From mboxrd@z Thu Jan 1 00:00:00 1970 From: Dan Carpenter Subject: [PATCH 1/2] bpf: sockmap, double free in __sock_map_ctx_update_elem() Date: Fri, 18 May 2018 10:58:10 +0300 Message-ID: <20180518075810.GA28285@mwanda> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Daniel Borkmann , netdev@vger.kernel.org, kernel-janitors@vger.kernel.org To: Alexei Starovoitov , John Fastabend Return-path: Received: from aserp2120.oracle.com ([141.146.126.78]:44238 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750882AbeERH6n (ORCPT ); Fri, 18 May 2018 03:58:43 -0400 Content-Disposition: inline Sender: netdev-owner@vger.kernel.org List-ID: We accidentally free "e" twice. Fixes: 81110384441a ("bpf: sockmap, add hash map support") Signed-off-by: Dan Carpenter diff --git a/kernel/bpf/sockmap.c b/kernel/bpf/sockmap.c index c6de1393df63..216d5c9b0eb3 100644 --- a/kernel/bpf/sockmap.c +++ b/kernel/bpf/sockmap.c @@ -1833,7 +1833,6 @@ static int __sock_map_ctx_update_elem(struct bpf_map *map, if (tx_msg) bpf_prog_put(tx_msg); write_unlock_bh(&sock->sk_callback_lock); - kfree(e); return err; }