1 |
--- chromium-62.0.3192.0/third_party/angle/src/compiler/translator/ValidateLimitations.cpp.gcc7 2017-08-22 21:06:34.000000000 +0200 |
2 |
+++ chromium-62.0.3192.0/third_party/angle/src/compiler/translator/ValidateLimitations.cpp 2017-09-08 22:31:37.405728676 +0200 |
3 |
@@ -82,7 +82,6 @@ |
4 |
private: |
5 |
void error(TSourceLoc loc, const char *reason, const char *token); |
6 |
|
7 |
- bool withinLoopBody() const; |
8 |
bool isLoopIndex(TIntermSymbol *symbol); |
9 |
bool validateLoopType(TIntermLoop *node); |
10 |
|
11 |
@@ -164,11 +163,6 @@ |
12 |
mDiagnostics->error(loc, reason, token); |
13 |
} |
14 |
|
15 |
-bool ValidateLimitationsTraverser::withinLoopBody() const |
16 |
-{ |
17 |
- return !mLoopSymbolIds.empty(); |
18 |
-} |
19 |
- |
20 |
bool ValidateLimitationsTraverser::isLoopIndex(TIntermSymbol *symbol) |
21 |
{ |
22 |
return std::find(mLoopSymbolIds.begin(), mLoopSymbolIds.end(), symbol->getId()) != |
23 |
--- chromium-62.0.3192.0/third_party/glslang-angle/src/SPIRV/GlslangToSpv.cpp.gcc7 2017-08-22 21:06:41.000000000 +0200 |
24 |
+++ chromium-62.0.3192.0/third_party/glslang-angle/src/SPIRV/GlslangToSpv.cpp 2017-09-08 22:38:00.736706539 +0200 |
25 |
@@ -171,7 +171,9 @@ |
26 |
bool isTrivialLeaf(const glslang::TIntermTyped* node); |
27 |
bool isTrivial(const glslang::TIntermTyped* node); |
28 |
spv::Id createShortCircuit(glslang::TOperator, glslang::TIntermTyped& left, glslang::TIntermTyped& right); |
29 |
+#ifdef AMD_EXTENSIONS |
30 |
spv::Id getExtBuiltins(const char* name); |
31 |
+#endif |
32 |
|
33 |
spv::Function* shaderEntry; |
34 |
spv::Function* currentFunction; |
35 |
@@ -5043,6 +5045,7 @@ |
36 |
return builder.createOp(spv::OpPhi, boolTypeId, phiOperands); |
37 |
} |
38 |
|
39 |
+#ifdef AMD_EXTENSIONS |
40 |
// Return type Id of the imported set of extended instructions corresponds to the name. |
41 |
// Import this set if it has not been imported yet. |
42 |
spv::Id TGlslangToSpvTraverser::getExtBuiltins(const char* name) |
43 |
@@ -5056,6 +5059,7 @@ |
44 |
return extBuiltins; |
45 |
} |
46 |
} |
47 |
+#endif |
48 |
|
49 |
}; // end anonymous namespace |
50 |
|
51 |
--- chromium-62.0.3192.0/third_party/WebKit/Source/platform/wtf/text/TextCodec.h.gcc7 2017-08-22 21:05:01.000000000 +0200 |
52 |
+++ chromium-62.0.3192.0/third_party/WebKit/Source/platform/wtf/text/TextCodec.h 2017-09-09 03:00:28.743370090 +0200 |
53 |
@@ -73,7 +73,7 @@ |
54 |
|
55 |
static_assert(!kDoNotFlush, "DoNotFlush should be falsy"); |
56 |
static_assert(kFetchEOF, "FetchEOF should be truthy"); |
57 |
-static_assert(kDataEOF, "DataEOF should be truthy"); |
58 |
+static_assert(kDataEOF != 0, "DataEOF should be truthy"); |
59 |
|
60 |
class WTF_EXPORT TextCodec { |
61 |
WTF_MAKE_NONCOPYABLE(TextCodec); |
62 |
--- chromium-62.0.3192.0/third_party/libyuv/source/row_any.cc.gcc7 2017-08-22 21:06:36.000000000 +0200 |
63 |
+++ chromium-62.0.3192.0/third_party/libyuv/source/row_any.cc 2017-09-08 22:54:05.079961882 +0200 |
64 |
@@ -721,7 +721,7 @@ |
65 |
#define ANY11P16(NAMEANY, ANY_SIMD, T, SBPP, BPP, MASK) \ |
66 |
