Re: [PATCH linux-next] um: use strscpy() is more robust and safer

2022-09-21 Thread kernel test robot
Hi, Thank you for the patch! Yet something to improve: [auto build test ERROR on next-20220920] url: https://github.com/intel-lab-lkp/linux/commits/cgel-zte-gmail-com/um-use-strscpy-is-more-robust-and-safer/20220921-173157 base:ef08d387bbbc20df740ced8caee0ffac835869ac config: um-i386_def

[PATCH linux-next] um: use strscpy() is more robust and safer

2022-09-21 Thread cgel . zte
From: ye xingchen The implementation of strscpy() is more robust and safer. That's now the recommended way to copy NUL terminated strings. Reported-by: Zeal Robot Signed-off-by: ye xingchen --- arch/um/os-Linux/umid.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/

Re: [PATCH linux-next] um: use strscpy() is more robust and safer

2022-09-21 Thread Geert Uytterhoeven
Hi Ye, On Wed, Sep 21, 2022 at 11:45 AM wrote: > From: ye xingchen > > The implementation of strscpy() is more robust and safer. > > That's now the recommended way to copy NUL terminated strings. > > Reported-by: Zeal Robot > Signed-off-by: ye xingchen Thanks for your patch! > --- a/arch/um/