2017-03-26 05:57:33 +00:00
|
|
|
#define TRACE_MODULE _s1ap_handler
|
|
|
|
|
|
|
|
#include "core_debug.h"
|
2017-03-26 06:34:34 +00:00
|
|
|
|
2017-04-04 01:49:19 +00:00
|
|
|
#include "mme_event.h"
|
2017-03-26 06:34:34 +00:00
|
|
|
|
2017-09-12 01:41:00 +00:00
|
|
|
#include "mme_kdf.h"
|
2017-03-26 05:57:33 +00:00
|
|
|
#include "s1ap_conv.h"
|
|
|
|
#include "s1ap_path.h"
|
2017-09-06 15:37:16 +00:00
|
|
|
#include "nas_path.h"
|
2017-08-31 02:05:00 +00:00
|
|
|
#include "mme_gtp_path.h"
|
2017-04-13 10:58:58 +00:00
|
|
|
|
2017-09-11 14:58:16 +00:00
|
|
|
#include "mme_s11_build.h"
|
2017-09-10 14:03:24 +00:00
|
|
|
#include "s1ap_build.h"
|
2017-04-13 10:58:58 +00:00
|
|
|
#include "s1ap_handler.h"
|
|
|
|
|
2017-11-30 11:13:15 +00:00
|
|
|
#include "mme_sm.h"
|
|
|
|
|
2017-04-06 11:10:00 +00:00
|
|
|
void s1ap_handle_s1_setup_request(mme_enb_t *enb, s1ap_message_t *message)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
S1ap_S1SetupRequestIEs_t *ies = NULL;
|
2017-04-13 14:30:56 +00:00
|
|
|
pkbuf_t *s1apbuf = NULL;
|
2017-03-26 05:57:33 +00:00
|
|
|
c_uint32_t enb_id;
|
2017-12-11 07:55:11 +00:00
|
|
|
int i, j;
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
d_assert(enb, return, "Null param");
|
2017-11-23 10:44:49 +00:00
|
|
|
d_assert(enb->sock, return, "Null param");
|
2017-03-26 05:57:33 +00:00
|
|
|
d_assert(message, return, "Null param");
|
|
|
|
|
|
|
|
ies = &message->s1ap_S1SetupRequestIEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] S1-Setup request\n");
|
|
|
|
|
2017-03-26 05:57:33 +00:00
|
|
|
s1ap_ENB_ID_to_uint32(&ies->global_ENB_ID.eNB_ID, &enb_id);
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n", CORE_ADDR(enb->addr, buf), enb_id);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-08-04 21:34:52 +00:00
|
|
|
/* Parse Supported TA */
|
2017-12-11 07:55:11 +00:00
|
|
|
enb->num_of_supported_ta_list = 0;
|
2017-08-04 21:34:52 +00:00
|
|
|
for (i = 0; i < ies->supportedTAs.list.count; i++)
|
|
|
|
{
|
|
|
|
S1ap_SupportedTAs_Item_t *tai = NULL;
|
|
|
|
S1ap_TAC_t *tAC;
|
|
|
|
|
|
|
|
tai = (S1ap_SupportedTAs_Item_t *)ies->supportedTAs.list.array[i];
|
|
|
|
tAC = &tai->tAC;
|
|
|
|
|
|
|
|
for (j = 0; j < tai->broadcastPLMNs.list.count; j++)
|
|
|
|
{
|
|
|
|
S1ap_PLMNidentity_t *pLMNidentity = NULL;
|
|
|
|
pLMNidentity =
|
|
|
|
(S1ap_PLMNidentity_t *)tai->broadcastPLMNs.list.array[j];
|
|
|
|
|
2017-12-11 07:55:11 +00:00
|
|
|
memcpy(&enb->supported_ta_list[enb->num_of_supported_ta_list].tac,
|
|
|
|
tAC->buf, sizeof(c_uint16_t));
|
|
|
|
enb->supported_ta_list[enb->num_of_supported_ta_list].tac =
|
|
|
|
ntohs(enb->supported_ta_list
|
|
|
|
[enb->num_of_supported_ta_list].tac);
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " TAC[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb->supported_ta_list[enb->num_of_supported_ta_list].tac);
|
2017-08-04 21:34:52 +00:00
|
|
|
|
2017-12-11 07:55:11 +00:00
|
|
|
memcpy(&enb->supported_ta_list
|
|
|
|
[enb->num_of_supported_ta_list].plmn_id,
|
|
|
|
pLMNidentity->buf, sizeof(plmn_id_t));
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " PLMN_ID[MCC:%d MNC:%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
plmn_id_mcc(&enb->supported_ta_list
|
|
|
|
[enb->num_of_supported_ta_list].plmn_id),
|
|
|
|
plmn_id_mnc(&enb->supported_ta_list
|
|
|
|
[enb->num_of_supported_ta_list].plmn_id));
|
2017-12-11 07:55:11 +00:00
|
|
|
enb->num_of_supported_ta_list++;
|
2017-08-04 21:34:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-11 07:55:11 +00:00
|
|
|
if (enb->num_of_supported_ta_list == 0)
|
2017-08-04 21:34:52 +00:00
|
|
|
{
|
|
|
|
d_error("No supported TA exist in s1stup_req messages");
|
|
|
|
}
|
|
|
|
|
2017-11-23 10:44:49 +00:00
|
|
|
d_assert(enb->sock, return,);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
|
|
|
d_trace(3, "[MME] S1-Setup response\n");
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-10-18 05:05:22 +00:00
|
|
|
d_assert(mme_enb_set_enb_id(enb, enb_id) == CORE_OK,
|
|
|
|
return, "hash add error");
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-13 14:30:56 +00:00
|
|
|
d_assert(s1ap_build_setup_rsp(&s1apbuf) == CORE_OK,
|
2017-03-26 05:57:33 +00:00
|
|
|
return, "build error");
|
2017-04-13 14:30:56 +00:00
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK, , "send error");
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-11-23 10:44:49 +00:00
|
|
|
d_assert(enb->sock, return,);
|
2017-03-26 05:57:33 +00:00
|
|
|
}
|
|
|
|
|
2017-04-06 11:10:00 +00:00
|
|
|
void s1ap_handle_initial_ue_message(mme_enb_t *enb, s1ap_message_t *message)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-03-26 05:57:33 +00:00
|
|
|
S1ap_InitialUEMessage_IEs_t *ies = NULL;
|
2017-04-11 11:44:38 +00:00
|
|
|
S1ap_TAI_t *tai = NULL;
|
|
|
|
S1ap_PLMNidentity_t *pLMNidentity = NULL;
|
|
|
|
S1ap_TAC_t *tAC = NULL;
|
|
|
|
S1ap_EUTRAN_CGI_t *eutran_cgi = NULL;
|
|
|
|
S1ap_CellIdentity_t *cell_ID = NULL;
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
d_assert(enb, return, "Null param");
|
2018-01-29 05:48:51 +00:00
|
|
|
d_assert(enb->sock, return, "Null param");
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
ies = &message->s1ap_InitialUEMessage_IEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Initial UE Message\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
if (!enb_ue)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = enb_ue_add(enb);
|
|
|
|
d_assert(enb_ue, return, "Null param");
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id = ies->eNB_UE_S1AP_ID;
|
2017-07-25 00:03:20 +00:00
|
|
|
|
|
|
|
/* Find MME_UE if s_tmsi included */
|
2017-09-11 12:14:55 +00:00
|
|
|
if (ies->presenceMask & S1AP_INITIALUEMESSAGE_IES_S_TMSI_PRESENT)
|
2017-07-25 00:03:20 +00:00
|
|
|
{
|
|
|
|
S1ap_S_TMSI_t *s_tmsi = &ies->s_tmsi;
|
|
|
|
served_gummei_t *served_gummei = &mme_self()->served_gummei[0];
|
|
|
|
guti_t guti;
|
2017-07-26 02:28:43 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-07-25 00:03:20 +00:00
|
|
|
|
|
|
|
memset(&guti, 0, sizeof(guti_t));
|
|
|
|
|
|
|
|
/* FIXME : Use the first configured plmn_id and mme group id */
|
|
|
|
memcpy(&guti.plmn_id, &served_gummei->plmn_id[0], PLMN_ID_LEN);
|
|
|
|
guti.mme_gid = served_gummei->mme_gid[0];
|
|
|
|
|
|
|
|
/* size must be 1 */
|
2017-07-25 14:29:02 +00:00
|
|
|
memcpy(&guti.mme_code, s_tmsi->mMEC.buf, s_tmsi->mMEC.size);
|
2017-07-25 00:03:20 +00:00
|
|
|
/* size must be 4 */
|
2017-07-25 14:29:02 +00:00
|
|
|
memcpy(&guti.m_tmsi, s_tmsi->m_TMSI.buf, s_tmsi->m_TMSI.size);
|
|
|
|
guti.m_tmsi = ntohl(guti.m_tmsi);
|
2017-07-25 00:03:20 +00:00
