MEDIUM: session: use the pointer to the origin instead of s->si[0].end
When s->si[0].end was dereferenced as a connection or anything in
order to retrieve information about the originating session, we'll
now use sess->origin instead so that when we have to chain multiple
streams in HTTP/2, we'll keep accessing the same origin.
diff --git a/src/backend.c b/src/backend.c
index 921dad0..2c2a61e 100644
--- a/src/backend.c
+++ b/src/backend.c
@@ -607,7 +607,7 @@
switch (s->be->lbprm.algo & BE_LB_PARM) {
case BE_LB_HASH_SRC:
- conn = objt_conn(s->si[0].end);
+ conn = objt_conn(strm_sess(s)->origin);
if (conn && conn->addr.from.ss_family == AF_INET) {
srv = get_server_sh(s->be,
(void *)&((struct sockaddr_in *)&conn->addr.from)->sin_addr,
@@ -746,7 +746,7 @@
*/
int assign_server_address(struct stream *s)
{
- struct connection *cli_conn = objt_conn(s->si[0].end);
+ struct connection *cli_conn = objt_conn(strm_sess(s)->origin);
struct connection *srv_conn = objt_conn(s->si[1].end);
#ifdef DEBUG_FULL
@@ -966,7 +966,7 @@
case CO_SRC_TPROXY_CLI:
case CO_SRC_TPROXY_CIP:
/* FIXME: what can we do if the client connects in IPv6 or unix socket ? */
- cli_conn = objt_conn(s->si[0].end);
+ cli_conn = objt_conn(strm_sess(s)->origin);
if (cli_conn)
srv_conn->addr.from = cli_conn->addr.from;
else
@@ -1074,7 +1074,7 @@
srv_conn->send_proxy_ofs = 0;
if (objt_server(s->target) && objt_server(s->target)->pp_opts) {
srv_conn->send_proxy_ofs = 1; /* must compute size */
- cli_conn = objt_conn(s->si[0].end);
+ cli_conn = objt_conn(strm_sess(s)->origin);
if (cli_conn)
conn_get_to_addr(cli_conn);
}
diff --git a/src/dumpstats.c b/src/dumpstats.c
index 1562078..2aed81a 100644
--- a/src/dumpstats.c
+++ b/src/dumpstats.c
@@ -5022,7 +5022,7 @@
sess->uniq_id,
strm_sess(sess)->listener && strm_sess(sess)->listener->proto->name ? strm_sess(sess)->listener->proto->name : "?");
- conn = objt_conn(sess->si[0].end);
+ conn = objt_conn(strm_sess(sess)->origin);
switch (conn ? addr_to_str(&conn->addr.from, pn, sizeof(pn)) : AF_UNSPEC) {
case AF_INET:
case AF_INET6:
@@ -5604,7 +5604,7 @@
strm_sess(curr_sess)->listener->proto->name);
- conn = objt_conn(curr_sess->si[0].end);
+ conn = objt_conn(strm_sess(curr_sess)->origin);
switch (conn ? addr_to_str(&conn->addr.from, pn, sizeof(pn)) : AF_UNSPEC) {
case AF_INET:
case AF_INET6:
diff --git a/src/frontend.c b/src/frontend.c
index 1b3abfa..caf0fc2 100644
--- a/src/frontend.c
+++ b/src/frontend.c
@@ -55,7 +55,7 @@
int frontend_accept(struct stream *s)
{
struct session *sess = s->sess;
- struct connection *conn = __objt_conn(s->si[0].end);
+ struct connection *conn = __objt_conn(sess->origin);
struct listener *l = sess->listener;
struct proxy *fe = sess->fe;
diff --git a/src/hlua.c b/src/hlua.c
index 363c09b..650051a 100644
--- a/src/hlua.c
+++ b/src/hlua.c
@@ -3505,7 +3505,7 @@
htxn = MAY_LJMP(hlua_checktxn(L, 1));