void NAMEANY(const uint16* src_ptr, uint16* dst_ptr, T param, int width) { \ |
67 |
SIMD_ALIGNED(uint16 temp[16 * 2]); \ |
68 |
- memset(temp, 0, 32); /* for msan */ \ |
69 |
+ memset(temp, 0, 32*sizeof(uint16)); /* for msan */ \ |
70 |
int r = width & MASK; \ |
71 |
int n = width & ~MASK; \ |
72 |
if (n > 0) { \ |
73 |
--- chromium-62.0.3192.0/third_party/webrtc/modules/video_coding/rtt_filter.cc.gcc7 2017-08-22 21:06:39.000000000 +0200 |
74 |
+++ chromium-62.0.3192.0/third_party/webrtc/modules/video_coding/rtt_filter.cc 2017-09-08 23:06:06.529620651 +0200 |
75 |
@@ -49,8 +49,8 @@ |
76 |
_filtFactCount = 1; |
77 |
_jumpCount = 0; |
78 |
_driftCount = 0; |
79 |
- memset(_jumpBuf, 0, kMaxDriftJumpCount); |
80 |
- memset(_driftBuf, 0, kMaxDriftJumpCount); |
81 |
+ memset(_jumpBuf, 0, kMaxDriftJumpCount * sizeof(int64_t)); |
82 |
+ memset(_driftBuf, 0, kMaxDriftJumpCount * sizeof(int64_t)); |
83 |
} |
84 |
|
85 |
void VCMRttFilter::Update(int64_t rttMs) { |
86 |
--- chromium-62.0.3192.0/third_party/webrtc/modules/video_processing/video_denoiser.cc.gcc7 2017-08-22 21:06:40.000000000 +0200 |
87 |
+++ chromium-62.0.3192.0/third_party/webrtc/modules/video_processing/video_denoiser.cc 2017-09-08 23:17:25.755051027 +0200 |
88 |
@@ -183,7 +183,7 @@ |
89 |
// artifacts. |
90 |
if (mb_filter_decision_[mb_index] != FILTER_BLOCK || |
91 |
IsTrailingBlock(moving_edge_, mb_row, mb_col) || |
92 |
- (x_density_[mb_col] * y_density_[mb_row] && |
93 |
+ ((x_density_[mb_col] * y_density_[mb_row] != 0) && |
94 |
moving_object_[mb_row * mb_cols_ + mb_col])) { |
95 |
// Copy y source. |
96 |
filter_->CopyMem16x16(mb_src, stride_src, mb_dst, stride_dst); |
97 |
--- chromium-62.0.3192.0/v8/src/compiler/store-store-elimination.cc.gcc7 2017-08-22 21:06:45.000000000 +0200 |
98 |
+++ chromium-62.0.3192.0/v8/src/compiler/store-store-elimination.cc 2017-09-08 23:46:06.624665417 +0200 |
99 |
@@ -79,7 +79,6 @@ |
100 |
StoreOffset offset_; |
101 |
|
102 |
bool operator==(const UnobservableStore) const; |
103 |
- bool operator!=(const UnobservableStore) const; |
104 |
bool operator<(const UnobservableStore) const; |
105 |
}; |
106 |
|
107 |
@@ -140,7 +139,6 @@ |
108 |
void Visit(Node* node); |
109 |
|
110 |
private: |
111 |
- static bool IsEffectful(Node* node); |
112 |
void VisitEffectfulNode(Node* node); |
113 |
UnobservablesSet RecomputeUseIntersection(Node* node); |
114 |
UnobservablesSet RecomputeSet(Node* node, UnobservablesSet uses); |
115 |
@@ -251,10 +249,6 @@ |
116 |
} |
117 |
} |
118 |
|
119 |
-bool RedundantStoreFinder::IsEffectful(Node* node) { |
120 |
- return (node->op()->EffectInputCount() >= 1); |
121 |
-} |
122 |
- |
123 |
// Recompute unobservables-set for a node. Will also mark superfluous nodes |
124 |
// as to be removed. |
125 |
|
126 |
@@ -552,10 +546,6 @@ |
127 |
return (id_ == other.id_) && (offset_ == other.offset_); |
128 |
} |
129 |
|
130 |
-bool UnobservableStore::operator!=(const UnobservableStore other) const { |
131 |
- return !(*this == other); |
132 |
-} |
133 |
- |
134 |
bool UnobservableStore::operator<(const UnobservableStore other) const { |
135 |
