9ae3f9
From 0e3871a57b7a621444dc5cfd49935a1e412f6436 Mon Sep 17 00:00:00 2001
9ae3f9
From: Mohit Agrawal <moagrawa@redhat.com>
9ae3f9
Date: Mon, 8 Jun 2020 13:27:50 +0530
9ae3f9
Subject: [PATCH 433/449] socket: Resolve ssl_ctx leak for a brick while only
9ae3f9
 mgmt SSL is enabled
9ae3f9
9ae3f9
Problem: While only mgmt SSL is enabled for a brick process use_ssl flag
9ae3f9
         is false for a brick process and socket api's cleanup ssl_ctx only
9ae3f9
         while use_ssl and ssl_ctx both are valid
9ae3f9
9ae3f9
Solution: To avoid a leak check only ssl_ctx, if it is valid cleanup
9ae3f9
          ssl_ctx
9ae3f9
9ae3f9
> Fixes: #1196
9ae3f9
> Change-Id: I2f4295478f4149dcb7d608ea78ee5104f28812c3
9ae3f9
> Signed-off-by: Mohit Agrawal <moagrawa@redhat.com>
9ae3f9
> (Cherry pick from commit 9873baee34afdf0c20f5fc98a7dbf2a9f07447e2)
9ae3f9
> (Reviewed on upstream link https://review.gluster.org/#/c/glusterfs/+/24366/)
9ae3f9
9ae3f9
BUG: 1810924
9ae3f9
Change-Id: I2f4295478f4149dcb7d608ea78ee5104f28812c3
9ae3f9
Signed-off-by: Mohit Agrawal <moagrawa@redhat.com>
9ae3f9
Reviewed-on: https://code.engineering.redhat.com/gerrit/202625
9ae3f9
Tested-by: RHGS Build Bot <nigelb@redhat.com>
9ae3f9
Reviewed-by: Sunil Kumar Heggodu Gopala Acharya <sheggodu@redhat.com>
9ae3f9
---
9ae3f9
 rpc/rpc-transport/socket/src/socket.c | 4 ++--
9ae3f9
 1 file changed, 2 insertions(+), 2 deletions(-)
9ae3f9
9ae3f9
diff --git a/rpc/rpc-transport/socket/src/socket.c b/rpc/rpc-transport/socket/src/socket.c
9ae3f9
index 226b2e2..54cd5df 100644
9ae3f9
--- a/rpc/rpc-transport/socket/src/socket.c
9ae3f9
+++ b/rpc/rpc-transport/socket/src/socket.c
9ae3f9
@@ -1163,7 +1163,7 @@ __socket_reset(rpc_transport_t *this)
9ae3f9
         SSL_free(priv->ssl_ssl);
9ae3f9
         priv->ssl_ssl = NULL;
9ae3f9
     }
9ae3f9
-    if (priv->use_ssl && priv->ssl_ctx) {
9ae3f9
+    if (priv->ssl_ctx) {
9ae3f9
         SSL_CTX_free(priv->ssl_ctx);
9ae3f9
         priv->ssl_ctx = NULL;
9ae3f9
     }
9ae3f9
@@ -4685,7 +4685,7 @@ fini(rpc_transport_t *this)
9ae3f9
             SSL_free(priv->ssl_ssl);
9ae3f9
             priv->ssl_ssl = NULL;
9ae3f9
         }
9ae3f9
-        if (priv->use_ssl && priv->ssl_ctx) {
9ae3f9
+        if (priv->ssl_ctx) {
9ae3f9
             SSL_CTX_free(priv->ssl_ctx);
9ae3f9
             priv->ssl_ctx = NULL;
9ae3f9
         }
9ae3f9
-- 
9ae3f9
1.8.3.1
9ae3f9