--- chromium-65.0.3325.51/ui/gfx/ipc/buffer_types/gfx_param_traits.cc.format 2018-02-06 21:06:22.000000000 +0100 +++ chromium-65.0.3325.51/ui/gfx/ipc/buffer_types/gfx_param_traits.cc 2018-02-17 02:35:15.445832776 +0100 @@ -30,7 +30,7 @@ void ParamTraits<gfx::BufferUsageAndFormat>::Log( const gfx::BufferUsageAndFormat& p, std::string* l) { - l->append(base::StringPrintf("(%d, %d)", p.usage, p.format)); + l->append(base::StringPrintf("(%d, %d)", int(p.usage), int(p.format))); } } // namespace IPC --- chromium-66.0.3359.66/third_party/blink/renderer/platform/mhtml/mhtml_parser.cc.gcc7-5 2018-04-02 02:25:58.873350066 +0200 +++ chromium-66.0.3359.66/third_party/blink/renderer/platform/mhtml/mhtml_parser.cc 2018-04-02 02:27:48.929444720 +0200 @@ -316,9 +316,10 @@ // In order to support parsing the MHTML archive file produced before the // MHTMLArchive bug was fixed, we need to take a risk of stripping off the // CRLF that indeed belongs to the content. - if (content.size() >= 2 && content[content.size() - 2] == '\r' && - content[content.size() - 1] == '\n') { - content.resize(content.size() - 2); + size_t size = content.size(); + if (size >= 2 && content[size - 2] == '\r' && + content[size - 1] == '\n') { + content.resize(size - 2); } Vector<char> next_chars; --- chromium-67.0.3396.10/third_party/blink/renderer/core/html/parser/html_tree_builder.cc.gcc7 2018-04-18 21:05:39.000000000 +0200 +++ chromium-67.0.3396.10/third_party/blink/renderer/core/html/parser/html_tree_builder.cc 2018-04-22 22:29:51.951074679 +0200 @@ -978,7 +978,7 @@ void HTMLTreeBuilder::ProcessStartTagFor } if (token->GetName() == html_names::kColTag) { ProcessFakeStartTag(html_names::kColgroupTag); - DCHECK(kInColumnGroupMode); + DCHECK(kInColumnGroupMode != 0); ProcessStartTag(token); return; } --- chromium-68.0.3440.7/content/browser/renderer_host/render_widget_host_view_base.cc.gcc7 2018-05-31 12:45:40.000000000 +0200 +++ chromium-68.0.3440.7/content/browser/renderer_host/render_widget_host_view_base.cc 2018-06-02 20:27:56.685605639 +0200 @@ -227,7 +227,7 @@ if (default_background_color_ == color) return; - bool opaque = default_background_color_ + int opaque = default_background_color_ ? SkColorGetA(*default_background_color_) : SK_AlphaOPAQUE; default_background_color_ = color; --- chromium-69.0.3497.4/content/browser/web_package/signed_exchange_handler.cc.gcc7 2018-07-21 20:30:02.788552807 +0200 +++ chromium-69.0.3497.4/content/browser/web_package/signed_exchange_handler.cc 2018-07-22 00:32:42.325559060 +0200 @@ -615,7 +615,7 @@ void SignedExchangeHandler::OnVerifyCert error_message = base::StringPrintf( "CT verification failed. result: %s, policy compliance: %d", net::ErrorToShortString(error_code).c_str(), - cv_result.policy_compliance); + int(cv_result.policy_compliance)); result = SignedExchangeLoadResult::kCTVerificationError; } else { error_message = --- chromium-75.0.3770.8/ui/events/blink/web_input_event_traits.cc.gcc8 2019-04-25 07:50:39.000000000 +0200 +++ chromium-75.0.3770.8/ui/events/blink/web_input_event_traits.cc 2019-05-01 09:33:52.140508136 +0200 @@ -61,7 +61,7 @@ void ApppendEventDetails(const WebGestur " RawData: (%f, %f, %f, %f)\n}", event.PositionInWidget().x(), event.PositionInWidget().y(), event.PositionInScreen().x(), event.PositionInScreen().y(), - event.SourceDevice(), event.data.scroll_update.delta_x, + int(event.SourceDevice()), event.data.scroll_update.delta_x, event.data.scroll_update.delta_y, event.data.scroll_update.velocity_x, event.data.scroll_update.velocity_y); --- chromium-76.0.3809.46/device/fido/credential_management.cc.gcc8 2019-06-27 23:59:25.000000000 +0200 +++ chromium-76.0.3809.46/device/fido/credential_management.cc 2019-07-02 21:18:35.700132318 +0200 @@ -130,7 +130,7 @@ absl::optional<CredentialsMetadataRespon if (it == response_map.end() || !it->second.is_unsigned()) { return absl::nullopt; } - const int64_t existing_count = it->second.GetUnsigned(); + const uint64_t existing_count = uint64_t(it->second.GetUnsigned()); if (existing_count > std::numeric_limits<size_t>::max()) { return absl::nullopt; } @@ -142,7 +142,7 @@ absl::optional<CredentialsMetadataRespon if (it == response_map.end() || !it->second.is_unsigned()) { return absl::nullopt; } - const int64_t remaining_count = it->second.GetUnsigned(); + const uint64_t remaining_count = uint64_t(it->second.GetUnsigned()); if (remaining_count > std::numeric_limits<size_t>::max()) { return absl::nullopt; } @@ -174,7 +174,7 @@ absl::optional<EnumerateRPsResponse> Enu } if (expect_rp_count) { if (it == response_map.end() || !it->second.is_unsigned() || - it->second.GetUnsigned() > std::numeric_limits<size_t>::max()) { + uint64_t(it->second.GetUnsigned()) > std::numeric_limits<size_t>::max()) { return absl::nullopt; } rp_count = static_cast<size_t>(it->second.GetUnsigned()); @@ -292,7 +292,7 @@ EnumerateCredentialsResponse::Parse( static_cast<int>(CredentialManagementResponseKey::kTotalCredentials))); if (it == response_map.end() || !it->second.is_unsigned() || it->second.GetUnsigned() == 0 || - it->second.GetUnsigned() > std::numeric_limits<size_t>::max()) { + uint64_t(it->second.GetUnsigned()) > std::numeric_limits<size_t>::max()) { return absl::nullopt; } credential_count = static_cast<size_t>(it->second.GetUnsigned()); --- chromium-76.0.3809.46/storage/browser/file_system/obfuscated_file_util_memory_delegate.cc.gcc8 2019-06-27 23:59:34.000000000 +0200 +++ chromium-76.0.3809.46/storage/browser/file_system/obfuscated_file_util_memory_delegate.cc 2019-07-02 22:09:50.604979383 +0200 @@ -512,8 +512,8 @@ base::File::Error ObfuscatedFileUtilMemo // |size_t| limits the maximum size that the memory file can keep and |int| // limits the maximum size that base::ReadFile function reads. - if (source_info.size > std::numeric_limits<size_t>::max() || - source_info.size > std::numeric_limits<int>::max()) { + if (uint64_t(source_info.size) > std::numeric_limits<size_t>::max() || + uint64_t(source_info.size) > std::numeric_limits<int>::max()) { return base::File::FILE_ERROR_NO_SPACE; } --- chromium-77.0.3865.35/extensions/browser/api/socket/tcp_socket.cc.gcc9 2019-08-15 00:02:07.000000000 +0200 +++ chromium-77.0.3865.35/extensions/browser/api/socket/tcp_socket.cc 2019-08-19 15:53:57.756002626 +0200 @@ -165,7 +165,7 @@ void TCPSocket::Disconnect(bool socket_d void