2006-06-15 15:48:13 -04:00
|
|
|
/*
|
2010-06-01 11:45:26 -04:00
|
|
|
* include/proto/session.h
|
|
|
|
|
* This file defines everything related to sessions.
|
|
|
|
|
*
|
|
|
|
|
* Copyright (C) 2000-2010 Willy Tarreau - w@1wt.eu
|
|
|
|
|
*
|
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
|
* License as published by the Free Software Foundation, version 2.1
|
|
|
|
|
* exclusively.
|
|
|
|
|
*
|
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
|
*/
|
2006-06-15 15:48:13 -04:00
|
|
|
|
2006-06-25 20:48:02 -04:00
|
|
|
#ifndef _PROTO_SESSION_H
|
|
|
|
|
#define _PROTO_SESSION_H
|
|
|
|
|
|
2006-06-29 12:54:54 -04:00
|
|
|
#include <common/config.h>
|
2007-05-13 13:43:47 -04:00
|
|
|
#include <common/memory.h>
|
2006-06-25 20:48:02 -04:00
|
|
|
#include <types/session.h>
|
2010-06-20 05:19:22 -04:00
|
|
|
#include <proto/freq_ctr.h>
|
2010-06-14 15:04:55 -04:00
|
|
|
#include <proto/stick_table.h>
|
2006-06-15 15:48:13 -04:00
|
|
|
|
2007-05-13 13:43:47 -04:00
|
|
|
extern struct pool_head *pool2_session;
|
2008-11-23 13:53:55 -05:00
|
|
|
extern struct list sessions;
|
2007-05-13 13:43:47 -04:00
|
|
|
|
2012-11-19 10:10:32 -05:00
|
|
|
extern struct data_cb sess_conn_cb;
|
|
|
|
|
|
2010-06-01 11:45:26 -04:00
|
|
|
int session_accept(struct listener *l, int cfd, struct sockaddr_storage *addr);
|
2006-06-15 15:48:13 -04:00
|
|
|
|
2007-05-13 13:43:47 -04:00
|
|
|
/* perform minimal intializations, report 0 in case of error, 1 if OK. */
|
|
|
|
|
int init_session();
|
2006-06-25 20:48:02 -04:00
|
|
|
|
2011-09-07 17:01:56 -04:00
|
|
|
/* kill a session and set the termination flags to <why> (one of SN_ERR_*) */
|
|
|
|
|
void session_shutdown(struct session *session, int why);
|
2011-06-07 20:19:07 -04:00
|
|
|
|
2007-11-24 16:12:47 -05:00
|
|
|
void session_process_counters(struct session *s);
|
[BUG] fix the dequeuing logic to ensure that all requests get served
The dequeuing logic was completely wrong. First, a task was assigned
to all servers to process the queue, but this task was never scheduled
and was only woken up on session free. Second, there was no reservation
of server entries when a task was assigned a server. This means that
as long as the task was not connected to the server, its presence was
not accounted for. This was causing trouble when detecting whether or
not a server had reached maxconn. Third, during a redispatch, a session
could lose its place at the server's and get blocked because another
session at the same moment would have stolen the entry. Fourth, the
redispatch option did not work when maxqueue was reached for a server,
and it was not possible to do so without indefinitely hanging a session.
The root cause of all those problems was the lack of pre-reservation of
connections at the server's, and the lack of tracking of servers during
a redispatch. Everything relied on combinations of flags which could
appear similarly in quite distinct situations.
This patch is a major rework but there was no other solution, as the
internal logic was deeply flawed. The resulting code is cleaner, more
understandable, uses less magics and is overall more robust.
As an added bonus, "option redispatch" now works when maxqueue has
been reached on a server.
