blob: b385ff11c1a6be2fd0416b3451c248bfb7b28d18 [file] [log] [blame]
Harald Welte9b455bf2010-03-14 15:45:01 +08001/* GSM Mobile Radio Interface Layer 3 messages on the A-bis interface
2 * 3GPP TS 04.08 version 7.21.0 Release 1998 / ETSI TS 100 940 V7.21.0 */
3
Harald Welteeb98c742015-08-16 17:11:32 +02004/* (C) 2009-2015 by Harald Welte <laforge@gnumonks.org>
Harald Weltec2e8cc42010-05-31 20:23:38 +02005 * (C) 2010 by On-Waves
Harald Welte9b455bf2010-03-14 15:45:01 +08006 *
7 * All Rights Reserved
8 *
9 * This program is free software; you can redistribute it and/or modify
Harald Welte9af6ddf2011-01-01 15:25:50 +010010 * it under the terms of the GNU Affero General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
Harald Welte9b455bf2010-03-14 15:45:01 +080012 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
Harald Welte9af6ddf2011-01-01 15:25:50 +010017 * GNU Affero General Public License for more details.
Harald Welte9b455bf2010-03-14 15:45:01 +080018 *
Harald Welte9af6ddf2011-01-01 15:25:50 +010019 * You should have received a copy of the GNU Affero General Public License
20 * along with this program. If not, see <http://www.gnu.org/licenses/>.
Harald Welte9b455bf2010-03-14 15:45:01 +080021 *
22 */
23
24#include <stdio.h>
25#include <stdlib.h>
26#include <string.h>
Harald Welteeaa614c2010-05-02 11:26:34 +020027#include <stdint.h>
Harald Welte9b455bf2010-03-14 15:45:01 +080028#include <errno.h>
Max82040102016-07-06 11:59:18 +020029#include <stdbool.h>
Harald Welte9b455bf2010-03-14 15:45:01 +080030#include <netinet/in.h>
Harald Welte421cba42010-05-02 23:11:50 +020031#include <arpa/inet.h>
Harald Welte9b455bf2010-03-14 15:45:01 +080032
Daniel Willmann6292c8d2016-05-21 17:35:57 +020033#include "bscconfig.h"
34
Pablo Neira Ayuso136f4532011-03-22 16:47:59 +010035#include <osmocom/core/msgb.h>
Harald Welted36ff762011-03-23 18:26:56 +010036#include <osmocom/gsm/tlv.h>
37#include <osmocom/gsm/gsm_utils.h>
Pablo Neira Ayuso136f4532011-03-22 16:47:59 +010038#include <osmocom/core/signal.h>
39#include <osmocom/core/talloc.h>
40#include <osmocom/core/rate_ctr.h>
Neels Hofmeyr93bafb62017-01-13 03:12:08 +010041#include <osmocom/core/utils.h>
Pau Espin Pedrola299d652019-08-14 19:11:10 +020042#include <osmocom/core/tdef.h>
Daniel Willmann770f3e32016-05-21 00:31:12 +020043#include <osmocom/crypt/auth.h>
Neels Hofmeyr3c7656a2022-03-07 15:38:59 +010044#include <osmocom/crypt/utran_cipher.h>
Harald Welte53373bc2016-04-20 17:11:43 +020045#include <osmocom/gsm/protocol/gsm_04_08_gprs.h>
Harald Welted6057092010-05-02 12:57:45 +020046
Harald Welteea34a4e2012-06-16 14:59:56 +080047#include <osmocom/gprs/gprs_bssgp.h>
48
Neels Hofmeyr396f2e62017-09-04 15:13:25 +020049#include <osmocom/sgsn/debug.h>
50#include <osmocom/sgsn/gprs_llc.h>
51#include <osmocom/sgsn/gprs_sgsn.h>
52#include <osmocom/sgsn/gprs_gmm.h>
53#include <osmocom/sgsn/gprs_utils.h>
54#include <osmocom/sgsn/gprs_subscriber.h>
55#include <osmocom/sgsn/sgsn.h>
Alexander Couzensf7198d72018-05-22 18:29:14 +020056#include <osmocom/sgsn/gprs_gmm_attach.h>
Pau Espin Pedrol02514bc2019-08-30 16:14:22 +020057#include <osmocom/sgsn/gprs_mm_state_gb_fsm.h>
Pau Espin Pedrolccd12522019-08-30 17:06:36 +020058#include <osmocom/sgsn/gprs_mm_state_iu_fsm.h>
Pau Espin Pedrol31c46572019-09-02 16:45:27 +020059#include <osmocom/sgsn/gprs_gmm_fsm.h>
Neels Hofmeyr396f2e62017-09-04 15:13:25 +020060#include <osmocom/sgsn/signal.h>
61#include <osmocom/sgsn/gprs_sndcp.h>
Pau Espin Pedrol6dfb5fe2019-08-29 17:21:00 +020062#include <osmocom/sgsn/gprs_ranap.h>
Pau Espin Pedrol05d5f282022-12-23 17:09:08 +010063#include <osmocom/sgsn/gprs_sm.h>
Pau Espin Pedrol8ec269a2023-01-05 19:19:32 +010064#include <osmocom/sgsn/gtp.h>
Daniel Willmann6292c8d2016-05-21 17:35:57 +020065
Harald Welte6abf94e2010-05-18 10:35:06 +020066#include <pdp.h>
67
Harald Weltec2e8cc42010-05-31 20:23:38 +020068#define PTMSI_ALLOC
69
Harald Welted193cb32010-05-17 22:58:03 +020070extern struct sgsn_instance *sgsn;
Pau Espin Pedrolb1d1c242018-10-30 17:27:59 +010071extern void *tall_sgsn_ctx;
Harald Welte9b455bf2010-03-14 15:45:01 +080072
Harald Welte588d44e2010-06-09 10:28:29 +020073static const struct tlv_definition gsm48_gmm_att_tlvdef = {
74 .def = {
Harald Welte4b6ac1e2010-07-03 11:09:06 +020075 [GSM48_IE_GMM_CIPH_CKSN] = { TLV_TYPE_FIXED, 1 },
Harald Welte588d44e2010-06-09 10:28:29 +020076 [GSM48_IE_GMM_TIMER_READY] = { TLV_TYPE_TV, 1 },
77 [GSM48_IE_GMM_ALLOC_PTMSI] = { TLV_TYPE_TLV, 0 },
Harald Welte4b6ac1e2010-07-03 11:09:06 +020078 [GSM48_IE_GMM_PTMSI_SIG] = { TLV_TYPE_FIXED, 3 },
79 [GSM48_IE_GMM_AUTH_RAND] = { TLV_TYPE_FIXED, 16 },
80 [GSM48_IE_GMM_AUTH_SRES] = { TLV_TYPE_FIXED, 4 },
Neels Hofmeyr058cd572017-02-24 06:24:45 +010081 [GSM48_IE_GMM_AUTH_RES_EXT] = { TLV_TYPE_TLV, 0 },
82 [GSM48_IE_GMM_AUTH_FAIL_PAR] = { TLV_TYPE_TLV, 0 },
Harald Welte588d44e2010-06-09 10:28:29 +020083 [GSM48_IE_GMM_IMEISV] = { TLV_TYPE_TLV, 0 },
Harald Welte4b6ac1e2010-07-03 11:09:06 +020084 [GSM48_IE_GMM_DRX_PARAM] = { TLV_TYPE_FIXED, 2 },
Harald Welte588d44e2010-06-09 10:28:29 +020085 [GSM48_IE_GMM_MS_NET_CAPA] = { TLV_TYPE_TLV, 0 },
86 [GSM48_IE_GMM_PDP_CTX_STATUS] = { TLV_TYPE_TLV, 0 },
87 [GSM48_IE_GMM_PS_LCS_CAPA] = { TLV_TYPE_TLV, 0 },
88 [GSM48_IE_GMM_GMM_MBMS_CTX_ST] = { TLV_TYPE_TLV, 0 },
89 },
90};
91
Harald Welte2720e732010-05-17 00:44:57 +020092/* Our implementation, should be kept in SGSN */
Harald Welte9b455bf2010-03-14 15:45:01 +080093
Harald Weltec2e8cc42010-05-31 20:23:38 +020094static void mmctx_timer_cb(void *_mm);
95
Pau Espin Pedrola299d652019-08-14 19:11:10 +020096static void mmctx_timer_start(struct sgsn_mm_ctx *mm, unsigned int T)
Harald Weltec2e8cc42010-05-31 20:23:38 +020097{
Pau Espin Pedrola299d652019-08-14 19:11:10 +020098 unsigned long seconds;
Pablo Neira Ayusobf540cb2011-05-06 12:11:06 +020099 if (osmo_timer_pending(&mm->timer))
Harald Welteeb98c742015-08-16 17:11:32 +0200100 LOGMMCTXP(LOGL_ERROR, mm, "Starting MM timer %u while old "
Harald Weltec2e8cc42010-05-31 20:23:38 +0200101 "timer %u pending\n", T, mm->T);
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200102
103 seconds = osmo_tdef_get(sgsn->cfg.T_defs, T, OSMO_TDEF_S, -1);
104
Harald Weltec2e8cc42010-05-31 20:23:38 +0200105 mm->T = T;
106 mm->num_T_exp = 0;
107
108 /* FIXME: we should do this only once ? */
Pablo Neira Ayuso51215762017-05-08 20:57:52 +0200109 osmo_timer_setup(&mm->timer, mmctx_timer_cb, mm);
Pablo Neira Ayusobf540cb2011-05-06 12:11:06 +0200110 osmo_timer_schedule(&mm->timer, seconds, 0);
Harald Weltec2e8cc42010-05-31 20:23:38 +0200111}
112
113static void mmctx_timer_stop(struct sgsn_mm_ctx *mm, unsigned int T)
114{
115 if (mm->T != T)
Harald Welteeb98c742015-08-16 17:11:32 +0200116 LOGMMCTXP(LOGL_ERROR, mm, "Stopping MM timer %u but "
Harald Weltec2e8cc42010-05-31 20:23:38 +0200117 "%u is running\n", T, mm->T);
Pablo Neira Ayusobf540cb2011-05-06 12:11:06 +0200118 osmo_timer_del(&mm->timer);
Harald Weltec2e8cc42010-05-31 20:23:38 +0200119}
120
Jacob Erlbeck81ffb742015-01-23 11:33:51 +0100121time_t gprs_max_time_to_idle(void)
122{
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200123 unsigned long T3314, T3312;
124
125 T3314 = osmo_tdef_get(sgsn->cfg.T_defs, 3314, OSMO_TDEF_S, -1);
126 T3312 = osmo_tdef_get(sgsn->cfg.T_defs, 3312, OSMO_TDEF_S, -1);
127 return T3314 + (T3312 + 4 * 60);
Jacob Erlbeck81ffb742015-01-23 11:33:51 +0100128}
129
Neels Hofmeyr723f7c72016-08-11 19:12:54 +0200130/* Send a message through the underlying layer.
131 * For param encryptable, see 3GPP TS 24.008 § 4.7.1.2 and
132 * gsm48_hdr_gmm_cipherable(). Pass false for not cipherable messages. */
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200133int gsm48_gmm_sendmsg(struct msgb *msg, int command,
Max82040102016-07-06 11:59:18 +0200134 struct sgsn_mm_ctx *mm, bool encryptable)
Harald Welte9b455bf2010-03-14 15:45:01 +0800135{
Daniel Willmann61329d42016-05-21 17:36:18 +0200136 if (mm) {
Pau Espin Pedrola33f0062021-06-04 17:27:03 +0200137 rate_ctr_inc(rate_ctr_group_get_ctr(mm->ctrg, GMM_CTR_PKTS_SIG_OUT));
Daniel Willmann61329d42016-05-21 17:36:18 +0200138#ifdef BUILD_IU
139 if (mm->ran_type == MM_CTX_T_UTRAN_Iu)
Neels Hofmeyra7a39472017-07-05 15:19:52 +0200140 return ranap_iu_tx(msg, GPRS_SAPI_GMM);
Daniel Willmann61329d42016-05-21 17:36:18 +0200141#endif
142 }
143
144#ifdef BUILD_IU
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +0200145 if (MSG_IU_UE_CTX(msg))
Neels Hofmeyra7a39472017-07-05 15:19:52 +0200146 return ranap_iu_tx(msg, GPRS_SAPI_GMM);
Daniel Willmann61329d42016-05-21 17:36:18 +0200147#endif
Harald Welte8acd88f2010-05-18 10:57:45 +0200148
Harald Welte11d7c102010-05-02 11:54:55 +0200149 /* caller needs to provide TLLI, BVCI and NSEI */
Max82040102016-07-06 11:59:18 +0200150 return gprs_llc_tx_ui(msg, GPRS_SAPI_GMM, command, mm, encryptable);
Harald Welte9b455bf2010-03-14 15:45:01 +0800151}
152
Harald Welte11d7c102010-05-02 11:54:55 +0200153/* copy identifiers from old message to new message, this
154 * is required so lower layers can route it correctly */
155static void gmm_copy_id(struct msgb *msg, const struct msgb *old)
156{
157 msgb_tlli(msg) = msgb_tlli(old);
158 msgb_bvci(msg) = msgb_bvci(old);
159 msgb_nsei(msg) = msgb_nsei(old);
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +0200160 MSG_IU_UE_CTX_SET(msg, MSG_IU_UE_CTX(old));
Harald Welte11d7c102010-05-02 11:54:55 +0200161}
162
Harald Welte6abf94e2010-05-18 10:35:06 +0200163/* Store BVCI/NSEI in MM context */
Pau Espin Pedrol8333ef12019-08-29 19:26:12 +0200164void msgid2mmctx(struct sgsn_mm_ctx *mm, const struct msgb *msg)
Harald Welte6abf94e2010-05-18 10:35:06 +0200165{
Alexander Couzensf8d3e7f2019-08-12 18:28:11 +0200166 /* check for Iu or Gb */
167 if (!MSG_IU_UE_CTX(msg)) {
168 mm->gb.bvci = msgb_bvci(msg);
169 mm->gb.nsei = msgb_nsei(msg);
Neels Hofmeyra7a39472017-07-05 15:19:52 +0200170 }
Alexander Couzensf8d3e7f2019-08-12 18:28:11 +0200171#ifdef BUILD_IU
172 else {
173 /* In case a Iu connection is reconnected we need to update the ue ctx */
174 /* FIXME: the old ue_ctx have to be freed/disconnected */
175 mm->iu.ue_ctx = MSG_IU_UE_CTX(msg);
176 if (mm->ran_type == MM_CTX_T_UTRAN_Iu
177 && mm->iu.ue_ctx) {
178 mm->iu.ue_ctx->rab_assign_addr_enc =
179 sgsn->cfg.iu.rab_assign_addr_enc;
180 }
181 }
182#endif
Harald Welte6abf94e2010-05-18 10:35:06 +0200183}
184
185/* Store BVCI/NSEI in MM context */
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200186void mmctx2msgid(struct msgb *msg, const struct sgsn_mm_ctx *mm)
Harald Welte6abf94e2010-05-18 10:35:06 +0200187{
Harald Weltef97ee042015-12-25 19:12:21 +0100188 msgb_tlli(msg) = mm->gb.tlli;
189 msgb_bvci(msg) = mm->gb.bvci;
190 msgb_nsei(msg) = mm->gb.nsei;
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +0200191 MSG_IU_UE_CTX_SET(msg, mm->iu.ue_ctx);
Harald Welte6abf94e2010-05-18 10:35:06 +0200192}
193
Jacob Erlbeck99985b52014-10-13 10:32:00 +0200194static void mm_ctx_cleanup_free(struct sgsn_mm_ctx *ctx, const char *log_text)
195{
Jacob Erlbecke671d252015-01-26 14:43:07 +0100196 LOGMMCTXP(LOGL_INFO, ctx, "Cleaning MM context due to %s\n", log_text);
Jacob Erlbeck99985b52014-10-13 10:32:00 +0200197
198 /* Mark MM state as deregistered */
Pau Espin Pedrol31c46572019-09-02 16:45:27 +0200199 osmo_fsm_inst_dispatch(ctx->gmm_fsm, E_GMM_CLEANUP, NULL);
Pau Espin Pedrol2179dec2019-08-13 19:09:32 +0200200
201 switch(ctx->ran_type) {
202 case MM_CTX_T_UTRAN_Iu:
Pau Espin Pedrol888052e2021-04-14 13:27:34 +0200203 osmo_fsm_inst_dispatch(ctx->iu.mm_state_fsm, E_PMM_PS_DETACH, NULL);
Pau Espin Pedrol2179dec2019-08-13 19:09:32 +0200204 break;
205 case MM_CTX_T_GERAN_Gb:
Pau Espin Pedrol888052e2021-04-14 13:27:34 +0200206 osmo_fsm_inst_dispatch(ctx->gb.mm_state_fsm, E_MM_GPRS_DETACH, NULL);
Pau Espin Pedrol2179dec2019-08-13 19:09:32 +0200207 break;
208 }
Jacob Erlbeck99985b52014-10-13 10:32:00 +0200209
Jacob Erlbecke671d252015-01-26 14:43:07 +0100210 sgsn_mm_ctx_cleanup_free(ctx);
Jacob Erlbeck99985b52014-10-13 10:32:00 +0200211}
212
Harald Weltef54e7e22010-06-09 10:51:23 +0200213/* Chapter 9.4.18 */
214static int _tx_status(struct msgb *msg, uint8_t cause,
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200215 struct sgsn_mm_ctx *mmctx)
Harald Weltef54e7e22010-06-09 10:51:23 +0200216{
217 struct gsm48_hdr *gh;
218
219 /* MMCTX might be NULL! */
220
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200221 DEBUGP(DMM, "<- GMM STATUS (cause: %s)\n",
Jacob Erlbeckafcf2302015-01-05 17:30:02 +0100222 get_value_string(gsm48_gmm_cause_names, cause));
Harald Weltef54e7e22010-06-09 10:51:23 +0200223
224 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200225 gh->proto_discr = GSM48_PDISC_MM_GPRS;
226 gh->msg_type = GSM48_MT_GMM_STATUS;
Harald Weltef54e7e22010-06-09 10:51:23 +0200227 gh->data[0] = cause;
228
Max82040102016-07-06 11:59:18 +0200229 return gsm48_gmm_sendmsg(msg, 0, mmctx, true);
Harald Weltef54e7e22010-06-09 10:51:23 +0200230}
Jacob Erlbeck70671422014-10-29 22:57:30 +0100231
Harald Weltef54e7e22010-06-09 10:51:23 +0200232static int gsm48_tx_gmm_status(struct sgsn_mm_ctx *mmctx, uint8_t cause)
233{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100234 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 GMM STATUS");
Harald Weltef54e7e22010-06-09 10:51:23 +0200235
236 mmctx2msgid(msg, mmctx);
Pau Espin Pedrol35f0e662019-09-02 18:27:27 +0200237 return _tx_status(msg, cause, mmctx);
Harald Weltef54e7e22010-06-09 10:51:23 +0200238}
239
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200240static int _tx_detach_req(struct msgb *msg, uint8_t detach_type, uint8_t cause,
241 struct sgsn_mm_ctx *mmctx)
242{
243 struct gsm48_hdr *gh;
244
245 /* MMCTX might be NULL! */
246
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200247 DEBUGP(DMM, "<- GMM DETACH REQ (type: %s, cause: %s)\n",
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200248 get_value_string(gprs_det_t_mt_strs, detach_type),
Jacob Erlbeckafcf2302015-01-05 17:30:02 +0100249 get_value_string(gsm48_gmm_cause_names, cause));
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200250
251 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
252
253 gh->proto_discr = GSM48_PDISC_MM_GPRS;
254 gh->msg_type = GSM48_MT_GMM_DETACH_REQ;
255 gh->data[0] = detach_type & 0x07;
256
257 msgb_tv_put(msg, GSM48_IE_GMM_CAUSE, cause);
258
Max82040102016-07-06 11:59:18 +0200259 return gsm48_gmm_sendmsg(msg, 0, mmctx, true);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200260}
261
262static int gsm48_tx_gmm_detach_req(struct sgsn_mm_ctx *mmctx,
263 uint8_t detach_type, uint8_t cause)
264{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100265 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 DET REQ");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200266
267 mmctx2msgid(msg, mmctx);
268 return _tx_detach_req(msg, detach_type, cause, mmctx);
269}
270
271static int gsm48_tx_gmm_detach_req_oldmsg(struct msgb *oldmsg,
272 uint8_t detach_type, uint8_t cause)
273{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100274 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 DET OLD");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +0200275
276 gmm_copy_id(msg, oldmsg);
277 return _tx_detach_req(msg, detach_type, cause, NULL);
278}
Harald Weltef54e7e22010-06-09 10:51:23 +0200279
Harald Welte9b455bf2010-03-14 15:45:01 +0800280/* Chapter 9.4.2: Attach accept */
Alexander Couzensd4788cd2018-05-02 22:32:19 +0200281int gsm48_tx_gmm_att_ack(struct sgsn_mm_ctx *mm)
Harald Welte9b455bf2010-03-14 15:45:01 +0800282{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100283 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ATT ACK");
Harald Welte9b455bf2010-03-14 15:45:01 +0800284 struct gsm48_hdr *gh;
285 struct gsm48_attach_ack *aa;
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200286 unsigned long t;
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +0100287#ifdef PTMSI_ALLOC
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +0200288 struct osmo_mobile_identity mi;
289 uint8_t *l;
290 int rc;
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +0100291#endif
Holger Hans Peter Freyther1768a572014-04-04 12:40:34 +0200292#if 0
293 uint8_t *ptsig;
294#endif
Harald Welte9b455bf2010-03-14 15:45:01 +0800295
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200296 LOGMMCTXP(LOGL_INFO, mm, "<- GMM ATTACH ACCEPT (new P-TMSI=0x%08x)\n", mm->p_tmsi);
Pau Espin Pedrola33f0062021-06-04 17:27:03 +0200297 rate_ctr_inc(rate_ctr_group_get_ctr(sgsn->rate_ctrs, CTR_GPRS_ATTACH_ACKED));
Harald Welte9b455bf2010-03-14 15:45:01 +0800298
Harald Welte6463c072010-05-18 17:04:55 +0200299 mmctx2msgid(msg, mm);
Harald Welte9b455bf2010-03-14 15:45:01 +0800300
301 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
302 gh->proto_discr = GSM48_PDISC_MM_GPRS;
303 gh->msg_type = GSM48_MT_GMM_ATTACH_ACK;
304
305 aa = (struct gsm48_attach_ack *) msgb_put(msg, sizeof(*aa));
306 aa->force_stby = 0; /* not indicated */
307 aa->att_result = 1; /* GPRS only */
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200308 t = osmo_tdef_get(sgsn->cfg.T_defs, 3312, OSMO_TDEF_S, -1);
309 aa->ra_upd_timer = gprs_secs_to_tmr_floor(t);
Keith6d92f142020-09-21 00:09:30 +0200310 aa->radio_prio = 0x44; /* lowest */
Max25c65c32018-01-08 14:43:53 +0100311 gsm48_encode_ra(&aa->ra_id, &mm->ra);
Harald Welte9b455bf2010-03-14 15:45:01 +0800312
Harald Welteab1d5622010-05-18 19:58:38 +0200313#if 0
Harald Welte6463c072010-05-18 17:04:55 +0200314 /* Optional: P-TMSI signature */
315 msgb_v_put(msg, GSM48_IE_GMM_PTMSI_SIG);
316 ptsig = msgb_put(msg, 3);
317 ptsig[0] = mm->p_tmsi_sig >> 16;
318 ptsig[1] = mm->p_tmsi_sig >> 8;
319 ptsig[2] = mm->p_tmsi_sig & 0xff;
320
Harald Weltec2e8cc42010-05-31 20:23:38 +0200321#endif
Jacob Erlbeck8de9c482015-01-23 11:44:39 +0100322 /* Optional: Negotiated Ready timer value
323 * (fixed 44s, default value, GSM 04.08, table 11.4a) to safely limit
324 * the inactivity time READY->STANDBY.
