From 68add700ba0b9aa79acfd0afb847b463934f83cb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C4=90o=C3=A0n=20Tr=E1=BA=A7n=20C=C3=B4ng=20Danh?= Date: Wed, 12 Jan 2022 17:06:30 +0700 Subject: [PATCH] kodi: patch patches context --- srcpkgs/kodi/patches/fortify-source-fix.patch | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/srcpkgs/kodi/patches/fortify-source-fix.patch b/srcpkgs/kodi/patches/fortify-source-fix.patch index 5717746e09e..5a314718a70 100644 --- a/srcpkgs/kodi/patches/fortify-source-fix.patch +++ b/srcpkgs/kodi/patches/fortify-source-fix.patch @@ -1,9 +1,11 @@ ---- a/xbmc/cores/DllLoader/exports/wrapper.c.orig -+++ b/xbmc/cores/DllLoader/exports/wrapper.c -@@ -462,7 +462,7 @@ +Index: xbmc-19.0-Matrix/xbmc/cores/DllLoader/exports/wrapper.c +=================================================================== +--- xbmc-19.0-Matrix.orig/xbmc/cores/DllLoader/exports/wrapper.c ++++ xbmc-19.0-Matrix/xbmc/cores/DllLoader/exports/wrapper.c +@@ -449,7 +449,7 @@ struct mntent *__wrap_getmntent(FILE *fp // are actually #defines which are inlined when compiled with -O. Those defines - // actally call __*chk (for example, __fread_chk). We need to bypass this whole - // thing to actually call our wrapped functions. + // actually call __*chk (for example, __fread_chk). We need to bypass this whole + // thing to actually call our wrapped functions. -#if _FORTIFY_SOURCE > 1 +#if defined(__GLIBC__) && _FORTIFY_SOURCE > 1