From c1249db4bf9d58b30dd8657ef38c18e7ece94ba0 Mon Sep 17 00:00:00 2001 From: Timo Sirainen Date: Tue, 18 Apr 2023 16:16:59 +0300 Subject: [PATCH] imap-urlauth: Don't access login_set.*_socket_path after they're freed from data stack Forgotten in 7f4bcbb9f2d97745a12d301b9ee276200ac58605 --- src/imap-urlauth/imap-urlauth.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/src/imap-urlauth/imap-urlauth.c b/src/imap-urlauth/imap-urlauth.c index 6f3fa60586..c3ef08a183 100644 --- a/src/imap-urlauth/imap-urlauth.c +++ b/src/imap-urlauth/imap-urlauth.c @@ -275,9 +275,12 @@ int main(int argc, char *argv[]) master_service_get_client_limit(master_service) == 1; clients_init(); - master_service_init_finish(master_service); master_service_set_die_callback(master_service, imap_urlauth_die); + if (!IS_STANDALONE()) + login_server = login_server_init(master_service, &login_set); + master_service_init_finish(master_service); + /* fake that we're running, so we know if client was destroyed while handling its initial input */ io_loop_set_running(current_ioloop); @@ -287,7 +290,6 @@ int main(int argc, char *argv[]) main_stdio_run(username); } T_END; } else { - login_server = login_server_init(master_service, &login_set); io_loop_set_running(current_ioloop); } -- 2.47.3