2019-06-01 09:52:38 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2019 by Sukchan Lee <acetcom@gmail.com>
|
|
|
|
*
|
|
|
|
* This file is part of Open5GS.
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2019-06-01 09:19:00 +00:00
|
|
|
#include "ogs-sctp.h"
|
|
|
|
|
2019-06-11 13:10:47 +00:00
|
|
|
#include "mme-event.h"
|
2017-03-26 06:34:34 +00:00
|
|
|
|
2019-06-11 13:10:47 +00:00
|
|
|
#include "nas-security.h"
|
|
|
|
#include "nas-path.h"
|
2017-09-10 14:03:24 +00:00
|
|
|
|
2019-06-11 13:10:47 +00:00
|
|
|
#include "s1ap-conv.h"
|
|
|
|
#include "s1ap-build.h"
|
2019-06-01 09:52:38 +00:00
|
|
|
#include "s1ap-path.h"
|
2017-02-13 04:19:53 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_open(void)
|
2017-11-24 16:08:26 +00:00
|
|
|
{
|
2019-06-01 09:43:33 +00:00
|
|
|
ogs_socknode_t *node = NULL;
|
|
|
|
|
2019-06-15 07:54:49 +00:00
|
|
|
ogs_list_for_each(&mme_self()->s1ap_list, node)
|
2019-06-01 09:43:33 +00:00
|
|
|
s1ap_server(node);
|
2017-12-08 05:29:35 +00:00
|
|
|
|
2019-06-15 07:54:49 +00:00
|
|
|
ogs_list_for_each(&mme_self()->s1ap_list6, node)
|
2019-06-01 09:43:33 +00:00
|
|
|
s1ap_server(node);
|
2017-12-08 05:29:35 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
return OGS_OK;
|
2017-12-08 05:29:35 +00:00
|
|
|
}
|
|
|
|
|
2019-05-31 12:05:35 +00:00
|
|
|
void s1ap_close()
|
2017-12-08 05:29:35 +00:00
|
|
|
{
|
2019-05-31 12:05:35 +00:00
|
|
|
ogs_socknode_remove_all(&mme_self()->s1ap_list);
|
|
|
|
ogs_socknode_remove_all(&mme_self()->s1ap_list6);
|
2017-12-08 05:29:35 +00:00
|
|
|
}
|
|
|
|
|
2019-06-01 09:19:00 +00:00
|
|
|
int s1ap_send(ogs_sock_t *sock, ogs_pkbuf_t *pkbuf,
|
|
|
|
ogs_sockaddr_t *addr, uint16_t stream_no)
|
|
|
|
{
|
|
|
|
int sent;
|
|
|
|
|
|
|
|
ogs_assert(sock);
|
|
|
|
ogs_assert(pkbuf);
|
|
|
|
|
|
|
|
sent = ogs_sctp_sendmsg(sock, pkbuf->data, pkbuf->len,
|
|
|
|
addr, SCTP_S1AP_PPID, stream_no);
|
|
|
|
if (sent < 0 || sent != pkbuf->len) {
|
|
|
|
ogs_error("ogs_sctp_sendmsg error (%d:%s)", errno, strerror(errno));
|
|
|
|
return OGS_ERROR;
|
|
|
|
}
|
|
|
|
ogs_pkbuf_free(pkbuf);
|
|
|
|
|
|
|
|
return OGS_OK;
|
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_to_enb(mme_enb_t *enb, ogs_pkbuf_t *pkbuf, uint16_t stream_no)
|
2017-02-13 04:19:53 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
char buf[OGS_ADDRSTRLEN];
|
|
|
|
int rv;
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb);
|
|
|
|
ogs_assert(pkbuf);
|
|
|
|
ogs_assert(enb->sock);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_debug(" IP[%s] ENB_ID[%d]",
|
|
|
|
OGS_ADDR(enb->addr, buf), enb->enb_id);
|
2017-02-13 04:19:53 +00:00
|
|
|
|
2017-11-24 10:03:48 +00:00
|
|
|
rv = s1ap_send(enb->sock, pkbuf,
|
2018-05-13 09:02:24 +00:00
|
|
|
enb->sock_type == SOCK_STREAM ? NULL : enb->addr,
|
|
|
|
stream_no);
|
2019-06-01 09:52:38 +00:00
|
|
|
if (rv != OGS_OK) {
|
2019-06-23 04:39:44 +00:00
|
|
|
ogs_error("s1ap_send() failed");
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_pkbuf_free(pkbuf);
|
2019-06-23 04:39:44 +00:00
|
|
|
s1ap_event_push(MME_EVT_S1AP_LO_CONNREFUSED,
|
|
|
|
enb->sock, enb->addr, NULL, 0, 0);
|
2017-03-26 16:50:01 +00:00
|
|
|
}
|
2017-03-07 05:47:17 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
return OGS_OK;;