2008-06-20 09:04:11 -04:00
|
|
|
void sess_change_server(struct session *sess, struct server *newsrv);
|
2009-03-08 04:38:41 -04:00
|
|
|
struct task *process_session(struct task *t);
|
2009-03-15 17:34:05 -04:00
|
|
|
void default_srv_error(struct session *s, struct stream_interface *si);
|
2010-06-14 15:04:55 -04:00
|
|
|
int parse_track_counters(char **args, int *arg,
|
|
|
|
|
int section_type, struct proxy *curpx,
|
|
|
|
|
struct track_ctr_prm *prm,
|
2012-05-08 13:47:01 -04:00
|
|
|
struct proxy *defpx, char **err);
|
2010-06-14 15:04:55 -04:00
|
|
|
|
2014-06-17 06:19:18 -04:00
|
|
|
/* Update the session's backend and server time stats */
|
|
|
|
|
void session_update_time_stats(struct session *s);
|
|
|
|
|
|
2013-11-23 17:37:04 -05:00
|
|
|
/* returns the session from a void *owner */
|
|
|
|
|
static inline struct session *session_from_task(struct task *t)
|
|
|
|
|
{
|
|
|
|
|
return (struct session *)t->context;
|
|
|
|
|
}
|
|
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
/* sets the stick counter's entry pointer */
|
|
|
|
|
static inline void stkctr_set_entry(struct stkctr *stkctr, struct stksess *entry)
|
|
|
|
|
{
|
|
|
|
|
stkctr->entry = caddr_from_ptr(entry, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* returns the entry pointer from a stick counter */
|
|
|
|
|
static inline struct stksess *stkctr_entry(struct stkctr *stkctr)
|
|
|
|
|
{
|
|
|
|
|
return caddr_to_ptr(stkctr->entry);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* returns the two flags from a stick counter */
|
|
|
|
|
static inline unsigned int stkctr_flags(struct stkctr *stkctr)
|
|
|
|
|
{
|
|
|
|
|
return caddr_to_data(stkctr->entry);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* sets up to two flags at a time on a composite address */
|
|
|
|
|
static inline void stkctr_set_flags(struct stkctr *stkctr, unsigned int flags)
|
|
|
|
|
{
|
|
|
|
|
stkctr->entry = caddr_set_flags(stkctr->entry, flags);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* returns the two flags from a stick counter */
|
|
|
|
|
static inline void stkctr_clr_flags(struct stkctr *stkctr, unsigned int flags)
|
|
|
|
|
{
|
|
|
|
|
stkctr->entry = caddr_clr_flags(stkctr->entry, flags);
|
|
|
|
|
}
|
|
|
|
|
|
2010-06-14 15:04:55 -04:00
|
|
|
/* Remove the refcount from the session to the tracked counters, and clear the
|
|
|
|
|
* pointer to ensure this is only performed once. The caller is responsible for
|
|
|
|
|
* ensuring that the pointer is valid first.
|
|
|
|
|
*/
|
|
|
|
|
static inline void session_store_counters(struct session *s)
|
|
|
|
|
{
|
2010-08-03 10:29:52 -04:00
|
|
|
void *ptr;
|
2012-12-09 09:55:40 -05:00
|
|
|
int i;
|
2010-08-03 10:29:52 -04:00
|
|
|
|
2013-07-23 13:15:30 -04:00
|
|
|
for (i = 0; i < MAX_SESS_STKCTR; i++) {
|
2014-01-28 17:18:23 -05:00
|
|
|
if (!stkctr_entry(&s->stkctr[i]))
|
2012-12-09 09:55:40 -05:00
|
|
|
continue;
|
2014-01-28 17:18:23 -05:00
|
|
|
ptr = stktable_data_ptr(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]), STKTABLE_DT_CONN_CUR);
|
2010-08-03 10:29:52 -04:00
|
|
|
if (ptr)
|
|
|
|
|
stktable_data_cast(ptr, conn_cur)--;
|
2014-01-28 17:18:23 -05:00
|
|
|
stkctr_entry(&s->stkctr[i])->ref_cnt--;
|
|
|
|
|
stksess_kill_if_expired(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]));
|
|
|
|
|
stkctr_set_entry(&s->stkctr[i], NULL);
|
2010-06-18 10:35:43 -04:00
|
|
|
}
|
2010-06-14 15:04:55 -04:00
|
|
|
}
|
|
|
|
|
|
BUG/MEDIUM: counters: flush content counters after each request
One year ago, commit 5d5b5d8 ("MEDIUM: proto_tcp: add support for tracking
L7 information") brought support for tracking L7 information in tcp-request
content rules. Two years earlier, commit 0a4838c ("[MEDIUM] session-counters:
correctly unbind the counters tracked by the backend") used to flush the
backend counters after processing a request.
While that earliest patch was correct at the time, it became wrong after
the second patch was merged. The code does what it says, but the concept
is flawed. "TCP request content" rules are evaluated for each HTTP request
over a single connection. So if such a rule in the frontend decides to
track any L7 information or to track L4 information when an L7 condition
matches, then it is applied to all requests over the same connection even
if they don't match. This means that a rule such as :
tcp-request content track-sc0 src if { path /index.html }
will count one request for index.html, and another one for each of the
objects present on this page that are fetched over the same connection
which sent the initial matching request.
Worse, it is possible to make the code do stupid things by using multiple
counters:
tcp-request content track-sc0 src if { path /foo }
tcp-request content track-sc1 src if { path /bar }
Just sending two requests first, one with /foo, one with /bar, shows
twice the number of requests for all subsequent requests. Just because
both of them persist after the end of the request.
