forked from acouzens/open5gs
2833 lines
99 KiB
C
2833 lines
99 KiB
C
/*
|
|
* Copyright (C) 2019 by Sukchan Lee <acetcom@gmail.com>
|
|
*
|
|
* This file is part of Open5GS.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "context.h"
|
|
|
|
static smf_context_t self;
|
|
static ogs_diam_config_t g_diam_conf;
|
|
|
|
int __smf_log_domain;
|
|
int __gsm_log_domain;
|
|
|
|
static OGS_POOL(smf_ue_pool, smf_ue_t);
|
|
static OGS_POOL(smf_sess_pool, smf_sess_t);
|
|
static OGS_POOL(smf_bearer_pool, smf_bearer_t);
|
|
|
|
static OGS_POOL(smf_pf_pool, smf_pf_t);
|
|
|
|
static int context_initialized = 0;
|
|
|
|
static int num_of_smf_sess = 0;
|
|
|
|
static void stats_add_smf_session(void);
|
|
static void stats_remove_smf_session(void);
|
|
|
|
int smf_ctf_config_init(smf_ctf_config_t *ctf_config)
|
|
{
|
|
ctf_config->enabled = SMF_CTF_ENABLED_AUTO;
|
|
return OGS_OK;
|
|
}
|
|
|
|
/* Shall Gy session be used according to policy and state? 1: yes, 0: no, -1: reject */
|
|
int smf_use_gy_iface()
|
|
{
|
|
switch (smf_self()->ctf_config.enabled) {
|
|
case SMF_CTF_ENABLED_AUTO:
|
|
return ogs_diam_app_connected(OGS_DIAM_GY_APPLICATION_ID) ? 1 : 0;
|
|
case SMF_CTF_ENABLED_YES:
|
|
return ogs_diam_app_connected(OGS_DIAM_GY_APPLICATION_ID) ? 1 : -1;
|
|
case SMF_CTF_ENABLED_NO:
|
|
return 0;
|
|
default:
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
void smf_context_init(void)
|
|
{
|
|
ogs_assert(context_initialized == 0);
|
|
|
|
/* Initial FreeDiameter Config */
|
|
memset(&g_diam_conf, 0, sizeof(ogs_diam_config_t));
|
|
|
|
/* Initialize SMF context */
|
|
memset(&self, 0, sizeof(smf_context_t));
|
|
smf_ctf_config_init(&self.ctf_config);
|
|
self.diam_config = &g_diam_conf;
|
|
|
|
ogs_log_install_domain(&__ogs_ngap_domain, "ngap", ogs_core()->log.level);
|
|
ogs_log_install_domain(&__ogs_nas_domain, "nas", ogs_core()->log.level);
|
|
ogs_log_install_domain(&__ogs_diam_domain, "diam", ogs_core()->log.level);
|
|
ogs_log_install_domain(&__smf_log_domain, "smf", ogs_core()->log.level);
|
|
ogs_log_install_domain(&__gsm_log_domain, "gsm", ogs_core()->log.level);
|
|
|
|
ogs_pool_init(&smf_ue_pool, ogs_app()->max.ue);
|
|
ogs_pool_init(&smf_sess_pool, ogs_app()->pool.sess);
|
|
ogs_pool_init(&smf_bearer_pool, ogs_app()->pool.bearer);
|
|
|
|
ogs_pool_init(&smf_pf_pool,
|
|
ogs_app()->pool.bearer * OGS_MAX_NUM_OF_FLOW_IN_BEARER);
|
|
|
|
self.supi_hash = ogs_hash_make();
|
|
ogs_assert(self.supi_hash);
|
|
self.imsi_hash = ogs_hash_make();
|
|
ogs_assert(self.imsi_hash);
|
|
self.ipv4_hash = ogs_hash_make();
|
|
ogs_assert(self.ipv4_hash);
|
|
self.ipv6_hash = ogs_hash_make();
|
|
ogs_assert(self.ipv6_hash);
|
|
self.n1n2message_hash = ogs_hash_make();
|
|
ogs_assert(self.n1n2message_hash);
|
|
|
|
|
|
context_initialized = 1;
|
|
}
|
|
|
|
void smf_context_final(void)
|
|
{
|
|
ogs_assert(context_initialized == 1);
|
|
|
|
smf_ue_remove_all();
|
|
|
|
ogs_assert(self.supi_hash);
|
|
ogs_hash_destroy(self.supi_hash);
|
|
ogs_assert(self.imsi_hash);
|
|
ogs_hash_destroy(self.imsi_hash);
|
|
ogs_assert(self.ipv4_hash);
|
|
ogs_hash_destroy(self.ipv4_hash);
|
|
ogs_assert(self.ipv6_hash);
|
|
ogs_hash_destroy(self.ipv6_hash);
|
|
ogs_assert(self.n1n2message_hash);
|
|
ogs_hash_destroy(self.n1n2message_hash);
|
|
|
|
ogs_pool_final(&smf_ue_pool);
|
|
ogs_pool_final(&smf_bearer_pool);
|
|
ogs_pool_final(&smf_sess_pool);
|
|
|
|
ogs_pool_final(&smf_pf_pool);
|
|
|
|
ogs_gtp_node_remove_all(&self.sgw_s5c_list);
|
|
|
|
context_initialized = 0;
|
|
}
|
|
|
|
smf_context_t *smf_self(void)
|
|
{
|
|
return &self;
|
|
}
|
|
|
|
static int smf_context_prepare(void)
|
|
{
|
|
self.diam_config->cnf_port = DIAMETER_PORT;
|
|
self.diam_config->cnf_port_tls = DIAMETER_SECURE_PORT;
|
|
self.nf_type = OpenAPI_nf_type_SMF;
|
|
|
|
return OGS_OK;
|
|
}
|
|
|
|
static int smf_context_validation(void)
|
|
{
|
|
ogs_sbi_nf_info_t *nf_info = NULL;
|
|
|
|
if (self.dns[0] == NULL && self.dns6[0] == NULL) {
|
|
ogs_error("No smf.dns in '%s'", ogs_app()->file);
|
|
return OGS_ERROR;
|
|
}
|
|
if (ogs_list_first(&ogs_gtp_self()->gtpu_list) == NULL) {
|
|
ogs_error("No smf.gtpu in '%s'", ogs_app()->file);
|
|
return OGS_ERROR;
|
|
}
|
|
if (ogs_list_first(&ogs_pfcp_self()->subnet_list) == NULL) {
|
|
ogs_error("No smf.subnet: in '%s'", ogs_app()->file);
|
|
return OGS_ERROR;
|
|
}
|
|
|
|
ogs_list_for_each(&ogs_sbi_self()->nf_info_list, nf_info) {
|
|
int i;
|
|
ogs_sbi_smf_info_t *smf_info = &nf_info->smf;
|
|
ogs_assert(smf_info);
|
|
|
|
if (smf_info->num_of_slice == 0) {
|
|
ogs_error("CHECK CONFIGURATION: No S-NSSAI in smfInfo");
|
|
return OGS_ERROR;
|
|
}
|
|
|
|
for (i = 0; i < smf_info->num_of_slice; i++) {
|
|
if (smf_info->slice[i].num_of_dnn == 0) {
|
|
ogs_error("CHECK CONFIGURATION: No DNN in SST[%d] SD[0x%x]",
|
|
smf_info->slice[i].s_nssai.sst,
|
|
smf_info->slice[i].s_nssai.sd.v);
|
|
return OGS_ERROR;
|
|
}
|
|
}
|
|
for (i = 0; i < smf_info->num_of_nr_tai_range; i++) {
|
|
if (smf_info->nr_tai_range[i].num_of_tac_range == 0) {
|
|
ogs_error("CHECK CONFIGURATION: No TacRange in "
|
|
"MCC[%d] MNC[0x%x]",
|
|
ogs_plmn_id_mcc(&smf_info->nr_tai[i].plmn_id),
|
|
ogs_plmn_id_mnc(&smf_info->nr_tai[i].plmn_id));
|
|
return OGS_ERROR;
|
|
}
|
|
}
|
|
}
|
|
|
|
return OGS_OK;
|
|
}
|
|
|
|
int smf_context_parse_config(void)
|
|
{
|
|
int rv;
|
|
yaml_document_t *document = NULL;
|
|
ogs_yaml_iter_t root_iter;
|
|
|
|
document = ogs_app()->document;
|
|
ogs_assert(document);
|
|
|
|
rv = smf_context_prepare();
|
|
if (rv != OGS_OK) return rv;
|
|
|
|
ogs_yaml_iter_init(&root_iter, document);
|
|
while (ogs_yaml_iter_next(&root_iter)) {
|
|
const char *root_key = ogs_yaml_iter_key(&root_iter);
|
|
ogs_assert(root_key);
|
|
if (!strcmp(root_key, "smf")) {
|
|
ogs_yaml_iter_t smf_iter;
|
|
ogs_yaml_iter_recurse(&root_iter, &smf_iter);
|
|
while (ogs_yaml_iter_next(&smf_iter)) {
|
|
const char *smf_key = ogs_yaml_iter_key(&smf_iter);
|
|
ogs_assert(smf_key);
|
|
if (!strcmp(smf_key, "freeDiameter")) {
|
|
yaml_node_t *node =
|
|
yaml_document_get_node(document, smf_iter.pair->value);
|
|
ogs_assert(node);
|
|
if (node->type == YAML_SCALAR_NODE) {
|
|
self.diam_conf_path = ogs_yaml_iter_value(&smf_iter);
|
|
} else if (node->type == YAML_MAPPING_NODE) {
|
|
ogs_yaml_iter_t fd_iter;
|
|
ogs_yaml_iter_recurse(&smf_iter, &fd_iter);
|
|
|
|
while (ogs_yaml_iter_next(&fd_iter)) {
|
|
const char *fd_key = ogs_yaml_iter_key(&fd_iter);
|
|
ogs_assert(fd_key);
|
|
if (!strcmp(fd_key, "identity")) {
|
|
self.diam_config->cnf_diamid =
|
|
ogs_yaml_iter_value(&fd_iter);
|
|
} else if (!strcmp(fd_key, "realm")) {
|
|
self.diam_config->cnf_diamrlm =
|
|
ogs_yaml_iter_value(&fd_iter);
|
|
} else if (!strcmp(fd_key, "port")) {
|
|
const char *v = ogs_yaml_iter_value(&fd_iter);
|
|
if (v) self.diam_config->cnf_port = atoi(v);
|
|
} else if (!strcmp(fd_key, "sec_port")) {
|
|
const char *v = ogs_yaml_iter_value(&fd_iter);
|
|
if (v) self.diam_config->cnf_port_tls = atoi(v);
|
|
} else if (!strcmp(fd_key, "listen_on")) {
|
|
self.diam_config->cnf_addr =
|
|
ogs_yaml_iter_value(&fd_iter);
|
|
} else if (!strcmp(fd_key, "no_fwd")) {
|
|
self.diam_config->cnf_flags.no_fwd =
|
|
ogs_yaml_iter_bool(&fd_iter);
|
|
} else if (!strcmp(fd_key, "load_extension")) {
|
|
ogs_yaml_iter_t ext_array, ext_iter;
|
|
ogs_yaml_iter_recurse(&fd_iter, &ext_array);
|
|
do {
|
|
const char *module = NULL;
|
|
const char *conf = NULL;
|
|
|
|
if (ogs_yaml_iter_type(&ext_array) ==
|
|
YAML_MAPPING_NODE) {
|
|
memcpy(&ext_iter, &ext_array,
|
|
sizeof(ogs_yaml_iter_t));
|
|
} else if (ogs_yaml_iter_type(&ext_array) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(&ext_array))
|
|
break;
|
|
ogs_yaml_iter_recurse(
|
|
&ext_array, &ext_iter);
|
|
} else if (ogs_yaml_iter_type(&ext_array) ==
|
|
YAML_SCALAR_NODE) {
|
|
break;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
while (ogs_yaml_iter_next(&ext_iter)) {
|
|
const char *ext_key =
|
|
ogs_yaml_iter_key(&ext_iter);
|
|
ogs_assert(ext_key);
|
|
if (!strcmp(ext_key, "module")) {
|
|
module = ogs_yaml_iter_value(
|
|
&ext_iter);
|
|
} else if (!strcmp(ext_key, "conf")) {
|
|
conf = ogs_yaml_iter_value(
|
|
&ext_iter);
|
|
} else
|
|
ogs_warn("unknown key `%s`",
|
|
ext_key);
|
|
}
|
|
|
|
if (module) {
|
|
self.diam_config->
|
|
ext[self.diam_config->num_of_ext].
|
|
module = module;
|
|
self.diam_config->
|
|
ext[self.diam_config->num_of_ext].
|
|
conf = conf;
|
|
self.diam_config->num_of_ext++;
|
|
}
|
|
} while (ogs_yaml_iter_type(&ext_array) ==
|
|
YAML_SEQUENCE_NODE);
|
|
} else if (!strcmp(fd_key, "connect")) {
|
|
ogs_yaml_iter_t conn_array, conn_iter;
|
|
ogs_yaml_iter_recurse(&fd_iter, &conn_array);
|
|
do {
|
|
const char *identity = NULL;
|
|
const char *addr = NULL;
|
|
uint16_t port = 0;
|
|
|
|
if (ogs_yaml_iter_type(&conn_array) ==
|
|
YAML_MAPPING_NODE) {
|
|
memcpy(&conn_iter, &conn_array,
|
|
sizeof(ogs_yaml_iter_t));
|
|
} else if (ogs_yaml_iter_type(
|
|
&conn_array) == YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(&conn_array))
|
|
break;
|
|
ogs_yaml_iter_recurse(&conn_array,
|
|
&conn_iter);
|
|
} else if (ogs_yaml_iter_type(
|
|
&conn_array) == YAML_SCALAR_NODE) {
|
|
break;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
while (ogs_yaml_iter_next(&conn_iter)) {
|
|
const char *conn_key =
|
|
ogs_yaml_iter_key(&conn_iter);
|
|
ogs_assert(conn_key);
|
|
if (!strcmp(conn_key, "identity")) {
|
|
identity =
|
|
ogs_yaml_iter_value(&conn_iter);
|
|
} else if (!strcmp(conn_key, "addr")) {
|
|
addr =
|
|
ogs_yaml_iter_value(&conn_iter);
|
|
} else if (!strcmp(conn_key, "port")) {
|
|
const char *v =
|
|
ogs_yaml_iter_value(&conn_iter);
|
|
if (v) port = atoi(v);
|
|
} else
|
|
ogs_warn("unknown key `%s`",
|
|
conn_key);
|
|
}
|
|
|
|
if (identity && addr) {
|
|
self.diam_config->
|
|
conn[self.diam_config->num_of_conn].
|
|
identity = identity;
|
|
self.diam_config->
|
|
conn[self.diam_config->num_of_conn].
|
|
addr = addr;
|
|
self.diam_config->
|
|
conn[self.diam_config->num_of_conn].
