apfs-dkms DKMS FTBFS wrt Linux 6.5
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux-apfs-rw (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
[Impact]
...
In file included from ./include/
In function ‘strcpy’,
inlined from ‘apfs_build_
inlined from ‘apfs_create_
inlined from ‘apfs_create_
./include/
798 | __write_overflow();
...
[Fix]
Apply the attached fix.
[How to test]
Install the patched package and make sure it builds.
[Regression potential]
High - the DKMS was broken in several ways:
1) __SOURCE_FORTIFY reported several out of bounds strcpy() - i switched all the strcpy() instances to the secure strscpy() version
2) blk_dev_get_*() switched exclusive access model so some logic had to be massaged
I pushed the fixes upstream so we get a second review (and in the mean time we unclock 6.5 promotion).
This bug was fixed in the package linux-apfs-rw - 0.3.2-0ubuntu2
---------------
linux-apfs-rw (0.3.2-0ubuntu2) mantic; urgency=medium
* debian/ patches/ 0001-linux- 6.5-substitute- strcpy- with-strscpy. patch, patches/ 0002-linux- 6.5-fix- blkdev_ get_by_ path-holder- and-superblo. patch:
debian/
- Fix Linux 6.5 (LP: #2029217)
-- Paolo Pisati <email address hidden> Tue, 01 Aug 2023 09:50:01 +0000