Re: A possible pointer_overflow in xen-4.13

2021-07-07 Thread Rroach
Hi, sorry about the late respond. I tried your suggestion, it works. I'm kind of surprised too, since such problem should exposed long time ago.  I looked deep into your suggestion. I believe you were right about it, since p - ctxt->io_emul_stub  won't overflow and the pointer overflow is likel

Re: A possible pointer_overflow in xen-4.13

2021-07-06 Thread Rroach
After patching it, this works fine and UBSAN dose not have any error report about it. -- Original -- From:  "Andrew Cooper";

A mismatched type error found

2021-06-26 Thread Rroach
Hi, when I look the source code in Xen-4.15 source code, I found a type mismatch. In detailed, in xen/arch/x86/msi.c:find_msi_entry, there is a comparison between entry->msi_attrib.type and cap_id. However, according to the definition, the type appears to be __u8, where is a char variable, and

A possible pointer_overflow in xen-4.13

2021-06-26 Thread Rroach
Hi, I compile Xen-4.13 with CONFIG_UBSAN, and try test it. However, during testing, xl dmesg got the output as shown below. It seems that there is a potential pointer overflow within arch/x86/pv/emul-priv-op.c:131 where xen try to execute instruction ''' APPEND_CALL(save_guest_gprs) '''??where

Locate a memory leak in tools modules

2020-11-28 Thread Rroach
Hi, I'm attempting to use address sanitizer in locating bugs in Xen 4-13, while use address sanitizer in tools modules, while I ran some basic instructions like xl, Xen report such bug: = ==2863==ERROR: LeakSanitizer: detected memory

help

2020-11-28 Thread Rroach
Hi, I'm attempting to use address sanitizer in locating bugs in Xen 4-13, while use address sanitizer in tools modules, while I ran some basic instructions like xl, Xen report such bug: = ==2863==ERROR: LeakSanitizer: detected memory