|
|
port = port;
|
|
self.diam_config->num_of_conn++;
|
|
}
|
|
} while (ogs_yaml_iter_type(&conn_array) ==
|
|
YAML_SEQUENCE_NODE);
|
|
} else
|
|
ogs_warn("unknown key `%s`", fd_key);
|
|
}
|
|
}
|
|
} else if (!strcmp(smf_key, "ctf")) {
|
|
ogs_yaml_iter_t ctf_iter;
|
|
yaml_node_t *node =
|
|
yaml_document_get_node(document, smf_iter.pair->value);
|
|
ogs_assert(node);
|
|
ogs_assert(node->type == YAML_MAPPING_NODE);
|
|
ogs_yaml_iter_recurse(&smf_iter, &ctf_iter);
|
|
while (ogs_yaml_iter_next(&ctf_iter)) {
|
|
const char *ctf_key = ogs_yaml_iter_key(&ctf_iter);
|
|
ogs_assert(ctf_key);
|
|
if (!strcmp(ctf_key, "enabled")) {
|
|
yaml_node_t *ctf_node =
|
|
yaml_document_get_node(document, ctf_iter.pair->value);
|
|
ogs_assert(ctf_node->type == YAML_SCALAR_NODE);
|
|
const char* enabled = ogs_yaml_iter_value(&ctf_iter);
|
|
if (!strcmp(enabled, "auto"))
|
|
self.ctf_config.enabled = SMF_CTF_ENABLED_AUTO;
|
|
else if (!strcmp(enabled, "yes"))
|
|
self.ctf_config.enabled = SMF_CTF_ENABLED_YES;
|
|
else if (!strcmp(enabled, "no"))
|
|
self.ctf_config.enabled = SMF_CTF_ENABLED_NO;
|
|
else
|
|
ogs_warn("unknown 'enabled' value `%s`", enabled);
|
|
} else
|
|
ogs_warn("unknown key `%s`", ctf_key);
|
|
}
|
|
} else if (!strcmp(smf_key, "gtpc")) {
|
|
/* handle config in gtp library */
|
|
} else if (!strcmp(smf_key, "gtpu")) {
|
|
/* handle config in gtp library */
|
|
} else if (!strcmp(smf_key, "dns")) {
|
|
ogs_yaml_iter_t dns_iter;
|
|
ogs_yaml_iter_recurse(&smf_iter, &dns_iter);
|
|
ogs_assert(ogs_yaml_iter_type(&dns_iter) !=
|
|
YAML_MAPPING_NODE);
|
|
|
|
do {
|
|
const char *v = NULL;
|
|
|
|
if (ogs_yaml_iter_type(&dns_iter) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(&dns_iter))
|
|
break;
|
|
}
|
|
|
|
v = ogs_yaml_iter_value(&dns_iter);
|
|
if (v && strlen(v)) {
|
|
ogs_ipsubnet_t ipsub;
|
|
rv = ogs_ipsubnet(&ipsub, v, NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
|
|
if (ipsub.family == AF_INET) {
|
|
if (self.dns[0] && self.dns[1])
|
|
ogs_warn("Ignore DNS : %s", v);
|
|
else if (self.dns[0]) self.dns[1] = v;
|
|
else self.dns[0] = v;
|
|
}
|
|
else if (ipsub.family == AF_INET6) {
|
|
if (self.dns6[0] && self.dns6[1])
|
|
ogs_warn("Ignore DNS : %s", v);
|
|
else if (self.dns6[0]) self.dns6[1] = v;
|
|
else self.dns6[0] = v;
|
|
} else
|
|
ogs_warn("Ignore DNS : %s", v);
|
|
}
|
|
|
|
} while (ogs_yaml_iter_type(&dns_iter) ==
|
|
YAML_SEQUENCE_NODE);
|
|
} else if (!strcmp(smf_key, "mtu")) {
|
|
ogs_assert(ogs_yaml_iter_type(&smf_iter) !=
|
|
YAML_SCALAR_NODE);
|
|
self.mtu = atoi(ogs_yaml_iter_value(&smf_iter));
|
|
ogs_assert(self.mtu);
|
|
} else if (!strcmp(smf_key, "p-cscf")) {
|
|
ogs_yaml_iter_t p_cscf_iter;
|
|
ogs_yaml_iter_recurse(&smf_iter, &p_cscf_iter);
|
|
ogs_assert(ogs_yaml_iter_type(&p_cscf_iter) !=
|
|
YAML_MAPPING_NODE);
|
|
|
|
self.num_of_p_cscf = 0;
|
|
self.num_of_p_cscf6 = 0;
|
|
do {
|
|
const char *v = NULL;
|
|
|
|
if (ogs_yaml_iter_type(&p_cscf_iter) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(&p_cscf_iter))
|
|
break;
|
|
}
|
|
|
|
v = ogs_yaml_iter_value(&p_cscf_iter);
|
|
if (v) {
|
|
ogs_ipsubnet_t ipsub;
|
|
rv = ogs_ipsubnet(&ipsub, v, NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
|
|
if (ipsub.family == AF_INET) {
|
|
if (self.num_of_p_cscf >= MAX_NUM_OF_P_CSCF)
|
|
ogs_warn("Ignore P-CSCF : %s", v);
|
|
else self.p_cscf[self.num_of_p_cscf++] = v;
|
|
}
|
|
else if (ipsub.family == AF_INET6) {
|
|
if (self.num_of_p_cscf6 >= MAX_NUM_OF_P_CSCF)
|
|
ogs_warn("Ignore P-CSCF : %s", v);
|
|
else self.p_cscf6[self.num_of_p_cscf6++] = v;
|
|
} else
|
|
ogs_warn("Ignore P-CSCF : %s", v);
|
|
}
|
|
|
|
} while (ogs_yaml_iter_type(&p_cscf_iter) ==
|
|
YAML_SEQUENCE_NODE);
|
|
} else if (!strcmp(smf_key, "info")) {
|
|
ogs_yaml_iter_t info_array, info_iter;
|
|
ogs_yaml_iter_recurse(&smf_iter, &info_array);
|
|
do {
|
|
ogs_sbi_nf_info_t *nf_info = NULL;
|
|
ogs_sbi_smf_info_t *smf_info = NULL;
|
|
|
|
if (ogs_yaml_iter_type(&info_array) ==
|
|
YAML_MAPPING_NODE) {
|
|
memcpy(&info_iter, &info_array,
|
|
sizeof(ogs_yaml_iter_t));
|
|
} else if (ogs_yaml_iter_type(&info_array) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(&info_array))
|
|
break;
|
|
ogs_yaml_iter_recurse(&info_array, &info_iter);
|
|
} else if (ogs_yaml_iter_type(&info_array) ==
|
|
YAML_SCALAR_NODE) {
|
|
break;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
nf_info = ogs_sbi_nf_info_add(
|
|
&ogs_sbi_self()->nf_info_list,
|
|
OpenAPI_nf_type_SMF);
|
|
ogs_assert(nf_info);
|
|
|
|
smf_info = &nf_info->smf;
|
|
ogs_assert(smf_info);
|
|
|
|
while (ogs_yaml_iter_next(&info_iter)) {
|
|
const char *info_key =
|
|
ogs_yaml_iter_key(&info_iter);
|
|
ogs_assert(info_key);
|
|
if (!strcmp(info_key, "s_nssai")) {
|
|
int num_of_slice = 0;
|
|
|
|
ogs_yaml_iter_t s_nssai_array, s_nssai_iter;
|
|
ogs_yaml_iter_recurse(&info_iter,
|
|
&s_nssai_array);
|
|
do {
|
|
ogs_s_nssai_t *s_nssai = NULL;
|
|
const char *sst = NULL, *sd = NULL;
|
|
int num_of_dnn = 0;
|
|
const char *dnn[OGS_MAX_NUM_OF_DNN];
|
|
|
|
ogs_assert(num_of_slice <
|
|
OGS_MAX_NUM_OF_SLICE);
|
|
s_nssai = &smf_info->slice[num_of_slice].
|
|
s_nssai;
|
|
ogs_assert(s_nssai);
|
|
|
|
if (ogs_yaml_iter_type(&s_nssai_array) ==
|
|
YAML_MAPPING_NODE) {
|
|
memcpy(&s_nssai_iter, &s_nssai_array,
|
|
sizeof(ogs_yaml_iter_t));
|
|
} else if (ogs_yaml_iter_type(
|
|
&s_nssai_array) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(&s_nssai_array))
|
|
break;
|
|
ogs_yaml_iter_recurse(&s_nssai_array,
|
|
&s_nssai_iter);
|
|
} else if (ogs_yaml_iter_type(
|
|
&s_nssai_array) ==
|
|
YAML_SCALAR_NODE) {
|
|
break;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
while (ogs_yaml_iter_next(&s_nssai_iter)) {
|
|
const char *s_nssai_key =
|
|
ogs_yaml_iter_key(&s_nssai_iter);
|
|
ogs_assert(s_nssai_key);
|
|
if (!strcmp(s_nssai_key, "sst")) {
|
|
sst = ogs_yaml_iter_value(
|
|
&s_nssai_iter);
|
|
} else if (!strcmp(s_nssai_key, "sd")) {
|
|
sd = ogs_yaml_iter_value(
|
|
&s_nssai_iter);
|
|
} else if (!strcmp(s_nssai_key,
|
|
"dnn")) {
|
|
ogs_yaml_iter_t dnn_iter;
|
|
ogs_yaml_iter_recurse(&s_nssai_iter,
|
|
&dnn_iter);
|
|
ogs_assert(ogs_yaml_iter_type(
|
|
&dnn_iter) !=
|
|
YAML_MAPPING_NODE);
|
|
|
|
do {
|
|
const char *v = NULL;
|
|
|
|
if (ogs_yaml_iter_type(
|
|
&dnn_iter) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(
|
|
&dnn_iter))
|
|
break;
|
|
}
|
|
|
|
v = ogs_yaml_iter_value(
|
|
&dnn_iter);
|
|
if (v) {
|
|
ogs_assert(num_of_dnn <
|
|
OGS_MAX_NUM_OF_DNN);
|
|
dnn[num_of_dnn++] = v;
|
|
}
|
|
} while (ogs_yaml_iter_type(
|
|
&dnn_iter) ==
|
|
YAML_SEQUENCE_NODE);
|
|
}
|
|
}
|
|
|
|
if (sst) {
|
|
int i;
|
|
|
|
s_nssai->sst = atoi(sst);
|
|
if (sd)
|
|
s_nssai->sd =
|
|
ogs_uint24_from_string(
|
|
(char*)sd);
|
|
else
|
|
s_nssai->sd.v =
|
|
OGS_S_NSSAI_NO_SD_VALUE;
|
|
|
|
ogs_assert(num_of_dnn <
|
|
OGS_MAX_NUM_OF_DNN);
|
|
|
|
for (i = 0; i < num_of_dnn; i++) {
|
|
smf_info->slice[num_of_slice].
|
|
dnn[i] = ogs_strdup(dnn[i]);
|
|
ogs_assert(
|
|
smf_info->slice[num_of_slice].
|
|
dnn[i]);
|
|
}
|
|
|
|
smf_info->slice[num_of_slice].
|
|
num_of_dnn = num_of_dnn;
|
|
|
|
num_of_slice++;
|
|
}
|
|
} while (ogs_yaml_iter_type(&s_nssai_array) ==
|
|
YAML_SEQUENCE_NODE);
|
|
|
|
smf_info->num_of_slice = num_of_slice;
|
|
|
|
} else if (!strcmp(info_key, "tai")) {
|
|
int num_of_nr_tai = 0;
|
|
int num_of_nr_tai_range = 0;
|
|
|
|
ogs_yaml_iter_t tai_array, tai_iter;
|
|
ogs_yaml_iter_recurse(&info_iter, &tai_array);
|
|
do {
|
|
const char *mcc = NULL, *mnc = NULL;
|
|
int num_of_tac = 0;
|
|
ogs_uint24_t tac[OGS_MAX_NUM_OF_TAI];
|
|
int num_of_range = 0;
|
|
ogs_uint24_t start[OGS_MAX_NUM_OF_TAI];
|
|
ogs_uint24_t end[OGS_MAX_NUM_OF_TAI];
|
|
|
|
if (ogs_yaml_iter_type(&tai_array) ==
|
|
YAML_MAPPING_NODE) {
|
|
memcpy(&tai_iter, &tai_array,
|
|
sizeof(ogs_yaml_iter_t));
|
|
} else if (ogs_yaml_iter_type(&tai_array) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(&tai_array))
|
|
break;
|
|
ogs_yaml_iter_recurse(&tai_array,
|
|
&tai_iter);
|
|
} else if (ogs_yaml_iter_type(&tai_array) ==
|
|
YAML_SCALAR_NODE) {
|
|
break;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
while (ogs_yaml_iter_next(&tai_iter)) {
|
|
const char *tai_key =
|
|
ogs_yaml_iter_key(&tai_iter);
|
|
ogs_assert(tai_key);
|
|
if (!strcmp(tai_key, "plmn_id")) {
|
|
ogs_yaml_iter_t plmn_id_iter;
|
|
|
|
ogs_yaml_iter_recurse(
|
|
&tai_iter, &plmn_id_iter);
|
|
while (ogs_yaml_iter_next(
|
|
&plmn_id_iter)) {
|
|
const char *plmn_id_key =
|
|
ogs_yaml_iter_key(
|
|
&plmn_id_iter);
|
|
ogs_assert(plmn_id_key);
|
|
if (!strcmp(plmn_id_key,
|
|
"mcc")) {
|
|
mcc = ogs_yaml_iter_value(
|
|
&plmn_id_iter);
|
|
} else if (!strcmp(plmn_id_key,
|
|
"mnc")) {
|
|
mnc = ogs_yaml_iter_value(
|
|
&plmn_id_iter);
|
|
}
|
|
}
|
|
} else if (!strcmp(tai_key, "tac")) {
|
|
ogs_yaml_iter_t tac_iter;
|
|
ogs_yaml_iter_recurse(
|
|
&tai_iter, &tac_iter);
|
|
ogs_assert(ogs_yaml_iter_type(
|
|
&tac_iter) !=
|
|
YAML_MAPPING_NODE);
|
|
|
|
do {
|
|
const char *v = NULL;
|
|
|
|
ogs_assert(num_of_tac <
|
|
OGS_MAX_NUM_OF_TAI);
|
|
if (ogs_yaml_iter_type(
|
|
&tac_iter) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(
|
|
&tac_iter))
|
|
break;
|
|
}
|
|
|
|
v = ogs_yaml_iter_value(
|
|
&tac_iter);
|
|
if (v) {
|
|
tac[num_of_tac].v = atoi(v);
|
|
num_of_tac++;
|
|
}
|
|
} while (
|
|
ogs_yaml_iter_type(&tac_iter) ==
|
|
YAML_SEQUENCE_NODE);
|
|
} else if (!strcmp(tai_key, "range")) {
|
|
ogs_yaml_iter_t range_iter;
|
|
ogs_yaml_iter_recurse(
|
|
&tai_iter, &range_iter);
|
|
ogs_assert(ogs_yaml_iter_type(
|
|
&range_iter) !=
|
|
YAML_MAPPING_NODE);
|
|
do {
|
|
char *v = NULL;
|
|
char *low = NULL, *high = NULL;
|
|
|
|
if (ogs_yaml_iter_type(
|
|
&range_iter) ==
|
|
YAML_SEQUENCE_NODE) {
|
|
if (!ogs_yaml_iter_next(
|
|
&range_iter))
|
|
break;
|
|
}
|
|
|
|
v = (char *)ogs_yaml_iter_value(
|
|
&range_iter);
|
|
if (v) {
|
|
low = strsep(&v, "-");
|
|
if (low && strlen(low) == 0)
|
|
low = NULL;
|
|
|
|
high = v;
|
|
if (high &&
|
|
strlen(high) == 0)
|
|
high = NULL;
|
|
|
|
if (low && high) {
|
|
ogs_assert(
|
|
num_of_range <
|
|
OGS_MAX_NUM_OF_TAI);
|
|
start[num_of_range].v =
|
|
atoi(low);
|
|
end[num_of_range].v =
|
|
atoi(high);
|
|
num_of_range++;
|
|
}
|
|
}
|
|
} while (
|
|
ogs_yaml_iter_type(
|
|
&range_iter) ==
|
|
YAML_SEQUENCE_NODE);
|
|
|
|
} else
|
|
ogs_warn("unknown key `%s`",
|
|
tai_key);
|
|
}
|
|
|
|
if (mcc && mnc) {
|
|
int i;
|
|
|
|
if (num_of_range) {
|
|
ogs_assert(num_of_nr_tai_range <
|
|
OGS_MAX_NUM_OF_TAI);
|
|
ogs_plmn_id_build(
|
|
&smf_info->nr_tai_range
|
|
[num_of_nr_tai_range].
