| Commit message (Collapse) | Author | Age | Files | Lines |
|\
| |
| |
| | |
Change-Id: Id3613b8dcda5629bce9e3cd14fa926567125a960
|
| |
| |
| |
| |
| |
| |
| |
| | |
Fix typo which surprisingly gives no errors with archiver,
however generated archives are bogus (at lest with lld)
Change-Id: Iea1e22c66eb99a720b398c5903b56938b309905f
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
If the PDF is not loaded before it jumps to the image then it fails
to jump to the specified page and ends up showing the first one.
Change-Id: I6061431e1fd9b743afaca3df0aec03dc6a1144bf
Reviewed-by: Shawn Rutledge <shawn.rutledge@qt.io>
(cherry picked from commit e2e249b8bb399ef7bcf6fe3be0b4f2fc9fa18182)
Reviewed-by: Qt Cherry-pick Bot <cherrypick_bot@qt-project.org>
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Chromium will recreate the original mapping based on the native keycode,
breaking any remapping.
Fixes: QTBUG-86672
Change-Id: I4b7e6f7434049cdf7250bee1ef759a9df4d4987c
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| | |
All pages that are opened have to be closed, in order to avoid a memory leak.
Pick-to: 5.15
Change-Id: I15c12b2f1b389638d5fe0a58599d9c410a033652
Reviewed-by: Shawn Rutledge <shawn.rutledge@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This patch cleans up script and collection apis:
* do not allocate user_script on heap, there is no need
for that.
* remove isNull(), which was used by collection.findScript(name)
* remove collection.size(), there is already collection.count()
* remove collection.findScript(name), user can use findScripts(name)
which returns list of scripts or empty list if not found
* collection.findScripts(name) is simply collection.find(name)
[ChangeLog] Removed QWebEngineScriptCollection::findScript(name),
use QWebEngineScriptCollection::find(name) instead.
Change-Id: Iecf8f1d7c26275b9ce3a1ea97cf4bd74b17f681e
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| | |
Change-Id: I8bfb805661aa0d2bc2c66dbbb5843b2e551aa64d
Reviewed-by: Qt CI Bot <qt_ci_bot@qt-project.org>
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This change just moves the class to core, a fixes
compilation issues.
[ChangeLog] QWebEngineScriptCollection is moved to
QtWebEngieCore
Taks-number: QTBUG-74585
Change-Id: I7caab835540f6f3be9fe27f3df35b4c6ab175a91
Reviewed-by: Kirill Burtsev <kirill.burtsev@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Reuse core class and adopt api:
* add missing setUrlSource to c++ class
* fix typing for setRunsOnSubFrames
* remove all invokable from setters in qml,
we use properties for that anyway.
* remove invokable toString , since we have debug
stream operator in c++
[ChangeLog] In qml websetttings.runOnSubframes is now
websettings.runsOnSubFrames
Change-Id: Iba822a7aa6a59940484c972726d710a1b66cb20d
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
If the PDF is not loaded before it jumps to the image then it fails
to jump to the specified page and ends up showing the first one.
Pick-to: 5.15
Change-Id: I6061431e1fd9b743afaca3df0aec03dc6a1144bf
Reviewed-by: Shawn Rutledge <shawn.rutledge@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Adaptations for the following qtbase changes:
- acbf9a858b Cleanup QTypeInfo
- 652bd1efca Make QStringList an alias to QList<QString>
- 25351dcc54 Long live QKeyCombination!
- ed8acbeb7c Automatically register data/debug stream operations in QMetaType
- a735038376 Move QStateMachine from QtCore to QtScxml
Change-Id: Ieb2677cd0572cc6dfe7be4b8f8dd4189a39bd3fe
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| | |
Work-around a QtNetwork bug, and QList::resize(0), doing some weird
illegal stuff.
