[{"id":3677160,"web_url":"http://patchwork.ozlabs.org/comment/3677160/","msgid":"<ee9eedaa-adff-45f7-8978-027c1bbc3616@linaro.org>","list_archive_url":null,"date":"2026-04-14T12:04:57","subject":"Re: [PATCH-for-11.0?] util/cutils: Fix heap corruption under Windows","submitter":{"id":85046,"url":"http://patchwork.ozlabs.org/api/people/85046/","name":"Philippe Mathieu-Daudé","email":"philmd@linaro.org"},"content":"On 14/4/26 13:40, Bernhard Beschow wrote:\n> Under Windows, QEMU would only sporadically start successfully. In the\n> G_OS_WIN32 case, get_relocated_path() first determines a cursor\n> to the end of the \"result\" string and then increases its size with\n> g_string_set_size(). Since g_string_set_size() may reallocate, the\n> cursor may become dangling. Windows may detect this and crash the QEMU\n> process with the following message:\n> \n>    HEAP: Free Heap block 000000000499B640 modified at 000000000499B684 after it was freed\n> \n> Furthermore, QEMU crashes spontaneously, even long after the guest has\n> booted. For example, it presumably chrashes due to the guest setting a\n\n(Typo \"crashes\")\n\n> new cursor icon which may be a result of the heap corruption.\n> \n> Fix this by determining the cursor on the resized string.\n> \n> Fixes: cf60ccc3306c (\"cutils: Introduce bundle mechanism\")\n> Cc: qemu-stable@nongnu.org\n> Signed-off-by: Bernhard Beschow <shentey@gmail.com>\n> ---\n>   util/cutils.c | 3 ++-\n>   1 file changed, 2 insertions(+), 1 deletion(-)\n> \n> diff --git a/util/cutils.c b/util/cutils.c\n> index 9803f11a59..76a9442085 100644\n> --- a/util/cutils.c\n> +++ b/util/cutils.c\n> @@ -1165,9 +1165,10 @@ char *get_relocated_path(const char *dir)\n>   \n>           PCWSTR wdir_skipped_root;\n>           if (PathCchSkipRoot(wdir, &wdir_skipped_root) == S_OK) {\n> +            char *cursor;\n>               size = wcsrtombs(NULL, &wdir_skipped_root, 0, &(mbstate_t){0});\n> -            char *cursor = result->str + result->len;\n>               g_string_set_size(result, result->len + size);\n> +            cursor = result->str + result->len - size;\n>               wcsrtombs(cursor, &wdir_skipped_root, size + 1, &(mbstate_t){0});\n>           } else {\n>               g_string_append(result, dir);\n\nReviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=diwlJfcU;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fw2zb4ZLRz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 14 Apr 2026 22:05:45 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wCcW0-0000X3-A1; Tue, 14 Apr 2026 08:05:14 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wCcVw-0000Va-TK\n for qemu-devel@nongnu.org; Tue, 14 Apr 2026 08:05:08 -0400","from mail-wm1-x333.google.com ([2a00:1450:4864:20::333])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wCcVt-00043P-Lw\n for qemu-devel@nongnu.org; Tue, 14 Apr 2026 08:05:08 -0400","by mail-wm1-x333.google.com with SMTP id\n 5b1f17b1804b1-488c21c636dso33082145e9.2\n for <qemu-devel@nongnu.org>; Tue, 14 Apr 2026 05:05:00 -0700 (PDT)","from [192.168.69.228] (88-187-86-199.subs.proxad.net.