mirror of
https://github.com/zephyrproject-rtos/zephyr
synced 2025-09-13 10:11:57 +00:00
This net_buf leak happends when we are low on available net_buf
count. During TCP segment preparation we do allocate IP header
successfully, but we fail to allocate TCP header. In such case
pkt->frags is not NULL anymore (it contains IP header), but we
override it during TCP header allocation error path. This results
in net_buf containing IP header to never be deallocated, because
it does not belong to any net_pkt anymore.
Use net_pkt_frag_add() function to add tail for future net_pkt
deallocation, instead of assigning tail to pkt->frags pointer.
Fixes:
|
||
---|---|---|
.. | ||
ip | ||
l2 | ||
lib | ||
buf.c | ||
CMakeLists.txt | ||
hostname.c | ||
Kconfig | ||
Kconfig.hostname | ||
TODO |