diff options
author | V3n3RiX <venerix@redcorelinux.org> | 2019-01-22 10:09:44 +0000 |
---|---|---|
committer | V3n3RiX <venerix@redcorelinux.org> | 2019-01-22 10:09:44 +0000 |
commit | 09351e78166b5e864197c4456ebae3f89dd0bed9 (patch) | |
tree | 41a96399f56ed3aa399006871bfce4430db84aa2 /net-libs/zeromq/files | |
parent | c8a77dfe4d3d307c1d5dd2650b7297447d8b609d (diff) |
gentoo resync : 22.01.2019
Diffstat (limited to 'net-libs/zeromq/files')
-rw-r--r-- | net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch b/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch new file mode 100644 index 000000000000..3c89024b84bd --- /dev/null +++ b/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch @@ -0,0 +1,25 @@ +From 4147957a5eec57ec7a2a416dca74c3c0299a3432 Mon Sep 17 00:00:00 2001 +From: Luca Boccassi <bluca@debian.org> +Date: Sun, 13 Jan 2019 13:08:10 +0000 +Subject: [PATCH] Problem: test_security_zap fails on architectures that + disallow unaligned pointer access + +Solution: use memcpy instead of doing pointer arithmetics with casting +and dereferencing to fix the error on sparc64 +--- + tests/testutil_security.hpp | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/tests/testutil_security.hpp b/tests/testutil_security.hpp +index 90999118c..437bfb298 100644 +--- a/tests/testutil_security.hpp ++++ b/tests/testutil_security.hpp +@@ -345,7 +345,7 @@ static int get_monitor_event_internal (void *monitor_, + uint8_t *data = (uint8_t *) zmq_msg_data (&msg); + uint16_t event = *(uint16_t *) (data); + if (value_) +- *value_ = *(uint32_t *) (data + 2); ++ memcpy (value_, data + 2, sizeof (uint32_t)); + + // Second frame in message contains event address + zmq_msg_init (&msg); |