Changeset 273183 in webkit
- Timestamp:
- Feb 19, 2021 4:46:44 PM (3 years ago)
- Location:
- trunk/Source
- Files:
-
- 33 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/Source/WebCore/ChangeLog
r273167 r273183 1 2021-02-19 Chris Dumez <cdumez@apple.com> 2 3 Make format of release logging more consistent to facilitate grepping 4 https://bugs.webkit.org/show_bug.cgi?id=222200 5 6 Reviewed by Simon Fraser. 7 8 * loader/DocumentLoader.cpp: 9 (WebCore::DocumentLoader::setMainDocumentError): 10 (WebCore::DocumentLoader::mainReceivedError): 11 (WebCore::DocumentLoader::notifyFinished): 12 (WebCore::DocumentLoader::continueAfterContentPolicy): 13 (WebCore::DocumentLoader::startLoadingMainResource): 14 (WebCore::DocumentLoader::cancelMainResourceLoad): 15 * loader/SubresourceLoader.cpp: 16 (WebCore::SubresourceLoader::didFail): 17 (WebCore::SubresourceLoader::willCancel): 18 * workers/service/ServiceWorker.cpp: 19 (WebCore::ServiceWorker::ServiceWorker): 20 (WebCore::ServiceWorker::updateState): 21 * workers/service/ServiceWorkerContainer.cpp: 22 (WebCore::ServiceWorkerContainer::addRegistration): 23 (WebCore::ServiceWorkerContainer::updateRegistration): 24 (WebCore::ServiceWorkerContainer::jobResolvedWithRegistration): 25 * workers/service/ServiceWorkerRegistration.cpp: 26 (WebCore::ServiceWorkerRegistration::ServiceWorkerRegistration): 27 * workers/service/server/SWServerJobQueue.cpp: 28 (WebCore::SWServerJobQueue::scriptFetchFinished): 29 (WebCore::SWServerJobQueue::didResolveRegistrationPromise): 30 1 31 2021-02-16 Jiewen Tan <jiewen_tan@apple.com> 2 32 -
trunk/Source/WebCore/loader/DocumentLoader.cpp
r272707 r273183 255 255 { 256 256 if (!error.isNull()) 257 RELEASE_LOG_IF_ALLOWED("setMainDocumentError: (type = %d, code =%d)", static_cast<int>(error.type()), error.errorCode());257 RELEASE_LOG_IF_ALLOWED("setMainDocumentError: (type=%d, code=%d)", static_cast<int>(error.type()), error.errorCode()); 258 258 259 259 m_mainDocumentError = error; … … 269 269 270 270 if (!error.isNull()) 271 RELEASE_LOG_IF_ALLOWED("mainReceivedError: (type = %d, code =%d)", static_cast<int>(error.type()), error.errorCode());271 RELEASE_LOG_IF_ALLOWED("mainReceivedError: (type=%d, code=%d)", static_cast<int>(error.type()), error.errorCode()); 272 272 273 273 if (m_identifierForLoadWithoutResourceLoader) { … … 432 432 433 433 if (!m_mainResource->resourceError().isNull()) 434 RELEASE_LOG_IF_ALLOWED("notifyFinished: canceling load (type = %d, code =%d)", static_cast<int>(m_mainResource->resourceError().type()), m_mainResource->resourceError().errorCode());434 RELEASE_LOG_IF_ALLOWED("notifyFinished: canceling load (type=%d, code=%d)", static_cast<int>(m_mainResource->resourceError().type()), m_mainResource->resourceError().errorCode()); 435 435 436 436 mainReceivedError(m_mainResource->resourceError()); … … 1006 1006 1007 1007 if (!m_frame) { 1008 RELEASE_LOG_IF_ALLOWED("continueAfterContentPolicy: Policy action%i received by DocumentLoader with null frame", (int)policy);1008 RELEASE_LOG_IF_ALLOWED("continueAfterContentPolicy: policyAction=%i received by DocumentLoader with null frame", (int)policy); 1009 1009 return; 1010 1010 } … … 1934 1934 matchRegistration(url, [request = WTFMove(request), protectedThis = WTFMove(protectedThis), this] (auto&& registrationData) mutable { 1935 1935 if (!m_mainDocumentError.isNull()) { 1936 RELEASE_LOG_IF_ALLOWED("startLoadingMainResource callback: Load canceled because of main document error (type = %d, code =%d)", static_cast<int>(m_mainDocumentError.type()), m_mainDocumentError.errorCode());1936 RELEASE_LOG_IF_ALLOWED("startLoadingMainResource callback: Load canceled because of main document error (type=%d, code=%d)", static_cast<int>(m_mainDocumentError.type()), m_mainDocumentError.errorCode()); 1937 1937 return; 1938 1938 } … … 2081 2081 ResourceError error = resourceError.isNull() ? frameLoader()->cancelledError(m_request) : resourceError; 2082 2082 2083 RELEASE_LOG_IF_ALLOWED("cancelMainResourceLoad: (type = %d, code =%d)", static_cast<int>(error.type()), error.errorCode());2083 RELEASE_LOG_IF_ALLOWED("cancelMainResourceLoad: (type=%d, code=%d)", static_cast<int>(error.type()), error.errorCode()); 2084 2084 2085 2085 m_dataLoadToken.clear(); -
trunk/Source/WebCore/loader/SubresourceLoader.cpp
r272313 r273183 755 755 void SubresourceLoader::didFail(const ResourceError& error) 756 756 { 757 RELEASE_LOG_IF_ALLOWED("didFail: (type = %d, code =%d)", static_cast<int>(error.type()), error.errorCode());757 RELEASE_LOG_IF_ALLOWED("didFail: (type=%d, code=%d)", static_cast<int>(error.type()), error.errorCode()); 758 758 759 759 #if USE(QUICK_LOOK) … … 793 793 void SubresourceLoader::willCancel(const ResourceError& error) 794 794 { 795 RELEASE_LOG_IF_ALLOWED("willCancel: (type = %d, code =%d)", static_cast<int>(error.type()), error.errorCode());795 RELEASE_LOG_IF_ALLOWED("willCancel: (type=%d, code=%d)", static_cast<int>(error.type()), error.errorCode()); 796 796 797 797 #if PLATFORM(IOS_FAMILY) -
trunk/Source/WebCore/workers/service/ServiceWorker.cpp
r253812 r273183 71 71 updatePendingActivityForEventDispatch(); 72 72 73 WORKER_RELEASE_LOG_IF_ALLOWED(" ServiceWorker: ID: %llu, state:%hhu", identifier().toUInt64(), m_data.state);73 WORKER_RELEASE_LOG_IF_ALLOWED("serviceWorkerID=%llu, state=%hhu", identifier().toUInt64(), m_data.state); 74 74 } 75 75 … … 82 82 void ServiceWorker::updateState(State state) 83 83 { 84 WORKER_RELEASE_LOG_IF_ALLOWED("updateState: Updating service worker %llu state from %hhu to %hhu. Registration ID:%llu", identifier().toUInt64(), m_data.state, state, registrationIdentifier().toUInt64());84 WORKER_RELEASE_LOG_IF_ALLOWED("updateState: Updating service worker %llu state from %hhu to %hhu. registrationID=%llu", identifier().toUInt64(), m_data.state, state, registrationIdentifier().toUInt64()); 85 85 m_data.state = state; 86 86 if (state != State::Installing && !m_isStopped) { -
trunk/Source/WebCore/workers/service/ServiceWorkerContainer.cpp
