Return-Path: Delivered-To: apmail-perl-modperl-archive@www.apache.org Received: (qmail 24780 invoked from network); 11 Aug 2006 23:14:51 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 11 Aug 2006 23:14:51 -0000 Received: (qmail 2443 invoked by uid 500); 11 Aug 2006 23:14:46 -0000 Delivered-To: apmail-perl-modperl-archive@perl.apache.org Received: (qmail 2421 invoked by uid 500); 11 Aug 2006 23:14:46 -0000 Mailing-List: contact modperl-help@perl.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list modperl@perl.apache.org Received: (qmail 2405 invoked by uid 99); 11 Aug 2006 23:14:46 -0000 Received: from asf.osuosl.org (HELO asf.osuosl.org) (140.211.166.49) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 11 Aug 2006 16:14:46 -0700 X-ASF-Spam-Status: No, hits=1.5 required=10.0 tests=SPF_SOFTFAIL X-Spam-Check-By: apache.org Received-SPF: softfail (asf.osuosl.org: transitioning domain of hedges@ucsd.edu does not designate 132.239.1.195 as permitted sender) Received: from [132.239.1.195] (HELO network.ucsd.edu) (132.239.1.195) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 11 Aug 2006 16:14:45 -0700 Received: from network.ucsd.edu (localhost.ucsd.edu [127.0.0.1]) by network.ucsd.edu (8.13.6/8.13.1) with ESMTP id k7BNEJQp090601; Fri, 11 Aug 2006 16:14:20 -0700 (PDT) (envelope-from hedges@ucsd.edu) Received: from localhost (hedges@localhost) by network.ucsd.edu (8.13.6/8.13.1/Submit) with ESMTP id k7BNEEnJ090598; Fri, 11 Aug 2006 16:14:14 -0700 (PDT) (envelope-from hedges@ucsd.edu) X-Authentication-Warning: network.ucsd.edu: hedges owned process doing -bs Date: Fri, 11 Aug 2006 16:14:14 -0700 (PDT) From: Mark Hedges To: Mon-Chaio Lo cc: modperl@perl.apache.org Subject: RE: Odd Apache mod_perl behavior In-Reply-To: Message-ID: <20060811161206.C89974@network.ucsd.edu> References: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Virus-Checked: Checked by ClamAV on apache.org X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N FWIW I sometimes found that if an error occured somewhere, even an incorrect use of an undefined value, it screwed up mod perl's subroutine wrapper caching and caused the handler to run again. So you could be seeing the results of the second or third time the handler was hit. If you have warnings and strict on, hunt them all down, explicitly set empty string where it might be undefined etc, and see if it still happens. Mark On Fri, 11 Aug 2006, Mon-Chaio Lo wrote: > From: Mon-Chaio Lo > To: Perrin Harkins > Cc: modperl@perl.apache.org > Date: Fri, 11 Aug 2006 15:19:56 -0700 > Subject: RE: Odd Apache mod_perl behavior > > Hmm, that seems to make sense, except for that the handler method of the > code sample I provided is the first piece of code that gets run and is > the first handler in the handler stack. Also, it doesn't happen on > every POST, just on some posts, which is odd ... :( > > M. > > On Thu, 2006-08-10 at 10:14 -0700, Mon-Chaio Lo wrote: > > What we're finding is that the request will fail at the > > $request->param() line. It doesn't seem to die, given that we don't > > get a 500 back, but if we put Log4perl warnings before and after that > > line we see that it doesn't progress past that line. > > That usually means you are trying to read POST data that has already > been read. Maybe you already called Apache::Request elsewhere? You can > usually use the instance() method to deal with this, or stash the data > in pnotes(). > > - Perrin > > >