blob: 37c1d15a45720d26c73c73525d8a9e955e13062f [file] [log] [blame]
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +08001/* main MSC management code... */
2
3/*
Holger Hans Peter Freythere7bd8632013-06-30 15:30:47 +02004 * (C) 2010,2013 by Holger Hans Peter Freyther <zecke@selfish.org>
Holger Hans Peter Freyther85531cc2010-10-06 20:37:09 +08005 * (C) 2010 by On-Waves
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +08006 *
7 * All Rights Reserved
8 *
9 * This program is free software; you can redistribute it and/or modify
Harald Welte9af6ddf2011-01-01 15:25:50 +010010 * it under the terms of the GNU Affero General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080012 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
Harald Welte9af6ddf2011-01-01 15:25:50 +010017 * GNU Affero General Public License for more details.
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080018 *
Harald Welte9af6ddf2011-01-01 15:25:50 +010019 * You should have received a copy of the GNU Affero General Public License
20 * along with this program. If not, see <http://www.gnu.org/licenses/>.
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080021 *
22 */
23
Neels Hofmeyr90843962017-09-04 15:04:35 +020024#include <osmocom/msc/debug.h>
25#include <osmocom/msc/transaction.h>
26#include <osmocom/msc/db.h>
27#include <osmocom/msc/vlr.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020028#include <osmocom/msc/a_iface.h>
Max43b01b02017-09-15 11:22:30 +020029#include <osmocom/msc/gsm_04_08.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020030#include <osmocom/msc/gsm_04_11.h>
Holger Hans Peter Freyther6a3d7652010-06-15 12:03:10 +080031
Neels Hofmeyr00e82d62017-07-05 15:19:52 +020032#include "../../bscconfig.h"
33#ifdef BUILD_IU
34#include <osmocom/ranap/iu_client.h>
35#else
Neels Hofmeyr90843962017-09-04 15:04:35 +020036#include <osmocom/msc/iu_dummy.h>
Neels Hofmeyr00e82d62017-07-05 15:19:52 +020037#endif
38
Neels Hofmeyr55014d02018-03-22 16:43:40 +010039struct gsm_network *gsm_network_init(void *ctx, mncc_recv_cb_t mncc_recv)
40{
41 struct gsm_network *net;
42
43 net = talloc_zero(ctx, struct gsm_network);
44 if (!net)
45 return NULL;
46
47 net->plmn = (struct osmo_plmn_id){ .mcc=1, .mnc=1 };
48
49 /* Permit a compile-time default of A5/3 and A5/1 */
50 net->a5_encryption_mask = (1 << 3) | (1 << 1);
51
52 /* Use 30 min periodic update interval as sane default */
53 net->t3212 = 5;
54
Philipp Maier9ca7b312018-10-10 17:00:49 +020055 net->mncc_guard_timeout = 180;
56
Neels Hofmeyr55014d02018-03-22 16:43:40 +010057 net->paging_response_timer = MSC_PAGING_RESPONSE_TIMER_DEFAULT;
58
59 INIT_LLIST_HEAD(&net->trans_list);
60 INIT_LLIST_HEAD(&net->upqueue);
Neels Hofmeyrc036b792018-11-29 22:37:51 +010061 INIT_LLIST_HEAD(&net->ran_conns);
Neels Hofmeyr55014d02018-03-22 16:43:40 +010062
63 /* init statistics */
64 net->msc_ctrs = rate_ctr_group_alloc(net, &msc_ctrg_desc, 0);
65 if (!net->msc_ctrs) {
66 talloc_free(net);
67 return NULL;
68 }
69 net->active_calls = osmo_counter_alloc("msc.active_calls");
Vadim Yanitskiyad64e2a2018-06-26 18:27:25 +070070 net->active_nc_ss = osmo_counter_alloc("msc.active_nc_ss");
Neels Hofmeyr55014d02018-03-22 16:43:40 +010071
72 net->mncc_recv = mncc_recv;
73
74 INIT_LLIST_HEAD(&net->a.bscs);
75
76 return net;
77}
78
Neels Hofmeyr80447eb2018-12-05 01:11:28 +010079void gsm_network_set_mncc_sock_path(struct gsm_network *net, const char *mncc_sock_path)
80{
81 if (net->mncc_sock_path)
82 talloc_free(net->mncc_sock_path);
83 net->mncc_sock_path = mncc_sock_path ? talloc_strdup(net, mncc_sock_path) : NULL;
84}
85
Harald Welte2483f1b2016-06-19 18:06:02 +020086/* Receive a SAPI-N-REJECT from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +010087void ran_conn_sapi_n_reject(struct ran_conn *conn, int dlci)
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080088{
Holger Hans Peter Freyther6a3d7652010-06-15 12:03:10 +080089 int sapi = dlci & 0x7;
90
91 if (sapi == UM_SAPI_SMS)
92 gsm411_sapi_n_reject(conn);
Holger Hans Peter Freyther43b09092010-06-15 11:52:51 +080093}
94
Neels Hofmeyrd03e7282018-11-30 01:20:32 +010095/* receive a Level 3 Complete message.