|
|
|
|
2017-07-26 02:28:43 +00:00
|
|
|
mme_ue = mme_ue_find_by_guti(&guti);
|
|
|
|
if (!mme_ue)
|
2017-07-25 00:03:20 +00:00
|
|
|
{
|
2018-01-09 08:38:06 +00:00
|
|
|
d_warn("Unknown UE by S_TMSI[G:%d,C:%d,M_TMSI:0x%x]",
|
|
|
|
guti.mme_gid, guti.mme_code, guti.m_tmsi);
|
2017-07-26 02:28:43 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-01-28 06:08:52 +00:00
|
|
|
d_trace(5, " S_TMSI[G:%d,C:%d,M_TMSI:0x%x] IMSI:[%s]\n",
|
|
|
|
mme_ue->guti.mme_gid,
|
|
|
|
mme_ue->guti.mme_code,
|
|
|
|
mme_ue->guti.m_tmsi,
|
|
|
|
MME_UE_HAVE_IMSI(mme_ue)
|
|
|
|
? mme_ue->imsi_bcd : "Unknown");
|
2018-01-28 07:13:48 +00:00
|
|
|
#if 0 /* FIXME : how can we release S1(enb_ue_t) context ? */
|
2018-01-28 06:08:52 +00:00
|
|
|
if (mme_ue->enb_ue)
|
|
|
|
{
|
|
|
|
d_warn("Implicitly S1 released");
|
|
|
|
d_warn(" ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]",
|
|
|
|
mme_ue->enb_ue->enb_ue_s1ap_id,
|
|
|
|
mme_ue->enb_ue->mme_ue_s1ap_id);
|
|
|
|
enb_ue_remove(mme_ue->enb_ue);
|
|
|
|
}
|
2018-01-28 07:13:48 +00:00
|
|
|
#endif
|
2017-09-14 09:01:26 +00:00
|
|
|
mme_ue_associate_enb_ue(mme_ue, enb_ue);
|
2017-07-25 00:03:20 +00:00
|
|
|
}
|
|
|
|
}
|
2017-03-26 05:57:33 +00:00
|
|
|
}
|
|
|
|
|
2017-12-11 07:55:11 +00:00
|
|
|
tai = &ies->tai;
|
|
|
|
d_assert(tai, return,);
|
|
|
|
pLMNidentity = &tai->pLMNidentity;
|
|
|
|
d_assert(pLMNidentity && pLMNidentity->size == sizeof(plmn_id_t), return,);
|
|
|
|
tAC = &tai->tAC;
|
|
|
|
d_assert(tAC && tAC->size == sizeof(c_uint16_t), return,);
|
|
|
|
|
2017-09-14 08:40:01 +00:00
|
|
|
memcpy(&enb_ue->nas.tai.plmn_id, pLMNidentity->buf,
|
|
|
|
sizeof(enb_ue->nas.tai.plmn_id));
|
|
|
|
memcpy(&enb_ue->nas.tai.tac, tAC->buf, sizeof(enb_ue->nas.tai.tac));
|
|
|
|
enb_ue->nas.tai.tac = ntohs(enb_ue->nas.tai.tac);
|
2017-12-11 07:55:11 +00:00
|
|
|
|
|
|
|
eutran_cgi = &ies->eutran_cgi;
|
|
|
|
d_assert(eutran_cgi, return,);
|
|
|
|
pLMNidentity = &eutran_cgi->pLMNidentity;
|
|
|
|
d_assert(pLMNidentity && pLMNidentity->size == sizeof(plmn_id_t), return,);
|
|
|
|
cell_ID = &eutran_cgi->cell_ID;
|
|
|
|
d_assert(cell_ID, return,);
|
2017-09-14 08:40:01 +00:00
|
|
|
memcpy(&enb_ue->nas.e_cgi.plmn_id, pLMNidentity->buf,
|
|
|
|
sizeof(enb_ue->nas.e_cgi.plmn_id));
|
|
|
|
memcpy(&enb_ue->nas.e_cgi.cell_id, cell_ID->buf,
|
|
|
|
sizeof(enb_ue->nas.e_cgi.cell_id));
|
|
|
|
enb_ue->nas.e_cgi.cell_id = (ntohl(enb_ue->nas.e_cgi.cell_id) >> 4);
|
2017-04-11 11:44:38 +00:00
|
|
|
|
2018-01-28 06:08:52 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d] TAC[%d]\n",
|
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id, enb_ue->nas.tai.tac);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-09-07 06:56:31 +00:00
|
|
|
d_assert(s1ap_send_to_nas(enb_ue, &ies->nas_pdu) == CORE_OK,,
|
|
|
|
"s1ap_send_to_nas failed");
|
2017-03-26 05:57:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void s1ap_handle_uplink_nas_transport(
|
2017-04-06 11:10:00 +00:00
|
|
|
mme_enb_t *enb, s1ap_message_t *message)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-03-26 05:57:33 +00:00
|
|
|
S1ap_UplinkNASTransport_IEs_t *ies = NULL;
|
|
|
|
|
|
|
|
ies = &message->s1ap_UplinkNASTransport_IEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Uplink NAS transport\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
2017-09-04 16:17:24 +00:00
|
|
|
d_assert(enb_ue, return, "No UE Context[%d]", ies->eNB_UE_S1AP_ID);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-09-07 06:56:31 +00:00
|
|
|
d_assert(s1ap_send_to_nas(enb_ue, &ies->nas_pdu) == CORE_OK,,
|
|
|
|
"s1ap_send_to_nas failed");
|
2017-03-26 05:57:33 +00:00
|
|
|
}
|
|
|
|
|
2017-04-13 14:14:59 +00:00
|
|
|
void s1ap_handle_ue_capability_info_indication(
|
|
|
|
mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-04-13 14:14:59 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-13 14:14:59 +00:00
|
|
|
S1ap_UECapabilityInfoIndicationIEs_t *ies = NULL;
|
|
|
|
|
|
|
|
ies = &message->s1ap_UECapabilityInfoIndicationIEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] UE capability info indication\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
d_assert(enb_ue, return, "No UE Context[%d]", ies->eNB_UE_S1AP_ID);
|
2017-04-13 14:14:59 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
|
|
|
|
2017-08-08 19:01:08 +00:00
|
|
|
if (enb_ue->mme_ue)
|
|
|
|
{
|
|
|
|
S1ap_UERadioCapability_t *ue_radio_capa = NULL;
|
|
|
|
S1ap_UERadioCapability_t *radio_capa = NULL;
|
|
|
|
mme_ue_t *mme_ue = enb_ue->mme_ue;
|
|
|
|
|
|
|
|
ue_radio_capa = &ies->ueRadioCapability;
|
|
|
|
|
2017-08-08 21:45:52 +00:00
|
|
|
/* Release the previous one */
|
|
|
|
if (mme_ue->radio_capa)
|
|
|
|
{
|
|
|
|
radio_capa = (S1ap_UERadioCapability_t *)mme_ue->radio_capa;
|
|
|
|
|
|
|
|
if (radio_capa->buf)
|
2018-01-13 13:03:30 +00:00
|
|
|
CORE_FREE(radio_capa->buf);
|
|
|
|
CORE_FREE(mme_ue->radio_capa);
|
2017-08-08 21:45:52 +00:00
|
|
|
}
|
|
|
|
/* Save UE radio capability */
|
|
|
|
mme_ue->radio_capa = core_calloc(1, sizeof(S1ap_UERadioCapability_t));
|
2017-08-08 19:01:08 +00:00
|
|
|
radio_capa = (S1ap_UERadioCapability_t *)mme_ue->radio_capa;
|
2017-08-08 21:45:52 +00:00
|
|
|
d_assert(radio_capa,return,"core_calloc Error");
|
|
|
|
|
2017-08-08 19:01:08 +00:00
|
|
|
radio_capa->size = ue_radio_capa->size;
|
|
|
|
radio_capa->buf =
|
|
|
|
core_calloc(radio_capa->size, sizeof(c_uint8_t));
|
|
|
|
d_assert(radio_capa->buf,return,"core_calloc Error(size=%d)",
|
|
|
|
radio_capa->size);
|
|
|
|
memcpy(radio_capa->buf, ue_radio_capa->buf, radio_capa->size);
|
|
|
|
}
|
2017-04-13 14:14:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void s1ap_handle_initial_context_setup_response(
|
|
|
|
mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-09-14 02:12:02 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-04-13 16:26:50 +00:00
|
|
|
int i = 0;
|
2017-04-13 14:14:59 +00:00
|
|
|
|
2017-09-11 15:49:15 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-13 14:14:59 +00:00
|
|
|
S1ap_InitialContextSetupResponseIEs_t *ies = NULL;
|
|
|
|
|
|
|
|
ies = &message->s1ap_InitialContextSetupResponseIEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Initial context setup response\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
d_assert(enb_ue, return, "No UE Context[%d]", ies->eNB_UE_S1AP_ID);
|
2017-09-11 15:49:15 +00:00
|
|
|
mme_ue = enb_ue->mme_ue;
|
|
|
|
d_assert(mme_ue, return,);
|
2017-04-13 14:14:59 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
2017-04-13 16:26:50 +00:00
|
|
|
|
2017-09-04 16:17:24 +00:00
|
|
|
for (i = 0; i < ies->e_RABSetupListCtxtSURes.
