Sophie

Sophie

distrib > Mageia > 7 > i586 > media > core-updates-src > by-pkgid > f5a2d348875a82e92e9aab3aebacb9c1 > files > 16

chromium-browser-stable-78.0.3904.87-1.mga7.src.rpm

--- chromium-62.0.3192.0/third_party/webrtc/modules/video_processing/video_denoiser.cc.gcc7	2017-08-22 21:06:40.000000000 +0200
+++ chromium-62.0.3192.0/third_party/webrtc/modules/video_processing/video_denoiser.cc	2017-09-08 23:17:25.755051027 +0200
@@ -183,7 +183,7 @@
       // artifacts.
       if (mb_filter_decision_[mb_index] != FILTER_BLOCK ||
           IsTrailingBlock(moving_edge_, mb_row, mb_col) ||
-          (x_density_[mb_col] * y_density_[mb_row] &&
+          ((x_density_[mb_col] * y_density_[mb_row] != 0) &&
            moving_object_[mb_row * mb_cols_ + mb_col])) {
         // Copy y source.
         filter_->CopyMem16x16(mb_src, stride_src, mb_dst, stride_dst);
--- chromium-62.0.3192.0/extensions/common/permissions/settings_override_permission.cc.gcc7	2017-08-22 21:04:44.000000000 +0200
+++ chromium-62.0.3192.0/extensions/common/permissions/settings_override_permission.cc	2017-09-09 00:43:40.708568094 +0200
@@ -43,7 +43,9 @@
 
 bool SettingsOverrideAPIPermission::Equal(const APIPermission* rhs) const {
   if (this != rhs)
+  {
     CHECK_EQ(info(), rhs->info());
+  }
   return true;
 }
 
--- chromium-62.0.3192.0/third_party/cacheinvalidation/src/google/cacheinvalidation/include/types.h.gcc7	2017-08-22 21:05:01.000000000 +0200
+++ chromium-62.0.3192.0/third_party/cacheinvalidation/src/google/cacheinvalidation/include/types.h	2017-09-09 00:47:09.190945226 +0200
@@ -174,7 +174,7 @@
  */
 class ObjectId {
  public:
-  ObjectId() : is_initialized_(false) {}
+  ObjectId() : is_initialized_(false), source_(0) {}
 
   /* Creates an object id for the given source and name (the name is copied). */
   ObjectId(int source, const string& name)
--- chromium-62.0.3192.0/extensions/common/permissions/api_permission.cc.gcc7	2017-08-22 21:04:44.000000000 +0200
+++ chromium-62.0.3192.0/extensions/common/permissions/api_permission.cc	2017-09-09 01:26:10.983202025 +0200
@@ -36,7 +36,9 @@
 
   bool Equal(const APIPermission* rhs) const override {
     if (this != rhs)
+    {
       CHECK_EQ(info(), rhs->info());
+    }
     return true;
   }
 
--- chromium-62.0.3192.0/content/browser/frame_host/navigation_controller_impl.cc.gcc7	2017-08-22 21:04:43.000000000 +0200
+++ chromium-62.0.3192.0/content/browser/frame_host/navigation_controller_impl.cc	2017-09-09 01:53:03.860647419 +0200
@@ -980,7 +980,9 @@
   // TODO(creis): This check won't pass for subframes until we create entries
   // for subframe navigations.
   if (!rfh->GetParent())
+  {
     CHECK_EQ(active_entry->site_instance(), rfh->GetSiteInstance());
+  }
 
   // Remember the bindings the renderer process has at this point, so that
   // we do not grant this entry additional bindings if we come back to it.
--- chromium-62.0.3192.0/content/browser/frame_host/navigator_impl.cc.gcc7	2017-08-22 21:04:43.000000000 +0200
+++ chromium-62.0.3192.0/content/browser/frame_host/navigator_impl.cc	2017-09-09 02:05:15.758922091 +0200
@@ -411,11 +411,15 @@
 
   // Make sure no code called via RFH::Navigate clears the pending entry.
   if (is_pending_entry)
+  {
     CHECK_EQ(nav_entry_id, controller_->GetPendingEntry()->GetUniqueID());
+  }
 
   // Notify observers about navigation.
   if (delegate_ && is_pending_entry)
+  {
     delegate_->DidStartNavigationToPendingEntry(dest_url, reload_type);
+  }
 }
 
 void NavigatorImpl::RequestOpenURL(
--- chromium-62.0.3192.0/content/browser/frame_host/render_frame_host_manager.cc.gcc7	2017-08-22 21:04:43.000000000 +0200
+++ chromium-62.0.3192.0/content/browser/frame_host/render_frame_host_manager.cc	2017-09-09 02:07:40.371353881 +0200
@@ -1030,7 +1030,9 @@
   // SiteInstance and the same frame, breaking lookup of RenderFrameHosts by
   // SiteInstance.
   if (force_swap)
+  {
     CHECK_NE(new_instance, current_instance);
+  }
 
   if (new_instance == current_instance) {
     // If we're navigating to the same site instance, we won't need to use the
--- chromium-62.0.3192.0/media/cast/receiver/video_decoder.cc.gcc7	2017-08-22 21:04:45.000000000 +0200
+++ chromium-62.0.3192.0/media/cast/receiver/video_decoder.cc	2017-09-09 05:02:17.907818439 +0200
@@ -133,7 +133,9 @@
  private:
   ~Vp8Impl() final {
     if (ImplBase::operational_status_ == STATUS_INITIALIZED)
+    {
       CHECK_EQ(VPX_CODEC_OK, vpx_codec_destroy(&context_));
+    }
   }
 
   scoped_refptr<VideoFrame> Decode(uint8_t* data, int len) final {
--- chromium-62.0.3202.9/third_party/skia/src/ports/SkTLS_pthread.cpp.gcc7	2017-09-11 04:39:22.554714295 +0200
+++ chromium-62.0.3202.9/third_party/skia/src/ports/SkTLS_pthread.cpp	2017-09-11 04:39:45.663296012 +0200
@@ -16,7 +16,7 @@
     // should we use forceCreateTheSlot to potentially just return nullptr if
     // we've never been called with forceCreateTheSlot==true ?
     static SkOnce once;
-    once(pthread_key_create, &gSkTLSKey, SkTLS::Destructor);
+    once(&pthread_key_create, &gSkTLSKey, SkTLS::Destructor);
     return pthread_getspecific(gSkTLSKey);
 }