scsi-sg-allow-waiting-for-commands-to-complete-on-removed-device.patch
revert-net-usb-ax88179_178a-needs-flag_send_zlp.patch
bluetooth-l2cap-fix-l2cap_global_chan_by_psm-regression.patch
-tee-add-overflow-check-in-register_shm_helper.patch
net-9p-initialize-the-iounit-field-during-fid-creation.patch
net_sched-cls_route-disallow-handle-of-0.patch
alsa-info-fix-llseek-return-value-when-using-callback.patch
xen-xenbus-fix-return-type-in-xenbus_file_read.patch
atm-idt77252-fix-use-after-free-bugs-caused-by-tst_timer.patch
dpaa2-eth-trace-the-allocated-address-instead-of-page-struct.patch
+tee-add-overflow-check-in-register_shm_helper.patch
Suggested-by: Jerome Forissier <jerome.forissier@linaro.org>
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
+[JW: backport to stable-5.4 + update commit message]
+Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
- drivers/tee/tee_shm.c | 3 +++
+ drivers/tee/tee_core.c | 3 +++
1 file changed, 3 insertions(+)
---- a/drivers/tee/tee_shm.c
-+++ b/drivers/tee/tee_shm.c
-@@ -239,6 +239,9 @@ struct tee_shm *tee_shm_register(struct
- goto err;
- }
+--- a/drivers/tee/tee_core.c
++++ b/drivers/tee/tee_core.c
+@@ -182,6 +182,9 @@ tee_ioctl_shm_register(struct tee_contex
+ if (data.flags)
+ return -EINVAL;
-+ if (!access_ok((void __user *)addr, length))
-+ return ERR_PTR(-EFAULT);
++ if (!access_ok((void __user *)(unsigned long)data.addr, data.length))
++ return -EFAULT;
+
- mutex_lock(&teedev->mutex);
- list_add_tail(&shm->link, &ctx->list_shm);
- mutex_unlock(&teedev->mutex);
+ shm = tee_shm_register(ctx, data.addr, data.length,
+ TEE_SHM_DMA_BUF | TEE_SHM_USER_MAPPED);
+ if (IS_ERR(shm))