Home - Waterfall Grid T-Grid Console Builders Recent Builds Buildslaves Changesources - JSON API - About

Builder curl-ares-solaris10-i386 Build #4337

Build In Progress:

ETA: 02:14:39 [4 mins, 26 secs]

[waiting for Lock]

SourceStamp:

Projectcurl
Repositoryhttps://github.com/curl/curl.git
Branchmaster
Revision961a13e366eaafc0d1828bc933abc78805f4b8ea
Changes5 changes

BuildSlave:

unstable10x

Reason:

The SingleBranchScheduler scheduler named 'schedule-curl-ares-solaris10-i386' triggered this build

Steps and Logfiles:

  1. git  
    1. - no logs -
    1. - no logs -
    1. - no logs -
  2. Runtest  
    1. - no logs -
    1. - no logs -

Build Properties:

NameValueSource
branch master Build
builddir /export/home/buildbot/slave/curl-ares-solaris10-i386 slave
buildername curl-ares-solaris10-i386 Builder
buildnumber 4337 Build
codebase Build
project curl Build
repository https://github.com/curl/curl.git Build
revision 961a13e366eaafc0d1828bc933abc78805f4b8ea Build
scheduler schedule-curl-ares-solaris10-i386 Scheduler
slavename unstable10x BuildSlave
workdir /export/home/buildbot/slave/curl-ares-solaris10-i386 slave (deprecated)

Forced Build Properties:

NameLabelValue

Responsible Users:

  1. Daniel McCarney
  2. Daniel Stenberg
  3. Stefan Eissing
  4. Viktor Szakats

Timing:

StartFri Apr 24 00:06:04 2026
Elapsed2 hrs, 4 mins, 8 secs

All Changes:

:

  1. Change #265261

    Category curl
    Changed by Stefan Eissing <stefanohnoyoudont@eissing.org>
    Changed at Thu 23 Apr 2026 15:55:07
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 00cac453c7955d8a3894772e02029bb8b65a2c12

    Comments

    multi: enhance pending handles fairness
    When trying to connect a pending transfer, remember the `mid` that was
    last reactivated and start looking for future pending handles from the
    last one forward through the pending bitset.
    
    Background: when many pending handles exist, iterating the bitset always
    from the start may become unfair to transfers that were assigned higher
    `mid` values.
    
    Fixes #21396
    Reported-by: Juan Belón
    Closes #21412

    Changed files

    • lib/multi.c
    • lib/multihandle.h
  2. Change #265268

    Category curl
    Changed by Stefan Eissing <stefanohnoyoudont@eissing.org>
    Changed at Thu 23 Apr 2026 17:23:54
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 69f3a36bcb94b6e69f0248ac749833483326edf9

    Comments

    doh: remove conn->bits.doh
    Since we have a new struct instance for each async operation now and
    async operation may happen in parallel, remove the connection bit
    indicating doh is in progress.
    
    Closes #21422

    Changed files

    • lib/doh.c
    • lib/hostip.c
    • lib/urldata.h
  3. Change #265283

    Category curl
    Changed by Daniel McCarney <danielohnoyoudont@binaryparadox.net>
    Changed at Thu 23 Apr 2026 20:24:53
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision ed9083eba206ed39f41f8eaebab4f7c2546c2277

    Comments

    ci: update RUSTLS_VERSION 0.15.2 -> 0.15.3
    Closes #21424

    Changed files

    • .github/workflows/linux.yml
  4. Change #265292

    Category curl
    Changed by Viktor Szakats <commitohnoyoudont@vsz.me>
    Changed at Thu 23 Apr 2026 22:07:41
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 734793f53319adc847b9c1fda0e01a3a5c495201

    Comments

    checksrc.pl: delete stray commas
    Closes #21426

    Changed files

    • scripts/checksrc.pl
  5. Change #265298

    Category curl
    Changed by Daniel Stenberg <danielohnoyoudont@haxx.se>
    Changed at Thu 23 Apr 2026 22:58:39
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 961a13e366eaafc0d1828bc933abc78805f4b8ea

    Comments

    rustls: fix memory leak on repeated SSLKEYLOGFILE fails
    Before this fix, Curl_tls_keylog_open() assigned the environment
    variable result to a global keylog_file_name without freeing any prior
    allocation. If the file cannot be opened (e.g., permission error)
    keylog_file_fp stays NULL, so subsequent calls to Curl_tls_keylog_open
    will overwrite keylog_file_name and leak the previous allocation.
    
    Spotted by Codex Security
    
    Closes #21427

    Changed files

    • lib/vtls/keylog.c