mirror of
https://github.com/qemu/qemu.git
synced 2026-04-05 21:46:25 +00:00
Recent fixes to TLS tasks memory handling have left the TLS bye task
uncovered. Fix by freeing the task in the same way the handshake task
is freed.
Direct leak of 704 byte(s) in 4 object(s) allocated from:
#1 0x7f5909b1d6a0 in g_malloc0 ../glib/gmem.c:163
#2 0x557650496d61 in qio_task_new ../io/task.c:58:12
#3 0x557650475d7f in qio_channel_tls_bye ../io/channel-tls.c:352:12
#4 0x55764f7a1bb4 in migration_tls_channel_end ../migration/tls.c:159:5
#5 0x55764f709750 in migration_ioc_shutdown_gracefully ../migration/multifd.c:462:9
#6 0x55764f6fcf53 in multifd_send_terminate_threads ../migration/multifd.c:493:13
#7 0x55764f6fcafb in multifd_send_shutdown ../migration/multifd.c:580:5
#8 0x55764f6e1b14 in migration_cleanup ../migration/migration.c:1323:9
#9 0x55764f6f5bac in migration_cleanup_bh ../migration/migration.c:1350:5
Fixes: d39d0f3acd ("io: fix cleanup for TLS I/O source data on cancellation")
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Acked-by: Daniel P. Berrangé <berrange@redhat.com>
Link: https://lore.kernel.org/qemu-devel/20260311213418.16951-3-farosas@suse.de
Signed-off-by: Fabiano Rosas <farosas@suse.de>
651 lines
18 KiB
C
651 lines
18 KiB
C
/*
|
|
* QEMU I/O channels TLS driver
|
|
*
|
|
* Copyright (c) 2015 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "qapi/error.h"
|
|
#include "qemu/module.h"
|
|
#include "io/channel-tls.h"
|
|
#include "trace.h"
|
|
#include "qemu/atomic.h"
|
|
|
|
|
|
static ssize_t qio_channel_tls_write_handler(const void *buf,
|
|
size_t len,
|
|
void *opaque,
|
|
Error **errp)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(opaque);
|
|
ssize_t ret;
|
|
|
|
ret = qio_channel_write(tioc->master, buf, len, errp);
|
|
if (ret == QIO_CHANNEL_ERR_BLOCK) {
|
|
return QCRYPTO_TLS_SESSION_ERR_BLOCK;
|
|
} else if (ret < 0) {
|
|
return -1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t qio_channel_tls_read_handler(void *buf,
|
|
size_t len,
|
|
void *opaque,
|
|
Error **errp)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(opaque);
|
|
ssize_t ret;
|
|
|
|
ret = qio_channel_read(tioc->master, buf, len, errp);
|
|
if (ret == QIO_CHANNEL_ERR_BLOCK) {
|
|
return QCRYPTO_TLS_SESSION_ERR_BLOCK;
|
|
} else if (ret < 0) {
|
|
return -1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
|
|
QIOChannelTLS *
|
|
qio_channel_tls_new_server(QIOChannel *master,
|
|
QCryptoTLSCreds *creds,
|
|
const char *aclname,
|
|
Error **errp)
|
|
{
|
|
QIOChannelTLS *tioc;
|
|
QIOChannel *ioc;
|
|
|
|
tioc = QIO_CHANNEL_TLS(object_new(TYPE_QIO_CHANNEL_TLS));
|
|
ioc = QIO_CHANNEL(tioc);
|
|
|
|
tioc->master = master;
|
|
ioc->follow_coroutine_ctx = master->follow_coroutine_ctx;
|
|
if (qio_channel_has_feature(master, QIO_CHANNEL_FEATURE_SHUTDOWN)) {
|
|
qio_channel_set_feature(ioc, QIO_CHANNEL_FEATURE_SHUTDOWN);
|
|