|
|
|
|
s1ap_E_RABSetupItemCtxtSURes.count; i++)
|
2017-04-13 16:26:50 +00:00
|
|
|
{
|
2017-08-09 15:41:09 +00:00
|
|
|
mme_sess_t *sess = NULL;
|
2017-04-13 16:26:50 +00:00
|
|
|
mme_bearer_t *bearer = NULL;
|
|
|
|
S1ap_E_RABSetupItemCtxtSURes_t *e_rab = NULL;
|
|
|
|
|
|
|
|
e_rab = (S1ap_E_RABSetupItemCtxtSURes_t *)
|
|
|
|
ies->e_RABSetupListCtxtSURes.s1ap_E_RABSetupItemCtxtSURes.array[i];
|
|
|
|
d_assert(e_rab, return, "Null param");
|
|
|
|
|
2017-08-26 09:52:06 +00:00
|
|
|
sess = mme_sess_find_by_ebi(mme_ue, e_rab->e_RAB_ID);
|
|
|
|
d_assert(sess, return, "Null param");
|
|
|
|
bearer = mme_default_bearer_in_sess(sess);
|
2017-04-13 16:26:50 +00:00
|
|
|
d_assert(bearer, return, "Null param");
|
|
|
|
memcpy(&bearer->enb_s1u_teid, e_rab->gTP_TEID.buf,
|
|
|
|
sizeof(bearer->enb_s1u_teid));
|
|
|
|
bearer->enb_s1u_teid = ntohl(bearer->enb_s1u_teid);
|
2017-12-07 08:23:45 +00:00
|
|
|
rv = s1ap_BIT_STRING_to_ip(
|
|
|
|
&e_rab->transportLayerAddress, &bearer->enb_s1u_ip);
|
|
|
|
d_assert(rv == CORE_OK, return,);
|
2017-09-08 03:11:44 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " EBI[%d]\n", bearer->ebi);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2017-09-08 03:11:44 +00:00
|
|
|
if (FSM_CHECK(&bearer->sm, esm_state_active))
|
|
|
|
{
|
2017-09-14 08:29:34 +00:00
|
|
|
int uli_presence = 0;
|
|
|
|
if (mme_ue->nas_eps.type != MME_EPS_TYPE_ATTACH_REQUEST)
|
2017-09-14 02:12:02 +00:00
|
|
|
{
|
2017-09-14 08:29:34 +00:00
|
|
|
uli_presence = 1;
|
2017-09-14 02:12:02 +00:00
|
|
|
}
|
2017-09-14 08:29:34 +00:00
|
|
|
rv = mme_gtp_send_modify_bearer_request(bearer, uli_presence);
|
2017-09-11 14:58:16 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "gtp send failed");
|
2017-09-08 03:11:44 +00:00
|
|
|
}
|
2017-04-13 16:26:50 +00:00
|
|
|
}
|
2017-04-13 14:14:59 +00:00
|
|
|
}
|
|
|
|
|
2018-01-02 09:30:17 +00:00
|
|
|
void s1ap_handle_initial_context_setup_failure(
|
|
|
|
mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2018-01-11 23:32:33 +00:00
|
|
|
status_t rv;
|
2018-01-02 09:30:17 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
|
|
|
|
|
|
|
mme_ue_t *mme_ue = NULL;
|
|
|
|
enb_ue_t *enb_ue = NULL;
|
|
|
|
S1ap_InitialContextSetupFailureIEs_t *ies = NULL;
|
|
|
|
|
|
|
|
ies = &message->s1ap_InitialContextSetupFailureIEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
|
|
|
enb_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
d_assert(enb_ue, return, "No UE Context[%d]", ies->eNB_UE_S1AP_ID);
|
|
|
|
mme_ue = enb_ue->mme_ue;
|
|
|
|
d_assert(mme_ue, return,);
|
|
|
|
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(3, "[MME] Initial context setup failure\n");
|
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-02 09:30:17 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-28 04:50:21 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(5, " Cause[Group:%d Cause:%d]\n",
|
2018-01-28 04:50:21 +00:00
|
|
|
ies->cause.present, ies->cause.choice.radioNetwork);
|
2018-01-28 13:08:53 +00:00
|
|
|
|
|
|
|
if (FSM_CHECK(&mme_ue->sm, emm_state_registered))
|
2018-01-11 23:32:33 +00:00
|
|
|
{
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(5, " Registered State\n");
|
2018-01-29 05:48:51 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* 19.2.2.3 in Spec 36.300
|
|
|
|
*
|
|
|
|
* In case of failure, eNB and MME behaviours are not mandated.
|
|
|
|
*
|
|
|
|
* Both implicit release (local release at each node) and
|
|
|
|
* explicit release (MME-initiated UE Context Release procedure)
|
|
|
|
* may in principle be adopted. The eNB should ensure
|
|
|
|
* that no hanging resources remain at the eNB.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if 0 /* FIXME : Does it needed? */
|
2018-01-28 13:08:53 +00:00
|
|
|
rv = nas_send_service_reject(mme_ue,
|
|
|
|
EMM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED);
|
|
|
|
d_assert(rv == CORE_OK,,
|
|
|
|
"nas_send_service_reject() failed");
|
2018-01-29 05:48:51 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if 1 /* Implicitly Detach */
|
|
|
|
d_trace(5, " Implicit Release\n");
|
|
|
|
rv = mme_ue_deassociate_enb_ue(enb_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "mme_ue_deassociate_enb_ue() failed");
|
|
|
|
|
|
|
|
rv = enb_ue_remove(enb_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "enb_ue_remove() failed");
|
|
|
|
|
|
|
|
#else /* Explicitly Detach */
|
2018-01-28 13:08:53 +00:00
|
|
|
|
2018-01-29 05:48:51 +00:00
|
|
|
d_trace(5, " Explicit Release\n");
|
|
|
|
#if 1 /* NAS Cause : Detach */
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(5, " NAS-CAUSE: DETACH\n");
|
|
|
|
rv = s1ap_send_ue_context_release_command(enb_ue,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_detach,
|
|
|
|
S1AP_UE_CTX_REL_NO_ACTION, 0);
|
|
|
|
d_assert(rv == CORE_OK,, "s1ap send error");
|
2018-01-29 05:48:51 +00:00
|
|
|
#else /* NAS Cause : Normal Release */
|
|
|
|
d_trace(5, " NAS-CAUSE: Normal Release\n");
|
|
|
|
rv = s1ap_send_ue_context_release_command(enb_ue,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_normal_release,
|
|
|
|
S1AP_UE_CTX_REL_NO_ACTION, 0);
|
|
|
|
d_assert(rv == CORE_OK,, "s1ap send error");
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif
|
2018-01-11 23:32:33 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(5, " NOT Registered State\n");
|
|
|
|
if (MME_HAVE_SGW_S11_PATH(mme_ue))
|
|
|
|
{
|
|
|
|
d_trace(5, " WITH Delete Sesson\n");
|
|
|
|
rv = mme_gtp_send_delete_all_sessions(mme_ue);
|
|
|
|
d_assert(rv == CORE_OK,,
|
|
|
|
"mme_gtp_send_delete_all_sessions failed");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
d_trace(5, " WITHOUT Delete Sesson\n");
|
|
|
|
rv = s1ap_send_ue_context_release_command(enb_ue,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_normal_release,
|
|
|
|
S1AP_UE_CTX_REL_REMOVE_MME_UE_CONTEXT, 0);
|
|
|
|
d_assert(rv == CORE_OK,, "s1ap send error");
|
|
|
|
}
|
2018-01-11 23:32:33 +00:00
|
|
|
}
|
2018-01-02 09:30:17 +00:00
|
|
|
}
|
|
|
|
|
2017-09-04 16:17:24 +00:00
|
|
|
void s1ap_handle_e_rab_setup_response(
|
|
|
|
mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-12-07 08:23:45 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-09-04 16:17:24 +00:00
|
|
|
int i;
|
|
|
|
|
|
|
|
enb_ue_t *enb_ue = NULL;
|
|
|
|
S1ap_E_RABSetupResponseIEs_t *ies = NULL;
|
2017-09-11 15:49:15 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-09-04 16:17:24 +00:00
|
|
|
|
|
|
|
d_assert(enb, return, "Null param");
|
|
|
|
d_assert(message, return, "Null param");
|
|
|
|
|
|
|
|
ies = &message->s1ap_E_RABSetupResponseIEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] E-RAB setup response\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-09-04 16:17:24 +00:00
|
|
|
enb_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
d_assert(enb_ue, return, "No UE Context[%d]", ies->eNB_UE_S1AP_ID);
|
2017-09-11 15:49:15 +00:00
|
|
|
mme_ue = enb_ue->mme_ue;
|
|
|
|
d_assert(mme_ue, return,);
|
2017-09-04 16:17:24 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
2017-09-04 16:17:24 +00:00
|
|
|
|
|
|
|
for (i = 0; i < ies->e_RABSetupListBearerSURes.
