Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp953004rwb; Thu, 6 Oct 2022 06:44:39 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6DbfL1QHU5bEZ+Fwdzw/IkFavLdQ0mqcWW1Oh7myFSDyvei5WVW8NOw2eRz1sIcqIEEhlm X-Received: by 2002:a63:4542:0:b0:43c:b1c6:7df8 with SMTP id u2-20020a634542000000b0043cb1c67df8mr36187pgk.138.1665063879067; Thu, 06 Oct 2022 06:44:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665063879; cv=none; d=google.com; s=arc-20160816; b=cbgCmyO5699ZCFYqNqZjE4lPk6lN2Gg5xr1OXjzwwcZiXyJFRc5mWtueQPskrjnxKP lgQHDW/RkXAxdxHJdG30N0N+CIg1IIH/uDt0AEnfDoX6V/rDqd7mQMqJdrNBxodaIZW6 fUThtO+cY+RFm9mD9ZUYbmMKKfmEcCUwAP223RHyi8H+ZTGvRhU504BO+LqNeZ7HcV7g XDL/5ArPwx+A6sZ+HRDQ8BKxwYPcKKWw18bMzoC05Wb6LA1mOh2nd6Uj6vXw+iEfUPp2 5744OXXGdb+7YKcWejSk16boHDpxW+VgQtgl8/N5NL64bTygBh88hcbKug5w9AgGg/QY 8jEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=bb99+LvYC5t2G+e1OOcYpq0k4h6ket2j3+nIs8win8Y=; b=E+trtO64mfNqS9ezC8boHtp3mfhY1LyUK4aPcys/MBRUcBmGfZFdB3bp6Ef5BTzeJt oR4Yn2hMGDhBakfPbrnmiiVE7y3TkfxGoWx2Kuk2lnFrgqpWqDrbtPN0lWeNT1fe925S bLPht47BxY9kl8m4TU03Opy8tN+E88OPkqbUz4khZyxI8cUEnif3SQmC3PBwvfMWvcy6 gtgQJEjBQoIKTIlDivnRlsw05scKjl6TvJPLyL5oO1x1DZYmFvxRGi1sVdH2cVU94uQl SZTX62qqCqpLcVRFATHvc49p4+1B5OLRhqeuAFTli4xHDzaYcatkBV7wElBnO//KfmBY QfLA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j24-20020a63e758000000b0042a33a98315si17239470pgk.737.2022.10.06.06.44.26; Thu, 06 Oct 2022 06:44:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231139AbiJFNPQ (ORCPT + 99 others); Thu, 6 Oct 2022 09:15:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40980 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229548AbiJFNPN (ORCPT ); Thu, 6 Oct 2022 09:15:13 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 77FD79E0C4 for ; Thu, 6 Oct 2022 06:15:09 -0700 (PDT) Received: from ptz.office.stw.pengutronix.de ([2a0a:edc0:0:900:1d::77] helo=irc.pengutronix.de) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1ogQiM-00016t-Jp; Thu, 06 Oct 2022 15:15:02 +0200 Message-ID: Subject: Re: PROBLEM: Segfault in kconfig From: Johannes Zink To: masahiroy@kernel.org, linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org Cc: kernel@pengutronix.de Date: Thu, 06 Oct 2022 15:15:00 +0200 In-Reply-To: <33059074b78110d4717efe09b887dd28ac77fe7f.camel@pengutronix.de> References: <33059074b78110d4717efe09b887dd28ac77fe7f.camel@pengutronix.de> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.38.3-1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2a0a:edc0:0:900:1d::77 X-SA-Exim-Mail-From: j.zink@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi everyone, On Thu, 2022-09-22 at 18:01 +0200, Johannes Zink wrote: > Hi everyone, > > [1.] One line summary of the problem: >      kconfig crashes with segfault under rare circumstances > [2.] Full description of the problem/report: >      Under certain circumstances jump keys are displayed on the > search  >      results even if a symbol is deactivated by one of its  >      dependencies. Using the jump keys then triggers a segmentation >      fault due to a NULL dereference. Perform the following steps to  >      trigger the issue >      >      1.: ARCH=arm64 make defconfig >      2.: ARCH=arm64 make menuconfig > >      3.: press '/' key to search for the string "EFI". Use jump key  >          (1) to jump to search result. Press 'n' key to deactivate > the  >          entry.  >      4.: press '/' to seach for the string "ACPI". Use the jump key  >          (1) to jump to the search result.  > >      Menuconfig then crashes with a segfault. >     > [3.] Keywords (i.e., modules, networking, kernel): >      kconfig, mconf > [4.] Kernel information > [4.1.] Kernel version (from /proc/version): >        v6.0.0-rc6 > [4.2.] Kernel .config file: >        arm64 default defconfig > [5.] Most recent kernel version which did not have the bug: >      v5.15 > [6.] Output of Oops.. message (if applicable) with symbolic > information >      resolved (see Documentation/admin-guide/bug-hunting.rst): >      not applicable > [7.] A small shell script or example program which triggers the >      problem (if possible): >      not applicable, please see description in [2.] > [8.] Environment > [8.1.] Software (add the output of the ver_linux script here): >        not applicable > [8.2.] Processor information (from /proc/cpuinfo): >        not applicable > [8.3.] Module information (from /proc/modules): >        not applicable > [8.4.] Loaded driver and hardware information (/proc/ioports, > /proc/iomem): >        not applicable > [8.5.] PCI information ('lspci -vvv' as root): >        not applicable > [8.6.] SCSI information (from /proc/scsi/scsi): >        not applicable > [8.7.] Other information that might be relevant to the problem >        (please look in /proc and include all information that you >        think to be relevant): >        not applicable > [X.] Other notes, patches, fixes, workarounds: >     >      I found that the attached patch is a very hacky workaround to  >      keep menuconfig from crashing, but I am pretty sure the jump  >      keys should not have be activated for unaccessable entries in > the >      first place. I found it quite hard to find the corresponding > part >      in mconf, which is why I decided to send this bugreport instead  >      of sending a patch. Maybe someone on this list either knows > mconf  >      really well and can just fix it, or guide me to where I can dig  >      around (though in that case I could really use some help on how  >      to debug menuconfig, since I found it challenging to get it  >      working with gdb) >      > Best regards > Johannes > > --- > scripts/kconfig/mconf.c | 3 ++-                                       >  1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/scripts/kconfig/mconf.c b/scripts/kconfig/mconf.c        > index 9d3cf510562f..60a82f701bd3 100644                               > --- a/scripts/kconfig/mconf.c                                         > +++ b/scripts/kconfig/mconf.c                                         > @@ -447,7 +447,8 @@ static void search_conf(void)                     >                 again = false; >                 for (i = 0; i < JUMP_NB && keys[i]; i++) >                         if (dres == keys[i]) { > -                               conf(targets[i]->parent, targets[i]); > +                               if (targets[i]->parent)               > +                                       conf(targets[i]->parent, > targets[i]); >                                 again = true; >                         } >                 str_free(&res); > Just a gentle ping and TL;DR on this issue: Menuconfig crashes with a segfault if performing the steps 1.: ARCH=arm64 make defconfig 2.: ARCH=arm64 make menuconfig 3.: press '/' key to search for the string "EFI". Use jump key (1) to jump to search result. Press 'n' key to deactivate the entry. 4.: press '/' to seach for the string "ACPI". Use the jump key (1) to jump to the search result. For more details please see the detailed report in the original message. Has anyone any input on this? Best regards -- Pengutronix e.K. | Johannes Zink | Steuerwalder Str. 21 | https://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686| Fax: +49-5121-206917-5555 |