blob: f0a9ffff39c333188f8ab03488eacf2d8f7e25a3 [file] [log] [blame]
Harald Welte3dcdd202019-03-09 13:06:46 +01001/* (C) 2018-2019 by Harald Welte <laforge@gnumonks.org>
2 *
3 * All Rights Reserved
4 *
5 * SPDX-License-Identifier: GPL-2.0+
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; if not, write to the Free Software Foundation, Inc.,
19 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20 *
21 */
22
23
Harald Welte24173fb2018-08-24 20:37:28 +020024#include <stdint.h>
25#include <string.h>
26#include <errno.h>
27
28#include <talloc.h>
29
30#include <osmocom/core/logging.h>
31#include <osmocom/core/utils.h>
32#include <osmocom/core/msgb.h>
33#include <osmocom/core/fsm.h>
34
35#include <osmocom/abis/ipa.h>
36#include <osmocom/gsm/protocol/ipaccess.h>
37
38#include "client.h"
39#include "rspro_util.h"
40
41#define S(x) (1 << (x))
42
Harald Welte707c85a2019-03-09 12:56:35 +010043#define T1_WAIT_CLIENT_CONN_RES 10
44#define T2_RECONNECT 10
45
46/***********************************************************************
Harald Welte0a684972019-12-02 20:10:59 +010047 * client-side FSM for a RSPRO connection to remsim-server
48 *
49 * This implements the TCP/IPA client side of an RSPRO connection between
50 * a logical (TCP-level) client implementation and a remote RSPRO server.
51 *
52 * 'client' and 'server' here strictly refer to RSPRO protocol roles, not
53 * to be confused with the remsim-client or remsim-server!
54 *
55 * Specifically, this RSPRO client FSM is used by both remsim-client and
56 * remsim-bankd for their RSPRO control connection to remsim-server.
Harald Welte707c85a2019-03-09 12:56:35 +010057 ***********************************************************************/
58
Harald Welte7f0e82f2018-10-14 20:07:59 +020059static void push_and_send(struct ipa_client_conn *ipa, struct msgb *msg_tx)
60{
61 ipa_prepend_header_ext(msg_tx, IPAC_PROTO_EXT_RSPRO);
62 ipa_msg_push_header(msg_tx, IPAC_PROTO_OSMO);
63 ipa_client_conn_send(ipa, msg_tx);
64 /* msg_tx is now queued and will be freed. */
65}
66
Harald Welte6d61b162019-12-02 22:47:35 +010067static int ipa_client_conn_send_rspro(struct ipa_client_conn *ipa, RsproPDU_t *rspro)
Harald Welte7f0e82f2018-10-14 20:07:59 +020068{
69 struct msgb *msg = rspro_enc_msg(rspro);
Harald Welte2eee4502019-03-30 08:50:35 +010070 if (!msg) {
Harald Weltea8b86ce2019-03-31 14:59:20 +020071 LOGP(DMAIN, LOGL_ERROR, "Error encoding RSPRO: %s\n", rspro_msgt_name(rspro));
72 osmo_log_backtrace(DMAIN, LOGL_ERROR);
Harald Welte2eee4502019-03-30 08:50:35 +010073 ASN_STRUCT_FREE(asn_DEF_RsproPDU, rspro);
Harald Weltea844bb02019-03-09 13:38:50 +010074 return -1;
Harald Welte2eee4502019-03-30 08:50:35 +010075 }
Harald Welte7f0e82f2018-10-14 20:07:59 +020076 push_and_send(ipa, msg);
Harald Weltea844bb02019-03-09 13:38:50 +010077 return 0;
78}
79
Harald Weltea3b14d12019-12-02 22:58:34 +010080static int _server_conn_send_rspro(struct rspro_server_conn *srvc, RsproPDU_t *rspro)