96 * Ownership of the conn is completely passed to the conn FSM, i.e. for both acceptance and rejection,
97 * the conn FSM shall decide when to release this conn. It may already be discarded before this exits. */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +010098void ran_conn_compl_l3(struct ran_conn *conn,
99 struct msgb *msg, uint16_t chosen_channel)
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800100{
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100101 ran_conn_get(conn, RAN_CONN_USE_COMPL_L3);
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800102 gsm0408_dispatch(conn, msg);
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100103 ran_conn_put(conn, RAN_CONN_USE_COMPL_L3);
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800104}
105
Harald Welte2483f1b2016-06-19 18:06:02 +0200106/* Receive a DTAP message from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100107void ran_conn_dtap(struct ran_conn *conn, struct msgb *msg)
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800108{
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100109 ran_conn_get(conn, RAN_CONN_USE_DTAP);
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800110 gsm0408_dispatch(conn, msg);
Harald Welte2483f1b2016-06-19 18:06:02 +0200111
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100112 ran_conn_put(conn, RAN_CONN_USE_DTAP);
Holger Hans Peter Freyther97643312010-06-17 16:41:25 +0800113}
114
Harald Welte2483f1b2016-06-19 18:06:02 +0200115/* Receive an ASSIGNMENT COMPLETE from BSC */
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100116void msc_assign_compl(struct ran_conn *conn,
Philipp Maierfbf66102017-04-09 12:32:51 +0200117 uint8_t rr_cause, uint8_t chosen_channel,
118 uint8_t encr_alg_id, uint8_t speec)
Holger Hans Peter Freyther40aac3f2011-12-27 12:31:02 +0100119{
Jacob Erlbeck8e68b562014-01-30 21:01:12 +0100120 LOGP(DRR, LOGL_DEBUG, "MSC assign complete (do nothing).\n");
Holger Hans Peter Freyther40aac3f2011-12-27 12:31:02 +0100121}
122
Harald Welte2483f1b2016-06-19 18:06:02 +0200123/* Receive an ASSIGNMENT FAILURE from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100124void ran_conn_assign_fail(struct ran_conn *conn, uint8_t cause, uint8_t *rr_cause)
Holger Hans Peter Freyther40aac3f2011-12-27 12:31:02 +0100125{
Jacob Erlbeck8e68b562014-01-30 21:01:12 +0100126 LOGP(DRR, LOGL_DEBUG, "MSC assign failure (do nothing).\n");
Holger Hans Peter Freyther40aac3f2011-12-27 12:31:02 +0100127}
128
Harald Welte2483f1b2016-06-19 18:06:02 +0200129/* Receive a CLASSMARK CHANGE from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100130void ran_conn_classmark_chg(struct ran_conn *conn,
131 const uint8_t *cm2, uint8_t cm2_len,
132 const uint8_t *cm3, uint8_t cm3_len)
Harald Welte95e862c2012-01-23 10:28:35 +0100133{
Neels Hofmeyr68cf9572018-09-18 15:52:58 +0200134 struct gsm_classmark *cm;
135
136 if (!conn->vsub)
137 cm = &conn->temporary_classmark;
138 else
139 cm = &conn->vsub->classmark;
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200140
Harald Welte2483f1b2016-06-19 18:06:02 +0200141 if (cm2 && cm2_len) {
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200142 if (cm2_len > sizeof(cm->classmark2)) {
Harald Welte2483f1b2016-06-19 18:06:02 +0200143 LOGP(DRR, LOGL_NOTICE, "%s: classmark2 is %u bytes, truncating at %zu bytes\n",
