pdcp.c 41.6 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
/*******************************************************************************

  Eurecom OpenAirInterface
  Copyright(c) 1999 - 2011 Eurecom

  This program is free software; you can redistribute it and/or modify it
  under the terms and conditions of the GNU General Public License,
  version 2, as published by the Free Software Foundation.

  This program is distributed in the hope it will be useful, but WITHOUT
  ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
  more details.

  You should have received a copy of the GNU General Public License along with
  this program; if not, write to the Free Software Foundation, Inc.,
  51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.

  The full GNU General Public License is included in this distribution in
  the file called "COPYING".

  Contact Information
  Openair Admin: openair_admin@eurecom.fr
  Openair Tech : openair_tech@eurecom.fr
  Forums       : http://forums.eurecom.fsr/openairinterface
  Address      : Eurecom, 2229, route des crêtes, 06560 Valbonne Sophia Antipolis, France

*******************************************************************************/

/*! \file pdcp.c
 * \brief pdcp interface with RLC
 * \author  Lionel GAUTHIER and Navid Nikaein
 * \date 2009-2012
 * \version 1.0
 */

#define PDCP_C
#ifndef USER_MODE
#include <rtai_fifos.h>
#endif
#include "pdcp.h"
#include "pdcp_util.h"
#include "pdcp_sequence_manager.h"
#include "LAYER2/RLC/rlc.h"
#include "LAYER2/MAC/extern.h"
#include "RRC/L2_INTERFACE/openair_rrc_L2_interface.h"
#include "pdcp_primitives.h"
#include "OCG.h"
#include "OCG_extern.h"
#include "UTIL/LOG/log.h"
#include <inttypes.h>
#include "platform_constants.h"
#include "UTIL/LOG/vcd_signal_dumper.h"

55
56
57
58
#if defined(ENABLE_SECURITY)
# include "UTIL/OSA/osa_defs.h"
#endif

59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
#define PDCP_DATA_REQ_DEBUG 0
#define PDCP_DATA_IND_DEBUG 0

#ifndef OAI_EMU
extern int otg_enabled;
#endif

extern rlc_op_status_t rlc_data_req(module_id_t, u32_t, u8_t, u8_t,rb_id_t, mui_t, confirm_t, sdu_size_t, mem_block_t*);
extern void rrc_lite_data_ind( u8 Mod_id, u32 frame, u8 eNB_flag, u32 Rb_id, u32 sdu_size,u8 *Buffer);
//Added MW - RRC L2 interface
extern void pdcp_rrc_data_ind( u8 Mod_id, u32 frame, u8 eNB_flag, unsigned int Srb_id, unsigned int Sdu_size,u8 *Buffer);
//extern char *packet_gen(int src, int dst, int ctime, int *pkt_size);
extern int otg_rx_pkt( int src, int dst, int ctime, char *buffer_tx, unsigned int size);

//-----------------------------------------------------------------------------
/*
 * If PDCP_UNIT_TEST is set here then data flow between PDCP and RLC is broken
 * and PDCP has no longer anything to do with RLC. In this case, after it's handed
 * an SDU it appends PDCP header and returns (by filling in incoming pointer parameters)
 * this mem_block_t to be dissected for testing purposes. For further details see test
 * code at targets/TEST/PDCP/test_pdcp.c:test_pdcp_data_req()
 */
#ifdef PDCP_UNIT_TEST
BOOL pdcp_data_req(module_id_t module_id, u32_t frame, u8_t eNB_flag, rb_id_t rb_id, sdu_size_t sdu_buffer_size, \
                   unsigned char* sdu_buffer, pdcp_t* test_pdcp_entity, list_t* test_list)
#else
    BOOL pdcp_data_req(module_id_t module_id, u32_t frame, u8_t eNB_flag, rb_id_t rb_id, u32 muiP, u32 confirmP, \
                       sdu_size_t sdu_buffer_size, unsigned char* sdu_buffer, u8 mode)
#endif
{
  //-----------------------------------------------------------------------------
#ifdef PDCP_UNIT_TEST
  pdcp_t* pdcp = test_pdcp_entity;
#else
93
  pdcp_t* pdcp = &pdcp_array[module_id][rb_id];
94
95
96
97
98
99
100
#endif
  u8 i;
  u8 pdcp_header_len=0, pdcp_tailer_len=0;
  u16 pdcp_pdu_size=0, current_sn;
  mem_block_t* pdcp_pdu = NULL;
  rlc_op_status_t rlc_status;

101
 if ((pdcp->instanciated_instance == 0) && (mode != PDCP_TM)) {
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
    LOG_W(PDCP, "Instance is not configured, Ignoring SDU...\n");
    return FALSE;
  }
  if (sdu_buffer_size == 0) {
    LOG_W(PDCP, "Handed SDU is of size 0! Ignoring...\n");
    return FALSE;
  }
  /*
   * XXX MAX_IP_PACKET_SIZE is 4096, shouldn't this be MAX SDU size, which is 8188 bytes?
   */

  if (sdu_buffer_size > MAX_IP_PACKET_SIZE) {
    LOG_E(PDCP, "Requested SDU size (%d) is bigger than that can be handled by PDCP (%u)!\n",
          sdu_buffer_size, MAX_IP_PACKET_SIZE);
    // XXX What does following call do?
    mac_xface->macphy_exit("");
  }

  // PDCP transparent mode for MBMS traffic 

  if (mode == PDCP_TM) { 
    LOG_D(PDCP, " [TM] Asking for a new mem_block of size %d\n",sdu_buffer_size);
    pdcp_pdu = get_free_mem_block(sdu_buffer_size);
    if (pdcp_pdu != NULL) {
126
      memcpy(&pdcp_pdu->data[0], sdu_buffer, sdu_buffer_size); 
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
      rlc_status = rlc_data_req(module_id, frame, eNB_flag, RLC_MBMS_YES, rb_id, muiP, confirmP, sdu_buffer_size, pdcp_pdu);
    } else
      rlc_status = RLC_OP_STATUS_OUT_OF_RESSOURCES;    
  } else {
    // calculate the pdcp header and trailer size
    if ((rb_id % NB_RB_MAX) < DTCH) {
      pdcp_header_len = PDCP_CONTROL_PLANE_DATA_PDU_SN_SIZE;
      pdcp_tailer_len = PDCP_CONTROL_PLANE_DATA_PDU_MAC_I_SIZE;
    } else {
      pdcp_header_len = PDCP_USER_PLANE_DATA_PDU_LONG_SN_HEADER_SIZE;
      pdcp_tailer_len = 0;
    }
    pdcp_pdu_size= sdu_buffer_size + pdcp_header_len + pdcp_tailer_len;
    
