open5gs/src/amf/amf-sm.c

882 lines
31 KiB
C

/*
* Copyright (C) 2019-2022 by Sukchan Lee <acetcom@gmail.com>
*
* This file is part of Open5GS.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
#include "sbi-path.h"
#include "ngap-path.h"
#include "nas-path.h"
#include "ngap-handler.h"
#include "nnrf-handler.h"
#include "namf-handler.h"
#include "nsmf-handler.h"
#include "nnssf-handler.h"
#include "nas-security.h"
void amf_state_initial(ogs_fsm_t *s, amf_event_t *e)
{
amf_sm_debug(e);
ogs_assert(s);
OGS_FSM_TRAN(s, &amf_state_operational);
}
void amf_state_final(ogs_fsm_t *s, amf_event_t *e)
{
amf_sm_debug(e);
ogs_assert(s);
}
void amf_state_operational(ogs_fsm_t *s, amf_event_t *e)
{
int rv;
char buf[OGS_ADDRSTRLEN];
const char *api_version = NULL;
ogs_sock_t *sock = NULL;
ogs_sockaddr_t *addr = NULL;
amf_gnb_t *gnb = NULL;
uint16_t max_num_of_ostreams = 0;
ogs_ngap_message_t ngap_message;
ogs_pkbuf_t *pkbuf = NULL;
int rc;
ogs_nas_5gs_message_t nas_message;
ran_ue_t *ran_ue = NULL;
amf_ue_t *amf_ue = NULL;
amf_sess_t *sess = NULL;
ogs_sbi_object_t *sbi_object = NULL;
ogs_sbi_xact_t *sbi_xact = NULL;
int state = AMF_CREATE_SM_CONTEXT_NO_STATE;
ogs_sbi_stream_t *stream = NULL;
ogs_sbi_request_t *sbi_request = NULL;
ogs_sbi_service_type_e service_type = OGS_SBI_SERVICE_TYPE_NULL;
ogs_sbi_nf_instance_t *nf_instance = NULL;
ogs_sbi_subscription_data_t *subscription_data = NULL;
ogs_sbi_response_t *sbi_response = NULL;
ogs_sbi_message_t sbi_message;
amf_sm_debug(e);
ogs_assert(s);
switch (e->h.id) {
case OGS_FSM_ENTRY_SIG:
break;
case OGS_FSM_EXIT_SIG:
break;
case OGS_EVENT_SBI_SERVER:
sbi_request = e->h.sbi.request;
ogs_assert(sbi_request);
stream = e->h.sbi.data;
ogs_assert(stream);
rv = ogs_sbi_parse_request(&sbi_message, sbi_request);
if (rv != OGS_OK) {
/* 'sbi_message' buffer is released in ogs_sbi_parse_request() */
ogs_error("cannot parse HTTP sbi_message");
ogs_assert(true ==
ogs_sbi_server_send_error(
stream, OGS_SBI_HTTP_STATUS_BAD_REQUEST,
NULL, "cannot parse HTTP sbi_message", NULL));
break;
}
SWITCH(sbi_message.h.service.name)
CASE(OGS_SBI_SERVICE_NAME_NUDM_SDM)
api_version = OGS_SBI_API_V2;
break;
DEFAULT
api_version = OGS_SBI_API_V1;
END
ogs_assert(api_version);
if (strcmp(sbi_message.h.api.version, api_version) != 0) {
ogs_error("Not supported version [%s]", sbi_message.h.api.version);
ogs_assert(true ==
ogs_sbi_server_send_error(
stream, OGS_SBI_HTTP_STATUS_BAD_REQUEST,
&sbi_message, "Not supported version", NULL));
ogs_sbi_message_free(&sbi_message);
break;
}
SWITCH(sbi_message.h.service.name)
CASE(OGS_SBI_SERVICE_NAME_NNRF_NFM)
SWITCH(sbi_message.h.resource.component[0])
CASE(OGS_SBI_RESOURCE_NAME_NF_STATUS_NOTIFY)
SWITCH(sbi_message.h.method)
CASE(OGS_SBI_HTTP_METHOD_POST)
ogs_nnrf_handle_nf_status_notify(stream, &sbi_message);
break;
DEFAULT
ogs_error("Invalid HTTP method [%s]", sbi_message.h.method);
ogs_assert(true ==
ogs_sbi_server_send_error(stream,
OGS_SBI_HTTP_STATUS_FORBIDDEN, &sbi_message,
"Invalid HTTP method", sbi_message.h.method));
END
break;
DEFAULT
ogs_error("Invalid resource name [%s]",
sbi_message.h.resource.component[0]);
ogs_assert(true ==
ogs_sbi_server_send_error(stream,
