Return-Path: Delivered-To: apmail-httpd-bugs-archive@www.apache.org Received: (qmail 88402 invoked from network); 30 Aug 2009 03:48:01 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 30 Aug 2009 03:48:01 -0000 Received: (qmail 16961 invoked by uid 500); 30 Aug 2009 03:48:01 -0000 Delivered-To: apmail-httpd-bugs-archive@httpd.apache.org Received: (qmail 16787 invoked by uid 500); 30 Aug 2009 03:48:00 -0000 Mailing-List: contact bugs-help@httpd.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: Reply-To: "Apache HTTPD Bugs Notification List" List-Id: Delivered-To: mailing list bugs@httpd.apache.org Received: (qmail 16775 invoked by uid 99); 30 Aug 2009 03:48:00 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 30 Aug 2009 03:48:00 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 30 Aug 2009 03:47:59 +0000 Received: by brutus.apache.org (Postfix, from userid 33) id D488C234C052; Sat, 29 Aug 2009 20:47:38 -0700 (PDT) From: bugzilla@apache.org To: bugs@httpd.apache.org Subject: DO NOT REPLY [Bug 40043] ap_get_client_block discards anything over specified buffer size and return 0 on a subsequent call X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Apache httpd-2 X-Bugzilla-Component: Core X-Bugzilla-Keywords: X-Bugzilla-Severity: major X-Bugzilla-Who: nick@webthing.com X-Bugzilla-Status: RESOLVED X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: bugs@httpd.apache.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Changed-Fields: Status Resolution In-Reply-To: References: X-Bugzilla-URL: https://issues.apache.org/bugzilla/ Auto-Submitted: auto-generated Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Message-Id: <20090830034738.D488C234C052@brutus.apache.org> Date: Sat, 29 Aug 2009 20:47:38 -0700 (PDT) X-Virus-Checked: Checked by ClamAV on apache.org https://issues.apache.org/bugzilla/show_bug.cgi?id=40043 Nick Kew changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WONTFIX --- Comment #1 from Nick Kew 2009-08-29 20:47:33 PDT --- It seems to me this can only manifest as a bug if ap_get_brigade returns too much data, which would imply the real bug is in the filter doing that. Hence, no doubt, why it's been ignored for so long. And since this is an API issue, you are always in a position to work around that. A trivial fix would be to insert a filter that buffers any remaining data if it gets too much (I daresay that's pretty-much equivalent to your posted fix). Marking WONTFIX because: 1. Hasn't been fixed, indicating lack of interest 2. Not really a bug, just a failure to compensate for bugs elsewhere 3. If it affects you, a workaround is always in your power However, if you have real-life usage cases where this affects you, please tell us! It means there's a buggy input filter that needs fixing! -- Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org For additional commands, e-mail: bugs-help@httpd.apache.org