aboutsummaryrefslogtreecommitdiffstats
path: root/src/gb
diff options
context:
space:
mode:
authorHarald Welte <laforge@osmocom.org>2020-06-16 08:44:42 +0200
committerHarald Welte <laforge@osmocom.org>2020-06-16 09:21:08 +0200
commita13fb750305cad14df5ecc98ee3006965b418cbc (patch)
treeeec5a70afcd5d4fa73b35f1779da486f609c692c /src/gb
parentd1ceca9d48eb3d8b212f386a1ebb35d8fc612297 (diff)
Revert "add osmo_mobile_identity API"
This reverts commit d1ceca9d48eb3d8b212f386a1ebb35d8fc612297, as it introduces regressions in both osmo-msc and osmo-nitb which have been causing failing builds for several days now. Change-Id: I4bd958d0cd2ab4b0c4725e6d114f4404d725fcf7
Diffstat (limited to 'src/gb')
-rw-r--r--src/gb/gprs_bssgp.c58
-rw-r--r--src/gb/gprs_bssgp_bss.c30
2 files changed, 43 insertions, 45 deletions
diff --git a/src/gb/gprs_bssgp.c b/src/gb/gprs_bssgp.c
index 2784d0a8..38794c28 100644
--- a/src/gb/gprs_bssgp.c
+++ b/src/gb/gprs_bssgp.c
@@ -1170,20 +1170,19 @@ int bssgp_tx_dl_ud(struct msgb *msg, uint16_t pdu_lifetime,
/* IMSI */
if (dup->imsi && strlen(dup->imsi)) {
- struct osmo_mobile_identity mi = { .type = GSM_MI_TYPE_IMSI, };
- OSMO_STRLCPY_ARRAY(mi.imsi, dup->imsi);
- msgb_tvl_put(msg, BSSGP_IE_IMSI, osmo_mobile_identity_encoded_len(&mi, NULL));
- if (osmo_mobile_identity_encode_msgb(msg, &mi, false) <= 0) {
- if (log_check_level(DBSSGP, LOGL_NOTICE)) {
- char strbuf[64];
- osmo_mobile_identity_to_str_buf(strbuf, sizeof(strbuf), &mi);
- LOGP(DBSSGP, LOGL_ERROR,
- "NSEI=%u/BVCI=%u Cannot encode Mobile Identity %s\n",
- nsei, bvci, strbuf);
- }
- msgb_free(msg);
- return -EINVAL;
- }
+ uint8_t mi[GSM48_MID_MAX_SIZE];
+/* gsm48_generate_mid_from_imsi() is guaranteed to never return more than 11,
+ * but somehow gcc (8.2) is not smart enough to figure this out and claims that
+ * the memcpy in msgb_tvlv_put() below will cause and out-of-bounds access up to
+ * mi[131], which is wrong */
+#pragma GCC diagnostic push
+#pragma GCC diagnostic ignored "-Warray-bounds"
+ int imsi_len = gsm48_generate_mid_from_imsi(mi, dup->imsi);
+ OSMO_ASSERT(imsi_len <= GSM48_MID_MAX_SIZE);
+ if (imsi_len > 2)
+ msgb_tvlv_push(msg, BSSGP_IE_IMSI,
+ imsi_len-2, mi+2);
+#pragma GCC diagnostic pop
}
/* DRX parameters */
@@ -1228,8 +1227,12 @@ int bssgp_tx_paging(uint16_t nsei, uint16_t ns_bvci,
struct bssgp_normal_hdr *bgph =
(struct bssgp_normal_hdr *) msgb_put(msg, sizeof(*bgph));
uint16_t drx_params = osmo_htons(pinfo->drx_params);
+ uint8_t mi[GSM48_MID_MAX_SIZE];
+ int imsi_len = gsm48_generate_mid_from_imsi(mi, pinfo->imsi);
struct gsm48_ra_id ra;
- struct osmo_mobile_identity mi;
+
+ if (imsi_len < 2)
+ return -EINVAL;
msgb_nsei(msg) = nsei;
msgb_bvci(msg) = ns_bvci;
@@ -1238,23 +1241,16 @@ int bssgp_tx_paging(uint16_t nsei, uint16_t ns_bvci,
bgph->pdu_type = BSSGP_PDUT_PAGING_PS;
else
bgph->pdu_type = BSSGP_PDUT_PAGING_CS;
-
/* IMSI */
- mi = (struct osmo_mobile_identity){ .type = GSM_MI_TYPE_IMSI, };
- OSMO_STRLCPY_ARRAY(mi.imsi, pinfo->imsi);
- msgb_tvl_put(msg, BSSGP_IE_IMSI, osmo_mobile_identity_encoded_len(&mi, NULL));
