Closed wmww closed 2 years ago
Ugh, thanks for the report! The /umockdev-testbed/uevent/action_overflow check is supposed to catch this, but doesn't. I'll investigate.
Ah wait, it does not actually segfault -- it's doing exactly as desired, aborting with that message before it segfaults phew. So indeed I only need to bump the buffer size.
Released as 0.17.6. I uploaded it to Debian unstable, so it should reach Ubuntu jammy over the weekend.
Thanks for the fast response!
Commit b781cf65d49dc18d6319fb783c5617a71134bbbd broke Mir's umockdev tests (https://github.com/MirServer/mir/issues/2285). We get this error:
In GDB, I tracked down the problem to calling
append_property()
with aname
that is too long for thesize
. On my machine, the name is (note that snaps I have installed seem to be included, no idea why):The length of that is 1281, just above the 1024 cap.