370 lines
10 KiB
C
370 lines
10 KiB
C
#define TRACE_MODULE _s1ap_usrsctp
|
|
|
|
#include "core_debug.h"
|
|
#include "core_thread.h"
|
|
|
|
#include "mme_event.h"
|
|
|
|
#include "s1ap_path.h"
|
|
|
|
#if HAVE_USRSCTP_H
|
|
#ifndef INET
|
|
#define INET 1
|
|
#endif
|
|
#ifndef INET6
|
|
#define INET6 1
|
|
#endif
|
|
#include <usrsctp.h>
|
|
#endif
|
|
|
|
static int s1ap_usrsctp_recv_cb(struct socket *sock,
|
|
union sctp_sockstore addr, void *data, size_t datalen,
|
|
struct sctp_rcvinfo rcv, int flags, void *ulp_info);
|
|
|
|
static void debug_printf(const char *format, ...);
|
|
|
|
int accept_thread_should_stop = 0;
|
|
static thread_id accept_thread;
|
|
static void *THREAD_FUNC accept_main(thread_id id, void *data);
|
|
|
|
status_t s1ap_init(c_uint16_t port)
|
|
{
|
|
usrsctp_init(port, NULL, debug_printf);
|
|
#ifdef SCTP_DEBUG
|
|
usrsctp_sysctl_set_sctp_debug_on(SCTP_DEBUG_ALL);
|
|
#endif
|
|
usrsctp_sysctl_set_sctp_blackhole(2);
|
|
usrsctp_sysctl_set_sctp_enable_sack_immediately(1);
|
|
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t s1ap_final()
|
|
{
|
|
while(usrsctp_finish() != 0)
|
|
{
|
|
d_error("try to finsih SCTP\n");
|
|
core_sleep(time_from_msec(1000));
|
|
}
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t s1ap_usrsctp_socket(sock_id *new,
|
|
int family, int type,
|
|
int (*receive_cb)(struct socket *sock, union sctp_sockstore addr,
|
|
void *data, size_t datalen, struct sctp_rcvinfo, int flags,
|
|
void *ulp_info))
|
|
{
|
|
struct socket *sock = NULL;
|
|
const int on = 1;
|
|
struct sctp_event event;
|
|
c_uint16_t event_types[] = {
|
|
SCTP_ASSOC_CHANGE,
|
|
SCTP_PEER_ADDR_CHANGE,
|
|
SCTP_REMOTE_ERROR,
|
|
SCTP_SHUTDOWN_EVENT,
|
|
SCTP_ADAPTATION_INDICATION,
|
|
SCTP_PARTIAL_DELIVERY_EVENT
|
|
};
|
|
int i;
|
|
|
|
if (!(sock = usrsctp_socket(family, type, IPPROTO_SCTP,
|
|
receive_cb, NULL, 0, NULL)))
|
|
{
|
|
d_error("usrsctp_socket failed");
|
|
return CORE_ERROR;
|
|
}
|
|
|
|
if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_RECVRCVINFO,
|
|
&on, sizeof(int)) < 0)
|
|
{
|
|
d_error("usrsctp_setsockopt SCTP_RECVRCVINFO failed");
|
|
return CORE_ERROR;
|
|
}
|
|
|
|
memset(&event, 0, sizeof(event));
|
|
event.se_assoc_id = SCTP_FUTURE_ASSOC;
|
|
event.se_on = 1;
|
|
for (i = 0; i < (int)(sizeof(event_types)/sizeof(c_uint16_t)); i++)
|
|
{
|
|
event.se_type = event_types[i];
|
|
if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_EVENT,
|
|
&event, sizeof(struct sctp_event)) < 0)
|
|
{
|
|
d_error("usrsctp_setsockopt SCTP_EVENT failed");
|
|
return CORE_ERROR;
|
|
}
|
|
}
|
|
|
|
*new = (sock_id)sock;
|
|
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t s1ap_usrsctp_bind(sock_id id, c_sockaddr_t *sa)
|
|
{
|
|
struct socket *sock = (struct socket *)id;
|
|
char buf[CORE_ADDRSTRLEN];
|
|
socklen_t addrlen;
|
|
|
|
d_assert(sock, return CORE_ERROR,);
|
|
d_assert(sa, return CORE_ERROR,);
|
|
|
|
addrlen = sockaddr_len(sa);
|
|
d_assert(addrlen, return CORE_ERROR,);
|
|
|
|
if (usrsctp_bind(sock, &sa->sa, addrlen) != 0)
|
|
{
|
|
d_error("usrsctp_bind(%s:%d) failed",
|
|
CORE_NTOP(sa, buf), CORE_PORT(sa));
|
|
return CORE_ERROR;
|
|
}
|
|
|
|
d_trace(1, "socket bind %s:%d\n", CORE_NTOP(sa, buf), CORE_PORT(sa));