|
|
plmn_id,
|
|
atoi(mcc), atoi(mnc),
|
|
strlen(mnc));
|
|
for (i = 0; i < num_of_range; i++) {
|
|
smf_info->nr_tai_range
|
|
[num_of_nr_tai_range].
|
|
start[i].v = start[i].v;
|
|
smf_info->nr_tai_range
|
|
[num_of_nr_tai_range].
|
|
end[i].v = end[i].v;
|
|
}
|
|
smf_info->nr_tai_range
|
|
[num_of_nr_tai_range].
|
|
num_of_tac_range =
|
|
num_of_range;
|
|
num_of_nr_tai_range++;
|
|
} else if (num_of_tac) {
|
|
for (i = 0; i < num_of_tac; i++) {
|
|
ogs_assert(num_of_nr_tai <
|
|
OGS_MAX_NUM_OF_TAI);
|
|
ogs_plmn_id_build(
|
|
&smf_info->nr_tai
|
|
[num_of_nr_tai].plmn_id,
|
|
atoi(mcc), atoi(mnc),
|
|
strlen(mnc));
|
|
smf_info->nr_tai[num_of_nr_tai].
|
|
tac.v = tac[i].v;
|
|
num_of_nr_tai++;
|
|
}
|
|
} else {
|
|
ogs_warn("No TAC info");
|
|
}
|
|
}
|
|
} while (ogs_yaml_iter_type(&tai_array) ==
|
|
YAML_SEQUENCE_NODE);
|
|
|
|
smf_info->num_of_nr_tai = num_of_nr_tai;
|
|
smf_info->num_of_nr_tai_range =
|
|
num_of_nr_tai_range;
|
|
} else
|
|
ogs_warn("unknown key `%s`", info_key);
|
|
}
|
|
|
|
} while (ogs_yaml_iter_type(&info_array) ==
|
|
YAML_SEQUENCE_NODE);
|
|
|
|
} else if (!strcmp(smf_key, "pfcp")) {
|
|
/* handle config in pfcp library */
|
|
} else if (!strcmp(smf_key, "subnet")) {
|
|
/* handle config in pfcp library */
|
|
} else if (!strcmp(smf_key, "sbi")) {
|
|
/* handle config in sbi library */
|
|
} else
|
|
ogs_warn("unknown key `%s`", smf_key);
|
|
}
|
|
}
|
|
}
|
|
|
|
rv = smf_context_validation();
|
|
if (rv != OGS_OK) return rv;
|
|
|
|
return OGS_OK;
|
|
}
|
|
|
|
smf_ue_t *smf_ue_add_by_supi(char *supi)
|
|
{
|
|
smf_ue_t *smf_ue = NULL;
|
|
|
|
ogs_assert(supi);
|
|
|
|
ogs_pool_alloc(&smf_ue_pool, &smf_ue);
|
|
if (!smf_ue) {
|
|
ogs_error("Maximum number of smf_ue[%lld] reached",
|
|
(long long)ogs_app()->max.ue);
|
|
return NULL;
|
|
}
|
|
memset(smf_ue, 0, sizeof *smf_ue);
|
|
|
|
ogs_list_init(&smf_ue->sess_list);
|
|
|
|
smf_ue->supi = ogs_strdup(supi);
|
|
ogs_assert(smf_ue->supi);
|
|
ogs_hash_set(self.supi_hash, smf_ue->supi, strlen(smf_ue->supi), smf_ue);
|
|
|
|
ogs_list_add(&self.smf_ue_list, smf_ue);
|
|
|
|
ogs_info("[Added] Number of SMF-UEs is now %d",
|
|
ogs_list_count(&self.smf_ue_list));
|
|
|
|
return smf_ue;
|
|
}
|
|
|
|
smf_ue_t *smf_ue_add_by_imsi(uint8_t *imsi, int imsi_len)
|
|
{
|
|
smf_ue_t *smf_ue = NULL;
|
|
|
|
ogs_assert(imsi);
|
|
ogs_assert(imsi_len);
|
|
|
|
ogs_pool_alloc(&smf_ue_pool, &smf_ue);
|
|
if (!smf_ue) {
|
|
ogs_error("Maximum number of smf_ue[%lld] reached",
|
|
(long long)ogs_app()->max.ue);
|
|
return NULL;
|
|
}
|
|
memset(smf_ue, 0, sizeof *smf_ue);
|
|
|
|
ogs_list_init(&smf_ue->sess_list);
|
|
|
|
smf_ue->imsi_len = imsi_len;
|
|
memcpy(smf_ue->imsi, imsi, smf_ue->imsi_len);
|
|
ogs_buffer_to_bcd(smf_ue->imsi, smf_ue->imsi_len, smf_ue->imsi_bcd);
|
|
ogs_hash_set(self.imsi_hash, smf_ue->imsi, smf_ue->imsi_len, smf_ue);
|
|
|
|
ogs_list_add(&self.smf_ue_list, smf_ue);
|
|
|
|
ogs_info("[Added] Number of SMF-UEs is now %d",
|
|
ogs_list_count(&self.smf_ue_list));
|
|
|
|
return smf_ue;
|
|
}
|
|
|
|
void smf_ue_remove(smf_ue_t *smf_ue)
|
|
{
|
|
ogs_assert(smf_ue);
|
|
|
|
ogs_list_remove(&self.smf_ue_list, smf_ue);
|
|
|
|
smf_sess_remove_all(smf_ue);
|
|
|
|
if (smf_ue->supi) {
|
|
ogs_hash_set(self.supi_hash, smf_ue->supi, strlen(smf_ue->supi), NULL);
|
|
ogs_free(smf_ue->supi);
|
|
}
|
|
|
|
if (smf_ue->imsi_len) {
|
|
ogs_hash_set(self.imsi_hash, smf_ue->imsi, smf_ue->imsi_len, NULL);
|
|
}
|
|
|
|
ogs_pool_free(&smf_ue_pool, smf_ue);
|
|
|
|
ogs_info("[Removed] Number of SMF-UEs is now %d",
|
|
ogs_list_count(&self.smf_ue_list));
|
|
}
|
|
|
|
void smf_ue_remove_all(void)
|
|
{
|
|
smf_ue_t *smf_ue = NULL, *next = NULL;;
|
|
|
|
ogs_list_for_each_safe(&self.smf_ue_list, next, smf_ue)
|
|
smf_ue_remove(smf_ue);
|
|
}
|
|
|
|
smf_ue_t *smf_ue_find_by_supi(char *supi)
|
|
{
|
|
ogs_assert(supi);
|
|
return (smf_ue_t *)ogs_hash_get(self.supi_hash, supi, strlen(supi));
|
|
}
|
|
|
|
smf_ue_t *smf_ue_find_by_imsi(uint8_t *imsi, int imsi_len)
|
|
{
|
|
ogs_assert(imsi);
|
|
ogs_assert(imsi_len);
|
|
return (smf_ue_t *)ogs_hash_get(self.imsi_hash, imsi, imsi_len);
|
|
}
|
|
|
|
static bool compare_ue_info(ogs_pfcp_node_t *node, smf_sess_t *sess)
|
|
{
|
|
int i;
|
|
|
|
ogs_assert(node);
|
|
ogs_assert(sess);
|
|
ogs_assert(sess->session.name);
|
|
|
|
for (i = 0; i < node->num_of_dnn; i++)
|
|
if (ogs_strcasecmp(node->dnn[i], sess->session.name) == 0) return true;
|
|
|
|
for (i = 0; i < node->num_of_e_cell_id; i++)
|
|
if (sess->gtp_rat_type == OGS_GTP2_RAT_TYPE_EUTRAN &&
|
|
node->e_cell_id[i] == sess->e_cgi.cell_id) return true;
|
|
|
|
for (i = 0; i < node->num_of_nr_cell_id; i++)
|
|
if (node->nr_cell_id[i] == sess->nr_cgi.cell_id) return true;
|
|
|
|
for (i = 0; i < node->num_of_tac; i++)
|
|
if ((sess->gtp_rat_type == OGS_GTP2_RAT_TYPE_EUTRAN &&
|
|
node->tac[i] == sess->e_tai.tac) ||
|
|
(node->tac[i] == sess->nr_tai.tac.v)) return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
static ogs_pfcp_node_t *selected_upf_node(
|
|
ogs_pfcp_node_t *current, smf_sess_t *sess)
|
|
{
|
|
ogs_pfcp_node_t *next, *node;
|
|
|
|
ogs_assert(current);
|
|
ogs_assert(sess);
|
|
|
|
/* continue search from current position */
|
|
next = ogs_list_next(current);
|
|
for (node = next; node; node = ogs_list_next(node)) {
|
|
if (OGS_FSM_CHECK(&node->sm, smf_pfcp_state_associated) &&
|
|
compare_ue_info(node, sess) == true) return node;
|
|
}
|
|
/* cyclic search from top to current position */
|
|
for (node = ogs_list_first(&ogs_pfcp_self()->pfcp_peer_list);
|
|
node != next; node = ogs_list_next(node)) {
|
|
if (OGS_FSM_CHECK(&node->sm, smf_pfcp_state_associated) &&
|
|
compare_ue_info(node, sess) == true) return node;
|
|
}
|
|
|
|
if (ogs_app()->parameter.no_pfcp_rr_select == 0) {
|
|
/* continue search from current position */
|
|
next = ogs_list_next(current);
|
|
for (node = next; node; node = ogs_list_next(node)) {
|
|
if (OGS_FSM_CHECK(&node->sm, smf_pfcp_state_associated))
|
|
return node;
|
|
}
|
|
/* cyclic search from top to current position */
|
|
for (node = ogs_list_first(&ogs_pfcp_self()->pfcp_peer_list);
|
|
node != next; node = ogs_list_next(node)) {
|
|
if (OGS_FSM_CHECK(&node->sm, smf_pfcp_state_associated))
|
|
return node;
|
|
}
|
|
}
|
|
|
|
ogs_error("No UPFs are PFCP associated that are suited to RR");
|
|
return ogs_list_first(&ogs_pfcp_self()->pfcp_peer_list);
|
|
}
|
|
|
|
void smf_sess_select_upf(smf_sess_t *sess)
|
|
{
|
|
char buf[OGS_ADDRSTRLEN];
|
|
|
|
ogs_assert(sess);
|
|
|
|
/*
|
|
* When used for the first time, if last node is set,
|
|
* the search is performed from the first UPF in a round-robin manner.
|
|
*/
|
|
if (ogs_pfcp_self()->pfcp_node == NULL)
|
|
ogs_pfcp_self()->pfcp_node =
|
|
ogs_list_last(&ogs_pfcp_self()->pfcp_peer_list);
|
|
|
|
/* setup GTP session with selected UPF */
|
|
ogs_pfcp_self()->pfcp_node =
|
|
selected_upf_node(ogs_pfcp_self()->pfcp_node, sess);
|
|
ogs_assert(ogs_pfcp_self()->pfcp_node);
|
|
OGS_SETUP_PFCP_NODE(sess, ogs_pfcp_self()->pfcp_node);
|
|
ogs_debug("UE using UPF on IP[%s]",
|
|
OGS_ADDR(&ogs_pfcp_self()->pfcp_node->addr, buf));
|
|
}
|
|
|
|
smf_sess_t *smf_sess_add_by_apn(smf_ue_t *smf_ue, char *apn, uint8_t rat_type)
|
|
{
|
|
smf_event_t e;
|
|
|
|
smf_sess_t *sess = NULL;
|
|
|
|
ogs_assert(smf_ue);
|
|
ogs_assert(apn);
|
|
|
|
ogs_pool_alloc(&smf_sess_pool, &sess);
|
|
if (!sess) {
|
|
ogs_error("Maximum number of session[%lld] reached",
|
|
(long long)ogs_app()->pool.sess);
|
|
return NULL;
|
|
}
|
|
memset(sess, 0, sizeof *sess);
|
|
|
|
ogs_pfcp_pool_init(&sess->pfcp);
|
|
smf_qfi_pool_init(sess);
|
|
smf_pf_precedence_pool_init(sess);
|
|
|
|
sess->index = ogs_pool_index(&smf_sess_pool, sess);
|
|
ogs_assert(sess->index > 0 && sess->index <= ogs_app()->pool.sess);
|
|
|
|
/* Set TEID & SEID */
|
|
sess->smf_n4_teid = sess->index;
|
|
sess->smf_n4_seid = sess->index;
|
|
|
|
/* Set Charging ID */
|
|
sess->charging.id = sess->index;
|
|
|
|
/* Create BAR in PFCP Session */
|
|
ogs_pfcp_bar_new(&sess->pfcp);
|
|
|
|
/* Set APN */
|
|
sess->session.name = ogs_strdup(apn);
|
|
ogs_assert(sess->session.name);
|
|
|
|
/* Set RAT-Type */
|
|
sess->gtp_rat_type = rat_type;
|
|
ogs_assert(sess->gtp_rat_type);
|
|
|
|
memset(&e, 0, sizeof(e));
|
|
e.sess = sess;
|
|
ogs_fsm_create(&sess->sm, smf_gsm_state_initial, smf_gsm_state_final);
|
|
ogs_fsm_init(&sess->sm, &e);
|
|
|
|
sess->smf_ue = smf_ue;
|
|
|
|
ogs_list_add(&smf_ue->sess_list, sess);
|
|
|
|
stats_add_smf_session();
|
|
|
|
return sess;
|
|
}
|
|
|
|
smf_sess_t *smf_sess_add_by_gtp1_message(ogs_gtp1_message_t *message)
|
|
{
|
|
smf_ue_t *smf_ue = NULL;
|
|
smf_sess_t *sess = NULL;
|
|
char apn[OGS_MAX_APN_LEN+1];
|
|
|
|
ogs_gtp1_create_pdp_context_request_t *req = &message->create_pdp_context_request;
|
|
|
|
if (req->imsi.presence == 0) {
|
|
ogs_error("No IMSI");
|
|
return NULL;
|
|
}
|
|
if (req->tunnel_endpoint_identifier_data_i.presence == 0) {
|
|
ogs_error("No Tunnel Endpoint Identifier Data I");
|
|
return NULL;
|
|
}
|
|
if (req->nsapi.presence == 0) {
|
|
ogs_error("No NSAPI");
|
|
return NULL;
|
|
}
|
|
if (req->access_point_name.presence == 0) {
|
|
ogs_error("No APN");
|
|
return NULL;
|
|
}
|
|
if (req->sgsn_address_for_signalling.presence == 0) {
|
|
ogs_error("No SGSN Address for signalling");
|
|
return NULL;
|
|
}
|
|
if (req->sgsn_address_for_user_traffic.presence == 0) {
|
|
ogs_error("No SGSN Address for user traffic");
|
|
return NULL;
|
|
}
|
|
if (req->quality_of_service_profile.presence == 0) {
|
|
ogs_error("No QoS Profile");
|
|
return NULL;
|
|
}
|
|
if (req->rat_type.presence == 0) {
|
|
ogs_error("No RAT Type");
|
|
return NULL;
|
|
}
|
|
|
|
if ((ogs_fqdn_parse(apn, req->access_point_name.data,
|
|
ogs_min(req->access_point_name.len, OGS_MAX_APN_LEN+1))) <= 0) {
|
|
ogs_error("No APN");
|
|
return NULL;
|
|
}
|
|
|
|
ogs_trace("smf_sess_add_by_message() [APN:%s]", apn);
|
|
|
|
/*
|
|
* 7.3.1 in 3GPP TS 29.060 Release 16
|
|
*
|
|
* If a new Create PDP Context Request is incoming on TEID 0 for an already
|
|
* active PDP context, this Create PDP Context Request must be considered
|
|
* related to a new session. The existing PDP context shall be torn down
|
|
* locally, and the associated PDP contexts deleted locally, before the new
|
|
* session is created.
