Re: A possible pointer_overflow in xen-4.13

2021-07-07 Thread Jan Beulich
On 07.07.2021 17:54, Rroach wrote: > Hi, sorry about the late respond. I tried your suggestion, it works. I'm kind > of surprised too, since such problem should exposed long time ago.  > > > I looked deep into your suggestion. I believe you were right about it, since > p - ctxt->io_emul_stub  w

Re: A possible pointer_overflow in xen-4.13

2021-07-07 Thread Rroach
Hi, sorry about the late respond. I tried your suggestion, it works. I'm kind of surprised too, since such problem should exposed long time ago.  I looked deep into your suggestion. I believe you were right about it, since p - ctxt->io_emul_stub  won't overflow and the pointer overflow is likel

Re: A possible pointer_overflow in xen-4.13

2021-07-07 Thread Jan Beulich
by a few bytes. Would you mind giving the alternative suggestion a try as well? Jan > -- Original -- > From:  "Andrew Cooper"; Send time: Saturday, Jun 26, 2021 9:50 PM > To: "Rroach"<2284696...@qq.com>; > "xen-devel&quo

Re: A possible pointer_overflow in xen-4.13

2021-07-06 Thread Rroach
After patching it, this works fine and UBSAN dose not have any error report about it. -- Original -- From:  "Andrew Cooper";

Re: A possible pointer_overflow in xen-4.13

2021-06-26 Thread Andrew Cooper
On 26/06/2021 14:29, Rroach wrote: > Hi, I compile Xen-4.13 with CONFIG_UBSAN, and try test it. However, > during testing, xl dmesg got the output as shown below. > > It seems that there is a potential pointer overflow within > arch/x86/pv/emul-priv-op.c:131 where xen try to execute instruction > '

A possible pointer_overflow in xen-4.13

2021-06-26 Thread Rroach
Hi, I compile Xen-4.13 with CONFIG_UBSAN, and try test it. However, during testing, xl dmesg got the output as shown below. It seems that there is a potential pointer overflow within arch/x86/pv/emul-priv-op.c:131 where xen try to execute instruction ''' APPEND_CALL(save_guest_gprs) '''??where