blob: 2367338a48ebb86acde09e8654315ab64e12b673 [file] [log] [blame]
Harald Welte9b455bf2010-03-14 15:45:01 +08001/* GSM Mobile Radio Interface Layer 3 messages on the A-bis interface
2 * 3GPP TS 04.08 version 7.21.0 Release 1998 / ETSI TS 100 940 V7.21.0 */
3
Harald Welteeb98c742015-08-16 17:11:32 +02004/* (C) 2009-2015 by Harald Welte <laforge@gnumonks.org>
Harald Weltec2e8cc42010-05-31 20:23:38 +02005 * (C) 2010 by On-Waves
Harald Welte9b455bf2010-03-14 15:45:01 +08006 *
7 * All Rights Reserved
8 *
9 * This program is free software; you can redistribute it and/or modify
Harald Welte9af6ddf2011-01-01 15:25:50 +010010 * it under the terms of the GNU Affero General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
Harald Welte9b455bf2010-03-14 15:45:01 +080012 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
Harald Welte9af6ddf2011-01-01 15:25:50 +010017 * GNU Affero General Public License for more details.
Harald Welte9b455bf2010-03-14 15:45:01 +080018 *
Harald Welte9af6ddf2011-01-01 15:25:50 +010019 * You should have received a copy of the GNU Affero General Public License
20 * along with this program. If not, see <http://www.gnu.org/licenses/>.
Harald Welte9b455bf2010-03-14 15:45:01 +080021 *
22 */
23
24#include <stdio.h>
25#include <stdlib.h>
26#include <string.h>
Harald Welteeaa614c2010-05-02 11:26:34 +020027#include <stdint.h>
Harald Welte9b455bf2010-03-14 15:45:01 +080028#include <errno.h>
Max82040102016-07-06 11:59:18 +020029#include <stdbool.h>
Harald Welte9b455bf2010-03-14 15:45:01 +080030#include <netinet/in.h>
Harald Welte421cba42010-05-02 23:11:50 +020031#include <arpa/inet.h>
Harald Welte9b455bf2010-03-14 15:45:01 +080032
Daniel Willmann6292c8d2016-05-21 17:35:57 +020033#include "bscconfig.h"
34
Pablo Neira Ayuso136f4532011-03-22 16:47:59 +010035#include <osmocom/core/msgb.h>
Harald Welted36ff762011-03-23 18:26:56 +010036#include <osmocom/gsm/tlv.h>
37#include <osmocom/gsm/gsm_utils.h>
Pablo Neira Ayuso136f4532011-03-22 16:47:59 +010038#include <osmocom/core/signal.h>
39#include <osmocom/core/talloc.h>
40#include <osmocom/core/rate_ctr.h>
Neels Hofmeyr93bafb62017-01-13 03:12:08 +010041#include <osmocom/core/utils.h>
Pau Espin Pedrola299d652019-08-14 19:11:10 +020042#include <osmocom/core/tdef.h>
Daniel Willmann770f3e32016-05-21 00:31:12 +020043#include <osmocom/crypt/auth.h>
Harald Welte53373bc2016-04-20 17:11:43 +020044#include <osmocom/gsm/protocol/gsm_04_08_gprs.h>
Harald Welted6057092010-05-02 12:57:45 +020045
Harald Welteea34a4e2012-06-16 14:59:56 +080046#include <osmocom/gprs/gprs_bssgp.h>
47
Neels Hofmeyr396f2e62017-09-04 15:13:25 +020048#include <osmocom/sgsn/debug.h>
49#include <osmocom/sgsn/gprs_llc.h>
50#include <osmocom/sgsn/gprs_sgsn.h>
51#include <osmocom/sgsn/gprs_gmm.h>
52#include <osmocom/sgsn/gprs_utils.h>
53#include <osmocom/sgsn/gprs_subscriber.h>
54#include <osmocom/sgsn/sgsn.h>
Alexander Couzensf7198d72018-05-22 18:29:14 +020055#include <osmocom/sgsn/gprs_gmm_attach.h>
Pau Espin Pedrol02514bc2019-08-30 16:14:22 +020056#include <osmocom/sgsn/gprs_mm_state_gb_fsm.h>
Pau Espin Pedrolccd12522019-08-30 17:06:36 +020057#include <osmocom/sgsn/gprs_mm_state_iu_fsm.h>
Pau Espin Pedrol31c46572019-09-02 16:45:27 +020058#include <osmocom/sgsn/gprs_gmm_fsm.h>
Neels Hofmeyr396f2e62017-09-04 15:13:25 +020059#include <osmocom/sgsn/signal.h>
60#include <osmocom/sgsn/gprs_sndcp.h>
Pau Espin Pedrol6dfb5fe2019-08-29 17:21:00 +020061#include <osmocom/sgsn/gprs_ranap.h>
Daniel Willmann6292c8d2016-05-21 17:35:57 +020062
Harald Welte6abf94e2010-05-18 10:35:06 +020063#include <pdp.h>
64
Harald Weltec2e8cc42010-05-31 20:23:38 +020065#define PTMSI_ALLOC
66
Harald Welted193cb32010-05-17 22:58:03 +020067extern struct sgsn_instance *sgsn;
Pau Espin Pedrolb1d1c242018-10-30 17:27:59 +010068extern void *tall_sgsn_ctx;
Harald Welte9b455bf2010-03-14 15:45:01 +080069
Harald Welte588d44e2010-06-09 10:28:29 +020070static const struct tlv_definition gsm48_gmm_att_tlvdef = {
71 .def = {
Harald Welte4b6ac1e2010-07-03 11:09:06 +020072 [GSM48_IE_GMM_CIPH_CKSN] = { TLV_TYPE_FIXED, 1 },
Harald Welte588d44e2010-06-09 10:28:29 +020073 [GSM48_IE_GMM_TIMER_READY] = { TLV_TYPE_TV, 1 },
74 [GSM48_IE_GMM_ALLOC_PTMSI] = { TLV_TYPE_TLV, 0 },
Harald Welte4b6ac1e2010-07-03 11:09:06 +020075 [GSM48_IE_GMM_PTMSI_SIG] = { TLV_TYPE_FIXED, 3 },
76 [GSM48_IE_GMM_AUTH_RAND] = { TLV_TYPE_FIXED, 16 },
77 [GSM48_IE_GMM_AUTH_SRES] = { TLV_TYPE_FIXED, 4 },
Neels Hofmeyr058cd572017-02-24 06:24:45 +010078 [GSM48_IE_GMM_AUTH_RES_EXT] = { TLV_TYPE_TLV, 0 },
79 [GSM48_IE_GMM_AUTH_FAIL_PAR] = { TLV_TYPE_TLV, 0 },
Harald Welte588d44e2010-06-09 10:28:29 +020080 [GSM48_IE_GMM_IMEISV] = { TLV_TYPE_TLV, 0 },
Harald Welte4b6ac1e2010-07-03 11:09:06 +020081 [GSM48_IE_GMM_DRX_PARAM] = { TLV_TYPE_FIXED, 2 },
Harald Welte588d44e2010-06-09 10:28:29 +020082 [GSM48_IE_GMM_MS_NET_CAPA] = { TLV_TYPE_TLV, 0 },
83 [GSM48_IE_GMM_PDP_CTX_STATUS] = { TLV_TYPE_TLV, 0 },
84 [GSM48_IE_GMM_PS_LCS_CAPA] = { TLV_TYPE_TLV, 0 },
85 [GSM48_IE_GMM_GMM_MBMS_CTX_ST] = { TLV_TYPE_TLV, 0 },
86 },
87};
88
Harald Welte2720e732010-05-17 00:44:57 +020089/* Our implementation, should be kept in SGSN */
Harald Welte9b455bf2010-03-14 15:45:01 +080090
Harald Weltec2e8cc42010-05-31 20:23:38 +020091static void mmctx_timer_cb(void *_mm);
92
Pau Espin Pedrola299d652019-08-14 19:11:10 +020093static void mmctx_timer_start(struct sgsn_mm_ctx *mm, unsigned int T)
Harald Weltec2e8cc42010-05-31 20:23:38 +020094{
Pau Espin Pedrola299d652019-08-14 19:11:10 +020095 unsigned long seconds;
Pablo Neira Ayusobf540cb2011-05-06 12:11:06 +020096 if (osmo_timer_pending(&mm->timer))
Harald Welteeb98c742015-08-16 17:11:32 +020097 LOGMMCTXP(LOGL_ERROR, mm, "Starting MM timer %u while old "
Harald Weltec2e8cc42010-05-31 20:23:38 +020098 "timer %u pending\n", T, mm->T);
Pau Espin Pedrola299d652019-08-14 19:11:10 +020099
100 seconds = osmo_tdef_get(sgsn->cfg.T_defs, T, OSMO_TDEF_S, -1);
101
Harald Weltec2e8cc42010-05-31 20:23:38 +0200102 mm->T = T;
103 mm->num_T_exp = 0;
104
105 /* FIXME: we should do this only once ? */
Pablo Neira Ayuso51215762017-05-08 20:57:52 +0200106 osmo_timer_setup(&mm->timer, mmctx_timer_cb, mm);
Pablo Neira Ayusobf540cb2011-05-06 12:11:06 +0200107 osmo_timer_schedule(&mm->timer, seconds, 0);
Harald Weltec2e8cc42010-05-31 20:23:38 +0200108}
109
110static void mmctx_timer_stop(struct sgsn_mm_ctx *mm, unsigned int T)
111{
112 if (mm->T != T)
Harald Welteeb98c742015-08-16 17:11:32 +0200113 LOGMMCTXP(LOGL_ERROR, mm, "Stopping MM timer %u but "
Harald Weltec2e8cc42010-05-31 20:23:38 +0200114 "%u is running\n", T, mm->T);
Pablo Neira Ayusobf540cb2011-05-06 12:11:06 +0200115 osmo_timer_del(&mm->timer);
Harald Weltec2e8cc42010-05-31 20:23:38 +0200116}
117
Jacob Erlbeck81ffb742015-01-23 11:33:51 +0100118time_t gprs_max_time_to_idle(void)
119{
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200120 unsigned long T3314, T3312;
121
122 T3314 = osmo_tdef_get(sgsn->cfg.T_defs, 3314, OSMO_TDEF_S, -1);
123 T3312 = osmo_tdef_get(sgsn->cfg.T_defs, 3312, OSMO_TDEF_S, -1);
124 return T3314 + (T3312 + 4 * 60);
Jacob Erlbeck81ffb742015-01-23 11:33:51 +0100125}
126
Neels Hofmeyr723f7c72016-08-11 19:12:54 +0200127/* Send a message through the underlying layer.
128 * For param encryptable, see 3GPP TS 24.008 § 4.7.1.2 and
129 * gsm48_hdr_gmm_cipherable(). Pass false for not cipherable messages. */
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200130int gsm48_gmm_sendmsg(struct msgb *msg, int command,
Max82040102016-07-06 11:59:18 +0200131 struct sgsn_mm_ctx *mm, bool encryptable)
Harald Welte9b455bf2010-03-14 15:45:01 +0800132{
Daniel Willmann61329d42016-05-21 17:36:18 +0200133 if (mm) {
Harald Welte8acd88f2010-05-18 10:57:45 +0200134 rate_ctr_inc(&mm->ctrg->ctr[GMM_CTR_PKTS_SIG_OUT]);
Daniel Willmann61329d42016-05-21 17:36:18 +0200135#ifdef BUILD_IU
136 if (mm->ran_type == MM_CTX_T_UTRAN_Iu)
Neels Hofmeyra7a39472017-07-05 15:19:52 +0200137 return ranap_iu_tx(msg, GPRS_SAPI_GMM);
Daniel Willmann61329d42016-05-21 17:36:18 +0200138#endif
139 }
140
141#ifdef BUILD_IU
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +0200142 if (MSG_IU_UE_CTX(msg))
Neels Hofmeyra7a39472017-07-05 15:19:52 +0200143 return ranap_iu_tx(msg, GPRS_SAPI_GMM);
Daniel Willmann61329d42016-05-21 17:36:18 +0200144#endif
Harald Welte8acd88f2010-05-18 10:57:45 +0200145
Harald Welte11d7c102010-05-02 11:54:55 +0200146 /* caller needs to provide TLLI, BVCI and NSEI */
Max82040102016-07-06 11:59:18 +0200147 return gprs_llc_tx_ui(msg, GPRS_SAPI_GMM, command, mm, encryptable);
Harald Welte9b455bf2010-03-14 15:45:01 +0800148}
149
Harald Welte11d7c102010-05-02 11:54:55 +0200150/* copy identifiers from old message to new message, this
151 * is required so lower layers can route it correctly */
152static void gmm_copy_id(struct msgb *msg, const struct msgb *old)
153{
154 msgb_tlli(msg) = msgb_tlli(old);
155 msgb_bvci(msg) = msgb_bvci(old);
156 msgb_nsei(msg) = msgb_nsei(old);
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +0200157 MSG_IU_UE_CTX_SET(msg, MSG_IU_UE_CTX(old));
Harald Welte11d7c102010-05-02 11:54:55 +0200158}
159
Harald Welte6abf94e2010-05-18 10:35:06 +0200160/* Store BVCI/NSEI in MM context */
Pau Espin Pedrol8333ef12019-08-29 19:26:12 +0200161void msgid2mmctx(struct sgsn_mm_ctx *mm, const struct msgb *msg)
Harald Welte6abf94e2010-05-18 10:35:06 +0200162{
Alexander Couzensf8d3e7f2019-08-12 18:28:11 +0200163 /* check for Iu or Gb */
164 if (!MSG_IU_UE_CTX(msg)) {
165 mm->gb.bvci = msgb_bvci(msg);
166 mm->gb.nsei = msgb_nsei(msg);
Neels Hofmeyra7a39472017-07-05 15:19:52 +0200167 }
Alexander Couzensf8d3e7f2019-08-12 18:28:11 +0200168#ifdef BUILD_IU
169 else {
170 /* In case a Iu connection is reconnected we need to update the ue ctx */
171 /* FIXME: the old ue_ctx have to be freed/disconnected */
172 mm->iu.ue_ctx = MSG_IU_UE_CTX(msg);
173 if (mm->ran_type == MM_CTX_T_UTRAN_Iu
174 && mm->iu.ue_ctx) {
175 mm->iu.ue_ctx->rab_assign_addr_enc =
176 sgsn->cfg.iu.rab_assign_addr_enc;
177 }
178 }
179#endif
Harald Welte6abf94e2010-05-18 10:35:06 +0200180}
181
182/* Store BVCI/NSEI in MM context */
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200183void mmctx2msgid(struct msgb *msg, const struct sgsn_mm_ctx *mm)
Harald Welte6abf94e2010-05-18 10:35:06 +0200184{
Harald Weltef97ee042015-12-25 19:12:21 +0100185 msgb_tlli(msg) = mm->gb.tlli;
186 msgb_bvci(msg) = mm->gb.bvci;
187 msgb_nsei(msg) = mm->gb.nsei;
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +0200188 MSG_IU_UE_CTX_SET(msg, mm->iu.ue_ctx);
Harald Welte6abf94e2010-05-18 10:35:06 +0200189}
190
Jacob Erlbeck99985b52014-10-13 10:32:00 +0200191static void mm_ctx_cleanup_free(struct sgsn_mm_ctx *ctx, const char *log_text)
192{
Jacob Erlbecke671d252015-01-26 14:43:07 +0100193 LOGMMCTXP(LOGL_INFO, ctx, "Cleaning MM context due to %s\n", log_text);
Jacob Erlbeck99985b52014-10-13 10:32:00 +0200194
195 /* Mark MM state as deregistered */
Pau Espin Pedrol31c46572019-09-02 16:45:27 +0200196 osmo_fsm_inst_dispatch(ctx->gmm_fsm, E_GMM_CLEANUP, NULL);
Pau Espin Pedrol2179dec2019-08-13 19:09:32 +0200197
198 switch(ctx->ran_type) {
199 case MM_CTX_T_UTRAN_Iu:
Pau Espin Pedrolccd12522019-08-30 17:06:36 +0200200 osmo_fsm_inst_dispatch(ctx->iu.mm_state_fsm, E_PMM_IMPLICIT_DETACH, NULL);
Pau Espin Pedrol2179dec2019-08-13 19:09:32 +0200201 break;
202 case MM_CTX_T_GERAN_Gb:
Pau Espin Pedrol02514bc2019-08-30 16:14:22 +0200203 osmo_fsm_inst_dispatch(ctx->gb.mm_state_fsm, E_MM_IMPLICIT_DETACH, NULL);
Pau Espin Pedrol2179dec2019-08-13 19:09:32 +0200204 break;
205 }
Jacob Erlbeck99985b52014-10-13 10:32:00 +0200206
Jacob Erlbecke671d252015-01-26 14:43:07 +0100207 sgsn_mm_ctx_cleanup_free(ctx);
Jacob Erlbeck99985b52014-10-13 10:32:00 +0200208}
209
Harald Weltef54e7e22010-06-09 10:51:23 +0200210/* Chapter 9.4.18 */
211static int _tx_status(struct msgb *msg, uint8_t cause,
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200212 struct sgsn_mm_ctx *mmctx)
Harald Weltef54e7e22010-06-09 10:51:23 +0200213{
214 struct gsm48_hdr *gh;
215
216 /* MMCTX might be NULL! */
217
218 DEBUGP(DMM, "<- GPRS MM STATUS (cause: %s)\n",
Jacob Erlbeckafcf2302015-01-05 17:30:02 +0100219 get_value_string(gsm48_gmm_cause_names, cause));
Harald Weltef54e7e22010-06-09 10:51:23 +0200220
221 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200222 gh->proto_discr = GSM48_PDISC_MM_GPRS;
223 gh->msg_type = GSM48_MT_GMM_STATUS;
Harald Weltef54e7e22010-06-09 10:51:23 +0200224 gh->data[0] = cause;
225
Max82040102016-07-06 11:59:18 +0200226 return gsm48_gmm_sendmsg(msg, 0, mmctx, true);
Harald Weltef54e7e22010-06-09 10:51:23 +0200227}
Jacob Erlbeck70671422014-10-29 22:57:30 +0100228
Harald Weltef54e7e22010-06-09 10:51:23 +0200229static int gsm48_tx_gmm_status(struct sgsn_mm_ctx *mmctx, uint8_t cause)
230{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100231 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 GMM STATUS");
Harald Weltef54e7e22010-06-09 10:51:23 +0200232
233 mmctx2msgid(msg, mmctx);
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200234 return _tx_status(msg, cause, mmctx);
Harald Weltef54e7e22010-06-09 10:51:23 +0200235}
236
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200237static int _tx_detach_req(struct msgb *msg, uint8_t detach_type, uint8_t cause,
238 struct sgsn_mm_ctx *mmctx)
239{
240 struct gsm48_hdr *gh;
241
242 /* MMCTX might be NULL! */
243
244 DEBUGP(DMM, "<- GPRS MM DETACH REQ (type: %s, cause: %s)\n",
245 get_value_string(gprs_det_t_mt_strs, detach_type),
Jacob Erlbeckafcf2302015-01-05 17:30:02 +0100246 get_value_string(gsm48_gmm_cause_names, cause));
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200247
248 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
249
250 gh->proto_discr = GSM48_PDISC_MM_GPRS;
251 gh->msg_type = GSM48_MT_GMM_DETACH_REQ;
252 gh->data[0] = detach_type & 0x07;
253
254 msgb_tv_put(msg, GSM48_IE_GMM_CAUSE, cause);
255
Max82040102016-07-06 11:59:18 +0200256 return gsm48_gmm_sendmsg(msg, 0, mmctx, true);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200257}
258
259static int gsm48_tx_gmm_detach_req(struct sgsn_mm_ctx *mmctx,
260 uint8_t detach_type, uint8_t cause)
261{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100262 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 DET REQ");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200263
264 mmctx2msgid(msg, mmctx);
265 return _tx_detach_req(msg, detach_type, cause, mmctx);
266}
267
268static int gsm48_tx_gmm_detach_req_oldmsg(struct msgb *oldmsg,
269 uint8_t detach_type, uint8_t cause)
270{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100271 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 DET OLD");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200272
273 gmm_copy_id(msg, oldmsg);
274 return _tx_detach_req(msg, detach_type, cause, NULL);
275}
Harald Weltef54e7e22010-06-09 10:51:23 +0200276
Harald Welte9b455bf2010-03-14 15:45:01 +0800277/* Chapter 9.4.2: Attach accept */
Alexander Couzensd4788cd2018-05-02 22:32:19 +0200278int gsm48_tx_gmm_att_ack(struct sgsn_mm_ctx *mm)
Harald Welte9b455bf2010-03-14 15:45:01 +0800279{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100280 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ATT ACK");
Harald Welte9b455bf2010-03-14 15:45:01 +0800281 struct gsm48_hdr *gh;
282 struct gsm48_attach_ack *aa;
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200283 unsigned long t;
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +0100284#ifdef PTMSI_ALLOC
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +0200285 struct osmo_mobile_identity mi;
286 uint8_t *l;
287 int rc;
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +0100288#endif
Holger Hans Peter Freyther1768a572014-04-04 12:40:34 +0200289#if 0
290 uint8_t *ptsig;
291#endif
Harald Welte9b455bf2010-03-14 15:45:01 +0800292
Daniel Willmann46553142014-09-03 17:46:44 +0200293 LOGMMCTXP(LOGL_INFO, mm, "<- GPRS ATTACH ACCEPT (new P-TMSI=0x%08x)\n", mm->p_tmsi);
Alexander Couzens14314bd2016-07-05 09:52:52 +0200294 rate_ctr_inc(&sgsn->rate_ctrs->ctr[CTR_GPRS_ATTACH_ACKED]);
Harald Welte9b455bf2010-03-14 15:45:01 +0800295
Harald Welte6463c072010-05-18 17:04:55 +0200296 mmctx2msgid(msg, mm);
Harald Welte9b455bf2010-03-14 15:45:01 +0800297
298 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
299 gh->proto_discr = GSM48_PDISC_MM_GPRS;
300 gh->msg_type = GSM48_MT_GMM_ATTACH_ACK;
301
302 aa = (struct gsm48_attach_ack *) msgb_put(msg, sizeof(*aa));
303 aa->force_stby = 0; /* not indicated */
304 aa->att_result = 1; /* GPRS only */
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200305 t = osmo_tdef_get(sgsn->cfg.T_defs, 3312, OSMO_TDEF_S, -1);
306 aa->ra_upd_timer = gprs_secs_to_tmr_floor(t);
Keith6d92f142020-09-21 00:09:30 +0200307 aa->radio_prio = 0x44; /* lowest */
Max25c65c32018-01-08 14:43:53 +0100308 gsm48_encode_ra(&aa->ra_id, &mm->ra);
Harald Welte9b455bf2010-03-14 15:45:01 +0800309
Harald Welteab1d5622010-05-18 19:58:38 +0200310#if 0
Harald Welte6463c072010-05-18 17:04:55 +0200311 /* Optional: P-TMSI signature */
312 msgb_v_put(msg, GSM48_IE_GMM_PTMSI_SIG);
313 ptsig = msgb_put(msg, 3);
314 ptsig[0] = mm->p_tmsi_sig >> 16;
315 ptsig[1] = mm->p_tmsi_sig >> 8;
316 ptsig[2] = mm->p_tmsi_sig & 0xff;
317
Harald Weltec2e8cc42010-05-31 20:23:38 +0200318#endif
Jacob Erlbeck8de9c482015-01-23 11:44:39 +0100319 /* Optional: Negotiated Ready timer value
320 * (fixed 44s, default value, GSM 04.08, table 11.4a) to safely limit
321 * the inactivity time READY->STANDBY.
