aboutsummaryrefslogtreecommitdiff
path: root/devel/electron27/files/patch-base_allocator_partition__allocator_address__space__randomization.h
diff options
context:
space:
mode:
Diffstat (limited to 'devel/electron27/files/patch-base_allocator_partition__allocator_address__space__randomization.h')
-rw-r--r--devel/electron27/files/patch-base_allocator_partition__allocator_address__space__randomization.h20
1 files changed, 20 insertions, 0 deletions
diff --git a/devel/electron27/files/patch-base_allocator_partition__allocator_address__space__randomization.h b/devel/electron27/files/patch-base_allocator_partition__allocator_address__space__randomization.h
new file mode 100644
index 000000000000..54aad34b29d6
--- /dev/null
+++ b/devel/electron27/files/patch-base_allocator_partition__allocator_address__space__randomization.h
@@ -0,0 +1,20 @@
+--- base/allocator/partition_allocator/address_space_randomization.h.orig 2023-10-19 19:57:58 UTC
++++ base/allocator/partition_allocator/address_space_randomization.h
+@@ -38,7 +38,7 @@ AslrMask(uintptr_t bits) {
+
+ #if defined(ARCH_CPU_64_BITS)
+
+- #if defined(MEMORY_TOOL_REPLACES_ALLOCATOR)
++ #if defined(MEMORY_TOOL_REPLACES_ALLOCATOR) && !BUILDFLAG(IS_BSD)
+
+ // We shouldn't allocate system pages at all for sanitizer builds. However,
+ // we do, and if random hint addresses interfere with address ranges
+@@ -124,7 +124,7 @@ AslrMask(uintptr_t bits) {
+ return AslrAddress(0x20000000ULL);
+ }
+
+- #elif BUILDFLAG(IS_LINUX)
++ #elif BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
+
+ // Linux on arm64 can use 39, 42, 48, or 52-bit user space, depending on
+ // page size and number of levels of translation pages used. We use