Fix: relayd: disallow 0-length session names for 2.4+ peers
[lttng-tools.git] / src / bin / lttng-relayd / cmd-2-11.c
index 0da8d2834dafe4c697c4d05024165fb0aa9da431..4b6f39120db0b84cd1170880c27750d854436877 100644 (file)
@@ -78,6 +78,10 @@ int cmd_create_session_2_11(const struct lttng_buffer_view *payload,
                ret = -ENAMETOOLONG;
                ERR("Length of session name (%" PRIu32 " bytes) received in create_session command exceeds maximum length (%d bytes)", header.session_name_len, LTTNG_NAME_MAX);
                goto error;
+       } else if (header.session_name_len == 0) {
+               ret = -EINVAL;
+               ERR("Illegal session name length of 0 received");
+               goto error;
        }
        if (header.hostname_len > LTTNG_HOST_NAME_MAX) {
                ret = -ENAMETOOLONG;
This page took 0.022461 seconds and 4 git commands to generate.