|
|
*/
|
|
|
|
smf_ue = smf_ue_find_by_imsi(req->imsi.data, req->imsi.len);
|
|
if (!smf_ue) {
|
|
smf_ue = smf_ue_add_by_imsi(req->imsi.data, req->imsi.len);
|
|
if (!smf_ue)
|
|
return NULL;
|
|
}
|
|
|
|
sess = smf_sess_find_by_apn(smf_ue, apn, req->rat_type.u8);
|
|
if (sess) {
|
|
ogs_warn("OLD Session Release [IMSI:%s,APN:%s]",
|
|
smf_ue->imsi_bcd, sess->session.name);
|
|
smf_sess_remove(sess);
|
|
}
|
|
|
|
sess = smf_sess_add_by_apn(smf_ue, apn, req->rat_type.u8);
|
|
return sess;
|
|
}
|
|
|
|
smf_sess_t *smf_sess_add_by_gtp_message(ogs_gtp2_message_t *message)
|
|
{
|
|
smf_ue_t *smf_ue = NULL;
|
|
smf_sess_t *sess = NULL;
|
|
char apn[OGS_MAX_APN_LEN+1];
|
|
|
|
ogs_gtp2_create_session_request_t *req = &message->create_session_request;
|
|
|
|
if (req->imsi.presence == 0) {
|
|
ogs_error("No IMSI");
|
|
return NULL;
|
|
}
|
|
if (req->access_point_name.presence == 0) {
|
|
ogs_error("No APN");
|
|
return NULL;
|
|
}
|
|
if (req->rat_type.presence == 0) {
|
|
ogs_error("No RAT Type");
|
|
return NULL;
|
|
}
|
|
|
|
ogs_assert(0 < ogs_fqdn_parse(apn, req->access_point_name.data,
|
|
ogs_min(req->access_point_name.len, OGS_MAX_APN_LEN)));
|
|
|
|
ogs_trace("smf_sess_add_by_message() [APN:%s]", apn);
|
|
|
|
/*
|
|
* 7.2.1 in 3GPP TS 29.274 Release 15
|
|
*
|
|
* If the new Create Session Request received by the SMF collides with
|
|
* an existing PDN connection context (the existing PDN connection context
|
|
* is identified with the triplet [IMSI, EPS Bearer ID, Interface type],
|
|
* where applicable Interface type here is S2a TWAN GTP-C interface or
|
|
* S2b ePDG GTP-C interface or S5/S8 SGW GTP-C interface, and where IMSI
|
|
* shall be replaced by TAC and SNR part of ME Identity for emergency
|
|
* attached UE without UICC or authenticated IMSI), this Create Session
|
|
* Request shall be treated as a request for a new session. Before creating
|
|
* the new session, the SMF should delete:
|
|
*
|
|
* - the existing PDN connection context, if the Create Session Request
|
|
* collides with the default bearer of an existing PDN connection context;
|
|
* - the existing dedicated bearer context, if the Create Session Request
|
|
* collides with a dedicated bearer of an existing PDN connection context.
|
|
*/
|
|
|
|
smf_ue = smf_ue_find_by_imsi(req->imsi.data, req->imsi.len);
|
|
if (!smf_ue) {
|
|
smf_ue = smf_ue_add_by_imsi(req->imsi.data, req->imsi.len);
|
|
if (!smf_ue)
|
|
return NULL;
|
|
}
|
|
|
|
sess = smf_sess_find_by_apn(smf_ue, apn, req->rat_type.u8);
|
|
if (sess) {
|
|
ogs_info("OLD Session Release [IMSI:%s,APN:%s]",
|
|
smf_ue->imsi_bcd, sess->session.name);
|
|
smf_sess_remove(sess);
|
|
}
|
|
|
|
sess = smf_sess_add_by_apn(smf_ue, apn, req->rat_type.u8);
|
|
return sess;
|
|
}
|
|
|
|
smf_sess_t *smf_sess_add_by_psi(smf_ue_t *smf_ue, uint8_t psi)
|
|
{
|
|
smf_event_t e;
|
|
|
|
smf_sess_t *sess = NULL;
|
|
|
|
ogs_assert(smf_ue);
|
|
ogs_assert(psi != OGS_NAS_PDU_SESSION_IDENTITY_UNASSIGNED);
|
|
|
|
ogs_pool_alloc(&smf_sess_pool, &sess);
|
|
if (!sess) {
|
|
ogs_error("Maximum number of session[%lld] reached",
|
|
(long long)ogs_app()->pool.sess);
|
|
return NULL;
|
|
}
|
|
memset(sess, 0, sizeof *sess);
|
|
|
|
/* SBI Features */
|
|
OGS_SBI_FEATURES_SET(sess->smpolicycontrol_features,
|
|
OGS_SBI_NPCF_SMPOLICYCONTROL_DN_AUTHORIZATION);
|
|
|
|
ogs_pfcp_pool_init(&sess->pfcp);
|
|
smf_qfi_pool_init(sess);
|
|
smf_pf_precedence_pool_init(sess);
|
|
|
|
sess->index = ogs_pool_index(&smf_sess_pool, sess);
|
|
ogs_assert(sess->index > 0 && sess->index <= ogs_app()->pool.sess);
|
|
|
|
/* Set SmContextRef in 5GC */
|
|
sess->sm_context_ref = ogs_msprintf("%d",
|
|
(int)ogs_pool_index(&smf_sess_pool, sess));
|
|
ogs_assert(sess->sm_context_ref);
|
|
|
|
/* Create BAR in PFCP Session */
|
|
ogs_pfcp_bar_new(&sess->pfcp);
|
|
|
|
/* Set PSI */
|
|
sess->psi = psi;
|
|
|
|
/* Set S-NSSAI */
|
|
sess->s_nssai.sst = 0;
|
|
sess->s_nssai.sd.v = OGS_S_NSSAI_NO_SD_VALUE;
|
|
sess->mapped_hplmn.sst = 0;
|
|
sess->mapped_hplmn.sd.v = OGS_S_NSSAI_NO_SD_VALUE;
|
|
|
|
/* Set TEID & SEID */
|
|
sess->smf_n4_teid = sess->index;
|
|
sess->smf_n4_seid = sess->index;
|
|
|
|
/* Set Charging Id */
|
|
sess->charging.id = sess->index;
|
|
|
|
memset(&e, 0, sizeof(e));
|
|
e.sess = sess;
|
|
ogs_fsm_create(&sess->sm, smf_gsm_state_initial, smf_gsm_state_final);
|
|
ogs_fsm_init(&sess->sm, &e);
|
|
|
|
sess->smf_ue = smf_ue;
|
|
|
|
ogs_list_add(&smf_ue->sess_list, sess);
|
|
|
|
stats_add_smf_session();
|
|
|
|
return sess;
|
|
}
|
|
|
|
smf_sess_t *smf_sess_add_by_sbi_message(ogs_sbi_message_t *message)
|
|
{
|
|
smf_ue_t *smf_ue = NULL;
|
|
smf_sess_t *sess = NULL;
|
|
|
|
OpenAPI_sm_context_create_data_t *SmContextCreateData = NULL;
|
|
|
|
ogs_assert(message);
|
|
SmContextCreateData = message->SmContextCreateData;
|
|
ogs_assert(SmContextCreateData);
|
|
|
|
if (!SmContextCreateData->supi) {
|
|
ogs_error("No SUPI");
|
|
return NULL;
|
|
}
|
|
|
|
if (SmContextCreateData->is_pdu_session_id == false) {
|
|
ogs_error("PDU session identitiy is unassigned");
|
|
return NULL;
|
|
}
|
|
|
|
smf_ue = smf_ue_find_by_supi(SmContextCreateData->supi);
|
|
if (!smf_ue) {
|
|
smf_ue = smf_ue_add_by_supi(SmContextCreateData->supi);
|
|
if (!smf_ue)
|
|
return NULL;
|
|
}
|
|
|
|
sess = smf_sess_find_by_psi(smf_ue, SmContextCreateData->pdu_session_id);
|
|
if (sess) {
|
|
ogs_warn("OLD Session Release [SUPI:%s,PDU Session identity:%d]",
|
|
SmContextCreateData->supi, SmContextCreateData->pdu_session_id);
|
|
smf_sess_remove(sess);
|
|
}
|
|
|
|
sess = smf_sess_add_by_psi(smf_ue, SmContextCreateData->pdu_session_id);
|
|
|
|
return sess;
|
|
}
|
|
|
|
uint8_t smf_sess_set_ue_ip(smf_sess_t *sess)
|
|
{
|
|
ogs_pfcp_subnet_t *subnet6 = NULL;
|
|
smf_ue_t *smf_ue = NULL;
|
|
|
|
uint8_t cause_value = OGS_PFCP_CAUSE_REQUEST_ACCEPTED;
|
|
|
|
ogs_assert(sess);
|
|
smf_ue = sess->smf_ue;
|
|
ogs_assert(smf_ue);
|
|
|
|
if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4V6) {
|
|
|
|
/*
|
|
* This is the case when the HSS is set to IPv4v6 and
|
|
* the UE requests IPv4v6.
|
|
*
|
|
* At this time, it was changed to operate normally
|
|
* even when SMF has no IPv4 or IPv6 subnet.
|
|
*
|
|
* If there is no IPv6 subnet, only IPv4 IP address is assigned.
|
|
* If there is no IPv4 subnet, only IPv6 IP address is assigned.
|
|
* If there are IPv4/IPv6 subnet, IPv4/IPv6 IP address are assigned.