325 */
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200326 t = osmo_tdef_get(sgsn->cfg.T_defs, 3314, OSMO_TDEF_S, -1);
327 msgb_tv_put(msg, GSM48_IE_GMM_TIMER_READY, gprs_secs_to_tmr_floor(t));
Harald Welte6463c072010-05-18 17:04:55 +0200328
Harald Weltec2e8cc42010-05-31 20:23:38 +0200329#ifdef PTMSI_ALLOC
Harald Welte6463c072010-05-18 17:04:55 +0200330 /* Optional: Allocated P-TMSI */
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +0200331 mi = (struct osmo_mobile_identity){
332 .type = GSM_MI_TYPE_TMSI,
333 .tmsi = mm->p_tmsi,
334 };
335 l = msgb_tl_put(msg, GSM48_IE_GMM_ALLOC_PTMSI);
336 rc = osmo_mobile_identity_encode_msgb(msg, &mi, false);
337 if (rc < 0) {
338 LOGMMCTXP(LOGL_ERROR, mm, "Cannot encode Mobile Identity\n");
339 msgb_free(msg);
340 return -EINVAL;
341 }
342 *l = rc;
Harald Welteab1d5622010-05-18 19:58:38 +0200343#endif
Harald Weltec2e8cc42010-05-31 20:23:38 +0200344
Harald Welte6463c072010-05-18 17:04:55 +0200345 /* Optional: MS-identity (combined attach) */
346 /* Optional: GMM cause (partial attach result for combined attach) */
347
Pau Espin Pedrol83142be2020-11-26 19:34:04 +0100348 /* Optional: Network feature support 10.5.5.23 */
349 /* msgb_v_put(msg, GSM48_IE_GMM_NET_FEAT_SUPPORT | 0x00);*/
350
Max82040102016-07-06 11:59:18 +0200351 return gsm48_gmm_sendmsg(msg, 0, mm, true);
Harald Welte9b455bf2010-03-14 15:45:01 +0800352}
353
354/* Chapter 9.4.5: Attach reject */
Harald Welteeb98c742015-08-16 17:11:32 +0200355static int _tx_gmm_att_rej(struct msgb *msg, uint8_t gmm_cause,
356 const struct sgsn_mm_ctx *mm)
Harald Welte9b455bf2010-03-14 15:45:01 +0800357{
Harald Welte9b455bf2010-03-14 15:45:01 +0800358 struct gsm48_hdr *gh;
359
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200360 LOGMMCTXP(LOGL_NOTICE, mm, "<- GMM ATTACH REJECT: %s\n",
Harald Welteeb98c742015-08-16 17:11:32 +0200361 get_value_string(gsm48_gmm_cause_names, gmm_cause));
Pau Espin Pedrola33f0062021-06-04 17:27:03 +0200362 rate_ctr_inc(rate_ctr_group_get_ctr(sgsn->rate_ctrs, CTR_GPRS_ATTACH_REJECTED));
Harald Welte9b455bf2010-03-14 15:45:01 +0800363
Harald Welte9b455bf2010-03-14 15:45:01 +0800364 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
365 gh->proto_discr = GSM48_PDISC_MM_GPRS;
366 gh->msg_type = GSM48_MT_GMM_ATTACH_REJ;
367 gh->data[0] = gmm_cause;
368
Max82040102016-07-06 11:59:18 +0200369 return gsm48_gmm_sendmsg(msg, 0, NULL, false);
Harald Welte9b455bf2010-03-14 15:45:01 +0800370}
Harald Welte6463c072010-05-18 17:04:55 +0200371static int gsm48_tx_gmm_att_rej_oldmsg(const struct msgb *old_msg,
372 uint8_t gmm_cause)
373{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100374 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ATT REJ OLD");
Harald Welte6463c072010-05-18 17:04:55 +0200375 gmm_copy_id(msg, old_msg);
Harald Welteeb98c742015-08-16 17:11:32 +0200376 return _tx_gmm_att_rej(msg, gmm_cause, NULL);
Harald Welte6463c072010-05-18 17:04:55 +0200377}
Alexander Couzensd4788cd2018-05-02 22:32:19 +0200378int gsm48_tx_gmm_att_rej(struct sgsn_mm_ctx *mm,
Harald Welte6463c072010-05-18 17:04:55 +0200379 uint8_t gmm_cause)
380{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100381 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ATT REJ");
Harald Welte6463c072010-05-18 17:04:55 +0200382 mmctx2msgid(msg, mm);
Harald Welteeb98c742015-08-16 17:11:32 +0200383 return _tx_gmm_att_rej(msg, gmm_cause, mm);
Harald Welte6463c072010-05-18 17:04:55 +0200384}
Harald Welte9b455bf2010-03-14 15:45:01 +0800385
Harald Welte2720e732010-05-17 00:44:57 +0200386/* Chapter 9.4.6.2 Detach accept */
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200387static int _tx_detach_ack(struct msgb *msg, uint8_t force_stby,
388 struct sgsn_mm_ctx *mm)
Harald Welte2720e732010-05-17 00:44:57 +0200389{
Harald Welte2720e732010-05-17 00:44:57 +0200390 struct gsm48_hdr *gh;
391
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200392 /* MMCTX might be NULL! */
Harald Welte2720e732010-05-17 00:44:57 +0200393
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200394 DEBUGP(DMM, "<- GMM DETACH ACC (force-standby: %d)\n", force_stby);
Pau Espin Pedrola33f0062021-06-04 17:27:03 +0200395 rate_ctr_inc(rate_ctr_group_get_ctr(sgsn->rate_ctrs, CTR_GPRS_DETACH_ACKED));
Harald Welte6463c072010-05-18 17:04:55 +0200396
Harald Welte2720e732010-05-17 00:44:57 +0200397 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
398 gh->proto_discr = GSM48_PDISC_MM_GPRS;
399 gh->msg_type = GSM48_MT_GMM_DETACH_ACK;
400 gh->data[0] = force_stby;
401
Max82040102016-07-06 11:59:18 +0200402 return gsm48_gmm_sendmsg(msg, 0, mm, true);
Harald Welte2720e732010-05-17 00:44:57 +0200403}
404
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200405static int gsm48_tx_gmm_det_ack(struct sgsn_mm_ctx *mm, uint8_t force_stby)
406{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100407 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 DET ACK");
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200408
409 mmctx2msgid(msg, mm);
410 return _tx_detach_ack(msg, force_stby, mm);
411}
412
413static int gsm48_tx_gmm_det_ack_oldmsg(struct msgb *oldmsg, uint8_t force_stby)
414{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100415 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 DET ACK OLD");
Jacob Erlbeck5a38f642014-10-21 13:09:55 +0200416
417 gmm_copy_id(msg, oldmsg);
418 return _tx_detach_ack(msg, force_stby, NULL);
419}
420
Harald Welte9b455bf2010-03-14 15:45:01 +0800421/* Transmit Chapter 9.4.12 Identity Request */
Alexander Couzensd4788cd2018-05-02 22:32:19 +0200422int gsm48_tx_gmm_id_req(struct sgsn_mm_ctx *mm, uint8_t id_type)
Harald Welte9b455bf2010-03-14 15:45:01 +0800423{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100424 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ID REQ");
Harald Welte9b455bf2010-03-14 15:45:01 +0800425 struct gsm48_hdr *gh;
426
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200427 LOGMMCTXP(LOGL_DEBUG, mm, "<- GMM IDENTITY REQUEST: mi_type=%s\n",
Harald Welteb9845f92015-08-16 18:07:48 +0200428 gsm48_mi_type_name(id_type));
Harald Welte9b455bf2010-03-14 15:45:01 +0800429
Harald Welte6463c072010-05-18 17:04:55 +0200430 mmctx2msgid(msg, mm);
Harald Welte9b455bf2010-03-14 15:45:01 +0800431
432 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
433 gh->proto_discr = GSM48_PDISC_MM_GPRS;
434 gh->msg_type = GSM48_MT_GMM_ID_REQ;
435 /* 10.5.5.9 ID type 2 + identity type and 10.5.5.7 'force to standby' IE */
436 gh->data[0] = id_type & 0xf;
437
Max82040102016-07-06 11:59:18 +0200438 return gsm48_gmm_sendmsg(msg, 1, mm, false);
Harald Welte9b455bf2010-03-14 15:45:01 +0800439}
440
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100441/* determine if the MS/UE supports R99 or later */
442static bool mmctx_is_r99(const struct sgsn_mm_ctx *mm)
443{
444 if (mm->ms_network_capa.len < 1)
445 return false;
446 if (mm->ms_network_capa.buf[0] & 0x01)
447 return true;
448 return false;
449}
450
Eric2f898262021-05-19 18:57:50 +0200451static enum gprs_ciph_algo gprs_ms_net_select_best_gea(uint8_t net_mask, uint8_t ms_mask) {
452 uint8_t common_mask = net_mask & ms_mask;
453 uint8_t r = 0;
454
455 while (common_mask >>= 1) {
456 r++;
457 }
458
459 return r;
460}
461
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +0200462/* 3GPP TS 24.008 § 9.4.9: Authentication and Ciphering Request */
Alexander Couzensd4788cd2018-05-02 22:32:19 +0200463int gsm48_tx_gmm_auth_ciph_req(struct sgsn_mm_ctx *mm,
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100464 const struct osmo_auth_vector *vec,
Maxb997f842016-07-06 15:57:01 +0200465 uint8_t key_seq, bool force_standby)
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200466{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100467 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 AUTH CIPH REQ");
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200468 struct gsm48_hdr *gh;
469 struct gsm48_auth_ciph_req *acreq;
Max4011e722016-07-05 15:19:12 +0200470 uint8_t *m_rand, *m_cksn, rbyte;
Max3b6332f2017-11-01 13:28:38 +0100471 int rc;
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200472
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200473 LOGMMCTXP(LOGL_INFO, mm, "<- GMM AUTH AND CIPHERING REQ (rand = %s,"
Neels Hofmeyr918a47b2018-04-30 21:59:34 +0200474 " mmctx_is_r99=%d, vec->auth_types=0x%x",
475 osmo_hexdump(vec->rand, sizeof(vec->rand)),
476 mmctx_is_r99(mm), vec->auth_types);
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100477 if (mmctx_is_r99(mm) && vec
478 && (vec->auth_types & OSMO_AUTH_TYPE_UMTS)) {
479 LOGPC(DMM, LOGL_INFO, ", autn = %s)\n",
480 osmo_hexdump(vec->autn, sizeof(vec->autn)));
481 } else
482 LOGPC(DMM, LOGL_INFO, ")\n");
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200483
484 mmctx2msgid(msg, mm);
485
486 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
487 gh->proto_discr = GSM48_PDISC_MM_GPRS;
488 gh->msg_type = GSM48_MT_GMM_AUTH_CIPH_REQ;
489
490 acreq = (struct gsm48_auth_ciph_req *) msgb_put(msg, sizeof(*acreq));
Maxb997f842016-07-06 15:57:01 +0200491 acreq->ciph_alg = mm->ciph_algo & 0xf;
492 /* § 10.5.5.10: */
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200493 acreq->imeisv_req = 0x1;
Maxb997f842016-07-06 15:57:01 +0200494 /* § 10.5.5.7: */
495 acreq->force_stby = force_standby;
Max4011e722016-07-05 15:19:12 +0200496 /* 3GPP TS 24.008 § 10.5.5.19: */
Max3b6332f2017-11-01 13:28:38 +0100497 rc = osmo_get_rand_id(&rbyte, 1);
498 if (rc < 0) {
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +0200499 LOGMMCTXP(LOGL_ERROR, mm, "osmo_get_rand_id() failed for A&C ref: %s\n", strerror(-rc));
Max3b6332f2017-11-01 13:28:38 +0100500 return rc;
501 }
502
503 acreq->ac_ref_nr = rbyte;
Max4011e722016-07-05 15:19:12 +0200504 mm->ac_ref_nr_used = acreq->ac_ref_nr;
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200505
506 /* Only if authentication is requested we need to set RAND + CKSN */
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100507 if (vec) {
508 m_rand = msgb_put(msg, sizeof(vec->rand) + 1);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200509 m_rand[0] = GSM48_IE_GMM_AUTH_RAND;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100510 memcpy(m_rand + 1, vec->rand, sizeof(vec->rand));
511
Maxb997f842016-07-06 15:57:01 +0200512 /* § 10.5.1.2: */
Jacob Erlbeck65d82732014-12-01 10:36:17 +0100513 m_cksn = msgb_put(msg, 1);
514 m_cksn[0] = (GSM48_IE_GMM_CIPH_CKSN << 4) | (key_seq & 0x07);
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100515
516 /* A Release99 or higher MS/UE must be able to handle
517 * the optional AUTN IE. If a classic GSM SIM is
518 * inserted, it will simply ignore AUTN and just use
519 * RAND */
520 if (mmctx_is_r99(mm) &&
521 (vec->auth_types & OSMO_AUTH_TYPE_UMTS)) {
522 msgb_tlv_put(msg, GSM48_IE_GMM_AUTN,
523 sizeof(vec->autn), vec->autn);
524 }
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200525 }
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200526
Max82040102016-07-06 11:59:18 +0200527 return gsm48_gmm_sendmsg(msg, 1, mm, false);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200528}
529
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +0200530/* 3GPP TS 24.008 § 9.4.11: Authentication and Ciphering Reject */
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200531static int gsm48_tx_gmm_auth_ciph_rej(struct sgsn_mm_ctx *mm)
532{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100533 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 AUTH CIPH REJ");
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200534 struct gsm48_hdr *gh;
535
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200536 LOGMMCTXP(LOGL_NOTICE, mm, "<- GMM AUTH AND CIPH REJECT\n");
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200537
538 mmctx2msgid(msg, mm);
539
540 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
541 gh->proto_discr = GSM48_PDISC_MM_GPRS;
542 gh->msg_type = GSM48_MT_GMM_AUTH_CIPH_REJ;
543
Max82040102016-07-06 11:59:18 +0200544 return gsm48_gmm_sendmsg(msg, 0, mm, false);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200545}
546
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100547/* check if the received authentication response matches */
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200548static enum osmo_sub_auth_type check_auth_resp(struct sgsn_mm_ctx *ctx,
549 bool is_utran,
550 const struct osmo_auth_vector *vec,
551 const uint8_t *res, uint8_t res_len)
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100552{
553 const uint8_t *expect_res;
554 uint8_t expect_res_len;
555 enum osmo_sub_auth_type expect_type;
556 const char *expect_str;
557
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100558 /* On UTRAN (3G) we always expect UMTS AKA. On GERAN (2G) we sent AUTN
559 * and expect UMTS AKA if there is R99 capability and our vector
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200560 * supports UMTS AKA, otherwise we expect GSM AKA.
