Branch: refs/heads/safari-7621.2.5.11-branch
Home: https://github.com/WebKit/WebKit
Commit: 5619b4fc324e6a7f815dd0085a4b59f8e6845a03
https://github.com/WebKit/WebKit/commit/5619b4fc324e6a7f815dd0085a4b59f8e6845a03
Author: Mohsin Qureshi <[email protected]>
Date: 2025-04-15 (Tue, 15 Apr 2025)
Changed paths:
M Configurations/Version.xcconfig
Log Message:
-----------
Versioning.
WebKit-7621.2.5.11.1
Canonical link: https://commits.webkit.org/[email protected]
Commit: 994e8a5cfa29f43b0ae585da4ace36d1079db8c3
https://github.com/WebKit/WebKit/commit/994e8a5cfa29f43b0ae585da4ace36d1079db8c3
Author: Mark Lam <[email protected]>
Date: 2025-04-15 (Tue, 15 Apr 2025)
Changed paths:
M Source/JavaScriptCore/bytecode/CodeBlock.cpp
M Source/JavaScriptCore/bytecode/CodeBlock.h
Log Message:
-----------
Cherry-pick 8d86a7bac107. rdar://149306684
Add sanity checks for CodeBlock::destroy().
https://bugs.webkit.org/show_bug.cgi?id=291532
rdar://143559929
Reviewed by Keith Miller and Yijia Huang.
This is temporarily needed for crash analysis on macOS.
* Source/JavaScriptCore/bytecode/CodeBlock.cpp:
(JSC::CodeBlock::CodeBlock):
(JSC::CodeBlock::setBaselineJITData):
(JSC::CodeBlock::~CodeBlock):
* Source/JavaScriptCore/bytecode/CodeBlock.h:
(JSC::CodeBlock::CrashChecker::hash):
(JSC::CodeBlock::CrashChecker::get):
(JSC::CodeBlock::CrashChecker::set):
(JSC::CodeBlock::CrashChecker::value const):
(JSC::CodeBlock::setDFGJITData):
(JSC::CodeBlock::setBaselineJITData): Deleted.
Canonical link: https://commits.webkit.org/293712@main
Commit: 21c51beb685843e84b767749b4a81069a8b3d9d8
https://github.com/WebKit/WebKit/commit/21c51beb685843e84b767749b4a81069a8b3d9d8
Author: Razvan Caliman <[email protected]>
Date: 2025-04-16 (Wed, 16 Apr 2025)
Changed paths:
M Source/WebInspectorUI/UserInterface/Views/OverrideDeviceSettingsPopover.js
Log Message:
-----------
Cherry-pick 3d0966402274. rdar://144707833
Web Inspector: Update User Agent string overrides aligned with Safari 18.4
https://bugs.webkit.org/show_bug.cgi?id=290920
rdar://144707833
Reviewed by Anne van Kesteren.
*
Source/WebInspectorUI/UserInterface/Views/OverrideDeviceSettingsPopover.js:
(WI.OverrideDeviceSettingsPopover.prototype._createUserAgentSection):
Canonical link: https://commits.webkit.org/293112@main
Canonical link: https://commits.webkit.org/[email protected]
Commit: 5242c520db857da081173e801e94929377b56462
https://github.com/WebKit/WebKit/commit/5242c520db857da081173e801e94929377b56462
Author: Daniel Liu <[email protected]>
Date: 2025-04-16 (Wed, 16 Apr 2025)
Changed paths:
M Source/WebCore/bindings/js/SerializedScriptValue.cpp
Log Message:
-----------
Cherry-pick 94ec0f4523cc. rdar://144781310
Re-land missing exception checks
https://bugs.webkit.org/show_bug.cgi?id=291290
rdar://144781310
Reviewed by Yijia Huang and Yusuke Suzuki.
Re-land the exception checks added in 292722@main, but fixing some issues
that
occurred when running Debug layout tests.
* Source/WebCore/bindings/js/SerializedScriptValue.cpp:
(WebCore::CloneDeserializer::deserialize):
(WebCore::SerializedScriptValue::create):
(WebCore::SerializedScriptValue::deserialize):
Canonical link: https://commits.webkit.org/293437@main
Canonical link: https://commits.webkit.org/[email protected]
Commit: 975a7e561e544451e18a4e2505b3e958b58d61af
https://github.com/WebKit/WebKit/commit/975a7e561e544451e18a4e2505b3e958b58d61af
Author: Rob Buis <[email protected]>
Date: 2025-04-16 (Wed, 16 Apr 2025)
Changed paths:
A LayoutTests/css3/masking/shared-clip-path-reference-crash-expected.txt
A LayoutTests/css3/masking/shared-clip-path-reference-crash.html
M Source/WebCore/rendering/RenderLayer.cpp
M Source/WebCore/rendering/RenderLayer.h
M Source/WebCore/rendering/svg/legacy/LegacyRenderSVGResourceContainer.cpp
Log Message:
-----------
Cherry-pick 441eda47158d. rdar://144407636
Cherry-pick [email protected] (ff0112ba3d52).
rdar://144407636
ASAN_TRAP | WTF::HashTable::lookup;
WebCore::LegacyRenderSVGResource::markForLayoutAndParentResourceInvalidation;
WebCore::SVGResourcesCache::clientStyleChanged
https://bugs.webkit.org/show_bug.cgi?id=288442
Reviewed by Simon Fraser.
LegacyRenderSVGResourceClipper.m_clipperMap is used to keep track of
clipper data per client, the client
can be a HTML element referencing the clipper by using the clip-path
property. The registering for that is done
in RenderLayer::setupClipPath but there is no code to deregister on
HTML element removal, so the m_clipperMap
keys will become a WeakRef with empty internal pointer for HTML
elements, causing a RELEASE_ASSERT.
To fix this, include deregistering code on RenderLayer destruction.
*
LayoutTests/css3/masking/shared-clip-path-reference-crash-expected.txt: Added.
* LayoutTests/css3/masking/shared-clip-path-reference-crash.html: Added.
