http://bugs.winehq.org/show_bug.cgi?id=31994
--- Comment #20 from Starous starous@volny.cz 2012-10-23 09:57:55 CDT --- (In reply to comment #19)
(In reply to comment #18)
... (My simple patch is only provisional, finally it should to (at least) do something similar like Bruno told above, i.e., it should test if EACCES is related to broadcast packet according to destination IP. Or maybe better: patch should test destination IP address before calling of WS2_send and modify the packet appropriately - like (probably) do Windows...)
Give attachment 42240 [details] a try ;)
Done - OK!
( Even I don't know what does mean this part of patch: FIXME("-> SIO_ADDRESS_LIST_CHANGE request: stub\n"); /* FIXME: error and return code depend on whether socket was created * with WSA_FLAG_OVERLAPPED, but there is no easy way to get this */ + overlapped = NULL; /* hack */ break;
- but don't waste time to explain it to me, if it is too complex.. :-) )