561 * However, on GERAN, even if we sent a UMTS AKA Authentication Request, the MS may decide to
562 * instead reply with a GSM AKA SRES response. */
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100563 if (is_utran
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200564 || (mmctx_is_r99(ctx) && (vec->auth_types & OSMO_AUTH_TYPE_UMTS)
565 && (res_len > sizeof(vec->sres)))) {
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100566 expect_type = OSMO_AUTH_TYPE_UMTS;
567 expect_str = "UMTS RES";
568 expect_res = vec->res;
569 expect_res_len = vec->res_len;
570 } else {
571 expect_type = OSMO_AUTH_TYPE_GSM;
572 expect_str = "GSM SRES";
573 expect_res = vec->sres;
574 expect_res_len = sizeof(vec->sres);
575 }
Pau Espin Pedrold04e6692018-01-07 18:14:12 +0100576
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100577 if (!(vec->auth_types & expect_type)) {
578 LOGMMCTXP(LOGL_ERROR, ctx, "Auth error: auth vector does"
579 " not provide the expected auth type:"
580 " expected %s = 0x%x, auth_types are 0x%x\n",
581 expect_str, expect_type, vec->auth_types);
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200582 return OSMO_AUTH_TYPE_NONE;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100583 }
584
585 if (!res)
586 goto auth_mismatch;
587
588 if (res_len != expect_res_len)
589 goto auth_mismatch;
590
591 if (memcmp(res, expect_res, res_len) != 0)
592 goto auth_mismatch;
593
594 /* Authorized! */
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200595 return expect_type;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100596
597auth_mismatch:
598 LOGMMCTXP(LOGL_ERROR, ctx, "Auth mismatch: expected %s = %s\n",
599 expect_str, osmo_hexdump_nospc(expect_res, expect_res_len));
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200600 return OSMO_AUTH_TYPE_NONE;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100601}
602
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +0200603/* 3GPP TS 24.008 § 9.4.10: Authentication and Ciphering Response */
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200604static int gsm48_rx_gmm_auth_ciph_resp(struct sgsn_mm_ctx *ctx,
605 struct msgb *msg)
606{
607 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
608 struct gsm48_auth_ciph_resp *acr = (struct gsm48_auth_ciph_resp *)gh->data;
609 struct tlv_parsed tp;
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100610 struct gsm_auth_tuple *at;
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100611 const char *res_name = "(no response)";
612 uint8_t res[16];
613 uint8_t res_len;
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100614 int rc;
615
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200616 LOGMMCTXP(LOGL_INFO, ctx, "-> GMM AUTH AND CIPH RESPONSE\n");
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100617
618 if (ctx->auth_triplet.key_seq == GSM_KEY_SEQ_INVAL) {
619 LOGMMCTXP(LOGL_NOTICE, ctx,
620 "Unexpected Auth & Ciph Response (ignored)\n");
621 return 0;
622 }
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200623
Max4011e722016-07-05 15:19:12 +0200624 if (acr->ac_ref_nr != ctx->ac_ref_nr_used) {
625 LOGMMCTXP(LOGL_NOTICE, ctx, "Reference mismatch for Auth & Ciph"
626 " Response: %u received, %u expected\n",
627 acr->ac_ref_nr, ctx->ac_ref_nr_used);
628 return 0;
629 }
630
Jacob Erlbeckbd0cf112014-12-01 12:33:33 +0100631 /* Stop T3360 */
632 mmctx_timer_stop(ctx, 3360);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200633
Holger Hans Peter Freyther1768a572014-04-04 12:40:34 +0200634 tlv_parse(&tp, &gsm48_gmm_att_tlvdef, acr->data,
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200635 (msg->data + msg->len) - acr->data, 0, 0);
636
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200637 if (!TLVP_PRESENT(&tp, GSM48_IE_GMM_AUTH_SRES) ||
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100638 !TLVP_PRESENT(&tp, GSM48_IE_GMM_IMEISV) ||
639 TLVP_LEN(&tp,GSM48_IE_GMM_AUTH_SRES) != 4) {
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100640 /* TODO: missing mandatory IE, return STATUS or REJ? */
641 LOGMMCTXP(LOGL_ERROR, ctx, "Missing mandantory IE\n");
642 return -EINVAL;
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200643 }
644
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100645 /* Start with the good old 4-byte SRES */
646 memcpy(res, TLVP_VAL(&tp, GSM48_IE_GMM_AUTH_SRES), 4);
647 res_len = 4;
648 res_name = "GSM SRES";
649
650 /* Append extended RES as part of UMTS AKA, if any */
651 if (TLVP_PRESENT(&tp, GSM48_IE_GMM_AUTH_RES_EXT)) {
652 unsigned int l = TLVP_LEN(&tp, GSM48_IE_GMM_AUTH_RES_EXT);
653 if (l > sizeof(res)-4)
654 l = sizeof(res)-4;
655 memcpy(res+4, TLVP_VAL(&tp, GSM48_IE_GMM_AUTH_RES_EXT), l);
656 res_len += l;
657 res_name = "UMTS RES";
658 }
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100659
660 at = &ctx->auth_triplet;
661
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100662 LOGMMCTXP(LOGL_DEBUG, ctx, "checking auth: received %s = %s\n",
663 res_name, osmo_hexdump(res, res_len));
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200664 ctx->sec_ctx = check_auth_resp(ctx, false, &at->vec, res, res_len);
665 if (!sgsn_mm_ctx_is_authenticated(ctx)) {
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100666 rc = gsm48_tx_gmm_auth_ciph_rej(ctx);
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200667 mm_ctx_cleanup_free(ctx, "GMM AUTH AND CIPH REJECT");
Jacob Erlbeck8ff3fb02014-12-01 12:44:24 +0100668 return rc;
669 }
670
Daniel Willmann3ecfbbb2016-05-21 00:16:55 +0200671 if (ctx->ran_type == MM_CTX_T_UTRAN_Iu)
672 ctx->iu.new_key = 1;
673
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200674 /* FIXME: enable LLC cipheirng */
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100675
676 /* Check if we can let the mobile station enter */
Alexander Couzensf7198d72018-05-22 18:29:14 +0200677 return osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_AUTH_RESP_RECV_SUCCESS, NULL);
Harald Welte4b6ac1e2010-07-03 11:09:06 +0200678}
679
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +0200680/* 3GPP TS 24.008 § 9.4.10: Authentication and Ciphering Failure */
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100681static int gsm48_rx_gmm_auth_ciph_fail(struct sgsn_mm_ctx *ctx,
682 struct msgb *msg)
683{
684 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
685 struct tlv_parsed tp;
686 const uint8_t gmm_cause = gh->data[0];
687 const uint8_t *auts;
688 int rc;
689
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200690 LOGMMCTXP(LOGL_INFO, ctx, "-> GMM AUTH AND CIPH FAILURE (cause = %s)\n",
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100691 get_value_string(gsm48_gmm_cause_names, gmm_cause));
692
693 tlv_parse(&tp, &gsm48_gmm_att_tlvdef, gh->data+1, msg->len - 1, 0, 0);
694
695 /* Only if GMM cause is present and the AUTS is provided, we can
696 * start re-sync procedure */
697 if (gmm_cause == GMM_CAUSE_SYNC_FAIL &&
698 TLVP_PRESENT(&tp, GSM48_IE_GMM_AUTH_FAIL_PAR)) {
699 if (TLVP_LEN(&tp, GSM48_IE_GMM_AUTH_FAIL_PAR) != 14) {
700 LOGMMCTXP(LOGL_ERROR, ctx, "AUTS IE has wrong size:"
701 " expected %d, got %u\n", 14,
702 TLVP_LEN(&tp, GSM48_IE_GMM_AUTH_FAIL_PAR));
703 return -EINVAL;
704 }
705 auts = TLVP_VAL(&tp, GSM48_IE_GMM_AUTH_FAIL_PAR);
706
707 LOGMMCTXP(LOGL_INFO, ctx,
708 "R99 AUTHENTICATION SYNCH (AUTS = %s)\n",
709 osmo_hexdump_nospc(auts, 14));
710
711 /* make sure we'll refresh the auth_triplet in
712 * sgsn_auth_update() */
713 ctx->auth_triplet.key_seq = GSM_KEY_SEQ_INVAL;
714
715 /* make sure we'll retry authentication after the resync */
716 ctx->auth_state = SGSN_AUTH_UMTS_RESYNC;
717
718 /* Send AUTS to HLR and wait for new Auth Info Result */
719 rc = gprs_subscr_request_auth_info(ctx, auts,
720 ctx->auth_triplet.vec.rand);
721 if (!rc)
Alexander Couzensf7198d72018-05-22 18:29:14 +0200722 return osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_AUTH_RESP_RECV_RESYNC, NULL);
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100723 /* on error, fall through to send a reject */
724 LOGMMCTXP(LOGL_ERROR, ctx,
725 "Sending AUTS to HLR failed (rc = %d)\n", rc);
726 }
727
728 LOGMMCTXP(LOGL_NOTICE, ctx, "Authentication failed\n");
729 rc = gsm48_tx_gmm_auth_ciph_rej(ctx);
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200730 mm_ctx_cleanup_free(ctx, "GMM AUTH FAILURE");
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100731 return rc;
732}
733
Alexander Couzens8007be42018-05-14 06:48:24 +0200734void extract_subscr_msisdn(struct sgsn_mm_ctx *ctx)
Holger Hans Peter Freyther20de3ae2015-05-05 22:52:40 +0200735{
736 struct gsm_mncc_number called;
737 uint8_t msisdn[sizeof(ctx->subscr->sgsn_data->msisdn) + 1];
738
739 /* Convert MSISDN from encoded to string.. */
740 if (!ctx->subscr)
741 return;
742
743 if (ctx->subscr->sgsn_data->msisdn_len < 1)
744 return;
745
746 /* prepare the data for the decoder */
747 memset(&called, 0, sizeof(called));
748 msisdn[0] = ctx->subscr->sgsn_data->msisdn_len;
749 memcpy(&msisdn[1], ctx->subscr->sgsn_data->msisdn,
750 ctx->subscr->sgsn_data->msisdn_len);
751
752 /* decode the string now */
753 gsm48_decode_called(&called, msisdn);
754
755 /* Prepend a '+' for international numbers */
756 if (called.plan == 1 && called.type == 1) {
757 ctx->msisdn[0] = '+';
Neels Hofmeyr93bafb62017-01-13 03:12:08 +0100758 osmo_strlcpy(&ctx->msisdn[1], called.number,
759 sizeof(ctx->msisdn));
Holger Hans Peter Freyther20de3ae2015-05-05 22:52:40 +0200760 } else {
Neels Hofmeyr93bafb62017-01-13 03:12:08 +0100761 osmo_strlcpy(ctx->msisdn, called.number, sizeof(ctx->msisdn));
Holger Hans Peter Freyther20de3ae2015-05-05 22:52:40 +0200762 }
763}
764
Alexander Couzens8007be42018-05-14 06:48:24 +0200765void extract_subscr_hlr(struct sgsn_mm_ctx *ctx)
Holger Hans Peter Freyther8ee13e22015-05-18 10:00:03 +0200766{
767 struct gsm_mncc_number called;
768 uint8_t hlr_number[sizeof(ctx->subscr->sgsn_data->hlr) + 1];
769
770 if (!ctx->subscr)
771 return;
772
773 if (ctx->subscr->sgsn_data->hlr_len < 1)
774 return;
775
776 /* prepare the data for the decoder */
777 memset(&called, 0, sizeof(called));
778 hlr_number[0] = ctx->subscr->sgsn_data->hlr_len;
779 memcpy(&hlr_number[1], ctx->subscr->sgsn_data->hlr,
780 ctx->subscr->sgsn_data->hlr_len);
781
782 /* decode the string now */
783 gsm48_decode_called(&called, hlr_number);
784
785 if (called.plan != 1) {
786 LOGMMCTXP(LOGL_ERROR, ctx,
787 "Numbering plan(%d) not allowed\n",
788 called.plan);
789 return;
790 }
791
792 if (called.type != 1) {
793 LOGMMCTXP(LOGL_ERROR, ctx,
794 "Numbering type(%d) not allowed\n",
795 called.type);
796 return;
797 }
798
Neels Hofmeyr93bafb62017-01-13 03:12:08 +0100799 osmo_strlcpy(ctx->hlr, called.number, sizeof(ctx->hlr));
Holger Hans Peter Freyther8ee13e22015-05-18 10:00:03 +0200800}
801
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200802#ifdef BUILD_IU
803/* Chapter 9.4.21: Service accept */
804static int gsm48_tx_gmm_service_ack(struct sgsn_mm_ctx *mm)
805{
806 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 SERVICE ACK");
807 struct gsm48_hdr *gh;
808
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200809 LOGMMCTXP(LOGL_INFO, mm, "<- GMM SERVICE ACCEPT (P-TMSI=0x%08x)\n", mm->p_tmsi);
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200810
811 mmctx2msgid(msg, mm);
812
813 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
814 gh->proto_discr = GSM48_PDISC_MM_GPRS;
815 gh->msg_type = GSM48_MT_GMM_SERVICE_ACK;
816
817 /* Optional: PDP context status */
818 /* Optional: MBMS context status */
819
820 return gsm48_gmm_sendmsg(msg, 0, mm, false);
821}
822#endif
823
824/* Chapter 9.4.22: Service reject */
825static int _tx_gmm_service_rej(struct msgb *msg, uint8_t gmm_cause,
826 const struct sgsn_mm_ctx *mm)
827{
828 struct gsm48_hdr *gh;
829
Pau Espin Pedrolf025e582021-04-13 11:58:59 +0200830 LOGMMCTXP(LOGL_NOTICE, mm, "<- GMM SERVICE REJECT: %s\n",
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200831 get_value_string(gsm48_gmm_cause_names, gmm_cause));
832
833 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
834 gh->proto_discr = GSM48_PDISC_MM_GPRS;
835 gh->msg_type = GSM48_MT_GMM_SERVICE_REJ;
836 gh->data[0] = gmm_cause;
837
838 return gsm48_gmm_sendmsg(msg, 0, NULL, true);
839}
840static int gsm48_tx_gmm_service_rej_oldmsg(const struct msgb *old_msg,
841 uint8_t gmm_cause)
842{
843 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 SERVICE REJ OLD");
844 gmm_copy_id(msg, old_msg);
845 return _tx_gmm_service_rej(msg, gmm_cause, NULL);
846}
847#if 0
848-- currently unused --
849static int gsm48_tx_gmm_service_rej(struct sgsn_mm_ctx *mm,
850 uint8_t gmm_cause)
851{
852 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 SERVICE REJ");
853 mmctx2msgid(msg, mm);
854 return _tx_gmm_service_rej(msg, gmm_cause, mm);
855}
856#endif
857
858static int gsm48_tx_gmm_ra_upd_ack(struct sgsn_mm_ctx *mm);
859
Harald Welte9b455bf2010-03-14 15:45:01 +0800860/* Check if we can already authorize a subscriber */
Pau Espin Pedrol6dfb5fe2019-08-29 17:21:00 +0200861int gsm48_gmm_authorize(struct sgsn_mm_ctx *ctx)
Harald Welte9b455bf2010-03-14 15:45:01 +0800862{
Daniel Willmann3ecfbbb2016-05-21 00:16:55 +0200863#ifdef BUILD_IU
864 int rc;
865#endif
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +0200866#ifndef PTMSI_ALLOC
867 struct sgsn_signal_data sig_data;
868#endif
869
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100870 /* Request IMSI and IMEI from the MS if they are unknown */
Harald Weltec2e8cc42010-05-31 20:23:38 +0200871 if (!strlen(ctx->imei)) {
Harald Weltec2e8cc42010-05-31 20:23:38 +0200872 ctx->t3370_id_type = GSM_MI_TYPE_IMEI;
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200873 mmctx_timer_start(ctx, 3370);
Harald Welte6463c072010-05-18 17:04:55 +0200874 return gsm48_tx_gmm_id_req(ctx, GSM_MI_TYPE_IMEI);
Harald Weltec2e8cc42010-05-31 20:23:38 +0200875 }
Harald Weltec2e8cc42010-05-31 20:23:38 +0200876 if (!strlen(ctx->imsi)) {
Harald Weltec2e8cc42010-05-31 20:23:38 +0200877 ctx->t3370_id_type = GSM_MI_TYPE_IMSI;
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200878 mmctx_timer_start(ctx, 3370);
Harald Welte6463c072010-05-18 17:04:55 +0200879 return gsm48_tx_gmm_id_req(ctx, GSM_MI_TYPE_IMSI);
Harald Weltec2e8cc42010-05-31 20:23:38 +0200880 }
Harald Welte9b455bf2010-03-14 15:45:01 +0800881
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100882 /* All information required for authentication is available */
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100883 ctx->t3370_id_type = GSM_MI_TYPE_NONE;
884
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200885 if (ctx->auth_state == SGSN_AUTH_UNKNOWN) {
886 /* Request authorization, this leads to a call to
Jacob Erlbeckf951a012014-11-07 14:17:44 +0100887 * sgsn_auth_update which in turn calls
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200888 * gsm0408_gprs_access_granted or gsm0408_gprs_access_denied */
889
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100890 sgsn_auth_request(ctx);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200891 /* Note that gsm48_gmm_authorize can be called recursively via
892 * sgsn_auth_request iff ctx->auth_info changes to AUTH_ACCEPTED
893 */
894 return 0;
895 }
896
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200897 if (ctx->auth_state == SGSN_AUTH_AUTHENTICATE
898 && !sgsn_mm_ctx_is_authenticated(ctx)) {
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100899 struct gsm_auth_tuple *at = &ctx->auth_triplet;
900
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200901 mmctx_timer_start(ctx, 3360);
Neels Hofmeyr058cd572017-02-24 06:24:45 +0100902 return gsm48_tx_gmm_auth_ciph_req(ctx, &at->vec, at->key_seq,
903 false);
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100904 }
905
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200906 if (ctx->auth_state == SGSN_AUTH_AUTHENTICATE && sgsn_mm_ctx_is_authenticated(ctx) &&
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100907 ctx->auth_triplet.key_seq != GSM_KEY_SEQ_INVAL) {
908 /* Check again for authorization */
909 sgsn_auth_request(ctx);
910 return 0;
911 }
912
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200913 if (ctx->auth_state != SGSN_AUTH_ACCEPTED) {
914 LOGMMCTXP(LOGL_NOTICE, ctx,
915 "authorization is denied, aborting procedure\n");
916 return -EACCES;
Jacob Erlbeck0c06f982014-10-29 22:12:20 +0100917 }
918
919 /* The MS is authorized */
Daniel Willmann3ecfbbb2016-05-21 00:16:55 +0200920#ifdef BUILD_IU
921 if (ctx->ran_type == MM_CTX_T_UTRAN_Iu && !ctx->iu.ue_ctx->integrity_active) {
Neels Hofmeyr3c7656a2022-03-07 15:38:59 +0100922 /* Is any encryption above UEA0 enabled? */
