blob: 89e25eacacee8484c19289a5ab18cc39b05bc9ae [file] [log] [blame]
Harald Welte6fff3642017-07-22 21:36:13 +02001module NS_Emulation {
2 import from NS_Types all;
3 import from BSSGP_Types all;
Harald Weltee0abc472018-02-05 09:13:31 +01004 import from Osmocom_Gb_Types all;
Harald Welte6fff3642017-07-22 21:36:13 +02005 import from NS_CodecPort all;
6 import from NS_CodecPort_CtrlFunct all;
Harald Welte6fff3642017-07-22 21:36:13 +02007 import from IPL4asp_Types all;
8
9 type record NsUnitdataRequest {
10 BssgpBvci bvci,
11 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020012 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010013 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020014 }
15
16 template NsUnitdataRequest t_NsUdReq(template Nsei nsei, template BssgpBvci bvci, template octetstring sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010017 template PDU_BSSGP bssgp) := {
Harald Welte6e594f22017-07-23 16:19:35 +020018 bvci := bvci,
19 nsei := nsei,
20 sdu := sdu,
21 bssgp := bssgp
Harald Welte6fff3642017-07-22 21:36:13 +020022 }
23
24 type record NsUnitdataIndication {
25 BssgpBvci bvci,
26 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020027 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010028 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020029 }
30
31 template NsUnitdataIndication t_NsUdInd(Nsei nsei, BssgpBvci bvci, octetstring sdu) := {
32 bvci := bvci,
33 nsei := nsei,
34 sdu := sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010035 bssgp := dec_PDU_BSSGP(sdu)
Harald Welte6e594f22017-07-23 16:19:35 +020036 }
37
38 type record NsStatusIndication {
39 Nsei nsei,
40 Nsvci nsvci,
41 NseState old_state,
42 NseState new_state
43 }
44
45 template NsStatusIndication t_NsStsInd(Nsei nsei, Nsvci nsvci, NseState old_state, NseState state) := {
46 nsei := nsei,
47 nsvci := nsvci,
48 old_state := old_state,
49 new_state := state
Harald Welte6fff3642017-07-22 21:36:13 +020050 }
51
52 type enumerated NseState {
Harald Welte6e594f22017-07-23 16:19:35 +020053 NSE_S_DEAD_BLOCKED,
54 NSE_S_WAIT_RESET,
55 NSE_S_ALIVE_BLOCKED,
56 NSE_S_ALIVE_UNBLOCKED
57 }
Harald Welte6fff3642017-07-22 21:36:13 +020058
59 /* port from our (internal) point of view */
60 type port NS_SP_PT message {
61 in NsUnitdataRequest;
62 out NsUnitdataIndication,
Harald Welte6e594f22017-07-23 16:19:35 +020063 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020064 ASP_Event;
65 } with { extension "internal" };
66
67 /* port from the user point of view */
68 type port NS_PT message {
69 in ASP_Event,
Harald Welte6e594f22017-07-23 16:19:35 +020070 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020071 NsUnitdataIndication;
72 out NsUnitdataRequest;
73 } with { extension "internal" };
74
Alexander Couzens2c12b242018-07-31 00:30:11 +020075 function NSStart(NSConfiguration init_config) runs on NS_CT {
76 config := init_config;
Harald Welte6fff3642017-07-22 21:36:13 +020077 f_init();
78 f_ScanEvents();
79 }
80
81 private function f_init() runs on NS_CT {
Harald Welte6e594f22017-07-23 16:19:35 +020082 var Result res;
83 /* Connect the UDP socket */
Alexander Couzens2c12b242018-07-31 00:30:11 +020084 res := f_IPL4_connect(NSCP, config.remote_ip, config.remote_udp_port, config.local_ip, config.local_udp_port, 0, { udp := {}});
Harald Welte9220f632018-05-23 20:27:02 +020085 if (not ispresent(res.connId)) {
Max39e6cae2018-11-06 19:00:50 +010086 setverdict(fail, "Could not connect NS UDP socket from " &
87 config.local_ip & ":" & int2str(config.local_udp_port) &
88 " to " & config.remote_ip & ":" & int2str(config.remote_udp_port));
Daniel Willmanne4ff5372018-07-05 17:35:03 +020089 mtc.stop;
Harald Welte9220f632018-05-23 20:27:02 +020090 }
Harald Welte6e594f22017-07-23 16:19:35 +020091 g_conn_id := res.connId;
92 f_change_state(NSE_S_DEAD_BLOCKED);
93 /* Send the first NS-ALIVE to test the connection */