322 */
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200323 t = osmo_tdef_get(sgsn->cfg.T_defs, 3314, OSMO_TDEF_S, -1);
324 msgb_tv_put(msg, GSM48_IE_GMM_TIMER_READY, gprs_secs_to_tmr_floor(t));
Harald Welte6463c072010-05-18 17:04:55 +0200325
Harald Weltec2e8cc42010-05-31 20:23:38 +0200326#ifdef PTMSI_ALLOC
Harald Welte6463c072010-05-18 17:04:55 +0200327 /* Optional: Allocated P-TMSI */
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +0200328 mi = (struct osmo_mobile_identity){
329 .type = GSM_MI_TYPE_TMSI,
330 .tmsi = mm->p_tmsi,
331 };
332 l = msgb_tl_put(msg, GSM48_IE_GMM_ALLOC_PTMSI);
333 rc = osmo_mobile_identity_encode_msgb(msg, &mi, false);
334 if (rc < 0) {
335 LOGMMCTXP(LOGL_ERROR, mm, "Cannot encode Mobile Identity\n");
336 msgb_free(msg);
337 return -EINVAL;
338 }
339 *l = rc;
Harald Welteab1d5622010-05-18 19:58:38 +0200340#endif
Harald Weltec2e8cc42010-05-31 20:23:38 +0200341
Harald Welte6463c072010-05-18 17:04:55 +0200342 /* Optional: MS-identity (combined attach) */
343 /* Optional: GMM cause (partial attach result for combined attach) */
344
Pau Espin Pedrol83142be2020-11-26 19:34:04 +0100345 /* Optional: Network feature support 10.5.5.23 */
346 /* msgb_v_put(msg, GSM48_IE_GMM_NET_FEAT_SUPPORT | 0x00);*/
347
Max82040102016-07-06 11:59:18 +0200348 return gsm48_gmm_sendmsg(msg, 0, mm, true);
Harald Welte9b455bf2010-03-14 15:45:01 +0800349}
350
351/* Chapter 9.4.5: Attach reject */
Harald Welteeb98c742015-08-16 17:11:32 +0200352static int _tx_gmm_att_rej(struct msgb *msg, uint8_t gmm_cause,
353 const struct sgsn_mm_ctx *mm)
Harald Welte9b455bf2010-03-14 15:45:01 +0800354{
Harald Welte9b455bf2010-03-14 15:45:01 +0800355 struct gsm48_hdr *gh;
356
Harald Welteeb98c742015-08-16 17:11:32 +0200357 LOGMMCTXP(LOGL_NOTICE, mm, "<- GPRS ATTACH REJECT: %s\n",
358 get_value_string(gsm48_gmm_cause_names, gmm_cause));
Alexander Couzens14314bd2016-07-05 09:52:52 +0200359 rate_ctr_inc(&sgsn->rate_ctrs->ctr[CTR_GPRS_ATTACH_REJECTED]);
Harald Welte9b455bf2010-03-14 15:45:01 +0800360
Harald Welte9b455bf2010-03-14 15:45:01 +0800361 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
362 gh->proto_discr = GSM48_PDISC_MM_GPRS;
363 gh->msg_type = GSM48_MT_GMM_ATTACH_REJ;
364 gh->data[0] = gmm_cause;
365
Max82040102016-07-06 11:59:18 +0200366 return gsm48_gmm_sendmsg(msg, 0, NULL, false);
Harald Welte9b455bf2010-03-14 15:45:01 +0800367}
Harald Welte6463c072010-05-18 17:04:55 +0200368static int gsm48_tx_gmm_att_rej_oldmsg(const struct msgb *old_msg,
369 uint8_t gmm_cause)
370{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100371 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ATT REJ OLD");
Harald Welte6463c072010-05-18 17:04:55 +0200372 gmm_copy_id(msg, old_msg);
Harald Welteeb98c742015-08-16 17:11:32 +0200373 return _tx_gmm_att_rej(msg, gmm_cause, NULL);
Harald Welte6463c072010-05-18 17:04:55 +0200374}
Alexander Couzensd4788cd2018-05-02 22:32:19 +0200375int gsm48_tx_gmm_att_rej(struct sgsn_mm_ctx *mm,
Harald Welte6463c072010-05-18 17:04:55 +0200376 uint8_t gmm_cause)
377{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100378 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ATT REJ");
Harald Welte6463c072010-05-18 17:04:55 +0200379 mmctx2msgid(msg, mm);
Harald Welteeb98c742015-08-16 17:11:32 +0200380 return _tx_gmm_att_rej(msg, gmm_cause, mm);
Harald Welte6463c072010-05-18 17:04:55 +0200381}
Harald Welte9b455bf2010-03-14 15:45:01 +0800382
Harald Welte2720e732010-05-17 00:44:57 +0200383/* Chapter 9.4.6.2 Detach accept */
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200384static int _tx_detach_ack(struct msgb *msg, uint8_t force_stby,
385 struct sgsn_mm_ctx *mm)
Harald Welte2720e732010-05-17 00:44:57 +0200386{
Harald Welte2720e732010-05-17 00:44:57 +0200387 struct gsm48_hdr *gh;
388
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200389 /* MMCTX might be NULL! */
Harald Welte2720e732010-05-17 00:44:57 +0200390
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200391 DEBUGP(DMM, "<- GPRS MM DETACH ACC (force-standby: %d)\n", force_stby);
Alexander Couzens14314bd2016-07-05 09:52:52 +0200392 rate_ctr_inc(&sgsn->rate_ctrs->ctr[CTR_GPRS_DETACH_ACKED]);
Harald Welte6463c072010-05-18 17:04:55 +0200393
Harald Welte2720e732010-05-17 00:44:57 +0200394 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
395 gh->proto_discr = GSM48_PDISC_MM_GPRS;
396 gh->msg_type = GSM48_MT_GMM_DETACH_ACK;
397 gh->data[0] = force_stby;
398
Max82040102016-07-06 11:59:18 +0200399 return gsm48_gmm_sendmsg(msg, 0, mm, true);
Harald Welte2720e732010-05-17 00:44:57 +0200400}
401
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200402static int gsm48_tx_gmm_det_ack(struct sgsn_mm_ctx *mm, uint8_t force_stby)
403{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100404 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 DET ACK");
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200405
406 mmctx2msgid(msg, mm);
407 return _tx_detach_ack(msg, force_stby, mm);
408}
409
410static int gsm48_tx_gmm_det_ack_oldmsg(struct msgb *oldmsg, uint8_t force_stby)
411{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100412 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 DET ACK OLD");
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200413
414 gmm_copy_id(msg, oldmsg);
415 return _tx_detach_ack(msg, force_stby, NULL);
416}
417
Harald Welte9b455bf2010-03-14 15:45:01 +0800418/* Transmit Chapter 9.4.12 Identity Request */
Alexander Couzensd4788cd2018-05-02 22:32:19 +0200419int gsm48_tx_gmm_id_req(struct sgsn_mm_ctx *mm, uint8_t id_type)
Harald Welte9b455bf2010-03-14 15:45:01 +0800420{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100421 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ID REQ");
Harald Welte9b455bf2010-03-14 15:45:01 +0800422 struct gsm48_hdr *gh;
423
Harald Welteb9845f92015-08-16 18:07:48 +0200424 LOGMMCTXP(LOGL_DEBUG, mm, "<- GPRS IDENTITY REQUEST: mi_type=%s\n",
425 gsm48_mi_type_name(id_type));
Harald Welte9b455bf2010-03-14 15:45:01 +0800426
Harald Welte6463c072010-05-18 17:04:55 +0200427 mmctx2msgid(msg, mm);
Harald Welte9b455bf2010-03-14 15:45:01 +0800428
429 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
430 gh->proto_discr = GSM48_PDISC_MM_GPRS;
431 gh->msg_type = GSM48_MT_GMM_ID_REQ;
432 /* 10.5.5.9 ID type 2 + identity type and 10.5.5.7 'force to standby' IE */
433 gh->data[0] = id_type & 0xf;
434
Max82040102016-07-06 11:59:18 +0200435 return gsm48_gmm_sendmsg(msg, 1, mm, false);
Harald Welte9b455bf2010-03-14 15:45:01 +0800436}
437
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100438/* determine if the MS/UE supports R99 or later */
439static bool mmctx_is_r99(const struct sgsn_mm_ctx *mm)
440{
441 if (mm->ms_network_capa.len < 1)
442 return false;
443 if (mm->ms_network_capa.buf[0] & 0x01)
444 return true;
445 return false;
446}
447
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +0200448/* 3GPP TS 24.008 § 9.4.9: Authentication and Ciphering Request */
Alexander Couzensd4788cd2018-05-02 22:32:19 +0200449int gsm48_tx_gmm_auth_ciph_req(struct sgsn_mm_ctx *mm,
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100450 const struct osmo_auth_vector *vec,
Maxb997f842016-07-06 15:57:01 +0200451 uint8_t key_seq, bool force_standby)
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200452{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100453 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 AUTH CIPH REQ");
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200454 struct gsm48_hdr *gh;
455 struct gsm48_auth_ciph_req *acreq;
Max4011e722016-07-05 15:19:12 +0200456 uint8_t *m_rand, *m_cksn, rbyte;
Max3b6332f2017-11-01 13:28:38 +0100457 int rc;
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200458
Neels Hofmeyr918a47b2018-04-30 21:59:34 +0200459 LOGMMCTXP(LOGL_INFO, mm, "<- GPRS AUTH AND CIPHERING REQ (rand = %s,"
460 " mmctx_is_r99=%d, vec->auth_types=0x%x",
461 osmo_hexdump(vec->rand, sizeof(vec->rand)),
462 mmctx_is_r99(mm), vec->auth_types);
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100463 if (mmctx_is_r99(mm) && vec
464 && (vec->auth_types & OSMO_AUTH_TYPE_UMTS)) {
465 LOGPC(DMM, LOGL_INFO, ", autn = %s)\n",
466 osmo_hexdump(vec->autn, sizeof(vec->autn)));
467 } else
468 LOGPC(DMM, LOGL_INFO, ")\n");
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200469
470 mmctx2msgid(msg, mm);
471
472 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
473 gh->proto_discr = GSM48_PDISC_MM_GPRS;
474 gh->msg_type = GSM48_MT_GMM_AUTH_CIPH_REQ;
475
476 acreq = (struct gsm48_auth_ciph_req *) msgb_put(msg, sizeof(*acreq));
Maxb997f842016-07-06 15:57:01 +0200477 acreq->ciph_alg = mm->ciph_algo & 0xf;
478 /* § 10.5.5.10: */
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200479 acreq->imeisv_req = 0x1;
Maxb997f842016-07-06 15:57:01 +0200480 /* § 10.5.5.7: */
481 acreq->force_stby = force_standby;
Max4011e722016-07-05 15:19:12 +0200482 /* 3GPP TS 24.008 § 10.5.5.19: */
Max3b6332f2017-11-01 13:28:38 +0100483 rc = osmo_get_rand_id(&rbyte, 1);
484 if (rc < 0) {
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +0200485 LOGMMCTXP(LOGL_ERROR, mm, "osmo_get_rand_id() failed for A&C ref: %s\n", strerror(-rc));
Max3b6332f2017-11-01 13:28:38 +0100486 return rc;
487 }
488
489 acreq->ac_ref_nr = rbyte;
Max4011e722016-07-05 15:19:12 +0200490 mm->ac_ref_nr_used = acreq->ac_ref_nr;
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200491
492 /* Only if authentication is requested we need to set RAND + CKSN */
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100493 if (vec) {
494 m_rand = msgb_put(msg, sizeof(vec->rand) + 1);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200495 m_rand[0] = GSM48_IE_GMM_AUTH_RAND;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100496 memcpy(m_rand + 1, vec->rand, sizeof(vec->rand));
497
Maxb997f842016-07-06 15:57:01 +0200498 /* § 10.5.1.2: */
Jacob Erlbeck65d82732014-12-01 10:36:17 +0100499 m_cksn = msgb_put(msg, 1);
500 m_cksn[0] = (GSM48_IE_GMM_CIPH_CKSN << 4) | (key_seq & 0x07);
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100501
502 /* A Release99 or higher MS/UE must be able to handle
503 * the optional AUTN IE. If a classic GSM SIM is
504 * inserted, it will simply ignore AUTN and just use
505 * RAND */
506 if (mmctx_is_r99(mm) &&
507 (vec->auth_types & OSMO_AUTH_TYPE_UMTS)) {
508 msgb_tlv_put(msg, GSM48_IE_GMM_AUTN,
509 sizeof(vec->autn), vec->autn);
510 }
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200511 }
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200512
Max82040102016-07-06 11:59:18 +0200513 return gsm48_gmm_sendmsg(msg, 1, mm, false);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200514}
515
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +0200516/* 3GPP TS 24.008 § 9.4.11: Authentication and Ciphering Reject */
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200517static int gsm48_tx_gmm_auth_ciph_rej(struct sgsn_mm_ctx *mm)
518{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100519 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 AUTH CIPH REJ");
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200520 struct gsm48_hdr *gh;
521
Daniel Willmann46553142014-09-03 17:46:44 +0200522 LOGMMCTXP(LOGL_NOTICE, mm, "<- GPRS AUTH AND CIPH REJECT\n");
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200523
524 mmctx2msgid(msg, mm);
525
526 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
527 gh->proto_discr = GSM48_PDISC_MM_GPRS;
528 gh->msg_type = GSM48_MT_GMM_AUTH_CIPH_REJ;
529
Max82040102016-07-06 11:59:18 +0200530 return gsm48_gmm_sendmsg(msg, 0, mm, false);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200531}
532
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100533/* check if the received authentication response matches */
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200534static enum osmo_sub_auth_type check_auth_resp(struct sgsn_mm_ctx *ctx,
535 bool is_utran,
536 const struct osmo_auth_vector *vec,
537 const uint8_t *res, uint8_t res_len)
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100538{
539 const uint8_t *expect_res;
540 uint8_t expect_res_len;
541 enum osmo_sub_auth_type expect_type;
542 const char *expect_str;
543
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100544 /* On UTRAN (3G) we always expect UMTS AKA. On GERAN (2G) we sent AUTN
545 * and expect UMTS AKA if there is R99 capability and our vector
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200546 * supports UMTS AKA, otherwise we expect GSM AKA.