So the decision to flush backend-tracked counters was not the correct
one. In practice, what is important is to flush countent-based rules
since they are the ones evaluated for each request.
Doing so requires new flags in the session however, to keep track of
which stick-counter was tracked by what ruleset. A later change might
make this easier to maintain over time.
This bug is 1.5-specific, no backport to stable is needed.
2014-01-28 15:40:28 -05:00
|
|
|
/* Remove the refcount from the session counters tracked at the content level if
|
2010-08-03 10:29:52 -04:00
|
|
|
* any, and clear the pointer to ensure this is only performed once. The caller
|
|
|
|
|
* is responsible for ensuring that the pointer is valid first.
|
2010-06-14 15:04:55 -04:00
|
|
|
*/
|
BUG/MEDIUM: counters: flush content counters after each request
One year ago, commit 5d5b5d8 ("MEDIUM: proto_tcp: add support for tracking
L7 information") brought support for tracking L7 information in tcp-request
content rules. Two years earlier, commit 0a4838c ("[MEDIUM] session-counters:
correctly unbind the counters tracked by the backend") used to flush the
backend counters after processing a request.
While that earliest patch was correct at the time, it became wrong after
the second patch was merged. The code does what it says, but the concept
is flawed. "TCP request content" rules are evaluated for each HTTP request
over a single connection. So if such a rule in the frontend decides to
track any L7 information or to track L4 information when an L7 condition
matches, then it is applied to all requests over the same connection even
if they don't match. This means that a rule such as :
tcp-request content track-sc0 src if { path /index.html }
will count one request for index.html, and another one for each of the
objects present on this page that are fetched over the same connection
which sent the initial matching request.
Worse, it is possible to make the code do stupid things by using multiple
counters:
tcp-request content track-sc0 src if { path /foo }
tcp-request content track-sc1 src if { path /bar }
Just sending two requests first, one with /foo, one with /bar, shows
twice the number of requests for all subsequent requests. Just because
both of them persist after the end of the request.
So the decision to flush backend-tracked counters was not the correct
one. In practice, what is important is to flush countent-based rules
since they are the ones evaluated for each request.
Doing so requires new flags in the session however, to keep track of
which stick-counter was tracked by what ruleset. A later change might
make this easier to maintain over time.
This bug is 1.5-specific, no backport to stable is needed.
2014-01-28 15:40:28 -05:00
|
|
|
static inline void session_stop_content_counters(struct session *s)
|
2010-06-14 15:04:55 -04:00
|
|
|
{
|
2010-08-03 10:29:52 -04:00
|
|
|
void *ptr;
|
2012-12-09 09:55:40 -05:00
|
|
|
int i;
|
2010-06-18 15:03:20 -04:00
|
|
|
|
2013-07-23 13:15:30 -04:00
|
|
|
for (i = 0; i < MAX_SESS_STKCTR; i++) {
|
2014-01-28 17:18:23 -05:00
|
|
|
if (!stkctr_entry(&s->stkctr[i]))
|
2012-12-09 09:55:40 -05:00
|
|
|
continue;
|
|
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
if (!(stkctr_flags(&s->stkctr[i]) & STKCTR_TRACK_CONTENT))
|
2012-12-09 09:55:40 -05:00
|
|
|
continue;
|
|
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
ptr = stktable_data_ptr(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]), STKTABLE_DT_CONN_CUR);
|
2010-08-06 14:11:05 -04:00
|
|
|
if (ptr)
|
|
|
|
|
stktable_data_cast(ptr, conn_cur)--;
|
2014-01-28 17:18:23 -05:00
|
|
|
stkctr_entry(&s->stkctr[i])->ref_cnt--;
|
|
|
|
|
stksess_kill_if_expired(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]));
|
|
|
|
|
stkctr_set_entry(&s->stkctr[i], NULL);
|
2010-08-06 14:11:05 -04:00
|
|
|
}
|
2010-08-03 10:29:52 -04:00
|
|
|
}
|
2010-06-18 15:03:20 -04:00
|
|
|
|
2010-08-03 10:29:52 -04:00
|
|
|
/* Increase total and concurrent connection count for stick entry <ts> of table
|
|
|
|
|
* <t>. The caller is responsible for ensuring that <t> and <ts> are valid
|
|
|
|
|
* pointers, and for calling this only once per connection.
