summaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-base_security__unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'www/chromium/files/patch-base_security__unittest.cc')
-rw-r--r--www/chromium/files/patch-base_security__unittest.cc6
1 files changed, 3 insertions, 3 deletions
diff --git a/www/chromium/files/patch-base_security__unittest.cc b/www/chromium/files/patch-base_security__unittest.cc
index c8628452c1ee..75edbfea9696 100644
--- a/www/chromium/files/patch-base_security__unittest.cc
+++ b/www/chromium/files/patch-base_security__unittest.cc
@@ -1,4 +1,4 @@
---- base/security_unittest.cc.orig 2021-04-14 18:40:48 UTC
+--- base/security_unittest.cc.orig 2021-12-14 11:44:55 UTC
+++ base/security_unittest.cc
@@ -61,7 +61,7 @@ NOINLINE Type HideValueFromCompiler(volatile Type valu
void OverflowTestsSoftExpectTrue(bool overflow_detected) {
@@ -9,7 +9,7 @@
// Sadly, on Linux, Android, and OSX we don't have a good story yet. Don't
// fail the test, but report.
printf("Platform has overflow: %s\n",
-@@ -123,7 +123,7 @@ TEST(SecurityTest, MAYBE_NewOverflow) {
+@@ -121,7 +121,7 @@ TEST(SecurityTest, MAYBE_NewOverflow) {
#endif // !defined(OS_WIN) || !defined(ARCH_CPU_64_BITS)
}
@@ -18,7 +18,7 @@
// Check if ptr1 and ptr2 are separated by less than size chars.
bool ArePointersToSameArea(void* ptr1, void* ptr2, size_t size) {
ptrdiff_t ptr_diff = reinterpret_cast<char*>(std::max(ptr1, ptr2)) -
-@@ -177,6 +177,6 @@ TEST(SecurityTest, MALLOC_OVERFLOW_TEST(RandomMemoryAl
+@@ -175,6 +175,6 @@ TEST(SecurityTest, MALLOC_OVERFLOW_TEST(RandomMemoryAl
EXPECT_FALSE(impossible_random_address);
}