547 * However, on GERAN, even if we sent a UMTS AKA Authentication Request, the MS may decide to
548 * instead reply with a GSM AKA SRES response. */
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100549 if (is_utran
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200550 || (mmctx_is_r99(ctx) && (vec->auth_types & OSMO_AUTH_TYPE_UMTS)
551 && (res_len > sizeof(vec->sres)))) {
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100552 expect_type = OSMO_AUTH_TYPE_UMTS;
553 expect_str = "UMTS RES";
554 expect_res = vec->res;
555 expect_res_len = vec->res_len;
556 } else {
557 expect_type = OSMO_AUTH_TYPE_GSM;
558 expect_str = "GSM SRES";
559 expect_res = vec->sres;
560 expect_res_len = sizeof(vec->sres);
561 }
Pau Espin Pedrold04e6692018-01-07 18:14:12 +0100562
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100563 if (!(vec->auth_types & expect_type)) {
564 LOGMMCTXP(LOGL_ERROR, ctx, "Auth error: auth vector does"
565 " not provide the expected auth type:"
566 " expected %s = 0x%x, auth_types are 0x%x\n",
567 expect_str, expect_type, vec->auth_types);
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200568 return OSMO_AUTH_TYPE_NONE;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100569 }
570
571 if (!res)
572 goto auth_mismatch;
573
574 if (res_len != expect_res_len)
575 goto auth_mismatch;
576
577 if (memcmp(res, expect_res, res_len) != 0)
578 goto auth_mismatch;
579
580 /* Authorized! */
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200581 return expect_type;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100582
583auth_mismatch:
584 LOGMMCTXP(LOGL_ERROR, ctx, "Auth mismatch: expected %s = %s\n",
585 expect_str, osmo_hexdump_nospc(expect_res, expect_res_len));
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200586 return OSMO_AUTH_TYPE_NONE;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100587}
588
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +0200589/* 3GPP TS 24.008 § 9.4.10: Authentication and Ciphering Response */
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200590static int gsm48_rx_gmm_auth_ciph_resp(struct sgsn_mm_ctx *ctx,
591 struct msgb *msg)
592{
593 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
594 struct gsm48_auth_ciph_resp *acr = (struct gsm48_auth_ciph_resp *)gh->data;
595 struct tlv_parsed tp;
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100596 struct gsm_auth_tuple *at;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100597 const char *res_name = "(no response)";
598 uint8_t res[16];
599 uint8_t res_len;
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100600 int rc;
601
602 LOGMMCTXP(LOGL_INFO, ctx, "-> GPRS AUTH AND CIPH RESPONSE\n");
603
604 if (ctx->auth_triplet.key_seq == GSM_KEY_SEQ_INVAL) {
605 LOGMMCTXP(LOGL_NOTICE, ctx,
606 "Unexpected Auth & Ciph Response (ignored)\n");
607 return 0;
608 }
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200609
Max4011e722016-07-05 15:19:12 +0200610 if (acr->ac_ref_nr != ctx->ac_ref_nr_used) {
611 LOGMMCTXP(LOGL_NOTICE, ctx, "Reference mismatch for Auth & Ciph"
612 " Response: %u received, %u expected\n",
613 acr->ac_ref_nr, ctx->ac_ref_nr_used);
614 return 0;
615 }
616
Jacob Erlbeckbd0cf112014-12-01 12:33:33 +0100617 /* Stop T3360 */
618 mmctx_timer_stop(ctx, 3360);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200619
Holger Hans Peter Freyther1768a572014-04-04 12:40:34 +0200620 tlv_parse(&tp, &gsm48_gmm_att_tlvdef, acr->data,
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200621 (msg->data + msg->len) - acr->data, 0, 0);
622
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200623 if (!TLVP_PRESENT(&tp, GSM48_IE_GMM_AUTH_SRES) ||
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100624 !TLVP_PRESENT(&tp, GSM48_IE_GMM_IMEISV) ||
625 TLVP_LEN(&tp,GSM48_IE_GMM_AUTH_SRES) != 4) {
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100626 /* TODO: missing mandatory IE, return STATUS or REJ? */
627 LOGMMCTXP(LOGL_ERROR, ctx, "Missing mandantory IE\n");
628 return -EINVAL;
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200629 }
630
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100631 /* Start with the good old 4-byte SRES */
632 memcpy(res, TLVP_VAL(&tp, GSM48_IE_GMM_AUTH_SRES), 4);
633 res_len = 4;
634 res_name = "GSM SRES";
635
636 /* Append extended RES as part of UMTS AKA, if any */
637 if (TLVP_PRESENT(&tp, GSM48_IE_GMM_AUTH_RES_EXT)) {
638 unsigned int l = TLVP_LEN(&tp, GSM48_IE_GMM_AUTH_RES_EXT);
639 if (l > sizeof(res)-4)
640 l = sizeof(res)-4;
641 memcpy(res+4, TLVP_VAL(&tp, GSM48_IE_GMM_AUTH_RES_EXT), l);
642 res_len += l;
643 res_name = "UMTS RES";
644 }
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100645
646 at = &ctx->auth_triplet;
647
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100648 LOGMMCTXP(LOGL_DEBUG, ctx, "checking auth: received %s = %s\n",
649 res_name, osmo_hexdump(res, res_len));
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200650 ctx->sec_ctx = check_auth_resp(ctx, false, &at->vec, res, res_len);
651 if (!sgsn_mm_ctx_is_authenticated(ctx)) {
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100652 rc = gsm48_tx_gmm_auth_ciph_rej(ctx);
653 mm_ctx_cleanup_free(ctx, "GPRS AUTH AND CIPH REJECT");
654 return rc;
655 }
656
Daniel Willmann3ecfbbb2016-05-21 00:16:55 +0200657 if (ctx->ran_type == MM_CTX_T_UTRAN_Iu)
658 ctx->iu.new_key = 1;
659
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200660 /* FIXME: enable LLC cipheirng */
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100661
662 /* Check if we can let the mobile station enter */
Alexander Couzensf7198d72018-05-22 18:29:14 +0200663 return osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_AUTH_RESP_RECV_SUCCESS, NULL);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200664}
665
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +0200666/* 3GPP TS 24.008 § 9.4.10: Authentication and Ciphering Failure */
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100667static int gsm48_rx_gmm_auth_ciph_fail(struct sgsn_mm_ctx *ctx,
668 struct msgb *msg)
669{
670 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
671 struct tlv_parsed tp;
672 const uint8_t gmm_cause = gh->data[0];
673 const uint8_t *auts;
674 int rc;
675
676 LOGMMCTXP(LOGL_INFO, ctx, "-> GPRS AUTH AND CIPH FAILURE (cause = %s)\n",
677 get_value_string(gsm48_gmm_cause_names, gmm_cause));
678
679 tlv_parse(&tp, &gsm48_gmm_att_tlvdef, gh->data+1, msg->len - 1, 0, 0);
680
681 /* Only if GMM cause is present and the AUTS is provided, we can
682 * start re-sync procedure */
683 if (gmm_cause == GMM_CAUSE_SYNC_FAIL &&
684 TLVP_PRESENT(&tp, GSM48_IE_GMM_AUTH_FAIL_PAR)) {
685 if (TLVP_LEN(&tp, GSM48_IE_GMM_AUTH_FAIL_PAR) != 14) {
686 LOGMMCTXP(LOGL_ERROR, ctx, "AUTS IE has wrong size:"
687 " expected %d, got %u\n", 14,
688 TLVP_LEN(&tp, GSM48_IE_GMM_AUTH_FAIL_PAR));
689 return -EINVAL;
690 }
691 auts = TLVP_VAL(&tp, GSM48_IE_GMM_AUTH_FAIL_PAR);
692
693 LOGMMCTXP(LOGL_INFO, ctx,
694 "R99 AUTHENTICATION SYNCH (AUTS = %s)\n",
695 osmo_hexdump_nospc(auts, 14));
696
697 /* make sure we'll refresh the auth_triplet in
698 * sgsn_auth_update() */
699 ctx->auth_triplet.key_seq = GSM_KEY_SEQ_INVAL;
700
701 /* make sure we'll retry authentication after the resync */
702 ctx->auth_state = SGSN_AUTH_UMTS_RESYNC;
703
704 /* Send AUTS to HLR and wait for new Auth Info Result */
705 rc = gprs_subscr_request_auth_info(ctx, auts,
706 ctx->auth_triplet.vec.rand);
707 if (!rc)
Alexander Couzensf7198d72018-05-22 18:29:14 +0200708 return osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_AUTH_RESP_RECV_RESYNC, NULL);
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100709 /* on error, fall through to send a reject */
710 LOGMMCTXP(LOGL_ERROR, ctx,
711 "Sending AUTS to HLR failed (rc = %d)\n", rc);
712 }
713
714 LOGMMCTXP(LOGL_NOTICE, ctx, "Authentication failed\n");
715 rc = gsm48_tx_gmm_auth_ciph_rej(ctx);
716 mm_ctx_cleanup_free(ctx, "GPRS AUTH FAILURE");
717 return rc;
718}
719
Alexander Couzens8007be42018-05-14 06:48:24 +0200720void extract_subscr_msisdn(struct sgsn_mm_ctx *ctx)
Holger Hans Peter Freyther20de3ae2015-05-05 22:52:40 +0200721{
722 struct gsm_mncc_number called;
723 uint8_t msisdn[sizeof(ctx->subscr->sgsn_data->msisdn) + 1];
724
725 /* Convert MSISDN from encoded to string.. */
726 if (!ctx->subscr)
727 return;
728
729 if (ctx->subscr->sgsn_data->msisdn_len < 1)
730 return;
731
732 /* prepare the data for the decoder */
733 memset(&called, 0, sizeof(called));
734 msisdn[0] = ctx->subscr->sgsn_data->msisdn_len;
735 memcpy(&msisdn[1], ctx->subscr->sgsn_data->msisdn,
736 ctx->subscr->sgsn_data->msisdn_len);
737
738 /* decode the string now */
739 gsm48_decode_called(&called, msisdn);
740
741 /* Prepend a '+' for international numbers */
742 if (called.plan == 1 && called.type == 1) {
743 ctx->msisdn[0] = '+';
Neels Hofmeyr93bafb62017-01-13 03:12:08 +0100744 osmo_strlcpy(&ctx->msisdn[1], called.number,
745 sizeof(ctx->msisdn));
Holger Hans Peter Freyther20de3ae2015-05-05 22:52:40 +0200746 } else {
Neels Hofmeyr93bafb62017-01-13 03:12:08 +0100747 osmo_strlcpy(ctx->msisdn, called.number, sizeof(ctx->msisdn));
Holger Hans Peter Freyther20de3ae2015-05-05 22:52:40 +0200748 }
749}
750
Alexander Couzens8007be42018-05-14 06:48:24 +0200751void extract_subscr_hlr(struct sgsn_mm_ctx *ctx)
Holger Hans Peter Freyther8ee13e22015-05-18 10:00:03 +0200752{
753 struct gsm_mncc_number called;
754 uint8_t hlr_number[sizeof(ctx->subscr->sgsn_data->hlr) + 1];
755
756 if (!ctx->subscr)
757 return;
758
759 if (ctx->subscr->sgsn_data->hlr_len < 1)
760 return;
761
762 /* prepare the data for the decoder */
763 memset(&called, 0, sizeof(called));
764 hlr_number[0] = ctx->subscr->sgsn_data->hlr_len;
765 memcpy(&hlr_number[1], ctx->subscr->sgsn_data->hlr,
766 ctx->subscr->sgsn_data->hlr_len);
767
768 /* decode the string now */
769 gsm48_decode_called(&called, hlr_number);
770
771 if (called.plan != 1) {
772 LOGMMCTXP(LOGL_ERROR, ctx,
773 "Numbering plan(%d) not allowed\n",
774 called.plan);
775 return;
776 }
777
778 if (called.type != 1) {
779 LOGMMCTXP(LOGL_ERROR, ctx,
780 "Numbering type(%d) not allowed\n",
781 called.type);
782 return;
783 }
784
Neels Hofmeyr93bafb62017-01-13 03:12:08 +0100785 osmo_strlcpy(ctx->hlr, called.number, sizeof(ctx->hlr));
Holger Hans Peter Freyther8ee13e22015-05-18 10:00:03 +0200786}
787
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200788#ifdef BUILD_IU
789/* Chapter 9.4.21: Service accept */
790static int gsm48_tx_gmm_service_ack(struct sgsn_mm_ctx *mm)
791{
792 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 SERVICE ACK");
793 struct gsm48_hdr *gh;
794
795 LOGMMCTXP(LOGL_INFO, mm, "<- GPRS SERVICE ACCEPT (P-TMSI=0x%08x)\n", mm->p_tmsi);
796
797 mmctx2msgid(msg, mm);
798
799 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
800 gh->proto_discr = GSM48_PDISC_MM_GPRS;
801 gh->msg_type = GSM48_MT_GMM_SERVICE_ACK;
802
803 /* Optional: PDP context status */
804 /* Optional: MBMS context status */
805
806 return gsm48_gmm_sendmsg(msg, 0, mm, false);
807}
808#endif
809
810/* Chapter 9.4.22: Service reject */
811static int _tx_gmm_service_rej(struct msgb *msg, uint8_t gmm_cause,
812 const struct sgsn_mm_ctx *mm)
813{
814 struct gsm48_hdr *gh;
815
816 LOGMMCTXP(LOGL_NOTICE, mm, "<- GPRS SERVICE REJECT: %s\n",
817 get_value_string(gsm48_gmm_cause_names, gmm_cause));
818
819 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
820 gh->proto_discr = GSM48_PDISC_MM_GPRS;
821 gh->msg_type = GSM48_MT_GMM_SERVICE_REJ;
822 gh->data[0] = gmm_cause;
823
824 return gsm48_gmm_sendmsg(msg, 0, NULL, true);
825}
826static int gsm48_tx_gmm_service_rej_oldmsg(const struct msgb *old_msg,
827 uint8_t gmm_cause)
828{
829 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 SERVICE REJ OLD");
830 gmm_copy_id(msg, old_msg);
831 return _tx_gmm_service_rej(msg, gmm_cause, NULL);
832}
833#if 0
834-- currently unused --
835static int gsm48_tx_gmm_service_rej(struct sgsn_mm_ctx *mm,
836 uint8_t gmm_cause)
837{
838 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 SERVICE REJ");
839 mmctx2msgid(msg, mm);
840 return _tx_gmm_service_rej(msg, gmm_cause, mm);
841}
842#endif
843
844static int gsm48_tx_gmm_ra_upd_ack(struct sgsn_mm_ctx *mm);
845
Harald Welte9b455bf2010-03-14 15:45:01 +0800846/* Check if we can already authorize a subscriber */
Pau Espin Pedrol6dfb5fe2019-08-29 17:21:00 +0200847int gsm48_gmm_authorize(struct sgsn_mm_ctx *ctx)
Harald Welte9b455bf2010-03-14 15:45:01 +0800848{
Daniel Willmann3ecfbbb2016-05-21 00:16:55 +0200849#ifdef BUILD_IU
850 int rc;
851#endif
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +0200852#ifndef PTMSI_ALLOC
853 struct sgsn_signal_data sig_data;
854#endif
855
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100856 /* Request IMSI and IMEI from the MS if they are unknown */
Harald Weltec2e8cc42010-05-31 20:23:38 +0200857 if (!strlen(ctx->imei)) {
Harald Weltec2e8cc42010-05-31 20:23:38 +0200858 ctx->t3370_id_type = GSM_MI_TYPE_IMEI;
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200859 mmctx_timer_start(ctx, 3370);
Harald Welte6463c072010-05-18 17:04:55 +0200860 return gsm48_tx_gmm_id_req(ctx, GSM_MI_TYPE_IMEI);
Harald Weltec2e8cc42010-05-31 20:23:38 +0200861 }
Harald Weltec2e8cc42010-05-31 20:23:38 +0200862 if (!strlen(ctx->imsi)) {
Harald Weltec2e8cc42010-05-31 20:23:38 +0200863 ctx->t3370_id_type = GSM_MI_TYPE_IMSI;
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200864 mmctx_timer_start(ctx, 3370);
Harald Welte6463c072010-05-18 17:04:55 +0200865 return gsm48_tx_gmm_id_req(ctx, GSM_MI_TYPE_IMSI);
Harald Weltec2e8cc42010-05-31 20:23:38 +0200866 }
Harald Welte9b455bf2010-03-14 15:45:01 +0800867
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100868 /* All information required for authentication is available */
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100869 ctx->t3370_id_type = GSM_MI_TYPE_NONE;
870
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200871 if (ctx->auth_state == SGSN_AUTH_UNKNOWN) {
872 /* Request authorization, this leads to a call to
Jacob Erlbeckf951a012014-11-07 14:17:44 +0100873 * sgsn_auth_update which in turn calls
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200874 * gsm0408_gprs_access_granted or gsm0408_gprs_access_denied */
875
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100876 sgsn_auth_request(ctx);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200877 /* Note that gsm48_gmm_authorize can be called recursively via
878 * sgsn_auth_request iff ctx->auth_info changes to AUTH_ACCEPTED
879 */
880 return 0;
881 }
882
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200883 if (ctx->auth_state == SGSN_AUTH_AUTHENTICATE
884 && !sgsn_mm_ctx_is_authenticated(ctx)) {
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100885 struct gsm_auth_tuple *at = &ctx->auth_triplet;
886
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200887 mmctx_timer_start(ctx, 3360);
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100888 return gsm48_tx_gmm_auth_ciph_req(ctx, &at->vec, at->key_seq,
889 false);
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100890 }
891
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200892 if (ctx->auth_state == SGSN_AUTH_AUTHENTICATE && sgsn_mm_ctx_is_authenticated(ctx) &&
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100893 ctx->auth_triplet.key_seq != GSM_KEY_SEQ_INVAL) {
894 /* Check again for authorization */
895 sgsn_auth_request(ctx);
896 return 0;
897 }
898
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200899 if (ctx->auth_state != SGSN_AUTH_ACCEPTED) {
900 LOGMMCTXP(LOGL_NOTICE, ctx,
901 "authorization is denied, aborting procedure\n");
902 return -EACCES;
Jacob Erlbeck0c06f982014-10-29 22:12:20 +0100903 }
904
905 /* The MS is authorized */