|
|
|
|
|
*/
|
|
|
|
|
static inline void session_start_counters(struct stktable *t, struct stksess *ts)
|
|
|
|
|
{
|
|
|
|
|
void *ptr;
|
|
|
|
|
|
|
|
|
|
ptr = stktable_data_ptr(t, ts, STKTABLE_DT_CONN_CUR);
|
|
|
|
|
if (ptr)
|
|
|
|
|
stktable_data_cast(ptr, conn_cur)++;
|
|
|
|
|
|
|
|
|
|
ptr = stktable_data_ptr(t, ts, STKTABLE_DT_CONN_CNT);
|
|
|
|
|
if (ptr)
|
|
|
|
|
stktable_data_cast(ptr, conn_cnt)++;
|
|
|
|
|
|
|
|
|
|
ptr = stktable_data_ptr(t, ts, STKTABLE_DT_CONN_RATE);
|
|
|
|
|
if (ptr)
|
|
|
|
|
update_freq_ctr_period(&stktable_data_cast(ptr, conn_rate),
|
|
|
|
|
t->data_arg[STKTABLE_DT_CONN_RATE].u, 1);
|
|
|
|
|
if (tick_isset(t->expire))
|
|
|
|
|
ts->expire = tick_add(now_ms, MS_TO_TICKS(t->expire));
|
|
|
|
|
}
|
2010-06-20 05:19:22 -04:00
|
|
|
|
2012-12-09 09:55:40 -05:00
|
|
|
/* Enable tracking of session counters as <stkctr> on stksess <ts>. The caller is
|
2010-08-03 10:29:52 -04:00
|
|
|
* responsible for ensuring that <t> and <ts> are valid pointers. Some controls
|
|
|
|
|
* are performed to ensure the state can still change.
|
|
|
|
|
*/
|
2012-12-09 09:55:40 -05:00
|
|
|
static inline void session_track_stkctr(struct stkctr *ctr, struct stktable *t, struct stksess *ts)
|
2010-08-03 10:29:52 -04:00
|
|
|
{
|
2014-01-28 17:18:23 -05:00
|
|
|
if (stkctr_entry(ctr))
|
2010-08-03 10:29:52 -04:00
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
ts->ref_cnt++;
|
2012-12-09 09:55:40 -05:00
|
|
|
ctr->table = t;
|
2014-01-28 17:18:23 -05:00
|
|
|
stkctr_set_entry(ctr, ts);
|
2010-08-03 10:29:52 -04:00
|
|
|
session_start_counters(t, ts);
|
2010-06-14 15:04:55 -04:00
|
|
|
}
|
2007-11-24 16:12:47 -05:00
|
|
|
|
2010-06-23 05:44:09 -04:00
|
|
|
/* Increase the number of cumulated HTTP requests in the tracked counters */
|
|
|
|
|
static void inline session_inc_http_req_ctr(struct session *s)
|
|
|
|
|
{
|
2010-08-03 10:29:52 -04:00
|
|
|
void *ptr;
|
2012-12-09 09:55:40 -05:00
|
|
|
int i;
|
2010-06-23 05:44:09 -04:00
|
|
|
|
2013-07-23 13:15:30 -04:00
|
|
|
for (i = 0; i < MAX_SESS_STKCTR; i++) {
|
2014-01-28 17:18:23 -05:00
|
|
|
if (!stkctr_entry(&s->stkctr[i]))
|
2012-12-09 09:55:40 -05:00
|
|
|
continue;
|
2010-06-23 05:44:09 -04:00
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
ptr = stktable_data_ptr(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]), STKTABLE_DT_HTTP_REQ_CNT);
|
2010-08-03 10:29:52 -04:00
|
|
|
if (ptr)
|
|
|
|
|
stktable_data_cast(ptr, http_req_cnt)++;
|
2012-12-09 06:00:04 -05:00
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
ptr = stktable_data_ptr(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]), STKTABLE_DT_HTTP_REQ_RATE);
|
2012-12-09 06:00:04 -05:00
|
|
|
if (ptr)
|
|
|
|
|
update_freq_ctr_period(&stktable_data_cast(ptr, http_req_rate),
|
2012-12-09 09:55:40 -05:00
|
|
|
s->stkctr[i].table->data_arg[STKTABLE_DT_HTTP_REQ_RATE].u, 1);
|
2012-12-09 06:00:04 -05:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Increase the number of cumulated HTTP requests in the backend's tracked counters */
|
|
|
|
|
static void inline session_inc_be_http_req_ctr(struct session *s)
|
|
|
|
|
{
|
|
|
|
|
void *ptr;
|
2012-12-09 09:55:40 -05:00
|
|
|
int i;
|
2012-12-09 06:00:04 -05:00
|
|
|
|
2013-07-23 13:15:30 -04:00
|
|
|
for (i = 0; i < MAX_SESS_STKCTR; i++) {
|
2014-01-28 17:18:23 -05:00
|
|
|
if (!stkctr_entry(&s->stkctr[i]))
|
2012-12-09 09:55:40 -05:00
