blob: 52277b75d8cd9daf7b836af82fde9167b08d11a6 [file] [log] [blame]
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +08001/* main MSC management code... */
2
3/*
Holger Hans Peter Freythere7bd8632013-06-30 15:30:47 +02004 * (C) 2010,2013 by Holger Hans Peter Freyther <zecke@selfish.org>
Holger Hans Peter Freyther85531cc2010-10-06 20:37:09 +08005 * (C) 2010 by On-Waves
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +08006 *
7 * All Rights Reserved
8 *
9 * This program is free software; you can redistribute it and/or modify
Harald Welte9af6ddf2011-01-01 15:25:50 +010010 * it under the terms of the GNU Affero General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080012 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
Harald Welte9af6ddf2011-01-01 15:25:50 +010017 * GNU Affero General Public License for more details.
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080018 *
Harald Welte9af6ddf2011-01-01 15:25:50 +010019 * You should have received a copy of the GNU Affero General Public License
20 * along with this program. If not, see <http://www.gnu.org/licenses/>.
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080021 *
22 */
23
Neels Hofmeyr90843962017-09-04 15:04:35 +020024#include <osmocom/msc/debug.h>
25#include <osmocom/msc/transaction.h>
26#include <osmocom/msc/db.h>
27#include <osmocom/msc/vlr.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020028#include <osmocom/msc/a_iface.h>
Max43b01b02017-09-15 11:22:30 +020029#include <osmocom/msc/gsm_04_08.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020030#include <osmocom/msc/gsm_04_11.h>
Holger Hans Peter Freyther6a3d7652010-06-15 12:03:10 +080031
Neels Hofmeyr00e82d62017-07-05 15:19:52 +020032#include "../../bscconfig.h"
33#ifdef BUILD_IU
34#include <osmocom/ranap/iu_client.h>
35#else
Neels Hofmeyr90843962017-09-04 15:04:35 +020036#include <osmocom/msc/iu_dummy.h>
Neels Hofmeyr00e82d62017-07-05 15:19:52 +020037#endif
38
Neels Hofmeyr55014d02018-03-22 16:43:40 +010039struct gsm_network *gsm_network_init(void *ctx, mncc_recv_cb_t mncc_recv)
40{
41 struct gsm_network *net;
42
43 net = talloc_zero(ctx, struct gsm_network);
44 if (!net)
45 return NULL;
46
47 net->plmn = (struct osmo_plmn_id){ .mcc=1, .mnc=1 };
48
49 /* Permit a compile-time default of A5/3 and A5/1 */
50 net->a5_encryption_mask = (1 << 3) | (1 << 1);
51
52 /* Use 30 min periodic update interval as sane default */
53 net->t3212 = 5;
54
Philipp Maier9ca7b312018-10-10 17:00:49 +020055 net->mncc_guard_timeout = 180;
56
Neels Hofmeyr55014d02018-03-22 16:43:40 +010057 net->paging_response_timer = MSC_PAGING_RESPONSE_TIMER_DEFAULT;
58
59 INIT_LLIST_HEAD(&net->trans_list);
60 INIT_LLIST_HEAD(&net->upqueue);
Neels Hofmeyrc036b792018-11-29 22:37:51 +010061 INIT_LLIST_HEAD(&net->ran_conns);
Neels Hofmeyr55014d02018-03-22 16:43:40 +010062
63 /* init statistics */
64 net->msc_ctrs = rate_ctr_group_alloc(net, &msc_ctrg_desc, 0);
65 if (!net->msc_ctrs) {
66 talloc_free(net);
67 return NULL;
68 }
69 net->active_calls = osmo_counter_alloc("msc.active_calls");
Vadim Yanitskiyad64e2a2018-06-26 18:27:25 +070070 net->active_nc_ss = osmo_counter_alloc("msc.active_nc_ss");
Neels Hofmeyr55014d02018-03-22 16:43:40 +010071
72 net->mncc_recv = mncc_recv;
73
74 INIT_LLIST_HEAD(&net->a.bscs);
75
76 return net;
77}
78
Harald Welte2483f1b2016-06-19 18:06:02 +020079/* Receive a SAPI-N-REJECT from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +010080void ran_conn_sapi_n_reject(struct ran_conn *conn, int dlci)
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080081{
Holger Hans Peter Freyther6a3d7652010-06-15 12:03:10 +080082 int sapi = dlci & 0x7;
83
84 if (sapi == UM_SAPI_SMS)
85 gsm411_sapi_n_reject(conn);
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080086}
87
Neels Hofmeyrd03e7282018-11-30 01:20:32 +010088/* receive a Level 3 Complete message.