|
2017-02-13 04:19:53 +00:00
|
|
|
}
|
2017-09-07 06:56:31 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_to_enb_ue(enb_ue_t *enb_ue, ogs_pkbuf_t *pkbuf)
|
2017-09-18 10:30:03 +00:00
|
|
|
{
|
2018-05-13 09:02:24 +00:00
|
|
|
mme_enb_t *enb = NULL;
|
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-09-18 10:30:03 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb_ue);
|
2018-05-13 09:02:24 +00:00
|
|
|
enb = enb_ue->enb;
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb);
|
2018-05-13 09:02:24 +00:00
|
|
|
mme_ue = enb_ue->mme_ue;
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(mme_ue);
|
2018-05-13 09:02:24 +00:00
|
|
|
|
2019-06-28 09:11:16 +00:00
|
|
|
return s1ap_send_to_enb(enb, pkbuf, enb_ue->enb_ostream_id);
|
2018-05-13 09:02:24 +00:00
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_delayed_send_to_enb_ue(
|
|
|
|
enb_ue_t *enb_ue, ogs_pkbuf_t *pkbuf, ogs_time_t duration)
|
2018-05-13 09:02:24 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb_ue);
|
|
|
|
ogs_assert(pkbuf);
|
2017-09-18 10:30:03 +00:00
|
|
|
|
2019-06-01 09:52:38 +00:00
|
|
|
if (duration) {
|
2019-04-27 14:54:30 +00:00
|
|
|
mme_event_t *e = NULL;
|
2017-09-18 10:30:03 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
e = mme_event_new(MME_EVT_S1AP_DELAYED_SEND);
|
|
|
|
ogs_assert(e);
|
|
|
|
e->timer = ogs_timer_add(mme_self()->timer_mgr, mme_event_timeout, e);
|
|
|
|
ogs_assert(e->timer);
|
|
|
|
e->pkbuf = pkbuf;
|
|
|
|
e->enb_ue = enb_ue;
|
2017-09-18 10:30:03 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_timer_start(e->timer, duration);
|
2017-09-18 10:30:03 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
return OGS_OK;
|
2019-06-01 09:52:38 +00:00
|
|
|
} else {
|
2018-05-13 09:02:24 +00:00
|
|
|
mme_enb_t *enb = NULL;
|
|
|
|
enb = enb_ue->enb;
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb);
|
2018-05-13 09:02:24 +00:00
|
|
|
return s1ap_send_to_enb_ue(enb_ue, pkbuf);
|
2017-09-18 10:30:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_to_esm(mme_ue_t *mme_ue, ogs_pkbuf_t *esmbuf)
|
2017-09-07 06:56:31 +00:00
|
|
|
{
|
2019-05-06 14:13:26 +00:00
|
|
|
int rv;
|
2019-04-27 14:54:30 +00:00
|
|
|
mme_event_t *e = NULL;
|
2017-09-07 06:56:31 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(mme_ue);
|
|
|
|
ogs_assert(esmbuf);
|
2017-09-07 06:56:31 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
e = mme_event_new(MME_EVT_ESM_MESSAGE);
|
|
|
|
ogs_assert(e);
|
|
|
|
e->mme_ue = mme_ue;
|
|
|
|
e->pkbuf = esmbuf;
|
2019-05-06 14:13:26 +00:00
|
|
|
rv = ogs_queue_push(mme_self()->queue, e);
|
|
|
|
if (rv != OGS_OK) {
|
|
|
|
ogs_warn("ogs_queue_push() failed:%d", (int)rv);
|
|
|
|
ogs_pkbuf_free(e->pkbuf);
|
|
|
|
mme_event_free(e);
|
|
|
|
}
|
2017-09-07 06:56:31 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
return OGS_OK;
|
2017-09-07 06:56:31 +00:00
|
|
|
}
|
2018-05-13 09:02:24 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_to_nas(enb_ue_t *enb_ue,
|
2018-03-05 14:01:07 +00:00
|
|
|
S1AP_ProcedureCode_t procedureCode, S1AP_NAS_PDU_t *nasPdu)
|
2017-09-07 06:56:31 +00:00
|
|
|
{
|
|
|
|
nas_security_header_t *sh = NULL;
|
|
|
|
nas_security_header_type_t security_header_type;
|
|
|
|
|
|
|
|
nas_emm_header_t *h = NULL;