\n [88.187.86.199]) by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-488ede2ba5asm42744725e9.12.2026.04.14.05.04.57\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Tue, 14 Apr 2026 05:04:58 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1776168299; x=1776773099; darn=nongnu.org;\n h=content-transfer-encoding:in-reply-to:from:references:cc:to\n :content-language:subject:user-agent:mime-version:date:message-id\n :from:to:cc:subject:date:message-id:reply-to;\n bh=Uw1fSUlyZLJQXq4DfFQbBLS5c3ny+bylAif3wFUdwy0=;\n b=diwlJfcUEWshGyYRSeMmutmlBZl2BUxls5SPr21ya50TsSppND1i9WBz/mZNFXZriK\n iDHq8lhwEit53bdf/BC03G0+1U5IMQWUBKZmSCtTbg2BzxBpXPf16Fk9apfxX8D11hHu\n c9KPNt05DWGcHjqf392r37BVUvejsbUMLaE1TSv67eMWMBvXXqNxKDddbJRyinZaF2LX\n vMM32NABH0VppxfgIYX424AScKXZD/gjUpN9XHbwafnPQNG/QAcXTaVUP+sz4MA1dQwu\n /gvOiCksBITPaUual4zb+LBcRXKSteDzidsNX7Cgww10A8DaYXaF8GUfxz7IRF+INNFp\n T7Gg==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776168299; x=1776773099;\n h=content-transfer-encoding:in-reply-to:from:references:cc:to\n :content-language:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=Uw1fSUlyZLJQXq4DfFQbBLS5c3ny+bylAif3wFUdwy0=;\n b=H+DrvQ39nETQMVcJZdHceNpKYn6tuFeXVrGEO786VyzN/yrvpagepaFqVz9cr8HVwD\n aPLcoKTQQQFmZU18/EU7+misc26j7kht+7W2/jkIt0WMwEMnS6xE0L7q3cP3/zKk/H2A\n NG/1IfgUo8reH9bqPB32ypCzMMwCUFMOKfuW+F0nVHnGxYfAr1neJlkL8Qr963vq1p4D\n YPhrVszBijj0hWBQR669/YacwaPXn72D+UB/KimsbgjioInMKCFlXvQk4MWrJMVi0rgg\n qzJmyZWcAEpE+7oeMGMXeYGTFQgIHolILq8LgP6kSclTaVrss8Zm2l8oVz4MCyIn/yon\n V3dw==","X-Forwarded-Encrypted":"i=1;\n AFNElJ9ACHfoJeigg8YtvtI8WX62smVBcmUio4sLEVEzrywZnOKwLRrclUM9qRzN/zblFTYrBCSKOPCY2lUZ@nongnu.org","X-Gm-Message-State":"AOJu0YzZ7LBsSdEJ2DykLwhe+bv83U37/XqU4CkT9EpN8W/Wv1/aEkcV\n LjMjz+XvTj+r/JS3yNJoU3ABeYS+ACgiLk8iCNMEuIOZwHq6ZXPfnFL+xsK9Xl5p2sI=","X-Gm-Gg":"AeBDietK3PliS1n1OFYuS1c34g+lenDy9HyS4msn5aR1jJG0rGf/kq66H62JMCaHAT6\n ziiQk785wNuNJmdvP2xGpTxktr14gorn4doGcw905W7qCHGPaDFPNEH8yMAxekW6JNkHFxdJuz0\n nTdYXHsM5YPkCpFIutQuKnhCTcPTwQHxocNwgf2YmQbS7wucV/eeEKg/CCTFxVOxEDj/wLrsvTC\n V/jv4D/GLvrzcCH7e7jsmNDumPAryWS4/1WGdrVofGKm8Df91WFPrvg3pZxpALFXFnVhjBoKHCo\n PqKVg8uI8B4NgVv9glM21lJZyvElk4S1Ko1WFAX+jkVgVv/kjJKqpoQ696X3XdZIpXp+A7GcZ8N\n PP+avJFBnfS8QAM85XKepyVEs0T8pLeUkgci/UiJW3AaD6AqpduhipLHwuKfzc6rdz9myJ71VfK\n F4FPTn90Qr8Vwzl+X2C4CODqUyHGrKKNtzBvkpXEKus69AqvehjAAj1E8UMFOo+g9+TQ==","X-Received":"by 2002:a05:600c:5306:b0:487:59c:2bb8 with SMTP id\n 5b1f17b1804b1-488d68c3385mr234895335e9.27.1776168299337;\n Tue, 14 Apr 2026 05:04:59 -0700 (PDT)","Message-ID":"<ee9eedaa-adff-45f7-8978-027c1bbc3616@linaro.org>","Date":"Tue, 