Mark Andrews
39c3565408
Add ${LMDB_CFLAGS} to DNS_INCLUDES in make/includes.in
...
so that <lmdb.h> will be found when <dns/lmdb.h> is included.
2020-06-19 12:13:27 +10:00
Mark Andrews
41e38c216d
Add missing #pragma once to <dns/lmdb.h>
2020-06-19 12:12:45 +10:00
Michał Kępień
8aed0ff51a
Merge branch 'v9_16_4-release' into 'v9_16'
...
[CVE-2020-8618] [CVE-2020-8619] Merge 9.16.4 release branch
See merge request isc-projects/bind9!3712
2020-06-18 08:47:51 +00:00
Michał Kępień
4712aa7330
Set up release notes for BIND 9.16.5
2020-06-18 10:33:50 +02:00
Michał Kępień
43b610a79d
Bump BIND_BASELINE_VERSION for ABI checks
2020-06-18 10:33:50 +02:00
Tinderbox User
9eb5040216
Merge branch 'prep-release' into security-v9_16
2020-06-18 10:25:51 +02:00
Tinderbox User
adab85b815
prep 9.16.4
2020-06-18 10:25:50 +02:00
Michał Kępień
64ee041fa7
Merge branch 'security-v9_16-docs' into 'security-v9_16'
...
Prepare documentation for BIND 9.16.4
See merge request isc-private/bind9!173
2020-06-18 10:25:37 +02:00
Michał Kępień
3859bbe57a
Tweak and reword release notes
2020-06-18 10:25:37 +02:00
Michał Kępień
338ba6e1a1
Add release note for #1859
2020-06-18 10:25:37 +02:00
Michał Kępień
0f28a6f0c4
Add release note for #1842
2020-06-18 10:25:37 +02:00
Michał Kępień
6e28c57d5c
Add release note for #1834
2020-06-18 10:25:37 +02:00
Michał Kępień
0d2315a5f2
Add release note for #1812
2020-06-18 10:25:37 +02:00
Michał Kępień
ca941a6542
Add release note for #1714
2020-06-18 10:25:37 +02:00
Michał Kępień
63a4cbfddf
Add release note for #83
2020-06-18 10:25:37 +02:00
Michał Kępień
2e3a70fe8d
Reorder release notes
2020-06-18 10:25:36 +02:00
Michał Kępień
40b3591eea
Prepare release notes for BIND 9.16.4
2020-06-18 10:25:05 +02:00
Michał Kępień
e4c2281e11
Merge branch 'security-wildcard-test-marka-v9_16' into security-v9_16
2020-06-18 10:18:42 +02:00
Michał Kępień
ef42ca2864
Tweak and reword recent CHANGES entries
2020-06-18 10:18:42 +02:00
Michał Kępień
0454d26078
Merge branch 'security-new_reference-insist-v9_16' into security-v9_16
2020-06-18 10:18:42 +02:00
Mark Andrews
f8d7bd22f7
Add CHANGES note
...
(cherry picked from commit 5acccc6e8dbcfd7efa31686946d677d7895a7fff)
2020-06-18 10:18:42 +02:00
Michał Kępień
c9e2a23d9e
Merge branch '1850-cleanup-client_allocsendbuf-v9_16' into security-v9_16
2020-06-18 10:18:42 +02:00
Mark Andrews
b40b453c93
Add CHANGES entry for #1718
...
(cherry picked from commit d7c26a97c82c256e00b167c65a70fb304a7320d4)
2020-06-18 10:18:42 +02:00
Mark Andrews
e522e80dc4
Add checking RFC 4592 responses examples to wildcard system test
...
(cherry picked from commit 30586aa054c9cd8a4e64c91ed78683a4b54c79bc)
2020-06-18 10:18:42 +02:00
Mark Andrews
e742313374
Add release notes for #1850
...
(cherry picked from commit 8d2dffa53a987c31af053824bc210a7fe3d66849)
2020-06-18 10:18:42 +02:00
Mark Andrews
54e5fb53e3
Add release note for #1718
...
(cherry picked from commit 2f9d6d4f7eb624986db914a2825bbcc4e6d378b1)
2020-06-18 10:18:42 +02:00
Mark Andrews
88cd1e264c
Add CHANGES entry for #1850
...
(cherry picked from commit 9b56a3c85578e56e10b174391e579d8e32ff6e34)
2020-06-18 10:18:42 +02:00
Mark Andrews
6964a21fa6
Remove INSIST from from new_reference
...
RBTDB node can now appear on the deadnodes lists following the changes
to decrement_reference in 176b23b6cd to
defer checking of node->down when the tree write lock is not held. The
node should be unlinked instead.
(cherry picked from commit 569cc155b8680d8ed12db1fabbe20947db24a0f9)
2020-06-18 10:18:42 +02:00
Mark Andrews
ee6f60349b
Adjust NS_CLIENT_TCP_BUFFER_SIZE and cleanup client_allocsendbuf
...
NS_CLIENT_TCP_BUFFER_SIZE was 2 byte too large following the
move to netmgr add associated changes to lib/ns/client.c and
as a result an INSIST could be trigger if the DNS message being
constructed had a checkpoint stage that fell in those two extra
bytes. Adjusted NS_CLIENT_TCP_BUFFER_SIZE and cleaned up
client_allocsendbuf now that the previously reserved 2 bytes
are no longer used.
(cherry picked from commit 5a92af19b7dce684b0e6670ae6ec1c4c58613263)
2020-06-18 10:18:41 +02:00
Ondřej Surý
8b61b30a57
Merge branch '1950-properly-handle-missing-kyua' into 'v9_16'
...
