diff options
author | Andrii Nakryiko <andriin@fb.com> | 2020-07-09 18:10:23 -0700 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2020-07-10 16:24:35 +0200 |
commit | 5c3320d7fece4612d4a413aa3c8e82cdb5b49fcb (patch) | |
tree | f3a1592c19c8d4b1502b06a352d598a24b498b82 /samples/bpf | |
parent | Merge branch 'bpf-libbpf-old-kernel' (diff) | |
download | linux-5c3320d7fece4612d4a413aa3c8e82cdb5b49fcb.tar.gz linux-5c3320d7fece4612d4a413aa3c8e82cdb5b49fcb.tar.bz2 linux-5c3320d7fece4612d4a413aa3c8e82cdb5b49fcb.zip |
libbpf: Fix memory leak and optimize BTF sanitization
Coverity's static analysis helpfully reported a memory leak introduced by
0f0e55d8247c ("libbpf: Improve BTF sanitization handling"). While fixing it,
I realized that btf__new() already creates a memory copy, so there is no need
to do this. So this patch also fixes misleading btf__new() signature to make
data into a `const void *` input parameter. And it avoids unnecessary memory
allocation and copy in BTF sanitization code altogether.
Fixes: 0f0e55d8247c ("libbpf: Improve BTF sanitization handling")
Signed-off-by: Andrii Nakryiko <andriin@fb.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20200710011023.1655008-1-andriin@fb.com
Diffstat (limited to 'samples/bpf')
0 files changed, 0 insertions, 0 deletions