diff options
Diffstat (limited to 'devel/electron35/files/patch-base_memory_protected__memory.h')
| -rw-r--r-- | devel/electron35/files/patch-base_memory_protected__memory.h | 44 | 
1 files changed, 0 insertions, 44 deletions
diff --git a/devel/electron35/files/patch-base_memory_protected__memory.h b/devel/electron35/files/patch-base_memory_protected__memory.h deleted file mode 100644 index fe1efc22b7f2..000000000000 --- a/devel/electron35/files/patch-base_memory_protected__memory.h +++ /dev/null @@ -1,44 +0,0 @@ ---- base/memory/protected_memory.h.orig	2025-01-27 17:37:37 UTC -+++ base/memory/protected_memory.h -@@ -120,12 +120,12 @@ __declspec(selectany) char __stop_protected_memory; -  - #define DECLARE_PROTECTED_DATA constinit - #define DEFINE_PROTECTED_DATA constinit __declspec(allocate("prot$mem")) --#elif BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) -+#elif BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_BSD) - // This value is used to align the writers variable. That variable needs to be - // aligned to ensure that the protected memory section starts on a page - // boundary. - #if (PA_BUILDFLAG(IS_ANDROID) && PA_BUILDFLAG(PA_ARCH_CPU_64_BITS)) || \ --    (PA_BUILDFLAG(IS_LINUX) && PA_BUILDFLAG(PA_ARCH_CPU_ARM64)) -+    ((PA_BUILDFLAG(IS_LINUX) || PA_BUILDFLAG(IS_BSD)) && PA_BUILDFLAG(PA_ARCH_CPU_ARM64)) - // arm64 supports 4kb, 16kb, and 64kb pages. Set to the largest of 64kb as that - // will guarantee the section is page aligned regardless of the choice. - inline constexpr int kProtectedMemoryAlignment = 65536; -@@ -340,7 +340,7 @@ class BASE_EXPORT AutoWritableMemoryBase { -     // where an attacker could overwrite it with a large value and invoke code -     // that constructs and destructs an AutoWritableMemory. After such a call -     // protected memory would still be set writable because writers > 0. --#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) -+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_BSD) -     // On Linux, the protected memory section is not automatically page aligned. -     // This means that attempts to reset the protected memory region to readonly -     // will set some of the preceding section that is on the same page readonly -@@ -354,7 +354,7 @@ class BASE_EXPORT AutoWritableMemoryBase { - #endif -     static inline size_t writers GUARDED_BY(writers_lock()) = 0; -  --#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) -+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_BSD) -     // On Linux, there is no guarantee the section following the protected -     // memory section is page aligned. This can result in attempts to change -     // the access permissions of the end of the protected memory section -@@ -412,7 +412,7 @@ class BASE_EXPORT AutoWritableMemoryInitializer -     // the variable to something large before the section was read-only. -     WriterData::writers = 0; -     CHECK(SetProtectedSectionReadOnly()); --#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) -+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_BSD) -     // Set the protected_memory_section_buffer to true to ensure the buffer -     // section is created. If a variable is declared but not used the memory -     // section won't be created.  | 