Change-Id: I1eb178b121b9dcdd0a9f6d71d121956ddb5eb2a3
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
|\|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Conflicts:
src/core/certificate_error_controller.cpp
src/core/compositor/display_gl_output_surface_qsg.cpp
src/webengine/doc/src/webengine_certificate_error.qdoc
tests/auto/quick/qmltests/data/tst_certificateError.qml
Change-Id: I976958a0833030bfd7c3ed762585eb12031306b0
|
| |
| |
| |
| |
| |
| |
| |
| | |
The QIcon::pixmap function does internal scaling messing up our
intermediate structures.
Change-Id: I727efd58a4cc948fa3e4b23539d97e8ca755d060
Reviewed-by: Peter Varga <pvarga@inf.u-szeged.hu>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Pulls in the following changes:
8776c7b2c15 [Backport] Security bug 1052492
22d88d240bc [Backport] CVE-2020-6533: Type Confusion in V8.
3c832d33641 [Backport] CVE-2020-6532: Use after free in SCTP
388b838dbb3 [Backport] CVE-2020-6541: Use after free in WebUSB
27fa668c5ee [Backport] Security bug 1102408
d3a76ebde8e [Backport] CVE-2020-6542: Use after free in ANGLE
4694a85f33e [Backport] CVE-2020-6543: Use after free in task scheduling
583f976f9a7 [Backport] CVE-2020-6544: Use after free in media
fa97385b501 [Backport] CVE-2020-6548: Heap buffer overflow in Skia
32655453cd7 [Backport] CVE-2020-6549: Use after free in media
ddcf711e69e [Backport] CVE-2020-6550: Use after free in IndexedDB
6a0f49a17b0 [Backport] CVE-2020-6551: Use after free in WebXR
b385b7bbbe4 [Backport] CVE-2020-6545: Use after free in audio
fe23e656183 [Backport] CVE-2020-6559: Use after free in presentation API
4466538c610 [Backport] Security issue 1102137
c3d07802d40 [Backport] Security issue 1108639
b1c7638148b [Backport] Security issue 1098860
011af517d81 [Backport] CVE-2020-6555: Out of bounds read in WebGL
273005ea959 [Backport] Security bugs 1087629 and 1029569
bdb438eff33 [Backport] Dependency for CVE-2020-6561 (1/2)
c223f423808 [Backport] Dependency for CVE-2020-6561 (2/2)
607bff335b1 [Backport] CVE-2020-6561: Inappropriate implementation in Content Security Policy
ed4b6792e13 [Backport] CVE-2020-6562: Insufficient policy enforcement in Blink
c5637fa9071 [Revert] [build] Remove jumbo build configs
Task-number: QTBUG-86342
Change-Id: I7ad617e1c617ef405a608e05cdafbfae5ad412fa
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Amends commit 99a668c324. Task 'swapBuffersOnVizThread' is supposed to
be scheduled only when m_middleBuffer is ready after swap on gpu thread.
Checking for m_taskRunner is not enough to verify this. Call to
updatePaintNode may come from SG backend on expose event, thus breaking
expected sequence of buffers swaps.
Task-number: QTBUG-85817
Fixes: QTBUG-86599
Change-Id: Ia97a7a24b5672a2979b514d3cb4879e7630941eb
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| | |
Add the missing implementation of
ContentRendererClient::IsOriginIsolatedPepperPlugin().
Change-Id: Ic4157da6b373450e620ff46faedad213a69adfec
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| | |
Change-Id: I81111633fb0050f75e49c8bee0354436ecec533a
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
(cherry picked from commit 17cab42bf68ee70f641718a144f864eb04042aa4)
Reviewed-by: Qt Cherry-pick Bot <cherrypick_bot@qt-project.org>
|
| |
| |
| |
| |
| |
| |
| |
| | |
Widget API already ignores these cases.
This would cause a crash for fatal certificate errors after 83-based.
Change-Id: I3e80bb12f023f22e330218a5b20f3e267bb237dc
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Can be reproduced with quicknanobrowser by
1. Open devtools
2. Switch to OTR mode
During the switch to OTR mode, the inspected WebContentsAdapter is
destroyed and recreated. DevToolsFrontendQt is supposed to call
devToolsFrontendDestroyed on the old WebContentsAdapter, but it
accesses this adapter through QQuickWebEngineViewPrivate's
webContentsAdapter() which has already been changed to the new value,
so devToolsFrontendDestroyed is actually called on the wrong object.
