Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp761948ybl; Wed, 4 Dec 2019 10:25:10 -0800 (PST) X-Google-Smtp-Source: APXvYqwBH2Y78WfXnZRHfKpgvkwjtfxrpFRNPoQbM5dlg40f5FkPtX9zpuLbV23BKrf9osVFpJ8g X-Received: by 2002:a05:6830:1d59:: with SMTP id p25mr3725880oth.308.1575483910906; Wed, 04 Dec 2019 10:25:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575483910; cv=none; d=google.com; s=arc-20160816; b=irmQx0xXrf45iDG/xQpXhHP9hUS354B5AeGjq/e55xPHO/JDkzsqzSOaJBT2fw94Hr lFb5qsZ7ksPXKDJGe7UkWUOVyudF4Mes2mnlyxqS8sCKArMw1n5B1cSv7EW8phRo+0Oa W1SicUxBu5QQIqnrNSCM9IIT18ydjRWytbCJvvyL+OQEDVlxoyf8D4MzuzdgYe2gXQfs Xdr4X4doGF8SGd2FOvFcMO/AGyuuPNUWpxBD5sRMG0New60YdqkH1lHx32AjTojP5fJY 1QBChCIW7S9pynrijWgtIrHWNk5E/yIz8N791m6SxQyhl9VjbVcyGct1rMQ4RwmKYJ4b 75Hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=HBp5WMM+J6xBYKqfK9R/VPUIpL8jqBKJXKKYd5THKtE=; b=Qef/PIkNitnQVqFiqYADt5sE0qxfLoRz5DeOOvjO5+d9BaOTDz9jl89Uy4TkGNG7RX zEumS2I9QY9zdGUf3b+jViP/GzoImJMB3R9Ai5mv08qoXL4wo/Yn5OiBBx/pBMCP2QKq T2MFOb9MSBkV9OAdQb/979y4CaYI0fHl9xuRL3WbaVa6uCw/iryw7npOwCavxZcxsscj AiZbCXTDc7KmkHf6Tf4q4bkjKiW7Gt/s3Tsnlylj/dR6yufYkTj+D/iSlJ5SEHoVqAdI OXdIQVNX+RE8YtDRTY++/M3nUn+SknY1FP2UDWmHMN2NDuzlHYQfhj1oxnCOTF3qSfjJ 3G7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=i2BOB00P; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v67si3384700oia.26.2019.12.04.10.24.58; Wed, 04 Dec 2019 10:25:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=i2BOB00P; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729312AbfLDSDX (ORCPT + 99 others); Wed, 4 Dec 2019 13:03:23 -0500 Received: from mail.kernel.org ([198.145.29.99]:46894 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730023AbfLDSDT (ORCPT ); Wed, 4 Dec 2019 13:03:19 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F1B912073B; Wed, 4 Dec 2019 18:03:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482599; bh=9mvyKiStdqWHIi9NvCE4eDL7Uh0tn5Xgra9f21+o9Z4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=i2BOB00PgoZ3o4J3s7AY4YGFOSZ4JTd7eT/IEYYztFd//SlC2oLWzmrwFT3mWHaa3 UwiflHPVa5d4CsWdDz7SeD6vZOHDYHIsNKcvchZR8HI5TjpiWAVur/+HfdcoTNpwsb JXxx2Esi3j4wClXslUqekYIwCU//9GecA88CfcPo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pan Bian , Benjamin Tissoires , Jiri Kosina , Sasha Levin Subject: [PATCH 4.14 061/209] HID: intel-ish-hid: fixes incorrect error handling Date: Wed, 4 Dec 2019 18:54:33 +0100 Message-Id: <20191204175325.530327484@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pan Bian [ Upstream commit 6e0856d317440a950b17c00a9283114f025e5699 ] The memory chunk allocated by hid_allocate_device() should be released by hid_destroy_device(), not kfree(). Fixes: 0b28cb4bcb1("HID: intel-ish-hid: ISH HID client driver") Signed-off-by: Pan Bian Reviewed-by: Benjamin Tissoires Signed-off-by: Jiri Kosina Signed-off-by: Sasha Levin --- drivers/hid/intel-ish-hid/ishtp-hid.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/hid/intel-ish-hid/ishtp-hid.c b/drivers/hid/intel-ish-hid/ishtp-hid.c index cd23903ddcf19..e918d78e541c0 100644 --- a/drivers/hid/intel-ish-hid/ishtp-hid.c +++ b/drivers/hid/intel-ish-hid/ishtp-hid.c @@ -222,7 +222,7 @@ int ishtp_hid_probe(unsigned int cur_hid_dev, err_hid_device: kfree(hid_data); err_hid_data: - kfree(hid); + hid_destroy_device(hid); return rv; } -- 2.20.1