Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/net/bind916 net/bind916: update to 9.16.5
details: https://anonhg.NetBSD.org/pkgsrc/rev/ea0c76bfe758
branches: trunk
changeset: 437398:ea0c76bfe758
user: taca <taca%pkgsrc.org@localhost>
date: Sun Aug 23 10:03:00 2020 +0000
description:
net/bind916: update to 9.16.5
Update bind916 to 9.16.5 (BIND 9.16.5).
--- 9.16.5 released ---
5458. [bug] Prevent a theoretically possible NULL dereference caused
by a data race between zone_maintenance() and
dns_zone_setview_helper(). [GL #1627]
5455. [bug] named could crash when cleaning dead nodes in
lib/dns/rbtdb.c that were being reused. [GL #1968]
5454. [bug] Address a startup crash that occurred when the server
was under load and the root zone had not yet been
loaded. [GL #1862]
5453. [bug] named crashed on shutdown when a new rndc connection was
received during shutdown. [GL #1747]
5452. [bug] The "blackhole" ACL was accidentally disabled for client
queries. [GL #1936]
5451. [func] Add 'rndc dnssec -status' command. [GL #1612]
5449. [bug] Fix a socket shutdown race in netmgr udp. [GL #1938]
5448. [bug] Fix a race condition in isc__nm_tcpdns_send().
[GL #1937]
5447. [bug] IPv6 addresses ending in "::" could break YAML
parsing. A "0" is now appended to such addresses
in YAML output from dig, mdig, delv, and dnstap-read.
[GL #1952]
5446. [bug] The validator could fail to accept a properly signed
RRset if an unsupported algorithm appeared earlier in
the DNSKEY RRset than a supported algorithm. It could
also stop if it detected a malformed public key.
[GL #1689]
5444. [bug] 'rndc dnstap -roll <value>' did not limit the number of
saved files to <value>. [GL !3728]
5443. [bug] The "primary" and "secondary" keywords, when used
as parameters for "check-names", were not
processed correctly and were being ignored. [GL #1949]
5441. [bug] ${LMDB_CFLAGS} was missing from make/includes.in.
[GL #1955]
5440. [test] Properly handle missing kyua. [GL #1950]
5439. [bug] The DS RRset returned by dns_keynode_dsset() was used in
a non-thread-safe manner. [GL #1926]
diffstat:
net/bind916/Makefile | 4 +-
net/bind916/distinfo | 14 ++++----
net/bind916/patches/patch-lib_isc_siphash.c | 23 ---------------
net/bind916/patches/patch-lib_isc_unix_socket.c | 38 ++++++++++++------------
4 files changed, 28 insertions(+), 51 deletions(-)
diffs (177 lines):
diff -r a7216210abee -r ea0c76bfe758 net/bind916/Makefile
--- a/net/bind916/Makefile Sun Aug 23 09:53:53 2020 +0000
+++ b/net/bind916/Makefile Sun Aug 23 10:03:00 2020 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.1 2020/08/09 15:20:21 taca Exp $
+# $NetBSD: Makefile,v 1.2 2020/08/23 10:03:00 taca Exp $
DISTNAME= bind-${BIND_VERSION}
PKGNAME= ${DISTNAME:S/-P/pl/}
@@ -15,7 +15,7 @@
MAKE_JOBS_SAFE= no
-BIND_VERSION= 9.16.5
+BIND_VERSION= 9.16.6
.include "../../mk/bsd.prefs.mk"
diff -r a7216210abee -r ea0c76bfe758 net/bind916/distinfo
--- a/net/bind916/distinfo Sun Aug 23 09:53:53 2020 +0000
+++ b/net/bind916/distinfo Sun Aug 23 10:03:00 2020 +0000
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.1 2020/08/09 15:20:21 taca Exp $
+$NetBSD: distinfo,v 1.2 2020/08/23 10:03:00 taca Exp $
-SHA1 (bind-9.16.5.tar.xz) = a5b0fffd3a53c06368772c185688207dd57058f1