923 bool send_ck = sgsn->cfg.uea_encryption_mask > (1 << OSMO_UTRAN_UEA0);
924 LOGMMCTXP(LOGL_DEBUG, ctx, "Iu Security Mode Command: %s encryption key (UEA encryption mask = 0x%x)\n",
925 send_ck ? "sending" : "not sending", sgsn->cfg.uea_encryption_mask);
926 /* FIXME: we should send the set of allowed UEA, as in ranap_new_msg_sec_mod_cmd2(). However, this
927 * is not possible in the iu_client API. See OS#5487. */
928 rc = ranap_iu_tx_sec_mode_cmd(ctx->iu.ue_ctx, &ctx->auth_triplet.vec, send_ck, ctx->iu.new_key);
Daniel Willmann3ecfbbb2016-05-21 00:16:55 +0200929 ctx->iu.new_key = 0;
930 return rc;
931 }
932#endif
Jacob Erlbeck0c06f982014-10-29 22:12:20 +0100933
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100934 switch (ctx->pending_req) {
935 case 0:
936 LOGMMCTXP(LOGL_INFO, ctx,
937 "no pending request, authorization completed\n");
938 break;
939 case GSM48_MT_GMM_ATTACH_REQ:
Daniel Willmannfac97582016-05-21 00:21:15 +0200940 ctx->pending_req = 0;
Holger Hans Peter Freyther20de3ae2015-05-05 22:52:40 +0200941
942 extract_subscr_msisdn(ctx);
Holger Hans Peter Freyther8ee13e22015-05-18 10:00:03 +0200943 extract_subscr_hlr(ctx);
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100944#ifdef PTMSI_ALLOC
945 /* Start T3350 and re-transmit up to 5 times until ATTACH COMPLETE */
Pau Espin Pedrola299d652019-08-14 19:11:10 +0200946 mmctx_timer_start(ctx, 3350);
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100947 ctx->t3350_mode = GMM_T3350_MODE_ATT;
Jacob Erlbeck0074a772014-10-28 16:23:46 +0100948#else
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +0200949 memset(&sig_data, 0, sizeof(sig_data));
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +0100950 sig_data.mm = ctx;
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +0200951 osmo_signal_dispatch(SS_SGSN, S_SGSN_ATTACH, &sig_data);
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +0100952 osmo_fsm_inst_dispatch(ctx->gmm_fsm, E_GMM_ATTACH_SUCCESS, NULL);
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100953#endif
954
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100955 return gsm48_tx_gmm_att_ack(ctx);
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200956#ifdef BUILD_IU
957 case GSM48_MT_GMM_SERVICE_REQ:
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200958 ctx->pending_req = 0;
Pau Espin Pedrolc67c90b2021-03-25 17:49:37 +0100959 osmo_fsm_inst_dispatch(ctx->iu.mm_state_fsm, E_PMM_PS_CONN_ESTABLISH, NULL);
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200960 rc = gsm48_tx_gmm_service_ack(ctx);
961
Daniel Willmannaf241722016-05-21 00:35:41 +0200962 if (ctx->iu.service.type != GPRS_SERVICE_T_SIGNALLING)
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200963 activate_pdp_rabs(ctx);
Daniel Willmann1dee2b62016-05-21 00:15:29 +0200964
965 return rc;
966#endif
967 case GSM48_MT_GMM_RA_UPD_REQ:
968 ctx->pending_req = 0;
969 /* Send RA UPDATE ACCEPT */
970 return gsm48_tx_gmm_ra_upd_ack(ctx);
971
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +0100972 default:
973 LOGMMCTXP(LOGL_ERROR, ctx,
974 "only Attach Request is supported yet, "
975 "got request type %u\n", ctx->pending_req);
976 break;
977 }
978
Harald Welte9b455bf2010-03-14 15:45:01 +0800979 return 0;
980}
981
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100982void gsm0408_gprs_authenticate(struct sgsn_mm_ctx *ctx)
983{
Neels Hofmeyraa4ed672018-04-22 19:29:41 +0200984 ctx->sec_ctx = OSMO_AUTH_TYPE_NONE;
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100985
Alexander Couzensf7198d72018-05-22 18:29:14 +0200986 if (ctx->gmm_att_req.fsm->state != ST_INIT)
987 osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_VLR_ANSWERED, (void *) 0);
988 else
989 gsm48_gmm_authorize(ctx);
Jacob Erlbeck4adb1362014-12-02 09:47:26 +0100990}
991
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200992void gsm0408_gprs_access_granted(struct sgsn_mm_ctx *ctx)
993{
Pau Espin Pedrol31c46572019-09-02 16:45:27 +0200994 switch (ctx->gmm_fsm->state) {
995 case ST_GMM_COMMON_PROC_INIT:
Harald Welteeb98c742015-08-16 17:11:32 +0200996 LOGMMCTXP(LOGL_NOTICE, ctx,
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200997 "Authorized, continuing procedure, IMSI=%s\n",
998 ctx->imsi);
999 /* Continue with the authorization */
Alexander Couzensf7198d72018-05-22 18:29:14 +02001000 if (ctx->gmm_att_req.fsm->state != ST_INIT)
1001 osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_VLR_ANSWERED, (void *) 0);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001002 break;
1003 default:
Harald Welteeb98c742015-08-16 17:11:32 +02001004 LOGMMCTXP(LOGL_INFO, ctx,
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001005 "Authorized, ignored, IMSI=%s\n",
1006 ctx->imsi);
1007 }
1008}
1009
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001010void gsm0408_gprs_access_denied(struct sgsn_mm_ctx *ctx, int gmm_cause)
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001011{
Jacob Erlbeckd6267d12015-01-19 11:10:04 +01001012 if (gmm_cause == SGSN_ERROR_CAUSE_NONE)
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001013 gmm_cause = GMM_CAUSE_GPRS_NOTALLOWED;
1014
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001015 switch (ctx->gmm_fsm->state) {
1016 case ST_GMM_COMMON_PROC_INIT:
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001017 LOGMMCTXP(LOGL_NOTICE, ctx,
1018 "Not authorized, rejecting ATTACH REQUEST "
1019 "with cause '%s' (%d)\n",
1020 get_value_string(gsm48_gmm_cause_names, gmm_cause),
1021 gmm_cause);
Alexander Couzensf7198d72018-05-22 18:29:14 +02001022 if (ctx->gmm_att_req.fsm->state != ST_INIT)
1023 osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_REJECT, (void *) (long) gmm_cause);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001024 break;
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001025 case ST_GMM_REGISTERED_NORMAL:
1026 case ST_GMM_REGISTERED_SUSPENDED:
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001027 LOGMMCTXP(LOGL_NOTICE, ctx,
1028 "Authorization lost, detaching "
1029 "with cause '%s' (%d)\n",
1030 get_value_string(gsm48_gmm_cause_names, gmm_cause),
1031 gmm_cause);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001032 gsm48_tx_gmm_detach_req(
Alexander Couzens13c13122018-05-22 20:28:18 +02001033 ctx, GPRS_DET_T_MT_IMSI, gmm_cause);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001034
1035 mm_ctx_cleanup_free(ctx, "auth lost");
1036 break;
1037 default:
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001038 LOGMMCTXP(LOGL_INFO, ctx,
1039 "Authorization lost, cause is '%s' (%d)\n",
1040 get_value_string(gsm48_gmm_cause_names, gmm_cause),
1041 gmm_cause);
1042 mm_ctx_cleanup_free(ctx, "auth lost");
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +02001043 }
1044}
1045
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001046void gsm0408_gprs_access_cancelled(struct sgsn_mm_ctx *ctx, int gmm_cause)
Jacob Erlbeck98647ca2014-11-11 14:47:38 +01001047{
Jacob Erlbeckd6267d12015-01-19 11:10:04 +01001048 if (gmm_cause != SGSN_ERROR_CAUSE_NONE) {
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001049 LOGMMCTXP(LOGL_INFO, ctx,
1050 "Cancelled with cause '%s' (%d), deleting context\n",
1051 get_value_string(gsm48_gmm_cause_names, gmm_cause),
1052 gmm_cause);
1053 gsm0408_gprs_access_denied(ctx, gmm_cause);
1054 return;
Jacob Erlbeck98647ca2014-11-11 14:47:38 +01001055 }
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +01001056
1057 LOGMMCTXP(LOGL_INFO, ctx, "Cancelled, deleting context silently\n");
Jacob Erlbeck98647ca2014-11-11 14:47:38 +01001058 mm_ctx_cleanup_free(ctx, "access cancelled");
1059}
1060
Harald Welte9b455bf2010-03-14 15:45:01 +08001061/* Parse Chapter 9.4.13 Identity Response */
Harald Welted193cb32010-05-17 22:58:03 +02001062static int gsm48_rx_gmm_id_resp(struct sgsn_mm_ctx *ctx, struct msgb *msg)
Harald Welte9b455bf2010-03-14 15:45:01 +08001063{
Harald Welte943c5bc2010-04-30 16:33:12 +02001064 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001065 long mi_typel;
1066 char mi_log_string[32];
1067 struct osmo_mobile_identity mi;
Harald Welte9b455bf2010-03-14 15:45:01 +08001068
Harald Welte9b455bf2010-03-14 15:45:01 +08001069 if (!ctx) {
Daniel Willmann46553142014-09-03 17:46:44 +02001070 DEBUGP(DMM, "from unknown TLLI 0x%08x?!? This should not happen\n", msgb_tlli(msg));
Harald Welte9b455bf2010-03-14 15:45:01 +08001071 return -EINVAL;
1072 }
1073
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001074 if (osmo_mobile_identity_decode(&mi, &gh->data[1], gh->data[0], false)) {
1075 LOGMMCTXP(LOGL_ERROR, ctx, "-> GMM IDENTITY RESPONSE: cannot decode Mobile Identity\n");
1076 return -EINVAL;
1077 }
1078 osmo_mobile_identity_to_str_buf(mi_log_string, sizeof(mi_log_string), &mi);
1079
1080 LOGMMCTXP(LOGL_DEBUG, ctx, "-> GMM IDENTITY RESPONSE: MI=%s\n", mi_log_string);
Daniel Willmannf8070f42014-09-23 18:48:44 +02001081
Jacob Erlbeckfb26c602014-10-22 12:20:26 +02001082 if (ctx->t3370_id_type == GSM_MI_TYPE_NONE) {
1083 LOGMMCTXP(LOGL_NOTICE, ctx,
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001084 "Got unexpected IDENTITY RESPONSE: MI=%s, "
Jacob Erlbeckfb26c602014-10-22 12:20:26 +02001085 "ignoring message\n",
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001086 mi_log_string);
Jacob Erlbeckfb26c602014-10-22 12:20:26 +02001087 return -EINVAL;
1088 }
1089
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001090 if (mi.type == ctx->t3370_id_type)
Harald Weltec2e8cc42010-05-31 20:23:38 +02001091 mmctx_timer_stop(ctx, 3370);
1092
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001093 switch (mi.type) {
Harald Welte9b455bf2010-03-14 15:45:01 +08001094 case GSM_MI_TYPE_IMSI:
1095 /* we already have a mm context with current TLLI, but no
1096 * P-TMSI / IMSI yet. What we now need to do is to fill
1097 * this initial context with data from the HLR */
Harald Weltec728eea2010-12-24 23:07:18 +01001098 if (strlen(ctx->imsi) == 0) {
1099 /* Check if we already have a MM context for this IMSI */
1100 struct sgsn_mm_ctx *ictx;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001101 ictx = sgsn_mm_ctx_by_imsi(mi.imsi);
Harald Weltec728eea2010-12-24 23:07:18 +01001102 if (ictx) {
Jacob Erlbeck99985b52014-10-13 10:32:00 +02001103 /* Handle it like in gsm48_rx_gmm_det_req,
1104 * except that no messages are sent to the BSS */
1105
Daniel Willmann46553142014-09-03 17:46:44 +02001106 LOGMMCTXP(LOGL_NOTICE, ctx, "Deleting old MM Context for same IMSI "
1107 "p_tmsi_old=0x%08x\n",
1108 ictx->p_tmsi);
Jacob Erlbeck99985b52014-10-13 10:32:00 +02001109
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02001110 mm_ctx_cleanup_free(ictx, "GMM IMSI re-use");
Harald Weltec728eea2010-12-24 23:07:18 +01001111 }
1112 }
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001113 OSMO_STRLCPY_ARRAY(ctx->imsi, mi.imsi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001114 break;
1115 case GSM_MI_TYPE_IMEI:
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001116 OSMO_STRLCPY_ARRAY(ctx->imei, mi.imei);
Harald Welte9b455bf2010-03-14 15:45:01 +08001117 break;
1118 case GSM_MI_TYPE_IMEISV:
1119 break;
1120 }
1121
Harald Welte9b455bf2010-03-14 15:45:01 +08001122 /* Check if we can let the mobile station enter */
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001123 mi_typel = mi.type;
Alexander Couzensf7198d72018-05-22 18:29:14 +02001124 return osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_IDEN_RESP_RECV, (void *)mi_typel);
Harald Welte9b455bf2010-03-14 15:45:01 +08001125}
1126
Max86e04df2017-10-09 16:21:31 +02001127/* Allocate a new P-TMSI and change context state */
1128static inline void ptmsi_update(struct sgsn_mm_ctx *ctx)
1129{
1130 uint32_t ptmsi;
1131 /* Don't change the P-TMSI if a P-TMSI re-assignment is under way */
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001132 if (ctx->gmm_fsm->state != ST_GMM_COMMON_PROC_INIT) {
Max86e04df2017-10-09 16:21:31 +02001133 ptmsi = sgsn_alloc_ptmsi();
Max7ad8fa62017-10-09 16:26:43 +02001134 if (ptmsi != GSM_RESERVED_TMSI) {
1135 ctx->p_tmsi_old = ctx->p_tmsi;
1136 ctx->p_tmsi = ptmsi;
1137 } else
1138 LOGMMCTXP(LOGL_ERROR, ctx, "P-TMSI allocation failure: using old one.\n");
Max86e04df2017-10-09 16:21:31 +02001139 }
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001140 osmo_fsm_inst_dispatch(ctx->gmm_fsm, E_GMM_COMMON_PROC_INIT_REQ, NULL);
Max86e04df2017-10-09 16:21:31 +02001141}
1142
Daniel Willmannd999e542020-01-30 12:30:40 +01001143/* Detect if RAT has changed */
1144static bool mmctx_did_rat_change(struct sgsn_mm_ctx *mmctx, struct msgb *msg)
1145{
1146 if (MSG_IU_UE_CTX(msg) && mmctx->ran_type != MM_CTX_T_UTRAN_Iu)
1147 return true;
1148 if (!MSG_IU_UE_CTX(msg) && mmctx->ran_type != MM_CTX_T_GERAN_Gb)
1149 return true;
1150 return false;
1151}
1152
Alexander Couzens91a8bbd2019-09-11 03:38:14 +02001153/* Notify the FSM of a RAT change */
1154static void mmctx_handle_rat_change(struct sgsn_mm_ctx *mmctx, struct msgb *msg, struct gprs_llc_llme *llme)
1155{
1156 struct gmm_rat_change_data rat_chg = {
1157 .llme = llme
1158 };
1159
1160 rat_chg.new_ran_type = MSG_IU_UE_CTX(msg) ? MM_CTX_T_UTRAN_Iu : MM_CTX_T_GERAN_Gb;
1161
1162 if (rat_chg.new_ran_type != mmctx->ran_type)
1163 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_RAT_CHANGE, (void *) &rat_chg);
1164 else
1165 LOGMMCTXP(LOGL_ERROR, mmctx, "RAT didn't change or not implemented (ran_type=%u, "
1166 "msg_iu_ue_ctx=%p\n", mmctx->ran_type, MSG_IU_UE_CTX(msg));
1167
1168}
1169
Eric2f898262021-05-19 18:57:50 +02001170static uint8_t gprs_ms_net_cap_gea_mask(const uint8_t *ms_net_cap, uint8_t cap_len)
1171{
1172 uint8_t mask = (1 << GPRS_ALGO_GEA0);
1173 mask |= (0x80 & ms_net_cap[0]) ? (1 << GPRS_ALGO_GEA1) : 0;
1174
1175 if (cap_len < 2)
1176 return mask;
1177
1178 /* extended GEA bits start from 2nd bit of the next byte */
1179 mask |= (0x40 & ms_net_cap[1]) ? (1 << GPRS_ALGO_GEA2) : 0;
1180 mask |= (0x20 & ms_net_cap[1]) ? (1 << GPRS_ALGO_GEA3) : 0;
1181 mask |= (0x10 & ms_net_cap[1]) ? (1 << GPRS_ALGO_GEA4) : 0;
1182 return mask;
1183}
1184
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001185/* 3GPP TS 24.008 § 9.4.1 Attach request */
Harald Welte807a5d82010-06-01 11:53:01 +02001186static int gsm48_rx_gmm_att_req(struct sgsn_mm_ctx *ctx, struct msgb *msg,
1187 struct gprs_llc_llme *llme)
Harald Welte9b455bf2010-03-14 15:45:01 +08001188{
Harald Welte943c5bc2010-04-30 16:33:12 +02001189 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001190 uint8_t *cur = gh->data, *msnc, *mi_data, *ms_ra_acc_cap;
1191 uint8_t msnc_len, att_type, mi_len, ms_ra_acc_cap_len;
Harald Welteeaa614c2010-05-02 11:26:34 +02001192 uint16_t drx_par;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001193 char mi_log_string[32];
Harald Welte9b455bf2010-03-14 15:45:01 +08001194 struct gprs_ra_id ra_id;
Daniel Willmann61329d42016-05-21 17:36:18 +02001195 uint16_t cid = 0;
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001196 enum gsm48_gmm_cause reject_cause;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001197 struct osmo_mobile_identity mi;
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001198 int rc;
Harald Welte9b455bf2010-03-14 15:45:01 +08001199
Harald Welteeb98c742015-08-16 17:11:32 +02001200 LOGMMCTXP(LOGL_INFO, ctx, "-> GMM ATTACH REQUEST ");
Pau Espin Pedrola33f0062021-06-04 17:27:03 +02001201 rate_ctr_inc(rate_ctr_group_get_ctr(sgsn->rate_ctrs, CTR_GPRS_ATTACH_REQUEST));
Harald Welte9b455bf2010-03-14 15:45:01 +08001202
1203 /* As per TS 04.08 Chapter 4.7.1.4, the attach request arrives either
1204 * with a foreign TLLI (P-TMSI that was allocated to the MS before),
1205 * or with random TLLI. */
1206
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001207 if (!MSG_IU_UE_CTX(msg)) {
Daniel Willmann61329d42016-05-21 17:36:18 +02001208 /* Gb mode */
1209 cid = bssgp_parse_cell_id(&ra_id, msgb_bcid(msg));
Neels Hofmeyra7a39472017-07-05 15:19:52 +02001210 } else {
1211#ifdef BUILD_IU
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001212 ra_id = MSG_IU_UE_CTX(msg)->ra_id;
Neels Hofmeyra7a39472017-07-05 15:19:52 +02001213#else
1214 LOGMMCTXP(LOGL_ERROR, ctx, "Cannot handle Iu Attach Request, built without Iu support\n");
1215 return -ENOTSUP;
1216#endif
1217 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001218
1219 /* MS network capability 10.5.5.12 */
1220 msnc_len = *cur++;
1221 msnc = cur;
Alexander Chemeris84402c02013-07-03 10:12:23 +04001222 if (msnc_len > sizeof(ctx->ms_network_capa.buf))
Harald Welte9b455bf2010-03-14 15:45:01 +08001223 goto err_inval;
1224 cur += msnc_len;
1225
Alexander Couzensc44af532019-08-12 18:29:57 +02001226 /* TODO: In iu mode - handle follow-on request.
