aboutsummaryrefslogtreecommitdiff
path: root/devel/electron37/files/patch-components_named__system__lock_lock__unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'devel/electron37/files/patch-components_named__system__lock_lock__unittest.cc')
-rw-r--r--devel/electron37/files/patch-components_named__system__lock_lock__unittest.cc29
1 files changed, 29 insertions, 0 deletions
diff --git a/devel/electron37/files/patch-components_named__system__lock_lock__unittest.cc b/devel/electron37/files/patch-components_named__system__lock_lock__unittest.cc
new file mode 100644
index 000000000000..4b68023b0bc4
--- /dev/null
+++ b/devel/electron37/files/patch-components_named__system__lock_lock__unittest.cc
@@ -0,0 +1,29 @@
+--- components/named_system_lock/lock_unittest.cc.orig 2025-04-22 20:15:27 UTC
++++ components/named_system_lock/lock_unittest.cc
+@@ -18,7 +18,7 @@
+ #include "build/build_config.h"
+ #include "testing/gtest/include/gtest/gtest.h"
+
+-#if BUILDFLAG(IS_LINUX)
++#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
+ #include <fcntl.h>
+ #include <sys/mman.h>
+
+@@ -45,7 +45,7 @@ class NamedSystemLockTest : public ::testing::Test {
+ const std::string lock_name_ = base::UnguessableToken::Create().ToString();
+
+ std::unique_ptr<ScopedLock> CreateLock() {
+-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC)
++#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_BSD)
+ return ScopedLock::Create(lock_name_, base::Seconds(0));
+ #else
+ CSecurityAttributes sa;
+@@ -95,7 +95,7 @@ TEST_F(NamedSystemLockTest, TryLockInThreadSuccess) {
+ EXPECT_TRUE(CreateLock());
+ }
+
+-#if BUILDFLAG(IS_LINUX)
++#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
+ TEST_F(NamedSystemLockTest, SharedMemoryWrongPermissions) {
+ // Create a shared memory region with overpermissive perms.
+ int shm_fd = shm_open(lock_name_.c_str(), O_RDWR | O_CREAT | O_EXCL,