Daniel Willmann3ecfbbb2016-05-21 00:16:55 +0200906#ifdef BUILD_IU
907 if (ctx->ran_type == MM_CTX_T_UTRAN_Iu && !ctx->iu.ue_ctx->integrity_active) {
Neels Hofmeyra7a39472017-07-05 15:19:52 +0200908 rc = ranap_iu_tx_sec_mode_cmd(ctx->iu.ue_ctx, &ctx->auth_triplet.vec, 0, ctx->iu.new_key);
Daniel Willmann3ecfbbb2016-05-21 00:16:55 +0200909 ctx->iu.new_key = 0;
910 return rc;
911 }
912#endif
Jacob Erlbeck0c06f982014-10-29 22:12:20 +0100913
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100914 switch (ctx->pending_req) {
915 case 0:
916 LOGMMCTXP(LOGL_INFO, ctx,
917 "no pending request, authorization completed\n");
918 break;
919 case GSM48_MT_GMM_ATTACH_REQ:
Daniel Willmannfac97582016-05-21 00:21:15 +0200920 ctx->pending_req = 0;
Holger Hans Peter Freyther20de3ae2015-05-05 22:52:40 +0200921
922 extract_subscr_msisdn(ctx);
Holger Hans Peter Freyther8ee13e22015-05-18 10:00:03 +0200923 extract_subscr_hlr(ctx);
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100924#ifdef PTMSI_ALLOC
925 /* Start T3350 and re-transmit up to 5 times until ATTACH COMPLETE */
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200926 mmctx_timer_start(ctx, 3350);
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100927 ctx->t3350_mode = GMM_T3350_MODE_ATT;
Jacob Erlbeck0074a772014-10-28 16:23:46 +0100928#else
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +0200929 memset(&sig_data, 0, sizeof(sig_data));
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +0100930 sig_data.mm = ctx;
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +0200931 osmo_signal_dispatch(SS_SGSN, S_SGSN_ATTACH, &sig_data);
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +0100932 osmo_fsm_inst_dispatch(ctx->gmm_fsm, E_GMM_ATTACH_SUCCESS, NULL);
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100933#endif
934
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100935 return gsm48_tx_gmm_att_ack(ctx);
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200936#ifdef BUILD_IU
937 case GSM48_MT_GMM_SERVICE_REQ:
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200938 ctx->pending_req = 0;
Pau Espin Pedrolccd12522019-08-30 17:06:36 +0200939 osmo_fsm_inst_dispatch(ctx->iu.mm_state_fsm, E_PMM_PS_ATTACH, NULL);
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200940 rc = gsm48_tx_gmm_service_ack(ctx);
941
Daniel Willmannaf241722016-05-21 00:35:41 +0200942 if (ctx->iu.service.type != GPRS_SERVICE_T_SIGNALLING)
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200943 activate_pdp_rabs(ctx);
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200944
945 return rc;
946#endif
947 case GSM48_MT_GMM_RA_UPD_REQ:
948 ctx->pending_req = 0;
949 /* Send RA UPDATE ACCEPT */
950 return gsm48_tx_gmm_ra_upd_ack(ctx);
951
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100952 default:
953 LOGMMCTXP(LOGL_ERROR, ctx,
954 "only Attach Request is supported yet, "
955 "got request type %u\n", ctx->pending_req);
956 break;
957 }
958
Harald Welte9b455bf2010-03-14 15:45:01 +0800959 return 0;
960}
961
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100962void gsm0408_gprs_authenticate(struct sgsn_mm_ctx *ctx)
963{
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200964 ctx->sec_ctx = OSMO_AUTH_TYPE_NONE;
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100965
Alexander Couzensf7198d72018-05-22 18:29:14 +0200966 if (ctx->gmm_att_req.fsm->state != ST_INIT)
967 osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_VLR_ANSWERED, (void *) 0);
968 else
969 gsm48_gmm_authorize(ctx);
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100970}
971
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200972void gsm0408_gprs_access_granted(struct sgsn_mm_ctx *ctx)
973{
Pau Espin Pedrol31c46572019-09-02 16:45:27 +0200974 switch (ctx->gmm_fsm->state) {
975 case ST_GMM_COMMON_PROC_INIT:
Harald Welteeb98c742015-08-16 17:11:32 +0200976 LOGMMCTXP(LOGL_NOTICE, ctx,
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200977 "Authorized, continuing procedure, IMSI=%s\n",
978 ctx->imsi);
979 /* Continue with the authorization */
Alexander Couzensf7198d72018-05-22 18:29:14 +0200980 if (ctx->gmm_att_req.fsm->state != ST_INIT)
981 osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_VLR_ANSWERED, (void *) 0);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200982 break;
983 default:
Harald Welteeb98c742015-08-16 17:11:32 +0200984 LOGMMCTXP(LOGL_INFO, ctx,
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200985 "Authorized, ignored, IMSI=%s\n",
986 ctx->imsi);
987 }
988}
989
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +0100990void gsm0408_gprs_access_denied(struct sgsn_mm_ctx *ctx, int gmm_cause)
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200991{
Jacob Erlbeckd6267d12015-01-19 11:10:04 +0100992 if (gmm_cause == SGSN_ERROR_CAUSE_NONE)
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +0100993 gmm_cause = GMM_CAUSE_GPRS_NOTALLOWED;
994
Pau Espin Pedrol31c46572019-09-02 16:45:27 +0200995 switch (ctx->gmm_fsm->state) {
996 case ST_GMM_COMMON_PROC_INIT:
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +0100997 LOGMMCTXP(LOGL_NOTICE, ctx,
998 "Not authorized, rejecting ATTACH REQUEST "
999 "with cause '%s' (%d)\n",
1000 get_value_string(gsm48_gmm_cause_names, gmm_cause),
1001 gmm_cause);
Alexander Couzensf7198d72018-05-22 18:29:14 +02001002 if (ctx->gmm_att_req.fsm->state != ST_INIT)
1003 osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_REJECT, (void *) (long) gmm_cause);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001004 break;
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001005 case ST_GMM_REGISTERED_NORMAL:
1006 case ST_GMM_REGISTERED_SUSPENDED:
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001007 LOGMMCTXP(LOGL_NOTICE, ctx,
1008 "Authorization lost, detaching "
1009 "with cause '%s' (%d)\n",
1010 get_value_string(gsm48_gmm_cause_names, gmm_cause),
1011 gmm_cause);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001012 gsm48_tx_gmm_detach_req(
Alexander Couzens13c13122018-05-22 20:28:18 +02001013 ctx, GPRS_DET_T_MT_IMSI, gmm_cause);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001014
1015 mm_ctx_cleanup_free(ctx, "auth lost");
1016 break;
1017 default:
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001018 LOGMMCTXP(LOGL_INFO, ctx,
1019 "Authorization lost, cause is '%s' (%d)\n",
1020 get_value_string(gsm48_gmm_cause_names, gmm_cause),
1021 gmm_cause);
1022 mm_ctx_cleanup_free(ctx, "auth lost");
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001023 }
1024}
1025
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001026void gsm0408_gprs_access_cancelled(struct sgsn_mm_ctx *ctx, int gmm_cause)
Jacob Erlbeck98647ca2014-11-11 14:47:38 +01001027{
Jacob Erlbeckd6267d12015-01-19 11:10:04 +01001028 if (gmm_cause != SGSN_ERROR_CAUSE_NONE) {
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001029 LOGMMCTXP(LOGL_INFO, ctx,
1030 "Cancelled with cause '%s' (%d), deleting context\n",
1031 get_value_string(gsm48_gmm_cause_names, gmm_cause),
1032 gmm_cause);
1033 gsm0408_gprs_access_denied(ctx, gmm_cause);
1034 return;
Jacob Erlbeck98647ca2014-11-11 14:47:38 +01001035 }
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001036
1037 LOGMMCTXP(LOGL_INFO, ctx, "Cancelled, deleting context silently\n");
Jacob Erlbeck98647ca2014-11-11 14:47:38 +01001038 mm_ctx_cleanup_free(ctx, "access cancelled");
1039}
1040
Harald Welte9b455bf2010-03-14 15:45:01 +08001041/* Parse Chapter 9.4.13 Identity Response */
Harald Welted193cb32010-05-17 22:58:03 +02001042static int gsm48_rx_gmm_id_resp(struct sgsn_mm_ctx *ctx, struct msgb *msg)
Harald Welte9b455bf2010-03-14 15:45:01 +08001043{
Harald Welte943c5bc2010-04-30 16:33:12 +02001044 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001045 long mi_typel;
1046 char mi_log_string[32];
1047 struct osmo_mobile_identity mi;
Harald Welte9b455bf2010-03-14 15:45:01 +08001048
Harald Welte9b455bf2010-03-14 15:45:01 +08001049 if (!ctx) {
Daniel Willmann46553142014-09-03 17:46:44 +02001050 DEBUGP(DMM, "from unknown TLLI 0x%08x?!? This should not happen\n", msgb_tlli(msg));
Harald Welte9b455bf2010-03-14 15:45:01 +08001051 return -EINVAL;
1052 }
1053
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001054 if (osmo_mobile_identity_decode(&mi, &gh->data[1], gh->data[0], false)) {
1055 LOGMMCTXP(LOGL_ERROR, ctx, "-> GMM IDENTITY RESPONSE: cannot decode Mobile Identity\n");
1056 return -EINVAL;
1057 }
1058 osmo_mobile_identity_to_str_buf(mi_log_string, sizeof(mi_log_string), &mi);
1059
1060 LOGMMCTXP(LOGL_DEBUG, ctx, "-> GMM IDENTITY RESPONSE: MI=%s\n", mi_log_string);
Daniel Willmannf8070f42014-09-23 18:48:44 +02001061
Jacob Erlbeckfb26c602014-10-22 12:20:26 +02001062 if (ctx->t3370_id_type == GSM_MI_TYPE_NONE) {
1063 LOGMMCTXP(LOGL_NOTICE, ctx,
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001064 "Got unexpected IDENTITY RESPONSE: MI=%s, "
Jacob Erlbeckfb26c602014-10-22 12:20:26 +02001065 "ignoring message\n",
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001066 mi_log_string);
Jacob Erlbeckfb26c602014-10-22 12:20:26 +02001067 return -EINVAL;
1068 }
1069
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001070 if (mi.type == ctx->t3370_id_type)
Harald Weltec2e8cc42010-05-31 20:23:38 +02001071 mmctx_timer_stop(ctx, 3370);
1072
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001073 switch (mi.type) {
Harald Welte9b455bf2010-03-14 15:45:01 +08001074 case GSM_MI_TYPE_IMSI:
1075 /* we already have a mm context with current TLLI, but no
1076 * P-TMSI / IMSI yet. What we now need to do is to fill
1077 * this initial context with data from the HLR */
Harald Weltec728eea2010-12-24 23:07:18 +01001078 if (strlen(ctx->imsi) == 0) {
1079 /* Check if we already have a MM context for this IMSI */
1080 struct sgsn_mm_ctx *ictx;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001081 ictx = sgsn_mm_ctx_by_imsi(mi.imsi);
Harald Weltec728eea2010-12-24 23:07:18 +01001082 if (ictx) {
Jacob Erlbeck99985b52014-10-13 10:32:00 +02001083 /* Handle it like in gsm48_rx_gmm_det_req,
1084 * except that no messages are sent to the BSS */
1085
Daniel Willmann46553142014-09-03 17:46:44 +02001086 LOGMMCTXP(LOGL_NOTICE, ctx, "Deleting old MM Context for same IMSI "
1087 "p_tmsi_old=0x%08x\n",
1088 ictx->p_tmsi);
Jacob Erlbeck99985b52014-10-13 10:32:00 +02001089
Jacob Erlbeck99985b52014-10-13 10:32:00 +02001090 mm_ctx_cleanup_free(ictx, "GPRS IMSI re-use");
Harald Weltec728eea2010-12-24 23:07:18 +01001091 }
1092 }
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001093 OSMO_STRLCPY_ARRAY(ctx->imsi, mi.imsi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001094 break;
1095 case GSM_MI_TYPE_IMEI:
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001096 OSMO_STRLCPY_ARRAY(ctx->imei, mi.imei);
Harald Welte9b455bf2010-03-14 15:45:01 +08001097 break;
1098 case GSM_MI_TYPE_IMEISV:
1099 break;
1100 }
1101
Harald Welte9b455bf2010-03-14 15:45:01 +08001102 /* Check if we can let the mobile station enter */
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001103 mi_typel = mi.type;
Alexander Couzensf7198d72018-05-22 18:29:14 +02001104 return osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_IDEN_RESP_RECV, (void *)mi_typel);
Harald Welte9b455bf2010-03-14 15:45:01 +08001105}
1106
Max86e04df2017-10-09 16:21:31 +02001107/* Allocate a new P-TMSI and change context state */
1108static inline void ptmsi_update(struct sgsn_mm_ctx *ctx)
1109{
1110 uint32_t ptmsi;
1111 /* Don't change the P-TMSI if a P-TMSI re-assignment is under way */
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001112 if (ctx->gmm_fsm->state != ST_GMM_COMMON_PROC_INIT) {
Max86e04df2017-10-09 16:21:31 +02001113 ptmsi = sgsn_alloc_ptmsi();
Max7ad8fa62017-10-09 16:26:43 +02001114 if (ptmsi != GSM_RESERVED_TMSI) {
1115 ctx->p_tmsi_old = ctx->p_tmsi;
1116 ctx->p_tmsi = ptmsi;
1117 } else
1118 LOGMMCTXP(LOGL_ERROR, ctx, "P-TMSI allocation failure: using old one.\n");
Max86e04df2017-10-09 16:21:31 +02001119 }
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001120 osmo_fsm_inst_dispatch(ctx->gmm_fsm, E_GMM_COMMON_PROC_INIT_REQ, NULL);
Max86e04df2017-10-09 16:21:31 +02001121}
1122
Daniel Willmannd999e542020-01-30 12:30:40 +01001123/* Detect if RAT has changed */
1124static bool mmctx_did_rat_change(struct sgsn_mm_ctx *mmctx, struct msgb *msg)
1125{
1126 if (MSG_IU_UE_CTX(msg) && mmctx->ran_type != MM_CTX_T_UTRAN_Iu)
1127 return true;
1128 if (!MSG_IU_UE_CTX(msg) && mmctx->ran_type != MM_CTX_T_GERAN_Gb)
1129 return true;
1130 return false;
1131}
1132
Alexander Couzens91a8bbd2019-09-11 03:38:14 +02001133/* Notify the FSM of a RAT change */
1134static void mmctx_handle_rat_change(struct sgsn_mm_ctx *mmctx, struct msgb *msg, struct gprs_llc_llme *llme)
1135{
1136 struct gmm_rat_change_data rat_chg = {
1137 .llme = llme
1138 };
1139
1140 rat_chg.new_ran_type = MSG_IU_UE_CTX(msg) ? MM_CTX_T_UTRAN_Iu : MM_CTX_T_GERAN_Gb;
1141
1142 if (rat_chg.new_ran_type != mmctx->ran_type)
1143 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_RAT_CHANGE, (void *) &rat_chg);
1144 else
1145 LOGMMCTXP(LOGL_ERROR, mmctx, "RAT didn't change or not implemented (ran_type=%u, "
1146 "msg_iu_ue_ctx=%p\n", mmctx->ran_type, MSG_IU_UE_CTX(msg));
1147
1148}
1149
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001150/* 3GPP TS 24.008 § 9.4.1 Attach request */
Harald Welte807a5d82010-06-01 11:53:01 +02001151static int gsm48_rx_gmm_att_req(struct sgsn_mm_ctx *ctx, struct msgb *msg,
1152 struct gprs_llc_llme *llme)
Harald Welte9b455bf2010-03-14 15:45:01 +08001153{
Harald Welte943c5bc2010-04-30 16:33:12 +02001154 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001155 uint8_t *cur = gh->data, *msnc, *mi_data, *ms_ra_acc_cap;
1156 uint8_t msnc_len, att_type, mi_len, ms_ra_acc_cap_len;
Harald Welteeaa614c2010-05-02 11:26:34 +02001157 uint16_t drx_par;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001158 char mi_log_string[32];
Harald Welte9b455bf2010-03-14 15:45:01 +08001159 struct gprs_ra_id ra_id;
Daniel Willmann61329d42016-05-21 17:36:18 +02001160 uint16_t cid = 0;
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001161 enum gsm48_gmm_cause reject_cause;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001162 struct osmo_mobile_identity mi;
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001163 int rc;
Harald Welte9b455bf2010-03-14 15:45:01 +08001164
Harald Welteeb98c742015-08-16 17:11:32 +02001165 LOGMMCTXP(LOGL_INFO, ctx, "-> GMM ATTACH REQUEST ");
Alexander Couzens14314bd2016-07-05 09:52:52 +02001166 rate_ctr_inc(&sgsn->rate_ctrs->ctr[CTR_GPRS_ATTACH_REQUEST]);
Harald Welte9b455bf2010-03-14 15:45:01 +08001167
1168 /* As per TS 04.08 Chapter 4.7.1.4, the attach request arrives either
1169 * with a foreign TLLI (P-TMSI that was allocated to the MS before),
1170 * or with random TLLI. */
1171
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001172 if (!MSG_IU_UE_CTX(msg)) {
Daniel Willmann61329d42016-05-21 17:36:18 +02001173 /* Gb mode */
1174 cid = bssgp_parse_cell_id(&ra_id, msgb_bcid(msg));
Neels Hofmeyra7a39472017-07-05 15:19:52 +02001175 } else {
1176#ifdef BUILD_IU
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001177 ra_id = MSG_IU_UE_CTX(msg)->ra_id;
Neels Hofmeyra7a39472017-07-05 15:19:52 +02001178#else
1179 LOGMMCTXP(LOGL_ERROR, ctx, "Cannot handle Iu Attach Request, built without Iu support\n");
1180 return -ENOTSUP;
1181#endif
1182 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001183
1184 /* MS network capability 10.5.5.12 */
1185 msnc_len = *cur++;
1186 msnc = cur;
Alexander Chemeris84402c02013-07-03 10:12:23 +04001187 if (msnc_len > sizeof(ctx->ms_network_capa.buf))
Harald Welte9b455bf2010-03-14 15:45:01 +08001188 goto err_inval;
1189 cur += msnc_len;
1190
Alexander Couzensc44af532019-08-12 18:29:57 +02001191 /* TODO: In iu mode - handle follow-on request.
1192 * The follow-on request can be signaled in an Attach Request on IuPS.
1193 * This means the MS/UE asks to keep the PS connection open for further requests
1194 * after the Attach Request succeed.
1195 * The SGSN can decide if it close the connection or not. Both are spec conform. */
Daniel Willmann746c7892016-01-25 16:49:53 +01001196
Harald Welte9b455bf2010-03-14 15:45:01 +08001197 /* aTTACH Type 10.5.5.2 */
Daniel Willmann746c7892016-01-25 16:49:53 +01001198 att_type = *cur++ & 0x07;
Harald Welte9b455bf2010-03-14 15:45:01 +08001199
1200 /* DRX parameter 10.5.5.6 */
Harald Welte56a01452010-05-31 22:12:30 +02001201 drx_par = *cur++ << 8;
1202 drx_par |= *cur++;
Harald Welte9b455bf2010-03-14 15:45:01 +08001203
1204 /* Mobile Identity (P-TMSI or IMSI) 10.5.1.4 */
1205 mi_len = *cur++;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001206 mi_data = cur;
Harald Welte9b455bf2010-03-14 15:45:01 +08001207 cur += mi_len;
1208
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001209 rc = osmo_mobile_identity_decode(&mi, mi_data, mi_len, false);
1210 if (rc)
1211 goto err_inval;
1212 osmo_mobile_identity_to_str_buf(mi_log_string, sizeof(mi_log_string), &mi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001213
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001214 DEBUGPC(DMM, "MI(%s) type=\"%s\" ", mi_log_string,
Harald Welte2720e732010-05-17 00:44:57 +02001215 get_value_string(gprs_att_t_strs, att_type));
Harald Welte9b455bf2010-03-14 15:45:01 +08001216
Holger Hans Peter Freyther1768a572014-04-04 12:40:34 +02001217 /* Old routing area identification 10.5.5.15. Skip it */
Harald Welte9b455bf2010-03-14 15:45:01 +08001218 cur += 6;
1219
1220 /* MS Radio Access Capability 10.5.5.12a */
Harald Welte56a01452010-05-31 22:12:30 +02001221 ms_ra_acc_cap_len = *cur++;
1222 ms_ra_acc_cap = cur;
Alexander Chemeris84402c02013-07-03 10:12:23 +04001223 if (ms_ra_acc_cap_len > sizeof(ctx->ms_radio_access_capa.buf))
Harald Weltec48ac472010-07-03 21:20:06 +02001224 goto err_inval;
Harald Welte4b2ed352011-07-27 23:35:38 +02001225 cur += ms_ra_acc_cap_len;
Harald Welte9b455bf2010-03-14 15:45:01 +08001226
Daniel Willmann46553142014-09-03 17:46:44 +02001227 LOGPC(DMM, LOGL_INFO, "\n");
1228
Harald Welte9b455bf2010-03-14 15:45:01 +08001229 /* Optional: Old P-TMSI Signature, Requested READY timer, TMSI Status */
1230
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001231 switch (mi.type) {
Harald Welte9b455bf2010-03-14 15:45:01 +08001232 case GSM_MI_TYPE_IMSI:
1233 /* Try to find MM context based on IMSI */
Harald Welte807a5d82010-06-01 11:53:01 +02001234 if (!ctx)
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001235 ctx = sgsn_mm_ctx_by_imsi(mi.imsi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001236 if (!ctx) {
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001237 if (MSG_IU_UE_CTX(msg))
1238 ctx = sgsn_mm_ctx_alloc_iu(MSG_IU_UE_CTX(msg));
Daniel Willmann61329d42016-05-21 17:36:18 +02001239 else
Alexander Couzens2b5fb8e2017-02-04 06:01:00 +01001240 ctx = sgsn_mm_ctx_alloc_gb(0, &ra_id);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001241 if (!ctx) {
1242 reject_cause = GMM_CAUSE_NET_FAIL;
1243 goto rejected;
1244 }
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001245 OSMO_STRLCPY_ARRAY(ctx->imsi, mi.imsi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001246 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001247 break;
1248 case GSM_MI_TYPE_TMSI:
Harald Welte9b455bf2010-03-14 15:45:01 +08001249 /* Try to find MM context based on P-TMSI */
Harald Welte807a5d82010-06-01 11:53:01 +02001250 if (!ctx)
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001251 ctx = sgsn_mm_ctx_by_ptmsi(mi.tmsi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001252 if (!ctx) {
Harald Weltec728eea2010-12-24 23:07:18 +01001253 /* Allocate a context as most of our code expects one.
1254 * Context will not have an IMSI ultil ID RESP is received */
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001255 if (MSG_IU_UE_CTX(msg))
1256 ctx = sgsn_mm_ctx_alloc_iu(MSG_IU_UE_CTX(msg));
Daniel Willmann61329d42016-05-21 17:36:18 +02001257 else
Alexander Couzens2b5fb8e2017-02-04 06:01:00 +01001258 ctx = sgsn_mm_ctx_alloc_gb(msgb_tlli(msg), &ra_id);
Neels Hofmeyraa7af4d2017-12-20 00:41:27 +01001259 if (!ctx) {
1260 reject_cause = GMM_CAUSE_NET_FAIL;
1261 goto rejected;
1262 }
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001263 ctx->p_tmsi = mi.tmsi;
Harald Welte9b455bf2010-03-14 15:45:01 +08001264 }
1265 break;
1266 default:
Harald Welteeb98c742015-08-16 17:11:32 +02001267 LOGMMCTXP(LOGL_NOTICE, ctx, "Rejecting ATTACH REQUEST with "
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001268 "MI %s\n", mi_log_string);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001269 reject_cause = GMM_CAUSE_MS_ID_NOT_DERIVED;
1270 goto rejected;
Harald Welte9b455bf2010-03-14 15:45:01 +08001271 }
Alexander Couzens4ec21762019-08-13 11:31:42 +02001272
Alexander Couzens91a8bbd2019-09-11 03:38:14 +02001273 if (mmctx_did_rat_change(ctx, msg))
1274 mmctx_handle_rat_change(ctx, msg, llme);
1275
Alexander Couzens4ec21762019-08-13 11:31:42 +02001276 if (ctx->ran_type == MM_CTX_T_GERAN_Gb) {
1277 ctx->gb.tlli = msgb_tlli(msg);
1278 ctx->gb.llme = llme;
1279 }
1280 msgid2mmctx(ctx, msg);
Harald Welte9f1f3ad2010-05-02 12:56:57 +02001281 /* Update MM Context with currient RA and Cell ID */
1282 ctx->ra = ra_id;
Harald Weltedbc72b32015-12-25 22:23:27 +01001283 if (ctx->ran_type == MM_CTX_T_GERAN_Gb)
1284 ctx->gb.cell_id = cid;
Daniel Willmann770f3e32016-05-21 00:31:12 +02001285
Harald Welte56a01452010-05-31 22:12:30 +02001286 /* Update MM Context with other data */
1287 ctx->drx_parms = drx_par;
Alexander Chemeris84402c02013-07-03 10:12:23 +04001288 ctx->ms_radio_access_capa.len = ms_ra_acc_cap_len;
Harald Welte4b2ed352011-07-27 23:35:38 +02001289 memcpy(ctx->ms_radio_access_capa.buf, ms_ra_acc_cap,
1290 ctx->ms_radio_access_capa.len);
Harald Welte56a01452010-05-31 22:12:30 +02001291 ctx->ms_network_capa.len = msnc_len;
1292 memcpy(ctx->ms_network_capa.buf, msnc, msnc_len);
Maxb997f842016-07-06 15:57:01 +02001293 if (!gprs_ms_net_cap_gea_supported(ctx->ms_network_capa.buf, msnc_len,
1294 ctx->ciph_algo)) {
1295 reject_cause = GMM_CAUSE_PROTO_ERR_UNSPEC;
1296 LOGMMCTXP(LOGL_NOTICE, ctx, "Rejecting ATTACH REQUEST with MI "
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001297 "%s because MS do not support required %s "
1298 "encryption\n", mi_log_string,
Maxb997f842016-07-06 15:57:01 +02001299 get_value_string(gprs_cipher_names,ctx->ciph_algo));
1300 goto rejected;
1301 }
Harald Weltec2e8cc42010-05-31 20:23:38 +02001302#ifdef PTMSI_ALLOC
Harald Welte807a5d82010-06-01 11:53:01 +02001303 /* Allocate a new P-TMSI (+ P-TMSI signature) and update TLLI */
Max86e04df2017-10-09 16:21:31 +02001304 ptmsi_update(ctx);
Harald Welteab1d5622010-05-18 19:58:38 +02001305#endif
Harald Welte807a5d82010-06-01 11:53:01 +02001306
Harald Weltedbc72b32015-12-25 22:23:27 +01001307 if (ctx->ran_type == MM_CTX_T_GERAN_Gb) {
1308 /* Even if there is no P-TMSI allocated, the MS will
1309 * switch from foreign TLLI to local TLLI */
1310 ctx->gb.tlli_new = gprs_tmsi2tlli(ctx->p_tmsi, TLLI_LOCAL);
1311
1312 /* Inform LLC layer about new TLLI but keep old active */
Neels Hofmeyraa4ed672018-04-22 19:29:41 +02001313 if (sgsn_mm_ctx_is_authenticated(ctx))
Max5aa51962016-07-06 11:33:04 +02001314 gprs_llme_copy_key(ctx, ctx->gb.llme);
1315
1316 gprs_llgmm_assign(ctx->gb.llme, ctx->gb.tlli, ctx->gb.tlli_new);
Harald Weltedbc72b32015-12-25 22:23:27 +01001317 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001318
Alexander Couzensf7198d72018-05-22 18:29:14 +02001319 osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_ATTACH_REQ_RECV, msg);
1320 return 0;
Harald Welte9b455bf2010-03-14 15:45:01 +08001321
1322err_inval:
Daniel Willmann46553142014-09-03 17:46:44 +02001323 LOGPC(DMM, LOGL_INFO, "\n");
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001324 reject_cause = GMM_CAUSE_SEM_INCORR_MSG;
1325
1326rejected:
1327 /* Send ATTACH REJECT */
1328 LOGMMCTXP(LOGL_NOTICE, ctx,
1329 "Rejecting Attach Request with cause '%s' (%d)\n",
Jacob Erlbeckafcf2302015-01-05 17:30:02 +01001330 get_value_string(gsm48_gmm_cause_names, reject_cause), reject_cause);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001331 rc = gsm48_tx_gmm_att_rej_oldmsg(msg, reject_cause);
1332 if (ctx)
1333 mm_ctx_cleanup_free(ctx, "GPRS ATTACH REJ");
Neels Hofmeyrceccd462017-12-20 16:21:45 +01001334 else if (llme)
Max39550252016-06-28 17:39:20 +02001335 gprs_llgmm_unassign(llme);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001336
1337 return rc;
1338
Harald Welte9b455bf2010-03-14 15:45:01 +08001339}
1340
Pau Espin Pedrola0bcfad2019-09-02 13:27:35 +02001341/* 3GPP TS 24.008 § 9.4.3 Attach complete */
1342static int gsm48_rx_gmm_att_compl(struct sgsn_mm_ctx *mmctx)
1343{
1344 struct sgsn_signal_data sig_data;
1345 /* only in case SGSN offered new P-TMSI */
1346 LOGMMCTXP(LOGL_INFO, mmctx, "-> ATTACH COMPLETE\n");
1347
1348 #ifdef BUILD_IU
1349 if (mmctx->iu.ue_ctx) {
1350 ranap_iu_tx_release(mmctx->iu.ue_ctx, NULL);
1351 }
1352 #endif
1353
1354 mmctx_timer_stop(mmctx, 3350);
1355 mmctx->t3350_mode = GMM_T3350_MODE_NONE;
1356 mmctx->p_tmsi_old = 0;
1357 mmctx->pending_req = 0;
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001358 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_ATTACH_SUCCESS, NULL);
Pau Espin Pedrola0bcfad2019-09-02 13:27:35 +02001359 switch(mmctx->ran_type) {
1360 case MM_CTX_T_UTRAN_Iu:
1361 osmo_fsm_inst_dispatch(mmctx->iu.mm_state_fsm, E_PMM_PS_ATTACH, NULL);
1362 break;
1363 case MM_CTX_T_GERAN_Gb:
1364 /* Unassign the old TLLI */
1365 mmctx->gb.tlli = mmctx->gb.tlli_new;
1366 gprs_llme_copy_key(mmctx, mmctx->gb.llme);
1367 gprs_llgmm_assign(mmctx->gb.llme, TLLI_UNASSIGNED,
1368 mmctx->gb.tlli_new);
1369 osmo_fsm_inst_dispatch(mmctx->gb.mm_state_fsm, E_MM_GPRS_ATTACH, NULL);
1370 break;
1371 }
1372
1373 osmo_fsm_inst_dispatch(mmctx->gmm_att_req.fsm, E_ATTACH_COMPLETE_RECV, 0);
1374 memset(&sig_data, 0, sizeof(sig_data));
1375 sig_data.mm = mmctx;
1376 osmo_signal_dispatch(SS_SGSN, S_SGSN_ATTACH, &sig_data);
1377
1378 return 0;
1379}
Alexander Couzensf7198d72018-05-22 18:29:14 +02001380
1381/* Checks if two attach request contain the IEs and IE values
1382 * return 0 if equal
1383 * return -1 if error
1384 * return 1 if unequal
1385 *
1386 * Only do a simple memcmp for now.
