|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "context.h" |
|
|
#include "pfcp-path.h" |
|
|
|
|
|
static upf_context_t self; |
|
|
|
|
|
int __upf_log_domain; |
|
|
|
|
|
static OGS_POOL(upf_sess_pool, upf_sess_t); |
|
|
static OGS_POOL(upf_n4_seid_pool, ogs_pool_id_t); |
|
|
|
|
|
static int context_initialized = 0; |
|
|
|
|
|
static void upf_sess_urr_acc_remove_all(upf_sess_t *sess); |
|
|
|
|
|
void upf_context_init(void) |
|
|
{ |
|
|
ogs_assert(context_initialized == 0); |
|
|
|
|
|
|
|
|
memset(&self, 0, sizeof(upf_context_t)); |
|
|
|
|
|
ogs_log_install_domain(&__upf_log_domain, "upf", ogs_core()->log.level); |
|
|
|
|
|
|
|
|
ogs_pfcp_self()->up_function_features.ftup = 1; |
|
|
ogs_pfcp_self()->up_function_features.empu = 1; |
|
|
ogs_pfcp_self()->up_function_features.mnop = 1; |
|
|
ogs_pfcp_self()->up_function_features.vtime = 1; |
|
|
ogs_pfcp_self()->up_function_features.frrt = 1; |
|
|
ogs_pfcp_self()->up_function_features_len = 4; |
|
|
|
|
|
ogs_list_init(&self.sess_list); |
|
|
ogs_pool_init(&upf_sess_pool, ogs_app()->pool.sess); |
|
|
ogs_pool_init(&upf_n4_seid_pool, ogs_app()->pool.sess); |
|
|
ogs_pool_random_id_generate(&upf_n4_seid_pool); |
|
|
|
|
|
self.upf_n4_seid_hash = ogs_hash_make(); |
|
|
ogs_assert(self.upf_n4_seid_hash); |
|
|
self.smf_n4_seid_hash = ogs_hash_make(); |
|
|
ogs_assert(self.smf_n4_seid_hash); |
|
|
self.smf_n4_f_seid_hash = ogs_hash_make(); |
|
|
ogs_assert(self.smf_n4_f_seid_hash); |
|
|
self.ipv4_hash = ogs_hash_make(); |
|
|
ogs_assert(self.ipv4_hash); |
|
|
self.ipv6_hash = ogs_hash_make(); |
|
|
ogs_assert(self.ipv6_hash); |
|
|
|
|
|
context_initialized = 1; |
|
|
} |
|
|
|
|
|
static void free_upf_route_trie_node(struct upf_route_trie_node *node) |
|
|
{ |
|
|
if (!node) |
|
|
return; |
|
|
free_upf_route_trie_node(node->left); |
|
|
free_upf_route_trie_node(node->right); |
|
|
ogs_free(node); |
|
|
} |
|
|
|
|
|
void upf_context_final(void) |
|
|
{ |
|
|
ogs_assert(context_initialized == 1); |
|
|
|
|
|
upf_sess_remove_all(); |
|
|
|
|
|
ogs_assert(self.upf_n4_seid_hash); |
|
|
ogs_hash_destroy(self.upf_n4_seid_hash); |
|
|
ogs_assert(self.smf_n4_seid_hash); |
|
|
ogs_hash_destroy(self.smf_n4_seid_hash); |
|
|
ogs_assert(self.smf_n4_f_seid_hash); |
|
|
ogs_hash_destroy(self.smf_n4_f_seid_hash); |
|
|
ogs_assert(self.ipv4_hash); |
|
|
ogs_hash_destroy(self.ipv4_hash); |
|
|
ogs_assert(self.ipv6_hash); |
|
|
ogs_hash_destroy(self.ipv6_hash); |
|
|
|
|
|
free_upf_route_trie_node(self.ipv4_framed_routes); |
|
|
free_upf_route_trie_node(self.ipv6_framed_routes); |
|
|
|
|
|
ogs_pool_final(&upf_sess_pool); |
|
|
ogs_pool_final(&upf_n4_seid_pool); |
|
|
|
|
|
context_initialized = 0; |
|
|
} |
|
|
|
|
|
upf_context_t *upf_self(void) |
|
|
{ |
|
|
return &self; |
|
|
} |
|
|
|
|
|
static int upf_context_prepare(void) |
|
|
{ |
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
static int upf_context_validation(void) |
|
|
{ |
|
|
if (ogs_list_first(&ogs_gtp_self()->gtpu_list) == NULL) { |
|
|
ogs_error("No upf.gtpu.address in '%s'", ogs_app()->file); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
if (ogs_list_first(&ogs_pfcp_self()->subnet_list) == NULL) { |
|
|
ogs_error("No upf.session.subnet: in '%s'", ogs_app()->file); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
int upf_context_parse_config(void) |
|
|
{ |
|
|
int rv; |
|
|
yaml_document_t *document = NULL; |
|
|
ogs_yaml_iter_t root_iter; |
|
|
|
|
|
document = ogs_app()->document; |
|
|
ogs_assert(document); |
|
|
|
|
|
rv = upf_context_prepare(); |
|
|
