2017-02-13 04:19:53 +00:00
|
|
|
#define TRACE_MODULE _mme_sm
|
2017-02-13 00:58:55 +00:00
|
|
|
#include "core_debug.h"
|
|
|
|
|
2017-04-09 05:57:07 +00:00
|
|
|
#include "s1ap_message.h"
|
|
|
|
#include "nas_message.h"
|
|
|
|
|
2017-04-04 01:49:19 +00:00
|
|
|
#include "mme_event.h"
|
2017-03-26 06:34:34 +00:00
|
|
|
|
2017-02-13 05:17:26 +00:00
|
|
|
#include "s1ap_path.h"
|
2017-04-09 05:57:07 +00:00
|
|
|
#include "nas_security.h"
|
2017-04-04 01:49:19 +00:00
|
|
|
#include "mme_s11_path.h"
|
2017-04-12 12:44:18 +00:00
|
|
|
#include "mme_s11_handler.h"
|
2017-04-28 04:43:42 +00:00
|
|
|
#include "emm_handler.h"
|
2017-02-13 00:58:55 +00:00
|
|
|
|
2017-04-11 00:32:34 +00:00
|
|
|
void mme_state_initial(fsm_t *s, event_t *e)
|
2017-02-13 00:58:55 +00:00
|
|
|
{
|
2017-08-02 10:33:57 +00:00
|
|
|
mme_sm_trace(3, e);
|
2017-02-13 00:58:55 +00:00
|
|
|
|
|
|
|
d_assert(s, return, "Null param");
|
|
|
|
|
2017-02-13 01:20:32 +00:00
|
|
|
FSM_TRAN(s, &mme_state_operational);
|
2017-02-13 00:58:55 +00:00
|
|
|
}
|
|
|
|
|
2017-04-11 00:32:34 +00:00
|
|
|
void mme_state_final(fsm_t *s, event_t *e)
|
2017-02-13 00:58:55 +00:00
|
|
|
{
|
2017-08-02 10:33:57 +00:00
|
|
|
mme_sm_trace(3, e);
|
2017-02-13 00:58:55 +00:00
|
|
|
|
|
|
|
d_assert(s, return, "Null param");
|
|
|
|
}
|
|
|
|
|
2017-07-28 15:21:04 +00:00
|
|
|
int test = 0;
|
|
|
|
|
2017-04-11 00:32:34 +00:00
|
|
|
void mme_state_operational(fsm_t *s, event_t *e)
|
2017-02-13 00:58:55 +00:00
|
|
|
{
|
2017-02-13 04:19:53 +00:00
|
|
|
status_t rv;
|
2017-02-13 00:58:55 +00:00
|
|
|
char buf[INET_ADDRSTRLEN];
|
|
|
|
|
2017-08-02 10:33:57 +00:00
|
|
|
mme_sm_trace(3, e);
|
2017-02-13 00:58:55 +00:00
|
|
|
|
|
|
|
d_assert(s, return, "Null param");
|
|
|
|
|
|
|
|
switch (event_get(e))
|
|
|
|
{
|
|
|
|
case FSM_ENTRY_SIG:
|
|
|
|
{
|
2017-03-27 04:22:42 +00:00
|
|
|
rv = mme_s11_listen();
|
|
|
|
if (rv != CORE_OK)
|
2017-02-13 04:19:53 +00:00
|
|
|
{
|
2017-03-27 04:22:42 +00:00
|
|
|
d_error("Can't establish S11 path");
|
|
|
|
break;
|
2017-02-20 11:20:31 +00:00
|
|
|
}
|
2017-03-26 15:48:33 +00:00
|
|
|
|
2017-03-27 04:22:42 +00:00
|
|
|
rv = s1ap_listen();
|
2017-03-24 04:19:36 +00:00
|
|
|
if (rv != CORE_OK)
|
|
|
|
{
|
2017-03-26 15:48:33 +00:00
|
|
|
d_error("Can't establish S1AP path");
|
2017-03-24 04:19:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-02-13 00:58:55 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case FSM_EXIT_SIG:
|
|
|
|
{
|
2017-03-27 04:22:42 +00:00
|
|
|
rv = mme_s11_close();
|
|
|
|
if (rv != CORE_OK)
|
2017-02-13 04:19:53 +00:00
|
|
|
{
|
2017-03-27 04:22:42 +00:00
|
|
|
d_error("Can't close S11 path");
|
|
|
|
break;
|
2017-02-13 04:19:53 +00:00