    LOG_I(PDCP, "Data request notification for PDCP entity with module ID %d and radio bearer ID %d pdu size %d (header%d, trailer%d)\n", module_id, rb_id,pdcp_pdu_size, pdcp_header_len,pdcp_tailer_len);
    
    /*
     * Allocate a new block for the new PDU (i.e. PDU header and SDU payload)
     */
    LOG_D(PDCP, "Asking for a new mem_block of size %d\n", pdcp_pdu_size);
    pdcp_pdu = get_free_mem_block(pdcp_pdu_size);
    
    if (pdcp_pdu != NULL) {
      /*
       * Create a Data PDU with header and append data
       *
       * Place User Plane PDCP Data PDU header first
       */
      
      if ((rb_id % NB_RB_MAX) < DTCH) { // this Control plane PDCP Data PDU
        pdcp_control_plane_data_pdu_header pdu_header;
        pdu_header.sn = pdcp_get_next_tx_seq_number(pdcp);
        current_sn = pdu_header.sn;
        memset(&pdu_header.mac_i[0],0,PDCP_CONTROL_PLANE_DATA_PDU_MAC_I_SIZE);
        if (pdcp_serialize_control_plane_data_pdu_with_SRB_sn_buffer((unsigned char*)pdcp_pdu->data, &pdu_header) == FALSE) {
          LOG_E(PDCP, "Cannot fill PDU buffer with relevant header fields!\n");
          return FALSE;
        }
      } else {
        pdcp_user_plane_data_pdu_header_with_long_sn pdu_header;
        pdu_header.dc = (mode == 1) ? PDCP_DATA_PDU :  PDCP_CONTROL_PDU;
        pdu_header.sn = pdcp_get_next_tx_seq_number(pdcp);
        current_sn = pdu_header.sn ;
        if (pdcp_serialize_user_plane_data_pdu_with_long_sn_buffer((unsigned char*)pdcp_pdu->data, &pdu_header) == FALSE) {
          LOG_E(PDCP, "Cannot fill PDU buffer with relevant header fields!\n");
          return FALSE;
        }
      }
      /*
       * Validate incoming sequence number, there might be a problem with PDCP initialization
       */
      if (current_sn > pdcp_calculate_max_seq_num_for_given_size(pdcp->seq_num_size)) {
        LOG_E(PDCP, "Generated sequence number (%lu) is greater than a sequence number could ever be!\n", current_sn);
        LOG_E(PDCP, "There must be a problem with PDCP initialization, ignoring this PDU...\n");

        free_mem_block(pdcp_pdu);
        return FALSE;
      }
185

186
      LOG_D(PDCP, "Sequence number %d is assigned to current PDU\n", current_sn);
187

188
189
      /* Then append data... */
      memcpy(&pdcp_pdu->data[pdcp_header_len], sdu_buffer, sdu_buffer_size);
190

191
192
      //For control plane data that are not integrity protected,
      // the MAC-I field is still present and should be padded with padding bits set to 0.
193
      // NOTE: user-plane data are never integrity protected
194
      for (i=0;i<pdcp_tailer_len;i++)
195
196
197
198
199
200
201
202
203
204
205
206
          pdcp_pdu->data[pdcp_header_len + sdu_buffer_size + i] = 0x00;// pdu_header.mac_i[i];

#if defined(ENABLE_SECURITY)
      if ((pdcp->security_activated != 0) &&
          ((pdcp->cipheringAlgorithm) != 0) &&
          ((pdcp->integrityProtAlgorithm) != 0)) {
        pdcp_apply_security(pdcp, rb_id % NB_RB_MAX,
                            pdcp_header_len, current_sn, pdcp_pdu->data,
                            sdu_buffer_size);
      }
#endif

207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
      /* Print octets of outgoing data in hexadecimal form */
      LOG_D(PDCP, "Following content with size %d will be sent over RLC (PDCP PDU header is the first two bytes)\n",
            pdcp_pdu_size);
      util_print_hex_octets(PDCP, (unsigned char*)pdcp_pdu->data, pdcp_pdu_size);
      //util_flush_hex_octets(PDCP, (unsigned char*)pdcp_pdu->data, pdcp_pdu_size);
    } else {
      LOG_E(PDCP, "Cannot create a mem_block for a PDU!\n");
      return FALSE;
    }      
#ifdef PDCP_UNIT_TEST
    /*
     * Here we add PDU to the list and return to test code without
     * handing it off to RLC
     */
    list_add_tail_eurecom(pdcp_pdu, test_list);
    return TRUE;
#else
    /*
     * Ask sublayer to transmit data and check return value
     * to see if RLC succeeded
     */
    rlc_status = rlc_data_req(module_id, frame, eNB_flag, 0, rb_id, muiP, confirmP, pdcp_pdu_size, pdcp_pdu);
  }
  switch (rlc_status) {
  case RLC_OP_STATUS_OK:
    LOG_D(PDCP, "Data sending request over RLC succeeded!\n");
    break;

  case RLC_OP_STATUS_BAD_PARAMETER:
    LOG_W(PDCP, "Data sending request over RLC failed with 'Bad Parameter' reason!\n");
    return FALSE;

  case RLC_OP_STATUS_INTERNAL_ERROR:
    LOG_W(PDCP, "Data sending request over RLC failed with 'Internal Error' reason!\n");
    return FALSE;

  case RLC_OP_STATUS_OUT_OF_RESSOURCES:
    LOG_W(PDCP, "Data sending request over RLC failed with 'Out of Resources' reason!\n");
    return FALSE;

  default:
    LOG_W(PDCP, "RLC returned an unknown status code after PDCP placed the order to send some data (Status Code:%d)\n", rlc_status);
    return FALSE;
  }

  /*
   * Control arrives here only if rlc_data_req() returns RLC_OP_STATUS_OK
   * so we return TRUE afterwards
   */
  /*  
   if (rb_id>=DTCH) {
    if (eNB_flag == 1) {
      Pdcp_stats_tx[module_id][(rb_id & RAB_OFFSET2 )>> RAB_SHIFT2][(rb_id & RAB_OFFSET)-DTCH]++;
      Pdcp_stats_tx_bytes[module_id][(rb_id & RAB_OFFSET2 )>> RAB_SHIFT2][(rb_id & RAB_OFFSET)-DTCH] += sdu_buffer_size;
    } else {
      Pdcp_stats_tx[module_id][(rb_id & RAB_OFFSET2 )>> RAB_SHIFT2][(rb_id & RAB_OFFSET)-DTCH]++;
      Pdcp_stats_tx_bytes[module_id][(rb_id & RAB_OFFSET2 )>> RAB_SHIFT2][(rb_id & RAB_OFFSET)-DTCH] += sdu_buffer_size;
    }
    }*/
  return TRUE;
#endif // PDCP_UNIT_TEST

