|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "context.h" |
|
|
|
|
|
#if HAVE_NETINET_IP_H |
|
|
#include <netinet/ip.h> |
|
|
#endif |
|
|
|
|
|
#if HAVE_NETINET_IP6_H |
|
|
#include <netinet/ip6.h> |
|
|
#endif |
|
|
|
|
|
#if HAVE_NETINET_IP_ICMP_H |
|
|
#include <netinet/ip_icmp.h> |
|
|
#endif |
|
|
|
|
|
#if HAVE_NETINET_ICMP6_H |
|
|
#include <netinet/icmp6.h> |
|
|
#endif |
|
|
|
|
|
#if HAVE_SYS_IOCTL_H |
|
|
#include <sys/ioctl.h> |
|
|
#endif |
|
|
|
|
|
#if HAVE_NET_IF_DL_H |
|
|
#include <net/if_dl.h> |
|
|
#endif |
|
|
|
|
|
#if HAVE_IFADDRS_H |
|
|
#include <ifaddrs.h> |
|
|
#endif |
|
|
|
|
|
#include "arp-nd.h" |
|
|
#include "event.h" |
|
|
#include "gtp-path.h" |
|
|
#include "pfcp-path.h" |
|
|
#include "rule-match.h" |
|
|
|
|
|
#define UPF_GTP_HANDLED 1 |
|
|
|
|
|
const uint8_t proxy_mac_addr[] = { 0x0e, 0x00, 0x00, 0x00, 0x00, 0x01 }; |
|
|
|
|
|
static ogs_pkbuf_pool_t *packet_pool = NULL; |
|
|
|
|
|
static void upf_gtp_handle_multicast(ogs_pkbuf_t *recvbuf); |
|
|
|
|
|
static int check_framed_routes(upf_sess_t *sess, int family, uint32_t *addr) |
|
|
{ |
|
|
int i = 0; |
|
|
ogs_ipsubnet_t *routes = family == AF_INET ? |
|
|
sess->ipv4_framed_routes : sess->ipv6_framed_routes; |
|
|
|
|
|
if (!routes) |
|
|
return false; |
|
|
|
|
|
for (i = 0; i < OGS_MAX_NUM_OF_FRAMED_ROUTES_IN_PDI; i++) { |
|
|
uint32_t *sub = routes[i].sub; |
|
|
uint32_t *mask = routes[i].mask; |
|
|
|
|
|
if (!routes[i].family) |
|
|
break; |
|
|
|
|
|
if (family == AF_INET) { |
|
|
if (sub[0] == (addr[0] & mask[0])) |
|
|
return true; |
|
|
} else { |
|
|
if (sub[0] == (addr[0] & mask[0]) && |
|
|
sub[1] == (addr[1] & mask[1]) && |
|
|
sub[2] == (addr[2] & mask[2]) && |
|
|
sub[3] == (addr[3] & mask[3])) |
|
|
return true; |
|
|
} |
|
|
} |
|
|
return false; |
|
|
} |
|
|
|
|
|
static uint16_t _get_eth_type(uint8_t *data, uint len) { |
|
|
if (len > ETHER_HDR_LEN) { |
|
|
struct ether_header *hdr = (struct ether_header*)data; |
|
|
return htobe16(hdr->ether_type); |
|
|
} |
|
|
return 0; |
|
|
} |
|
|
|
|
|
static void _gtpv1_tun_recv_common_cb( |
|
|
short when, ogs_socket_t fd, bool has_eth, void *data) |
|
|
{ |
|
|
ogs_pkbuf_t *recvbuf = NULL; |
|
|
|
|
|
upf_sess_t *sess = NULL; |
|
|
ogs_pfcp_pdr_t *pdr = NULL; |
|
|
ogs_pfcp_pdr_t *fallback_pdr = NULL; |
|
|
ogs_pfcp_far_t *far = NULL; |
|
|
ogs_pfcp_user_plane_report_t report; |
|
|
int i; |
|
|
|
|
|
recvbuf = ogs_tun_read(fd, packet_pool); |
|
|
if (!recvbuf) { |
|
|
ogs_warn("ogs_tun_read() failed"); |
|
|
return; |
|
|
} |
|
|
|
|
|
if (has_eth) { |
|
|
ogs_pkbuf_t *replybuf = NULL; |
|
|
uint16_t eth_type = _get_eth_type(recvbuf->data, recvbuf->len); |
|
|
uint8_t size; |
|
|
|
|
|
if (eth_type == ETHERTYPE_ARP) { |
|
|
if (is_arp_req(recvbuf->data, recvbuf->len) && |
|
|
upf_sess_find_by_ipv4( |
|
|
arp_parse_target_addr(recvbuf->data, recvbuf->len))) { |
