2->peer->peer_addr->addr))
1281 continue;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001282
Neels Hofmeyr18d30492015-12-02 15:00:50 +01001283 /* The peer is reusing a TEI that I believe to
1284 * be part of another tunnel. The other tunnel
1285 * must be stale, then. */
1286 LOG(LOGL_NOTICE,
1287 "Expiring tunnel due to reused TEI:"
Neels Hofmeyree1e5d72015-12-06 17:18:49 +01001288 " %s peer %s sent %s TEI %x,"
Neels Hofmeyr18d30492015-12-02 15:00:50 +01001289 " previously used by tunnel %s...\n",
Neels Hofmeyree1e5d72015-12-06 17:18:49 +01001290 gtphub_side_idx_names[side_idx],
Neels Hofmeyr18d30492015-12-02 15:00:50 +01001291 gtphub_port_str(te->peer),
1292 gtphub_plane_idx_names[plane_idx],
1293 te->tei_orig,
1294 gtphub_tunnel_str(tun));
1295 LOG(LOGL_NOTICE, "...while establishing tunnel %s\n",
1296 gtphub_tunnel_str(new_tun));
Neels Hofmeyr52c0bd32015-12-02 14:14:32 +01001297
Neels Hofmeyr18d30492015-12-02 15:00:50 +01001298 expiring_item_del(&tun->expiry_entry);
1299 /* continue to find more matches. There shouldn't be
1300 * any, but let's make sure. However, tun is deleted,
1301 * so we need to skip to the next tunnel. */
1302 tun_continue = 1;
1303 break;
1304 }
1305 if (tun_continue)
1306 break;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001307 }
Neels Hofmeyr18d30492015-12-02 15:00:50 +01001308 if (tun_continue)
1309 continue;
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001310
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001311 /* Check whether the mapped TEI is already used by another
1312 * tunnel. */
1313 if (!gtphub_check_mapped_tei(new_tun, tun, &tei_min, &tei_max)) {
1314 LOG(LOGL_ERROR,
1315 "No mapped TEI is readily available."
1316 " Searching for holes between occupied"
1317 " TEIs not implemented.");
1318 return 0;
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001319 }
1320
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001321 }
Neels Hofmeyr7174b162015-11-27 01:22:13 +01001322
1323 return 1;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001324}
1325
1326static void gtphub_tunnel_refresh(struct gtphub *hub,
1327 struct gtphub_tunnel *tun,
1328 time_t now)
1329{
1330 expiry_add(&hub->expire_slowly,
1331 &tun->expiry_entry,
1332 now);
1333}
1334
1335static struct gtphub_tunnel_endpoint *gtphub_unmap_tei(struct gtphub *hub,
1336 struct gtp_packet_desc *p,
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001337 struct gtphub_peer_port *from,
1338 struct gtphub_tunnel **unmapped_from_tun)
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001339{
1340 OSMO_ASSERT(from);
1341 int other_side = other_side_idx(p->side_idx);
1342
1343 struct gtphub_tunnel *tun;
1344 llist_for_each_entry(tun, &hub->tunnels, entry) {
1345 struct gtphub_tunnel_endpoint *te_from =
1346 &tun->endpoint[p->side_idx][p->plane_idx];
1347 struct gtphub_tunnel_endpoint *te_to =
1348 &tun->endpoint[other_side][p->plane_idx];
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001349 if ((tun->tei_repl == p->header_tei_rx)
Neels Hofmeyrfc1be3a2015-12-02 00:31:31 +01001350 && te_from->peer
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001351 && gsn_addr_same(&te_from->peer->peer_addr->addr,
1352 &from->peer_addr->addr)) {
1353 gtphub_tunnel_refresh(hub, tun, p->timestamp);
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001354 if (unmapped_from_tun)
1355 *unmapped_from_tun = tun;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001356 return te_to;
1357 }
1358 }
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001359
1360 if (unmapped_from_tun)
1361 *unmapped_from_tun = NULL;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001362 return NULL;
1363}
1364
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001365static void gtphub_map_restart_counter(struct gtphub *hub,
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001366 struct gtp_packet_desc *p)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001367{
Neels Hofmeyrba9e9f62015-11-26 22:19:22 +01001368 if (p->rc != GTP_RC_PDU_C)
1369 return;
1370
1371 int ie_idx;
1372 ie_idx = gtpie_getie(p->ie, GTPIE_RECOVERY, 0);
1373 if (ie_idx < 0)
1374 return;
1375
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01001376 /* Always send gtphub's own restart counter */
Neels Hofmeyrba9e9f62015-11-26 22:19:22 +01001377 p->ie[ie_idx]->tv1.v = hton8(hub->restart_counter);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001378}
1379
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001380static int gtphub_unmap_header_tei(struct gtphub_peer_port **to_port_p,
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001381 struct gtphub_tunnel **unmapped_from_tun,
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001382 struct gtphub *hub,
1383 struct gtp_packet_desc *p,
1384 struct gtphub_peer_port *from_port)
1385{
1386 OSMO_ASSERT(p->version == 1);
1387 *to_port_p = NULL;
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001388 if (unmapped_from_tun)
1389 *unmapped_from_tun = NULL;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001390
1391 /* If the header's TEI is zero, no PDP context has been established
1392 * yet. If nonzero, a mapping should actually already exist for this
1393 * TEI, since it must have been announced in a PDP context creation. */
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001394 if (!p->header_tei_rx)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001395 return 0;
1396
1397 /* to_peer has previously announced a TEI, which was stored and
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001398 * mapped in a tunnel struct. */
1399 struct gtphub_tunnel_endpoint *to;
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001400 to = gtphub_unmap_tei(hub, p, from_port, unmapped_from_tun);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001401 if (!to) {
1402 LOG(LOGL_ERROR, "Received unknown TEI %" PRIx32 " from %s\n",
1403 p->header_tei_rx, gtphub_port_str(from_port));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001404 return -1;
1405 }
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001406 OSMO_ASSERT(*unmapped_from_tun);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001407
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001408 uint32_t unmapped_tei = to->tei_orig;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001409 set_tei(p, unmapped_tei);
1410
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001411 LOG(LOGL_DEBUG, "Unmapped TEI coming from: %s\n",
1412 gtphub_tunnel_str(*unmapped_from_tun));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001413
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001414 /* May be NULL for an invalidated tunnel. */
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001415 *to_port_p = to->peer;
1416
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001417 return 0;
1418}
1419
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001420static int gtphub_handle_create_pdp_ctx(struct gtphub *hub,
1421 struct gtp_packet_desc *p,
1422 struct gtphub_peer_port *from_ctrl,
1423 struct gtphub_peer_port *to_ctrl)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001424{
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001425 int plane_idx;
1426
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001427 osmo_static_assert((GTPH_PLANE_CTRL == 0) && (GTPH_PLANE_USER == 1),
1428 plane_nrs_match_GSN_addr_IE_indices);
1429
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001430 struct gtphub_tunnel *tun = p->tun;
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001431
1432 if (p->type == GTP_CREATE_PDP_REQ) {
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001433 if (p->side_idx != GTPH_SIDE_SGSN) {
1434 LOG(LOGL_ERROR, "Wrong side: Create PDP Context"
Neels Hofmeyre5a07982015-12-03 13:47:05 +01001435 " Request from the GGSN side: %s",
1436 gtphub_port_str(from_ctrl));
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001437 return -1;
1438 }
1439
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001440 if (tun) {
1441 LOG(LOGL_ERROR, "Not implemented: Received"
1442 " Create PDP Context Request for an already"
1443 " established tunnel:"
1444 " from %s, tunnel %s\n",
1445 gtphub_port_str(from_ctrl),
1446 gtphub_tunnel_str(p->tun));
1447 return -1;
1448 }
1449
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001450 /* A new tunnel. */
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001451 p->tun = tun = gtphub_tunnel_new();
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001452
1453 /* Create TEI mapping */
1454 tun->tei_repl = nr_pool_next(&hub->tei_pool);
1455
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001456 llist_add(&tun->entry, &hub->tunnels);
1457 gtphub_tunnel_refresh(hub, tun, p->timestamp);
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001458 /* The endpoint peers on this side (SGSN) will be set from IEs
1459 * below. Also set the GGSN Ctrl endpoint, for logging. */
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001460 gtphub_tunnel_endpoint_set_peer(&tun->endpoint[GTPH_SIDE_GGSN][GTPH_PLANE_CTRL],
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001461 to_ctrl);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001462 } else if (p->type == GTP_CREATE_PDP_RSP) {
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001463 if (p->side_idx != GTPH_SIDE_GGSN) {
1464 LOG(LOGL_ERROR, "Wrong side: Create PDP Context"
Neels Hofmeyre5a07982015-12-03 13:47:05 +01001465 " Response from the SGSN side: %s",
1466 gtphub_port_str(from_ctrl));
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001467 return -1;
1468 }
1469
Neels Hofmeyr8c5b0732015-12-03 13:45:15 +01001470 /* The tunnel should already have been resolved from the header
1471 * TEI and be available in tun (== p->tun). Just fill in the
1472 * GSN Addresses below.*/
1473 OSMO_ASSERT(tun);
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001474 OSMO_ASSERT(tun->tei_repl == p->header_tei_rx);
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001475 OSMO_ASSERT(to_ctrl);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001476 }
1477
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001478 uint8_t ie_type[] = { GTPIE_TEI_C, GTPIE_TEI_DI };
1479 int ie_mandatory = (p->type == GTP_CREATE_PDP_REQ);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001480 unsigned int side_idx = p->side_idx;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001481
1482 for (plane_idx = 0; plane_idx < 2; plane_idx++) {
Neels Hofmeyr08550082015-11-30 12:19:50 +01001483 int rc;
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001484 struct gsn_addr use_addr;
1485 uint16_t use_port;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001486 uint32_t tei_from_ie;
1487 int ie_idx;
1488
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001489 /* Fetch GSN Address and TEI from IEs. As ensured by above
1490 * static asserts, plane_idx corresponds to the GSN Address IE
1491 * index (the first one = 0 = ctrl, second one = 1 = user). */
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001492 rc = gsn_addr_get(&use_addr, p, plane_idx);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001493 if (rc) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +01001494 LOG(LOGL_ERROR, "Cannot read %s GSN Address IE\n",
1495 gtphub_plane_idx_names[plane_idx]);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001496 return -1;
1497 }
Neels Hofmeyr063a8022015-11-16 14:35:13 +01001498 LOG(LOGL_DEBUG, "Read %s GSN addr %s (%d)\n",
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001499 gtphub_plane_idx_names[plane_idx],
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001500 gsn_addr_to_str(&use_addr),
1501 use_addr.len);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001502
1503 ie_idx = gtpie_getie(p->ie, ie_type[plane_idx], 0);
1504 if (ie_idx < 0) {
1505 if (ie_mandatory) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01001506 LOG(LOGL_ERROR,
1507 "Create PDP Context message invalid:"
1508 " missing IE %d\n",
1509 (int)ie_type[plane_idx]);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001510 return -1;
1511 }
1512 tei_from_ie = 0;
1513 }
1514 else
1515 tei_from_ie = ntoh32(p->ie[ie_idx]->tv4.v);
1516
1517 /* Make sure an entry for this peer address with default port
Neels Hofmeyrca2361c2015-12-03 14:12:44 +01001518 * exists.