* Source/WebCore/rendering/RenderLayer.cpp:
(WebCore::RenderLayer::~RenderLayer):
(WebCore::RenderLayer::removeClipperClientIfNeeded const):
* Source/WebCore/rendering/RenderLayer.h:
*
Source/WebCore/rendering/svg/legacy/LegacyRenderSVGResourceContainer.cpp:
(WebCore::LegacyRenderSVGResourceContainer::markClientForInvalidation):
Canonical link:
https://commits.webkit.org/[email protected]
Canonical link: https://commits.webkit.org/289651.427@safari-7621-branch
Canonical link: https://commits.webkit.org/[email protected]
Commit: 7a6181d83f8af8618285e637d0eb051766b5945d
https://github.com/WebKit/WebKit/commit/7a6181d83f8af8618285e637d0eb051766b5945d
Author: Daniel Liu <[email protected]>
Date: 2025-04-16 (Wed, 16 Apr 2025)
Changed paths:
A JSTests/wasm/stress/array-get-large-i64-index.js
M Source/JavaScriptCore/wasm/WasmBBQJIT64.cpp
Log Message:
-----------
Cherry-pick 341845413761. rdar://149185657
BBQJIT array operations should mask index to 32 bits
https://bugs.webkit.org/show_bug.cgi?id=291506
rdar://149185657
Reviewed by Keith Miller.
BBQ array operations (get/set) assume that the index passed
in will be 32 bits. While this is correct by spec behavior,
we do not check that the upper 32 bits of the value are set
to zero, but use the value directly. This creates potential
OOB opportunities, where we can influence the upper 32 bits
of the pointer to index out of bounds. To fix this, we must
mask off the upper 32 bits of the index value before it can
be used in a load/store.
* JSTests/wasm/stress/array-get-large-i64-index.js: Added.
* Source/JavaScriptCore/wasm/WasmBBQJIT64.cpp:
(JSC::Wasm::BBQJITImpl::BBQJIT::addArrayGet):
(JSC::Wasm::BBQJITImpl::BBQJIT::addArraySet):
Canonical link: https://commits.webkit.org/289651.431@safari-7621-branch
Canonical link: https://commits.webkit.org/[email protected]
Commit: e725732395be8ec3e8fd4d77704b807025ff62ff
https://github.com/WebKit/WebKit/commit/e725732395be8ec3e8fd4d77704b807025ff62ff
Author: Brent Fulgham <[email protected]>
Date: 2025-04-16 (Wed, 16 Apr 2025)
Changed paths:
M LayoutTests/TestExpectations
M LayoutTests/platform/glib/tables/mozilla/bugs/bug30332-1-expected.txt
M LayoutTests/platform/glib/tables/mozilla/bugs/bug30332-2-expected.txt
M LayoutTests/platform/glib/tables/mozilla/bugs/bug9879-1-expected.txt
M
LayoutTests/platform/glib/tables/mozilla_expected_failures/bugs/bug9879-1-expected.txt
M LayoutTests/platform/ios/tables/mozilla/bugs/bug30332-1-expected.txt
M LayoutTests/platform/ios/tables/mozilla/bugs/bug30332-2-expected.txt
M LayoutTests/platform/ios/tables/mozilla/bugs/bug9879-1-expected.txt
M
LayoutTests/platform/ios/tables/mozilla_expected_failures/bugs/bug9879-1-expected.txt
M LayoutTests/platform/mac/tables/mozilla/bugs/bug30332-1-expected.txt
M LayoutTests/platform/mac/tables/mozilla/bugs/bug30332-2-expected.txt
M LayoutTests/platform/mac/tables/mozilla/bugs/bug9879-1-expected.txt
M
LayoutTests/platform/mac/tables/mozilla_expected_failures/bugs/bug9879-1-expected.txt
M Source/WebCore/html/HTMLTableCellElement.cpp
Log Message:
-----------
Cherry-pick 7106a5905d11. rdar://149318862
Unreviewed, reverting 288746@main (75a5507d4d8f)
https://bugs.webkit.org/show_bug.cgi?id=291584
rdar://149318862
Exposes an underlying performance bug
Reverted change:
rowspan="0" results in different table layout than Firefox/Chrome
https://bugs.webkit.org/show_bug.cgi?id=185341
rdar://133910430
288746@main (75a5507d4d8f)
Canonical link: https://commits.webkit.org/289651.432@safari-7621-branch
Canonical link: https://commits.webkit.org/[email protected]
Commit: dc5506d90eccf6692cbdbd8527aed7c2803c7b82
https://github.com/WebKit/WebKit/commit/dc5506d90eccf6692cbdbd8527aed7c2803c7b82
Author: Dan Robson <[email protected]>
Date: 2025-04-17 (Thu, 17 Apr 2025)
Changed paths:
M Configurations/Version.xcconfig
Log Message:
-----------
Versioning.
WebKit-7621.2.5.11.2
Canonical link: https://commits.webkit.org/[email protected]
Commit: ac08cec226dc9870d1deba2af07b85538b3d5c10
https://github.com/WebKit/WebKit/commit/ac08cec226dc9870d1deba2af07b85538b3d5c10
Author: Jean-Yves Avenard <[email protected]>
Date: 2025-04-17 (Thu, 17 Apr 2025)
Changed paths:
A LayoutTests/media/content/test-vp9-yuv422p10.webm
A LayoutTests/media/content/test-vp9-yuv422p10.webm.png
A LayoutTests/media/media-vp9-yuv422p10-expected.html
A LayoutTests/media/media-vp9-yuv422p10.html
M LayoutTests/platform/ios/TestExpectations
M LayoutTests/platform/mac-wk1/TestExpectations
M
Source/ThirdParty/libwebrtc/Source/webrtc/webkit_sdk/WebKit/WebKitDecoderReceiver.cpp
M
Source/ThirdParty/libwebrtc/Source/webrtc/webkit_sdk/WebKit/WebKitDecoderReceiver.h
M
Source/ThirdParty/libwebrtc/Source/webrtc/webkit_sdk/WebKit/WebKitUtilities.h
M
Source/ThirdParty/libwebrtc/Source/webrtc/webkit_sdk/WebKit/WebKitUtilities.mm
M Source/WebCore/platform/libwebrtc/LibWebRTCVPXVideoDecoder.cpp
M Source/WebCore/platform/mediastream/libwebrtc/VideoFrameLibWebRTC.cpp
Log Message:
-----------
Cherry-pick 0dec430870a0. rdar://148703791
Some Steam webm videos don't play in Safari
https://bugs.webkit.org/show_bug.cgi?id=291420
rdar://148703791
Reviewed by Jer Noble.
