Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/net/bind916 net/bind916: update to 9.16.5



details:   https://anonhg.NetBSD.org/pkgsrc/rev/ea0c76bfe758
branches:  trunk
changeset: 437398:ea0c76bfe758
user:      taca <taca%pkgsrc.org@localhost>
date:      Sun Aug 23 10:03:00 2020 +0000

description:
net/bind916: update to 9.16.5

Update bind916 to 9.16.5 (BIND 9.16.5).


        --- 9.16.5 released ---

5458.   [bug]           Prevent a theoretically possible NULL dereference caused
                        by a data race between zone_maintenance() and
                        dns_zone_setview_helper(). [GL #1627]

5455.   [bug]           named could crash when cleaning dead nodes in
                        lib/dns/rbtdb.c that were being reused. [GL #1968]

5454.   [bug]           Address a startup crash that occurred when the server
                        was under load and the root zone had not yet been
                        loaded. [GL #1862]

5453.   [bug]           named crashed on shutdown when a new rndc connection was
                        received during shutdown. [GL #1747]

5452.   [bug]           The "blackhole" ACL was accidentally disabled for client
                        queries. [GL #1936]

5451.   [func]          Add 'rndc dnssec -status' command. [GL #1612]

5449.   [bug]           Fix a socket shutdown race in netmgr udp. [GL #1938]

5448.   [bug]           Fix a race condition in isc__nm_tcpdns_send().
                        [GL #1937]

5447.   [bug]           IPv6 addresses ending in "::" could break YAML
                        parsing. A "0" is now appended to such addresses
                        in YAML output from dig, mdig, delv, and dnstap-read.
                        [GL #1952]

5446.   [bug]           The validator could fail to accept a properly signed
                        RRset if an unsupported algorithm appeared earlier in
                        the DNSKEY RRset than a supported algorithm. It could
                        also stop if it detected a malformed public key.
                        [GL #1689]

5444.   [bug]           'rndc dnstap -roll <value>' did not limit the number of
                        saved files to <value>. [GL !3728]

5443.   [bug]           The "primary" and "secondary" keywords, when used
                        as parameters for "check-names", were not
                        processed correctly and were being ignored. [GL #1949]

5441.   [bug]           ${LMDB_CFLAGS} was missing from make/includes.in.
                        [GL #1955]

5440.   [test]          Properly handle missing kyua. [GL #1950]

5439.   [bug]           The DS RRset returned by dns_keynode_dsset() was used in
                        a non-thread-safe manner. [GL #1926]

diffstat:

 net/bind916/Makefile                            |   4 +-
 net/bind916/distinfo                            |  14 ++++----
 net/bind916/patches/patch-lib_isc_siphash.c     |  23 ---------------
 net/bind916/patches/patch-lib_isc_unix_socket.c |  38 ++++++++++++------------
 4 files changed, 28 insertions(+), 51 deletions(-)

diffs (177 lines):

diff -r a7216210abee -r ea0c76bfe758 net/bind916/Makefile
--- a/net/bind916/Makefile      Sun Aug 23 09:53:53 2020 +0000
+++ b/net/bind916/Makefile      Sun Aug 23 10:03:00 2020 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.1 2020/08/09 15:20:21 taca Exp $
+# $NetBSD: Makefile,v 1.2 2020/08/23 10:03:00 taca Exp $
 
 DISTNAME=      bind-${BIND_VERSION}
 PKGNAME=       ${DISTNAME:S/-P/pl/}
@@ -15,7 +15,7 @@
 
 MAKE_JOBS_SAFE=        no
 
-BIND_VERSION=  9.16.5
+BIND_VERSION=  9.16.6
 
 .include "../../mk/bsd.prefs.mk"
 
diff -r a7216210abee -r ea0c76bfe758 net/bind916/distinfo
--- a/net/bind916/distinfo      Sun Aug 23 09:53:53 2020 +0000
+++ b/net/bind916/distinfo      Sun Aug 23 10:03:00 2020 +0000
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.1 2020/08/09 15:20:21 taca Exp $
+$NetBSD: distinfo,v 1.2 2020/08/23 10:03:00 taca Exp $
 