|
|
|
|
s1ap_E_RABSetupItemBearerSURes.count; i++)
|
|
|
|
{
|
2017-09-07 06:56:31 +00:00
|
|
|
mme_bearer_t *bearer = NULL;
|
2017-09-04 16:17:24 +00:00
|
|
|
S1ap_E_RABSetupItemBearerSURes_t *e_rab = NULL;
|
|
|
|
|
|
|
|
e_rab = (S1ap_E_RABSetupItemBearerSURes_t *)ies->
|
|
|
|
e_RABSetupListBearerSURes.s1ap_E_RABSetupItemBearerSURes.array[i];
|
|
|
|
d_assert(e_rab, return, "Null param");
|
|
|
|
|
|
|
|
bearer = mme_bearer_find_by_ue_ebi(mme_ue, e_rab->e_RAB_ID);
|
|
|
|
d_assert(bearer, return, "Null param");
|
|
|
|
|
|
|
|
memcpy(&bearer->enb_s1u_teid, e_rab->gTP_TEID.buf,
|
|
|
|
sizeof(bearer->enb_s1u_teid));
|
|
|
|
bearer->enb_s1u_teid = ntohl(bearer->enb_s1u_teid);
|
2017-12-07 08:23:45 +00:00
|
|
|
rv = s1ap_BIT_STRING_to_ip(
|
|
|
|
&e_rab->transportLayerAddress, &bearer->enb_s1u_ip);
|
|
|
|
d_assert(rv == CORE_OK, return,);
|
2017-09-08 03:11:44 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " EBI[%d]\n", bearer->ebi);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2017-09-08 03:11:44 +00:00
|
|
|
if (FSM_CHECK(&bearer->sm, esm_state_active))
|
|
|
|
{
|
|
|
|
status_t rv;
|
|
|
|
|
|
|
|
mme_bearer_t *linked_bearer = mme_linked_bearer(bearer);
|
2018-01-22 14:14:20 +00:00
|
|
|
d_assert(linked_bearer, return, "Null param");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Linked-EBI[%d]\n", linked_bearer->ebi);
|
2017-09-08 03:11:44 +00:00
|
|
|
|
|
|
|
if (bearer->ebi == linked_bearer->ebi)
|
|
|
|
{
|
2017-09-14 08:29:34 +00:00
|
|
|
rv = mme_gtp_send_modify_bearer_request(bearer, 0);
|
2017-09-11 14:58:16 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "gtp send failed");
|
2017-09-08 03:11:44 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
rv = mme_gtp_send_create_bearer_response(bearer);
|
2017-09-11 14:58:16 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "gtp send failed");
|
2017-09-08 03:11:44 +00:00
|
|
|
}
|
|
|
|
}
|
2017-09-04 16:17:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-25 00:03:20 +00:00
|
|
|
void s1ap_handle_ue_context_release_request(
|
|
|
|
mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-09-08 07:46:37 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-07-25 00:03:20 +00:00
|
|
|
|
|
|
|
enb_ue_t *enb_ue = NULL;
|
|
|
|
S1ap_UEContextReleaseRequest_IEs_t *ies = NULL;
|
|
|
|
|
|
|
|
ies = &message->s1ap_UEContextReleaseRequest_IEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] UE Context release request\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-07-25 00:03:20 +00:00
|
|
|
enb_ue = enb_ue_find_by_mme_ue_s1ap_id(ies->mme_ue_s1ap_id);
|
|
|
|
d_assert(enb_ue, return, "No UE Context[%d]", ies->mme_ue_s1ap_id);
|
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Cause[Group:%d Cause:%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
ies->cause.present, ies->cause.choice.radioNetwork);
|
2017-07-25 00:03:20 +00:00
|
|
|
|
2017-07-25 12:15:25 +00:00
|
|
|
switch(ies->cause.present)
|
|
|
|
{
|
|
|
|
case S1ap_Cause_PR_radioNetwork:
|
2018-01-09 09:02:56 +00:00
|
|
|
{
|
2018-01-19 08:00:37 +00:00
|
|
|
mme_ue_t *mme_ue = enb_ue->mme_ue;
|
|
|
|
|
2018-01-09 09:02:56 +00:00
|
|
|
if (ies->cause.choice.radioNetwork
|
|
|
|
== S1ap_CauseRadioNetwork_user_inactivity)
|
2017-07-25 12:15:25 +00:00
|
|
|
{
|
2017-09-13 07:22:39 +00:00
|
|
|
d_assert(mme_ue, return,);
|
2017-07-25 12:15:25 +00:00
|
|
|
|
2017-09-05 03:37:27 +00:00
|
|
|
if (MME_HAVE_SGW_S11_PATH(mme_ue))
|
2017-07-25 12:15:25 +00:00
|
|
|
{
|
2017-09-13 07:22:39 +00:00
|
|
|
rv = mme_gtp_send_release_access_bearers_request(mme_ue);
|
|
|
|
d_assert(rv == CORE_OK, return, "gtp send failed");
|
2017-07-25 12:15:25 +00:00
|
|
|
}
|
2017-08-11 06:21:03 +00:00
|
|
|
else
|
2017-07-25 12:15:25 +00:00
|
|
|
{
|
2018-01-21 11:31:28 +00:00
|
|
|
rv = s1ap_send_ue_context_release_command(enb_ue,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_normal_release,
|
|
|
|
S1AP_UE_CTX_REL_NO_ACTION, 0);
|
2017-09-08 07:46:37 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "s1ap send error");
|
2017-07-25 12:15:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-01-28 13:08:53 +00:00
|
|
|
if (FSM_CHECK(&mme_ue->sm, emm_state_registered))
|
2018-01-19 08:00:37 +00:00
|
|
|
{
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(5, " Registered State\n");
|
2018-01-21 11:31:28 +00:00
|
|
|
rv = s1ap_send_ue_context_release_command(enb_ue,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_normal_release,
|
2018-01-28 13:08:53 +00:00
|
|
|
S1AP_UE_CTX_REL_NO_ACTION, 0);
|
2018-01-19 08:00:37 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "s1ap send error");
|
|
|
|
}
|
2018-01-28 13:08:53 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
d_trace(5, " NOT Registered State\n");
|
|
|
|
if (MME_HAVE_SGW_S11_PATH(mme_ue))
|
|
|
|
{
|
|
|
|
d_trace(5, " WITH Delete Sesson\n");
|
|
|
|
rv = mme_gtp_send_delete_all_sessions(mme_ue);
|
|
|
|
d_assert(rv == CORE_OK,,
|
|
|
|
"mme_gtp_send_delete_all_sessions failed");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
d_trace(5, " WITHOUT Delete Sesson\n");
|
|
|
|
rv = s1ap_send_ue_context_release_command(enb_ue,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_normal_release,
|
|
|
|
S1AP_UE_CTX_REL_REMOVE_MME_UE_CONTEXT, 0);
|
|
|
|
d_assert(rv == CORE_OK,, "s1ap send error");
|
|
|
|
}
|
|
|
|
}
|
2017-07-25 12:15:25 +00:00
|
|
|
}
|
|
|
|
break;
|
2018-01-09 09:02:56 +00:00
|
|
|
}
|
2017-07-25 12:15:25 +00:00
|
|
|
case S1ap_Cause_PR_transport:
|
2018-01-09 09:02:56 +00:00
|
|
|
{
|
2018-01-11 23:25:30 +00:00
|
|
|
mme_ue_t *mme_ue = enb_ue->mme_ue;
|
2018-01-09 09:02:56 +00:00
|
|
|
|
2018-01-28 13:08:53 +00:00
|
|
|
if (FSM_CHECK(&mme_ue->sm, emm_state_registered))
|
2018-01-11 23:25:30 +00:00
|
|
|
{
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(5, " Registered State\n");
|
|
|
|
rv = s1ap_send_ue_context_release_command(enb_ue,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_normal_release,
|
|
|
|
S1AP_UE_CTX_REL_NO_ACTION, 0);
|
|
|
|
d_assert(rv == CORE_OK,, "s1ap send error");
|
2018-01-11 23:25:30 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-01-28 13:08:53 +00:00
|
|
|
d_trace(5, " NOT Registered State\n");
|
|
|
|
if (MME_HAVE_SGW_S11_PATH(mme_ue))
|
|
|
|
{
|
|
|
|
d_trace(5, " WITH Delete Sesson\n");
|
|
|
|
rv = mme_gtp_send_delete_all_sessions(mme_ue);
|
|
|
|
d_assert(rv == CORE_OK,,
|
|
|
|
"mme_gtp_send_delete_all_sessions failed");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
d_trace(5, " WITHOUT Delete Sesson\n");
|
|
|
|
rv = s1ap_send_ue_context_release_command(enb_ue,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_normal_release,
|
|
|
|
S1AP_UE_CTX_REL_REMOVE_MME_UE_CONTEXT, 0);
|
|
|
|
d_assert(rv == CORE_OK,, "s1ap send error");
|
|
|
|
}
|
2018-01-11 23:25:30 +00:00
|
|
|
}
|
2017-07-25 12:15:25 +00:00
|
|
|
break;
|
2018-01-09 09:02:56 +00:00
|
|
|
}
|
2017-07-25 12:15:25 +00:00
|
|
|
case S1ap_Cause_PR_nas:
|
2018-01-09 09:02:56 +00:00
|
|
|
d_warn("Not implmented (nas cause : %d)", ies->cause.choice.nas);
|
2017-07-25 12:15:25 +00:00
|
|
|
break;
|
|
|
|
case S1ap_Cause_PR_protocol:
|
2018-01-09 09:02:56 +00:00
|
|
|
d_warn("Not implmented (protocol cause : %d)",
|
|
|
|
ies->cause.choice.protocol);
|
2017-07-25 12:15:25 +00:00
|
|
|
break;
|
|
|
|
case S1ap_Cause_PR_misc:
|
2018-01-09 09:02:56 +00:00
|
|
|
d_warn("Not implmented (misc cause : %d)", ies->cause.choice.misc);
|
2017-07-25 12:15:25 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
d_warn("Invalid cause type : %d", ies->cause.present);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2017-07-25 00:03:20 +00:00
|
|
|
|
2017-04-28 04:46:16 +00:00
|
|
|
void s1ap_handle_ue_context_release_complete(
|
|
|
|
mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-09-18 10:30:03 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-04-28 04:46:16 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-09-18 10:30:03 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-04-28 04:46:16 +00:00
|
|
|
S1ap_UEContextReleaseComplete_IEs_t *ies = NULL;
|
|
|
|
|
|
|
|