1387 */
1388int gprs_gmm_attach_req_ies(struct msgb *a, struct msgb *b)
1389{
1390 struct gsm48_hdr *gh_a = (struct gsm48_hdr *) msgb_gmmh(a);
1391 struct gsm48_hdr *gh_b = (struct gsm48_hdr *) msgb_gmmh(b);
1392
1393#define GMM_ATTACH_REQ_LEN 26
1394
1395 /* there is the LLC FCS behind */
1396 if (msgb_l3len(a) < GMM_ATTACH_REQ_LEN || msgb_l3len(b) < GMM_ATTACH_REQ_LEN)
1397 return -1;
1398
1399 return !!memcmp(gh_a, gh_b, GMM_ATTACH_REQ_LEN);
1400}
1401
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001402/* 3GPP TS 24.008 § 4.7.4.1 / 9.4.5.2 MO Detach request */
Harald Welted193cb32010-05-17 22:58:03 +02001403static int gsm48_rx_gmm_det_req(struct sgsn_mm_ctx *ctx, struct msgb *msg)
Harald Welte2720e732010-05-17 00:44:57 +02001404{
1405 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Harald Welte2720e732010-05-17 00:44:57 +02001406 uint8_t detach_type, power_off;
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02001407 int rc = 0;
Harald Welte2720e732010-05-17 00:44:57 +02001408
1409 detach_type = gh->data[0] & 0x7;
1410 power_off = gh->data[0] & 0x8;
1411
1412 /* FIXME: In 24.008 there is an optional P-TMSI and P-TMSI signature IE */
Alexander Couzens14314bd2016-07-05 09:52:52 +02001413 rate_ctr_inc(&sgsn->rate_ctrs->ctr[CTR_GPRS_DETACH_REQUEST]);
Daniel Willmann46553142014-09-03 17:46:44 +02001414 LOGMMCTXP(LOGL_INFO, ctx, "-> GMM DETACH REQUEST TLLI=0x%08x type=%s %s\n",
Harald Welte2720e732010-05-17 00:44:57 +02001415 msgb_tlli(msg), get_value_string(gprs_det_t_mo_strs, detach_type),
1416 power_off ? "Power-off" : "");
1417
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02001418 /* Only send the Detach Accept (MO) if power off isn't indicated,
Jacob Erlbeckb9ab0d42014-10-21 09:52:05 +02001419 * see 04.08, 4.7.4.1.2/3 for details */
1420 if (!power_off) {
1421 /* force_stby = 0 */
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02001422 if (ctx)
1423 rc = gsm48_tx_gmm_det_ack(ctx, 0);
1424 else
1425 rc = gsm48_tx_gmm_det_ack_oldmsg(msg, 0);
Jacob Erlbeckb9ab0d42014-10-21 09:52:05 +02001426 }
Harald Weltebd5c9122010-06-28 22:18:53 +02001427
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +02001428 if (ctx) {
1429 struct sgsn_signal_data sig_data;
1430 memset(&sig_data, 0, sizeof(sig_data));
1431 sig_data.mm = ctx;
1432 osmo_signal_dispatch(SS_SGSN, S_SGSN_DETACH, &sig_data);
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02001433 mm_ctx_cleanup_free(ctx, "GPRS DETACH REQUEST");
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +02001434 }
Jacob Erlbeck258ce3d2014-09-30 13:51:45 +02001435
Harald Weltebd5c9122010-06-28 22:18:53 +02001436 return rc;
Harald Welte2720e732010-05-17 00:44:57 +02001437}
1438
Harald Welte9b455bf2010-03-14 15:45:01 +08001439/* Chapter 9.4.15: Routing area update accept */
Harald Welte6463c072010-05-18 17:04:55 +02001440static int gsm48_tx_gmm_ra_upd_ack(struct sgsn_mm_ctx *mm)
Harald Welte9b455bf2010-03-14 15:45:01 +08001441{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +01001442 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 UPD ACK");
Harald Welte9b455bf2010-03-14 15:45:01 +08001443 struct gsm48_hdr *gh;
1444 struct gsm48_ra_upd_ack *rua;
Pau Espin Pedrola299d652019-08-14 19:11:10 +02001445 unsigned long t;
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +01001446#ifdef PTMSI_ALLOC
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001447 uint8_t *l;
1448 int rc;
1449 struct osmo_mobile_identity mi;
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +01001450#endif
Harald Welte9b455bf2010-03-14 15:45:01 +08001451
Alexander Couzens14314bd2016-07-05 09:52:52 +02001452 rate_ctr_inc(&sgsn->rate_ctrs->ctr[CTR_GPRS_ROUTING_AREA_ACKED]);
Daniel Willmann46553142014-09-03 17:46:44 +02001453 LOGMMCTXP(LOGL_INFO, mm, "<- ROUTING AREA UPDATE ACCEPT\n");
Harald Welte9b455bf2010-03-14 15:45:01 +08001454
Harald Welte6463c072010-05-18 17:04:55 +02001455 mmctx2msgid(msg, mm);
Harald Welte9b455bf2010-03-14 15:45:01 +08001456
1457 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
1458 gh->proto_discr = GSM48_PDISC_MM_GPRS;
1459 gh->msg_type = GSM48_MT_GMM_RA_UPD_ACK;
1460
1461 rua = (struct gsm48_ra_upd_ack *) msgb_put(msg, sizeof(*rua));
1462 rua->force_stby = 0; /* not indicated */
1463 rua->upd_result = 0; /* RA updated */
Pau Espin Pedrola299d652019-08-14 19:11:10 +02001464 t = osmo_tdef_get(sgsn->cfg.T_defs, 3312, OSMO_TDEF_S, -1);
1465 rua->ra_upd_timer = gprs_secs_to_tmr_floor(t);
Harald Welte11d7c102010-05-02 11:54:55 +02001466
Max25c65c32018-01-08 14:43:53 +01001467 gsm48_encode_ra(&rua->ra_id, &mm->ra);
Harald Welte9b455bf2010-03-14 15:45:01 +08001468
Harald Weltec2e8cc42010-05-31 20:23:38 +02001469#if 0
1470 /* Optional: P-TMSI signature */
1471 msgb_v_put(msg, GSM48_IE_GMM_PTMSI_SIG);
1472 ptsig = msgb_put(msg, 3);
1473 ptsig[0] = mm->p_tmsi_sig >> 16;
1474 ptsig[1] = mm->p_tmsi_sig >> 8;
1475 ptsig[2] = mm->p_tmsi_sig & 0xff;
1476#endif
1477
1478#ifdef PTMSI_ALLOC
1479 /* Optional: Allocated P-TMSI */
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001480 mi = (struct osmo_mobile_identity){
1481 .type = GSM_MI_TYPE_TMSI,
1482 .tmsi = mm->p_tmsi,
1483 };
1484 l = msgb_tl_put(msg, GSM48_IE_GMM_ALLOC_PTMSI);
1485 rc = osmo_mobile_identity_encode_msgb(msg, &mi, false);
1486 if (rc < 0) {
1487 msgb_free(msg);
1488 return -EINVAL;
1489 }
1490 *l = rc;
Harald Weltec2e8cc42010-05-31 20:23:38 +02001491#endif
1492
Jacob Erlbeck8de9c482015-01-23 11:44:39 +01001493 /* Optional: Negotiated READY timer value */
Pau Espin Pedrola299d652019-08-14 19:11:10 +02001494 t = osmo_tdef_get(sgsn->cfg.T_defs, 3314, OSMO_TDEF_S, -1);
1495 msgb_tv_put(msg, GSM48_IE_GMM_TIMER_READY, gprs_secs_to_tmr_floor(t));
Jacob Erlbeck8de9c482015-01-23 11:44:39 +01001496
Harald Weltec2e8cc42010-05-31 20:23:38 +02001497 /* Option: MS ID, ... */
Max82040102016-07-06 11:59:18 +02001498 return gsm48_gmm_sendmsg(msg, 0, mm, true);
Harald Welte9b455bf2010-03-14 15:45:01 +08001499}
1500
1501/* Chapter 9.4.17: Routing area update reject */
Alexander Couzensd4788cd2018-05-02 22:32:19 +02001502int gsm48_tx_gmm_ra_upd_rej(struct msgb *old_msg, uint8_t cause)
Harald Welte9b455bf2010-03-14 15:45:01 +08001503{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +01001504 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 RA UPD REJ");
Harald Welte9b455bf2010-03-14 15:45:01 +08001505 struct gsm48_hdr *gh;
1506
Daniel Willmann46553142014-09-03 17:46:44 +02001507 LOGP(DMM, LOGL_NOTICE, "<- ROUTING AREA UPDATE REJECT\n");
Alexander Couzens14314bd2016-07-05 09:52:52 +02001508 rate_ctr_inc(&sgsn->rate_ctrs->ctr[CTR_GPRS_ROUTING_AREA_REJECT]);
Harald Welte9b455bf2010-03-14 15:45:01 +08001509
Harald Welte11d7c102010-05-02 11:54:55 +02001510 gmm_copy_id(msg, old_msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08001511
1512 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 2);
1513 gh->proto_discr = GSM48_PDISC_MM_GPRS;
1514 gh->msg_type = GSM48_MT_GMM_RA_UPD_REJ;
1515 gh->data[0] = cause;
1516 gh->data[1] = 0; /* ? */
1517
1518 /* Option: P-TMSI signature, allocated P-TMSI, MS ID, ... */
Max82040102016-07-06 11:59:18 +02001519 return gsm48_gmm_sendmsg(msg, 0, NULL, false);
Harald Welte9b455bf2010-03-14 15:45:01 +08001520}
1521
Harald Welte588d44e2010-06-09 10:28:29 +02001522static void process_ms_ctx_status(struct sgsn_mm_ctx *mmctx,
Holger Hans Peter Freyther2b174542011-10-14 23:31:34 +02001523 const uint8_t *pdp_status)
Harald Welte588d44e2010-06-09 10:28:29 +02001524{
1525 struct sgsn_pdp_ctx *pdp, *pdp2;
1526 /* 24.008 4.7.5.1.3: If the PDP context status information element is
1527 * included in ROUTING AREA UPDATE REQUEST message, then the network
1528 * shall deactivate all those PDP contexts locally (without peer to
1529 * peer signalling between the MS and the network), which are not in SM
1530 * state PDP-INACTIVE on network side but are indicated by the MS as
1531 * being in state PDP-INACTIVE. */
1532
1533 llist_for_each_entry_safe(pdp, pdp2, &mmctx->pdp_list, list) {
Pau Espin Pedrol25998dd2020-10-23 13:11:02 +02001534 bool inactive = (pdp->nsapi < 8) ?
1535 !(pdp_status[0] & (1 << pdp->nsapi)) :
1536 !(pdp_status[1] & (1 << (pdp->nsapi - 8)));
1537 if (!inactive)
1538 continue;
1539
1540 LOGMMCTXP(LOGL_NOTICE, mmctx, "Dropping PDP context for NSAPI=%u "
1541 "due to PDP CTX STATUS IE=0x%02x%02x\n",
1542 pdp->nsapi, pdp_status[1], pdp_status[0]);
Pau Espin Pedrol08395b32020-10-23 13:25:10 +02001543 if (pdp->ggsn)
1544 sgsn_delete_pdp_ctx(pdp);
1545 else /* GTP side already detached, freeing */
1546 sgsn_pdp_ctx_free(pdp);
Harald Welte588d44e2010-06-09 10:28:29 +02001547 }
1548}
1549
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001550/* 3GPP TS 24.008 § 4.7.13.4 Service request procedure not accepted by the
efistokldef0d942019-04-23 14:37:13 +03001551 * network. Returns true if MS has active PDP contexts in pdp_status */
1552bool pdp_status_has_active_nsapis(const uint8_t *pdp_status, const size_t pdp_status_len)
1553{
1554 size_t i;
1555
1556 for (i = 0; i < pdp_status_len; i++)
1557 if (pdp_status[i] != 0)
1558 return true;
1559
1560 return false;
1561}
1562
Harald Welte9b455bf2010-03-14 15:45:01 +08001563/* Chapter 9.4.14: Routing area update request */
Harald Welte807a5d82010-06-01 11:53:01 +02001564static int gsm48_rx_gmm_ra_upd_req(struct sgsn_mm_ctx *mmctx, struct msgb *msg,
1565 struct gprs_llc_llme *llme)
Harald Welte9b455bf2010-03-14 15:45:01 +08001566{
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +02001567#ifndef PTMSI_ALLOC
1568 struct sgsn_signal_data sig_data;
1569#endif
Harald Welte943c5bc2010-04-30 16:33:12 +02001570 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Harald Welteeaa614c2010-05-02 11:26:34 +02001571 uint8_t *cur = gh->data;
Harald Welte588d44e2010-06-09 10:28:29 +02001572 uint8_t ms_ra_acc_cap_len;
Harald Welte9b455bf2010-03-14 15:45:01 +08001573 struct gprs_ra_id old_ra_id;
Harald Welte588d44e2010-06-09 10:28:29 +02001574 struct tlv_parsed tp;
Harald Welteeaa614c2010-05-02 11:26:34 +02001575 uint8_t upd_type;
Philipp Maier6934a0f2017-01-25 12:19:08 +01001576 enum gsm48_gmm_cause reject_cause = GMM_CAUSE_PROTO_ERR_UNSPEC;
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001577 int rc;
Harald Welte9b455bf2010-03-14 15:45:01 +08001578
Alexander Couzensc44af532019-08-12 18:29:57 +02001579 /* TODO: In iu mode - handle follow-on request.
1580 * The follow-on request can be signaled in an Attach Request on IuPS.
1581 * This means the MS/UE asks to keep the PS connection open for further requests
1582 * after the Attach Request succeed.
1583 * The SGSN can decide if it close the connection or not. Both are spec conform. */
Daniel Willmann746c7892016-01-25 16:49:53 +01001584
Harald Welte9b455bf2010-03-14 15:45:01 +08001585 /* Update Type 10.5.5.18 */
Daniel Willmann746c7892016-01-25 16:49:53 +01001586 upd_type = *cur++ & 0x07;
Harald Welte9b455bf2010-03-14 15:45:01 +08001587
Alexander Couzens14314bd2016-07-05 09:52:52 +02001588 rate_ctr_inc(&sgsn->rate_ctrs->ctr[CTR_GPRS_ROUTING_AREA_REQUEST]);
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001589 LOGMMCTXP(LOGL_INFO, mmctx, "-> GMM RA UPDATE REQUEST type=\"%s\"\n",
Harald Welte2720e732010-05-17 00:44:57 +02001590 get_value_string(gprs_upd_t_strs, upd_type));
Harald Welte9b455bf2010-03-14 15:45:01 +08001591
1592 /* Old routing area identification 10.5.5.15 */
1593 gsm48_parse_ra(&old_ra_id, cur);
1594 cur += 6;
1595
1596 /* MS Radio Access Capability 10.5.5.12a */
Harald Welte588d44e2010-06-09 10:28:29 +02001597 ms_ra_acc_cap_len = *cur++;
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001598 if (ms_ra_acc_cap_len > 52) {
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001599 LOGMMCTXP(LOGL_ERROR, mmctx,
Neels Hofmeyr7554fd12018-04-23 17:07:18 +02001600 "Rejecting GMM RA Update Request: MS Radio Access Capability too long"
1601 " (ms_ra_acc_cap_len = %u > 52)\n", ms_ra_acc_cap_len);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001602 reject_cause = GMM_CAUSE_PROTO_ERR_UNSPEC;
1603 goto rejected;
1604 }
Harald Welte4b2ed352011-07-27 23:35:38 +02001605 cur += ms_ra_acc_cap_len;
Harald Welte9b455bf2010-03-14 15:45:01 +08001606
1607 /* Optional: Old P-TMSI Signature, Requested READY timer, TMSI Status,
1608 * DRX parameter, MS network capability */
Holger Hans Peter Freyther1768a572014-04-04 12:40:34 +02001609 tlv_parse(&tp, &gsm48_gmm_att_tlvdef, cur,
Harald Welte588d44e2010-06-09 10:28:29 +02001610 (msg->data + msg->len) - cur, 0, 0);
Harald Welte9b455bf2010-03-14 15:45:01 +08001611
1612 switch (upd_type) {
1613 case GPRS_UPD_T_RA_LA:
1614 case GPRS_UPD_T_RA_LA_IMSI_ATT:
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001615 LOGMMCTXP(LOGL_NOTICE, mmctx, "Update type %i unsupported in Mode III, is your SI13 corrupt?\n", upd_type);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001616 reject_cause = GMM_CAUSE_PROTO_ERR_UNSPEC;
1617 goto rejected;
Harald Welte9b455bf2010-03-14 15:45:01 +08001618 case GPRS_UPD_T_RA:
1619 case GPRS_UPD_T_PERIODIC:
1620 break;
1621 }
1622
Jacob Erlbeckd35957a2016-01-04 18:43:36 +01001623 if (!mmctx) {
1624 /* BSSGP doesn't give us an mmctx */
1625
1626 /* TODO: Check if there is an MM CTX with old_ra_id and
1627 * the P-TMSI (if given, reguired for UMTS) or as last resort
1628 * if the TLLI matches foreign_tlli (P-TMSI). Note that this
1629 * is an optimization to avoid the RA reject (impl detached)
1630 * below, which will cause a new attach cycle. */
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001631 /* Look-up the MM context based on old RA-ID and TLLI */
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001632 if (!MSG_IU_UE_CTX(msg)) {
1633 /* Gb */
Daniel Willmann61329d42016-05-21 17:36:18 +02001634 mmctx = sgsn_mm_ctx_by_tlli_and_ptmsi(msgb_tlli(msg), &old_ra_id);
1635 } else if (TLVP_PRESENT(&tp, GSM48_IE_GMM_ALLOC_PTMSI)) {
1636#ifdef BUILD_IU
1637 /* In Iu mode search only for ptmsi */
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001638 struct osmo_mobile_identity mi;
1639 if (osmo_mobile_identity_decode(&mi, TLVP_VAL(&tp, GSM48_IE_GMM_ALLOC_PTMSI),
1640 TLVP_LEN(&tp, GSM48_IE_GMM_ALLOC_PTMSI), false)
1641 || mi.type != GSM_MI_TYPE_TMSI) {
1642 LOGIUP(MSG_IU_UE_CTX(msg), LOGL_ERROR, "Cannot decode P-TMSI\n");
1643 goto rejected;
Daniel Willmann61329d42016-05-21 17:36:18 +02001644 }
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001645 mmctx = sgsn_mm_ctx_by_ptmsi(mi.tmsi);
Daniel Willmann61329d42016-05-21 17:36:18 +02001646#else
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001647 LOGIUP(MSG_IU_UE_CTX(msg), LOGL_ERROR,
1648 "Rejecting GMM RA Update Request: No Iu support\n");
Daniel Willmann61329d42016-05-21 17:36:18 +02001649 goto rejected;
1650#endif
1651 }
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001652 if (mmctx) {
1653 LOGMMCTXP(LOGL_INFO, mmctx,
1654 "Looked up by matching TLLI and P_TMSI. "
1655 "BSSGP TLLI: %08x, P-TMSI: %08x (%08x), "
Neels Hofmeyr10719b72018-02-21 00:39:36 +01001656 "TLLI: %08x (%08x), RA: %s\n",
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001657 msgb_tlli(msg),
1658 mmctx->p_tmsi, mmctx->p_tmsi_old,
Harald Weltef97ee042015-12-25 19:12:21 +01001659 mmctx->gb.tlli, mmctx->gb.tlli_new,
Neels Hofmeyr10719b72018-02-21 00:39:36 +01001660 osmo_rai_name(&mmctx->ra));
Alexander Couzens91a8bbd2019-09-11 03:38:14 +02001661 /* A RAT change will trigger the common procedure
1662 * below after handling the RAT change. Protect it
1663 * here from being called twice */
1664 if (!mmctx_did_rat_change(mmctx, msg))
1665 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_COMMON_PROC_INIT_REQ, NULL);
1666
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001667 }
1668 } else if (!gprs_ra_id_equals(&mmctx->ra, &old_ra_id) ||
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001669 mmctx->gmm_fsm->state == ST_GMM_DEREGISTERED)
Jacob Erlbeckd35957a2016-01-04 18:43:36 +01001670 {
Alexander Couzens27a0bf72020-09-18 15:37:56 +02001671 /* We've received either a RAU for a MS which isn't registered
1672 * or a RAU with an unknown RA ID. As long the SGSN doesn't support
1673 * PS handover we treat this as invalid RAU */
1674 struct gprs_ra_id new_ra_id;
1675 char new_ra[32];
1676
1677 bssgp_parse_cell_id(&new_ra_id, msgb_bcid(msg));
1678 osmo_rai_name_buf(new_ra, sizeof(new_ra), &new_ra_id);
1679
1680 if (mmctx->gmm_fsm->state == ST_GMM_DEREGISTERED)
1681 LOGMMCTXP(LOGL_INFO, mmctx,
1682 "Rejecting RAU - GMM state is deregistered. Old RA: %s New RA: %s\n",
1683 osmo_rai_name(&old_ra_id), new_ra);
1684 else
1685 LOGMMCTXP(LOGL_INFO, mmctx,
1686 "Rejecting RAU - Old RA doesn't match MM. Old RA: %s New RA: %s\n",
1687 osmo_rai_name(&old_ra_id), new_ra);
1688
1689 reject_cause = GMM_CAUSE_IMPL_DETACHED;
1690 goto rejected;
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001691 }
Jacob Erlbeckd35957a2016-01-04 18:43:36 +01001692
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001693 if (!mmctx) {
Harald Welte2b2429e2015-12-25 22:31:36 +01001694 if (llme) {
1695 /* send a XID reset to re-set all LLC sequence numbers
1696 * in the MS */
Pau Espin Pedrol029a70e2019-11-21 13:58:39 +01001697 LOGGBP(llme, DMM, LOGL_NOTICE, "LLC XID RESET\n");
Pau Espin Pedrol9203da52019-11-21 16:31:00 +01001698 gprs_llgmm_reset_oldmsg(msg, GPRS_SAPI_GMM, llme);
Harald Welte2b2429e2015-12-25 22:31:36 +01001699 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001700 /* The MS has to perform GPRS attach */
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02001701 /* Device is still IMSI attached for CS but initiate GPRS ATTACH,
1702 * see GSM 04.08, 4.7.5.1.4 and G.6 */
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001703 LOGGBIUP(llme, msg, LOGL_ERROR, "Rejecting GMM RA Update Request: MS should GMM Attach first\n");
