From 09351e78166b5e864197c4456ebae3f89dd0bed9 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Tue, 22 Jan 2019 10:09:44 +0000 Subject: gentoo resync : 22.01.2019 --- .../files/zeromq-4.3.1-fix-test_security_zap.patch | 25 ++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch (limited to 'net-libs/zeromq/files') diff --git a/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch b/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch new file mode 100644 index 000000000000..3c89024b84bd --- /dev/null +++ b/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch @@ -0,0 +1,25 @@ +From 4147957a5eec57ec7a2a416dca74c3c0299a3432 Mon Sep 17 00:00:00 2001 +From: Luca Boccassi +Date: Sun, 13 Jan 2019 13:08:10 +0000 +Subject: [PATCH] Problem: test_security_zap fails on architectures that + disallow unaligned pointer access + +Solution: use memcpy instead of doing pointer arithmetics with casting +and dereferencing to fix the error on sparc64 +--- + tests/testutil_security.hpp | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/tests/testutil_security.hpp b/tests/testutil_security.hpp +index 90999118c..437bfb298 100644 +--- a/tests/testutil_security.hpp ++++ b/tests/testutil_security.hpp +@@ -345,7 +345,7 @@ static int get_monitor_event_internal (void *monitor_, + uint8_t *data = (uint8_t *) zmq_msg_data (&msg); + uint16_t event = *(uint16_t *) (data); + if (value_) +- *value_ = *(uint32_t *) (data + 2); ++ memcpy (value_, data + 2, sizeof (uint32_t)); + + // Second frame in message contains event address + zmq_msg_init (&msg); -- cgit v1.2.3