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_pkbuf_t *nasbuf = NULL;
|
|
|
|
mme_event_t *e = NULL;
|
2017-09-07 06:56:31 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb_ue);
|
|
|
|
ogs_assert(nasPdu);
|
2017-09-07 06:56:31 +00:00
|
|
|
|
|
|
|
/* The Packet Buffer(pkbuf_t) for NAS message MUST make a HEADROOM.
|
|
|
|
* When calculating AES_CMAC, we need to use the headroom of the packet. */
|
2019-04-27 14:54:30 +00:00
|
|
|
nasbuf = ogs_pkbuf_alloc(NULL, NAS_HEADROOM+nasPdu->size);
|
|
|
|
ogs_pkbuf_reserve(nasbuf, NAS_HEADROOM);
|
|
|
|
ogs_pkbuf_put_data(nasbuf, nasPdu->buf, nasPdu->size);
|
2017-09-07 06:56:31 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
sh = nasbuf->data;
|
|
|
|
ogs_assert(sh);
|
2017-09-07 06:56:31 +00:00
|
|
|
|
|
|
|
memset(&security_header_type, 0, sizeof(nas_security_header_type_t));
|
2019-06-01 09:52:38 +00:00
|
|
|
switch(sh->security_header_type) {
|
|
|
|
case NAS_SECURITY_HEADER_PLAIN_NAS_MESSAGE:
|
|
|
|
break;
|
|
|
|
case NAS_SECURITY_HEADER_FOR_SERVICE_REQUEST_MESSAGE:
|
|
|
|
security_header_type.service_request = 1;
|
|
|
|
break;
|
|
|
|
case NAS_SECURITY_HEADER_INTEGRITY_PROTECTED:
|
|
|
|
security_header_type.integrity_protected = 1;
|
|
|
|
ogs_assert(ogs_pkbuf_pull(nasbuf, 6));
|
|
|
|
break;
|
|
|
|
case NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHERED:
|
|
|
|
security_header_type.integrity_protected = 1;
|
|
|
|
security_header_type.ciphered = 1;
|
|
|
|
ogs_assert(ogs_pkbuf_pull(nasbuf, 6));
|
|
|
|
break;
|
|
|
|
case NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_NEW_SECURITY_CONTEXT:
|
|
|
|
security_header_type.integrity_protected = 1;
|
|
|
|
security_header_type.new_security_context = 1;
|
|
|
|
ogs_assert(ogs_pkbuf_pull(nasbuf, 6));
|
|
|
|
break;
|
|
|
|
case NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHTERD_WITH_NEW_INTEGRITY_CONTEXT:
|
|
|
|
security_header_type.integrity_protected = 1;
|
|
|
|
security_header_type.ciphered = 1;
|
|
|
|
security_header_type.new_security_context = 1;
|
|
|
|
ogs_assert(ogs_pkbuf_pull(nasbuf, 6));
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ogs_error("Not implemented(securiry header type:0x%x)",
|
|
|
|
sh->security_header_type);
|
|
|
|
return OGS_ERROR;
|
2017-09-07 06:56:31 +00:00
|
|
|
}
|
|
|
|
|
2019-06-01 09:52:38 +00:00
|
|
|
if (enb_ue->mme_ue) {
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(nas_security_decode(
|
|
|
|
enb_ue->mme_ue, security_header_type, nasbuf) == OGS_OK);
|
2017-09-07 06:56:31 +00:00
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
h = nasbuf->data;
|
|
|
|
ogs_assert(h);
|
2019-06-01 09:52:38 +00:00
|
|
|
if (h->protocol_discriminator == NAS_PROTOCOL_DISCRIMINATOR_EMM) {
|
2019-05-06 14:13:26 +00:00
|
|
|
int rv;
|
2019-04-27 14:54:30 +00:00
|
|
|
e = mme_event_new(MME_EVT_EMM_MESSAGE);
|
|
|
|
ogs_assert(e);
|
|
|
|
e->enb_ue = enb_ue;
|
|
|
|
e->s1ap_code = procedureCode;
|
|
|
|
e->nas_type = security_header_type.type;
|
|
|
|
e->pkbuf = nasbuf;
|
2019-05-06 14:13:26 +00:00
|
|
|
rv = ogs_queue_push(mme_self()->queue, e);
|
|
|
|
if (rv != OGS_OK) {
|
|
|
|
ogs_warn("ogs_queue_push() failed:%d", (int)rv);
|
|
|
|
ogs_pkbuf_free(e->pkbuf);
|
|
|
|
mme_event_free(e);
|
|
|
|
}
|
2019-06-01 09:52:38 +00:00
|
|
|
