blob: 9ad89cb45c2614e61909b4af3ffe00570278aa84 [file] [log] [blame]
Harald Welte6fff3642017-07-22 21:36:13 +02001module NS_Emulation {
2 import from NS_Types all;
3 import from BSSGP_Types all;
Harald Weltee0abc472018-02-05 09:13:31 +01004 import from Osmocom_Gb_Types all;
Harald Welte6fff3642017-07-22 21:36:13 +02005 import from NS_CodecPort all;
6 import from NS_CodecPort_CtrlFunct all;
Harald Welte6fff3642017-07-22 21:36:13 +02007 import from IPL4asp_Types all;
8
9 type record NsUnitdataRequest {
10 BssgpBvci bvci,
11 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020012 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010013 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020014 }
15
16 template NsUnitdataRequest t_NsUdReq(template Nsei nsei, template BssgpBvci bvci, template octetstring sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010017 template PDU_BSSGP bssgp) := {
Harald Welte6e594f22017-07-23 16:19:35 +020018 bvci := bvci,
19 nsei := nsei,
20 sdu := sdu,
21 bssgp := bssgp
Harald Welte6fff3642017-07-22 21:36:13 +020022 }
23
24 type record NsUnitdataIndication {
25 BssgpBvci bvci,
26 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020027 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010028 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020029 }
30
31 template NsUnitdataIndication t_NsUdInd(Nsei nsei, BssgpBvci bvci, octetstring sdu) := {
32 bvci := bvci,
33 nsei := nsei,
34 sdu := sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010035 bssgp := dec_PDU_BSSGP(sdu)
Harald Welte6e594f22017-07-23 16:19:35 +020036 }
37
38 type record NsStatusIndication {
39 Nsei nsei,
40 Nsvci nsvci,
41 NseState old_state,
42 NseState new_state
43 }
44
45 template NsStatusIndication t_NsStsInd(Nsei nsei, Nsvci nsvci, NseState old_state, NseState state) := {
46 nsei := nsei,
47 nsvci := nsvci,
48 old_state := old_state,
49 new_state := state
Harald Welte6fff3642017-07-22 21:36:13 +020050 }
51
52 type enumerated NseState {
Harald Welte6e594f22017-07-23 16:19:35 +020053 NSE_S_DEAD_BLOCKED,
54 NSE_S_WAIT_RESET,
55 NSE_S_ALIVE_BLOCKED,
56 NSE_S_ALIVE_UNBLOCKED
57 }
Harald Welte6fff3642017-07-22 21:36:13 +020058
59 /* port from our (internal) point of view */
60 type port NS_SP_PT message {
61 in NsUnitdataRequest;
62 out NsUnitdataIndication,
Harald Welte6e594f22017-07-23 16:19:35 +020063 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020064 ASP_Event;
65 } with { extension "internal" };
66
67 /* port from the user point of view */
68 type port NS_PT message {
69 in ASP_Event,
Harald Welte6e594f22017-07-23 16:19:35 +020070 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020071 NsUnitdataIndication;
72 out NsUnitdataRequest;
73 } with { extension "internal" };
74
Alexander Couzens2c12b242018-07-31 00:30:11 +020075 function NSStart(NSConfiguration init_config) runs on NS_CT {
76 config := init_config;
Harald Welte6fff3642017-07-22 21:36:13 +020077 f_init();
78 f_ScanEvents();
79 }
80
81 private function f_init() runs on NS_CT {
Harald Welte6e594f22017-07-23 16:19:35 +020082 var Result res;
83 /* Connect the UDP socket */
Alexander Couzens2c12b242018-07-31 00:30:11 +020084 res := f_IPL4_connect(NSCP, config.remote_ip, config.remote_udp_port, config.local_ip, config.local_udp_port, 0, { udp := {}});
Harald Welte9220f632018-05-23 20:27:02 +020085 if (not ispresent(res.connId)) {
Max39e6cae2018-11-06 19:00:50 +010086 setverdict(fail, "Could not connect NS UDP socket from " &
87 config.local_ip & ":" & int2str(config.local_udp_port) &
88 " to " & config.remote_ip & ":" & int2str(config.remote_udp_port));
Daniel Willmanne4ff5372018-07-05 17:35:03 +020089 mtc.stop;
Harald Welte9220f632018-05-23 20:27:02 +020090 }
Harald Welte6e594f22017-07-23 16:19:35 +020091 g_conn_id := res.connId;
92 f_change_state(NSE_S_DEAD_BLOCKED);
93 /* Send the first NS-ALIVE to test the connection */
