/* * Copyright (C) 2019 by Sukchan Lee * * This file is part of Open5GS. * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include "mme-event.h" #include "mme-timer.h" #include "s1ap-handler.h" #include "mme-fd-path.h" #include "emm-handler.h" #include "emm-build.h" #include "esm-handler.h" #include "nas-path.h" #include "nas-security.h" #include "s1ap-path.h" #include "sgsap-types.h" #include "sgsap-path.h" #include "mme-gtp-path.h" #include "mme-path.h" #include "mme-sm.h" #undef OGS_LOG_DOMAIN #define OGS_LOG_DOMAIN __emm_log_domain void emm_state_initial(ogs_fsm_t *s, mme_event_t *e) { ogs_assert(s); mme_sm_debug(e); OGS_FSM_TRAN(s, &emm_state_de_registered); } void emm_state_final(ogs_fsm_t *s, mme_event_t *e) { ogs_assert(s); mme_sm_debug(e); } static void common_register_state(ogs_fsm_t *s, mme_event_t *e); void emm_state_de_registered(ogs_fsm_t *s, mme_event_t *e) { mme_ue_t *mme_ue = NULL; ogs_assert(s); ogs_assert(e); mme_sm_debug(e); mme_ue = e->mme_ue; ogs_assert(mme_ue); switch (e->id) { case OGS_FSM_ENTRY_SIG: CLEAR_SERVICE_INDICATOR(mme_ue); CLEAR_MME_UE_ALL_TIMERS(mme_ue); break; case OGS_FSM_EXIT_SIG: break; default: break; } common_register_state(s, e); } void emm_state_registered(ogs_fsm_t *s, mme_event_t *e) { ogs_assert(s); ogs_assert(e); mme_sm_debug(e); common_register_state(s, e); } static void common_register_state(ogs_fsm_t *s, mme_event_t *e) { int rv; mme_ue_t *mme_ue = NULL; enb_ue_t *enb_ue = NULL; ogs_nas_eps_message_t *message = NULL; ogs_nas_security_header_type_t h; ogs_assert(e); mme_ue = e->mme_ue; ogs_assert(mme_ue); switch (e->id) { case OGS_FSM_ENTRY_SIG: break; case OGS_FSM_EXIT_SIG: break; case MME_EVT_EMM_MESSAGE: message = e->nas_message; ogs_assert(message); enb_ue = enb_ue_cycle(mme_ue->enb_ue); ogs_assert(enb_ue); h.type = e->nas_type; if (message->emm.h.security_header_type == OGS_NAS_SECURITY_HEADER_FOR_SERVICE_REQUEST_MESSAGE) { ogs_info("[%s] Service request", mme_ue->imsi_bcd); rv = emm_handle_service_request( mme_ue, &message->emm.service_request); if (rv != OGS_OK) { ogs_error("emm_handle_service_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } if (!MME_UE_HAVE_IMSI(mme_ue)) { ogs_info("Service request : Unknown UE"); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!SECURITY_CONTEXT_IS_VALID(mme_ue)) { ogs_warn("No Security Context : IMSI[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!SESSION_CONTEXT_IS_AVAILABLE(mme_ue)) { ogs_warn("No Session Context : IMSI[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!ACTIVE_EPS_BEARERS_IS_AVAIABLE(mme_ue)) { ogs_warn("No active EPS bearers : IMSI[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_NO_EPS_BEARER_CONTEXT_ACTIVATED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } ogs_assert(OGS_OK == s1ap_send_initial_context_setup_request(mme_ue)); OGS_FSM_TRAN(s, &emm_state_registered); break; } switch (message->emm.h.message_type) { case OGS_NAS_EPS_IDENTITY_RESPONSE: ogs_info("Identity response"); CLEAR_MME_UE_TIMER(mme_ue->t3470); rv = emm_handle_identity_response(mme_ue, &message->emm.identity_response); if (rv != OGS_OK) { ogs_error("emm_handle_identity_response() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } if (!MME_UE_HAVE_IMSI(mme_ue)) { ogs_error("No IMSI"); OGS_FSM_TRAN(s, emm_state_exception); break; } if (SESSION_CONTEXT_IS_AVAILABLE(mme_ue)) { mme_gtp_send_delete_all_sessions(mme_ue, OGS_GTP_DELETE_SEND_AUTHENTICATION_REQUEST); } else { mme_s6a_send_air(mme_ue, NULL); } OGS_FSM_TRAN(s, &emm_state_authentication); break; case OGS_NAS_EPS_ATTACH_REQUEST: ogs_info("[%s] Attach request", mme_ue->imsi_bcd); rv = emm_handle_attach_request( mme_ue, &message->emm.attach_request, e->pkbuf); if (rv != OGS_OK) { ogs_error("emm_handle_attach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } if (!MME_UE_HAVE_IMSI(mme_ue)) { CLEAR_MME_UE_TIMER(mme_ue->t3470); ogs_assert(OGS_OK == nas_eps_send_identity_request(mme_ue)); break; } if (h.integrity_protected && SECURITY_CONTEXT_IS_VALID(mme_ue)) { if (SESSION_CONTEXT_IS_AVAILABLE(mme_ue)) { mme_gtp_send_delete_all_sessions(mme_ue, OGS_GTP_DELETE_HANDLE_PDN_CONNECTIVITY_REQUEST); } else { rv = nas_eps_send_emm_to_esm(mme_ue, &mme_ue->pdn_connectivity_request); if (rv != OGS_OK) { ogs_error("nas_eps_send_emm_to_esm() failed"); ogs_assert(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } } OGS_FSM_TRAN(s, &emm_state_initial_context_setup); } else { if (SESSION_CONTEXT_IS_AVAILABLE(mme_ue)) { mme_gtp_send_delete_all_sessions(mme_ue, OGS_GTP_DELETE_SEND_AUTHENTICATION_REQUEST); } else { mme_s6a_send_air(mme_ue, NULL); } OGS_FSM_TRAN(s, &emm_state_authentication); } break; case OGS_NAS_EPS_TRACKING_AREA_UPDATE_REQUEST: ogs_info("[%s] Tracking area update request", mme_ue->imsi_bcd); rv = emm_handle_tau_request(mme_ue, &message->emm.tracking_area_update_request, e->pkbuf); if (rv != OGS_OK) { ogs_error("emm_handle_tau_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } if (!MME_UE_HAVE_IMSI(mme_ue)) { ogs_info("TAU request : Unknown UE"); ogs_assert(OGS_OK == nas_eps_send_tau_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!SESSION_CONTEXT_IS_AVAILABLE(mme_ue)) { ogs_warn("No PDN Connection : UE[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_tau_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, emm_state_exception); break; } if (!ACTIVE_EPS_BEARERS_IS_AVAIABLE(mme_ue)) { ogs_warn("No active EPS bearers : IMSI[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_tau_reject(mme_ue, EMM_CAUSE_NO_EPS_BEARER_CONTEXT_ACTIVATED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!h.integrity_protected || !SECURITY_CONTEXT_IS_VALID(mme_ue)) { mme_s6a_send_air(mme_ue, NULL); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_authentication); break; } /* * * 1. InitialUEMessage + Tracking area update request * Active flag : No bearer establishment requested (0) * EPS update type : TA updating (0) or Periodic updating (3) * 2. DownlinkNASTransport + Tracking area update accept * EPS update result value : TA updated (0) * 3. UEContextReleaseCommand * Cause : nas(2) + normal-release(0) * 4. UEContextReleaseComplete * * * 1. InitialUEMessage + Tracking area update request * Active flag : bearer establishment requested (1) * EPS update type : Combined TA/LA updating with IMSI attach (2) * 2. InitialContextSetupRequest + Tracking area update accept * EPS update result : Combined TA/LA updated (1) * New GUTI * 3. InitialContextSetupResponse * 4. UplinkNASTransport + Tracking area update complete * * * 1. S1SetupRequest/S1SetupResponse * 2. InitialUEMessage + Tracking area update request * Active flag : bearer establishment requested (1) * EPS update type : Periodic updating (3) * 3. InitialContextSetupRequest + Tracking area update accept * EPS update result : TA updated (0) * No GUTI * 4. InitialContextSetupResponse * * * 1. HandoverNotify (Target) * 2. UplinkNASTransport + Tracking area update request (Target) * Active flag : bearer establishment requested (1) * EPS update type : TA updating (0) * 3. UEContextReleaseCommand (Source) * Cause : radioNetwork(0) + successful-handover(2) * 4. UEcontextReleaseComplete (Source) * 5. DownlinkNASTransport + Tracking area update accept (Target) * EPS update result : TA updated (0) * * * 1. HandoverNotify (Target) * * 2. UEContextReleaseCommand (Source) * Cause : radioNetwork(0) + successful-handover(2) * 3. UEcontextReleaseComplete (Source) * 4. UEContextReleaseRequest (Target) * Cause : transport(1) + transport-resource-unavailable(0) * 5. UEContextReleaseCommand (Target) * Cause : nas(2) + normal-release(0) * 6. UEcontextReleaseComplete (Target) * * 7. InitialUEMessage + Tracking area update request (Target) * Active flag : bearer establishment requested (1) * EPS update type : TA updating (0) * 8. InitialContextSetupRequest + Tracking area update accept * EPS update result : TA updated (0) * New GUTI * 9. InitialContextSetupResponse (Target) * EPS update result : TA updated (0) * 10. UplinkNASTransport + Tracking area update complete (Target) */ if (e->s1ap_code == S1AP_ProcedureCode_id_initialUEMessage) { ogs_debug(" Iniital UE Message"); if (mme_ue->nas_eps.update.active_flag) { ogs_assert(OGS_OK == nas_eps_send_tau_accept(mme_ue, S1AP_ProcedureCode_id_InitialContextSetup)); } else { ogs_assert(OGS_OK == nas_eps_send_tau_accept(mme_ue, S1AP_ProcedureCode_id_downlinkNASTransport)); } } else if (e->s1ap_code == S1AP_ProcedureCode_id_uplinkNASTransport) { ogs_debug(" Uplink NAS Transport"); ogs_assert(OGS_OK == nas_eps_send_tau_accept(mme_ue, S1AP_ProcedureCode_id_downlinkNASTransport)); } else { ogs_fatal("Invalid Procedure Code[%d]", (int)e->s1ap_code); } if (!mme_ue->nas_eps.update.active_flag) mme_send_release_access_bearer_or_ue_context_release(enb_ue); if (mme_ue->next.m_tmsi) { ogs_fatal("MME does not create new GUTI"); ogs_assert_if_reached(); OGS_FSM_TRAN(s, &emm_state_initial_context_setup); } else { OGS_FSM_TRAN(s, &emm_state_registered); } break; case OGS_NAS_EPS_EXTENDED_SERVICE_REQUEST: ogs_info("[%s] Extended service request", mme_ue->imsi_bcd); rv = emm_handle_extended_service_request( mme_ue, &message->emm.extended_service_request); if (rv != OGS_OK) { ogs_error("emm_handle_extended_service_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } if (!MME_UE_HAVE_IMSI(mme_ue)) { ogs_warn("Extended Service request : Unknown UE"); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!SESSION_CONTEXT_IS_AVAILABLE(mme_ue)) { ogs_warn("No PDN Connection : UE[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, emm_state_exception); break; } if (!SECURITY_CONTEXT_IS_VALID(mme_ue)) { ogs_warn("No Security Context : IMSI[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (e->s1ap_code == S1AP_ProcedureCode_id_initialUEMessage) { ogs_debug(" Initial UE Message"); if (!MME_P_TMSI_IS_AVAILABLE(mme_ue)) { ogs_warn("No P-TMSI : UE[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK) ); mme_send_release_access_bearer_or_ue_context_release( enb_ue); break; } if (mme_ue->nas_eps.service.value == OGS_NAS_SERVICE_TYPE_CS_FALLBACK_FROM_UE || mme_ue->nas_eps.service.value == OGS_NAS_SERVICE_TYPE_CS_FALLBACK_EMERGENCY_CALL_FROM_UE) { ogs_debug(" MO-CSFB-INDICATION[%d]", mme_ue->nas_eps.service.value); ogs_assert(OGS_OK == sgsap_send_mo_csfb_indication(mme_ue)); } else if (mme_ue->nas_eps.service.value == OGS_NAS_SERVICE_TYPE_CS_FALLBACK_TO_UE) { ogs_debug(" SERVICE_REQUEST[%d]", mme_ue->nas_eps.service.value); ogs_assert(OGS_OK == sgsap_send_service_request(mme_ue, SGSAP_EMM_IDLE_MODE) ); } else { ogs_warn(" Unknown CSFB Service Type[%d]", mme_ue->nas_eps.service.value); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK) ); OGS_FSM_TRAN(s, &emm_state_exception); break; } ogs_assert(OGS_OK == s1ap_send_initial_context_setup_request(mme_ue)); } else if (e->s1ap_code == S1AP_ProcedureCode_id_uplinkNASTransport) { ogs_debug(" Uplink NAS Transport"); if (!MME_P_TMSI_IS_AVAILABLE(mme_ue)) { ogs_warn("No P-TMSI : UE[%s]", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK) ); break; } if (mme_ue->nas_eps.service.value == OGS_NAS_SERVICE_TYPE_CS_FALLBACK_FROM_UE || mme_ue->nas_eps.service.value == OGS_NAS_SERVICE_TYPE_CS_FALLBACK_EMERGENCY_CALL_FROM_UE) { ogs_debug(" MO-CSFB-INDICATION[%d]", mme_ue->nas_eps.service.value); ogs_assert(OGS_OK == sgsap_send_mo_csfb_indication(mme_ue)); } else if (mme_ue->nas_eps.service.value == OGS_NAS_SERVICE_TYPE_CS_FALLBACK_TO_UE) { ogs_debug(" SERVICE_REQUEST[%d]", mme_ue->nas_eps.service.value); ogs_assert(OGS_OK == sgsap_send_service_request( mme_ue, SGSAP_EMM_CONNECTED_MODE)); } else { ogs_warn(" Unknown CSFB Service Type[%d]", mme_ue->nas_eps.service.value); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK) ); OGS_FSM_TRAN(s, &emm_state_exception); break; } ogs_assert(OGS_OK == s1ap_send_ue_context_modification_request(mme_ue)); } else { ogs_error("Invalid Procedure Code[%d]", (int)e->s1ap_code); } break; case OGS_NAS_EPS_EMM_STATUS: ogs_warn("EMM STATUS : IMSI[%s] Cause[%d]", mme_ue->imsi_bcd, message->emm.emm_status.emm_cause); OGS_FSM_TRAN(s, &emm_state_exception); break; case OGS_NAS_EPS_DETACH_REQUEST: ogs_info("[%s] Detach request", mme_ue->imsi_bcd); rv = emm_handle_detach_request( mme_ue, &message->emm.detach_request_from_ue); if (rv != OGS_OK) { ogs_error("emm_handle_detach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } if (MME_P_TMSI_IS_AVAILABLE(mme_ue)) { ogs_assert(OGS_OK == sgsap_send_detach_indication(mme_ue)); } else { mme_send_delete_session_or_detach(mme_ue); } OGS_FSM_TRAN(s, &emm_state_de_registered); break; case OGS_NAS_EPS_UPLINK_NAS_TRANSPORT: ogs_debug("Uplink NAS Transport"); ogs_debug(" IMSI[%s]", mme_ue->imsi_bcd); if (MME_SGSAP_IS_CONNECTED(mme_ue)) { ogs_assert(OGS_OK == sgsap_send_uplink_unitdata(mme_ue, &message->emm. uplink_nas_transport.nas_message_container)); } else { S1AP_MME_UE_S1AP_ID_t MME_UE_S1AP_ID; S1AP_ENB_UE_S1AP_ID_t ENB_UE_S1AP_ID; ogs_warn("No connection of MSC/VLR"); MME_UE_S1AP_ID = enb_ue->mme_ue_s1ap_id; ENB_UE_S1AP_ID = enb_ue->enb_ue_s1ap_id; ogs_assert(OGS_OK == s1ap_send_error_indication(enb_ue->enb, &MME_UE_S1AP_ID, &ENB_UE_S1AP_ID, S1AP_Cause_PR_transport, S1AP_CauseTransport_transport_resource_unavailable)); } break; case OGS_NAS_EPS_ATTACH_COMPLETE: ogs_error("[%s] Attach complete in INVALID-STATE", mme_ue->imsi_bcd); break; case OGS_NAS_EPS_TRACKING_AREA_UPDATE_COMPLETE: ogs_error("[%s] Tracking area update complete in INVALID-STATE", mme_ue->imsi_bcd); break; default: ogs_warn("Unknown message[%d]", message->emm.h.message_type); } break; case MME_EVT_EMM_TIMER: switch (e->timer_id) { case MME_TIMER_T3413: if (mme_ue->t3413.retry_count >= mme_timer_cfg(MME_TIMER_T3413)->max_count) { /* Paging failed */ ogs_warn("Paging to IMSI[%s] failed. Stop paging", mme_ue->imsi_bcd); CLEAR_MME_UE_TIMER(mme_ue->t3413); mme_send_after_paging(mme_ue, OGS_GTP2_CAUSE_UNABLE_TO_PAGE_UE); if (CS_CALL_SERVICE_INDICATOR(mme_ue) || SMS_SERVICE_INDICATOR(mme_ue)) { ogs_assert(OGS_OK == sgsap_send_ue_unreachable(mme_ue, SGSAP_SGS_CAUSE_UE_UNREACHABLE)); } CLEAR_SERVICE_INDICATOR(mme_ue); } else { mme_ue->t3413.retry_count++; /* * If t3413 is timeout, the saved pkbuf is used. * We don't have to set CNDomain. * So, we just set CNDomain to 0 */ ogs_assert(OGS_OK == s1ap_send_paging(mme_ue, 0)); } break; case MME_TIMER_T3470: if (mme_ue->t3470.retry_count >= mme_timer_cfg(MME_TIMER_T3470)->max_count) { ogs_warn("Retransmission of Identity-Request failed. " "Stop retransmission"); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); } else { rv = nas_eps_send_identity_request(mme_ue); if (rv == OGS_OK) { mme_ue->t3470.retry_count++; } else { ogs_error("nas_eps_send_identity_request() failed"); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); } } break; default: ogs_error("Unknown timer[%s:%d]", mme_timer_get_name(e->timer_id), e->timer_id); } break; default: ogs_error("Unknown event[%s]", mme_event_get_name(e)); } } void emm_state_authentication(ogs_fsm_t *s, mme_event_t *e) { int rv; mme_ue_t *mme_ue = NULL; ogs_nas_eps_message_t *message = NULL; ogs_assert(s); ogs_assert(e); mme_sm_debug(e); mme_ue = e->mme_ue; ogs_assert(mme_ue); switch (e->id) { case OGS_FSM_ENTRY_SIG: break; case OGS_FSM_EXIT_SIG: break; case MME_EVT_EMM_MESSAGE: message = e->nas_message; ogs_assert(message); switch (message->emm.h.message_type) { case OGS_NAS_EPS_AUTHENTICATION_RESPONSE: { ogs_nas_eps_authentication_response_t *authentication_response = &message->emm.authentication_response; ogs_nas_authentication_response_parameter_t *authentication_response_parameter = &authentication_response-> authentication_response_parameter; ogs_debug("Authentication response"); ogs_debug(" IMSI[%s]", mme_ue->imsi_bcd); CLEAR_MME_UE_TIMER(mme_ue->t3460); if (authentication_response_parameter->length == 0 || memcmp(authentication_response_parameter->res, mme_ue->xres, authentication_response_parameter->length) != 0) { ogs_log_hexdump(OGS_LOG_WARN, authentication_response_parameter->res, authentication_response_parameter->length); ogs_log_hexdump(OGS_LOG_WARN, mme_ue->xres, OGS_MAX_RES_LEN); ogs_assert(OGS_OK == nas_eps_send_authentication_reject(mme_ue)); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); } else { OGS_FSM_TRAN(&mme_ue->sm, &emm_state_security_mode); } break; } case OGS_NAS_EPS_AUTHENTICATION_FAILURE: { ogs_nas_eps_authentication_failure_t *authentication_failure = &message->emm.authentication_failure; ogs_nas_authentication_failure_parameter_t *authentication_failure_parameter = &authentication_failure-> authentication_failure_parameter; ogs_debug("Authentication failure"); ogs_debug(" IMSI[%s] EMM_CAUSE[%d]", mme_ue->imsi_bcd, authentication_failure->emm_cause); CLEAR_MME_UE_TIMER(mme_ue->t3460); switch (authentication_failure->emm_cause) { case EMM_CAUSE_MAC_FAILURE: ogs_warn("Authentication failure(MAC failure)"); break; case EMM_CAUSE_NON_EPS_AUTHENTICATION_UNACCEPTABLE: ogs_error("Authentication failure" "(Non-EPS authentication unacceptable)"); break; case EMM_CAUSE_SYNCH_FAILURE: ogs_info("Authentication failure(Synch failure)"); mme_s6a_send_air(mme_ue, authentication_failure_parameter); return; default: ogs_error("Unknown EMM_CAUSE{%d] in Authentication" " failure", authentication_failure->emm_cause); break; } ogs_assert(OGS_OK == nas_eps_send_authentication_reject(mme_ue)); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); break; } case OGS_NAS_EPS_ATTACH_REQUEST: ogs_warn("[%s] Attach request", mme_ue->imsi_bcd); rv = emm_handle_attach_request( mme_ue, &message->emm.attach_request, e->pkbuf); if (rv != OGS_OK) { ogs_error("emm_handle_attach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } mme_s6a_send_air(mme_ue, NULL); OGS_FSM_TRAN(s, &emm_state_authentication); break; case OGS_NAS_EPS_EMM_STATUS: ogs_warn("EMM STATUS : IMSI[%s] Cause[%d]", mme_ue->imsi_bcd, message->emm.emm_status.emm_cause); OGS_FSM_TRAN(s, &emm_state_exception); break; case OGS_NAS_EPS_DETACH_REQUEST: ogs_warn("Detach request"); rv = emm_handle_detach_request( mme_ue, &message->emm.detach_request_from_ue); if (rv != OGS_OK) { ogs_error("emm_handle_detach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } mme_send_delete_session_or_detach(mme_ue); OGS_FSM_TRAN(s, &emm_state_de_registered); break; default: ogs_warn("Unknown message[%d]", message->emm.h.message_type); break; } break; case MME_EVT_EMM_TIMER: switch (e->timer_id) { case MME_TIMER_T3460: if (mme_ue->t3460.retry_count >= mme_timer_cfg(MME_TIMER_T3460)->max_count) { ogs_warn("Retransmission of IMSI[%s] failed. " "Stop retransmission", mme_ue->imsi_bcd); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); ogs_expect(OGS_OK == nas_eps_send_authentication_reject(mme_ue)); } else { rv = nas_eps_send_authentication_request(mme_ue); if (rv == OGS_OK) { mme_ue->t3460.retry_count++; } else { ogs_error("nas_eps_send_authentication_request() failed"); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); } } break; default: ogs_error("Unknown timer[%s:%d]", mme_timer_get_name(e->timer_id), e->timer_id); break; } break; default: ogs_error("Unknown event[%s]", mme_event_get_name(e)); break; } } void emm_state_security_mode(ogs_fsm_t *s, mme_event_t *e) { int rv; mme_ue_t *mme_ue = NULL; ogs_nas_eps_message_t *message = NULL; ogs_nas_security_header_type_t h; ogs_assert(s); ogs_assert(e); mme_sm_debug(e); mme_ue = e->mme_ue; ogs_assert(mme_ue); switch (e->id) { case OGS_FSM_ENTRY_SIG: CLEAR_MME_UE_TIMER(mme_ue->t3460); ogs_assert(OGS_OK == nas_eps_send_security_mode_command(mme_ue)); break; case OGS_FSM_EXIT_SIG: break; case MME_EVT_EMM_MESSAGE: message = e->nas_message; ogs_assert(message); if (message->emm.h.security_header_type == OGS_NAS_SECURITY_HEADER_FOR_SERVICE_REQUEST_MESSAGE) { ogs_debug("Service request"); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } switch (message->emm.h.message_type) { case OGS_NAS_EPS_SECURITY_MODE_COMPLETE: ogs_debug("Security mode complete"); ogs_debug(" IMSI[%s]", mme_ue->imsi_bcd); CLEAR_MME_UE_TIMER(mme_ue->t3460); /* Now, We will check the MAC in the NAS message*/ h.type = e->nas_type; if (h.integrity_protected == 0) { ogs_error("[%s] No Integrity Protected", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!SECURITY_CONTEXT_IS_VALID(mme_ue)) { ogs_warn("[%s] No Security Context", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } emm_handle_security_mode_complete( mme_ue, &message->emm.security_mode_complete); ogs_kdf_kenb(mme_ue->kasme, mme_ue->ul_count.i32, mme_ue->kenb); ogs_kdf_nh_enb(mme_ue->kasme, mme_ue->kenb, mme_ue->nh); mme_ue->nhcc = 1; /* Create New GUTI */ mme_ue_new_guti(mme_ue); mme_s6a_send_ulr(mme_ue); if (mme_ue->next.m_tmsi) { OGS_FSM_TRAN(s, &emm_state_initial_context_setup); } else { ogs_fatal("MME always creates new GUTI"); ogs_assert_if_reached(); OGS_FSM_TRAN(s, &emm_state_registered); } break; case OGS_NAS_EPS_SECURITY_MODE_REJECT: ogs_warn("Security mode reject : IMSI[%s] Cause[%d]", mme_ue->imsi_bcd, message->emm.security_mode_reject.emm_cause); CLEAR_MME_UE_TIMER(mme_ue->t3460); OGS_FSM_TRAN(s, &emm_state_exception); break; case OGS_NAS_EPS_ATTACH_REQUEST: ogs_warn("[%s] Attach request", mme_ue->imsi_bcd); rv = emm_handle_attach_request( mme_ue, &message->emm.attach_request, e->pkbuf); if (rv != OGS_OK) { ogs_error("emm_handle_attach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } mme_s6a_send_air(mme_ue, NULL); OGS_FSM_TRAN(s, &emm_state_authentication); break; case OGS_NAS_EPS_TRACKING_AREA_UPDATE_REQUEST: ogs_debug("Tracking area update request"); ogs_assert(OGS_OK == nas_eps_send_tau_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; case OGS_NAS_EPS_EMM_STATUS: ogs_warn("EMM STATUS : IMSI[%s] Cause[%d]", mme_ue->imsi_bcd, message->emm.emm_status.emm_cause); OGS_FSM_TRAN(s, &emm_state_exception); break; case OGS_NAS_EPS_DETACH_REQUEST: ogs_warn("Detach request"); rv = emm_handle_detach_request( mme_ue, &message->emm.detach_request_from_ue); if (rv != OGS_OK) { ogs_error("emm_handle_detach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } mme_send_delete_session_or_detach(mme_ue); OGS_FSM_TRAN(s, &emm_state_de_registered); break; default: ogs_warn("Unknown message[%d]", message->emm.h.message_type); break; } break; case MME_EVT_EMM_TIMER: switch (e->timer_id) { case MME_TIMER_T3460: if (mme_ue->t3460.retry_count >= mme_timer_cfg(MME_TIMER_T3460)->max_count) { ogs_warn("Retransmission of IMSI[%s] failed. " "Stop retransmission", mme_ue->imsi_bcd); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); ogs_expect(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); } else { rv = nas_eps_send_security_mode_command(mme_ue); if (rv == OGS_OK) { mme_ue->t3460.retry_count++; } else { ogs_error("nas_eps_send_security_mode_command() failed"); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); } } break; default: ogs_error("Unknown timer[%s:%d]", mme_timer_get_name(e->timer_id), e->timer_id); break; } break; default: ogs_error("Unknown event[%s]", mme_event_get_name(e)); break; } } void emm_state_initial_context_setup(ogs_fsm_t *s, mme_event_t *e) { int rv; mme_ue_t *mme_ue = NULL; ogs_nas_eps_message_t *message = NULL; ogs_nas_security_header_type_t h; ogs_assert(s); ogs_assert(e); mme_sm_debug(e); mme_ue = e->mme_ue; ogs_assert(mme_ue); switch (e->id) { case OGS_FSM_ENTRY_SIG: break; case OGS_FSM_EXIT_SIG: break; case MME_EVT_EMM_MESSAGE: message = e->nas_message; ogs_assert(message); if (message->emm.h.security_header_type == OGS_NAS_SECURITY_HEADER_FOR_SERVICE_REQUEST_MESSAGE) { ogs_debug("Service request"); ogs_assert(OGS_OK == nas_eps_send_service_reject(mme_ue, EMM_CAUSE_UE_IDENTITY_CANNOT_BE_DERIVED_BY_THE_NETWORK)); OGS_FSM_TRAN(s, &emm_state_exception); break; } switch (message->emm.h.message_type) { case OGS_NAS_EPS_ATTACH_COMPLETE: ogs_info("[%s] Attach complete", mme_ue->imsi_bcd); CLEAR_MME_UE_TIMER(mme_ue->t3450); h.type = e->nas_type; if (h.integrity_protected == 0) { ogs_error("[%s] No Integrity Protected", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!SECURITY_CONTEXT_IS_VALID(mme_ue)) { ogs_warn("[%s] No Security Context", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } rv = emm_handle_attach_complete( mme_ue, &message->emm.attach_complete); if (rv != OGS_OK) { ogs_error("emm_handle_attach_complete() failed " "in emm_state_initial_context_setup"); OGS_FSM_TRAN(s, emm_state_exception); break; } /* Confirm GUTI */ if (mme_ue->next.m_tmsi) mme_ue_confirm_guti(mme_ue); if (MME_P_TMSI_IS_AVAILABLE(mme_ue)) ogs_assert(OGS_OK == sgsap_send_tmsi_reallocation_complete(mme_ue)); OGS_FSM_TRAN(s, &emm_state_registered); break; case OGS_NAS_EPS_TRACKING_AREA_UPDATE_COMPLETE: ogs_debug("[%s] Tracking area update complete", mme_ue->imsi_bcd); CLEAR_MME_UE_TIMER(mme_ue->t3450); h.type = e->nas_type; if (h.integrity_protected == 0) { ogs_error("[%s] No Integrity Protected", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } if (!SECURITY_CONTEXT_IS_VALID(mme_ue)) { ogs_warn("[%s] No Security Context", mme_ue->imsi_bcd); ogs_assert(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_SECURITY_MODE_REJECTED_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } /* Confirm GUTI */ if (mme_ue->next.m_tmsi) mme_ue_confirm_guti(mme_ue); OGS_FSM_TRAN(s, &emm_state_registered); break; case OGS_NAS_EPS_ATTACH_REQUEST: ogs_warn("[%s] Attach request", mme_ue->imsi_bcd); rv = emm_handle_attach_request( mme_ue, &message->emm.attach_request, e->pkbuf); if (rv != OGS_OK) { ogs_error("emm_handle_attach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } mme_gtp_send_delete_all_sessions(mme_ue, OGS_GTP_DELETE_SEND_AUTHENTICATION_REQUEST); OGS_FSM_TRAN(s, &emm_state_authentication); break; case OGS_NAS_EPS_EMM_STATUS: ogs_warn("EMM STATUS : IMSI[%s] Cause[%d]", mme_ue->imsi_bcd, message->emm.emm_status.emm_cause); OGS_FSM_TRAN(s, &emm_state_exception); break; case OGS_NAS_EPS_DETACH_REQUEST: ogs_warn("Detach request"); rv = emm_handle_detach_request( mme_ue, &message->emm.detach_request_from_ue); if (rv != OGS_OK) { ogs_error("emm_handle_detach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } mme_send_delete_session_or_detach(mme_ue); OGS_FSM_TRAN(s, &emm_state_de_registered); break; case OGS_NAS_EPS_SECURITY_MODE_COMPLETE: ogs_warn("[%s] Duplicated : Security mode complete", mme_ue->imsi_bcd); break; default: ogs_warn("Unknown message[%d]", message->emm.h.message_type); break; } break; case MME_EVT_EMM_TIMER: switch (e->timer_id) { case MME_TIMER_T3450: if (mme_ue->t3450.retry_count >= mme_timer_cfg(MME_TIMER_T3450)->max_count) { ogs_warn("Retransmission of IMSI[%s] failed. " "Stop retransmission", mme_ue->imsi_bcd); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); } else { ogs_pkbuf_t *emmbuf = NULL; mme_ue->t3450.retry_count++; emmbuf = mme_ue->t3450.pkbuf; ogs_expect_or_return(emmbuf); mme_ue->t3450.pkbuf = ogs_pkbuf_copy(emmbuf); ogs_assert(mme_ue->t3450.pkbuf); ogs_timer_start(mme_ue->t3450.timer, mme_timer_cfg(MME_TIMER_T3450)->duration); rv = nas_eps_send_to_downlink_nas_transport(mme_ue, emmbuf); if (rv != OGS_OK) { ogs_error("nas_eps_send_to_downlink_nas_transport() " "failed"); OGS_FSM_TRAN(&mme_ue->sm, &emm_state_exception); } } break; default: ogs_error("Unknown timer[%s:%d]", mme_timer_get_name(e->timer_id), e->timer_id); break; } break; default: ogs_error("Unknown event[%s]", mme_event_get_name(e)); break; } } void emm_state_exception(ogs_fsm_t *s, mme_event_t *e) { int rv; mme_ue_t *mme_ue = NULL; enb_ue_t *enb_ue = NULL; ogs_nas_eps_message_t *message = NULL; ogs_nas_security_header_type_t h; ogs_assert(e); mme_sm_debug(e); mme_ue = e->mme_ue; ogs_assert(mme_ue); switch (e->id) { case OGS_FSM_ENTRY_SIG: CLEAR_SERVICE_INDICATOR(mme_ue); CLEAR_MME_UE_ALL_TIMERS(mme_ue); break; case OGS_FSM_EXIT_SIG: break; case MME_EVT_EMM_MESSAGE: message = e->nas_message; ogs_assert(message); enb_ue = enb_ue_cycle(mme_ue->enb_ue); ogs_assert(enb_ue); h.type = e->nas_type; switch (message->emm.h.message_type) { case OGS_NAS_EPS_ATTACH_REQUEST: ogs_warn("[%s] Attach request", mme_ue->imsi_bcd); rv = emm_handle_attach_request( mme_ue, &message->emm.attach_request, e->pkbuf); if (rv != OGS_OK) { ogs_error("emm_handle_attach_request() failed"); OGS_FSM_TRAN(s, emm_state_exception); break; } if (!MME_UE_HAVE_IMSI(mme_ue)) { CLEAR_MME_UE_TIMER(mme_ue->t3470); ogs_assert(OGS_OK == nas_eps_send_identity_request(mme_ue)); OGS_FSM_TRAN(s, &emm_state_de_registered); break; } if (h.integrity_protected && SECURITY_CONTEXT_IS_VALID(mme_ue)) { if (SESSION_CONTEXT_IS_AVAILABLE(mme_ue)) { mme_gtp_send_delete_all_sessions(mme_ue, OGS_GTP_DELETE_HANDLE_PDN_CONNECTIVITY_REQUEST); } else { rv = nas_eps_send_emm_to_esm(mme_ue, &mme_ue->pdn_connectivity_request); if (rv != OGS_OK) { ogs_error("nas_eps_send_emm_to_esm() failed"); ogs_assert(OGS_OK == nas_eps_send_attach_reject(mme_ue, EMM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED, ESM_CAUSE_PROTOCOL_ERROR_UNSPECIFIED)); OGS_FSM_TRAN(s, &emm_state_exception); break; } } OGS_FSM_TRAN(s, &emm_state_initial_context_setup); } else { if (SESSION_CONTEXT_IS_AVAILABLE(mme_ue)) { mme_gtp_send_delete_all_sessions(mme_ue, OGS_GTP_DELETE_SEND_AUTHENTICATION_REQUEST); } else { mme_s6a_send_air(mme_ue, NULL); } OGS_FSM_TRAN(s, &emm_state_authentication); } break; default: ogs_warn("Unknown message[%d]", message->emm.h.message_type); } break; default: ogs_error("Unknown event[%s]", mme_event_get_name(e)); } }