}

//-----------------------------------------------------------------------------
#ifdef PDCP_UNIT_TEST
BOOL pdcp_data_ind(module_id_t module_id, u32_t frame, u8_t eNB_flag, rb_id_t rb_id, sdu_size_t sdu_buffer_size, \
                   mem_block_t* sdu_buffer, pdcp_t* pdcp_test_entity, list_t* test_list)
#else
    BOOL pdcp_data_ind(module_id_t module_id, u32_t frame, u8_t eNB_flag, u8_t MBMS_flagP, rb_id_t rb_id, sdu_size_t sdu_buffer_size, \
                       mem_block_t* sdu_buffer, u8 is_data_plane)
#endif
{
  //-----------------------------------------------------------------------------
#ifdef PDCP_UNIT_TEST
  pdcp_t* pdcp = pdcp_test_entity;
  list_t* sdu_list = test_list;
#else
285
  pdcp_t* pdcp = &pdcp_array[module_id][rb_id];
286
287
288
289
290
291
292
293
  list_t* sdu_list = &pdcp_sdu_list;
#endif
  mem_block_t *new_sdu = NULL;
  int src_id, dst_id,ctime; // otg param
  u8 pdcp_header_len=0, pdcp_tailer_len=0;
  u16 sequence_number;
  u8 payload_offset=0;

294
295
  LOG_I(PDCP,"Data indication notification for PDCP entity with module "
  "ID %d and radio bearer ID %d rlc sdu size %d eNB_flag %d\n", module_id, rb_id, sdu_buffer_size, eNB_flag);
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354

  if (sdu_buffer_size == 0) {
    LOG_W(PDCP, "SDU buffer size is zero! Ignoring this chunk!");
    return FALSE;
  }

  /*
     * Check if incoming SDU is long enough to carry a PDU header
     */
  if (MBMS_flagP == 0 ) {
    if ((rb_id % NB_RB_MAX) < DTCH) {
      pdcp_header_len = PDCP_CONTROL_PLANE_DATA_PDU_SN_SIZE;
      pdcp_tailer_len = PDCP_CONTROL_PLANE_DATA_PDU_MAC_I_SIZE;
    } else {
      pdcp_header_len = PDCP_USER_PLANE_DATA_PDU_LONG_SN_HEADER_SIZE;
      pdcp_tailer_len = 0;
    }

    if (sdu_buffer_size < pdcp_header_len + pdcp_tailer_len ) {
      LOG_W(PDCP, "Incoming (from RLC) SDU is short of size (size:%d)! Ignoring...\n", sdu_buffer_size);
#ifndef PDCP_UNIT_TEST
      free_mem_block(sdu_buffer);
#endif
      return FALSE;
    }

    /*
       * Parse the PDU placed at the beginning of SDU to check
       * if incoming SN is in line with RX window
       */

    if (pdcp_header_len == PDCP_USER_PLANE_DATA_PDU_LONG_SN_HEADER_SIZE) { // DRB
      sequence_number =     pdcp_get_sequence_number_of_pdu_with_long_sn((unsigned char*)sdu_buffer->data);
//       u8 dc = pdcp_get_dc_filed((unsigned char*)sdu_buffer->data);
    } else { //SRB1/2
      sequence_number =   pdcp_get_sequence_number_of_pdu_with_SRB_sn((unsigned char*)sdu_buffer->data);
    }
    if (pdcp_is_rx_seq_number_valid(sequence_number, pdcp) == TRUE) {
      LOG_D(PDCP, "Incoming PDU has a sequence number (%d) in accordance with RX window, yay!\n", sequence_number);
      /* if (dc == PDCP_DATA_PDU )
	   LOG_D(PDCP, "Passing piggybacked SDU to NAS driver...\n");
	   else
	   LOG_D(PDCP, "Passing piggybacked SDU to RRC ...\n");*/
    } else {
      LOG_W(PDCP, "Incoming PDU has an unexpected sequence number (%d), RX window snychronisation have probably been lost!\n", sequence_number);
      /*
	 * XXX Till we implement in-sequence delivery and duplicate discarding
	 * mechanism all out-of-order packets will be delivered to RRC/IP
	 */
#if 0
      LOG_D(PDCP, "Ignoring PDU...\n");
      free_mem_block(sdu_buffer);
      return FALSE;
#else
      LOG_W(PDCP, "Delivering out-of-order SDU to upper layer...\n");
#endif
    }
    // SRB1/2: control-plane data
    if ( (rb_id % NB_RB_MAX) <  DTCH ){
355
356
357
358
359
360
361
#if defined(ENABLE_SECURITY)
      if (pdcp->security_activated == 1) {
        pdcp_validate_security(pdcp, rb_id % NB_RB_MAX, pdcp_header_len,
                               sequence_number, sdu_buffer->data,
                               sdu_buffer_size - pdcp_tailer_len);
      }
#endif
362
363
364
365
366
367
368
369
370
371
372
373
      //rrc_lite_data_ind(module_id, //Modified MW - L2 Interface
      pdcp_rrc_data_ind(module_id,
                        frame,
                        eNB_flag,
                        rb_id,
                        sdu_buffer_size - pdcp_header_len - pdcp_tailer_len,
                        (u8*)&sdu_buffer->data[pdcp_header_len]);
      free_mem_block(sdu_buffer);
      // free_mem_block(new_sdu);
      return TRUE;
    }
    payload_offset=PDCP_USER_PLANE_DATA_PDU_LONG_SN_HEADER_SIZE;
374
375
376
377
378
379
380
#if defined(ENABLE_SECURITY)
    if (pdcp->security_activated == 1) {
        pdcp_validate_security(pdcp, rb_id % NB_RB_MAX, pdcp_header_len,
                               sequence_number, sdu_buffer->data,
                               sdu_buffer_size - pdcp_tailer_len);
    }
#endif
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
  } else {
    payload_offset=0;
  }
#if defined(USER_MODE) && defined(OAI_EMU)
  if (oai_emulation.info.otg_enabled ==1 ){
    src_id = 0;
    dst_id = (eNB_flag == 1) ? module_id : module_id /*-  NB_eNB_INST*/;
    ctime = oai_emulation.info.time_ms; // avg current simulation time in ms : we may get the exact time through OCG?
    LOG_D(OTG,"Check received buffer : enb_flag %d mod id %d, rab id %d (src %d, dst %d)\n", eNB_flag, module_id, rb_id, src_id, dst_id);