1227 * The follow-on request can be signaled in an Attach Request on IuPS.
1228 * This means the MS/UE asks to keep the PS connection open for further requests
1229 * after the Attach Request succeed.
1230 * The SGSN can decide if it close the connection or not. Both are spec conform. */
Daniel Willmann746c7892016-01-25 16:49:53 +01001231
Harald Welte9b455bf2010-03-14 15:45:01 +08001232 /* aTTACH Type 10.5.5.2 */
Daniel Willmann746c7892016-01-25 16:49:53 +01001233 att_type = *cur++ & 0x07;
Harald Welte9b455bf2010-03-14 15:45:01 +08001234
1235 /* DRX parameter 10.5.5.6 */
Harald Welte56a01452010-05-31 22:12:30 +02001236 drx_par = *cur++ << 8;
1237 drx_par |= *cur++;
Harald Welte9b455bf2010-03-14 15:45:01 +08001238
1239 /* Mobile Identity (P-TMSI or IMSI) 10.5.1.4 */
1240 mi_len = *cur++;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001241 mi_data = cur;
Harald Welte9b455bf2010-03-14 15:45:01 +08001242 cur += mi_len;
1243
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001244 rc = osmo_mobile_identity_decode(&mi, mi_data, mi_len, false);
1245 if (rc)
1246 goto err_inval;
1247 osmo_mobile_identity_to_str_buf(mi_log_string, sizeof(mi_log_string), &mi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001248
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001249 DEBUGPC(DMM, "MI(%s) type=\"%s\" ", mi_log_string,
Harald Welte2720e732010-05-17 00:44:57 +02001250 get_value_string(gprs_att_t_strs, att_type));
Harald Welte9b455bf2010-03-14 15:45:01 +08001251
Holger Hans Peter Freyther1768a572014-04-04 12:40:34 +02001252 /* Old routing area identification 10.5.5.15. Skip it */
Harald Welte9b455bf2010-03-14 15:45:01 +08001253 cur += 6;
1254
1255 /* MS Radio Access Capability 10.5.5.12a */
Harald Welte56a01452010-05-31 22:12:30 +02001256 ms_ra_acc_cap_len = *cur++;
1257 ms_ra_acc_cap = cur;
Alexander Chemeris84402c02013-07-03 10:12:23 +04001258 if (ms_ra_acc_cap_len > sizeof(ctx->ms_radio_access_capa.buf))
Harald Weltec48ac472010-07-03 21:20:06 +02001259 goto err_inval;
Harald Welte4b2ed352011-07-27 23:35:38 +02001260 cur += ms_ra_acc_cap_len;
Harald Welte9b455bf2010-03-14 15:45:01 +08001261
Daniel Willmann46553142014-09-03 17:46:44 +02001262 LOGPC(DMM, LOGL_INFO, "\n");
1263
Harald Welte9b455bf2010-03-14 15:45:01 +08001264 /* Optional: Old P-TMSI Signature, Requested READY timer, TMSI Status */
1265
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001266 switch (mi.type) {
Harald Welte9b455bf2010-03-14 15:45:01 +08001267 case GSM_MI_TYPE_IMSI:
1268 /* Try to find MM context based on IMSI */
Harald Welte807a5d82010-06-01 11:53:01 +02001269 if (!ctx)
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001270 ctx = sgsn_mm_ctx_by_imsi(mi.imsi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001271 if (!ctx) {
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001272 if (MSG_IU_UE_CTX(msg))
1273 ctx = sgsn_mm_ctx_alloc_iu(MSG_IU_UE_CTX(msg));
Daniel Willmann61329d42016-05-21 17:36:18 +02001274 else
Alexander Couzens2b5fb8e2017-02-04 06:01:00 +01001275 ctx = sgsn_mm_ctx_alloc_gb(0, &ra_id);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001276 if (!ctx) {
1277 reject_cause = GMM_CAUSE_NET_FAIL;
1278 goto rejected;
1279 }
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001280 OSMO_STRLCPY_ARRAY(ctx->imsi, mi.imsi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001281 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001282 break;
1283 case GSM_MI_TYPE_TMSI:
Harald Welte9b455bf2010-03-14 15:45:01 +08001284 /* Try to find MM context based on P-TMSI */
Harald Welte807a5d82010-06-01 11:53:01 +02001285 if (!ctx)
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001286 ctx = sgsn_mm_ctx_by_ptmsi(mi.tmsi);
Harald Welte9b455bf2010-03-14 15:45:01 +08001287 if (!ctx) {
Harald Weltec728eea2010-12-24 23:07:18 +01001288 /* Allocate a context as most of our code expects one.
1289 * Context will not have an IMSI ultil ID RESP is received */
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001290 if (MSG_IU_UE_CTX(msg))
1291 ctx = sgsn_mm_ctx_alloc_iu(MSG_IU_UE_CTX(msg));
Daniel Willmann61329d42016-05-21 17:36:18 +02001292 else
Alexander Couzens2b5fb8e2017-02-04 06:01:00 +01001293 ctx = sgsn_mm_ctx_alloc_gb(msgb_tlli(msg), &ra_id);
Neels Hofmeyraa7af4d2017-12-20 00:41:27 +01001294 if (!ctx) {
1295 reject_cause = GMM_CAUSE_NET_FAIL;
1296 goto rejected;
1297 }
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001298 ctx->p_tmsi = mi.tmsi;
Harald Welte9b455bf2010-03-14 15:45:01 +08001299 }
1300 break;
1301 default:
Harald Welteeb98c742015-08-16 17:11:32 +02001302 LOGMMCTXP(LOGL_NOTICE, ctx, "Rejecting ATTACH REQUEST with "
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001303 "MI %s\n", mi_log_string);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001304 reject_cause = GMM_CAUSE_MS_ID_NOT_DERIVED;
1305 goto rejected;
Harald Welte9b455bf2010-03-14 15:45:01 +08001306 }
Alexander Couzens4ec21762019-08-13 11:31:42 +02001307
Alexander Couzens91a8bbd2019-09-11 03:38:14 +02001308 if (mmctx_did_rat_change(ctx, msg))
1309 mmctx_handle_rat_change(ctx, msg, llme);
1310
Alexander Couzens4ec21762019-08-13 11:31:42 +02001311 if (ctx->ran_type == MM_CTX_T_GERAN_Gb) {
1312 ctx->gb.tlli = msgb_tlli(msg);
1313 ctx->gb.llme = llme;
1314 }
1315 msgid2mmctx(ctx, msg);
Harald Welte9f1f3ad2010-05-02 12:56:57 +02001316 /* Update MM Context with currient RA and Cell ID */
1317 ctx->ra = ra_id;
Harald Weltedbc72b32015-12-25 22:23:27 +01001318 if (ctx->ran_type == MM_CTX_T_GERAN_Gb)
1319 ctx->gb.cell_id = cid;
Daniel Willmann770f3e32016-05-21 00:31:12 +02001320
Harald Welte56a01452010-05-31 22:12:30 +02001321 /* Update MM Context with other data */
1322 ctx->drx_parms = drx_par;
Alexander Chemeris84402c02013-07-03 10:12:23 +04001323 ctx->ms_radio_access_capa.len = ms_ra_acc_cap_len;
Harald Welte4b2ed352011-07-27 23:35:38 +02001324 memcpy(ctx->ms_radio_access_capa.buf, ms_ra_acc_cap,
1325 ctx->ms_radio_access_capa.len);
Harald Welte56a01452010-05-31 22:12:30 +02001326 ctx->ms_network_capa.len = msnc_len;
1327 memcpy(ctx->ms_network_capa.buf, msnc, msnc_len);
Eric2f898262021-05-19 18:57:50 +02001328
1329 ctx->ue_cipher_mask = gprs_ms_net_cap_gea_mask(ctx->ms_network_capa.buf, msnc_len);
1330
Neels Hofmeyr340a7e92022-03-07 15:37:24 +01001331 if (!(ctx->ue_cipher_mask & sgsn->cfg.gea_encryption_mask)) {
Maxb997f842016-07-06 15:57:01 +02001332 reject_cause = GMM_CAUSE_PROTO_ERR_UNSPEC;
1333 LOGMMCTXP(LOGL_NOTICE, ctx, "Rejecting ATTACH REQUEST with MI "
Eric2f898262021-05-19 18:57:50 +02001334 "%s because MS do not support required encryption, mask UE:0x%02x NW:0x%02x \n",
Neels Hofmeyr340a7e92022-03-07 15:37:24 +01001335 mi_log_string, ctx->ue_cipher_mask, sgsn->cfg.gea_encryption_mask);
Maxb997f842016-07-06 15:57:01 +02001336 goto rejected;
1337 }
Eric2f898262021-05-19 18:57:50 +02001338
1339 /* just assume that everythig is fine if the phone offers a5/4:
1340 * it requires a valid umts security context which we can only have after
1341 * 1) IDENTITY REQUEST to know what to ask the HLR for
1342 * 2) and AUTHENTICATION AND CIPHERING REQUEST
1343 * ... but 2) already requires selecting a cipher mode.
1344 * So let's just assume we will have the auth data required to make it work.
1345 */
1346
Neels Hofmeyr340a7e92022-03-07 15:37:24 +01001347 ctx->ciph_algo = gprs_ms_net_select_best_gea(ctx->ue_cipher_mask, sgsn->cfg.gea_encryption_mask);
Eric2f898262021-05-19 18:57:50 +02001348
Harald Weltec2e8cc42010-05-31 20:23:38 +02001349#ifdef PTMSI_ALLOC
Harald Welte807a5d82010-06-01 11:53:01 +02001350 /* Allocate a new P-TMSI (+ P-TMSI signature) and update TLLI */
Max86e04df2017-10-09 16:21:31 +02001351 ptmsi_update(ctx);
Harald Welteab1d5622010-05-18 19:58:38 +02001352#endif
Harald Welte807a5d82010-06-01 11:53:01 +02001353
Harald Weltedbc72b32015-12-25 22:23:27 +01001354 if (ctx->ran_type == MM_CTX_T_GERAN_Gb) {
1355 /* Even if there is no P-TMSI allocated, the MS will
1356 * switch from foreign TLLI to local TLLI */
1357 ctx->gb.tlli_new = gprs_tmsi2tlli(ctx->p_tmsi, TLLI_LOCAL);
1358
1359 /* Inform LLC layer about new TLLI but keep old active */
Neels Hofmeyraa4ed672018-04-22 19:29:41 +02001360 if (sgsn_mm_ctx_is_authenticated(ctx))
Max5aa51962016-07-06 11:33:04 +02001361 gprs_llme_copy_key(ctx, ctx->gb.llme);
1362
1363 gprs_llgmm_assign(ctx->gb.llme, ctx->gb.tlli, ctx->gb.tlli_new);
Harald Weltedbc72b32015-12-25 22:23:27 +01001364 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001365
Alexander Couzensf7198d72018-05-22 18:29:14 +02001366 osmo_fsm_inst_dispatch(ctx->gmm_att_req.fsm, E_ATTACH_REQ_RECV, msg);
1367 return 0;
Harald Welte9b455bf2010-03-14 15:45:01 +08001368
1369err_inval:
Daniel Willmann46553142014-09-03 17:46:44 +02001370 LOGPC(DMM, LOGL_INFO, "\n");
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001371 reject_cause = GMM_CAUSE_SEM_INCORR_MSG;
1372
1373rejected:
1374 /* Send ATTACH REJECT */
1375 LOGMMCTXP(LOGL_NOTICE, ctx,
1376 "Rejecting Attach Request with cause '%s' (%d)\n",
Jacob Erlbeckafcf2302015-01-05 17:30:02 +01001377 get_value_string(gsm48_gmm_cause_names, reject_cause), reject_cause);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001378 rc = gsm48_tx_gmm_att_rej_oldmsg(msg, reject_cause);
1379 if (ctx)
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02001380 mm_ctx_cleanup_free(ctx, "GMM ATTACH REJ");
Neels Hofmeyrceccd462017-12-20 16:21:45 +01001381 else if (llme)
Max39550252016-06-28 17:39:20 +02001382 gprs_llgmm_unassign(llme);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001383
1384 return rc;
1385
Harald Welte9b455bf2010-03-14 15:45:01 +08001386}
1387
Pau Espin Pedrola0bcfad2019-09-02 13:27:35 +02001388/* 3GPP TS 24.008 § 9.4.3 Attach complete */
1389static int gsm48_rx_gmm_att_compl(struct sgsn_mm_ctx *mmctx)
1390{
1391 struct sgsn_signal_data sig_data;
1392 /* only in case SGSN offered new P-TMSI */
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02001393 LOGMMCTXP(LOGL_INFO, mmctx, "-> GMM ATTACH COMPLETE\n");
Pau Espin Pedrola0bcfad2019-09-02 13:27:35 +02001394
1395 #ifdef BUILD_IU
1396 if (mmctx->iu.ue_ctx) {
1397 ranap_iu_tx_release(mmctx->iu.ue_ctx, NULL);
1398 }
1399 #endif
1400
1401 mmctx_timer_stop(mmctx, 3350);
1402 mmctx->t3350_mode = GMM_T3350_MODE_NONE;
1403 mmctx->p_tmsi_old = 0;
1404 mmctx->pending_req = 0;
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001405 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_ATTACH_SUCCESS, NULL);
Pau Espin Pedrola0bcfad2019-09-02 13:27:35 +02001406 switch(mmctx->ran_type) {
1407 case MM_CTX_T_UTRAN_Iu:
1408 osmo_fsm_inst_dispatch(mmctx->iu.mm_state_fsm, E_PMM_PS_ATTACH, NULL);
1409 break;
1410 case MM_CTX_T_GERAN_Gb:
1411 /* Unassign the old TLLI */
1412 mmctx->gb.tlli = mmctx->gb.tlli_new;
1413 gprs_llme_copy_key(mmctx, mmctx->gb.llme);
1414 gprs_llgmm_assign(mmctx->gb.llme, TLLI_UNASSIGNED,
1415 mmctx->gb.tlli_new);
1416 osmo_fsm_inst_dispatch(mmctx->gb.mm_state_fsm, E_MM_GPRS_ATTACH, NULL);
1417 break;
1418 }
1419
1420 osmo_fsm_inst_dispatch(mmctx->gmm_att_req.fsm, E_ATTACH_COMPLETE_RECV, 0);
1421 memset(&sig_data, 0, sizeof(sig_data));
1422 sig_data.mm = mmctx;
1423 osmo_signal_dispatch(SS_SGSN, S_SGSN_ATTACH, &sig_data);
1424
1425 return 0;
1426}
Alexander Couzensf7198d72018-05-22 18:29:14 +02001427
1428/* Checks if two attach request contain the IEs and IE values
1429 * return 0 if equal
1430 * return -1 if error
1431 * return 1 if unequal
1432 *
1433 * Only do a simple memcmp for now.
