drivers/video/fbdev/core/fbcon.c | 2 ++ 1 file changed, 2 insertions(+)
syzbot has found a NULL pointer dereference bug in fbcon.
Here is the simplified C reproducer:
struct param {
uint8_t type;
struct tiocl_selection ts;
};
int main()
{
struct fb_con2fbmap con2fb;
struct param param;
int fd = open("/dev/fb1", 0, 0);
con2fb.console = 0x19;
con2fb.framebuffer = 0;
ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb);
param.type = 2;
param.ts.xs = 0; param.ts.ys = 0;
param.ts.xe = 0; param.ts.ye = 0;
param.ts.sel_mode = 0;
int fd1 = open("/dev/tty1", O_RDWR, 0);
ioctl(fd1, TIOCLINUX, ¶m);
con2fb.console = 1;
con2fb.framebuffer = 0;
ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb);
return 0;
}
After calling ioctl(fd1, TIOCLINUX, ¶m), the subsequent ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb)
causes the kernel to follow a different execution path:
set_con2fb_map
-> con2fb_init_display
-> fbcon_set_disp
-> redraw_screen
-> hide_cursor
-> clear_selection
-> highlight
-> invert_screen
-> do_update_region
-> fbcon_putcs
-> ops->putcs
Since ops->putcs is a NULL pointer, this leads to a kernel panic.
To prevent this, we need to call set_blitting_type() within set_con2fb_map()
to properly initialize ops->putcs.
Reported-by: syzbot+3d613ae53c031502687a@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=3d613ae53c031502687a
Tested-by: syzbot+3d613ae53c031502687a@syzkaller.appspotmail.com
Signed-off-by: Qianqiang Liu <qianqiang.liu@163.com>
---
Changes since v2:
- Document the commit message in more detail
---
Changes since v1:
- Initialize ops->putcs by calling set_blitting_type()
---
drivers/video/fbdev/core/fbcon.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/video/fbdev/core/fbcon.c b/drivers/video/fbdev/core/fbcon.c
index 2e093535884b..d9abae2516d8 100644
--- a/drivers/video/fbdev/core/fbcon.c
+++ b/drivers/video/fbdev/core/fbcon.c
@@ -861,6 +861,8 @@ static int set_con2fb_map(int unit, int newidx, int user)
return err;
fbcon_add_cursor_work(info);
+ } else if (vc) {
+ set_blitting_type(vc, info);
}
con2fb_map[unit] = newidx;
--
2.34.1
On 9/25/24 07:29, Qianqiang Liu wrote: > syzbot has found a NULL pointer dereference bug in fbcon. > Here is the simplified C reproducer: > > struct param { > uint8_t type; > struct tiocl_selection ts; > }; > > int main() > { > struct fb_con2fbmap con2fb; > struct param param; > > int fd = open("/dev/fb1", 0, 0); > > con2fb.console = 0x19; > con2fb.framebuffer = 0; > ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb); > > param.type = 2; > param.ts.xs = 0; param.ts.ys = 0; > param.ts.xe = 0; param.ts.ye = 0; > param.ts.sel_mode = 0; > > int fd1 = open("/dev/tty1", O_RDWR, 0); > ioctl(fd1, TIOCLINUX, ¶m); > > con2fb.console = 1; > con2fb.framebuffer = 0; > ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb); > > return 0; > } > > After calling ioctl(fd1, TIOCLINUX, ¶m), the subsequent ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb) > causes the kernel to follow a different execution path: > > set_con2fb_map > -> con2fb_init_display > -> fbcon_set_disp > -> redraw_screen > -> hide_cursor > -> clear_selection > -> highlight > -> invert_screen > -> do_update_region > -> fbcon_putcs > -> ops->putcs > > Since ops->putcs is a NULL pointer, this leads to a kernel panic. > To prevent this, we need to call set_blitting_type() within set_con2fb_map() > to properly initialize ops->putcs. > > Reported-by: syzbot+3d613ae53c031502687a@syzkaller.appspotmail.com > Closes: https://syzkaller.appspot.com/bug?extid=3d613ae53c031502687a > Tested-by: syzbot+3d613ae53c031502687a@syzkaller.appspotmail.com > Signed-off-by: Qianqiang Liu <qianqiang.liu@163.com> > --- > Changes since v2: > - Document the commit message in more detail Queued up in for-next branch of fbdev git tree. Thanks! Helge > --- > Changes since v1: > - Initialize ops->putcs by calling set_blitting_type() > --- > drivers/video/fbdev/core/fbcon.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/drivers/video/fbdev/core/fbcon.c b/drivers/video/fbdev/core/fbcon.c > index 2e093535884b..d9abae2516d8 100644 > --- a/drivers/video/fbdev/core/fbcon.c > +++ b/drivers/video/fbdev/core/fbcon.c > @@ -861,6 +861,8 @@ static int set_con2fb_map(int unit, int newidx, int user) > return err; > > fbcon_add_cursor_work(info); > + } else if (vc) { > + set_blitting_type(vc, info); > } > > con2fb_map[unit] = newidx;
© 2016 - 2024 Red Hat, Inc.