DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=42972>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=42972





------- Additional Comments From [EMAIL PROTECTED]  2007-09-27 06:34 -------
Well, it does not matter where the segmentation fault happens. The problem is,
that the object (openssl stack objects withn the ssl context) is shared between
processes/threads. This object is accessed readonly only, therefore no mutex is
required when accessing it. The problem is, that openssl does a sort (changing
the order of the objects within the stack for fast access) when accessing the
stack the very first time. In order to prevent this sort when accessing the
stack from multiple parallel request, I suggest to force a stack sort at server
startup (right after all certificates has been loaded), e.g. in the function
ssl_init_ctx_verify().

Well, this is a minor change request at all (the worst thing that happens is
probably a segfault by some child processes at sever startup).

Many thanks...

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to