r269997 r273183 181 181 } 182 182 183 CONTAINER_RELEASE_LOG_IF_ALLOWED("addRegistration: Registering service worker. Job ID:%" PRIu64, jobData.identifier().jobIdentifier.toUInt64());183 CONTAINER_RELEASE_LOG_IF_ALLOWED("addRegistration: Registering service worker. jobID=%" PRIu64, jobData.identifier().jobIdentifier.toUInt64()); 184 184 185 185 jobData.clientCreationURL = context->url(); … … 226 226 jobData.scriptURL = scriptURL; 227 227 228 CONTAINER_RELEASE_LOG_IF_ALLOWED("removeRegistration: Updating service worker. Job ID:%" PRIu64, jobData.identifier().jobIdentifier.toUInt64());228 CONTAINER_RELEASE_LOG_IF_ALLOWED("removeRegistration: Updating service worker. jobID=%" PRIu64, jobData.identifier().jobIdentifier.toUInt64()); 229 229 230 230 scheduleJob(makeUnique<ServiceWorkerJob>(*this, WTFMove(promise), WTFMove(jobData))); … … 393 393 auto registration = ServiceWorkerRegistration::getOrCreate(*scriptExecutionContext(), *this, WTFMove(data)); 394 394 395 CONTAINER_RELEASE_LOG_IF_ALLOWED("jobResolvedWithRegistration: Resolving promise for job %" PRIu64 ". Registration ID:%" PRIu64, jobIdentifier.toUInt64(), registration->identifier().toUInt64());395 CONTAINER_RELEASE_LOG_IF_ALLOWED("jobResolvedWithRegistration: Resolving promise for job %" PRIu64 ". registrationID=%" PRIu64, jobIdentifier.toUInt64(), registration->identifier().toUInt64()); 396 396 397 397 if (shouldNotifyWhenResolved == ShouldNotifyWhenResolved::Yes) { -
trunk/Source/WebCore/workers/service/ServiceWorkerRegistration.cpp
r260709 r273183 72 72 m_activeWorker = ServiceWorker::getOrCreate(context, WTFMove(*m_registrationData.activeWorker)); 73 73 74 REGISTRATION_RELEASE_LOG_IF_ALLOWED("ServiceWorkerRegistration: ID %llu, installing : %llu, waiting: %llu, active:%llu", identifier().toUInt64(), m_installingWorker ? m_installingWorker->identifier().toUInt64() : 0, m_waitingWorker ? m_waitingWorker->identifier().toUInt64() : 0, m_activeWorker ? m_activeWorker->identifier().toUInt64() : 0);74 REGISTRATION_RELEASE_LOG_IF_ALLOWED("ServiceWorkerRegistration: ID %llu, installing=%llu, waiting=%llu, active=%llu", identifier().toUInt64(), m_installingWorker ? m_installingWorker->identifier().toUInt64() : 0, m_waitingWorker ? m_waitingWorker->identifier().toUInt64() : 0, m_activeWorker ? m_activeWorker->identifier().toUInt64() : 0); 75 75 76 76 m_container->addRegistration(*this); -
trunk/Source/WebCore/workers/service/server/SWServerJobQueue.cpp
r265282 r273183 102 102 // text, then: 103 103 if (newestWorker && equalIgnoringFragmentIdentifier(newestWorker->scriptURL(), job.scriptURL) && result.script == newestWorker->script() && doCertificatesMatch(result.certificateInfo, newestWorker->certificateInfo())) { 104 RELEASE_LOG(ServiceWorker, "%p - SWServerJobQueue::scriptFetchFinished, script and certificate are matching for registration ID:%llu", this, registration->identifier().toUInt64());104 RELEASE_LOG(ServiceWorker, "%p - SWServerJobQueue::scriptFetchFinished, script and certificate are matching for registrationID=%llu", this, registration->identifier().toUInt64()); 105 105 // FIXME: for non classic scripts, check the script’s module record's [[ECMAScriptCode]]. 