mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-08-13 21:36:00 +03:00
Merge latest 2.5.x changes to trunk.
This commit is contained in:
parent
08e651a1c8
commit
73fb8eae5d
13
CHANGES
13
CHANGES
@ -1,5 +1,14 @@
|
||||
15 Jun 2009 - trunk
|
||||
-------------------
|
||||
23 July 2009 - trunk
|
||||
--------------------
|
||||
|
||||
* Allow mlogc to periodically flush memory pools.
|
||||
|
||||
* Using nolog,auditlog will now log the "Message:" line to the auditlog, but
|
||||
nothing to the error log. Prior versions dropped the "Message:" line from
|
||||
both logs. To do this now, just use "nolog" or "nolog,noauditlog".
|
||||
|
||||
* Forced mlogc to use SSLv3 to avoid some potential auto negotiation
|
||||
issues with some libcurl versions.
|
||||
|
||||
* Fixed mlogc issue seen on big endian machines where content type
|
||||
could be listed as zero.
|
||||
|
@ -154,6 +154,8 @@ int max_connections = 10;
|
||||
apr_global_mutex_t *gmutex = NULL;
|
||||
apr_thread_mutex_t *mutex = NULL;
|
||||
apr_pool_t *pool = NULL;
|
||||
apr_pool_t *thread_pool = NULL;
|
||||
apr_pool_t *recv_pool = NULL;
|
||||
apr_array_header_t *queue = NULL;
|
||||
const char *queue_path = NULL;
|
||||
/* apr_time_t queue_time = 0; */
|
||||
@ -176,7 +178,7 @@ int opt_force = 0;
|
||||
|
||||
/* -- Code -- */
|
||||
|
||||
static char *_log_escape(const char *input, apr_size_t input_len)
|
||||
static char *_log_escape(apr_pool_t *mp, const char *input, apr_size_t input_len)
|
||||
{
|
||||
static const char c2x_table[] = "0123456789abcdef";
|
||||
unsigned char *d = NULL;
|
||||
@ -185,7 +187,7 @@ static char *_log_escape(const char *input, apr_size_t input_len)
|
||||
|
||||
if (input == NULL) return NULL;
|
||||
|
||||
ret = apr_palloc(pool, input_len * 4 + 1);
|
||||
ret = apr_palloc(mp, input_len * 4 + 1);
|
||||
if (ret == NULL) return NULL;
|
||||
d = (unsigned char *)ret;
|
||||
|
||||
@ -565,6 +567,7 @@ static void transaction_checkpoint(void)
|
||||
apr_hash_index_t *hi = NULL;
|
||||
char msg[256];
|
||||
int i;
|
||||
apr_pool_t *cpool;
|
||||
|
||||
apr_snprintf(new_queue_path, sizeof(new_queue_path), "%s.new", queue_path);
|
||||
apr_snprintf(old_queue_path, sizeof(old_queue_path), "%s.old", queue_path);
|
||||
@ -584,12 +587,15 @@ static void transaction_checkpoint(void)
|
||||
|
||||
error_log(LOG_DEBUG, NULL, "Checkpoint started.");
|
||||
|
||||
apr_pool_create(&cpool, NULL);
|
||||
|
||||
/* Dump active entries into a new queue file. */
|
||||
if (apr_file_open(&queue_fd, new_queue_path, APR_WRITE | APR_CREATE
|
||||
| APR_EXCL | APR_TRUNCATE | APR_FILE_NOCLEANUP, APR_OS_DEFAULT, pool) != APR_SUCCESS)
|
||||
| APR_EXCL | APR_TRUNCATE | APR_FILE_NOCLEANUP, APR_OS_DEFAULT, cpool) != APR_SUCCESS)
|
||||
{
|
||||
error_log(LOG_ERROR, NULL, "Failed to create file: %s", new_queue_path);
|
||||
error_log(LOG_DEBUG, NULL, "Checkpoint unlocking global mutex.");
|
||||
apr_pool_destroy(cpool);
|
||||
apr_global_mutex_unlock(gmutex);
|
||||
return;
|
||||
}
|
||||
@ -622,14 +628,16 @@ static void transaction_checkpoint(void)
|
||||
apr_file_close(queue_fd);
|
||||
|
||||
