- 26 Jul, 2024 6 commits
-
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
- 25 Jul, 2024 9 commits
-
-
Guido Casati authored
* aper_decode allocates memory for for local pointer `pdusessionTransfer`, in `decodePDUSessionResourceSetup` * this memory seems not to be freed but its members are by: `ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_NGAP_PDUSessionResourceSetupRequestTransfer,pdusessionTransfer);` which btw in its header says: "AVOID using it in the application code; Use a safer ASN_STRUCT_RESET() instead" * the following mem leak was detected by ASAN: ``` Direct leak of 72 byte(s) in 1 object(s) allocated from: *0 0x7ffff74b4a57 in __interceptor_calloc /src/libsanitizer/asan/asan_malloc_linux.cpp:154 *1 0x55555cb306df in SEQUENCE_decode_aper /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/constr_SEQUENCE_aper.c:36 *2 0x55555ca9fa28 in aper_decode /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/aper_decoder.c:78 *3 0x55555b99bae6 in decodePDUSessionResourceSetup /openair2/RRC/NR/rrc_gNB_NGAP.c:273 *4 0x55555b99fec2 in trigger_bearer_setup /openair2/RRC/NR/rrc_gNB_NGAP.c:357 *5 0x55555b9b54bf in rrc_gNB_process_NGAP_PDUSESSION_SETUP_REQ /openair2/RRC/NR/rrc_gNB_NGAP.c:830 *6 0x55555b936871 in rrc_gnb_task /openair2/RRC/NR/rrc_gNB.c:2428 *7 0x7ffff5e94ac2 in start_thread nptl/pthread_create.c:442 ``` * This commit replaces ASN_STRUCT_FREE_CONTENTS_ONLY with ASN_STRUCT_FREE, which will free the memory allocated for the entire struct and its members
-
Guido Casati authored
* fill_DRB_configList_e1 is filling `DRB_configList->list` then passing to PDCP * the contents of the struct are allocated but seem not to be freed * the following mem leak was detected by ASAN ``` Direct leak of 32 byte(s) in 1 object(s) allocated from: *0 0x7ffff74b4c38 in __interceptor_realloc /src/libsanitizer/asan/asan_malloc_linux.cpp:164 *1 0x55555caa6a3e in asn_set_add /cmake_targets/ran_build/build/openair2/RRC/LTE/MESSAGES/asn_SET_OF.c:27 *2 0x55555c8b8bb6 in fill_DRB_configList_e1 /openair2/LAYER2/nr_pdcp/cucp_cuup_handler.c:42 *3 0x55555c8be6eb in e1_bearer_context_setup /openair2/LAYER2/nr_pdcp/cucp_cuup_handler.c:189 *4 0x55555d329668 in cucp_cuup_bearer_context_setup_direct /openair2/RRC/NR/cucp_cuup_direct.c:31 *5 0x55555b9a2c37 in trigger_bearer_setup /openair2/RRC/NR/rrc_gNB_NGAP.c:437 *6 0x55555b9b54bf in rrc_gNB_process_NGAP_PDUSESSION_SETUP_REQ /openair2/RRC/NR/rrc_gNB_NGAP.c:830 *7 0x55555b936871 in rrc_gnb_task /openair2/RRC/NR/rrc_gNB.c:2428 *8 0x7ffff5e94ac2 in start_thread nptl/pthread_create.c:442 ``` * using ASN_STRUCT_RESET to free the memory used by the members of the structure without freeing the structure pointer which is allocated on the stack
-
Raghavendra Dinavahi authored
- if search fails, keeps increasing the rx gain (set by --ue-rxgain) by 3 db until USRP max rx gain - if initial sync is success, sets the rxgain to the value of (TARGET_RX_POWER (50) - pbch digital power in dB/RE)
-
Raghavendra Dinavahi authored
-
Raghavendra Dinavahi authored
-
Guido Casati authored
-
Guido Casati authored
-
Raphael Defosseux authored
-
Reem Bahsoun authored
-
- 24 Jul, 2024 3 commits
-
-
Robert Schmidt authored
OAI 5GC seems to have a bug, and occasionally might send a PDU session setup request without having sent a UE context setup request, resulting in no security context activated for a UE. This lead to an assertion in rrc_gNB_process_e1_bearer_context_setup_resp(). To prevent the gNB from stopping, check if security is active before triggering PDU sessions. If not, the gNB will reject PDU sessions.
-
Reem Bahsoun authored
-
Reem Bahsoun authored
-
- 23 Jul, 2024 4 commits
-
-
Robert Schmidt authored
Integration: `2024.w29` See merge request oai/openairinterface5g!2867 * !2854 Fix NSA test * !2715 Aerial multi l2 * !2798 CI: Create Iperf2 unidirectional function * !2859 Switch to BWP where RA is configured when Msg3 contains MAC CE for C-RNTI * !2861 7.2 xran: notification generation code in ru_thread excluded from compilation * !2853 Cleanup executables focusing on NR UE * !2860 Fix segfault in SRS modulation when ue-nb-ant-tx (fp) does not match UE capabilities * !2863 Add configuration for CBRS RU * !2749 immediately reuse UL/DL HARQ ID and don't wait for feedback if disable_harq == 1
-
Jaroslava Fiedlerova authored
-
Thomas Schlichter authored
-
Jaroslava Fiedlerova authored
-
- 22 Jul, 2024 6 commits
-
-
francescomani authored
-
francescomani authored
-
Jaroslava Fiedlerova authored
-
Raphael Defosseux authored
Signed-off-by: Raphael Defosseux <raphael.defosseux@eurecom.fr>
-
Guido Casati authored
* number of configured SRS antenna ports M <= N (number of physical antenna ports)
-
Jaroslava Fiedlerova authored
-
- 20 Jul, 2024 2 commits
-
-
Patricio Latini authored
-
Nick Hedberg authored
-
- 19 Jul, 2024 10 commits
-
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Thomas Schlichter authored
gNB: refactor code to handle end of using a specific HARQ process - finish_nr_dl_harq() and finish_nr_ul_harq()
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
-
Guido Casati authored
* the mismatch between UE capabilities, passed to PHY by NFAPI PDU, and --ue-nb-ant-tx causes a segfault in SRS modulation * issue with indexing txdataF[p_index], which fails due to an out-of-bounds access since first dimension of txdataF is sized based on ue->frame_parms.nb_antennas_tx * N_ap used in SRS modulation is based on the number of antenna ports in the SRS configuration (srs_config_pdu->num_ant_ports)
-
Thomas Schlichter authored
-
Thomas Schlichter authored
-
Thomas Schlichter authored
-
Thomas Schlichter authored
sched_ul_bytes is reduced already in case the last HARQ round fails through handle_nr_ul_harq() -> abort_nr_ul_harq(). Therefore, the reduction in nr_rx_sdu() is wrong, and btw. it wrongly assumes the max. UL HARQ rounds to 4. So simply remove this peace of code in nr_rx_sdu().
-