1519 *
1520 * Exception: if sgsn_use_sender is set, instead use the
1521 * sender's address and port for Ctrl -- the User port is not
1522 * known until the first User packet arrives.
1523 *
1524 * Note: doing this here is just an optimization, because
1525 * gtphub_handle_buf() has code to replace the tunnel
1526 * endpoints' addresses with the sender (needed for User
1527 * plane). We could just ignore sgsn_use_sender here. But if we
1528 * set up a default port here and replace it in
1529 * gtphub_handle_buf(), we'd be creating a peer port just to
1530 * expire it right away. */
1531 if (hub->sgsn_use_sender && (side_idx == GTPH_SIDE_SGSN)) {
1532 gsn_addr_from_sockaddr(&use_addr, &use_port, &from_ctrl->sa);
1533 } else {
1534 use_port = gtphub_plane_idx_default_port[plane_idx];
1535
1536 }
1537
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001538 struct gtphub_peer_port *peer_from_ie;
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001539 peer_from_ie = gtphub_port_have(hub,
1540 &hub->to_gsns[side_idx][plane_idx],
1541 &use_addr, use_port);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001542
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001543 gtphub_tunnel_endpoint_set_peer(&tun->endpoint[side_idx][plane_idx],
1544 peer_from_ie);
1545
Neels Hofmeyr59c1b642015-12-03 11:30:43 +01001546 if (!tei_from_ie &&
1547 !tun->endpoint[side_idx][plane_idx].tei_orig) {
1548 LOG(LOGL_ERROR,
Neels Hofmeyr328d2f72015-12-06 19:13:21 +01001549 "Create PDP Context message omits %s TEI, but"
1550 " no TEI has been announced for this tunnel: %s\n",
Neels Hofmeyr59c1b642015-12-03 11:30:43 +01001551 gtphub_plane_idx_names[plane_idx],
1552 gtphub_tunnel_str(tun));
1553 return -1;
1554 }
1555
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001556 if (tei_from_ie) {
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001557 /* Replace TEI in GTP packet IE */
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001558 tun->endpoint[side_idx][plane_idx].tei_orig = tei_from_ie;
Neels Hofmeyree07e4f2015-12-06 19:11:45 +01001559 p->ie[ie_idx]->tv4.v = hton32(tun->tei_repl);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001560
Neels Hofmeyrcd865d62015-11-30 12:58:48 +01001561 if (!gtphub_check_reused_teis(hub, tun)) {
1562 /* It's highly unlikely that all TEIs are
1563 * taken. But the code looking for an unused
1564 * TEI is, at the time of writing this comment,
1565 * not able to find gaps in the TEI space. To
1566 * explicitly alert the user of this problem,
1567 * rather abort than carry on. */
1568 LOG(LOGL_FATAL, "TEI range exhausted. Cannot create TEI mapping, aborting.\n");
1569 abort();
1570 }
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001571 }
1572
1573 /* Replace the GSN address to reflect gtphub. */
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001574 rc = gsn_addr_put(&hub->to_gsns[other_side_idx(side_idx)][plane_idx].local_addr,
1575 p, plane_idx);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001576 if (rc) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +01001577 LOG(LOGL_ERROR, "Cannot write %s GSN Address IE\n",
1578 gtphub_plane_idx_names[plane_idx]);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001579 return -1;
1580 }
1581 }
1582
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001583 if (p->type == GTP_CREATE_PDP_REQ) {
1584 LOG(LOGL_DEBUG, "New tunnel, first half: %s\n",
1585 gtphub_tunnel_str(tun));
Neels Hofmeyr005f1752015-11-30 12:19:11 +01001586 } else if (p->type == GTP_CREATE_PDP_RSP) {
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001587 LOG(LOGL_DEBUG, "New tunnel: %s\n",
1588 gtphub_tunnel_str(tun));
1589 }
1590
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001591 return 0;
1592}
1593
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001594static void pending_delete_del_cb(struct expiring_item *expi)
1595{
1596 struct pending_delete *pd;
1597 pd = container_of(expi, struct pending_delete, expiry_entry);
1598
1599 llist_del(&pd->entry);
1600 INIT_LLIST_HEAD(&pd->entry);
1601
1602 pd->expiry_entry.del_cb = 0;
1603 expiring_item_del(&pd->expiry_entry);
1604
1605 talloc_free(pd);
1606}
1607
1608static struct pending_delete *pending_delete_new(void)
1609{
1610 struct pending_delete *pd = talloc_zero(osmo_gtphub_ctx, struct pending_delete);
1611 INIT_LLIST_HEAD(&pd->entry);
1612 expiring_item_init(&pd->expiry_entry);
1613 pd->expiry_entry.del_cb = pending_delete_del_cb;
1614 return pd;
1615}
1616
Neels Hofmeyrff4b6302015-11-30 00:07:02 +01001617static int gtphub_handle_delete_pdp_ctx(struct gtphub *hub,
1618 struct gtp_packet_desc *p,
1619 struct gtphub_peer_port *from_ctrl,
1620 struct gtphub_peer_port *to_ctrl)
1621{
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001622 struct gtphub_tunnel *known_tun = p->tun;
1623
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001624 if (p->type == GTP_DELETE_PDP_REQ) {
1625 if (!known_tun) {
1626 LOG(LOGL_ERROR, "Cannot find tunnel for Delete PDP Context Request.\n");
1627 return -1;
1628 }
1629
1630 /* Store the Delete Request until a successful Response is seen. */
1631 uint8_t teardown_ind;
1632 uint8_t nsapi;
1633
1634 if (gtpie_gettv1(p->ie, GTPIE_TEARDOWN, 0, &teardown_ind) != 0) {
1635 LOG(LOGL_ERROR, "Missing Teardown Ind IE in Delete PDP Context Request.\n");
1636 return -1;
1637 }
1638
1639 if (gtpie_gettv1(p->ie, GTPIE_NSAPI, 0, &nsapi) != 0) {
1640 LOG(LOGL_ERROR, "Missing NSAPI IE in Delete PDP Context Request.\n");
1641 return -1;
1642 }
1643
1644 struct pending_delete *pd = NULL;
1645
1646 struct pending_delete *pdi = NULL;
1647 llist_for_each_entry(pdi, &hub->pending_deletes, entry) {
1648 if ((pdi->tun == known_tun)
1649 && (pdi->teardown_ind == teardown_ind)
1650 && (pdi->nsapi == nsapi)) {
1651 pd = pdi;
1652 break;
1653 }
1654 }
1655
1656 if (!pd) {
1657 pd = pending_delete_new();
1658 pd->tun = known_tun;
1659 pd->teardown_ind = teardown_ind;
1660 pd->nsapi = nsapi;
1661
1662 LOG(LOGL_DEBUG, "Tunnel delete pending: %s\n",
1663 gtphub_tunnel_str(known_tun));
1664 llist_add(&pd->entry, &hub->pending_deletes);
1665 }
1666
1667 /* Add or refresh timeout. */