Harald Weltee81d84e2018-07-05 03:17:00 +020094 if (not config.role_sgsn) {
95 f_sendReset();
96 }
Harald Welte6fff3642017-07-22 21:36:13 +020097 }
98
99 type component NS_CT {
100 /* UDP port towards the bottom (IUT) */
101 port NS_CODEC_PT NSCP;
102 /* NS-User SAP towards the user */
103 port NS_SP_PT NS_SP;
104
Alexander Couzens2c12b242018-07-31 00:30:11 +0200105 var NSConfiguration config;
106
Harald Welte6e594f22017-07-23 16:19:35 +0200107 var NseState g_state := NSE_S_DEAD_BLOCKED;
108 var ConnectionId g_conn_id := -1;
109
110 timer Tns_alive := 3.0;
111 timer Tns_test := 10.0;
112 timer Tns_block := 10.0;
Harald Welte6fff3642017-07-22 21:36:13 +0200113 }
114
Alexander Couzens2c12b242018-07-31 00:30:11 +0200115 type record NSConfiguration {
116 PortNumber local_udp_port,
117 charstring local_ip,
118 PortNumber remote_udp_port,
119 charstring remote_ip,
120 Nsvci nsvci,
Harald Welte5e514fa2018-07-05 00:01:45 +0200121 Nsvci nsei,
122 boolean role_sgsn,
123 boolean handle_sns
Alexander Couzens2c12b242018-07-31 00:30:11 +0200124 }
Harald Welte6fff3642017-07-22 21:36:13 +0200125
Harald Welte6e594f22017-07-23 16:19:35 +0200126 private function f_change_state(NseState new_state) runs on NS_CT {
127 var NseState old_state := g_state;
128 g_state := new_state;
129 log("NS State Transition: ", old_state, " -> ", new_state);
Alexander Couzens2c12b242018-07-31 00:30:11 +0200130 NS_SP.send(t_NsStsInd(config.nsei, config.nsvci, old_state, new_state));
Harald Welte6fff3642017-07-22 21:36:13 +0200131 }
132
Harald Welte6e594f22017-07-23 16:19:35 +0200133 private function f_sendReset() runs on NS_CT {
Harald Welte387ab372018-06-30 10:27:06 +0200134 NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET(NS_CAUSE_OM_INTERVENTION, config.nsvci, config.nsei)));
Harald Welte6e594f22017-07-23 16:19:35 +0200135 g_state := NSE_S_WAIT_RESET;
Harald Welte6fff3642017-07-22 21:36:13 +0200136 }
137
Harald Welte6e594f22017-07-23 16:19:35 +0200138 private function f_sendAlive() runs on NS_CT {
139 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE));
140 Tns_alive.start;
141 }
142
143 private function f_sendUnblock() runs on NS_CT {
144 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK));
145 Tns_block.start;
146 }
147
148 private function f_sendBlock(NsCause cause) runs on NS_CT {
Harald Welte387ab372018-06-30 10:27:06 +0200149 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK(cause, config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200150 Tns_block.start;
151 }
152
153 altstep as_allstate() runs on NS_CT {
154 var NS_RecvFrom rf;
155 var ASP_Event evt;
156
157 /* transition to DEAD if t_alive times out */
Harald Weltec27f6842018-03-02 21:40:03 +0100158 [Tns_alive.running] Tns_alive.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200159 log("Tns-alive expired: changing to DEAD_BLOCKED + starting Tns-test");
160 f_change_state(NSE_S_DEAD_BLOCKED);
161 Tns_test.start;
Harald Welte6fff3642017-07-22 21:36:13 +0200162 }
Harald Welte6fff3642017-07-22 21:36:13 +0200163
Harald Weltec27f6842018-03-02 21:40:03 +0100164 [Tns_test.running] Tns_test.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200165 log("Tns-test expired: sending NS-ALIVE");
166 f_sendAlive();
Harald Welte6fff3642017-07-22 21:36:13 +0200167 }
Harald Welte6fff3642017-07-22 21:36:13 +0200168
Harald Welte6e594f22017-07-23 16:19:35 +0200169 /* Stop t_alive when receiving ALIVE-ACK */
170 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE_ACK)) {
171 log("NS-ALIVE-ACK received: stopping Tns-alive; starting Tns-test");
172 Tns_alive.stop;
173 Tns_test.start;
174 }
Harald Welte6fff3642017-07-22 21:36:13 +0200175
Harald Welte6e594f22017-07-23 16:19:35 +0200176 /* respond to NS-ALIVE with NS-ALIVE-ACK */
177 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE)) {
178 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE_ACK));
179 }
180