|
|
|
}
|
2017-03-26 15:48:33 +00:00
|
|
|
|
|
|
|
rv = s1ap_close();
|
2017-03-24 04:19:36 +00:00
|
|
|
if (rv != CORE_OK)
|
|
|
|
{
|
2017-03-26 15:48:33 +00:00
|
|
|
d_error("Can't close S1AP path");
|
2017-03-24 04:19:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-03-26 15:48:33 +00:00
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
2017-04-13 10:32:56 +00:00
|
|
|
case MME_EVT_S1AP_ENB_LO_ACCEPT:
|
2017-02-13 04:38:57 +00:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
net_sock_t *sock = (net_sock_t *)event_get_param1(e);
|
|
|
|
d_assert(sock, break, "Null param");
|
|
|
|
|
|
|
|
d_trace(1, "eNB-S1 accepted[%s] in master_sm module\n",
|
|
|
|
INET_NTOP(&sock->remote.sin_addr.s_addr, buf));
|
|
|
|
|
2017-04-06 11:10:00 +00:00
|
|
|
mme_enb_t *enb = mme_enb_find_by_sock(sock);
|
2017-02-13 04:38:57 +00:00
|
|
|
if (!enb)
|
|
|
|
{
|
2017-03-06 08:55:50 +00:00
|
|
|
rc = net_register_sock(sock, _s1ap_recv_cb, NULL);
|
2017-02-13 05:17:26 +00:00
|
|
|
d_assert(rc == 0, break, "register _s1ap_recv_cb failed");
|
2017-02-13 04:38:57 +00:00
|
|
|
|
2017-04-08 01:45:48 +00:00
|
|
|
mme_enb_t *enb = mme_enb_add(sock);
|
2017-02-13 04:38:57 +00:00
|
|
|
d_assert(enb, break, "Null param");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
d_warn("eNB context duplicated with IP-address [%s]!!!",
|
2017-02-13 05:01:38 +00:00
|
|
|
INET_NTOP(&sock->remote.sin_addr.s_addr, buf));
|
2017-02-13 04:38:57 +00:00
|
|
|
net_close(sock);
|
|
|
|
d_warn("S1 Socket Closed");
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
2017-04-13 10:32:56 +00:00
|
|
|
case MME_EVT_S1AP_ENB_LO_CONNREFUSED:
|
2017-02-13 04:38:57 +00:00
|
|
|
{
|
2017-04-11 00:19:33 +00:00
|
|
|
index_t index = event_get_param1(e);
|
|
|
|
mme_enb_t *enb = NULL;
|
2017-04-09 05:57:07 +00:00
|
|
|
|
2017-04-11 00:19:33 +00:00
|
|
|
d_assert(index, break, "Null param");
|
|
|
|
enb = mme_enb_find(index);
|
|
|
|
if (enb)
|
2017-02-13 04:38:57 +00:00
|
|
|
{
|
2017-08-02 06:11:08 +00:00
|
|
|
d_trace(1, "eNB-S1[%x] connection refused!!!\n",
|
|
|
|
enb->enb_id);
|
2017-04-11 00:19:33 +00:00
|
|
|
mme_enb_remove(enb);
|
2017-02-13 04:38:57 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2017-04-11 00:19:33 +00:00
|
|
|
d_warn("Socket connection refused, Already Removed!");
|
2017-02-13 04:38:57 +00:00
|
|
|
}
|
2017-03-05 08:05:30 +00:00
|
|
|
|
2017-03-05 08:36:16 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-04-13 10:32:56 +00:00
|
|
|
case MME_EVT_S1AP_ENB_MSG:
|
2017-07-26 08:55:53 +00:00
|
|
|
case MME_EVT_S1AP_UE_FROM_EMM:
|
2017-07-25 12:15:25 +00:00
|
|
|
case MME_EVT_S1AP_UE_FROM_S11:
|
2017-04-09 05:57:07 +00:00
|
|
|
{
|
|
|
|
s1ap_message_t message;
