Provided by: libcurl4-doc_8.9.1-2ubuntu2.2_all bug

NAME

       libcurl-thread - libcurl thread safety

Multi-threading with libcurl

       libcurl  is  thread  safe  but  has  no internal thread synchronization. You may have to provide your own
       locking should you meet any of the thread safety exceptions below.

Handles

       You must never share the same handle in multiple threads. You can pass the handles around among  threads,
       but you must never use a single handle from more than one thread at any given time.

Shared objects

       You  can  share  certain  data between multiple handles by using the share interface but you must provide
       your own locking and set curl_share_setopt(3) CURLSHOPT_LOCKFUNC and CURLSHOPT_UNLOCKFUNC.

       Note that some items are specifically documented as not thread-safe in the share API (the connection pool
       and HSTS cache for example).

TLS

       All current TLS libraries libcurl supports are thread-safe.

       OpenSSL
              OpenSSL 1.1.0+ can be safely used in multi-threaded applications provided  that  support  for  the
              underlying  OS  threading  API is built-in. For older versions of OpenSSL, the user must set mutex
              callbacks.

              libcurl may not be able to fully clean up after multi-threaded OpenSSL depending  on  how  OpenSSL
              was  built  and loaded as a library. It is possible in some rare circumstances a memory leak could
              occur unless you implement your own OpenSSL thread cleanup.

              For example, on Windows if both libcurl and OpenSSL are linked statically to a DLL or  application
              then OpenSSL may leak memory unless the DLL or application calls OPENSSL_thread_stop() before each
              thread  terminates. If OpenSSL is built as a DLL then it does this cleanup automatically and there
              is no leak. If libcurl is built as a DLL and OpenSSL is linked statically to it then libcurl  does
              this cleanup automatically and there is no leak (added in libcurl 8.8.0).

              Please    review    the    OpenSSL    documentation    for   a   full   list   of   circumstances:
              https://docs.openssl.org/3.0/man3/OPENSSL_init_crypto/#notes

Signals

       Signals are used for timing out name resolves (during DNS lookup) - when built without using  either  the
       c-ares or threaded resolver backends. On systems that have a signal concept.

       When  using  multiple  threads  you  should  set  the  CURLOPT_NOSIGNAL(3)  option to 1L for all handles.
       Everything works fine except that timeouts cannot be honored during DNS lookups  -  which  you  can  work
       around  by  building  libcurl with c-ares or threaded-resolver support. c-ares is a library that provides
       asynchronous name resolves. On some platforms, libcurl simply  cannot  function  properly  multi-threaded
       unless the CURLOPT_NOSIGNAL(3) option is set.

       When CURLOPT_NOSIGNAL(3) is set to 1L, your application needs to deal with the risk of a SIGPIPE (that at
       least  the  OpenSSL  backend can trigger). Note that setting CURLOPT_NOSIGNAL(3) to 0L does not work in a
       threaded situation as there is a race condition where libcurl risks restoring the former  signal  handler
       while another thread should still ignore it.

Name resolving

       The  gethostbyname  or  getaddrinfo and other name resolving system calls used by libcurl are provided by
       your operating system and must be thread safe. It is important that libcurl can find and use thread  safe
       versions  of  these  and  other  system  calls,  as  otherwise it cannot function fully thread safe. Some
       operating systems are known to have faulty thread implementations. We have  previously  received  problem
       reports  on *BSD (at least in the past, they may be working fine these days). Some operating systems that
       are known to have solid and working thread support are Linux, Solaris and Windows.

curl_global_* functions

       These   functions   are   thread-safe   since   libcurl   7.84.0   if   curl_version_info(3)   has    the
       CURL_VERSION_THREADSAFE feature bit set (most platforms).

       If  these  functions are not thread-safe and you are using libcurl with multiple threads it is especially
       important  that  before  use  you  call  curl_global_init(3)  or  curl_global_init_mem(3)  to  explicitly
       initialize  the  library and its dependents, rather than rely on the "lazy" fail-safe initialization that
       takes place the first time curl_easy_init(3) is called. For an in-depth explanation refer  to  libcurl(3)
       section GLOBAL CONSTANTS.

Memory functions

       These  functions, provided either by your operating system or your own replacements, must be thread safe.
       You can use curl_global_init_mem(3) to set your own replacement memory functions.

Non-safe functions

       CURLOPT_DNS_USE_GLOBAL_CACHE(3) is not thread-safe.

       curl_version_info(3) is not thread-safe before libcurl initialization.

SEE ALSO

       libcurl-security(3)

libcurl                                            2024-12-11                                  libcurl-thread(3)