diff options
Diffstat (limited to 'www/chromium/files/patch-base_security__unittest.cc')
-rw-r--r-- | www/chromium/files/patch-base_security__unittest.cc | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/www/chromium/files/patch-base_security__unittest.cc b/www/chromium/files/patch-base_security__unittest.cc index c8628452c1ee..75edbfea9696 100644 --- a/www/chromium/files/patch-base_security__unittest.cc +++ b/www/chromium/files/patch-base_security__unittest.cc @@ -1,4 +1,4 @@ ---- base/security_unittest.cc.orig 2021-04-14 18:40:48 UTC +--- base/security_unittest.cc.orig 2021-12-14 11:44:55 UTC +++ base/security_unittest.cc @@ -61,7 +61,7 @@ NOINLINE Type HideValueFromCompiler(volatile Type valu void OverflowTestsSoftExpectTrue(bool overflow_detected) { @@ -9,7 +9,7 @@ // Sadly, on Linux, Android, and OSX we don't have a good story yet. Don't // fail the test, but report. printf("Platform has overflow: %s\n", -@@ -123,7 +123,7 @@ TEST(SecurityTest, MAYBE_NewOverflow) { +@@ -121,7 +121,7 @@ TEST(SecurityTest, MAYBE_NewOverflow) { #endif // !defined(OS_WIN) || !defined(ARCH_CPU_64_BITS) } @@ -18,7 +18,7 @@ // Check if ptr1 and ptr2 are separated by less than size chars. bool ArePointersToSameArea(void* ptr1, void* ptr2, size_t size) { ptrdiff_t ptr_diff = reinterpret_cast<char*>(std::max(ptr1, ptr2)) - -@@ -177,6 +177,6 @@ TEST(SecurityTest, MALLOC_OVERFLOW_TEST(RandomMemoryAl +@@ -175,6 +175,6 @@ TEST(SecurityTest, MALLOC_OVERFLOW_TEST(RandomMemoryAl EXPECT_FALSE(impossible_random_address); } |