tos = MAY_LJMP(luaL_checkinteger(L, 2));
- if ((cli_conn = objt_conn(htxn->s->si[0].end)) && conn_ctrl_ready(cli_conn))
+ if ((cli_conn = objt_conn(htxn->s->sess->origin)) && conn_ctrl_ready(cli_conn))
inet_set_tos(cli_conn->t.sock.fd, cli_conn->addr.from, tos);
return 0;
@@ -3522,7 +3522,7 @@
htxn = MAY_LJMP(hlua_checktxn(L, 1));
mark = MAY_LJMP(luaL_checkinteger(L, 2));
- if ((cli_conn = objt_conn(htxn->s->si[0].end)) && conn_ctrl_ready(cli_conn))
+ if ((cli_conn = objt_conn(htxn->s->sess->origin)) && conn_ctrl_ready(cli_conn))
setsockopt(cli_conn->t.sock.fd, SOL_SOCKET, SO_MARK, &mark, sizeof(mark));
#endif
return 0;
diff --git a/src/log.c b/src/log.c
index 80ac989..d2f8ad5 100644
--- a/src/log.c
+++ b/src/log.c
@@ -986,7 +986,7 @@
break;
case LOG_FMT_CLIENTIP: // %ci
- conn = objt_conn(s->si[0].end);
+ conn = objt_conn(sess->origin);
if (conn)
ret = lf_ip(tmplog, (struct sockaddr *)&conn->addr.from, dst + maxsize - tmplog, tmp);
else
@@ -998,7 +998,7 @@
break;
case LOG_FMT_CLIENTPORT: // %cp
- conn = objt_conn(s->si[0].end);
+ conn = objt_conn(sess->origin);
if (conn) {
if (conn->addr.from.ss_family == AF_UNIX) {
ret = ltoa_o(sess->listener->luid, tmplog, dst + maxsize - tmplog);
@@ -1017,7 +1017,7 @@
break;
case LOG_FMT_FRONTENDIP: // %fi
- conn = objt_conn(s->si[0].end);
+ conn = objt_conn(sess->origin);
if (conn) {
conn_get_to_addr(conn);
ret = lf_ip(tmplog, (struct sockaddr *)&conn->addr.to, dst + maxsize - tmplog, tmp);
@@ -1032,7 +1032,7 @@
break;
case LOG_FMT_FRONTENDPORT: // %fp
- conn = objt_conn(s->si[0].end);
+ conn = objt_conn(sess->origin);
if (conn) {
conn_get_to_addr(conn);
if (conn->addr.to.ss_family == AF_UNIX)
@@ -1193,7 +1193,7 @@
#ifdef USE_OPENSSL
case LOG_FMT_SSL_CIPHER: // %sslc
src = NULL;
- conn = objt_conn(s->si[0].end);
+ conn = objt_conn(sess->origin);
if (conn) {
if (sess->listener->xprt == &ssl_sock)
src = ssl_sock_get_cipher_name(conn);
@@ -1207,7 +1207,7 @@
case LOG_FMT_SSL_VERSION: // %sslv
src = NULL;
- conn = objt_conn(s->si[0].end);
+ conn = objt_conn(sess->origin);
if (conn) {
if (sess->listener->xprt == &ssl_sock)
src = ssl_sock_get_proto_version(conn);
diff --git a/src/proto_http.c b/src/proto_http.c
index 0c7bbc4..3e87470 100644
--- a/src/proto_http.c
+++ b/src/proto_http.c
@@ -2772,12 +2772,13 @@
req->flags |= CF_READ_DONTWAIT; /* try to get back here ASAP */
s->res.flags &= ~CF_EXPECT_MORE; /* speed up sending a previous response */
#ifdef TCP_QUICKACK
- if (sess->listener->options & LI_O_NOQUICKACK && req->buf->i && objt_conn(s->si[0].end) && conn_ctrl_ready(__objt_conn(s->si[0].end))) {
+ if (sess->listener->options & LI_O_NOQUICKACK && req->buf->i &&
+ objt_conn(sess->origin) && conn_ctrl_ready(__objt_conn(sess->origin))) {
/* We need more data, we have to re-enable quick-ack in case we
* previously disabled it, otherwise we might cause the client
* to delay next data.