OGS_SBI_HTTP_STATUS_BAD_REQUEST, &sbi_message,
"Invalid resource name",
sbi_message.h.resource.component[0]));
END
break;
CASE(OGS_SBI_SERVICE_NAME_NAMF_COMM)
SWITCH(sbi_message.h.resource.component[0])
CASE(OGS_SBI_RESOURCE_NAME_UE_CONTEXTS)
SWITCH(sbi_message.h.resource.component[2])
CASE(OGS_SBI_RESOURCE_NAME_N1_N2_MESSAGES)
SWITCH(sbi_message.h.method)
CASE(OGS_SBI_HTTP_METHOD_POST)
rv = amf_namf_comm_handle_n1_n2_message_transfer(
stream, &sbi_message);
if (rv != OGS_OK) {
ogs_assert(true ==
ogs_sbi_server_send_error(stream,
OGS_SBI_HTTP_STATUS_BAD_REQUEST,
&sbi_message,
"No N1N2MessageTransferReqData", NULL));
}
break;
DEFAULT
ogs_error("Invalid HTTP method [%s]",
sbi_message.h.method);
ogs_assert(true ==
ogs_sbi_server_send_error(stream,
OGS_SBI_HTTP_STATUS_FORBIDDEN, &sbi_message,
"Invalid HTTP method", sbi_message.h.method));
END
break;
DEFAULT
ogs_error("Invalid resource name [%s]",
sbi_message.h.resource.component[2]);
ogs_assert(true ==
ogs_sbi_server_send_error(stream,
OGS_SBI_HTTP_STATUS_BAD_REQUEST, &sbi_message,
"Invalid resource name",
sbi_message.h.resource.component[2]));
END
break;
DEFAULT
ogs_error("Invalid resource name [%s]",
sbi_message.h.resource.component[0]);
ogs_assert(true ==
ogs_sbi_server_send_error(stream,
OGS_SBI_HTTP_STATUS_BAD_REQUEST, &sbi_message,
"Invalid resource name",
sbi_message.h.resource.component[0]));
END
break;
CASE(OGS_SBI_SERVICE_NAME_NAMF_CALLBACK)
SWITCH(sbi_message.h.resource.component[1])
CASE(OGS_SBI_RESOURCE_NAME_SM_CONTEXT_STATUS)
amf_namf_callback_handle_sm_context_status(
stream, &sbi_message);
break;
CASE(OGS_SBI_RESOURCE_NAME_DEREG_NOTIFY)
amf_namf_callback_handle_dereg_notify(stream, &sbi_message);
break;
CASE(OGS_SBI_RESOURCE_NAME_AM_POLICY_NOTIFY)
ogs_assert(true == ogs_sbi_send_http_status_no_content(stream));
break;
DEFAULT
ogs_error("Invalid resource name [%s]",
sbi_message.h.resource.component[1]);
ogs_assert(true ==
ogs_sbi_server_send_error(stream,
OGS_SBI_HTTP_STATUS_BAD_REQUEST, &sbi_message,
"Invalid resource name",
sbi_message.h.resource.component[1]));
END
break;
DEFAULT
ogs_error("Invalid API name [%s]", sbi_message.h.service.name);
ogs_assert(true ==
ogs_sbi_server_send_error(stream,
OGS_SBI_HTTP_STATUS_BAD_REQUEST, &sbi_message,
"Invalid API name", sbi_message.h.resource.component[0]));
END
/* In lib/sbi/server.c, notify_completed() releases 'request' buffer. */
ogs_sbi_message_free(&sbi_message);
break;
case OGS_EVENT_SBI_CLIENT:
ogs_assert(e);
sbi_response = e->h.sbi.response;
ogs_assert(sbi_response);
rv = ogs_sbi_parse_response(&sbi_message, sbi_response);
if (rv != OGS_OK) {
ogs_error("cannot parse HTTP response");
ogs_sbi_message_free(&sbi_message);
ogs_sbi_response_free(sbi_response);
break;
}
SWITCH(sbi_message.h.service.name)
CASE(OGS_SBI_SERVICE_NAME_NUDM_SDM)
CASE(OGS_SBI_SERVICE_NAME_NNSSF_NSSELECTION)
api_version = OGS_SBI_API_V2;
break;
DEFAULT
api_version = OGS_SBI_API_V1;
END
ogs_assert(api_version);
if (strcmp(sbi_message.h.api.version, api_version) != 0) {
ogs_error("Not supported version [%s]", sbi_message.h.api.version);
ogs_sbi_message_free(&sbi_message);
ogs_sbi_response_free(sbi_response);
break;
}
SWITCH(sbi_message.h.service.name)
CASE(OGS_SBI_SERVICE_NAME_NNRF_NFM)
