pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/net/bind916
Module Name: pkgsrc
Committed By: taca
Date: Sun Aug 23 10:03:00 UTC 2020
Modified Files:
pkgsrc/net/bind916: Makefile distinfo
pkgsrc/net/bind916/patches: patch-lib_isc_unix_socket.c
Removed Files:
pkgsrc/net/bind916/patches: patch-lib_isc_siphash.c
Log Message:
net/bind916: update to 9.16.5
Update bind916 to 9.16.5 (BIND 9.16.5).
--- 9.16.5 released ---
5458. [bug] Prevent a theoretically possible NULL dereference caused
by a data race between zone_maintenance() and
dns_zone_setview_helper(). [GL #1627]
5455. [bug] named could crash when cleaning dead nodes in
lib/dns/rbtdb.c that were being reused. [GL #1968]
5454. [bug] Address a startup crash that occurred when the server
was under load and the root zone had not yet been
loaded. [GL #1862]
5453. [bug] named crashed on shutdown when a new rndc connection was
received during shutdown. [GL #1747]
5452. [bug] The "blackhole" ACL was accidentally disabled for client
queries. [GL #1936]
5451. [func] Add 'rndc dnssec -status' command. [GL #1612]
5449. [bug] Fix a socket shutdown race in netmgr udp. [GL #1938]
5448. [bug] Fix a race condition in isc__nm_tcpdns_send().
[GL #1937]
5447. [bug] IPv6 addresses ending in "::" could break YAML
parsing. A "0" is now appended to such addresses
in YAML output from dig, mdig, delv, and dnstap-read.
[GL #1952]
5446. [bug] The validator could fail to accept a properly signed
RRset if an unsupported algorithm appeared earlier in
the DNSKEY RRset than a supported algorithm. It could
also stop if it detected a malformed public key.
[GL #1689]
5444. [bug] 'rndc dnstap -roll <value>' did not limit the number of
saved files to <value>. [GL !3728]
5443. [bug] The "primary" and "secondary" keywords, when used
as parameters for "check-names", were not
processed correctly and were being ignored. [GL #1949]
5441. [bug] ${LMDB_CFLAGS} was missing from make/includes.in.
[GL #1955]
5440. [test] Properly handle missing kyua. [GL #1950]
5439. [bug] The DS RRset returned by dns_keynode_dsset() was used in
a non-thread-safe manner. [GL #1926]
To generate a diff of this commit:
cvs rdiff -u -r1.1 -r1.2 pkgsrc/net/bind916/Makefile \
pkgsrc/net/bind916/distinfo
cvs rdiff -u -r1.1 -r0 pkgsrc/net/bind916/patches/patch-lib_isc_siphash.c
cvs rdiff -u -r1.1 -r1.2 \
pkgsrc/net/bind916/patches/patch-lib_isc_unix_socket.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/net/bind916/Makefile
diff -u pkgsrc/net/bind916/Makefile:1.1 pkgsrc/net/bind916/Makefile:1.2
--- pkgsrc/net/bind916/Makefile:1.1 Sun Aug 9 15:20:21 2020
+++ pkgsrc/net/bind916/Makefile Sun Aug 23 10:03:00 2020
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.1 2020/08/09 15:20:21 taca Exp $
+# $NetBSD: Makefile,v 1.2 2020/08/23 10:03:00 taca Exp $
DISTNAME= bind-${BIND_VERSION}
PKGNAME= ${DISTNAME:S/-P/pl/}
@@ -15,7 +15,7 @@ CONFLICTS+= host-[0-9]*
MAKE_JOBS_SAFE= no
-BIND_VERSION= 9.16.5
+BIND_VERSION= 9.16.6
.include "../../mk/bsd.prefs.mk"