81{
82 LOGPFSM(srvc->fi, "Tx RSPRO %s\n", rspro_msgt_name(rspro));
83 return ipa_client_conn_send_rspro(srvc->conn, rspro);
84}
85
Harald Weltea844bb02019-03-09 13:38:50 +010086int server_conn_send_rspro(struct rspro_server_conn *srvc, RsproPDU_t *rspro)
87{
Harald Weltea8b86ce2019-03-31 14:59:20 +020088 if (!rspro) {
89 LOGPFSML(srvc->fi, LOGL_ERROR, "Attempt to transmit NULL\n");
90 osmo_log_backtrace(DMAIN, LOGL_ERROR);
91 return -EINVAL;
92 }
Harald Weltea3b14d12019-12-02 22:58:34 +010093 if (osmo_fsm_inst_dispatch(srvc->fi, SRVC_E_RSPRO_TX, rspro) < 0) {
94 ASN_STRUCT_FREE(asn_DEF_RsproPDU, rspro);
95 return -EPERM;
96 }
97 return 0;
Harald Welte7f0e82f2018-10-14 20:07:59 +020098}
99
Harald Welte24173fb2018-08-24 20:37:28 +0200100enum server_conn_fsm_state {
101 /* waiting for initial connectiong to remsim-server */
102 SRVC_ST_INIT,
103 /* server connection established, waiting for ClientConnectRes */
104 SRVC_ST_ESTABLISHED,
105 /* server connection etsablished, ClientConnect succeeded */
106 SRVC_ST_CONNECTED,
107 /* connection lost, we're waiting for a re-establish */
108 SRVC_ST_REESTABLISH,
109};
110
111static const struct value_string server_conn_fsm_event_names[] = {
Harald Welted2192e22019-11-07 18:10:57 +0100112 OSMO_VALUE_STRING(SRVC_E_ESTABLISH),
Harald Welte24173fb2018-08-24 20:37:28 +0200113 OSMO_VALUE_STRING(SRVC_E_TCP_UP),
114 OSMO_VALUE_STRING(SRVC_E_TCP_DOWN),
Harald Welte03b24112019-03-08 19:43:02 +0100115 OSMO_VALUE_STRING(SRVC_E_KA_TIMEOUT),
Harald Welte24173fb2018-08-24 20:37:28 +0200116 OSMO_VALUE_STRING(SRVC_E_CLIENT_CONN_RES),
Harald Weltea3b14d12019-12-02 22:58:34 +0100117 OSMO_VALUE_STRING(SRVC_E_RSPRO_TX),
Harald Welte24173fb2018-08-24 20:37:28 +0200118 { 0, NULL }
119};
120
Harald Welte84ba2342018-08-24 22:20:20 +0200121static void srvc_updown_cb(struct ipa_client_conn *conn, int up)
122{
123 struct rspro_server_conn *srvc = conn->data;
124
Harald Weltee57334e2019-03-27 22:58:10 +0100125 LOGPFSM(srvc->fi, "RSPRO link to %s:%d %s\n", conn->addr, conn->port, up ? "UP" : "DOWN");
Harald Welte84ba2342018-08-24 22:20:20 +0200126
127 osmo_fsm_inst_dispatch(srvc->fi, up ? SRVC_E_TCP_UP: SRVC_E_TCP_DOWN, 0);
128}
129
130static int srvc_read_cb(struct ipa_client_conn *conn, struct msgb *msg)
131{
132 struct ipaccess_head *hh = (struct ipaccess_head *) msg->data;
133 struct ipaccess_head_ext *he = (struct ipaccess_head_ext *) msgb_l2(msg);
134 struct rspro_server_conn *srvc = conn->data;
Harald Weltef9995a32018-10-14 20:40:05 +0200135 RsproPDU_t *pdu;
Harald Welte84ba2342018-08-24 22:20:20 +0200136 int rc;
137
138 if (msgb_length(msg) < sizeof(*hh))
139 goto invalid;
140 msg->l2h = &hh->data[0];
Harald Welte1a171042019-03-08 19:18:52 +0100141 switch (hh->proto) {
Harald Welte03b24112019-03-08 19:43:02 +0100142 case IPAC_PROTO_IPACCESS:
143 rc = ipaccess_bts_handle_ccm(srvc->conn, &srvc->ipa_dev, msg);