106 106 … … 186 186 } 187 187 188 RELEASE_LOG(ServiceWorker, "%p - SWServerJobQueue::didResolveRegistrationPromise: Registration ID:%llu. Now proceeding with install", this, registration->identifier().toUInt64());188 RELEASE_LOG(ServiceWorker, "%p - SWServerJobQueue::didResolveRegistrationPromise: RegistrationID=%llu. Now proceeding with install", this, registration->identifier().toUInt64()); 189 189 190 190 // Queue a task to fire an event named updatefound at all the ServiceWorkerRegistration objects -
trunk/Source/WebKit/ChangeLog
r273181 r273183 1 2021-02-19 Chris Dumez <cdumez@apple.com> 2 3 Make format of release logging more consistent to facilitate grepping 4 https://bugs.webkit.org/show_bug.cgi?id=222200 5 6 Reviewed by Simon Fraser. 7 8 * NetworkProcess/NetworkCORSPreflightChecker.cpp: 9 (WebKit::NetworkCORSPreflightChecker::didCompleteWithError): 10 * NetworkProcess/NetworkLoadChecker.cpp: 11 (WebKit::NetworkLoadChecker::checkCORSRequestWithPreflight): 12 * NetworkProcess/NetworkProcess.cpp: 13 (WebKit::NetworkProcess::didReceiveMessage): 14 (WebKit::NetworkProcess::didReceiveSyncMessage): 15 (WebKit::NetworkProcess::initializeNetworkProcess): 16 (WebKit::NetworkProcess::prepareToSuspend): 17 * NetworkProcess/PingLoad.cpp: 18 (WebKit::PingLoad::didReceiveResponse): 19 (WebKit::PingLoad::didCompleteWithError): 20 * NetworkProcess/PreconnectTask.cpp: 21 (WebKit::PreconnectTask::didFailLoading): 22 * NetworkProcess/ServiceWorker/WebSWServerConnection.cpp: 23 (WebKit::WebSWServerConnection::startFetch): 24 * NetworkProcess/cocoa/NetworkDataTaskCocoa.mm: 25 (WebKit::NetworkDataTaskCocoa::NetworkDataTaskCocoa): 26 (WebKit::NetworkDataTaskCocoa::willPerformHTTPRedirection): 27 * Platform/IPC/Connection.cpp: 28 (IPC::Connection::waitForSyncReply): 29 * UIProcess/ApplicationStateTracker.mm: 30 (WebKit::ApplicationStateTracker::ApplicationStateTracker): 31 * UIProcess/AuxiliaryProcessProxy.cpp: 32 (WebKit::AuxiliaryProcessProxy::terminate): 33 * UIProcess/ProcessThrottler.cpp: 34 (WebKit::ProcessThrottler::setAssertionType): 35 (WebKit::ProcessThrottler::updateAssertionIfNeeded): 36 (WebKit::ProcessThrottler::sendPrepareToSuspendIPC): 37 * UIProcess/ProvisionalPageProxy.cpp: 38 (WebKit::ProvisionalPageProxy::ProvisionalPageProxy): 39 (WebKit::ProvisionalPageProxy::processDidTerminate): 40 (WebKit::ProvisionalPageProxy::cancel): 41 (WebKit::ProvisionalPageProxy::loadData): 42 (WebKit::ProvisionalPageProxy::loadRequest): 43 (WebKit::ProvisionalPageProxy::goToBackForwardItem): 44 (WebKit::ProvisionalPageProxy::didCreateMainFrame): 45 (WebKit::ProvisionalPageProxy::didStartProvisionalLoadForFrame): 46 (WebKit::ProvisionalPageProxy::didFailProvisionalLoadForFrame): 47 (WebKit::ProvisionalPageProxy::didCommitLoadForFrame): 48 (WebKit::ProvisionalPageProxy::didCreateContextForVisibilityPropagation): 49 * UIProcess/WebBackForwardCache.cpp: 50 (WebKit::WebBackForwardCache::addEntry): 51 (WebKit::WebBackForwardCache::removeEntry): 52 (WebKit::WebBackForwardCache::takeSuspendedPage): 53 * UIProcess/WebBackForwardCacheEntry.cpp: 54 (WebKit::WebBackForwardCacheEntry::expirationTimerFired): 55 * UIProcess/WebPageProxy.cpp: 56 (WebKit::WebPageProxy::receivedNavigationPolicyDecision): 57 (WebKit::WebPageProxy::commitProvisionalPage): 58 (WebKit::WebPageProxy::continueNavigationInNewProcess): 59 (WebKit::WebPageProxy::didStartProvisionalLoadForFrameShared): 60 (WebKit::WebPageProxy::didReceiveServerRedirectForProvisionalLoadForFrameShared): 61 (WebKit::WebPageProxy::willPerformClientRedirectForFrame): 62 (WebKit::WebPageProxy::didCancelClientRedirectForFrame): 63 (WebKit::WebPageProxy::didFailProvisionalLoadForFrameShared): 64 (WebKit::WebPageProxy::didCommitLoadForFrame): 65 (WebKit::WebPageProxy::didFinishDocumentLoadForFrame): 66 (WebKit::WebPageProxy::didFinishLoadForFrame): 67 (WebKit::WebPageProxy::didFailLoadForFrame): 68 (WebKit::WebPageProxy::didSameDocumentNavigationForFrame): 69 (WebKit::WebPageProxy::decidePolicyForNavigationAction): 70 (WebKit::WebPageProxy::didPerformClientRedirectShared): 71 (WebKit::WebPageProxy::dispatchProcessDidTerminate): 72 * UIProcess/WebProcessPool.cpp: 73 (WebKit::WebProcessPool::gpuProcessCrashed): 74 * UIProcess/WebProcessProxy.cpp: 75 (WebKit::WebProcessProxy::updateServiceWorkerProcessAssertion): 76 * UIProcess/ios/ProcessAssertionIOS.mm: 77 (-[WKProcessAssertionBackgroundTaskManager _updateBackgroundTask]): 78 (-[WKProcessAssertionBackgroundTaskManager _handleBackgroundTaskExpiration]): 79 (-[WKProcessAssertionBackgroundTaskManager _handleBackgroundTaskExpirationOnMainThread]): 80 (WebKit::ProcessAssertion::ProcessAssertion): 81 (WebKit::ProcessAssertion::~ProcessAssertion): 82 (WebKit::ProcessAssertion::processAssertionWasInvalidated): 83 * UIProcess/ios/WKApplicationStateTrackingView.mm: 84 (-[WKApplicationStateTrackingView willMoveToWindow:]): 85 (-[WKApplicationStateTrackingView didMoveToWindow]): 86 * UIProcess/ios/WKContentView.mm: 87 (-[WKContentView _setupVisibilityPropagationView]): 88 (-[WKContentView _setupVisibilityPropagationViewForGPUProcess]): 89 * WebAuthnProcess/WebAuthnProcess.cpp: 90 (WebKit::WebAuthnProcess::prepareToSuspend): 91 * WebProcess/WebCoreSupport/WebResourceLoadObserver.cpp: 92 (WebKit::WebResourceLoadObserver::logUserInteractionWithReducedTimeResolution): 93 * WebProcess/WebPage/WebPage.cpp: 94 (WebKit::WebPage::didReceivePolicyDecision): 95 * WebProcess/WebProcess.cpp: 96 (WebKit::WebProcess::initializeWebProcess): 97 (WebKit::WebProcess::prepareToSuspend): 98 * WebProcess/cocoa/WebProcessCocoa.mm: 99 (WebKit::WebProcess::updateProcessName): 100 (WebKit::WebProcess::updateFreezerStatus): 101 1 102 2021-02-19 Alex Christensen <achristensen@webkit.org> 2 103 -
trunk/Source/WebKit/NetworkProcess/NetworkCORSPreflightChecker.cpp
r258052 r273183 138 138 } 139 139 140 RELEASE_LOG_IF_ALLOWED("didComplete http_status_code :%d", m_response.httpStatusCode());140 RELEASE_LOG_IF_ALLOWED("didComplete http_status_code=%d", m_response.httpStatusCode()); 141 141 142 142 auto result = validatePreflightResponse(m_parameters.originalRequest, m_response, m_parameters.storedCredentialsPolicy, m_parameters.sourceOrigin, m_networkResourceLoader.get()); -
