2020-04-26 19:36:05 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2019 by Sukchan Lee <acetcom@gmail.com>
|
|
|
|
*
|
|
|
|
* This file is part of Open5GS.
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "bearer-binding.h"
|
|
|
|
#include "s5c-build.h"
|
|
|
|
|
|
|
|
#include "ipfw/ipfw2.h"
|
|
|
|
|
|
|
|
static void timeout(ogs_gtp_xact_t *xact, void *data)
|
|
|
|
{
|
|
|
|
smf_sess_t *sess = data;
|
|
|
|
uint8_t type = 0;
|
|
|
|
|
|
|
|
ogs_assert(sess);
|
|
|
|
|
|
|
|
type = xact->seq[0].type;
|
|
|
|
|
|
|
|
ogs_debug("GTP Timeout : SGW_S5C_TEID[0x%x] SMF_N4_TEID[0x%x] "
|
|
|
|
"Message-Type[%d]", sess->sgw_s5c_teid, sess->smf_n4_teid, type);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void encode_traffic_flow_template(
|
|
|
|
ogs_gtp_tft_t *tft, smf_bearer_t *bearer)
|
|
|
|
{
|
|
|
|
int i, j, len;
|
|
|
|
smf_pf_t *pf = NULL;
|
|
|
|
|
|
|
|
ogs_assert(tft);
|
|
|
|
ogs_assert(bearer);
|
|
|
|
|
|
|
|
memset(tft, 0, sizeof(*tft));
|
|
|
|
tft->code = OGS_GTP_TFT_CODE_CREATE_NEW_TFT;
|
|
|
|
|
|
|
|
i = 0;
|
|
|
|
pf = smf_pf_first(bearer);
|
|
|
|
while (pf) {
|
|
|
|
tft->pf[i].direction = pf->direction;
|
|
|
|
tft->pf[i].identifier = pf->identifier - 1;
|
|
|
|
tft->pf[i].precedence = i+1;
|
|
|
|
|
|
|
|
j = 0, len = 0;
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pf->ipfw_rule.proto) {
|
2020-04-26 19:36:05 +00:00
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_PROTOCOL_IDENTIFIER_NEXT_HEADER_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
tft->pf[i].component[j].proto = pf->ipfw_rule.proto;
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 2;
|
|
|
|
}
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pf->ipfw_rule.ipv4_local) {
|
2020-04-26 19:36:05 +00:00
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_IPV4_LOCAL_ADDRESS_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
tft->pf[i].component[j].ipv4.addr = pf->ipfw_rule.ip.local.addr[0];
|
|
|
|
tft->pf[i].component[j].ipv4.mask = pf->ipfw_rule.ip.local.mask[0];
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 9;
|
|
|
|
}
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pf->ipfw_rule.ipv4_remote) {
|
2020-04-26 19:36:05 +00:00
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_IPV4_REMOTE_ADDRESS_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
tft->pf[i].component[j].ipv4.addr = pf->ipfw_rule.ip.remote.addr[0];
|
|
|
|
tft->pf[i].component[j].ipv4.mask = pf->ipfw_rule.ip.remote.mask[0];
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 9;
|
|
|
|
}
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pf->ipfw_rule.ipv6_local) {
|
2020-04-26 19:36:05 +00:00
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_IPV6_LOCAL_ADDRESS_PREFIX_LENGTH_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
memcpy(tft->pf[i].component[j].ipv6.addr,
|
|
|
|
pf->ipfw_rule.ip.local.addr,
|
|
|
|
sizeof pf->ipfw_rule.ip.local.addr);
|
2020-04-26 19:36:05 +00:00
|
|
|
tft->pf[i].component[j].ipv6.prefixlen =
|
2020-08-13 00:31:22 +00:00
|
|
|
contigmask((uint8_t *)pf->ipfw_rule.ip.local.mask, 128);
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 18;
|
|
|
|
}
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pf->ipfw_rule.ipv6_remote) {
|
2020-04-26 19:36:05 +00:00
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_IPV6_REMOTE_ADDRESS_PREFIX_LENGTH_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
memcpy(tft->pf[i].component[j].ipv6.addr,
|
|
|
|
pf->ipfw_rule.ip.remote.addr,
|
|
|
|
sizeof pf->ipfw_rule.ip.remote.addr);
|
2020-04-26 19:36:05 +00:00
|
|
|
tft->pf[i].component[j].ipv6.prefixlen =
|
2020-08-13 00:31:22 +00:00
|
|
|
contigmask((uint8_t *)pf->ipfw_rule.ip.remote.mask, 128);
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 18;
