[packages/docker-ce] upstream fix for missing setsockopt syscall on x86 (32bit)
atler
atler at pld-linux.org
Mon Feb 24 19:23:05 CET 2025
commit b9d40e036e297e2835ba41b33e99b01afff9248b
Author: Jan Palus <atler at pld-linux.org>
Date: Mon Feb 24 19:01:01 2025 +0100
upstream fix for missing setsockopt syscall on x86 (32bit)
docker-ce.spec | 2 +
setsockopt-x86.patch | 102 +++++++++++++++++++++++++++++++++++++++++++++++++++
2 files changed, 104 insertions(+)
---
diff --git a/docker-ce.spec b/docker-ce.spec
index 455b7f1..dd83839 100644
--- a/docker-ce.spec
+++ b/docker-ce.spec
@@ -11,6 +11,7 @@ Source1: dockerd.sh
Source2: docker.init
Source3: docker.sysconfig
Patch0: systemd.patch
+Patch1: setsockopt-x86.patch
URL: https://www.docker.com/
BuildRequires: golang >= 1.21
BuildRequires: linux-libc-headers >= 7:4.12
@@ -69,6 +70,7 @@ databases.
%prep
%setup -q -n moby-%{version}
%patch -P0 -p1
+%patch -P1 -p1
%build
export VERSION=%{version}
diff --git a/setsockopt-x86.patch b/setsockopt-x86.patch
new file mode 100644
index 0000000..23240d7
--- /dev/null
+++ b/setsockopt-x86.patch
@@ -0,0 +1,102 @@
+From 73f2a5336d8af70e6676d2bea2b321ea62fbfe26 Mon Sep 17 00:00:00 2001
+From: Albin Kerouanton <albinker at gmail.com>
+Date: Sun, 23 Feb 2025 11:24:50 +0100
+Subject: [PATCH] libnet/d/bridge: fix compilation on i386
+
+On i386, Linux doesn't provide direct socket syscall but instead
+multiplexes them through the socketcall syscall (see `man 2 socketcall`).
+This commit fixes compilation for i386 by wrapping the offending syscall
+in a new function that uses the socketcall syscall on i386, and
+the `setsockopt` syscall on other archs.
+
+Signed-off-by: Albin Kerouanton <albinker at gmail.com>
+---
+ .../drivers/bridge/port_mapping_linux.go | 10 +--------
+ .../drivers/bridge/port_mapping_linux_386.go | 21 +++++++++++++++++++
+ .../bridge/port_mapping_linux_others.go | 21 +++++++++++++++++++
+ 3 files changed, 43 insertions(+), 9 deletions(-)
+ create mode 100644 libnetwork/drivers/bridge/port_mapping_linux_386.go
+ create mode 100644 libnetwork/drivers/bridge/port_mapping_linux_others.go
+
+diff --git a/libnetwork/drivers/bridge/port_mapping_linux.go b/libnetwork/drivers/bridge/port_mapping_linux.go
+index d4c5e46056c69..285d2a3b00563 100644
+--- a/libnetwork/drivers/bridge/port_mapping_linux.go
++++ b/libnetwork/drivers/bridge/port_mapping_linux.go
+@@ -13,7 +13,6 @@ import (
+ "slices"
+ "strconv"
+ "syscall"
+- "unsafe"
+
+ "github.com/containerd/log"
+ "github.com/docker/docker/libnetwork/iptables"
+@@ -675,14 +674,7 @@ func bindSCTP(cfg portBindingReq, port int) (_ portBinding, retErr error) {
+ syscall.SetsockoptInt(sd, syscall.IPPROTO_IPV6, syscall.IPV6_V6ONLY, 1)
+ }
+
+- options := sctp.InitMsg{NumOstreams: sctp.SCTP_MAX_STREAM}
+- if _, _, errno := syscall.Syscall6(syscall.SYS_SETSOCKOPT,
+- uintptr(sd),
+- sctp.SOL_SCTP,
+- sctp.SCTP_INITMSG,
+- uintptr(unsafe.Pointer(&options)), // #nosec G103 -- Ignore "G103: Use of unsafe calls should be audited"
+- unsafe.Sizeof(options),
+- 0); errno != 0 {
++ if errno := setSCTPInitMsg(sd, sctp.InitMsg{NumOstreams: sctp.SCTP_MAX_STREAM}); errno != 0 {
+ return portBinding{}, errno
+ }
+
+diff --git a/libnetwork/drivers/bridge/port_mapping_linux_386.go b/libnetwork/drivers/bridge/port_mapping_linux_386.go
+new file mode 100644
+index 0000000000000..4c7ece4030d1a
+--- /dev/null
++++ b/libnetwork/drivers/bridge/port_mapping_linux_386.go
+@@ -0,0 +1,21 @@
++package bridge
++
++import (
++ "syscall"
++ "unsafe"
++
++ "github.com/ishidawataru/sctp"
++)
++
++const sysSetsockopt = 14 // See https://elixir.bootlin.com/linux/v6.13.3/source/include/uapi/linux/net.h#L40
++
++func setSCTPInitMsg(sd int, options sctp.InitMsg) syscall.Errno {
++ _, _, errno := syscall.Syscall6(syscall.SYS_SOCKETCALL, // See `man 2 socketcall`
++ sysSetsockopt,
++ uintptr(sd),
++ sctp.SOL_SCTP,
++ sctp.SCTP_INITMSG,
++ uintptr(unsafe.Pointer(&options)), // #nosec G103 -- Ignore "G103: Use of unsafe calls should be audited"
++ unsafe.Sizeof(options))
++ return errno
++}
+diff --git a/libnetwork/drivers/bridge/port_mapping_linux_others.go b/libnetwork/drivers/bridge/port_mapping_linux_others.go
+new file mode 100644
+index 0000000000000..d94ad0e54ad17
+--- /dev/null
++++ b/libnetwork/drivers/bridge/port_mapping_linux_others.go
+@@ -0,0 +1,21 @@
++//go:build linux && !386
++
++package bridge
++
++import (
++ "syscall"
++ "unsafe"
++
++ "github.com/ishidawataru/sctp"
++)
++
++func setSCTPInitMsg(sd int, options sctp.InitMsg) syscall.Errno {
++ _, _, errno := syscall.Syscall6(syscall.SYS_SETSOCKOPT,
++ uintptr(sd),
++ sctp.SOL_SCTP,
++ sctp.SCTP_INITMSG,
++ uintptr(unsafe.Pointer(&options)), // #nosec G103 -- Ignore "G103: Use of unsafe calls should be audited"
++ unsafe.Sizeof(options),
++ 0)
++ return errno
++}
================================================================
---- gitweb:
http://git.pld-linux.org/gitweb.cgi/packages/docker-ce.git/commitdiff/b9d40e036e297e2835ba41b33e99b01afff9248b
More information about the pld-cvs-commit
mailing list