-RMD160 (bind-9.16.5.tar.xz) = 28228bd5d7531026e9b0cc324235d347e704bf57
-SHA512 (bind-9.16.5.tar.xz) = 789fc19f60e81f67ef13ebacd030ea5d8f8cc42cf5f06a01ee2eefe9b7c6d3b10603a3a6a3df85b0e5d770fcf462ce8dddc3a7e5f7f2dab27aa5879ee5380eb7
-Size (bind-9.16.5.tar.xz) = 3474044 bytes
+SHA1 (bind-9.16.6.tar.xz) = f8a4c1bd074cc0305a4c50971e71da5a3b810d78
+RMD160 (bind-9.16.6.tar.xz) = 3b296d967a6a5a709b599efbffc9697060c5f91b
+SHA512 (bind-9.16.6.tar.xz) = 37f57db6d1633cc85a4d954a69bbb3372c65ac43fef965df5aee8dcdd32153bb5b0c6d0d5f00f353dd4464c71d74dc8e801937b930e2b8f6799fa77af5f243e0
+Size (bind-9.16.6.tar.xz) = 3228368 bytes
SHA1 (patch-bin_dig_dighost.c) = b1073911d80ecd519af98b6678968296ff8c0c98
SHA1 (patch-bin_dig_include_dig_dig.h) = 10166f5bb98b208c7b10d63eb31e8253f704acc8
SHA1 (patch-bin_named_Makefile.in) = f1367da6a226ba44d0ee13acf00b8abeb5b1b7eb
@@ -46,12 +46,12 @@
SHA1 (patch-lib_isc_netmgr_netmgr.c) = 63168c8901646e7b2079e1dc3324087508bb1e62
SHA1 (patch-lib_isc_netmgr_tcp.c) = f71556e21a6416af012b8d37a9ffb7c3ed4aa986
SHA1 (patch-lib_isc_rwlock.c) = 1d114248ddee20db7a7429afab446f8b2f0dca82
-SHA1 (patch-lib_isc_siphash.c) = 1527f960967148cece7337a453fe868e812fd5f1
+SHA1 (patch-lib_isc_siphash.c) = da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA1 (patch-lib_isc_stats.c) = 024a372d9919fa751b894f8fc8267691297f00f4
SHA1 (patch-lib_isc_task.c) = 103a23c74888edd3ddee0793ce6531cd2e6b87f3
SHA1 (patch-lib_isc_unix_include_isc_align.h) = 1bbd78f1617a40079d1044175cfe037bbd1d95b2
SHA1 (patch-lib_isc_unix_net.c) = c654f60a1feefdba9bf980dcfa46ce37f46918aa
-SHA1 (patch-lib_isc_unix_socket.c) = 48fb35ae552164ce2ce3fb0df76db8df4271d2ee
+SHA1 (patch-lib_isc_unix_socket.c) = 3178214a578e977ecdcf6e44ac04b25690176a03
SHA1 (patch-lib_isc_unix_time.c) = fac9e66754e099f53ba8c499f5f179825a0b0fbd
SHA1 (patch-lib_ns_Makefile.in) = 5626877ffe97261518f976bb8dd827cdb53668ed
SHA1 (patch-lib_ns_client.c) = e0453a7483a4f899023e0c5ab970cda241976b90
diff -r a7216210abee -r ea0c76bfe758 net/bind916/patches/patch-lib_isc_siphash.c
--- a/net/bind916/patches/patch-lib_isc_siphash.c Sun Aug 23 09:53:53 2020 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,23 +0,0 @@
-$NetBSD: patch-lib_isc_siphash.c,v 1.1 2020/08/09 15:20:22 taca Exp $
-
-* Take from NetBSD base.
-
---- lib/isc/siphash.c.orig 2020-05-06 09:59:35.000000000 +0000
-+++ lib/isc/siphash.c
-@@ -113,8 +113,14 @@ isc_siphash24(const uint8_t *k, const ui
- REQUIRE(k != NULL);
- REQUIRE(out != NULL);
-
-- uint64_t k0 = U8TO64_LE(k);
-- uint64_t k1 = U8TO64_LE(k + 8);
-+ uint64_t k0;
-+ uint64_t k1;
-+
-+ memcpy(&k0, k, sizeof(k0));
-+ memcpy(&k1, k + sizeof(k0), sizeof(k1));
-+
-+ k0 = le64toh(k0);
-+ k1 = le64toh(k1);
-
- uint64_t v0 = 0x736f6d6570736575ULL ^ k0;
- uint64_t v1 = 0x646f72616e646f6dULL ^ k1;
diff -r a7216210abee -r ea0c76bfe758 net/bind916/patches/patch-lib_isc_unix_socket.c
--- a/net/bind916/patches/patch-lib_isc_unix_socket.c Sun Aug 23 09:53:53 2020 +0000
+++ b/net/bind916/patches/patch-lib_isc_unix_socket.c Sun Aug 23 10:03:00 2020 +0000
@@ -1,10 +1,10 @@
-$NetBSD: patch-lib_isc_unix_socket.c,v 1.1 2020/08/09 15:20:22 taca Exp $
+$NetBSD: patch-lib_isc_unix_socket.c,v 1.2 2020/08/23 10:03:00 taca Exp $
* Apply fixes from NetBSD base system.