if (rv != OGS_OK) return rv; |
|
|
|
|
|
ogs_yaml_iter_init(&root_iter, document); |
|
|
while (ogs_yaml_iter_next(&root_iter)) { |
|
|
const char *root_key = ogs_yaml_iter_key(&root_iter); |
|
|
ogs_assert(root_key); |
|
|
if (!strcmp(root_key, "upf")) { |
|
|
ogs_yaml_iter_t upf_iter; |
|
|
ogs_yaml_iter_recurse(&root_iter, &upf_iter); |
|
|
while (ogs_yaml_iter_next(&upf_iter)) { |
|
|
const char *upf_key = ogs_yaml_iter_key(&upf_iter); |
|
|
ogs_assert(upf_key); |
|
|
if (!strcmp(upf_key, "gtpu")) { |
|
|
|
|
|
} else if (!strcmp(upf_key, "pfcp")) { |
|
|
|
|
|
} else if (!strcmp(upf_key, "smf")) { |
|
|
|
|
|
} else if (!strcmp(upf_key, "session")) { |
|
|
|
|
|
} else if (!strcmp(upf_key, "metrics")) { |
|
|
|
|
|
} else |
|
|
ogs_warn("unknown key `%s`", upf_key); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
rv = upf_context_validation(); |
|
|
if (rv != OGS_OK) return rv; |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
upf_sess_t *upf_sess_add(ogs_pfcp_f_seid_t *cp_f_seid) |
|
|
{ |
|
|
upf_sess_t *sess = NULL; |
|
|
|
|
|
ogs_assert(cp_f_seid); |
|
|
|
|
|
ogs_pool_id_calloc(&upf_sess_pool, &sess); |
|
|
ogs_assert(sess); |
|
|
|
|
|
ogs_pfcp_pool_init(&sess->pfcp); |
|
|
|
|
|
|
|
|
ogs_pool_alloc(&upf_n4_seid_pool, &sess->upf_n4_seid_node); |
|
|
ogs_assert(sess->upf_n4_seid_node); |
|
|
|
|
|
sess->upf_n4_seid = *(sess->upf_n4_seid_node); |
|
|
|
|
|
ogs_hash_set(self.upf_n4_seid_hash, &sess->upf_n4_seid, |
|
|
sizeof(sess->upf_n4_seid), sess); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
sess->smf_n4_f_seid.seid = cp_f_seid->seid; |
|
|
ogs_assert(OGS_OK == |
|
|
ogs_pfcp_f_seid_to_ip(cp_f_seid, &sess->smf_n4_f_seid.ip)); |
|
|
|
|
|
ogs_hash_set(self.smf_n4_f_seid_hash, &sess->smf_n4_f_seid, |
|
|
sizeof(sess->smf_n4_f_seid), sess); |
|
|
ogs_hash_set(self.smf_n4_seid_hash, &sess->smf_n4_f_seid.seid, |
|
|
sizeof(sess->smf_n4_f_seid.seid), sess); |
|
|
|
|
|
ogs_list_add(&self.sess_list, sess); |
|
|
upf_metrics_inst_global_inc(UPF_METR_GLOB_GAUGE_UPF_SESSIONNBR); |
|
|
|
|
|
ogs_info("[Added] Number of UPF-Sessions is now %d", |
|
|
ogs_list_count(&self.sess_list)); |
|
|
|
|
|
return sess; |
|
|
} |
|
|
|
|
|
int upf_sess_remove(upf_sess_t *sess) |
|
|
{ |
|
|
ogs_assert(sess); |
|
|
|
|
|
upf_sess_urr_acc_remove_all(sess); |
|
|
|
|
|
ogs_list_remove(&self.sess_list, sess); |
|
|
ogs_pfcp_sess_clear(&sess->pfcp); |
|
|
|
|
|
ogs_hash_set(self.upf_n4_seid_hash, &sess->upf_n4_seid, |
|
|
sizeof(sess->upf_n4_seid), NULL); |
|
|
|
|
|
ogs_hash_set(self.smf_n4_seid_hash, &sess->smf_n4_f_seid.seid, |
|
|
sizeof(sess->smf_n4_f_seid.seid), NULL); |
|
|
ogs_hash_set(self.smf_n4_f_seid_hash, &sess->smf_n4_f_seid, |
|
|
sizeof(sess->smf_n4_f_seid), NULL); |
|
|
|
|
|
if (sess->ipv4) { |
|
|
ogs_hash_set(self.ipv4_hash, sess->ipv4->addr, OGS_IPV4_LEN, NULL); |
|
|
ogs_pfcp_ue_ip_free(sess->ipv4); |
|
|
} |
|
|
if (sess->ipv6) { |
|
|
ogs_hash_set(self.ipv6_hash, |
|
|
sess->ipv6->addr, OGS_IPV6_DEFAULT_PREFIX_LEN >> 3, NULL); |
|
|
ogs_pfcp_ue_ip_free(sess->ipv6); |
|
|
} |
|
|
|
|
|
upf_sess_set_ue_ipv4_framed_routes(sess, NULL); |
|
|
upf_sess_set_ue_ipv6_framed_routes(sess, NULL); |
|
|
|
|
|
ogs_pfcp_pool_final(&sess->pfcp); |
|
|
|
|
|
ogs_pool_free(&upf_n4_seid_pool, sess->upf_n4_seid_node); |
|
|
ogs_pool_id_free(&upf_sess_pool, sess); |
|
|
if (sess->apn_dnn) |
|
|
ogs_free(sess->apn_dnn); |
|
|
upf_metrics_inst_global_dec(UPF_METR_GLOB_GAUGE_UPF_SESSIONNBR); |
|
|
|
|
|
ogs_info("[Removed] Number of UPF-sessions is now %d", |
|
|
