From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 74239C32792 for ; Tue, 23 Aug 2022 12:33:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242089AbiHWMdZ (ORCPT ); Tue, 23 Aug 2022 08:33:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50072 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239324AbiHWM3h (ORCPT ); Tue, 23 Aug 2022 08:29:37 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0F5699A965 for ; Tue, 23 Aug 2022 02:45:01 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8DA686138B for ; Tue, 23 Aug 2022 09:44:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9477EC433C1; Tue, 23 Aug 2022 09:44:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661247853; bh=5VnopQ/I9SCUlyB0Lmukczx3+amUB5IUn2tr6Vri5lY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=vYzRV63m7FhSCBW+OQZvoYuRmF4kCOgwHmCqm0Dr7u/HdmC0rH95DJJvRizJpb42G CUGTOTDpDG2XXPCjIIC4b6qbP+fLOGb0nMouAtuZ9jogMIRcBGhZKFW0X9zpyAyEyb d/NBA7LOyowTIlzPAAkdDB9sABtMcO17XOEE46I0= Date: Tue, 23 Aug 2022 10:30:22 +0200 From: Greg KH To: Jens Wiklander Cc: stable@vger.kernel.org, Pavel Machek Subject: Re: [PATCH for 5.10.y] tee: fix memory leak in tee_shm_register() Message-ID: References: <20220823082326.9155-1-jens.wiklander@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220823082326.9155-1-jens.wiklander@linaro.org> Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Tue, Aug 23, 2022 at 10:23:26AM +0200, Jens Wiklander wrote: > Moves the access_ok() check for valid memory range from user space from > the function tee_shm_register() to tee_ioctl_shm_register(). With this > we error out early before anything is done that must be undone on error. > > Fixes: 578c349570d2 ("tee: add overflow check in register_shm_helper()") > Cc: stable@vger.kernel.org # 5.10 > Reported-by: Pavel Machek > Signed-off-by: Jens Wiklander > --- > Hi, > > This patch targets the 5.10.y release to take care of a recently introduced > issue there. Thanks, now queued up. greg k-h