-SHA1 (bind-9.16.5.tar.xz) = a5b0fffd3a53c06368772c185688207dd57058f1
-RMD160 (bind-9.16.5.tar.xz) = 28228bd5d7531026e9b0cc324235d347e704bf57
-SHA512 (bind-9.16.5.tar.xz) = 789fc19f60e81f67ef13ebacd030ea5d8f8cc42cf5f06a01ee2eefe9b7c6d3b10603a3a6a3df85b0e5d770fcf462ce8dddc3a7e5f7f2dab27aa5879ee5380eb7
-Size (bind-9.16.5.tar.xz) = 3474044 bytes
+SHA1 (bind-9.16.6.tar.xz) = f8a4c1bd074cc0305a4c50971e71da5a3b810d78
+RMD160 (bind-9.16.6.tar.xz) = 3b296d967a6a5a709b599efbffc9697060c5f91b
+SHA512 (bind-9.16.6.tar.xz) = 37f57db6d1633cc85a4d954a69bbb3372c65ac43fef965df5aee8dcdd32153bb5b0c6d0d5f00f353dd4464c71d74dc8e801937b930e2b8f6799fa77af5f243e0
+Size (bind-9.16.6.tar.xz) = 3228368 bytes
 SHA1 (patch-bin_dig_dighost.c) = b1073911d80ecd519af98b6678968296ff8c0c98
 SHA1 (patch-bin_dig_include_dig_dig.h) = 10166f5bb98b208c7b10d63eb31e8253f704acc8
 SHA1 (patch-bin_named_Makefile.in) = f1367da6a226ba44d0ee13acf00b8abeb5b1b7eb
@@ -46,12 +46,12 @@
 SHA1 (patch-lib_isc_netmgr_netmgr.c) = 63168c8901646e7b2079e1dc3324087508bb1e62
 SHA1 (patch-lib_isc_netmgr_tcp.c) = f71556e21a6416af012b8d37a9ffb7c3ed4aa986
 SHA1 (patch-lib_isc_rwlock.c) = 1d114248ddee20db7a7429afab446f8b2f0dca82
-SHA1 (patch-lib_isc_siphash.c) = 1527f960967148cece7337a453fe868e812fd5f1
+SHA1 (patch-lib_isc_siphash.c) = da39a3ee5e6b4b0d3255bfef95601890afd80709
 SHA1 (patch-lib_isc_stats.c) = 024a372d9919fa751b894f8fc8267691297f00f4
 SHA1 (patch-lib_isc_task.c) = 103a23c74888edd3ddee0793ce6531cd2e6b87f3
 SHA1 (patch-lib_isc_unix_include_isc_align.h) = 1bbd78f1617a40079d1044175cfe037bbd1d95b2
 SHA1 (patch-lib_isc_unix_net.c) = c654f60a1feefdba9bf980dcfa46ce37f46918aa
-SHA1 (patch-lib_isc_unix_socket.c) = 48fb35ae552164ce2ce3fb0df76db8df4271d2ee
+SHA1 (patch-lib_isc_unix_socket.c) = 3178214a578e977ecdcf6e44ac04b25690176a03
 SHA1 (patch-lib_isc_unix_time.c) = fac9e66754e099f53ba8c499f5f179825a0b0fbd
 SHA1 (patch-lib_ns_Makefile.in) = 5626877ffe97261518f976bb8dd827cdb53668ed
 SHA1 (patch-lib_ns_client.c) = e0453a7483a4f899023e0c5ab970cda241976b90
diff -r a7216210abee -r ea0c76bfe758 net/bind916/patches/patch-lib_isc_siphash.c
--- a/net/bind916/patches/patch-lib_isc_siphash.c       Sun Aug 23 09:53:53 2020 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,23 +0,0 @@
-$NetBSD: patch-lib_isc_siphash.c,v 1.1 2020/08/09 15:20:22 taca Exp $
-
-* Take from NetBSD base.
-
---- lib/isc/siphash.c.orig     2020-05-06 09:59:35.000000000 +0000
-+++ lib/isc/siphash.c
-@@ -113,8 +113,14 @@ isc_siphash24(const uint8_t *k, const ui
-       REQUIRE(k != NULL);
-       REQUIRE(out != NULL);
- 
--      uint64_t k0 = U8TO64_LE(k);
--      uint64_t k1 = U8TO64_LE(k + 8);
-+      uint64_t k0;
-+      uint64_t k1;
-+
-+      memcpy(&k0, k, sizeof(k0));
-+      memcpy(&k1, k + sizeof(k0), sizeof(k1));
-+
-+      k0 = le64toh(k0);
-+      k1 = le64toh(k1);
- 
-       uint64_t v0 = 0x736f6d6570736575ULL ^ k0;
-       uint64_t v1 = 0x646f72616e646f6dULL ^ k1;
diff -r a7216210abee -r ea0c76bfe758 net/bind916/patches/patch-lib_isc_unix_socket.c
--- a/net/bind916/patches/patch-lib_isc_unix_socket.c   Sun Aug 23 09:53:53 2020 +0000
+++ b/net/bind916/patches/patch-lib_isc_unix_socket.c   Sun Aug 23 10:03:00 2020 +0000
@@ -1,10 +1,10 @@
-$NetBSD: patch-lib_isc_unix_socket.c,v 1.1 2020/08/09 15:20:22 taca Exp $
+$NetBSD: patch-lib_isc_unix_socket.c,v 1.2 2020/08/23 10:03:00 taca Exp $
 