14 Apr 2026 14:04:57 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH-for-11.0?] util/cutils: Fix heap corruption under Windows","Content-Language":"en-US","To":"Bernhard Beschow <shentey@gmail.com>, qemu-devel@nongnu.org","Cc":"Stefan Weil <sw@weilnetz.de>, Peter Maydell <peter.maydell@linaro.org>,\n Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>, qemu-stable@nongnu.org","References":"<20260414114033.2360-1-shentey@gmail.com>","From":"=?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>","In-Reply-To":"<20260414114033.2360-1-shentey@gmail.com>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=2a00:1450:4864:20::333;\n envelope-from=philmd@linaro.org; helo=mail-wm1-x333.google.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}},{"id":3677162,"web_url":"http://patchwork.ozlabs.org/comment/3677162/","msgid":"<2dd7e121-bf3f-4ce7-9a1f-fb54369be27b@rsg.ci.i.u-tokyo.ac.jp>","list_archive_url":null,"date":"2026-04-14T12:07:31","subject":"Re: [PATCH] util/cutils: Fix heap corruption under Windows","submitter":{"id":90980,"url":"http://patchwork.ozlabs.org/api/people/90980/","name":"Akihiko Odaki","email":"odaki@rsg.ci.i.u-tokyo.ac.jp"},"content":"On 2026/04/14 20:40, Bernhard Beschow wrote:\n> Under Windows, QEMU would only sporadically start successfully. In the\n> G_OS_WIN32 case, get_relocated_path() first determines a cursor\n> to the end of the \"result\" string and then increases its size with\n> g_string_set_size(). Since g_string_set_size() may reallocate, the\n> cursor may become dangling. Windows may detect this and crash the QEMU\n> process with the following message:\n> \n>    HEAP: Free Heap block 000000000499B640 modified at 000000000499B684 after it was freed\n> \n> Furthermore, QEMU crashes spontaneously, even long after the guest has\n> booted. For example, it presumably chrashes due to the guest setting a\n> new cursor icon which may be a result of the heap corruption.\n> \n> Fix this by determining the cursor on the resized string.\n> \n> Fixes: cf60ccc3306c (\"cutils: Introduce bundle mechanism\")\n> Cc: qemu-stable@nongnu.org\n> Signed-off-by: Bernhard Beschow <shentey@gmail.com>\n\nReviewed-by: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>\n\nRegards,\nAkihiko Odaki","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"key not found in DNS\" header.d=rsg.ci.i.u-tokyo.ac.jp\n header.i=@rsg.ci.i.u-tokyo.ac.jp header.a=rsa-sha256 header.s=rs20250326\n header.b=UMeYf3Ke;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fw32X0mxHz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 14 Apr 2026 22:08:20 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wCcYd-00018O-Dw; Tue, 14 Apr 2026 08:07:55 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <odaki@rsg.ci.i.u-tokyo.ac.jp>)\n id 1wCcYX-00017N-O8; Tue, 14 Apr 2026 08:07:49 -0400","from www3579.sakura.ne.jp ([49.212.243.89])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <odaki@rsg.ci.i.u-tokyo.ac.jp>)\n id 1wCcYU-0004YB-An; Tue, 14 Apr 2026 08:07:49 -0400","from [133.11.54.205] (h205.csg.ci.i.u-tokyo.ac.jp [133.11.54.205])\n (authenticated bits=0)\n by www3579.sakura.ne.jp (8.16.1/8.16.1) with ESMTPSA id 63EC7Wl1012152\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO);\n Tue, 14 Apr 2026 21:07:32 +0900 (JST)\n (envelope-from odaki@rsg.ci.i.u-tokyo.ac.jp)"],"DKIM-Signature":"a=rsa-sha256; bh=mfOgw5mTj1Qi2eJsbdXXZOurFL7eVXpYI+Qc6aNj0PY=;\n c=relaxed/relaxed; d=rsg.ci.i.u-tokyo.ac.jp;\n h=From:Message-ID:To:Subject:Date;\n s=rs20250326; t=1776168452; v=1;\n b=UMeYf3KeJDV6IYdpmzDOxj/+0ihOuvp0CyeVfqIa5rKo+Dg+5LVGbXTS2DOtMxGm\n Ge5dvYxIrGKQi1nO9FGfw4ysOLrzgveDVgVYc8TR+ACHi7Z01LY5djGTblKw6Cu7\n GBBkoez2PoTVuigmivjP0wFU1caW1M1vhfZVu3eCVrxWHlEJ64+tQDcHvDBWl5Df\n oQEDVtcasNU3vgKIY3B7r+bfMaIui/CO6kdCOhheqrlteV24bUv58Eues2xGzOZC\n EkuEf6dycwG/be+YXpzt7RHp4WFHWOGJ70B3EjhMlImpkJgdInkvNVDp41++4tbW\n kBXukcXQHZ57iLpgFTt7iQ==","Message-ID":"<2dd7e121-bf3f-4ce7-9a1f-fb54369be27b@rsg.ci.i.u-tokyo.ac.jp>","Date":"Tue, 14 Apr 2026 21:07:31 +0900","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH] util/cutils: Fix heap corruption under Windows","To":"Bernhard Beschow <shentey@gmail.com>, qemu-devel@nongnu.org","Cc":"Stefan Weil <sw@weilnetz.de>, Peter Maydell <peter.maydell@linaro.org>,\n qemu-stable@nongnu.org","References":"<20260414114033.2360-1-shentey@gmail.com>","Content-Language":"en-US","From":"Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>","In-Reply-To":"<20260414114033.2360-1-shentey@gmail.com>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"7bit","Received-SPF":"pass client-ip=49.212.243.89;\n envelope-from=odaki@rsg.ci.i.u-tokyo.ac.jp; helo=www3579.sakura.ne.jp","X-Spam_score_int":"-16","X-Spam_score":"-1.7","X-Spam_bar":"-","X-Spam_report":"(-1.7 / 5.0 requ) BAYES_00=-1.9, DKIM_INVALID=0.1,\n DKIM_SIGNED=0.1, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001,\n RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=no autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}},{"id":3677270,"web_url":"http://patchwork.ozlabs.org/comment/3677270/","msgid":"<CAFEAcA8DqYBwwNNz=ua0q8WKq+qc2qbnhY+CDurCz3fx1TH_yw@mail.gmail.com>","list_archive_url":null,"date":"2026-04-14T15:33:27","subject":"Re: [PATCH] util/cutils: Fix heap corruption under Windows","submitter":{"id":5111,"url":"http://patchwork.ozlabs.org/api/people/5111/","name":"Peter Maydell","email":"peter.maydell@linaro.org"},"content":"On Tue, 14 Apr 2026 at 12:40, Bernhard Beschow <shentey@gmail.com> wrote:\n>\n> Under Windows, QEMU would only sporadically start successfully. In the\n> G_OS_WIN32 case, get_relocated_path() first determines a