|
|
|
|
}
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pf->ipfw_rule.port.local.low) {
|
|
|
|
if (pf->ipfw_rule.port.local.low == pf->ipfw_rule.port.local.high)
|
2020-04-26 19:36:05 +00:00
|
|
|
{
|
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_SINGLE_LOCAL_PORT_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
tft->pf[i].component[j].port.low = pf->ipfw_rule.port.local.low;
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 3;
|
|
|
|
} else {
|
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_LOCAL_PORT_RANGE_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
tft->pf[i].component[j].port.low = pf->ipfw_rule.port.local.low;
|
|
|
|
tft->pf[i].component[j].port.high =
|
|
|
|
pf->ipfw_rule.port.local.high;
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 5;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pf->ipfw_rule.port.remote.low) {
|
|
|
|
if (pf->ipfw_rule.port.remote.low ==
|
|
|
|
pf->ipfw_rule.port.remote.high) {
|
2020-04-26 19:36:05 +00:00
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_SINGLE_REMOTE_PORT_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
tft->pf[i].component[j].port.low =
|
|
|
|
pf->ipfw_rule.port.remote.low;
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 3;
|
|
|
|
} else {
|
|
|
|
tft->pf[i].component[j].type =
|
|
|
|
GTP_PACKET_FILTER_REMOTE_PORT_RANGE_TYPE;
|
2020-08-13 00:31:22 +00:00
|
|
|
tft->pf[i].component[j].port.low =
|
|
|
|
pf->ipfw_rule.port.remote.low;
|
|
|
|
tft->pf[i].component[j].port.high =
|
|
|
|
pf->ipfw_rule.port.remote.high;
|
2020-04-26 19:36:05 +00:00
|
|
|
j++; len += 5;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
tft->pf[i].num_of_component = j;
|
|
|
|
tft->pf[i].length = len;
|
|
|
|
i++;
|
|
|
|
|
|
|
|
pf = smf_pf_next(pf);
|
|
|
|
}
|
|
|
|
tft->num_of_packet_filter = i;
|
|
|
|
}
|
|
|
|
|
|
|
|
void smf_bearer_binding(smf_sess_t *sess)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
int i, j;
|
|
|
|
|
|
|
|
ogs_assert(sess);
|
|
|
|
|
|
|
|
for (i = 0; i < sess->num_of_pcc_rule; i++) {
|
|
|
|
ogs_gtp_xact_t *xact = NULL;
|
|
|
|
ogs_gtp_header_t h;
|
|
|
|
ogs_pkbuf_t *pkbuf = NULL;
|
|
|
|
smf_bearer_t *bearer = NULL;
|
|
|
|
|
|
|
|
ogs_pcc_rule_t *pcc_rule = &sess->pcc_rule[i];
|
|
|
|
int bearer_created = 0;
|
|
|
|
int qos_presence = 0;
|
|
|
|
ogs_gtp_tft_t tft;
|
|
|
|
|
|
|
|
ogs_assert(pcc_rule);
|
|
|
|
if (pcc_rule->name == NULL) {
|
|
|
|
ogs_error("No PCC Rule Name");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pcc_rule->type == OGS_PCC_RULE_TYPE_INSTALL) {
|
|
|
|
ogs_pfcp_pdr_t *pdr = NULL;
|
|
|
|
|
|
|
|
bearer = smf_bearer_find_by_qci_arp(sess,
|
|
|
|
pcc_rule->qos.qci,
|
|
|
|
pcc_rule->qos.arp.priority_level,
|
|
|
|
pcc_rule->qos.arp.pre_emption_capability,
|
|
|
|
pcc_rule->qos.arp.pre_emption_vulnerability);
|
|
|
|
if (!bearer) {
|
|
|
|
if (pcc_rule->num_of_flow == 0) {
|
|
|
|
/* TFT is mandatory in
|
|
|
|
* activate dedicated EPS bearer context request */
|
|
|
|
ogs_error("No flow in PCC Rule");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
bearer = smf_bearer_add(sess);
|
|
|
|
ogs_assert(bearer);
|
|
|
|
|
|
|
|
/* Precedence is set to the order in which it was created */
|
|
|
|
ogs_list_for_each(&bearer->pfcp.pdr_list, pdr)
|
|
|
|
pdr->precedence = pdr->id;
|
|
|
|
|
|
|
|
bearer->name = ogs_strdup(pcc_rule->name);
|
|
|
|
ogs_assert(bearer->name);
|
|
|
|
|
|
|
|
memcpy(&bearer->qos, &pcc_rule->qos, sizeof(ogs_qos_t));
|
|
|
|
|
|
|
|
bearer_created = 1;
|
2020-08-13 00:31:22 +00:00
|
|
|
|
2020-04-26 19:36:05 +00:00
|
|
|
} else {
|
|
|
|
ogs_assert(strcmp(bearer->name, pcc_rule->name) == 0);
|
|
|
|
|
|
|
|
if (pcc_rule->num_of_flow) {
|
|
|
|
/* We'll use always 'Create new TFT'.