ogs_list_count(&self.sess_list)); |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
void upf_sess_remove_all(void) |
|
|
{ |
|
|
upf_sess_t *sess = NULL, *next = NULL; |
|
|
|
|
|
ogs_list_for_each_safe(&self.sess_list, next, sess) { |
|
|
upf_sess_remove(sess); |
|
|
} |
|
|
} |
|
|
|
|
|
upf_sess_t *upf_sess_find_by_smf_n4_seid(uint64_t seid) |
|
|
{ |
|
|
return ogs_hash_get(self.smf_n4_seid_hash, &seid, sizeof(seid)); |
|
|
} |
|
|
|
|
|
upf_sess_t *upf_sess_find_by_smf_n4_f_seid(ogs_pfcp_f_seid_t *f_seid) |
|
|
{ |
|
|
struct { |
|
|
uint64_t seid; |
|
|
ogs_ip_t ip; |
|
|
} key; |
|
|
|
|
|
ogs_assert(f_seid); |
|
|
ogs_assert(OGS_OK == ogs_pfcp_f_seid_to_ip(f_seid, &key.ip)); |
|
|
key.seid = f_seid->seid; |
|
|
|
|
|
return ogs_hash_get(self.smf_n4_f_seid_hash, &key, sizeof(key)); |
|
|
} |
|
|
|
|
|
upf_sess_t *upf_sess_find_by_upf_n4_seid(uint64_t seid) |
|
|
{ |
|
|
return ogs_hash_get(self.upf_n4_seid_hash, &seid, sizeof(seid)); |
|
|
} |
|
|
|
|
|
upf_sess_t *upf_sess_find_by_ipv4(uint32_t addr) |
|
|
{ |
|
|
upf_sess_t *ret; |
|
|
struct upf_route_trie_node *trie = self.ipv4_framed_routes; |
|
|
const int nbits = sizeof(addr) << 3; |
|
|
int i; |
|
|
|
|
|
ogs_assert(self.ipv4_hash); |
|
|
|
|
|
ret = ogs_hash_get(self.ipv4_hash, &addr, OGS_IPV4_LEN); |
|
|
if (ret) |
|
|
return ret; |
|
|
|
|
|
for (i = 0; i <= nbits; i++) { |
|
|
int bit = nbits - i - 1; |
|
|
|
|
|
if (!trie) |
|
|
break; |
|
|
if (trie->sess) |
|
|
ret = trie->sess; |
|
|
if (i == nbits) |
|
|
break; |
|
|
|
|
|
if ((1 << bit) & be32toh(addr)) |
|
|
trie = trie->right; |
|
|
else |
|
|
trie = trie->left; |
|
|
} |
|
|
return ret; |
|
|
} |
|
|
|
|
|
upf_sess_t *upf_sess_find_by_ipv6(uint32_t *addr6) |
|
|
{ |
|
|
upf_sess_t *ret = NULL; |
|
|
struct upf_route_trie_node *trie = self.ipv6_framed_routes; |
|
|
int i; |
|
|
const int chunk_size = sizeof(*addr6) << 3; |
|
|
|
|
|
ogs_assert(self.ipv6_hash); |
|
|
ogs_assert(addr6); |
|
|
ret = ogs_hash_get( |
|
|
self.ipv6_hash, addr6, OGS_IPV6_DEFAULT_PREFIX_LEN >> 3); |
|
|
if (ret) |
|
|
return ret; |
|
|
|
|
|
for (i = 0; i <= OGS_IPV6_128_PREFIX_LEN; i++) { |
|
|
int part = i / chunk_size; |
|
|
int bit = (OGS_IPV6_128_PREFIX_LEN - i - 1) % chunk_size; |
|
|
|
|
|
if (!trie) |
|
|
break; |
|
|
if (trie->sess) |
|
|
ret = trie->sess; |
|
|
if (i == OGS_IPV6_128_PREFIX_LEN) |
|
|
break; |
|
|
|
|
|
if ((1 << bit) & be32toh(addr6[part])) |
|
|
trie = trie->right; |
|
|
else |
|
|
trie = trie->left; |
|
|
} |
|
|
return ret; |
|
|
} |
|
|
|
|
|
upf_sess_t *upf_sess_find_by_id(ogs_pool_id_t id) |
|
|
{ |
|
|
return ogs_pool_find_by_id(&upf_sess_pool, id); |
|
|
} |
|
|
|
|
|
upf_sess_t *upf_sess_add_by_message(ogs_pfcp_message_t *message) |
|
|
{ |
|
|
upf_sess_t *sess = NULL; |
|
|
ogs_pfcp_f_seid_t *f_seid = NULL; |
|
|
|
|
|
ogs_pfcp_session_establishment_request_t *req = |
|
|
&message->pfcp_session_establishment_request;; |
|
|
|
|
|
f_seid = req->cp_f_seid.data; |
|
|
if (req->cp_f_seid.presence == 0 || f_seid == NULL) { |
|
|
ogs_error("No CP F-SEID"); |
|
|
return NULL; |
|
|
} |
|
|
if (f_seid->ipv4 == 0 && f_seid->ipv6 == 0) { |
|
|
ogs_error("No IPv4 or IPv6"); |
|
|
return NULL; |
|
|
} |
|
|
f_seid->seid = be64toh(f_seid->seid); |
|
|
|
|
|
sess = upf_sess_find_by_smf_n4_f_seid(f_seid); |
|
|
if (!sess) { |
|
|
sess = upf_sess_add(f_seid); |
|
|
if (!sess) { |
|
|
ogs_error("No Session Context"); |
|
|
return NULL; |
|
|
} |
|
|
} |
|
|
ogs_assert(sess); |
|
|
|
|
|
return sess; |
|
|
} |
|
|
|
|
|
uint8_t upf_sess_set_ue_ip(upf_sess_t *sess, |
|
|
uint8_t session_type, ogs_pfcp_pdr_t *pdr) |