trunk/Source/WebKit/NetworkProcess/NetworkLoadChecker.cpp
r272313 r273183 443 443 }; 444 444 m_corsPreflightChecker = makeUnique<NetworkCORSPreflightChecker>(m_networkProcess.get(), m_networkResourceLoader.get(), WTFMove(parameters), m_shouldCaptureExtraNetworkLoadMetrics, [this, request = WTFMove(request), handler = WTFMove(handler), isRedirected = isRedirected()](auto&& error) mutable { 445 RELEASE_LOG_IF_ALLOWED("checkCORSRequestWithPreflight - makeCrossOriginAccessRequestWithPreflight preflight complete, success : %d forRedirect?%d", error.isNull(), isRedirected);445 RELEASE_LOG_IF_ALLOWED("checkCORSRequestWithPreflight - makeCrossOriginAccessRequestWithPreflight preflight complete, success=%d forRedirect=%d", error.isNull(), isRedirected); 446 446 447 447 if (!error.isNull()) { -
trunk/Source/WebKit/NetworkProcess/NetworkProcess.cpp
r273133 r273183 217 217 ASSERT(parentProcessConnection() == &connection); 218 218 if (parentProcessConnection() != &connection) { 219 WTFLogAlways("Ignored message '%s' because it did not come from the UIProcess (destination :%" PRIu64 ")", description(decoder.messageName()), decoder.destinationID());219 WTFLogAlways("Ignored message '%s' because it did not come from the UIProcess (destination=%" PRIu64 ")", description(decoder.messageName()), decoder.destinationID()); 220 220 ASSERT_NOT_REACHED(); 221 221 return; … … 244 244 ASSERT(parentProcessConnection() == &connection); 245 245 if (parentProcessConnection() != &connection) { 246 WTFLogAlways("Ignored message '%s' because it did not come from the UIProcess (destination :%" PRIu64 ")", description(decoder.messageName()), decoder.destinationID());246 WTFLogAlways("Ignored message '%s' because it did not come from the UIProcess (destination=%" PRIu64 ")", description(decoder.messageName()), decoder.destinationID()); 247 247 ASSERT_NOT_REACHED(); 248 248 return; … … 349 349 registerURLSchemeAsNoAccess(scheme); 350 350 351 RELEASE_LOG(Process, "%p - NetworkProcess::initializeNetworkProcess: Presenting process =%d", this, WebCore::presentingApplicationPID());351 RELEASE_LOG(Process, "%p - NetworkProcess::initializeNetworkProcess: Presenting processPID=%d", this, WebCore::presentingApplicationPID()); 352 352 } 353 353 … … 2193 2193 void NetworkProcess::prepareToSuspend(bool isSuspensionImminent, CompletionHandler<void()>&& completionHandler) 2194 2194 { 2195 RELEASE_LOG(ProcessSuspension, "%p - NetworkProcess::prepareToSuspend(), isSuspensionImminent :%d", this, isSuspensionImminent);2195 RELEASE_LOG(ProcessSuspension, "%p - NetworkProcess::prepareToSuspend(), isSuspensionImminent=%d", this, isSuspensionImminent); 2196 2196 2197 2197 #if PLATFORM(IOS_FAMILY) && ENABLE(INDEXED_DATABASE) -
trunk/Source/WebKit/NetworkProcess/PingLoad.cpp