89 * Ownership of the conn is completely passed to the conn FSM, i.e. for both acceptance and rejection,
90 * the conn FSM shall decide when to release this conn. It may already be discarded before this exits. */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +010091void ran_conn_compl_l3(struct ran_conn *conn,
92 struct msgb *msg, uint16_t chosen_channel)
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +080093{
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +010094 ran_conn_get(conn, RAN_CONN_USE_COMPL_L3);
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +080095 gsm0408_dispatch(conn, msg);
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +010096 ran_conn_put(conn, RAN_CONN_USE_COMPL_L3);
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +080097}
98
Harald Welte2483f1b2016-06-19 18:06:02 +020099/* Receive a DTAP message from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100100void ran_conn_dtap(struct ran_conn *conn, struct msgb *msg)
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800101{
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100102 ran_conn_get(conn, RAN_CONN_USE_DTAP);
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800103 gsm0408_dispatch(conn, msg);
Harald Welte2483f1b2016-06-19 18:06:02 +0200104
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100105 ran_conn_put(conn, RAN_CONN_USE_DTAP);
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800106}
107
Harald Welte2483f1b2016-06-19 18:06:02 +0200108/* Receive an ASSIGNMENT COMPLETE from BSC */
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100109void msc_assign_compl(struct ran_conn *conn,
Philipp Maierfbf66102017-04-09 12:32:51 +0200110 uint8_t rr_cause, uint8_t chosen_channel,
111 uint8_t encr_alg_id, uint8_t speec)
Holger Hans Peter Freyther40aac3f2011-12-27 12:31:02 +0100112{
Jacob Erlbeck8e68b562014-01-30 21:01:12 +0100113 LOGP(DRR, LOGL_DEBUG, "MSC assign complete (do nothing).\n");
Holger Hans Peter Freyther40aac3f2011-12-27 12:31:02 +0100114}
115
Harald Welte2483f1b2016-06-19 18:06:02 +0200116/* Receive an ASSIGNMENT FAILURE from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100117void ran_conn_assign_fail(struct ran_conn *conn, uint8_t cause, uint8_t *rr_cause)
Holger Hans Peter Freyther40aac3f2011-12-27 12:31:02 +0100118{
Jacob Erlbeck8e68b562014-01-30 21:01:12 +0100119 LOGP(DRR, LOGL_DEBUG, "MSC assign failure (do nothing).\n");
Holger Hans Peter Freyther40aac3f2011-12-27 12:31:02 +0100120}
121
Harald Welte2483f1b2016-06-19 18:06:02 +0200122/* Receive a CLASSMARK CHANGE from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100123void ran_conn_classmark_chg(struct ran_conn *conn,
124 const uint8_t *cm2, uint8_t cm2_len,
125 const uint8_t *cm3, uint8_t cm3_len)
Harald Welte95e862c2012-01-23 10:28:35 +0100126{
Neels Hofmeyr68cf9572018-09-18 15:52:58 +0200127 struct gsm_classmark *cm;
128
129 if (!conn->vsub)
130 cm = &conn->temporary_classmark;
131 else
132 cm = &conn->vsub->classmark;
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200133
Harald Welte2483f1b2016-06-19 18:06:02 +0200134 if (cm2 && cm2_len) {
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200135 if (cm2_len > sizeof(cm->classmark2)) {
Harald Welte2483f1b2016-06-19 18:06:02 +0200136 LOGP(DRR, LOGL_NOTICE, "%s: classmark2 is %u bytes, truncating at %zu bytes\n",
