With static analisys tools we found that strncpy() is used in rpmsg. This
function is not safe and can lead to buffer overflow. This patchset
replaces strncpy() with strscpy_pad().
This patchset backports the following commit from v5.16:
commit 766279a8f85d ("rpmsg: qcom: glink: replace strncpy() with strscpy_pad()")
Link: https://lore.kernel.org/all/20220519073330.7187-1-krzysztof.kozlowski@linar…
Found by Linux Verification Center (linuxtesting.org) with SVACE.