|
|
replybuf = ogs_pkbuf_alloc(packet_pool, OGS_MAX_PKT_LEN); |
|
|
ogs_assert(replybuf); |
|
|
ogs_pkbuf_reserve(replybuf, OGS_TUN_MAX_HEADROOM); |
|
|
ogs_pkbuf_put(replybuf, OGS_MAX_PKT_LEN-OGS_TUN_MAX_HEADROOM); |
|
|
size = arp_reply(replybuf->data, recvbuf->data, recvbuf->len, |
|
|
proxy_mac_addr); |
|
|
ogs_pkbuf_trim(replybuf, size); |
|
|
ogs_info("[SEND] reply to ARP request: %u", size); |
|
|
} else { |
|
|
goto cleanup; |
|
|
} |
|
|
} else if (eth_type == ETHERTYPE_IPV6 && |
|
|
is_nd_req(recvbuf->data, recvbuf->len)) { |
|
|
replybuf = ogs_pkbuf_alloc(packet_pool, OGS_MAX_PKT_LEN); |
|
|
ogs_assert(replybuf); |
|
|
ogs_pkbuf_reserve(replybuf, OGS_TUN_MAX_HEADROOM); |
|
|
ogs_pkbuf_put(replybuf, OGS_MAX_PKT_LEN-OGS_TUN_MAX_HEADROOM); |
|
|
size = nd_reply(replybuf->data, recvbuf->data, recvbuf->len, |
|
|
proxy_mac_addr); |
|
|
ogs_pkbuf_trim(replybuf, size); |
|
|
ogs_info("[SEND] reply to ND solicit: %u", size); |
|
|
} |
|
|
if (replybuf) { |
|
|
if (ogs_tun_write(fd, replybuf) != OGS_OK) |
|
|
ogs_warn("ogs_tun_write() for reply failed"); |
|
|
|
|
|
ogs_pkbuf_free(replybuf); |
|
|
goto cleanup; |
|
|
} |
|
|
if (eth_type != ETHERTYPE_IP && eth_type != ETHERTYPE_IPV6) { |
|
|
ogs_error("[DROP] Invalid eth_type [%x]]", eth_type); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, recvbuf->data, recvbuf->len); |
|
|
goto cleanup; |
|
|
} |
|
|
ogs_pkbuf_pull(recvbuf, ETHER_HDR_LEN); |
|
|
} |
|
|
|
|
|
sess = upf_sess_find_by_ue_ip_address(recvbuf); |
|
|
if (!sess) |
|
|
goto cleanup; |
|
|
|
|
|
ogs_list_for_each(&sess->pfcp.pdr_list, pdr) { |
|
|
far = pdr->far; |
|
|
ogs_assert(far); |
|
|
|
|
|
|
|
|
if (pdr->src_if != OGS_PFCP_INTERFACE_CORE) |
|
|
continue; |
|
|
|
|
|
|
|
|
fallback_pdr = pdr; |
|
|
|
|
|
|
|
|
if (far->dst_if != OGS_PFCP_INTERFACE_ACCESS) |
|
|
continue; |
|
|
|
|
|
|
|
|
if (far->outer_header_creation.ip4 == 0 && |
|
|
far->outer_header_creation.ip6 == 0 && |
|
|
far->outer_header_creation.udp4 == 0 && |
|
|
far->outer_header_creation.udp6 == 0 && |
|
|
far->outer_header_creation.gtpu4 == 0 && |
|
|
far->outer_header_creation.gtpu6 == 0) |
|
|
continue; |
|
|
|
|
|
|
|
|
if (ogs_list_first(&pdr->rule_list) && |
|
|
ogs_pfcp_pdr_rule_find_by_packet(pdr, recvbuf) == NULL) |
|
|
continue; |
|
|
|
|
|
break; |
|
|
} |
|
|
|
|
|
if (!pdr) |
|
|
pdr = fallback_pdr; |
|
|
|
|
|
if (!pdr) { |
|
|
if (ogs_global_conf()->parameter.multicast) { |
|
|
upf_gtp_handle_multicast(recvbuf); |
|
|
} |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
|
|
|
for (i = 0; i < pdr->num_of_urr; i++) |
|
|
upf_sess_urr_acc_add(sess, pdr->urr[i], recvbuf->len, false); |
|
|
|
|
|
ogs_assert(true == ogs_pfcp_up_handle_pdr( |
|
|
pdr, OGS_GTPU_MSGTYPE_GPDU, NULL, recvbuf, &report)); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#if 0 |
|
|
