From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: yuhaocheng035@gmail.com
Cc: Jiri Slaby <jirislaby@kernel.org>,
Nicolas Pitre <npitre@baylibre.com>,
linux-kernel@vger.kernel.org, linux-serial@vger.kernel.org,
Calixte Pernot <calixte.pernot@grenoble-inp.org>
Subject: Re: [PATCH] tty: vt: Fix slab-out-of-bounds write in do_con_write
Date: Sat, 21 Mar 2026 07:32:34 +0100 [thread overview]
Message-ID: <2026032123-earplugs-stunning-0c6f@gregkh> (raw)
In-Reply-To: <20260321062312.4290-1-yuhaocheng035@gmail.com>
On Sat, Mar 21, 2026 at 02:23:12PM +0800, yuhaocheng035@gmail.com wrote:
> From: Haocheng Yu <yuhaocheng035@gmail.com>
>
> A KASAN: slab-out-of-bounds Write in do_con_write issue is reported by
> a modified Syzkaller-based kernel fuzzing tool that we developed. The
> report indicates the problem lies in vc_con_write_normal
> drivers/tty/vt/vt.c:3141(scr_writew(tc, (u16*)vc->vc_pos)), which writes
> 2 bytes to the right of the allocated region at 2634 bytes.
>
> Since it did not provide any repro program or enough information,
> the cause remains unclear. However, adding a validity check of vc->vc_pos
> before scr_writew should avoid this issue.
>
> Signed-off-by: Haocheng Yu <yuhaocheng035@gmail.com>
What commit caused this problem to show up?
And without more information, or a reproducer, I'm a bit loath to take
this change.
> ---
> drivers/tty/vt/vt.c | 7 +++++++
> 1 file changed, 7 insertions(+)
>
> diff --git a/drivers/tty/vt/vt.c b/drivers/tty/vt/vt.c
> index 6e0089b85c27..95d860f09837 100644
> --- a/drivers/tty/vt/vt.c
> +++ b/drivers/tty/vt/vt.c
> @@ -3138,6 +3138,13 @@ static int vc_con_write_normal(struct vc_data *vc, int tc, int c,
> (tc & 0xff);
> tc |= (vc_attr << 8) & ~himask;
>
> + unsigned long end = vc->vc_origin + vc->vc_screenbuf_size;
Ideally do not create new variables in the middle of a function,
checkpatch should have warned about this.
> +
> + if (WARN_ON_ONCE(vc->vc_screenbuf_size < 2 ||
> + end < vc->vc_origin ||
> + vc->vc_pos < vc->vc_origin ||
> + vc->vc_pos > end - 2))
That's not good, if panic-on-warn is enabled, as it is in a few billion
Linux systems, you just rebooted the machine, turning a simple overwrite
into a denial-of-service, not fixing anything at all, but making it
worse :(
> + return -1;
Do not make up error numbers :(
thanks,
greg k-h
next prev parent reply other threads:[~2026-03-21 6:32 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-21 6:23 [PATCH] tty: vt: Fix slab-out-of-bounds write in do_con_write yuhaocheng035
2026-03-21 6:32 ` Greg Kroah-Hartman [this message]
2026-03-21 6:37 ` Greg Kroah-Hartman
2026-03-22 7:32 ` Haocheng Yu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2026032123-earplugs-stunning-0c6f@gregkh \
--to=gregkh@linuxfoundation.org \
--cc=calixte.pernot@grenoble-inp.org \
--cc=jirislaby@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-serial@vger.kernel.org \
--cc=npitre@baylibre.com \
--cc=yuhaocheng035@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox