From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CED1F30E0EF; Mon, 13 Oct 2025 15:46:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760370366; cv=none; b=Af1heSgnf0Cpi6JNsMWebDOG+1LnJaKVa+1aOozvPbhH+GTDOdJwvIkdpCi+4xgLVe9kMIEfIr8LZjiq3Hn7HhcNEx9ZdOVTP55YjftvkelVjLlZcqj4bd5doANI9tSzQQ3kbwt/dRcb0s2PtF4lYUMu5rhSDZQ+zp68GBj8KyU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760370366; c=relaxed/simple; bh=ODZYIhcFA86BiEpzbfpQtw8mRSwQ/ZRCImp3AAAjSUc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=EKFipDa0Zrle/nLbOyUeNTgeq0LBsgl0huGtp+bdA+9F7C2TezfRiMsup6X/YtzeIFKOpPjqKwU9hOjLogPaXJbUMhZBbufUUcAZ2P+DdWGKZMS3q92OP6hs2Hg3SFbJlaqDz5imI2y5tgAfWNv5YsxLsiI6mkCk8DsUinH7u3A= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=yf/NVpze; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="yf/NVpze" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5B11DC4CEE7; Mon, 13 Oct 2025 15:46:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1760370366; bh=ODZYIhcFA86BiEpzbfpQtw8mRSwQ/ZRCImp3AAAjSUc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yf/NVpzeztpWvap04IgiSAKP+QjkEJ63r5axi8Eh/Q77H/2xWd5MNW6N+xf4pYvEq UXCWODl38y2+RMAENRPHTbcXGcl2faKjN7fuECYfhegK89HN4BnoFCT9rOeuu3G5YX oMsRfJcYs1FylCjj9LXEVC01veDRW7Szyg/kj63Y= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Masami Ichikawa , Jens Wiklander Subject: [PATCH 6.17 554/563] tee: fix register_shm_helper() Date: Mon, 13 Oct 2025 16:46:55 +0200 Message-ID: <20251013144431.372821921@linuxfoundation.org> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20251013144411.274874080@linuxfoundation.org> References: <20251013144411.274874080@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.17-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jens Wiklander commit d5cf5b37064b1699d946e8b7ab4ac7d7d101814c upstream. In register_shm_helper(), fix incorrect error handling for a call to iov_iter_extract_pages(). A case is missing for when iov_iter_extract_pages() only got some pages and return a number larger than 0, but not the requested amount. This fixes a possible NULL pointer dereference following a bad input from ioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn't mapped. Cc: stable@vger.kernel.org Reported-by: Masami Ichikawa Closes: https://lore.kernel.org/op-tee/CACOXgS-Bo2W72Nj1_44c7bntyNYOavnTjJAvUbEiQfq=u9W+-g@mail.gmail.com/ Tested-by: Masami Ichikawa Fixes: 7bdee4157591 ("tee: Use iov_iter to better support shared buffer registration") Signed-off-by: Jens Wiklander Signed-off-by: Greg Kroah-Hartman --- drivers/tee/tee_shm.c | 8 ++++++++ 1 file changed, 8 insertions(+) --- a/drivers/tee/tee_shm.c +++ b/drivers/tee/tee_shm.c @@ -321,6 +321,14 @@ register_shm_helper(struct tee_context * if (unlikely(len <= 0)) { ret = len ? ERR_PTR(len) : ERR_PTR(-ENOMEM); goto err_free_shm_pages; + } else if (DIV_ROUND_UP(len + off, PAGE_SIZE) != num_pages) { + /* + * If we only got a few pages, update to release the + * correct amount below. + */ + shm->num_pages = len / PAGE_SIZE; + ret = ERR_PTR(-ENOMEM); + goto err_put_shm_pages; } /*