With static analisys tools we found that strncpy() is used in rpmsg. This function is not safe and can lead to buffer overflow. This patchset replaces strncpy() with strscpy_pad().
Link: https://lore.kernel.org/all/20220519073330.7187-1-krzysztof.kozlowski@linaro...
Found by Linux Verification Center (linuxtesting.org) with SVACE.