upf_metrics_inst_global_inc(UPF_METR_GLOB_CTR_GTP_OUTDATAPKTN3UPF); |
|
|
upf_metrics_inst_by_qfi_add(pdr->qer->qfi, |
|
|
UPF_METR_CTR_GTP_OUTDATAVOLUMEQOSLEVELN3UPF, recvbuf->len); |
|
|
#endif |
|
|
|
|
|
if (report.type.downlink_data_report) { |
|
|
ogs_assert(pdr->sess); |
|
|
sess = UPF_SESS(pdr->sess); |
|
|
ogs_assert(sess); |
|
|
|
|
|
report.downlink_data.pdr_id = pdr->id; |
|
|
if (pdr->qer && pdr->qer->qfi) |
|
|
report.downlink_data.qfi = pdr->qer->qfi; |
|
|
|
|
|
ogs_assert(OGS_OK == |
|
|
upf_pfcp_send_session_report_request(sess, &report)); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
return; |
|
|
|
|
|
cleanup: |
|
|
ogs_pkbuf_free(recvbuf); |
|
|
} |
|
|
|
|
|
static void _gtpv1_tun_recv_cb(short when, ogs_socket_t fd, void *data) |
|
|
{ |
|
|
_gtpv1_tun_recv_common_cb(when, fd, false, data); |
|
|
} |
|
|
|
|
|
static void _gtpv1_tun_recv_eth_cb(short when, ogs_socket_t fd, void *data) |
|
|
{ |
|
|
_gtpv1_tun_recv_common_cb(when, fd, true, data); |
|
|
} |
|
|
|
|
|
static void _gtpv1_u_recv_cb(short when, ogs_socket_t fd, void *data) |
|
|
{ |
|
|
int len; |
|
|
ssize_t size; |
|
|
char buf1[OGS_ADDRSTRLEN]; |
|
|
char buf2[OGS_ADDRSTRLEN]; |
|
|
|
|
|
upf_sess_t *sess = NULL; |
|
|
|
|
|
ogs_pkbuf_t *pkbuf = NULL; |
|
|
ogs_sock_t *sock = NULL; |
|
|
ogs_sockaddr_t from; |
|
|
|
|
|
ogs_gtp2_header_t *gtp_h = NULL; |
|
|
ogs_gtp2_header_desc_t header_desc; |
|
|
ogs_pfcp_user_plane_report_t report; |
|
|
|
|
|
ogs_assert(fd != INVALID_SOCKET); |
|
|
sock = data; |
|
|
ogs_assert(sock); |
|
|
|
|
|
pkbuf = ogs_pkbuf_alloc(packet_pool, OGS_MAX_PKT_LEN); |
|
|
ogs_assert(pkbuf); |
|
|
ogs_pkbuf_reserve(pkbuf, OGS_TUN_MAX_HEADROOM); |
|
|
ogs_pkbuf_put(pkbuf, OGS_MAX_PKT_LEN-OGS_TUN_MAX_HEADROOM); |
|
|
|
|
|
size = ogs_recvfrom(fd, pkbuf->data, pkbuf->len, 0, &from); |
|
|
if (size <= 0) { |
|
|
ogs_log_message(OGS_LOG_ERROR, ogs_socket_errno, |
|
|
"ogs_recv() failed"); |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
ogs_pkbuf_trim(pkbuf, size); |
|
|
|
|
|
ogs_assert(pkbuf); |
|
|
ogs_assert(pkbuf->len); |
|
|
|
|
|
gtp_h = (ogs_gtp2_header_t *)pkbuf->data; |
|
|
if (gtp_h->version != OGS_GTP2_VERSION_1) { |
|
|
ogs_error("[DROP] Invalid GTPU version [%d]", gtp_h->version); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
len = ogs_gtpu_parse_header(&header_desc, pkbuf); |
|
|
if (len < 0) { |
|
|
ogs_error("[DROP] Cannot decode GTPU packet"); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
goto cleanup; |
|
|
} |
|
|
if (header_desc.type == OGS_GTPU_MSGTYPE_ECHO_REQ) { |
|
|
ogs_pkbuf_t *echo_rsp; |
|
|
|
|
|
ogs_debug("[RECV] Echo Request from [%s]", OGS_ADDR(&from, buf1)); |
|
|
echo_rsp = ogs_gtp2_handle_echo_req(pkbuf); |
|
|
ogs_expect(echo_rsp); |
|
|
if (echo_rsp) { |
|
|
ssize_t sent; |
|
|
|
|
|
|
|
|
ogs_debug("[SEND] Echo Response to [%s]", OGS_ADDR(&from, buf1)); |
|
|
|
|
|