|
|
{ |
|
|
ogs_pfcp_ue_ip_addr_t *ue_ip = NULL; |
|
|
char buf1[OGS_ADDRSTRLEN]; |
|
|
char buf2[OGS_ADDRSTRLEN]; |
|
|
|
|
|
uint8_t cause_value = OGS_PFCP_CAUSE_REQUEST_ACCEPTED; |
|
|
|
|
|
ogs_assert(sess); |
|
|
ogs_assert(session_type); |
|
|
ogs_assert(pdr); |
|
|
ogs_assert(pdr->ue_ip_addr_len); |
|
|
ue_ip = &pdr->ue_ip_addr; |
|
|
ogs_assert(ue_ip); |
|
|
|
|
|
if (sess->ipv4) { |
|
|
ogs_hash_set(self.ipv4_hash, |
|
|
sess->ipv4->addr, OGS_IPV4_LEN, NULL); |
|
|
ogs_pfcp_ue_ip_free(sess->ipv4); |
|
|
} |
|
|
if (sess->ipv6) { |
|
|
ogs_hash_set(self.ipv6_hash, |
|
|
sess->ipv6->addr, OGS_IPV6_DEFAULT_PREFIX_LEN >> 3, NULL); |
|
|
ogs_pfcp_ue_ip_free(sess->ipv6); |
|
|
} |
|
|
|
|
|
|
|
|
if (session_type == OGS_PDU_SESSION_TYPE_IPV4) { |
|
|
if (ue_ip->ipv4 || pdr->dnn) { |
|
|
sess->ipv4 = ogs_pfcp_ue_ip_alloc(&cause_value, AF_INET, |
|
|
pdr->dnn, (uint8_t *)&(ue_ip->addr)); |
|
|
if (!sess->ipv4) { |
|
|
ogs_error("ogs_pfcp_ue_ip_alloc() failed[%d]", cause_value); |
|
|
ogs_assert(cause_value != OGS_PFCP_CAUSE_REQUEST_ACCEPTED); |
|
|
return cause_value; |
|
|
} |
|
|
ogs_hash_set(self.ipv4_hash, sess->ipv4->addr, OGS_IPV4_LEN, sess); |
|
|
} else { |
|
|
ogs_warn("Cannot support PDN-Type[%d], [IPv4:%d IPv6:%d DNN:%s]", |
|
|
session_type, ue_ip->ipv4, ue_ip->ipv6, |
|
|
pdr->dnn ? pdr->dnn : ""); |
|
|
} |
|
|
} else if (session_type == OGS_PDU_SESSION_TYPE_IPV6) { |
|
|
if (ue_ip->ipv6 || pdr->dnn) { |
|
|
sess->ipv6 = ogs_pfcp_ue_ip_alloc(&cause_value, AF_INET6, |
|
|
pdr->dnn, ue_ip->addr6); |
|
|
if (!sess->ipv6) { |
|
|
ogs_error("ogs_pfcp_ue_ip_alloc() failed[%d]", cause_value); |
|
|
ogs_assert(cause_value != OGS_PFCP_CAUSE_REQUEST_ACCEPTED); |
|
|
return cause_value; |
|
|
} |
|
|
ogs_hash_set(self.ipv6_hash, sess->ipv6->addr, |
|
|
OGS_IPV6_DEFAULT_PREFIX_LEN >> 3, sess); |
|
|
} else { |
|
|
ogs_warn("Cannot support PDN-Type[%d], [IPv4:%d IPv6:%d DNN:%s]", |
|
|
session_type, ue_ip->ipv4, ue_ip->ipv6, |
|
|
pdr->dnn ? pdr->dnn : ""); |
|
|
} |
|
|
} else if (session_type == OGS_PDU_SESSION_TYPE_IPV4V6) { |
|
|
if (ue_ip->ipv4 || pdr->dnn) { |
|
|
sess->ipv4 = ogs_pfcp_ue_ip_alloc(&cause_value, AF_INET, |
|
|
pdr->dnn, (uint8_t *)&(ue_ip->both.addr)); |
|
|
if (!sess->ipv4) { |
|
|
ogs_error("ogs_pfcp_ue_ip_alloc() failed[%d]", cause_value); |
|
|
ogs_assert(cause_value != OGS_PFCP_CAUSE_REQUEST_ACCEPTED); |
|
|
return cause_value; |
|
|
} |
|
|
ogs_hash_set(self.ipv4_hash, sess->ipv4->addr, OGS_IPV4_LEN, sess); |
|
|
} else { |
|
|
ogs_warn("Cannot support PDN-Type[%d], [IPv4:%d IPv6:%d DNN:%s]", |
|
|
session_type, ue_ip->ipv4, ue_ip->ipv6, |
|
|
pdr->dnn ? pdr->dnn : ""); |
|
|
} |
|
|
|
|
|
if (ue_ip->ipv6 || pdr->dnn) { |
|
|
sess->ipv6 = ogs_pfcp_ue_ip_alloc(&cause_value, AF_INET6, |
|
|
pdr->dnn, ue_ip->both.addr6); |
|
|
if (!sess->ipv6) { |
|
|
ogs_error("ogs_pfcp_ue_ip_alloc() failed[%d]", cause_value); |
|
|
ogs_assert(cause_value != OGS_PFCP_CAUSE_REQUEST_ACCEPTED); |
|
|
if (sess->ipv4) { |
|
|
ogs_hash_set(self.ipv4_hash, |
|
|
sess->ipv4->addr, OGS_IPV4_LEN, NULL); |
|
|
ogs_pfcp_ue_ip_free(sess->ipv4); |
|
|
sess->ipv4 = NULL; |
|
|
} |
|
|
return cause_value; |
|
|
} |
|
|
ogs_hash_set(self.ipv6_hash, sess->ipv6->addr, |
|
|
OGS_IPV6_DEFAULT_PREFIX_LEN >> 3, sess); |
|
|
} else { |
|
|
ogs_warn("Cannot support PDN-Type[%d], [IPv4:%d IPv6:%d DNN:%s]", |
|
|
session_type, ue_ip->ipv4, ue_ip->ipv6, |
|
|
pdr->dnn ? pdr->dnn : ""); |
|
|
} |
|
|
} else { |
|
|
ogs_warn("Cannot support PDN-Type[%d], [IPv4:%d IPv6:%d DNN:%s]", |
|
|