|
|
|
continue;
|
2012-12-09 06:00:04 -05:00
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
if (!(stkctr_flags(&s->stkctr[i]) & STKCTR_TRACK_BACKEND))
|
2012-12-09 09:55:40 -05:00
|
|
|
continue;
|
2012-12-09 06:00:04 -05:00
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
ptr = stktable_data_ptr(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]), STKTABLE_DT_HTTP_REQ_CNT);
|
2012-12-09 06:00:04 -05:00
|
|
|
if (ptr)
|
|
|
|
|
stktable_data_cast(ptr, http_req_cnt)++;
|
2010-08-03 10:29:52 -04:00
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
ptr = stktable_data_ptr(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]), STKTABLE_DT_HTTP_REQ_RATE);
|
2010-08-03 10:29:52 -04:00
|
|
|
if (ptr)
|
|
|
|
|
update_freq_ctr_period(&stktable_data_cast(ptr, http_req_rate),
|
2012-12-09 09:55:40 -05:00
|
|
|
s->stkctr[i].table->data_arg[STKTABLE_DT_HTTP_REQ_RATE].u, 1);
|
2010-06-23 05:44:09 -04:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Increase the number of cumulated failed HTTP requests in the tracked
|
|
|
|
|
* counters. Only 4xx requests should be counted here so that we can
|
|
|
|
|
* distinguish between errors caused by client behaviour and other ones.
|
|
|
|
|
* Note that even 404 are interesting because they're generally caused by
|
|
|
|
|
* vulnerability scans.
|
|
|
|
|
*/
|
|
|
|
|
static void inline session_inc_http_err_ctr(struct session *s)
|
|
|
|
|
{
|
2010-08-03 10:29:52 -04:00
|
|
|
void *ptr;
|
2012-12-09 09:55:40 -05:00
|
|
|
int i;
|
2010-08-03 10:29:52 -04:00
|
|
|
|
2013-07-23 13:15:30 -04:00
|
|
|
for (i = 0; i < MAX_SESS_STKCTR; i++) {
|
2014-01-28 17:18:23 -05:00
|
|
|
if (!stkctr_entry(&s->stkctr[i]))
|
2012-12-09 09:55:40 -05:00
|
|
|
continue;
|
2010-06-23 05:44:09 -04:00
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
ptr = stktable_data_ptr(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]), STKTABLE_DT_HTTP_ERR_CNT);
|
2010-06-23 05:44:09 -04:00
|
|
|
if (ptr)
|
|
|
|
|
stktable_data_cast(ptr, http_err_cnt)++;
|
|
|
|
|
|
2014-01-28 17:18:23 -05:00
|
|
|
ptr = stktable_data_ptr(s->stkctr[i].table, stkctr_entry(&s->stkctr[i]), STKTABLE_DT_HTTP_ERR_RATE);
|
2010-06-23 05:44:09 -04:00
|
|
|
if (ptr)
|
|
|
|
|
update_freq_ctr_period(&stktable_data_cast(ptr, http_err_rate),
|
2012-12-09 09:55:40 -05:00
|
|
|
s->stkctr[i].table->data_arg[STKTABLE_DT_HTTP_ERR_RATE].u, 1);
|
2010-06-23 05:44:09 -04:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2011-06-21 01:34:57 -04:00
|
|
|
static void inline session_add_srv_conn(struct session *sess, struct server *srv)
|
|
|
|
|
{
|
|
|
|
|
sess->srv_conn = srv;
|
|
|
|
|
LIST_ADD(&srv->actconns, &sess->by_srv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void inline session_del_srv_conn(struct session *sess)
|
|
|
|
|
{
|
|
|
|
|
if (!sess->srv_conn)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
sess->srv_conn = NULL;
|
|
|
|
|
LIST_DEL(&sess->by_srv);
|
|
|
|
|
}
|
|
|
|
|
|
2011-07-19 18:17:39 -04:00
|
|
|
static void inline session_init_srv_conn(struct session *sess)
|
|
|
|
|
{
|
|
|
|
|
sess->srv_conn = NULL;
|
|
|
|
|
LIST_INIT(&sess->by_srv);
|
|
|
|
|
}
|
|
|
|
|
|
2006-06-25 20:48:02 -04:00
|
|
|
#endif /* _PROTO_SESSION_H */
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Local variables:
|
|
|
|
|
* c-indent-level: 8
|
|
|
|
|
* c-basic-offset: 8
|
|
|
|
|
* End:
|
|
|
|
|
*/
|