Hi

On Wed, Jan 10, 2024 at 3:16 PM Daniel P. Berrangé <berra...@redhat.com> wrote:
>
> The chardev socket backend will unref the QIOChannel object while
> it is still potentially open. When using TLS there could be a
> pending TLS handshake taking place. If the channel is left open
> then when the TLS handshake callback runs, it can end up accessing
> free'd memory in the tcp_chr_tls_handshake method.
>
> Closing the QIOChannel will unregister any pending handshake
> source.

ooh oh, one of those little things..
Reviewed-by: Marc-André Lureau <marcandre.lur...@redhat.com>

(weak refs could be a solution? but it's also sometime tricky, and we
don't have those..)

>
> Reported-by: jiangyegen <jiangye...@huawei.com>
> Signed-off-by: Daniel P. Berrangé <berra...@redhat.com>
> ---
>  chardev/char-socket.c | 4 ++++
>  1 file changed, 4 insertions(+)
>
> diff --git a/chardev/char-socket.c b/chardev/char-socket.c
> index 73947da188..7105753815 100644
> --- a/chardev/char-socket.c
> +++ b/chardev/char-socket.c
> @@ -378,6 +378,10 @@ static void tcp_chr_free_connection(Chardev *chr)
>                                   char_socket_yank_iochannel,
>                                   QIO_CHANNEL(s->sioc));
>      }
> +
> +    if (s->ioc) {
> +        qio_channel_close(s->ioc, NULL);
> +    }
>      object_unref(OBJECT(s->sioc));
>      s->sioc = NULL;
>      object_unref(OBJECT(s->ioc));
> --
> 2.43.0
>


Reply via email to