On Mon, 16 Feb 2026 18:01:30 +1100, Finn Thain wrote:
> Given CONFIG_FORTIFY_SOURCE=y and a recent compiler,
> commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when
> available") produces the warning below and an oops.
> 
>     Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000
>     ------------[ cut here ]------------
>     WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1
>     memcmp: detected buffer overflow: 15 byte read of buffer size 14
>     Modules linked in:
>     CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE
> 
> [...]

Applied to mtd/fixes, thanks!

[1/1] mtd: Avoid boot crash in RedBoot partition table parser
      commit: 8e2f8020270af7777d49c2e7132260983e4fc566

Patche(s) should be available on mtd/linux.git and will be
part of the next PR (provided that no robot complains by then).

Kind regards,
Miquèl


Reply via email to