session_type, ue_ip->ipv4, ue_ip->ipv6, |
|
|
pdr->dnn ? pdr->dnn : ""); |
|
|
} |
|
|
|
|
|
ogs_info("UE F-SEID[UP:0x%lx CP:0x%lx] " |
|
|
"APN[%s] PDN-Type[%d] IPv4[%s] IPv6[%s]", |
|
|
(long)sess->upf_n4_seid, (long)sess->smf_n4_f_seid.seid, |
|
|
pdr->dnn, session_type, |
|
|
sess->ipv4 ? OGS_INET_NTOP(&sess->ipv4->addr, buf1) : "", |
|
|
sess->ipv6 ? OGS_INET6_NTOP(&sess->ipv6->addr, buf2) : ""); |
|
|
|
|
|
return cause_value; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
static void free_framed_route_from_trie(ogs_ipsubnet_t *route) |
|
|
{ |
|
|
const int chunk_size = sizeof(route->sub[0]) << 3; |
|
|
const int is_ipv4 = route->family == AF_INET; |
|
|
const int nbits = is_ipv4 ? chunk_size : OGS_IPV6_128_PREFIX_LEN; |
|
|
struct upf_route_trie_node **trie = |
|
|
is_ipv4 ? &self.ipv4_framed_routes : &self.ipv6_framed_routes; |
|
|
|
|
|
struct upf_route_trie_node **to_free_tries[OGS_IPV6_128_PREFIX_LEN + 1]; |
|
|
int free_from = 0; |
|
|
int i = 0; |
|
|
|
|
|
for (i = 0; i <= nbits; i++) { |
|
|
int part = i / chunk_size; |
|
|
int bit = (nbits - i - 1) % chunk_size; |
|
|
|
|
|
if (!*trie) |
|
|
break; |
|
|
to_free_tries[i] = trie; |
|
|
|
|
|
if (i == nbits || |
|
|
((1 << bit) & be32toh(route->mask[part])) == 0) { |
|
|
(*trie)->sess = NULL; |
|
|
if ((*trie)->left || (*trie)->right) |
|
|
free_from = i + 1; |
|
|
i++; |
|
|
break; |
|
|
} |
|
|
|
|
|
if ((1 << bit) & be32toh(route->sub[part])) { |
|
|
if ((*trie)->left || (*trie)->sess) |
|
|
free_from = i + 1; |
|
|
trie = &(*trie)->right; |
|
|
} else { |
|
|
if ((*trie)->right || (*trie)->sess) |
|
|
free_from = i + 1; |
|
|
trie = &(*trie)->left; |
|
|
} |
|
|
} |
|
|
|
|
|
for (i = i - 1; i >= free_from; i--) { |
|
|
trie = to_free_tries[i]; |
|
|
ogs_free(*trie); |
|
|
*trie = NULL; |
|
|
} |
|
|
} |
|
|
|
|
|
static void add_framed_route_to_trie(ogs_ipsubnet_t *route, upf_sess_t *sess) |
|
|
{ |
|
|
const int chunk_size = sizeof(route->sub[0]) << 3; |
|
|
const int is_ipv4 = route->family == AF_INET; |
|
|
const int nbits = is_ipv4 ? chunk_size : OGS_IPV6_128_PREFIX_LEN; |
|
|
struct upf_route_trie_node **trie = |
|
|
is_ipv4 ? &self.ipv4_framed_routes : &self.ipv6_framed_routes; |
|
|
int i = 0; |
|
|
|
|
|
for (i = 0; i <= nbits; i++) { |
|
|
int part = i / chunk_size; |
|
|
int bit = (nbits - i - 1) % chunk_size; |
|
|
|
|
|
if (!*trie) |
|
|
*trie = ogs_calloc(1, sizeof(**trie)); |
|
|
|
|
|
if (i == nbits || |
|
|
((1 << bit) & be32toh(route->mask[part])) == 0) { |
|
|
(*trie)->sess = sess; |
|
|
break; |
|
|
} |
|
|
|
|
|
if ((1 << bit) & be32toh(route->sub[part])) { |
|
|
trie = &(*trie)->right; |
|
|
} else { |
|
|
trie = &(*trie)->left; |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
static int parse_framed_route(ogs_ipsubnet_t *subnet, const char *framed_route) |
|
|
{ |
|
|
char *mask = ogs_strdup(framed_route); |
|
|
char *addr = strsep(&mask, "/"); |
|
|
int rv; |
|
|
|
|
|
rv = ogs_ipsubnet(subnet, addr, mask); |
|
|
ogs_free(addr); |
|
|
return rv; |
|
|
} |
|
|
|
|
|
uint8_t upf_sess_set_ue_ipv4_framed_routes(upf_sess_t *sess, |
|
|
char *framed_routes[]) |
|
|
{ |
|
|
int i = 0, j = 0, rv; |
|
|
uint8_t cause_value = OGS_PFCP_CAUSE_REQUEST_ACCEPTED; |
|
|
|
|
|
ogs_assert(sess); |
|
|
|
|
|
for (i = 0; i < OGS_MAX_NUM_OF_FRAMED_ROUTES_IN_PDI; i++) { |
|
|
if (!sess->ipv4_framed_routes || !sess->ipv4_framed_routes[i].family) |
|
|
break; |
|
|
free_framed_route_from_trie(&sess->ipv4_framed_routes[i]); |
|
|
memset(&sess->ipv4_framed_routes[i], 0, |
|
|
sizeof(sess->ipv4_framed_routes[i])); |
|
|
} |
|
|
|
|
|