TCPSocket::Bind(const std::string& address, uint16_t port, net::CompletionOnceCallback callback) { - std::move(callback).Run(net::ERR_FAILED); + std::move(callback).Run(false); } void TCPSocket::Read(int count, ReadCompletionCallback callback) { @@ -203,7 +203,7 @@ void TCPSocket::SendTo(scoped_refptr<net int byte_count, const net::IPEndPoint& address, net::CompletionOnceCallback callback) { - std::move(callback).Run(net::ERR_FAILED); + std::move(callback).Run(false); } void TCPSocket::SetKeepAlive(bool enable, --- chromium-77.0.3865.35/chrome/renderer/searchbox/searchbox.cc.gcc9 2019-08-15 00:02:02.000000000 +0200 +++ chromium-77.0.3865.35/chrome/renderer/searchbox/searchbox.cc 2019-08-19 22:33:58.223703225 +0200 @@ -282,11 +282,11 @@ void SearchBox::Paste(const base::string } void SearchBox::StartCapturingKeyStrokes() { - embedded_search_service_->FocusOmnibox(page_seq_no_, OMNIBOX_FOCUS_INVISIBLE); + embedded_search_service_->FocusOmnibox(page_seq_no_, true); } void SearchBox::StopCapturingKeyStrokes() { - embedded_search_service_->FocusOmnibox(page_seq_no_, OMNIBOX_FOCUS_NONE); + embedded_search_service_->FocusOmnibox(page_seq_no_, false); } void SearchBox::UndoAllMostVisitedDeletions() { --- patch99/gpu/config/gpu_util.cc 2022-02-10 05:17:50.000000000 +0100 +++ patch99/gpu/config/gpu_util.cc.type-erros 2022-02-14 16:36:00.691182351 +0100 @@ -659,7 +659,7 @@ void SetKeysForCrashLogging(const GPUInf crash_keys::gpu_pixel_shader_version.Set(gpu_info.pixel_shader_version); crash_keys::gpu_vertex_shader_version.Set(gpu_info.vertex_shader_version); crash_keys::gpu_generation_intel.Set( - base::StringPrintf("%d", GetIntelGpuGeneration(gpu_info))); + base::StringPrintf("%d", int(GetIntelGpuGeneration(gpu_info)))); #if BUILDFLAG(IS_MAC) crash_keys::gpu_gl_version.Set(gpu_info.gl_version); #elif BUILDFLAG(IS_POSIX) --- chromium-84.0.4147.89/ui/events/blink/web_input_event_traits.cc.gcc10 2020-07-18 05:58:51.819440377 +0200 +++ chromium-84.0.4147.89/ui/events/blink/web_input_event_traits.cc 2020-07-19 16:27:32.515843782 +0200 @@ -73,7 +73,7 @@ void ApppendTouchPointDetails(const WebT " (ID: %d, State: %d, ScreenPos: (%f, %f), Pos: (%f, %f)," " Radius: (%f, %f), Rot: %f, Force: %f," " Tilt: (%d, %d), Twist: %d, TangentialPressure: %f),\n", - point.id, point.state, point.PositionInScreen().x(), + point.id, int(point.state), point.PositionInScreen().x(), point.PositionInScreen().y(), point.PositionInWidget().x(), point.PositionInWidget().y(), point.radius_x, point.radius_y, point.rotation_angle, point.force, point.tilt_x, point.tilt_y, @@ -84,7 +84,7 @@ void ApppendEventDetails(const WebTouchE StringAppendF(result, "{\n Touches: %u, DispatchType: %d, CausesScrolling: %d," " Hovering: %d, uniqueTouchEventId: %u\n[\n", - event.touches_length, event.dispatch_type, + event.touches_length, int(event.dispatch_type), event.moved_beyond_slop_region, event.hovering, event.unique_touch_event_id); for (unsigned i = 0; i < event.touches_length; ++i) --- patch102/chrome/browser/notifications/notification_platform_bridge_linux.cc 2022-05-10 12:18:06.444297508 +0200 +++ patch102/chrome/browser/notifications/notification_platform_bridge_linux.cc.type-erros 