r258052 r273183 163 163 void PingLoad::didReceiveResponse(ResourceResponse&& response, NegotiatedLegacyTLS, ResponseCompletionHandler&& completionHandler) 164 164 { 165 RELEASE_LOG_IF_ALLOWED("didReceiveResponse - httpStatusCode :%d", response.httpStatusCode());165 RELEASE_LOG_IF_ALLOWED("didReceiveResponse - httpStatusCode=%d", response.httpStatusCode()); 166 166 auto weakThis = makeWeakPtr(*this); 167 167 completionHandler(PolicyAction::Ignore); … … 182 182 RELEASE_LOG_IF_ALLOWED("didComplete"); 183 183 else 184 RELEASE_LOG_IF_ALLOWED("didCompleteWithError, error_code :%d", error.errorCode());184 RELEASE_LOG_IF_ALLOWED("didCompleteWithError, error_code=%d", error.errorCode()); 185 185 186 186 didFinish(error); -
trunk/Source/WebKit/NetworkProcess/PreconnectTask.cpp
r264846 r273183 87 87 void PreconnectTask::didFailLoading(const ResourceError& error) 88 88 { 89 RELEASE_LOG(Network, "%p - PreconnectTask::didFailLoading, error_code :%d", this, error.errorCode());89 RELEASE_LOG(Network, "%p - PreconnectTask::didFailLoading, error_code=%d", this, error.errorCode()); 90 90 didFinish(error); 91 91 } -
trunk/Source/WebKit/NetworkProcess/ServiceWorker/WebSWServerConnection.cpp
r260507 r273183 214 214 215 215 if (!success) { 216 SWSERVERCONNECTION_RELEASE_LOG_ERROR_IF_ALLOWED("startFetch: fetchIdentifier :%llu DidNotHandle because worker did not become activated", task->fetchIdentifier().toUInt64());216 SWSERVERCONNECTION_RELEASE_LOG_ERROR_IF_ALLOWED("startFetch: fetchIdentifier=%llu DidNotHandle because worker did not become activated", task->fetchIdentifier().toUInt64()); 217 217 task->cannotHandle(); 218 218 return; … … 239 239 240 240 if (!contextConnection) { 241 SWSERVERCONNECTION_RELEASE_LOG_ERROR_IF_ALLOWED("startFetch: fetchIdentifier :%s DidNotHandle because failed to run service worker", task->fetchIdentifier().loggingString().utf8().data());241 SWSERVERCONNECTION_RELEASE_LOG_ERROR_IF_ALLOWED("startFetch: fetchIdentifier=%s DidNotHandle because failed to run service worker", task->fetchIdentifier().loggingString().utf8().data()); 242 242 task->cannotHandle(); 243 243 return; -
trunk/Source/WebKit/NetworkProcess/cocoa/NetworkDataTaskCocoa.mm
r272773 r273183 365 365 #if !RELEASE_LOG_DISABLED 366 366 if (m_session->shouldLogCookieInformation()) 367 RELEASE_LOG_IF(isAlwaysOnLoggingAllowed(), Network, "%p - NetworkDataTaskCocoa::logCookieInformation: pageID = %llu, frameID = %llu, taskID =%lu: Blocking cookies for URL %s", this, pageID.toUInt64(), frameID.toUInt64(), (unsigned long)[m_task taskIdentifier], nsRequest.URL.absoluteString.UTF8String);367 RELEASE_LOG_IF(isAlwaysOnLoggingAllowed(), Network, "%p - NetworkDataTaskCocoa::logCookieInformation: pageID=%llu, frameID=%llu, taskID=%lu: Blocking cookies for URL %s", this, pageID.toUInt64(), frameID.toUInt64(), (unsigned long)[m_task taskIdentifier], nsRequest.URL.absoluteString.UTF8String); 368 368 #else 369 369 LOG(NetworkSession, "%llu Blocking cookies for URL %s", [m_task taskIdentifier], nsRequest.URL.absoluteString.UTF8String); … … 513 513 #if !RELEASE_LOG_DISABLED 514 514 if (m_session->shouldLogCookieInformation()) 515 