Video was made of a vp9 10 bits video for which we don't have hardware
decoder.
In addition, the software video decoder only supported YUV 420 (NV12) in
either 8 or 10 bits.
We add support for YUV 422 in either 8 or 10 bits in both WebCodec and VP9
macOS VideoToolbox plugin.
YUV 422 8 bits will be converted to NV12 as libyuv doesn't provide the
required utility.
Added test.
* LayoutTests/media/content/test-vp9-yuv422p10.webm: Added.
* LayoutTests/media/content/test-vp9-yuv422p10.webm.png: Added.
* LayoutTests/media/media-vp9-yuv422p10-expected.html: Added.
* LayoutTests/media/media-vp9-yuv422p10.html: Added.
* LayoutTests/platform/mac-wk1/TestExpectations:
*
Source/ThirdParty/libwebrtc/Source/webrtc/webkit_sdk/WebKit/WebKitDecoderReceiver.cpp:
(webrtc::WebKitDecoderReceiver::initializeFromFormatDescription):
(webrtc::WebKitDecoderReceiver::pixelBufferPool):
(webrtc::WebKitDecoderReceiver::Decoded):
*
Source/ThirdParty/libwebrtc/Source/webrtc/webkit_sdk/WebKit/WebKitDecoderReceiver.h:
*
Source/ThirdParty/libwebrtc/Source/webrtc/webkit_sdk/WebKit/WebKitUtilities.h:
*
Source/ThirdParty/libwebrtc/Source/webrtc/webkit_sdk/WebKit/WebKitUtilities.mm:
(webrtc::CopyVideoFrameToPixelBuffer):
(webrtc::createPixelBufferFromFrameBuffer):
* Source/WebCore/platform/libwebrtc/LibWebRTCVPXVideoDecoder.cpp:
(WebCore::LibWebRTCVPXInternalVideoDecoder::createPixelBuffer):
* Source/WebCore/platform/mediastream/libwebrtc/VideoFrameLibWebRTC.cpp:
(WebCore::VideoFrameLibWebRTC::create):
(WebCore::VideoFrameLibWebRTC::VideoFrameLibWebRTC):
Canonical link: https://commits.webkit.org/293620@main
Canonical link: https://commits.webkit.org/[email protected]
Commit: db5fd44fe41fba73b3da800454673533b71af279
https://github.com/WebKit/WebKit/commit/db5fd44fe41fba73b3da800454673533b71af279
Author: Said Abou-Hallawa <[email protected]>
Date: 2025-04-17 (Thu, 17 Apr 2025)
Changed paths:
M Source/WebCore/PAL/PAL.xcodeproj/project.pbxproj
A Source/WebCore/PAL/pal/cocoa/LockdownModeCocoa.h
A Source/WebCore/PAL/pal/cocoa/LockdownModeCocoa.mm
R Source/WebCore/PAL/pal/cocoa/LockdownModeSoftLink.h
R Source/WebCore/PAL/pal/cocoa/LockdownModeSoftLink.mm
M Source/WebCore/platform/graphics/cg/UTIRegistry.mm
M Source/WebKit/UIProcess/API/Cocoa/_WKSystemPreferences.mm
M Source/WebKit/WebProcess/WebProcess.cpp
Log Message:
-----------
Cherry-pick 69431ee57734. rdar://149401615
REGRESSION(289593@main): Images are still restricted even after opting out
pages from Lockdown Mode
https://bugs.webkit.org/show_bug.cgi?id=291614#
rdar://147500578
Reviewed by Tim Horton.
In 289593@main we made UTIRegistry call PAL::isLockdownModeEnabled() to
detect
whether the Lockdown Mode is enabled. But this function ends up calling the
system
LockdownModeLibrary. This does not take into consideration the opted out
pages.
So this causes the restricted images to be always restricted in Lockdown
Mode.
The fix is to used WebProcess::isLockdownModeEnabled() instead because this
will
return false when opting out the page. To propagate this to WebCore a
getter and
a setter for isLockdownModeEnabledForCurrentProcess will be added in PAL.
UTIRegistry will call PAL::isLockdownModeEnabledForCurrentProcess() instead.
* Source/WebCore/PAL/PAL.xcodeproj/project.pbxproj:
* Source/WebCore/PAL/pal/cocoa/LockdownModeCocoa.h: Renamed from
Source/WebCore/PAL/pal/cocoa/LockdownModeSoftLink.h.
* Source/WebCore/PAL/pal/cocoa/LockdownModeCocoa.mm: Renamed from
Source/WebCore/PAL/pal/cocoa/LockdownModeSoftLink.mm.
(PAL::isLockdownModeEnabled):
(PAL::isLockdownModeEnabledForCurrentProcessCached):
(PAL::isLockdownModeEnabledForCurrentProcess):
(PAL::setLockdownModeEnabledForCurrentProcess):
* Source/WebCore/platform/graphics/cg/UTIRegistry.mm:
(WebCore::supportedImageTypes):
(WebCore::setAdditionalSupportedImageTypes):
(WebCore::allowableSupportedImageTypes):
(WebCore::isLockdownModeEnabled): Deleted.