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200144 vlr_subscr_name(conn->vsub), cm2_len, sizeof(cm->classmark2));
145 cm2_len = sizeof(cm->classmark2);
Harald Welte95e862c2012-01-23 10:28:35 +0100146 }
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200147 cm->classmark2_len = cm2_len;
148 memcpy(cm->classmark2, cm2, cm2_len);
Harald Welte2483f1b2016-06-19 18:06:02 +0200149 }
150 if (cm3 && cm3_len) {
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200151 if (cm3_len > sizeof(cm->classmark3)) {
Harald Welte2483f1b2016-06-19 18:06:02 +0200152 LOGP(DRR, LOGL_NOTICE, "%s: classmark3 is %u bytes, truncating at %zu bytes\n",
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200153 vlr_subscr_name(conn->vsub), cm3_len, sizeof(cm->classmark3));
154 cm3_len = sizeof(cm->classmark3);
Harald Welte2483f1b2016-06-19 18:06:02 +0200155 }
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200156 cm->classmark3_len = cm3_len;
157 memcpy(cm->classmark3, cm3, cm3_len);
Harald Welte95e862c2012-01-23 10:28:35 +0100158 }
Neels Hofmeyr3117b702018-09-13 03:23:07 +0200159
160 /* bump subscr conn FSM in case it is waiting for a Classmark Update */
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100161 if (conn->fi->state == RAN_CONN_S_WAIT_CLASSMARK_UPDATE)
162 osmo_fsm_inst_dispatch(conn->fi, RAN_CONN_E_CLASSMARK_UPDATE, NULL);
Harald Welte95e862c2012-01-23 10:28:35 +0100163}
164
Harald Welte2483f1b2016-06-19 18:06:02 +0200165/* Receive a CIPHERING MODE COMPLETE from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100166void ran_conn_cipher_mode_compl(struct ran_conn *conn, struct msgb *msg, uint8_t alg_id)
Harald Weltecf149ee2012-01-23 16:40:24 +0100167{
Harald Welte2483f1b2016-06-19 18:06:02 +0200168 struct vlr_ciph_result ciph_res = { .cause = VLR_CIPH_REJECT };
Harald Weltecf149ee2012-01-23 16:40:24 +0100169
Harald Welte2483f1b2016-06-19 18:06:02 +0200170 if (!conn) {
Harald Welte284c39a2018-01-24 22:38:06 +0100171 LOGP(DRR, LOGL_ERROR, "invalid: rx Ciphering Mode Complete on NULL conn\n");
Harald Welte2483f1b2016-06-19 18:06:02 +0200172 return;
173 }
174 if (!conn->vsub) {
Harald Welte284c39a2018-01-24 22:38:06 +0100175 LOGP(DRR, LOGL_ERROR, "invalid: rx Ciphering Mode Complete for NULL subscr\n");
Harald Welte2483f1b2016-06-19 18:06:02 +0200176 return;
Harald Weltecf149ee2012-01-23 16:40:24 +0100177 }
178
Harald Welte284c39a2018-01-24 22:38:06 +0100179 DEBUGP(DRR, "%s: CIPHERING MODE COMPLETE\n", vlr_subscr_name(conn->vsub));
Harald Welte2483f1b2016-06-19 18:06:02 +0200180
Harald Welte284c39a2018-01-24 22:38:06 +0100181 if (msg) {
182 struct gsm48_hdr *gh = msgb_l3(msg);
183 unsigned int payload_len = msgb_l3len(msg) - sizeof(*gh);
184 struct tlv_parsed tp;
185 uint8_t mi_type;
Harald Welte2483f1b2016-06-19 18:06:02 +0200186
Harald Welte284c39a2018-01-24 22:38:06 +0100187 if (!gh) {
188 LOGP(DRR, LOGL_ERROR, "invalid: msgb without l3 header\n");
189 return;
190 }
191
192 tlv_parse(&tp, &gsm48_att_tlvdef, gh->data, payload_len, 0, 0);
193
194 /* bearer capability */
195 if (TLVP_PRESENT(&tp, GSM48_IE_MOBILE_ID)) {
196 mi_type = TLVP_VAL(&tp, GSM48_IE_MOBILE_ID)[0] & GSM_MI_TYPE_MASK;
197 if (mi_type == GSM_MI_TYPE_IMEISV
198 && TLVP_LEN(&tp, GSM48_IE_MOBILE_ID) > 0) {
Neels Hofmeyrfa10eda2018-03-13 01:22:01 +0100199 gsm48_mi_to_string(ciph_res.imeisv, sizeof(ciph_res.imeisv),