*/
- setsockopt(__objt_conn(s->si[0].end)->t.sock.fd, IPPROTO_TCP, TCP_QUICKACK, &one, sizeof(one));
+ setsockopt(__objt_conn(sess->origin)->t.sock.fd, IPPROTO_TCP, TCP_QUICKACK, &one, sizeof(one));
}
#endif
@@ -3325,6 +3326,7 @@
enum rule_result
http_req_get_intercept_rule(struct proxy *px, struct list *rules, struct stream *s, struct http_txn *txn)
{
+ struct session *sess = strm_sess(s);
struct connection *cli_conn;
struct http_req_rule *rule;
struct hdr_ctx ctx;
@@ -3400,13 +3402,13 @@
break;
case HTTP_REQ_ACT_SET_TOS:
- if ((cli_conn = objt_conn(s->si[0].end)) && conn_ctrl_ready(cli_conn))
+ if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn))
inet_set_tos(cli_conn->t.sock.fd, cli_conn->addr.from, rule->arg.tos);
break;
case HTTP_REQ_ACT_SET_MARK:
#ifdef SO_MARK
- if ((cli_conn = objt_conn(s->si[0].end)) && conn_ctrl_ready(cli_conn))
+ if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn))
setsockopt(cli_conn->t.sock.fd, SOL_SOCKET, SO_MARK, &rule->arg.mark, sizeof(rule->arg.mark));
#endif
break;
@@ -3577,7 +3579,7 @@
t->data_arg[STKTABLE_DT_HTTP_REQ_RATE].u, 1);
stkctr_set_flags(&s->stkctr[http_req_trk_idx(rule->action)], STKCTR_TRACK_CONTENT);
- if (strm_sess(s)->fe != s->be)
+ if (sess->fe != s->be)
stkctr_set_flags(&s->stkctr[http_req_trk_idx(rule->action)], STKCTR_TRACK_BACKEND);
}
}
@@ -3600,6 +3602,7 @@
static enum rule_result
http_res_get_intercept_rule(struct proxy *px, struct list *rules, struct stream *s, struct http_txn *txn)
{
+ struct session *sess = strm_sess(s);
struct connection *cli_conn;
struct http_res_rule *rule;
struct hdr_ctx ctx;
@@ -3647,13 +3650,13 @@
break;
case HTTP_RES_ACT_SET_TOS:
- if ((cli_conn = objt_conn(s->si[0].end)) && conn_ctrl_ready(cli_conn))
+ if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn))
inet_set_tos(cli_conn->t.sock.fd, cli_conn->addr.from, rule->arg.tos);
break;
case HTTP_RES_ACT_SET_MARK:
#ifdef SO_MARK
- if ((cli_conn = objt_conn(s->si[0].end)) && conn_ctrl_ready(cli_conn))
+ if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn))
setsockopt(cli_conn->t.sock.fd, SOL_SOCKET, SO_MARK, &rule->arg.mark, sizeof(rule->arg.mark));
#endif
break;
@@ -8589,6 +8592,7 @@
struct http_msg *msg,
enum ht_state state, struct proxy *other_end)
{
+ struct session *sess = strm_sess(s);
struct channel *chn = msg->chn;
int len1, len2;
@@ -8610,8 +8614,8 @@
es->sid = s->uniq_id;
es->srv = objt_server(s->target);
es->oe = other_end;
- if (objt_conn(s->si[0].end))
- es->src = __objt_conn(s->si[0].end)->addr.from;
+ if (objt_conn(sess->origin))
+ es->src = __objt_conn(sess->origin)->addr.from;
else
memset(&es->src, 0, sizeof(es->src));
@@ -8765,10 +8769,12 @@
*/
void debug_hdr(const char *dir, struct stream *s, const char *start, const char *end)
{
+ struct session *sess = strm_sess(s);
int max;
+
chunk_printf(&trash, "%08x:%s.%s[%04x:%04x]: ", s->uniq_id, s->be->id,
dir,
- objt_conn(s->si[0].end) ? (unsigned short)objt_conn(s->si[0].end)->t.sock.fd : -1,
+ objt_conn(sess->origin) ? (unsigned short)objt_conn(sess->origin)->t.sock.fd : -1,
objt_conn(s->si[1].end) ? (unsigned short)objt_conn(s->si[1].end)->t.sock.fd : -1);
for (max = 0; start + max < end; max++)
@@ -10585,7 +10591,8 @@
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct chunk *temp;
- struct connection *cli_conn = objt_conn(l4->si[0].end);
+ struct session *sess = strm_sess(l4);
+ struct connection *cli_conn = objt_conn(sess->origin);
if (!cli_conn)
return 0;
