strcpy(3) does not guarantee any particular outcome for aliasing
violations in dst/src. Furthermore, _FORTIFY_SOURCE will outright
abort. Switch to memmove(3) for an overlap-safe copy.
While we're here, improve the readability slightly by giving cp a
more sensible name, and using sizeof() for the gethostname(3) buffer
size to formalize our assumption that we still have room for us to
NUL-terminate the buffer to be safe.
Sponsored by: Klara, Inc.
Sponsored by: Stormshield