mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2025-02-24 14:46:56 +00:00
The condition to poll for receive as implemented in channel_may_recv() is still incorrect. If buf->o is null and buf->i is slightly larger than chn->to_forward and at least as large as buf->size - maxrewrite, then reading will be disabled. It may slightly delay some data delivery by having first to forward pending bytes, but may also cause some random issues with analysers that wait for some data before starting to forward what they correctly parsed. For instance, a body analyser may be prevented from seeing the data that only fits in the reserve. This bug may also prevent an applet's chk_rcv() function from being called when part of a buffer is released. It is possible (though not verified) that this participated to some peers frozen session issues some people have been facing. This fix should be backported to 1.6 and 1.5 to ensure better coherency with channel_recv_limit(). |
||
---|---|---|
.. | ||
common | ||
import | ||
proto | ||
types |