|
2017-04-11 00:19:33 +00:00
|
|
|
index_t index = event_get_param1(e);
|
2017-04-09 05:57:07 +00:00
|
|
|
mme_enb_t *enb = NULL;
|
2017-04-13 02:08:42 +00:00
|
|
|
pkbuf_t *pkbuf = NULL;
|
|
|
|
|
|
|
|
d_assert(index, break, "Null param");
|
|
|
|
d_assert(enb = mme_enb_find(index), break, "No eNB context");
|
|
|
|
d_assert(FSM_STATE(&enb->sm), break, "No S1AP State Machine");
|
2017-04-09 05:57:07 +00:00
|
|
|
|
2017-07-25 12:15:25 +00:00
|
|
|
if (event_get(e) == MME_EVT_S1AP_ENB_MSG)
|
|
|
|
{
|
|
|
|
pkbuf = (pkbuf_t *)event_get_param2(e);
|
|
|
|
d_assert(pkbuf, break, "Null param");
|
|
|
|
d_assert(s1ap_decode_pdu(&message, pkbuf) == CORE_OK,
|
|
|
|
pkbuf_free(pkbuf); break, "Can't decode S1AP_PDU");
|
|
|
|
event_set_param3(e, (c_uintptr_t)&message);
|
|
|
|
}
|
2017-04-09 05:57:07 +00:00
|
|
|
|
2017-04-11 00:32:34 +00:00
|
|
|
fsm_dispatch(&enb->sm, (fsm_event_t*)e);
|
2017-04-09 05:57:07 +00:00
|
|
|
|
2017-07-25 12:15:25 +00:00
|
|
|
if (event_get(e) == MME_EVT_S1AP_ENB_MSG)
|
|
|
|
{
|
|
|
|
s1ap_free_pdu(&message);
|
|
|
|
pkbuf_free(pkbuf);
|
|
|
|
}
|
2017-04-09 05:57:07 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-04-13 10:32:56 +00:00
|
|
|
case MME_EVT_EMM_UE_MSG:
|
2017-04-28 04:43:42 +00:00
|
|
|
{
|
|
|
|
nas_message_t message;
|
|
|
|
index_t index = event_get_param1(e);
|
2017-07-28 14:20:09 +00:00
|
|
|
pkbuf_t *pkbuf = (pkbuf_t *)event_get_param3(e);
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-28 04:43:42 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = enb_ue_find(index);
|
|
|
|
d_assert(enb_ue, break, "No ENB UE context");
|
2017-04-28 04:43:42 +00:00
|
|
|
|
|
|
|
d_assert(pkbuf, break, "Null param");
|
|
|
|
d_assert(nas_emm_decode(&message, pkbuf) == CORE_OK,
|
|
|
|
pkbuf_free(pkbuf); break, "Can't decode NAS_EMM");
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue = enb_ue->mme_ue;
|
2017-07-23 07:26:40 +00:00
|
|
|
if (!mme_ue)
|
2017-04-28 04:43:42 +00:00
|
|
|
{
|
2017-07-28 05:06:40 +00:00
|
|
|
mme_ue = mme_ue_find_by_message(&message);
|
2017-07-23 07:26:40 +00:00
|
|
|
if (!mme_ue)
|
|
|
|
{
|
|
|
|
mme_ue = mme_ue_add(enb_ue);
|
|
|
|
d_assert(mme_ue, break, "Null param");
|
|
|
|
}
|
2017-07-28 15:21:04 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Here, if the MME_UE Context is found,
|
|
|
|
* the integrity check is not performed
|
|
|
|
* For example, ATTACH_REQUEST,
|
|
|
|
* TRACKING_AREA_UPDATE_REQUEST message
|
|
|
|
*
|
|
|
|
* Now, We will check the MAC in the NAS message*/
|
|
|
|
nas_security_header_type_t h;
|
|
|
|
h.type = (c_uint8_t)event_get_param2(e);
|
|
|
|
if (h.integrity_protected)
|
|
|
|
{
|
|
|
|
/* Decryption was performed in S1AP handler.