* Source/WebKit/UIProcess/API/Cocoa/_WKSystemPreferences.mm:
* Source/WebKit/WebProcess/WebProcess.cpp:
(WebKit::WebProcess::initializeWebProcess):
Canonical link: https://commits.webkit.org/293755@main
Canonical link: https://commits.webkit.org/[email protected]
Commit: d6f1e77c8231cecf6249052700ead7c064a836e9
https://github.com/WebKit/WebKit/commit/d6f1e77c8231cecf6249052700ead7c064a836e9
Author: Kiet Ho <[email protected]>
Date: 2025-04-17 (Thu, 17 Apr 2025)
Changed paths:
A
LayoutTests/http/tests/security/access-cssstylesheet-after-removing-from-document-expected.txt
A
LayoutTests/http/tests/security/access-cssstylesheet-after-removing-from-document.html
A
LayoutTests/http/tests/security/access-imported-cssstylesheet-after-removing-from-document-expected.txt
A
LayoutTests/http/tests/security/access-imported-cssstylesheet-after-removing-from-document.html
M LayoutTests/http/tests/security/cannot-read-cssrules-redirect-expected.txt
M
LayoutTests/imported/w3c/web-platform-tests/service-workers/service-worker/fetch-request-css-cross-origin.https-expected.txt
M Source/WebCore/css/CSSImportRule.cpp
M Source/WebCore/css/CSSStyleSheet.cpp
M Source/WebCore/css/CSSStyleSheet.h
M Source/WebCore/dom/ProcessingInstruction.cpp
M Source/WebCore/html/HTMLLinkElement.cpp
Log Message:
-----------
Cherry-pick be53cebfe0d9. rdar://148513087
Tighten up cross-site access to CSSStyleSheet
rdar://148513087
https://bugs.webkit.org/show_bug.cgi?id=290992
Reviewed by Youenn Fablet.
CSSStyleSheet::canAccessRules() gates access to rules within
CSSStyleSheet, depending on whether the JS code and stylesheet comes
from the same origin.
bool CSSStyleSheet::canAccessRules() const
{
if (m_isOriginClean) // (1)
return m_isOriginClean.value();
URL baseURL = m_contents->baseURL(); // (2)
if (baseURL.isEmpty())
return true;
Document* document = ownerDocument(); // (3)
if (!document)
return true; // (4)
return document->protectedSecurityOrigin()->canRequest(baseURL,
OriginAccessPatternsForWebProcess::singleton()); // (5)
}
If CSSStyleSheet is constructed with an explicit same-origin flag, (which
indicates the origin status of the JS code and stylesheet), that flag is
used (1). Otherwise, it manually checks the origin:
* get the base URL of the stylesheet (2)
* get the document owner of the CSSStyleSheet
(also the document that the JS code is in) (3)
* check whether the JS code and the stylesheet is same-origin (5)
There's a bug at (4) - it grants access if the CSSStyleSheet doesn't
belong to a Document. Malicious JS code can manipulate a cross-origin
CSSStyleSheet into this state:
* If the CSSStyleSheet comes from HTMLLinkElement.sheet (<link
rel="stylesheet">)
or HTMLStyleElement.sheet (<style>), remove the <link> or <style> element
from the document e.g using Node.removeChild
* If it comes from CSSImportRule.styleSheet (@import), remove the
stylesheet containing the @import rule from the document
Following the removal, ownerDocument() returns nullptr, and access is
granted. Fix this by changing (4) to return false instead.
Unfortunately, many places in the codebase construct CSSStyleSheet
without supplying the same-origin flag, instead relying on the
fallback check. For those cases, this change introduces a regression
where if a same-origin stylesheet is created without the same-origin
flag, then is removed from the document, the fallback check will
incorrectly deny access. Fix this by hunting down places that
construct CSSStyleSheet and supply the flag if possible.
Also fix CSSStyleSheet.{insert,delete}Rule to always check with
canAccessRules() before allowing insertion/deletion.
*
LayoutTests/http/tests/security/access-cssstylesheet-after-removing-from-document-expected.txt:
Added.
*
LayoutTests/http/tests/security/access-cssstylesheet-after-removing-from-document.html:
Added.
*
LayoutTests/http/tests/security/access-imported-cssstylesheet-after-removing-from-document-expected.txt:
Added.
*
LayoutTests/http/tests/security/access-imported-cssstylesheet-after-removing-from-document.html:
Added.
*
LayoutTests/http/tests/security/cannot-read-cssrules-redirect-expected.txt:
- Adjust expectation. This now matches Chrome's output.
*
LayoutTests/imported/w3c/web-platform-tests/service-workers/service-worker/fetch-request-css-cross-origin.https-expected.txt:
* Source/WebCore/css/CSSImportRule.cpp:
(WebCore::CSSImportRule::styleSheet const):
- Supply same-origin flag when creating CSSStyleSheet if possible.
* Source/WebCore/css/CSSStyleSheet.cpp:
(WebCore::CSSStyleSheet::create):
- Make ::create for @import rules take an optional same-origin flag.
(WebCore::CSSStyleSheet::createInline):
- Take an optional same-origin flag.
(WebCore::CSSStyleSheet::canAccessRules const):
- Deny access if the CSSStyleSheet does not belong to a Document.
(WebCore::CSSStyleSheet::insertRule):
- Deny access if not allowed (using canAccessRules())
(WebCore::CSSStyleSheet::deleteRule):
- Deny access if not allowed (using canAccessRules())
* Source/WebCore/css/CSSStyleSheet.h:
* Source/WebCore/dom/ProcessingInstruction.cpp:
(WebCore::ProcessingInstruction::setCSSStyleSheet):
- Supply same-origin flag when creating CSSStyleSheet.
* Source/WebCore/html/HTMLLinkElement.cpp:
(WebCore::HTMLLinkElement::initializeStyleSheet):
- Always set the origin clean flag, regardless whether the fetch
request is CORS or not.
Canonical link: https://commits.webkit.org/289651.433@safari-7621-branch
Canonical link: https://commits.webkit.org/[email protected]
Commit: a9a52d85126e9f3eb3ef836dce5ba4c5fc19ddff
https://github.com/WebKit/WebKit/commit/a9a52d85126e9f3eb3ef836dce5ba4c5fc19ddff
Author: Sihui Liu <[email protected]>
Date: 2025-04-17 (Thu, 17 Apr 2025)
Changed paths:
M Source/WebCore/platform/network/ResourceResponseBase.cpp
M Source/WebCore/platform/network/ResourceResponseBase.h
Log Message:
-----------
Cherry-pick cdd407b46a54. rdar://148182167
ResourceResponseData::proxyName is not properly isolated copied
https://bugs.webkit.org/show_bug.cgi?id=291646
rdar://148182167
Reviewed by Chris Dumez.
In existing implementation, ResourceResponseData::proxyName is not isolated
copied or moved correctly at the places it
is supposed to be, and this can be the cause of increasing crashes we saw
in recent builds. Credits to Chris who found
the issue.