Fix by remembering the WebContentsAdapter pointer in the
DevToolsFrontendQt constructor.
Change-Id: I17004ebb1a392399ef3e189c433d3f4b3f05bfd3
Reviewed-by: Tamas Zakor <ztamas@inf.u-szeged.hu>
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| | |
And update another error that is now better in its other description.
Change-Id: I1b35db2196d05bb35d4c2e1e702fadb430e784c1
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Pulls in the changes:
b1c7f4dd221 [Backport] CVE-2020-6510: Heap buffer overflow in background fetch
9a1f5aa55bf [Backport] CVE-2020-6511: Side-channel information leakage in CSP (1/2)
65a41d539be [Backport] CVE-2020-6511: Side-channel information leakage in CSP (2/2)
c7659e61424 [Backport] CVE-2020-6512: Type Confusion in V8 (1/2)
c3dda9b1ba0 [Backport] CVE-2020-6512: Type Confusion in V8 (2/2)
b6707b23089 [Backport] CVE-2020-6512: Type Confusion in V8 (3/3)
0ea2066f022 [Backport] CVE-2020-6514: Inappropriate implementation in WebRTC
9c0fcb08ccc [Backport] CVE-2020-6518: Use after free in developer tools
cf40f91b1a1 [Backport] CVE-2020-6523: Out of bounds write in Skia
ed4112559e3 [Backport] CVE-2020-6513: Heap buffer overflow in PDFium
6f57596692e [Backport] CVE-2020-6524: Heap buffer overflow in WebAudio
33ea34381ce [Backport] CVE-2020-6526: Inappropriate implementation in iframe sandbox
49583b1502a [Backport] CVE-2020-6529: Inappropriate implementation in WebRTC
d4576fb0757 [Backport] CVE-2020-6535: Insufficient data validation in WebUI
0998aa1143f [Backport] Security bug 1090543
98883838595 [Backport] CVE-2020-6530: Out of bounds memory access in developer tools
1be41cad096 [Backport] CVE-2020-6531: Side-channel information leakage in scroll to text
71896380867 [Backport] Security bug 1065731
3f13f72f337 [Backport] Security bug 1065122
c8109013cc7 [Backport] CVE-2020-6534: Heap buffer overflow in WebRTC
Change-Id: Idd5bf0023c013bf94ebae552b27932a14ddb86d2
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Just a move of qwebenginescript from widgets to core.
[ChangleLog] QWebEngineScirpt is now in QtWebEngineCore
Change-Id: I45380377579283e27c86bb05981b227559b9630b
Reviewed-by: Qt CI Bot <qt_ci_bot@qt-project.org>
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
In widget apis webenginescripts are value types and are managed
by webenginescriptcollection. Introduce same concept in qml and
make qquickwebenginescript a value type and reuse core userscript
as private implementation. Rewrite webenginscript list handling.
This patch is half baked since it does not include docs and tests
for new api, however aim is to move script classes to core and reuse
those in qml land. Therefore, new class introduced here is going to
be removed in follow up patches, so all the missing parts will be added
later. A new way of managing scripts in qml is as follows:
* using collection with javascript dictionaries
var script = { name: "FOO"
sourceUrl: Qt.resolvedUrl("foo.js"),
injectionPoint: WebEngineScript.DocumentReady }
webEngineView.userScripts.collection = [ script1, script2 ];
* using collection with webscript basic type
var script = WebEngine.script()
script.name = "FOO"
webEngineView.userScripts.collection = [ script ];
* using fine grain user script collection api with basic type
var script = WebEngine.script()
script.name = "FOO"
webEngineView.userScripts.insert(script)
Of course new api can be extended and we can provide more convince
overloads.
Note the main motivation here is to enable reuse webenginescript object
created in c++ land, which is now passed as value in follow up
patches.