|
|
|
|
* Therefore, all previous flows are removed
|
|
|
|
* and replaced by the new flow */
|
|
|
|
smf_pf_remove_all(bearer);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((pcc_rule->qos.mbr.downlink &&
|
|
|
|
bearer->qos.mbr.downlink != pcc_rule->qos.mbr.downlink) ||
|
|
|
|
(pcc_rule->qos.mbr.uplink &&
|
|
|
|
bearer->qos.mbr.uplink != pcc_rule->qos.mbr.uplink) ||
|
|
|
|
(pcc_rule->qos.gbr.downlink &&
|
|
|
|
bearer->qos.gbr.downlink != pcc_rule->qos.gbr.downlink) ||
|
|
|
|
(pcc_rule->qos.gbr.uplink &&
|
|
|
|
bearer->qos.gbr.uplink != pcc_rule->qos.gbr.uplink)) {
|
|
|
|
/* Update QoS parameter */
|
|
|
|
memcpy(&bearer->qos, &pcc_rule->qos, sizeof(ogs_qos_t));
|
|
|
|
|
|
|
|
/* Update Bearer Request encodes updated QoS parameter */
|
|
|
|
qos_presence = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pcc_rule->num_of_flow == 0 && qos_presence == 0) {
|
|
|
|
ogs_warn("No need to send 'Update Bearer Request'");
|
|
|
|
ogs_warn(" - Both QoS and TFT are same as before");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
ogs_list_for_each(&bearer->pfcp.pdr_list, pdr)
|
|
|
|
pdr->num_of_flow = 0;
|
|
|
|
|
2020-04-26 19:36:05 +00:00
|
|
|
for (j = 0; j < pcc_rule->num_of_flow; j++) {
|
|
|
|
ogs_flow_t *flow = &pcc_rule->flow[j];
|
|
|
|
smf_pf_t *pf = NULL;
|
|
|
|
|
|
|
|
ogs_expect_or_return(flow);
|
|
|
|
ogs_expect_or_return(flow->description);
|
|
|
|
|
|
|
|
ogs_list_for_each(&bearer->pfcp.pdr_list, pdr) {
|
|
|
|
if (flow->direction == OGS_FLOW_DOWNLINK_ONLY) {
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pdr->src_if == OGS_PFCP_INTERFACE_CORE) {
|
2020-04-26 19:36:05 +00:00
|
|
|
pdr->flow_description[pdr->num_of_flow++] =
|
|
|
|
flow->description;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else if (flow->direction == OGS_FLOW_UPLINK_ONLY) {
|
2020-08-13 00:31:22 +00:00
|
|
|
if (pdr->src_if == OGS_PFCP_INTERFACE_ACCESS) {
|
2020-04-26 19:36:05 +00:00
|
|
|
pdr->flow_description[pdr->num_of_flow++] =
|
|
|
|
flow->description;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ogs_error("Flow Bidirectional is not supported[%d]",
|
|
|
|
flow->direction);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pf = smf_pf_add(bearer, pcc_rule->precedence);
|
2020-08-13 00:31:22 +00:00
|
|
|
ogs_assert(pf);
|
2020-04-26 19:36:05 +00:00
|
|
|
|
|
|
|
pf->direction = flow->direction;
|
2020-08-13 00:31:22 +00:00
|
|
|
pf->flow_description = ogs_strdup(flow->description);
|
|
|
|
rv = ogs_ipfw_compile_rule(
|
|
|
|
&pf->ipfw_rule, pf->flow_description);
|
|
|
|
if (rv != OGS_OK) {
|
|
|
|
ogs_error("Invalid Flow-Description[%s]",
|
|
|
|
pf->flow_description);
|
|
|
|
smf_pf_remove(pf);
|
|
|
|
break;
|
|
|
|
}
|
2020-04-26 19:36:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