ies = &message->s1ap_UEContextReleaseComplete_IEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] UE Context release complete\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = enb_ue_find_by_mme_ue_s1ap_id(ies->mme_ue_s1ap_id);
|
|
|
|
d_assert(enb_ue, return, "No UE Context[%d]", ies->mme_ue_s1ap_id);
|
2018-01-29 05:48:51 +00:00
|
|
|
mme_ue = enb_ue->mme_ue;
|
2017-04-28 04:46:16 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
2017-04-28 04:46:16 +00:00
|
|
|
|
2018-01-29 05:48:51 +00:00
|
|
|
switch (enb_ue->ue_ctx_rel_action)
|
|
|
|
{
|
|
|
|
case S1AP_UE_CTX_REL_NO_ACTION:
|
|
|
|
{
|
|
|
|
d_trace(5, " No Action\n");
|
|
|
|
rv = mme_ue_deassociate_enb_ue(enb_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "mme_ue_deassociate_enb_ue() failed");
|
2018-01-11 13:12:48 +00:00
|
|
|
|
2018-01-29 05:48:51 +00:00
|
|
|
rv = enb_ue_remove(enb_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "enb_ue_remove() failed");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case S1AP_UE_CTX_REL_REMOVE_MME_UE_CONTEXT:
|
|
|
|
{
|
|
|
|
d_trace(5, " Action: UE(mme) context\n");
|
|
|
|
rv = mme_ue_deassociate_enb_ue(enb_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "mme_ue_deassociate_enb_ue() failed");
|
2017-09-18 10:30:03 +00:00
|
|
|
|
2018-01-29 05:48:51 +00:00
|
|
|
rv = enb_ue_remove(enb_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "enb_ue_removeI() failed");
|
|
|
|
|
|
|
|
d_assert(mme_ue,,);
|
|
|
|
rv = mme_ue_remove(mme_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "mme_ue_remove() failed");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case S1AP_UE_CTX_REL_DELETE_INDIRECT_TUNNEL:
|
2017-09-18 10:30:03 +00:00
|
|
|
{
|
2018-01-29 05:48:51 +00:00
|
|
|
d_trace(5, " Action: Delete indirect tunnel\n");
|
|
|
|
|
|
|
|
rv = source_ue_deassociate_target_ue(enb_ue);
|
|
|
|
d_assert(rv == CORE_OK,,
|
|
|
|
"source_ue_deassociate_target_ue() failed");
|
|
|
|
|
|
|
|
rv = enb_ue_remove(enb_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "enb_ue_removeI() failed");
|
|
|
|
|
|
|
|
d_assert(mme_ue,,);
|
|
|
|
rv = mme_gtp_send_delete_indirect_data_forwarding_tunnel_request(
|
|
|
|
mme_ue);
|
|
|
|
d_assert(rv == CORE_OK,,
|
|
|
|
"mme_gtp_send_delete_indirect_data_forwarding_tunnel_request()"
|
|
|
|
"failed");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
d_assert(0,, "Invalid Action[%d]", enb_ue->ue_ctx_rel_action);
|
|
|
|
break;
|
2017-09-18 12:58:33 +00:00
|
|
|
}
|
|
|
|
}
|
2017-04-28 04:46:16 +00:00
|
|
|
}
|
2017-08-07 22:58:13 +00:00
|
|
|
|
|
|
|
void s1ap_handle_paging(mme_ue_t *mme_ue)
|
|
|
|
{
|
|
|
|
pkbuf_t *s1apbuf = NULL;
|
2017-10-18 05:05:22 +00:00
|
|
|
hash_index_t *hi = NULL;
|
2017-08-07 22:58:13 +00:00
|
|
|
mme_enb_t *enb = NULL;
|
|
|
|
int i;
|
|
|
|
status_t rv;
|
|
|
|
|
|
|
|
/* Find enB with matched TAI */
|
2017-10-18 05:05:22 +00:00
|
|
|
for (hi = mme_enb_first(); hi; hi = mme_enb_next(hi))
|
2017-08-07 22:58:13 +00:00
|
|
|
{
|
2017-10-18 05:05:22 +00:00
|
|
|
enb = mme_enb_this(hi);
|
2017-12-11 07:55:11 +00:00
|
|
|
for (i = 0; i < enb->num_of_supported_ta_list; i++)
|
2017-08-07 22:58:13 +00:00
|
|
|
{
|
2017-12-11 07:55:11 +00:00
|
|
|
if (!memcmp(&enb->supported_ta_list[i],
|
|
|
|
&mme_ue->tai, sizeof(tai_t)))
|
2017-08-07 22:58:13 +00:00
|
|
|
{
|
|
|
|
if (mme_ue->last_paging_msg)
|
|
|
|
s1apbuf = mme_ue->last_paging_msg;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Buidl S1Ap Paging message */
|
|
|
|
rv = s1ap_build_paging(&s1apbuf, mme_ue);
|
|
|
|
d_assert(rv == CORE_OK && s1apbuf, return,
|
|
|
|
"s1ap build error");
|
|
|
|
|
|
|
|
/* Save it for later use */
|
|
|
|
mme_ue->last_paging_msg = pkbuf_copy(s1apbuf);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Send to enb */
|
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK, return,
|
|
|
|
"s1ap send error");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-09-11 12:14:55 +00:00
|
|
|
|
|
|
|
void s1ap_handle_path_switch_request(
|
|
|
|
mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-09-11 12:14:55 +00:00
|
|
|
int i;
|
|
|
|
|
|
|
|
enb_ue_t *enb_ue = NULL;
|
|
|
|
mme_ue_t *mme_ue = NULL;
|
|
|
|
|
|
|
|
S1ap_PathSwitchRequestIEs_t *ies = NULL;
|
|
|
|
S1ap_EUTRAN_CGI_t *eutran_cgi;
|
|
|
|
S1ap_PLMNidentity_t *pLMNidentity = NULL;
|
|
|
|
S1ap_CellIdentity_t *cell_ID = NULL;
|
|
|
|
S1ap_TAI_t *tai;
|
|
|
|
S1ap_TAC_t *tAC = NULL;
|
|
|
|
S1ap_UESecurityCapabilities_t *ueSecurityCapabilities = NULL;
|
|
|
|
S1ap_EncryptionAlgorithms_t *encryptionAlgorithms = NULL;
|
|
|
|
S1ap_IntegrityProtectionAlgorithms_t *integrityProtectionAlgorithms = NULL;
|
|
|
|
c_uint16_t eea = 0, eia = 0;
|
|
|
|
|
|
|
|
d_assert(enb, return, "Null param");
|
|
|
|
|
|
|
|
ies = &message->s1ap_PathSwitchRequestIEs;
|
|
|
|
d_assert(ies, return, "Null param");
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Path switch request\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-09-11 12:14:55 +00:00
|
|
|
eutran_cgi = &ies->eutran_cgi;
|
|
|
|
d_assert(eutran_cgi, return,);
|
|
|
|
pLMNidentity = &eutran_cgi->pLMNidentity;
|
|
|
|
d_assert(pLMNidentity && pLMNidentity->size == sizeof(plmn_id_t), return,);
|
|
|
|
cell_ID = &eutran_cgi->cell_ID;
|
|
|
|
d_assert(cell_ID, return,);
|
|
|
|
|
|
|
|
tai = &ies->tai;
|
|
|
|
d_assert(tai, return,);
|
|
|
|
pLMNidentity = &tai->pLMNidentity;
|
|
|
|
d_assert(pLMNidentity && pLMNidentity->size == sizeof(plmn_id_t), return,);
|
|
|
|
tAC = &tai->tAC;
|
|
|
|
d_assert(tAC && tAC->size == sizeof(c_uint16_t), return,);
|
|
|
|
|
|
|
|
ueSecurityCapabilities = &ies->ueSecurityCapabilities;
|
|
|
|
d_assert(ueSecurityCapabilities, return,);
|
|
|
|
encryptionAlgorithms =
|
|
|
|
&ueSecurityCapabilities->encryptionAlgorithms;
|
|
|
|
integrityProtectionAlgorithms =
|
|
|
|
&ueSecurityCapabilities->integrityProtectionAlgorithms;
|
|
|
|
|
|
|
|
enb_ue = enb_ue_find_by_mme_ue_s1ap_id(ies->sourceMME_UE_S1AP_ID);
|
|
|
|
if (!enb_ue)
|
|
|
|
{
|
|
|
|
d_error("Cannot find UE from sourceMME-UE-S1AP-ID[%d] and eNB[%s:%d]",
|
|
|
|
ies->sourceMME_UE_S1AP_ID,
|
2017-11-25 14:28:34 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2017-09-11 12:14:55 +00:00
|
|
|
|
|
|
|
s1ap_send_path_switch_failure(enb, ies->eNB_UE_S1AP_ID,
|
2018-01-21 11:31:28 +00:00
|
|
|
ies->sourceMME_UE_S1AP_ID,
|
|
|
|
S1ap_Cause_PR_radioNetwork,
|
|
|
|
S1ap_CauseRadioNetwork_unknown_mme_ue_s1ap_id);
|
2017-09-11 12:14:55 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id, enb_ue->mme_ue_s1ap_id);
|
|
|
|
|
2017-09-11 12:14:55 +00:00
|
|
|
mme_ue = enb_ue->mme_ue;
|
|
|
|
d_assert(mme_ue, return, "Null param");
|
|
|
|
|
2017-09-12 01:48:42 +00:00
|
|
|
if (SECURITY_CONTEXT_IS_VALID(mme_ue))
|
|
|
|
{
|
|
|
|
mme_ue->nhcc++;
|
|
|
|
mme_kdf_nh(mme_ue->kasme, mme_ue->nh, mme_ue->nh);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
s1ap_send_path_switch_failure(enb, ies->eNB_UE_S1AP_ID,
|
2018-01-21 11:31:28 +00:00
|
|
|
ies->sourceMME_UE_S1AP_ID,
|
|
|
|
S1ap_Cause_PR_nas, S1ap_CauseNas_authentication_failure);
|
2017-09-12 01:48:42 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-09-11 12:14:55 +00:00
|
|
|
enb_ue->enb_ue_s1ap_id = ies->eNB_UE_S1AP_ID;
|
|
|
|
|
2017-09-14 08:40:01 +00:00
|
|
|
memcpy(&mme_ue->tai.plmn_id, pLMNidentity->buf,
|
|
|
|
sizeof(mme_ue->tai.plmn_id));
|
|
|
|
memcpy(&mme_ue->tai.tac, tAC->buf, sizeof(mme_ue->tai.tac));
|
|
|
|
mme_ue->tai.tac = ntohs(mme_ue->tai.tac);
|
|
|
|
memcpy(&mme_ue->e_cgi.plmn_id, pLMNidentity->buf,
|
|
|
|
sizeof(mme_ue->e_cgi.plmn_id));
|
|
|
|
memcpy(&mme_ue->e_cgi.cell_id, cell_ID->buf, sizeof(mme_ue->e_cgi.cell_id));
|
|
|
|
mme_ue->e_cgi.cell_id = (ntohl(mme_ue->e_cgi.cell_id) >> 4);
|
2017-09-11 12:14:55 +00:00
|
|
|
|
|
|
|
memcpy(&eea, encryptionAlgorithms->buf, sizeof(eea));
|
|
|
|
eea = ntohs(eea);
|
2017-09-12 14:07:55 +00:00
|
|
|
mme_ue->ue_network_capability.eea = eea >> 9;
|
|
|
|
mme_ue->ue_network_capability.eea0 = 1;
|
2017-09-11 12:14:55 +00:00
|
|
|
|
|
|
|
memcpy(&eia, integrityProtectionAlgorithms->buf, sizeof(eia));
|
|
|
|
eia = ntohs(eia);
|
2017-09-12 14:07:55 +00:00
|
|
|
mme_ue->ue_network_capability.eia = eia >> 9;
|
|
|
|
mme_ue->ue_network_capability.eia0 = 0;
|
2017-09-11 12:14:55 +00:00
|
|
|
|
|
|
|
for (i = 0; i < ies->e_RABToBeSwitchedDLList.