* Source/WebCore/platform/network/ResourceResponseBase.cpp:
(WebCore::ResourceResponseData::isolatedCopy const):
(WebCore::ResourceResponseBase::crossThreadData const):
(WebCore::ResourceResponseBase::fromCrossThreadData):
* Source/WebCore/platform/network/ResourceResponseBase.h:
(WebCore::ResourceResponseBase::setProxyName):
(WebCore::ResourceResponseBase::proxyName const):
Canonical link: https://commits.webkit.org/289651.434@safari-7621-branch
Canonical link: https://commits.webkit.org/[email protected]
Commit: a90e2caa37a5ad7a034015c7406d36ae539af964
https://github.com/WebKit/WebKit/commit/a90e2caa37a5ad7a034015c7406d36ae539af964
Author: Sihui Liu <[email protected]>
Date: 2025-04-17 (Thu, 17 Apr 2025)
Changed paths:
M Source/WebCore/platform/graphics/ImageAdapter.h
M Source/WebCore/platform/graphics/ImageUtilities.h
M Source/WebCore/platform/graphics/ShareableBitmap.cpp
M Source/WebCore/platform/graphics/ShareableBitmap.h
M Source/WebCore/platform/graphics/cg/ImageUtilitiesCG.cpp
M Source/WebKit/UIProcess/Cocoa/WebPageProxyCocoa.mm
M Source/WebKit/WebProcess/WebPage/Cocoa/WebPageCocoa.mm
M Source/WebKit/WebProcess/WebPage/WebPage.h
M Source/WebKit/WebProcess/WebPage/WebPage.messages.in
Log Message:
-----------
Cherry-pick db75e4455949. rdar://143579665
Make web process send ShareableBitmap instead of SharedBuffer for icon data
https://bugs.webkit.org/show_bug.cgi?id=290873
rdar://143579665
Reviewed by Said Abou-Hallawa and Anne van Kesteren.
In existing implementation of icon data generation, UI process sends image
data to web process, and web process decodes
image from data, generates images with different sizes, combines them into
one ico image and sends back image data to UI
process. To make the process more safe, this patch makes web process send
images (bitmaps) with different sizes to UI
process, and UI process is responsible for combining them into an ico image.
* Source/WebCore/platform/graphics/ImageAdapter.h:
(WebCore::ImageAdapter::image const):
* Source/WebCore/platform/graphics/ImageUtilities.h:
* Source/WebCore/platform/graphics/ShareableBitmap.cpp:
(WebCore::ShareableBitmap::createFromImageDraw):
* Source/WebCore/platform/graphics/ShareableBitmap.h:
* Source/WebCore/platform/graphics/cg/ImageUtilitiesCG.cpp:
(WebCore::createBitmapsFromNativeImage):
(WebCore::createNativeImageFromSVGImage):
(WebCore::createBitmapsFromSVGImage):
(WebCore::createBitmapsFromImageData):
(WebCore::createIconDataFromBitmaps):
(WebCore::expandNativeImageToData): Deleted.
(WebCore::expandSVGImageToData): Deleted.
(WebCore::createIconDataFromImageData): Deleted.
* Source/WebKit/UIProcess/Cocoa/WebPageProxyCocoa.mm:
(WebKit::WebPageProxy::createIconDataFromImageData):
* Source/WebKit/WebProcess/WebPage/Cocoa/WebPageCocoa.mm:
(WebKit::WebPage::createBitmapsFromImageData):
(WebKit::WebPage::createIconDataFromImageData): Deleted.
* Source/WebKit/WebProcess/WebPage/WebPage.h:
* Source/WebKit/WebProcess/WebPage/WebPage.messages.in:
* Tools/TestWebKitAPI/TestWebKitAPI.xcodeproj/project.pbxproj:
* Tools/TestWebKitAPI/Tests/WebKit/icon-svg-16.tiff: Added.
* Tools/TestWebKitAPI/Tests/WebKit/icon-svg-256.tiff: Added.
* Tools/TestWebKitAPI/Tests/WebKitCocoa/LoadAndDecodeImage.mm:
(TestWebKitAPI::tiffRepresentation):
(TestWebKitAPI::TEST(WebKit, CreateIconDataFromImageDataSVG)):
Canonical link: https://commits.webkit.org/293430@main
Canonical link: https://commits.webkit.org/[email protected]
Commit: a94c0a2b69c648336bbb7c824f953232a71e8796
https://github.com/WebKit/WebKit/commit/a94c0a2b69c648336bbb7c824f953232a71e8796
Author: Matthieu Dubet <[email protected]>
Date: 2025-04-17 (Thu, 17 Apr 2025)
Changed paths:
M Source/WebCore/css/CSSStyleRule.cpp
M Source/WebCore/css/CSSStyleSheet.cpp
Log Message:
-----------
Cherry-pick 79a886fb157b. rdar://147446595
[CSS] Clear StyleSheetContents hasNestingRuleCache on any rule mutation
https://bugs.webkit.org/show_bug.cgi?id=291695
rdar://147446595
Reviewed by Antti Koivisto.
Currently only CSSStyleRule::insertRule() API clear the cache,
however we can also insert a first StyleRuleWithNesting directly at the
top level which will use CSSStyleSheet::insertRule() or
inside a group rule (like @media) which would go
through CSSGroupingRule::insertRule().
We already have a mechanism to deal with any rule mutation
(RuleMutationScope),
let's use it to clear hasNestingRulesCache.
* Source/WebCore/css/CSSStyleRule.cpp:
(WebCore::CSSStyleRule::insertRule):
* Source/WebCore/css/CSSStyleSheet.cpp:
(WebCore::CSSStyleSheet::RuleMutationScope::~RuleMutationScope):
Canonical link: https://commits.webkit.org/293824@main
Commit: 837878297b853cb019c9ae9fccb7e18b1bb0978c
https://github.com/WebKit/WebKit/commit/837878297b853cb019c9ae9fccb7e18b1bb0978c
Author: Mohsin Qureshi <[email protected]>
Date: 2025-04-18 (Fri, 18 Apr 2025)
Changed paths:
M Configurations/Version.xcconfig
Log Message:
-----------
Versioning.