}
|
|
object_ref(OBJECT(master));
|
|
|
|
tioc->session = qcrypto_tls_session_new(
|
|
creds,
|
|
NULL,
|
|
aclname,
|
|
QCRYPTO_TLS_CREDS_ENDPOINT_SERVER,
|
|
errp);
|
|
if (!tioc->session) {
|
|
goto error;
|
|
}
|
|
|
|
qcrypto_tls_session_set_callbacks(
|
|
tioc->session,
|
|
qio_channel_tls_write_handler,
|
|
qio_channel_tls_read_handler,
|
|
tioc);
|
|
|
|
trace_qio_channel_tls_new_server(tioc, master, creds, aclname);
|
|
return tioc;
|
|
|
|
error:
|
|
object_unref(OBJECT(tioc));
|
|
return NULL;
|
|
}
|
|
|
|
QIOChannelTLS *
|
|
qio_channel_tls_new_client(QIOChannel *master,
|
|
QCryptoTLSCreds *creds,
|
|
const char *hostname,
|
|
Error **errp)
|
|
{
|
|
QIOChannelTLS *tioc;
|
|
QIOChannel *ioc;
|
|
|
|
tioc = QIO_CHANNEL_TLS(object_new(TYPE_QIO_CHANNEL_TLS));
|
|
ioc = QIO_CHANNEL(tioc);
|
|
|
|
tioc->master = master;
|
|
ioc->follow_coroutine_ctx = master->follow_coroutine_ctx;
|
|
if (qio_channel_has_feature(master, QIO_CHANNEL_FEATURE_SHUTDOWN)) {
|
|
qio_channel_set_feature(ioc, QIO_CHANNEL_FEATURE_SHUTDOWN);
|
|
}
|
|
object_ref(OBJECT(master));
|
|
|
|
tioc->session = qcrypto_tls_session_new(
|
|
creds,
|
|
hostname,
|
|
NULL,
|
|
QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT,
|
|
errp);
|
|
if (!tioc->session) {
|
|
goto error;
|
|
}
|
|
|
|
qcrypto_tls_session_set_callbacks(
|
|
tioc->session,
|
|
qio_channel_tls_write_handler,
|
|
qio_channel_tls_read_handler,
|
|
tioc);
|
|
|
|
trace_qio_channel_tls_new_client(tioc, master, creds, hostname);
|
|
return tioc;
|
|
|
|
error:
|
|
object_unref(OBJECT(tioc));
|
|
return NULL;
|
|
}
|
|
|
|
struct QIOChannelTLSData {
|
|
QIOTask *task;
|
|
GMainContext *context;
|
|
};
|
|
typedef struct QIOChannelTLSData QIOChannelTLSData;
|
|
|
|
static void qio_channel_tls_io_data_free(gpointer user_data)
|
|
{
|
|
QIOChannelTLSData *data = user_data;
|
|
/*
|
|
* Usually 'task' will be NULL since the GSource
|
|
* callback will either complete the task or pass
|
|
* it on to a new GSource. We'll see a non-NULL
|
|
* task here only if the GSource was released before
|
|
* its callback triggers
|
|
*/
|
|
if (data->task) {
|
|
qio_task_free(data->task);
|
|
}
|
|
if (data->context) {
|
|
g_main_context_unref(data->context);
|
|
}
|
|
g_free(data);
|
|
}
|
|
|
|
static gboolean qio_channel_tls_handshake_io(QIOChannel *ioc,
|
|
GIOCondition condition,
|
|
gpointer user_data);
|
|
|
|
static gboolean qio_channel_tls_handshake_task(QIOChannelTLS *ioc,
|
|
QIOTask *task,
|
|
GMainContext *context)
|
|
{
|
|
Error *err = NULL;
|
|
int status;
|
|
|
|
status = qcrypto_tls_session_handshake(ioc->session, &err);
|
|
|
|
if (status < 0) {
|
|
trace_qio_channel_tls_handshake_fail(ioc);
|
|
qio_task_set_error(task, err);
|
|
qio_task_complete(task);
|
|
return TRUE;
|
|
}
|
|
|
|
if (status == QCRYPTO_TLS_HANDSHAKE_COMPLETE) {
|
|
trace_qio_channel_tls_handshake_complete(ioc);
|
|