Harald Welte284c39a2018-01-24 22:38:06 +0100200 TLVP_VAL(&tp, GSM48_IE_MOBILE_ID),
201 TLVP_LEN(&tp, GSM48_IE_MOBILE_ID));
Harald Welte284c39a2018-01-24 22:38:06 +0100202 }
Harald Welte2483f1b2016-06-19 18:06:02 +0200203 }
204 }
205
Neels Hofmeyrf41658d2018-11-30 04:35:50 +0100206 conn->geran_encr.alg_id = alg_id;
Neels Hofmeyrb0779bb2018-11-29 23:37:19 +0100207
Harald Welte2483f1b2016-06-19 18:06:02 +0200208 ciph_res.cause = VLR_CIPH_COMPL;
209 vlr_subscr_rx_ciph_res(conn->vsub, &ciph_res);
Harald Weltecf149ee2012-01-23 16:40:24 +0100210}
211
Harald Welte2483f1b2016-06-19 18:06:02 +0200212/* Receive a CLEAR REQUEST from BSC */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100213int ran_conn_clear_request(struct ran_conn *conn, uint32_t cause)
Harald Welte2483f1b2016-06-19 18:06:02 +0200214{
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100215 ran_conn_close(conn, cause);
Harald Welte2483f1b2016-06-19 18:06:02 +0200216 return 1;
217}
218
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100219static const char *used_ref_counts_str(struct ran_conn *conn)
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200220{
221 static char buf[256];
222 int bit_nr;
223 char *pos = buf;
224 *pos = '\0';
225
226 if (conn->use_tokens < 0)
227 return "invalid";
228
229#define APPEND_STR(fmt, args...) do { \
230 int remain = sizeof(buf) - (pos - buf) - 1; \
231 int l = -1; \
232 if (remain > 0) \
233 l = snprintf(pos, remain, "%s" fmt, (pos == buf? "" : ","), ##args); \
234 if (l < 0 || l > remain) { \
235 buf[sizeof(buf) - 1] = '\0'; \
236 return buf; \
237 } \
238 pos += l; \
239 } while(0)
240
241 for (bit_nr = 0; (1 << bit_nr) <= conn->use_tokens; bit_nr++) {
242 if (conn->use_tokens & (1 << bit_nr)) {
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100243 APPEND_STR("%s", get_value_string(ran_conn_use_names, bit_nr));
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200244 }
245 }
246 return buf;
247#undef APPEND_STR
248}
249
Harald Welte2483f1b2016-06-19 18:06:02 +0200250/* increment the ref-count. Needs to be called by every user */
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100251struct ran_conn *_ran_conn_get(struct ran_conn *conn, enum ran_conn_use balance_token,
252 const char *file, int line)
Harald Welte2483f1b2016-06-19 18:06:02 +0200253{
254 OSMO_ASSERT(conn);
Holger Hans Peter Freythere7bd8632013-06-30 15:30:47 +0200255
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100256 if (balance_token != RAN_CONN_USE_UNTRACKED) {
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100257 uint32_t flag = 1 << balance_token;
258 OSMO_ASSERT(balance_token < 32);
259 if (conn->use_tokens & flag)
260 LOGPSRC(DREF, LOGL_ERROR, file, line,
261 "%s: MSC conn use error: using an already used token: %s\n",
262 vlr_subscr_name(conn->vsub),
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100263 ran_conn_use_name(balance_token));
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100264 conn->use_tokens |= flag;
265 }
266
Harald Welte2483f1b2016-06-19 18:06:02 +0200267 conn->use_count++;
268 LOGPSRC(DREF, LOGL_DEBUG, file, line,
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200269 "%s: MSC conn use + %s == %u (0x%x: %s)\n",
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100270 vlr_subscr_name(conn->vsub), ran_conn_use_name(balance_token),
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200271 conn->use_count, conn->use_tokens, used_ref_counts_str(conn));