2022-05-10 14:34:27.720170614 +0200 @@ -816,7 +816,7 @@ class NotificationPlatformBridgeLinuxImp std::unique_ptr<ResourceFile> icon_file = WriteDataToTmpFile( gfx::Image(notification->icon().Rasterize(nullptr)).As1xPNGBytes()); if (icon_file) { - for (const std::string& hint_name : {"image_path", "image-path"}) { + for (char const * hint_name : {"image_path", "image-path"}) { dbus::MessageWriter image_path_writer(nullptr); hints_writer.OpenDictEntry(&image_path_writer); image_path_writer.AppendString(hint_name); --- chromium-91.0.4472.69/chrome/browser/extensions/extension_service.cc.gcc11 2021-05-20 04:16:59.000000000 +0200 +++ chromium-91.0.4472.69/chrome/browser/extensions/extension_service.cc 2021-05-24 06:03:49.977252549 +0200 @@ -2364,7 +2364,7 @@ void ExtensionService::OnInstalledExtens void ExtensionService::UninstallMigratedExtensions() { std::unique_ptr<ExtensionSet> installed_extensions = registry_->GenerateInstalledExtensionsSet(); - for (const std::string& extension_id : kObsoleteComponentExtensionIds) { + for (char const * extension_id : kObsoleteComponentExtensionIds) { auto* extension = installed_extensions->GetByID(extension_id); if (extension) { UninstallExtension(extension_id, UNINSTALL_REASON_COMPONENT_REMOVED, --- chromium-91.0.4472.69/chrome/browser/ui/webui/settings/settings_clear_browsing_data_handler.cc.gcc11 2021-05-20 04:17:01.000000000 +0200 +++ chromium-91.0.4472.69/chrome/browser/ui/webui/settings/settings_clear_browsing_data_handler.cc 2021-05-24 06:05:30.203452578 +0200 @@ -114,11 +114,11 @@ void ClearBrowsingDataHandler::OnJavascr dse_service_observation_.Observe( TemplateURLServiceFactory::GetForProfile(profile_)); DCHECK(counters_.empty()); - for (const std::string& pref : kCounterPrefsBasic) { + for (char const * pref : kCounterPrefsBasic) { AddCounter(BrowsingDataCounterFactory::GetForProfileAndPref(profile_, pref), browsing_data::ClearBrowsingDataTab::BASIC); } - for (const std::string& pref : kCounterPrefsAdvanced) { + for (char const * pref : kCounterPrefsAdvanced) { AddCounter(BrowsingDataCounterFactory::GetForProfileAndPref(profile_, pref), browsing_data::ClearBrowsingDataTab::ADVANCED); } --- patch101/content/browser/renderer_host/back_forward_cache_can_store_document_result.cc 2022-04-07 05:21:02.000000000 +0200 +++ patch101/content/browser/renderer_host/back_forward_cache_can_store_document_result.cc.fix-build-gcc-type-errors 2022-04-11 12:32:30.429556300 +0200 @@ -239,7 +239,7 @@ std::string DisabledReasonsToString( std::vector<std::string> descriptions; for (const auto& reason : reasons) { descriptions.push_back( - base::StringPrintf("%d:%d:%s:%s", reason.source, reason.id, + base::StringPrintf("%d:%d:%s:%s", int(reason.source), int(reason.id), reason.description.c_str(), reason.context.c_str())); } return base::JoinString(descriptions, ", "); --- chromium-91.0.4472.69/third_party/blink/renderer/platform/loader/subresource_integrity.cc.gcc11 2021-05-20 04:17:14.000000000 +0200 +++ chromium-91.0.4472.69/third_party/blink/renderer/platform/loader/subresource_integrity.cc 2021-05-24 16:19:47.039021427 +0200 @@ -117,7 +117,7 @@ bool SubresourceIntegrity::CheckSubresou // Check any of the "strongest" integrity constraints. IntegrityAlgorithm max_algorithm = FindBestAlgorithm(metadata_set); - for (const IntegrityMetadata& metadata : metadata_set) { + for (IntegrityMetadata metadata : metadata_set) { if (metadata.Algorithm() == max_algorithm && CheckSubresourceIntegrityDigest(metadata, content, size)) { report_info.AddUseCount(ReportInfo::UseCounterFeature:: --- chromium-92.0.4515.51/third_party/webrtc/api/video_codecs/h264_profile_level_id.cc.gcc10 2021-06-11 00:14:14.000000000 +0200 +++ chromium-92.0.4515.51/third_party/webrtc/api/video_codecs/h264_profile_level_id.cc 2021-06-12 18:34:20.389965281 +0200 @@ -234,7 +234,7 @@ absl::optional<std::string> H264ProfileL } char str[7]; - snprintf(str, 7u, "%s%02x", profile_idc_iop_string, profile_level_id.level); + snprintf(str, 7u, "%s%02hhx", profile_idc_iop_string, (unsigned char)(profile_level_id.level)); return {str}; } --- chromium-94.0.4606.20/media/cast/net/rtcp/rtcp_builder.cc.gcc11 2021-08-25 21:12:23.000000000 +0200 +++ chromium-94.0.4606.20/media/cast/net/rtcp/rtcp_builder.cc 2021-09-03 01:30:04.161898622 +0200 @@ -33,7 +33,7 @@ uint16_t MergeEventTypeAndTimestampForWi uint16_t event_type_4_bits = ConvertEventTypeToWireFormat(event); DCHECK(event_type_4_bits); - DCHECK(~(event_type_4_bits & 0xfff0)); + DCHECK(uint16_t(~(event_type_4_bits & 0xfff0))); return (event_type_4_bits << 12) | time_delta_12_bits; } --- chromium-97.0.4692.71_patch/v8/src/runtime/runtime-test-wasm.cc 2021-12-31 02:01:03.000000000 +0100 +++ chromium-97.0.4692.71_patch/v8/src/runtime/runtime-test-wasm.cc.gcc-type-errors 2022-01-06 15:47:52.718251785 +0100 @@ -210,12 +210,12 @@ RUNTIME_FUNCTION(Runtime_WasmTraceExit) } case wasm::kF32: { float value = base::ReadUnalignedValue<float>(value_addr_smi.ptr()); - PrintF(" -> %f\n", value); + PrintF(" -> %f\n", (double)value); break; } case wasm::kF64: { double value = base::ReadUnalignedValue<double>(value_addr_smi.ptr()); - PrintF(" -> %f\n", value); + PrintF(" -> %f\n", (double)value); break; } default: --- patch99/net/url_request/redirect_util.cc 2022-02-10 05:17:52.000000000 +0100 +++ patch99/net/url_request/redirect_util.cc.type-errors 2022-02-14 16:40:37.752439494 +0100 @@ -110,7 +110,7 @@ scoped_refptr<HttpResponseHeaders> Redir "Location: %s\n" "Cross-Origin-Resource-Policy: Cross-Origin\n" "Non-Authoritative-Reason: %s", - response_code, redirect_destination.spec().c_str(), + int(response_code), redirect_destination.spec().c_str(), redirect_reason.c_str()); std::string http_origin; --- chromium-96.0.4664.9/services/network/public/cpp/corb/corb_impl.cc.gcc11 2021-10-15 06:39:13.000000000 +0200 +++ chromium-96.0.4664.9/services/network/public/cpp/corb/corb_impl.cc 2021-10-18 00:29:23.683760499 +0200 @@ -295,7 +295,7 @@ void LogAction(CrossOriginReadBlocking:: bool CrossOriginReadBlocking::IsJavascriptMimeType( base::StringPiece mime_type) { constexpr auto kCaseInsensitive = base::CompareCase::INSENSITIVE_ASCII; - for (const std::string& suffix : kJavaScriptSuffixes) { + for (char const * suffix : kJavaScriptSuffixes) { if (base::EndsWith(mime_type, suffix, kCaseInsensitive)) return true; }