if (qcrypto_tls_session_check_credentials(ioc->session,
|
|
&err) < 0) {
|
|
trace_qio_channel_tls_credentials_deny(ioc);
|
|
qio_task_set_error(task, err);
|
|
} else {
|
|
trace_qio_channel_tls_credentials_allow(ioc);
|
|
}
|
|
qio_task_complete(task);
|
|
return TRUE;
|
|
} else {
|
|
GIOCondition condition;
|
|
QIOChannelTLSData *data = g_new0(typeof(*data), 1);
|
|
|
|
data->task = task;
|
|
data->context = context;
|
|
|
|
if (context) {
|
|
g_main_context_ref(context);
|
|
}
|
|
|
|
if (status == QCRYPTO_TLS_HANDSHAKE_SENDING) {
|
|
condition = G_IO_OUT;
|
|
} else {
|
|
condition = G_IO_IN;
|
|
}
|
|
|
|
trace_qio_channel_tls_handshake_pending(ioc, status);
|
|
ioc->hs_ioc_tag =
|
|
qio_channel_add_watch_full(ioc->master,
|
|
condition,
|
|
qio_channel_tls_handshake_io,
|
|
data,
|
|
qio_channel_tls_io_data_free,
|
|
context);
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
|
|
static gboolean qio_channel_tls_handshake_io(QIOChannel *ioc,
|
|
GIOCondition condition,
|
|
gpointer user_data)
|
|
{
|
|
QIOChannelTLSData *data = user_data;
|
|
QIOTask *task = data->task;
|
|
GMainContext *context = data->context;
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(
|
|
qio_task_get_source(task));
|
|
|
|
tioc->hs_ioc_tag = 0;
|
|
if (!qio_channel_tls_handshake_task(tioc, task, context)) {
|
|
/* task is kept by new GSource so must not be released yet */
|
|
data->task = NULL;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
void qio_channel_tls_handshake(QIOChannelTLS *ioc,
|
|
QIOTaskFunc func,
|
|
gpointer opaque,
|
|
GDestroyNotify destroy,
|
|
GMainContext *context)
|
|
{
|
|
QIOTask *task;
|
|
|
|
if (qio_channel_has_feature(QIO_CHANNEL(ioc),
|
|
QIO_CHANNEL_FEATURE_CONCURRENT_IO)) {
|
|
qcrypto_tls_session_require_thread_safety(ioc->session);
|
|
}
|
|
|
|
task = qio_task_new(OBJECT(ioc),
|
|
func, opaque, destroy);
|
|
|
|
trace_qio_channel_tls_handshake_start(ioc);
|
|
if (qio_channel_tls_handshake_task(ioc, task, context)) {
|
|
qio_task_free(task);
|
|
}
|
|
}
|
|
|
|
static gboolean qio_channel_tls_bye_io(QIOChannel *ioc, GIOCondition condition,
|
|
gpointer user_data);
|
|
|
|
static gboolean qio_channel_tls_bye_task(QIOChannelTLS *ioc, QIOTask *task,
|
|
GMainContext *context)
|
|
{
|
|
GIOCondition condition;
|
|
QIOChannelTLSData *data;
|
|
int status;
|
|
Error *err = NULL;
|
|
|
|
status = qcrypto_tls_session_bye(ioc->session, &err);
|
|
|
|
if (status < 0) {
|
|
trace_qio_channel_tls_bye_fail(ioc);
|
|
qio_task_set_error(task, err);
|
|
qio_task_complete(task);
|
|
return TRUE;
|
|
}
|
|
|
|
if (status == QCRYPTO_TLS_BYE_COMPLETE) {
|
|
qio_task_complete(task);
|
|
return TRUE;
|
|
}
|
|
|
|
data = g_new0(typeof(*data), 1);
|
|
data->task = task;
|
|
data->context = context;
|
|
|
|
if (context) {
|
|
g_main_context_ref(context);
|
|
}
|
|
|
|
if (status == QCRYPTO_TLS_BYE_SENDING) {
|
|