} else if (h->protocol_discriminator == NAS_PROTOCOL_DISCRIMINATOR_ESM) {
|
2017-09-07 06:56:31 +00:00
|
|
|
mme_ue_t *mme_ue = enb_ue->mme_ue;
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(mme_ue);
|
2017-09-07 06:56:31 +00:00
|
|
|
s1ap_send_to_esm(mme_ue, nasbuf);
|
2019-06-01 09:52:38 +00:00
|
|
|
} else
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert_if_reached();
|
2017-09-07 06:56:31 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
return OGS_OK;
|
2017-09-07 06:56:31 +00:00
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_initial_context_setup_request(mme_ue_t *mme_ue)
|
2017-09-10 14:03:24 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2017-09-10 14:03:24 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(mme_ue);
|
2017-09-10 14:03:24 +00:00
|
|
|
|
2017-09-11 05:01:11 +00:00
|
|
|
rv = s1ap_build_initial_context_setup_request(&s1apbuf, mme_ue, NULL);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2017-09-10 14:03:24 +00:00
|
|
|
|
|
|
|
rv = nas_send_to_enb(mme_ue, s1apbuf);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2017-09-10 14:03:24 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
return OGS_OK;
|
2017-09-10 14:03:24 +00:00
|
|
|
}
|
2017-09-07 06:56:31 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_ue_context_release_command(
|
2018-03-05 14:01:07 +00:00
|
|
|
enb_ue_t *enb_ue, S1AP_Cause_PR group, long cause,
|
2019-04-27 14:54:30 +00:00
|
|
|
uint8_t action, uint32_t delay)
|
2017-09-08 07:46:37 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2017-09-08 07:46:37 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(action != S1AP_UE_CTX_REL_INVALID_ACTION);
|
2018-01-11 13:12:48 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb_ue);
|
2018-01-11 13:12:48 +00:00
|
|
|
enb_ue->ue_ctx_rel_action = action;
|
2017-09-08 07:46:37 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_debug("[MME] UE Context release command");
|
|
|
|
ogs_debug(" ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_debug(" Group[%d] Cause[%d] Action[%d] Delay[%d]",
|
|
|
|
group, (int)cause, action, delay);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2018-01-21 11:31:28 +00:00
|
|
|
rv = s1ap_build_ue_context_release_command(&s1apbuf, enb_ue, group, cause);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2017-09-08 07:46:37 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_delayed_send_to_enb_ue(enb_ue, s1apbuf, delay);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
return OGS_OK;
|
2017-09-08 07:46:37 +00:00
|
|
|
}
|
2017-09-11 12:14:55 +00:00
|
|
|
|
2019-07-08 09:15:19 +00:00
|
|
|
void s1ap_send_paging(mme_ue_t *mme_ue, S1AP_CNDomain_t cn_domain)
|
|
|
|
{
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
|
|
|
ogs_hash_index_t *hi = NULL;
|
|
|
|
mme_enb_t *enb = NULL;
|
|
|
|
int i;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
/* Find enB with matched TAI */
|
|
|
|
for (hi = mme_enb_first(); hi; hi = mme_enb_next(hi)) {
|
|
|
|
|
|
|
|
enb = mme_enb_this(hi);
|
|
|
|
for (i = 0; i < enb->num_of_supported_ta_list; i++) {
|
|
|
|
|
|
|
|
if (memcmp(&enb->supported_ta_list[i], &mme_ue->tai,
|
|
|
|
sizeof(tai_t)) == 0) {
|
|
|
|
|
|
|
|
/* Build S1AP Paging message */
|
|
|
|