WebKit-7621.2.5.11.3
Canonical link: https://commits.webkit.org/[email protected]
Commit: 05c1df286f2a5cdc0ce04971d18259e1f7ad6268
https://github.com/WebKit/WebKit/commit/05c1df286f2a5cdc0ce04971d18259e1f7ad6268
Author: Youenn Fablet <[email protected]>
Date: 2025-04-18 (Fri, 18 Apr 2025)
Changed paths:
M LayoutTests/platform/ios/TestExpectations
A LayoutTests/webrtc/getDisplayMedia-odd-size-expected.txt
A LayoutTests/webrtc/getDisplayMedia-odd-size.html
M Source/WebCore/platform/cocoa/SharedVideoFrameInfo.mm
Log Message:
-----------
Cherry-pick 4dd862e5ce1c. rdar://149383110
Google Meet is sometimes encoding black frames from a getDisplayMedia track
rdar://149383110
https://bugs.webkit.org/show_bug.cgi?id=291626
Reviewed by Chris Dumez.
There is sometimes a mismatch in the width/height of plane B of a memory
pixel buffer in web process and an IO surface pixel buffer in GPU process.
This happens in particular for getDisplayMedia frames when the width or
height is odd.
In that case, planeB rounding may be different.
We would previously fail the creation of the memory pixel buffer in web
process, which would trigger black frame encoding when SW VP8 is used.
The added test covers odd sizes for getDisplayMedia tracks but it does not
reproduce the specific configuration of ScreenCaptureKit pixel buffers.
Manually tested.
* LayoutTests/platform/ios/TestExpectations:
* LayoutTests/webrtc/getDisplayMedia-odd-size-expected.txt: Added.
* LayoutTests/webrtc/getDisplayMedia-odd-size.html: Added.
* Source/WebCore/platform/cocoa/SharedVideoFrameInfo.mm:
(WebCore::SharedVideoFrameInfo::createPixelBufferFromMemory):
Canonical link: https://commits.webkit.org/293784@main
Commit: a3ed1fac02b82ccaf4e1c988a23df6acdb0b15c6
https://github.com/WebKit/WebKit/commit/a3ed1fac02b82ccaf4e1c988a23df6acdb0b15c6
Author: Daniel Liu <[email protected]>
Date: 2025-04-18 (Fri, 18 Apr 2025)
Changed paths:
A JSTests/wasm/stress/initialize-100k-functions.js
A JSTests/wasm/stress/initialize-100k-functions.wasm
M Source/JavaScriptCore/wasm/WasmFunctionCodeBlockGenerator.h
M Source/JavaScriptCore/wasm/WasmFunctionIPIntMetadataGenerator.h
M Source/JavaScriptCore/wasm/WasmIPIntGenerator.cpp
M Source/JavaScriptCore/wasm/WasmLLIntGenerator.cpp
Log Message:
-----------
Cherry-pick 16455b07fc9f. rdar://149554265
Cherry-pick 2faf0a6395f4. rdar://149554409
Clean up dead callee BitVector in LLInt/IPInt generators
https://bugs.webkit.org/show_bug.cgi?id=291699
rdar://149052721
Reviewed by Yijia Huang.
Previously, we used this BitVector to track external functions, but now
it is no
longer used by the code. We can remove this unnecessary allocation.
* JSTests/wasm/stress/initialize-100k-functions.js: Added.
(async main):
* JSTests/wasm/stress/initialize-100k-functions.wasm: Added.
* Source/JavaScriptCore/wasm/WasmFunctionCodeBlockGenerator.h:
(JSC::Wasm::FunctionCodeBlockGenerator::tailCallSuccessors const):
(JSC::Wasm::FunctionCodeBlockGenerator::takeCallees): Deleted.
* Source/JavaScriptCore/wasm/WasmFunctionIPIntMetadataGenerator.h:
(JSC::Wasm::FunctionIPIntMetadataGenerator::takeCallees): Deleted.
* Source/JavaScriptCore/wasm/WasmIPIntGenerator.cpp:
(JSC::Wasm::IPIntGenerator::IPIntGenerator):
(JSC::Wasm::IPIntGenerator::addCall):
* Source/JavaScriptCore/wasm/WasmLLIntGenerator.cpp:
(JSC::Wasm::LLIntGenerator::LLIntGenerator):
(JSC::Wasm::LLIntGenerator::addCall):
Canonical link: https://commits.webkit.org/293831@main
Commit: caf1616010ea70f7944e437a35109ee5d4d9ae56
https://github.com/WebKit/WebKit/commit/caf1616010ea70f7944e437a35109ee5d4d9ae56
Author: Elijah Sawyers <[email protected]>
Date: 2025-04-18 (Fri, 18 Apr 2025)
Changed paths:
M
Source/WebKit/UIProcess/Extensions/Cocoa/API/WebExtensionContextAPIPermissionsCocoa.mm
M Tools/TestWebKitAPI/Tests/WebKitCocoa/WKWebExtensionAPIPermissions.mm
Log Message:
-----------
Cherry-pick 0ea6caec83cb. rdar://149249321
permissions.getAll() is wrong if all hosts and URLs access was granted with
implicit request
https://bugs.webkit.org/show_bug.cgi?id=291757
rdar://149249321
Reviewed by Timothy Hatcher.
Fix a bug where permissions.getAll() doesn't return the all hosts and URLs
match
pattern if access was granted through an implicit request.
To fix this, if none of the match patterns in the manifest match all hosts
and
URLs, but access has been granted, return the match pattern.
Wrote a new test to validate the fix.
*
Source/WebKit/UIProcess/Extensions/Cocoa/API/WebExtensionContextAPIPermissionsCocoa.mm:
(WebKit::WebExtensionContext::permissionsGetAll):
* Tools/TestWebKitAPI/Tests/WebKitCocoa/WKWebExtensionAPIPermissions.mm:
(TestWebKitAPI::TEST(WKWebExtensionAPIPermissions,
ImplicitAllHostsAndURLsPermissions)):
Canonical link: https://commits.webkit.org/293872@main
Commit: cea49fc3f47374c8780de8cc3a12bbdce582ec68
https://github.com/WebKit/WebKit/commit/cea49fc3f47374c8780de8cc3a12bbdce582ec68
Author: Marcus Plutowski <[email protected]>
Date: 2025-04-21 (Mon, 21 Apr 2025)
Changed paths:
M Source/JavaScriptCore/runtime/OptionsList.h
Log Message:
-----------
[JSC] Disable DFG loop unrolling
https://bugs.webkit.org/show_bug.cgi?id=291852
rdar://147263376
Reviewed by Yijia Huang
This is known to cause compiler crashes; while a fix is in the pipeline,
we should disable it to prevent issues downstream.