for (i = 0, j = 0; i < OGS_MAX_NUM_OF_FRAMED_ROUTES_IN_PDI; i++) { |
|
|
if (!framed_routes || !framed_routes[i]) |
|
|
break; |
|
|
|
|
|
if (sess->ipv4_framed_routes == NULL) { |
|
|
sess->ipv4_framed_routes = ogs_calloc( |
|
|
OGS_MAX_NUM_OF_FRAMED_ROUTES_IN_PDI, sizeof(ogs_ipsubnet_t)); |
|
|
ogs_assert(sess->ipv4_framed_routes); |
|
|
} |
|
|
|
|
|
rv = parse_framed_route(&sess->ipv4_framed_routes[j], framed_routes[i]); |
|
|
|
|
|
if (rv != OGS_OK) { |
|
|
ogs_warn("Ignoring invalid framed route %s", framed_routes[i]); |
|
|
memset(&sess->ipv4_framed_routes[j], 0, |
|
|
sizeof(sess->ipv4_framed_routes[j])); |
|
|
continue; |
|
|
} |
|
|
add_framed_route_to_trie(&sess->ipv4_framed_routes[j], sess); |
|
|
j++; |
|
|
} |
|
|
if (j == 0 && sess->ipv4_framed_routes) { |
|
|
ogs_free(sess->ipv4_framed_routes); |
|
|
sess->ipv4_framed_routes = NULL; |
|
|
} |
|
|
|
|
|
return cause_value; |
|
|
} |
|
|
|
|
|
uint8_t upf_sess_set_ue_ipv6_framed_routes(upf_sess_t *sess, |
|
|
char *framed_routes[]) |
|
|
{ |
|
|
int i = 0, j = 0, rv; |
|
|
uint8_t cause_value = OGS_PFCP_CAUSE_REQUEST_ACCEPTED; |
|
|
|
|
|
ogs_assert(sess); |
|
|
|
|
|
for (i = 0; i < OGS_MAX_NUM_OF_FRAMED_ROUTES_IN_PDI; i++) { |
|
|
if (!sess->ipv6_framed_routes || !sess->ipv6_framed_routes[i].family) |
|
|
break; |
|
|
free_framed_route_from_trie(&sess->ipv6_framed_routes[i]); |
|
|
} |
|
|
|
|
|
for (i = 0, j = 0; i < OGS_MAX_NUM_OF_FRAMED_ROUTES_IN_PDI; i++) { |
|
|
if (!framed_routes || !framed_routes[i]) |
|
|
break; |
|
|
|
|
|
if (sess->ipv6_framed_routes == NULL) { |
|
|
sess->ipv6_framed_routes = ogs_calloc( |
|
|
OGS_MAX_NUM_OF_FRAMED_ROUTES_IN_PDI, sizeof(ogs_ipsubnet_t)); |
|
|
ogs_assert(sess->ipv6_framed_routes); |
|
|
} |
|
|
|
|
|
rv = parse_framed_route(&sess->ipv6_framed_routes[j], framed_routes[i]); |
|
|
|
|
|
if (rv != OGS_OK) { |
|
|
ogs_warn("Ignoring invalid framed route %s", framed_routes[i]); |
|
|
memset(&sess->ipv6_framed_routes[j], 0, |
|
|
sizeof(sess->ipv6_framed_routes[j])); |
|
|
continue; |
|
|
} |
|
|
add_framed_route_to_trie(&sess->ipv6_framed_routes[j], sess); |
|
|
j++; |
|
|
} |
|
|
if (j == 0 && sess->ipv6_framed_routes) { |
|
|
ogs_free(sess->ipv6_framed_routes); |
|
|
sess->ipv6_framed_routes = NULL; |
|
|
} |
|
|
|
|
|
return cause_value; |
|
|
} |
|
|
|
|
|
void upf_sess_urr_acc_add(upf_sess_t *sess, ogs_pfcp_urr_t *urr, size_t size, bool is_uplink) |
|
|
{ |
|
|
upf_sess_urr_acc_t *urr_acc = &sess->urr_acc[urr->id]; |
|
|
uint64_t vol; |
|
|
|
|
|
|
|
|
urr_acc->total_octets += size; |
|
|
urr_acc->total_pkts++; |
|
|
if (is_uplink) { |
|
|
urr_acc->ul_octets += size; |
|
|
urr_acc->ul_pkts++; |
|
|
} else { |
|
|
urr_acc->dl_octets += size; |
|
|
urr_acc->dl_pkts++; |
|
|
} |
|
|
|
|
|
urr_acc->time_of_last_packet = ogs_time_now(); |
|
|
if (urr_acc->time_of_first_packet == 0) |
|
|
urr_acc->time_of_first_packet = urr_acc->time_of_last_packet; |
|
|
|
|
|
|
|
|
vol = urr_acc->total_octets - urr_acc->last_report.total_octets; |
|
|
if ((urr->rep_triggers.volume_quota && urr->vol_quota.tovol && vol >= urr->vol_quota.total_volume) || |
|
|
(urr->rep_triggers.volume_threshold && urr->vol_threshold.tovol && vol >= urr->vol_threshold.total_volume)) { |
|
|
ogs_pfcp_user_plane_report_t report; |
|
|
memset(&report, 0, sizeof(report)); |
|
|
upf_sess_urr_acc_fill_usage_report(sess, urr, &report, 0); |
|
|
report.num_of_usage_report = 1; |
|
|
upf_sess_urr_acc_snapshot(sess, urr); |
|
|
|
|
|
ogs_assert(OGS_OK == |
|
|
upf_pfcp_send_session_report_request(sess, &report)); |
|
|
|
|
|
