The patch titled Subject: relay: use strscpy() is more robust and safer has been added to the -mm mm-nonmm-unstable branch. Its filename is relay-use-strscpy-is-more-robust-and-safer.patch This patch will shortly appear at https://git.kernel.org/pub/scm/linux/kernel/git/akpm/25-new.git/tree/patches/relay-use-strscpy-is-more-robust-and-safer.patch This patch will later appear in the mm-nonmm-unstable branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next via the mm-everything branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm and is updated there every 2-3 working days ------------------------------------------------------ From: Xu Panda <xu.panda@xxxxxxxxxx> Subject: relay: use strscpy() is more robust and safer Date: Tue, 22 Nov 2022 08:53:25 +0800 (CST) The implementation of strscpy() is more robust and safer. That's now the recommended way to copy NUL terminated strings. Link: https://lkml.kernel.org/r/202211220853259244666@xxxxxxxxxx Signed-off-by: Xu Panda <xu.panda@xxxxxxxxxx> Signed-off-by: Yang Yang <yang.yang29@xxxxxxx> Cc: Colin Ian King <colin.i.king@xxxxxxxxx> Cc: Jens Axboe <axboe@xxxxxxxxx> Cc: wuchi <wuchi.zero@xxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- kernel/relay.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/kernel/relay.c~relay-use-strscpy-is-more-robust-and-safer +++ a/kernel/relay.c @@ -507,7 +507,7 @@ struct rchan *relay_open(const char *bas chan->private_data = private_data; if (base_filename) { chan->has_base_filename = 1; - strlcpy(chan->base_filename, base_filename, NAME_MAX); + strscpy(chan->base_filename, base_filename, NAME_MAX); } chan->cb = cb; kref_init(&chan->kref); @@ -578,7 +578,7 @@ int relay_late_setup_files(struct rchan if (!chan || !base_filename) return -EINVAL; - strlcpy(chan->base_filename, base_filename, NAME_MAX); + strscpy(chan->base_filename, base_filename, NAME_MAX); mutex_lock(&relay_channels_mutex); /* Is chan already set up? */ _ Patches currently in -mm which might be from xu.panda@xxxxxxxxxx are relay-use-strscpy-is-more-robust-and-safer.patch