Attached my (currently) final versions of the patches to fix PR37145 on 2.0.x 
(37145_2.0.x.diff)
and on trunk (37145.diff). Comments / thoughts / votes are highly appreciated 
as I want to
commit to trunk and propose it for backport in 2.0.x.

Regards

Rüdiger

On 10/19/2005 02:46 AM, Ruediger Pluem wrote:
> Attached a new version of the patch that uses ap_save_brigade.
> Again for 2.0.x.
> 
> Regards
> 
> Rüdiger
> 
> 
> On 10/19/2005 02:18 AM, Ruediger Pluem wrote:
> 
>>The following patch should fix PR37145. I would like to hear some comments / 
>>thoughts
>>from brigade / buckets and proxy gurus on this.
>>Although this problem has been reported against 2.0.55, I cross checked
>>and this problem is also in the trunk.
>>
>>Regards
>>
>>Rüdiger
>>
Index: modules/proxy/mod_proxy_http.c
===================================================================
--- modules/proxy/mod_proxy_http.c      (Revision 326481)
+++ modules/proxy/mod_proxy_http.c      (Arbeitskopie)
@@ -832,9 +832,27 @@
         }
 
         apr_brigade_length(temp_brigade, 1, &bytes);
-        APR_BRIGADE_CONCAT(input_brigade, temp_brigade);
         bytes_read += bytes;
 
+        /*
+         * Save temp_brigade in input_brigade. (At least) in the SSL case
+         * temp_brigade contains transient buckets whose data would get
+         * overwritten during the next call of ap_get_brigade in the loop.
+         * ap_save_brigade ensures these buckets to be set aside.
+         * Calling ap_save_brigade with NULL as filter is OK, because
+         * input_brigade already has been created and does not need to get
+         * created by ap_save_brigade.
+         */
+        status = ap_save_brigade(NULL, &input_brigade, &temp_brigade, p);
+        if (status != APR_SUCCESS) {
+            ap_log_error(APLOG_MARK, APLOG_ERR, status, r->server,
+                         "proxy: processing prefetched request body failed"
+                         " to %pI (%s) from %s (%s)",
+                         p_conn->addr, p_conn->hostname ? p_conn->hostname: "",
+                         c->remote_ip, c->remote_host ? c->remote_host: "");
+            return status;
+        }
+
     /* Ensure we don't hit a wall where we have a buffer too small
      * for ap_get_brigade's filters to fetch us another bucket,
      * surrender once we hit 80 bytes less than MAX_MEM_SPOOL
Index: modules/proxy/proxy_http.c
===================================================================
--- modules/proxy/proxy_http.c  (Revision 312938)
+++ modules/proxy/proxy_http.c  (Arbeitskopie)
@@ -1081,9 +1081,27 @@
         }
 
         apr_brigade_length(temp_brigade, 1, &bytes);
-        APR_BRIGADE_CONCAT(input_brigade, temp_brigade);
         bytes_read += bytes;
 
+        /*
+         * Save temp_brigade in input_brigade. (At least) in the SSL case
+         * temp_brigade contains transient buckets whose data would get
+         * overwritten during the next call of ap_get_brigade in the loop.
+         * ap_save_brigade ensures these buckets to be set aside.
+         * Calling ap_save_brigade with NULL as filter is OK, because
+         * input_brigade already has been created and does not need to get
+         * created by ap_save_brigade.
+         */
+        status = ap_save_brigade(NULL, &input_brigade, &temp_brigade, p);
+        if (status != APR_SUCCESS) {
+            ap_log_error(APLOG_MARK, APLOG_ERR, status, r->server,
+                         "proxy: processing prefetched request body failed"
+                         " to %s from %s (%s)",
+                         p_conn->name ? p_conn->name: "",
+                         c->remote_ip, c->remote_host ? c->remote_host: "");
+            return status;
+        }
+
     /* Ensure we don't hit a wall where we have a buffer too small
      * for ap_get_brigade's filters to fetch us another bucket,
      * surrender once we hit 80 bytes less than MAX_MEM_SPOOL

Reply via email to