SWITCH(sbi_message.h.resource.component[0])
CASE(OGS_SBI_RESOURCE_NAME_NF_INSTANCES)
nf_instance = e->h.sbi.data;
ogs_assert(nf_instance);
ogs_assert(OGS_FSM_STATE(&nf_instance->sm));
e->h.sbi.message = &sbi_message;
ogs_fsm_dispatch(&nf_instance->sm, e);
break;
CASE(OGS_SBI_RESOURCE_NAME_SUBSCRIPTIONS)
subscription_data = e->h.sbi.data;
ogs_assert(subscription_data);
SWITCH(sbi_message.h.method)
CASE(OGS_SBI_HTTP_METHOD_POST)
if (sbi_message.res_status == OGS_SBI_HTTP_STATUS_CREATED ||
sbi_message.res_status == OGS_SBI_HTTP_STATUS_OK) {
ogs_nnrf_handle_nf_status_subscribe(
subscription_data, &sbi_message);
} else {
ogs_error("[%s] HTTP response error [%d]",
subscription_data->id, sbi_message.res_status);
}
break;
CASE(OGS_SBI_HTTP_METHOD_DELETE)
if (sbi_message.res_status ==
OGS_SBI_HTTP_STATUS_NO_CONTENT) {
ogs_sbi_subscription_data_remove(subscription_data);
} else {
ogs_error("[%s] HTTP response error [%d]",
subscription_data->id, sbi_message.res_status);
}
break;
DEFAULT
ogs_error("Invalid HTTP method [%s]", sbi_message.h.method);
ogs_assert_if_reached();
END
break;
DEFAULT
ogs_error("Invalid resource name [%s]",
sbi_message.h.resource.component[0]);
ogs_assert_if_reached();
END
break;
CASE(OGS_SBI_SERVICE_NAME_NNRF_DISC)
SWITCH(sbi_message.h.resource.component[0])
CASE(OGS_SBI_RESOURCE_NAME_NF_INSTANCES)
sbi_xact = e->h.sbi.data;
ogs_assert(sbi_xact);
SWITCH(sbi_message.h.method)
CASE(OGS_SBI_HTTP_METHOD_GET)
if (sbi_message.res_status == OGS_SBI_HTTP_STATUS_OK)
amf_nnrf_handle_nf_discover(sbi_xact, &sbi_message);
else
ogs_error("HTTP response error [%d]",
sbi_message.res_status);
break;
DEFAULT
ogs_error("Invalid HTTP method [%s]", sbi_message.h.method);
ogs_assert_if_reached();
END
break;
DEFAULT
ogs_error("Invalid resource name [%s]",
sbi_message.h.resource.component[0]);
ogs_assert_if_reached();
END
break;
CASE(OGS_SBI_SERVICE_NAME_NAUSF_AUTH)
CASE(OGS_SBI_SERVICE_NAME_NUDM_UECM)
CASE(OGS_SBI_SERVICE_NAME_NUDM_SDM)
CASE(OGS_SBI_SERVICE_NAME_NPCF_AM_POLICY_CONTROL)
sbi_xact = e->h.sbi.data;
ogs_assert(sbi_xact);
sbi_xact = ogs_sbi_xact_cycle(sbi_xact);
if (!sbi_xact) {
/* CLIENT_WAIT timer could remove SBI transaction
* before receiving SBI message */
ogs_error("SBI transaction has already been removed");
break;
}
amf_ue = (amf_ue_t *)sbi_xact->sbi_object;
ogs_assert(amf_ue);
ogs_sbi_xact_remove(sbi_xact);
amf_ue = amf_ue_cycle(amf_ue);
if (amf_ue) {
ogs_assert(OGS_FSM_STATE(&amf_ue->sm));
e->amf_ue = amf_ue;
e->h.sbi.message = &sbi_message;;
ogs_fsm_dispatch(&amf_ue->sm, e);
} else {
ogs_error("UE(amf_ue) Context has already been removed");
}
break;
CASE(OGS_SBI_SERVICE_NAME_NSMF_PDUSESSION)
sbi_xact = e->h.sbi.data;
ogs_assert(sbi_xact);
sbi_xact = ogs_sbi_xact_cycle(sbi_xact);
if (!sbi_xact) {
/* CLIENT_WAIT timer could remove SBI transaction
* before receiving SBI message */
ogs_error("SBI transaction has already been removed");
break;
}
state = sbi_xact->state;
sess = (amf_sess_t *)sbi_xact->sbi_object;
ogs_assert(sess);
ogs_sbi_xact_remove(sbi_xact);
sess = amf_sess_cycle(sess);
if (!sess) {
/*
* 1. If AMF-UE context is duplicated in Identity-Response,
* OLD AMF-UE's all session contexts are removed.
* 2. If there is an unfinished transaction with SMF,
* Transaction's session context is NULL.
*
* For example,
*
* 1. gNB->AMF : PDUSessionResourceSetupResponse
* 2. AMF->SMF : [POST] /nsmf-pdusession/v1/sm-contexts/1/modify
* 3. UE ->AMF : Registration request with Unknwon GUTI
* 4. AMF->UE : Identity request
* 5. UE ->AMF : Identity response
* AMF UE context duplicated.
* All session contexts are removed
* 6. SMF->AMF : RESPONSE /nsmf-pdusession/v1/sm-contexts/1/modify
* No Session Context
* Assertion
*
* OR
*
* In ./tests/vonr/af-test/test3_func()
* 1. Send PDU session establishment request
* 2. Receive PDU session establishment accept
* 3. Send PDUSessionResourceSetupResponse
* 4. Send De-registration request
* 5. SMF->AMF : RESPONSE /nsmf-pdusession/v1/sm-contexts/3/release
* 6. SMF->AMF : RESPONSE /nsmf-pdusession/v1/sm-contexts/1/modify
*
* IF THIS HAPPENS IN THE REAL WORLD,
* I WILL MODIFY THE ASSERTS BELOW.
*/
ogs_error("Session has already been removed");
break;
}
amf_ue = sess->amf_ue;
ogs_assert(amf_ue);
amf_ue = amf_ue_cycle(amf_ue);
ogs_assert(amf_ue);
ogs_assert(OGS_FSM_STATE(&amf_ue->sm));
e->amf_ue = amf_ue;
e->sess = sess;
e->h.sbi.message = &sbi_message;;
SWITCH(sbi_message.h.resource.component[2])
CASE(OGS_SBI_RESOURCE_NAME_MODIFY)
rv = amf_nsmf_pdusession_handle_update_sm_context(
sess, state, &sbi_message);
if (rv != OGS_OK) {
AMF_SESS_CLEAR(sess);
}
break;
CASE(OGS_SBI_RESOURCE_NAME_RELEASE)
if (sbi_message.res_status == OGS_SBI_HTTP_STATUS_NO_CONTENT ||
sbi_message.res_status == OGS_SBI_HTTP_STATUS_OK) {
ogs_info("[%s:%d] Release SM context [%d]",
amf_ue->supi, sess->psi, sbi_message.res_status);
} else {
ogs_error("[%s] HTTP response error [%d]",
amf_ue->supi, sbi_message.res_status);
}
amf_nsmf_pdusession_handle_release_sm_context(sess, state);
break;
DEFAULT
rv = amf_nsmf_pdusession_handle_create_sm_context(
sess, &sbi_message);
if (rv != OGS_OK) {
/*
* 1. First PDU session establishment request
* (PSI:5, internet)
* 2. First session created
* 3. Seconds PDU session establishment request
* (PSI:5, ims)
* 4. AMF sends DUPLICATED_PDU_SESSION_ID to the SMF
* 5. AMF try to create second PDU session.
* 6. But, Second session rejected due to Subscription Info.
*
* In above situation, AMF need to clear SM_CONTEXT_REF.
* Otherwise, AMF have redundant PDU session.
*
* Moreover, AMF could send UEContextReleaseRequest
* with deactivating this redundant session.
*
* So, if CreateSMContext is failed,
* we'll clear SM_CONTEXT_REF.