1434 */
1435int gprs_gmm_attach_req_ies(struct msgb *a, struct msgb *b)
1436{
1437 struct gsm48_hdr *gh_a = (struct gsm48_hdr *) msgb_gmmh(a);
1438 struct gsm48_hdr *gh_b = (struct gsm48_hdr *) msgb_gmmh(b);
1439
1440#define GMM_ATTACH_REQ_LEN 26
1441
1442 /* there is the LLC FCS behind */
1443 if (msgb_l3len(a) < GMM_ATTACH_REQ_LEN || msgb_l3len(b) < GMM_ATTACH_REQ_LEN)
1444 return -1;
1445
1446 return !!memcmp(gh_a, gh_b, GMM_ATTACH_REQ_LEN);
1447}
1448
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001449/* 3GPP TS 24.008 § 4.7.4.1 / 9.4.5.2 MO Detach request */
Harald Welted193cb32010-05-17 22:58:03 +02001450static int gsm48_rx_gmm_det_req(struct sgsn_mm_ctx *ctx, struct msgb *msg)
Harald Welte2720e732010-05-17 00:44:57 +02001451{
1452 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Harald Welte2720e732010-05-17 00:44:57 +02001453 uint8_t detach_type, power_off;
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02001454 int rc = 0;
Harald Welte2720e732010-05-17 00:44:57 +02001455
1456 detach_type = gh->data[0] & 0x7;
1457 power_off = gh->data[0] & 0x8;
1458
1459 /* FIXME: In 24.008 there is an optional P-TMSI and P-TMSI signature IE */
Pau Espin Pedrola33f0062021-06-04 17:27:03 +02001460 rate_ctr_inc(rate_ctr_group_get_ctr(sgsn->rate_ctrs, CTR_GPRS_DETACH_REQUEST));
Daniel Willmann46553142014-09-03 17:46:44 +02001461 LOGMMCTXP(LOGL_INFO, ctx, "-> GMM DETACH REQUEST TLLI=0x%08x type=%s %s\n",
Harald Welte2720e732010-05-17 00:44:57 +02001462 msgb_tlli(msg), get_value_string(gprs_det_t_mo_strs, detach_type),
1463 power_off ? "Power-off" : "");
1464
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02001465 /* Only send the Detach Accept (MO) if power off isn't indicated,
Jacob Erlbeckb9ab0d42014-10-21 09:52:05 +02001466 * see 04.08, 4.7.4.1.2/3 for details */
1467 if (!power_off) {
1468 /* force_stby = 0 */
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02001469 if (ctx)
1470 rc = gsm48_tx_gmm_det_ack(ctx, 0);
1471 else
1472 rc = gsm48_tx_gmm_det_ack_oldmsg(msg, 0);
Jacob Erlbeckb9ab0d42014-10-21 09:52:05 +02001473 }
Harald Weltebd5c9122010-06-28 22:18:53 +02001474
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +02001475 if (ctx) {
1476 struct sgsn_signal_data sig_data;
1477 memset(&sig_data, 0, sizeof(sig_data));
1478 sig_data.mm = ctx;
1479 osmo_signal_dispatch(SS_SGSN, S_SGSN_DETACH, &sig_data);
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02001480 mm_ctx_cleanup_free(ctx, "GMM DETACH REQUEST");
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +02001481 }
Jacob Erlbeck258ce3d2014-09-30 13:51:45 +02001482
Harald Weltebd5c9122010-06-28 22:18:53 +02001483 return rc;
Harald Welte2720e732010-05-17 00:44:57 +02001484}
1485
Harald Welte9b455bf2010-03-14 15:45:01 +08001486/* Chapter 9.4.15: Routing area update accept */
Harald Welte6463c072010-05-18 17:04:55 +02001487static int gsm48_tx_gmm_ra_upd_ack(struct sgsn_mm_ctx *mm)
Harald Welte9b455bf2010-03-14 15:45:01 +08001488{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +01001489 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 UPD ACK");
Harald Welte9b455bf2010-03-14 15:45:01 +08001490 struct gsm48_hdr *gh;
1491 struct gsm48_ra_upd_ack *rua;
Pau Espin Pedrola299d652019-08-14 19:11:10 +02001492 unsigned long t;
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +01001493#ifdef PTMSI_ALLOC
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001494 uint8_t *l;
1495 int rc;
1496 struct osmo_mobile_identity mi;
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +01001497#endif
Harald Welte9b455bf2010-03-14 15:45:01 +08001498
Pau Espin Pedrola33f0062021-06-04 17:27:03 +02001499 rate_ctr_inc(rate_ctr_group_get_ctr(sgsn->rate_ctrs, CTR_GPRS_ROUTING_AREA_ACKED));
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02001500 LOGMMCTXP(LOGL_INFO, mm, "<- GMM ROUTING AREA UPDATE ACCEPT\n");
Harald Welte9b455bf2010-03-14 15:45:01 +08001501
Harald Welte6463c072010-05-18 17:04:55 +02001502 mmctx2msgid(msg, mm);
Harald Welte9b455bf2010-03-14 15:45:01 +08001503
1504 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
1505 gh->proto_discr = GSM48_PDISC_MM_GPRS;
1506 gh->msg_type = GSM48_MT_GMM_RA_UPD_ACK;
1507
1508 rua = (struct gsm48_ra_upd_ack *) msgb_put(msg, sizeof(*rua));
1509 rua->force_stby = 0; /* not indicated */
1510 rua->upd_result = 0; /* RA updated */
Pau Espin Pedrola299d652019-08-14 19:11:10 +02001511 t = osmo_tdef_get(sgsn->cfg.T_defs, 3312, OSMO_TDEF_S, -1);
1512 rua->ra_upd_timer = gprs_secs_to_tmr_floor(t);
Harald Welte11d7c102010-05-02 11:54:55 +02001513
Max25c65c32018-01-08 14:43:53 +01001514 gsm48_encode_ra(&rua->ra_id, &mm->ra);
Harald Welte9b455bf2010-03-14 15:45:01 +08001515
Harald Weltec2e8cc42010-05-31 20:23:38 +02001516#if 0
1517 /* Optional: P-TMSI signature */
1518 msgb_v_put(msg, GSM48_IE_GMM_PTMSI_SIG);
1519 ptsig = msgb_put(msg, 3);
1520 ptsig[0] = mm->p_tmsi_sig >> 16;
1521 ptsig[1] = mm->p_tmsi_sig >> 8;
1522 ptsig[2] = mm->p_tmsi_sig & 0xff;
1523#endif
1524
1525#ifdef PTMSI_ALLOC
1526 /* Optional: Allocated P-TMSI */
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001527 mi = (struct osmo_mobile_identity){
1528 .type = GSM_MI_TYPE_TMSI,
1529 .tmsi = mm->p_tmsi,
1530 };
1531 l = msgb_tl_put(msg, GSM48_IE_GMM_ALLOC_PTMSI);
1532 rc = osmo_mobile_identity_encode_msgb(msg, &mi, false);
1533 if (rc < 0) {
1534 msgb_free(msg);
1535 return -EINVAL;
1536 }
1537 *l = rc;
Harald Weltec2e8cc42010-05-31 20:23:38 +02001538#endif
1539
Jacob Erlbeck8de9c482015-01-23 11:44:39 +01001540 /* Optional: Negotiated READY timer value */
Pau Espin Pedrola299d652019-08-14 19:11:10 +02001541 t = osmo_tdef_get(sgsn->cfg.T_defs, 3314, OSMO_TDEF_S, -1);
1542 msgb_tv_put(msg, GSM48_IE_GMM_TIMER_READY, gprs_secs_to_tmr_floor(t));
Jacob Erlbeck8de9c482015-01-23 11:44:39 +01001543
Harald Weltec2e8cc42010-05-31 20:23:38 +02001544 /* Option: MS ID, ... */
Max82040102016-07-06 11:59:18 +02001545 return gsm48_gmm_sendmsg(msg, 0, mm, true);
Harald Welte9b455bf2010-03-14 15:45:01 +08001546}
1547
1548/* Chapter 9.4.17: Routing area update reject */
Alexander Couzensd4788cd2018-05-02 22:32:19 +02001549int gsm48_tx_gmm_ra_upd_rej(struct msgb *old_msg, uint8_t cause)
Harald Welte9b455bf2010-03-14 15:45:01 +08001550{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +01001551 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 RA UPD REJ");
Harald Welte9b455bf2010-03-14 15:45:01 +08001552 struct gsm48_hdr *gh;
1553
Daniel Willmann46553142014-09-03 17:46:44 +02001554 LOGP(DMM, LOGL_NOTICE, "<- ROUTING AREA UPDATE REJECT\n");
Pau Espin Pedrola33f0062021-06-04 17:27:03 +02001555 rate_ctr_inc(rate_ctr_group_get_ctr(sgsn->rate_ctrs, CTR_GPRS_ROUTING_AREA_REJECT));
Harald Welte9b455bf2010-03-14 15:45:01 +08001556
Harald Welte11d7c102010-05-02 11:54:55 +02001557 gmm_copy_id(msg, old_msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08001558
1559 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 2);
1560 gh->proto_discr = GSM48_PDISC_MM_GPRS;
1561 gh->msg_type = GSM48_MT_GMM_RA_UPD_REJ;
1562 gh->data[0] = cause;
1563 gh->data[1] = 0; /* ? */
1564
1565 /* Option: P-TMSI signature, allocated P-TMSI, MS ID, ... */
Max82040102016-07-06 11:59:18 +02001566 return gsm48_gmm_sendmsg(msg, 0, NULL, false);
Harald Welte9b455bf2010-03-14 15:45:01 +08001567}
1568
Harald Welte588d44e2010-06-09 10:28:29 +02001569static void process_ms_ctx_status(struct sgsn_mm_ctx *mmctx,
Holger Hans Peter Freyther2b174542011-10-14 23:31:34 +02001570 const uint8_t *pdp_status)
Harald Welte588d44e2010-06-09 10:28:29 +02001571{
1572 struct sgsn_pdp_ctx *pdp, *pdp2;
1573 /* 24.008 4.7.5.1.3: If the PDP context status information element is
1574 * included in ROUTING AREA UPDATE REQUEST message, then the network
1575 * shall deactivate all those PDP contexts locally (without peer to
1576 * peer signalling between the MS and the network), which are not in SM
1577 * state PDP-INACTIVE on network side but are indicated by the MS as
1578 * being in state PDP-INACTIVE. */
1579
1580 llist_for_each_entry_safe(pdp, pdp2, &mmctx->pdp_list, list) {
Pau Espin Pedrol25998dd2020-10-23 13:11:02 +02001581 bool inactive = (pdp->nsapi < 8) ?
1582 !(pdp_status[0] & (1 << pdp->nsapi)) :
1583 !(pdp_status[1] & (1 << (pdp->nsapi - 8)));
1584 if (!inactive)
1585 continue;
1586
1587 LOGMMCTXP(LOGL_NOTICE, mmctx, "Dropping PDP context for NSAPI=%u "
1588 "due to PDP CTX STATUS IE=0x%02x%02x\n",
1589 pdp->nsapi, pdp_status[1], pdp_status[0]);
Pau Espin Pedrol08395b32020-10-23 13:25:10 +02001590 if (pdp->ggsn)
1591 sgsn_delete_pdp_ctx(pdp);
1592 else /* GTP side already detached, freeing */
1593 sgsn_pdp_ctx_free(pdp);
Harald Welte588d44e2010-06-09 10:28:29 +02001594 }
1595}
1596
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001597/* 3GPP TS 24.008 § 4.7.13.4 Service request procedure not accepted by the
efistokldef0d942019-04-23 14:37:13 +03001598 * network. Returns true if MS has active PDP contexts in pdp_status */
1599bool pdp_status_has_active_nsapis(const uint8_t *pdp_status, const size_t pdp_status_len)
1600{
1601 size_t i;
1602
1603 for (i = 0; i < pdp_status_len; i++)
1604 if (pdp_status[i] != 0)
1605 return true;
1606
1607 return false;
1608}
1609
Harald Welte9b455bf2010-03-14 15:45:01 +08001610/* Chapter 9.4.14: Routing area update request */
Harald Welte807a5d82010-06-01 11:53:01 +02001611static int gsm48_rx_gmm_ra_upd_req(struct sgsn_mm_ctx *mmctx, struct msgb *msg,
1612 struct gprs_llc_llme *llme)
Harald Welte9b455bf2010-03-14 15:45:01 +08001613{
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +02001614#ifndef PTMSI_ALLOC
1615 struct sgsn_signal_data sig_data;
1616#endif
Harald Welte943c5bc2010-04-30 16:33:12 +02001617 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Harald Welteeaa614c2010-05-02 11:26:34 +02001618 uint8_t *cur = gh->data;
Harald Welte588d44e2010-06-09 10:28:29 +02001619 uint8_t ms_ra_acc_cap_len;
Harald Welte9b455bf2010-03-14 15:45:01 +08001620 struct gprs_ra_id old_ra_id;
Harald Welte588d44e2010-06-09 10:28:29 +02001621 struct tlv_parsed tp;
Harald Welteeaa614c2010-05-02 11:26:34 +02001622 uint8_t upd_type;
Philipp Maier6934a0f2017-01-25 12:19:08 +01001623 enum gsm48_gmm_cause reject_cause = GMM_CAUSE_PROTO_ERR_UNSPEC;
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001624 int rc;
Harald Welte9b455bf2010-03-14 15:45:01 +08001625
Alexander Couzensc44af532019-08-12 18:29:57 +02001626 /* TODO: In iu mode - handle follow-on request.
1627 * The follow-on request can be signaled in an Attach Request on IuPS.
1628 * This means the MS/UE asks to keep the PS connection open for further requests
1629 * after the Attach Request succeed.
1630 * The SGSN can decide if it close the connection or not. Both are spec conform. */
Daniel Willmann746c7892016-01-25 16:49:53 +01001631
Harald Welte9b455bf2010-03-14 15:45:01 +08001632 /* Update Type 10.5.5.18 */
Daniel Willmann746c7892016-01-25 16:49:53 +01001633 upd_type = *cur++ & 0x07;
Harald Welte9b455bf2010-03-14 15:45:01 +08001634
Pau Espin Pedrola33f0062021-06-04 17:27:03 +02001635 rate_ctr_inc(rate_ctr_group_get_ctr(sgsn->rate_ctrs, CTR_GPRS_ROUTING_AREA_REQUEST));
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001636 LOGMMCTXP(LOGL_INFO, mmctx, "-> GMM RA UPDATE REQUEST type=\"%s\"\n",
Harald Welte2720e732010-05-17 00:44:57 +02001637 get_value_string(gprs_upd_t_strs, upd_type));
Harald Welte9b455bf2010-03-14 15:45:01 +08001638
1639 /* Old routing area identification 10.5.5.15 */
1640 gsm48_parse_ra(&old_ra_id, cur);
1641 cur += 6;
1642
1643 /* MS Radio Access Capability 10.5.5.12a */
Harald Welte588d44e2010-06-09 10:28:29 +02001644 ms_ra_acc_cap_len = *cur++;
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001645 if (ms_ra_acc_cap_len > 52) {
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001646 LOGMMCTXP(LOGL_ERROR, mmctx,
Neels Hofmeyr7554fd12018-04-23 17:07:18 +02001647 "Rejecting GMM RA Update Request: MS Radio Access Capability too long"
1648 " (ms_ra_acc_cap_len = %u > 52)\n", ms_ra_acc_cap_len);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001649 reject_cause = GMM_CAUSE_PROTO_ERR_UNSPEC;
1650 goto rejected;
1651 }
Harald Welte4b2ed352011-07-27 23:35:38 +02001652 cur += ms_ra_acc_cap_len;
Harald Welte9b455bf2010-03-14 15:45:01 +08001653
1654 /* Optional: Old P-TMSI Signature, Requested READY timer, TMSI Status,
1655 * DRX parameter, MS network capability */
Holger Hans Peter Freyther1768a572014-04-04 12:40:34 +02001656 tlv_parse(&tp, &gsm48_gmm_att_tlvdef, cur,
Harald Welte588d44e2010-06-09 10:28:29 +02001657 (msg->data + msg->len) - cur, 0, 0);
Harald Welte9b455bf2010-03-14 15:45:01 +08001658
1659 switch (upd_type) {
1660 case GPRS_UPD_T_RA_LA:
1661 case GPRS_UPD_T_RA_LA_IMSI_ATT:
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001662 LOGMMCTXP(LOGL_NOTICE, mmctx, "Update type %i unsupported in Mode III, is your SI13 corrupt?\n", upd_type);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001663 reject_cause = GMM_CAUSE_PROTO_ERR_UNSPEC;
1664 goto rejected;
Harald Welte9b455bf2010-03-14 15:45:01 +08001665 case GPRS_UPD_T_RA:
1666 case GPRS_UPD_T_PERIODIC:
1667 break;
1668 }
1669
Jacob Erlbeckd35957a2016-01-04 18:43:36 +01001670 if (!mmctx) {
1671 /* BSSGP doesn't give us an mmctx */
1672
1673 /* TODO: Check if there is an MM CTX with old_ra_id and
1674 * the P-TMSI (if given, reguired for UMTS) or as last resort
1675 * if the TLLI matches foreign_tlli (P-TMSI). Note that this
1676 * is an optimization to avoid the RA reject (impl detached)
1677 * below, which will cause a new attach cycle. */
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001678 /* Look-up the MM context based on old RA-ID and TLLI */
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001679 if (!MSG_IU_UE_CTX(msg)) {
1680 /* Gb */
Daniel Willmann61329d42016-05-21 17:36:18 +02001681 mmctx = sgsn_mm_ctx_by_tlli_and_ptmsi(msgb_tlli(msg), &old_ra_id);
1682 } else if (TLVP_PRESENT(&tp, GSM48_IE_GMM_ALLOC_PTMSI)) {
1683#ifdef BUILD_IU
1684 /* In Iu mode search only for ptmsi */
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001685 struct osmo_mobile_identity mi;
1686 if (osmo_mobile_identity_decode(&mi, TLVP_VAL(&tp, GSM48_IE_GMM_ALLOC_PTMSI),
1687 TLVP_LEN(&tp, GSM48_IE_GMM_ALLOC_PTMSI), false)
1688 || mi.type != GSM_MI_TYPE_TMSI) {
1689 LOGIUP(MSG_IU_UE_CTX(msg), LOGL_ERROR, "Cannot decode P-TMSI\n");
1690 goto rejected;
Daniel Willmann61329d42016-05-21 17:36:18 +02001691 }
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001692 mmctx = sgsn_mm_ctx_by_ptmsi(mi.tmsi);
Daniel Willmann61329d42016-05-21 17:36:18 +02001693#else
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001694 LOGIUP(MSG_IU_UE_CTX(msg), LOGL_ERROR,
1695 "Rejecting GMM RA Update Request: No Iu support\n");
Daniel Willmann61329d42016-05-21 17:36:18 +02001696 goto rejected;
1697#endif
1698 }
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001699 if (mmctx) {
1700 LOGMMCTXP(LOGL_INFO, mmctx,
1701 "Looked up by matching TLLI and P_TMSI. "
1702 "BSSGP TLLI: %08x, P-TMSI: %08x (%08x), "
Neels Hofmeyr10719b72018-02-21 00:39:36 +01001703 "TLLI: %08x (%08x), RA: %s\n",
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001704 msgb_tlli(msg),
1705 mmctx->p_tmsi, mmctx->p_tmsi_old,
Harald Weltef97ee042015-12-25 19:12:21 +01001706 mmctx->gb.tlli, mmctx->gb.tlli_new,
Neels Hofmeyr10719b72018-02-21 00:39:36 +01001707 osmo_rai_name(&mmctx->ra));
Alexander Couzens91a8bbd2019-09-11 03:38:14 +02001708 /* A RAT change will trigger the common procedure
1709 * below after handling the RAT change. Protect it
1710 * here from being called twice */
1711 if (!mmctx_did_rat_change(mmctx, msg))
1712 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_COMMON_PROC_INIT_REQ, NULL);
1713
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001714 }
1715 } else if (!gprs_ra_id_equals(&mmctx->ra, &old_ra_id) ||
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001716 mmctx->gmm_fsm->state == ST_GMM_DEREGISTERED)
Jacob Erlbeckd35957a2016-01-04 18:43:36 +01001717 {
Alexander Couzens27a0bf72020-09-18 15:37:56 +02001718 /* We've received either a RAU for a MS which isn't registered
1719 * or a RAU with an unknown RA ID. As long the SGSN doesn't support
1720 * PS handover we treat this as invalid RAU */
1721 struct gprs_ra_id new_ra_id;
1722 char new_ra[32];
1723
1724 bssgp_parse_cell_id(&new_ra_id, msgb_bcid(msg));
1725 osmo_rai_name_buf(new_ra, sizeof(new_ra), &new_ra_id);
1726
1727 if (mmctx->gmm_fsm->state == ST_GMM_DEREGISTERED)
1728 LOGMMCTXP(LOGL_INFO, mmctx,
1729 "Rejecting RAU - GMM state is deregistered. Old RA: %s New RA: %s\n",
1730 osmo_rai_name(&old_ra_id), new_ra);
1731 else
1732 LOGMMCTXP(LOGL_INFO, mmctx,
1733 "Rejecting RAU - Old RA doesn't match MM. Old RA: %s New RA: %s\n",
1734 osmo_rai_name(&old_ra_id), new_ra);
1735
1736 reject_cause = GMM_CAUSE_IMPL_DETACHED;
1737 goto rejected;
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001738 }
Jacob Erlbeckd35957a2016-01-04 18:43:36 +01001739
Jacob Erlbeck5ac4aad2016-01-04 18:43:38 +01001740 if (!mmctx) {
Harald Welte2b2429e2015-12-25 22:31:36 +01001741 if (llme) {
1742 /* send a XID reset to re-set all LLC sequence numbers
1743 * in the MS */
Pau Espin Pedrol029a70e2019-11-21 13:58:39 +01001744 LOGGBP(llme, DMM, LOGL_NOTICE, "LLC XID RESET\n");
Pau Espin Pedrol9203da52019-11-21 16:31:00 +01001745 gprs_llgmm_reset_oldmsg(msg, GPRS_SAPI_GMM, llme);
Harald Welte2b2429e2015-12-25 22:31:36 +01001746 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001747 /* The MS has to perform GPRS attach */
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02001748 /* Device is still IMSI attached for CS but initiate GPRS ATTACH,
1749 * see GSM 04.08, 4.7.5.1.4 and G.6 */
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02001750 LOGGBIUP(llme, msg, LOGL_ERROR, "Rejecting GMM RA Update Request: MS should GMM Attach first\n");