sent = ogs_sendto(fd, echo_rsp->data, echo_rsp->len, 0, &from); |
|
|
if (sent < 0 || sent != echo_rsp->len) { |
|
|
ogs_log_message(OGS_LOG_ERROR, ogs_socket_errno, |
|
|
"ogs_sendto() failed"); |
|
|
} |
|
|
ogs_pkbuf_free(echo_rsp); |
|
|
} |
|
|
goto cleanup; |
|
|
} |
|
|
if (header_desc.type != OGS_GTPU_MSGTYPE_END_MARKER && |
|
|
pkbuf->len <= len) { |
|
|
ogs_error("[DROP] Small GTPU packet(type:%d len:%d)", |
|
|
header_desc.type, len); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
ogs_trace("[RECV] GPU-U Type [%d] from [%s] : TEID[0x%x]", |
|
|
header_desc.type, OGS_ADDR(&from, buf1), header_desc.teid); |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_pull(pkbuf, len)); |
|
|
|
|
|
if (header_desc.type == OGS_GTPU_MSGTYPE_END_MARKER) { |
|
|
|
|
|
|
|
|
} else if (header_desc.type == OGS_GTPU_MSGTYPE_ERR_IND) { |
|
|
ogs_pfcp_far_t *far = NULL; |
|
|
|
|
|
far = ogs_pfcp_far_find_by_gtpu_error_indication(pkbuf); |
|
|
if (far) { |
|
|
ogs_assert(true == |
|
|
ogs_pfcp_up_handle_error_indication(far, &report)); |
|
|
|
|
|
if (report.type.error_indication_report) { |
|
|
ogs_assert(far->sess); |
|
|
sess = UPF_SESS(far->sess); |
|
|
ogs_assert(sess); |
|
|
|
|
|
ogs_assert(OGS_OK == |
|
|
upf_pfcp_send_session_report_request(sess, &report)); |
|
|
} |
|
|
|
|
|
} else { |
|
|
ogs_error("[DROP] Cannot find FAR by Error-Indication"); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
} |
|
|
} else if (header_desc.type == OGS_GTPU_MSGTYPE_GPDU) { |
|
|
uint16_t eth_type = 0; |
|
|
struct ip *ip_h = NULL; |
|
|
uint32_t *src_addr = NULL; |
|
|
ogs_pfcp_object_t *pfcp_object = NULL; |
|
|
ogs_pfcp_sess_t *pfcp_sess = NULL; |
|
|
ogs_pfcp_pdr_t *pdr = NULL; |
|
|
ogs_pfcp_far_t *far = NULL; |
|
|
|
|
|
ogs_pfcp_subnet_t *subnet = NULL; |
|
|
ogs_pfcp_dev_t *dev = NULL; |
|
|
int i; |
|
|
|
|
|
ip_h = (struct ip *)pkbuf->data; |
|
|
ogs_assert(ip_h); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#if 0 |
|
|
upf_metrics_inst_global_inc(UPF_METR_GLOB_CTR_GTP_INDATAPKTN3UPF); |
|
|
upf_metrics_inst_by_qfi_add(header_desc.qos_flow_identifier, |
|
|
UPF_METR_CTR_GTP_INDATAVOLUMEQOSLEVELN3UPF, pkbuf->len); |
|
|
#endif |
|
|
|
|
|
pfcp_object = ogs_pfcp_object_find_by_teid(header_desc.teid); |
|
|
if (!pfcp_object) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (ogs_time_ntp32_now() > |
|
|
(ogs_pfcp_self()->local_recovery + |
|
|
ogs_time_sec(ogs_local_conf()->time.message.pfcp. |
|
|
association_interval))) { |
|
|
ogs_error("[%s] Send Error Indication [TEID:0x%x] to [%s]", |
|
|
OGS_ADDR(&sock->local_addr, buf1), |
|
|
header_desc.teid, |
|
|
OGS_ADDR(&from, buf2)); |
|
|
ogs_gtp1_send_error_indication( |
|
|
sock, header_desc.teid, |
|
|
header_desc.qos_flow_identifier, &from); |
|
|
} |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
switch(pfcp_object->type) { |
|
|