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001704 reject_cause = GMM_CAUSE_IMPL_DETACHED;
1705 goto rejected;
Harald Welte9b455bf2010-03-14 15:45:01 +08001706 }
1707
Alexander Couzens91a8bbd2019-09-11 03:38:14 +02001708 if (mmctx_did_rat_change(mmctx, msg)) {
1709 mmctx_handle_rat_change(mmctx, msg, llme);
1710 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_COMMON_PROC_INIT_REQ, NULL);
1711 }
1712
Harald Weltef0901f02010-12-26 10:39:26 +01001713 /* Store new BVCI/NSEI in MM context (FIXME: delay until we ack?) */
1714 msgid2mmctx(mmctx, msg);
1715 /* Bump the statistics of received signalling msgs for this MM context */
1716 rate_ctr_inc(&mmctx->ctrg->ctr[GMM_CTR_PKTS_SIG_IN]);
1717
Harald Welte9f1f3ad2010-05-02 12:56:57 +02001718 /* Update the MM context with the new RA-ID */
Neels Hofmeyrc6548bb2019-12-25 23:46:06 +01001719 if (mmctx->ran_type == MM_CTX_T_GERAN_Gb && msgb_bcid(msg)) {
Daniel Willmannf9f43872016-05-20 22:36:23 +02001720 bssgp_parse_cell_id(&mmctx->ra, msgb_bcid(msg));
Harald Weltedbc72b32015-12-25 22:23:27 +01001721 /* Update the MM context with the new (i.e. foreign) TLLI */
1722 mmctx->gb.tlli = msgb_tlli(msg);
1723 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001724 /* FIXME: Update the MM context with the MS radio acc capabilities */
1725 /* FIXME: Update the MM context with the MS network capabilities */
1726
Harald Welte77289c22010-05-18 14:32:29 +02001727 rate_ctr_inc(&mmctx->ctrg->ctr[GMM_CTR_RA_UPDATE]);
1728
Harald Weltec2e8cc42010-05-31 20:23:38 +02001729#ifdef PTMSI_ALLOC
Max86e04df2017-10-09 16:21:31 +02001730 ptmsi_update(mmctx);
1731
Harald Weltec2e8cc42010-05-31 20:23:38 +02001732 /* Start T3350 and re-transmit up to 5 times until ATTACH COMPLETE */
1733 mmctx->t3350_mode = GMM_T3350_MODE_RAU;
Pau Espin Pedrola299d652019-08-14 19:11:10 +02001734 mmctx_timer_start(mmctx, 3350);
Jacob Erlbeck0074a772014-10-28 16:23:46 +01001735#else
1736 /* Make sure we are NORMAL (i.e. not SUSPENDED anymore) */
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +01001737 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_ATTACH_SUCCESS, NULL);
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +02001738
1739 memset(&sig_data, 0, sizeof(sig_data));
1740 sig_data.mm = mmctx;
1741 osmo_signal_dispatch(SS_SGSN, S_SGSN_UPDATE, &sig_data);
Harald Weltec2e8cc42010-05-31 20:23:38 +02001742#endif
Harald Weltedbc72b32015-12-25 22:23:27 +01001743 if (mmctx->ran_type == MM_CTX_T_GERAN_Gb) {
1744 /* Even if there is no P-TMSI allocated, the MS will switch from
1745 * foreign TLLI to local TLLI */
1746 mmctx->gb.tlli_new = gprs_tmsi2tlli(mmctx->p_tmsi, TLLI_LOCAL);
Harald Weltec2e8cc42010-05-31 20:23:38 +02001747
Pau Espin Pedrol982e1302019-08-13 20:01:44 +02001748 /* Inform LLC layer about new TLLI but keep accepting the old one during Rx */
Harald Weltedbc72b32015-12-25 22:23:27 +01001749 gprs_llgmm_assign(mmctx->gb.llme, mmctx->gb.tlli,
Max5aa51962016-07-06 11:33:04 +02001750 mmctx->gb.tlli_new);
Harald Weltedbc72b32015-12-25 22:23:27 +01001751 }
Harald Welte807a5d82010-06-01 11:53:01 +02001752
Harald Welte588d44e2010-06-09 10:28:29 +02001753 /* Look at PDP Context Status IE and see if MS's view of
1754 * activated/deactivated NSAPIs agrees with our view */
1755 if (TLVP_PRESENT(&tp, GSM48_IE_GMM_PDP_CTX_STATUS)) {
Holger Hans Peter Freyther2b174542011-10-14 23:31:34 +02001756 const uint8_t *pdp_status = TLVP_VAL(&tp, GSM48_IE_GMM_PDP_CTX_STATUS);
Harald Welte588d44e2010-06-09 10:28:29 +02001757 process_ms_ctx_status(mmctx, pdp_status);
1758 }
1759
Daniel Willmannaf241722016-05-21 00:35:41 +02001760 /* Send RA UPDATE ACCEPT. In Iu, the RA upd request can be called from
1761 * a new Iu connection, so we might need to re-authenticate the
1762 * connection as well as turn on integrity protection. */
1763 mmctx->pending_req = GSM48_MT_GMM_RA_UPD_REQ;
1764 return gsm48_gmm_authorize(mmctx);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001765
1766rejected:
1767 /* Send RA UPDATE REJECT */
1768 LOGMMCTXP(LOGL_NOTICE, mmctx,
1769 "Rejecting RA Update Request with cause '%s' (%d)\n",
Jacob Erlbeckafcf2302015-01-05 17:30:02 +01001770 get_value_string(gsm48_gmm_cause_names, reject_cause), reject_cause);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001771 rc = gsm48_tx_gmm_ra_upd_rej(msg, reject_cause);
1772 if (mmctx)
1773 mm_ctx_cleanup_free(mmctx, "GPRS RA UPDATE REJ");
Pau Espin Pedrold723a972019-08-12 17:43:35 +02001774 else if (llme)
1775 gprs_llgmm_unassign(llme);
Alexander Couzens10af11d2019-09-17 16:52:15 +02001776#ifdef BUILD_IU
1777 else if (MSG_IU_UE_CTX(msg)) {
1778 unsigned long X1001 = osmo_tdef_get(sgsn->cfg.T_defs, -1001, OSMO_TDEF_S, -1);
1779 ranap_iu_tx_release_free(MSG_IU_UE_CTX(msg), NULL, (int) X1001);
1780 }
1781#endif
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001782
1783 return rc;
Harald Welte9b455bf2010-03-14 15:45:01 +08001784}
1785
Pau Espin Pedrolab264eb2019-09-02 13:36:11 +02001786/* 3GPP TS 24.008 § 9.4.16: Routing area update complete */
1787static int gsm48_rx_gmm_ra_upd_compl(struct sgsn_mm_ctx *mmctx)
1788{
1789 struct sgsn_signal_data sig_data;
1790 /* only in case SGSN offered new P-TMSI */
1791 LOGMMCTXP(LOGL_INFO, mmctx, "-> ROUTING AREA UPDATE COMPLETE\n");
1792 mmctx_timer_stop(mmctx, 3350);
1793 mmctx->t3350_mode = GMM_T3350_MODE_NONE;
1794 mmctx->p_tmsi_old = 0;
1795 mmctx->pending_req = 0;
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001796 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_COMMON_PROC_SUCCESS, NULL);
Pau Espin Pedrolab264eb2019-09-02 13:36:11 +02001797 switch(mmctx->ran_type) {
1798 case MM_CTX_T_UTRAN_Iu:
1799 osmo_fsm_inst_dispatch(mmctx->iu.mm_state_fsm, E_PMM_RA_UPDATE, NULL);
1800 break;
1801 case MM_CTX_T_GERAN_Gb:
1802 /* Unassign the old TLLI */
1803 mmctx->gb.tlli = mmctx->gb.tlli_new;
1804 gprs_llgmm_assign(mmctx->gb.llme, TLLI_UNASSIGNED,
1805 mmctx->gb.tlli_new);
1806 osmo_fsm_inst_dispatch(mmctx->gb.mm_state_fsm, E_MM_RA_UPDATE, NULL);
1807 break;
1808 }
1809
1810 memset(&sig_data, 0, sizeof(sig_data));
1811 sig_data.mm = mmctx;
1812 osmo_signal_dispatch(SS_SGSN, S_SGSN_UPDATE, &sig_data);
1813
1814 return 0;
1815}
1816
Pau Espin Pedrol33ebedc2019-09-02 13:43:51 +02001817/* 3GPP TS 24.008 § 9.4.8: P-TMSI reallocation complete */
1818static int gsm48_rx_gmm_ptmsi_reall_compl(struct sgsn_mm_ctx *mmctx)
1819{
1820 LOGMMCTXP(LOGL_INFO, mmctx, "-> PTMSI REALLOCATION COMPLETE\n");
1821 mmctx_timer_stop(mmctx, 3350);
1822 mmctx->t3350_mode = GMM_T3350_MODE_NONE;
1823 mmctx->p_tmsi_old = 0;
1824 mmctx->pending_req = 0;
1825 if (mmctx->ran_type == MM_CTX_T_GERAN_Gb) {
1826 /* Unassign the old TLLI */
1827 mmctx->gb.tlli = mmctx->gb.tlli_new;
1828 //gprs_llgmm_assign(mmctx->gb.llme, TLLI_UNASSIGNED, mmctx->gb.tlli_new, GPRS_ALGO_GEA0, NULL);
1829 }
1830 return 0;
1831}
1832
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001833/* 3GPP TS 24.008 § 9.4.20 Service request.
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001834 * In Iu, a UE in PMM-IDLE mode can use GSM48_MT_GMM_SERVICE_REQ to switch back
1835 * to PMM-CONNECTED mode. */
1836static int gsm48_rx_gmm_service_req(struct sgsn_mm_ctx *ctx, struct msgb *msg)
1837{
1838 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001839 uint8_t *cur = gh->data, *mi_data;
1840 uint8_t service_type, mi_len;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001841 struct tlv_parsed tp;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001842 struct osmo_mobile_identity mi;
1843 char mi_log_string[32];
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001844 enum gsm48_gmm_cause reject_cause;
1845 int rc;
1846
1847 LOGMMCTXP(LOGL_INFO, ctx, "-> GMM SERVICE REQUEST ");
1848
1849 /* This message is only valid in Iu mode */
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001850 if (!MSG_IU_UE_CTX(msg)) {
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001851 LOGPC(DMM, LOGL_INFO, "Invalid if not in Iu mode\n");
1852 return -1;
1853 }
1854
1855 /* Skip Ciphering key sequence number 10.5.1.2 */
Pau Espin Pedroldb6f8032018-01-07 18:13:09 +01001856 /* uint8_t ciph_seq_nr = *cur & 0x07; */
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001857
1858 /* Service type 10.5.5.20 */
1859 service_type = (*cur++ >> 4) & 0x07;
1860
1861 /* Mobile Identity (P-TMSI or IMSI) 10.5.1.4 */
1862 mi_len = *cur++;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001863 mi_data = cur;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001864 cur += mi_len;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001865 rc = osmo_mobile_identity_decode(&mi, mi_data, mi_len, false);
1866 if (rc)
1867 goto err_inval;
1868 osmo_mobile_identity_to_str_buf(mi_log_string, sizeof(mi_log_string), &mi);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001869
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001870 DEBUGPC(DMM, "MI(%s) type=\"%s\" ", mi_log_string,
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001871 get_value_string(gprs_service_t_strs, service_type));
1872
1873 LOGPC(DMM, LOGL_INFO, "\n");
1874
1875 /* Optional: PDP context status, MBMS context status, Uplink data status, Device properties */
1876 tlv_parse(&tp, &gsm48_gmm_att_tlvdef, cur, (msg->data + msg->len) - cur, 0, 0);
1877
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001878 switch (mi.type) {
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001879 case GSM_MI_TYPE_IMSI:
1880 /* Try to find MM context based on IMSI */
1881 if (!ctx)
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001882 ctx = sgsn_mm_ctx_by_imsi(mi.imsi);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001883 if (!ctx) {
1884 /* FIXME: We need to have a context for service request? */
Alexander Couzens47cf6bd2018-07-17 20:13:27 +02001885 reject_cause = GMM_CAUSE_IMPL_DETACHED;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001886 goto rejected;
1887 }
1888 msgid2mmctx(ctx, msg);
1889 break;
1890 case GSM_MI_TYPE_TMSI:
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001891 /* Try to find MM context based on P-TMSI */
1892 if (!ctx)
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001893 ctx = sgsn_mm_ctx_by_ptmsi(mi.tmsi);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001894 if (!ctx) {
1895 /* FIXME: We need to have a context for service request? */
Alexander Couzens47cf6bd2018-07-17 20:13:27 +02001896 reject_cause = GMM_CAUSE_IMPL_DETACHED;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001897 goto rejected;
1898 }
1899 msgid2mmctx(ctx, msg);
1900 break;
1901 default:
1902 LOGMMCTXP(LOGL_NOTICE, ctx, "Rejecting SERVICE REQUEST with "
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001903 "MI %s\n", mi_log_string);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001904 reject_cause = GMM_CAUSE_MS_ID_NOT_DERIVED;
1905 goto rejected;
1906 }
1907
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001908 osmo_fsm_inst_dispatch(ctx->gmm_fsm, E_GMM_COMMON_PROC_INIT_REQ, NULL);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001909
1910 ctx->iu.service.type = service_type;
1911
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001912 /* Look at PDP Context Status IE and see if MS's view of
1913 * activated/deactivated NSAPIs agrees with our view */
1914 if (TLVP_PRESENT(&tp, GSM48_IE_GMM_PDP_CTX_STATUS)) {
1915 const uint8_t *pdp_status = TLVP_VAL(&tp, GSM48_IE_GMM_PDP_CTX_STATUS);
efistokldef0d942019-04-23 14:37:13 +03001916 const size_t pdp_status_len = TLVP_LEN(&tp, GSM48_IE_GMM_PDP_CTX_STATUS);
1917
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001918 process_ms_ctx_status(ctx, pdp_status);
efistokldef0d942019-04-23 14:37:13 +03001919
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001920 /* 3GPP TS 24.008 § 4.7.13.4 Service request procedure not
efistokldef0d942019-04-23 14:37:13 +03001921 * accepted by the network. Cause #40. If MS has PDP Contexts in
1922 * Active state in pdp_status but there is no PDP contexts on
1923 * SGSN side then Reject with the cause will force the mobile to
1924 * reset PDP contexts */
1925 if (llist_empty(&ctx->pdp_list) && pdp_status_has_active_nsapis(pdp_status, pdp_status_len)) {
1926 reject_cause = GMM_CAUSE_NO_PDP_ACTIVATED;
1927 goto rejected;
1928 }
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001929 }
1930
1931
1932 ctx->pending_req = GSM48_MT_GMM_SERVICE_REQ;
1933 return gsm48_gmm_authorize(ctx);
1934
1935err_inval:
1936 LOGPC(DMM, LOGL_INFO, "\n");
1937 reject_cause = GMM_CAUSE_SEM_INCORR_MSG;
1938
1939rejected:
1940 /* Send SERVICE REJECT */
1941 LOGMMCTXP(LOGL_NOTICE, ctx,
1942 "Rejecting Service Request with cause '%s' (%d)\n",
1943 get_value_string(gsm48_gmm_cause_names, reject_cause), reject_cause);
1944 rc = gsm48_tx_gmm_service_rej_oldmsg(msg, reject_cause);
1945
1946 return rc;
1947
1948}
1949
1950
Harald Welted193cb32010-05-17 22:58:03 +02001951static int gsm48_rx_gmm_status(struct sgsn_mm_ctx *mmctx, struct msgb *msg)
Harald Welte9b455bf2010-03-14 15:45:01 +08001952{
1953 struct gsm48_hdr *gh = msgb_l3(msg);
1954
Daniel Willmann46553142014-09-03 17:46:44 +02001955 LOGMMCTXP(LOGL_INFO, mmctx, "-> GPRS MM STATUS (cause: %s)\n",
Jacob Erlbeckafcf2302015-01-05 17:30:02 +01001956 get_value_string(gsm48_gmm_cause_names, gh->data[0]));
Harald Welte9b455bf2010-03-14 15:45:01 +08001957
1958 return 0;
1959}
1960
Pau Espin Pedrol72b61e42019-08-12 16:43:58 +02001961/* Rx GPRS Mobility Management. MMCTX can be NULL when called. On !Gb (Iu), llme is NULL */
Pau Espin Pedrol6dfb5fe2019-08-29 17:21:00 +02001962int gsm0408_rcv_gmm(struct sgsn_mm_ctx *mmctx, struct msgb *msg,
Max82040102016-07-06 11:59:18 +02001963 struct gprs_llc_llme *llme, bool drop_cipherable)
Harald Welte9b455bf2010-03-14 15:45:01 +08001964{
Harald Welte943c5bc2010-04-30 16:33:12 +02001965 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08001966 int rc;
1967
Max82040102016-07-06 11:59:18 +02001968 if (drop_cipherable && gsm48_hdr_gmm_cipherable(gh)) {
1969 LOGMMCTXP(LOGL_NOTICE, mmctx, "Dropping cleartext GMM %s which "
1970 "is expected to be encrypted for TLLI 0x%08x\n",
1971 get_value_string(gprs_msgt_gmm_names, gh->msg_type),
1972 llme->tlli);
1973 return -EBADMSG;
1974 }
Harald Welte807a5d82010-06-01 11:53:01 +02001975
Harald Welte2b2429e2015-12-25 22:31:36 +01001976 if (llme && !mmctx &&
Harald Welted193cb32010-05-17 22:58:03 +02001977 gh->msg_type != GSM48_MT_GMM_ATTACH_REQ &&
Harald Weltec2e8cc42010-05-31 20:23:38 +02001978 gh->msg_type != GSM48_MT_GMM_RA_UPD_REQ) {
Pau Espin Pedrol029a70e2019-11-21 13:58:39 +01001979 LOGGBP(llme, DMM, LOGL_NOTICE, "Cannot handle GMM for unknown MM CTX\n");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02001980 /* 4.7.10 */
Jacob Erlbeck14ae5822014-10-28 09:47:03 +01001981 if (gh->msg_type == GSM48_MT_GMM_STATUS) {
1982 /* TLLI unassignment */
Max39550252016-06-28 17:39:20 +02001983 gprs_llgmm_unassign(llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02001984 return 0;
Jacob Erlbeck14ae5822014-10-28 09:47:03 +01001985 }
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02001986
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02001987 /* Don't reply or establish a LLME on DETACH_ACK */
Max39550252016-06-28 17:39:20 +02001988 if (gh->msg_type == GSM48_MT_GMM_DETACH_ACK)
1989 return gprs_llgmm_unassign(llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02001990
Alexander Couzens85ca87b2018-05-02 18:17:34 +02001991 /* Don't reply to deatch requests, reason power off */
1992 if (gh->msg_type == GSM48_MT_GMM_DETACH_REQ &&
1993 gh->data[0] & 0x8) {
1994 return 0;
1995 }
1996
1997
Jacob Erlbeckc4f9bf32014-11-11 08:55:13 +01001998 gprs_llgmm_reset(llme);
1999
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002000 /* Don't force it into re-attachment */
2001 if (gh->msg_type == GSM48_MT_GMM_DETACH_REQ) {
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02002002 /* Handle Detach Request */
2003 rc = gsm48_rx_gmm_det_req(NULL, msg);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002004
2005 /* TLLI unassignment */
Max39550252016-06-28 17:39:20 +02002006 gprs_llgmm_unassign(llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002007 return rc;
2008 }
2009
2010 /* Force the MS to re-attach */
Maxb997f842016-07-06 15:57:01 +02002011 rc = gsm0408_gprs_force_reattach_oldmsg(msg, llme);
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002012
2013 /* TLLI unassignment */
Max39550252016-06-28 17:39:20 +02002014 gprs_llgmm_unassign(llme);
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002015 return rc;
Harald Welted193cb32010-05-17 22:58:03 +02002016 }
2017
Daniel Willmannd999e542020-01-30 12:30:40 +01002018 /* A RAT change is only expected/allowed for RAU/Attach Req */
2019 if (mmctx && mmctx_did_rat_change(mmctx, msg)) {
2020 switch (gh->msg_type) {
2021 case GSM48_MT_GMM_RA_UPD_REQ:
2022 case GSM48_MT_GMM_ATTACH_REQ:
2023 break;
2024 default:
2025 /* This shouldn't happen with other message types and
2026 * we need to error out to prevent a crash */
2027 LOGMMCTXP(LOGL_NOTICE, mmctx, "Dropping GMM %s which was received on different "
2028 "RAT (mmctx ran_type=%u, msg_iu_ue_ctx=%p\n",
2029 get_value_string(gprs_msgt_gmm_names, gh->msg_type),
2030 mmctx->ran_type, MSG_IU_UE_CTX(msg));
2031 return -EINVAL;
2032 }
2033 }
2034
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002035 /*
2036 * For a few messages, mmctx may be NULL. For most, we want to ensure a
2037 * non-NULL mmctx. At the same time, we want to keep the message
2038 * validity check intact, so that all message types appear in the
2039 * switch statement and the default case thus means "unknown message".