/* Switch the files and truncate the transaction log file. */
|
||||
apr_file_remove(old_queue_path, pool);
|
||||
apr_file_rename(queue_path, old_queue_path, pool);
|
||||
apr_file_rename(new_queue_path, queue_path, pool);
|
||||
apr_file_remove(old_queue_path, pool);
|
||||
apr_file_remove(old_queue_path, cpool);
|
||||
apr_file_rename(queue_path, old_queue_path, cpool);
|
||||
apr_file_rename(new_queue_path, queue_path, cpool);
|
||||
apr_file_remove(old_queue_path, cpool);
|
||||
apr_file_trunc(transaction_log_fd, 0);
|
||||
|
||||
error_log(LOG_DEBUG, NULL, "Checkpoint completed.");
|
||||
|
||||
apr_pool_destroy(cpool);
|
||||
|
||||
/* Unlock and exit. */
|
||||
error_log(LOG_DEBUG, NULL, "Checkpoint unlocking global mutex.");
|
||||
apr_global_mutex_unlock(gmutex);
|
||||
@ -1016,6 +1024,7 @@ size_t curl_writefunction(void *ptr, size_t size, size_t nmemb, void *stream)
|
||||
int curl_debugfunction(CURL *curl, curl_infotype infotype, char *data, size_t datalen, void *ourdata)
|
||||
{
|
||||
apr_size_t i, effectivelen;
|
||||
apr_thread_t *thread = (apr_thread_t *)ourdata;
|
||||
|
||||
if (error_log_level < LOG_DEBUG) return 0;
|
||||
|
||||
@ -1027,8 +1036,24 @@ int curl_debugfunction(CURL *curl, curl_infotype infotype, char *data, size_t da
|
||||
}
|
||||
}
|
||||
|
||||
if (infotype == CURLINFO_TEXT) {
|
||||
error_log(LOG_DEBUG, ourdata, "CURL: %s", _log_escape(data, effectivelen));
|
||||
if (error_log_level >= LOG_DEBUG) {
|
||||
if (infotype == CURLINFO_TEXT) {
|
||||
error_log(LOG_DEBUG, thread, "CURL: %s", _log_escape(apr_thread_pool_get(thread), data, effectivelen));
|
||||
}
|
||||
}
|
||||
if (error_log_level >= LOG_DEBUG2) {
|
||||
if (infotype == CURLINFO_HEADER_IN) {
|
||||
error_log(LOG_DEBUG2, thread, "CURL: HEADER_IN %s", _log_escape(apr_thread_pool_get(thread), data, effectivelen));
|
||||
}
|
||||
else if (infotype == CURLINFO_HEADER_OUT) {
|
||||
error_log(LOG_DEBUG2, thread, "CURL: HEADER_OUT %s", _log_escape(apr_thread_pool_get(thread), data, effectivelen));
|
||||
}
|
||||
else if (infotype == CURLINFO_DATA_IN) {
|
||||
error_log(LOG_DEBUG2, thread, "CURL: DATA_IN %s", _log_escape(apr_thread_pool_get(thread), data, effectivelen));
|
||||
}
|
||||
else if (infotype == CURLINFO_DATA_OUT) {
|
||||
error_log(LOG_DEBUG2, thread, "CURL: DATA_OUT %s", _log_escape(apr_thread_pool_get(thread), data, effectivelen));
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
@ -1091,6 +1116,8 @@ static void logc_init(void)
|
||||
curl_easy_setopt(curl, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
|
||||
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
||||
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0);
|
||||
/* SSLv3 works better overall as some servers have issues with TLS */
|
||||
curl_easy_setopt(curl, CURLOPT_SSLVERSION, CURL_SSLVERSION_SSLv3);
|
||||
curl_easy_setopt(curl, CURLOPT_CONNECTTIMEOUT, 15);
|
||||
curl_easy_setopt(curl, CURLOPT_NOSIGNAL, TRUE);
|
||||
curl_easy_setopt(curl, CURLOPT_HEADER, TRUE);
|
||||
@ -1155,7 +1182,9 @@ static void keep_entries_hack(apr_pool_t *mp, apr_thread_t *thread, const char *
|
||||
return;
|
||||
}
|
||||
|
||||