case OGS_PFCP_OBJ_PDR_TYPE: |
|
|
|
|
|
ogs_assert_if_reached(); |
|
|
pdr = (ogs_pfcp_pdr_t *)pfcp_object; |
|
|
ogs_assert(pdr); |
|
|
break; |
|
|
case OGS_PFCP_OBJ_SESS_TYPE: |
|
|
pfcp_sess = (ogs_pfcp_sess_t *)pfcp_object; |
|
|
ogs_assert(pfcp_sess); |
|
|
|
|
|
ogs_list_for_each(&pfcp_sess->pdr_list, pdr) { |
|
|
|
|
|
|
|
|
if (pdr->src_if != OGS_PFCP_INTERFACE_ACCESS && |
|
|
pdr->src_if != OGS_PFCP_INTERFACE_CP_FUNCTION) |
|
|
continue; |
|
|
|
|
|
|
|
|
if (header_desc.teid != pdr->f_teid.teid) |
|
|
continue; |
|
|
|
|
|
|
|
|
if (header_desc.qos_flow_identifier && |
|
|
pdr->qfi != header_desc.qos_flow_identifier) |
|
|
continue; |
|
|
|
|
|
|
|
|
if (ogs_list_first(&pdr->rule_list) && |
|
|
ogs_pfcp_pdr_rule_find_by_packet(pdr, pkbuf) == NULL) |
|
|
continue; |
|
|
|
|
|
break; |
|
|
} |
|
|
|
|
|
if (!pdr) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (ogs_time_ntp32_now() > |
|
|
(ogs_pfcp_self()->local_recovery + |
|
|
ogs_time_sec(ogs_local_conf()->time.message.pfcp. |
|
|
association_interval))) { |
|
|
ogs_error( |
|
|
"[%s] Send Error Indication [TEID:0x%x] to [%s]", |
|
|
OGS_ADDR(&sock->local_addr, buf1), |
|
|
header_desc.teid, |
|
|
OGS_ADDR(&from, buf2)); |
|
|
ogs_gtp1_send_error_indication( |
|
|
sock, header_desc.teid, |
|
|
header_desc.qos_flow_identifier, &from); |
|
|
} |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
break; |
|
|
default: |
|
|
ogs_fatal("Unknown type [%d]", pfcp_object->type); |
|
|
ogs_assert_if_reached(); |
|
|
} |
|
|
|
|
|
ogs_assert(pdr); |
|
|
ogs_assert(pdr->sess); |
|
|
ogs_assert(pdr->sess->obj.type == OGS_PFCP_OBJ_SESS_TYPE); |
|
|
|
|
|
sess = UPF_SESS(pdr->sess); |
|
|
ogs_assert(sess); |
|
|
|
|
|
far = pdr->far; |
|
|
ogs_assert(far); |
|
|
|
|
|
if (ip_h->ip_v == 4 && sess->ipv4) { |
|
|
src_addr = (void *)&ip_h->ip_src.s_addr; |
|
|
ogs_assert(src_addr); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (far->dst_if != OGS_PFCP_INTERFACE_ACCESS) { |
|
|
|
|
|
if (src_addr[0] == sess->ipv4->addr[0]) { |
|
|
|
|
|
} else if (check_framed_routes(sess, AF_INET, src_addr)) { |
|
|
|
|
|
} else { |
|
|
ogs_error("[DROP] Source IP-%d Spoofing APN:%s SrcIf:%d DstIf:%d TEID:0x%x", |
|
|
ip_h->ip_v, pdr->dnn, pdr->src_if, far->dst_if, header_desc.teid); |
|
|
ogs_error(" SRC:%08X, UE:%08X", |
|
|
be32toh(src_addr[0]), be32toh(sess->ipv4->addr[0])); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
|
|
|
goto cleanup; |
|
|
} |
|
|
} |
|
|
|
|
|
subnet = sess->ipv4->subnet; |
|
|
eth_type = ETHERTYPE_IP; |
|
|
|
|
|
} else if (ip_h->ip_v == 6 && sess->ipv6) { |
|
|
struct ip6_hdr *ip6_h = (struct ip6_hdr *)pkbuf->data; |
|
|
ogs_assert(ip6_h); |
|
|
src_addr = (void *)ip6_h->ip6_src.s6_addr; |
|
|
ogs_assert(src_addr); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (far->dst_if != OGS_PFCP_INTERFACE_ACCESS) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (IN6_IS_ADDR_LINKLOCAL((struct in6_addr *)src_addr) && |
