Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp176857pxj; Tue, 18 May 2021 00:22:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwjob8Fzmr4aPEJNiripFIpgoKWyzd/mhBfXN50d8aGi20XVaqoPgsKVx8VtKiJNmcU01dX X-Received: by 2002:a17:906:b7d6:: with SMTP id fy22mr4490460ejb.383.1621322554580; Tue, 18 May 2021 00:22:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621322554; cv=none; d=google.com; s=arc-20160816; b=nLQwFupCxl/HQhebMWX17mGgE6uu5qUe6gvf2vd3ptJFRvJxeq4t46BHIxvFo4ONt3 Mn1JenkLhz1imsHK2JbXXP+Ccf4GXzcKHi//NV063nzqp1F7TMolXCPjnGR+XGFw8N3L 6fHNMCENtigBSvLODIlV30Xuiv98en3uoPgV9mVGYnj9GF4H9zjFAAtrpvgNAsjROAg4 W+i3qsGaOF0Scn1XKSZBoqFt6QNZiPwEopNsLYGMnNP/hQK0CTAa48Fvd520aXuUtzdf fvcdXZeSdVYI5I3L108D6ARxqvSLF49kjWIq2GeBMt3hRRwQ04RkDnswCkWevWpWJfs2 XUWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FwyscKVbQ7nCTpCXkTuG+z2IU0Xedeob+5qunzSK4Pc=; b=NCO+bnpfNPoU6oaAvAnM9nXn08IR3YO/M+I+EEky+MMF9/Sv7zBl4G65mZsmirloOz aYaQXk2M+cJHw6Cwkt70HkKvK0aFBEEctOkXcQXswbqN+EUrNL37X9wVaYO+NCb8V8IN pyJ6RQqT1z0LntRUmdQzXqGIhFgCcu4D+lauS12M14uzQbF4xuqE1aNYHLyGjuJoVSjI uSnMasUkEaBzQpjEWS+QetcgfTFBGMzHbeEzNx+onpeOUkZ54Kmw5eXYuso5p9Do5CSG 7rkyxhN052QUSyBRlhQvSnzZtzuiffbRaWMPbMpPZpldWextpdpEK5trCKgj/YVtaIXw kBSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eR9xsAfY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k19si14894078ejv.416.2021.05.18.00.22.11; Tue, 18 May 2021 00:22:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eR9xsAfY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242431AbhEQOzY (ORCPT + 99 others); Mon, 17 May 2021 10:55:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:40530 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240793AbhEQOq5 (ORCPT ); Mon, 17 May 2021 10:46:57 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CBD2A61453; Mon, 17 May 2021 14:21:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621261314; bh=HNvOkNfzFgERXYRr3FBPoHd92Jf0xb9PgL8U1hhuMh0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eR9xsAfYWAI1BdJirVM52jmzk4/8/KprgKSyHf6O9h/59DCJ7JG7CEe6uNlM5jQyX a89R188OgeifYgTFJ73ARYE5XWZsk4n7S4oYs/bge5xV468DTDgRTmk+JUluUCsZCm iocLdfAhb6EQd0ZhchegNxlZyznN+2jgaUW9c/bs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mihai Moldovan , Masahiro Yamada , Sasha Levin Subject: [PATCH 5.4 032/141] kconfig: nconf: stop endless search loops Date: Mon, 17 May 2021 16:01:24 +0200 Message-Id: <20210517140243.852293391@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210517140242.729269392@linuxfoundation.org> References: <20210517140242.729269392@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mihai Moldovan [ Upstream commit 8c94b430b9f6213dec84e309bb480a71778c4213 ] If the user selects the very first entry in a page and performs a search-up operation, or selects the very last entry in a page and performs a search-down operation that will not succeed (e.g., via [/]asdfzzz[Up Arrow]), nconf will never terminate searching the page. The reason is that in this case, the starting point will be set to -1 or n, which is then translated into (n - 1) (i.e., the last entry of the page) or 0 (i.e., the first entry of the page) and finally the search begins. This continues to work fine until the index reaches 0 or (n - 1), at which point it will be decremented to -1 or incremented to n, but not checked against the starting point right away. Instead, it's wrapped around to the bottom or top again, after which the starting point check occurs... and naturally fails. My original implementation added another check for -1 before wrapping the running index variable around, but Masahiro Yamada pointed out that the actual issue is that the comparison point (starting point) exceeds bounds (i.e., the [0,n-1] interval) in the first place and that, instead, the starting point should be fixed. This has the welcome side-effect of also fixing the case where the starting point was n while searching down, which also lead to an infinite loop. OTOH, this code is now essentially all his work. Amazingly, nobody seems to have been hit by this for 11 years - or at the very least nobody bothered to debug and fix this. Signed-off-by: Mihai Moldovan Signed-off-by: Masahiro Yamada Signed-off-by: Sasha Levin --- scripts/kconfig/nconf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/kconfig/nconf.c b/scripts/kconfig/nconf.c index b7c1ef757178..331b2cc917ec 100644 --- a/scripts/kconfig/nconf.c +++ b/scripts/kconfig/nconf.c @@ -503,8 +503,8 @@ static int get_mext_match(const char *match_str, match_f flag) else if (flag == FIND_NEXT_MATCH_UP) --match_start; + match_start = (match_start + items_num) % items_num; index = match_start; - index = (index + items_num) % items_num; while (true) { char *str = k_menu_items[index].str; if (strcasestr(str, match_str) != NULL) -- 2.30.2