*/
AMF_SESS_CLEAR(sess);
}
END
break;
CASE(OGS_SBI_SERVICE_NAME_NNSSF_NSSELECTION)
sbi_xact = e->h.sbi.data;
ogs_assert(sbi_xact);
sbi_xact = ogs_sbi_xact_cycle(sbi_xact);
if (!sbi_xact) {
/* CLIENT_WAIT timer could remove SBI transaction
* before receiving SBI message */
ogs_error("SBI transaction has already been removed");
break;
}
sess = (amf_sess_t *)sbi_xact->sbi_object;
ogs_assert(sess);
state = sbi_xact->state;
ogs_sbi_xact_remove(sbi_xact);
sess = amf_sess_cycle(sess);
if (!sess) {
ogs_error("Session has already been removed");
break;
}
amf_ue = sess->amf_ue;
ogs_assert(amf_ue);
amf_ue = amf_ue_cycle(amf_ue);
ogs_assert(amf_ue);
ogs_assert(OGS_FSM_STATE(&amf_ue->sm));
e->amf_ue = amf_ue;
e->sess = sess;
e->h.sbi.message = &sbi_message;;
amf_nnssf_nsselection_handle_get(sess, &sbi_message);
break;
DEFAULT
ogs_error("Invalid service name [%s]", sbi_message.h.service.name);
ogs_assert_if_reached();
END
ogs_sbi_message_free(&sbi_message);
ogs_sbi_response_free(sbi_response);
break;
case OGS_EVENT_SBI_TIMER:
ogs_assert(e);
switch(e->h.timer_id) {
case OGS_TIMER_NF_INSTANCE_REGISTRATION_INTERVAL:
case OGS_TIMER_NF_INSTANCE_HEARTBEAT_INTERVAL:
case OGS_TIMER_NF_INSTANCE_NO_HEARTBEAT:
case OGS_TIMER_NF_INSTANCE_VALIDITY:
nf_instance = e->h.sbi.data;
ogs_assert(nf_instance);
ogs_assert(OGS_FSM_STATE(&nf_instance->sm));
ogs_fsm_dispatch(&nf_instance->sm, e);
if (OGS_FSM_CHECK(&nf_instance->sm, ogs_sbi_nf_state_exception))
ogs_error("[%s:%s] State machine exception [%d]",
OpenAPI_nf_type_ToString(nf_instance->nf_type),
nf_instance->id, e->h.timer_id);
break;
case OGS_TIMER_SUBSCRIPTION_VALIDITY:
subscription_data = e->h.sbi.data;
ogs_assert(subscription_data);
ogs_assert(true ==
ogs_nnrf_nfm_send_nf_status_subscribe(subscription_data));
ogs_info("Subscription validity expired [%s]",
subscription_data->id);
ogs_sbi_subscription_data_remove(subscription_data);
break;
case OGS_TIMER_SBI_CLIENT_WAIT:
sbi_xact = e->h.sbi.data;
ogs_assert(sbi_xact);
sbi_object = sbi_xact->sbi_object;
ogs_assert(sbi_object);
service_type = sbi_xact->service_type;
ogs_sbi_xact_remove(sbi_xact);
ogs_assert(sbi_object->type > OGS_SBI_OBJ_BASE &&
sbi_object->type < OGS_SBI_OBJ_TOP);
switch(sbi_object->type) {
case OGS_SBI_OBJ_UE_TYPE:
amf_ue = (amf_ue_t *)sbi_object;
ogs_assert(amf_ue);
amf_ue = amf_ue_cycle(amf_ue);
if (!amf_ue) {
ogs_error("UE(amf_ue) Context has already been removed");
break;
}
ogs_error("[%s] Cannot receive SBI message", amf_ue->suci);
ogs_expect(OGS_OK ==
nas_5gs_send_gmm_reject_from_sbi(amf_ue,
OGS_SBI_HTTP_STATUS_GATEWAY_TIMEOUT));
break;
case OGS_SBI_OBJ_SESS_TYPE:
sess = (amf_sess_t *)sbi_object;
ogs_assert(sess);
sess = amf_sess_cycle(sess);
if (!sess) {
ogs_error("Session has already been removed");
break;
}
ogs_error("[%d:%d] Cannot receive SBI message",
sess->psi, sess->pti);
if (sess->payload_container_type) {
ogs_expect(OGS_OK ==
nas_5gs_send_back_gsm_message(sess,