return (id_ < other.id_) || (id_ == other.id_ && offset_ < other.offset_); |
136 |
} |
137 |
--- chromium-62.0.3192.0/v8/src/conversions.cc.gcc7 2017-08-22 21:06:45.000000000 +0200 |
138 |
+++ chromium-62.0.3192.0/v8/src/conversions.cc 2017-09-08 23:55:42.464167410 +0200 |
139 |
@@ -30,48 +30,6 @@ |
140 |
namespace v8 { |
141 |
namespace internal { |
142 |
|
143 |
- |
144 |
-namespace { |
145 |
- |
146 |
-// C++-style iterator adaptor for StringCharacterStream |
147 |
-// (unlike C++ iterators the end-marker has different type). |
148 |
-class StringCharacterStreamIterator { |
149 |
- public: |
150 |
- class EndMarker {}; |
151 |
- |
152 |
- explicit StringCharacterStreamIterator(StringCharacterStream* stream); |
153 |
- |
154 |
- uint16_t operator*() const; |
155 |
- void operator++(); |
156 |
- bool operator==(EndMarker const&) const { return end_; } |
157 |
- bool operator!=(EndMarker const& m) const { return !end_; } |
158 |
- |
159 |
- private: |
160 |
- StringCharacterStream* const stream_; |
161 |
- uint16_t current_; |
162 |
- bool end_; |
163 |
-}; |
164 |
- |
165 |
- |
166 |
-StringCharacterStreamIterator::StringCharacterStreamIterator( |
167 |
- StringCharacterStream* stream) : stream_(stream) { |
168 |
- ++(*this); |
169 |
-} |
170 |
- |
171 |
-uint16_t StringCharacterStreamIterator::operator*() const { |
172 |
- return current_; |
173 |
-} |
174 |
- |
175 |
- |
176 |
-void StringCharacterStreamIterator::operator++() { |
177 |
- end_ = !stream_->HasMore(); |
178 |
- if (!end_) { |
179 |
- current_ = stream_->GetNext(); |
180 |
- } |
181 |
-} |
182 |
-} // End anonymous namespace. |
183 |
- |
184 |
- |
185 |
double StringToDouble(UnicodeCache* unicode_cache, |
186 |
const char* str, int flags, double empty_string_val) { |
187 |
// We cast to const uint8_t* here to avoid instantiating the |
188 |
--- chromium-62.0.3192.0/third_party/brotli/enc/memory.h.gcc7 2017-08-22 21:05:01.000000000 +0200 |
189 |
+++ chromium-62.0.3192.0/third_party/brotli/enc/memory.h 2017-09-09 00:23:41.035799835 +0200 |
190 |
@@ -40,7 +40,7 @@ |
191 |
|
192 |
BROTLI_INTERNAL void* BrotliAllocate(MemoryManager* m, size_t n); |
193 |
#define BROTLI_ALLOC(M, T, N) \ |
194 |
- ((N) ? ((T*)BrotliAllocate((M), (N) * sizeof(T))) : NULL) |
195 |
+ ((N) != 0 ? ((T*)BrotliAllocate((M), (N) * sizeof(T))) : NULL) |
196 |
|
197 |
BROTLI_INTERNAL void BrotliFree(MemoryManager* m, void* p); |
198 |
#define BROTLI_FREE(M, P) { \ |
199 |
--- chromium-61.0.3163.91/third_party/WebKit/Source/platform/wtf/LinkedHashSet.h.gcc7 2017-09-14 21:05:14.000000000 +0200 |
200 |
+++ chromium-61.0.3163.91/third_party/WebKit/Source/platform/wtf/LinkedHashSet.h 2017-09-15 09:04:20.785471180 +0200 |
201 |
@@ -685,6 +685,8 @@ |
202 |
return *this; |
203 |
} |
204 |
|
205 |
+inline void SwapAnchor(LinkedHashSetNodeBase& a, LinkedHashSetNodeBase& b); |
206 |
+ |
207 |
template <typename T, typename U, typename V, typename W> |
208 |
inline void LinkedHashSet<T, U, V, W>::Swap(LinkedHashSet& other) { |
209 |
impl_.swap(other.impl_); |
210 |