|
|
*/
|
|
|
|
ogs_pfcp_subnet_t *subnet = NULL;
|
|
ogs_pfcp_subnet_t *subnet6 = NULL;
|
|
|
|
ogs_assert(sess->session.name);
|
|
subnet = ogs_pfcp_find_subnet_by_dnn(AF_INET, sess->session.name);
|
|
subnet6 = ogs_pfcp_find_subnet_by_dnn(AF_INET6, sess->session.name);
|
|
|
|
if (subnet != NULL && subnet6 == NULL)
|
|
sess->session.session_type = OGS_PDU_SESSION_TYPE_IPV4;
|
|
else if (subnet == NULL && subnet6 != NULL)
|
|
sess->session.session_type = OGS_PDU_SESSION_TYPE_IPV6;
|
|
}
|
|
|
|
sess->session.paa.session_type = sess->session.session_type;
|
|
ogs_assert(sess->session.session_type);
|
|
|
|
if (sess->ipv4) {
|
|
ogs_hash_set(smf_self()->ipv4_hash,
|
|
sess->ipv4->addr, OGS_IPV4_LEN, NULL);
|
|
ogs_pfcp_ue_ip_free(sess->ipv4);
|
|
}
|
|
if (sess->ipv6) {
|
|
ogs_hash_set(smf_self()->ipv6_hash,
|
|
sess->ipv6->addr, OGS_IPV6_DEFAULT_PREFIX_LEN >> 3, NULL);
|
|
ogs_pfcp_ue_ip_free(sess->ipv6);
|
|
}
|
|
|
|
if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4) {
|
|
sess->ipv4 = ogs_pfcp_ue_ip_alloc(&cause_value, AF_INET,
|
|
sess->session.name, (uint8_t *)&sess->session.ue_ip.addr);
|
|
if (!sess->ipv4) {
|
|
ogs_error("ogs_pfcp_ue_ip_alloc() failed[%d]", cause_value);
|
|
ogs_assert(cause_value != OGS_PFCP_CAUSE_REQUEST_ACCEPTED);
|
|
return cause_value;
|
|
}
|
|
sess->session.paa.addr = sess->ipv4->addr[0];
|
|
ogs_hash_set(smf_self()->ipv4_hash,
|
|
sess->ipv4->addr, OGS_IPV4_LEN, sess);
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV6) {
|
|
sess->ipv6 = ogs_pfcp_ue_ip_alloc(&cause_value, AF_INET6,
|
|
sess->session.name, sess->session.ue_ip.addr6);
|
|
if (!sess->ipv6) {
|
|
ogs_error("ogs_pfcp_ue_ip_alloc() failed[%d]", cause_value);
|
|
ogs_assert(cause_value != OGS_PFCP_CAUSE_REQUEST_ACCEPTED);
|
|
return cause_value;
|
|
}
|
|
|
|
subnet6 = sess->ipv6->subnet;
|
|
ogs_assert(subnet6);
|
|
|
|
sess->session.paa.len = OGS_IPV6_DEFAULT_PREFIX_LEN >> 3;
|
|
memcpy(sess->session.paa.addr6, sess->ipv6->addr, OGS_IPV6_LEN);
|
|
ogs_hash_set(smf_self()->ipv6_hash,
|
|
sess->ipv6->addr, OGS_IPV6_DEFAULT_PREFIX_LEN >> 3, sess);
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4V6) {
|
|
sess->ipv4 = ogs_pfcp_ue_ip_alloc(&cause_value, AF_INET,
|
|
sess->session.name, (uint8_t *)&sess->session.ue_ip.addr);
|
|
if (!sess->ipv4) {
|
|
ogs_error("ogs_pfcp_ue_ip_alloc() failed[%d]", cause_value);
|
|
ogs_assert(cause_value != OGS_PFCP_CAUSE_REQUEST_ACCEPTED);
|
|
return cause_value;
|
|
}
|
|
sess->ipv6 = ogs_pfcp_ue_ip_alloc(&cause_value, AF_INET6,
|
|
sess->session.name, sess->session.ue_ip.addr6);
|
|
if (!sess->ipv6) {
|
|
ogs_error("ogs_pfcp_ue_ip_alloc() failed[%d]", cause_value);
|
|
ogs_assert(cause_value != OGS_PFCP_CAUSE_REQUEST_ACCEPTED);
|
|
if (sess->ipv4) {
|
|
ogs_hash_set(smf_self()->ipv4_hash,
|
|
sess->ipv4->addr, OGS_IPV4_LEN, NULL);
|
|
ogs_pfcp_ue_ip_free(sess->ipv4);
|
|
sess->ipv4 = NULL;
|
|
}
|
|
return cause_value;
|
|
}
|
|
|
|
subnet6 = sess->ipv6->subnet;
|
|
ogs_assert(subnet6);
|
|
|
|
sess->session.paa.both.addr = sess->ipv4->addr[0];
|
|
sess->session.paa.both.len = OGS_IPV6_DEFAULT_PREFIX_LEN >> 3;
|
|
memcpy(sess->session.paa.both.addr6, sess->ipv6->addr, OGS_IPV6_LEN);
|
|
ogs_hash_set(smf_self()->ipv4_hash,
|
|
sess->ipv4->addr, OGS_IPV4_LEN, sess);
|
|
ogs_hash_set(smf_self()->ipv6_hash,
|
|
sess->ipv6->addr, OGS_IPV6_DEFAULT_PREFIX_LEN >> 3, sess);
|
|
} else {
|
|
ogs_fatal("Invalid sess->session.session_type[%d]",
|
|
sess->session.session_type);
|
|
ogs_assert_if_reached();
|
|
}
|
|
|
|
return cause_value;
|
|
}
|
|
|
|
void smf_sess_set_paging_n1n2message_location(
|
|
smf_sess_t *sess, char *n1n2message_location)
|
|
{
|
|
ogs_assert(sess);
|
|
ogs_assert(n1n2message_location);
|
|
|
|
if (sess->paging.n1n2message_location) {
|
|
ogs_hash_set(self.n1n2message_hash,
|
|
sess->paging.n1n2message_location,
|
|
strlen(sess->paging.n1n2message_location),
|
|
NULL);
|
|
ogs_free(sess->paging.n1n2message_location);
|
|
}
|
|
|
|
sess->paging.n1n2message_location = ogs_strdup(n1n2message_location);
|
|
ogs_assert(sess->paging.n1n2message_location);
|
|
|
|
ogs_hash_set(self.n1n2message_hash,
|
|
sess->paging.n1n2message_location,
|
|
strlen(sess->paging.n1n2message_location),
|
|
sess);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_error_indication_report(
|
|
smf_ue_t *smf_ue,
|
|
ogs_pfcp_tlv_error_indication_report_t *error_indication_report)
|
|
{
|
|
smf_sess_t *sess = NULL;
|
|
ogs_pfcp_f_teid_t *remote_f_teid = NULL;
|
|
|
|
uint32_t teid;
|
|
uint16_t len; /* OGS_IPV4_LEN or OGS_IPV6_LEN */
|
|
uint32_t addr[4];
|
|
|
|
ogs_assert(smf_ue);
|
|
ogs_assert(error_indication_report);
|
|
|
|
if (error_indication_report->presence == 0) {
|
|
ogs_error("No Error Indication Report");
|
|
return NULL;
|
|
}
|
|
|
|
if (error_indication_report->remote_f_teid.presence == 0) {
|
|
ogs_error("No Remote F-TEID");
|
|
return NULL;
|
|
}
|
|
|
|
remote_f_teid = error_indication_report->remote_f_teid.data;
|
|
ogs_assert(remote_f_teid);
|
|
|
|
teid = be32toh(remote_f_teid->teid);
|
|
if (remote_f_teid->ipv4 && remote_f_teid->ipv6) {
|
|
ogs_error("User plane should not set both IPv4 and IPv6");
|
|
return NULL;
|
|
} else if (remote_f_teid->ipv4) {
|
|
len = OGS_IPV4_LEN;
|
|
memcpy(addr, &remote_f_teid->addr, len);
|
|
} else if (remote_f_teid->ipv6) {
|
|
len = OGS_IPV6_LEN;
|
|
memcpy(addr, remote_f_teid->addr6, len);
|
|
} else {
|
|
ogs_error("No IPv4 and IPv6");
|
|
return NULL;
|
|
}
|
|
|
|
ogs_list_for_each(&smf_ue->sess_list, sess) {
|
|
if (teid == sess->gnb_n3_teid) {
|
|
if (len == OGS_IPV4_LEN && sess->gnb_n3_ip.ipv4 &&
|
|
memcmp(addr, &sess->gnb_n3_ip.addr, len) == 0) {
|
|
return sess;
|
|
} else if (len == OGS_IPV6_LEN && sess->gnb_n3_ip.ipv6 &&
|
|
memcmp(addr, sess->gnb_n3_ip.addr6, len) == 0) {
|
|
return sess;
|
|
}
|
|
}
|
|
}
|
|
|
|
ogs_error("Cannot find the session context "
|
|
"[TEID:%d,LEN:%d,ADDR:%08x %08x %08x %08x]",
|
|
teid, len, be32toh(addr[0]), be32toh(addr[1]),
|
|
be32toh(addr[2]), be32toh(addr[3]));
|
|
|
|
return NULL;
|
|
}
|
|
|
|
void smf_sess_remove(smf_sess_t *sess)
|
|
{
|
|
int i;
|
|
smf_ue_t *smf_ue = NULL;
|
|
smf_event_t e;
|
|
|
|
char buf1[OGS_ADDRSTRLEN];
|
|
char buf2[OGS_ADDRSTRLEN];
|
|
|
|
ogs_assert(sess);
|
|
smf_ue = sess->smf_ue;
|
|
ogs_assert(smf_ue);
|
|
|
|
ogs_info("Removed Session: UE IMSI:[%s] DNN:[%s:%d] IPv4:[%s] IPv6:[%s]",
|
|
smf_ue->supi ? smf_ue->supi : smf_ue->imsi_bcd,
|
|
sess->session.name, sess->psi,
|
|
sess->ipv4 ? OGS_INET_NTOP(&sess->ipv4->addr, buf1) : "",
|
|
sess->ipv6 ? OGS_INET6_NTOP(&sess->ipv6->addr, buf2) : "");
|
|
|
|
ogs_list_remove(&smf_ue->sess_list, sess);
|
|
|
|
memset(&e, 0, sizeof(e));
|
|
e.sess = sess;
|
|
ogs_fsm_fini(&sess->sm, &e);
|
|
ogs_fsm_delete(&sess->sm);
|
|
|
|
OGS_TLV_CLEAR_DATA(&sess->gtp.ue_pco);
|
|
OGS_TLV_CLEAR_DATA(&sess->gtp.user_location_information);
|
|
OGS_TLV_CLEAR_DATA(&sess->gtp.ue_timezone);
|
|
|
|
OGS_NAS_CLEAR_DATA(&sess->nas.ue_pco);
|
|
|
|
for (i = 0; i < sess->policy.num_of_pcc_rule; i++)
|
|
OGS_PCC_RULE_FREE(&sess->policy.pcc_rule[i]);
|
|
sess->policy.num_of_pcc_rule = 0;
|
|
|
|
if (sess->ipv4) {
|
|
ogs_hash_set(self.ipv4_hash, sess->ipv4->addr, OGS_IPV4_LEN, NULL);
|
|
ogs_pfcp_ue_ip_free(sess->ipv4);
|
|
}
|
|
if (sess->ipv6) {
|
|
ogs_hash_set(self.ipv6_hash,
|
|
sess->ipv6->addr, OGS_IPV6_DEFAULT_PREFIX_LEN >> 3, NULL);
|
|
ogs_pfcp_ue_ip_free(sess->ipv6);
|
|
}
|
|
|
|
if (sess->paging.n1n2message_location) {
|
|
ogs_hash_set(self.n1n2message_hash,
|
|
sess->paging.n1n2message_location,
|
|
strlen(sess->paging.n1n2message_location),
|
|
NULL);
|
|
ogs_free(sess->paging.n1n2message_location);
|
|
}
|
|
|
|
if (sess->sm_context_ref)
|
|
ogs_free(sess->sm_context_ref);
|
|
|
|
if (sess->sm_context_status_uri)
|
|
ogs_free(sess->sm_context_status_uri);
|
|
if (sess->namf.client)
|
|
ogs_sbi_client_remove(sess->namf.client);
|
|
|
|
if (sess->policy_association_id)
|
|
ogs_free(sess->policy_association_id);
|
|
|
|
if (sess->session.name)
|
|
ogs_free(sess->session.name);
|
|
|
|
if (sess->upf_n3_addr)
|
|
ogs_freeaddrinfo(sess->upf_n3_addr);
|
|
if (sess->upf_n3_addr6)
|
|
ogs_freeaddrinfo(sess->upf_n3_addr6);
|
|
|
|
if (sess->handover.upf_dl_addr)
|
|
ogs_freeaddrinfo(sess->handover.upf_dl_addr);
|
|
if (sess->handover.upf_dl_addr6)
|
|
ogs_freeaddrinfo(sess->handover.upf_dl_addr6);
|
|
|
|
if (sess->pcf_id)
|
|
ogs_free(sess->pcf_id);
|
|
|
|
/* Free SBI object memory */
|
|
ogs_sbi_object_free(&sess->sbi);
|
|
|
|
smf_bearer_remove_all(sess);
|
|
|
|
ogs_assert(sess->pfcp.bar);
|
|
ogs_pfcp_bar_delete(sess->pfcp.bar);
|
|
|
|
smf_sess_delete_cp_up_data_forwarding(sess);
|
|
|
|
ogs_pfcp_pool_final(&sess->pfcp);
|
|
smf_qfi_pool_final(sess);
|
|
smf_pf_precedence_pool_final(sess);
|
|
|
|
ogs_pool_free(&smf_sess_pool, sess);
|
|
|
|
stats_remove_smf_session();
|
|
}
|
|
|
|
void smf_sess_remove_all(smf_ue_t *smf_ue)
|
|
{
|
|
smf_sess_t *sess = NULL, *next = NULL;;
|
|
|
|
ogs_assert(smf_ue);
|
|
|
|
ogs_list_for_each_safe(&smf_ue->sess_list, next, sess)
|
|
smf_sess_remove(sess);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find(uint32_t index)
|
|
{
|
|
return ogs_pool_find(&smf_sess_pool, index);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_teid(uint32_t teid)
|
|
{
|
|
return smf_sess_find(teid);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_seid(uint64_t seid)
|
|
{
|
|
return smf_sess_find(seid);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_apn(smf_ue_t *smf_ue, char *apn, uint8_t rat_type)
|
|
{
|
|
smf_sess_t *sess = NULL;
|
|
|
|
ogs_assert(smf_ue);
|
|
ogs_assert(apn);
|
|
|
|
ogs_list_for_each(&smf_ue->sess_list, sess) {
|
|
if (ogs_strcasecmp(sess->session.name, apn) == 0 &&
|
|
sess->gtp_rat_type == rat_type)
|
|
return sess;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_psi(smf_ue_t *smf_ue, uint8_t psi)
|
|
{
|
|
smf_sess_t *sess = NULL;
|
|
|
|
ogs_assert(smf_ue);
|
|
ogs_assert(psi != OGS_NAS_PDU_SESSION_IDENTITY_UNASSIGNED);
|
|
|
|
ogs_list_for_each(&smf_ue->sess_list, sess) {
|
|
if (sess->psi == psi)
|
|
return sess;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_charging_id(uint32_t charging_id)
|
|
{
|
|
ogs_assert(charging_id);
|
|
return smf_sess_find(charging_id);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_sm_context_ref(char *sm_context_ref)
|
|
{
|
|
ogs_assert(sm_context_ref);
|
|
return smf_sess_find(atoll(sm_context_ref));
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_ipv4(uint32_t addr)
|
|
{
|
|
ogs_assert(self.ipv4_hash);
|
|
return (smf_sess_t *)ogs_hash_get(self.ipv4_hash, &addr, OGS_IPV4_LEN);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_ipv6(uint32_t *addr6)
|
|
{
|
|
ogs_assert(self.ipv6_hash);