rv = s1ap_build_paging(&s1apbuf, mme_ue, cn_domain);
|
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
|
|
|
|
|
|
|
/* Save it for later use */
|
|
|
|
ogs_assert(mme_ue->last_paging_msg == NULL);
|
|
|
|
mme_ue->last_paging_msg = ogs_pkbuf_copy(s1apbuf);
|
|
|
|
|
|
|
|
/* Send to enb */
|
|
|
|
rv = s1ap_send_to_enb(enb, s1apbuf, S1AP_NON_UE_SIGNALLING);
|
|
|
|
ogs_assert(rv == OGS_OK);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Start T3413 */
|
|
|
|
ogs_timer_start(mme_ue->t3413, mme_self()->t3413_value);
|
|
|
|
}
|
|
|
|
|
|
|
|
void s1ap_t3413_timeout(void *data)
|
|
|
|
{
|
|
|
|
mme_ue_t *mme_ue = data;
|
|
|
|
ogs_assert(mme_ue);
|
|
|
|
|
|
|
|
if (mme_ue->max_paging_retry < MAX_NUM_OF_PAGING) {
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
|
|
|
ogs_hash_index_t *hi = NULL;
|
|
|
|
mme_enb_t *enb = NULL;
|
|
|
|
int i;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
/* Find enB with matched TAI */
|
|
|
|
for (hi = mme_enb_first(); hi; hi = mme_enb_next(hi)) {
|
|
|
|
|
|
|
|
enb = mme_enb_this(hi);
|
|
|
|
for (i = 0; i < enb->num_of_supported_ta_list; i++) {
|
|
|
|
|
|
|
|
if (memcmp(&enb->supported_ta_list[i], &mme_ue->tai,
|
|
|
|
sizeof(tai_t)) == 0) {
|
|
|
|
|
|
|
|
/* Save it for later use */
|
|
|
|
ogs_assert(mme_ue->last_paging_msg);
|
|
|
|
s1apbuf = mme_ue->last_paging_msg;
|
|
|
|
mme_ue->last_paging_msg = ogs_pkbuf_copy(s1apbuf);
|
|
|
|
|
|
|
|
/* Send to enb */
|
|
|
|
rv = s1ap_send_to_enb(enb, s1apbuf, S1AP_NON_UE_SIGNALLING);
|
|
|
|
ogs_assert(rv == OGS_OK);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Start T3413 */
|
|
|
|
ogs_timer_start(mme_ue->t3413, mme_self()->t3413_value);
|
|
|
|
|
|
|
|
mme_ue->max_paging_retry++;
|
|
|
|
} else {
|
|
|
|
/* Paging failed */
|
|
|
|
ogs_warn("[EMM] Paging to IMSI[%s] failed. Stop paging",
|
|
|
|
mme_ue->imsi_bcd);
|
|
|
|
CLEAR_PAGING_INFO(mme_ue);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_mme_configuration_transfer(
|
2018-03-24 01:08:55 +00:00
|
|
|
mme_enb_t *target_enb,
|
|
|
|
S1AP_SONConfigurationTransfer_t *SONConfigurationTransfer)
|
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2018-03-24 01:08:55 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(target_enb);
|
|
|
|
ogs_assert(SONConfigurationTransfer);
|
2018-03-24 01:08:55 +00:00
|
|
|
|
|
|
|
rv = s1ap_build_mme_configuration_transfer(
|
|
|
|
&s1apbuf, SONConfigurationTransfer);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2018-03-24 01:08:55 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_send_to_enb(target_enb, s1apbuf, S1AP_NON_UE_SIGNALLING);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2018-03-24 01:08:55 +00:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_path_switch_ack(mme_ue_t *mme_ue)
|
2017-09-11 12:14:55 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2017-09-11 12:14:55 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(mme_ue);
|
2017-09-11 12:14:55 +00:00
|
|
|
|
|
|
|
rv = s1ap_build_path_switch_ack(&s1apbuf, mme_ue);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2017-09-11 12:14:55 +00:00
|
|
|
|
|
|
|
rv = nas_send_to_enb(mme_ue, s1apbuf);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2017-09-11 12:14:55 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
