public inbox for ecos-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug 1000762] httpd.c crashes on javascript
[not found] <bug-1000762-13@http.bugzilla.ecoscentric.com/>
@ 2009-05-21 12:22 ` bugzilla-daemon
0 siblings, 0 replies; 4+ messages in thread
From: bugzilla-daemon @ 2009-05-21 12:22 UTC (permalink / raw)
To: ecos-bugs
http://bugzilla.ecoscentric.com/show_bug.cgi?id=1000762
--- Comment #5 from Jochen Gerster <Jochen.Gerster@freescale.com> 2009-05-21 13:21:58 ---
Thank you for your email.
I'm out of office and will be back in the office 8 June 2009
During this time I will have no access to my emails.
Your email isn't automatically forwarded.
In urgent case please contact Anita.Maliverney@freescale.com
Thank you and best regards
Jochen Gerster
--
Configure bugmail: http://bugzilla.ecoscentric.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug 1000762] httpd.c crashes on javascript
2009-05-12 12:27 [Bug 1000762] New: " bugzilla-daemon
2009-05-12 16:43 ` [Bug 1000762] " bugzilla-daemon
2009-05-12 18:22 ` bugzilla-daemon
@ 2009-05-21 12:21 ` bugzilla-daemon
2 siblings, 0 replies; 4+ messages in thread
From: bugzilla-daemon @ 2009-05-21 12:21 UTC (permalink / raw)
To: ecos-bugs
http://bugs.ecos.sourceware.org/show_bug.cgi?id=1000762
Stefan Singer <Stefan.Singer@freescale.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |Stefan.Singer@freescale.com
--- Comment #4 from Stefan Singer <Stefan.Singer@freescale.com> 2009-05-21 13:21:02 ---
(In reply to comment #3)
> (In reply to comment #0)
> > Created an attachment (id=716)
--> (http://bugs.ecos.sourceware.org/attachment.cgi?id=716) [details] [details]
> > diff file to fix the problems described above
> > When using extensive javascripting the httpd.c webserver crashes, when it
> > encounters the EOF character. The attached patch just filters that out.
> > Probably not an entirely clean fix, but avoids any further crash with no
> > visible problems.
> (In reply to comment #2)
> > (In reply to comment #1)
> > > Nick, presumably JavaScript can introduce EOF chars in the TCP stream. Does the
> > > (reversed) patch make sense or is this hiding a more fundamental problem?
> > >
> > I'm not sure what this patch is trying to do. The EOF returned from getc() is
> > actually -1, and indicates that the remote end has closed the connection. An
> > EOF character, Ctrl-D, would appear as 0x04. EOF from getc() indicates that the
> > remote end is failing to complete the HTTP protocol request, and this patch is
> > just covering that up. Just breaking out of this loop seem incorrect, since the
> > connection is now closed, and no response can be returned.
> > Admittedly this code could probably be made a little more robust in the face of
> > dropped connections. But I don't think this patch is the right way to do that.
> Hi Nick, agreed, this is not a really clean fix, but I had the problem, that
> the webserver was always crashing with a javascript, that was polling some
> value very frequently, as soon as mouse traffic was created in addition.
> Applying this patch at least makes the httpd stable and as a user of the
> webserver there are no visible problems.
Hi Nick, also I agree this might not be the perfect clean fix, it at least
solves the user observed problem. I would think either the real root cause
should be fixed or at least this patch should be used, since it hides the
problem of the root cause. Don't you agree ?
--
Configure bugmail: http://bugs.ecos.sourceware.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug 1000762] httpd.c crashes on javascript
2009-05-12 12:27 [Bug 1000762] New: " bugzilla-daemon
2009-05-12 16:43 ` [Bug 1000762] " bugzilla-daemon
@ 2009-05-12 18:22 ` bugzilla-daemon
2009-05-21 12:21 ` bugzilla-daemon
2 siblings, 0 replies; 4+ messages in thread
From: bugzilla-daemon @ 2009-05-12 18:22 UTC (permalink / raw)
To: ecos-bugs
http://bugs.ecos.sourceware.org/show_bug.cgi?id=1000762
--- Comment #3 from Stefan Singer <Stefan.Singer@freescale.com> 2009-05-12 19:22:03 ---
(In reply to comment #0)
> Created an attachment (id=716)
--> (http://bugs.ecos.sourceware.org/attachment.cgi?id=716) [details]
> diff file to fix the problems described above
> When using extensive javascripting the httpd.c webserver crashes, when it
> encounters the EOF character. The attached patch just filters that out.
> Probably not an entirely clean fix, but avoids any further crash with no
> visible problems.
(In reply to comment #2)
> (In reply to comment #1)
> > Nick, presumably JavaScript can introduce EOF chars in the TCP stream. Does the
> > (reversed) patch make sense or is this hiding a more fundamental problem?
> >
> I'm not sure what this patch is trying to do. The EOF returned from getc() is
> actually -1, and indicates that the remote end has closed the connection. An
> EOF character, Ctrl-D, would appear as 0x04. EOF from getc() indicates that the
> remote end is failing to complete the HTTP protocol request, and this patch is
> just covering that up. Just breaking out of this loop seem incorrect, since the
> connection is now closed, and no response can be returned.
> Admittedly this code could probably be made a little more robust in the face of
> dropped connections. But I don't think this patch is the right way to do that.
Hi Nick, agreed, this is not a really clean fix, but I had the problem, that
the webserver was always crashing with a javascript, that was polling some
value very frequently, as soon as mouse traffic was created in addition.
Applying this patch at least makes the httpd stable and as a user of the
webserver there are no visible problems.
--
Configure bugmail: http://bugs.ecos.sourceware.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug 1000762] httpd.c crashes on javascript
2009-05-12 12:27 [Bug 1000762] New: " bugzilla-daemon
@ 2009-05-12 16:43 ` bugzilla-daemon
2009-05-12 18:22 ` bugzilla-daemon
2009-05-21 12:21 ` bugzilla-daemon
2 siblings, 0 replies; 4+ messages in thread
From: bugzilla-daemon @ 2009-05-12 16:43 UTC (permalink / raw)
To: ecos-bugs
http://bugs.ecos.sourceware.org/show_bug.cgi?id=1000762
John Dallaway <john@dallaway.org.uk> changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|jifl@ecoscentric.com |nickg@ecoscentric.com
--- Comment #1 from John Dallaway <john@dallaway.org.uk> 2009-05-12 17:43:25 ---
Nick, presumably JavaScript can introduce EOF chars in the TCP stream. Does the
(reversed) patch make sense or is this hiding a more fundamental problem?
--
Configure bugmail: http://bugs.ecos.sourceware.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2009-05-21 12:22 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <bug-1000762-13@http.bugzilla.ecoscentric.com/>
2009-05-21 12:22 ` [Bug 1000762] httpd.c crashes on javascript bugzilla-daemon
2009-05-12 12:27 [Bug 1000762] New: " bugzilla-daemon
2009-05-12 16:43 ` [Bug 1000762] " bugzilla-daemon
2009-05-12 18:22 ` bugzilla-daemon
2009-05-21 12:21 ` bugzilla-daemon
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).