|
|
|
|
* So, we disabled 'ciphered'
|
|
|
|
* not to decrypt NAS message */
|
|
|
|
h.ciphered = 0;
|
|
|
|
d_assert(
|
|
|
|
nas_security_decode(mme_ue, h, pkbuf) == CORE_OK,
|
|
|
|
pkbuf_free(pkbuf);return,
|
|
|
|
"nas_security_decode failed");
|
|
|
|
}
|
|
|
|
}
|
2017-07-29 00:44:13 +00:00
|
|
|
/* Set mme_ue */
|
|
|
|
mme_associate_ue_context(mme_ue, enb_ue);
|
2017-04-28 04:43:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
d_assert(mme_ue, pkbuf_free(pkbuf);break, "No MME UE context");
|
|
|
|
d_assert(FSM_STATE(&mme_ue->sm), pkbuf_free(pkbuf);break,
|
|
|
|
"No EMM State Machine");
|
|
|
|
|
|
|
|
/* Set event */
|
|
|
|
event_set_param1(e, (c_uintptr_t)mme_ue->index);/* mme_ue index */
|
2017-07-28 14:20:09 +00:00
|
|
|
event_set_param4(e, (c_uintptr_t)&message);
|
2017-04-28 04:43:42 +00:00
|
|
|
|
|
|
|
fsm_dispatch(&mme_ue->sm, (fsm_event_t*)e);
|
|
|
|
|
|
|
|
pkbuf_free(pkbuf);
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
2017-04-14 01:04:41 +00:00
|
|
|
case MME_EVT_EMM_UE_FROM_S6A:
|
2017-04-14 01:11:38 +00:00
|
|
|
case MME_EVT_EMM_UE_FROM_S11:
|
2017-04-14 01:04:41 +00:00
|
|
|
case MME_EVT_EMM_BEARER_FROM_S11:
|
2017-08-07 22:58:13 +00:00
|
|
|
case MME_EVT_EMM_UE_T3413:
|
2017-03-05 08:36:16 +00:00
|
|
|
{
|
2017-04-10 14:59:59 +00:00
|
|
|
index_t index = event_get_param1(e);
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-04-13 10:15:53 +00:00
|
|
|
mme_bearer_t *bearer = NULL;
|
2017-04-09 05:57:07 +00:00
|
|
|
|
2017-04-14 01:04:41 +00:00
|
|
|
if (event_get(e) == MME_EVT_EMM_BEARER_FROM_S11)
|
2017-04-13 02:08:42 +00:00
|
|
|
{
|
|
|
|
d_assert(index, break, "Null param");
|
2017-04-13 10:15:53 +00:00
|
|
|
bearer = mme_bearer_find(index);
|
|
|
|
d_assert(bearer, break, "No ESM context");
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue = bearer->mme_ue;
|
2017-04-13 02:08:42 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
d_assert(index, break, "Null param");
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue = mme_ue_find(index);
|
2017-04-13 02:08:42 +00:00
|
|
|
}
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue, break, "No UE context");
|
|
|
|
d_assert(FSM_STATE(&mme_ue->sm), break, "No EMM State Machine");
|
2017-04-09 05:57:07 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
fsm_dispatch(&mme_ue->sm, (fsm_event_t*)e);
|
2017-03-05 08:36:16 +00:00
|
|
|
|
2017-02-13 04:38:57 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-04-14 01:27:31 +00:00
|
|
|
case MME_EVT_ESM_BEARER_TO_S11:
|
2017-04-13 10:32:56 +00:00
