forked from acouzens/open5gs
196 lines
6.7 KiB
C
196 lines
6.7 KiB
C
/*
|
|
* Copyright (C) 2019 by Sukchan Lee <acetcom@gmail.com>
|
|
*
|
|
* This file is part of Open5GS.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "context.h"
|
|
#include "gtp-path.h"
|
|
#include "pfcp-path.h"
|
|
#include "gx-handler.h"
|
|
#include "binding.h"
|
|
|
|
static uint8_t gtp_cause_from_diameter(
|
|
const uint32_t *dia_err, const uint32_t *dia_exp_err)
|
|
{
|
|
if (dia_exp_err) {
|
|
}
|
|
if (dia_err) {
|
|
switch (*dia_err) {
|
|
case OGS_DIAM_UNKNOWN_SESSION_ID:
|
|
return OGS_GTP_CAUSE_APN_ACCESS_DENIED_NO_SUBSCRIPTION;
|
|
}
|
|
}
|
|
|
|
ogs_error("Unexpected Diameter Result Code %d/%d, defaulting to severe "
|
|
"network failure",
|
|
dia_err ? *dia_err : -1, dia_exp_err ? *dia_exp_err : -1);
|
|
return OGS_GTP_CAUSE_UE_NOT_AUTHORISED_BY_OCS_OR_EXTERNAL_AAA_SERVER;
|
|
}
|
|
|
|
void smf_gx_handle_cca_initial_request(
|
|
smf_sess_t *sess, ogs_diam_gx_message_t *gx_message,
|
|
ogs_gtp_xact_t *gtp_xact)
|
|
{
|
|
int i;
|
|
|
|
smf_bearer_t *bearer = NULL;
|
|
ogs_pfcp_pdr_t *dl_pdr = NULL;
|
|
ogs_pfcp_pdr_t *ul_pdr = NULL;
|
|
ogs_pfcp_far_t *dl_far = NULL;
|
|
ogs_pfcp_qer_t *qer = NULL;
|
|
|
|
ogs_assert(sess);
|
|
ogs_assert(gx_message);
|
|
ogs_assert(gtp_xact);
|
|
|
|
ogs_debug("[PGW] Create Session Response");
|
|
ogs_debug(" SGW_S5C_TEID[0x%x] PGW_S5C_TEID[0x%x]",
|
|
sess->sgw_s5c_teid, sess->smf_n4_teid);
|
|
|
|
if (gx_message->result_code != ER_DIAMETER_SUCCESS) {
|
|
uint8_t cause_value = gtp_cause_from_diameter(
|
|
gx_message->err, gx_message->exp_err);
|
|
|
|
ogs_gtp_send_error_message(gtp_xact, sess ? sess->sgw_s5c_teid : 0,
|
|
OGS_GTP_CREATE_SESSION_RESPONSE_TYPE, cause_value);
|
|
return;
|
|
}
|
|
|
|
sess->num_of_pcc_rule = gx_message->session_data.num_of_pcc_rule;
|
|
for (i = 0; i < gx_message->session_data.num_of_pcc_rule; i++)
|
|
OGS_STORE_PCC_RULE(&sess->pcc_rule[i],
|
|
&gx_message->session_data.pcc_rule[i]);
|
|
|
|
/* APN-AMBR
|
|
* if PCRF changes APN-AMBR, this should be included. */
|
|
sess->gtp.create_session_response_apn_ambr = false;
|
|
if ((gx_message->session_data.pdn.ambr.uplink &&
|
|
(sess->pdn.ambr.uplink / 1000) !=
|
|
(gx_message->session_data.pdn.ambr.uplink / 1000)) ||
|
|
(gx_message->session_data.pdn.ambr.downlink &&
|
|
(sess->pdn.ambr.downlink / 1000) !=
|
|
(gx_message->session_data.pdn.ambr.downlink / 1000))) {
|
|
|
|
sess->pdn.ambr.downlink = gx_message->session_data.pdn.ambr.downlink;
|
|
sess->pdn.ambr.uplink = gx_message->session_data.pdn.ambr.uplink;
|
|
|
|
sess->gtp.create_session_response_apn_ambr = true;
|
|
}
|
|
|
|
/* Bearer QoS
|
|
* if PCRF changes Bearer QoS, this should be included. */
|
|
sess->gtp.create_session_response_bearer_qos = false;
|
|
if ((gx_message->session_data.pdn.qos.qci &&
|
|
sess->pdn.qos.qci != gx_message->session_data.pdn.qos.qci) ||
|
|
(gx_message->session_data.pdn.qos.arp.priority_level &&
|
|
sess->pdn.qos.arp.priority_level !=
|
|
gx_message->session_data.pdn.qos.arp.priority_level) ||
