[Spice-devel] [PATCH spice-server 1/9] reds: Use GLib memory functions for RedVDIReadBuf

Victor Toso victortoso at redhat.com
Tue Dec 5 09:25:38 UTC 2017


On Tue, Dec 05, 2017 at 04:14:10AM -0500, Frediano Ziglio wrote:
> > 
> > Hi,
> > 
> > On Tue, Dec 05, 2017 at 08:41:04AM +0000, Frediano Ziglio wrote:
> > > Signed-off-by: Frediano Ziglio <fziglio at redhat.com>
> > 
> > > ---
> > >  server/reds.c | 2 +-
> > >  1 file changed, 1 insertion(+), 1 deletion(-)
> > > 
> > > diff --git a/server/reds.c b/server/reds.c
> > > index 64b3a967..4e652253 100644
> > > --- a/server/reds.c
> > > +++ b/server/reds.c
> > > @@ -4519,7 +4519,7 @@ red_char_device_vdi_port_init(RedCharDeviceVDIPort
> > > *self)
> > >      self->priv->receive_len = sizeof(self->priv->vdi_chunk_header);
> > >  
> > >      for (i = 0; i < REDS_VDI_PORT_NUM_RECEIVE_BUFFS; i++) {
> > > -        RedVDIReadBuf *buf = spice_new0(RedVDIReadBuf, 1);
> > > +        RedVDIReadBuf *buf = g_new0(RedVDIReadBuf, 1);
> > 
> > Yes, last one in server
> > Acked-by: Victor Toso <victortoso at redhat.com>
> > 
> 
> Yes, this was my last patch in my glib_memory branch (beside other OT
> ones).
> Note that surely this identify a leak which was not detected by either
> Valgrind nor ASan. Looks like the circular pointers
> Agent -> RedVDIReadBuf -> Agent made these tools believe there was
> no leak :-(

Interesting! How you manage to see the leak without Valgrind/ASan to
point it out to you?

> (I think I spent half an hours of compiling and testing to understand
> this).
> 
> > >          vdi_read_buf_init(buf);
> > >          buf->dev = self;
> > >          g_warn_if_fail(!self->priv->agent_attached);
> 
> Frediano
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.freedesktop.org/archives/spice-devel/attachments/20171205/3957df29/attachment.sig>


More information about the Spice-devel mailing list