blob: 6f9bc39c74c63ce68f69b9134540d96fde1460a2 [file] [log] [blame]
Harald Welte34b5a952019-05-27 11:54:11 +02001/* GPRS-NS Emulation in TTCN-3
2 * (C) 2018 Harald Welte <laforge@gnumonks.org>
3 * contributions by sysmocom - s.f.m.c. GmbH
4 * All rights reserved.
5 *
6 * Released under the terms of GNU General Public License, Version 2 or
7 * (at your option) any later version.
8 *
9 * SPDX-License-Identifier: GPL-2.0-or-later
10 */
11
Harald Welte6fff3642017-07-22 21:36:13 +020012module NS_Emulation {
13 import from NS_Types all;
14 import from BSSGP_Types all;
Harald Weltee0abc472018-02-05 09:13:31 +010015 import from Osmocom_Gb_Types all;
Harald Welte6fff3642017-07-22 21:36:13 +020016 import from NS_CodecPort all;
17 import from NS_CodecPort_CtrlFunct all;
Harald Welte6fff3642017-07-22 21:36:13 +020018 import from IPL4asp_Types all;
Alexander Couzens1e5dc482020-07-28 15:38:46 +020019 import from PCUIF_Types all;
Harald Welte6fff3642017-07-22 21:36:13 +020020
21 type record NsUnitdataRequest {
22 BssgpBvci bvci,
23 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020024 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010025 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020026 }
27
28 template NsUnitdataRequest t_NsUdReq(template Nsei nsei, template BssgpBvci bvci, template octetstring sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010029 template PDU_BSSGP bssgp) := {
Harald Welte6e594f22017-07-23 16:19:35 +020030 bvci := bvci,
31 nsei := nsei,
32 sdu := sdu,
33 bssgp := bssgp
Harald Welte6fff3642017-07-22 21:36:13 +020034 }
35
36 type record NsUnitdataIndication {
37 BssgpBvci bvci,
38 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020039 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010040 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020041 }
42
43 template NsUnitdataIndication t_NsUdInd(Nsei nsei, BssgpBvci bvci, octetstring sdu) := {
44 bvci := bvci,
45 nsei := nsei,
46 sdu := sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010047 bssgp := dec_PDU_BSSGP(sdu)
Harald Welte6e594f22017-07-23 16:19:35 +020048 }
49
50 type record NsStatusIndication {
51 Nsei nsei,
52 Nsvci nsvci,
53 NseState old_state,
54 NseState new_state
55 }
56
57 template NsStatusIndication t_NsStsInd(Nsei nsei, Nsvci nsvci, NseState old_state, NseState state) := {
58 nsei := nsei,
59 nsvci := nsvci,
60 old_state := old_state,
61 new_state := state
Harald Welte6fff3642017-07-22 21:36:13 +020062 }
63
64 type enumerated NseState {
Harald Welte6e594f22017-07-23 16:19:35 +020065 NSE_S_DEAD_BLOCKED,
66 NSE_S_WAIT_RESET,
67 NSE_S_ALIVE_BLOCKED,
68 NSE_S_ALIVE_UNBLOCKED
69 }
Harald Welte6fff3642017-07-22 21:36:13 +020070
71 /* port from our (internal) point of view */
72 type port NS_SP_PT message {
73 in NsUnitdataRequest;
74 out NsUnitdataIndication,
Harald Welte6e594f22017-07-23 16:19:35 +020075 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020076 ASP_Event;
77 } with { extension "internal" };
78
79 /* port from the user point of view */
80 type port NS_PT message {
81 in ASP_Event,
Harald Welte6e594f22017-07-23 16:19:35 +020082 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020083 NsUnitdataIndication;
84 out NsUnitdataRequest;
85 } with { extension "internal" };
86
Alexander Couzens2c12b242018-07-31 00:30:11 +020087 function NSStart(NSConfiguration init_config) runs on NS_CT {
88 config := init_config;
Harald Welte6fff3642017-07-22 21:36:13 +020089 f_init();
90 f_ScanEvents();
91 }
92
93 private function f_init() runs on NS_CT {
Harald Welte6e594f22017-07-23 16:19:35 +020094 var Result res;
95 /* Connect the UDP socket */
Alexander Couzens2c12b242018-07-31 00:30:11 +020096 res := f_IPL4_connect(NSCP, config.remote_ip, config.remote_udp_port, config.local_ip, config.local_udp_port, 0, { udp := {}});
Harald Welte9220f632018-05-23 20:27:02 +020097 if (not ispresent(res.connId)) {
Max39e6cae2018-11-06 19:00:50 +010098 setverdict(fail, "Could not connect NS UDP socket from " &
99 config.local_ip & ":" & int2str(config.local_udp_port) &