1668 expiry_add(&hub->expire_quickly, &pd->expiry_entry, p->timestamp);
1669
1670 /* If a pending_delete should expire before the response to
1671 * indicate success comes in, the responding peer will have the
1672 * tunnel deactivated, while the requesting peer gets no reply
1673 * and keeps the tunnel. The hope is that the requesting peer
1674 * will try again and get a useful response. */
1675 } else if (p->type == GTP_DELETE_PDP_RSP) {
1676 /* Find the Delete Request for this Response. */
1677 struct pending_delete *pd = NULL;
1678
1679 struct pending_delete *pdi;
1680 llist_for_each_entry(pdi, &hub->pending_deletes, entry) {
1681 if (known_tun == pdi->tun) {
1682 pd = pdi;
1683 break;
1684 }
1685 }
1686
1687 if (!pd) {
1688 LOG(LOGL_ERROR, "Delete PDP Context Response:"
1689 " Cannot find matching request.");
1690 /* If we delete the tunnel now, anyone can send a
1691 * Delete response to kill tunnels at will. */
1692 return -1;
1693 }
1694
1695 /* TODO handle teardown_ind and nsapi */
1696
1697 expiring_item_del(&pd->expiry_entry);
1698
1699 uint8_t cause;
1700 if (gtpie_gettv1(p->ie, GTPIE_CAUSE, 0, &cause) != 0) {
1701 LOG(LOGL_ERROR, "Delete PDP Context Response:"
1702 " Missing Cause IE.");
1703 /* If we delete the tunnel now, at least one of the
1704 * peers may still think it is active. */
1705 return -1;
1706 }
1707
1708 if (cause != GTPCAUSE_ACC_REQ) {
1709 LOG(LOGL_NOTICE,
1710 "Delete PDP Context Response indicates failure;"
1711 "for %s\n",
1712 gtphub_tunnel_str(known_tun));
1713 return -1;
1714 }
1715
1716 LOG(LOGL_DEBUG, "Delete PDP Context: removing tunnel %s\n",
1717 gtphub_tunnel_str(known_tun));
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001718 p->tun = NULL;
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01001719 expiring_item_del(&known_tun->expiry_entry);
1720 }
1721
Neels Hofmeyrff4b6302015-11-30 00:07:02 +01001722 return 0;
1723}
1724
1725static int gtphub_handle_update_pdp_ctx(struct gtphub *hub,
1726 struct gtp_packet_desc *p,
1727 struct gtphub_peer_port *from_ctrl,
1728 struct gtphub_peer_port *to_ctrl)
1729{
1730 /* TODO */
1731 return 0;
1732}
1733
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001734/* Read GSN address IEs from p, and make sure these peer addresses exist in
1735 * bind[plane_idx] with default ports, in their respective planes (both Ctrl
1736 * and User). Map TEIs announced in IEs, and write mapped TEIs in-place into
1737 * the packet p. */
1738static int gtphub_handle_pdp_ctx(struct gtphub *hub,
1739 struct gtp_packet_desc *p,
1740 struct gtphub_peer_port *from_ctrl,
1741 struct gtphub_peer_port *to_ctrl)
1742{
1743 OSMO_ASSERT(p->plane_idx == GTPH_PLANE_CTRL);
1744
1745 switch (p->type) {
1746 case GTP_CREATE_PDP_REQ:
1747 case GTP_CREATE_PDP_RSP:
1748 return gtphub_handle_create_pdp_ctx(hub, p,
1749 from_ctrl, to_ctrl);
Neels Hofmeyrff4b6302015-11-30 00:07:02 +01001750
1751 case GTP_DELETE_PDP_REQ:
1752 case GTP_DELETE_PDP_RSP:
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001753 return gtphub_handle_delete_pdp_ctx(hub, p,
Neels Hofmeyrff4b6302015-11-30 00:07:02 +01001754 from_ctrl, to_ctrl);
1755
1756 case GTP_UPDATE_PDP_REQ:
1757 case GTP_UPDATE_PDP_RSP:
1758 return gtphub_handle_update_pdp_ctx(hub, p,
1759 from_ctrl, to_ctrl);
1760
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001761 default:
1762 /* Nothing to do for this message type. */
1763 return 0;
1764 }
1765
1766}
1767
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001768static int gtphub_send_del_pdp_ctx(struct gtphub *hub,
1769 struct gtphub_tunnel *tun,
1770 int to_side)
1771{
1772 static uint8_t del_ctx_msg[16] = {
1773 0x32, /* GTP v1 flags */
1774 GTP_DELETE_PDP_REQ,
1775 0x00, 0x08, /* Length in network byte order */
1776 0x00, 0x00, 0x00, 0x00, /* TEI to be replaced */
1777 0, 0, /* Seq, to be replaced */
1778 0, 0, /* no extensions */
1779 0x13, 0xff, /* 19: Teardown ind = 1 */
1780 0x14, 0 /* 20: NSAPI = 0 */
1781 };
1782
1783 uint32_t *tei = (uint32_t*)&del_ctx_msg[4];
1784 uint16_t *seq = (uint16_t*)&del_ctx_msg[8];
1785
1786 struct gtphub_tunnel_endpoint *te =
1787 &tun->endpoint[to_side][GTPH_PLANE_CTRL];
1788
1789 if (! te->peer)
1790 return 0;
1791
1792 *tei = hton32(te->tei_orig);
1793 *seq = hton16(nr_pool_next(&te->peer->peer_addr->peer->seq_pool));
1794
1795 struct gtphub_bind *to_bind = &hub->to_gsns[to_side][GTPH_PLANE_CTRL];
Neels Hofmeyrd8660ef2015-12-03 11:24:39 +01001796 int rc = gtphub_write(&to_bind->ofd, &te->peer->sa,
1797 del_ctx_msg, sizeof(del_ctx_msg));
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001798 if (rc != 0) {
1799 LOG(LOGL_ERROR,
1800 "Failed to send out-of-band Delete PDP Context Request to %s\n",
1801 gtphub_port_str(te->peer));
1802 }
1803 return rc;
1804}
1805
1806/* Tell all peers on the other end of tunnels that PDP contexts are void. */
1807static void gtphub_restarted(struct gtphub *hub,
1808 struct gtp_packet_desc *p,
1809 struct gtphub_peer_port *pp)
1810{
Neels Hofmeyr936b8902015-12-02 14:31:08 +01001811 LOG(LOGL_DEBUG, "Peer has restarted: %s\n",
1812 gtphub_port_str(pp));
1813
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001814 struct gtphub_tunnel *tun;
1815 llist_for_each_entry(tun, &hub->tunnels, entry) {
1816 int side_idx;
1817 for_each_side(side_idx) {
Neels Hofmeyrc6d51f52015-12-02 15:44:34 +01001818 struct gtphub_tunnel_endpoint *te = &tun->endpoint[side_idx][GTPH_PLANE_CTRL];
1819 struct gtphub_tunnel_endpoint *te2 = &tun->endpoint[other_side_idx(side_idx)][GTPH_PLANE_CTRL];
1820 if ((!te->peer)
1821 || (!te2->tei_orig)
1822 || (pp->peer_addr->peer != te->peer->peer_addr->peer))
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001823 continue;
1824
Neels Hofmeyr936b8902015-12-02 14:31:08 +01001825 LOG(LOGL_DEBUG, "Deleting tunnel due to peer restart: %s\n",
1826 gtphub_tunnel_str(tun));
1827
Neels Hofmeyrbc443302015-12-01 15:20:18 +01001828 /* Send a Delete PDP Context Request to the
1829 * peer on the other side, remember the pending
1830 * delete and wait for the response to delete
1831 * the tunnel. Clear this side of the tunnel to
1832 * make sure it isn't used.