|
|
src_addr[2] == sess->ipv6->addr[2] && |
|
|
src_addr[3] == sess->ipv6->addr[3]) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
} else if (src_addr[0] == sess->ipv6->addr[0] && |
|
|
src_addr[1] == sess->ipv6->addr[1]) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
} else if (check_framed_routes(sess, AF_INET6, src_addr)) { |
|
|
|
|
|
} else { |
|
|
ogs_error("[DROP] Source IP-%d Spoofing APN:%s SrcIf:%d DstIf:%d TEID:0x%x", |
|
|
ip_h->ip_v, pdr->dnn, pdr->src_if, far->dst_if, header_desc.teid); |
|
|
ogs_error("SRC:%08x %08x %08x %08x", |
|
|
be32toh(src_addr[0]), be32toh(src_addr[1]), |
|
|
be32toh(src_addr[2]), be32toh(src_addr[3])); |
|
|
ogs_error("UE:%08x %08x %08x %08x", |
|
|
be32toh(sess->ipv6->addr[0]), |
|
|
be32toh(sess->ipv6->addr[1]), |
|
|
be32toh(sess->ipv6->addr[2]), |
|
|
be32toh(sess->ipv6->addr[3])); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
|
|
|
goto cleanup; |
|
|
} |
|
|
} |
|
|
|
|
|
subnet = sess->ipv6->subnet; |
|
|
eth_type = ETHERTYPE_IPV6; |
|
|
|
|
|
} else { |
|
|
ogs_error("Invalid packet [IP version:%d, Packet Length:%d]", |
|
|
ip_h->ip_v, pkbuf->len); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
if (far->dst_if == OGS_PFCP_INTERFACE_CORE) { |
|
|
|
|
|
if (!subnet) { |
|
|
#if 0 |
|
|
ogs_error("[DROP] Cannot find subnet V:%d, IPv4:%p, IPv6:%p", |
|
|
ip_h->ip_v, sess->ipv4, sess->ipv6); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
#endif |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
dev = subnet->dev; |
|
|
ogs_assert(dev); |
|
|
|
|
|
|
|
|
for (i = 0; i < pdr->num_of_urr; i++) |
|
|
upf_sess_urr_acc_add(sess, pdr->urr[i], pkbuf->len, true); |
|
|
|
|
|
if (dev->is_tap) { |
|
|
ogs_assert(eth_type); |
|
|
eth_type = htobe16(eth_type); |
|
|
ogs_pkbuf_push(pkbuf, sizeof(eth_type)); |
|
|
memcpy(pkbuf->data, ð_type, sizeof(eth_type)); |
|
|
ogs_pkbuf_push(pkbuf, ETHER_ADDR_LEN); |
|
|
memcpy(pkbuf->data, proxy_mac_addr, ETHER_ADDR_LEN); |
|
|
ogs_pkbuf_push(pkbuf, ETHER_ADDR_LEN); |
|
|
memcpy(pkbuf->data, dev->mac_addr, ETHER_ADDR_LEN); |
|
|
} |
|
|
|
|
|
|
|
|
if (ogs_tun_write(dev->fd, pkbuf) != OGS_OK) |
|
|
ogs_warn("ogs_tun_write() failed"); |
|
|
|
|
|
} else if (far->dst_if == OGS_PFCP_INTERFACE_ACCESS) { |
|
|
ogs_assert(true == ogs_pfcp_up_handle_pdr( |
|
|
pdr, header_desc.type, &header_desc, pkbuf, &report)); |
|
|
|
|
|
if (report.type.downlink_data_report) { |
|
|
ogs_error("Indirect Data Fowarding Buffered"); |
|
|
|
|
|
report.downlink_data.pdr_id = pdr->id; |
|
|
if (pdr->qer && pdr->qer->qfi) |
|
|
report.downlink_data.qfi = pdr->qer->qfi; |
|
|
|
|
|
ogs_assert(OGS_OK == |
|
|
upf_pfcp_send_session_report_request(sess, &report)); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
return; |
|
|
|
|
|