Skip the unit tests when kyua is not available
See merge request isc-projects/bind9!3704
2020-06-17 13:28:14 +00:00
Ondřej Surý
4ab9e79e6f
Add CHANGES and release note for #1950
2020-06-17 15:04:43 +02:00
Ondřej Surý
762a3c866e
Skip the unit tests when kyua is not available
...
The unittest.sh script tried to execute the unit tests when cmocka
development libraries was available, but kyua, the execution engine,
was not. Now, both need to be installed in the system.
2020-06-17 15:04:43 +02:00
Ondřej Surý
eca3c5f615
Merge branch 'ondrej/switch-the-default-branch-name-to-main-v9_16' into 'v9_16'
...
Adjust the GitLab CI scripts for new default branch name
See merge request isc-projects/bind9!3707
2020-06-17 12:19:22 +00:00
Ondřej Surý
e12ab8c48b
Adjust the GitLab CI scripts for new default branch name
...
(cherry picked from commit b36cd06a0b )
2020-06-17 14:17:21 +02:00
Ondřej Surý
f0a3d4d688
Merge branch '1943-remove-references-to-blacklist-and-whitelist-in-bind-arm-v9_16' into 'v9_16'
...
Remove references to "blacklist" and "whitelist"
See merge request isc-projects/bind9!3701
2020-06-16 20:00:32 +00:00
Suzanne Goldlust
4cc90976f6
Update logging-categories.rst and reference.rst
...
Remove references to "blacklist" and "whitelist"
(cherry picked from commit 4a04fb68cd )
2020-06-16 21:58:49 +02:00
Ondřej Surý
06f125c9d4
Merge branch '1931-fix-out-of-order-rfcs-in-general-rst-file-of-bind-arm-v9_16' into 'v9_16'
...
Fix two RFCs that were out of numerical order
See merge request isc-projects/bind9!3700
2020-06-16 19:34:17 +00:00
Suzanne Goldlust
194ea4b256
Fix two RFCs that were out of numerical order
...
(cherry picked from commit acb4742182 )
2020-06-16 21:33:11 +02:00
Ondřej Surý
8b7c9df2b0
Merge branch '1945-system-clang-tsan-has-bad-symbolizer-v9_16' into 'v9_16'
...
Set the TSAN symbolizer path directly, the indirection via env doesn't work
See merge request isc-projects/bind9!3698
2020-06-16 08:54:45 +00:00
Ondřej Surý
362007bf1f
Set the TSAN symbolizer path directly, the indirection via env doesn't work
...
(cherry picked from commit 39107365a7 )
2020-06-16 10:51:58 +02:00
Ondřej Surý
cebc77a560
Merge branch '1474-threadsanitizer-data-race-lib-dns-message-c-v9_16' into 'v9_16'
...
Add missing acquire memory barrier in isc_nmhandle_unref
See merge request isc-projects/bind9!3695
2020-06-16 08:51:17 +00:00
Ondřej Surý
8b4fe6c6c5
Add missing acquire memory barrier in isc_nmhandle_unref
...
The ThreadSanitizer uses system synchronization primitives to check for
data race. The netmgr handle->references was missing acquire memory
barrier before resetting and reusing the memory occupied by isc_nmhandle_t.
(cherry picked from commit 1013c0930e )
2020-06-16 08:58:33 +02:00
Mark Andrews
b6e4432081
Merge branch 'marka-dsset-refs-v9_16' into 'v9_16'
...
Marka dsset refs v9 16
See merge request isc-projects/bind9!3688
2020-06-11 07:52:21 +00:00
Mark Andrews
02541e95e3
Add release note for [GL #1926 ]
...
(cherry picked from commit f97889a51a )
2020-06-11 16:09:44 +10:00
Mark Andrews
e7969ca571
Add CHANGES note [GL #1926 ]
...
(cherry picked from commit 9d89244ba2 )
2020-06-11 16:09:44 +10:00
Mark Andrews
06cebcb6b7
val->keynode is no longer needed
...
(cherry picked from commit ff4fc3f8dc )
2020-06-11 16:09:43 +10:00
Mark Andrews
70c27df941
The dsset returned by dns_keynode_dsset needs to be thread safe.
...
- clone keynode->dsset rather than return a pointer so that thread
use is independent of each other.
- hold a reference to the dsset (keynode) so it can't be deleted
while in use.
- create a new keynode when removing DS records so that dangling
pointers to the deleted records will not occur.
- use a rwlock when accessing the rdatalist to prevent instabilities
when DS records are added.
(cherry picked from commit e5b2eca1d3 )
2020-06-11 16:09:43 +10:00
Evan Hunt
5b4d4cb3f3
Merge branch '1930-tcp-race-quota-v9_16' into 'v9_16'
...
Fix a race in TCP accepting.
See merge request isc-projects/bind9!3684
2020-06-10 18:49:55 +00:00
Witold Kręcicki
aa2282853a
Fix a race in TCP accepting.
...
There's a possibility of a race in TCP accepting code:
T1 accepts a connection C1
T2 accepts a connection C2
T1 tries to accept a connection C3, but we hit a quota,
isc_quota_cb_init() sets quota_accept_cb for the socket,
we return from accept_connection
T2 drops C2, but we race in quota_release with accepting C3 so
we don't see quota->waiting is > 0, we don't launch the callback
T1 accepts a connection C4, we are able to get the quota we clear
the quota_accept_cb from sock->quotacb
T1 drops C1, tries to call the callback which is zeroed, sigsegv.
2020-06-10 11:39:43 -07:00
Witold Kręcicki
7ff1ff88f9
Don't clean quota cb cb_func/data, we don't own it
2020-06-10 17:52:53 +02:00