The following comment has been added to this issue:
Author: Neil Graham
Created: Thu, 13 May 2004 6:45 AM
Body:
Hi Dan. A few thoughts: You might want to look at the way the
http://apache.org/xml/properties/input-buffer-size property is implemented in
Xerces-J, since that seems to aim at doing pretty much what you're after. Xerces-J
has a fairly different design when it comes to scanning, so it might not be directly
relevant; but might give you some ideas.
The idea sounds good in general to me. It sounds like you'll need to define a new
property on the parsers for the buffer size, and maybe one for the handler. On the
other hand, if you can design a handler that knows how to make appropriate calls to
the scanner's sendChars() method so that the buffer gets flushed when a maximum buffer
size is reached, then perhaps a pluggable handler wouldn't be necessary since the
default behaviour would always work when an application has chosen to set this limit.
I'd also observe that XMLBuffer has to check to use the infelicitously named
"insureCapacity()" method to make sure it's large enough; you could easily add a
boolean to this check so that, instead of expanding its capacity if it's full, if a
maximum size has been set then a call would be made to the handler. This extra check
would then only be done in the relatively unlikely situation where a buffer reaches
its full size, so certainly wouldn't impact the performance of existing code that
doesn't need the new property.
---------------------------------------------------------------------
View this comment:
http://issues.apache.org/jira/browse/XERCESC-1207?page=comments#action_35524
---------------------------------------------------------------------
View the issue:
http://issues.apache.org/jira/browse/XERCESC-1207
Here is an overview of the issue:
---------------------------------------------------------------------
Key: XERCESC-1207
Summary: XMLScanner::scanCharData fills XMLBuffer until out of memory
Type: Bug
Status: Unassigned
Priority: Critical
Project: Xerces-C++
Components:
Non-Validating Parser
Versions:
2.5.0
Assignee:
Reporter: Dan Rosen
Created: Mon, 10 May 2004 10:51 AM
Updated: Thu, 13 May 2004 6:45 AM
Description:
When parsing an XML file consisting primarily of very large (hundreds of megabytes)
blocks of contiguous character data, XMLScanner::scanCharData() happily attempts to
build a single XMLBuffer containing all the data. Eventually the buffer becomes so
large that the reallocation within XMLBuffer::insureCapacity() fails, causing
std::bad_alloc to be thrown, or a crash in memcpy (depending on compiler). The
fundamental problem seems to be that there is no upper bound imposed on buffer length.
In the SAX model, it is acceptable to issue multiple ContentHandler::characters()
callbacks for a single contiguous block of data. The only restriction on how this
should be implemented is that all characters in any single event must come from the
same external entity; no further behavior is specified. So it would be perfectly
conformant to the SAX model to set an upper bound on the size of a single characters()
event.
(As far as I understand, allowing an upper bound in XMLScanner::scanCharData() would
not affect the DOM)
I'd propose that an upper bound for character buffer size be added as an optional
parameter (with some reasonable value as a default), either in the constructor of the
parser or in useScanner(), and that that parameter be used to inform
XMLScanner::scanCharData() when to force a call to sendCharData() to dump the buffer
to its client.
---------------------------------------------------------------------
JIRA INFORMATION:
This message is automatically generated by JIRA.
If you think it was sent incorrectly contact one of the administrators:
http://issues.apache.org/jira/secure/Administrators.jspa
If you want more information on JIRA, or have a bug to report see:
http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]