error_log(LOG_DEBUG, thread, "STAT \"%s\" {uid=%d; gid=%d; size=%" APR_OFF_T_FMT "; csize=%" APR_OFF_T_FMT "; atime=%" APR_TIME_T_FMT "; ctime=%" APR_TIME_T_FMT "; mtime=%" APR_TIME_T_FMT "}", fn, finfo.user, finfo.group, finfo.size, finfo.csize, finfo.atime, finfo.ctime, finfo.mtime);
|
||||
if (error_log_level >= LOG_DEBUG) {
|
||||
error_log(LOG_DEBUG, thread, "STAT \"%s\" {uid=%d; gid=%d; size=%" APR_OFF_T_FMT "; csize=%" APR_OFF_T_FMT "; atime=%" APR_TIME_T_FMT "; ctime=%" APR_TIME_T_FMT "; mtime=%" APR_TIME_T_FMT "}", fn, finfo.user, finfo.group, finfo.size, finfo.csize, finfo.atime, finfo.ctime, finfo.mtime);
|
||||
}
|
||||
|
||||
if (finfo.mtime != KEEP_ENTRIES_REMOVE_TIME) {
|
||||
error_log(LOG_DEBUG2, thread, "Set mtime: %s", fn);
|
||||
@ -1201,13 +1230,13 @@ static void * APR_THREAD_FUNC thread_worker(apr_thread_t *thread, void *data)
|
||||
int nodelay = 0;
|
||||
|
||||
|
||||
error_log(LOG_DEBUG, thread, "Worker thread starting.");
|
||||
|
||||
/* Each worker uses its own pool to manage memory. To avoid
|
||||
* memory leaks the pool is cleared after each processed
|
||||
* entry.
|
||||
*/
|
||||
apr_pool_create(&tpool, NULL);
|
||||
|
||||
error_log(LOG_DEBUG, thread, "Worker thread starting.");
|
||||
apr_pool_create(&tpool, thread_pool);
|
||||
|
||||
/* Process jobs in a queue until there are no more jobs to process. */
|
||||
for(;;) {
|
||||
@ -1285,12 +1314,12 @@ static void * APR_THREAD_FUNC thread_worker(apr_thread_t *thread, void *data)
|
||||
rc = pcre_exec(logline_regex, NULL, entry->line, entry->line_size, 0, 0,
|
||||
capturevector, CAPTUREVECTORSIZE);
|
||||
if (rc == PCRE_ERROR_NOMATCH) { /* No match. */
|
||||
error_log(LOG_WARNING, thread, "Invalid entry (failed to match regex): %s", _log_escape(entry->line, entry->line_size));
|
||||
error_log(LOG_WARNING, thread, "Invalid entry (failed to match regex): %s", _log_escape(tpool, entry->line, entry->line_size));
|
||||
take_new = 1;
|
||||
nodelay = 1;
|
||||
}
|
||||
else if (rc < 0) { /* Error condition. */
|
||||
error_log(LOG_WARNING, thread, "Invalid entry (PCRE error %d): %s", rc, _log_escape(entry->line, entry->line_size));
|
||||
error_log(LOG_WARNING, thread, "Invalid entry (PCRE error %d): %s", rc, _log_escape(tpool, entry->line, entry->line_size));
|
||||
take_new = 1;
|
||||
nodelay = 1;
|
||||
}
|
||||
@ -1321,7 +1350,9 @@ static void * APR_THREAD_FUNC thread_worker(apr_thread_t *thread, void *data)
|
||||
char response_buf[STATUSBUF_SIZE];
|
||||
CURLcode res;
|
||||
|
||||
error_log(LOG_DEBUG, thread, "STAT \"%s\" {uid=%d; gid=%d; size=%" APR_OFF_T_FMT "; csize=%" APR_OFF_T_FMT "; atime=%" APR_TIME_T_FMT "; ctime=%" APR_TIME_T_FMT "; mtime=%" APR_TIME_T_FMT "}", auditlogentry, finfo.user, finfo.group, finfo.size, finfo.csize, finfo.atime, finfo.ctime, finfo.mtime);
|
||||
if (error_log_level >= LOG_DEBUG) {
|
||||
error_log(LOG_DEBUG, thread, "STAT \"%s\" {uid=%d; gid=%d; size=%" APR_OFF_T_FMT "; csize=%" APR_OFF_T_FMT "; atime=%" APR_TIME_T_FMT "; ctime=%" APR_TIME_T_FMT "; mtime=%" APR_TIME_T_FMT "}", auditlogentry, finfo.user, finfo.group, finfo.size, finfo.csize, finfo.atime, finfo.ctime, finfo.mtime);
