- 30 Jul, 2024 1 commit
-
-
Jaroslava Fiedlerova authored
-
- 29 Jul, 2024 4 commits
-
-
Robert Schmidt authored
-
Xin Zhe Khooi authored
-
Robert Schmidt authored
-
Xin Zhe Khooi authored
38.473 requires to reset UE-related contexts in F1 Setup Request, so do it. However, avoid resetting UE states in phy_test: it has preconfigured UE which we should not reset. Note that if NSA/phy-test used F1, we could likely reset the UE state here, as the F1 UE context setup would come afterwards.
-
- 26 Jul, 2024 13 commits
-
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Cedric Roux authored
-
Bartosz Podrygajlo authored
Fix a bug where if BWP size is not exactly maximum BWP size for a bandwidth power control code asserts. This assert and assumption is incorrect, according to 38.101-1 UE channel is defined only by the BWP size and BWP size can be any value supported by the RRC parameters defining the BWP. To determine the UE channel the smallest bandwidth supporting the BWP is selected. This is an assumption based on references in the same document to UE channel bandwidth being equal to one of the values in set {5, 10, 15, 20, 25, 30, 35, 40, 50, 60, 70, 80, 90, 100}. Also: - calculated P_CMIN during BWP setup since the parameter doesn't depend on DCI. - initiialize uniqCfg structure in test_nr_ue_power_procedures main function which enables LOG prints during tests
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Xin Zhe Khooi authored
-
Xin Zhe Khooi authored
The next commit implements the release of all UEs following the F1 Reset message. It uses nr_mac_release_ue(), which as of now, triggered a release complete message automatically, which we don't want in the case of F1 Reset. This commit refactors the code to split UE release at MAC/RLC and release complete message sending to allow to release UEs without sending the complete. Corresponding users are updated.
-
Xin Zhe Khooi authored
-
Xin Zhe Khooi authored
-
- 25 Jul, 2024 9 commits
-
-
Guido Casati authored
* aper_decode allocates memory for for local pointer `pdusessionTransfer`, in `decodePDUSessionResourceSetup` * this memory seems not to be freed but its members are by: `ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_NGAP_PDUSessionResourceSetupRequestTransfer,pdusessionTransfer);` which btw in its header says: "AVOID using it in the application code; Use a safer ASN_STRUCT_RESET() instead" * the following mem leak was detected by ASAN: ``` Direct leak of 72 byte(s) in 1 object(s) allocated from: *0 0x7ffff74b4a57 in __interceptor_calloc /src/libsanitizer/asan/asan_malloc_linux.cpp:154 *1 0x55555cb306df in SEQUENCE_decode_aper /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/constr_SEQUENCE_aper.c:36 *2 0x55555ca9fa28 in aper_decode /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/aper_decoder.c:78 *3 0x55555b99bae6 in decodePDUSessionResourceSetup /openair2/RRC/NR/rrc_gNB_NGAP.c:273 *4 0x55555b99fec2 in trigger_bearer_setup /openair2/RRC/NR/rrc_gNB_NGAP.c:357 *5 0x55555b9b54bf in rrc_gNB_process_NGAP_PDUSESSION_SETUP_REQ /openair2/RRC/NR/rrc_gNB_NGAP.c:830 *6 0x55555b936871 in rrc_gnb_task /openair2/RRC/NR/rrc_gNB.c:2428 *7 0x7ffff5e94ac2 in start_thread nptl/pthread_create.c:442 ``` * This commit replaces ASN_STRUCT_FREE_CONTENTS_ONLY with ASN_STRUCT_FREE, which will free the memory allocated for the entire struct and its members
-
Guido Casati authored
* fill_DRB_configList_e1 is filling `DRB_configList->list` then passing to PDCP * the contents of the struct are allocated but seem not to be freed * the following mem leak was detected by ASAN ``` Direct leak of 32 byte(s) in 1 object(s) allocated from: *0 0x7ffff74b4c38 in __interceptor_realloc /src/libsanitizer/asan/asan_malloc_linux.cpp:164 *1 0x55555caa6a3e in asn_set_add /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/asn_SET_OF.c:27 *2 0x55555c8b8bb6 in fill_DRB_configList_e1 /openair2/LAYER2/nr_pdcp/cucp_cuup_handler.c:42 *3 0x55555c8be6eb in e1_bearer_context_setup /openair2/LAYER2/nr_pdcp/cucp_cuup_handler.c:189 *4 0x55555d329668 in cucp_cuup_bearer_context_setup_direct /openair2/RRC/NR/cucp_cuup_direct.c:31 *5 0x55555b9a2c37 in trigger_bearer_setup /openair2/RRC/NR/rrc_gNB_NGAP.c:437 *6 0x55555b9b54bf in rrc_gNB_process_NGAP_PDUSESSION_SETUP_REQ /openair2/RRC/NR/rrc_gNB_NGAP.c:830 *7 0x55555b936871 in rrc_gnb_task /openair2/RRC/NR/rrc_gNB.c:2428 *8 0x7ffff5e94ac2 in start_thread nptl/pthread_create.c:442 ``` * using ASN_STRUCT_RESET to free the memory used by the members of the structure without freeing the structure pointer which is allocated on the stack
-
Raghavendra Dinavahi authored
- if search fails, keeps increasing the rx gain (set by --ue-rxgain) by 3 db until USRP max rx gain - if initial sync is success, sets the rxgain to the value of (TARGET_RX_POWER (50) - pbch digital power in dB/RE)
-
Raghavendra Dinavahi authored
-
Raghavendra Dinavahi authored
-
Guido Casati authored
-
Guido Casati authored
-
Raphael Defosseux authored
-
Reem Bahsoun authored
-
- 24 Jul, 2024 3 commits
-
-
Robert Schmidt authored
OAI 5GC seems to have a bug, and occasionally might send a PDU session setup request without having sent a UE context setup request, resulting in no security context activated for a UE. This lead to an assertion in rrc_gNB_process_e1_bearer_context_setup_resp(). To prevent the gNB from stopping, check if security is active before triggering PDU sessions. If not, the gNB will reject PDU sessions.
-
Reem Bahsoun authored
-
Reem Bahsoun authored
-
- 23 Jul, 2024 4 commits
-
-
Robert Schmidt authored
Integration: `2024.w29` See merge request oai/openairinterface5g!2867 * !2854 Fix NSA test * !2715 Aerial multi l2 * !2798 CI: Create Iperf2 unidirectional function * !2859 Switch to BWP where RA is configured when Msg3 contains MAC CE for C-RNTI * !2861 7.2 xran: notification generation code in ru_thread excluded from compilation * !2853 Cleanup executables focusing on NR UE * !2860 Fix segfault in SRS modulation when ue-nb-ant-tx (fp) does not match UE capabilities * !2863 Add configuration for CBRS RU * !2749 immediately reuse UL/DL HARQ ID and don't wait for feedback if disable_harq == 1
-
Jaroslava Fiedlerova authored
-
Thomas Schlichter authored
-
Jaroslava Fiedlerova authored
-
- 22 Jul, 2024 6 commits
-
-
francescomani authored
-
francescomani authored
-
Jaroslava Fiedlerova authored
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
Guido Casati authored
* number of configured SRS antenna ports M <= N (number of physical antenna ports)
-
Jaroslava Fiedlerova authored
-