--- chromium-61.0.3163.91/components/metrics/call_stack_profile_metrics_provider.cc.gcc7 2017-09-14 21:04:42.000000000 +0200 |
211 |
+++ chromium-61.0.3163.91/components/metrics/call_stack_profile_metrics_provider.cc 2017-09-15 09:10:21.868632839 +0200 |
212 |
@@ -72,7 +72,6 @@ |
213 |
ProfilesState(const CallStackProfileParams& params, |
214 |
StackSamplingProfiler::CallStackProfiles profiles); |
215 |
ProfilesState(ProfilesState&&); |
216 |
- ProfilesState& operator=(ProfilesState&&); |
217 |
|
218 |
// The metrics-related parameters provided to |
219 |
// CallStackProfileMetricsProvider::GetProfilerCallback(). |
220 |
@@ -91,9 +90,6 @@ |
221 |
|
222 |
ProfilesState::ProfilesState(ProfilesState&&) = default; |
223 |
|
224 |
-// Some versions of GCC need this for push_back to work with std::move. |
225 |
-ProfilesState& ProfilesState::operator=(ProfilesState&&) = default; |
226 |
- |
227 |
// PendingProfiles ------------------------------------------------------------ |
228 |
|
229 |
// Singleton class responsible for retaining profiles received via the callback |
230 |
--- chromium-62.0.3192.0/extensions/common/permissions/settings_override_permission.cc.gcc7 2017-08-22 21:04:44.000000000 +0200 |
231 |
+++ chromium-62.0.3192.0/extensions/common/permissions/settings_override_permission.cc 2017-09-09 00:43:40.708568094 +0200 |
232 |
@@ -43,7 +43,9 @@ |
233 |
|
234 |
bool SettingsOverrideAPIPermission::Equal(const APIPermission* rhs) const { |
235 |
if (this != rhs) |
236 |
+ { |
237 |
CHECK_EQ(info(), rhs->info()); |
238 |
+ } |
239 |
return true; |
240 |
} |
241 |
|
242 |
--- chromium-62.0.3192.0/extensions/common/permissions/api_permission.cc.gcc7 2017-08-22 21:04:44.000000000 +0200 |
243 |
+++ chromium-62.0.3192.0/extensions/common/permissions/api_permission.cc 2017-09-09 01:26:10.983202025 +0200 |
244 |
@@ -36,7 +36,9 @@ |
245 |
|
246 |
bool Equal(const APIPermission* rhs) const override { |
247 |
if (this != rhs) |
248 |
+ { |
249 |
CHECK_EQ(info(), rhs->info()); |
250 |
+ } |
251 |
return true; |
252 |
} |
253 |
|
254 |
--- chromium-62.0.3192.0/content/browser/frame_host/navigation_controller_impl.cc.gcc7 2017-08-22 21:04:43.000000000 +0200 |
255 |
+++ chromium-62.0.3192.0/content/browser/frame_host/navigation_controller_impl.cc 2017-09-09 01:53:03.860647419 +0200 |
256 |
@@ -980,7 +980,9 @@ |
257 |
// TODO(creis): This check won't pass for subframes until we create entries |
258 |
// for subframe navigations. |
259 |
if (!rfh->GetParent()) |
260 |
+ { |
261 |
CHECK_EQ(active_entry->site_instance(), rfh->GetSiteInstance()); |
262 |
+ } |
263 |
|
264 |
// Remember the bindings the renderer process has at this point, so that |
265 |
// we do not grant this entry additional bindings if we come back to it. |
266 |
--- chromium-62.0.3192.0/content/browser/frame_host/navigator_impl.cc.gcc7 2017-08-22 21:04:43.000000000 +0200 |
267 |
+++ chromium-62.0.3192.0/content/browser/frame_host/navigator_impl.cc 2017-09-09 02:05:15.758922091 +0200 |
268 |
@@ -404,7 +404,9 @@ |
269 |
|
270 |
// Make sure no code called via RFHM::Navigate clears the pending entry. |
271 |
if (is_pending_entry) |
272 |