cursor\n> to the end of the \"result\" string and then increases its size with\n> g_string_set_size(). Since g_string_set_size() may reallocate, the\n> cursor may become dangling. Windows may detect this and crash the QEMU\n> process with the following message:\n>\n>   HEAP: Free Heap block 000000000499B640 modified at 000000000499B684 after it was freed\n>\n> Furthermore, QEMU crashes spontaneously, even long after the guest has\n> booted. For example, it presumably chrashes due to the guest setting a\n> new cursor icon which may be a result of the heap corruption.\n>\n> Fix this by determining the cursor on the resized string.\n>\n> Fixes: cf60ccc3306c (\"cutils: Introduce bundle mechanism\")\n> Cc: qemu-stable@nongnu.org\n> Signed-off-by: Bernhard Beschow <shentey@gmail.com>\n\nThanks -- this isn't strictly a regression from 10.2 but it seems\nworth getting into rc4, and the fix is clear and small, so I'm\ngoing to apply it to git.\n\n-- PMM","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=OGRiNil2;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fw7cH1dNbz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 15 Apr 2026 01:34:23 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wCfm3-0008Ja-01; Tue, 14 Apr 2026 11:33:59 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <peter.maydell@linaro.org>)\n id 1wCfln-0008FD-89\n for qemu-devel@nongnu.org; Tue, 14 Apr 2026 11:33:47 -0400","from mail-yx1-xb132.google.com ([2607:f8b0:4864:20::b132])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <peter.maydell@linaro.org>)\n id 1wCflk-0002PH-T3\n for qemu-devel@nongnu.org; Tue, 14 Apr 2026 11:33:42 -0400","by mail-yx1-xb132.google.com with SMTP id\n 956f58d0204a3-651d692e833so1814531d50.3\n for <qemu-devel@nongnu.org>; Tue, 14 Apr 2026 08:33:40 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; t=1776180819; cv=none;\n d=google.com; s=arc-20240605;\n b=CuV7cAh8pvSv1m0FmxoklSW11P2xZb8Nqs13GPRxz7wSIlak/U6+hwjRFrp/Zd0hy7\n 00WkmeI3mXe/3nPWk5h8Os6xqRkI0O9Lk/VPu+XV4mmg2ym3F8nmuSVBS3nq9dA4S+dv\n 8Gvrs3m8kjuQgfakx5uSUYVAliCLVoDe16nTipcfx7z1p9Kc1AsUburcx4wzruKDQGCz\n PhtS1+3XNF9pL/NNf5z0ymiLNI2malBTwDGkZE5xSq70aCwPHEEgLvFeVNj/00didPV7\n M5heeM777N2gzkzqszqFV59f+f8HIfeG00AG4iknePEXs38B/cJvxuZqQ3/ngW6z9RDA\n Yuig==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:dkim-signature;\n bh=JqlTNKeKRP1EGbnPDrIlwmasHcPhUiheVy+T0tzWyuo=;\n fh=deni8HxXlep4Bc6IVKDjGikudT6zI4MmdGbZ9bUiORo=;\n b=Y7QO7HeL5h3Vf9dYufwPreDi2hru02D+DwPYbsjc/3msfSDQVtZ87Ry+xdo3PyQl9H\n CT+/a3KdzRdhq6AWOd3zw3iNv95k+PrPvPookyle2FkrwAwj3KTI5jcPeAH3ykr0TPOr\n a5q28p5vq8/6c98IAaqYv2PxV+YoG1H8nrvjq53n/sOBnITWjm1nRGC4sjMDKhP25fS5\n LEYWpNeahh+Qlv9zGJqJ4oKwTNQzbgd85D/4Hn8euUhRkOXJuwNYPEXrQs3k3ppswjVk\n RI+Hlz0XiMjFlBqoIskdPKX2ltF/fKJTF6Nh4+Zdl6S1lmtDV9NbpC5UoehoX1Ifl35P\n