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001751 reject_cause = GMM_CAUSE_IMPL_DETACHED;
1752 goto rejected;
Harald Welte9b455bf2010-03-14 15:45:01 +08001753 }
1754
Alexander Couzens91a8bbd2019-09-11 03:38:14 +02001755 if (mmctx_did_rat_change(mmctx, msg)) {
1756 mmctx_handle_rat_change(mmctx, msg, llme);
1757 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_COMMON_PROC_INIT_REQ, NULL);
1758 }
1759
Harald Weltef0901f02010-12-26 10:39:26 +01001760 /* Store new BVCI/NSEI in MM context (FIXME: delay until we ack?) */
1761 msgid2mmctx(mmctx, msg);
1762 /* Bump the statistics of received signalling msgs for this MM context */
Pau Espin Pedrola33f0062021-06-04 17:27:03 +02001763 rate_ctr_inc(rate_ctr_group_get_ctr(mmctx->ctrg, GMM_CTR_PKTS_SIG_IN));
Harald Weltef0901f02010-12-26 10:39:26 +01001764
Harald Welte9f1f3ad2010-05-02 12:56:57 +02001765 /* Update the MM context with the new RA-ID */
Neels Hofmeyrc6548bb2019-12-25 23:46:06 +01001766 if (mmctx->ran_type == MM_CTX_T_GERAN_Gb && msgb_bcid(msg)) {
Daniel Willmannf9f43872016-05-20 22:36:23 +02001767 bssgp_parse_cell_id(&mmctx->ra, msgb_bcid(msg));
Harald Weltedbc72b32015-12-25 22:23:27 +01001768 /* Update the MM context with the new (i.e. foreign) TLLI */
1769 mmctx->gb.tlli = msgb_tlli(msg);
1770 }
Harald Welte9b455bf2010-03-14 15:45:01 +08001771 /* FIXME: Update the MM context with the MS radio acc capabilities */
1772 /* FIXME: Update the MM context with the MS network capabilities */
1773
Pau Espin Pedrola33f0062021-06-04 17:27:03 +02001774 rate_ctr_inc(rate_ctr_group_get_ctr(mmctx->ctrg, GMM_CTR_RA_UPDATE));
Harald Welte77289c22010-05-18 14:32:29 +02001775
Harald Weltec2e8cc42010-05-31 20:23:38 +02001776#ifdef PTMSI_ALLOC
Max86e04df2017-10-09 16:21:31 +02001777 ptmsi_update(mmctx);
1778
Harald Weltec2e8cc42010-05-31 20:23:38 +02001779 /* Start T3350 and re-transmit up to 5 times until ATTACH COMPLETE */
1780 mmctx->t3350_mode = GMM_T3350_MODE_RAU;
Pau Espin Pedrola299d652019-08-14 19:11:10 +02001781 mmctx_timer_start(mmctx, 3350);
Jacob Erlbeck0074a772014-10-28 16:23:46 +01001782#else
1783 /* Make sure we are NORMAL (i.e. not SUSPENDED anymore) */
Pau Espin Pedrol8c3d7fd2020-11-26 18:18:07 +01001784 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_ATTACH_SUCCESS, NULL);
Holger Hans Peter Freytherb1008952015-05-02 19:55:38 +02001785
1786 memset(&sig_data, 0, sizeof(sig_data));
1787 sig_data.mm = mmctx;
1788 osmo_signal_dispatch(SS_SGSN, S_SGSN_UPDATE, &sig_data);
Harald Weltec2e8cc42010-05-31 20:23:38 +02001789#endif
Harald Weltedbc72b32015-12-25 22:23:27 +01001790 if (mmctx->ran_type == MM_CTX_T_GERAN_Gb) {
1791 /* Even if there is no P-TMSI allocated, the MS will switch from
1792 * foreign TLLI to local TLLI */
1793 mmctx->gb.tlli_new = gprs_tmsi2tlli(mmctx->p_tmsi, TLLI_LOCAL);
Harald Weltec2e8cc42010-05-31 20:23:38 +02001794
Pau Espin Pedrol982e1302019-08-13 20:01:44 +02001795 /* Inform LLC layer about new TLLI but keep accepting the old one during Rx */
Harald Weltedbc72b32015-12-25 22:23:27 +01001796 gprs_llgmm_assign(mmctx->gb.llme, mmctx->gb.tlli,
Max5aa51962016-07-06 11:33:04 +02001797 mmctx->gb.tlli_new);
Harald Weltedbc72b32015-12-25 22:23:27 +01001798 }
Harald Welte807a5d82010-06-01 11:53:01 +02001799
Harald Welte588d44e2010-06-09 10:28:29 +02001800 /* Look at PDP Context Status IE and see if MS's view of
1801 * activated/deactivated NSAPIs agrees with our view */
1802 if (TLVP_PRESENT(&tp, GSM48_IE_GMM_PDP_CTX_STATUS)) {
Holger Hans Peter Freyther2b174542011-10-14 23:31:34 +02001803 const uint8_t *pdp_status = TLVP_VAL(&tp, GSM48_IE_GMM_PDP_CTX_STATUS);
Harald Welte588d44e2010-06-09 10:28:29 +02001804 process_ms_ctx_status(mmctx, pdp_status);
1805 }
1806
Daniel Willmannaf241722016-05-21 00:35:41 +02001807 /* Send RA UPDATE ACCEPT. In Iu, the RA upd request can be called from
1808 * a new Iu connection, so we might need to re-authenticate the
1809 * connection as well as turn on integrity protection. */
1810 mmctx->pending_req = GSM48_MT_GMM_RA_UPD_REQ;
1811 return gsm48_gmm_authorize(mmctx);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001812
1813rejected:
1814 /* Send RA UPDATE REJECT */
1815 LOGMMCTXP(LOGL_NOTICE, mmctx,
1816 "Rejecting RA Update Request with cause '%s' (%d)\n",
Jacob Erlbeckafcf2302015-01-05 17:30:02 +01001817 get_value_string(gsm48_gmm_cause_names, reject_cause), reject_cause);
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001818 rc = gsm48_tx_gmm_ra_upd_rej(msg, reject_cause);
1819 if (mmctx)
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02001820 mm_ctx_cleanup_free(mmctx, "GMM RA UPDATE REJ");
Pau Espin Pedrold723a972019-08-12 17:43:35 +02001821 else if (llme)
1822 gprs_llgmm_unassign(llme);
Alexander Couzens10af11d2019-09-17 16:52:15 +02001823#ifdef BUILD_IU
1824 else if (MSG_IU_UE_CTX(msg)) {
1825 unsigned long X1001 = osmo_tdef_get(sgsn->cfg.T_defs, -1001, OSMO_TDEF_S, -1);
1826 ranap_iu_tx_release_free(MSG_IU_UE_CTX(msg), NULL, (int) X1001);
1827 }
1828#endif
Jacob Erlbeck80d07e32014-11-06 13:43:41 +01001829
1830 return rc;
Harald Welte9b455bf2010-03-14 15:45:01 +08001831}
1832
Pau Espin Pedrolab264eb2019-09-02 13:36:11 +02001833/* 3GPP TS 24.008 § 9.4.16: Routing area update complete */
1834static int gsm48_rx_gmm_ra_upd_compl(struct sgsn_mm_ctx *mmctx)
1835{
1836 struct sgsn_signal_data sig_data;
1837 /* only in case SGSN offered new P-TMSI */
1838 LOGMMCTXP(LOGL_INFO, mmctx, "-> ROUTING AREA UPDATE COMPLETE\n");
1839 mmctx_timer_stop(mmctx, 3350);
1840 mmctx->t3350_mode = GMM_T3350_MODE_NONE;
1841 mmctx->p_tmsi_old = 0;
1842 mmctx->pending_req = 0;
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001843 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_COMMON_PROC_SUCCESS, NULL);
Pau Espin Pedrolab264eb2019-09-02 13:36:11 +02001844 switch(mmctx->ran_type) {
1845 case MM_CTX_T_UTRAN_Iu:
1846 osmo_fsm_inst_dispatch(mmctx->iu.mm_state_fsm, E_PMM_RA_UPDATE, NULL);
1847 break;
1848 case MM_CTX_T_GERAN_Gb:
1849 /* Unassign the old TLLI */
1850 mmctx->gb.tlli = mmctx->gb.tlli_new;
1851 gprs_llgmm_assign(mmctx->gb.llme, TLLI_UNASSIGNED,
1852 mmctx->gb.tlli_new);
1853 osmo_fsm_inst_dispatch(mmctx->gb.mm_state_fsm, E_MM_RA_UPDATE, NULL);
1854 break;
1855 }
1856
1857 memset(&sig_data, 0, sizeof(sig_data));
1858 sig_data.mm = mmctx;
1859 osmo_signal_dispatch(SS_SGSN, S_SGSN_UPDATE, &sig_data);
1860
1861 return 0;
1862}
1863
Pau Espin Pedrol33ebedc2019-09-02 13:43:51 +02001864/* 3GPP TS 24.008 § 9.4.8: P-TMSI reallocation complete */
1865static int gsm48_rx_gmm_ptmsi_reall_compl(struct sgsn_mm_ctx *mmctx)
1866{
1867 LOGMMCTXP(LOGL_INFO, mmctx, "-> PTMSI REALLOCATION COMPLETE\n");
1868 mmctx_timer_stop(mmctx, 3350);
1869 mmctx->t3350_mode = GMM_T3350_MODE_NONE;
1870 mmctx->p_tmsi_old = 0;
1871 mmctx->pending_req = 0;
1872 if (mmctx->ran_type == MM_CTX_T_GERAN_Gb) {
1873 /* Unassign the old TLLI */
1874 mmctx->gb.tlli = mmctx->gb.tlli_new;
1875 //gprs_llgmm_assign(mmctx->gb.llme, TLLI_UNASSIGNED, mmctx->gb.tlli_new, GPRS_ALGO_GEA0, NULL);
1876 }
1877 return 0;
1878}
1879
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001880/* 3GPP TS 24.008 § 9.4.20 Service request.
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001881 * In Iu, a UE in PMM-IDLE mode can use GSM48_MT_GMM_SERVICE_REQ to switch back
1882 * to PMM-CONNECTED mode. */
1883static int gsm48_rx_gmm_service_req(struct sgsn_mm_ctx *ctx, struct msgb *msg)
1884{
1885 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001886 uint8_t *cur = gh->data, *mi_data;
1887 uint8_t service_type, mi_len;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001888 struct tlv_parsed tp;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001889 struct osmo_mobile_identity mi;
1890 char mi_log_string[32];
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001891 enum gsm48_gmm_cause reject_cause;
1892 int rc;
1893
1894 LOGMMCTXP(LOGL_INFO, ctx, "-> GMM SERVICE REQUEST ");
1895
1896 /* This message is only valid in Iu mode */
Pau Espin Pedroldfd7c242019-08-12 16:06:49 +02001897 if (!MSG_IU_UE_CTX(msg)) {
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001898 LOGPC(DMM, LOGL_INFO, "Invalid if not in Iu mode\n");
1899 return -1;
1900 }
1901
1902 /* Skip Ciphering key sequence number 10.5.1.2 */
Pau Espin Pedroldb6f8032018-01-07 18:13:09 +01001903 /* uint8_t ciph_seq_nr = *cur & 0x07; */
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001904
1905 /* Service type 10.5.5.20 */
1906 service_type = (*cur++ >> 4) & 0x07;
1907
1908 /* Mobile Identity (P-TMSI or IMSI) 10.5.1.4 */
1909 mi_len = *cur++;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001910 mi_data = cur;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001911 cur += mi_len;
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001912 rc = osmo_mobile_identity_decode(&mi, mi_data, mi_len, false);
1913 if (rc)
1914 goto err_inval;
1915 osmo_mobile_identity_to_str_buf(mi_log_string, sizeof(mi_log_string), &mi);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001916
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001917 DEBUGPC(DMM, "MI(%s) type=\"%s\" ", mi_log_string,
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001918 get_value_string(gprs_service_t_strs, service_type));
1919
1920 LOGPC(DMM, LOGL_INFO, "\n");
1921
1922 /* Optional: PDP context status, MBMS context status, Uplink data status, Device properties */
1923 tlv_parse(&tp, &gsm48_gmm_att_tlvdef, cur, (msg->data + msg->len) - cur, 0, 0);
1924
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001925 switch (mi.type) {
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001926 case GSM_MI_TYPE_IMSI:
1927 /* Try to find MM context based on IMSI */
1928 if (!ctx)
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001929 ctx = sgsn_mm_ctx_by_imsi(mi.imsi);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001930 if (!ctx) {
1931 /* FIXME: We need to have a context for service request? */
Alexander Couzens47cf6bd2018-07-17 20:13:27 +02001932 reject_cause = GMM_CAUSE_IMPL_DETACHED;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001933 goto rejected;
1934 }
1935 msgid2mmctx(ctx, msg);
1936 break;
1937 case GSM_MI_TYPE_TMSI:
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001938 /* Try to find MM context based on P-TMSI */
1939 if (!ctx)
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001940 ctx = sgsn_mm_ctx_by_ptmsi(mi.tmsi);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001941 if (!ctx) {
1942 /* FIXME: We need to have a context for service request? */
Alexander Couzens47cf6bd2018-07-17 20:13:27 +02001943 reject_cause = GMM_CAUSE_IMPL_DETACHED;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001944 goto rejected;
1945 }
1946 msgid2mmctx(ctx, msg);
1947 break;
1948 default:
1949 LOGMMCTXP(LOGL_NOTICE, ctx, "Rejecting SERVICE REQUEST with "
Neels Hofmeyrb26a5a82020-05-29 16:53:23 +02001950 "MI %s\n", mi_log_string);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001951 reject_cause = GMM_CAUSE_MS_ID_NOT_DERIVED;
1952 goto rejected;
1953 }
1954
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02001955 osmo_fsm_inst_dispatch(ctx->gmm_fsm, E_GMM_COMMON_PROC_INIT_REQ, NULL);
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001956
1957 ctx->iu.service.type = service_type;
1958
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001959 /* Look at PDP Context Status IE and see if MS's view of
1960 * activated/deactivated NSAPIs agrees with our view */
1961 if (TLVP_PRESENT(&tp, GSM48_IE_GMM_PDP_CTX_STATUS)) {
1962 const uint8_t *pdp_status = TLVP_VAL(&tp, GSM48_IE_GMM_PDP_CTX_STATUS);
efistokldef0d942019-04-23 14:37:13 +03001963 const size_t pdp_status_len = TLVP_LEN(&tp, GSM48_IE_GMM_PDP_CTX_STATUS);
1964
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001965 process_ms_ctx_status(ctx, pdp_status);
efistokldef0d942019-04-23 14:37:13 +03001966
Pau Espin Pedrol5623eb82019-08-21 17:18:14 +02001967 /* 3GPP TS 24.008 § 4.7.13.4 Service request procedure not
efistokldef0d942019-04-23 14:37:13 +03001968 * accepted by the network. Cause #40. If MS has PDP Contexts in
1969 * Active state in pdp_status but there is no PDP contexts on
1970 * SGSN side then Reject with the cause will force the mobile to
1971 * reset PDP contexts */
1972 if (llist_empty(&ctx->pdp_list) && pdp_status_has_active_nsapis(pdp_status, pdp_status_len)) {
1973 reject_cause = GMM_CAUSE_NO_PDP_ACTIVATED;
1974 goto rejected;
1975 }
Daniel Willmann1dee2b62016-05-21 00:15:29 +02001976 }
1977
1978
1979 ctx->pending_req = GSM48_MT_GMM_SERVICE_REQ;
1980 return gsm48_gmm_authorize(ctx);
1981
1982err_inval:
1983 LOGPC(DMM, LOGL_INFO, "\n");
1984 reject_cause = GMM_CAUSE_SEM_INCORR_MSG;
1985
1986rejected:
1987 /* Send SERVICE REJECT */
1988 LOGMMCTXP(LOGL_NOTICE, ctx,
1989 "Rejecting Service Request with cause '%s' (%d)\n",
1990 get_value_string(gsm48_gmm_cause_names, reject_cause), reject_cause);
1991 rc = gsm48_tx_gmm_service_rej_oldmsg(msg, reject_cause);
1992
1993 return rc;
1994
1995}
1996
1997
Harald Welted193cb32010-05-17 22:58:03 +02001998static int gsm48_rx_gmm_status(struct sgsn_mm_ctx *mmctx, struct msgb *msg)
Harald Welte9b455bf2010-03-14 15:45:01 +08001999{
2000 struct gsm48_hdr *gh = msgb_l3(msg);
2001
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02002002 LOGMMCTXP(LOGL_INFO, mmctx, "-> GMM STATUS (cause: %s)\n",
Jacob Erlbeckafcf2302015-01-05 17:30:02 +01002003 get_value_string(gsm48_gmm_cause_names, gh->data[0]));
Harald Welte9b455bf2010-03-14 15:45:01 +08002004
2005 return 0;
2006}
2007
Pau Espin Pedrol72b61e42019-08-12 16:43:58 +02002008/* Rx GPRS Mobility Management. MMCTX can be NULL when called. On !Gb (Iu), llme is NULL */
Pau Espin Pedrol6dfb5fe2019-08-29 17:21:00 +02002009int gsm0408_rcv_gmm(struct sgsn_mm_ctx *mmctx, struct msgb *msg,
Max82040102016-07-06 11:59:18 +02002010 struct gprs_llc_llme *llme, bool drop_cipherable)
Harald Welte9b455bf2010-03-14 15:45:01 +08002011{
Harald Welte943c5bc2010-04-30 16:33:12 +02002012 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08002013 int rc;
2014
Max82040102016-07-06 11:59:18 +02002015 if (drop_cipherable && gsm48_hdr_gmm_cipherable(gh)) {
2016 LOGMMCTXP(LOGL_NOTICE, mmctx, "Dropping cleartext GMM %s which "
2017 "is expected to be encrypted for TLLI 0x%08x\n",
2018 get_value_string(gprs_msgt_gmm_names, gh->msg_type),
2019 llme->tlli);
2020 return -EBADMSG;
2021 }
Harald Welte807a5d82010-06-01 11:53:01 +02002022
Harald Welte2b2429e2015-12-25 22:31:36 +01002023 if (llme && !mmctx &&
Harald Welted193cb32010-05-17 22:58:03 +02002024 gh->msg_type != GSM48_MT_GMM_ATTACH_REQ &&
Harald Weltec2e8cc42010-05-31 20:23:38 +02002025 gh->msg_type != GSM48_MT_GMM_RA_UPD_REQ) {
Pau Espin Pedrol029a70e2019-11-21 13:58:39 +01002026 LOGGBP(llme, DMM, LOGL_NOTICE, "Cannot handle GMM for unknown MM CTX\n");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002027 /* 4.7.10 */
Jacob Erlbeck14ae5822014-10-28 09:47:03 +01002028 if (gh->msg_type == GSM48_MT_GMM_STATUS) {
2029 /* TLLI unassignment */
Max39550252016-06-28 17:39:20 +02002030 gprs_llgmm_unassign(llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002031 return 0;
Jacob Erlbeck14ae5822014-10-28 09:47:03 +01002032 }
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002033
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002034 /* Don't reply or establish a LLME on DETACH_ACK */
Max39550252016-06-28 17:39:20 +02002035 if (gh->msg_type == GSM48_MT_GMM_DETACH_ACK)
2036 return gprs_llgmm_unassign(llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002037
Alexander Couzens85ca87b2018-05-02 18:17:34 +02002038 /* Don't reply to deatch requests, reason power off */
2039 if (gh->msg_type == GSM48_MT_GMM_DETACH_REQ &&
2040 gh->data[0] & 0x8) {
2041 return 0;
2042 }
2043
2044
Jacob Erlbeckc4f9bf32014-11-11 08:55:13 +01002045 gprs_llgmm_reset(llme);
2046
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002047 /* Don't force it into re-attachment */
2048 if (gh->msg_type == GSM48_MT_GMM_DETACH_REQ) {
Jacob Erlbeck5a38f642014-10-21 13:09:55 +02002049 /* Handle Detach Request */
2050 rc = gsm48_rx_gmm_det_req(NULL, msg);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002051
2052 /* TLLI unassignment */
Max39550252016-06-28 17:39:20 +02002053 gprs_llgmm_unassign(llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002054 return rc;
2055 }
2056
2057 /* Force the MS to re-attach */
Maxb997f842016-07-06 15:57:01 +02002058 rc = gsm0408_gprs_force_reattach_oldmsg(msg, llme);
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002059
2060 /* TLLI unassignment */
Max39550252016-06-28 17:39:20 +02002061 gprs_llgmm_unassign(llme);
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002062 return rc;
Harald Welted193cb32010-05-17 22:58:03 +02002063 }
2064
Daniel Willmannd999e542020-01-30 12:30:40 +01002065 /* A RAT change is only expected/allowed for RAU/Attach Req */
2066 if (mmctx && mmctx_did_rat_change(mmctx, msg)) {
2067 switch (gh->msg_type) {
2068 case GSM48_MT_GMM_RA_UPD_REQ:
2069 case GSM48_MT_GMM_ATTACH_REQ:
2070 break;
2071 default:
2072 /* This shouldn't happen with other message types and
2073 * we need to error out to prevent a crash */
2074 LOGMMCTXP(LOGL_NOTICE, mmctx, "Dropping GMM %s which was received on different "
2075 "RAT (mmctx ran_type=%u, msg_iu_ue_ctx=%p\n",
2076 get_value_string(gprs_msgt_gmm_names, gh->msg_type),
2077 mmctx->ran_type, MSG_IU_UE_CTX(msg));
2078 return -EINVAL;
2079 }
2080 }
2081
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002082 /*
2083 * For a few messages, mmctx may be NULL. For most, we want to ensure a
2084 * non-NULL mmctx. At the same time, we want to keep the message
2085 * validity check intact, so that all message types appear in the
2086 * switch statement and the default case thus means "unknown message".