|
|
|
case MME_EVT_ESM_BEARER_MSG:
|
2017-04-11 03:16:07 +00:00
|
|
|
{
|
2017-04-13 02:08:42 +00:00
|
|
|
nas_message_t message;
|
2017-04-11 03:16:07 +00:00
|
|
|
index_t index = event_get_param1(e);
|
2017-04-13 10:15:53 +00:00
|
|
|
mme_bearer_t *bearer = NULL;
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-04-13 02:08:42 +00:00
|
|
|
pkbuf_t *pkbuf = NULL;
|
2017-04-11 03:16:07 +00:00
|
|
|
|
|
|
|
d_assert(index, break, "Null param");
|
2017-04-13 10:15:53 +00:00
|
|
|
bearer = mme_bearer_find(index);
|
|
|
|
d_assert(bearer, break, "No ESM context");
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue = bearer->mme_ue, break, "No UE context");
|
2017-04-13 10:15:53 +00:00
|
|
|
d_assert(FSM_STATE(&bearer->sm), break, "No ESM State Machine");
|
2017-04-11 03:16:07 +00:00
|
|
|
|
2017-04-13 10:32:56 +00:00
|
|
|
if (event_get(e) == MME_EVT_ESM_BEARER_MSG)
|
2017-04-13 02:08:42 +00:00
|
|
|
{
|
2017-07-28 14:20:09 +00:00
|
|
|
pkbuf = (pkbuf_t *)event_get_param3(e);
|
2017-04-13 02:08:42 +00:00
|
|
|
d_assert(pkbuf, break, "Null param");
|
|
|
|
d_assert(nas_esm_decode(&message, pkbuf) == CORE_OK,
|
|
|
|
pkbuf_free(pkbuf); break, "Can't decode NAS_ESM");
|
2017-04-09 05:57:07 +00:00
|
|
|
|
2017-07-28 14:20:09 +00:00
|
|
|
event_set_param4(e, (c_uintptr_t)&message);
|
2017-04-13 02:08:42 +00:00
|
|
|
}
|
2017-04-09 05:57:07 +00:00
|
|
|
|
2017-04-13 10:15:53 +00:00
|
|
|
fsm_dispatch(&bearer->sm, (fsm_event_t*)e);
|
2017-03-27 10:32:24 +00:00
|
|
|
|
2017-04-13 10:32:56 +00:00
|
|
|
if (event_get(e) == MME_EVT_ESM_BEARER_MSG)
|
2017-04-13 02:08:42 +00:00
|
|
|
{
|
|
|
|
pkbuf_free(pkbuf);
|
|
|
|
}
|
|
|
|
|
2017-03-27 10:32:24 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-04-13 10:32:56 +00:00
|
|
|
case MME_EVT_S11_UE_MSG:
|
2017-03-24 04:19:36 +00:00
|
|
|
{
|
2017-04-03 13:46:19 +00:00
|
|
|
status_t rv;
|
2017-04-03 06:27:00 +00:00
|
|
|
net_sock_t *sock = (net_sock_t *)event_get_param1(e);
|
|
|
|
gtp_node_t *gnode = (gtp_node_t *)event_get_param2(e);
|
|
|
|
pkbuf_t *pkbuf = (pkbuf_t *)event_get_param3(e);
|
|
|
|
gtp_xact_t *xact = NULL;
|
2017-04-03 13:09:48 +00:00
|
|
|
c_uint8_t type;
|
2017-04-06 03:13:38 +00:00
|
|
|
c_uint32_t teid;
|
2017-04-03 06:27:00 +00:00
|
|
|
gtp_message_t gtp_message;
|
2017-04-27 14:06:10 +00:00
|
|
|
mme_sess_t *sess = NULL;
|
2017-04-03 06:27:00 +00:00
|
|
|
|
|
|
|
d_assert(pkbuf, break, "Null param");
|
2017-04-03 11:50:20 +00:00
|
|
|
d_assert(sock, pkbuf_free(pkbuf); break, "Null param");
|
|
|
|
d_assert(gnode, pkbuf_free(pkbuf); break, "Null param");