100 " to " & config.remote_ip & ":" & int2str(config.remote_udp_port));
Daniel Willmanne4ff5372018-07-05 17:35:03 +0200101 mtc.stop;
Harald Welte9220f632018-05-23 20:27:02 +0200102 }
Harald Welte6e594f22017-07-23 16:19:35 +0200103 g_conn_id := res.connId;
104 f_change_state(NSE_S_DEAD_BLOCKED);
105 /* Send the first NS-ALIVE to test the connection */
Harald Weltee81d84e2018-07-05 03:17:00 +0200106 if (not config.role_sgsn) {
107 f_sendReset();
108 }
Harald Welte6fff3642017-07-22 21:36:13 +0200109 }
110
111 type component NS_CT {
112 /* UDP port towards the bottom (IUT) */
113 port NS_CODEC_PT NSCP;
114 /* NS-User SAP towards the user */
115 port NS_SP_PT NS_SP;
116
Alexander Couzens2c12b242018-07-31 00:30:11 +0200117 var NSConfiguration config;
118
Harald Welte6e594f22017-07-23 16:19:35 +0200119 var NseState g_state := NSE_S_DEAD_BLOCKED;
120 var ConnectionId g_conn_id := -1;
121
122 timer Tns_alive := 3.0;
123 timer Tns_test := 10.0;
124 timer Tns_block := 10.0;
Harald Welte6fff3642017-07-22 21:36:13 +0200125 }
126
Alexander Couzens2c12b242018-07-31 00:30:11 +0200127 type record NSConfiguration {
Alexander Couzens1e5dc482020-07-28 15:38:46 +0200128 PCUIF_AddrType remote_proto,
Alexander Couzens2c12b242018-07-31 00:30:11 +0200129 PortNumber local_udp_port,
130 charstring local_ip,
131 PortNumber remote_udp_port,
132 charstring remote_ip,
133 Nsvci nsvci,
Harald Welte5e514fa2018-07-05 00:01:45 +0200134 Nsvci nsei,
135 boolean role_sgsn,
136 boolean handle_sns
Alexander Couzens2c12b242018-07-31 00:30:11 +0200137 }
Harald Welte6fff3642017-07-22 21:36:13 +0200138
Harald Welte6e594f22017-07-23 16:19:35 +0200139 private function f_change_state(NseState new_state) runs on NS_CT {
140 var NseState old_state := g_state;
141 g_state := new_state;
142 log("NS State Transition: ", old_state, " -> ", new_state);
Alexander Couzens2c12b242018-07-31 00:30:11 +0200143 NS_SP.send(t_NsStsInd(config.nsei, config.nsvci, old_state, new_state));
Harald Welte6fff3642017-07-22 21:36:13 +0200144 }
145
Harald Welte6e594f22017-07-23 16:19:35 +0200146 private function f_sendReset() runs on NS_CT {
Harald Welte387ab372018-06-30 10:27:06 +0200147 NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET(NS_CAUSE_OM_INTERVENTION, config.nsvci, config.nsei)));
Harald Welte6e594f22017-07-23 16:19:35 +0200148 g_state := NSE_S_WAIT_RESET;
Harald Welte6fff3642017-07-22 21:36:13 +0200149 }
150
Harald Welte6e594f22017-07-23 16:19:35 +0200151 private function f_sendAlive() runs on NS_CT {
152 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE));
153 Tns_alive.start;
154 }
155
156 private function f_sendUnblock() runs on NS_CT {
157 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK));
158 Tns_block.start;
159 }
160
161 private function f_sendBlock(NsCause cause) runs on NS_CT {
Harald Welte387ab372018-06-30 10:27:06 +0200162 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK(cause, config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200163 Tns_block.start;
164 }
165
166 altstep as_allstate() runs on NS_CT {
167 var NS_RecvFrom rf;
168 var ASP_Event evt;
169
170 /* transition to DEAD if t_alive times out */
Harald Weltec27f6842018-03-02 21:40:03 +0100171 [Tns_alive.running] Tns_alive.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200172 log("Tns-alive expired: changing to DEAD_BLOCKED + starting Tns-test");
173 f_change_state(NSE_S_DEAD_BLOCKED);
174 Tns_test.start;
Harald Welte6fff3642017-07-22 21:36:13 +0200175 }
Harald Welte6fff3642017-07-22 21:36:13 +0200176
Harald Weltec27f6842018-03-02 21:40:03 +0100177 [Tns_test.running] Tns_test.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200178 log("Tns-test expired: sending NS-ALIVE");
179 f_sendAlive();
Harald Welte6fff3642017-07-22 21:36:13 +0200180 }
Harald Welte6fff3642017-07-22 21:36:13 +0200181
Harald Welte6e594f22017-07-23 16:19:35 +0200182 /* Stop t_alive when receiving ALIVE-ACK */
183 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE_ACK)) {
184 log("NS-ALIVE-ACK received: stopping Tns-alive; starting Tns-test");
185 Tns_alive.stop;
186 Tns_test.start;
187 }