Index: pkgsrc/net/bind916/distinfo
diff -u pkgsrc/net/bind916/distinfo:1.1 pkgsrc/net/bind916/distinfo:1.2
--- pkgsrc/net/bind916/distinfo:1.1 Sun Aug 9 15:20:21 2020
+++ pkgsrc/net/bind916/distinfo Sun Aug 23 10:03:00 2020
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.1 2020/08/09 15:20:21 taca Exp $
+$NetBSD: distinfo,v 1.2 2020/08/23 10:03:00 taca Exp $
-SHA1 (bind-9.16.5.tar.xz) = a5b0fffd3a53c06368772c185688207dd57058f1
-RMD160 (bind-9.16.5.tar.xz) = 28228bd5d7531026e9b0cc324235d347e704bf57
-SHA512 (bind-9.16.5.tar.xz) = 789fc19f60e81f67ef13ebacd030ea5d8f8cc42cf5f06a01ee2eefe9b7c6d3b10603a3a6a3df85b0e5d770fcf462ce8dddc3a7e5f7f2dab27aa5879ee5380eb7
-Size (bind-9.16.5.tar.xz) = 3474044 bytes
+SHA1 (bind-9.16.6.tar.xz) = f8a4c1bd074cc0305a4c50971e71da5a3b810d78
+RMD160 (bind-9.16.6.tar.xz) = 3b296d967a6a5a709b599efbffc9697060c5f91b
+SHA512 (bind-9.16.6.tar.xz) = 37f57db6d1633cc85a4d954a69bbb3372c65ac43fef965df5aee8dcdd32153bb5b0c6d0d5f00f353dd4464c71d74dc8e801937b930e2b8f6799fa77af5f243e0
+Size (bind-9.16.6.tar.xz) = 3228368 bytes
SHA1 (patch-bin_dig_dighost.c) = b1073911d80ecd519af98b6678968296ff8c0c98
SHA1 (patch-bin_dig_include_dig_dig.h) = 10166f5bb98b208c7b10d63eb31e8253f704acc8
SHA1 (patch-bin_named_Makefile.in) = f1367da6a226ba44d0ee13acf00b8abeb5b1b7eb
@@ -46,12 +46,12 @@ SHA1 (patch-lib_isc_include_isc_types.h)
SHA1 (patch-lib_isc_netmgr_netmgr.c) = 63168c8901646e7b2079e1dc3324087508bb1e62
SHA1 (patch-lib_isc_netmgr_tcp.c) = f71556e21a6416af012b8d37a9ffb7c3ed4aa986
SHA1 (patch-lib_isc_rwlock.c) = 1d114248ddee20db7a7429afab446f8b2f0dca82
-SHA1 (patch-lib_isc_siphash.c) = 1527f960967148cece7337a453fe868e812fd5f1
+SHA1 (patch-lib_isc_siphash.c) = da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA1 (patch-lib_isc_stats.c) = 024a372d9919fa751b894f8fc8267691297f00f4
SHA1 (patch-lib_isc_task.c) = 103a23c74888edd3ddee0793ce6531cd2e6b87f3
SHA1 (patch-lib_isc_unix_include_isc_align.h) = 1bbd78f1617a40079d1044175cfe037bbd1d95b2
SHA1 (patch-lib_isc_unix_net.c) = c654f60a1feefdba9bf980dcfa46ce37f46918aa
-SHA1 (patch-lib_isc_unix_socket.c) = 48fb35ae552164ce2ce3fb0df76db8df4271d2ee
+SHA1 (patch-lib_isc_unix_socket.c) = 3178214a578e977ecdcf6e44ac04b25690176a03
SHA1 (patch-lib_isc_unix_time.c) = fac9e66754e099f53ba8c499f5f179825a0b0fbd
SHA1 (patch-lib_ns_Makefile.in) = 5626877ffe97261518f976bb8dd827cdb53668ed
SHA1 (patch-lib_ns_client.c) = e0453a7483a4f899023e0c5ab970cda241976b90
Index: pkgsrc/net/bind916/patches/patch-lib_isc_unix_socket.c
diff -u pkgsrc/net/bind916/patches/patch-lib_isc_unix_socket.c:1.1 pkgsrc/net/bind916/patches/patch-lib_isc_unix_socket.c:1.2
--- pkgsrc/net/bind916/patches/patch-lib_isc_unix_socket.c:1.1 Sun Aug 9 15:20:22 2020
+++ pkgsrc/net/bind916/patches/patch-lib_isc_unix_socket.c Sun Aug 23 10:03:00 2020
@@ -1,10 +1,10 @@
-$NetBSD: patch-lib_isc_unix_socket.c,v 1.1 2020/08/09 15:20:22 taca Exp $
+$NetBSD: patch-lib_isc_unix_socket.c,v 1.2 2020/08/23 10:03:00 taca Exp $
* Apply fixes from NetBSD base system.