1833 *
1834 * Should the delete message send fail, or if no
1835 * response is received, this tunnel will expire. If
1836 * its TEIs come up in a new PDP Context Request, it
1837 * will be removed. If messages for this tunnel should
1838 * come in (from the not restarted side), they will be
1839 * dropped because the tunnel is rendered unusable. */
1840 gtphub_send_del_pdp_ctx(hub, tun, other_side_idx(side_idx));
1841
1842 struct pending_delete *pd;
1843 pd = pending_delete_new();
1844 pd->tun = tun;
1845 pd->teardown_ind = 0xff;
1846 pd->nsapi = 0;
1847 llist_add(&pd->entry, &hub->pending_deletes);
1848 expiry_add(&hub->expire_quickly, &pd->expiry_entry, p->timestamp);
1849
1850 gtphub_tunnel_endpoint_set_peer(&tun->endpoint[side_idx][GTPH_PLANE_CTRL],
1851 NULL);
1852 gtphub_tunnel_endpoint_set_peer(&tun->endpoint[side_idx][GTPH_PLANE_USER],
1853 NULL);
1854 }
1855 }
1856}
1857
1858static int get_restart_count(struct gtp_packet_desc *p)
1859{
1860 int ie_idx;
1861 ie_idx = gtpie_getie(p->ie, GTPIE_RECOVERY, 0);
1862 if (ie_idx < 0)
1863 return -1;
1864 return ntoh8(p->ie[ie_idx]->tv1.v);
1865}
1866
1867static void gtphub_check_restart_counter(struct gtphub *hub,
1868 struct gtp_packet_desc *p,
1869 struct gtphub_peer_port *from)
1870{
1871 /* If the peer is sending a Recovery IE (7.7.11) with a restart counter
1872 * that doesn't match the peer's previously sent restart counter, clear
1873 * that peer and cancel PDP contexts. */
1874
1875 int restart = get_restart_count(p);
1876
1877 if ((restart < 0) || (restart > 255))
1878 return;
1879
1880 if ((from->last_restart_count >= 0) && (from->last_restart_count <= 255)) {
1881 if (from->last_restart_count != restart) {
1882 gtphub_restarted(hub, p, from);
1883 }
1884 }
1885
1886 from->last_restart_count = restart;
1887}
1888
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01001889static int from_sgsns_read_cb(struct osmo_fd *from_sgsns_ofd, unsigned int what)
1890{
1891 unsigned int plane_idx = from_sgsns_ofd->priv_nr;
1892 OSMO_ASSERT(plane_idx < GTPH_PLANE_N);
Neels Hofmeyr28a70f22015-12-06 15:22:54 +01001893 LOG(LOGL_DEBUG, "=== reading from SGSN (%s)\n",
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01001894 gtphub_plane_idx_names[plane_idx]);
1895
1896 if (!(what & BSC_FD_READ))
1897 return 0;
1898
1899 struct gtphub *hub = from_sgsns_ofd->data;
1900
1901 static uint8_t buf[4096];
1902 struct osmo_sockaddr from_addr;
1903 struct osmo_sockaddr to_addr;
1904 struct osmo_fd *to_ofd;
1905 int len;
1906 uint8_t *reply_buf;
1907
1908 len = gtphub_read(from_sgsns_ofd, &from_addr, buf, sizeof(buf));
1909 if (len < 1)
1910 return 0;
1911
1912 len = gtphub_handle_buf(hub, GTPH_SIDE_SGSN, plane_idx, &from_addr,
1913 buf, len, gtphub_now(),
1914 &reply_buf, &to_ofd, &to_addr);
1915 if (len < 1)
1916 return 0;
1917
1918 return gtphub_write(to_ofd, &to_addr, reply_buf, len);
1919}
1920
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001921static int from_ggsns_read_cb(struct osmo_fd *from_ggsns_ofd, unsigned int what)
1922{
1923 unsigned int plane_idx = from_ggsns_ofd->priv_nr;
1924 OSMO_ASSERT(plane_idx < GTPH_PLANE_N);
Neels Hofmeyr28a70f22015-12-06 15:22:54 +01001925 LOG(LOGL_DEBUG, "=== reading from GGSN (%s)\n",
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01001926 gtphub_plane_idx_names[plane_idx]);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001927 if (!(what & BSC_FD_READ))
1928 return 0;
1929
1930 struct gtphub *hub = from_ggsns_ofd->data;
1931
1932 static uint8_t buf[4096];
1933 struct osmo_sockaddr from_addr;
1934 struct osmo_sockaddr to_addr;
1935 struct osmo_fd *to_ofd;
Neels Hofmeyr16c3f572015-11-11 17:27:01 +01001936 int len;
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01001937 uint8_t *reply_buf;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001938
1939 len = gtphub_read(from_ggsns_ofd, &from_addr, buf, sizeof(buf));
1940 if (len < 1)
1941 return 0;
1942
Neels Hofmeyra9905a52015-11-29 23:49:48 +01001943 len = gtphub_handle_buf(hub, GTPH_SIDE_GGSN, plane_idx, &from_addr,
1944 buf, len, gtphub_now(),
1945 &reply_buf, &to_ofd, &to_addr);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001946 if (len < 1)
1947 return 0;
1948
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01001949 return gtphub_write(to_ofd, &to_addr, reply_buf, len);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001950}
1951
1952static int gtphub_unmap(struct gtphub *hub,
1953 struct gtp_packet_desc *p,
1954 struct gtphub_peer_port *from,
1955 struct gtphub_peer_port *to_proxy,
1956 struct gtphub_peer_port **final_unmapped,
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001957 struct gtphub_peer_port **unmapped_from_seq)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001958{
1959 /* Always (try to) unmap sequence and TEI numbers, which need to be
1960 * replaced in the packet. Either way, give precedence to the proxy, if
1961 * configured. */
1962
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01001963 if (unmapped_from_seq)
1964 *unmapped_from_seq = NULL;
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01001965 if (final_unmapped)
1966 *final_unmapped = NULL;
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001967 p->tun = NULL;
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01001968
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001969 struct gtphub_peer_port *from_seq = NULL;
1970 struct gtphub_peer_port *from_tei = NULL;
1971 struct gtphub_peer_port *unmapped = NULL;
1972
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001973 from_seq = gtphub_unmap_seq(p, from);
1974
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01001975 if (gtphub_unmap_header_tei(&from_tei, &p->tun, hub, p, from) < 0)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001976 return -1;
1977
1978 struct gtphub_peer *from_peer = from->peer_addr->peer;
1979 if (from_seq && from_tei && (from_seq != from_tei)) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01001980 LOG(LOGL_DEBUG,
1981 "Seq unmap and TEI unmap yield two different peers."
1982 " Using seq unmap."
Neels Hofmeyr28a70f22015-12-06 15:22:54 +01001983 " (from %s %s: seq %d yields %s, tei %u yields %s)\n",
Neels Hofmeyr063a8022015-11-16 14:35:13 +01001984 gtphub_plane_idx_names[p->plane_idx],
1985 gtphub_peer_str(from_peer),
1986 (int)p->seq,
1987 gtphub_port_str(from_seq),
Neels Hofmeyre54cd152015-11-24 13:31:06 +01001988 (unsigned int)p->header_tei_rx,
Neels Hofmeyr063a8022015-11-16 14:35:13 +01001989 gtphub_port_str2(from_tei)
1990 );
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02001991 }
1992 unmapped = (from_seq? from_seq : from_tei);
1993
1994 if (unmapped && to_proxy && (unmapped != to_proxy)) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01001995 LOG(LOGL_NOTICE,
1996 "Unmap yields a different peer than the configured proxy."
1997 " Using proxy."
Neels Hofmeyr063a8022015-11-16 14:35:13 +01001998 " unmapped: %s proxy: %s\n",
1999 gtphub_port_str(unmapped),
2000 gtphub_port_str2(to_proxy)
2001 );
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002002 }
2003 unmapped = (to_proxy? to_proxy : unmapped);
2004
2005 if (!unmapped) {
2006 /* Return no error, but returned pointers are all NULL. */
2007 return 0;
2008 }
2009
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002010 if (unmapped_from_seq)
2011 *unmapped_from_seq = from_seq;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002012 if (final_unmapped)
2013 *final_unmapped = unmapped;
2014 return 0;
2015}
2016
2017static int gsn_addr_to_sockaddr(struct gsn_addr *src,
2018 uint16_t port,
2019 struct osmo_sockaddr *dst)
2020{
2021 return osmo_sockaddr_init_udp(dst, gsn_addr_to_str(src), port);
2022}
2023
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002024/* If p is an Echo request, replace p's data with the matching response and
2025 * return 1. If p is no Echo request, return 0, or -1 if an invalid packet is
2026 * detected. */
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01002027static int gtphub_handle_echo_req(struct gtphub *hub, struct gtp_packet_desc *p,
2028 uint8_t **reply_buf)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002029{
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002030 if (p->type != GTP_ECHO_REQ)
2031 return 0;
2032
2033 static uint8_t echo_response_data[14] = {
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01002034 0x32, /* GTP v1 flags */
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002035 GTP_ECHO_RSP,
2036 0x00, 14 - 8, /* Length in network byte order */
2037 0x00, 0x00, 0x00, 0x00, /* Zero TEI */
2038 0, 0, /* Seq, to be replaced */
2039 0, 0, /* no extensions */
2040 0x0e, /* Recovery IE */
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01002041 0 /* Restart counter, to be replaced */
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002042 };