upf_sess_urr_acc_timers_setup(sess, urr); |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
void upf_sess_urr_acc_fill_usage_report(upf_sess_t *sess, const ogs_pfcp_urr_t *urr, |
|
|
ogs_pfcp_user_plane_report_t *report, unsigned int idx) |
|
|
{ |
|
|
upf_sess_urr_acc_t *urr_acc = &sess->urr_acc[urr->id]; |
|
|
ogs_time_t last_report_timestamp; |
|
|
ogs_time_t now; |
|
|
|
|
|
now = ogs_time_now(); |
|
|
|
|
|
if (urr_acc->last_report.timestamp) |
|
|
last_report_timestamp = urr_acc->last_report.timestamp; |
|
|
else |
|
|
last_report_timestamp = ogs_time_from_ntp32(urr_acc->time_start); |
|
|
|
|
|
report->type.usage_report = 1; |
|
|
report->usage_report[idx].id = urr->id; |
|
|
report->usage_report[idx].seqn = urr_acc->report_seqn++; |
|
|
report->usage_report[idx].start_time = urr_acc->time_start; |
|
|
report->usage_report[idx].end_time = ogs_time_to_ntp32(now); |
|
|
report->usage_report[idx].vol_measurement = (ogs_pfcp_volume_measurement_t){ |
|
|
.dlnop = 1, |
|
|
.ulnop = 1, |
|
|
.tonop = 1, |
|
|
.dlvol = 1, |
|
|
.ulvol = 1, |
|
|
.tovol = 1, |
|
|
.total_volume = urr_acc->total_octets - urr_acc->last_report.total_octets, |
|
|
.uplink_volume = urr_acc->ul_octets - urr_acc->last_report.ul_octets, |
|
|
.downlink_volume = urr_acc->dl_octets - urr_acc->last_report.dl_octets, |
|
|
.total_n_packets = urr_acc->total_pkts - urr_acc->last_report.total_pkts, |
|
|
.uplink_n_packets = urr_acc->ul_pkts - urr_acc->last_report.ul_pkts, |
|
|
.downlink_n_packets = urr_acc->dl_pkts - urr_acc->last_report.dl_pkts, |
|
|
}; |
|
|
if (now >= last_report_timestamp) |
|
|
report->usage_report[idx].dur_measurement = ((now - last_report_timestamp) + (OGS_USEC_PER_SEC/2)) / OGS_USEC_PER_SEC; |
|
|
|
|
|
report->usage_report[idx].time_of_first_packet = ogs_time_to_ntp32(urr_acc->time_of_first_packet); |
|
|
report->usage_report[idx].time_of_last_packet = ogs_time_to_ntp32(urr_acc->time_of_last_packet); |
|
|
|
|
|
|
|
|
if (urr->quota_validity_time > 0 && |
|
|
report->usage_report[idx].dur_measurement >= urr->quota_validity_time) |
|
|
report->usage_report[idx].rep_trigger.quota_validity_time = 1; |
|
|
if (urr->time_quota > 0 && |
|
|
report->usage_report[idx].dur_measurement >= urr->time_quota) |
|
|
report->usage_report[idx].rep_trigger.time_quota = 1; |
|
|
if (urr->time_threshold > 0 && |
|
|
report->usage_report[idx].dur_measurement >= urr->time_threshold) |
|
|
report->usage_report[idx].rep_trigger.time_threshold = 1; |
|
|
|
|
|
|
|
|
if (urr->rep_triggers.volume_quota && urr->vol_quota.tovol && |
|
|
report->usage_report[idx].vol_measurement.total_volume >= urr->vol_quota.total_volume) |
|
|
report->usage_report[idx].rep_trigger.volume_quota = 1; |
|
|
if (urr->rep_triggers.volume_threshold && urr->vol_threshold.tovol && |
|
|
report->usage_report[idx].vol_measurement.total_volume >= urr->vol_threshold.total_volume) |
|
|
report->usage_report[idx].rep_trigger.volume_threshold = 1; |
|
|
} |
|
|
|
|
|
void upf_sess_urr_acc_snapshot(upf_sess_t *sess, ogs_pfcp_urr_t *urr) |
|
|
{ |
|
|
upf_sess_urr_acc_t *urr_acc = &sess->urr_acc[urr->id]; |
|
|
urr_acc->last_report.total_octets = urr_acc->total_octets; |
|
|
urr_acc->last_report.dl_octets = urr_acc->dl_octets; |
|
|
urr_acc->last_report.ul_octets = urr_acc->ul_octets; |
|
|
urr_acc->last_report.total_pkts = urr_acc->total_pkts; |
|
|
urr_acc->last_report.dl_pkts = urr_acc->dl_pkts; |
|
|
urr_acc->last_report.ul_pkts = urr_acc->ul_pkts; |
|
|
urr_acc->last_report.timestamp = ogs_time_now(); |
|
|
} |
|
|
|
|
|
static void upf_sess_urr_acc_timers_cb(void *data) |
