Projects
osmocom:nightly
open5gs
Log In
Username
Password
Error getting diff: tar:
×
We truncated the diff of some files because they were too big. If you want to see the full diff for every file,
click here
.
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
Expand all
Collapse all
Changes of Revision 1157
View file
open5gs_2.7.6.4747.da27.202508232026.dsc -> open5gs_2.7.6.4751.5939.202508242026.dsc
Changed
@@ -2,7 +2,7 @@ Source: open5gs Binary: open5gs-common, open5gs-mme, open5gs-sgwc, open5gs-smf, open5gs-amf, open5gs-sgwu, open5gs-upf, open5gs-hss, open5gs-pcrf, open5gs-nrf, open5gs-scp, open5gs-sepp, open5gs-ausf, open5gs-udm, open5gs-pcf, open5gs-nssf, open5gs-bsf, open5gs-udr, open5gs, open5gs-dbg Architecture: any -Version: 2.7.6.4747.da27.202508232026 +Version: 2.7.6.4751.5939.202508242026 Maintainer: Harald Welte <laforge@gnumonks.org> Uploaders: Sukchan Lee <acetcom@gmail.com> Homepage: https://open5gs.org @@ -32,8 +32,8 @@ open5gs-udr deb net optional arch=any open5gs-upf deb net optional arch=any Checksums-Sha1: - 70675672de79d1ee96c87a7bb800d130f6b5c0b1 15036116 open5gs_2.7.6.4747.da27.202508232026.tar.xz + def98dfbb64f8888893b7513a4343a5625df284a 15038492 open5gs_2.7.6.4751.5939.202508242026.tar.xz Checksums-Sha256: - 83b7cf28ecf174b4804f88e0065358eb7c693ac801ac57f4115da5bdb044ccf4 15036116 open5gs_2.7.6.4747.da27.202508232026.tar.xz + f7e964131e4fc943da177e8c5939eb8ee8b46ec62075cf96f6fcc24b516d2c01 15038492 open5gs_2.7.6.4751.5939.202508242026.tar.xz Files: - e76c64247c7b12aeae8fd6d4b86e99ac 15036116 open5gs_2.7.6.4747.da27.202508232026.tar.xz + 1cf179a4022a5d785b5eb39e6ee130f9 15038492 open5gs_2.7.6.4751.5939.202508242026.tar.xz
View file
open5gs_2.7.6.4747.da27.202508232026.tar.xz/.tarball-version -> open5gs_2.7.6.4751.5939.202508242026.tar.xz/.tarball-version
Changed
@@ -1 +1 @@ -2.7.6.4747-da27.202508232026 +2.7.6.4751-5939.202508242026
View file
open5gs_2.7.6.4747.da27.202508232026.tar.xz/debian/changelog -> open5gs_2.7.6.4751.5939.202508242026.tar.xz/debian/changelog
Changed
@@ -1,8 +1,8 @@ -open5gs (2.7.6.4747.da27.202508232026) unstable; urgency=medium +open5gs (2.7.6.4751.5939.202508242026) unstable; urgency=medium * Automatically generated changelog entry for building the Osmocom nightly feed - -- Osmocom OBS scripts <info@osmocom.org> Sat, 23 Aug 2025 20:27:53 +0000 + -- Osmocom OBS scripts <info@osmocom.org> Sun, 24 Aug 2025 20:27:54 +0000 open5gs (2.7.6) unstable; urgency=medium
View file
open5gs_2.7.6.4747.da27.202508232026.tar.xz/lib/nas/5gs/types.c -> open5gs_2.7.6.4751.5939.202508242026.tar.xz/lib/nas/5gs/types.c
Changed