Harald Weltecacbc2b2019-07-24 18:42:02 +0200144 if (rc < 0) {
145 msgb_free(msg);
Harald Welte03b24112019-03-08 19:43:02 +0100146 break;
Harald Weltecacbc2b2019-07-24 18:42:02 +0200147 }
Harald Welte03b24112019-03-08 19:43:02 +0100148 switch (hh->data[0]) {
149 case IPAC_MSGT_PONG:
150 ipa_keepalive_fsm_pong_received(srvc->keepalive_fi);
151 rc = 0;
152 break;
153 default:
154 break;
155 }
156 break;
Harald Welte1a171042019-03-08 19:18:52 +0100157 case IPAC_PROTO_OSMO:
158 if (!he || msgb_l2len(msg) < sizeof(*he))
159 goto invalid;
160 msg->l2h = &he->data[0];
161 switch (he->proto) {
162 case IPAC_PROTO_EXT_RSPRO:
Harald Weltee57334e2019-03-27 22:58:10 +0100163 LOGPFSM(srvc->fi, "Received RSPRO %s\n", msgb_hexdump(msg));
Harald Welte9392e082019-07-23 18:14:18 +0200164 /* respro_dec_msg() takes ownership of the input message buffer in successful
165 * and unsuccessful cases */
Harald Welte1a171042019-03-08 19:18:52 +0100166 pdu = rspro_dec_msg(msg);
167 if (!pdu)
Harald Welte573a5b92019-09-12 20:27:58 +0200168 break;
Harald Welte1a171042019-03-08 19:18:52 +0100169 rc = srvc->handle_rx(srvc, pdu);
170 ASN_STRUCT_FREE(asn_DEF_RsproPDU, pdu);
171 break;
172 default:
173 goto invalid;
174 }
175 break;
176 default:
Harald Welte84ba2342018-08-24 22:20:20 +0200177 goto invalid;
Harald Welte1a171042019-03-08 19:18:52 +0100178 }
Harald Welte573a5b92019-09-12 20:27:58 +0200179
180 msgb_free(msg);
Harald Welte84ba2342018-08-24 22:20:20 +0200181 return rc;
Harald Welte84ba2342018-08-24 22:20:20 +0200182
183invalid:
Harald Weltee57334e2019-03-27 22:58:10 +0100184 LOGPFSML(srvc->fi, LOGL_ERROR, "Error decoding PDU\n");
Harald Welte84ba2342018-08-24 22:20:20 +0200185 msgb_free(msg);
186 return -1;
187}
188
Harald Welte03b24112019-03-08 19:43:02 +0100189static const struct ipa_keepalive_params ka_params = {
190 .interval = 30,
191 .wait_for_resp = 10,
192};
Harald Welte84ba2342018-08-24 22:20:20 +0200193
Harald Welte24173fb2018-08-24 20:37:28 +0200194static void srvc_st_init(struct osmo_fsm_inst *fi, uint32_t event, void *data)
195{
Harald Welte84ba2342018-08-24 22:20:20 +0200196 switch (event) {
Harald Welted2192e22019-11-07 18:10:57 +0100197 case SRVC_E_ESTABLISH:
Harald Welte84ba2342018-08-24 22:20:20 +0200198 default:
199 OSMO_ASSERT(0);
200 }
201}
202
203static void srvc_st_established_onenter(struct osmo_fsm_inst *fi, uint32_t prev_state)
204{
205 struct rspro_server_conn *srvc = (struct rspro_server_conn *) fi->priv;
206 RsproPDU_t *pdu;
207
Harald Welte03b24112019-03-08 19:43:02 +0100208 ipa_keepalive_fsm_start(srvc->keepalive_fi);
209
Harald Welte707c85a2019-03-09 12:56:35 +0100210 if (srvc->own_comp_id.type == ComponentType_remsimClient)
211 pdu = rspro_gen_ConnectClientReq(&srvc->own_comp_id, srvc->clslot);
212 else
Harald Welte4fa407a2019-04-01 21:05:06 +0200213 pdu = rspro_gen_ConnectBankReq(&srvc->own_comp_id, srvc->bankd.bank_id,
