We don't even NULL the pointer out, so we're freeing the same object twice here.
Coverity #951 Signed-off-by: Dave Jones <[EMAIL PROTECTED]> --- linux-2.6/net/sunrpc/auth_gss/gss_krb5_wrap.c~ 2006-03-06 04:18:50.000000000 -0500 +++ linux-2.6/net/sunrpc/auth_gss/gss_krb5_wrap.c 2006-03-06 04:19:40.000000000 -0500 @@ -205,8 +205,6 @@ gss_wrap_kerberos(struct gss_ctx *ctx, i BUG(); } - kfree(md5cksum.data); - /* XXX would probably be more efficient to compute checksum * and encrypt at the same time: */ if ((krb5_make_seq_num(kctx->seq, kctx->initiate ? 0 : 0xff, @@ -221,7 +219,8 @@ gss_wrap_kerberos(struct gss_ctx *ctx, i return ((kctx->endtime < now) ? GSS_S_CONTEXT_EXPIRED : GSS_S_COMPLETE); out_err: - if (md5cksum.data) kfree(md5cksum.data); + if (md5cksum.data) + kfree(md5cksum.data); return GSS_S_FAILURE; } -- http://www.codemonkey.org.uk - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html