1. 23 Feb, 2021 4 commits
  2. 21 Feb, 2021 1 commit
  3. 19 Feb, 2021 1 commit
  4. 18 Feb, 2021 3 commits
  5. 15 Feb, 2021 7 commits
    • Cedric Roux's avatar
      21ff70e8
    • Cedric Roux's avatar
      hack: fix NR prachsim compilation · 3cfa2c26
      Cedric Roux authored
      Dirty!
      3cfa2c26
    • Cedric Roux's avatar
      hack: fix NR ulsim compilation · 778e4873
      Cedric Roux authored
      Dirty.
      778e4873
    • Cedric Roux's avatar
      hack: fix NR dlsim compilation · 67b9cd18
      Cedric Roux authored
      Dirty...
      67b9cd18
    • Cedric Roux's avatar
      NSA: finalize nea2 security for gNB · 73f3a458
      Cedric Roux authored
      - a new section in the configuration file to select security algorithms,
        with new code to deal with it
      - cleanup CG-ConfigInfo: specs seem to indicate that we must not
        add mcg_RB_Config; the gNB has to deal with that
      - as a consequence, modify fill_default_rbconfig() that is called in
        every cases and needs security and bearer parameters
      
      The new section in the configuration file looks like:
      
          security = {
            # preferred ciphering algorithms
            # the first one of the list that an UE supports in chosen
            # valid values: nea0, nea1, nea2, nea3
            ciphering_algorithms = ( "nea0", "nea2" );
      
            # preferred integrity algorithms
            # the first one of the list that an UE supports in chosen
            # valid values: nia0, nia1, nia2, nia3
            integrity_algorithms = ( "nia0" );
          };
      73f3a458
    • Cedric Roux's avatar
      minor trivial bugfix · cb589c21
      Cedric Roux authored
      cb589c21
    • Cedric Roux's avatar
      NSA: first draft of nea2 security for gNB · 10e021e9
      Cedric Roux authored
      The code is forced to use nea2, no matter what the UE supports.
      
      After 2^18 PDCP packets, it will fail to work (we don't use HFN yet).
      
      These limitations will be fixed in later commits.
      
      The existing security function was not reused, because it does too
      much memory allocation and initializes the security context at each
      ciphering. So here comes nr_pdcp_security_nea2_cipher(). And also
      the ciphering is done inplace. To be changed if necessary.
      10e021e9
  6. 12 Feb, 2021 3 commits
  7. 11 Feb, 2021 4 commits
    • Mahesh's avatar
      Fix whitespaces · 7f4ffe29
      Mahesh authored
      7f4ffe29
    • Mahesh's avatar
      Merging MR978 with develop · eb19e02c
      Mahesh authored
      eb19e02c
    • Laurent Thomas's avatar
      trivial merge with develop" · c93482c4
      Laurent Thomas authored
      c93482c4
    • Raphael Defosseux's avatar
      * MR 1015: Multi-UE + more slots · 39ab3c1e
      Raphael Defosseux authored
      This MR adds a multi-UE scheduler (proportional fair) for multiple UEs. Tested for two UEs, but should work for more. Additionally, it enables 12 DL slots and 2 UL slots (still fixed, will be read from the configuration file in a clean-up/follow-up MR).
      
      * MR 1019: NASMESH: support for kernel version >= 5.6.0
      he syntax for ndo_tx_timeout in Linux Kernel has changed since 5.6.0 i.e it has changed
      
      * MR 1033: ue fixes
      1. Write tx data to radio unit only on tx slots.
      2. Fixed a bug in DL HARQ.
      3. Disabled UE and some gNB side logs which were enabled (maybe by mistake) in previous MRs.
      4. In UE, check if NDI toggled before reading SDU for PUSCH.
      39ab3c1e
  8. 10 Feb, 2021 3 commits
  9. 09 Feb, 2021 7 commits
  10. 08 Feb, 2021 5 commits
  11. 07 Feb, 2021 2 commits
    • Robert Schmidt's avatar
      Use the MAX_BWP_SIZE macro everywhere · 9b77575a
      Robert Schmidt authored
      9b77575a
    • Robert Schmidt's avatar
      Skip DL HARQ feedbacks if the timing does not match · 318c4e0f
      Robert Schmidt authored
      As the precedent commit, this commit deals with the realtime problems
      that we currently have on the CI bench.
      
      For DL HARQ feedback, nFAPI does not give us the HARQ process ID.
      Instead, we have to figure this out "from timing", i.e., if we trigger
      PUCCH reception, we will get a message with HARQ if we instructed the
      PHY to do so. If we have real-time problems, it seems (I cannot verify:
      don't have real time problems) that we do not get the nFAPI message with
      HARQ feedback. Thus, we need to skip the HARQ processes that should have
      been processed in the past, which happens in this commit.
      318c4e0f