lmbg==; darn=nongnu.org","ARC-Authentication-Results":"i=1; mx.google.com; arc=none","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1776180819; x=1776785619; darn=nongnu.org;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:from:to:cc:subject:date:message-id:reply-to;\n bh=JqlTNKeKRP1EGbnPDrIlwmasHcPhUiheVy+T0tzWyuo=;\n b=OGRiNil2/LBhBJYuVQNJbJiZKUBWaSBynaFalPi0csG+gWU8DyH1wLubiwutuouJR5\n 7aJc5pMQGz34Rucuyyl6c5tSODrcm1gGC6qE7g+ail/NSEYUANdQldKqQvuiyRaIjUge\n 06tr4FTBloi0BHmitbk4lYMu3kHTSPb0gQI0yTL8dMde5qnr5Uf9Ax+UveRqCn4qzVT/\n TEYBcMwzE/jh4PxyJR9dLoTY6CWGyVf83/ZiMCMXjy8IjHXblDFO9oLTydh7KRw/m4Q6\n 0X6JDdkPzcttxJOS94tntX0XkB2irxy4BEGIdjKexQusyzeYyW8a/Y511YjRAwRSTomh\n MUgw==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776180819; x=1776785619;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=JqlTNKeKRP1EGbnPDrIlwmasHcPhUiheVy+T0tzWyuo=;\n b=QqTBmPCk8uNQ31tFl25eGyQerYRozB1Ne43QTZ5xep+4WTbuT8wG4dyEpvpHt07eSl\n 7SIZ6isWxOjT9DcboUptj8mXiIyxyqZsMjfB5OpspNRqxDw3qwQomI0msPhZ91ybJR8X\n vEkkSkbXx66v24ynua3Nl2AimKn6u8FSkgKI70t/Jv3JyIb34Txxwwv3PPtvB9BVZgOV\n tKBL/yd9EkUhNp6S8XPEu1KYxWFIZzWYilfYGLhMXc9VnZhCGAxjbBB878OItcnIFUpk\n 4ptfar+aMlRv94savyefG3bCTBzGKPCvn6sHpSQkJEsyvIEtI3gA8ExqpW+Idi0EbHad\n fhfg==","X-Gm-Message-State":"AOJu0Yx7BF+hUpK/+eMmH5weqXHgJtBktk5FxZdpz3N9ILn6QGGH0YJ+\n cEsP2db8evmZT6ajIbUVbnCQUvUh9n/kPzxZBO2o6ZCLRKnhIWaO8bD6Vbv35FXY1F2zQFikeOx\n /X83vTxAYsVD77xdA9KK2v4WepQjKNOc4kbtDoDejLA==","X-Gm-Gg":"AeBDievLaMzJe8Cp2FcrDxh36Cwum9KOj78Nu8rE7+q6/Qnim91Sa7OOVJTovo8Y43P\n iB3K+4COykVgEbbT0e2NzMvr0KuCvcetKkhs6Vm5LmqBRBYhQaAAIjBVnkIAyYljwxAnK+fEELY\n PJlS1ZrSnFsyUPUbdZAhpP6L1IcSBO5D1qE/h9f4UryKz5STqP94vVLIXNdcFQFDiu7S/+zHzES\n KLsdLvRB25DwEiifmkaPTiLjd4Jz0Tr/BpkcZ6/YAxjWzCcn36D9p8pXxs3Fo1RKmXvPf5srKRa\n 5MdJvNZOpY9JVX/iFishX4/2J/dAZiQWZkrsC45usyhcHiWuHFeqz0mGVRiDKc2DYqA=","X-Received":"by 2002:a05:690e:e88:b0:651:bf32:de6 with SMTP id\n 956f58d0204a3-651bf321462mr9620108d50.54.1776180819161; Tue, 14 Apr 2026\n 08:33:39 -0700 (PDT)","MIME-Version":"1.0","References":"<20260414114033.2360-1-shentey@gmail.com>","In-Reply-To":"<20260414114033.2360-1-shentey@gmail.com>","From":"Peter Maydell <peter.maydell@linaro.org>","Date":"Tue, 14 Apr 2026 16:33:27 +0100","X-Gm-Features":"AQROBzAShnZi1-pS8ZX_X7tflRIetS03e8NXhZvcBB1PGzv7p3MX1WaKFNlsfow","Message-ID":"\n <CAFEAcA8DqYBwwNNz=ua0q8WKq+qc2qbnhY+CDurCz3fx1TH_yw@mail.gmail.com>","Subject":"Re: [PATCH] util/cutils: Fix heap corruption under Windows","To":"Bernhard Beschow <shentey@gmail.com>","Cc":"qemu-devel@nongnu.org, Stefan Weil <sw@weilnetz.de>,\n Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>, qemu-stable@nongnu.org","Content-Type":"text/plain; charset=\"UTF-8\"","Received-SPF":"pass client-ip=2607:f8b0:4864:20::b132;\n envelope-from=peter.maydell@linaro.org; helo=mail-yx1-xb132.google.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}}]