APPLIED: [SRU][N/Q][PATCH 0/1] Fix net:tap.c error "buffer overflow detected"
Stefan Bader
stefan.bader at canonical.com
Fri Jan 23 16:06:54 UTC 2026
On 07/01/2026 19:21, Alice C. Munduruca wrote:
> [ Impact ]
>
> Currently the kernel testing infrastructure fails consistently
> on net:tap.c, since our C toolchain defaults to
> `-D_FORTIFY_SOURCE=3`. This causes some issues when checked
> functions such as strcpy() are used on kernel objects which do
> not match the standard object model expected by the glibc checked
> functions.
>
> Use an unchecked function such as memcpy() instead so that none
> of the issues described above manifest.
>
> [ Fix ]
>
> resolute: Will be pulled in from upstream
> questing: Cherry picked from 6.19-rc4
> noble: Cherry picked from 6.19-rc4
> jammy: N/A
>
> [ Tests ]
>
> Compiled and pass-tested on amd64.
>
> [ Where problems could occur ]
>
> No real kernel regression potential as this is a kselftest,
> although, since the original test author did not respond for
> comment during the patch review process, it is possible that
> the merge of `rtattr_add_str` and `rtattr_add_strsz` would
> cause some issues, although this is discussed in the commit
> message.
>
> Alice C. Munduruca (1):
> selftests: net: fix "buffer overflow detected" for tap.c
>
> tools/testing/selftests/net/tap.c | 16 +++++-----------
> 1 file changed, 5 insertions(+), 11 deletions(-)
>
Applied to questing,noble:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 52669 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260123/d6b69959/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260123/d6b69959/attachment-0001.sig>
More information about the kernel-team
mailing list