OGS_5GMM_CAUSE_PAYLOAD_WAS_NOT_FORWARDED,
AMF_NAS_BACKOFF_TIME));
} else {
ogs_expect(OGS_OK ==
ngap_send_error_indication2(amf_ue,
NGAP_Cause_PR_transport,
NGAP_CauseTransport_transport_resource_unavailable)
);
}
break;
default:
ogs_fatal("Not implemented [%s:%d]",
ogs_sbi_service_type_to_name(service_type),
sbi_object->type);
ogs_assert_if_reached();
}
break;
default:
ogs_error("Unknown timer[%s:%d]",
ogs_timer_get_name(e->h.timer_id), e->h.timer_id);
}
break;
case AMF_EVENT_NGAP_LO_ACCEPT:
sock = e->ngap.sock;
ogs_assert(sock);
addr = e->ngap.addr;
ogs_assert(addr);
ogs_info("gNB-N2 accepted[%s] in master_sm module",
OGS_ADDR(addr, buf));
gnb = amf_gnb_find_by_addr(addr);
if (!gnb) {
gnb = amf_gnb_add(sock, addr);
ogs_assert(gnb);
} else {
ogs_warn("gNB context duplicated with IP-address [%s]!!!",
OGS_ADDR(addr, buf));
ogs_sock_destroy(sock);
ogs_free(addr);
ogs_warn("N2 Socket Closed");
}
break;
case AMF_EVENT_NGAP_LO_SCTP_COMM_UP:
sock = e->ngap.sock;
ogs_assert(sock);
addr = e->ngap.addr;
ogs_assert(addr);
max_num_of_ostreams = e->ngap.max_num_of_ostreams;
gnb = amf_gnb_find_by_addr(addr);
if (!gnb) {
gnb = amf_gnb_add(sock, addr);
ogs_assert(gnb);
} else {
ogs_free(addr);
}
if (gnb->max_num_of_ostreams)
gnb->max_num_of_ostreams =
ogs_min(max_num_of_ostreams, gnb->max_num_of_ostreams);
else
gnb->max_num_of_ostreams = max_num_of_ostreams;
ogs_info("gNB-N2[%s] max_num_of_ostreams : %d",
OGS_ADDR(gnb->sctp.addr, buf), gnb->max_num_of_ostreams);
break;
case AMF_EVENT_NGAP_LO_CONNREFUSED:
sock = e->ngap.sock;
ogs_assert(sock);
addr = e->ngap.addr;
ogs_assert(addr);
gnb = amf_gnb_find_by_addr(addr);
if (gnb) {
ogs_info("gNB-N2[%s] connection refused!!!", OGS_ADDR(addr, buf));
amf_sbi_send_deactivate_all_ue_in_gnb(
gnb, AMF_REMOVE_S1_CONTEXT_BY_LO_CONNREFUSED);
amf_gnb_remove(gnb);
} else {
ogs_warn("gNB-N2[%s] connection refused, Already Removed!",
OGS_ADDR(addr, buf));
}
ogs_free(addr);
break;
case AMF_EVENT_NGAP_MESSAGE:
sock = e->ngap.sock;
ogs_assert(sock);
addr = e->ngap.addr;
ogs_assert(addr);
pkbuf = e->pkbuf;
ogs_assert(pkbuf);
gnb = amf_gnb_find_by_addr(addr);
ogs_free(addr);
ogs_assert(gnb);
ogs_assert(OGS_FSM_STATE(&gnb->sm));
rc = ogs_ngap_decode(&ngap_message, pkbuf);
if (rc == OGS_OK) {
e->gnb = gnb;
e->ngap.message = &ngap_message;
ogs_fsm_dispatch(&gnb->sm, e);
} else {
ogs_error("Cannot decode NGAP message");
ogs_assert(OGS_OK ==
ngap_send_error_indication(
gnb, NULL, NULL, NGAP_Cause_PR_protocol,
NGAP_CauseProtocol_abstract_syntax_error_falsely_constructed_message));
}
ogs_ngap_free(&ngap_message);
ogs_pkbuf_free(pkbuf);
break;
case AMF_EVENT_NGAP_TIMER:
ran_ue = e->ran_ue;
ogs_assert(ran_ue);
switch (e->h.timer_id) {
case AMF_TIMER_NG_DELAYED_SEND:
gnb = e->gnb;
ogs_assert(gnb);
pkbuf = e->pkbuf;
ogs_assert(pkbuf);
ogs_expect(OGS_OK == ngap_send_to_ran_ue(ran_ue, pkbuf));
ogs_timer_delete(e->timer);
break;
case AMF_TIMER_NG_HOLDING:
ogs_warn("Implicit NG release");
ogs_warn(" RAN_UE_NGAP_ID[%d] AMF_UE_NGAP_ID[%lld]",
ran_ue->ran_ue_ngap_id,
(long long)ran_ue->amf_ue_ngap_id);
ngap_handle_ue_context_release_action(ran_ue);
break;
default:
ogs_error("Unknown timer[%s:%d]",
amf_timer_get_name(e->h.timer_id), e->h.timer_id);
break;
}
break;
case AMF_EVENT_5GMM_MESSAGE:
ran_ue = e->ran_ue;
ogs_assert(ran_ue);
pkbuf = e->pkbuf;
ogs_assert(pkbuf);
if (ogs_nas_5gmm_decode(&nas_message, pkbuf) != OGS_OK) {
ogs_error("ogs_nas_5gmm_decode() failed");
ogs_pkbuf_free(pkbuf);
return;
}
amf_ue = ran_ue->amf_ue;
if (!amf_ue) {
amf_ue = amf_ue_find_by_message(&nas_message);
if (!amf_ue) {
amf_ue = amf_ue_add(ran_ue);
ogs_assert(amf_ue);
} else {
/* Here, if the AMF_UE Context is found,
* the integrity check is not performed
* For example, REGISTRATION_REQUEST,
* TRACKING_AREA_UPDATE_REQUEST message
*
* Now, We will check the MAC in the NAS message*/
ogs_nas_security_header_type_t h;
h.type = e->nas.type;
if (h.integrity_protected) {
/* Decryption was performed in NGAP handler.
* So, we disabled 'ciphered'
* not to decrypt NAS message */
h.ciphered = 0;
if (nas_5gs_security_decode(amf_ue, h, pkbuf) != OGS_OK) {
ogs_error("[%s] nas_security_decode() failed",
amf_ue->suci);
ogs_pkbuf_free(pkbuf);
return;
}
}
}
/*
* TS23.502
* 4.2.3.2 UE Triggered Service Request
*
* 4. [Conditional]
* AMF to SMF: Nsmf_PDUSession_UpdateSMContext Request
*
* The AMF may receive a Service Request to establish another
* NAS signalling connection via a NG-RAN while it has maintained
* an old NAS signalling connection for UE still via NG-RAN.
* In this case, AMF shall trigger the AN release procedure toward
* the old NG-RAN to release the old NAS signalling connection
* as defined in clause 4.2.6 with following logic: */
/* If NAS(amf_ue_t) has already been associated with
* older NG(ran_ue_t) context */
if (CM_CONNECTED(amf_ue)) {
/* Previous NG(ran_ue_t) context the holding timer(30secs)
* is started.
* Newly associated NG(ran_ue_t) context holding timer
* is stopped. */
ogs_debug("[%s] Start NG Holding Timer", amf_ue->suci);
ogs_debug("[%s] RAN_UE_NGAP_ID[%d] AMF_UE_NGAP_ID[%lld]",
amf_ue->suci, amf_ue->ran_ue->ran_ue_ngap_id,
(long long)amf_ue->ran_ue->amf_ue_ngap_id);
/* De-associate NG with NAS/EMM */
ran_ue_deassociate(amf_ue->ran_ue);
ogs_expect(OGS_OK ==
ngap_send_ran_ue_context_release_command(amf_ue->ran_ue,
NGAP_Cause_PR_nas, NGAP_CauseNas_normal_release,
NGAP_UE_CTX_REL_NG_CONTEXT_REMOVE, 0));
}
amf_ue_associate_ran_ue(amf_ue, ran_ue);
}
ogs_assert(amf_ue);
ogs_assert(OGS_FSM_STATE(&amf_ue->sm));
e->amf_ue = amf_ue;
e->nas.message = &nas_message;
ogs_fsm_dispatch(&amf_ue->sm, e);
ogs_pkbuf_free(pkbuf);
break;
case AMF_EVENT_5GMM_TIMER:
amf_ue = e->amf_ue;
ogs_assert(amf_ue);
ogs_assert(OGS_FSM_STATE(&amf_ue->sm));
ogs_fsm_dispatch(&amf_ue->sm, e);
break;
default:
ogs_error("No handler for event %s", amf_event_get_name(e));
break;
}
}