An error occurred fetching the project authors.
  1. 26 Mar, 2019 1 commit
  2. 09 Mar, 2019 1 commit
  3. 08 Mar, 2019 2 commits
  4. 05 Mar, 2019 1 commit
  5. 27 Feb, 2019 1 commit
    • Cedric Roux's avatar
      bugfix: fix PDCP sequence management (plus some cleanup) · e3782b5c
      Cedric Roux authored
      With the introduction of X2AP into develop, the UEs now have to regularly
      send measurement reports.
      
      In the logs of the eNB, we see:
      
      [OSA]   Mismatch found in integrity for algorithm 2,
              got e0.a0.c2.66, expecting a5.9c.cb.57
      [PDCP]   [OSA][RB 1] eNB failed to validate MAC-I of incoming PDU
      
      This is a bug in the PDCP layer that uses wrong parameters to compute the
      integrity.
      
      This commit fixes this bug.
      
      The function pdcp_is_rx_seq_number_valid was removed. Its processing
      has been directly integrated into the function pdcp_data_ind.
      
      The function pdcp_mark_current_pdu_as_received is not called anymore.
      Its processing was not used later on, so as of today, not calling it does
      not introduce any functional change.
      
      The function pdcp_validate_security takes now as parameters both
      SN and HFN. Same for the function pdcp_get_next_count_rx.
      
      Useless constants PDCP_SN_5BIT, PDCP_SN_7BIT and PDCP_SN_12BIT have been
      removed.
      
      The compilation option ENABLE_SECURITY has been removed. It's now always
      on. (This may impact some use cases.)
      
      The PDCP for DRB using RLC AM is not correct. It was not correct before
      this commit (apart from the integrity bug). We should deal with a list
      of PDUs and transmit packets to upper layers as detailed in the specs.
      Today we transmit the PDU as soon as we get it. We don't care about
      duplicates, in-order delivery, timeouts.
      
      Also, we don't deal with "PDCP re-establishment". Not sure how that impacts
      the software.
      
      And, last but not least, there is still no ROHC.
      e3782b5c
  6. 26 Feb, 2019 1 commit
  7. 25 Feb, 2019 2 commits
  8. 19 Feb, 2019 1 commit
  9. 17 Feb, 2019 1 commit
  10. 12 Feb, 2019 1 commit
  11. 22 Jan, 2019 2 commits
  12. 19 Jan, 2019 2 commits
  13. 10 Jan, 2019 1 commit
  14. 09 Jan, 2019 1 commit
  15. 07 Jan, 2019 1 commit
    • Cedric Roux's avatar
      fix a lot of file mode · aea6b4b5
      Cedric Roux authored
      For whatever reason most of the files had their permission
      changed from 644 to 755, which is not wanted.
      aea6b4b5
  16. 07 Nov, 2018 1 commit
  17. 02 Nov, 2018 2 commits
  18. 23 Oct, 2018 1 commit
  19. 22 Oct, 2018 1 commit
  20. 18 Oct, 2018 1 commit
  21. 17 Oct, 2018 2 commits
  22. 25 Sep, 2018 1 commit
  23. 24 Sep, 2018 2 commits
  24. 20 Sep, 2018 3 commits
  25. 19 Sep, 2018 3 commits
  26. 12 Sep, 2018 1 commit
  27. 10 Sep, 2018 1 commit
  28. 03 Sep, 2018 2 commits
    • Robert Schmidt's avatar
      Return immediately from pdcp_data_req · 3278aa49
      Robert Schmidt authored
      When the RLC layer returns error codes (like dropped packets), this is still
      counted as PDCP layer traffic. In order to reflect dropped packets or
      malfunctioning, this patch makes that upon an RLC error code, the function is
      exited immediately. In this case, it is not counted as additional PDCP traffic.
      
      An example is too much UDP traffic. If the RLC buffer is saturated and the
      packet therefore refused, incoming traffic won't be counted anymore. With this
      patch, the PDCP layer statistics won't count such traffic anymore.
      3278aa49
    • Robert Schmidt's avatar
      Drop traffic in PDCP if RLC buffer is full · 97c69dc4
      Robert Schmidt authored
      If the buffer in the RLC is full, testing the buffer state over and over again
      slows the DL traffic down. In order to circumvent this, the PDCP will drop any
      data during a configurable time (compile-time) before it delivers data to RLC
      again.
      
      To change this, see the constant TM_SKIP_FULL_BUF_MS in pdcp.h.
      97c69dc4