From: Chris Darroch Date: Sat, 29 Mar 2008 00:34:58 +0000 (+0000) Subject: comment on PR 41960 backport X-Git-Tag: 2.2.9~270 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=e08899ba4e6f14e6882dcdbc6c5d3397373629a2;p=thirdparty%2Fapache%2Fhttpd.git comment on PR 41960 backport git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@642454 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/STATUS b/STATUS index 896140efd58..b9ae36c96f9 100644 --- a/STATUS +++ b/STATUS @@ -141,11 +141,24 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK: +1 covener, niq * core: Reinstate location walk for subrequests. + PR: 41960. Trunk version of patch: http://svn.apache.org/viewvc?view=rev&revision=579664 Backport version of 2.2.x of patch: Trunk version works (minus CHANGES conflict) +1: niq + chrisd says: The patch seems to address the issues in the PR. + My only concern would be that the ap_location_walk() call + (the second one) expects r->uri. I'm fairly sure that + no native httpd code creates subrequests where r->uri is + NULL. However, it might be wise to wrap the second + ap_location_walk() with something like: + if(!file_req || (r->uri && r->uri[0] != '\0')) + Things like "RewriteCond /foo -F" can use + ap_sub_req_lookup_file() to create subrequests with + r->uri = "" (but not NULL, I think ...); we might as + well bypass checks on these, and also handle + any external modules that might try passing r->uri as NULL. * ab: Use a 64 bit unsigned int instead of a signed long to count the bytes transferred to avoid integer overflows