summaryrefslogtreecommitdiff
path: root/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch
diff options
context:
space:
mode:
Diffstat (limited to 'net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch')
-rw-r--r--net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch25
1 files changed, 25 insertions, 0 deletions
diff --git a/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch b/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch
new file mode 100644
index 000000000000..3c89024b84bd
--- /dev/null
+++ b/net-libs/zeromq/files/zeromq-4.3.1-fix-test_security_zap.patch
@@ -0,0 +1,25 @@
+From 4147957a5eec57ec7a2a416dca74c3c0299a3432 Mon Sep 17 00:00:00 2001
+From: Luca Boccassi <bluca@debian.org>
+Date: Sun, 13 Jan 2019 13:08:10 +0000
+Subject: [PATCH] Problem: test_security_zap fails on architectures that
+ disallow unaligned pointer access
+
+Solution: use memcpy instead of doing pointer arithmetics with casting
+and dereferencing to fix the error on sparc64
+---
+ tests/testutil_security.hpp | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/tests/testutil_security.hpp b/tests/testutil_security.hpp
+index 90999118c..437bfb298 100644
+--- a/tests/testutil_security.hpp
++++ b/tests/testutil_security.hpp
+@@ -345,7 +345,7 @@ static int get_monitor_event_internal (void *monitor_,
+ uint8_t *data = (uint8_t *) zmq_msg_data (&msg);
+ uint16_t event = *(uint16_t *) (data);
+ if (value_)
+- *value_ = *(uint32_t *) (data + 2);
++ memcpy (value_, data + 2, sizeof (uint32_t));
+
+ // Second frame in message contains event address
+ zmq_msg_init (&msg);