- if (osmo_mobile_identity_encode_msgb(msg, &mi, false) <= 0) {
- if (log_check_level(DBSSGP, LOGL_NOTICE)) {
- char strbuf[64];
- osmo_mobile_identity_to_str_buf(strbuf, sizeof(strbuf), &mi);
- LOGP(DBSSGP, LOGL_ERROR,
- "NSEI=%u/BVCI=%u Cannot encode Mobile Identity %s\n",
- nsei, ns_bvci, strbuf);
- }
- msgb_free(msg);
- return -EINVAL;
- }
-
+/* gsm48_generate_mid_from_imsi() is guaranteed to never return more than 11,
+ * but somehow gcc (8.2) is not smart enough to figure this out and claims that
+ * the memcpy in msgb_tvlv_put() below will cause and out-of-bounds access up to
+ * mi[131], which is wrong */
+#pragma GCC diagnostic push
+#pragma GCC diagnostic ignored "-Warray-bounds"
+ OSMO_ASSERT(imsi_len <= GSM48_MID_MAX_SIZE);
+ msgb_tvlv_put(msg, BSSGP_IE_IMSI, imsi_len-2, mi+2);
+#pragma GCC diagnostic pop
/* DRX Parameters */
msgb_tvlv_put(msg, BSSGP_IE_DRX_PARAMS, 2,
(uint8_t *) &drx_params);
diff --git a/src/gb/gprs_bssgp_bss.c b/src/gb/gprs_bssgp_bss.c
index 9e9cefc5..5c9d11cc 100644
--- a/src/gb/gprs_bssgp_bss.c
+++ b/src/gb/gprs_bssgp_bss.c
@@ -178,17 +178,22 @@ int bssgp_tx_radio_status_imsi(struct bssgp_bvc_ctx *bctx, uint8_t cause,
const char *imsi)
{
struct msgb *msg = common_tx_radio_status(bctx);
- struct osmo_mobile_identity mi = { .type = GSM_MI_TYPE_IMSI, };
- OSMO_STRLCPY_ARRAY(mi.imsi, imsi);
+ uint8_t mi[GSM48_MID_MAX_SIZE];
+ int imsi_len = gsm48_generate_mid_from_imsi(mi, imsi);
if (!msg)
return -ENOMEM;
-
- msgb_tvl_put(msg, BSSGP_IE_IMSI, osmo_mobile_identity_encoded_len(&mi, NULL));
- if (osmo_mobile_identity_encode_msgb(msg, &mi, false) <= 0) {
- msgb_free(msg);
- return -EINVAL;
- }
+/* gsm48_generate_mid_from_imsi() is guaranteed to never return more than 11,
+ * but somehow gcc (8.2) is not smart enough to figure this out and claims that
+ * the memcpy in msgb_tvlv_put() below will cause and out-of-bounds access up to
+ * mi[131], which is wrong */
+#pragma GCC diagnostic push
+#pragma GCC diagnostic ignored "-Warray-bounds"
+ OSMO_ASSERT(imsi_len <= GSM48_MID_MAX_SIZE);
+ /* strip the MI type and length values (2 bytes) */
+ if (imsi_len > 2)
+ msgb_tvlv_put(msg, BSSGP_IE_IMSI, imsi_len-2, mi+2);
+#pragma GCC diagnostic pop
LOGPC(DBSSGP, LOGL_NOTICE, "IMSI=%s ", imsi);
return common_tx_radio_status2(msg, cause);
@@ -481,7 +486,6 @@ int bssgp_rx_paging(struct bssgp_paging_info *pinfo,
struct tlv_parsed tp;
uint8_t ra[6];
int rc, data_len;
- struct osmo_mobile_identity mi;
memset(ra, 0, sizeof(ra));
@@ -506,11 +510,9 @@ int bssgp_rx_paging(struct bssgp_paging_info *pinfo,
goto err_mand_ie;
if (!pinfo->imsi)
pinfo->imsi = talloc_zero_size(pinfo, GSM_IMSI_LENGTH);
- if (osmo_mobile_identity_decode(&mi, TLVP_VAL(&tp, BSSGP_IE_IMSI), TLVP_LEN(&tp, BSSGP_IE_IMSI), false))
- goto err_mand_ie;
- if (mi.type != GSM_MI_TYPE_IMSI)
- goto err_mand_ie;
- osmo_talloc_replace_string(pinfo, &pinfo->imsi, mi.imsi);
+ gsm48_mi_to_string(pinfo->imsi, GSM_IMSI_LENGTH,
+ TLVP_VAL(&tp, BSSGP_IE_IMSI),
+ TLVP_LEN(&tp, BSSGP_IE_IMSI));
/* DRX Parameters */
if (!TLVP_PRESENT(&tp, BSSGP_IE_DRX_PARAMS))