qcacmn: Fix memory leak for invalid peer error
In dp_rx_null_q_desc_handle, if peer is invaild and no need to deliver to the upper layer, the nbuf must be freed before recycle the rx descriptor. CRs-Fixed: 2153932 Change-Id: I1b373d1b5b50da42b896f0b2fd7bbd13b0e2466d
This commit is contained in:
@@ -412,6 +412,8 @@ dp_rx_wds_srcport_learn(struct dp_soc *soc,
|
||||
#endif
|
||||
|
||||
uint8_t dp_rx_process_invalid_peer(struct dp_soc *soc, qdf_nbuf_t nbuf);
|
||||
void dp_rx_process_invalid_peer_wrapper(struct dp_soc *soc,
|
||||
qdf_nbuf_t mpdu, bool mpdu_done);
|
||||
void dp_rx_process_mic_error(struct dp_soc *soc, qdf_nbuf_t nbuf, uint8_t *rx_tlv_hdr);
|
||||
|
||||
#define DP_RX_LIST_APPEND(head, tail, elem) \
|
||||
|
Reference in New Issue
Block a user