|
|
ogs_assert(addr6);
|
|
return (smf_sess_t *)ogs_hash_get(
|
|
self.ipv6_hash, addr6, OGS_IPV6_DEFAULT_PREFIX_LEN >> 3);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_find_by_paging_n1n2message_location(
|
|
char *n1n2message_location)
|
|
{
|
|
ogs_assert(self.n1n2message_hash);
|
|
ogs_assert(n1n2message_location);
|
|
return (smf_sess_t *)ogs_hash_get(self.n1n2message_hash,
|
|
n1n2message_location, strlen(n1n2message_location));
|
|
}
|
|
|
|
ogs_pcc_rule_t *smf_pcc_rule_find_by_id(smf_sess_t *sess, char *pcc_rule_id)
|
|
{
|
|
int i;
|
|
|
|
ogs_assert(sess);
|
|
ogs_assert(pcc_rule_id);
|
|
|
|
for (i = 0; i < sess->policy.num_of_pcc_rule; i++) {
|
|
ogs_pcc_rule_t *pcc_rule = &sess->policy.pcc_rule[i];
|
|
if (pcc_rule->id && strcmp(pcc_rule->id, pcc_rule_id) == 0) {
|
|
return pcc_rule;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_bearer_t *smf_qos_flow_add(smf_sess_t *sess)
|
|
{
|
|
smf_bearer_t *qos_flow = NULL;
|
|
|
|
ogs_pfcp_pdr_t *dl_pdr = NULL;
|
|
ogs_pfcp_pdr_t *ul_pdr = NULL;
|
|
ogs_pfcp_far_t *dl_far = NULL;
|
|
ogs_pfcp_far_t *ul_far = NULL;
|
|
ogs_pfcp_urr_t *urr = NULL;
|
|
ogs_pfcp_qer_t *qer = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_pool_alloc(&smf_bearer_pool, &qos_flow);
|
|
ogs_assert(qos_flow);
|
|
memset(qos_flow, 0, sizeof *qos_flow);
|
|
|
|
smf_pf_identifier_pool_init(qos_flow);
|
|
|
|
qos_flow->index = ogs_pool_index(&smf_bearer_pool, qos_flow);
|
|
ogs_assert(qos_flow->index > 0 && qos_flow->index <=
|
|
ogs_app()->pool.bearer);
|
|
|
|
ogs_list_init(&qos_flow->pf_list);
|
|
|
|
/* PDR */
|
|
dl_pdr = ogs_pfcp_pdr_add(&sess->pfcp);
|
|
ogs_assert(dl_pdr);
|
|
qos_flow->dl_pdr = dl_pdr;
|
|
|
|
dl_pdr->src_if = OGS_PFCP_INTERFACE_CORE;
|
|
|
|
if (sess->session.name) {
|
|
dl_pdr->apn = ogs_strdup(sess->session.name);
|
|
ogs_assert(dl_pdr->apn);
|
|
}
|
|
|
|
ul_pdr = ogs_pfcp_pdr_add(&sess->pfcp);
|
|
ogs_assert(ul_pdr);
|
|
qos_flow->ul_pdr = ul_pdr;
|
|
|
|
ul_pdr->src_if = OGS_PFCP_INTERFACE_ACCESS;
|
|
|
|
if (sess->session.name) {
|
|
ul_pdr->apn = ogs_strdup(sess->session.name);
|
|
ogs_assert(ul_pdr->apn);
|
|
}
|
|
|
|
ul_pdr->outer_header_removal_len = 2;
|
|
if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4) {
|
|
ul_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV4;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV6) {
|
|
ul_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV6;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4V6) {
|
|
ul_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IP;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
ul_pdr->outer_header_removal.gtpu_extheader_deletion =
|
|
OGS_PFCP_PDU_SESSION_CONTAINER_TO_BE_DELETED;
|
|
|
|
/* FAR */
|
|
dl_far = ogs_pfcp_far_add(&sess->pfcp);
|
|
ogs_assert(dl_far);
|
|
qos_flow->dl_far = dl_far;
|
|
|
|
dl_far->dst_if = OGS_PFCP_INTERFACE_ACCESS;
|
|
ogs_pfcp_pdr_associate_far(dl_pdr, dl_far);
|
|
|
|
dl_far->apply_action =
|
|
OGS_PFCP_APPLY_ACTION_BUFF| OGS_PFCP_APPLY_ACTION_NOCP;
|
|
ogs_assert(sess->pfcp.bar);
|
|
|
|
ul_far = ogs_pfcp_far_add(&sess->pfcp);
|
|
ogs_assert(ul_far);
|
|
qos_flow->ul_far = ul_far;
|
|
|
|
ul_far->dst_if = OGS_PFCP_INTERFACE_CORE;
|
|
ogs_pfcp_pdr_associate_far(ul_pdr, ul_far);
|
|
|
|
ul_far->apply_action = OGS_PFCP_APPLY_ACTION_FORW;
|
|
|
|
/* URR */
|
|
urr = ogs_pfcp_urr_add(&sess->pfcp);
|
|
ogs_assert(urr);
|
|
qos_flow->urr = urr;
|
|
|
|
urr->meas_method = OGS_PFCP_MEASUREMENT_METHOD_VOLUME;
|
|
urr->rep_triggers.volume_threshold = 1;
|
|
urr->vol_threshold.tovol = 1;
|
|
urr->vol_threshold.total_volume = 1024*1024*100;
|
|
|
|
ogs_pfcp_pdr_associate_urr(dl_pdr, urr);
|
|
|
|
/* QER */
|
|
qer = ogs_pfcp_qer_add(&sess->pfcp);
|
|
ogs_assert(qer);
|
|
qos_flow->qer = qer;
|
|
|
|
ogs_pfcp_pdr_associate_qer(dl_pdr, qer);
|
|
ogs_pfcp_pdr_associate_qer(ul_pdr, qer);
|
|
|
|
/* Allocate QFI */
|
|
ogs_pool_alloc(&sess->qfi_pool, &qos_flow->qfi_node);
|
|
ogs_assert(qos_flow->qfi_node);
|
|
|
|
qos_flow->qfi = ul_pdr->qfi = qer->qfi = *(qos_flow->qfi_node);
|
|
|
|
qos_flow->sess = sess;
|
|
|
|
ogs_list_add(&sess->bearer_list, qos_flow);
|
|
|
|
return qos_flow;
|
|
}
|
|
|
|
void smf_sess_create_indirect_data_forwarding(smf_sess_t *sess)
|
|
{
|
|
smf_bearer_t *qos_flow = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_list_for_each(&sess->bearer_list, qos_flow) {
|
|
ogs_pfcp_pdr_t *pdr = NULL;
|
|
ogs_pfcp_far_t *far = NULL;
|
|
ogs_pfcp_qer_t *qer = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
pdr = ogs_pfcp_pdr_add(&sess->pfcp);
|
|
ogs_assert(pdr);
|
|
|
|
pdr->src_if = OGS_PFCP_INTERFACE_ACCESS;
|
|
|
|
pdr->outer_header_removal_len = 1;
|
|
if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4) {
|
|
pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV4;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV6) {
|
|
pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV6;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4V6) {
|
|
pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IP;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
far = ogs_pfcp_far_add(&sess->pfcp);
|
|
ogs_assert(far);
|
|
|
|
far->dst_if = OGS_PFCP_INTERFACE_ACCESS;
|
|
ogs_pfcp_pdr_associate_far(pdr, far);
|
|
|
|
far->apply_action = OGS_PFCP_APPLY_ACTION_FORW;
|
|
|
|
qer = qos_flow->qer;
|
|
ogs_assert(qer);
|
|
|
|
ogs_pfcp_pdr_associate_qer(pdr, qer);
|
|
|
|
pdr->qfi = qos_flow->qfi;
|
|
|
|
ogs_assert(sess->pfcp_node);
|
|
if (sess->pfcp_node->up_function_features.ftup) {
|
|
pdr->f_teid.ch = 1;
|
|
pdr->f_teid.chid = 1;
|
|
pdr->f_teid.choose_id = OGS_PFCP_INDIRECT_DATA_FORWARDING_CHOOSE_ID;
|
|
pdr->f_teid_len = 2;
|
|
} else {
|
|
char buf[OGS_ADDRSTRLEN];
|
|
ogs_sockaddr_t *addr = sess->pfcp_node->sa_list;
|
|
ogs_assert(addr);
|
|
|
|
ogs_error("F-TEID allocation/release not supported "
|
|
"with peer [%s]:%d",
|
|
OGS_ADDR(addr, buf), OGS_PORT(addr));
|
|
ogs_assert(OGS_OK ==
|
|
ogs_pfcp_sockaddr_to_f_teid(
|
|
sess->upf_n3_addr, sess->upf_n3_addr6,
|
|
&pdr->f_teid, &pdr->f_teid_len));
|
|
pdr->f_teid.teid = sess->upf_n3_teid;
|
|
}
|
|
|
|
ogs_assert(OGS_OK ==
|
|
ogs_pfcp_ip_to_outer_header_creation(
|
|
&sess->handover.gnb_dl_ip,
|
|
&far->outer_header_creation,
|
|
&far->outer_header_creation_len));
|
|
far->outer_header_creation.teid = sess->handover.gnb_dl_teid;
|
|
|
|
/* Indirect Data Forwarding PDRs is set to highest precedence
|
|
* (lowest precedence value) */
|
|
pdr->precedence = OGS_PFCP_INDIRECT_PDR_PRECEDENCE;
|
|
}
|
|
}
|
|
|
|
bool smf_sess_have_indirect_data_forwarding(smf_sess_t *sess)
|
|
{
|
|
ogs_pfcp_pdr_t *pdr = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_list_for_each(&sess->pfcp.pdr_list, pdr) {
|
|
ogs_pfcp_far_t *far = pdr->far;
|
|
|
|
ogs_assert(far);
|
|
|
|
if ((pdr->src_if == OGS_PFCP_INTERFACE_ACCESS) &&
|
|
(far->dst_if == OGS_PFCP_INTERFACE_ACCESS)) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
void smf_sess_delete_indirect_data_forwarding(smf_sess_t *sess)
|
|
{
|
|
ogs_pfcp_pdr_t *pdr = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_list_for_each(&sess->pfcp.pdr_list, pdr) {
|
|
ogs_pfcp_far_t *far = pdr->far;
|
|
|
|
ogs_assert(far);
|
|
|
|
if ((pdr->src_if == OGS_PFCP_INTERFACE_ACCESS) &&
|
|
(far->dst_if == OGS_PFCP_INTERFACE_ACCESS)) {
|
|
ogs_pfcp_pdr_remove(pdr);
|
|
ogs_pfcp_far_remove(far);
|
|
}
|
|
}
|
|
}
|
|
|
|
void smf_sess_create_cp_up_data_forwarding(smf_sess_t *sess)
|
|
{
|
|
smf_bearer_t *qos_flow = NULL;
|
|
|
|
ogs_pfcp_pdr_t *cp2up_pdr = NULL;
|
|
ogs_pfcp_pdr_t *up2cp_pdr = NULL;
|
|
ogs_pfcp_far_t *cp2up_far = NULL;
|
|
ogs_pfcp_far_t *up2cp_far = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
smf_sess_delete_cp_up_data_forwarding(sess);
|
|
|
|
cp2up_pdr = ogs_pfcp_pdr_add(&sess->pfcp);
|
|
ogs_assert(cp2up_pdr);
|
|
sess->cp2up_pdr = cp2up_pdr;
|
|
|
|
cp2up_pdr->src_if = OGS_PFCP_INTERFACE_CP_FUNCTION;
|
|
|
|
cp2up_pdr->outer_header_removal_len = 1;
|
|
if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4) {
|
|
cp2up_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV4;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV6) {
|
|
cp2up_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV6;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4V6) {
|
|
cp2up_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IP;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
up2cp_pdr = ogs_pfcp_pdr_add(&sess->pfcp);
|
|
ogs_assert(up2cp_pdr);
|
|
sess->up2cp_pdr = up2cp_pdr;
|
|
|
|
up2cp_pdr->src_if = OGS_PFCP_INTERFACE_ACCESS;
|
|
|
|
up2cp_pdr->outer_header_removal_len = 1;
|
|
if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4) {
|
|
up2cp_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV4;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV6) {
|
|
up2cp_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV6;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4V6) {
|
|
up2cp_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IP;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
qos_flow = smf_default_bearer_in_sess(sess);
|
|
ogs_assert(qos_flow);
|
|
ogs_assert(ogs_list_next(qos_flow) == NULL);
|
|
|
|
/* We'll use the DL-FAR for CP2UP-FAR */
|
|
cp2up_far = qos_flow->dl_far;
|
|
ogs_assert(cp2up_far);
|
|
ogs_pfcp_pdr_associate_far(cp2up_pdr, cp2up_far);
|
|
sess->cp2up_far = cp2up_far;
|
|
|
|
up2cp_far = ogs_pfcp_far_add(&sess->pfcp);
|
|
ogs_assert(up2cp_far);
|
|
sess->up2cp_far = up2cp_far;
|
|
|
|
up2cp_far->dst_if = OGS_PFCP_INTERFACE_CP_FUNCTION;
|
|
ogs_pfcp_pdr_associate_far(up2cp_pdr, up2cp_far);
|
|
|
|
up2cp_far->apply_action = OGS_PFCP_APPLY_ACTION_FORW;
|
|
}
|
|
|
|
void smf_sess_delete_cp_up_data_forwarding(smf_sess_t *sess)
|
|
{
|
|
ogs_assert(sess);
|
|
|
|
if (sess->cp2up_pdr)
|
|
ogs_pfcp_pdr_remove(sess->cp2up_pdr);
|
|
if (sess->up2cp_pdr)
|
|
ogs_pfcp_pdr_remove(sess->up2cp_pdr);
|
|
|
|
/* CP2UP-FAR == DL-FAR in Default QoS Flow
|
|
* Should not remove CP2UP-FAR here */
|
|
if (sess->up2cp_far)
|
|
ogs_pfcp_far_remove(sess->up2cp_far);
|
|
}
|
|
|
|
smf_bearer_t *smf_qos_flow_find_by_qfi(smf_sess_t *sess, uint8_t qfi)
|
|
{
|
|
smf_bearer_t *qos_flow = NULL;
|
|
|
|
ogs_assert(sess);
|
|
ogs_list_for_each(&sess->bearer_list, qos_flow) {
|
|
if (qos_flow->qfi == qfi)
|
|
return qos_flow;
|
|
}
|
|
|
|
return qos_flow;
|
|
}
|
|
|
|
smf_bearer_t *smf_qos_flow_find_by_pcc_rule_id(
|
|
smf_sess_t *sess, char *pcc_rule_id)
|
|
{
|
|
smf_bearer_t *qos_flow = NULL;
|
|
|
|
ogs_assert(sess);
|
|
ogs_assert(pcc_rule_id);
|
|
|
|
ogs_list_for_each(&sess->bearer_list, qos_flow) {
|
|
if (qos_flow->pcc_rule.id &&
|
|
strcmp(qos_flow->pcc_rule.id, pcc_rule_id) == 0)
|
|