|
|
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t s1ap_usrsctp_connect(sock_id id, c_sockaddr_t *sa)
|
|
{
|
|
struct socket *sock = (struct socket *)id;
|
|
char buf[CORE_ADDRSTRLEN];
|
|
socklen_t addrlen;
|
|
|
|
d_assert(sock, return CORE_ERROR,);
|
|
d_assert(sa, return CORE_ERROR,);
|
|
|
|
addrlen = sockaddr_len(sa);
|
|
d_assert(addrlen, return CORE_ERROR,);
|
|
|
|
if (usrsctp_connect(sock, &sa->sa, addrlen) != 0)
|
|
{
|
|
d_error("usrsctp_connect(%s:%d)", CORE_NTOP(sa, buf), CORE_PORT(sa));
|
|
return CORE_ERROR;
|
|
}
|
|
|
|
d_trace(1, "socket connect %s:%d\n", CORE_NTOP(sa, buf), CORE_PORT(sa));
|
|
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t s1ap_usrsctp_listen(sock_id id)
|
|
{
|
|
int rc;
|
|
struct socket *sock = (struct socket *)id;
|
|
d_assert(sock, return CORE_ERROR,);
|
|
|
|
rc = usrsctp_listen(sock, 5);
|
|
if (rc < 0)
|
|
{
|
|
d_error("usrsctp_listen failed");
|
|
return CORE_ERROR;
|
|
}
|
|
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t s1ap_open(void)
|
|
{
|
|
status_t rv;
|
|
char buf[CORE_ADDRSTRLEN];
|
|
c_sockaddr_t addr;
|
|
|
|
rv = s1ap_usrsctp_socket((sock_id *)&mme_self()->s1ap_sock,
|
|
AF_INET, SOCK_STREAM, s1ap_usrsctp_recv_cb);
|
|
d_assert(rv == CORE_OK, return CORE_ERROR,);
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.c_sa_family = AF_INET;
|
|
addr.c_sa_port = htons(mme_self()->s1ap_port);
|
|
addr.sin.sin_addr.s_addr = mme_self()->s1ap_addr;
|
|
|
|
rv = s1ap_usrsctp_bind(mme_self()->s1ap_sock, &addr);
|
|
d_assert(rv == CORE_OK, return CORE_ERROR,);
|
|
|
|
rv = s1ap_usrsctp_listen(mme_self()->s1ap_sock);
|
|
d_assert(rv == CORE_OK, return CORE_ERROR,);
|
|
|
|
rv = thread_create(&accept_thread, NULL, accept_main, NULL);
|
|
if (rv != CORE_OK) return rv;
|
|
|
|
d_trace(1, "s1_enb_listen() %s:%d\n",
|
|
CORE_NTOP(&addr, buf), CORE_PORT(&addr));
|
|
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t s1ap_close()
|
|
{
|
|
d_assert(mme_self(), return CORE_ERROR, "Null param");
|
|
d_assert(mme_self()->s1ap_sock, return CORE_ERROR,
|
|
"S1-ENB path already opened");
|
|
|
|
accept_thread_should_stop = 1;
|
|
|
|
sock_delete(mme_self()->s1ap_sock);
|
|
#if 0
|
|
thread_delete(accept_thread);
|
|
#else
|
|
d_error("[FIXME] should delete accept_thread : "
|
|
"how to release usrsctp_accept() blocking?");
|
|
#endif
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t sock_delete(sock_id sock)
|
|
{
|
|
usrsctp_close((struct socket *)sock);
|
|
return CORE_OK;
|
|
}
|
|
|
|
status_t s1ap_send(sock_id id, pkbuf_t *pkbuf)
|
|
{
|
|
ssize_t sent;
|
|
struct socket *sock = (struct socket *)id;
|
|
struct sctp_sndinfo sndinfo;
|
|
|
|
d_assert(id, return CORE_ERROR, "Null param");
|
|
d_assert(pkbuf, return CORE_ERROR, "Null param");
|
|
|
|
memset((void *)&sndinfo, 0, sizeof(struct sctp_sndinfo));
|
|
sndinfo.snd_ppid = htonl(SCTP_S1AP_PPID);
|
|
sent = usrsctp_sendv(sock, pkbuf->payload, pkbuf->len,
|
|
NULL, 0,
|
|
(void *)&sndinfo, (socklen_t)sizeof(struct sctp_sndinfo),
|
|
SCTP_SENDV_SNDINFO, 0);
|
|
|
|
d_trace(10,"Sent %d->%d bytes\n", pkbuf->len, sent);
|
|
d_trace_hex(10, pkbuf->payload, pkbuf->len);
|
|
if (sent < 0 || sent != pkbuf->len)
|
|
{
|
|