2043 uint16_t *seq = (uint16_t*)&echo_response_data[8];
2044 uint8_t *recovery = &echo_response_data[13];
2045
2046 *seq = hton16(p->seq);
2047 *recovery = hub->restart_counter;
2048
2049 *reply_buf = echo_response_data;
2050
2051 return sizeof(echo_response_data);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002052}
2053
Neels Hofmeyrc83cd892015-11-11 14:01:06 +01002054struct gtphub_peer_port *gtphub_known_addr_have_port(const struct gtphub_bind *bind,
2055 const struct osmo_sockaddr *addr);
2056
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002057/* Parse buffer as GTP packet, replace elements in-place and return the ofd and
2058 * address to forward to. Return a pointer to the osmo_fd, but copy the
2059 * sockaddr to *to_addr. The reason for this is that the sockaddr may expire at
2060 * any moment, while the osmo_fd is guaranteed to persist. Return the number of
2061 * bytes to forward, 0 or less on failure. */
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002062int gtphub_handle_buf(struct gtphub *hub,
2063 unsigned int side_idx,
2064 unsigned int plane_idx,
2065 const struct osmo_sockaddr *from_addr,
2066 uint8_t *buf,
2067 size_t received,
2068 time_t now,
2069 uint8_t **reply_buf,
2070 struct osmo_fd **to_ofd,
2071 struct osmo_sockaddr *to_addr)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002072{
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002073 struct gtphub_bind *from_bind = &hub->to_gsns[side_idx][plane_idx];
2074 struct gtphub_bind *to_bind = &hub->to_gsns[other_side_idx(side_idx)][plane_idx];
Neels Hofmeyrdba6d1a2015-11-20 01:27:22 +01002075
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +01002076 rate_ctr_add(&from_bind->counters_io->ctr[GTPH_CTR_BYTES_IN],
2077 received);
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002078 LOG(LOGL_DEBUG, "%s rx %s from %s %s\n",
2079 (side_idx == GTPH_SIDE_GGSN)? "<-" : "->",
Neels Hofmeyre921e322015-11-11 00:45:50 +01002080 gtphub_plane_idx_names[plane_idx],
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002081 gtphub_side_idx_names[side_idx],
Neels Hofmeyre921e322015-11-11 00:45:50 +01002082 osmo_sockaddr_to_str(from_addr));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002083
Neels Hofmeyrd8660ef2015-12-03 11:24:39 +01002084 struct gtp_packet_desc p;
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002085 gtp_decode(buf, received, side_idx, plane_idx, &p, now);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002086
Neels Hofmeyr87c83d02015-12-03 11:25:27 +01002087 if (p.rc <= 0) {
2088 LOG(LOGL_ERROR, "INVALID: dropping GTP packet from %s %s %s\n",
2089 gtphub_side_idx_names[side_idx],
2090 gtphub_plane_idx_names[plane_idx],
2091 osmo_sockaddr_to_str(from_addr));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002092 return -1;
Neels Hofmeyr87c83d02015-12-03 11:25:27 +01002093 }
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002094
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +01002095 rate_ctr_inc(&from_bind->counters_io->ctr[GTPH_CTR_PKTS_IN]);
2096
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002097 int reply_len;
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01002098 reply_len = gtphub_handle_echo_req(hub, &p, reply_buf);
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002099 if (reply_len > 0) {
2100 /* It was an echo. Nothing left to do. */
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002101 osmo_sockaddr_copy(to_addr, from_addr);
Neels Hofmeyrdba6d1a2015-11-20 01:27:22 +01002102 *to_ofd = &from_bind->ofd;
Neels Hofmeyr4b2cbda2015-11-20 03:16:19 +01002103
2104 rate_ctr_inc(&from_bind->counters_io->ctr[GTPH_CTR_PKTS_OUT]);
2105 rate_ctr_add(&from_bind->counters_io->ctr[GTPH_CTR_BYTES_OUT],
2106 reply_len);
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002107 LOG(LOGL_DEBUG, "%s Echo response to %s: %d bytes to %s\n",
2108 (side_idx == GTPH_SIDE_GGSN)? "-->" : "<--",
2109 gtphub_side_idx_names[side_idx],
Neels Hofmeyr4b2cbda2015-11-20 03:16:19 +01002110 (int)reply_len, osmo_sockaddr_to_str(to_addr));
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002111 return reply_len;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002112 }
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002113 if (reply_len < 0)
2114 return -1;
2115
Neels Hofmeyrdba6d1a2015-11-20 01:27:22 +01002116 *to_ofd = &to_bind->ofd;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002117
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01002118 /* If a proxy is configured, check that it's indeed that proxy talking
2119 * to us. A proxy is a forced 1:1 connection, e.g. to another gtphub,
2120 * so no-one else is allowed to talk to us from that side. */
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002121 struct gtphub_peer_port *from_peer = hub->proxy[side_idx][plane_idx];
2122 if (from_peer) {
2123 if (osmo_sockaddr_cmp(&from_peer->sa, from_addr) != 0) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002124 LOG(LOGL_ERROR,
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002125 "Rejecting: %s proxy configured, but GTP packet"
2126 " received on %s bind is from another sender:"
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002127 " proxy: %s sender: %s\n",
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002128 gtphub_side_idx_names[side_idx],
2129 gtphub_side_idx_names[side_idx],
2130 gtphub_port_str(from_peer),
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002131 osmo_sockaddr_to_str(from_addr));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002132 return -1;
2133 }
2134 }
2135
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002136 if (!from_peer) {
2137 /* Find or create a peer with a matching address. The sender's
2138 * port may in fact differ. */
2139 from_peer = gtphub_known_addr_have_port(from_bind, from_addr);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002140 }
2141
2142 /* If any PDP context has been created, we already have an entry for
Neels Hofmeyr3fdba2e2015-11-30 14:17:21 +01002143 * this GSN. If we don't have an entry, a GGSN has nothing to tell us
2144 * about, while an SGSN may initiate a PDP context. */
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002145 if (!from_peer) {
2146 if (side_idx == GTPH_SIDE_GGSN) {
2147 LOG(LOGL_ERROR, "Dropping packet: unknown GGSN peer: %s\n",
2148 osmo_sockaddr_to_str(from_addr));
2149 return -1;
2150 } else {
2151 /* SGSN */
2152 /* A new peer. If this is on the Ctrl plane, an SGSN
2153 * may make first contact without being known yet, so
2154 * create the peer struct for the current sender. */
2155 if (plane_idx != GTPH_PLANE_CTRL) {
2156 LOG(LOGL_ERROR,
2157 "Dropping packet: User plane peer was not"
2158 "announced by PDP Context: %s\n",
2159 osmo_sockaddr_to_str(from_addr));
2160 return -1;
2161 }
2162
2163 struct gsn_addr from_gsna;
2164 uint16_t from_port;
2165 if (gsn_addr_from_sockaddr(&from_gsna, &from_port, from_addr) != 0)
2166 return -1;
2167
2168 from_peer = gtphub_port_have(hub, from_bind, &from_gsna, from_port);
2169 }
2170 }
2171
2172 if (!from_peer) {
2173 /* This could theoretically happen for invalid address data or
2174 * somesuch. */
2175 LOG(LOGL_ERROR, "Dropping packet: invalid %s peer: %s\n",
2176 gtphub_side_idx_names[side_idx],
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002177 osmo_sockaddr_to_str(from_addr));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002178 return -1;
2179 }
2180
Neels Hofmeyre38fb662015-12-06 16:44:14 +01002181 rate_ctr_add(&from_peer->counters_io->ctr[GTPH_CTR_BYTES_IN],
2182 received);
2183 rate_ctr_inc(&from_peer->counters_io->ctr[GTPH_CTR_PKTS_IN]);
2184
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002185 LOG(LOGL_DEBUG, "from %s peer: %s\n", gtphub_side_idx_names[side_idx],
2186 gtphub_port_str(from_peer));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002187
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002188 struct gtphub_peer_port *to_peer_from_seq;
2189 struct gtphub_peer_port *to_peer;
2190 if (gtphub_unmap(hub, &p, from_peer,
2191 hub->proxy[other_side_idx(side_idx)][plane_idx],
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01002192 &to_peer, &to_peer_from_seq)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002193 != 0) {
2194 return -1;
2195 }
2196
Neels Hofmeyre38fb662015-12-06 16:44:14 +01002197 if (p.tun) {
2198 struct gtphub_tunnel_endpoint *te = &p.tun->endpoint[p.side_idx][p.plane_idx];
2199 rate_ctr_add(&te->counters_io->ctr[GTPH_CTR_BYTES_IN],
2200 received);
2201 rate_ctr_inc(&te->counters_io->ctr[GTPH_CTR_PKTS_IN]);
2202 }
2203
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002204 if ((!to_peer) && (side_idx == GTPH_SIDE_SGSN)) {
2205 if (gtphub_resolve_ggsn(hub, &p, &to_peer) < 0)
2206 return -1;
2207 }
2208
2209 if (!to_peer) {