} else if (far->dst_if == OGS_PFCP_INTERFACE_CP_FUNCTION) { |
|
|
|
|
|
if (!far->gnode) { |
|
|
ogs_error("No Outer Header Creation in FAR"); |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
if ((far->apply_action & OGS_PFCP_APPLY_ACTION_FORW) == 0) { |
|
|
ogs_error("Not supported Apply Action [0x%x]", |
|
|
far->apply_action); |
|
|
goto cleanup; |
|
|
} |
|
|
|
|
|
ogs_assert(true == ogs_pfcp_up_handle_pdr( |
|
|
pdr, header_desc.type, &header_desc, pkbuf, &report)); |
|
|
|
|
|
ogs_assert(report.type.downlink_data_report == 0); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
return; |
|
|
|
|
|
} else { |
|
|
ogs_fatal("Not implemented : FAR-DST_IF[%d]", far->dst_if); |
|
|
ogs_assert_if_reached(); |
|
|
} |
|
|
} else { |
|
|
ogs_error("[DROP] Invalid GTPU Type [%d]", header_desc.type); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, pkbuf->data, pkbuf->len); |
|
|
} |
|
|
|
|
|
cleanup: |
|
|
ogs_pkbuf_free(pkbuf); |
|
|
} |
|
|
|
|
|
int upf_gtp_init(void) |
|
|
{ |
|
|
ogs_pkbuf_config_t config; |
|
|
memset(&config, 0, sizeof config); |
|
|
|
|
|
config.cluster_2048_pool = ogs_app()->pool.packet; |
|
|
|
|
|
#if OGS_USE_TALLOC == 1 |
|
|
|
|
|
|
|
|
packet_pool = talloc_pool(__ogs_talloc_core, 1000*1024); |
|
|
ogs_assert(packet_pool); |
|
|
#else |
|
|
packet_pool = ogs_pkbuf_pool_create(&config); |
|
|
#endif |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
void upf_gtp_final(void) |
|
|
{ |
|
|
ogs_pkbuf_pool_destroy(packet_pool); |
|
|
} |
|
|
|
|
|
static void _get_dev_mac_addr(char *ifname, uint8_t *mac_addr) |
|
|
{ |
|
|
#ifdef SIOCGIFHWADDR |
|
|
int fd = socket(PF_INET, SOCK_DGRAM, 0); |
|
|
ogs_assert(fd); |
|
|
struct ifreq req; |
|
|
memset(&req, 0, sizeof(req)); |
|
|
ogs_cpystrn(req.ifr_name, ifname, IF_NAMESIZE-1); |
|
|
ogs_assert(ioctl(fd, SIOCGIFHWADDR, &req) == 0); |
|
|
memcpy(mac_addr, req.ifr_hwaddr.sa_data, ETHER_ADDR_LEN); |
|
|
#else |
|
|
struct ifaddrs *ifap; |
|
|
ogs_assert(getifaddrs(&ifap) == 0); |
|
|
struct ifaddrs *p; |
|
|
for (p = ifap; p; p = p->ifa_next) { |
|
|
if (strncmp(ifname, p->ifa_name, IF_NAMESIZE-1) == 0) { |
|
|
struct sockaddr_dl* sdp = (struct sockaddr_dl*) p->ifa_addr; |
|
|
memcpy(mac_addr, sdp->sdl_data + sdp->sdl_nlen, ETHER_ADDR_LEN); |
|
|
freeifaddrs(ifap); |
|
|
return; |
|
|
} |
|
|
} |
|
|
ogs_assert(0); |
|
|
#endif |
|
|
} |
|
|
|
|
|
int upf_gtp_open(void) |
|
|
{ |
|
|
ogs_pfcp_dev_t *dev = NULL; |
|
|
ogs_pfcp_subnet_t *subnet = NULL; |
|
|
ogs_socknode_t *node = NULL; |
|
|
ogs_sock_t *sock = NULL; |
|
|
int rc; |
|
|
|
|
|
ogs_list_for_each(&ogs_gtp_self()->gtpu_list, node) { |
|
|
sock = ogs_gtp_server(node); |
|
|
if (!sock) return OGS_ERROR; |
|
|
|
|
|
if (sock->family == AF_INET) |
|
|
ogs_gtp_self()->gtpu_sock = sock; |
|
|
else if (sock->family == AF_INET6) |
|
|
ogs_gtp_self()->gtpu_sock6 = sock; |
|
|
|
|
|
