On 07.07.2021 17:54, Rroach wrote:
> Hi, sorry about the late respond. I tried your suggestion, it works. I'm kind
> of surprised too, since such problem should exposed long time ago.
>
>
> I looked deep into your suggestion. I believe you were right about it, since
> p - ctxt->io_emul_stub w
Hi, sorry about the late respond. I tried your suggestion, it works. I'm kind
of surprised too, since such problem should exposed long time ago.
I looked deep into your suggestion. I believe you were right about it, since p
- ctxt->io_emul_stub won't overflow and the pointer overflow is likel
by a few bytes.
Would you mind giving the alternative suggestion a try as well?
Jan
> -- Original --
> From: "Andrew Cooper"; Send time: Saturday, Jun 26, 2021 9:50 PM
> To: "Rroach"<2284696...@qq.com>;
> "xen-devel&quo
After patching it, this works fine and UBSAN dose not have any error report
about it.
-- Original --
From: "Andrew Cooper";
On 26/06/2021 14:29, Rroach wrote:
> Hi, I compile Xen-4.13 with CONFIG_UBSAN, and try test it. However,
> during testing, xl dmesg got the output as shown below.
>
> It seems that there is a potential pointer overflow within
> arch/x86/pv/emul-priv-op.c:131 where xen try to execute instruction
> '
Hi, I compile Xen-4.13 with CONFIG_UBSAN, and try test it. However, during
testing, xl dmesg got the output as shown below.
It seems that there is a potential pointer overflow within
arch/x86/pv/emul-priv-op.c:131 where xen try to execute instruction '''
APPEND_CALL(save_guest_gprs) '''??where