2210 LOG(LOGL_ERROR, "No %s to send to. Dropping packet.\n",
2211 gtphub_side_idx_names[other_side_idx(side_idx)]);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002212 return -1;
2213 }
2214
2215 if (plane_idx == GTPH_PLANE_CTRL) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002216 /* This may be a Create PDP Context response. If it is, there
2217 * are other addresses in the GTP message to set up apart from
2218 * the sender. */
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01002219 if (gtphub_handle_pdp_ctx(hub, &p, from_peer, to_peer)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002220 != 0)
2221 return -1;
2222 }
Neels Hofmeyrd53c6042015-12-03 13:59:49 +01002223
2224 /* Either to_peer was resolved from an existing tunnel,
2225 * or a PDP Ctx and thus a tunnel has just been created,
2226 * or the tunnel has been deleted due to this message. */
2227 OSMO_ASSERT(p.tun || (p.type == GTP_DELETE_PDP_RSP));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002228
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002229 gtphub_check_restart_counter(hub, &p, from_peer);
Neels Hofmeyrbc443302015-12-01 15:20:18 +01002230 gtphub_map_restart_counter(hub, &p);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002231
2232 /* If the GGSN is replying to an SGSN request, the sequence nr has
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002233 * already been unmapped above (to_peer_from_seq != NULL), and we need not
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002234 * create a new mapping. */
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002235 if (!to_peer_from_seq)
2236 gtphub_map_seq(&p, from_peer, to_peer);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002237
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002238 osmo_sockaddr_copy(to_addr, &to_peer->sa);
Neels Hofmeyrbb3d6782015-11-09 15:12:25 +01002239
2240 *reply_buf = (uint8_t*)p.data;
Neels Hofmeyre921e322015-11-11 00:45:50 +01002241
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +01002242 if (received) {
2243 rate_ctr_inc(&to_bind->counters_io->ctr[GTPH_CTR_PKTS_OUT]);
2244 rate_ctr_add(&to_bind->counters_io->ctr[GTPH_CTR_BYTES_OUT],
2245 received);
Neels Hofmeyre38fb662015-12-06 16:44:14 +01002246
2247 rate_ctr_inc(&to_peer->counters_io->ctr[GTPH_CTR_PKTS_OUT]);
2248 rate_ctr_add(&to_peer->counters_io->ctr[GTPH_CTR_BYTES_OUT],
2249 received);
Neels Hofmeyr1ba50c62015-11-20 01:28:40 +01002250 }
Neels Hofmeyre38fb662015-12-06 16:44:14 +01002251
2252 if (p.tun) {
2253 struct gtphub_tunnel_endpoint *te = &p.tun->endpoint[other_side_idx(p.side_idx)][p.plane_idx];
2254 rate_ctr_inc(&te->counters_io->ctr[GTPH_CTR_PKTS_OUT]);
2255 rate_ctr_add(&te->counters_io->ctr[GTPH_CTR_BYTES_OUT],
2256 received);
2257 }
2258
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002259 LOG(LOGL_DEBUG, "%s Forward to %s: %d bytes to %s\n",
2260 (side_idx == GTPH_SIDE_SGSN)? "-->" : "<--",
2261 gtphub_side_idx_names[other_side_idx(side_idx)],
Neels Hofmeyre921e322015-11-11 00:45:50 +01002262 (int)received, osmo_sockaddr_to_str(to_addr));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002263 return received;
2264}
2265
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +01002266static void resolved_gssn_del_cb(struct expiring_item *expi)
2267{
2268 struct gtphub_resolved_ggsn *ggsn;
2269 ggsn = container_of(expi, struct gtphub_resolved_ggsn, expiry_entry);
2270
2271 gtphub_port_ref_count_dec(ggsn->peer);
2272 llist_del(&ggsn->entry);
2273
2274 ggsn->expiry_entry.del_cb = 0;
2275 expiring_item_del(&ggsn->expiry_entry);
2276
2277 talloc_free(ggsn);
2278}
2279
2280void gtphub_resolved_ggsn(struct gtphub *hub, const char *apn_oi_str,
2281 struct gsn_addr *resolved_addr,
2282 time_t now)
2283{
2284 struct gtphub_peer_port *pp;
2285 struct gtphub_resolved_ggsn *ggsn;
2286
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002287 LOG(LOGL_DEBUG, "Resolved GGSN callback: %s %s\n",
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002288 apn_oi_str, osmo_hexdump((unsigned char*)resolved_addr,
2289 sizeof(*resolved_addr)));
Neels Hofmeyr3317c842015-11-11 17:20:42 +01002290
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002291 pp = gtphub_port_have(hub, &hub->to_gsns[GTPH_SIDE_GGSN][GTPH_PLANE_CTRL],
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +01002292 resolved_addr, 2123);
2293 if (!pp) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002294 LOG(LOGL_ERROR, "Internal: Cannot create/find peer '%s'\n",
2295 gsn_addr_to_str(resolved_addr));
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +01002296 return;
2297 }
2298
2299 ggsn = talloc_zero(osmo_gtphub_ctx, struct gtphub_resolved_ggsn);
2300 OSMO_ASSERT(ggsn);
Neels Hofmeyra4370dd2015-11-24 12:46:11 +01002301 INIT_LLIST_HEAD(&ggsn->entry);
2302 expiring_item_init(&ggsn->expiry_entry);
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +01002303
2304 ggsn->peer = pp;
2305 gtphub_port_ref_count_inc(pp);
2306
2307 strncpy(ggsn->apn_oi_str, apn_oi_str, sizeof(ggsn->apn_oi_str));
Neels Hofmeyr3c820ee2015-11-17 12:28:09 +01002308 ggsn->apn_oi_str[sizeof(ggsn->apn_oi_str) - 1] = '\0';
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +01002309
2310 ggsn->expiry_entry.del_cb = resolved_gssn_del_cb;
Neels Hofmeyr2c8b5812015-11-25 16:45:59 +01002311 expiry_add(&hub->expire_slowly, &ggsn->expiry_entry, now);
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +01002312
2313 llist_add(&ggsn->entry, &hub->resolved_ggsns);
2314}
2315
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002316static int gtphub_gc_peer_port(struct gtphub_peer_port *pp)
2317{
2318 return pp->ref_count == 0;
2319}
2320
2321static int gtphub_gc_peer_addr(struct gtphub_peer_addr *pa)
2322{
2323 struct gtphub_peer_port *pp, *npp;
2324 llist_for_each_entry_safe(pp, npp, &pa->ports, entry) {
2325 if (gtphub_gc_peer_port(pp)) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002326 LOG(LOGL_DEBUG, "expired: peer %s\n",
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002327 gtphub_port_str(pp));
2328 gtphub_peer_port_del(pp);
2329 }
2330 }
2331 return llist_empty(&pa->ports);
2332}
2333
2334static int gtphub_gc_peer(struct gtphub_peer *p)
2335{
2336 struct gtphub_peer_addr *pa, *npa;
2337 llist_for_each_entry_safe(pa, npa, &p->addresses, entry) {
2338 if (gtphub_gc_peer_addr(pa)) {
2339 gtphub_peer_addr_del(pa);
2340 }
2341 }
2342
2343 /* Note that there's a ref_count in each gtphub_peer_port instance
2344 * listed within p->addresses, referenced by TEI mappings from
2345 * hub->tei_map. As long as those don't expire, this peer will stay. */
2346
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002347 return llist_empty(&p->addresses)
2348 && nr_map_empty(&p->seq_map);
2349}
2350
2351static void gtphub_gc_bind(struct gtphub_bind *b)
2352{
2353 struct gtphub_peer *p, *n;
2354 llist_for_each_entry_safe(p, n, &b->peers, entry) {
2355 if (gtphub_gc_peer(p)) {
2356 gtphub_peer_del(p);
2357 }
2358 }
2359}
2360
2361void gtphub_gc(struct gtphub *hub, time_t now)
2362{
2363 int expired;
Neels Hofmeyr2c8b5812015-11-25 16:45:59 +01002364 expired = expiry_tick(&hub->expire_quickly, now);
2365 expired += expiry_tick(&hub->expire_slowly, now);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002366
2367 /* ... */
2368
2369 if (expired) {
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002370 int s, p;
2371 for_each_side_and_plane(s, p) {
2372 gtphub_gc_bind(&hub->to_gsns[s][p]);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002373 }
2374 }
2375}
2376
2377static void gtphub_gc_cb(void *data)
2378{
2379 struct gtphub *hub = data;
2380 gtphub_gc(hub, gtphub_now());
2381 osmo_timer_schedule(&hub->gc_timer, GTPH_GC_TICK_SECONDS, 0);
2382}
2383
2384static void gtphub_gc_start(struct gtphub *hub)
2385{
2386 hub->gc_timer.cb = gtphub_gc_cb;
2387 hub->gc_timer.data = hub;
2388
2389 osmo_timer_schedule(&hub->gc_timer, GTPH_GC_TICK_SECONDS, 0);
2390}
2391
2392/* called by unit tests */
2393void gtphub_init(struct gtphub *hub)
2394{
2395 gtphub_zero(hub);
2396
Neels Hofmeyre54cd152015-11-24 13:31:06 +01002397 INIT_LLIST_HEAD(&hub->tunnels);
Neels Hofmeyr10fc0242015-12-01 00:23:45 +01002398 INIT_LLIST_HEAD(&hub->pending_deletes);
Neels Hofmeyre54cd152015-11-24 13:31:06 +01002399
Neels Hofmeyr2c8b5812015-11-25 16:45:59 +01002400 expiry_init(&hub->expire_quickly, GTPH_EXPIRE_QUICKLY_SECS);
2401 expiry_init(&hub->expire_slowly, GTPH_EXPIRE_SLOWLY_MINUTES * 60);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002402
Neels Hofmeyrd121ea62015-11-27 01:20:53 +01002403 nr_pool_init(&hub->tei_pool, 1, 0xffffffff);
2404
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002405 int side_idx;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002406 int plane_idx;
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002407 for_each_side_and_plane(side_idx, plane_idx) {