Harald Welte6fff3642017-07-22 21:36:13 +0200188
Harald Welte6e594f22017-07-23 16:19:35 +0200189 /* respond to NS-ALIVE with NS-ALIVE-ACK */
190 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE)) {
191 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE_ACK));
192 }
193
194 /* Respond to BLOCK for wrong NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200195 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, ?))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200196 log("Rx NS-BLOCK for unknown NSVCI");
197 /* FIXME */
198 }
199
200 /* Respond to RESET with correct NSEI/NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200201 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, config.nsvci, config.nsei))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200202 f_change_state(NSE_S_ALIVE_BLOCKED);
Harald Welte387ab372018-06-30 10:27:06 +0200203 NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET_ACK(config.nsvci, config.nsei)));
Harald Welte6e594f22017-07-23 16:19:35 +0200204 }
205
206 /* Respond to RESET with wrong NSEI/NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200207 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, ?, ?))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200208 log("Rx NS-RESET for unknown NSEI/NSVCI");
209 /* FIXME */
210 }
211
Harald Welte5e514fa2018-07-05 00:01:45 +0200212 [config.role_sgsn and config.handle_sns] as_sns_sgsn();
213
Harald Welte6e594f22017-07-23 16:19:35 +0200214 /* default case of handling unknown PDUs */
215 [] NSCP.receive(t_NS_RecvFrom(?)) -> value rf {
216 log("Rx Unexpected NS PDU ", rf.msg," in state ", g_state);
Harald Weltee0abc472018-02-05 09:13:31 +0100217 NSCP.send(t_NS_Send(g_conn_id, ts_NS_STATUS(NS_CAUSE_PDU_NOT_COMPATIBLE_WITH_PROTOCOL_STATE, rf.msg)));
Harald Welte6e594f22017-07-23 16:19:35 +0200218 }
219 /* Forwarding of ASP_Evet to user */
220 [] NSCP.receive(ASP_Event:?) -> value evt { NS_SP.send(evt); }
Harald Welte6fff3642017-07-22 21:36:13 +0200221 }
222
Harald Welte5e514fa2018-07-05 00:01:45 +0200223 /* simple IP Sub-Network Service responder for the SGSN side. This is not a full implementation
224 * of the protocol, merely sufficient to make the PCU/BSS side happy to proceed */
225 altstep as_sns_sgsn() runs on NS_CT {
226 var NS_RecvFrom rf;
227 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(config.nsei))) -> value rf {
228 /* blindly acknowledge whatever the PCU sends */
229 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_SIZE_ACK(config.nsei, omit)));
230 }
231 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(?))) {
232 setverdict(fail, "SNS-SIZE from unexpected NSEI");
233 self.stop;
234 }
235 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true,
236 {tr_SNS_IPv4(config.remote_ip, config.remote_udp_port)}))) -> value rf {
237 /* blindly acknowledge whatever the PCU sends */
238 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG_ACK(config.nsei, omit)));
239 /* send a SNS-CONFIG in response and expect a SNS-CONFIG-ACK */
240 var IP4_Elements v4 := { valueof(ts_SNS_IPv4(config.local_ip, config.local_udp_port)) };
241 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG(config.nsei, true, v4)));
242 alt {
243 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, omit))) {
244 /* success */
245 }
246 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, ?))) {
247 setverdict(fail, "Unexpected SNS-CONFIG-NACK");
248 self.stop;
249 }
250 }
251 }
252 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, false, ?))) { /* ignore */}
253 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true, ?))) {
254 setverdict(fail, "Unexpected SNS-CONFIG content");
255 self.stop;
256 }
257 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(?, ?, ?))) {
258 setverdict(fail, "SNS-CONFIG from unexpected NSEI");
259 self.stop;
260 }
261 }
262
Harald Welte6fff3642017-07-22 21:36:13 +0200263 private function f_ScanEvents() runs on NS_CT {
264 var NsUnitdataRequest ud_req;
265 var NS_RecvFrom rf;
Harald Welte6e594f22017-07-23 16:19:35 +0200266 var default d;
267
268 d := activate(as_allstate());
