diff options
author | Jeff Darcy <jdarcy@redhat.com> | 2015-03-31 14:34:22 -0400 |
---|---|---|
committer | Vijay Bellur <vbellur@redhat.com> | 2015-04-09 09:55:37 +0000 |
commit | 8830e90fa1b131057e4ee1742cb83d78102714c0 (patch) | |
tree | c83304de5eb99302f294e45039b356bcc87f69d1 /rpc/rpc-transport/socket/src/socket-mem-types.h | |
parent | 9df5fdb357da74de38cb4e8c2cea776023641164 (diff) |
socket: use OpenSSL multi-threading interfaces
OpenSSL isn't thread-safe unless you register these locking and thread
ID functions. Most often the crashes would occur around
X509_verify_cert, even though it's insane that the certificate parsing
functions wouldn't be thread-safe. The bug for this was filed over
two years ago, but it didn't seem like a high priority because the bug
didn't bite anyone until it caused a spurious regression-test failure.
Ironically, that was on a test for a *different* spurious
regression-test failure, which I guess is just deserts[1] for leaving
this on the to-do list so long.
[1] Yes, it really is "deserts" in that phrase - not as in very dry
places, but from late Latin "deservire" meaning to serve well or
zealously. Aren't commit messages educational?
Change-Id: I2a6c0e9b361abf54efa10ffbbbe071404f82b0d9
BUG: 906763
Signed-off-by: Jeff Darcy <jdarcy@redhat.com>
Reviewed-on: http://review.gluster.org/10075
Tested-by: Gluster Build System <jenkins@build.gluster.com>
Reviewed-by: Kaleb KEITHLEY <kkeithle@redhat.com>
Reviewed-by: Vijay Bellur <vbellur@redhat.com>
Diffstat (limited to 'rpc/rpc-transport/socket/src/socket-mem-types.h')
-rw-r--r-- | rpc/rpc-transport/socket/src/socket-mem-types.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/rpc/rpc-transport/socket/src/socket-mem-types.h b/rpc/rpc-transport/socket/src/socket-mem-types.h index e5553b172a2..3181406625d 100644 --- a/rpc/rpc-transport/socket/src/socket-mem-types.h +++ b/rpc/rpc-transport/socket/src/socket-mem-types.h @@ -15,6 +15,7 @@ typedef enum gf_sock_mem_types_ { gf_sock_connect_error_state_t = gf_common_mt_end + 1, + gf_sock_mt_lock_array, gf_sock_mt_end } gf_sock_mem_types_t; |