|
|
|
|
s1ap_E_RABToBeSwitchedDLItem.count; i++)
|
|
|
|
{
|
2017-09-11 14:58:16 +00:00
|
|
|
status_t rv;
|
|
|
|
|
2017-09-11 12:14:55 +00:00
|
|
|
mme_bearer_t *bearer = NULL;
|
|
|
|
S1ap_E_RABToBeSwitchedDLItem_t *e_rab = NULL;
|
|
|
|
|
|
|
|
e_rab = (S1ap_E_RABToBeSwitchedDLItem_t *)ies->e_RABToBeSwitchedDLList.
|
|
|
|
s1ap_E_RABToBeSwitchedDLItem.array[i];
|
|
|
|
d_assert(e_rab, return, "Null param");
|
|
|
|
|
|
|
|
bearer = mme_bearer_find_by_ue_ebi(mme_ue, e_rab->e_RAB_ID);
|
|
|
|
d_assert(bearer, return, "Null param");
|
|
|
|
|
|
|
|
memcpy(&bearer->enb_s1u_teid, e_rab->gTP_TEID.buf,
|
|
|
|
sizeof(bearer->enb_s1u_teid));
|
|
|
|
bearer->enb_s1u_teid = ntohl(bearer->enb_s1u_teid);
|
2017-12-07 08:23:45 +00:00
|
|
|
rv = s1ap_BIT_STRING_to_ip(
|
|
|
|
&e_rab->transportLayerAddress, &bearer->enb_s1u_ip);
|
|
|
|
d_assert(rv == CORE_OK, return,);
|
2017-09-11 14:58:16 +00:00
|
|
|
|
2017-09-13 02:18:17 +00:00
|
|
|
GTP_COUNTER_INCREMENT(
|
|
|
|
mme_ue, GTP_COUNTER_MODIFY_BEARER_BY_PATH_SWITCH);
|
|
|
|
|
2017-09-14 08:29:34 +00:00
|
|
|
rv = mme_gtp_send_modify_bearer_request(bearer, 1);
|
2017-09-11 14:58:16 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "gtp send failed");
|
2017-09-11 12:14:55 +00:00
|
|
|
}
|
|
|
|
|
2017-09-15 21:02:14 +00:00
|
|
|
/* Switch to enb */
|
|
|
|
enb_ue_switch_to_enb(enb_ue, enb);
|
2017-09-11 12:14:55 +00:00
|
|
|
}
|
2017-09-12 05:16:22 +00:00
|
|
|
|
|
|
|
void s1ap_handle_handover_required(mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-09-12 14:07:55 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
enb_ue_t *source_ue = NULL;
|
2017-09-12 14:07:55 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
|
|
|
|
|
|
|
S1ap_HandoverRequiredIEs_t *ies = NULL;
|
|
|
|
|
|
|
|
d_assert(enb, return,);
|
|
|
|
|
|
|
|
ies = &message->s1ap_HandoverRequiredIEs;
|
|
|
|
d_assert(ies, return,);
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Handover required\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
source_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
d_assert(source_ue, return,
|
2017-09-12 14:07:55 +00:00
|
|
|
"Cannot find UE for eNB-UE-S1AP-ID[%d] and eNB[%s:%d]",
|
|
|
|
ies->eNB_UE_S1AP_ID,
|
2017-11-25 14:28:34 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2017-09-14 09:01:26 +00:00
|
|
|
d_assert(source_ue->mme_ue_s1ap_id == ies->mme_ue_s1ap_id, return,
|
2017-09-12 14:07:55 +00:00
|
|
|
"Conflict MME-UE-S1AP-ID : %d != %d\n",
|
2017-09-14 09:01:26 +00:00
|
|
|
source_ue->mme_ue_s1ap_id, ies->mme_ue_s1ap_id);
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Source : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
source_ue->enb_ue_s1ap_id, source_ue->mme_ue_s1ap_id);
|
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
mme_ue = source_ue->mme_ue;
|
2017-09-12 14:07:55 +00:00
|
|
|
d_assert(mme_ue, return,);
|
|
|
|
|
|
|
|
if (SECURITY_CONTEXT_IS_VALID(mme_ue))
|
|
|
|
{
|
|
|
|
mme_ue->nhcc++;
|
|
|
|
mme_kdf_nh(mme_ue->kasme, mme_ue->nh, mme_ue->nh);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2017-09-15 04:28:07 +00:00
|
|
|
rv = s1ap_send_handover_preparation_failure(source_ue, &ies->cause);
|
|
|
|
d_assert(rv == CORE_OK, return, "s1ap send error");
|
|
|
|
|
|
|
|
return;
|
2017-09-12 14:07:55 +00:00
|
|
|
}
|
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
source_ue->handover_type = ies->handoverType;
|
2017-09-13 12:51:02 +00:00
|
|
|
|
2017-09-12 14:07:55 +00:00
|
|
|
rv = s1ap_send_handover_request(mme_ue, ies);
|
|
|
|
d_assert(rv == CORE_OK,, "s1ap send error");
|
2017-09-12 05:16:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void s1ap_handle_handover_request_ack(mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-09-13 07:22:39 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-09-12 14:07:55 +00:00
|
|
|
int i;
|
|
|
|
|
2017-09-15 03:06:26 +00:00
|
|
|
enb_ue_t *source_ue = NULL;
|
2017-09-14 09:01:26 +00:00
|
|
|
enb_ue_t *target_ue = NULL;
|
2017-09-12 14:07:55 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
|
|
|
|
|
|
|
S1ap_HandoverRequestAcknowledgeIEs_t *ies = NULL;
|
|
|
|
|
|
|
|
d_assert(enb, return,);
|
|
|
|
|
|
|
|
ies = &message->s1ap_HandoverRequestAcknowledgeIEs;
|
|
|
|
d_assert(ies, return,);
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Handover request acknowledge\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
target_ue = enb_ue_find_by_mme_ue_s1ap_id(ies->mme_ue_s1ap_id);
|
|
|
|
d_assert(target_ue, return,
|
2017-09-12 14:07:55 +00:00
|
|
|
"Cannot find UE for MME-UE-S1AP-ID[%d] and eNB[%s:%d]",
|
|
|
|
ies->mme_ue_s1ap_id,
|
2017-11-25 14:28:34 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
target_ue->enb_ue_s1ap_id = ies->eNB_UE_S1AP_ID;
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2017-09-15 03:06:26 +00:00
|
|
|
source_ue = target_ue->source_ue;
|
|
|
|
d_assert(source_ue, return,);
|
2017-09-18 12:30:04 +00:00
|
|
|
mme_ue = source_ue->mme_ue;
|
|
|
|
d_assert(mme_ue, return,);
|
2017-09-12 14:07:55 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Source : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
source_ue->enb_ue_s1ap_id, source_ue->mme_ue_s1ap_id);
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Target : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
target_ue->enb_ue_s1ap_id, target_ue->mme_ue_s1ap_id);
|
|
|
|
|
2017-09-12 14:07:55 +00:00
|
|
|
for (i = 0; i < ies->e_RABAdmittedList.s1ap_E_RABAdmittedItem.count; i++)
|
|
|
|
{
|
|
|
|
mme_bearer_t *bearer = NULL;
|
|
|
|
S1ap_E_RABAdmittedItem_t *e_rab = NULL;
|
|
|
|
|
|
|
|
e_rab = (S1ap_E_RABAdmittedItem_t *)ies->e_RABAdmittedList.