Harald Welte2483f1b2016-06-19 18:06:02 +0200272
273 return conn;
274}
275
276/* decrement the ref-count. Once it reaches zero, we release */
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100277void _ran_conn_put(struct ran_conn *conn, enum ran_conn_use balance_token,
278 const char *file, int line)
Harald Welte2483f1b2016-06-19 18:06:02 +0200279{
280 OSMO_ASSERT(conn);
281
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100282 if (balance_token != RAN_CONN_USE_UNTRACKED) {
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100283 uint32_t flag = 1 << balance_token;
284 OSMO_ASSERT(balance_token < 32);
285 if (!(conn->use_tokens & flag))
286 LOGPSRC(DREF, LOGL_ERROR, file, line,
287 "%s: MSC conn use error: freeing an unused token: %s\n",
288 vlr_subscr_name(conn->vsub),
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100289 ran_conn_use_name(balance_token));
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100290 conn->use_tokens &= ~flag;
291 }
292
Harald Welte2483f1b2016-06-19 18:06:02 +0200293 if (conn->use_count == 0) {
294 LOGPSRC(DREF, LOGL_ERROR, file, line,
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100295 "%s: MSC conn use - %s failed: is already 0\n",
296 vlr_subscr_name(conn->vsub),
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100297 ran_conn_use_name(balance_token));
Harald Welte2483f1b2016-06-19 18:06:02 +0200298 return;
299 }
300
301 conn->use_count--;
302 LOGPSRC(DREF, LOGL_DEBUG, file, line,
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200303 "%s: MSC conn use - %s == %u (0x%x: %s)\n",
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100304 vlr_subscr_name(conn->vsub), ran_conn_use_name(balance_token),
Neels Hofmeyr99a8d232018-04-09 20:44:56 +0200305 conn->use_count, conn->use_tokens, used_ref_counts_str(conn));
Harald Welte2483f1b2016-06-19 18:06:02 +0200306
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200307 if (conn->use_count == 0)
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100308 osmo_fsm_inst_dispatch(conn->fi, RAN_CONN_E_UNUSED, NULL);
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200309}
310
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100311bool ran_conn_used_by(struct ran_conn *conn, enum ran_conn_use token)
Neels Hofmeyr4068ab22018-04-01 20:55:54 +0200312{
313 return conn && (conn->use_tokens & (1 << token));
314}
315
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100316const struct value_string ran_conn_use_names[] = {
Neels Hofmeyr3c20a5e2018-11-30 01:08:36 +0100317 {RAN_CONN_USE_UNTRACKED, "UNTRACKED"},
318 {RAN_CONN_USE_COMPL_L3, "compl_l3"},
319 {RAN_CONN_USE_DTAP, "dtap"},
320 {RAN_CONN_USE_AUTH_CIPH, "auth+ciph"},
321 {RAN_CONN_USE_CM_SERVICE, "cm_service"},
322 {RAN_CONN_USE_TRANS_CC, "trans_cc"},
323 {RAN_CONN_USE_TRANS_SMS, "trans_sms"},
324 {RAN_CONN_USE_TRANS_NC_SS, "trans_nc_ss"},
325 {RAN_CONN_USE_SILENT_CALL, "silent_call"},
326 {RAN_CONN_USE_RELEASE, "release"},
Neels Hofmeyr6166f292017-11-22 14:33:12 +0100327 {0, NULL},
328};
329
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200330void msc_stop_paging(struct vlr_subscr *vsub)
331{
332 DEBUGP(DPAG, "Paging can stop for %s\n", vlr_subscr_name(vsub));
333 /* tell BSCs and RNCs to stop paging? How? */
Holger Hans Peter Freyther40494552010-06-28 17:09:29 +0800334}