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200137 vlr_subscr_name(conn->vsub), cm2_len, sizeof(cm->classmark2));
138 cm2_len = sizeof(cm->classmark2);
Harald Welte95e862c2012-01-23 10:28:35 +0100139 }
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200140 cm->classmark2_len = cm2_len;
141 memcpy(cm->classmark2, cm2, cm2_len);
Harald Welte2483f1b2016-06-19 18:06:02 +0200142 }
143 if (cm3 && cm3_len) {
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200144 if (cm3_len > sizeof(cm->classmark3)) {
Harald Welte2483f1b2016-06-19 18:06:02 +0200145 LOGP(DRR, LOGL_NOTICE, "%s: classmark3 is %u bytes, truncating at %zu bytes\n",
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200146 vlr_subscr_name(conn->vsub), cm3_len, sizeof(cm->classmark3));
147 cm3_len = sizeof(cm->classmark3);
Harald Welte2483f1b2016-06-19 18:06:02 +0200148 }
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200149 cm->classmark3_len = cm3_len;
150 memcpy(cm->classmark3, cm3, cm3_len);
Harald Welte95e862c2012-01-23 10:28:35 +0100151 }
Neels Hofmeyr3117b702018-09-13 03:23:07 +0200152
153 /* bump subscr conn FSM in case it is waiting for a Classmark Update */
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100154 if (conn->fi->state == RAN_CONN_S_WAIT_CLASSMARK_UPDATE)
155 osmo_fsm_inst_dispatch(conn->fi, RAN_CONN_E_CLASSMARK_UPDATE, NULL);
Harald Welte95e862c2012-01-23 10:28:35 +0100156}
157
Harald Welte2483f1b2016-06-19 18:06:02 +0200158/* Receive a CIPHERING MODE COMPLETE from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100159void ran_conn_cipher_mode_compl(struct ran_conn *conn, struct msgb *msg, uint8_t alg_id)
Harald Weltecf149ee2012-01-23 16:40:24 +0100160{
Harald Welte2483f1b2016-06-19 18:06:02 +0200161 struct vlr_ciph_result ciph_res = { .cause = VLR_CIPH_REJECT };
Harald Weltecf149ee2012-01-23 16:40:24 +0100162
Harald Welte2483f1b2016-06-19 18:06:02 +0200163 if (!conn) {
Harald Welte284c39a2018-01-24 22:38:06 +0100164 LOGP(DRR, LOGL_ERROR, "invalid: rx Ciphering Mode Complete on NULL conn\n");
Harald Welte2483f1b2016-06-19 18:06:02 +0200165 return;
166 }
167 if (!conn->vsub) {
Harald Welte284c39a2018-01-24 22:38:06 +0100168 LOGP(DRR, LOGL_ERROR, "invalid: rx Ciphering Mode Complete for NULL subscr\n");
Harald Welte2483f1b2016-06-19 18:06:02 +0200169 return;
Harald Weltecf149ee2012-01-23 16:40:24 +0100170 }
171
Harald Welte284c39a2018-01-24 22:38:06 +0100172 DEBUGP(DRR, "%s: CIPHERING MODE COMPLETE\n", vlr_subscr_name(conn->vsub));
Harald Welte2483f1b2016-06-19 18:06:02 +0200173
Harald Welte284c39a2018-01-24 22:38:06 +0100174 if (msg) {
175 struct gsm48_hdr *gh = msgb_l3(msg);
176 unsigned int payload_len = msgb_l3len(msg) - sizeof(*gh);
177 struct tlv_parsed tp;
178 uint8_t mi_type;
Harald Welte2483f1b2016-06-19 18:06:02 +0200179
Harald Welte284c39a2018-01-24 22:38:06 +0100180 if (!gh) {
181 LOGP(DRR, LOGL_ERROR, "invalid: msgb without l3 header\n");
182 return;
183 }
184
185 tlv_parse(&tp, &gsm48_att_tlvdef, gh->data, payload_len, 0, 0);
186
187 /* bearer capability */
188 if (TLVP_PRESENT(&tp, GSM48_IE_MOBILE_ID)) {
189 mi_type = TLVP_VAL(&tp, GSM48_IE_MOBILE_ID)[0] & GSM_MI_TYPE_MASK;
190 if (mi_type == GSM_MI_TYPE_IMEISV
191 && TLVP_LEN(&tp, GSM48_IE_MOBILE_ID) > 0) {
Neels Hofmeyrfa10eda2018-03-13 01:22:01 +0100192 gsm48_mi_to_string(ciph_res.imeisv, sizeof(ciph_res.imeisv),
Harald Welte284c39a2018-01-24 22:38:06 +0100193 TLVP_VAL(&tp, GSM48_IE_MOBILE_ID),