2408 gtphub_bind_init(&hub->to_gsns[side_idx][plane_idx]);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002409 }
Neels Hofmeyr390e9102015-11-16 13:45:13 +01002410
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002411 hub->to_gsns[GTPH_SIDE_SGSN][GTPH_PLANE_CTRL].label = "SGSN Ctrl";
2412 hub->to_gsns[GTPH_SIDE_GGSN][GTPH_PLANE_CTRL].label = "GGSN Ctrl";
2413 hub->to_gsns[GTPH_SIDE_SGSN][GTPH_PLANE_USER].label = "SGSN User";
2414 hub->to_gsns[GTPH_SIDE_GGSN][GTPH_PLANE_USER].label = "GGSN User";
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002415}
2416
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +01002417/* For the test suite, this is kept separate from gtphub_stop(), which also
2418 * closes sockets. The test suite avoids using sockets and would cause
2419 * segfaults when trying to close uninitialized ofds. */
2420void gtphub_free(struct gtphub *hub)
2421{
2422 /* By expiring all mappings, a garbage collection should free
2423 * everything else. A gtphub_bind_free() will assert that everything is
2424 * indeed empty. */
Neels Hofmeyr2c8b5812015-11-25 16:45:59 +01002425 expiry_clear(&hub->expire_quickly);
2426 expiry_clear(&hub->expire_slowly);
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +01002427
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002428 int side_idx;
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +01002429 int plane_idx;
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002430 for_each_side_and_plane(side_idx, plane_idx) {
2431 gtphub_gc_bind(&hub->to_gsns[side_idx][plane_idx]);
2432 gtphub_bind_free(&hub->to_gsns[side_idx][plane_idx]);
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +01002433 }
2434}
2435
2436void gtphub_stop(struct gtphub *hub)
2437{
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002438 int side_idx;
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +01002439 int plane_idx;
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002440 for_each_side_and_plane(side_idx, plane_idx) {
2441 gtphub_bind_stop(&hub->to_gsns[side_idx][plane_idx]);
Neels Hofmeyr20bd6bf2015-11-20 00:08:28 +01002442 }
2443 gtphub_free(hub);
2444}
2445
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002446static int gtphub_make_proxy(struct gtphub *hub,
2447 struct gtphub_peer_port **pp,
2448 struct gtphub_bind *bind,
2449 const struct gtphub_cfg_addr *addr)
2450{
2451 if (!addr->addr_str)
2452 return 0;
2453
2454 struct gsn_addr gsna;
2455 if (gsn_addr_from_str(&gsna, addr->addr_str) != 0)
2456 return -1;
2457
2458 *pp = gtphub_port_have(hub, bind, &gsna, addr->port);
2459
2460 /* This is *the* proxy. Make sure it is never expired. */
2461 gtphub_port_ref_count_inc(*pp);
2462 return 0;
2463}
2464
Neels Hofmeyrba9e9f62015-11-26 22:19:22 +01002465int gtphub_start(struct gtphub *hub, struct gtphub_cfg *cfg,
2466 uint8_t restart_counter)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002467{
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002468 gtphub_init(hub);
Neels Hofmeyrb6c2db52015-11-18 18:11:32 +01002469
Neels Hofmeyrba9e9f62015-11-26 22:19:22 +01002470 hub->restart_counter = restart_counter;
Neels Hofmeyrca2361c2015-12-03 14:12:44 +01002471 hub->sgsn_use_sender = cfg->sgsn_use_sender? 1 : 0;
Neels Hofmeyrba9e9f62015-11-26 22:19:22 +01002472
Neels Hofmeyrb6c2db52015-11-18 18:11:32 +01002473 /* If a Ctrl plane proxy is configured, ares will never be used. */
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002474 if (!cfg->proxy[GTPH_SIDE_GGSN][GTPH_PLANE_CTRL].addr_str) {
Neels Hofmeyrb6c2db52015-11-18 18:11:32 +01002475 if (gtphub_ares_init(hub) != 0) {
2476 LOG(LOGL_FATAL, "Failed to initialize ares\n");
2477 return -1;
2478 }
2479 }
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002480
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002481 int side_idx;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002482 int plane_idx;
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002483 for_each_side_and_plane(side_idx, plane_idx) {
Neels Hofmeyr08550082015-11-30 12:19:50 +01002484 int rc;
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002485 rc = gtphub_bind_start(&hub->to_gsns[side_idx][plane_idx],
2486 &cfg->to_gsns[side_idx][plane_idx],
2487 (side_idx == GTPH_SIDE_SGSN)
2488 ? from_sgsns_read_cb
2489 : from_ggsns_read_cb,
2490 hub, plane_idx);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002491 if (rc) {
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002492 LOG(LOGL_FATAL, "Failed to bind for %ss (%s)\n",
2493 gtphub_side_idx_names[side_idx],
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002494 gtphub_plane_idx_names[plane_idx]);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002495 return rc;
2496 }
2497 }
2498
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002499 for_each_side_and_plane(side_idx, plane_idx) {
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002500 if (gtphub_make_proxy(hub,
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002501 &hub->proxy[side_idx][plane_idx],
2502 &hub->to_gsns[side_idx][plane_idx],
2503 &cfg->proxy[side_idx][plane_idx])
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002504 != 0) {
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002505 LOG(LOGL_FATAL, "Cannot configure %s proxy"
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002506 " %s port %d.\n",
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002507 gtphub_side_idx_names[side_idx],
2508 cfg->proxy[side_idx][plane_idx].addr_str,
2509 (int)cfg->proxy[side_idx][plane_idx].port);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002510 return -1;
2511 }
2512 }
2513
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002514 for_each_side_and_plane(side_idx, plane_idx) {
2515 if (hub->proxy[side_idx][plane_idx])
2516 LOG(LOGL_NOTICE, "Using %s %s proxy %s\n",
2517 gtphub_side_idx_names[side_idx],
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002518 gtphub_plane_idx_names[plane_idx],
Neels Hofmeyra9905a52015-11-29 23:49:48 +01002519 gtphub_port_str(hub->proxy[side_idx][plane_idx]));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002520 }
2521
Neels Hofmeyre1ba7812015-12-03 14:48:22 +01002522 if (hub->sgsn_use_sender)
Neels Hofmeyr9d8f5062015-12-03 14:52:33 +01002523 LOG(LOGL_NOTICE, "Using sender address and port for SGSN instead of GSN Addr IE and default ports.\n");
Neels Hofmeyre1ba7812015-12-03 14:48:22 +01002524
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002525 gtphub_gc_start(hub);
2526 return 0;
2527}
2528
2529static struct gtphub_peer_addr *gtphub_peer_find_addr(const struct gtphub_peer *peer,
2530 const struct gsn_addr *addr)
2531{
2532 struct gtphub_peer_addr *a;
2533 llist_for_each_entry(a, &peer->addresses, entry) {
2534 if (gsn_addr_same(&a->addr, addr))
2535 return a;
2536 }
2537 return NULL;
2538}
2539
2540static struct gtphub_peer_port *gtphub_addr_find_port(const struct gtphub_peer_addr *a,
2541 uint16_t port)
2542{
2543 OSMO_ASSERT(port);
2544 struct gtphub_peer_port *pp;
2545 llist_for_each_entry(pp, &a->ports, entry) {
2546 if (pp->port == port)
2547 return pp;
2548 }
2549 return NULL;
2550}
2551
2552static struct gtphub_peer_addr *gtphub_addr_find(const struct gtphub_bind *bind,
2553 const struct gsn_addr *addr)
2554{
2555 struct gtphub_peer *peer;
2556 llist_for_each_entry(peer, &bind->peers, entry) {
2557 struct gtphub_peer_addr *a = gtphub_peer_find_addr(peer, addr);
2558 if (a)
2559 return a;
2560 }
2561 return NULL;
2562}
2563
2564static struct gtphub_peer_port *gtphub_port_find(const struct gtphub_bind *bind,
2565 const struct gsn_addr *addr,
2566 uint16_t port)
2567{
2568 struct gtphub_peer_addr *a = gtphub_addr_find(bind, addr);
2569 if (!a)
2570 return NULL;
2571 return gtphub_addr_find_port(a, port);
2572}
2573
2574struct gtphub_peer_port *gtphub_port_find_sa(const struct gtphub_bind *bind,
2575 const struct osmo_sockaddr *addr)
2576{
2577 struct gsn_addr gsna;
2578 uint16_t port;
2579 gsn_addr_from_sockaddr(&gsna, &port, addr);
2580 return gtphub_port_find(bind, &gsna, port);
2581}
2582
2583static struct gtphub_peer *gtphub_peer_new(struct gtphub *hub,
2584 struct gtphub_bind *bind)
2585{
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002586 struct gtphub_peer *peer = talloc_zero(osmo_gtphub_ctx,
2587 struct gtphub_peer);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002588 OSMO_ASSERT(peer);
2589
2590 INIT_LLIST_HEAD(&peer->addresses);
2591
Neels Hofmeyre2ed8e62015-11-17 14:30:37 +01002592 nr_pool_init(&peer->seq_pool, 0, 0xffff);
Neels Hofmeyr2c8b5812015-11-25 16:45:59 +01002593 nr_map_init(&peer->seq_map, &peer->seq_pool, &hub->expire_quickly);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002594
2595 /* TODO use something random to pick the initial sequence nr.