condition = G_IO_OUT;
|
|
} else {
|
|
condition = G_IO_IN;
|
|
}
|
|
|
|
trace_qio_channel_tls_bye_pending(ioc, status);
|
|
ioc->bye_ioc_tag = qio_channel_add_watch_full(ioc->master, condition,
|
|
qio_channel_tls_bye_io,
|
|
data,
|
|
qio_channel_tls_io_data_free,
|
|
context);
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
static gboolean qio_channel_tls_bye_io(QIOChannel *ioc, GIOCondition condition,
|
|
gpointer user_data)
|
|
{
|
|
QIOChannelTLSData *data = user_data;
|
|
QIOTask *task = data->task;
|
|
GMainContext *context = data->context;
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(qio_task_get_source(task));
|
|
|
|
tioc->bye_ioc_tag = 0;
|
|
if (!qio_channel_tls_bye_task(tioc, task, context)) {
|
|
/* task is kept by new GSource so must not be released yet */
|
|
data->task = NULL;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void propagate_error(QIOTask *task, gpointer opaque)
|
|
{
|
|
qio_task_propagate_error(task, opaque);
|
|
}
|
|
|
|
void qio_channel_tls_bye(QIOChannelTLS *ioc, Error **errp)
|
|
{
|
|
QIOTask *task;
|
|
|
|
task = qio_task_new(OBJECT(ioc), propagate_error, errp, NULL);
|
|
|
|
trace_qio_channel_tls_bye_start(ioc);
|
|
if (qio_channel_tls_bye_task(ioc, task, NULL)) {
|
|
qio_task_free(task);
|
|
}
|
|
}
|
|
|
|
static void qio_channel_tls_init(Object *obj G_GNUC_UNUSED)
|
|
{
|
|
}
|
|
|
|
|
|
static void qio_channel_tls_finalize(Object *obj)
|
|
{
|
|
QIOChannelTLS *ioc = QIO_CHANNEL_TLS(obj);
|
|
|
|
if (ioc->hs_ioc_tag) {
|
|
trace_qio_channel_tls_handshake_cancel(ioc);
|
|
g_clear_handle_id(&ioc->hs_ioc_tag, g_source_remove);
|
|
}
|
|
|
|
if (ioc->bye_ioc_tag) {
|
|
trace_qio_channel_tls_bye_cancel(ioc);
|
|
g_clear_handle_id(&ioc->bye_ioc_tag, g_source_remove);
|
|
}
|
|
|
|
object_unref(OBJECT(ioc->master));
|
|
qcrypto_tls_session_free(ioc->session);
|
|
}
|
|
|
|
static bool
|
|
qio_channel_tls_allow_premature_termination(QIOChannelTLS *tioc, int flags)
|
|
{
|
|
if (flags & QIO_CHANNEL_READ_FLAG_RELAXED_EOF) {
|
|
return true;
|
|
}
|
|
|
|
if (qatomic_read(&tioc->shutdown) & QIO_CHANNEL_SHUTDOWN_READ) {
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static ssize_t qio_channel_tls_readv(QIOChannel *ioc,
|
|
const struct iovec *iov,
|
|
size_t niov,
|
|
int **fds,
|
|
size_t *nfds,
|
|
int flags,
|
|
Error **errp)
|
|
{
|
|
ERRP_GUARD();
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
size_t i;
|
|
ssize_t got = 0;
|
|
|
|
for (i = 0 ; i < niov ; i++) {
|
|
ssize_t ret = qcrypto_tls_session_read(
|
|
tioc->session,
|
|
iov[i].iov_base,
|
|
iov[i].iov_len,
|
|
errp);
|
|
if (ret == QCRYPTO_TLS_SESSION_ERR_BLOCK) {
|
|
if (got) {
|
|
return got;
|
|
} else {
|
|
return QIO_CHANNEL_ERR_BLOCK;
|
|
}
|
|
} else if (ret < 0) {
|
|
if (ret == QCRYPTO_TLS_SESSION_PREMATURE_TERMINATION &&
|
|
qio_channel_tls_allow_premature_termination(tioc, flags)) {
|
|
error_free(*errp);