    if (MBMS_flagP == 0) {
      src_id = (eNB_flag == 1) ? (rb_id - DTCH) / NB_RB_MAX  /*- NB_eNB_INST */ + 1 :  ((rb_id - DTCH) / NB_RB_MAX);
    }else {
#ifdef Rel10
      src_id = (rb_id - MTCH  - 3 - maxDRB) / maxSessionPerPMCH  /*- NB_eNB_INST */ ;
      //dst_id is now = module_id (supoosed to be 1 for UE), take the same as module from rlc_data_ind
      // dst_id generated data from OTG is is 1 (session_id)
#endif
    }

    if (otg_rx_pkt(src_id, dst_id,ctime,&sdu_buffer->data[payload_offset],
                   sdu_buffer_size - payload_offset ) == 0 ) {
      free_mem_block(sdu_buffer);
      return TRUE;
    }
  }
#else
  if (otg_enabled==1) {
    LOG_D(OTG,"Discarding received packed\n");
    free_mem_block(sdu_buffer);
    return TRUE;
  }
#endif
  new_sdu = get_free_mem_block(sdu_buffer_size - payload_offset + sizeof (pdcp_data_ind_header_t));

  if (new_sdu) {
    /*
       * Prepend PDCP indication header which is going to be removed at pdcp_fifo_flush_sdus()
       */
    memset(new_sdu->data, 0, sizeof (pdcp_data_ind_header_t));
    ((pdcp_data_ind_header_t *) new_sdu->data)->rb_id     = rb_id;
    ((pdcp_data_ind_header_t *) new_sdu->data)->data_size = sdu_buffer_size - payload_offset;

    // Here there is no virtualization possible
#ifdef IDROMEL_NEMO
    if (eNB_flag == 0)
      ((pdcp_data_ind_header_t *) new_sdu->data)->inst = rb_id/8;
    else
      ((pdcp_data_ind_header_t *) new_sdu->data)->inst = 0;
#else
    ((pdcp_data_ind_header_t *) new_sdu->data)->inst = module_id;
#endif
    
    // XXX Decompression would be done at this point

    /*
       * After checking incoming sequence number PDCP header
       * has to be stripped off so here we copy SDU buffer starting
       * from its second byte (skipping 0th and 1st octets, i.e.
       * PDCP header)
       */
    memcpy(&new_sdu->data[sizeof (pdcp_data_ind_header_t)], \
           &sdu_buffer->data[payload_offset], \
           sdu_buffer_size - payload_offset);
    list_add_tail_eurecom (new_sdu, sdu_list);

    /* Print octets of incoming data in hexadecimal form */
    LOG_D(PDCP, "Following content has been received from RLC (%d,%d)(PDCP header has already been removed):\n", sdu_buffer_size  - payload_offset + sizeof(pdcp_data_ind_header_t),
          sdu_buffer_size  - payload_offset);
    //util_print_hex_octets(PDCP, (unsigned char*)new_sdu->data, sdu_buffer_size  - PDCP_USER_PLANE_DATA_PDU_LONG_SN_HEADER_SIZE + sizeof(pdcp_data_ind_header_t));
    util_flush_hex_octets(PDCP, (unsigned char*)new_sdu->data, sdu_buffer_size  - payload_offset  + sizeof(pdcp_data_ind_header_t));

    /*
       * Update PDCP statistics
       * XXX Following two actions are identical, is there a merge error?
       */
    if (eNB_flag == 1) {
      Pdcp_stats_rx[module_id][(rb_id & RAB_OFFSET2) >> RAB_SHIFT2][(rb_id & RAB_OFFSET) - DTCH]++;
      Pdcp_stats_rx_bytes[module_id][(rb_id & RAB_OFFSET2) >> RAB_SHIFT2][(rb_id & RAB_OFFSET) - DTCH] += sdu_buffer_size;
    } else {
      Pdcp_stats_rx[module_id][(rb_id & RAB_OFFSET2) >> RAB_SHIFT2][(rb_id & RAB_OFFSET) - DTCH]++;
      Pdcp_stats_rx_bytes[module_id][(rb_id & RAB_OFFSET2) >> RAB_SHIFT2][(rb_id & RAB_OFFSET) - DTCH] += sdu_buffer_size;
    }
  }

  free_mem_block(sdu_buffer);

  return TRUE;
}

//-----------------------------------------------------------------------------
void
    pdcp_run (u32_t frame, u8 eNB_flag, u8 UE_index, u8 eNB_index) {
  //-----------------------------------------------------------------------------

#ifndef NAS_NETLINK
#ifdef USER_MODE
#define PDCP_DUMMY_BUFFER_SIZE 38
    unsigned char pdcp_dummy_buffer[PDCP_DUMMY_BUFFER_SIZE];
#endif
#endif
//     unsigned int diff, i, k, j;
//     unsigned char *otg_pkt=NULL;
//     int src_id, module_id; // src for otg
//     int dst_id, rb_id; // dst for otg
//     int service_id, session_id;
//     int pkt_size=0;
//     unsigned int ctime=0;

    vcd_signal_dumper_dump_function_by_name(VCD_SIGNAL_DUMPER_FUNCTIONS_PDCP_RUN, VCD_FUNCTION_IN);

    /*
      if ((frame % 128) == 0) {
      for (i=0; i < NB_UE_INST; i++) {
      for (j=0; j < NB_CNX_CH; j++) {
      for (k=0; k < NB_RAB_MAX; k++) {
      diff = Pdcp_stats_tx_bytes[i][j][k];
      Pdcp_stats_tx_bytes[i][j][k] = 0;
      Pdcp_stats_tx_rate[i][j][k] = (diff*8) >> 7;

      diff = Pdcp_stats_rx_bytes[i][j][k];
      Pdcp_stats_rx_bytes[i][j][k] = 0;
      Pdcp_stats_rx_rate[i][j][k] = (diff*8) >> 7;
      }
      }
      }
      }
    */

  pdcp_fifo_read_input_sdus_from_otg(frame, eNB_flag, UE_index, eNB_index);

  // IP/NAS -> PDCP traffic : TX, read the pkt from the upper layer buffer
  pdcp_fifo_read_input_sdus(frame,eNB_flag);

  // PDCP -> NAS/IP traffic: RX
  pdcp_fifo_flush_sdus(frame,eNB_flag);

  vcd_signal_dumper_dump_function_by_name(VCD_SIGNAL_DUMPER_FUNCTIONS_PDCP_RUN, VCD_FUNCTION_OUT);
}

