- 08 Aug, 2024 1 commit
-
-
Guido Casati authored
* strdup() function is returning a malloced string which must be freed after use * replace the strdup with direct use of strings to avoid heap allocation > Direct leak of 23 byte(s) in 1 object(s) allocated from: > 0 0x7ffff745b9a7 in __interceptor_strdup ../../../../src/libsanitizer/asan/asan_interceptors.cpp:454 > 1 0x555559e36f87 in RCconfig_nr_parallel /openair2/GNB_APP/gnb_config.c:2054 > 2 0x555559e38ea3 in NRRCConfig /openair2/GNB_APP/gnb_config.c:2097 > 3 0x555559155542 in get_options /executables/nr-softmodem.c:423 > 4 0x555559155542 in main /executables/nr-softmodem.c:623 > 5 0x7ffff5e29d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 > Direct leak of 14 byte(s) in 1 object(s) allocated from: > 0 0x7ffff745b9a7 in __interceptor_strdup ../../../../src/libsanitizer/asan/asan_interceptors.cpp:454 > 1 0x555559e370c5 in RCconfig_nr_parallel /openair2/GNB_APP/gnb_config.c:2063 > 2 0x555559e38ea3 in NRRCConfig /openair2/GNB_APP/gnb_config.c:2097 > 3 0x555559155542 in get_options /executables/nr-softmodem.c:423 > 4 0x555559155542 in main /executables/nr-softmodem.c:623 > 5 0x7ffff5e29d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
-
- 30 Jul, 2024 15 commits
-
-
Robert Schmidt authored
Integration: `2024.w30` See merge request oai/openairinterface5g!2877 * !2830 NR feature set update * !2868 Fix support for USRP UHD Versions => 4.5.0.0 * !2870 fix(docker): base image for target oai-gnb-aw2s shall be jammy * !2874 Fix memory leaks in gNB PDU Session Setup Request processing * !2866 RRC: reject PDU sessions if security is not active * !2829 Automatic update of USRP RX gain during initial search using --agc option * !2878 USRP: add a T trace to record the TX IQ data on antenna 0 * !2633 Handle F1 Reset at DU, and ensure state re-init on F1Setup * !2864 Fix an assert in power control * !2754 Introduce gold sequence cache
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Laurent THOMAS authored
-
Laurent THOMAS authored
-
Laurent THOMAS authored
-
Laurent THOMAS authored
-
Laurent THOMAS authored
-
Robert Schmidt authored
-
Laurent THOMAS authored
Harmonize nr_gold_pusch() and nr_gold_pdsch(), as the gold sequence calculation for PUSCH and PDSCH is the same.
-
Laurent THOMAS authored
-
Laurent THOMAS authored
-
Laurent THOMAS authored
-
Robert Schmidt authored
-
Jaroslava Fiedlerova authored
-
- 29 Jul, 2024 4 commits
-
-
Robert Schmidt authored
-
Xin Zhe Khooi authored
-
Robert Schmidt authored
-
Xin Zhe Khooi authored
38.473 requires to reset UE-related contexts in F1 Setup Request, so do it. However, avoid resetting UE states in phy_test: it has preconfigured UE which we should not reset. Note that if NSA/phy-test used F1, we could likely reset the UE state here, as the F1 UE context setup would come afterwards.
-
- 26 Jul, 2024 18 commits
-
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Laurent THOMAS authored
Add gold sequence cache with dynamic size, private to each thread. It periodically reorders by call rate. To free the gold sequences after end of life time of a thread, use the pthread API.