2040 * If we split the switch in two parts to check non-NULL halfway, the
2041 * unknown-message check breaks, or we'd need to duplicate the switch
2042 * cases in both parts. Just keep one large switch and add some gotos.
2043 */
Harald Welte9b455bf2010-03-14 15:45:01 +08002044 switch (gh->msg_type) {
2045 case GSM48_MT_GMM_RA_UPD_REQ:
Harald Welte807a5d82010-06-01 11:53:01 +02002046 rc = gsm48_rx_gmm_ra_upd_req(mmctx, msg, llme);
Harald Welte9b455bf2010-03-14 15:45:01 +08002047 break;
2048 case GSM48_MT_GMM_ATTACH_REQ:
Harald Welte807a5d82010-06-01 11:53:01 +02002049 rc = gsm48_rx_gmm_att_req(mmctx, msg, llme);
Harald Welte9b455bf2010-03-14 15:45:01 +08002050 break;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02002051 case GSM48_MT_GMM_SERVICE_REQ:
2052 rc = gsm48_rx_gmm_service_req(mmctx, msg);
2053 break;
Daniel Willmann46553142014-09-03 17:46:44 +02002054 /* For all the following types mmctx can not be NULL */
Harald Welte9b455bf2010-03-14 15:45:01 +08002055 case GSM48_MT_GMM_ID_RESP:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002056 if (!mmctx)
2057 goto null_mmctx;
Harald Welted193cb32010-05-17 22:58:03 +02002058 rc = gsm48_rx_gmm_id_resp(mmctx, msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08002059 break;
2060 case GSM48_MT_GMM_STATUS:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002061 if (!mmctx)
2062 goto null_mmctx;
Harald Welted193cb32010-05-17 22:58:03 +02002063 rc = gsm48_rx_gmm_status(mmctx, msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08002064 break;
Harald Welte2720e732010-05-17 00:44:57 +02002065 case GSM48_MT_GMM_DETACH_REQ:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002066 if (!mmctx)
2067 goto null_mmctx;
Harald Welted193cb32010-05-17 22:58:03 +02002068 rc = gsm48_rx_gmm_det_req(mmctx, msg);
Harald Welte2720e732010-05-17 00:44:57 +02002069 break;
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002070 case GSM48_MT_GMM_DETACH_ACK:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002071 if (!mmctx)
2072 goto null_mmctx;
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002073 LOGMMCTXP(LOGL_INFO, mmctx, "-> DETACH ACK\n");
2074 mm_ctx_cleanup_free(mmctx, "GPRS DETACH ACK");
2075 rc = 0;
2076 break;
Harald Welte9b455bf2010-03-14 15:45:01 +08002077 case GSM48_MT_GMM_ATTACH_COMPL:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002078 if (!mmctx)
2079 goto null_mmctx;
Pau Espin Pedrola0bcfad2019-09-02 13:27:35 +02002080 rc = gsm48_rx_gmm_att_compl(mmctx);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002081 break;
Harald Welteab1d5622010-05-18 19:58:38 +02002082 case GSM48_MT_GMM_RA_UPD_COMPL:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002083 if (!mmctx)
2084 goto null_mmctx;
Pau Espin Pedrolab264eb2019-09-02 13:36:11 +02002085 rc = gsm48_rx_gmm_ra_upd_compl(mmctx);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002086 break;
Harald Welte9b455bf2010-03-14 15:45:01 +08002087 case GSM48_MT_GMM_PTMSI_REALL_COMPL:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002088 if (!mmctx)
2089 goto null_mmctx;
Pau Espin Pedrol33ebedc2019-09-02 13:43:51 +02002090 rc = gsm48_rx_gmm_ptmsi_reall_compl(mmctx);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002091 break;
Harald Welte9b455bf2010-03-14 15:45:01 +08002092 case GSM48_MT_GMM_AUTH_CIPH_RESP:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002093 if (!mmctx)
2094 goto null_mmctx;
Harald Welte4b6ac1e2010-07-03 11:09:06 +02002095 rc = gsm48_rx_gmm_auth_ciph_resp(mmctx, msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08002096 break;
Neels Hofmeyr058cd572017-02-24 06:24:45 +01002097 case GSM48_MT_GMM_AUTH_CIPH_FAIL:
2098 rc = gsm48_rx_gmm_auth_ciph_fail(mmctx, msg);
2099 break;
Harald Welte9b455bf2010-03-14 15:45:01 +08002100 default:
Daniel Willmann46553142014-09-03 17:46:44 +02002101 LOGMMCTXP(LOGL_NOTICE, mmctx, "Unknown GSM 04.08 GMM msg type 0x%02x\n",
Harald Welte9b455bf2010-03-14 15:45:01 +08002102 gh->msg_type);
Neels Hofmeyr9329e6f2016-06-03 00:44:23 +02002103 if (mmctx)
2104 rc = gsm48_tx_gmm_status(mmctx, GMM_CAUSE_MSGT_NOTEXIST_NOTIMPL);
2105 else
2106 rc = -EINVAL;
Harald Welte9b455bf2010-03-14 15:45:01 +08002107 break;
2108 }
2109
2110 return rc;
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002111
2112null_mmctx:
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02002113 LOGGBIUP(llme, msg, LOGL_ERROR,
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002114 "Received GSM 04.08 message type 0x%02x,"
2115 " but no MM context available\n",
2116 gh->msg_type);
2117 return -EINVAL;
Harald Welte9b455bf2010-03-14 15:45:01 +08002118}
2119
Harald Weltec2e8cc42010-05-31 20:23:38 +02002120static void mmctx_timer_cb(void *_mm)
2121{
2122 struct sgsn_mm_ctx *mm = _mm;
Jacob Erlbeckbd0cf112014-12-01 12:33:33 +01002123 struct gsm_auth_tuple *at;
Max3b6332f2017-11-01 13:28:38 +01002124 int rc;
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002125 unsigned long seconds;
Harald Weltec2e8cc42010-05-31 20:23:38 +02002126
2127 mm->num_T_exp++;
2128
2129 switch (mm->T) {
2130 case 3350: /* waiting for ATTACH COMPLETE */
2131 if (mm->num_T_exp >= 5) {
Daniel Willmann46553142014-09-03 17:46:44 +02002132 LOGMMCTXP(LOGL_NOTICE, mm, "T3350 expired >= 5 times\n");
Jacob Erlbecka7904562014-11-03 10:12:52 +01002133 mm_ctx_cleanup_free(mm, "T3350");
Harald Weltec2e8cc42010-05-31 20:23:38 +02002134 /* FIXME: should we return some error? */
2135 break;
2136 }
2137 /* re-transmit the respective msg and re-start timer */
2138 switch (mm->t3350_mode) {
2139 case GMM_T3350_MODE_ATT:
2140 gsm48_tx_gmm_att_ack(mm);
2141 break;
2142 case GMM_T3350_MODE_RAU:
2143 gsm48_tx_gmm_ra_upd_ack(mm);
2144 break;
2145 case GMM_T3350_MODE_PTMSI_REALL:
2146 /* FIXME */
2147 break;
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +01002148 case GMM_T3350_MODE_NONE:
2149 LOGMMCTXP(LOGL_NOTICE, mm,
2150 "T3350 mode wasn't set, ignoring timeout\n");
2151 break;
Harald Weltec2e8cc42010-05-31 20:23:38 +02002152 }
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002153 seconds = osmo_tdef_get(sgsn->cfg.T_defs, 3350, OSMO_TDEF_S, -1);
2154 osmo_timer_schedule(&mm->timer, seconds, 0);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002155 break;
Harald Welte4b6ac1e2010-07-03 11:09:06 +02002156 case 3360: /* waiting for AUTH AND CIPH RESP */
2157 if (mm->num_T_exp >= 5) {
Daniel Willmann46553142014-09-03 17:46:44 +02002158 LOGMMCTXP(LOGL_NOTICE, mm, "T3360 expired >= 5 times\n");
Jacob Erlbecka7904562014-11-03 10:12:52 +01002159 mm_ctx_cleanup_free(mm, "T3360");
Harald Welte4b6ac1e2010-07-03 11:09:06 +02002160 break;
2161 }
Jacob Erlbeckbd0cf112014-12-01 12:33:33 +01002162 /* Re-transmit the respective msg and re-start timer */
2163 if (mm->auth_triplet.key_seq == GSM_KEY_SEQ_INVAL) {
2164 LOGMMCTXP(LOGL_ERROR, mm,
2165 "timeout: invalid auth triplet reference\n");
2166 mm_ctx_cleanup_free(mm, "T3360");
2167 break;
2168 }
2169 at = &mm->auth_triplet;
2170
Max3b6332f2017-11-01 13:28:38 +01002171 rc = gsm48_tx_gmm_auth_ciph_req(mm, &at->vec, at->key_seq, false);
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002172 if (rc < 0) {
Ruben Undheim55fcf112018-09-25 22:59:34 +02002173 LOGMMCTXP(LOGL_ERROR, mm, "failed sending Auth. & Ciph. Request: %s \n", strerror(-rc));
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002174 } else {
2175 seconds = osmo_tdef_get(sgsn->cfg.T_defs, 3360, OSMO_TDEF_S, -1);
2176 osmo_timer_schedule(&mm->timer, seconds, 0);
2177 }
Harald Welte4b6ac1e2010-07-03 11:09:06 +02002178 break;
Harald Weltec2e8cc42010-05-31 20:23:38 +02002179 case 3370: /* waiting for IDENTITY RESPONSE */
2180 if (mm->num_T_exp >= 5) {
Daniel Willmann46553142014-09-03 17:46:44 +02002181 LOGMMCTXP(LOGL_NOTICE, mm, "T3370 expired >= 5 times\n");
Harald Weltec2e8cc42010-05-31 20:23:38 +02002182 gsm48_tx_gmm_att_rej(mm, GMM_CAUSE_MS_ID_NOT_DERIVED);
Jacob Erlbecka7904562014-11-03 10:12:52 +01002183 mm_ctx_cleanup_free(mm, "GPRS ATTACH REJECT (T3370)");
Harald Weltec2e8cc42010-05-31 20:23:38 +02002184 break;
2185 }
2186 /* re-tranmit IDENTITY REQUEST and re-start timer */
2187 gsm48_tx_gmm_id_req(mm, mm->t3370_id_type);
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002188 seconds = osmo_tdef_get(sgsn->cfg.T_defs, 3370, OSMO_TDEF_S, -1);
2189 osmo_timer_schedule(&mm->timer, seconds, 0);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002190 break;
2191 default:
Daniel Willmann46553142014-09-03 17:46:44 +02002192 LOGMMCTXP(LOGL_ERROR, mm, "timer expired in unknown mode %u\n",
Harald Weltec2e8cc42010-05-31 20:23:38 +02002193 mm->T);
2194 }
2195}
2196
Maxb997f842016-07-06 15:57:01 +02002197int gsm0408_gprs_force_reattach_oldmsg(struct msgb *msg,
2198 struct gprs_llc_llme *llme)
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002199{
Jacob Erlbeckabdf02b2014-10-31 12:20:49 +01002200 int rc;
Alexander Couzensa1735662016-08-30 18:50:58 +02002201 if (llme)
2202 gprs_llgmm_reset_oldmsg(msg, GPRS_SAPI_GMM, llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002203
Jacob Erlbeckabdf02b2014-10-31 12:20:49 +01002204 rc = gsm48_tx_gmm_detach_req_oldmsg(
2205 msg, GPRS_DET_T_MT_REATT_REQ, GMM_CAUSE_IMPL_DETACHED);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002206
Jacob Erlbeckabdf02b2014-10-31 12:20:49 +01002207 return rc;
2208}
2209
2210int gsm0408_gprs_force_reattach(struct sgsn_mm_ctx *mmctx)
2211{
2212 int rc;
Harald Weltedbc72b32015-12-25 22:23:27 +01002213 if (mmctx->ran_type == MM_CTX_T_GERAN_Gb)
2214 gprs_llgmm_reset(mmctx->gb.llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002215
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002216 rc = gsm48_tx_gmm_detach_req(
2217 mmctx, GPRS_DET_T_MT_REATT_REQ, GMM_CAUSE_IMPL_DETACHED);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002218
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002219 mm_ctx_cleanup_free(mmctx, "forced reattach");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002220
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002221 return rc;
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002222}
2223
Harald Welte5bfe4992010-06-09 11:22:47 +02002224int gprs_gmm_rx_suspend(struct gprs_ra_id *raid, uint32_t tlli)
2225{
2226 struct sgsn_mm_ctx *mmctx;
2227
2228 mmctx = sgsn_mm_ctx_by_tlli(tlli, raid);
2229 if (!mmctx) {
2230 LOGP(DMM, LOGL_NOTICE, "SUSPEND request for unknown "
2231 "TLLI=%08x\n", tlli);
2232 return -EINVAL;
2233 }
2234
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02002235 if (!gmm_fsm_is_registered(mmctx->gmm_fsm)) {
Daniel Willmann46553142014-09-03 17:46:44 +02002236 LOGMMCTXP(LOGL_NOTICE, mmctx, "SUSPEND request while state "
Harald Welte5bfe4992010-06-09 11:22:47 +02002237 "!= REGISTERED (TLLI=%08x)\n", tlli);
2238 return -EINVAL;
2239 }
2240
2241 /* Transition from REGISTERED_NORMAL to REGISTERED_SUSPENDED */
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02002242 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_SUSPEND, NULL);
Harald Welte5bfe4992010-06-09 11:22:47 +02002243 return 0;
2244}
2245
2246int gprs_gmm_rx_resume(struct gprs_ra_id *raid, uint32_t tlli,
2247 uint8_t suspend_ref)
2248{
2249 struct sgsn_mm_ctx *mmctx;
2250
2251 /* FIXME: make use of suspend reference? */
2252
2253 mmctx = sgsn_mm_ctx_by_tlli(tlli, raid);
2254 if (!mmctx) {
2255 LOGP(DMM, LOGL_NOTICE, "RESUME request for unknown "
2256 "TLLI=%08x\n", tlli);
2257 return -EINVAL;
2258 }
2259
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02002260 if (!gmm_fsm_is_registered(mmctx->gmm_fsm)) {
Daniel Willmann46553142014-09-03 17:46:44 +02002261 LOGMMCTXP(LOGL_NOTICE, mmctx, "RESUME request while state "
Harald Welte5bfe4992010-06-09 11:22:47 +02002262 "!= SUSPENDED (TLLI=%08x)\n", tlli);
2263 /* FIXME: should we not simply ignore it? */
2264 return -EINVAL;
2265 }
2266
2267 /* Transition from SUSPENDED to NORMAL */
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02002268 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_RESUME, NULL);
Harald Welte5bfe4992010-06-09 11:22:47 +02002269 return 0;
2270}