BOOL rrc_pdcp_config_asn1_req (module_id_t module_id, u32_t frame, u8_t eNB_flag, u32_t index,
                               SRB_ToAddModList_t* srb2add_list,
                               DRB_ToAddModList_t* drb2add_list,
524
525
526
527
528
                               DRB_ToReleaseList_t*  drb2release_list,
                               u8 security_mode,
                               u8 *kRRCenc,
                               u8 *kRRCint,
                               u8 *kUPenc
529
#ifdef Rel10
530
                              ,PMCH_InfoList_r9_t*  pmch_InfoList_r9
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
#endif
                               ){

  long int        rb_id        = 0;
  long int        lc_id        = 0;
  long int        srb_id        = 0;
  long int        mch_id         = 0;
  rlc_mode_t      rlc_type    = RLC_NONE;
  DRB_Identity_t  drb_id       = 0;
  DRB_Identity_t* pdrb_id      = NULL;
  u8              drb_sn       = 0;
  u8              srb_sn       = 5; // fixed sn for SRBs
  u8              drb_report   = 0;
  long int        cnt          = 0;
  u16 header_compression_profile = 0;
  u32 action                   = ACTION_ADD;
  SRB_ToAddMod_t* srb_toaddmod = NULL;
  DRB_ToAddMod_t* drb_toaddmod = NULL;

#ifdef Rel10
  int i,j;
  MBMS_SessionInfoList_r9_t *mbms_SessionInfoList_r9;
  MBMS_SessionInfo_r9_t     *MBMS_SessionInfo= NULL;
#endif

  LOG_D(PDCP, "[MOD_id %d]CONFIG REQ ASN1 for %s %d\n",module_id,
        (eNB_flag == 1)? "eNB": "UE", index);
  // srb2add_list does not define pdcp config, we use rlc info to setup the pdcp dcch0 and dcch1 channels

  if (srb2add_list != NULL) {
    for (cnt=0;cnt<srb2add_list->list.count;cnt++) {
      srb_id = srb2add_list->list.array[cnt]->srb_Identity;
563
      lc_id = srb_id; 
564
      rb_id = (index * NB_RB_MAX) + srb_id;
565
      if (pdcp_array[module_id][rb_id].instanciated_instance == module_id + 1)
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
        action = ACTION_MODIFY;
      else
        action = ACTION_ADD;
      srb_toaddmod = srb2add_list->list.array[cnt];
      rlc_type = RLC_MODE_AM;
      if (srb_toaddmod->rlc_Config) {
        switch (srb_toaddmod->rlc_Config->present) {
        case SRB_ToAddMod__rlc_Config_PR_NOTHING:
          break;
        case SRB_ToAddMod__rlc_Config_PR_explicitValue:
          switch (srb_toaddmod->rlc_Config->choice.explicitValue.present) {
          case RLC_Config_PR_NOTHING:
            break;
          default:
            pdcp_config_req_asn1 (module_id,
                                  frame,
                                  eNB_flag, // not really required
                                  index, // ue/enb index : used for log
                                  rlc_type,
                                  action,
                                  lc_id,
                                  mch_id,
                                  rb_id,
                                  srb_sn,
                                  0, // drb_report
                                  0, // header compression
592
593
594
595
                                  security_mode,
                                  kRRCenc,
                                  kRRCint,
                                  kUPenc);
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
            break;
          }
          break;
        case SRB_ToAddMod__rlc_Config_PR_defaultValue:
          // already the default values
          break;
        default:;
        }
      }
    }
  }
  // reset the action

  if (drb2add_list != NULL) {
    for (cnt=0;cnt<drb2add_list->list.count;cnt++) {

      drb_toaddmod = drb2add_list->list.array[cnt];

      drb_id = drb_toaddmod->drb_Identity;

      if (drb_toaddmod->logicalChannelIdentity != null) {
        lc_id = *drb_toaddmod->logicalChannelIdentity;
      } else {
        lc_id = -1;
      }
      rb_id =  (index * NB_RB_MAX) + lc_id;
622
      if (pdcp_array[module_id][rb_id].instanciated_instance == module_id + 1)
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
        action = ACTION_MODIFY;
      else
        action = ACTION_ADD;
      if (drb_toaddmod->pdcp_Config){
        if (drb_toaddmod->pdcp_Config->discardTimer) {
          // set the value of the timer
        }
        if (drb_toaddmod->pdcp_Config->rlc_AM) {
          drb_report = drb_toaddmod->pdcp_Config->rlc_AM->statusReportRequired;
          rlc_type =RLC_MODE_AM;
        }
        if (drb_toaddmod->pdcp_Config->rlc_UM){
          drb_sn = drb_toaddmod->pdcp_Config->rlc_UM->pdcp_SN_Size;
          rlc_type =RLC_MODE_UM;
        }
        switch (drb_toaddmod->pdcp_Config->headerCompression.present) {
        case PDCP_Config__headerCompression_PR_NOTHING:
        case PDCP_Config__headerCompression_PR_notUsed:
          header_compression_profile=0x0;
          break;
        case PDCP_Config__headerCompression_PR_rohc:
          // parse the struc and get the rohc profile
          if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0001)
            header_compression_profile=0x0001;
          else if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0002)
            header_compression_profile=0x0002;
          else if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0003)
            header_compression_profile=0x0003;
          else if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0004)
            header_compression_profile=0x0004;
          else if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0006)
            header_compression_profile=0x0006;
          else if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0101)
            header_compression_profile=0x0101;
          else if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0102)
            header_compression_profile=0x0102;
          else if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0103)
            header_compression_profile=0x0103;
          else if(drb_toaddmod->pdcp_Config->headerCompression.choice.rohc.profiles.profile0x0104)
            header_compression_profile=0x0104;
          else {
            header_compression_profile=0x0;
            LOG_W(PDCP,"unknown header compresion profile\n");
          }
          // set the applicable profile
          break;
        default:
          LOG_W(PDCP,"[MOD_id %d][RB %d] unknown drb_toaddmod->PDCP_Config->headerCompression->present \n",module_id,drb_id);
        }
        pdcp_config_req_asn1 (module_id,
                              frame,
                              eNB_flag, // not really required
                              index,
                              rlc_type,
                              action,
                              lc_id,
                              mch_id,
                              rb_id,
                              drb_sn,
                              drb_report,
                              header_compression_profile,
684
685
686
687
                              security_mode,
                              kRRCenc,
                              kRRCint,
                              kUPenc);
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
      }
    }
  }

  if (drb2release_list != NULL) {
    for (cnt=0;cnt<drb2add_list->list.count;cnt++) {
      pdrb_id = drb2release_list->list.array[cnt];
      rb_id =  (index * NB_RB_MAX) + pdrb_id;
      action = ACTION_REMOVE;
      pdcp_config_req_asn1 (module_id,
                            frame,
                            eNB_flag, // not really required
                            index,
                            rlc_type,
                            action,
                            lc_id,
                            mch_id,
                            rb_id,
                            0,
                            0,
                            0,
709
710
711
712
                            security_mode,
                            kRRCenc,
                            kRRCint,
                            kUPenc);
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
    }
  }