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Cedric Roux authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Bartosz Podrygajlo authored
Fix a bug where if BWP size is not exactly maximum BWP size for a bandwidth power control code asserts. This assert and assumption is incorrect, according to 38.101-1 UE channel is defined only by the BWP size and BWP size can be any value supported by the RRC parameters defining the BWP. To determine the UE channel the smallest bandwidth supporting the BWP is selected. This is an assumption based on references in the same document to UE channel bandwidth being equal to one of the values in set {5, 10, 15, 20, 25, 30, 35, 40, 50, 60, 70, 80, 90, 100}. Also: - calculated P_CMIN during BWP setup since the parameter doesn't depend on DCI. - initiialize uniqCfg structure in test_nr_ue_power_procedures main function which enables LOG prints during tests
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Xin Zhe Khooi authored
-
Xin Zhe Khooi authored
The next commit implements the release of all UEs following the F1 Reset message. It uses nr_mac_release_ue(), which as of now, triggered a release complete message automatically, which we don't want in the case of F1 Reset. This commit refactors the code to split UE release at MAC/RLC and release complete message sending to allow to release UEs without sending the complete. Corresponding users are updated.
-
Xin Zhe Khooi authored
-
Xin Zhe Khooi authored
-
- 25 Jul, 2024 2 commits
-
-
Guido Casati authored
* aper_decode allocates memory for for local pointer `pdusessionTransfer`, in `decodePDUSessionResourceSetup` * this memory seems not to be freed but its members are by: `ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_NGAP_PDUSessionResourceSetupRequestTransfer,pdusessionTransfer);` which btw in its header says: "AVOID using it in the application code; Use a safer ASN_STRUCT_RESET() instead" * the following mem leak was detected by ASAN: ``` Direct leak of 72 byte(s) in 1 object(s) allocated from: *0 0x7ffff74b4a57 in __interceptor_calloc /src/libsanitizer/asan/asan_malloc_linux.cpp:154 *1 0x55555cb306df in SEQUENCE_decode_aper /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/constr_SEQUENCE_aper.c:36 *2 0x55555ca9fa28 in aper_decode /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/aper_decoder.c:78 *3 0x55555b99bae6 in decodePDUSessionResourceSetup /openair2/RRC/NR/rrc_gNB_NGAP.c:273 *4 0x55555b99fec2 in trigger_bearer_setup /openair2/RRC/NR/rrc_gNB_NGAP.c:357 *5 0x55555b9b54bf in rrc_gNB_process_NGAP_PDUSESSION_SETUP_REQ /openair2/RRC/NR/rrc_gNB_NGAP.c:830 *6 0x55555b936871 in rrc_gnb_task /openair2/RRC/NR/rrc_gNB.c:2428 *7 0x7ffff5e94ac2 in start_thread nptl/pthread_create.c:442 ``` * This commit replaces ASN_STRUCT_FREE_CONTENTS_ONLY with ASN_STRUCT_FREE, which will free the memory allocated for the entire struct and its members
-
Guido Casati authored
* fill_DRB_configList_e1 is filling `DRB_configList->list` then passing to PDCP * the contents of the struct are allocated but seem not to be freed * the following mem leak was detected by ASAN ``` Direct leak of 32 byte(s) in 1 object(s) allocated from: *0 0x7ffff74b4c38 in __interceptor_realloc /src/libsanitizer/asan/asan_malloc_linux.cpp:164 *1 0x55555caa6a3e in asn_set_add /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/asn_SET_OF.c:27 *2 0x55555c8b8bb6 in fill_DRB_configList_e1 /openair2/LAYER2/nr_pdcp/cucp_cuup_handler.c:42 *3 0x55555c8be6eb in e1_bearer_context_setup /openair2/LAYER2/nr_pdcp/cucp_cuup_handler.c:189 *4 0x55555d329668 in cucp_cuup_bearer_context_setup_direct /openair2/RRC/NR/cucp_cuup_direct.c:31 *5 0x55555b9a2c37 in trigger_bearer_setup /openair2/RRC/NR/rrc_gNB_NGAP.c:437 *6 0x55555b9b54bf in rrc_gNB_process_NGAP_PDUSESSION_SETUP_REQ /openair2/RRC/NR/rrc_gNB_NGAP.c:830 *7 0x55555b936871 in rrc_gnb_task /openair2/RRC/NR/rrc_gNB.c:2428 *8 0x7ffff5e94ac2 in start_thread nptl/pthread_create.c:442 ``` * using ASN_STRUCT_RESET to free the memory used by the members of the structure without freeing the structure pointer which is allocated on the stack
-