Projects
osmocom:nightly
open5gs
Log In
Username
Password
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
Expand all
Collapse all
Changes of Revision 960
View file
open5gs_2.7.2.4608.07cb.202502052026.dsc -> open5gs_2.7.2.4610.056b.202502062026.dsc
Changed
@@ -2,7 +2,7 @@ Source: open5gs Binary: open5gs-common, open5gs-mme, open5gs-sgwc, open5gs-smf, open5gs-amf, open5gs-sgwu, open5gs-upf, open5gs-hss, open5gs-pcrf, open5gs-nrf, open5gs-scp, open5gs-sepp, open5gs-ausf, open5gs-udm, open5gs-pcf, open5gs-nssf, open5gs-bsf, open5gs-udr, open5gs, open5gs-dbg Architecture: any -Version: 2.7.2.4608.07cb.202502052026 +Version: 2.7.2.4610.056b.202502062026 Maintainer: Harald Welte <laforge@gnumonks.org> Uploaders: Sukchan Lee <acetcom@gmail.com> Homepage: https://open5gs.org @@ -32,8 +32,8 @@ open5gs-udr deb net optional arch=any open5gs-upf deb net optional arch=any Checksums-Sha1: - d41c5ee812821e4abfe9b313a726a3487bc31cb9 14524500 open5gs_2.7.2.4608.07cb.202502052026.tar.xz + 1d93d75796a24da9adbf69a5efe46df22c86ad77 14525700 open5gs_2.7.2.4610.056b.202502062026.tar.xz Checksums-Sha256: - 2b4b930e25be28f6aad4edf30c5bcf222153c9d231f2bea082bfd1c592a31f88 14524500 open5gs_2.7.2.4608.07cb.202502052026.tar.xz + e91d22ed4eaf3606cc1dce7d5dc3b11561cde53cc1560db1ec813e68a3441e68 14525700 open5gs_2.7.2.4610.056b.202502062026.tar.xz Files: - 4fb6e81626001fea2f01179ee2a446c7 14524500 open5gs_2.7.2.4608.07cb.202502052026.tar.xz + ee7670799eefdf4242943a7b62461030 14525700 open5gs_2.7.2.4610.056b.202502062026.tar.xz
View file
open5gs_2.7.2.4608.07cb.202502052026.tar.xz/.tarball-version -> open5gs_2.7.2.4610.056b.202502062026.tar.xz/.tarball-version
Changed
@@ -1 +1 @@ -2.7.2.4608-07cb.202502052026 +2.7.2.4610-056b.202502062026
View file
open5gs_2.7.2.4608.07cb.202502052026.tar.xz/debian/changelog -> open5gs_2.7.2.4610.056b.202502062026.tar.xz/debian/changelog
Changed
@@ -1,8 +1,8 @@ -open5gs (2.7.2.4608.07cb.202502052026) unstable; urgency=medium +open5gs (2.7.2.4610.056b.202502062026) unstable; urgency=medium * Automatically generated changelog entry for building the Osmocom nightly feed - -- Osmocom OBS scripts <info@osmocom.org> Wed, 05 Feb 2025 20:27:55 +0000 + -- Osmocom OBS scripts <info@osmocom.org> Thu, 06 Feb 2025 20:27:54 +0000 open5gs (2.7.2) unstable; urgency=medium
View file
open5gs_2.7.2.4608.07cb.202502052026.tar.xz/src/amf/gmm-sm.c -> open5gs_2.7.2.4610.056b.202502062026.tar.xz/src/amf/gmm-sm.c
Changed
@@ -1977,6 +1977,29 @@ END break; + CASE(OGS_SBI_SERVICE_NAME_NUDM_SDM) + if ((sbi_message->res_status != OGS_SBI_HTTP_STATUS_OK) && + (sbi_message->res_status != OGS_SBI_HTTP_STATUS_CREATED) && + (sbi_message->res_status != OGS_SBI_HTTP_STATUS_NO_CONTENT)) { + ogs_error("%s HTTP response error %d", + amf_ue->supi, sbi_message->res_status); + } + + SWITCH(sbi_message->h.resource.component1) + CASE(OGS_SBI_RESOURCE_NAME_AM_DATA) + CASE(OGS_SBI_RESOURCE_NAME_SMF_SELECT_DATA) + CASE(OGS_SBI_RESOURCE_NAME_UE_CONTEXT_IN_SMF_DATA) + CASE(OGS_SBI_RESOURCE_NAME_SDM_SUBSCRIPTIONS) + ogs_warn("%s Ignore SBI message", amf_ue->supi); + break; + + DEFAULT + ogs_error("Invalid resource name %s", + sbi_message->h.resource.component1); + ogs_assert_if_reached(); + END + break; + CASE(OGS_SBI_SERVICE_NAME_NPCF_AM_POLICY_CONTROL) SWITCH(sbi_message->h.resource.component0) CASE(OGS_SBI_RESOURCE_NAME_POLICIES)
View file
open5gs_2.7.2.4608.07cb.202502052026.tar.xz/src/amf/nsmf-handler.c -> open5gs_2.7.2.4610.056b.202502062026.tar.xz/src/amf/nsmf-handler.c
Changed
@@ -681,7 +681,29 @@ ogs_warn("%s:%d Receive Update SM context" "(DUPLICATED_PDU_SESSION_ID)", amf_ue->supi, sess->psi); - if (ran_ue) { + /* + * Issue #3710 + * + * A duplicate PDU Session Establishment is received. + * The system intends to update the SM context via the SBI. + * + * The process is as follows: + * 1. Log a warning including the SUPI (subscriber ID) and psi. + * 2. Call amf_sess_sbi_discover_and_send() with a pointer + * to amf_nsmf_pdusession_build_create_sm_context(). + * 3. This function (amf_nsmf_pdusession_build_create_sm_context) + * will eventually build the SBI request header and call + * ogs_sbi_server_uri(), which internally calls ogs_uridup(). + * 4. If the SUPI (used as header.resource.component0) is NULL, + * ogs_uridup asserts on the NULL value and causes a crash. + * + * To prevent this, we check for a NULL SUPI before calling the + * update function. + */ + if (!amf_ue->supi) { + ogs_warn("SUPI is NULL. Skipping update SM context for " + "duplicated PDU Session (psi: %d)", sess->psi); + } else if (ran_ue) { r = amf_sess_sbi_discover_and_send( OGS_SBI_SERVICE_TYPE_NSMF_PDUSESSION, NULL, amf_nsmf_pdusession_build_create_sm_context,
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.