- 06 Jun, 2020 1 commit
-
-
Andrew Burger authored
Going wild..
-
- 04 Jun, 2020 1 commit
-
-
Andrew Burger authored
-
- 03 Jun, 2020 1 commit
-
-
Andrew Burger authored
-
- 01 Jun, 2020 1 commit
-
-
Andrew Burger authored
-
- 30 May, 2020 2 commits
-
-
Andrew Burger authored
-
Michael Cook authored
-
- 29 May, 2020 5 commits
-
-
Andrew Burger authored
-
Andrew Burger authored
-
Raphael Defosseux authored
Develop Integration Branch : 2020 week 22 The following Merge Requests are been included: * MR 796 : Nr rrc configuration trx thread * MR 807 : Use SCF FAPI for DMRS and PTRS also on UE side * MR 817 : Fixing errored/missing circular dependency protection * MR 819 : cleanup branch and initial ninja build support * MR 820 : CI: Add OAI-CN-In-Docker support
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
- 28 May, 2020 9 commits
-
-
Raphael Defosseux authored
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
laurent authored
-
Raphael Defosseux authored
Merge remote-tracking branch 'origin/add_oai_cn_docker_support_to_ci' into develop_integration_2020_w22
-
Raphael Defosseux authored
-
Raphael Defosseux authored
Merge remote-tracking branch 'origin/fix-circular-dependency-protection' into develop_integration_2020_w22
-
Raphael Defosseux authored
-
- 27 May, 2020 3 commits
-
-
laurent authored
-
laurent authored
-
WANG Tsu-Han authored
-
- 26 May, 2020 3 commits
-
-
WANG Tsu-Han authored
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr> Conflicts: ci-scripts/epc.py
-
- 25 May, 2020 1 commit
-
-
Raymond Knopp authored
-
- 20 May, 2020 2 commits
-
-
laurent authored
-
WANG Tsu-Han authored
-
- 15 May, 2020 1 commit
-
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
- 14 May, 2020 3 commits
-
-
Thomas Schlichter authored
-
Thomas Schlichter authored
-
Ahmed Hussein authored
-
- 11 May, 2020 3 commits
-
-
Raphael Defosseux authored
Develop Integration Branch -- 2020 week 19 The following Merge Requests were included: * MR [810] : NR PUCCH * MR [812] : fix 20 compilation warnings * MR [815] : rlc v2 -- coverity scan fixes * MR [816] : hotfix: fix compilation of UE with --musim Also add fixes for CI
-
Raphael Defosseux authored
-
Raphael Defosseux authored
-
- 09 May, 2020 1 commit
-
-
Cedric Roux authored
The following was failing: ./build_oai --UE --musim Not sure this fix is correct, but it seems consistent with the rest of platform_constants.h.
-
- 07 May, 2020 3 commits
-
-
Cedric Roux authored
Minor fixes, doesn't change anything. Not sure these are 'bugs' either, but let's be polite with coverity scan... One thing was not changed. Coverity scan says: *** CID 357991: Memory - illegal accesses (USE_AFTER_FREE) /home/carabe/raphael/openairinterface5g/openair2/LAYER2/rlc_v2/rlc_entity_am.c: 507 in tx_list_remove_sn() 501 } else { 502 prev = cur; 503 cur = cur->next; 504 } 505 } 506 >>> CID 357991: Memory - illegal accesses (USE_AFTER_FREE) >>> Using freed pointer "head.next". 507 return head.next; 508 } 509 510 void cleanup_sdu_list(rlc_entity_am_t *entity) 511 { 512 rlc_sdu_t head; But as far as I understand, there is no problem. We don't access head.next at all if it has been freed. Or is there some aliasing going on there (pointer aliasing)? I doubt it. False positive?
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
Raphael Defosseux authored
-- check if C file has a GNU GPL license -- check if C file has s suspect license -- check if C header is having correct circular dependency protection (with Laurent Thomas's help) Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-