This changes reuses private apis of qml and will most likely require
further changes when QTBUG-82443 is completed.
[ChangeLog] WebEngineScript is a basic value type in qml, it is no
longer declarative way of creating it, instead use WebEngine.script()
Change-Id: I6a0ac3607e4522ccaefcec0a7d2986577d7e7024
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| | |
Use type safe native texture accessors.
Change-Id: Ib362b975a51d8ba17231aed4e43ae23768511416
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| | |
Task-number: QTBUG-74585
Change-Id: I953f46d01c1e4a82ab0d75b5f955e4f346f1c941
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
| |
| |
| |
| |
| |
| | |
Pick-to: 5.15
Change-Id: I81111633fb0050f75e49c8bee0354436ecec533a
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|\|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Conflicts:
src/3rdparty
src/core/certificate_error_controller.cpp
src/core/certificate_error_controller.h
src/core/compositor/compositor.cpp
src/core/compositor/compositor.h
src/core/compositor/display_gl_output_surface.cpp
src/core/content_browser_client_qt.cpp
src/core/core_chromium.pri
src/core/delegated_frame_host_client_qt.cpp
src/core/ozone/gl_share_context_qt.h
src/core/ozone/surface_factory_qt.cpp
src/core/permission_manager_qt.cpp
src/core/render_widget_host_view_qt.cpp
src/core/render_widget_host_view_qt.h
src/core/web_engine_context.cpp
src/core/web_engine_settings.cpp
src/core/web_event_factory.cpp
tests/auto/widgets/qwebenginedownloadrequest/tst_qwebenginedownloadrequest.cpp
Change-Id: Ice14c3c350b139e800c7c7011b7cef1fc7010669
|
| |
| |
| |
| |
| |
| |
| | |
Most of the includes were included twice
Change-Id: Ie2967e9d8ef4799c28a856ade7318d24bac391c6
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
| |
| |
| |
| |
| | |
Change-Id: I63ed851426b18623d549ceaf87f1b6eeec527966
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
| |
| |
| |
| |
| | |
Change-Id: Ie422b327025da084bc8038c7a0aadee2db801f29
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
| |
| |
| |
| |
| |
| |
| | |
Change-Id: I1b056a61e2b56b19441f559e97f785c87df61a0c
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
(cherry picked from commit b00af13974b2c72ae4d397fbdf5925181e7cc1bf)
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
| |\
| | |
| | |
| | | |
Change-Id: Ieb546ccd35db06e8ad6358b11e3139a839c9b4cf
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Submodule src/3rdparty 4e0b66a6..62bc4758:
> [Backport] Security issue 1098860
> [Backport] Security issue 1108639
> [Backport] Security issue 1102137
> [Backport] CVE-2020-6559: Use after free in presentation API
Change-Id: Ifa6ba52fa2d760b20e3b36abb10adaca0fc79cf8
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Otherwise unchanged intercepted request leads to second call
in the same interceptor but on ui thread after io thread.
Ammends a05bb73747.
Fixes: QTBUG-86267
Change-Id: I4e7c662d24a58be5445f5c8b6d0bf3751f40cc05
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
* e31cc67a44d Fix neon support in libpng
Change-Id: Ib06498f303106d113cc3b4c5b70d20685c9e6b9f
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This supposed to be covered by ff50fbf but got lost in
following patchsets and static ios build did not complain
about it.
Change-Id: Ie4e34dc12d942442824ba1f0e3483bed682b3157
Reviewed-by: Shawn Rutledge <shawn.rutledge@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Suppress duplicated progress values coming from chromium.
Verify this behavior reliably (and not only 0 and 100 value) by loading html
with subresources with minor delay through test http server.
Change-Id: Id034dda9012212d54d12fc95d5939ba301577c1c
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Drop duplicated enums. Use qwebenginesettings as private
for qquickwebenginesettings. This can most likely
be more optimized when profile is moved to core.