#ifdef Rel10
  if (pmch_InfoList_r9 != NULL){
    for (i=0;i<pmch_InfoList_r9->list.count;i++){
      mbms_SessionInfoList_r9 = &(pmch_InfoList_r9->list.array[i]->mbms_SessionInfoList_r9);
      for (j=0;j<mbms_SessionInfoList_r9->list.count;j++) {
        MBMS_SessionInfo = mbms_SessionInfoList_r9->list.array[j];
        //lc_id = MBMS_SessionInfo->logicalChannelIdentity_r9; // lcid
        lc_id = MBMS_SessionInfo->sessionId_r9->buf[0];
        mch_id = MBMS_SessionInfo->tmgi_r9.serviceId_r9.buf[2]; //serviceId is 3-octet string
        // can set the mch_id = i
        if (eNB_flag)
          rb_id =  (mch_id * maxSessionPerPMCH ) + lc_id ;
        else
          rb_id =  (mch_id * maxSessionPerPMCH ) + lc_id + (maxDRB + 3);
        if (pdcp_mbms_array[module_id][rb_id].instanciated_instance == module_id + 1)
          action = ACTION_MBMS_MODIFY;
        else
          action = ACTION_MBMS_ADD;

        rlc_type = RLC_MODE_UM;
        pdcp_config_req_asn1 (module_id,
                              frame,
                              eNB_flag, // not really required
                              index,
                              rlc_type,
                              action,
                              lc_id,
                              mch_id,
                              rb_id,
                              0, // set to deafult
                              0,
                              0,
748
749
750
751
                              security_mode,
                              kRRCenc,
                              kRRCint,
                              kUPenc);
752
753
754
755
756
757
758
759
760
761
762
763
      }
    }
  }
#endif

  return 1;

}

BOOL pdcp_config_req_asn1 (module_id_t module_id, u32 frame, u8_t eNB_flag, u16 index,
                           rlc_mode_t rlc_mode, u32  action, u16 lc_id,u16 mch_id, rb_id_t rb_id,
                           u8 rb_sn, u8 rb_report, u16 header_compression_profile,
764
765
766
767
                           u8 security_mode,
                           u8 *kRRCenc,
                           u8 *kRRCint,
                           u8 *kUPenc){
768
769
  switch (action) {
  case ACTION_ADD:
770
771
772
773
774
    pdcp_array[module_id][rb_id].instanciated_instance = module_id + 1;
    pdcp_array[module_id][rb_id].is_ue = (eNB_flag == 0) ? 1 : 0;
    pdcp_array[module_id][rb_id].lcid = lc_id;
    pdcp_array[module_id][rb_id].header_compression_profile=header_compression_profile;
    pdcp_array[module_id][rb_id].status_report = rb_report;
775
    if (rb_sn == PDCP_Config__rlc_UM__pdcp_SN_Size_len7bits)
776
      pdcp_array[module_id][rb_id].seq_num_size = 7;
777
    else if (rb_sn == PDCP_Config__rlc_UM__pdcp_SN_Size_len12bits)
778
      pdcp_array[module_id][rb_id].seq_num_size=12;
779
    else
780
      pdcp_array[module_id][rb_id].seq_num_size=5;
781

782
783
784
785
786
787
788
    pdcp_array[module_id][rb_id].rlc_mode = rlc_mode;
    pdcp_array[module_id][rb_id].next_pdcp_tx_sn = 0;
    pdcp_array[module_id][rb_id].next_pdcp_rx_sn = 0;
    pdcp_array[module_id][rb_id].tx_hfn = 0;
    pdcp_array[module_id][rb_id].rx_hfn = 0;
    pdcp_array[module_id][rb_id].last_submitted_pdcp_rx_sn = 4095;
    pdcp_array[module_id][rb_id].first_missing_pdu = -1;
789

790
    LOG_I(PDCP,"[%s %d] Config request : Action ADD for %s %d: Frame %d LCID %d (rb id %d) configured with SN size %d bits and RLC %s\n",
791
792
          (eNB_flag) ? "eNB" : "UE", module_id,
          (eNB_flag) ? "UE" : "eNB", index,
793
          frame, lc_id, rb_id, pdcp_array[module_id][rb_id].seq_num_size,
794
795
          (rlc_mode == 1) ? "AM" : (rlc_mode == 2) ? "TM" : "UM");

796
797
798
799
800
    /* Setup security */
    if (security_mode != 0xff) {
        pdcp_config_set_security(module_id, frame, eNB_flag, rb_id, lc_id, security_mode, kRRCenc, kRRCint, kUPenc);
    }

801
802
803
804
    LOG_D(PDCP,  "[MSC_NEW][FRAME %05d][PDCP][MOD %02d][RB %02d]\n", frame, module_id,rb_id);

    break;
    case ACTION_MODIFY:
805
806
807
    pdcp_array[module_id][rb_id].header_compression_profile=header_compression_profile;
    pdcp_array[module_id][rb_id].status_report = rb_report;
    pdcp_array[module_id][rb_id].rlc_mode = rlc_mode;
808

809
810
811
812
813
    /* Setup security */
    if (security_mode != 0xff) {
        pdcp_config_set_security(module_id, frame, eNB_flag, rb_id, lc_id, security_mode, kRRCenc, kRRCint, kUPenc);
    }

814
    if (rb_sn == PDCP_Config__rlc_UM__pdcp_SN_Size_len7bits)
815
      pdcp_array[module_id][rb_id].seq_num_size = 7;
816
    else if (rb_sn == PDCP_Config__rlc_UM__pdcp_SN_Size_len12bits)
817
      pdcp_array[module_id][rb_id].seq_num_size=12;
818
    else
819
      pdcp_array[module_id][rb_id].seq_num_size=5;
820