214 srvc->bankd.num_slots);
Harald Weltea3b14d12019-12-02 22:58:34 +0100215 _server_conn_send_rspro(srvc, pdu);
Harald Welte24173fb2018-08-24 20:37:28 +0200216}
217
218static void srvc_st_established(struct osmo_fsm_inst *fi, uint32_t event, void *data)
219{
Harald Welte4e7a2852019-03-17 21:01:50 +0100220 struct rspro_server_conn *srvc = (struct rspro_server_conn *) fi->priv;
221 RsproPDU_t *pdu = NULL;
222 e_ResultCode res;
223
Harald Welte84ba2342018-08-24 22:20:20 +0200224 switch (event) {
225 case SRVC_E_TCP_DOWN:
Harald Welte03b24112019-03-08 19:43:02 +0100226 case SRVC_E_KA_TIMEOUT:
Harald Welte84ba2342018-08-24 22:20:20 +0200227 osmo_fsm_inst_state_chg(fi, SRVC_ST_REESTABLISH, T2_RECONNECT, 2);
228 break;
229 case SRVC_E_CLIENT_CONN_RES:
Harald Welte4e7a2852019-03-17 21:01:50 +0100230 pdu = data;
231 res = rspro_get_result(pdu);
232 if (res != ResultCode_ok) {
233 ipa_client_conn_close(srvc->conn);
234 osmo_fsm_inst_dispatch(fi, SRVC_E_TCP_DOWN, NULL);
235 } else {
236 /* somehow notify the main code? */
237 osmo_fsm_inst_state_chg(fi, SRVC_ST_CONNECTED, 0, 0);
238 }
Harald Welte84ba2342018-08-24 22:20:20 +0200239 break;
240 default:
241 OSMO_ASSERT(0);
242 }
Harald Welte24173fb2018-08-24 20:37:28 +0200243}
244
245static void srvc_st_connected(struct osmo_fsm_inst *fi, uint32_t event, void *data)
246{
Harald Weltea3b14d12019-12-02 22:58:34 +0100247 struct rspro_server_conn *srvc = (struct rspro_server_conn *) fi->priv;
248 RsproPDU_t *pdu = NULL;
249
Harald Welte84ba2342018-08-24 22:20:20 +0200250 switch (event) {
251 case SRVC_E_TCP_DOWN:
Harald Welte03b24112019-03-08 19:43:02 +0100252 case SRVC_E_KA_TIMEOUT:
Harald Welte84ba2342018-08-24 22:20:20 +0200253 osmo_fsm_inst_state_chg(fi, SRVC_ST_REESTABLISH, T2_RECONNECT, 2);
254 break;
Harald Weltea3b14d12019-12-02 22:58:34 +0100255 case SRVC_E_RSPRO_TX:
256 pdu = data;
257 _server_conn_send_rspro(srvc, pdu);
258 break;
Harald Welte84ba2342018-08-24 22:20:20 +0200259 default:
260 OSMO_ASSERT(0);
261 }
262}
263
264static void srvc_st_reestablish_onenter(struct osmo_fsm_inst *fi, uint32_t prev_state)
265{
266 struct rspro_server_conn *srvc = (struct rspro_server_conn *) fi->priv;
267 int rc;
268
Harald Welted2192e22019-11-07 18:10:57 +0100269 if (srvc->keepalive_fi) {
270 ipa_keepalive_fsm_stop(srvc->keepalive_fi);
271 osmo_fsm_inst_term(srvc->keepalive_fi, OSMO_FSM_TERM_REGULAR, NULL);
272 srvc->keepalive_fi = NULL;
273 }
274
275 if (srvc->conn) {
276 LOGPFSML(fi, LOGL_INFO, "Destroying existing connection to server\n");
277 ipa_client_conn_close(srvc->conn);
278 ipa_client_conn_destroy(srvc->conn);
279 srvc->conn = NULL;
280 }
281 LOGPFSML(fi, LOGL_INFO, "Creating TCP connection to server at %s:%u\n",
282 srvc->server_host, srvc->server_port);
283 srvc->conn = ipa_client_conn_create(fi, NULL, 0, srvc->server_host, srvc->server_port,
284 srvc_updown_cb, srvc_read_cb, NULL, srvc);
285 if (!srvc->conn) {