2087 * If we split the switch in two parts to check non-NULL halfway, the
2088 * unknown-message check breaks, or we'd need to duplicate the switch
2089 * cases in both parts. Just keep one large switch and add some gotos.
2090 */
Harald Welte9b455bf2010-03-14 15:45:01 +08002091 switch (gh->msg_type) {
2092 case GSM48_MT_GMM_RA_UPD_REQ:
Harald Welte807a5d82010-06-01 11:53:01 +02002093 rc = gsm48_rx_gmm_ra_upd_req(mmctx, msg, llme);
Harald Welte9b455bf2010-03-14 15:45:01 +08002094 break;
2095 case GSM48_MT_GMM_ATTACH_REQ:
Harald Welte807a5d82010-06-01 11:53:01 +02002096 rc = gsm48_rx_gmm_att_req(mmctx, msg, llme);
Harald Welte9b455bf2010-03-14 15:45:01 +08002097 break;
Daniel Willmann1dee2b62016-05-21 00:15:29 +02002098 case GSM48_MT_GMM_SERVICE_REQ:
2099 rc = gsm48_rx_gmm_service_req(mmctx, msg);
2100 break;
Daniel Willmann46553142014-09-03 17:46:44 +02002101 /* For all the following types mmctx can not be NULL */
Harald Welte9b455bf2010-03-14 15:45:01 +08002102 case GSM48_MT_GMM_ID_RESP:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002103 if (!mmctx)
2104 goto null_mmctx;
Harald Welted193cb32010-05-17 22:58:03 +02002105 rc = gsm48_rx_gmm_id_resp(mmctx, msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08002106 break;
2107 case GSM48_MT_GMM_STATUS:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002108 if (!mmctx)
2109 goto null_mmctx;
Harald Welted193cb32010-05-17 22:58:03 +02002110 rc = gsm48_rx_gmm_status(mmctx, msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08002111 break;
Harald Welte2720e732010-05-17 00:44:57 +02002112 case GSM48_MT_GMM_DETACH_REQ:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002113 if (!mmctx)
2114 goto null_mmctx;
Harald Welted193cb32010-05-17 22:58:03 +02002115 rc = gsm48_rx_gmm_det_req(mmctx, msg);
Harald Welte2720e732010-05-17 00:44:57 +02002116 break;
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002117 case GSM48_MT_GMM_DETACH_ACK:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002118 if (!mmctx)
2119 goto null_mmctx;
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002120 LOGMMCTXP(LOGL_INFO, mmctx, "-> DETACH ACK\n");
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02002121 mm_ctx_cleanup_free(mmctx, "GMM DETACH ACK");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002122 rc = 0;
2123 break;
Harald Welte9b455bf2010-03-14 15:45:01 +08002124 case GSM48_MT_GMM_ATTACH_COMPL:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002125 if (!mmctx)
2126 goto null_mmctx;
Pau Espin Pedrola0bcfad2019-09-02 13:27:35 +02002127 rc = gsm48_rx_gmm_att_compl(mmctx);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002128 break;
Harald Welteab1d5622010-05-18 19:58:38 +02002129 case GSM48_MT_GMM_RA_UPD_COMPL:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002130 if (!mmctx)
2131 goto null_mmctx;
Pau Espin Pedrolab264eb2019-09-02 13:36:11 +02002132 rc = gsm48_rx_gmm_ra_upd_compl(mmctx);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002133 break;
Harald Welte9b455bf2010-03-14 15:45:01 +08002134 case GSM48_MT_GMM_PTMSI_REALL_COMPL:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002135 if (!mmctx)
2136 goto null_mmctx;
Pau Espin Pedrol33ebedc2019-09-02 13:43:51 +02002137 rc = gsm48_rx_gmm_ptmsi_reall_compl(mmctx);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002138 break;
Harald Welte9b455bf2010-03-14 15:45:01 +08002139 case GSM48_MT_GMM_AUTH_CIPH_RESP:
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002140 if (!mmctx)
2141 goto null_mmctx;
Harald Welte4b6ac1e2010-07-03 11:09:06 +02002142 rc = gsm48_rx_gmm_auth_ciph_resp(mmctx, msg);
Harald Welte9b455bf2010-03-14 15:45:01 +08002143 break;
Neels Hofmeyr058cd572017-02-24 06:24:45 +01002144 case GSM48_MT_GMM_AUTH_CIPH_FAIL:
2145 rc = gsm48_rx_gmm_auth_ciph_fail(mmctx, msg);
2146 break;
Harald Welte9b455bf2010-03-14 15:45:01 +08002147 default:
Daniel Willmann46553142014-09-03 17:46:44 +02002148 LOGMMCTXP(LOGL_NOTICE, mmctx, "Unknown GSM 04.08 GMM msg type 0x%02x\n",
Harald Welte9b455bf2010-03-14 15:45:01 +08002149 gh->msg_type);
Neels Hofmeyr9329e6f2016-06-03 00:44:23 +02002150 if (mmctx)
2151 rc = gsm48_tx_gmm_status(mmctx, GMM_CAUSE_MSGT_NOTEXIST_NOTIMPL);
2152 else
2153 rc = -EINVAL;
Harald Welte9b455bf2010-03-14 15:45:01 +08002154 break;
2155 }
2156
2157 return rc;
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002158
2159null_mmctx:
Pau Espin Pedrol5b6c4b82019-08-14 16:08:15 +02002160 LOGGBIUP(llme, msg, LOGL_ERROR,
Pau Espin Pedrolc8ace5a2021-03-25 16:03:02 +01002161 "Received GSM 04.08 message type %s,"
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002162 " but no MM context available\n",
Pau Espin Pedrolc8ace5a2021-03-25 16:03:02 +01002163 get_value_string(gprs_msgt_gmm_names, gh->msg_type));
Neels Hofmeyre98ba822016-05-22 14:28:19 +02002164 return -EINVAL;
Harald Welte9b455bf2010-03-14 15:45:01 +08002165}
2166
Harald Weltec2e8cc42010-05-31 20:23:38 +02002167static void mmctx_timer_cb(void *_mm)
2168{
2169 struct sgsn_mm_ctx *mm = _mm;
Jacob Erlbeckbd0cf112014-12-01 12:33:33 +01002170 struct gsm_auth_tuple *at;
Max3b6332f2017-11-01 13:28:38 +01002171 int rc;
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002172 unsigned long seconds;
Harald Weltec2e8cc42010-05-31 20:23:38 +02002173
2174 mm->num_T_exp++;
2175
2176 switch (mm->T) {
2177 case 3350: /* waiting for ATTACH COMPLETE */
2178 if (mm->num_T_exp >= 5) {
Daniel Willmann46553142014-09-03 17:46:44 +02002179 LOGMMCTXP(LOGL_NOTICE, mm, "T3350 expired >= 5 times\n");
Jacob Erlbecka7904562014-11-03 10:12:52 +01002180 mm_ctx_cleanup_free(mm, "T3350");
Harald Weltec2e8cc42010-05-31 20:23:38 +02002181 /* FIXME: should we return some error? */
2182 break;
2183 }
2184 /* re-transmit the respective msg and re-start timer */
2185 switch (mm->t3350_mode) {
2186 case GMM_T3350_MODE_ATT:
2187 gsm48_tx_gmm_att_ack(mm);
2188 break;
2189 case GMM_T3350_MODE_RAU:
2190 gsm48_tx_gmm_ra_upd_ack(mm);
2191 break;
2192 case GMM_T3350_MODE_PTMSI_REALL:
2193 /* FIXME */
2194 break;
Jacob Erlbeck93eae8e2014-10-28 12:23:29 +01002195 case GMM_T3350_MODE_NONE:
2196 LOGMMCTXP(LOGL_NOTICE, mm,
2197 "T3350 mode wasn't set, ignoring timeout\n");
2198 break;
Harald Weltec2e8cc42010-05-31 20:23:38 +02002199 }
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002200 seconds = osmo_tdef_get(sgsn->cfg.T_defs, 3350, OSMO_TDEF_S, -1);
2201 osmo_timer_schedule(&mm->timer, seconds, 0);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002202 break;
Harald Welte4b6ac1e2010-07-03 11:09:06 +02002203 case 3360: /* waiting for AUTH AND CIPH RESP */
2204 if (mm->num_T_exp >= 5) {
Daniel Willmann46553142014-09-03 17:46:44 +02002205 LOGMMCTXP(LOGL_NOTICE, mm, "T3360 expired >= 5 times\n");
Jacob Erlbecka7904562014-11-03 10:12:52 +01002206 mm_ctx_cleanup_free(mm, "T3360");
Harald Welte4b6ac1e2010-07-03 11:09:06 +02002207 break;
2208 }
Jacob Erlbeckbd0cf112014-12-01 12:33:33 +01002209 /* Re-transmit the respective msg and re-start timer */
2210 if (mm->auth_triplet.key_seq == GSM_KEY_SEQ_INVAL) {
2211 LOGMMCTXP(LOGL_ERROR, mm,
2212 "timeout: invalid auth triplet reference\n");
2213 mm_ctx_cleanup_free(mm, "T3360");
2214 break;
2215 }
2216 at = &mm->auth_triplet;
2217
Max3b6332f2017-11-01 13:28:38 +01002218 rc = gsm48_tx_gmm_auth_ciph_req(mm, &at->vec, at->key_seq, false);
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002219 if (rc < 0) {
Ruben Undheim55fcf112018-09-25 22:59:34 +02002220 LOGMMCTXP(LOGL_ERROR, mm, "failed sending Auth. & Ciph. Request: %s \n", strerror(-rc));
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002221 } else {
2222 seconds = osmo_tdef_get(sgsn->cfg.T_defs, 3360, OSMO_TDEF_S, -1);
2223 osmo_timer_schedule(&mm->timer, seconds, 0);
2224 }
Harald Welte4b6ac1e2010-07-03 11:09:06 +02002225 break;
Harald Weltec2e8cc42010-05-31 20:23:38 +02002226 case 3370: /* waiting for IDENTITY RESPONSE */
2227 if (mm->num_T_exp >= 5) {
Daniel Willmann46553142014-09-03 17:46:44 +02002228 LOGMMCTXP(LOGL_NOTICE, mm, "T3370 expired >= 5 times\n");
Harald Weltec2e8cc42010-05-31 20:23:38 +02002229 gsm48_tx_gmm_att_rej(mm, GMM_CAUSE_MS_ID_NOT_DERIVED);
Pau Espin Pedrolf025e582021-04-13 11:58:59 +02002230 mm_ctx_cleanup_free(mm, "GMM ATTACH REJECT (T3370)");
Harald Weltec2e8cc42010-05-31 20:23:38 +02002231 break;
2232 }
2233 /* re-tranmit IDENTITY REQUEST and re-start timer */
2234 gsm48_tx_gmm_id_req(mm, mm->t3370_id_type);
Pau Espin Pedrola299d652019-08-14 19:11:10 +02002235 seconds = osmo_tdef_get(sgsn->cfg.T_defs, 3370, OSMO_TDEF_S, -1);
2236 osmo_timer_schedule(&mm->timer, seconds, 0);
Harald Weltec2e8cc42010-05-31 20:23:38 +02002237 break;
2238 default:
Daniel Willmann46553142014-09-03 17:46:44 +02002239 LOGMMCTXP(LOGL_ERROR, mm, "timer expired in unknown mode %u\n",
Harald Weltec2e8cc42010-05-31 20:23:38 +02002240 mm->T);
2241 }
2242}
2243
Maxb997f842016-07-06 15:57:01 +02002244int gsm0408_gprs_force_reattach_oldmsg(struct msgb *msg,
2245 struct gprs_llc_llme *llme)
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002246{
Jacob Erlbeckabdf02b2014-10-31 12:20:49 +01002247 int rc;
Alexander Couzensa1735662016-08-30 18:50:58 +02002248 if (llme)
2249 gprs_llgmm_reset_oldmsg(msg, GPRS_SAPI_GMM, llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002250
Jacob Erlbeckabdf02b2014-10-31 12:20:49 +01002251 rc = gsm48_tx_gmm_detach_req_oldmsg(
2252 msg, GPRS_DET_T_MT_REATT_REQ, GMM_CAUSE_IMPL_DETACHED);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002253
Jacob Erlbeckabdf02b2014-10-31 12:20:49 +01002254 return rc;
2255}
2256
2257int gsm0408_gprs_force_reattach(struct sgsn_mm_ctx *mmctx)
2258{
2259 int rc;
Harald Weltedbc72b32015-12-25 22:23:27 +01002260 if (mmctx->ran_type == MM_CTX_T_GERAN_Gb)
2261 gprs_llgmm_reset(mmctx->gb.llme);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002262
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002263 rc = gsm48_tx_gmm_detach_req(
2264 mmctx, GPRS_DET_T_MT_REATT_REQ, GMM_CAUSE_IMPL_DETACHED);
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002265
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002266 mm_ctx_cleanup_free(mmctx, "forced reattach");
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002267
Jacob Erlbeckb1c074f2014-10-31 12:27:11 +01002268 return rc;
Jacob Erlbeck78ecaf02014-09-05 14:32:36 +02002269}
2270
Harald Welte5bfe4992010-06-09 11:22:47 +02002271int gprs_gmm_rx_suspend(struct gprs_ra_id *raid, uint32_t tlli)
2272{
2273 struct sgsn_mm_ctx *mmctx;
2274
2275 mmctx = sgsn_mm_ctx_by_tlli(tlli, raid);
2276 if (!mmctx) {
2277 LOGP(DMM, LOGL_NOTICE, "SUSPEND request for unknown "
2278 "TLLI=%08x\n", tlli);
2279 return -EINVAL;
2280 }
2281
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02002282 if (!gmm_fsm_is_registered(mmctx->gmm_fsm)) {
Daniel Willmann46553142014-09-03 17:46:44 +02002283 LOGMMCTXP(LOGL_NOTICE, mmctx, "SUSPEND request while state "
Harald Welte5bfe4992010-06-09 11:22:47 +02002284 "!= REGISTERED (TLLI=%08x)\n", tlli);
2285 return -EINVAL;
2286 }
2287
2288 /* Transition from REGISTERED_NORMAL to REGISTERED_SUSPENDED */
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02002289 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_SUSPEND, NULL);
Harald Welte5bfe4992010-06-09 11:22:47 +02002290 return 0;
2291}
2292
2293int gprs_gmm_rx_resume(struct gprs_ra_id *raid, uint32_t tlli,
2294 uint8_t suspend_ref)
2295{
2296 struct sgsn_mm_ctx *mmctx;
2297
2298 /* FIXME: make use of suspend reference? */
2299
2300 mmctx = sgsn_mm_ctx_by_tlli(tlli, raid);
2301 if (!mmctx) {
2302 LOGP(DMM, LOGL_NOTICE, "RESUME request for unknown "
2303 "TLLI=%08x\n", tlli);
2304 return -EINVAL;
2305 }
2306
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02002307 if (!gmm_fsm_is_registered(mmctx->gmm_fsm)) {
Daniel Willmann46553142014-09-03 17:46:44 +02002308 LOGMMCTXP(LOGL_NOTICE, mmctx, "RESUME request while state "
Harald Welte5bfe4992010-06-09 11:22:47 +02002309 "!= SUSPENDED (TLLI=%08x)\n", tlli);
2310 /* FIXME: should we not simply ignore it? */
2311 return -EINVAL;
2312 }
2313
2314 /* Transition from SUSPENDED to NORMAL */
Pau Espin Pedrol31c46572019-09-02 16:45:27 +02002315 osmo_fsm_inst_dispatch(mmctx->gmm_fsm, E_GMM_RESUME, NULL);
Harald Welte5bfe4992010-06-09 11:22:47 +02002316 return 0;
2317}
Pau Espin Pedrol05d5f282022-12-23 17:09:08 +01002318
2319/* Has to be called whenever any PDU (signaling, data, ...) has been received */
2320void gprs_gb_recv_pdu(struct sgsn_mm_ctx *mmctx, const struct msgb *msg)
2321{
2322 msgid2mmctx(mmctx, msg);
2323 if (mmctx->gb.llme)
2324 osmo_fsm_inst_dispatch(mmctx->gb.mm_state_fsm, E_MM_PDU_RECEPTION, NULL);
2325}
2326
2327/* Main entry point for incoming 04.08 GPRS messages from Gb */
2328int gsm0408_gprs_rcvmsg_gb(struct msgb *msg, struct gprs_llc_llme *llme,
2329 bool drop_cipherable)
2330{
2331 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_gmmh(msg);
2332 uint8_t pdisc = gsm48_hdr_pdisc(gh);
2333 struct sgsn_mm_ctx *mmctx;
2334 struct gprs_ra_id ra_id;
2335 int rc = -EINVAL;
2336
2337 bssgp_parse_cell_id(&ra_id, msgb_bcid(msg));
2338 mmctx = sgsn_mm_ctx_by_tlli(msgb_tlli(msg), &ra_id);
2339 if (mmctx) {
2340 rate_ctr_inc(rate_ctr_group_get_ctr(mmctx->ctrg, GMM_CTR_PKTS_SIG_IN));
2341 mmctx->gb.llme = llme;
2342 gprs_gb_recv_pdu(mmctx, msg);
2343 }
2344
2345 /* MMCTX can be NULL */
2346
2347 switch (pdisc) {
2348 case GSM48_PDISC_MM_GPRS:
2349 rc = gsm0408_rcv_gmm(mmctx, msg, llme, drop_cipherable);
2350 break;
2351 case GSM48_PDISC_SM_GPRS:
2352 rc = gsm0408_rcv_gsm(mmctx, msg, llme);
2353 break;
2354 default:
2355 LOGMMCTXP(LOGL_NOTICE, mmctx,
2356 "Unknown GSM 04.08 discriminator 0x%02x: %s\n",
2357 pdisc, osmo_hexdump((uint8_t *)gh, msgb_l3len(msg)));
2358 /* FIXME: return status message */
2359 break;
2360 }
2361
2362 /* MMCTX can be invalid */
2363
2364 return rc;
2365}