|
|
|
|
s1ap_E_RABAdmittedItem.array[i];
|
|
|
|
d_assert(e_rab, return, "Null param");
|
|
|
|
|
|
|
|
bearer = mme_bearer_find_by_ue_ebi(mme_ue, e_rab->e_RAB_ID);
|
|
|
|
d_assert(bearer, return, "Null param");
|
|
|
|
|
2017-09-14 02:12:02 +00:00
|
|
|
memcpy(&bearer->target_s1u_teid, e_rab->gTP_TEID.buf,
|
|
|
|
sizeof(bearer->target_s1u_teid));
|
|
|
|
bearer->target_s1u_teid = ntohl(bearer->target_s1u_teid);
|
2017-12-07 08:23:45 +00:00
|
|
|
rv = s1ap_BIT_STRING_to_ip(
|
|
|
|
&e_rab->transportLayerAddress, &bearer->target_s1u_ip);
|
|
|
|
d_assert(rv == CORE_OK, return,);
|
2017-09-12 14:07:55 +00:00
|
|
|
|
|
|
|
if (e_rab->dL_transportLayerAddress && e_rab->dL_gTP_TEID)
|
|
|
|
{
|
|
|
|
d_assert(e_rab->dL_gTP_TEID->buf, return,);
|
|
|
|
d_assert(e_rab->dL_transportLayerAddress->buf, return,);
|
|
|
|
memcpy(&bearer->enb_dl_teid, e_rab->dL_gTP_TEID->buf,
|
|
|
|
sizeof(bearer->enb_dl_teid));
|
|
|
|
bearer->enb_dl_teid = ntohl(bearer->enb_dl_teid);
|
2017-12-07 08:23:45 +00:00
|
|
|
rv = s1ap_BIT_STRING_to_ip(
|
|
|
|
e_rab->dL_transportLayerAddress, &bearer->enb_dl_ip);
|
|
|
|
d_assert(rv == CORE_OK, return,);
|
2017-09-12 14:07:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (e_rab->uL_S1ap_TransportLayerAddress && e_rab->uL_S1ap_GTP_TEID)
|
|
|
|
{
|
|
|
|
d_assert(e_rab->uL_S1ap_GTP_TEID->buf, return,);
|
|
|
|
d_assert(e_rab->uL_S1ap_TransportLayerAddress->buf, return,);
|
|
|
|
memcpy(&bearer->enb_ul_teid, e_rab->uL_S1ap_GTP_TEID->buf,
|
|
|
|
sizeof(bearer->enb_ul_teid));
|
|
|
|
bearer->enb_ul_teid = ntohl(bearer->enb_ul_teid);
|
2017-12-07 08:23:45 +00:00
|
|
|
rv = s1ap_BIT_STRING_to_ip(
|
|
|
|
e_rab->uL_S1ap_TransportLayerAddress, &bearer->enb_ul_ip);
|
|
|
|
d_assert(rv == CORE_OK, return,);
|
2017-09-12 14:07:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-13 02:57:17 +00:00
|
|
|
S1AP_STORE_DATA(
|
|
|
|
&mme_ue->container, &ies->target_ToSource_TransparentContainer);
|
|
|
|
|
2017-09-13 14:49:31 +00:00
|
|
|
if (i > 0)
|
|
|
|
{
|
|
|
|
rv = mme_gtp_send_create_indirect_data_forwarding_tunnel_request(
|
|
|
|
mme_ue);
|
|
|
|
d_assert(rv == CORE_OK, return, "gtp send failed");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2017-09-15 03:06:26 +00:00
|
|
|
rv = s1ap_send_handover_command(source_ue);
|
2017-09-13 14:49:31 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "gtp send failed");
|
|
|
|
}
|
2017-09-12 05:16:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void s1ap_handle_handover_failure(mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-09-15 04:28:07 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-09-15 04:28:07 +00:00
|
|
|
|
|
|
|
S1ap_HandoverFailureIEs_t *ies = NULL;
|
|
|
|
enb_ue_t *target_ue = NULL;
|
|
|
|
enb_ue_t *source_ue = NULL;
|
|
|
|
|
|
|
|
d_assert(enb, return,);
|
|
|
|
|
|
|
|
ies = &message->s1ap_HandoverFailureIEs;
|
|
|
|
d_assert(ies, return,);
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Handover failure\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-09-15 04:28:07 +00:00
|
|
|
target_ue = enb_ue_find_by_mme_ue_s1ap_id(ies->mme_ue_s1ap_id);
|
|
|
|
d_assert(target_ue, return,
|
|
|
|
"Cannot find UE for MME-UE-S1AP-ID[%d] and eNB[%s:%d]",
|
|
|
|
ies->mme_ue_s1ap_id,
|
2017-11-25 14:28:34 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2017-09-15 04:28:07 +00:00
|
|
|
|
|
|
|
source_ue = target_ue->source_ue;
|
|
|
|
d_assert(source_ue, return,);
|
2018-01-22 14:14:20 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Source : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
source_ue->enb_ue_s1ap_id, source_ue->mme_ue_s1ap_id);
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Target : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
target_ue->enb_ue_s1ap_id, target_ue->mme_ue_s1ap_id);
|
|
|
|
|
2017-09-15 04:28:07 +00:00
|
|
|
rv = s1ap_send_handover_preparation_failure(source_ue, &ies->cause);
|
|
|
|
d_assert(rv == CORE_OK, return, "s1ap send error");
|
|
|
|
|
2018-01-21 11:31:28 +00:00
|
|
|
rv = s1ap_send_ue_context_release_command(
|
|
|
|
target_ue, S1ap_Cause_PR_radioNetwork,
|
|
|
|
S1ap_CauseRadioNetwork_ho_failure_in_target_EPC_eNB_or_target_system,
|
|
|
|
S1AP_UE_CTX_REL_DELETE_INDIRECT_TUNNEL, 0);
|
2017-09-15 04:28:07 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "s1ap send error");
|
2017-09-12 05:16:22 +00:00
|
|
|
}
|
|
|
|
|
2017-09-15 03:06:26 +00:00
|
|
|
void s1ap_handle_handover_cancel(mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-09-15 03:06:26 +00:00
|
|
|
|
|
|
|
enb_ue_t *source_ue = NULL;
|
2017-09-18 10:30:03 +00:00
|
|
|
enb_ue_t *target_ue = NULL;
|
2017-09-15 03:06:26 +00:00
|
|
|
|
|
|
|
S1ap_HandoverCancelIEs_t *ies = NULL;
|
|
|
|
|
|
|
|
d_assert(enb, return,);
|
|
|
|
|
|
|
|
ies = &message->s1ap_HandoverCancelIEs;
|
|
|
|
d_assert(ies, return,);
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Handover cancel\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-09-15 03:06:26 +00:00
|
|
|
source_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
d_assert(source_ue, return,
|
|
|
|
"Cannot find UE for eNB-UE-S1AP-ID[%d] and eNB[%s:%d]",
|
|
|
|
ies->eNB_UE_S1AP_ID,
|
2017-11-25 14:28:34 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2017-09-15 03:06:26 +00:00
|
|
|
d_assert(source_ue->mme_ue_s1ap_id == ies->mme_ue_s1ap_id, return,
|
|
|
|
"Conflict MME-UE-S1AP-ID : %d != %d\n",
|
|
|
|
source_ue->mme_ue_s1ap_id, ies->mme_ue_s1ap_id);
|
|
|
|
|
2017-09-18 10:30:03 +00:00
|
|
|
target_ue = source_ue->target_ue;
|
|
|
|
d_assert(target_ue, return,);
|
2017-09-15 03:06:26 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Source : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
source_ue->enb_ue_s1ap_id, source_ue->mme_ue_s1ap_id);
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Target : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
target_ue->enb_ue_s1ap_id, target_ue->mme_ue_s1ap_id);
|
|
|
|
|
2017-09-18 10:30:03 +00:00
|
|
|
rv = s1ap_send_handover_cancel_ack(source_ue);
|
|
|
|
d_assert(rv == CORE_OK,, "s1ap send error");
|
2017-09-15 04:28:07 +00:00
|
|
|
|
2018-01-21 11:31:28 +00:00
|
|
|
rv = s1ap_send_ue_context_release_command(
|
|
|
|
target_ue, S1ap_Cause_PR_radioNetwork,
|
|
|
|
S1ap_CauseRadioNetwork_handover_cancelled,
|
2018-01-11 13:12:48 +00:00
|
|
|
S1AP_UE_CTX_REL_DELETE_INDIRECT_TUNNEL, 300);
|
2017-09-18 10:30:03 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "s1ap send error");
|
2017-09-15 03:06:26 +00:00
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Handover Cancel : "