node->poll = ogs_pollset_add(ogs_app()->pollset, |
|
|
OGS_POLLIN, sock->fd, _gtpv1_u_recv_cb, sock); |
|
|
ogs_assert(node->poll); |
|
|
} |
|
|
|
|
|
OGS_SETUP_GTPU_SERVER; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ogs_list_for_each(&ogs_pfcp_self()->dev_list, dev) { |
|
|
dev->is_tap = strstr(dev->ifname, "tap"); |
|
|
dev->fd = ogs_tun_open(dev->ifname, OGS_MAX_IFNAME_LEN, dev->is_tap); |
|
|
if (dev->fd == INVALID_SOCKET) { |
|
|
ogs_error("tun_open(dev:%s) failed", dev->ifname); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
if (dev->is_tap) { |
|
|
_get_dev_mac_addr(dev->ifname, dev->mac_addr); |
|
|
dev->poll = ogs_pollset_add(ogs_app()->pollset, |
|
|
OGS_POLLIN, dev->fd, _gtpv1_tun_recv_eth_cb, NULL); |
|
|
ogs_assert(dev->poll); |
|
|
} else { |
|
|
dev->poll = ogs_pollset_add(ogs_app()->pollset, |
|
|
OGS_POLLIN, dev->fd, _gtpv1_tun_recv_cb, NULL); |
|
|
ogs_assert(dev->poll); |
|
|
} |
|
|
|
|
|
ogs_assert(dev->poll); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ogs_list_for_each(&ogs_pfcp_self()->subnet_list, subnet) { |
|
|
ogs_assert(subnet->dev); |
|
|
rc = ogs_tun_set_ip(subnet->dev->ifname, &subnet->gw, &subnet->sub); |
|
|
if (rc != OGS_OK) { |
|
|
ogs_error("ogs_tun_set_ip(dev:%s) failed", subnet->dev->ifname); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
} |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
void upf_gtp_close(void) |
|
|
{ |
|
|
ogs_pfcp_dev_t *dev = NULL; |
|
|
|
|
|
ogs_socknode_remove_all(&ogs_gtp_self()->gtpu_list); |
|
|
|
|
|
ogs_list_for_each(&ogs_pfcp_self()->dev_list, dev) { |
|
|
if (dev->poll) |
|
|
ogs_pollset_remove(dev->poll); |
|
|
ogs_closesocket(dev->fd); |
|
|
} |
|
|
} |
|
|
|
|
|
static void upf_gtp_handle_multicast(ogs_pkbuf_t *recvbuf) |
|
|
{ |
|
|
struct ip *ip_h = NULL; |
|
|
struct ip6_hdr *ip6_h = NULL; |
|
|
ogs_pfcp_user_plane_report_t report; |
|
|
|
|
|
ip_h = (struct ip *)recvbuf->data; |
|
|
if (ip_h->ip_v == 6) { |
|
|
#if COMPILE_ERROR_IN_MAC_OS_X |
|
|
ip6_h = (struct ip6_hdr *)recvbuf->data; |
|
|
if (IN6_IS_ADDR_MULTICAST(&ip6_h->ip6_dst)) |
|
|
#else |
|
|
struct in6_addr ip6_dst; |
|
|
ip6_h = (struct ip6_hdr *)recvbuf->data; |
|
|
memcpy(&ip6_dst, &ip6_h->ip6_dst, sizeof(struct in6_addr)); |
|
|
if (IN6_IS_ADDR_MULTICAST(&ip6_dst)) |
|
|
#endif |
|
|
{ |
|
|
upf_sess_t *sess = NULL; |
|
|
|
|
|
|
|
|
ogs_list_for_each(&upf_self()->sess_list, sess) { |
|
|
if (sess->ipv6) { |
|
|
|
|
|
ogs_pfcp_pdr_t *pdr = NULL; |
|
|
|
|
|
ogs_list_for_each(&sess->pfcp.pdr_list, pdr) { |
|
|
if (pdr->src_if == OGS_PFCP_INTERFACE_CORE) { |
|
|
ogs_pkbuf_t *sendbuf = ogs_pkbuf_copy(recvbuf); |
|
|
ogs_assert(sendbuf); |
|
|
ogs_assert(true == |
|
|
ogs_pfcp_up_handle_pdr( |
|
|
pdr, OGS_GTPU_MSGTYPE_GPDU, |
|
|
NULL, sendbuf, &report)); |
|
|
break; |
|
|
} |
|
|
} |
|
|
|
|
|
return; |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
|