From nobody Sun Nov 9 22:37:40 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1551980609774610.2960409638117; Thu, 7 Mar 2019 09:43:29 -0800 (PST) Received: from localhost ([127.0.0.1]:56250 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1h1x3C-0004j1-A8 for importer@patchew.org; Thu, 07 Mar 2019 12:43:22 -0500 Received: from eggs.gnu.org ([209.51.188.92]:39182) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1h1wqQ-0002hy-82 for qemu-devel@nongnu.org; Thu, 07 Mar 2019 12:30:11 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1h1wqP-0007kj-6s for qemu-devel@nongnu.org; Thu, 07 Mar 2019 12:30:10 -0500 Received: from mail-wr1-x435.google.com ([2a00:1450:4864:20::435]:39166) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1h1wqO-0007jf-OM for qemu-devel@nongnu.org; Thu, 07 Mar 2019 12:30:09 -0500 Received: by mail-wr1-x435.google.com with SMTP id l12so1947945wrp.6 for ; Thu, 07 Mar 2019 09:30:08 -0800 (PST) Received: from 640k.localdomain ([93.56.166.5]) by smtp.gmail.com with ESMTPSA id d206sm9979753wmc.11.2019.03.07.09.30.05 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 07 Mar 2019 09:30:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=9qsHMfj3SXqze2xdBVc6hsNmSf+AshL1Xh6WpZaMRNY=; b=QwgOJiZVGcHl3ns+8ojE6CurX/GYvF0N/Rmi9uQpzHiZeT4Je5iHkGT7oA2o20HKmL erk9Y+efQA1i1DbKwwpfHFUjpVIZh0T+cxkwz4/kxqjpw5dd2J1Z2CcFfamgiXWoWt9g vSRBfzm092T8iYSG0cSqoS4G/d5XWuRX84Ip8sYdDsTveFIJ2tmtgYZtWKfUpJiC03c/ XufvyP4Hi6ovnzPASMN+aG1UcGgV7XoAis8sidOHJdXlIrFWxx4vvJ2TdWaRLsNggPxe YmGO6TjwJsQNBSaFb9/wQ8JZ+/dNtT2K/OAuIzKqgUabNbsMWS1je/AEfMBpq/1HuD3a bquQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references:mime-version:content-transfer-encoding; bh=9qsHMfj3SXqze2xdBVc6hsNmSf+AshL1Xh6WpZaMRNY=; b=lqHD0TInmKcmpQxk1tkFzY/aJqnjLqprTrGVIlJcFPa4D0XGVDOUJl2U96QE5/Kwvc CfMSZ60QXcWvShlfE2zcvfUr0XPjjX8b20sSlEpcHt2z1ZvmNQUj5gSJ63jOEq1Fb8OV puOkTZ7Z9hgNkdfITzWVyuKICH4jOVxUUTUVshxX4WCD8kJWP8M9TuI/3CCr418mWBLs 68z/onSEXrc1ZnDQn8qZLlIpixy3lkzoHm70OXhSIgqhFSRYyL7N0hj5ra3guk/mbrYv buxCFuxFT57hplBIgWBxD6PSq8A6gSpzxOG21rv1ZbQwbOK5pNbZPtmOEVCIeh+VPbH/ ucwA== X-Gm-Message-State: APjAAAUIc0aByfbCXhx2G6DLtTr66JQS2zlpJTiCYO1vRSOjvXEPmskD rZJLOcyzMJXAoSNjgKKU2KPqzvoF X-Google-Smtp-Source: APXvYqxfOcUq03vGi+ibRSEeRT82N8L6OEi83pM94g8yQHCk688HB67PSlF5m30EIuTUaJPGT5lvkA== X-Received: by 2002:a5d:4145:: with SMTP id c5mr7586326wrq.256.1551979806693; Thu, 07 Mar 2019 09:30:06 -0800 (PST) From: Paolo Bonzini To: qemu-devel@nongnu.org Date: Thu, 7 Mar 2019 18:29:08 +0100 Message-Id: <1551979804-6060-2-git-send-email-pbonzini@redhat.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1551979804-6060-1-git-send-email-pbonzini@redhat.com> References: <1551979804-6060-1-git-send-email-pbonzini@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 2a00:1450:4864:20::435 Subject: [Qemu-devel] [PULL 01/57] chardev-socket: do not blindly reset handlers when switching GMainContext X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: thuth@redhat.com, lviver@redhat.com Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) If the socket is connecting or connected, tcp_chr_update_read_handler will be called but it should not set the NetListener's callbacks again. Otherwise, tcp_chr_accept is invoked while the socket is in connected state and you get an assertion failure. Reviewed-by: Daniel P. Berrang=C3=A9 Reviewed-by: Marc-Andr=C3=A9 Lureau Signed-off-by: Paolo Bonzini --- chardev/char-socket.c | 2 +- tests/test-char.c | 102 ++++++++++++++++++++++++++++++++++++++++++++++= +++- 2 files changed, 102 insertions(+), 2 deletions(-) diff --git a/chardev/char-socket.c b/chardev/char-socket.c index 4fcdd8a..6d287ba 100644 --- a/chardev/char-socket.c +++ b/chardev/char-socket.c @@ -632,7 +632,7 @@ static void tcp_chr_update_read_handler(Chardev *chr) { SocketChardev *s =3D SOCKET_CHARDEV(chr); =20 - if (s->listener) { + if (s->listener && s->state =3D=3D TCP_CHARDEV_STATE_DISCONNECTED) { /* * It's possible that chardev context is changed in * qemu_chr_be_update_read_handlers(). Reset it for QIO net diff --git a/tests/test-char.c b/tests/test-char.c index 63b4d32..de32838 100644 --- a/tests/test-char.c +++ b/tests/test-char.c @@ -1003,6 +1003,103 @@ static void char_socket_client_test(gconstpointer o= paque) g_free(optstr); } =20 +static void +count_closed_event(void *opaque, int event) +{ + int *count =3D opaque; + if (event =3D=3D CHR_EVENT_CLOSED) { + (*count)++; + } +} + +static void +char_socket_discard_read(void *opaque, const uint8_t *buf, int size) +{ +} + +static void char_socket_server_two_clients_test(gconstpointer opaque) +{ + SocketAddress *incoming_addr =3D (gpointer) opaque; + Chardev *chr; + CharBackend be =3D {0}; + QObject *qaddr; + SocketAddress *addr; + Visitor *v; + char *optstr; + QemuOpts *opts; + QIOChannelSocket *ioc1, *ioc2; + int closed =3D 0; + + g_setenv("QTEST_SILENT_ERRORS", "1", 1); + /* + * We rely on addr containing "nowait", otherwise + * qemu_chr_new() will block until a client connects. We + * can't spawn our client thread though, because until + * qemu_chr_new() returns we don't know what TCP port was + * allocated by the OS + */ + optstr =3D char_socket_addr_to_opt_str(incoming_addr, + false, + NULL, + true); + opts =3D qemu_opts_parse_noisily(qemu_find_opts("chardev"), + optstr, true); + g_assert_nonnull(opts); + chr =3D qemu_chr_new_from_opts(opts, NULL, &error_abort); + qemu_opts_del(opts); + g_assert_nonnull(chr); + g_assert(!object_property_get_bool(OBJECT(chr), "connected", &error_ab= ort)); + + qaddr =3D object_property_get_qobject(OBJECT(chr), "addr", &error_abor= t); + g_assert_nonnull(qaddr); + + v =3D qobject_input_visitor_new(qaddr); + visit_type_SocketAddress(v, "addr", &addr, &error_abort); + visit_free(v); + qobject_unref(qaddr); + + qemu_chr_fe_init(&be, chr, &error_abort); + + qemu_chr_fe_set_handlers(&be, char_socket_can_read, char_socket_discar= d_read, + count_closed_event, NULL, + &closed, NULL, true); + + ioc1 =3D qio_channel_socket_new(); + qio_channel_socket_connect_sync(ioc1, addr, &error_abort); + qemu_chr_wait_connected(chr, &error_abort); + + /* switch the chardev to another context */ + GMainContext *ctx =3D g_main_context_new(); + qemu_chr_fe_set_handlers(&be, char_socket_can_read, char_socket_discar= d_read, + count_closed_event, NULL, + &closed, ctx, true); + + /* Start a second connection while the first is still connected. + * It will be placed in the listen() backlog, and connect() will + * succeed immediately. + */ + ioc2 =3D qio_channel_socket_new(); + qio_channel_socket_connect_sync(ioc2, addr, &error_abort); + + object_unref(OBJECT(ioc1)); + /* The two connections should now be processed serially. */ + while (g_main_context_iteration(ctx, TRUE)) { + if (closed =3D=3D 1 && ioc2) { + object_unref(OBJECT(ioc2)); + ioc2 =3D NULL; + } + if (closed =3D=3D 2) { + break; + } + } + + qapi_free_SocketAddress(addr); + object_unparent(OBJECT(chr)); + g_main_context_unref(ctx); + g_free(optstr); + g_unsetenv("QTEST_SILENT_ERRORS"); +} + =20 #ifdef HAVE_CHARDEV_SERIAL static void char_serial_test(void) @@ -1342,12 +1439,15 @@ int main(int argc, char **argv) =20 SOCKET_SERVER_TEST(tcp, &tcpaddr); SOCKET_CLIENT_TEST(tcp, &tcpaddr); + g_test_add_data_func("/char/socket/server/two-clients/tcp", &tcpaddr, + char_socket_server_two_clients_test); #ifndef WIN32 SOCKET_SERVER_TEST(unix, &unixaddr); SOCKET_CLIENT_TEST(unix, &unixaddr); + g_test_add_data_func("/char/socket/server/two-clients/unix", &unixaddr, + char_socket_server_two_clients_test); #endif =20 - g_test_add_func("/char/udp", char_udp_test); #ifdef HAVE_CHARDEV_SERIAL g_test_add_func("/char/serial", char_serial_test); --=20 1.8.3.1