181 /* Respond to BLOCK for wrong NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200182 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, ?))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200183 log("Rx NS-BLOCK for unknown NSVCI");
184 /* FIXME */
185 }
186
187 /* Respond to RESET with correct NSEI/NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200188 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, config.nsvci, config.nsei))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200189 f_change_state(NSE_S_ALIVE_BLOCKED);
Harald Welte387ab372018-06-30 10:27:06 +0200190 NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET_ACK(config.nsvci, config.nsei)));
Harald Welte6e594f22017-07-23 16:19:35 +0200191 }
192
193 /* Respond to RESET with wrong NSEI/NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200194 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, ?, ?))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200195 log("Rx NS-RESET for unknown NSEI/NSVCI");
196 /* FIXME */
197 }
198
Harald Welte5e514fa2018-07-05 00:01:45 +0200199 [config.role_sgsn and config.handle_sns] as_sns_sgsn();
200
Harald Welte6e594f22017-07-23 16:19:35 +0200201 /* default case of handling unknown PDUs */
202 [] NSCP.receive(t_NS_RecvFrom(?)) -> value rf {
203 log("Rx Unexpected NS PDU ", rf.msg," in state ", g_state);
Harald Weltee0abc472018-02-05 09:13:31 +0100204 NSCP.send(t_NS_Send(g_conn_id, ts_NS_STATUS(NS_CAUSE_PDU_NOT_COMPATIBLE_WITH_PROTOCOL_STATE, rf.msg)));
Harald Welte6e594f22017-07-23 16:19:35 +0200205 }
206 /* Forwarding of ASP_Evet to user */
207 [] NSCP.receive(ASP_Event:?) -> value evt { NS_SP.send(evt); }
Harald Welte6fff3642017-07-22 21:36:13 +0200208 }
209
Harald Welte5e514fa2018-07-05 00:01:45 +0200210 /* simple IP Sub-Network Service responder for the SGSN side. This is not a full implementation
211 * of the protocol, merely sufficient to make the PCU/BSS side happy to proceed */
212 altstep as_sns_sgsn() runs on NS_CT {
213 var NS_RecvFrom rf;
214 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(config.nsei))) -> value rf {
215 /* blindly acknowledge whatever the PCU sends */
216 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_SIZE_ACK(config.nsei, omit)));
217 }
218 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(?))) {
219 setverdict(fail, "SNS-SIZE from unexpected NSEI");
220 self.stop;
221 }
222 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true,
223 {tr_SNS_IPv4(config.remote_ip, config.remote_udp_port)}))) -> value rf {
224 /* blindly acknowledge whatever the PCU sends */
225 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG_ACK(config.nsei, omit)));
226 /* send a SNS-CONFIG in response and expect a SNS-CONFIG-ACK */
227 var IP4_Elements v4 := { valueof(ts_SNS_IPv4(config.local_ip, config.local_udp_port)) };
228 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG(config.nsei, true, v4)));
229 alt {
230 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, omit))) {
231 /* success */
232 }
233 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, ?))) {
234 setverdict(fail, "Unexpected SNS-CONFIG-NACK");
235 self.stop;
236 }
237 }
238 }
239 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, false, ?))) { /* ignore */}
240 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true, ?))) {
241 setverdict(fail, "Unexpected SNS-CONFIG content");
242 self.stop;
243 }
244 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(?, ?, ?))) {
245 setverdict(fail, "SNS-CONFIG from unexpected NSEI");
246 self.stop;
247 }
248 }
249
Harald Welte6fff3642017-07-22 21:36:13 +0200250 private function f_ScanEvents() runs on NS_CT {
251 var NsUnitdataRequest ud_req;
252 var NS_RecvFrom rf;
Harald Welte6e594f22017-07-23 16:19:35 +0200253 var default d;
254
255 d := activate(as_allstate());
Harald Welte6fff3642017-07-22 21:36:13 +0200256
257 while (true) {