|
||||
}
|
||||
|
||||
/* Initialize the respone buffer with a hidden value */
|
||||
response_buf[0] = 0;
|
||||
@ -1543,16 +1574,27 @@ static void create_new_worker(int lock)
|
||||
return;
|
||||
}
|
||||
|
||||
/* Cleanup thread pool when idle */
|
||||
if (current_workers <= 0) {
|
||||
if (thread_pool != NULL) {
|
||||
error_log(LOG_DEBUG, NULL, "Destroying thread_pool.");
|
||||
apr_pool_destroy(thread_pool);
|
||||
thread_pool = NULL;
|
||||
}
|
||||
error_log(LOG_DEBUG, NULL, "Creating thread_pool.");
|
||||
apr_pool_create(&thread_pool, NULL);
|
||||
}
|
||||
|
||||
curlptr = (CURL **)apr_array_pop(curl_handles);
|
||||
if (curlptr != NULL) {
|
||||
apr_threadattr_t *thread_attrs;
|
||||
apr_status_t rc;
|
||||
|
||||
apr_threadattr_create(&thread_attrs, pool);
|
||||
apr_threadattr_create(&thread_attrs, thread_pool);
|
||||
apr_threadattr_detach_set(thread_attrs, 1);
|
||||
apr_threadattr_stacksize_set(thread_attrs, 1024);
|
||||
|
||||
rc = apr_thread_create(&thread, thread_attrs, thread_worker, *curlptr, pool);
|
||||
rc = apr_thread_create(&thread, thread_attrs, thread_worker, *curlptr, thread_pool);
|
||||
if (rc != APR_SUCCESS) {
|
||||
if (lock) {
|
||||
error_log(LOG_DEBUG, NULL, "Worker creation unlocking thread mutex.");
|
||||
@ -1693,6 +1735,8 @@ static void receive_loop(void) {
|
||||
int done = 0;
|
||||
int drop_next = 0;
|
||||
int buffered_events = 0;
|
||||
int count = 0;
|
||||
apr_pool_t *tmp_pool;
|
||||
|
||||
/* Open stdin. */
|
||||
if (apr_file_open_stdin(&fd_stdin, pool) != APR_SUCCESS) {
|
||||
@ -1703,11 +1747,15 @@ static void receive_loop(void) {
|
||||
/* Always want this NUL terminated */
|
||||
buf[PIPE_BUF_SIZE] = '\0';
|
||||
|
||||
apr_pool_create(&tmp_pool, NULL);
|
||||
|
||||
/* Loop forever receiving entries from stdin. */
|
||||
while(!done || (curr < next)) {
|
||||
apr_status_t rc;
|
||||
|
||||
error_log(LOG_DEBUG2, NULL, "Internal state: [evnt \"%" APR_SIZE_T_FMT "\"][curr \"%" APR_SIZE_T_FMT "\"][next \"%" APR_SIZE_T_FMT "\"][nbytes \"%" APR_SIZE_T_FMT "\"]", evnt, curr, next, nbytes);
|
||||
if (error_log_level >= LOG_DEBUG2) {
|
||||
error_log(LOG_DEBUG2, NULL, "Internal state: [evnt \"%" APR_SIZE_T_FMT "\"][curr \"%" APR_SIZE_T_FMT "\"][next \"%" APR_SIZE_T_FMT "\"][nbytes \"%" APR_SIZE_T_FMT "\"]", evnt, curr, next, nbytes);
|
||||
}
|
||||
|
||||
/* If we are not done and have the space, read more */
|
||||
if (!done && (nbytes > 0)) {
|
||||
@ -1726,7 +1774,7 @@ static void receive_loop(void) {
|
||||
error_log(LOG_DEBUG, NULL, "Read %" APR_SIZE_T_FMT " bytes from pipe", nbytes);
|
||||
}
|
||||
else {
|
||||
error_log(LOG_DEBUG2, NULL, "Read %" APR_SIZE_T_FMT " bytes from pipe: `%s'", nbytes, _log_escape((buf + next), nbytes));
|
||||
error_log(LOG_DEBUG2, NULL, "Read %" APR_SIZE_T_FMT " bytes from pipe: `%s'", nbytes, _log_escape(tmp_pool, (buf + next), nbytes));
|
||||
}
|
||||
}
|
||||
|
||||
@ -1750,13 +1798,13 @@ static void receive_loop(void) {
|
||||
|
||||
/* We may have to drop this one if it previously failed */
|
||||
if (drop_next) {
|
||||
