This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "uClibc-ng - small C library for embedded systems".
The branch, master has been updated
via bcd581688e7222af52ff23b815fdc878c2703245 (commit)
from 59c183933e06c74942d3eda019cd951328f7f79b (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit bcd581688e7222af52ff23b815fdc878c2703245
Author: Waldemar Brodkorb <wbx(a)openadk.org>
Date: Fri Nov 13 06:13:42 2015 +0100
i386: use socketcall even if newer linux exposes direct syscalls
The changeset 9dea5dc921b5f4045a18c63eb92e84dc274d17eb in the Linux kernel
expose the direct syscalls for sockets. For example udhcpc then will use sendto
syscall directly and get an EINVAL error. Disable direct syscalls as it was done
for SPARC in the past. Musl and GNU libc are not affected, as they already
disable direct socket syscalls on i386.
Reported-by: Gustavo Zacarias <gustavo(a)zacarias.com.ar>
-----------------------------------------------------------------------
Summary of changes:
libc/inet/socketcalls.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/libc/inet/socketcalls.c b/libc/inet/socketcalls.c
index 6f4054b..1fef810 100644
--- a/libc/inet/socketcalls.c
+++ b/libc/inet/socketcalls.c
@@ -31,7 +31,8 @@
#define SYS_ACCEPT4 18
#endif
-#ifdef __sparc__
+/* exposed on x86 since Linux commit 9dea5dc921b5f4045a18c63eb92e84dc274d17eb */
+#if defined(__sparc__) || defined(__i386__)
#undef __NR_accept
#undef __NR_accept4
#undef __NR_bind
hooks/post-receive
--
uClibc-ng - small C library for embedded systems
Show replies by date