Taylor R Campbell writes:
> Both jemalloc and glibc use sbrk in addition to mmap.
Jemalloc *can* use sbrk() in addition to mmap() if enabled at build
time, but even then, it will try mmap() first, unless you explicitly
configure it at runtime to prefer sbrk() over mmap(). And it's still
not a me
Unbound pretends to report memory statistics based on the value returned
by sbrk(). Not only is this non-portable (as demonstrated by r3528 and
r3911), but it is completely meaningless even on systems that provide
the sbrk() function. First, modern allocators (and by "modern" I mean
"anything wri
The following are changes I had to make to integrate 1.5.10 into FreeBSD
head, rebased to unbound trunk.
1) lz_type() must either have a prototype or be declared static. Since
it isn't used outside its compilation unit, I chose the latter.
Index: services/localzone.c
=
Matt via Unbound-users writes:
> It seems to work fine but I keep getting this error when using
> unbound-control:
>
> # unbound-control stats
> error: SSL handshake failed
> *:error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify
> failed:s3_clnt.c:1172:
Did you run unboun
The prototype for ub_event_get_version() in util/ub_event.h is missing
an argument list. C11 allows function definitions to have empty
argument lists but not prototypes. Patch relative to tip of svn tree:
Index: util/ub_event.h
===
Dag-Erling Smørgrav writes:
> When using unblock-lan-zones, you will more likely than not also need to
> disable validation for these zones. The attached patch adds a new
> configuration option, insecure-lan-zones, which adds all AS112 zones to
> the list of insecure domains. Note that it moves
When using unblock-lan-zones, you will more likely than not also need to
disable validation for these zones. The attached patch adds a new
configuration option, insecure-lan-zones, which adds all AS112 zones to
the list of insecure domains. Note that it moves the list of AS112
zones, which is cur
Taylor R Campbell writes:
> That's irrelevant to the issue Philippe raised. The network is not
> always available, no matter how well you configure your system or
> engineer your software. The problem here is that when the network is
> down, Unbound spews junk to its log as fast as it can.
Defi
Philippe Meunier via Unbound-users writes:
> After booting, unbound and ntpd both start without problem. Then ntpd
> automatically starts trying to contact NTP servers from pool.ntp.org,
> which triggers DNS queries. In turn unbound tries to contact root DNS
> servers and fails since no network
Traditionally, Unix daemons will reload their configuration upon
receiving SIGHUP and terminate gracefully upon receiving SIGTERM.
Unbound follows this tradition, but in addition, it treats SIGINT
(Ctrl-C when not daemonized) and SIGQUIT (Ctrl-\ when not daemonized) as
equivalent to SIGTERM. The m
When the configuration lexer processes an include directive and unbound
is chrooted, it will attempt to strip the chroot directory from the
front of the filename. Unfortunately, this is omitted from the loop
that handles globs.
The bug was reported to me by a 1.5.3 user and has been confirmed in
11 matches
Mail list logo