286 LOGPFSML(fi, LOGL_FATAL, "Unable to create socket: %s\n", strerror(errno));
287 exit(1);
288 }
289
290 srvc->keepalive_fi = ipa_client_conn_alloc_keepalive_fsm(srvc->conn, &ka_params, fi->id);
291 if (!srvc->keepalive_fi) {
292 LOGPFSM(fi, "Unable to create keepalive FSM\n");
293 exit(1);
294 }
295 /* ensure parent is notified once keepalive FSM instance is dying */
296 osmo_fsm_inst_change_parent(srvc->keepalive_fi, srvc->fi, SRVC_E_KA_TIMEOUT);
Harald Welte03b24112019-03-08 19:43:02 +0100297
Harald Welte84ba2342018-08-24 22:20:20 +0200298 /* Attempt to connect TCP socket */
299 rc = ipa_client_conn_open(srvc->conn);
300 if (rc < 0) {
Harald Welted2192e22019-11-07 18:10:57 +0100301 LOGPFSML(fi, LOGL_FATAL, "Unable to connect RSPRO to %s:%u - %s\n",
Harald Welte84ba2342018-08-24 22:20:20 +0200302 srvc->server_host, srvc->server_port, strerror(errno));
303 /* FIXME: retry? Timer? Abort? */
304 OSMO_ASSERT(0);
305 }
Harald Welte24173fb2018-08-24 20:37:28 +0200306}
307
308static void srvc_st_reestablish(struct osmo_fsm_inst *fi, uint32_t event, void *data)
309{
Harald Welte84ba2342018-08-24 22:20:20 +0200310 switch (event) {
Harald Welte52cc7db2018-09-24 11:51:51 +0200311 case SRVC_E_TCP_UP:
Harald Welte84ba2342018-08-24 22:20:20 +0200312 osmo_fsm_inst_state_chg(fi, SRVC_ST_ESTABLISHED, T1_WAIT_CLIENT_CONN_RES, 1);
313 break;
Harald Welte52cc7db2018-09-24 11:51:51 +0200314 case SRVC_E_TCP_DOWN:
315 /* wait for normal T2 call-back */
316 break;
Harald Welte84ba2342018-08-24 22:20:20 +0200317 default:
318 OSMO_ASSERT(0);
319 }
Harald Welte24173fb2018-08-24 20:37:28 +0200320}
321
Harald Welted2192e22019-11-07 18:10:57 +0100322static void srvc_allstate_action(struct osmo_fsm_inst *fi, uint32_t event, void *data)
323{
324 switch (event) {
325 case SRVC_E_ESTABLISH:
326 osmo_fsm_inst_state_chg(fi, SRVC_ST_REESTABLISH, T2_RECONNECT, 2);
327 break;
328 default:
329 OSMO_ASSERT(0);
330 }
331}
332
Harald Welte24173fb2018-08-24 20:37:28 +0200333static int server_conn_fsm_timer_cb(struct osmo_fsm_inst *fi)
334{
Harald Weltea025e702019-03-09 21:39:09 +0100335 struct rspro_server_conn *srvc = (struct rspro_server_conn *) fi->priv;
336
Harald Welte52cc7db2018-09-24 11:51:51 +0200337 switch (fi->T) {
338 case 2:
Harald Welted2192e22019-11-07 18:10:57 +0100339 /* TCP reconnect failed: retry */
Harald Welte52cc7db2018-09-24 11:51:51 +0200340 osmo_fsm_inst_state_chg(fi, SRVC_ST_REESTABLISH, T2_RECONNECT, 2);
341 break;
342 case 1:
Harald Welted2192e22019-11-07 18:10:57 +0100343 /* no ClientConnectRes received: disconnect + reconnect */
Harald Weltea025e702019-03-09 21:39:09 +0100344 ipa_client_conn_close(srvc->conn);
345 osmo_fsm_inst_dispatch(fi, SRVC_E_TCP_DOWN, NULL);
Harald Welte52cc7db2018-09-24 11:51:51 +0200346 break;
347 default:
348 OSMO_ASSERT(0);
349 }
350
Harald Welte24173fb2018-08-24 20:37:28 +0200351 return 0;
352}
353
354static const struct osmo_fsm_state server_conn_fsm_states[] = {