Harald Welte6fff3642017-07-22 21:36:13 +0200269
270 while (true) {
Harald Welte6e594f22017-07-23 16:19:35 +0200271 if (g_state == NSE_S_DEAD_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200272 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200273 [false] any timer.timeout {}
Harald Welte6fff3642017-07-22 21:36:13 +0200274 }
Harald Welte6e594f22017-07-23 16:19:35 +0200275 } else if (g_state == NSE_S_WAIT_RESET) {
Harald Welte6fff3642017-07-22 21:36:13 +0200276 alt {
Harald Welte387ab372018-06-30 10:27:06 +0200277 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET_ACK(config.nsvci, config.nsei))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200278 f_change_state(NSE_S_ALIVE_BLOCKED);
279 f_sendAlive();
280 f_sendUnblock();
Harald Welte6fff3642017-07-22 21:36:13 +0200281 }
Harald Welte6fff3642017-07-22 21:36:13 +0200282 }
Harald Welte6e594f22017-07-23 16:19:35 +0200283 } else if (g_state == NSE_S_ALIVE_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200284 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200285 /* bogus block, just respond with ACK */
Harald Welte387ab372018-06-30 10:27:06 +0200286 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
287 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200288 }
289 /* Respond to UNBLOCK with UNBLOCK-ACK + change state */
290 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
291 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
292 Tns_block.stop;
293 f_change_state(NSE_S_ALIVE_UNBLOCKED);
294 }
295 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK_ACK)) -> value rf {
296 Tns_block.stop;
297 f_change_state(NSE_S_ALIVE_UNBLOCKED);
298 }
299 [] Tns_block.timeout {
300 /* repeat unblock transmission */
301 f_sendUnblock();
302 }
303 }
304 } else if (g_state == NSE_S_ALIVE_UNBLOCKED) {
305 alt {
306 /* bogus unblock, just respond with ACK */
307 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
308 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
309 }
310 /* Respond to BLOCK with BLOCK-ACK + change state */
Harald Welte387ab372018-06-30 10:27:06 +0200311 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
312 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200313 Tns_block.stop;
314 f_change_state(NSE_S_ALIVE_BLOCKED);
315 }
Harald Welte387ab372018-06-30 10:27:06 +0200316 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK_ACK(config.nsvci))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200317 Tns_block.stop;
318 }
319 /* NS-UNITDATA PDU from network to NS-UNITDATA.ind to user */
Harald Welte387ab372018-06-30 10:27:06 +0200320 [] NSCP.receive(t_NS_RecvFrom(tr_NS_UNITDATA(?, ?, ?))) -> value rf {
Alexander Couzens2c12b242018-07-31 00:30:11 +0200321 NS_SP.send(t_NsUdInd(config.nsei,
Harald Weltee0abc472018-02-05 09:13:31 +0100322 oct2int(rf.msg.pDU_NS_Unitdata.bVCI),
323 rf.msg.pDU_NS_Unitdata.nS_SDU));
Harald Welte6e594f22017-07-23 16:19:35 +0200324 }
325 /* NS-UNITDATA.req from user to NS-UNITDATA PDU on network */
Alexander Couzens2c12b242018-07-31 00:30:11 +0200326 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, ?, omit)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200327 /* using raw octetstring PDU */
Harald Welte387ab372018-06-30 10:27:06 +0200328 NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, ud_req.sdu)));
Harald Welte6e594f22017-07-23 16:19:35 +0200329 }
Alexander Couzens2c12b242018-07-31 00:30:11 +0200330 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, omit, ?)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200331 /* using decoded BSSGP PDU that we need to encode first */
Harald Weltee0abc472018-02-05 09:13:31 +0100332 var octetstring enc := enc_PDU_BSSGP(ud_req.bssgp);
Harald Welte387ab372018-06-30 10:27:06 +0200333 NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, enc)));
Harald Welte6e594f22017-07-23 16:19:35 +0200334 }
Harald Welte6fff3642017-07-22 21:36:13 +0200335 }
336 }
337
Harald Welte6e594f22017-07-23 16:19:35 +0200338 } /* while */
339 //deactivate(d);
Harald Welte6fff3642017-07-22 21:36:13 +0200340 }
341}