|
2017-09-15 03:06:26 +00:00
|
|
|
"UE[eNB-UE-S1AP-ID(%d)] --> eNB[%s:%d]\n",
|
|
|
|
source_ue->enb_ue_s1ap_id,
|
2017-11-25 14:28:34 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2017-09-15 03:06:26 +00:00
|
|
|
}
|
|
|
|
|
2017-09-12 05:16:22 +00:00
|
|
|
void s1ap_handle_enb_status_transfer(mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-09-14 02:12:02 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-09-13 14:49:31 +00:00
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
enb_ue_t *source_ue = NULL, *target_ue = NULL;
|
2017-09-13 14:49:31 +00:00
|
|
|
|
|
|
|
S1ap_ENBStatusTransferIEs_t *ies = NULL;
|
|
|
|
|
|
|
|
d_assert(enb, return,);
|
|
|
|
|
|
|
|
ies = &message->s1ap_ENBStatusTransferIEs;
|
|
|
|
d_assert(ies, return,);
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] ENB status transfer\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
source_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
d_assert(source_ue, return,
|
2017-09-13 14:49:31 +00:00
|
|
|
"Cannot find UE for eNB-UE-S1AP-ID[%d] and eNB[%s:%d]",
|
|
|
|
ies->eNB_UE_S1AP_ID,
|
2017-11-25 14:28:34 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2017-09-14 09:01:26 +00:00
|
|
|
d_assert(source_ue->mme_ue_s1ap_id == ies->mme_ue_s1ap_id, return,
|
2017-09-13 14:49:31 +00:00
|
|
|
"Conflict MME-UE-S1AP-ID : %d != %d\n",
|
2017-09-14 09:01:26 +00:00
|
|
|
source_ue->mme_ue_s1ap_id, ies->mme_ue_s1ap_id);
|
2017-09-13 14:49:31 +00:00
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
target_ue = source_ue->target_ue;
|
|
|
|
d_assert(target_ue, return,);
|
2017-09-13 14:49:31 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Source : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
source_ue->enb_ue_s1ap_id, source_ue->mme_ue_s1ap_id);
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Target : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
target_ue->enb_ue_s1ap_id, target_ue->mme_ue_s1ap_id);
|
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
rv = s1ap_send_mme_status_transfer(target_ue, ies);
|
2017-09-14 02:12:02 +00:00
|
|
|
d_assert(rv == CORE_OK,,);
|
2017-09-12 05:16:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void s1ap_handle_handover_notification(mme_enb_t *enb, s1ap_message_t *message)
|
|
|
|
{
|
2017-09-14 02:12:02 +00:00
|
|
|
status_t rv;
|
2017-11-23 10:44:49 +00:00
|
|
|
char buf[CORE_ADDRSTRLEN];
|
2017-09-14 02:12:02 +00:00
|
|
|
|
2017-09-18 12:30:04 +00:00
|
|
|
enb_ue_t *source_ue = NULL;
|
2017-09-14 09:01:26 +00:00
|
|
|
enb_ue_t *target_ue = NULL;
|
2017-09-14 02:12:02 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
|
|
|
mme_sess_t *sess = NULL;
|
|
|
|
mme_bearer_t *bearer = NULL;
|
|
|
|
|
|
|
|
S1ap_HandoverNotifyIEs_t *ies = NULL;
|
|
|
|
S1ap_EUTRAN_CGI_t *eutran_cgi;
|
|
|
|
S1ap_PLMNidentity_t *pLMNidentity = NULL;
|
|
|
|
S1ap_CellIdentity_t *cell_ID = NULL;
|
|
|
|
S1ap_TAI_t *tai;
|
|
|
|
S1ap_TAC_t *tAC = NULL;
|
|
|
|
|
|
|
|
d_assert(enb, return,);
|
|
|
|
|
|
|
|
ies = &message->s1ap_HandoverNotifyIEs;
|
|
|
|
d_assert(ies, return,);
|
|
|
|
|
2018-01-22 14:14:20 +00:00
|
|
|
d_trace(3, "[MME] Handover notification\n");
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " IP[%s] ENB_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
|
|
|
|
2017-09-14 02:12:02 +00:00
|
|
|
eutran_cgi = &ies->eutran_cgi;
|
|
|
|
d_assert(eutran_cgi, return,);
|
|
|
|
pLMNidentity = &eutran_cgi->pLMNidentity;
|
|
|
|
d_assert(pLMNidentity && pLMNidentity->size == sizeof(plmn_id_t), return,);
|
|
|
|
cell_ID = &eutran_cgi->cell_ID;
|
|
|
|
d_assert(cell_ID, return,);
|
|
|
|
|
|
|
|
tai = &ies->tai;
|
|
|
|
d_assert(tai, return,);
|
|
|
|
pLMNidentity = &tai->pLMNidentity;
|
|
|
|
d_assert(pLMNidentity && pLMNidentity->size == sizeof(plmn_id_t), return,);
|
|
|
|
tAC = &tai->tAC;
|
|
|
|
d_assert(tAC && tAC->size == sizeof(c_uint16_t), return,);
|
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
target_ue = enb_ue_find_by_enb_ue_s1ap_id(enb, ies->eNB_UE_S1AP_ID);
|
|
|
|
d_assert(target_ue, return,
|
2017-09-14 02:12:02 +00:00
|
|
|
"Cannot find UE for eNB-UE-S1AP-ID[%d] and eNB[%s:%d]",
|
|
|
|
ies->eNB_UE_S1AP_ID,
|
2017-11-25 14:28:34 +00:00
|
|
|
CORE_ADDR(enb->addr, buf), enb->enb_id);
|
2017-09-14 09:01:26 +00:00
|
|
|
d_assert(target_ue->mme_ue_s1ap_id == ies->mme_ue_s1ap_id, return,
|
2017-09-14 02:12:02 +00:00
|
|
|
"Conflict MME-UE-S1AP-ID : %d != %d\n",
|
2017-09-14 09:01:26 +00:00
|
|
|
target_ue->mme_ue_s1ap_id, ies->mme_ue_s1ap_id);
|
2017-09-14 02:12:02 +00:00
|
|
|
|
2017-09-18 12:30:04 +00:00
|
|
|
source_ue = target_ue->source_ue;
|
|
|
|
d_assert(source_ue, return,);
|
|
|
|
mme_ue = source_ue->mme_ue;
|
2017-09-14 02:12:02 +00:00
|
|
|
d_assert(mme_ue, return,);
|
2017-09-14 09:01:26 +00:00
|
|
|
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Source : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
source_ue->enb_ue_s1ap_id, source_ue->mme_ue_s1ap_id);
|
2018-01-23 06:38:07 +00:00
|
|
|
d_trace(5, " Target : ENB_UE_S1AP_ID[%d] MME_UE_S1AP_ID[%d]\n",
|
2018-01-22 14:14:20 +00:00
|
|
|
target_ue->enb_ue_s1ap_id, target_ue->mme_ue_s1ap_id);
|
|
|
|
|
2017-09-14 09:01:26 +00:00
|
|
|
mme_ue_associate_enb_ue(mme_ue, target_ue);
|
2017-09-14 02:12:02 +00:00
|
|
|
|
2017-09-14 08:40:01 +00:00
|
|
|
memcpy(&mme_ue->tai.plmn_id, pLMNidentity->buf,
|
|
|
|
sizeof(mme_ue->tai.plmn_id));
|
|
|
|
memcpy(&mme_ue->tai.tac, tAC->buf, sizeof(mme_ue->tai.tac));
|
|
|
|
mme_ue->tai.tac = ntohs(mme_ue->tai.tac);
|
|
|
|
memcpy(&mme_ue->e_cgi.plmn_id, pLMNidentity->buf,
|
|
|
|
sizeof(mme_ue->e_cgi.plmn_id));
|
|
|
|
memcpy(&mme_ue->e_cgi.cell_id, cell_ID->buf, sizeof(mme_ue->e_cgi.cell_id));
|
|
|
|
mme_ue->e_cgi.cell_id = (ntohl(mme_ue->e_cgi.cell_id) >> 4);
|
2017-09-14 02:12:02 +00:00
|
|
|
|
|
|
|
sess = mme_sess_first(mme_ue);
|
|
|
|
while(sess)
|
|
|
|
{
|
|
|
|
bearer = mme_bearer_first(sess);
|
|
|
|
while(bearer)
|
|
|
|
{
|
|
|
|
bearer->enb_s1u_teid = bearer->target_s1u_teid;
|
2017-12-07 08:23:45 +00:00
|
|
|
memcpy(&bearer->enb_s1u_ip, &bearer->target_s1u_ip, sizeof(ip_t));
|
2017-09-14 02:12:02 +00:00
|
|
|
|
|
|
|
GTP_COUNTER_INCREMENT(
|
|
|
|
mme_ue, GTP_COUNTER_MODIFY_BEARER_BY_HANDOVER_NOTIFY);
|
|
|
|
|
2017-09-14 08:29:34 +00:00
|
|
|
rv = mme_gtp_send_modify_bearer_request(bearer, 1);
|
2017-09-14 02:12:02 +00:00
|
|
|
d_assert(rv == CORE_OK, return, "gtp send failed");
|
|
|
|
|
|
|
|
bearer = mme_bearer_next(bearer);
|
|
|
|
}
|
|
|
|
sess = mme_sess_next(sess);
|
|
|
|
}
|
2017-09-12 05:16:22 +00:00
|
|
|
}
|