memset(&tft, 0, sizeof tft);
|
|
|
|
if (pcc_rule->num_of_flow)
|
|
|
|
encode_traffic_flow_template(&tft, bearer);
|
|
|
|
|
|
|
|
memset(&h, 0, sizeof(ogs_gtp_header_t));
|
|
|
|
if (bearer_created == 1) {
|
|
|
|
h.type = OGS_GTP_CREATE_BEARER_REQUEST_TYPE;
|
|
|
|
h.teid = sess->sgw_s5c_teid;
|
|
|
|
|
|
|
|
/* TFT is mandatory in
|
|
|
|
* activate dedicated EPS bearer context request */
|
|
|
|
ogs_assert(pcc_rule->num_of_flow);
|
|
|
|
|
|
|
|
pkbuf = smf_s5c_build_create_bearer_request(
|
|
|
|
h.type, bearer, pcc_rule->num_of_flow ? &tft : NULL);
|
|
|
|
ogs_expect_or_return(pkbuf);
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
xact = ogs_gtp_xact_local_create(
|
|
|
|
sess->gnode, &h, pkbuf, timeout, sess);
|
|
|
|
ogs_expect_or_return(xact);
|
|
|
|
|
|
|
|
} else {
|
2020-04-26 19:36:05 +00:00
|
|
|
h.type = OGS_GTP_UPDATE_BEARER_REQUEST_TYPE;
|
|
|
|
h.teid = sess->sgw_s5c_teid;
|
|
|
|
|
|
|
|
pkbuf = smf_s5c_build_update_bearer_request(
|
|
|
|
h.type, bearer,
|
|
|
|
OGS_NAS_PROCEDURE_TRANSACTION_IDENTITY_UNASSIGNED,
|
|
|
|
pcc_rule->num_of_flow ? &tft : NULL, qos_presence);
|
|
|
|
ogs_expect_or_return(pkbuf);
|
|
|
|
|
2020-08-13 00:31:22 +00:00
|
|
|
xact = ogs_gtp_xact_local_create(
|
|
|
|
sess->gnode, &h, pkbuf, timeout, sess);
|
|
|
|
ogs_expect_or_return(xact);
|
|
|
|
|
|
|
|
if (pcc_rule->num_of_flow)
|
|
|
|
xact->update_flags |= OGS_GTP_MODIFY_TFT_UPDATE;
|
|
|
|
if (qos_presence)
|
|
|
|
xact->update_flags |= OGS_GTP_MODIFY_QOS_UPDATE;
|
|
|
|
}
|
2020-04-26 19:36:05 +00:00
|
|
|
|
|
|
|
rv = ogs_gtp_xact_commit(xact);
|
|
|
|
ogs_expect(rv == OGS_OK);
|
2020-08-13 00:31:22 +00:00
|
|
|
|
2020-04-26 19:36:05 +00:00
|
|
|
} else if (pcc_rule->type == OGS_PCC_RULE_TYPE_REMOVE) {
|
|
|
|
bearer = smf_bearer_find_by_name(sess, pcc_rule->name);
|
|
|
|
ogs_assert(bearer);
|
|
|
|
|
|
|
|
if (!bearer) {
|
|
|
|
ogs_warn("No need to send 'Delete Bearer Request'");
|
|
|
|
ogs_warn(" - Bearer[Name:%s] has already been removed.",
|
|
|
|
pcc_rule->name);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&h, 0, sizeof(ogs_gtp_header_t));
|
|
|
|
h.type = OGS_GTP_DELETE_BEARER_REQUEST_TYPE;
|
|
|
|
h.teid = sess->sgw_s5c_teid;
|
|
|
|
|
|
|
|
pkbuf = smf_s5c_build_delete_bearer_request(h.type, bearer,
|
|
|
|
OGS_NAS_PROCEDURE_TRANSACTION_IDENTITY_UNASSIGNED);
|
|
|
|
ogs_expect_or_return(pkbuf);
|
|
|
|
|
|
|
|
xact = ogs_gtp_xact_local_create(
|
|
|
|
sess->gnode, &h, pkbuf, timeout, sess);
|
|
|
|
ogs_expect_or_return(xact);
|
|
|
|
|
|
|
|
rv = ogs_gtp_xact_commit(xact);
|
|
|
|
ogs_expect(rv == OGS_OK);
|
|
|
|
} else {
|
|
|
|
ogs_error("Invalid Type[%d]", pcc_rule->type);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|