Change-Id: I04bdc6c5a35556bf6d38a273cefeeee9d2a0a310
Reviewed-by: Qt CI Bot <qt_ci_bot@qt-project.org>
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|\ \ \ |
|
| |\| |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Conflicts:
.qmake.conf
src/core/compositor/display_gl_output_surface_qsg.cpp
src/core/web_engine_context.cpp
tests/auto/quick/quick.pro
Change-Id: Iaf03434696788c89f5d3b524969513a89cb0a235
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
The ScopedGLContextChecker, which deactivates the current
QOpenGLContext when executing Chromium tasks, is currently enabled
only if QOpenGLContext::supportsThreadedOpenGL() is false. But the gpu
thread can nowadays be disabled also with an environment variable and
ScopedGLContextChecker needs to take this into account.
Change-Id: I012524538b49b033ed053dbc41ed4350db916542
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
(cherry picked from commit 5988cec1a1b59aa163042a419c4c2e978bb814bb)
|
| | |/
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This is the case when the WebEngineNewViewRequest.openIn()
is not called on newViewRequested().
For example, when opening the view source from context
menu in quick minimal example.
Fixes: QTBUG-85494
Change-Id: I7c1ae53684361de459b2f268e471904e632821b0
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
At least turns our support off on html5test.com
Change-Id: Ic82800b0efb70bb5589f7544b851ebcd64000105
Reviewed-by: Michael Brüning <michael.bruning@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Was enabled for all platforms except windows using MSVC, but
compiles just fine for us.
Fixes: QTBUG-86092
Change-Id: Ib15d94c36b8a411dd5eab01843db1a3666ac370f
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Submodule src/3rdparty c153fafb..4e0b66a6:
> Remove blocking of proper fixes
> Fix bison 3.7
Fixes: QTBUG-85835
Change-Id: If3b77c7db6203ccd0137ea381c927bd09cede505
Reviewed-by: Michael Brüning <michael.bruning@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Also violates modern Qt code style
Change-Id: Ibb12b6db18bbd2669377abe1d25034ed69a86389
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This pulls in the following changes:
c153fafb306 Fix invalid dbus bus name error in MPRIS
Fixes: QTBUG-85626
Change-Id: I7913a1caede7041632b1c070152f54a848c063ab
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
The buffer pointers m_middleBuffer and m_frontBuffer are swapped in
updatePaintNode on the condition that m_middleBuffer is non-null and
it's serviceId non-zero. But neither m_middleBuffer nor it's serviceId
is immediately cleared, leaving the possibility that a subsequent call
to updatePaintNode could swap the buffer pointers again if this call
occurs before m_middleBuffer is cleared in swapBuffersOnVizThread. The
m_taskRunner pointer is however cleared immediately and therefore the
subsequent call to updatePaintNode will trigger a segmentation fault.
Since m_taskRunner precisely tracks the condition when we should or
should not swap, change the swap condition to simply require that
m_taskRunner is non-null.
Fixes: QTBUG-85817
Change-Id: Iad89bb0f4de7c0c151d5c5bd63ac74ab6cdd9087
Reviewed-by: Michael Brüning <michael.bruning@qt.io>
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Pulls in the changes:
6b7ceb6afd9 Fix debug-info in MSVC developer-builds
563e0a1cd4f [Backport] CVE-2020-6542: Use after free in ANGLE
c16701ae892 [Backport] CVE-2020-6543: Use after free in task scheduling
10efe0032f2 [Backport] CVE-2020-6544: Use after free in media
69a85eaabf2 [Backport] CVE-2020-6548: Heap buffer overflow in Skia
d2f5e4d3a25 [Backport] CVE-2020-6549: Use after free in media
0eed9609606 [Backport] CVE-2020-6550: Use after free in IndexedDB
f7859651865 [Backport] CVE-2020-6551: Use after free in WebXR
3cebf422618 [Backport] CVE-2020-6555: Out of bounds read in WebGL
30a0c954b97 [Backport] CVE-2020-6545: Use after free in audio
Task-number: QTBUG-85606
Change-Id: I1f591d722380fbcfb91565b90a6f4cbb7227b266
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|