|
|
{ |
|
|
ogs_pfcp_urr_t *urr = (ogs_pfcp_urr_t *)data; |
|
|
ogs_pfcp_user_plane_report_t report; |
|
|
ogs_pfcp_sess_t *pfcp_sess = urr->sess; |
|
|
upf_sess_t *sess = UPF_SESS(pfcp_sess); |
|
|
|
|
|
ogs_info("upf_time_threshold_cb() triggered! urr=%p", urr); |
|
|
|
|
|
if (urr->rep_triggers.quota_validity_time || |
|
|
urr->rep_triggers.time_quota || |
|
|
urr->rep_triggers.time_threshold) { |
|
|
memset(&report, 0, sizeof(report)); |
|
|
upf_sess_urr_acc_fill_usage_report(sess, urr, &report, 0); |
|
|
report.num_of_usage_report = 1; |
|
|
upf_sess_urr_acc_snapshot(sess, urr); |
|
|
|
|
|
ogs_assert(OGS_OK == |
|
|
upf_pfcp_send_session_report_request(sess, &report)); |
|
|
} |
|
|
|
|
|
upf_sess_urr_acc_timers_setup(sess, urr); |
|
|
} |
|
|
|
|
|
static void upf_sess_urr_acc_validity_time_setup(upf_sess_t *sess, ogs_pfcp_urr_t *urr) |
|
|
{ |
|
|
upf_sess_urr_acc_t *urr_acc = &sess->urr_acc[urr->id]; |
|
|
|
|
|
ogs_debug("Installing URR Quota Validity Time timer"); |
|
|
urr_acc->reporting_enabled = true; |
|
|
if (!urr_acc->t_validity_time) |
|
|
urr_acc->t_validity_time = ogs_timer_add(ogs_app()->timer_mgr, |
|
|
upf_sess_urr_acc_timers_cb, urr); |
|
|
ogs_timer_start(urr_acc->t_validity_time, |
|
|
ogs_time_from_sec(urr->quota_validity_time)); |
|
|
} |
|
|
|
|
|
static void upf_sess_urr_acc_time_quota_setup(upf_sess_t *sess, ogs_pfcp_urr_t *urr) |
|
|
{ |
|
|
upf_sess_urr_acc_t *urr_acc = &sess->urr_acc[urr->id]; |
|
|
|
|
|
ogs_debug("Installing URR Time Quota timer"); |
|
|
urr_acc->reporting_enabled = true; |
|
|
if (!urr_acc->t_time_quota) |
|
|
urr_acc->t_time_quota = ogs_timer_add(ogs_app()->timer_mgr, |
|
|
upf_sess_urr_acc_timers_cb, urr); |
|
|
ogs_timer_start(urr_acc->t_time_quota, ogs_time_from_sec(urr->time_quota)); |
|
|
} |
|
|
|
|
|
static void upf_sess_urr_acc_time_threshold_setup(upf_sess_t *sess, ogs_pfcp_urr_t *urr) |
|
|
{ |
|
|
upf_sess_urr_acc_t *urr_acc = &sess->urr_acc[urr->id]; |
|
|
|
|
|
ogs_debug("Installing URR Time Threshold timer"); |
|
|
urr_acc->reporting_enabled = true; |
|
|
if (!urr_acc->t_time_threshold) |
|
|
urr_acc->t_time_threshold = ogs_timer_add(ogs_app()->timer_mgr, |
|
|
upf_sess_urr_acc_timers_cb, urr); |
|
|
ogs_timer_start(urr_acc->t_time_threshold, |
|
|
ogs_time_from_sec(urr->time_threshold)); |
|
|
} |
|
|
|
|
|
void upf_sess_urr_acc_timers_setup(upf_sess_t *sess, ogs_pfcp_urr_t *urr) |
|
|
{ |
|
|
upf_sess_urr_acc_t *urr_acc = &sess->urr_acc[urr->id]; |
|
|
urr_acc->time_start = ogs_time_ntp32_now(); |
|
|
if (urr->rep_triggers.quota_validity_time && urr->quota_validity_time > 0) |
|
|
upf_sess_urr_acc_validity_time_setup(sess, urr); |
|
|
if (urr->rep_triggers.time_quota && urr->time_quota > 0) |
|
|
upf_sess_urr_acc_time_quota_setup(sess, urr); |
|
|
if (urr->rep_triggers.time_threshold && urr->time_threshold > 0) |
|
|
upf_sess_urr_acc_time_threshold_setup(sess, urr); |
|
|
} |
|
|
|
|
|
static void upf_sess_urr_acc_remove_all(upf_sess_t *sess) |
|
|
{ |
|
|
unsigned int i; |
|
|
for (i = 0; i < OGS_ARRAY_SIZE(sess->urr_acc); i++) { |
|
|
if (sess->urr_acc[i].t_time_threshold) { |
|
|
ogs_timer_delete(sess->urr_acc[i].t_time_threshold); |
|
|
sess->urr_acc[i].t_time_threshold = NULL; |
|
|
} |
|
|
if (sess->urr_acc[i].t_validity_time) { |
|
|
ogs_timer_delete(sess->urr_acc[i].t_validity_time); |
|
|
sess->urr_acc[i].t_validity_time = NULL; |
|
|
} |
|
|
if (sess->urr_acc[i].t_time_quota) { |
|
|
ogs_timer_delete(sess->urr_acc[i].t_time_quota); |
|
|
sess->urr_acc[i].t_time_quota = NULL; |
|
|
} |
|
|
} |
|
|
} |
|
|
|