|
|
*errp = NULL;
|
|
return got;
|
|
}
|
|
return -1;
|
|
}
|
|
got += ret;
|
|
if (ret < iov[i].iov_len) {
|
|
break;
|
|
}
|
|
}
|
|
return got;
|
|
}
|
|
|
|
|
|
static ssize_t qio_channel_tls_writev(QIOChannel *ioc,
|
|
const struct iovec *iov,
|
|
size_t niov,
|
|
int *fds,
|
|
size_t nfds,
|
|
int flags,
|
|
Error **errp)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
size_t i;
|
|
ssize_t done = 0;
|
|
|
|
for (i = 0 ; i < niov ; i++) {
|
|
ssize_t ret = qcrypto_tls_session_write(tioc->session,
|
|
iov[i].iov_base,
|
|
iov[i].iov_len,
|
|
errp);
|
|
if (ret == QCRYPTO_TLS_SESSION_ERR_BLOCK) {
|
|
if (done) {
|
|
return done;
|
|
} else {
|
|
return QIO_CHANNEL_ERR_BLOCK;
|
|
}
|
|
} else if (ret < 0) {
|
|
return -1;
|
|
}
|
|
done += ret;
|
|
if (ret < iov[i].iov_len) {
|
|
break;
|
|
}
|
|
}
|
|
return done;
|
|
}
|
|
|
|
static int qio_channel_tls_set_blocking(QIOChannel *ioc,
|
|
bool enabled,
|
|
Error **errp)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
|
|
return qio_channel_set_blocking(tioc->master, enabled, errp) ? 0 : -1;
|
|
}
|
|
|
|
static void qio_channel_tls_set_delay(QIOChannel *ioc,
|
|
bool enabled)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
|
|
qio_channel_set_delay(tioc->master, enabled);
|
|
}
|
|
|
|
static void qio_channel_tls_set_cork(QIOChannel *ioc,
|
|
bool enabled)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
|
|
qio_channel_set_cork(tioc->master, enabled);
|
|
}
|
|
|
|
static int qio_channel_tls_shutdown(QIOChannel *ioc,
|
|
QIOChannelShutdown how,
|
|
Error **errp)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
|
|
qatomic_or(&tioc->shutdown, how);
|
|
|
|
return qio_channel_shutdown(tioc->master, how, errp);
|
|
}
|
|
|
|
static int qio_channel_tls_close(QIOChannel *ioc,
|
|
Error **errp)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
|
|
if (tioc->hs_ioc_tag) {
|
|
trace_qio_channel_tls_handshake_cancel(ioc);
|
|
g_clear_handle_id(&tioc->hs_ioc_tag, g_source_remove);
|
|
}
|
|
|
|
if (tioc->bye_ioc_tag) {
|
|
trace_qio_channel_tls_bye_cancel(ioc);
|
|
g_clear_handle_id(&tioc->bye_ioc_tag, g_source_remove);
|
|
}
|
|
|
|
return qio_channel_close(tioc->master, errp);
|
|
}
|
|
|
|
static void qio_channel_tls_set_aio_fd_handler(QIOChannel *ioc,
|
|
AioContext *read_ctx,
|
|
IOHandler *io_read,
|
|
AioContext *write_ctx,
|
|
IOHandler *io_write,
|
|
void *opaque)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
|
|
qio_channel_set_aio_fd_handler(tioc->master, read_ctx, io_read,
|
|
write_ctx, io_write, opaque);
|
|
}
|
|
|
|
typedef struct QIOChannelTLSSource QIOChannelTLSSource;
|
|
struct QIOChannelTLSSource {
|
|
GSource parent;
|
|
QIOChannelTLS *tioc;
|
|
};
|
|
|
|
static gboolean
|
|
qio_channel_tls_source_check(GSource *source)
|
|
{
|
|
QIOChannelTLSSource *tsource = (QIOChannelTLSSource *)source;
|
|
|
|