194 TLVP_LEN(&tp, GSM48_IE_MOBILE_ID));
Harald Welte284c39a2018-01-24 22:38:06 +0100195 }
Harald Welte2483f1b2016-06-19 18:06:02 +0200196 }
197 }
198
Neels Hofmeyrf41658d2018-11-30 04:35:50 +0100199 conn->geran_encr.alg_id = alg_id;
Neels Hofmeyrb0779bb2018-11-29 23:37:19 +0100200
Harald Welte2483f1b2016-06-19 18:06:02 +0200201 ciph_res.cause = VLR_CIPH_COMPL;
202 vlr_subscr_rx_ciph_res(conn->vsub, &ciph_res);
Harald Weltecf149ee2012-01-23 16:40:24 +0100203}
204
Harald Welte2483f1b2016-06-19 18:06:02 +0200205/* Receive a CLEAR REQUEST from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100206int ran_conn_clear_request(struct ran_conn *conn, uint32_t cause)
Harald Welte2483f1b2016-06-19 18:06:02 +0200207{
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100208 ran_conn_close(conn, cause);
Harald Welte2483f1b2016-06-19 18:06:02 +0200209 return 1;
210}
211
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100212static const char *used_ref_counts_str(struct ran_conn *conn)
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200213{
214 static char buf[256];
215 int bit_nr;
216 char *pos = buf;
217 *pos = '\0';
218
219 if (conn->use_tokens < 0)
220 return "invalid";
221
222#define APPEND_STR(fmt, args...) do { \
223 int remain = sizeof(buf) - (pos - buf) - 1; \
224 int l = -1; \
225 if (remain > 0) \
226 l = snprintf(pos, remain, "%s" fmt, (pos == buf? "" : ","), ##args); \
227 if (l < 0 || l > remain) { \
228 buf[sizeof(buf) - 1] = '\0'; \
229 return buf; \
230 } \
231 pos += l; \
232 } while(0)
233
234 for (bit_nr = 0; (1 << bit_nr) <= conn->use_tokens; bit_nr++) {
235 if (conn->use_tokens & (1 << bit_nr)) {
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100236 APPEND_STR("%s", get_value_string(ran_conn_use_names, bit_nr));
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200237 }
238 }
239 return buf;
240#undef APPEND_STR
241}
242
Harald Welte2483f1b2016-06-19 18:06:02 +0200243/* increment the ref-count. Needs to be called by every user */
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100244struct ran_conn *_ran_conn_get(struct ran_conn *conn, enum ran_conn_use balance_token,
245 const char *file, int line)
Harald Welte2483f1b2016-06-19 18:06:02 +0200246{
247 OSMO_ASSERT(conn);
Holger Hans Peter Freythere7bd8632013-06-30 15:30:47 +0200248
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100249 if (balance_token != RAN_CONN_USE_UNTRACKED) {
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100250 uint32_t flag = 1 << balance_token;
251 OSMO_ASSERT(balance_token < 32);
252 if (conn->use_tokens & flag)
253 LOGPSRC(DREF, LOGL_ERROR, file, line,
254 "%s: MSC conn use error: using an already used token: %s\n",
255 vlr_subscr_name(conn->vsub),
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100256 ran_conn_use_name(balance_token));
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100257 conn->use_tokens |= flag;
258 }
259
Harald Welte2483f1b2016-06-19 18:06:02 +0200260 conn->use_count++;
261 LOGPSRC(DREF, LOGL_DEBUG, file, line,
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200262 "%s: MSC conn use + %s == %u (0x%x: %s)\n",
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100263 vlr_subscr_name(conn->vsub), ran_conn_use_name(balance_token),
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200264 conn->use_count, conn->use_tokens, used_ref_counts_str(conn));