return OGS_OK;
|
2017-09-11 12:14:55 +00:00
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_handover_command(enb_ue_t *source_ue)
|
2017-09-15 04:28:07 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2017-09-15 04:28:07 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(source_ue);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
|
|
|
rv = s1ap_build_handover_command(&s1apbuf, source_ue);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_send_to_enb_ue(source_ue, s1apbuf);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_handover_preparation_failure(
|
2018-03-05 14:01:07 +00:00
|
|
|
enb_ue_t *source_ue, S1AP_Cause_t *cause)
|
2017-09-15 04:28:07 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2017-09-15 04:28:07 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(source_ue);
|
|
|
|
ogs_assert(cause);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
|
|
|
rv = s1ap_build_handover_preparation_failure(&s1apbuf, source_ue, cause);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_send_to_enb_ue(source_ue, s1apbuf);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_handover_cancel_ack(enb_ue_t *source_ue)
|
2017-09-15 04:28:07 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2017-09-15 04:28:07 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(source_ue);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
|
|
|
rv = s1ap_build_handover_cancel_ack(&s1apbuf, source_ue);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_send_to_enb_ue(source_ue, s1apbuf);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_handover_request(
|
2018-03-13 14:16:01 +00:00
|
|
|
mme_ue_t *mme_ue,
|
2018-03-23 04:14:56 +00:00
|
|
|
mme_enb_t *target_enb,
|
2018-03-13 14:16:01 +00:00
|
|
|
S1AP_ENB_UE_S1AP_ID_t *enb_ue_s1ap_id,
|
|
|
|
S1AP_MME_UE_S1AP_ID_t *mme_ue_s1ap_id,
|
|
|
|
S1AP_HandoverType_t *handovertype,
|
|
|
|
S1AP_Cause_t *cause,
|
|
|
|
S1AP_Source_ToTarget_TransparentContainer_t
|
|
|
|
*source_totarget_transparentContainer)
|
2017-09-12 14:07:55 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2017-09-14 10:33:58 +00:00
|
|
|
enb_ue_t *source_ue = NULL, *target_ue = NULL;
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_debug("[MME] Handover request");
|
2018-03-23 04:14:56 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(target_enb);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(mme_ue);
|
2017-09-14 10:33:58 +00:00
|
|
|
source_ue = mme_ue->enb_ue;
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(source_ue);
|
|
|
|
ogs_assert(source_ue->target_ue == NULL);
|
2017-09-14 10:33:58 +00:00
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
target_ue = enb_ue_add(target_enb);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(target_ue);
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_debug(" Source : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]",
|
2018-01-22 14:14:20 +00:00
|
|
|
source_ue->enb_ue_s1ap_id, source_ue->mme_ue_s1ap_id);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_debug(" Target : ENB_UE_S1AP_ID[Unknown] MME_UE_S1AP_ID[%d]",
|
2018-01-28 06:08:52 +00:00
|
|
|
target_ue->mme_ue_s1ap_id);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2019-06-30 11:46:15 +00:00
|
|
|