@@ -11374,7 +11381,8 @@
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct chunk *temp;
- struct connection *cli_conn = objt_conn(l4->si[0].end);
+ struct session *sess = strm_sess(l4);
+ struct connection *cli_conn = objt_conn(sess->origin);
if (!smp_fetch_url32(px, l4, l7, opt, args, smp, kw, private))
return 0;
diff --git a/src/proto_tcp.c b/src/proto_tcp.c
index 67404cf..6a67785 100644
--- a/src/proto_tcp.c
+++ b/src/proto_tcp.c
@@ -1366,7 +1366,7 @@
struct tcp_rule *rule;
struct stksess *ts;
struct stktable *t = NULL;
- struct connection *conn = objt_conn(s->si[0].end);
+ struct connection *conn = objt_conn(sess->origin);
int result = 1;
enum acl_test_res ret;
@@ -1968,7 +1968,8 @@
smp_fetch_src(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
- struct connection *cli_conn = objt_conn(l4->si[0].end);
+ struct session *sess = strm_sess(l4);
+ struct connection *cli_conn = objt_conn(sess->origin);
if (!cli_conn)
return 0;
@@ -1995,7 +1996,8 @@
smp_fetch_sport(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *k, void *private)
{
- struct connection *cli_conn = objt_conn(l4->si[0].end);
+ struct session *sess = strm_sess(l4);
+ struct connection *cli_conn = objt_conn(sess->origin);
if (!cli_conn)
return 0;
@@ -2013,7 +2015,8 @@
smp_fetch_dst(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
- struct connection *cli_conn = objt_conn(l4->si[0].end);
+ struct session *sess = strm_sess(l4);
+ struct connection *cli_conn = objt_conn(sess->origin);
if (!cli_conn)
return 0;
@@ -2042,7 +2045,8 @@
smp_fetch_dport(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
- struct connection *cli_conn = objt_conn(l4->si[0].end);
+ struct session *sess = strm_sess(l4);
+ struct connection *cli_conn = objt_conn(sess->origin);
if (!cli_conn)
return 0;
diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index f695309..39d759e 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -77,6 +77,7 @@
#include <proto/proxy.h>
#include <proto/shctx.h>
#include <proto/ssl_sock.h>
+#include <proto/stream.h>
#include <proto/task.h>
/* Warning, these are bits, not integers! */
@@ -3087,11 +3088,12 @@
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct connection *conn;
+ struct session *sess = l4->sess;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3119,12 +3121,13 @@
X509 *crt = NULL;
int ret = 0;
struct chunk *smp_trash;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3167,12 +3170,13 @@
X509 *crt = NULL;
int ret = 0;
struct chunk *smp_trash;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3216,12 +3220,13 @@
const EVP_MD *digest;
int ret = 0;
struct chunk *smp_trash;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3263,12 +3268,13 @@
X509 *crt = NULL;
int ret = 0;
struct chunk *smp_trash;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3311,12 +3317,13 @@
X509_NAME *name;
int ret = 0;
struct chunk *smp_trash;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3373,12 +3380,13 @@
X509 *crt = NULL;
int ret = 0;
struct chunk *smp_trash;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3421,12 +3429,13 @@
X509_NAME *name;
int ret = 0;
struct chunk *smp_trash;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3477,12 +3486,13 @@
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
X509 *crt;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3512,12 +3522,13 @@
{
int cert_peer = (kw[4] == 'c') ? 1 : 0;
X509 *crt;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3553,12 +3564,13 @@