|
|
sess->pdn.qos.arp.pre_emption_capability !=
|
|
gx_message->session_data.pdn.qos.arp.pre_emption_capability ||
|
|
sess->pdn.qos.arp.pre_emption_vulnerability !=
|
|
gx_message->session_data.pdn.qos.arp.pre_emption_vulnerability) {
|
|
|
|
sess->pdn.qos.qci = gx_message->session_data.pdn.qos.qci;
|
|
sess->pdn.qos.arp.priority_level =
|
|
gx_message->session_data.pdn.qos.arp.priority_level;
|
|
sess->pdn.qos.arp.pre_emption_capability =
|
|
gx_message->session_data.pdn.qos.arp.pre_emption_capability;
|
|
sess->pdn.qos.arp.pre_emption_vulnerability =
|
|
gx_message->session_data.pdn.qos.arp.pre_emption_vulnerability;
|
|
|
|
sess->gtp.create_session_response_bearer_qos = true;
|
|
}
|
|
|
|
bearer = smf_default_bearer_in_sess(sess);
|
|
ogs_assert(bearer);
|
|
|
|
/* Setup QER */
|
|
if (sess->pdn.ambr.downlink || sess->pdn.ambr.uplink) {
|
|
/* Only 1 QER is used per bearer */
|
|
qer = bearer->qer;
|
|
if (!qer) {
|
|
qer = ogs_pfcp_qer_add(&sess->pfcp);
|
|
ogs_assert(qer);
|
|
bearer->qer = qer;
|
|
}
|
|
|
|
qer->mbr.uplink = sess->pdn.ambr.uplink;
|
|
qer->mbr.downlink = sess->pdn.ambr.downlink;
|
|
}
|
|
|
|
/* Setup FAR */
|
|
dl_far = bearer->dl_far;
|
|
ogs_assert(dl_far);
|
|
|
|
dl_far->apply_action = OGS_PFCP_APPLY_ACTION_FORW;
|
|
|
|
/* Set Outer Header Creation to the Default DL FAR */
|
|
ogs_pfcp_ip_to_outer_header_creation(&bearer->sgw_s5u_ip,
|
|
&dl_far->outer_header_creation, &dl_far->outer_header_creation_len);
|
|
dl_far->outer_header_creation.teid = bearer->sgw_s5u_teid;
|
|
|
|
/* Setup PDR */
|
|
dl_pdr = bearer->dl_pdr;
|
|
ogs_assert(dl_pdr);
|
|
ul_pdr = bearer->ul_pdr;
|
|
ogs_assert(ul_pdr);
|
|
|
|
/* Set UE IP Address to the Default DL PDR */
|
|
ogs_pfcp_paa_to_ue_ip_addr(&sess->pdn.paa,
|
|
&dl_pdr->ue_ip_addr, &dl_pdr->ue_ip_addr_len);
|
|
dl_pdr->ue_ip_addr.sd = OGS_PFCP_UE_IP_DST;
|
|
|
|
/* Default PDRs is set to lowest precedence(highest precedence value) */
|
|
dl_pdr->precedence = 0xffffffff;
|
|
ul_pdr->precedence = 0xffffffff;
|
|
|
|
if (qer) {
|
|
ogs_pfcp_pdr_associate_qer(dl_pdr, qer);
|
|
ogs_pfcp_pdr_associate_qer(ul_pdr, qer);
|
|
}
|
|
|
|
smf_epc_pfcp_send_session_establishment_request(sess, gtp_xact);
|
|
}
|
|
|
|
void smf_gx_handle_cca_termination_request(
|
|
smf_sess_t *sess, ogs_diam_gx_message_t *gx_message,
|
|
ogs_gtp_xact_t *gtp_xact)
|
|
{
|
|
ogs_assert(sess);
|
|
ogs_assert(gx_message);
|
|
ogs_assert(gtp_xact);
|
|
|
|
ogs_debug("[SMF] Delete Session Response");
|
|
ogs_debug(" SGW_S5C_TEID[0x%x] SMF_N4_TEID[0x%x]",
|
|
sess->sgw_s5c_teid, sess->smf_n4_teid);
|
|
|
|
smf_epc_pfcp_send_session_deletion_request(sess, gtp_xact);
|
|
}
|
|
|
|
void smf_gx_handle_re_auth_request(
|
|
smf_sess_t *sess, ogs_diam_gx_message_t *gx_message)
|
|
{
|
|
int i;
|
|
|
|
sess->num_of_pcc_rule = gx_message->session_data.num_of_pcc_rule;
|
|
for (i = 0; i < gx_message->session_data.num_of_pcc_rule; i++)
|
|
OGS_STORE_PCC_RULE(&sess->pcc_rule[i],
|
|
&gx_message->session_data.pcc_rule[i]);
|
|
|
|
smf_bearer_binding(sess);
|
|
}
|