 * Apply fixes from NetBSD base system.
 * Fix build on SmartOS. In this special case, _XOPEN_SOURCE has to be only
   defined on SmartOS.
 
---- lib/isc/unix/socket.c.orig 2020-06-10 21:01:43.000000000 +0000
+--- lib/isc/unix/socket.c.orig 2020-08-10 09:31:13.000000000 +0000
 +++ lib/isc/unix/socket.c
 @@ -11,6 +11,15 @@
  
@@ -150,8 +150,8 @@
  /*
   * Dequeue an item off the given socket's read queue, set the result code
   * in the done event to the one provided, and send it to the task it was
-@@ -3117,6 +3184,64 @@ finish:
-       UNLOCK(&sock->lock);
+@@ -3115,6 +3182,64 @@ finish:
+       }
  }
  
 +static void
@@ -215,16 +215,7 @@
  /*
   * Process read/writes on each fd here.  Avoid locking
   * and unlocking twice if both reads and writes are possible.
-@@ -3164,7 +3289,7 @@ process_fd(isc__socketthread_t *thread, 
-               if (sock->listener) {
-                       internal_accept(sock);
-               } else {
--                      internal_recv(sock);
-+                      dispatch_recv(sock);
-               }
-       }
- 
-@@ -3172,7 +3297,7 @@ process_fd(isc__socketthread_t *thread, 
+@@ -3162,7 +3287,7 @@ process_fd(isc__socketthread_t *thread, 
                if (sock->connecting) {
                        internal_connect(sock);
                } else {
@@ -233,7 +224,16 @@
                }
        }
  
-@@ -5287,7 +5412,7 @@ static isc_once_t hasreuseport_once = IS
+@@ -3170,7 +3295,7 @@ process_fd(isc__socketthread_t *thread, 
+               if (sock->listener) {
+                       internal_accept(sock); /* unlocks sock */
+               } else {
+-                      internal_recv(sock);
++                      dispatch_recv(sock);
+                       UNLOCK(&sock->lock);
+               }
+       } else {
+@@ -5274,7 +5399,7 @@ static isc_once_t hasreuseport_once = IS
  static bool hasreuseport = false;
  
  static void
@@ -242,7 +242,7 @@
  /*
   * SO_REUSEPORT works very differently on *BSD and on Linux (because why not).
   * We only want to use it on Linux, if it's available. On BSD we want to dup()
-@@ -5341,6 +5466,8 @@ _socktype(isc_sockettype_t type) {
+@@ -5328,6 +5453,8 @@ _socktype(isc_sockettype_t type) {
                return ("tcp");
        case isc_sockettype_unix:
                return ("unix");
@@ -251,7 +251,7 @@
        default:
                return ("not-initialized");
        }
-@@ -5353,7 +5480,7 @@ _socktype(isc_sockettype_t type) {
+@@ -5340,7 +5467,7 @@ _socktype(isc_sockettype_t type) {
                xmlrc = (a);        \
                if (xmlrc < 0)      \
                        goto error; \
@@ -260,7 +260,7 @@
  int
  isc_socketmgr_renderxml(isc_socketmgr_t *mgr0, void *writer0) {
        isc__socketmgr_t *mgr = (isc__socketmgr_t *)mgr0;
-@@ -5460,7 +5587,7 @@ error:
+@@ -5447,7 +5574,7 @@ error:
                        result = ISC_R_NOMEMORY; \
                        goto error;              \
                }                                \
@@ -269,7 +269,7 @@
  
  isc_result_t
  isc_socketmgr_renderjson(isc_socketmgr_t *mgr0, void *stats0) {
-@@ -5582,3 +5709,112 @@ isc_socketmgr_createinctx(isc_mem_t *mct
+@@ -5569,3 +5696,112 @@ isc_socketmgr_createinctx(isc_mem_t *mct
  
        return (result);
  }



Home | Main Index | Thread Index | Old Index