355 [SRVC_ST_INIT] = {
356 .name = "INIT",
Harald Welted2192e22019-11-07 18:10:57 +0100357 .in_event_mask = 0, /* S(SRVC_E_ESTABLISH) via allstate */
358 .out_state_mask = S(SRVC_ST_REESTABLISH),
Harald Welte24173fb2018-08-24 20:37:28 +0200359 .action = srvc_st_init,
360 },
361 [SRVC_ST_ESTABLISHED] = {
362 .name = "ESTABLISHED",
Harald Welte03b24112019-03-08 19:43:02 +0100363 .in_event_mask = S(SRVC_E_TCP_DOWN) | S(SRVC_E_KA_TIMEOUT) | S(SRVC_E_CLIENT_CONN_RES),
Harald Welte24173fb2018-08-24 20:37:28 +0200364 .out_state_mask = S(SRVC_ST_CONNECTED) | S(SRVC_ST_REESTABLISH),
365 .action = srvc_st_established,
Harald Welte84ba2342018-08-24 22:20:20 +0200366 .onenter = srvc_st_established_onenter,
Harald Welte24173fb2018-08-24 20:37:28 +0200367 },
368 [SRVC_ST_CONNECTED] = {
369 .name = "CONNECTED",
Harald Weltea3b14d12019-12-02 22:58:34 +0100370 .in_event_mask = S(SRVC_E_TCP_DOWN) | S(SRVC_E_KA_TIMEOUT) | S(SRVC_E_RSPRO_TX),
Harald Welte24173fb2018-08-24 20:37:28 +0200371 .out_state_mask = S(SRVC_ST_REESTABLISH),
372 .action = srvc_st_connected,
373 },
374 [SRVC_ST_REESTABLISH] = {
375 .name = "REESTABLISH",
Harald Welte52cc7db2018-09-24 11:51:51 +0200376 .in_event_mask = S(SRVC_E_TCP_UP) | S(SRVC_E_TCP_DOWN),
377 .out_state_mask = S(SRVC_ST_ESTABLISHED) | S(SRVC_ST_REESTABLISH),
Harald Welte24173fb2018-08-24 20:37:28 +0200378 .action = srvc_st_reestablish,
Harald Welte84ba2342018-08-24 22:20:20 +0200379 .onenter = srvc_st_reestablish_onenter,
Harald Welte24173fb2018-08-24 20:37:28 +0200380 },
381};
382
Harald Welte3cded632019-03-09 12:59:41 +0100383struct osmo_fsm rspro_client_server_fsm = {
384 .name = "RSPRO_CLIENT",
Harald Welte24173fb2018-08-24 20:37:28 +0200385 .states = server_conn_fsm_states,
386 .num_states = ARRAY_SIZE(server_conn_fsm_states),
Harald Welted2192e22019-11-07 18:10:57 +0100387 .allstate_event_mask = S(SRVC_E_ESTABLISH),
388 .allstate_action = srvc_allstate_action,
Harald Welte24173fb2018-08-24 20:37:28 +0200389 .timer_cb = server_conn_fsm_timer_cb,
390 .log_subsys = DMAIN,
391 .event_names = server_conn_fsm_event_names,
392};
393
Harald Welte098ef872018-10-14 20:08:50 +0200394int server_conn_fsm_alloc(void *ctx, struct rspro_server_conn *srvc)
Harald Welte24173fb2018-08-24 20:37:28 +0200395{
396 struct osmo_fsm_inst *fi;
397
Harald Welte3cded632019-03-09 12:59:41 +0100398 fi = osmo_fsm_inst_alloc(&rspro_client_server_fsm, ctx, srvc, LOGL_DEBUG, "server");
Harald Welte24173fb2018-08-24 20:37:28 +0200399 if (!fi)
400 return -1;
401
Harald Welte84ba2342018-08-24 22:20:20 +0200402 srvc->fi = fi;
Harald Welte24173fb2018-08-24 20:37:28 +0200403 return 0;
404}
Harald Welte7fc64bc2019-03-02 12:55:59 +0100405
406static __attribute__((constructor)) void on_dso_load(void)
407{
Harald Welte4ccd2fc2019-12-01 13:32:54 +0100408 OSMO_ASSERT(osmo_fsm_register(&rspro_client_server_fsm) == 0);
Harald Welte7fc64bc2019-03-02 12:55:59 +0100409}