* Source/JavaScriptCore/runtime/OptionsList.h:
Canonical link: https://commits.webkit.org/[email protected]
Commit: 43fb301f542124dcb9b0da8f5e026272ea77b260
https://github.com/WebKit/WebKit/commit/43fb301f542124dcb9b0da8f5e026272ea77b260
Author: Dan Robson <[email protected]>
Date: 2025-04-21 (Mon, 21 Apr 2025)
Changed paths:
M Configurations/Version.xcconfig
Log Message:
-----------
Versioning.
WebKit-7621.2.5.11.4
Canonical link: https://commits.webkit.org/[email protected]
Commit: 1b98d23bcab1108cc55c902ea90b8e48aed5c776
https://github.com/WebKit/WebKit/commit/1b98d23bcab1108cc55c902ea90b8e48aed5c776
Author: Dan Robson <[email protected]>
Date: 2025-04-24 (Thu, 24 Apr 2025)
Changed paths:
M Configurations/Version.xcconfig
Log Message:
-----------
Versioning.
WebKit-7621.2.5.11.5
Canonical link: https://commits.webkit.org/[email protected]
Commit: 9201c22a436be57fc8f74f1695c99d2110b16d3f
https://github.com/WebKit/WebKit/commit/9201c22a436be57fc8f74f1695c99d2110b16d3f
Author: Dan Robson <[email protected]>
Date: 2025-04-29 (Tue, 29 Apr 2025)
Changed paths:
M Configurations/Version.xcconfig
Log Message:
-----------
Versioning.
WebKit-7621.2.5.11.6
Canonical link: https://commits.webkit.org/[email protected]
Commit: 47150739e56af87ea54538236c912b1d1dfa72d7
https://github.com/WebKit/WebKit/commit/47150739e56af87ea54538236c912b1d1dfa72d7
Author: Mohsin Qureshi <[email protected]>
Date: 2025-05-02 (Fri, 02 May 2025)
Changed paths:
M Configurations/Version.xcconfig
Log Message:
-----------
Versioning.
WebKit-7621.2.5.11.7
Canonical link: https://commits.webkit.org/[email protected]
Commit: d0c8d2cde0447b890dbca881627ac45970dc349f
https://github.com/WebKit/WebKit/commit/d0c8d2cde0447b890dbca881627ac45970dc349f
Author: Matthew Finkel <[email protected]>
Date: 2025-05-03 (Sat, 03 May 2025)
Changed paths:
M LayoutTests/http/tests/cookies/resources/setCookies.cgi
A
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-expected.txt
A
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie-expected.txt
A
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie.html
A
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie.html
A
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect-expected.txt
A
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect.html
A
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https-expected.txt
A
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https.html
A
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party-expected.txt
A
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party.html
A
LayoutTests/http/tests/workers/service/resources/basic-install-event-waitUntil-resolve-worker-then-fetch.js
M Source/WebKit/NetworkProcess/cocoa/NetworkTaskCocoa.mm
M Tools/TestWebKitAPI/Tests/WebKitCocoa/ResourceLoadStatistics.mm
Log Message:
-----------
WebKit accepts some unpartitioned third party cookies when third-party cookie
blocking is enabled
https://bugs.webkit.org/show_bug.cgi?id=292371
rdar://149535707
Before 288413@main, Apple platforms blocked all third-party cookies by default.
In that commit, we enabled CHIPS (opt-in partitioned cookies), and that
required allowing partitioned third-party cookies while rejecting unpartitioned
cookies. This change closes a hole in the mechanism for rejecting unpartitioned
third-party cookies. It relies on a callback we receive before cookies are
stored, and we filter any cookies that should not be allowed.
We may land a different fix later or fix this in an underlying framework.
Adding some new tests that cover setting cross-site cookies in various
situations.
* LayoutTests/http/tests/cookies/resources/setCookies.cgi:
*
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-expected.txt:
Added.
*
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie-expected.txt:
Added.
*
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie.html:
Added.
*
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie.html:
Added.
*
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect-expected.txt:
Added.
*
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect.html:
Added.
*
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https-expected.txt:
Added.
*
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https.html:
Added.
*
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party-expected.txt:
Added.
*
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party.html:
Added.
*
LayoutTests/http/tests/workers/service/resources/basic-install-event-waitUntil-resolve-worker-then-fetch.js:
Added.
(event.event.waitUntil.new.Promise):
(event.then.r.r.text.then):
* Source/WebKit/NetworkProcess/cocoa/NetworkTaskCocoa.mm:
(WebKit::NetworkTaskCocoa::setCookieTransformForThirdPartyRequest):
(WebKit::NetworkTaskCocoa::willPerformHTTPRedirection):
* Tools/TestWebKitAPI/Tests/WebKitCocoa/ResourceLoadStatistics.mm:
(TEST(ResourceLoadStatistics, BlockUnpartitionedThirdPartyCookies)):
(TEST(ResourceLoadStatistics,
BlockUnpartitionedAndAllowPartitionedThirdPartyCookies)):
(cherry picked from commit 33c7a2a083291d97d1437e2a8176db55103f22c2)
Commit: 8d30a02d6614c5412d2245c28c2694c0f7cb4cd8
https://github.com/WebKit/WebKit/commit/8d30a02d6614c5412d2245c28c2694c0f7cb4cd8
Author: Mohsin Qureshi <[email protected]>
Date: 2025-05-03 (Sat, 03 May 2025)
Changed paths:
M LayoutTests/http/tests/cookies/resources/setCookies.cgi
R
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-expected.txt
R
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie-expected.txt
R
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie.html
R
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie.html
R
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect-expected.txt
R
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect.html
R
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https-expected.txt
R
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https.html
R
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party-expected.txt
R
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party.html
R
LayoutTests/http/tests/workers/service/resources/basic-install-event-waitUntil-resolve-worker-then-fetch.js
M Source/WebKit/NetworkProcess/cocoa/NetworkTaskCocoa.mm
M Tools/TestWebKitAPI/Tests/WebKitCocoa/ResourceLoadStatistics.mm
Log Message:
-----------
Revert "WebKit accepts some unpartitioned third party cookies when
third-party cookie blocking is enabled"
This reverts commit d0c8d2cde0447b890dbca881627ac45970dc349f.