return qos_flow;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_bearer_t *smf_bearer_add(smf_sess_t *sess)
|
|
{
|
|
smf_bearer_t *bearer = NULL;
|
|
|
|
ogs_pfcp_pdr_t *dl_pdr = NULL;
|
|
ogs_pfcp_pdr_t *ul_pdr = NULL;
|
|
ogs_pfcp_far_t *dl_far = NULL;
|
|
ogs_pfcp_far_t *ul_far = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_pool_alloc(&smf_bearer_pool, &bearer);
|
|
ogs_assert(bearer);
|
|
memset(bearer, 0, sizeof *bearer);
|
|
|
|
smf_pf_identifier_pool_init(bearer);
|
|
|
|
bearer->index = ogs_pool_index(&smf_bearer_pool, bearer);
|
|
ogs_assert(bearer->index > 0 && bearer->index <=
|
|
ogs_app()->pool.bearer);
|
|
|
|
ogs_list_init(&bearer->pf_list);
|
|
|
|
/* PDR */
|
|
dl_pdr = ogs_pfcp_pdr_add(&sess->pfcp);
|
|
ogs_assert(dl_pdr);
|
|
bearer->dl_pdr = dl_pdr;
|
|
|
|
dl_pdr->src_if = OGS_PFCP_INTERFACE_CORE;
|
|
|
|
ogs_assert(sess->session.name);
|
|
dl_pdr->apn = ogs_strdup(sess->session.name);
|
|
ogs_assert(dl_pdr->apn);
|
|
|
|
ul_pdr = ogs_pfcp_pdr_add(&sess->pfcp);
|
|
ogs_assert(ul_pdr);
|
|
bearer->ul_pdr = ul_pdr;
|
|
|
|
ul_pdr->src_if = OGS_PFCP_INTERFACE_ACCESS;
|
|
|
|
ogs_assert(sess->session.name);
|
|
ul_pdr->apn = ogs_strdup(sess->session.name);
|
|
ogs_assert(ul_pdr->apn);
|
|
|
|
ul_pdr->outer_header_removal_len = 1;
|
|
if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4) {
|
|
ul_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV4;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV6) {
|
|
ul_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IPV6;
|
|
} else if (sess->session.session_type == OGS_PDU_SESSION_TYPE_IPV4V6) {
|
|
ul_pdr->outer_header_removal.description =
|
|
OGS_PFCP_OUTER_HEADER_REMOVAL_GTPU_UDP_IP;
|
|
} else
|
|
ogs_assert_if_reached();
|
|
|
|
/* FAR */
|
|
dl_far = ogs_pfcp_far_add(&sess->pfcp);
|
|
ogs_assert(dl_far);
|
|
bearer->dl_far = dl_far;
|
|
|
|
dl_far->dst_if = OGS_PFCP_INTERFACE_ACCESS;
|
|
ogs_pfcp_pdr_associate_far(dl_pdr, dl_far);
|
|
|
|
dl_far->apply_action =
|
|
OGS_PFCP_APPLY_ACTION_BUFF| OGS_PFCP_APPLY_ACTION_NOCP;
|
|
ogs_assert(sess->pfcp.bar);
|
|
|
|
ul_far = ogs_pfcp_far_add(&sess->pfcp);
|
|
ogs_assert(ul_far);
|
|
bearer->ul_far = ul_far;
|
|
|
|
ul_far->dst_if = OGS_PFCP_INTERFACE_CORE;
|
|
ogs_pfcp_pdr_associate_far(ul_pdr, ul_far);
|
|
|
|
ul_far->apply_action = OGS_PFCP_APPLY_ACTION_FORW;
|
|
|
|
bearer->sess = sess;
|
|
|
|
ogs_list_add(&sess->bearer_list, bearer);
|
|
|
|
return bearer;
|
|
}
|
|
|
|
int smf_bearer_remove(smf_bearer_t *bearer)
|
|
{
|
|
ogs_assert(bearer);
|
|
ogs_assert(bearer->sess);
|
|
|
|
ogs_list_remove(&bearer->sess->bearer_list, bearer);
|
|
|
|
ogs_assert(bearer->dl_pdr);
|
|
ogs_pfcp_pdr_remove(bearer->dl_pdr);
|
|
ogs_assert(bearer->ul_pdr);
|
|
ogs_pfcp_pdr_remove(bearer->ul_pdr);
|
|
ogs_assert(bearer->dl_far);
|
|
ogs_pfcp_far_remove(bearer->dl_far);
|
|
ogs_assert(bearer->ul_far);
|
|
ogs_pfcp_far_remove(bearer->ul_far);
|
|
if (bearer->urr)
|
|
ogs_pfcp_urr_remove(bearer->urr);
|
|
if (bearer->qer)
|
|
ogs_pfcp_qer_remove(bearer->qer);
|
|
|
|
if (bearer->pcc_rule.name)
|
|
ogs_free(bearer->pcc_rule.name);
|
|
if (bearer->pcc_rule.id)
|
|
ogs_free(bearer->pcc_rule.id);
|
|
if (bearer->pgw_s5u_addr)
|
|
ogs_freeaddrinfo(bearer->pgw_s5u_addr);
|
|
if (bearer->pgw_s5u_addr6)
|
|
ogs_freeaddrinfo(bearer->pgw_s5u_addr6);
|
|
|
|
smf_pf_remove_all(bearer);
|
|
|
|
smf_pf_identifier_pool_final(bearer);
|
|
|
|
if (bearer->qfi_node)
|
|
ogs_pool_free(&bearer->sess->qfi_pool, bearer->qfi_node);
|
|
|
|
ogs_pool_free(&smf_bearer_pool, bearer);
|
|
|
|
return OGS_OK;
|
|
}
|
|
|
|
void smf_bearer_remove_all(smf_sess_t *sess)
|
|
{
|
|
smf_bearer_t *bearer = NULL, *next_bearer = NULL;
|
|
|
|
ogs_assert(sess);
|
|
ogs_list_for_each_safe(&sess->bearer_list, next_bearer, bearer)
|
|
smf_bearer_remove(bearer);
|
|
}
|
|
|
|
smf_bearer_t *smf_bearer_find_by_pgw_s5u_teid(
|
|
smf_sess_t *sess, uint32_t pgw_s5u_teid)
|
|
{
|
|
smf_bearer_t *bearer = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_list_for_each(&sess->bearer_list, bearer) {
|
|
if (bearer->pgw_s5u_teid == pgw_s5u_teid)
|
|
return bearer;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_bearer_t *smf_bearer_find_by_ebi(smf_sess_t *sess, uint8_t ebi)
|
|
{
|
|
smf_bearer_t *bearer = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_list_for_each(&sess->bearer_list, bearer) {
|
|
if (bearer->ebi == ebi)
|
|
return bearer;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_bearer_t *smf_bearer_find_by_pcc_rule_name(
|
|
smf_sess_t *sess, char *pcc_rule_name)
|
|
{
|
|
smf_bearer_t *bearer = NULL;
|
|
|
|
ogs_assert(sess);
|
|
ogs_assert(pcc_rule_name);
|
|
|
|
ogs_list_for_each(&sess->bearer_list, bearer) {
|
|
if (bearer->pcc_rule.name &&
|
|
strcmp(bearer->pcc_rule.name, pcc_rule_name) == 0)
|
|
return bearer;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_bearer_t *smf_bearer_find_by_pdr_id(
|
|
smf_sess_t *sess, ogs_pfcp_pdr_id_t pdr_id)
|
|
{
|
|
smf_bearer_t *bearer = NULL;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_list_for_each(&sess->bearer_list, bearer) {
|
|
ogs_pfcp_pdr_t *dl_pdr = NULL;
|
|
ogs_pfcp_pdr_t *ul_pdr = NULL;
|
|
|
|
dl_pdr = bearer->dl_pdr;
|
|
ogs_assert(dl_pdr);
|
|
ul_pdr = bearer->ul_pdr;
|
|
ogs_assert(ul_pdr);
|
|
|
|
if (dl_pdr->id == pdr_id || ul_pdr->id == pdr_id)
|
|
return bearer;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
void smf_bearer_tft_update(smf_bearer_t *bearer)
|
|
{
|
|
smf_pf_t *pf = NULL;
|
|
ogs_pfcp_pdr_t *dl_pdr = NULL, *ul_pdr = NULL;
|
|
|
|
ogs_assert(bearer);
|
|
|
|
dl_pdr = bearer->dl_pdr;
|
|
ogs_assert(dl_pdr);
|
|
ul_pdr = bearer->ul_pdr;
|
|
ogs_assert(ul_pdr);
|
|
|
|
dl_pdr->num_of_flow = 0;
|
|
ul_pdr->num_of_flow = 0;
|
|
|
|
ogs_list_for_each(&bearer->pf_list, pf) {
|
|
if (pf->direction == OGS_FLOW_DOWNLINK_ONLY) {
|
|
dl_pdr->flow_description[dl_pdr->num_of_flow++] =
|
|
pf->flow_description;
|
|
|
|
} else if (pf->direction == OGS_FLOW_UPLINK_ONLY) {
|
|
ul_pdr->flow_description[ul_pdr->num_of_flow++] =
|
|
pf->flow_description;
|
|
} else {
|
|
ogs_assert_if_reached();
|
|
ogs_fatal("Flow Bidirectional is not supported[%d]",
|
|
pf->direction);
|
|
}
|
|
}
|
|
}
|
|
|
|
void smf_bearer_qos_update(smf_bearer_t *bearer)
|
|
{
|
|
smf_sess_t *sess = NULL;
|
|
|
|
ogs_pfcp_pdr_t *dl_pdr = NULL, *ul_pdr = NULL;
|
|
ogs_pfcp_qer_t *qer = NULL;
|
|
|
|
ogs_assert(bearer);
|
|
sess = bearer->sess;
|
|
ogs_assert(sess);
|
|
|
|
dl_pdr = bearer->dl_pdr;
|
|
ogs_assert(dl_pdr);
|
|
ul_pdr = bearer->ul_pdr;
|
|
ogs_assert(ul_pdr);
|
|
|
|
qer = bearer->qer;
|
|
if (!qer) {
|
|
qer = ogs_pfcp_qer_add(&sess->pfcp);
|
|
ogs_assert(qer);
|
|
bearer->qer = qer;
|
|
}
|
|
|
|
ogs_pfcp_pdr_associate_qer(dl_pdr, qer);
|
|
ogs_pfcp_pdr_associate_qer(ul_pdr, qer);
|
|
|
|
qer->mbr.uplink = bearer->qos.mbr.uplink;
|
|
qer->mbr.downlink = bearer->qos.mbr.downlink;
|
|
qer->gbr.uplink = bearer->qos.gbr.uplink;
|
|
qer->gbr.downlink = bearer->qos.gbr.downlink;
|
|
}
|
|
|
|
smf_bearer_t *smf_default_bearer_in_sess(smf_sess_t *sess)
|
|
{
|
|
ogs_assert(sess);
|
|
return ogs_list_first(&sess->bearer_list);
|
|
}
|
|
|
|
smf_ue_t *smf_ue_cycle(smf_ue_t *smf_ue)
|
|
{
|
|
return ogs_pool_cycle(&smf_ue_pool, smf_ue);
|
|
}
|
|
|
|
smf_sess_t *smf_sess_cycle(smf_sess_t *sess)
|
|
{
|
|
return ogs_pool_cycle(&smf_sess_pool, sess);
|
|
}
|
|
|
|
smf_bearer_t *smf_bearer_cycle(smf_bearer_t *bearer)
|
|
{
|
|
return ogs_pool_cycle(&smf_bearer_pool, bearer);
|
|
}
|
|
|
|
smf_bearer_t *smf_qos_flow_cycle(smf_bearer_t *qos_flow)
|
|
{
|
|
return ogs_pool_cycle(&smf_bearer_pool, qos_flow);
|
|
}
|
|
|
|
void smf_sess_select_nf(smf_sess_t *sess, OpenAPI_nf_type_e nf_type)
|
|
{
|
|
ogs_assert(sess);
|
|
ogs_assert(nf_type);
|
|
|
|
if (nf_type == OpenAPI_nf_type_NRF)
|
|
ogs_sbi_select_nrf(&sess->sbi, smf_nf_state_registered);
|
|
else
|
|
ogs_sbi_select_first_nf(&sess->sbi, nf_type, smf_nf_state_registered);
|
|
}
|
|
|
|
smf_pf_t *smf_pf_add(smf_bearer_t *bearer)
|
|
{
|
|
smf_sess_t *sess = NULL;
|
|
smf_pf_t *pf = NULL;
|
|
|
|
ogs_assert(bearer);
|
|
sess = bearer->sess;
|
|
ogs_assert(sess);
|
|
|
|
ogs_pool_alloc(&smf_pf_pool, &pf);
|
|
ogs_assert(pf);
|
|
memset(pf, 0, sizeof *pf);
|
|
|
|
ogs_pool_alloc(&bearer->pf_identifier_pool, &pf->identifier_node);
|
|
if (!pf->identifier_node) {
|
|
ogs_error("smf_pf_add: Expectation `pf->identifier_node' failed");
|
|
ogs_pool_free(&smf_pf_pool, pf);
|
|
return NULL;
|
|
}
|
|
|
|
pf->identifier = *(pf->identifier_node);
|
|
ogs_assert(pf->identifier > 0 && pf->identifier <=
|
|
OGS_MAX_NUM_OF_FLOW_IN_BEARER);
|
|
|
|
ogs_pool_alloc(&sess->pf_precedence_pool, &pf->precedence_node);
|
|
if (!pf->precedence_node) {
|
|
ogs_error("smf_pf_add: Expectation `pf->precedence_node' failed");
|
|
ogs_pool_free(&bearer->pf_identifier_pool, pf->identifier_node);
|
|
ogs_pool_free(&smf_pf_pool, pf);
|
|
return NULL;
|
|
}
|
|
|
|
pf->precedence = *(pf->precedence_node);
|
|
ogs_assert(pf->precedence > 0 && pf->precedence <=
|
|
(OGS_MAX_NUM_OF_BEARER * OGS_MAX_NUM_OF_FLOW_IN_BEARER));
|
|
|
|
pf->bearer = bearer;
|
|
|
|
ogs_list_add(&bearer->pf_list, pf);
|
|
|
|
return pf;
|
|
}
|
|
|
|
int smf_pf_remove(smf_pf_t *pf)
|
|
{
|
|
ogs_assert(pf);
|
|
ogs_assert(pf->bearer);
|
|
ogs_assert(pf->bearer->sess);
|
|
|
|
ogs_list_remove(&pf->bearer->pf_list, pf);
|
|
if (pf->flow_description)
|
|
ogs_free(pf->flow_description);
|
|
|
|
if (pf->identifier_node)
|
|
ogs_pool_free(&pf->bearer->pf_identifier_pool, pf->identifier_node);
|
|
if (pf->precedence_node)
|
|
ogs_pool_free(
|
|
&pf->bearer->sess->pf_precedence_pool, pf->precedence_node);
|
|
|
|
ogs_pool_free(&smf_pf_pool, pf);
|
|
|
|
return OGS_OK;
|
|
}
|
|
|
|
void smf_pf_remove_all(smf_bearer_t *bearer)
|
|
{
|
|
smf_pf_t *pf = NULL, *next_pf = NULL;
|
|
|
|
ogs_assert(bearer);
|
|
ogs_list_for_each_safe(&bearer->pf_list, next_pf, pf)
|
|
smf_pf_remove(pf);
|
|
}
|
|
|
|
smf_pf_t *smf_pf_find_by_id(smf_bearer_t *bearer, uint8_t id)
|
|
{
|
|
smf_pf_t *pf = NULL;
|
|
|
|
ogs_list_for_each(&bearer->pf_list, pf) {
|
|
if (pf->identifier == id) return pf;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_pf_t *smf_pf_find_by_flow(
|
|
smf_bearer_t *bearer, uint8_t direction, char *flow_description)
|
|
{
|
|
smf_pf_t *pf = NULL;
|
|
|
|
ogs_list_for_each(&bearer->pf_list, pf) {
|
|
if ((pf->direction == direction) &&
|
|
(!strcmp(pf->flow_description, flow_description))) {
|
|
return pf;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
smf_pf_t *smf_pf_first(smf_bearer_t *bearer)
|
|
{
|
|
return ogs_list_first(&bearer->pf_list);
|
|
}
|
|
|
|
smf_pf_t *smf_pf_next(smf_pf_t *pf)
|
|
{
|
|
return ogs_list_next(pf);
|
|
}
|
|
|
|
/*
|
|
* The following code is stolen from osmo-ggsn.
