summaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-base_security__unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'www/chromium/files/patch-base_security__unittest.cc')
-rw-r--r--www/chromium/files/patch-base_security__unittest.cc28
1 files changed, 0 insertions, 28 deletions
diff --git a/www/chromium/files/patch-base_security__unittest.cc b/www/chromium/files/patch-base_security__unittest.cc
deleted file mode 100644
index 75edbfea9696..000000000000
--- a/www/chromium/files/patch-base_security__unittest.cc
+++ /dev/null
@@ -1,28 +0,0 @@
---- base/security_unittest.cc.orig 2021-12-14 11:44:55 UTC
-+++ base/security_unittest.cc
-@@ -61,7 +61,7 @@ NOINLINE Type HideValueFromCompiler(volatile Type valu
- void OverflowTestsSoftExpectTrue(bool overflow_detected) {
- if (!overflow_detected) {
- #if defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_ANDROID) || \
-- defined(OS_APPLE)
-+ defined(OS_APPLE) || defined(OS_BSD)
- // Sadly, on Linux, Android, and OSX we don't have a good story yet. Don't
- // fail the test, but report.
- printf("Platform has overflow: %s\n",
-@@ -121,7 +121,7 @@ TEST(SecurityTest, MAYBE_NewOverflow) {
- #endif // !defined(OS_WIN) || !defined(ARCH_CPU_64_BITS)
- }
-
--#if (defined(OS_LINUX) || defined(OS_CHROMEOS)) && defined(__x86_64__)
-+#if (defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_BSD)) && defined(__x86_64__)
- // Check if ptr1 and ptr2 are separated by less than size chars.
- bool ArePointersToSameArea(void* ptr1, void* ptr2, size_t size) {
- ptrdiff_t ptr_diff = reinterpret_cast<char*>(std::max(ptr1, ptr2)) -
-@@ -175,6 +175,6 @@ TEST(SecurityTest, MALLOC_OVERFLOW_TEST(RandomMemoryAl
- EXPECT_FALSE(impossible_random_address);
- }
-
--#endif // (defined(OS_LINUX) || defined(OS_CHROMEOS)) && defined(__x86_64__)
-+#endif // (defined(OS_LINUX) || defined(OS_CHROMEOS) || defined(OS_BSD)) && defined(__x86_64__)
-
- } // namespace