+ { |
273 |
CHECK_EQ(controller_->GetPendingEntry(), &entry); |
274 |
+ } |
275 |
|
276 |
// For security, we should never send non-Web-UI URLs to a Web UI renderer. |
277 |
// Double check that here. |
278 |
@@ -470,7 +472,9 @@ |
279 |
|
280 |
// Make sure no code called via RFH::Navigate clears the pending entry. |
281 |
if (is_pending_entry) |
282 |
+ { |
283 |
CHECK_EQ(controller_->GetPendingEntry(), &entry); |
284 |
+ } |
285 |
|
286 |
if (controller_->GetPendingEntryIndex() == -1 && |
287 |
dest_url.SchemeIs(url::kJavaScriptScheme)) { |
288 |
--- chromium-62.0.3192.0/content/browser/frame_host/render_frame_host_manager.cc.gcc7 2017-08-22 21:04:43.000000000 +0200 |
289 |
+++ chromium-62.0.3192.0/content/browser/frame_host/render_frame_host_manager.cc 2017-09-09 02:07:40.371353881 +0200 |
290 |
@@ -1198,7 +1198,9 @@ |
291 |
// SiteInstance and the same frame, breaking lookup of RenderFrameHosts by |
292 |
// SiteInstance. |
293 |
if (force_swap) |
294 |
+ { |
295 |
CHECK_NE(new_instance, current_instance); |
296 |
+ } |
297 |
|
298 |
if (new_instance == current_instance) { |
299 |
// If we're navigating to the same site instance, we won't need to use any |
300 |
--- chromium-62.0.3192.0/media/cast/receiver/video_decoder.cc.gcc7 2017-08-22 21:04:45.000000000 +0200 |
301 |
+++ chromium-62.0.3192.0/media/cast/receiver/video_decoder.cc 2017-09-09 05:02:17.907818439 +0200 |
302 |
@@ -133,7 +133,9 @@ |
303 |
private: |
304 |
~Vp8Impl() final { |
305 |
if (ImplBase::operational_status_ == STATUS_INITIALIZED) |
306 |
+ { |
307 |
CHECK_EQ(VPX_CODEC_OK, vpx_codec_destroy(&context_)); |
308 |
+ } |
309 |
} |
310 |
|
311 |
scoped_refptr<VideoFrame> Decode(uint8_t* data, int len) final { |
312 |
--- chromium-61.0.3163.91/content/common/unique_name_helper.cc.gcc7 2017-09-14 21:04:45.000000000 +0200 |
313 |
+++ chromium-61.0.3163.91/content/common/unique_name_helper.cc 2017-09-15 11:51:02.701168401 +0200 |
314 |
@@ -219,15 +219,12 @@ |
315 |
// tree and go down from there, it is impossible for a frame path to contain |
316 |
// a unique name (which needs a replacement) that has not already been seen |
317 |
// and inserted into |replacements|. |
318 |
- size_t index = 0; |
319 |
for (const auto& replacement : *replacements) { |
320 |
size_t next_index = legacy_name.find(replacement.old_name); |
321 |
if (next_index == std::string::npos) |
322 |
continue; |
323 |
legacy_name.replace(next_index, replacement.old_name.size(), |
324 |
replacement.new_name); |
325 |
- index = next_index - |
326 |
- (replacement.old_name.size() - replacement.new_name.size()); |
327 |
} |
328 |
return legacy_name; |
329 |
} |
330 |
--- chromium-62.0.3192.0/chrome/browser/extensions/extension_service.cc.gcc7 2017-08-22 21:04:39.000000000 +0200 |
331 |
+++ chromium-62.0.3192.0/chrome/browser/extensions/extension_service.cc 2017-09-09 06:33:31.998535383 +0200 |
332 |
@@ -1504,7 +1504,9 @@ |
333 |
// Other than for unpacked extensions, CrxInstaller should have guaranteed |
334 |
// that we aren't downgrading. |
335 |
if (!Manifest::IsUnpackedLocation(extension->location())) |