return qcrypto_tls_session_check_pending(tsource->tioc->session) > 0;
|
|
}
|
|
|
|
static gboolean
|
|
qio_channel_tls_source_prepare(GSource *source, gint *timeout)
|
|
{
|
|
*timeout = -1;
|
|
return qio_channel_tls_source_check(source);
|
|
}
|
|
|
|
static gboolean
|
|
qio_channel_tls_source_dispatch(GSource *source, GSourceFunc callback,
|
|
gpointer user_data)
|
|
{
|
|
return G_SOURCE_CONTINUE;
|
|
}
|
|
|
|
static void
|
|
qio_channel_tls_source_finalize(GSource *source)
|
|
{
|
|
QIOChannelTLSSource *tsource = (QIOChannelTLSSource *)source;
|
|
|
|
object_unref(OBJECT(tsource->tioc));
|
|
}
|
|
|
|
static GSourceFuncs qio_channel_tls_source_funcs = {
|
|
qio_channel_tls_source_prepare,
|
|
qio_channel_tls_source_check,
|
|
qio_channel_tls_source_dispatch,
|
|
qio_channel_tls_source_finalize
|
|
};
|
|
|
|
static void
|
|
qio_channel_tls_read_watch(QIOChannelTLS *tioc, GSource *source)
|
|
{
|
|
GSource *child;
|
|
QIOChannelTLSSource *tlssource;
|
|
|
|
child = g_source_new(&qio_channel_tls_source_funcs,
|
|
sizeof(QIOChannelTLSSource));
|
|
tlssource = (QIOChannelTLSSource *)child;
|
|
|
|
tlssource->tioc = tioc;
|
|
object_ref(OBJECT(tioc));
|
|
|
|
g_source_add_child_source(source, child);
|
|
g_source_unref(child);
|
|
}
|
|
|
|
static GSource *qio_channel_tls_create_watch(QIOChannel *ioc,
|
|
GIOCondition condition)
|
|
{
|
|
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
|
|
GSource *source = qio_channel_create_watch(tioc->master, condition);
|
|
|
|
if (condition & G_IO_IN) {
|
|
qio_channel_tls_read_watch(tioc, source);
|
|
}
|
|
|
|
return source;
|
|
}
|
|
|
|
QCryptoTLSSession *
|
|
qio_channel_tls_get_session(QIOChannelTLS *ioc)
|
|
{
|
|
return ioc->session;
|
|
}
|
|
|
|
static void qio_channel_tls_class_init(ObjectClass *klass,
|
|
const void *class_data G_GNUC_UNUSED)
|
|
{
|
|
QIOChannelClass *ioc_klass = QIO_CHANNEL_CLASS(klass);
|
|
|
|
ioc_klass->io_writev = qio_channel_tls_writev;
|
|
ioc_klass->io_readv = qio_channel_tls_readv;
|
|
ioc_klass->io_set_blocking = qio_channel_tls_set_blocking;
|
|
ioc_klass->io_set_delay = qio_channel_tls_set_delay;
|
|
ioc_klass->io_set_cork = qio_channel_tls_set_cork;
|
|
ioc_klass->io_close = qio_channel_tls_close;
|
|
ioc_klass->io_shutdown = qio_channel_tls_shutdown;
|
|
ioc_klass->io_create_watch = qio_channel_tls_create_watch;
|
|
ioc_klass->io_set_aio_fd_handler = qio_channel_tls_set_aio_fd_handler;
|
|
}
|
|
|
|
static const TypeInfo qio_channel_tls_info = {
|
|
.parent = TYPE_QIO_CHANNEL,
|
|
.name = TYPE_QIO_CHANNEL_TLS,
|
|
.instance_size = sizeof(QIOChannelTLS),
|
|
.instance_init = qio_channel_tls_init,
|
|
.instance_finalize = qio_channel_tls_finalize,
|
|
.class_init = qio_channel_tls_class_init,
|
|
};
|
|
|
|
static void qio_channel_tls_register_types(void)
|
|
{
|
|
type_register_static(&qio_channel_tls_info);
|
|
}
|
|
|
|
type_init(qio_channel_tls_register_types);
|