|
|
* https://github.com/osmocom/osmo-ggsn/blob/master/ggsn/pco.c#L26-L43
|
|
*/
|
|
|
|
/* determine if IPCP contains given option */
|
|
static const uint8_t *ipcp_contains_option(
|
|
const ogs_pco_ipcp_t *ipcp, size_t ipcp_len,
|
|
enum ogs_pco_ipcp_options opt, size_t opt_minlen)
|
|
{
|
|
const uint8_t *cur_opt = (const uint8_t *)ipcp->options;
|
|
|
|
/* iterate over Options and check if protocol contained */
|
|
while (cur_opt + sizeof(struct ogs_pco_ipcp_options_s) <=
|
|
(uint8_t*)ipcp + ipcp_len) {
|
|
const struct ogs_pco_ipcp_options_s *cur_opt_hdr =
|
|
(const struct ogs_pco_ipcp_options_s *)cur_opt;
|
|
/* length value includes 2 bytes type/length */
|
|
if (cur_opt_hdr->len < 2)
|
|
return NULL;
|
|
if (cur_opt_hdr->type == opt &&
|
|
cur_opt_hdr->len >= 2 + opt_minlen)
|
|
return cur_opt;
|
|
cur_opt += cur_opt_hdr->len;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
#include "../version.h"
|
|
static const char *pap_welcome = "Welcome to open5gs-smfd " OPEN5GS_VERSION;
|
|
|
|
int smf_pco_build(uint8_t *pco_buf, uint8_t *buffer, int length)
|
|
{
|
|
int rv;
|
|
ogs_pco_t ue, smf;
|
|
ogs_pco_pap_t pco_pap;
|
|
ogs_pco_chap_t pco_chap;
|
|
#define OGS_PCO_MAX_NUM_OF_IPCP 4
|
|
ogs_pco_ipcp_t pco_ipcp[OGS_PCO_MAX_NUM_OF_IPCP];
|
|
int num_of_ipcp;
|
|
int pco_size = 0;
|
|
ogs_ipsubnet_t dns_primary, dns_secondary, dns6_primary, dns6_secondary;
|
|
ogs_ipsubnet_t p_cscf, p_cscf6;
|
|
int size = 0;
|
|
int i = 0;
|
|
uint16_t mtu = 0;
|
|
|
|
ogs_assert(pco_buf);
|
|
ogs_assert(buffer);
|
|
ogs_assert(length);
|
|
|
|
num_of_ipcp = 0;
|
|
memset(&pco_ipcp, 0, sizeof(pco_ipcp));
|
|
|
|
size = ogs_pco_parse(&ue, buffer, length);
|
|
ogs_assert(size);
|
|
|
|
memset(&smf, 0, sizeof(ogs_pco_t));
|
|
smf.ext = ue.ext;
|
|
smf.configuration_protocol = ue.configuration_protocol;
|
|
|
|
for (i = 0; i < ue.num_of_id; i++) {
|
|
uint8_t *data = ue.ids[i].data;
|
|
switch(ue.ids[i].id) {
|
|
case OGS_PCO_ID_PASSWORD_AUTHENTICATION_PROTOCOL:
|
|
if (data[0] == 1) { /* Code : Authenticate-Request */
|
|
memset(&pco_pap, 0, sizeof(ogs_pco_pap_t));
|
|
|
|
pco_pap.welcome_len = strlen(pap_welcome);
|
|
memcpy(pco_pap.welcome, pap_welcome, pco_pap.welcome_len);
|
|
|
|
pco_size =
|
|
4 + /* sizeof(code+identifier+len) */
|
|
1 + /* sizeof(welcome_len) */
|
|
pco_pap.welcome_len;
|
|
|
|
pco_pap.code = 2; /* Code : Authenticate-Ack */
|
|
pco_pap.identifier = data[1]; /* Identifier */
|
|
pco_pap.len = htobe16(pco_size);
|
|
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = pco_size;
|
|
smf.ids[smf.num_of_id].data = (uint8_t *)&pco_pap;
|
|
smf.num_of_id++;
|
|
}
|
|
break;
|
|
case OGS_PCO_ID_CHALLENGE_HANDSHAKE_AUTHENTICATION_PROTOCOL:
|
|
if (data[0] == 2) { /* Code : Response */
|
|
memset(&pco_chap, 0, sizeof(ogs_pco_chap_t));
|
|
pco_size = 4; /* sizeof(code+identifier+len) */
|
|
|
|
pco_chap.code = 3; /* Code : Success */
|
|
pco_chap.identifier = data[1]; /* Identifier */
|
|
pco_chap.len = htobe16(pco_size);
|
|
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = pco_size;
|
|
smf.ids[smf.num_of_id].data = (uint8_t *)&pco_chap;
|
|
smf.num_of_id++;
|
|
}
|
|
break;
|
|
case OGS_PCO_ID_INTERNET_PROTOCOL_CONTROL_PROTOCOL:
|
|
if (data[0] == 1) { /* Code : Configuration Request */
|
|
ogs_pco_ipcp_t *ipcp = (ogs_pco_ipcp_t *)data;
|
|
uint16_t in_len = 0;
|
|
uint16_t out_len = 0;
|
|
int num_of_option = 0;
|
|
|
|
ogs_assert(smf_self()->dns[0] || smf_self()->dns[1]);
|
|
|
|
ogs_assert(ipcp);
|
|
in_len = be16toh(ipcp->len);
|
|
|
|
ogs_assert(num_of_ipcp <= OGS_PCO_MAX_NUM_OF_IPCP);
|
|
pco_ipcp[num_of_ipcp].code = 2; /* Code : Configuration Ack */
|
|
|
|
out_len = 4;
|
|
/* Primary DNS Server IP Address */
|
|
if (smf_self()->dns[0] &&
|
|
ipcp_contains_option(ipcp, in_len,
|
|
OGS_IPCP_OPT_PRIMARY_DNS, 4)) {
|
|
rv = ogs_ipsubnet(
|
|
&dns_primary, smf_self()->dns[0], NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
ogs_assert(
|
|
num_of_option <= OGS_PCO_MAX_NUM_OF_IPCP_OPTIONS);
|
|
pco_ipcp[num_of_ipcp].options[num_of_option].type =
|
|
OGS_IPCP_OPT_PRIMARY_DNS;
|
|
pco_ipcp[num_of_ipcp].options[num_of_option].len = 6;
|
|
pco_ipcp[num_of_ipcp].options[num_of_option].addr =
|
|
dns_primary.sub[0];
|
|
num_of_option++;
|
|
|
|
out_len += 6;
|
|
}
|
|
|
|
/* Secondary DNS Server IP Address */
|
|
if (smf_self()->dns[1] &&
|
|
ipcp_contains_option(ipcp, in_len,
|
|
OGS_IPCP_OPT_SECONDARY_DNS, 4)) {
|
|
rv = ogs_ipsubnet(
|
|
&dns_secondary, smf_self()->dns[1], NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
ogs_assert(
|
|
num_of_option <= OGS_PCO_MAX_NUM_OF_IPCP_OPTIONS);
|
|
pco_ipcp[num_of_ipcp].options[num_of_option].type =
|
|
OGS_IPCP_OPT_SECONDARY_DNS;
|
|
pco_ipcp[num_of_ipcp].options[num_of_option].len = 6;
|
|
pco_ipcp[num_of_ipcp].options[num_of_option].addr =
|
|
dns_secondary.sub[0];
|
|
num_of_option++;
|
|
|
|
out_len += 6;
|
|
}
|
|
|
|
pco_ipcp[num_of_ipcp].len = htobe16(out_len);
|
|
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = out_len;
|
|
smf.ids[smf.num_of_id].data = (uint8_t *)&pco_ipcp[num_of_ipcp];
|
|
|
|
num_of_ipcp++;
|
|
|
|
smf.num_of_id++;
|
|
}
|
|
break;
|
|
case OGS_PCO_ID_DNS_SERVER_IPV4_ADDRESS_REQUEST:
|
|
if (smf_self()->dns[0]) {
|
|
rv = ogs_ipsubnet(
|
|
&dns_primary, smf_self()->dns[0], NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = OGS_IPV4_LEN;
|
|
smf.ids[smf.num_of_id].data = dns_primary.sub;
|
|
smf.num_of_id++;
|
|
}
|
|
|
|
if (smf_self()->dns[1]) {
|
|
rv = ogs_ipsubnet(
|
|
&dns_secondary, smf_self()->dns[1], NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = OGS_IPV4_LEN;
|
|
smf.ids[smf.num_of_id].data = dns_secondary.sub;
|
|
smf.num_of_id++;
|
|
}
|
|
break;
|
|
case OGS_PCO_ID_DNS_SERVER_IPV6_ADDRESS_REQUEST:
|
|
if (smf_self()->dns6[0]) {
|
|
rv = ogs_ipsubnet(
|
|
&dns6_primary, smf_self()->dns6[0], NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = OGS_IPV6_LEN;
|
|
smf.ids[smf.num_of_id].data = dns6_primary.sub;
|
|
smf.num_of_id++;
|
|
}
|
|
|
|
if (smf_self()->dns6[1]) {
|
|
rv = ogs_ipsubnet(
|
|
&dns6_secondary, smf_self()->dns6[1], NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = OGS_IPV6_LEN;
|
|
smf.ids[smf.num_of_id].data = dns6_secondary.sub;
|
|
smf.num_of_id++;
|
|
}
|
|
break;
|
|
case OGS_PCO_ID_P_CSCF_IPV4_ADDRESS_REQUEST:
|
|
if (smf_self()->num_of_p_cscf) {
|
|
rv = ogs_ipsubnet(&p_cscf,
|
|
smf_self()->p_cscf[smf_self()->p_cscf_index], NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = OGS_IPV4_LEN;
|
|
smf.ids[smf.num_of_id].data = p_cscf.sub;
|
|
smf.num_of_id++;
|
|
|
|
smf_self()->p_cscf_index++;
|
|
smf_self()->p_cscf_index %= smf_self()->num_of_p_cscf;
|
|
}
|
|
break;
|
|
case OGS_PCO_ID_P_CSCF_IPV6_ADDRESS_REQUEST:
|
|
if (smf_self()->num_of_p_cscf6) {
|
|
rv = ogs_ipsubnet(&p_cscf6,
|
|
smf_self()->p_cscf6[smf_self()->p_cscf6_index], NULL);
|
|
ogs_assert(rv == OGS_OK);
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = OGS_IPV6_LEN;
|
|
smf.ids[smf.num_of_id].data = p_cscf6.sub;
|
|
smf.num_of_id++;
|
|
|
|
smf_self()->p_cscf6_index++;
|
|
smf_self()->p_cscf6_index %= smf_self()->num_of_p_cscf6;
|
|
}
|
|
break;
|
|
case OGS_PCO_ID_IPV4_LINK_MTU_REQUEST:
|
|
if (smf_self()->mtu) {
|
|
mtu = htons(smf_self()->mtu);
|
|
smf.ids[smf.num_of_id].id = ue.ids[i].id;
|
|
smf.ids[smf.num_of_id].len = sizeof(uint16_t);
|
|
smf.ids[smf.num_of_id].data = &mtu;
|
|
smf.num_of_id++;
|
|
}
|
|
break;
|
|
case OGS_PCO_ID_IP_ADDRESS_ALLOCATION_VIA_NAS_SIGNALLING:
|
|
/* TODO */
|
|
break;
|
|
case OGS_PCO_ID_MS_SUPPORTS_BCM:
|
|
/* TODO */
|
|
break;
|
|
case OGS_PCO_ID_MS_SUPPORT_LOCAL_ADDR_TFT_INDICATOR:
|
|
/* TODO */
|
|
break;
|
|
case OGS_PCO_ID_P_CSCF_RE_SELECTION_SUPPORT:
|
|
/* TODO */
|
|
break;
|
|
default:
|
|
ogs_warn("Unknown PCO ID:(0x%x)", ue.ids[i].id);
|
|
}
|
|
}
|
|
|
|
size = ogs_pco_build(pco_buf, OGS_MAX_PCO_LEN, &smf);
|
|
return size;
|
|
}
|
|
|
|
void smf_qfi_pool_init(smf_sess_t *sess)
|
|
{
|
|
int i;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_index_init(&sess->qfi_pool, OGS_MAX_QOS_FLOW_ID);
|
|
|
|
for (i = 1; i <= OGS_MAX_QOS_FLOW_ID; i++) {
|
|
sess->qfi_pool.array[i-1] = i;
|
|
}
|
|
}
|
|
|
|
void smf_qfi_pool_final(smf_sess_t *sess)
|
|
{
|
|
ogs_assert(sess);
|
|
|
|
ogs_index_final(&sess->qfi_pool);
|
|
}
|
|
|
|
void smf_pf_identifier_pool_init(smf_bearer_t *bearer)
|
|
{
|
|
int i;
|
|
|
|
ogs_assert(bearer);
|
|
|
|
ogs_index_init(&bearer->pf_identifier_pool, OGS_MAX_NUM_OF_FLOW_IN_BEARER);
|
|
|
|
for (i = 1; i <= OGS_MAX_NUM_OF_FLOW_IN_BEARER; i++) {
|
|
bearer->pf_identifier_pool.array[i-1] = i;
|
|
}
|
|
}
|
|
|
|
void smf_pf_identifier_pool_final(smf_bearer_t *bearer)
|
|
{
|
|
ogs_assert(bearer);
|
|
|
|
ogs_index_final(&bearer->pf_identifier_pool);
|
|
}
|
|
|
|
void smf_pf_precedence_pool_init(smf_sess_t *sess)
|
|
{
|
|
int i;
|
|
|
|
ogs_assert(sess);
|
|
|
|
ogs_index_init(&sess->pf_precedence_pool,
|
|
OGS_MAX_NUM_OF_BEARER * OGS_MAX_NUM_OF_FLOW_IN_BEARER);
|
|
|
|
for (i = 1; i <=
|
|
OGS_MAX_NUM_OF_BEARER * OGS_MAX_NUM_OF_FLOW_IN_BEARER; i++) {
|
|
sess->pf_precedence_pool.array[i-1] = i;
|
|
}
|
|
}
|
|
|
|
void smf_pf_precedence_pool_final(smf_sess_t *sess)
|
|
{
|
|
ogs_assert(sess);
|
|
|
|
ogs_index_final(&sess->pf_precedence_pool);
|
|
}
|
|
|
|
static void stats_add_smf_session(void)
|
|
{
|
|
num_of_smf_sess = num_of_smf_sess + 1;
|
|
ogs_info("[Added] Number of SMF-Sessions is now %d", num_of_smf_sess);
|
|
}
|
|
|
|
static void stats_remove_smf_session(void)
|
|
{
|
|
num_of_smf_sess = num_of_smf_sess - 1;
|
|
ogs_info("[Removed] Number of SMF-Sessions is now %d", num_of_smf_sess);
|
|
}
|