DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ· RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=42972>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ· INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=42972 ------- Additional Comments From [EMAIL PROTECTED] 2007-09-27 06:34 ------- Well, it does not matter where the segmentation fault happens. The problem is, that the object (openssl stack objects withn the ssl context) is shared between processes/threads. This object is accessed readonly only, therefore no mutex is required when accessing it. The problem is, that openssl does a sort (changing the order of the objects within the stack for fast access) when accessing the stack the very first time. In order to prevent this sort when accessing the stack from multiple parallel request, I suggest to force a stack sort at server startup (right after all certificates has been loaded), e.g. in the function ssl_init_ctx_verify(). Well, this is a minor change request at all (the worst thing that happens is probably a segfault by some child processes at sever startup). Many thanks... -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
