mirror of
https://github.com/zephyrproject-rtos/zephyr
synced 2025-09-06 13:01:57 +00:00
This net_buf leak happends when we are low on available net_buf
count. During TCP segment preparation we do allocate IP header
successfully, but we fail to allocate TCP header. In such case
pkt->frags is not NULL anymore (it contains IP header), but we
override it during TCP header allocation error path. This results
in net_buf containing IP header to never be deallocated, because
it does not belong to any net_pkt anymore.
Use net_pkt_frag_add() function to add tail for future net_pkt
deallocation, instead of assigning tail to pkt->frags pointer.
Fixes:
|
||
---|---|---|
.. | ||
app_memory | ||
bluetooth | ||
console | ||
cpp | ||
debug | ||
dfu | ||
disk | ||
fs | ||
logging | ||
mgmt | ||
net | ||
random | ||
settings | ||
shell | ||
storage | ||
usb | ||
CMakeLists.txt | ||
Kconfig |