Commit: 29e7c77e4707af1854d17b1f9aab4c3ce4a30d40
https://github.com/WebKit/WebKit/commit/29e7c77e4707af1854d17b1f9aab4c3ce4a30d40
Author: Matthew Finkel <[email protected]>
Date: 2025-05-03 (Sat, 03 May 2025)
Changed paths:
M LayoutTests/http/tests/cookies/resources/setCookies.cgi
A
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-expected.txt
A
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie-expected.txt
A
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie.html
A
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie.html
A
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect-expected.txt
A
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect.html
A
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https-expected.txt
A
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https.html
A
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party-expected.txt
A
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party.html
A
LayoutTests/http/tests/workers/service/resources/basic-install-event-waitUntil-resolve-worker-then-fetch.js
M Source/WTF/Scripts/Preferences/UnifiedWebPreferences.yaml
M Tools/TestWebKitAPI/Tests/WebKitCocoa/ResourceLoadStatistics.mm
Log Message:
-----------
Cherry-pick 8c26876e5fb1. rdar://150597487
Cherry-pick d34e63ea0dd6. rdar://150597487
[cocoa] Disable CHIPS
https://bugs.webkit.org/show_bug.cgi?id=292371
rdar://149535707
Reviewed by Wenson Hsieh and Alex Christensen.
Before 288413@main, Apple platforms blocked all third-party cookies by
default.
In that commit, we enabled CHIPS (opt-in partitioned cookies), and that
required allowing partitioned third-party cookies while rejecting
unpartitioned
cookies. The mechanism for rejecting unpartitioned third-party cookies
is incomplete,
so this change disables CHIPS and returns to the previous shipping
behavior.
We may land a different fix later or fix this in an underlying
framework.
Adding some new tests that cover setting cross-site cookies in various
situations.
* LayoutTests/http/tests/cookies/resources/setCookies.cgi:
*
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-expected.txt:
Added.
*
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie-expected.txt:
Added.
*
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie-preexisting-cookie.html:
Added.
*
LayoutTests/http/tests/navigation/ping-attribute/cross-site-url-anchor-cookie.html:
Added.
*
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect-expected.txt:
Added.
*
LayoutTests/http/tests/resourceLoadStatistics/only-partitioned-cookies-after-redirect.html:
Added.
*
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https-expected.txt:
Added.
*
LayoutTests/http/tests/websocket/tests/hybi/websocket-allowed-setting-cookie-as-third-party-with-third-party-cookie-blocking.https.html:
Added.
*
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party-expected.txt:
Added.
*
LayoutTests/http/tests/workers/service/basic-install-event-sw-fetch-third-party.html:
Added.
*
LayoutTests/http/tests/workers/service/resources/basic-install-event-waitUntil-resolve-worker-then-fetch.js:
Added.
(event.event.waitUntil.new.Promise):
(event.then.r.r.text.then):
* Source/WTF/Scripts/Preferences/UnifiedWebPreferences.yaml:
* Tools/TestWebKitAPI/Tests/WebKitCocoa/ResourceLoadStatistics.mm:
(TEST(ResourceLoadStatistics, BlockUnpartitionedThirdPartyCookies)):
(TEST(ResourceLoadStatistics,
BlockUnpartitionedAndAllowPartitionedThirdPartyCookies)):
(cherry picked from commit d34e63ea0dd698ef0d3a3d779fbdfae02526126c)
Canonical link:
https://commits.webkit.org/[email protected]
Commit: 2432e747ec383181f9eb28f3a2ff3de002f56a39
https://github.com/WebKit/WebKit/commit/2432e747ec383181f9eb28f3a2ff3de002f56a39
Author: Mohsin Qureshi <[email protected]>
Date: 2025-05-03 (Sat, 03 May 2025)
Changed paths:
M Configurations/Version.xcconfig
Log Message:
-----------
Versioning.
WebKit-7621.2.5.11.8
Canonical link: https://commits.webkit.org/[email protected]
Commit: 22c049414bba674d5491f88152f70c3a2c2372a1
https://github.com/WebKit/WebKit/commit/22c049414bba674d5491f88152f70c3a2c2372a1
Author: Jonathan Bedard <[email protected]>
Date: 2025-05-03 (Sat, 03 May 2025)
Changed paths:
A
LayoutTests/platform/ios/imported/w3c/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/audioworklet-denormals.https.window-expected.txt
M LayoutTests/platform/mac/TestExpectations
R LayoutTests/webaudio/audoworklet-denormal-float-values-expected.txt
R LayoutTests/webaudio/audoworklet-denormal-float-values.html
M Source/WTF/wtf/PlatformHave.h
M Source/WebCore/Sources.txt
M Source/WebCore/WebCore.xcodeproj/project.pbxproj
R Source/WebCore/platform/audio/DenormalDisabler.cpp
M Source/WebCore/platform/audio/DenormalDisabler.h
Log Message:
-----------
Cherry-pick 95b5c23d504e. rdar://150598921
Unreviewed, reverting 43@safari-7621-branch (c1b04541303e)
rdar://149063743
REGRESSION(289651.43@safari-7621-branch): has introduced a JIT bug
Reverted change:
Enable Denormal Disabling on ARM platforms
https://bugs.webkit.org/show_bug.cgi?id=286694
rdar://141366322
289651.43@safari-7621-branch (c1b04541303e)
Canonical link: https://commits.webkit.org/289651.477@safari-7621-branch
Compare: https://github.com/WebKit/WebKit/compare/5619b4fc324e%5E...22c049414bba
To unsubscribe from these emails, change your notification settings at
https://github.com/WebKit/WebKit/settings/notifications
_______________________________________________
webkit-changes mailing list
[email protected]
https://lists.webkit.org/mailman/listinfo/webkit-changes