target: Fix incorrect strlen() NULL terminator checks
This patch fixes a number of cases in target core using an incorrectly if (strlen(foo) > SOME_MAX_SIZE) As strlen() returns the number of characters in the string not counting the NULL character at the end. So if you do something like: char buf[10]; if (strlen("0123456789") > 10) return -ETOOLONG; snprintf(buf, 10, "0123456789"); printf("%s\n", buf); then the last "9" gets chopped off and only "012345678" is printed. Plus I threw in one small related cleanup. Signed-off-by: Dan Carpenter <error27@gmail.com> Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
This commit is contained in:

committed by
Nicholas Bellinger

parent
5eff5be0b1
commit
60d645a4e9
@@ -1143,7 +1143,7 @@ static ssize_t tcm_loop_tpg_store_nexus(
|
||||
* the fabric protocol_id set in tcm_loop_make_scsi_hba(), and call
|
||||
* tcm_loop_make_nexus()
|
||||
*/
|
||||
if (strlen(page) > TL_WWN_ADDR_LEN) {
|
||||
if (strlen(page) >= TL_WWN_ADDR_LEN) {
|
||||
printk(KERN_ERR "Emulated NAA Sas Address: %s, exceeds"
|
||||
" max: %d\n", page, TL_WWN_ADDR_LEN);
|
||||
return -EINVAL;
|
||||
@@ -1324,7 +1324,7 @@ struct se_wwn *tcm_loop_make_scsi_hba(
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
check_len:
|
||||
if (strlen(name) > TL_WWN_ADDR_LEN) {
|
||||
if (strlen(name) >= TL_WWN_ADDR_LEN) {
|
||||
printk(KERN_ERR "Emulated NAA %s Address: %s, exceeds"
|
||||
" max: %d\n", name, tcm_loop_dump_proto_id(tl_hba),
|
||||
TL_WWN_ADDR_LEN);
|
||||
|
Reference in New Issue
Block a user