d_error("sent : %d, pkbuf->len : %d\n", sent, pkbuf->len);
|
|
return CORE_ERROR;
|
|
}
|
|
pkbuf_free(pkbuf);
|
|
|
|
return CORE_OK;
|
|
}
|
|
|
|
static void *THREAD_FUNC accept_main(thread_id id, void *data)
|
|
{
|
|
event_t e;
|
|
|
|
struct socket *sock = NULL;
|
|
c_sockaddr_t *addr = NULL;
|
|
socklen_t addrlen = sizeof(struct sockaddr_storage);
|
|
|
|
while (!accept_thread_should_stop)
|
|
{
|
|
addr = core_calloc(1, sizeof(c_sockaddr_t));
|
|
if ((sock = usrsctp_accept((struct socket *)mme_self()->s1ap_sock,
|
|
&addr->sa, &addrlen)) == NULL)
|
|
{
|
|
d_error("usrsctp_accept failed");
|
|
core_free(addr);
|
|
continue;
|
|
}
|
|
|
|
event_set(&e, MME_EVT_S1AP_LO_ACCEPT);
|
|
event_set_param1(&e, (c_uintptr_t)sock);
|
|
event_set_param2(&e, (c_uintptr_t)addr);
|
|
mme_event_send(&e);
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static int s1ap_usrsctp_recv_cb(struct socket *sock,
|
|
union sctp_sockstore addr, void *data, size_t datalen,
|
|
struct sctp_rcvinfo rcv, int flags, void *ulp_info)
|
|
{
|
|
if (data)
|
|
{
|
|
event_t e;
|
|
|
|
#undef MSG_NOTIFICATION
|
|
#define MSG_NOTIFICATION 0x2000
|
|
if (flags & MSG_NOTIFICATION)
|
|
{
|
|
union sctp_notification *not = (union sctp_notification *)data;
|
|
if (not->sn_header.sn_length == (c_uint32_t)datalen)
|
|
{
|
|
switch(not->sn_header.sn_type)
|
|
{
|
|
case SCTP_ASSOC_CHANGE :
|
|
d_trace(3, "SCTP_ASSOC_CHANGE"
|
|
"(type:0x%x, flags:0x%x, state:0x%x)\n",
|
|
not->sn_assoc_change.sac_type,
|
|
not->sn_assoc_change.sac_flags,
|
|
not->sn_assoc_change.sac_state);
|
|
|
|
if (not->sn_assoc_change.sac_state ==
|
|
SCTP_SHUTDOWN_COMP ||
|
|
not->sn_assoc_change.sac_state ==
|
|
SCTP_COMM_LOST)
|
|
{
|
|
event_set(&e, MME_EVT_S1AP_LO_CONNREFUSED);
|
|
event_set_param1(&e, (c_uintptr_t)sock);
|
|
mme_event_send(&e);
|
|
break;
|
|
}
|
|
|
|
if (not->sn_assoc_change.sac_state == SCTP_COMM_UP)
|
|
d_trace(3, "SCTP_COMM_UP\n");
|
|
|
|
break;
|
|
case SCTP_PEER_ADDR_CHANGE:
|
|
break;
|
|
case SCTP_SEND_FAILED :
|
|
d_error("SCTP_SEND_FAILED"
|
|
"(type:0x%x, flags:0x%x, error:0x%x)\n",
|
|
not->sn_send_failed_event.ssfe_type,
|
|
not->sn_send_failed_event.ssfe_flags,
|
|
not->sn_send_failed_event.ssfe_error);
|
|
break;
|
|
case SCTP_SHUTDOWN_EVENT :
|
|
event_set(&e, MME_EVT_S1AP_LO_CONNREFUSED);
|
|
event_set_param1(&e, (c_uintptr_t)sock);
|
|
mme_event_send(&e);
|
|
break;
|
|
default :
|
|
d_error("Discarding event with unknown "
|
|
"flags = 0x%x, type 0x%x",
|
|
flags, not->sn_header.sn_type);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else if (flags & MSG_EOR)
|
|
{
|
|
pkbuf_t *pkbuf;
|
|
|
|
pkbuf = pkbuf_alloc(0, MAX_SDU_LEN);
|
|
d_assert(pkbuf, return 1, );
|
|
|
|
pkbuf->len = datalen;
|
|
memcpy(pkbuf->payload, data, pkbuf->len);
|
|
|
|
event_set(&e, MME_EVT_S1AP_MESSAGE);
|
|
event_set_param1(&e, (c_uintptr_t)sock);
|
|
event_set_param2(&e, (c_uintptr_t)pkbuf);
|
|
mme_event_send(&e);
|
|
}
|
|
else
|
|
{
|
|
d_error("Not engough buffer. Need more recv : 0x%x", flags);
|
|
}
|
|
free(data);
|
|
}
|
|
return (1);
|
|
}
|
|
|
|
static void debug_printf(const char *format, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
va_start(ap, format);
|
|
vprintf(format, ap);
|
|
va_end(ap);
|
|
}
|