On Mon, 16 Feb 2026 18:01:30 +1100, Finn Thain wrote:
> Given CONFIG_FORTIFY_SOURCE=y and a recent compiler,
> commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when
> available") produces the warning below and an oops.
>
> Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000
> ------------[ cut here ]------------
> WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1
> memcmp: detected buffer overflow: 15 byte read of buffer size 14
> Modules linked in:
> CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE
>
> [...]
Applied to mtd/fixes, thanks!
[1/1] mtd: Avoid boot crash in RedBoot partition table parser
commit: 8e2f8020270af7777d49c2e7132260983e4fc566
Patche(s) should be available on mtd/linux.git and will be
part of the next PR (provided that no robot complains by then).
Kind regards,
Miquèl