821
    LOG_I(PDCP,"[%s %d] Config request : Action MODIFY for %s %d: Frame %d LCID %d RB id %d configured with SN size %d and RLC %s \n",
822
823
          (eNB_flag) ? "eNB" : "UE", module_id,
          (eNB_flag) ? "UE" : "eNB", index,
824
          frame, lc_id, rb_id, rb_sn,
825
826
827
828
          (rlc_mode == 1) ? "AM" : (rlc_mode == 2) ? "TM" : "UM");

    break;
    case ACTION_REMOVE:
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
    pdcp_array[module_id][rb_id].instanciated_instance = 0;
    pdcp_array[module_id][rb_id].lcid= 0;
    pdcp_array[module_id][rb_id].header_compression_profile=0x0;
    pdcp_array[module_id][rb_id].cipheringAlgorithm=0xff;
    pdcp_array[module_id][rb_id].integrityProtAlgorithm=0xff;
    pdcp_array[module_id][rb_id].status_report = 0;
    pdcp_array[module_id][rb_id].rlc_mode = RLC_NONE;
    pdcp_array[module_id][rb_id].next_pdcp_tx_sn = 0;
    pdcp_array[module_id][rb_id].next_pdcp_rx_sn = 0;
    pdcp_array[module_id][rb_id].tx_hfn = 0;
    pdcp_array[module_id][rb_id].rx_hfn = 0;
    pdcp_array[module_id][rb_id].last_submitted_pdcp_rx_sn = 4095;
    pdcp_array[module_id][rb_id].seq_num_size = 0;
    pdcp_array[module_id][rb_id].first_missing_pdu = -1;
    pdcp_array[module_id][rb_id].security_activated = 0;
844

845
    LOG_I(PDCP,"[%s %d] Config request : ACTION_REMOVE: Frame %d LCID %d RBID %d configured\n",
846
847
          (eNB_flag) ? "eNB" : "UE", module_id, frame, lc_id, rb_id);
    /* Security keys */
848
849
    if (pdcp_array[module_id][rb_id].kUPenc != NULL) {
        free(pdcp_array[module_id][rb_id].kUPenc);
850
    }
851
852
    if (pdcp_array[module_id][rb_id].kRRCint != NULL) {
        free(pdcp_array[module_id][rb_id].kRRCint);
853
    }
854
855
    if (pdcp_array[module_id][rb_id].kRRCenc != NULL) {
        free(pdcp_array[module_id][rb_id].kRRCenc);
856
857
    }

858
859
860
861

    break;
    case ACTION_MBMS_ADD:
    case ACTION_MBMS_MODIFY:
862
863
864
865
    pdcp_mbms_array[module_id][rb_id].instanciated_instance = module_id + 1 ;
    pdcp_mbms_array[module_id][rb_id].service_id = mch_id;
    pdcp_mbms_array[module_id][rb_id].session_id = lc_id;
    pdcp_mbms_array[module_id][rb_id].rb_id = rb_id;
866
867
868
869
    LOG_I(PDCP,"[%s %d] Config request : ACTION_MBMS_ADD: Frame %d service_id/mch index %d, session_id/lcid %d, rbid %d configured\n",
          (eNB_flag == 1) ? "eNB" : "UE", module_id, frame, mch_id, lc_id, rb_id);
    break;
    case ACTION_SET_SECURITY_MODE:
870
871
        pdcp_config_set_security(module_id, frame, eNB_flag, rb_id, lc_id, security_mode, kRRCenc, kRRCint, kUPenc);
        break;
872
    default:
873
874
        LOG_W(PDCP,"unknown action %d for the config request\n",action);
        break;
875
876
877
  }
  return 0;
}
878
879
880
881
882

void pdcp_config_set_security(module_id_t module_id, u32 frame, u8 eNB_flag, rb_id_t rb_id,
                              u16 lc_id, u8 security_mode, u8 *kRRCenc, u8 *kRRCint, u8 *kUPenc)
{
    if ((security_mode >= 0) && (security_mode <= 0x77)) {
883
884
        pdcp_array[module_id][rb_id].cipheringAlgorithm     = security_mode & 0x0f;
        pdcp_array[module_id][rb_id].integrityProtAlgorithm = (security_mode>>4) & 0xf;
885
886
887
        LOG_D(PDCP,"[%s %d][RB %02d] Set security mode : ACTION_SET_SECURITY_MODE: "
              "Frame %d  cipheringAlgorithm %d integrityProtAlgorithm %d\n",
              (eNB_flag) ? "eNB" : "UE", module_id, rb_id, frame,
888
889
890
891
892
              pdcp_array[module_id][rb_id].cipheringAlgorithm,
              pdcp_array[module_id][rb_id].integrityProtAlgorithm);
        pdcp_array[module_id][rb_id].kRRCenc = kRRCenc;
        pdcp_array[module_id][rb_id].kRRCint = kRRCint;
        pdcp_array[module_id][rb_id].kUPenc  = kUPenc;
893
894

        /* Activate security */
895
        pdcp_array[module_id][rb_id].security_activated = 1;
896
897
898
899
900
    } else {
        LOG_D(PDCP,"[%s %d] bad security mode %d", security_mode);
    }
}

901
void rrc_pdcp_config_req (module_id_t module_id, u32 frame, u8_t eNB_flag, u32  action, rb_id_t rb_id, u8 security_mode){
902
903
904
905
906
907

  /*
     * Initialize sequence number state variables of relevant PDCP entity
     */
  switch (action) {
  case ACTION_ADD:
908
    pdcp_array[module_id][rb_id].instanciated_instance = module_id + 1;
909
    
910
911
912
913
    pdcp_array[module_id][rb_id].next_pdcp_tx_sn = 0;
    pdcp_array[module_id][rb_id].next_pdcp_rx_sn = 0;
    pdcp_array[module_id][rb_id].tx_hfn = 0;
    pdcp_array[module_id][rb_id].rx_hfn = 0;
914
    /* SN of the last PDCP SDU delivered to upper layers */
915
    pdcp_array[module_id][rb_id].last_submitted_pdcp_rx_sn = 4095;
916
917

    if ( (rb_id % NB_RB_MAX) < DTCH) // SRB
918
      pdcp_array[module_id][rb_id].seq_num_size = 5;
919
    else // DRB
920
921
      pdcp_array[module_id][rb_id].seq_num_size = 12;
    pdcp_array[module_id][rb_id].first_missing_pdu = -1;
922
923
924
925
926
927
928
    LOG_D(PDCP,"[%s %d] Config request : Action ADD: Frame %d radio bearer id %d configured\n",
          (eNB_flag) ? "eNB" : "UE", module_id, frame, rb_id);
    LOG_D(PDCP,  "[MSC_NEW][FRAME %05d][PDCP][MOD %02d][RB %02d]\n", frame, module_id,rb_id);
    break;
    case ACTION_MODIFY:
    break;
    case ACTION_REMOVE:
929
930
931
932
933
934
935
936
    pdcp_array[module_id][rb_id].instanciated_instance = 0;
    pdcp_array[module_id][rb_id].next_pdcp_tx_sn = 0;
    pdcp_array[module_id][rb_id].next_pdcp_rx_sn = 0;
    pdcp_array[module_id][rb_id].tx_hfn = 0;
    pdcp_array[module_id][rb_id].rx_hfn = 0;
    pdcp_array[module_id][rb_id].last_submitted_pdcp_rx_sn = 4095;
    pdcp_array[module_id][rb_id].seq_num_size = 0;
    pdcp_array[module_id][rb_id].first_missing_pdu = -1;
937
    pdcp_array[module_id][rb_id].security_activated = 0;
938
939
940
941
942
943
    LOG_D(PDCP,"[%s %d] Config request : ACTION_REMOVE: Frame %d radio bearer id %d configured\n",
          (eNB_flag) ? "eNB" : "UE", module_id, frame, rb_id);