336 |
+ { |
337 |
CHECK_GE(version_compare_result, 0); |
338 |
+ } |
339 |
} |
340 |
// If the extension was disabled for a reload, then enable it. |
341 |
bool reloading = reloading_extensions_.erase(extension->id()) > 0; |
342 |
--- chromium-61.0.3163.91/chrome/browser/devtools/devtools_file_system_indexer.cc.gcc7 2017-09-14 21:04:35.000000000 +0200 |
343 |
+++ chromium-61.0.3163.91/chrome/browser/devtools/devtools_file_system_indexer.cc 2017-09-15 13:16:14.852876926 +0200 |
344 |
@@ -34,11 +34,11 @@ |
345 |
using base::TimeTicks; |
346 |
using content::BrowserThread; |
347 |
using std::map; |
348 |
-using std::set; |
349 |
using std::string; |
350 |
using std::vector; |
351 |
|
352 |
namespace { |
353 |
+using std::set; |
354 |
|
355 |
base::SequencedTaskRunner* impl_task_runner() { |
356 |
constexpr base::TaskTraits kBlockingTraits = {base::MayBlock(), |
357 |
--- chromium-62.0.3192.0/third_party/WebKit/Source/core/frame/LocalFrameView.cpp.gcc7 2017-08-22 21:05:00.000000000 +0200 |
358 |
+++ chromium-62.0.3192.0/third_party/WebKit/Source/core/frame/LocalFrameView.cpp 2017-09-09 10:40:20.353155618 +0200 |
359 |
@@ -3856,7 +3856,9 @@ |
360 |
// TODO(crbug.com/729196): Trace why LocalFrameView::DetachFromLayout crashes. |
361 |
CHECK(!is_attached_); |
362 |
if (frame_->GetDocument()) |
363 |
+ { |
364 |
CHECK_NE(Lifecycle().GetState(), DocumentLifecycle::kStopping); |
365 |
+ } |
366 |
is_attached_ = true; |
367 |
parent_ = ParentFrameView(); |
368 |
if (!parent_) { |
369 |
--- chromium-62.0.3192.0/third_party/WebKit/Source/core/html/parser/HTMLTreeBuilder.cpp.gcc7 2017-08-22 21:05:00.000000000 +0200 |
370 |
+++ chromium-62.0.3192.0/third_party/WebKit/Source/core/html/parser/HTMLTreeBuilder.cpp 2017-09-09 11:00:10.392998875 +0200 |
371 |
@@ -937,7 +937,7 @@ |
372 |
} |
373 |
if (token->GetName() == colTag) { |
374 |
ProcessFakeStartTag(colgroupTag); |
375 |
- DCHECK(kInColumnGroupMode); |
376 |
+ DCHECK(kInColumnGroupMode != 0); |
377 |
ProcessStartTag(token); |
378 |
return; |
379 |
} |
380 |
--- chromium-62.0.3192.0/third_party/WebKit/Source/core/inspector/InspectorStyleSheet.cpp.gcc7 2017-08-22 21:05:00.000000000 +0200 |
381 |
+++ chromium-62.0.3192.0/third_party/WebKit/Source/core/inspector/InspectorStyleSheet.cpp 2017-09-09 11:25:12.629082678 +0200 |
382 |
@@ -155,8 +155,6 @@ |
383 |
DCHECK(result_); |
384 |
} |
385 |
|
386 |
- DECLARE_TRACE(); |
387 |
- |
388 |
private: |
389 |
void StartRuleHeader(StyleRule::RuleType, unsigned) override; |
390 |
void EndRuleHeader(unsigned) override; |
391 |
@@ -333,13 +333,6 @@ |
392 |
true, true, SourceRange(start_offset, end_offset))); |
393 |
} |
394 |
|
395 |
-DEFINE_TRACE(StyleSheetHandler) { |
396 |
- visitor->Trace(document_); |
397 |
- visitor->Trace(result_); |
398 |
- visitor->Trace(current_rule_data_stack_); |
399 |
- visitor->Trace(current_rule_data_); |
400 |
-} |
401 |
- |
402 |
bool VerifyRuleText(Document* document, const String& rule_text) { |
403 |
DEFINE_STATIC_LOCAL(String, bogus_property_name, ("-webkit-boguz-propertee")); |
404 |
StyleSheetContents* style_sheet = |