* Fix build on SmartOS. In this special case, _XOPEN_SOURCE has to be only
defined on SmartOS.
---- lib/isc/unix/socket.c.orig 2020-06-10 21:01:43.000000000 +0000
+--- lib/isc/unix/socket.c.orig 2020-08-10 09:31:13.000000000 +0000
+++ lib/isc/unix/socket.c
@@ -11,6 +11,15 @@
@@ -150,8 +150,8 @@
/*
* Dequeue an item off the given socket's read queue, set the result code
* in the done event to the one provided, and send it to the task it was
-@@ -3117,6 +3184,64 @@ finish:
- UNLOCK(&sock->lock);
+@@ -3115,6 +3182,64 @@ finish:
+ }
}
+static void
@@ -215,16 +215,7 @@
/*
* Process read/writes on each fd here. Avoid locking
* and unlocking twice if both reads and writes are possible.
-@@ -3164,7 +3289,7 @@ process_fd(isc__socketthread_t *thread,
- if (sock->listener) {
- internal_accept(sock);
- } else {
-- internal_recv(sock);
-+ dispatch_recv(sock);
- }
- }
-
-@@ -3172,7 +3297,7 @@ process_fd(isc__socketthread_t *thread,
+@@ -3162,7 +3287,7 @@ process_fd(isc__socketthread_t *thread,
if (sock->connecting) {
internal_connect(sock);
} else {
@@ -233,7 +224,16 @@
}
}
-@@ -5287,7 +5412,7 @@ static isc_once_t hasreuseport_once = IS
+@@ -3170,7 +3295,7 @@ process_fd(isc__socketthread_t *thread,
+ if (sock->listener) {
+ internal_accept(sock); /* unlocks sock */
+ } else {
+- internal_recv(sock);
++ dispatch_recv(sock);
+ UNLOCK(&sock->lock);
+ }
+ } else {
+@@ -5274,7 +5399,7 @@ static isc_once_t hasreuseport_once = IS
static bool hasreuseport = false;
static void
@@ -242,7 +242,7 @@
/*
* SO_REUSEPORT works very differently on *BSD and on Linux (because why not).
* We only want to use it on Linux, if it's available. On BSD we want to dup()
-@@ -5341,6 +5466,8 @@ _socktype(isc_sockettype_t type) {
+@@ -5328,6 +5453,8 @@ _socktype(isc_sockettype_t type) {
return ("tcp");
case isc_sockettype_unix:
return ("unix");
@@ -251,7 +251,7 @@
default:
return ("not-initialized");
}
-@@ -5353,7 +5480,7 @@ _socktype(isc_sockettype_t type) {
+@@ -5340,7 +5467,7 @@ _socktype(isc_sockettype_t type) {
xmlrc = (a); \
if (xmlrc < 0) \
goto error; \
@@ -260,7 +260,7 @@
int
isc_socketmgr_renderxml(isc_socketmgr_t *mgr0, void *writer0) {
isc__socketmgr_t *mgr = (isc__socketmgr_t *)mgr0;
-@@ -5460,7 +5587,7 @@ error:
+@@ -5447,7 +5574,7 @@ error:
result = ISC_R_NOMEMORY; \
goto error; \
} \
@@ -269,7 +269,7 @@
isc_result_t
isc_socketmgr_renderjson(isc_socketmgr_t *mgr0, void *stats0) {
-@@ -5582,3 +5709,112 @@ isc_socketmgr_createinctx(isc_mem_t *mct
+@@ -5569,3 +5696,112 @@ isc_socketmgr_createinctx(isc_mem_t *mct
return (result);
}
Home |
Main Index |
Thread Index |
Old Index