aboutsummaryrefslogtreecommitdiff
path: root/contrib/unbound/daemon/remote.c
diff options
context:
space:
mode:
authorCy Schubert <cy@FreeBSD.org>2020-08-24 18:14:04 +0000
committerCy Schubert <cy@FreeBSD.org>2020-08-24 18:14:04 +0000
commit25039b37d3883b8fdae50475cbea41a255a08ee2 (patch)
tree107a2df1bfda36ef3220a93fff6212e0c354ed36 /contrib/unbound/daemon/remote.c
parent0a5eb308d3006e2f386620f7266b6593b300b987 (diff)
parent7973006f41cdaf144441d1a39f9f075053435e2f (diff)
downloadsrc-25039b37d3883b8fdae50475cbea41a255a08ee2.tar.gz
src-25039b37d3883b8fdae50475cbea41a255a08ee2.zip
MFV 364468:
Update unbound 1.10.1 --> 1.11.0. MFH: 1 month
Notes
Notes: svn path=/head/; revision=364721
Diffstat (limited to 'contrib/unbound/daemon/remote.c')
-rw-r--r--contrib/unbound/daemon/remote.c18
1 files changed, 16 insertions, 2 deletions
diff --git a/contrib/unbound/daemon/remote.c b/contrib/unbound/daemon/remote.c
index 1782a39cad7c..aa263d074c64 100644
--- a/contrib/unbound/daemon/remote.c
+++ b/contrib/unbound/daemon/remote.c
@@ -329,7 +329,7 @@ add_open(const char* ip, int nr, struct listen_port** list, int noproto_is_err,
/* open fd */
fd = create_tcp_accept_sock(res, 1, &noproto, 0,
- cfg->ip_transparent, 0, cfg->ip_freebind, cfg->use_systemd);
+ cfg->ip_transparent, 0, cfg->ip_freebind, cfg->use_systemd, cfg->ip_dscp);
freeaddrinfo(res);
}
@@ -804,6 +804,9 @@ print_mem(RES* ssl, struct worker* worker, struct daemon* daemon,
size_t dnscrypt_shared_secret = 0;
size_t dnscrypt_nonce = 0;
#endif /* USE_DNSCRYPT */
+#ifdef WITH_DYNLIBMODULE
+ size_t dynlib = 0;
+#endif /* WITH_DYNLIBMODULE */
msg = slabhash_get_mem(daemon->env->msg_cache);
rrset = slabhash_get_mem(&daemon->env->rrset_cache->table);
val = mod_get_mem(&worker->env, "validator");
@@ -822,6 +825,9 @@ print_mem(RES* ssl, struct worker* worker, struct daemon* daemon,
dnscrypt_nonce = slabhash_get_mem(daemon->dnscenv->nonces_cache);
}
#endif /* USE_DNSCRYPT */
+#ifdef WITH_DYNLIBMODULE
+ dynlib = mod_get_mem(&worker->env, "dynlib");
+#endif /* WITH_DYNLIBMODULE */
if(!print_longnum(ssl, "mem.cache.rrset"SQ, rrset))
return 0;
@@ -849,6 +855,10 @@ print_mem(RES* ssl, struct worker* worker, struct daemon* daemon,
dnscrypt_nonce))
return 0;
#endif /* USE_DNSCRYPT */
+#ifdef WITH_DYNLIBMODULE
+ if(!print_longnum(ssl, "mem.mod.dynlibmod"SQ, dynlib))
+ return 0;
+#endif /* WITH_DYNLIBMODULE */
if(!print_longnum(ssl, "mem.streamwait"SQ,
(size_t)s->svr.mem_stream_wait))
return 0;
@@ -907,7 +917,7 @@ static int
print_ext(RES* ssl, struct ub_stats_info* s)
{
int i;
- char nm[16];
+ char nm[32];
const sldns_rr_descriptor* desc;
const sldns_lookup_table* lt;
/* TYPE */
@@ -1124,6 +1134,10 @@ parse_arg_name(RES* ssl, char* str, uint8_t** res, size_t* len, int* labs)
*res = NULL;
*len = 0;
*labs = 0;
+ if(str[0] == '\0') {
+ ssl_printf(ssl, "error: this option requires a domain name\n");
+ return 0;
+ }
status = sldns_str2wire_dname_buf(str, nm, &nmlen);
if(status != 0) {
ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", str,