Hello,
I compiled xen-tools with GCC-4.3.3 with Stack Smashing Protection
(SSP) patches by gentoo, and found a small bug in
tools/python/lowlevel/xc/xc.c. The bug is located in
pyxc_dom_set_policy_cpuid:
(this is the change which fixes it:)
> @@ -808,7 +808,7 @@
> static PyObject *pyxc_dom_set_policy_cpuid(XcObject *self,
> PyObject *args)
> {
> - domid_t domid;
> + int domid;
>
> if ( !PyArg_ParseTuple(args, "i", &domid) )
> return NULL;
domid_t is defined as uint16_t (thus 2 bytes long) in xen header files,
but the "i" format needs a C "int" type, which is 4 bytes long.
(<URL:http://docs.python.org/c-api/arg.html>) This error is detected
by SSP as stack overflow.
Attached patch fixes the error. Maybe it would better to use "h"
format instead of the "i" format, which converts the argument to an C
"short int". Then you would have to change the python wrapper if
domid_t changes, though.
Please apply this patch or the change to the "h" format string (I
haven't tested it, but I believe it should work just as well).
Regards,
Milan Holzäpfel
--
Milan Holzaepfel <mail(a)mjh(d)name> <URL:http://mjh.name/>
pub 4096R/C790FC23 EB8E 5E81 81E3 53A9 9B74 B895 5179 54C0 C790 FC23
xen-3.4.1_fix_ssp_error.diff
Description: Text Data
pgpUbFyMVflld.pgp
Description: PGP signature
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|