diff options
Diffstat (limited to 'devel/electron13/files/patch-base_security__unittest.cc')
-rw-r--r-- | devel/electron13/files/patch-base_security__unittest.cc | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/devel/electron13/files/patch-base_security__unittest.cc b/devel/electron13/files/patch-base_security__unittest.cc new file mode 100644 index 000000000000..2ea783870412 --- /dev/null +++ b/devel/electron13/files/patch-base_security__unittest.cc @@ -0,0 +1,28 @@ +--- base/security_unittest.cc.orig 2021-01-07 00:36:18 UTC ++++ base/security_unittest.cc +@@ -61,7 +61,7 @@ NOINLINE Type HideValueFromCompiler(volatile Type valu + void OverflowTestsSoftExpectTrue(bool overflow_detected) { + if (!overflow_detected) { + #if defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_ANDROID) || \ +- defined(OS_APPLE) ++ defined(OS_APPLE) || defined(OS_BSD) + // Sadly, on Linux, Android, and OSX we don't have a good story yet. Don't + // fail the test, but report. + printf("Platform has overflow: %s\n", +@@ -123,7 +123,7 @@ TEST(SecurityTest, MAYBE_NewOverflow) { + #endif // !defined(OS_WIN) || !defined(ARCH_CPU_64_BITS) + } + +-#if (defined(OS_LINUX) || defined(OS_CHROMEOS)) && defined(__x86_64__) ++#if (defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_BSD)) && defined(__x86_64__) + // Check if ptr1 and ptr2 are separated by less than size chars. + bool ArePointersToSameArea(void* ptr1, void* ptr2, size_t size) { + ptrdiff_t ptr_diff = reinterpret_cast<char*>(std::max(ptr1, ptr2)) - +@@ -177,6 +177,6 @@ TEST(SecurityTest, MALLOC_OVERFLOW_TEST(RandomMemoryAl + EXPECT_FALSE(impossible_random_address); + } + +-#endif // (defined(OS_LINUX) || defined(OS_CHROMEOS)) && defined(__x86_64__) ++#endif // (defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_BSD)) && defined(__x86_64__) + + } // namespace |