error_log(LOG_ERROR, NULL, "Dropping remaining portion of failed event: `%s'", _log_escape((buf + evnt), (curr - evnt)));
|
||||
error_log(LOG_ERROR, NULL, "Dropping remaining portion of failed event: `%s'", _log_escape(tmp_pool, (buf + evnt), (curr - evnt)));
|
||||
drop_next = 0;
|
||||
}
|
||||
else {
|
||||
transaction_log(IN, buf + evnt);
|
||||
error_log(LOG_DEBUG2, NULL, "Received audit log entry (count %lu queue %d workers %d): %s",
|
||||
entry_counter, queue->nelts, current_workers, _log_escape((buf + evnt), strlen(buf + evnt)));
|
||||
entry_counter, queue->nelts, current_workers, _log_escape(tmp_pool, (buf + evnt), strlen(buf + evnt)));
|
||||
add_entry(buf + evnt, 1);
|
||||
buffered_events++;
|
||||
}
|
||||
@ -1765,7 +1813,7 @@ static void receive_loop(void) {
|
||||
evnt = curr = curr + 1;
|
||||
}
|
||||
else {
|
||||
error_log(LOG_DEBUG2, NULL, "Event buffer contains partial event: `%s'", _log_escape((buf + evnt), (next - evnt)));
|
||||
error_log(LOG_DEBUG2, NULL, "Event buffer contains partial event: `%s'", _log_escape(tmp_pool, (buf + evnt), (next - evnt)));
|
||||
break;
|
||||
}
|
||||
}
|
||||
@ -1779,7 +1827,7 @@ static void receive_loop(void) {
|
||||
curr -= evnt;
|
||||
memmove(buf, (buf + evnt), next);
|
||||
|
||||
error_log(LOG_DEBUG2, NULL, "Shifted buffer back %" APR_SIZE_T_FMT " and offset %" APR_SIZE_T_FMT " bytes for next read: `%s'", evnt, next, _log_escape(buf, next));
|
||||
error_log(LOG_DEBUG2, NULL, "Shifted buffer back %" APR_SIZE_T_FMT " and offset %" APR_SIZE_T_FMT " bytes for next read: `%s'", evnt, next, _log_escape(tmp_pool, buf, next));
|
||||
|
||||
evnt = 0;
|
||||
}
|
||||
@ -1791,10 +1839,10 @@ static void receive_loop(void) {
|
||||
*/
|
||||
|
||||
if (drop_next) {
|
||||
error_log(LOG_ERROR, NULL, "Event continuation too large, dropping it as well: `%s'", _log_escape(buf, PIPE_BUF_SIZE));
|
||||
error_log(LOG_ERROR, NULL, "Event continuation too large, dropping it as well: `%s'", _log_escape(tmp_pool, buf, PIPE_BUF_SIZE));
|
||||
}
|
||||
else {
|
||||
error_log(LOG_ERROR, NULL, "Event too large, dropping event: `%s'", _log_escape(buf, PIPE_BUF_SIZE));
|
||||
error_log(LOG_ERROR, NULL, "Event too large, dropping event: `%s'", _log_escape(tmp_pool, buf, PIPE_BUF_SIZE));
|
||||
}
|
||||
|
||||
/* Rewind buf and mark that we need to drop up to the next event */
|
||||
@ -1803,6 +1851,16 @@ static void receive_loop(void) {
|
||||
}
|
||||
|
||||
nbytes = PIPE_BUF_SIZE - next;
|
||||
|
||||
if (count++ > 1000) {
|
||||
count = 0;
|
||||
error_log(LOG_DEBUG, NULL, "Recycling tmp_pool.");
|
||||
apr_pool_destroy(tmp_pool);
|
||||
apr_pool_create(&tmp_pool, NULL);
|
||||
}
|
||||
else {
|
||||
apr_pool_clear(tmp_pool);
|
||||
}
|
||||
}
|
||||
|
||||
/* Wait for queue to empty if specified */
|
||||
@ -1900,6 +1958,7 @@ int main(int argc, const char * const argv[]) {
|
||||
|
||||
logc_pid = getpid();
|
||||
apr_pool_create(&pool, NULL);
|
||||
apr_pool_create(&recv_pool, NULL);
|
||||
apr_setup_signal_thread();
|
||||
|
||||
if (argc < 2) {
|
||||
|
@ -26,17 +26,34 @@
|
||||
#include "msc_xml.h"
|
||||
|
||||
/**
|
||||
* Log an alert message to the log, adding the rule metadata at the end.