@@ -273,7 +273,7 @@ ogs_nas_build_s_nssai(&nas_s_nssai, nas_s_nssai_ie + i); memcpy(nas_nssai->buffer + nas_nssai->length, &nas_s_nssai, sizeof(nas_s_nssai.length) + nas_s_nssai.length); - nas_nssai->length += + nas_nssai->length += (sizeof(nas_s_nssai.length) + nas_s_nssai.length); } } @@ -805,14 +805,216 @@ return OGS_OK; } +/* Parse "Packet filter list", 3GPP TS 24.501 Figure 9.11.4.13.3 and Figure 9.11.4.13. */ +static int parse_qos_rules_packet_filter_list(ogs_nas_qos_rule_t *rule, const uint8_t *buffer, uint16_t length) { + uint16_t size = 0; + int i, j, len = 0; + + for (i = 0; i < rule->num_of_packet_filter && i < OGS_MAX_NUM_OF_FLOW_IN_GTP; i++) { + if (size+sizeof(rule->pfi.flags) > length) { + ogs_error("PF%d Overflow: size%d length%d", i, size, length); + goto cleanup; + } + memcpy(&rule->pfi.flags, buffer+size, sizeof(rule->pfi.flags)); + size += sizeof(rule->pfi.flags); + + if (rule->code == + OGS_NAS_QOS_CODE_MODIFY_EXISTING_QOS_RULE_AND_DELETE_PACKET_FILTERS) + continue; + + if (size+sizeof(rule->pfi.content.length) > length) { + ogs_error("PF%d Overflow: size%d length%d", i, size, length); + goto cleanup; + } + memcpy(&rule->pfi.content.length, buffer+size, + sizeof(rule->pfi.content.length)); + size += sizeof(rule->pfi.content.length); + + j = 0; len = 0; + while(len < rule->pfi.content.length) { + if (size+len+ + sizeof(rule->pfi.content.componentj.type) > length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.type, + buffer+size+len, + sizeof(rule->pfi.content.componentj.type)); + len += sizeof(rule->pfi.content.componentj.type); + switch(rule->pfi.content.componentj.type) { + case OGS_PACKET_FILTER_MATCH_ALL: + break; + case OGS_PACKET_FILTER_PROTOCOL_IDENTIFIER_NEXT_HEADER_TYPE: + if (size+len+ + sizeof(rule->pfi.content.componentj.proto) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.proto, + buffer+size+len, + sizeof(rule->pfi.content.componentj.proto)); + len += sizeof(rule->pfi.content.componentj.proto); + break; + case OGS_PACKET_FILTER_IPV4_REMOTE_ADDRESS_TYPE: + case OGS_PACKET_FILTER_IPV4_LOCAL_ADDRESS_TYPE: + if (size+len+ + sizeof(rule->pfi.content.componentj.ipv4.addr) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.ipv4.addr, + buffer+size+len, + sizeof(rule->pfi.content.componentj.ipv4.addr)); + len += sizeof(rule->pfi.content.componentj.ipv4.addr); + + if (size+len+ + sizeof(rule->pfi.content.componentj.ipv4.mask) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.ipv4.mask, + buffer+size+len, + sizeof(rule->pfi.content.componentj.ipv4.mask)); + len += sizeof(rule->pfi.content.componentj.ipv4.mask); + break; + case OGS_PACKET_FILTER_IPV6_LOCAL_ADDRESS_PREFIX_LENGTH_TYPE: + case OGS_PACKET_FILTER_IPV6_REMOTE_ADDRESS_PREFIX_LENGTH_TYPE: + if (size+len+ + sizeof(rule->pfi.content.componentj.ipv6.addr) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.ipv6.addr, + buffer+size+len, + sizeof(rule->pfi.content.componentj.ipv6.addr)); + len += sizeof(rule->pfi.content.componentj.ipv6.addr); + + if (size+len+ + sizeof( + rule->pfi.content.componentj.ipv6.prefixlen) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.ipv6.prefixlen, + buffer+size+len, + sizeof( + rule->pfi.content.componentj.ipv6.prefixlen)); + len += sizeof( + rule->pfi.content.componentj.ipv6.prefixlen); + break; + case OGS_PACKET_FILTER_IPV6_LOCAL_ADDRESS_TYPE: + case OGS_PACKET_FILTER_IPV6_REMOTE_ADDRESS_TYPE: + if (size+len+ + sizeof( + rule->pfi.content.componentj.ipv6_mask.addr) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.ipv6_mask.addr, + buffer+size+len, + sizeof( + rule->pfi.content.componentj.ipv6_mask.addr)); + len += sizeof( + rule->pfi.content.componentj.ipv6_mask.addr); + + if (size+len+ + sizeof( + rule->pfi.content.componentj.ipv6_mask.mask) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.ipv6_mask.mask, + buffer+size+len, + sizeof( + rule->pfi.content.componentj.ipv6_mask.mask)); + len += sizeof( + rule->pfi.content.componentj.ipv6_mask.mask); + break; + case OGS_PACKET_FILTER_SINGLE_LOCAL_PORT_TYPE: + case OGS_PACKET_FILTER_SINGLE_REMOTE_PORT_TYPE: + if (size+len+ + sizeof(rule->pfi.content.componentj.port.low) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.port.low, + buffer+size+len, + sizeof(rule->pfi.content.componentj.port.low)); + rule->pfi.content.componentj.port.low = + be16toh(rule->pfi.content.componentj.port.low); + len += sizeof(rule->pfi.content.componentj.port.low); + break; + case OGS_PACKET_FILTER_LOCAL_PORT_RANGE_TYPE: + case OGS_PACKET_FILTER_REMOTE_PORT_RANGE_TYPE: + if (size+len+ + sizeof(rule->pfi.content.componentj.port.low) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.port.low, + buffer+size+len, + sizeof(rule->pfi.content.componentj.port.low)); + rule->pfi.content.componentj.port.low = + be16toh(rule->pfi.content.componentj.port.low); + len += sizeof(rule->pfi.content.componentj.port.low); + + if (size+len+ + sizeof(rule->pfi.content.componentj.port.high) > + length) { + ogs_error("PF%d Overflow: size%d len%d length%d", + i, size, len, length); + goto cleanup; + } + memcpy(&rule->pfi.content.componentj.port.high, + buffer+size+len, + sizeof(rule->pfi.content.componentj.port.high)); + rule->pfi.content.componentj.port.high = + be16toh(rule->pfi.content.componentj.port.high); + len += sizeof(rule->pfi.content.componentj.port.high); + break; + default:
View file
open5gs_2.7.6.4747.da27.202508232026.tar.xz/src/smf/gsm-build.c -> open5gs_2.7.6.4751.5939.202508242026.tar.xz/src/smf/gsm-build.c
Changed
@@ -752,7 +752,6 @@ qos_rule_code != OGS_NAS_QOS_CODE_MODIFY_EXISTING_QOS_RULE_AND_DELETE_PACKET_FILTERS && qos_rule_code != OGS_NAS_QOS_CODE_MODIFY_EXISTING_QOS_RULE_WITHOUT_MODIFYING_PACKET_FILTERS) { - ogs_assert(dl_pdr->precedence > 0 && dl_pdr->precedence < 255); qos_rule->precedence = dl_pdr->precedence; qos_rule->flow.segregation = 0; qos_rule->flow.identifier = qos_flow->qfi;
View file
open5gs_2.7.6.4747.da27.202508232026.tar.xz/src/smf/gsm-handler.c -> open5gs_2.7.6.4751.5939.202508242026.tar.xz/src/smf/gsm-handler.c
Changed
@@ -112,6 +112,8 @@ pf->direction = qos_rule->pfi.direction; for (j = 0; j < qos_rule->pfi.content.num_of_component; j++) { switch(qos_rule->pfi.content.componentj.type) { + case OGS_PACKET_FILTER_MATCH_ALL: + break; case OGS_PACKET_FILTER_PROTOCOL_IDENTIFIER_NEXT_HEADER_TYPE: pf->ipfw_rule.proto = qos_rule->pfi.content.componentj.proto; break;
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.