summaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-base_security__unittest.cc
diff options
context:
space:
mode:
authorRene Ladan <rene@FreeBSD.org>2022-02-20 12:35:15 +0100
committerRene Ladan <rene@FreeBSD.org>2022-02-20 12:42:02 +0100
commita23dfd214ae04e8b4d116ca6411570b684eb5ed6 (patch)
treea42703b6563673398eee97ae6ad4d01eafd77738 /www/chromium/files/patch-base_security__unittest.cc
parentgraphics/libglvnd: reduce dependency on gcc for everyone on powerpc64* by usi... (diff)
www/chromium: update to 98.0.4758.102
- The port now uses the combined patch set for OpenBSD and FreeBSD maintained by Robert Nagy. - Fix build on i386 again. Obtained from: Robert Nagy <robert@openbsd.org> Security: https://vuxml.freebsd.org/freebsd/e12432af-8e73-11ec-8bc4-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/e852f43c-846e-11ec-b043-3065ec8fd3ec.html
Diffstat (limited to 'www/chromium/files/patch-base_security__unittest.cc')
-rw-r--r--www/chromium/files/patch-base_security__unittest.cc28
1 files changed, 0 insertions, 28 deletions
diff --git a/www/chromium/files/patch-base_security__unittest.cc b/www/chromium/files/patch-base_security__unittest.cc
deleted file mode 100644
index 75edbfea9696..000000000000
--- a/www/chromium/files/patch-base_security__unittest.cc
+++ /dev/null
@@ -1,28 +0,0 @@
---- base/security_unittest.cc.orig 2021-12-14 11:44:55 UTC
-+++ base/security_unittest.cc
-@@ -61,7 +61,7 @@ NOINLINE Type HideValueFromCompiler(volatile Type valu
- void OverflowTestsSoftExpectTrue(bool overflow_detected) {
- if (!overflow_detected) {
- #if defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_ANDROID) || \
-- defined(OS_APPLE)
-+ defined(OS_APPLE) || defined(OS_BSD)
- // Sadly, on Linux, Android, and OSX we don't have a good story yet. Don't
- // fail the test, but report.
- printf("Platform has overflow: %s\n",
-@@ -121,7 +121,7 @@ TEST(SecurityTest, MAYBE_NewOverflow) {
- #endif // !defined(OS_WIN) || !defined(ARCH_CPU_64_BITS)
- }
-
--#if (defined(OS_LINUX) || defined(OS_CHROMEOS)) && defined(__x86_64__)
-+#if (defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_BSD)) && defined(__x86_64__)
- // Check if ptr1 and ptr2 are separated by less than size chars.
- bool ArePointersToSameArea(void* ptr1, void* ptr2, size_t size) {
- ptrdiff_t ptr_diff = reinterpret_cast<char*>(std::max(ptr1, ptr2)) -
-@@ -175,6 +175,6 @@ TEST(SecurityTest, MALLOC_OVERFLOW_TEST(RandomMemoryAl
- EXPECT_FALSE(impossible_random_address);
- }
-
--#endif // (defined(OS_LINUX) || defined(OS_CHROMEOS)) && defined(__x86_64__)
-+#endif // (defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_BSD)) && defined(__x86_64__)
-
- } // namespace