ACK: [SRU][N/P/Q][PATCH 0/1] UBUNTU: SAUCE: selftests: net: fix "buffer overflow detected" for tap.c

Edoardo Canepa edoardo.canepa at canonical.com
Fri Dec 5 08:03:10 UTC 2025


Acked-by: Edoardo Canepa <edoardo.canepa at canonical.com>

On 12/5/25 05:42, Alice C. Munduruca wrote:
> BugLink: https://bugs.launchpad.net/bugs/2067642
>
> [ Impact ]
>
> Currently, the default enablement of `-D_FORTIFY_SOURCE=3` in gcc causes
> the kselftest net:tap test to fail due to an error in userspace. As this is not
> an issue with the kernel, the test itself is changed to no longer use a checked
> function (in this case using `memcpy`) to return to the previous behavior.
>
> [ Fix ]
>
> questing: replace the call to strcpy() with memcpy(), which is not checked.
> plucky: cleanly applied questing patch.
> noble: cleanly applied questing patch.
> jammy: Unaffected as the jammy toolchain doesn't enable this option.
>
> [ Test Plan ]
>
> Run the test before and after the patch and notice the difference.
>
> [ Regression Potential ]
>
> N/A, Kernel is not modified by this patch.
>
> Alice C. Munduruca (1):
>    UBUNTU: SAUCE: selftests: net: fix "buffer overflow detected" for
>      tap.c
>
>   tools/testing/selftests/net/tap.c | 2 +-
>   1 file changed, 1 insertion(+), 1 deletion(-)
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x20F88172E14F6784.asc
Type: application/pgp-keys
Size: 3167 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20251205/9cdb9c18/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20251205/9cdb9c18/attachment-0001.sig>


More information about the kernel-team mailing list