94 f_sendReset();
Harald Welte6fff3642017-07-22 21:36:13 +020095 }
96
97 type component NS_CT {
98 /* UDP port towards the bottom (IUT) */
99 port NS_CODEC_PT NSCP;
100 /* NS-User SAP towards the user */
101 port NS_SP_PT NS_SP;
102
Alexander Couzens2c12b242018-07-31 00:30:11 +0200103 var NSConfiguration config;
104
Harald Welte6e594f22017-07-23 16:19:35 +0200105 var NseState g_state := NSE_S_DEAD_BLOCKED;
106 var ConnectionId g_conn_id := -1;
107
108 timer Tns_alive := 3.0;
109 timer Tns_test := 10.0;
110 timer Tns_block := 10.0;
Harald Welte6fff3642017-07-22 21:36:13 +0200111 }
112
Alexander Couzens2c12b242018-07-31 00:30:11 +0200113 type record NSConfiguration {
114 PortNumber local_udp_port,
115 charstring local_ip,
116 PortNumber remote_udp_port,
117 charstring remote_ip,
118 Nsvci nsvci,
Harald Welte5e514fa2018-07-05 00:01:45 +0200119 Nsvci nsei,
120 boolean role_sgsn,
121 boolean handle_sns
Alexander Couzens2c12b242018-07-31 00:30:11 +0200122 }
Harald Welte6fff3642017-07-22 21:36:13 +0200123
Harald Welte6e594f22017-07-23 16:19:35 +0200124 private function f_change_state(NseState new_state) runs on NS_CT {
125 var NseState old_state := g_state;
126 g_state := new_state;
127 log("NS State Transition: ", old_state, " -> ", new_state);
Alexander Couzens2c12b242018-07-31 00:30:11 +0200128 NS_SP.send(t_NsStsInd(config.nsei, config.nsvci, old_state, new_state));
Harald Welte6fff3642017-07-22 21:36:13 +0200129 }
130
Harald Welte6e594f22017-07-23 16:19:35 +0200131 private function f_sendReset() runs on NS_CT {
Harald Welte387ab372018-06-30 10:27:06 +0200132 NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET(NS_CAUSE_OM_INTERVENTION, config.nsvci, config.nsei)));
Harald Welte6e594f22017-07-23 16:19:35 +0200133 g_state := NSE_S_WAIT_RESET;
Harald Welte6fff3642017-07-22 21:36:13 +0200134 }
135
Harald Welte6e594f22017-07-23 16:19:35 +0200136 private function f_sendAlive() runs on NS_CT {
137 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE));
138 Tns_alive.start;
139 }
140
141 private function f_sendUnblock() runs on NS_CT {
142 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK));
143 Tns_block.start;
144 }
145
146 private function f_sendBlock(NsCause cause) runs on NS_CT {
Harald Welte387ab372018-06-30 10:27:06 +0200147 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK(cause, config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200148 Tns_block.start;
149 }
150
151 altstep as_allstate() runs on NS_CT {
152 var NS_RecvFrom rf;
153 var ASP_Event evt;
154
155 /* transition to DEAD if t_alive times out */
Harald Weltec27f6842018-03-02 21:40:03 +0100156 [Tns_alive.running] Tns_alive.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200157 log("Tns-alive expired: changing to DEAD_BLOCKED + starting Tns-test");
158 f_change_state(NSE_S_DEAD_BLOCKED);
159 Tns_test.start;
Harald Welte6fff3642017-07-22 21:36:13 +0200160 }
Harald Welte6fff3642017-07-22 21:36:13 +0200161
Harald Weltec27f6842018-03-02 21:40:03 +0100162 [Tns_test.running] Tns_test.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200163 log("Tns-test expired: sending NS-ALIVE");
164 f_sendAlive();
Harald Welte6fff3642017-07-22 21:36:13 +0200165 }
Harald Welte6fff3642017-07-22 21:36:13 +0200166
Harald Welte6e594f22017-07-23 16:19:35 +0200167 /* Stop t_alive when receiving ALIVE-ACK */
168 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE_ACK)) {
169 log("NS-ALIVE-ACK received: stopping Tns-alive; starting Tns-test");
170 Tns_alive.stop;
171 Tns_test.start;
172 }
Harald Welte6fff3642017-07-22 21:36:13 +0200173
Harald Welte6e594f22017-07-23 16:19:35 +0200174 /* respond to NS-ALIVE with NS-ALIVE-ACK */
175 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE)) {
176 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE_ACK));
177 }
178