* Fix build on SmartOS. In this special case, _XOPEN_SOURCE has to be only
defined on SmartOS.
---- lib/isc/unix/socket.c.orig 2020-06-10 21:01:43.000000000 +0000
+--- lib/isc/unix/socket.c.orig 2020-08-10 09:31:13.000000000 +0000
+++ lib/isc/unix/socket.c
@@ -11,6 +11,15 @@
@@ -150,8 +150,8 @@ $NetBSD: patch-lib_isc_unix_socket.c,v 1
/*
* Dequeue an item off the given socket's read queue, set the result code
* in the done event to the one provided, and send it to the task it was
-@@ -3117,6 +3184,64 @@ finish:
- UNLOCK(&sock->lock);
+@@ -3115,6 +3182,64 @@ finish:
+ }
}
+static void
@@ -215,16 +215,7 @@ $NetBSD: patch-lib_isc_unix_socket.c,v 1
/*
* Process read/writes on each fd here. Avoid locking
* and unlocking twice if both reads and writes are possible.
-@@ -3164,7 +3289,7 @@ process_fd(isc__socketthread_t *thread,
- if (sock->listener) {
- internal_accept(sock);
- } else {
-- internal_recv(sock);
-+ dispatch_recv(sock);
- }
- }
-
-@@ -3172,7 +3297,7 @@ process_fd(isc__socketthread_t *thread,
+@@ -3162,7 +3287,7 @@ process_fd(isc__socketthread_t *thread,
if (sock->connecting) {
internal_connect(sock);
} else {
@@ -233,7 +224,16 @@ $NetBSD: patch-lib_isc_unix_socket.c,v 1
}
}
-@@ -5287,7 +5412,7 @@ static isc_once_t hasreuseport_once = IS
+@@ -3170,7 +3295,7 @@ process_fd(isc__socketthread_t *thread,
+ if (sock->listener) {
+ internal_accept(sock); /* unlocks sock */
+ } else {
+- internal_recv(sock);
++ dispatch_recv(sock);
+ UNLOCK(&sock->lock);
+ }
+ } else {
+@@ -5274,7 +5399,7 @@ static isc_once_t hasreuseport_once = IS
static bool hasreuseport = false;
static void
@@ -242,7 +242,7 @@ $NetBSD: patch-lib_isc_unix_socket.c,v 1
/*
* SO_REUSEPORT works very differently on *BSD and on Linux (because why not).
* We only want to use it on Linux, if it's available. On BSD we want to dup()
-@@ -5341,6 +5466,8 @@ _socktype(isc_sockettype_t type) {
+@@ -5328,6 +5453,8 @@ _socktype(isc_sockettype_t type) {
return ("tcp");
case isc_sockettype_unix:
return ("unix");
@@ -251,7 +251,7 @@ $NetBSD: patch-lib_isc_unix_socket.c,v 1
default:
return ("not-initialized");
}
-@@ -5353,7 +5480,7 @@ _socktype(isc_sockettype_t type) {
+@@ -5340,7 +5467,7 @@ _socktype(isc_sockettype_t type) {
xmlrc = (a); \
if (xmlrc < 0) \
goto error; \
@@ -260,7 +260,7 @@ $NetBSD: patch-lib_isc_unix_socket.c,v 1
int
isc_socketmgr_renderxml(isc_socketmgr_t *mgr0, void *writer0) {
isc__socketmgr_t *mgr = (isc__socketmgr_t *)mgr0;
-@@ -5460,7 +5587,7 @@ error:
+@@ -5447,7 +5574,7 @@ error:
result = ISC_R_NOMEMORY; \
goto error; \
} \
@@ -269,7 +269,7 @@ $NetBSD: patch-lib_isc_unix_socket.c,v 1
isc_result_t
isc_socketmgr_renderjson(isc_socketmgr_t *mgr0, void *stats0) {
-@@ -5582,3 +5709,112 @@ isc_socketmgr_createinctx(isc_mem_t *mct
+@@ -5569,3 +5696,112 @@ isc_socketmgr_createinctx(isc_mem_t *mct
return (result);
}
Home |
Main Index |
Thread Index |
Old Index