Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Thu, 7 Apr 2022 16:04:45 -0700 you wrote: > Coverity static analyzer complains that strcpy() can cause buffer > overflow. Use libbpf_strlcpy() instead to be 100% sure this doesn't > happen. > > Signed-off-by: Andrii Nakryiko <andrii@xxxxxxxxxx> > --- > tools/lib/bpf/usdt.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) Here is the summary with links: - [bpf-next,1/2] libbpf: use strlcpy() in path resolution fallback logic https://git.kernel.org/bpf/bpf-next/c/3c0dfe6e4c43 - [bpf-next,2/2] libbpf: allow WEAK and GLOBAL bindings during BTF fixup https://git.kernel.org/bpf/bpf-next/c/3a06ec0a996d You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html