179 /* Respond to BLOCK for wrong NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200180 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, ?))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200181 log("Rx NS-BLOCK for unknown NSVCI");
182 /* FIXME */
183 }
184
185 /* Respond to RESET with correct NSEI/NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200186 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, config.nsvci, config.nsei))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200187 f_change_state(NSE_S_ALIVE_BLOCKED);
Harald Welte387ab372018-06-30 10:27:06 +0200188 NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET_ACK(config.nsvci, config.nsei)));
Harald Welte6e594f22017-07-23 16:19:35 +0200189 }
190
191 /* Respond to RESET with wrong NSEI/NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200192 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, ?, ?))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200193 log("Rx NS-RESET for unknown NSEI/NSVCI");
194 /* FIXME */
195 }
196
Harald Welte5e514fa2018-07-05 00:01:45 +0200197 [config.role_sgsn and config.handle_sns] as_sns_sgsn();
198
Harald Welte6e594f22017-07-23 16:19:35 +0200199 /* default case of handling unknown PDUs */
200 [] NSCP.receive(t_NS_RecvFrom(?)) -> value rf {
201 log("Rx Unexpected NS PDU ", rf.msg," in state ", g_state);
Harald Weltee0abc472018-02-05 09:13:31 +0100202 NSCP.send(t_NS_Send(g_conn_id, ts_NS_STATUS(NS_CAUSE_PDU_NOT_COMPATIBLE_WITH_PROTOCOL_STATE, rf.msg)));
Harald Welte6e594f22017-07-23 16:19:35 +0200203 }
204 /* Forwarding of ASP_Evet to user */
205 [] NSCP.receive(ASP_Event:?) -> value evt { NS_SP.send(evt); }
Harald Welte6fff3642017-07-22 21:36:13 +0200206 }
207
Harald Welte5e514fa2018-07-05 00:01:45 +0200208 /* simple IP Sub-Network Service responder for the SGSN side. This is not a full implementation
209 * of the protocol, merely sufficient to make the PCU/BSS side happy to proceed */
210 altstep as_sns_sgsn() runs on NS_CT {
211 var NS_RecvFrom rf;
212 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(config.nsei))) -> value rf {
213 /* blindly acknowledge whatever the PCU sends */
214 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_SIZE_ACK(config.nsei, omit)));
215 }
216 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(?))) {
217 setverdict(fail, "SNS-SIZE from unexpected NSEI");
218 self.stop;
219 }
220 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true,
221 {tr_SNS_IPv4(config.remote_ip, config.remote_udp_port)}))) -> value rf {
222 /* blindly acknowledge whatever the PCU sends */
223 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG_ACK(config.nsei, omit)));
224 /* send a SNS-CONFIG in response and expect a SNS-CONFIG-ACK */
225 var IP4_Elements v4 := { valueof(ts_SNS_IPv4(config.local_ip, config.local_udp_port)) };
226 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG(config.nsei, true, v4)));
227 alt {
228 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, omit))) {
229 /* success */
230 }
231 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, ?))) {
232 setverdict(fail, "Unexpected SNS-CONFIG-NACK");
233 self.stop;
234 }
235 }
236 }
237 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, false, ?))) { /* ignore */}
238 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true, ?))) {
239 setverdict(fail, "Unexpected SNS-CONFIG content");
240 self.stop;
241 }
242 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(?, ?, ?))) {
243 setverdict(fail, "SNS-CONFIG from unexpected NSEI");
244 self.stop;
245 }
246 }
247
Harald Welte6fff3642017-07-22 21:36:13 +0200248 private function f_ScanEvents() runs on NS_CT {
249 var NsUnitdataRequest ud_req;
250 var NS_RecvFrom rf;
Harald Welte6e594f22017-07-23 16:19:35 +0200251 var default d;
252
253 d := activate(as_allstate());
Harald Welte6fff3642017-07-22 21:36:13 +0200254
255 while (true) {