source_ue_associate_target_ue(source_ue, target_ue);
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2018-03-13 14:16:01 +00:00
|
|
|
rv = s1ap_build_handover_request(&s1apbuf, mme_ue, target_ue,
|
|
|
|
enb_ue_s1ap_id, mme_ue_s1ap_id,
|
2018-03-23 04:14:56 +00:00
|
|
|
handovertype, cause,
|
2018-03-13 14:16:01 +00:00
|
|
|
source_totarget_transparentContainer);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_send_to_enb_ue(target_ue, s1apbuf);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2017-09-12 14:07:55 +00:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
2017-09-13 12:51:02 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_mme_status_transfer(
|
2018-03-13 14:16:01 +00:00
|
|
|
enb_ue_t *target_ue,
|
|
|
|
S1AP_ENB_StatusTransfer_TransparentContainer_t
|
|
|
|
*enb_statustransfer_transparentContainer)
|
2017-09-14 02:12:02 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2017-09-14 02:12:02 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(target_ue);
|
2017-09-14 02:12:02 +00:00
|
|
|
|
2018-03-13 14:16:01 +00:00
|
|
|
rv = s1ap_build_mme_status_transfer(&s1apbuf, target_ue,
|
|
|
|
enb_statustransfer_transparentContainer);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2017-09-14 02:12:02 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_send_to_enb_ue(target_ue, s1apbuf);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2017-09-14 02:12:02 +00:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
2018-02-03 02:48:15 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_error_indication(
|
2018-03-12 14:06:14 +00:00
|
|
|
mme_enb_t *enb,
|
|
|
|
S1AP_MME_UE_S1AP_ID_t *mme_ue_s1ap_id,
|
|
|
|
S1AP_ENB_UE_S1AP_ID_t *enb_ue_s1ap_id,
|
2018-03-14 08:59:56 +00:00
|
|
|
S1AP_Cause_PR group, long cause)
|
2018-02-03 02:48:15 +00:00
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2018-02-03 02:48:15 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb);
|
2018-02-03 02:48:15 +00:00
|
|
|
|
|
|
|
rv = s1ap_build_error_indication(&s1apbuf,
|
2018-03-14 08:59:56 +00:00
|
|
|
mme_ue_s1ap_id, enb_ue_s1ap_id, group, cause);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2018-02-03 02:48:15 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_send_to_enb(enb, s1apbuf, S1AP_NON_UE_SIGNALLING);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2018-02-03 02:48:15 +00:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
2018-03-21 07:10:20 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
int s1ap_send_s1_reset_ack(
|
2018-03-21 07:10:20 +00:00
|
|
|
mme_enb_t *enb,
|
|
|
|
S1AP_UE_associatedLogicalS1_ConnectionListRes_t *partOfS1_Interface)
|
|
|
|
{
|
2019-04-27 14:54:30 +00:00
|
|
|
int rv;
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
2018-03-21 07:10:20 +00:00
|
|
|
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(enb);
|
2018-03-21 07:10:20 +00:00
|
|
|
|
|
|
|
rv = s1ap_build_s1_reset_ack(&s1apbuf, partOfS1_Interface);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK && s1apbuf);
|
2018-03-21 07:10:20 +00:00
|
|
|
|
2018-05-13 09:02:24 +00:00
|
|
|
rv = s1ap_send_to_enb(enb, s1apbuf, S1AP_NON_UE_SIGNALLING);
|
2019-04-27 14:54:30 +00:00
|
|
|
ogs_assert(rv == OGS_OK);
|
2018-03-21 07:10:20 +00:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|