Harald Welte2483f1b2016-06-19 18:06:02 +0200265
266 return conn;
267}
268
269/* decrement the ref-count. Once it reaches zero, we release */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100270void _ran_conn_put(struct ran_conn *conn, enum ran_conn_use balance_token,
271 const char *file, int line)
Harald Welte2483f1b2016-06-19 18:06:02 +0200272{
273 OSMO_ASSERT(conn);
274
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100275 if (balance_token != RAN_CONN_USE_UNTRACKED) {
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100276 uint32_t flag = 1 << balance_token;
277 OSMO_ASSERT(balance_token < 32);
278 if (!(conn->use_tokens & flag))
279 LOGPSRC(DREF, LOGL_ERROR, file, line,
280 "%s: MSC conn use error: freeing an unused token: %s\n",
281 vlr_subscr_name(conn->vsub),
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100282 ran_conn_use_name(balance_token));
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100283 conn->use_tokens &= ~flag;
284 }
285
Harald Welte2483f1b2016-06-19 18:06:02 +0200286 if (conn->use_count == 0) {
287 LOGPSRC(DREF, LOGL_ERROR, file, line,
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100288 "%s: MSC conn use - %s failed: is already 0\n",
289 vlr_subscr_name(conn->vsub),
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100290 ran_conn_use_name(balance_token));
Harald Welte2483f1b2016-06-19 18:06:02 +0200291 return;
292 }
293
294 conn->use_count--;
295 LOGPSRC(DREF, LOGL_DEBUG, file, line,
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200296 "%s: MSC conn use - %s == %u (0x%x: %s)\n",
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100297 vlr_subscr_name(conn->vsub), ran_conn_use_name(balance_token),
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200298 conn->use_count, conn->use_tokens, used_ref_counts_str(conn));
Harald Welte2483f1b2016-06-19 18:06:02 +0200299
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200300 if (conn->use_count == 0)
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100301 osmo_fsm_inst_dispatch(conn->fi, RAN_CONN_E_UNUSED, NULL);
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200302}
303
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100304bool ran_conn_used_by(struct ran_conn *conn, enum ran_conn_use token)
Neels Hofmeyr4068ab22018-04-01 20:55:54 +0200305{
306 return conn && (conn->use_tokens & (1 << token));
307}
308
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100309const struct value_string ran_conn_use_names[] = {
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100310 {RAN_CONN_USE_UNTRACKED, "UNTRACKED"},
311 {RAN_CONN_USE_COMPL_L3, "compl_l3"},
312 {RAN_CONN_USE_DTAP, "dtap"},
313 {RAN_CONN_USE_AUTH_CIPH, "auth+ciph"},
314 {RAN_CONN_USE_CM_SERVICE, "cm_service"},
315 {RAN_CONN_USE_TRANS_CC, "trans_cc"},
316 {RAN_CONN_USE_TRANS_SMS, "trans_sms"},
317 {RAN_CONN_USE_TRANS_NC_SS, "trans_nc_ss"},
318 {RAN_CONN_USE_SILENT_CALL, "silent_call"},
319 {RAN_CONN_USE_RELEASE, "release"},
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100320 {0, NULL},
321};
322
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200323void msc_stop_paging(struct vlr_subscr *vsub)
324{
325 DEBUGP(DPAG, "Paging can stop for %s\n", vlr_subscr_name(vsub));
326 /* tell BSCs and RNCs to stop paging? How? */
Holger Hans Peter Freyther40494552010-06-28 17:09:29 +0800327}