DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=27081>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=27081

Too much malformed data is reported





------- Additional Comments From [EMAIL PROTECTED]  2004-02-21 02:54 -------
I've succeeded in reporducing the bug without any dependence on XOM; i.e. in a
pure SAX program. The revised test case is attached. 

It seems necessary only that 026.xml be processed before the bug exposes itself.
It's not necessary to process 1-25 with the same parser, but it is necessary to
process 026.xml. I don't yet know whether it's something special about 026.xml
or whether any malformed file or any XML document at all would be able to expose
the bug. However, the bug does not appear when 027.xml is the first document
parsed by the XMLReader.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to