    break;
    case ACTION_SET_SECURITY_MODE:
    if ((security_mode >= 0 ) && (security_mode <=0x77)) {
944
945
      pdcp_array[module_id][rb_id].cipheringAlgorithm= security_mode & 0x0f;
      pdcp_array[module_id][rb_id].integrityProtAlgorithm = (security_mode>>4) & 0xf;
946
947
      LOG_D(PDCP,"[%s %d] Set security mode : ACTION_SET_SECURITY_MODE: Frame %d  cipheringAlgorithm %d integrityProtAlgorithm %d\n",
            (eNB_flag) ? "eNB" : "UE", module_id, frame,
948
949
            pdcp_array[module_id][rb_id].cipheringAlgorithm,
            pdcp_array[module_id][rb_id].integrityProtAlgorithm );
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
    }else
      LOG_D(PDCP,"[%s %d] bad security mode %d", security_mode);
    break;
    default:
    break;
  }

}

// TODO PDCP module initialization code might be removed
int
    pdcp_module_init ()
{
  //-----------------------------------------------------------------------------
#ifdef NAS_FIFO
  int ret;

  ret=rtf_create(PDCP2NAS_FIFO,32768);

  if (ret < 0) {
    LOG_E(PDCP, "Cannot create PDCP2NAS fifo %d (ERROR %d)\n", PDCP2NAS_FIFO, ret);

    return -1;
  } else {
    LOG_D(PDCP, "Created PDCP2NAS fifo %d\n", PDCP2NAS_FIFO);
    rtf_reset(PDCP2NAS_FIFO);
  }

  ret=rtf_create(NAS2PDCP_FIFO,32768);

  if (ret < 0) {
    LOG_E(PDCP, "Cannot create NAS2PDCP fifo %d (ERROR %d)\n", NAS2PDCP_FIFO, ret);

    return -1;
  } else {
    LOG_D(PDCP, "Created NAS2PDCP fifo %d\n", NAS2PDCP_FIFO);
    rtf_reset(NAS2PDCP_FIFO);
  }

  pdcp_2_nas_irq = 0;
  pdcp_input_sdu_remaining_size_to_read=0;
  pdcp_input_sdu_size_read=0;
#endif

  return 0;

}

//-----------------------------------------------------------------------------
void
    pdcp_module_cleanup ()
    //-----------------------------------------------------------------------------
{
#ifdef NAS_FIFO
  rtf_destroy(NAS2PDCP_FIFO);
  rtf_destroy(PDCP2NAS_FIFO);
#endif
}

//-----------------------------------------------------------------------------
void
    pdcp_layer_init ()
{
  //-----------------------------------------------------------------------------
  unsigned int i, j, k;

  /*
    * Initialize SDU list
    */
  list_init(&pdcp_sdu_list, NULL);
  for (i=0; i < MAX_MODULES; i++) {
1021
    for (j=0; j < NB_RB_MAX; j++) {
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
      memset((void*)&pdcp_array[i][j], 0, sizeof(pdcp_t));
    }

  }
  for (i=0; i < MAX_MODULES; i++) { // MAX service
    for (j=0; j < 16*29; j++) { // max session
      memset((void*)&pdcp_mbms_array[i][j], 0, sizeof(pdcp_mbms_t));
    }
  }

  LOG_I(PDCP, "PDCP layer has been initialized\n");
  pdcp_output_sdu_bytes_to_write=0;
  pdcp_output_header_bytes_to_write=0;
  pdcp_input_sdu_remaining_size_to_read=0;
  /*
    * Initialize PDCP entities (see pdcp_t at pdcp.h)
    */
  // set RB for eNB : this is now down by RRC for each mod id and rab id when needed.
  /*  for (i=0;i  < NB_eNB_INST; i++) {
       for (j=NB_eNB_INST; j < NB_eNB_INST+NB_UE_INST; j++ ) {
       pdcp_config_req(i, (j-NB_eNB_INST) * NB_RB_MAX + DCCH, DCCH  ); // default DRB
       pdcp_config_req(i, (j-NB_eNB_INST) * NB_RB_MAX + DCCH1, DCCH1  ); // default DRB
       pdcp_config_req(i, (j-NB_eNB_INST) * NB_RB_MAX + DTCH, DTCH  ); // default DRB
       }
       }
       // set RB for UE
       for (i=NB_eNB_INST;i<NB_eNB_INST+NB_UE_INST; i++) {
       for (j=0;j<NB_eNB_INST; j++) {
       pdcp_config_req(i, j * NB_RB_MAX + DCCH, DCCH ); // default DRB
       pdcp_config_req(i, j * NB_RB_MAX + DCCH1, DCCH1 ); // default DRB
       pdcp_config_req(i, j * NB_RB_MAX + DTCH, DTCH ); // default DRB
       }
       }*/

  for (i=0;i<NB_UE_INST;i++) { // ue
    for (k=0;k<NB_eNB_INST;k++) { // enb
      for(j=0;j<NB_RAB_MAX;j++) {//rb
        Pdcp_stats_tx[i][k][j]=0;
        Pdcp_stats_tx_bytes[i][k][j]=0;
        Pdcp_stats_tx_bytes_last[i][k][j]=0;
        Pdcp_stats_tx_rate[i][k][j]=0;

        Pdcp_stats_rx[i][k][j]=0;
        Pdcp_stats_rx_bytes[i][k][j]=0;
        Pdcp_stats_rx_bytes_last[i][k][j]=0;
        Pdcp_stats_rx_rate[i][k][j]=0;
      }
    }
  }
}

//-----------------------------------------------------------------------------
void
    pdcp_layer_cleanup ()
    //-----------------------------------------------------------------------------
{
  list_free (&pdcp_sdu_list);
}

#ifdef NAS_FIFO
EXPORT_SYMBOL(pdcp_2_nas_irq);
#endif //NAS_FIFO