|
||||
* Format an alert message.
|
||||
*/
|
||||
void msc_alert(modsec_rec *msr, int level, msre_actionset *actionset, const char *action_message,
|
||||
const char * msc_alert_message(modsec_rec *msr, msre_actionset *actionset, const char *action_message,
|
||||
const char *rule_message)
|
||||
{
|
||||
const char *message = NULL;
|
||||
|
||||
if (rule_message == NULL) rule_message = "Unknown error.";
|
||||
|
||||
message = apr_psprintf(msr->mp, "%s %s%s", action_message,
|
||||
rule_message, msre_format_metadata(msr, actionset));
|
||||
if (action_message == NULL) {
|
||||
message = apr_psprintf(msr->mp, "%s%s",
|
||||
rule_message, msre_format_metadata(msr, actionset));
|
||||
}
|
||||
else {
|
||||
message = apr_psprintf(msr->mp, "%s %s%s", action_message,
|
||||
rule_message, msre_format_metadata(msr, actionset));
|
||||
}
|
||||
|
||||
return message;
|
||||
}
|
||||
|
||||
/**
|
||||
* Log an alert message to the log, adding the rule metadata at the end.
|
||||
*/
|
||||
void msc_alert(modsec_rec *msr, int level, msre_actionset *actionset, const char *action_message,
|
||||
const char *rule_message)
|
||||
{
|
||||
const char *message = msc_alert_message(msr, actionset, action_message, rule_message);
|
||||
|
||||
msr_log(msr, level, "%s", message);
|
||||
}
|
||||
|
@ -545,6 +545,9 @@ apr_status_t DSOLOCAL modsecurity_request_body_retrieve(modsec_rec *msr, msc_dat
|
||||
void DSOLOCAL msc_add(modsec_rec *msr, int level, msre_actionset *actionset,
|
||||
const char *action_message, const char *rule_message);
|
||||
|
||||
const char DSOLOCAL *msc_alert_message(modsec_rec *msr, msre_actionset *actionset, const char *action_message,
|
||||
const char *rule_message);
|
||||
|
||||
void DSOLOCAL msc_alert(modsec_rec *msr, int level, msre_actionset *actionset, const char *action_message,
|
||||
const char *rule_message);
|
||||
|
||||
|
16
apache2/re.c
16
apache2/re.c
@ -1660,8 +1660,22 @@ static void msre_perform_disruptive_actions(modsec_rec *msr, msre_rule *rule,
|
||||
|| (msr->modsecurity->processing_mode == MODSEC_OFFLINE)
|
||||
|| (actionset->intercept_action == ACTION_NONE))
|
||||
{
|
||||
int log_level;
|
||||
|
||||
/* If "nolog" was used log at a higher level to prevent an "alert". */
|
||||
int log_level = (actionset->log == 0 ? 4 : 2);
|
||||
if (actionset->log == 0) {
|
||||
log_level = 4;
|
||||
|
||||
/* But, if "auditlog" is enabled, then still add the message. */
|
||||
if (actionset->auditlog != 0) {
|
||||
*(const char **)apr_array_push(msr->alerts) = msc_alert_message(msr, actionset, NULL, message);
|
||||
}
|
||||
|
||||
}
|
||||
else {
|
||||
log_level = 2;
|
||||
}
|
||||
|
||||
msc_alert(msr, log_level, actionset, "Warning.", message);
|
||||
|
||||
/* However, this will mark the txn relevant again if it is <= 3,
|
||||
|
@ -6,7 +6,7 @@
|
||||
Manual</title>
|
||||
|
||||
<articleinfo>
|
||||
<releaseinfo>Version 2.6.0-trunk (July 20, 2009)</releaseinfo>
|
||||
<releaseinfo>Version 2.6.0-trunk (July 23, 2009)</releaseinfo>
|
||||
|
||||
<copyright>
|
||||
<year>2004-2009</year>
|
||||
|
Loading…
x
Reference in New Issue
Block a user