Harald Welte6e594f22017-07-23 16:19:35 +0200258 if (g_state == NSE_S_DEAD_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200259 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200260 [false] any timer.timeout {}
Harald Welte6fff3642017-07-22 21:36:13 +0200261 }
Harald Welte6e594f22017-07-23 16:19:35 +0200262 } else if (g_state == NSE_S_WAIT_RESET) {
Harald Welte6fff3642017-07-22 21:36:13 +0200263 alt {
Harald Welte387ab372018-06-30 10:27:06 +0200264 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET_ACK(config.nsvci, config.nsei))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200265 f_change_state(NSE_S_ALIVE_BLOCKED);
266 f_sendAlive();
267 f_sendUnblock();
Harald Welte6fff3642017-07-22 21:36:13 +0200268 }
Harald Welte6fff3642017-07-22 21:36:13 +0200269 }
Harald Welte6e594f22017-07-23 16:19:35 +0200270 } else if (g_state == NSE_S_ALIVE_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200271 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200272 /* bogus block, just respond with ACK */
Harald Welte387ab372018-06-30 10:27:06 +0200273 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
274 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200275 }
276 /* Respond to UNBLOCK with UNBLOCK-ACK + change state */
277 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
278 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
279 Tns_block.stop;
280 f_change_state(NSE_S_ALIVE_UNBLOCKED);
281 }
282 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK_ACK)) -> value rf {
283 Tns_block.stop;
284 f_change_state(NSE_S_ALIVE_UNBLOCKED);
285 }
286 [] Tns_block.timeout {
287 /* repeat unblock transmission */
288 f_sendUnblock();
289 }
290 }
291 } else if (g_state == NSE_S_ALIVE_UNBLOCKED) {
292 alt {
293 /* bogus unblock, just respond with ACK */
294 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
295 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
296 }
297 /* Respond to BLOCK with BLOCK-ACK + change state */
Harald Welte387ab372018-06-30 10:27:06 +0200298 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
299 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200300 Tns_block.stop;
301 f_change_state(NSE_S_ALIVE_BLOCKED);
302 }
Harald Welte387ab372018-06-30 10:27:06 +0200303 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK_ACK(config.nsvci))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200304 Tns_block.stop;
305 }
306 /* NS-UNITDATA PDU from network to NS-UNITDATA.ind to user */
Harald Welte387ab372018-06-30 10:27:06 +0200307 [] NSCP.receive(t_NS_RecvFrom(tr_NS_UNITDATA(?, ?, ?))) -> value rf {
Alexander Couzens2c12b242018-07-31 00:30:11 +0200308 NS_SP.send(t_NsUdInd(config.nsei,
Harald Weltee0abc472018-02-05 09:13:31 +0100309 oct2int(rf.msg.pDU_NS_Unitdata.bVCI),
310 rf.msg.pDU_NS_Unitdata.nS_SDU));
Harald Welte6e594f22017-07-23 16:19:35 +0200311 }
312 /* NS-UNITDATA.req from user to NS-UNITDATA PDU on network */
Alexander Couzens2c12b242018-07-31 00:30:11 +0200313 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, ?, omit)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200314 /* using raw octetstring PDU */
Harald Welte387ab372018-06-30 10:27:06 +0200315 NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, ud_req.sdu)));
Harald Welte6e594f22017-07-23 16:19:35 +0200316 }
Alexander Couzens2c12b242018-07-31 00:30:11 +0200317 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, omit, ?)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200318 /* using decoded BSSGP PDU that we need to encode first */
Harald Weltee0abc472018-02-05 09:13:31 +0100319 var octetstring enc := enc_PDU_BSSGP(ud_req.bssgp);
Harald Welte387ab372018-06-30 10:27:06 +0200320 NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, enc)));
Harald Welte6e594f22017-07-23 16:19:35 +0200321 }
Harald Welte6fff3642017-07-22 21:36:13 +0200322 }
323 }
324
Harald Welte6e594f22017-07-23 16:19:35 +0200325 } /* while */
326 //deactivate(d);
Harald Welte6fff3642017-07-22 21:36:13 +0200327 }
328}