2596 0x6d31 produces the ASCII character sequence 'm1', currently used in
2597 gtphub_nc_test.sh. */
2598 peer->seq_pool.last_nr = 0x6d31 - 1;
2599
2600 llist_add(&peer->entry, &bind->peers);
2601 return peer;
2602}
2603
2604static struct gtphub_peer_addr *gtphub_peer_add_addr(struct gtphub_peer *peer,
2605 const struct gsn_addr *addr)
2606{
2607 struct gtphub_peer_addr *a;
2608 a = talloc_zero(osmo_gtphub_ctx, struct gtphub_peer_addr);
2609 OSMO_ASSERT(a);
2610 a->peer = peer;
2611 gsn_addr_copy(&a->addr, addr);
2612 INIT_LLIST_HEAD(&a->ports);
2613 llist_add(&a->entry, &peer->addresses);
2614
2615 return a;
2616}
2617
2618static struct gtphub_peer_addr *gtphub_addr_have(struct gtphub *hub,
2619 struct gtphub_bind *bind,
2620 const struct gsn_addr *addr)
2621{
2622 struct gtphub_peer_addr *a = gtphub_addr_find(bind, addr);
2623 if (a)
2624 return a;
2625
2626 /* If we haven't found an address, that means we need to create an
2627 * entirely new peer for the new address. More addresses may be added
2628 * to this peer later, but not via this function. */
2629 struct gtphub_peer *peer = gtphub_peer_new(hub, bind);
Neels Hofmeyre921e322015-11-11 00:45:50 +01002630
2631 a = gtphub_peer_add_addr(peer, addr);
2632
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002633 LOG(LOGL_DEBUG, "New peer address: %s %s\n",
Neels Hofmeyr390e9102015-11-16 13:45:13 +01002634 bind->label,
Neels Hofmeyre921e322015-11-11 00:45:50 +01002635 gsn_addr_to_str(&a->addr));
2636
2637 return a;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002638}
2639
2640static struct gtphub_peer_port *gtphub_addr_add_port(struct gtphub_peer_addr *a,
2641 uint16_t port)
2642{
2643 struct gtphub_peer_port *pp;
2644
2645 pp = talloc_zero(osmo_gtphub_ctx, struct gtphub_peer_port);
2646 OSMO_ASSERT(pp);
2647 pp->peer_addr = a;
2648 pp->port = port;
Neels Hofmeyrbc443302015-12-01 15:20:18 +01002649 pp->last_restart_count = -1;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002650
2651 if (gsn_addr_to_sockaddr(&a->addr, port, &pp->sa) != 0) {
2652 talloc_free(pp);
2653 return NULL;
2654 }
2655
Neels Hofmeyre38fb662015-12-06 16:44:14 +01002656 pp->counters_io = rate_ctr_group_alloc(osmo_gtphub_ctx,
2657 &gtphub_ctrg_io_desc, 0);
2658
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002659 llist_add(&pp->entry, &a->ports);
2660
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002661 LOG(LOGL_DEBUG, "New peer port: %s port %d\n",
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002662 gsn_addr_to_str(&a->addr),
2663 (int)port);
2664
2665 return pp;
2666}
2667
Neels Hofmeyr30f7bcb2015-11-08 20:34:47 +01002668struct gtphub_peer_port *gtphub_port_have(struct gtphub *hub,
2669 struct gtphub_bind *bind,
2670 const struct gsn_addr *addr,
2671 uint16_t port)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002672{
2673 struct gtphub_peer_addr *a = gtphub_addr_have(hub, bind, addr);
2674
2675 struct gtphub_peer_port *pp = gtphub_addr_find_port(a, port);
2676 if (pp)
2677 return pp;
2678
2679 return gtphub_addr_add_port(a, port);
2680}
2681
Neels Hofmeyrc83cd892015-11-11 14:01:06 +01002682/* Find a GGSN peer with a matching address. If the address is known but the
2683 * port not, create a new port for that peer address. */
2684struct gtphub_peer_port *gtphub_known_addr_have_port(const struct gtphub_bind *bind,
2685 const struct osmo_sockaddr *addr)
2686{
2687 struct gtphub_peer_addr *pa;
2688 struct gtphub_peer_port *pp;
2689
2690 struct gsn_addr gsna;
2691 uint16_t port;
2692 gsn_addr_from_sockaddr(&gsna, &port, addr);
2693
2694 pa = gtphub_addr_find(bind, &gsna);
2695 if (!pa)
2696 return NULL;
2697
2698 pp = gtphub_addr_find_port(pa, port);
2699
2700 if (!pp)
2701 pp = gtphub_addr_add_port(pa, port);
2702
2703 return pp;
2704}
2705
2706
Neels Hofmeyr5b664f42015-11-10 20:32:13 +01002707/* Return 0 if the message in p is not applicable for GGSN resolution, -1 if
2708 * resolution should be possible but failed, and 1 if resolution was
2709 * successful. *pp will be set to NULL if <1 is returned. */
2710static int gtphub_resolve_ggsn(struct gtphub *hub,
2711 struct gtp_packet_desc *p,
2712 struct gtphub_peer_port **pp)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002713{
Neels Hofmeyr5b664f42015-11-10 20:32:13 +01002714 *pp = NULL;
2715
2716 /* TODO determine from message type whether IEs should be present? */
2717
2718 int rc;
2719 const char *imsi_str;
2720 rc = get_ie_imsi_str(p->ie, 0, &imsi_str);
2721 if (rc < 1)
2722 return rc;
2723 OSMO_ASSERT(imsi_str);
2724
2725 const char *apn_str;
2726 rc = get_ie_apn_str(p->ie, &apn_str);
2727 if (rc < 1)
2728 return rc;
2729 OSMO_ASSERT(apn_str);
2730
2731 *pp = gtphub_resolve_ggsn_addr(hub, imsi_str, apn_str);
2732 return (*pp)? 1 : -1;
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002733}
2734
2735
2736/* TODO move to osmocom/core/socket.c ? */
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002737/* use this in osmo_sock_init() to remove dup. */
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002738/* Internal: call getaddrinfo for osmo_sockaddr_init(). The caller is required
2739 to call freeaddrinfo(*result), iff zero is returned. */
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002740static int _osmo_getaddrinfo(struct addrinfo **result,
2741 uint16_t family, uint16_t type, uint8_t proto,
2742 const char *host, uint16_t port)
2743{
2744 struct addrinfo hints;
2745 char portbuf[16];
2746
2747 sprintf(portbuf, "%u", port);
2748 memset(&hints, '\0', sizeof(struct addrinfo));
2749 hints.ai_family = family;
2750 if (type == SOCK_RAW) {
2751 /* Workaround for glibc, that returns EAI_SERVICE (-8) if
2752 * SOCK_RAW and IPPROTO_GRE is used.
2753 */
2754 hints.ai_socktype = SOCK_DGRAM;
2755 hints.ai_protocol = IPPROTO_UDP;
2756 } else {
2757 hints.ai_socktype = type;
2758 hints.ai_protocol = proto;
2759 }
2760
2761 return getaddrinfo(host, portbuf, &hints, result);
2762}
2763
2764/* TODO move to osmocom/core/socket.c ? */
2765int osmo_sockaddr_init(struct osmo_sockaddr *addr,
2766 uint16_t family, uint16_t type, uint8_t proto,
2767 const char *host, uint16_t port)
2768{
2769 struct addrinfo *res;
2770 int rc;
2771 rc = _osmo_getaddrinfo(&res, family, type, proto, host, port);
2772
2773 if (rc != 0) {
Neels Hofmeyr063a8022015-11-16 14:35:13 +01002774 LOG(LOGL_ERROR, "getaddrinfo returned error %d\n", (int)rc);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002775 return -EINVAL;
2776 }
2777
2778 OSMO_ASSERT(res->ai_addrlen <= sizeof(addr->a));
2779 memcpy(&addr->a, res->ai_addr, res->ai_addrlen);
2780 addr->l = res->ai_addrlen;
2781 freeaddrinfo(res);
2782
2783 return 0;
2784}
2785
2786int osmo_sockaddr_to_strs(char *addr_str, size_t addr_str_len,
2787 char *port_str, size_t port_str_len,
2788 const struct osmo_sockaddr *addr,
2789 int flags)
2790{
2791 int rc;
2792
2793 if ((addr->l < 1) || (addr->l > sizeof(addr->a))) {
2794 LOGP(DGTPHUB, LOGL_ERROR, "Invalid address size: %d\n", addr->l);
2795 return -1;
2796 }
2797
2798 if (addr->l > sizeof(addr->a)) {
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002799 LOGP(DGTPHUB, LOGL_ERROR, "Invalid address: too long: %d\n",
2800 addr->l);
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002801 return -1;
2802 }
2803
2804 rc = getnameinfo((struct sockaddr*)&addr->a, addr->l,
2805 addr_str, addr_str_len,
2806 port_str, port_str_len,
2807 flags);
2808
2809 if (rc)
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002810 LOGP(DGTPHUB, LOGL_ERROR, "Invalid address: %s: %s\n",
2811 gai_strerror(rc), osmo_hexdump((uint8_t*)&addr->a,
2812 addr->l));
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002813
2814 return rc;
2815}
2816
2817const char *osmo_sockaddr_to_strb(const struct osmo_sockaddr *addr,
2818 char *buf, size_t buf_len)
2819{
2820 const int portbuf_len = 6;
2821 OSMO_ASSERT(buf_len > portbuf_len);
2822 char *portbuf = buf + buf_len - portbuf_len;
2823 buf_len -= portbuf_len;
2824 if (osmo_sockaddr_to_strs(buf, buf_len,
2825 portbuf, portbuf_len,
2826 addr,
2827 NI_NUMERICHOST | NI_NUMERICSERV))
2828 return NULL;
2829
2830 char *pos = buf + strnlen(buf, buf_len-1);
2831 size_t len = buf_len - (pos - buf);
2832
2833 snprintf(pos, len, " port %s", portbuf);
2834 buf[buf_len-1] = '\0';
2835
2836 return buf;
2837}
2838
2839const char *osmo_sockaddr_to_str(const struct osmo_sockaddr *addr)
2840{
2841 static char buf[256];
2842 const char *result = osmo_sockaddr_to_strb(addr, buf, sizeof(buf));
2843 if (! result)
2844 return "(invalid)";
2845 return result;
2846}
2847
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002848int osmo_sockaddr_cmp(const struct osmo_sockaddr *a,
2849 const struct osmo_sockaddr *b)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002850{
2851 if (a == b)
2852 return 0;
2853 if (!a)
2854 return -1;
2855 if (!b)
2856 return 1;
2857 if (a->l != b->l) {
2858 /* Lengths are not the same, but determine the order. Will
2859 * anyone ever sort a list by osmo_sockaddr though...? */
2860 int cmp = memcmp(&a->a, &b->a, (a->l < b->l)? a->l : b->l);
2861 if (cmp == 0) {
2862 if (a->l < b->l)
2863 return -1;
2864 else
2865 return 1;
2866 }
2867 return cmp;
2868 }
2869 return memcmp(&a->a, &b->a, a->l);
2870}
2871
Neels Hofmeyr9cfe0372015-11-16 14:52:05 +01002872void osmo_sockaddr_copy(struct osmo_sockaddr *dst,
2873 const struct osmo_sockaddr *src)
Neels Hofmeyrc8a614d2015-09-24 17:32:30 +02002874{
2875 OSMO_ASSERT(src->l <= sizeof(dst->a));
2876 memcpy(&dst->a, &src->a, src->l);
2877 dst->l = src->l;
2878}