int cert_peer = (kw[4] == 'c') ? 1 : 0;
X509 *crt;
int nid;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3605,12 +3617,13 @@
int cert_peer = (kw[4] == 'c') ? 1 : 0;
X509 *crt;
int nid;
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3667,7 +3680,8 @@
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
- struct connection *conn = objt_conn(l4->si[0].end);
+ struct session *sess = strm_sess(l4);
+ struct connection *conn = objt_conn(sess->origin);
smp->type = SMP_T_BOOL;
smp->data.uint = (conn && conn->xprt == &ssl_sock) &&
@@ -3774,6 +3788,7 @@
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct connection *conn;
+ struct session *sess = strm_sess(l4);
smp->flags = SMP_F_CONST;
smp->type = SMP_T_STR;
@@ -3781,7 +3796,7 @@
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || !conn->xprt_ctx || conn->xprt != &ssl_sock)
return 0;
@@ -3802,6 +3817,7 @@
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct connection *conn;
+ struct session *sess = strm_sess(l4);
smp->flags = SMP_F_CONST;
smp->type = SMP_T_STR;
@@ -3809,7 +3825,7 @@
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || !conn->xprt_ctx || conn->xprt != &ssl_sock)
return 0;
@@ -3898,6 +3914,7 @@
{
#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
struct connection *conn;
+ struct session *sess = strm_sess(l4);
smp->flags = SMP_F_CONST;
smp->type = SMP_T_STR;
@@ -3905,7 +3922,7 @@
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || !conn->xprt_ctx || conn->xprt != &ssl_sock)
return 0;
@@ -3968,12 +3985,13 @@
smp_fetch_ssl_c_ca_err(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -3994,12 +4012,13 @@
smp_fetch_ssl_c_ca_err_depth(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -4020,12 +4039,13 @@
smp_fetch_ssl_c_err(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
@@ -4046,12 +4066,13 @@
smp_fetch_ssl_c_verify(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
+ struct session *sess = strm_sess(l4);
struct connection *conn;
if (!l4)
return 0;
- conn = objt_conn(l4->si[0].end);
+ conn = objt_conn(sess->origin);
if (!conn || conn->xprt != &ssl_sock)
return 0;
diff --git a/src/stream.c b/src/stream.c
index 357e561..70c07a7 100644
--- a/src/stream.c
+++ b/src/stream.c
@@ -592,9 +592,10 @@
static void stream_free(struct stream *s)
{
struct http_txn *txn = &s->txn;
- struct proxy *fe = strm_sess(s)->fe;
+ struct session *sess = strm_sess(s);
+ struct proxy *fe = sess->fe;
struct bref *bref, *back;
- struct connection *cli_conn = objt_conn(s->si[0].end);
+ struct connection *cli_conn = objt_conn(sess->origin);
int i;
if (s->pend_pos)
@@ -2910,6 +2911,7 @@
struct stkctr *
smp_fetch_sc_stkctr(struct stream *l4, const struct arg *args, const char *kw)
{
+ struct session *sess = strm_sess(l4);
static struct stkctr stkctr;
struct stksess *stksess;
unsigned int num = kw[2] - '0';
@@ -2923,7 +2925,7 @@
}
else if (num > 9) { /* src_* variant, args[0] = table */
struct stktable_key *key;
- struct connection *conn = objt_conn(l4->si[0].end);
+ struct connection *conn = objt_conn(sess->origin);
if (!conn)
return NULL;
@@ -3144,7 +3146,8 @@
smp_fetch_src_updt_conn_cnt(struct proxy *px, struct stream *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw, void *private)
{
- struct connection *conn = objt_conn(l4->si[0].end);
+ struct session *sess = strm_sess(l4);
+ struct connection *conn = objt_conn(sess->origin);
struct stksess *ts;
struct stktable_key *key;
void *ptr;