From 25fab9a63a948422c89fd827fd27835ba267d3a4 Mon Sep 17 00:00:00 2001 From: Stefan Saraev Date: Sat, 25 Jan 2014 00:59:23 +0200 Subject: [PATCH 1/3] gdb: build without lzma --- packages/debug/gdb/package.mk | 1 + 1 file changed, 1 insertion(+) diff --git a/packages/debug/gdb/package.mk b/packages/debug/gdb/package.mk index 8e7f9d0ed4..6c5e7c3520 100644 --- a/packages/debug/gdb/package.mk +++ b/packages/debug/gdb/package.mk @@ -49,6 +49,7 @@ PKG_CONFIGURE_OPTS_TARGET="bash_cv_have_mbstate_t=set \ --without-x \ --disable-tui \ --disable-libada \ + --without-lzma \ --disable-werror" post_makeinstall_target() { From 5f9536b929c41a8a19fc0703af4e19f4c37aa614 Mon Sep 17 00:00:00 2001 From: Stefan Saraev Date: Sat, 25 Jan 2014 01:03:30 +0200 Subject: [PATCH 2/3] gcc: do not ever try to include host headers patch source: openricks git --- .../patches/gcc-crosscompile-badness.patch | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 packages/lang/gcc/patches/gcc-crosscompile-badness.patch diff --git a/packages/lang/gcc/patches/gcc-crosscompile-badness.patch b/packages/lang/gcc/patches/gcc-crosscompile-badness.patch new file mode 100644 index 0000000000..22aa83167f --- /dev/null +++ b/packages/lang/gcc/patches/gcc-crosscompile-badness.patch @@ -0,0 +1,31 @@ +Index: gcc-4.4+svnr145550/gcc/incpath.c +=================================================================== +--- gcc-4.4+svnr145550.orig/gcc/incpath.c 2009-04-04 13:48:31.000000000 -0700 ++++ gcc-4.4+svnr145550/gcc/incpath.c 2009-04-04 14:49:29.000000000 -0700 +@@ -417,6 +417,26 @@ + p->construct = 0; + p->user_supplied_p = user_supplied_p; + ++ /* A common error when cross compiling is including ++ host headers. This code below will try to fail fast ++ for cross compiling. Currently we consider /usr/include, ++ /opt/include and /sw/include as harmful. */ ++ ++ { ++ /* printf("Adding Path: %s\n", p->name ); */ ++ if( strstr(p->name, "/usr/include" ) == p->name ) { ++ fprintf(stderr, _("CROSS COMPILE Badness: /usr/include in INCLUDEPATH: %s\n"), p->name); ++ abort(); ++ } else if( strstr(p->name, "/sw/include") == p->name ) { ++ fprintf(stderr, _("CROSS COMPILE Badness: /sw/include in INCLUDEPATH: %s\n"), p->name); ++ abort(); ++ } else if( strstr(p->name, "/opt/include") == p->name ) { ++ fprintf(stderr, _("CROSS COMPILE Badness: /opt/include in INCLUDEPATH: %s\n"), p->name); ++ abort(); ++ } ++ } ++ ++ + add_cpp_dir_path (p, chain); + } + From e01589510f9226d127b817be746ad36486ad91da Mon Sep 17 00:00:00 2001 From: Stefan Saraev Date: Sat, 25 Jan 2014 01:14:43 +0200 Subject: [PATCH 3/3] ffmpeg: add yet another xbmc patch --- ...le-cookies-that-specify-a-sub-domain.patch | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 packages/multimedia/ffmpeg/patches/ffmpeg-0061-ffmpeg-backport-Correctly-handle-cookies-that-specify-a-sub-domain.patch diff --git a/packages/multimedia/ffmpeg/patches/ffmpeg-0061-ffmpeg-backport-Correctly-handle-cookies-that-specify-a-sub-domain.patch b/packages/multimedia/ffmpeg/patches/ffmpeg-0061-ffmpeg-backport-Correctly-handle-cookies-that-specify-a-sub-domain.patch new file mode 100644 index 0000000000..1e894f83d2 --- /dev/null +++ b/packages/multimedia/ffmpeg/patches/ffmpeg-0061-ffmpeg-backport-Correctly-handle-cookies-that-specify-a-sub-domain.patch @@ -0,0 +1,29 @@ +From aa1852f88f769ee438e85cec8552ff545914885c Mon Sep 17 00:00:00 2001 +From: Eli K. +Date: Thu, 23 Jan 2014 10:27:21 +0200 +Subject: [PATCH] Correctly handle cookies that specify a sub-domain. + +--- + libavformat/http.c | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/libavformat/http.c b/libavformat/http.c +index 3b655c6..69c4d6d 100644 +--- a/libavformat/http.c ++++ b/libavformat/http.c +@@ -490,8 +490,11 @@ static int get_cookies(HTTPContext *s, char **cookies, const char *path, + av_free(cpath); + cpath = av_strdup(¶m[5]); + } else if (!av_strncasecmp("domain=", param, 7)) { ++ // if the cookie specifies a sub-domain, skip the leading dot thereby ++ // supporting URLs that point to sub-domains and the master domain ++ int leading_dot = (param[7] == '.'); + av_free(cdomain); +- cdomain = av_strdup(¶m[7]); ++ cdomain = av_strdup(¶m[7+leading_dot]); + } else if (!av_strncasecmp("secure", param, 6) || + !av_strncasecmp("comment", param, 7) || + !av_strncasecmp("max-age", param, 7) || +-- +1.8.3.msysgit.0 +