Harald Welte6e594f22017-07-23 16:19:35 +0200256 if (g_state == NSE_S_DEAD_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200257 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200258 [false] any timer.timeout {}
Harald Welte6fff3642017-07-22 21:36:13 +0200259 }
Harald Welte6e594f22017-07-23 16:19:35 +0200260 } else if (g_state == NSE_S_WAIT_RESET) {
Harald Welte6fff3642017-07-22 21:36:13 +0200261 alt {
Harald Welte387ab372018-06-30 10:27:06 +0200262 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET_ACK(config.nsvci, config.nsei))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200263 f_change_state(NSE_S_ALIVE_BLOCKED);
264 f_sendAlive();
265 f_sendUnblock();
Harald Welte6fff3642017-07-22 21:36:13 +0200266 }
Harald Welte6fff3642017-07-22 21:36:13 +0200267 }
Harald Welte6e594f22017-07-23 16:19:35 +0200268 } else if (g_state == NSE_S_ALIVE_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200269 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200270 /* bogus block, just respond with ACK */
Harald Welte387ab372018-06-30 10:27:06 +0200271 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
272 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200273 }
274 /* Respond to UNBLOCK with UNBLOCK-ACK + change state */
275 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
276 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
277 Tns_block.stop;
278 f_change_state(NSE_S_ALIVE_UNBLOCKED);
279 }
280 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK_ACK)) -> value rf {
281 Tns_block.stop;
282 f_change_state(NSE_S_ALIVE_UNBLOCKED);
283 }
284 [] Tns_block.timeout {
285 /* repeat unblock transmission */
286 f_sendUnblock();
287 }
288 }
289 } else if (g_state == NSE_S_ALIVE_UNBLOCKED) {
290 alt {
291 /* bogus unblock, just respond with ACK */
292 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
293 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
294 }
295 /* Respond to BLOCK with BLOCK-ACK + change state */
Harald Welte387ab372018-06-30 10:27:06 +0200296 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
297 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200298 Tns_block.stop;
299 f_change_state(NSE_S_ALIVE_BLOCKED);
300 }
Harald Welte387ab372018-06-30 10:27:06 +0200301 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK_ACK(config.nsvci))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200302 Tns_block.stop;
303 }
304 /* NS-UNITDATA PDU from network to NS-UNITDATA.ind to user */
Harald Welte387ab372018-06-30 10:27:06 +0200305 [] NSCP.receive(t_NS_RecvFrom(tr_NS_UNITDATA(?, ?, ?))) -> value rf {
Alexander Couzens2c12b242018-07-31 00:30:11 +0200306 NS_SP.send(t_NsUdInd(config.nsei,
Harald Weltee0abc472018-02-05 09:13:31 +0100307 oct2int(rf.msg.pDU_NS_Unitdata.bVCI),
308 rf.msg.pDU_NS_Unitdata.nS_SDU));
Harald Welte6e594f22017-07-23 16:19:35 +0200309 }
310 /* NS-UNITDATA.req from user to NS-UNITDATA PDU on network */
Alexander Couzens2c12b242018-07-31 00:30:11 +0200311 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, ?, omit)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200312 /* using raw octetstring PDU */
Harald Welte387ab372018-06-30 10:27:06 +0200313 NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, ud_req.sdu)));
Harald Welte6e594f22017-07-23 16:19:35 +0200314 }
Alexander Couzens2c12b242018-07-31 00:30:11 +0200315 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, omit, ?)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200316 /* using decoded BSSGP PDU that we need to encode first */
Harald Weltee0abc472018-02-05 09:13:31 +0100317 var octetstring enc := enc_PDU_BSSGP(ud_req.bssgp);
Harald Welte387ab372018-06-30 10:27:06 +0200318 NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, enc)));
Harald Welte6e594f22017-07-23 16:19:35 +0200319 }
Harald Welte6fff3642017-07-22 21:36:13 +0200320 }
321 }
322
Harald Welte6e594f22017-07-23 16:19:35 +0200323 } /* while */
324 //deactivate(d);
Harald Welte6fff3642017-07-22 21:36:13 +0200325 }
326}