|
2017-04-03 06:27:00 +00:00
|
|
|
|
2017-04-06 03:13:38 +00:00
|
|
|
rv = gtp_xact_receive(
|
|
|
|
&mme_self()->gtp_xact_ctx, sock, gnode,
|
|
|
|
&xact, &type, &teid, >p_message, pkbuf);
|
|
|
|
if (rv != CORE_OK)
|
2017-04-03 13:46:19 +00:00
|
|
|
break;
|
|
|
|
|
2017-04-27 14:06:10 +00:00
|
|
|
sess = mme_sess_find_by_teid(teid);
|
|
|
|
d_assert(sess, pkbuf_free(pkbuf); break,
|
2017-04-11 10:14:18 +00:00
|
|
|
"No Session Context(TEID:%d)", teid);
|
2017-04-03 13:46:19 +00:00
|
|
|
switch(type)
|
2017-04-03 06:27:00 +00:00
|
|
|
{
|
2017-04-03 13:46:19 +00:00
|
|
|
case GTP_CREATE_SESSION_RESPONSE_TYPE:
|
2017-04-12 12:44:18 +00:00
|
|
|
mme_s11_handle_create_session_response(
|
2017-04-27 14:06:10 +00:00
|
|
|
sess, >p_message.create_session_response);
|
2017-04-03 13:46:19 +00:00
|
|
|
break;
|
2017-04-13 16:26:50 +00:00
|
|
|
case GTP_MODIFY_BEARER_RESPONSE_TYPE:
|
|
|
|
mme_s11_handle_modify_bearer_response(
|
2017-04-27 14:06:10 +00:00
|
|
|
sess, >p_message.modify_bearer_response);
|
2017-04-13 16:26:50 +00:00
|
|
|
break;
|
2017-04-28 02:20:09 +00:00
|
|
|
case GTP_DELETE_SESSION_RESPONSE_TYPE:
|
|
|
|
mme_s11_handle_delete_session_response(
|
2017-04-28 04:46:16 +00:00
|
|
|
sess, >p_message.delete_session_response);
|
2017-04-28 02:20:09 +00:00
|
|
|
break;
|
2017-07-25 12:15:25 +00:00
|
|
|
case GTP_RELEASE_ACCESS_BEARERS_RESPONSE_TYPE:
|
|
|
|
mme_s11_handle_release_access_bearers_response(
|
|
|
|
sess, >p_message.release_access_bearers_response);
|
|
|
|
break;
|
2017-08-02 23:18:19 +00:00
|
|
|
|
|
|
|
case GTP_DOWNLINK_DATA_NOTIFICATION_TYPE:
|
|
|
|
mme_s11_handle_downlink_data_notification(
|
2017-08-03 00:32:50 +00:00
|
|
|
xact,
|
2017-08-02 23:18:19 +00:00
|
|
|
sess, >p_message.downlink_data_notification);
|
|
|
|
break;
|
2017-04-03 13:46:19 +00:00
|
|
|
default:
|
|
|
|
d_warn("Not implmeneted(type:%d)", type);
|
|
|
|
break;
|
2017-04-03 06:27:00 +00:00
|
|
|
}
|
2017-04-03 13:46:19 +00:00
|
|
|
pkbuf_free(pkbuf);
|
2017-04-03 06:27:00 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-04-13 10:32:56 +00:00
|
|
|
case MME_EVT_S11_TRANSACTION_T3:
|
2017-04-03 06:27:00 +00:00
|
|
|
{
|
2017-04-10 14:59:59 +00:00
|
|
|
gtp_xact_timeout(event_get_param1(e));
|
2017-03-24 04:19:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-02-13 00:58:55 +00:00
|
|
|
default:
|
|
|
|
{
|
2017-03-24 09:47:05 +00:00
|
|
|
d_error("No handler for event %s", mme_event_get_name(e));
|
2017-02-13 00:58:55 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|