From 020a37a9a81d8728f425f837011419ef4e99b64f Mon Sep 17 00:00:00 2001 From: AlexDuan <417921451@qq.com> Date: Wed, 29 Sep 2021 11:35:30 +0800 Subject: [PATCH] add comment for overflow --- src/query/src/qExecutor.c | 1 + 1 file changed, 1 insertion(+) diff --git a/src/query/src/qExecutor.c b/src/query/src/qExecutor.c index 982996d70d..78d4aabdd8 100644 --- a/src/query/src/qExecutor.c +++ b/src/query/src/qExecutor.c @@ -8914,6 +8914,7 @@ static void doSetTagValueToResultBuf(char* output, const char* val, int16_t type if (IS_VAR_DATA_TYPE(type)) { // Binary data overflows for sort of unknown reasons. Let trim the overflow data + // overflow one reason is client tag length is less than server tag length if (varDataTLen(val) > bytes) { int32_t maxLen = bytes - VARSTR_HEADER_SIZE; int32_t len = (varDataLen(val) > maxLen)? maxLen:varDataLen(val); -- GitLab