RELEASE_LOG_IF(isAlwaysOnLoggingAllowed(), Network, "%p - NetworkDataTaskCocoa::willPerformHTTPRedirection::logCookieInformation: pageID = %llu, frameID = %llu, taskID =%lu: %s cookies for redirect URL %s", this, m_pageID.toUInt64(), m_frameID.toUInt64(), (unsigned long)[m_task taskIdentifier], (m_hasBeenSetToUseStatelessCookieStorage ? "Blocking" : "Not blocking"), request.url().string().utf8().data());515 RELEASE_LOG_IF(isAlwaysOnLoggingAllowed(), Network, "%p - NetworkDataTaskCocoa::willPerformHTTPRedirection::logCookieInformation: pageID=%llu, frameID=%llu, taskID=%lu: %s cookies for redirect URL %s", this, m_pageID.toUInt64(), m_frameID.toUInt64(), (unsigned long)[m_task taskIdentifier], (m_hasBeenSetToUseStatelessCookieStorage ? "Blocking" : "Not blocking"), request.url().string().utf8().data()); 516 516 #else 517 517 LOG(NetworkSession, "%llu %s cookies for redirect URL %s", [m_task taskIdentifier], (m_hasBeenSetToUseStatelessCookieStorage ? "Blocking" : "Not blocking"), request.url().string().utf8().data()); -
trunk/Source/WebKit/Platform/IPC/Connection.cpp
r272916 r273183 649 649 // any more incoming messages. 650 650 if (!isValid()) { 651 RELEASE_LOG_ERROR(IPC, "Connection::waitForSyncReply: Connection no longer valid, id =%" PRIu64, syncRequestID);651 RELEASE_LOG_ERROR(IPC, "Connection::waitForSyncReply: Connection no longer valid, id=%" PRIu64, syncRequestID); 652 652 didReceiveSyncReply(sendSyncOptions); 653 653 return nullptr; … … 661 661 662 662 #if OS(DARWIN) 663 RELEASE_LOG_ERROR(IPC, "Connection::waitForSyncReply: Timed-out while waiting for reply for %{public}s from process %d, id =%" PRIu64, description(messageName), remoteProcessID(), syncRequestID);663 RELEASE_LOG_ERROR(IPC, "Connection::waitForSyncReply: Timed-out while waiting for reply for %{public}s from process %d, id=%" PRIu64, description(messageName), remoteProcessID(), syncRequestID); 664 664 #else 665 RELEASE_LOG_ERROR(IPC, "Connection::waitForSyncReply: Timed-out while waiting for reply for %s, id =%" PRIu64, description(messageName), syncRequestID);665 RELEASE_LOG_ERROR(IPC, "Connection::waitForSyncReply: Timed-out while waiting for reply for %s, id=%" PRIu64, description(messageName), syncRequestID); 666 666 #endif 667 667 -
trunk/Source/WebKit/UIProcess/ApplicationStateTracker.mm
r268736 r273183 96 96 case ApplicationType::Application: { 97 97 m_isInBackground = window.windowScene.activationState == UISceneActivationStateBackground || window.windowScene.activationState == UISceneActivationStateUnattached; 98 RELEASE_LOG(ViewState, "%p - ApplicationStateTracker::ApplicationStateTracker(): m_isInBackground :%d", this, m_isInBackground);98 RELEASE_LOG(ViewState, "%p - ApplicationStateTracker::ApplicationStateTracker(): m_isInBackground=%d", this, m_isInBackground); 99 99 100 100 m_didEnterBackgroundObserver = [notificationCenter addObserverForName:UISceneDidEnterBackgroundNotification object:nil queue:nil usingBlock:[this](NSNotification *notification) { … … 148 148 m_isInBackground = false; 149 149 150 RELEASE_LOG(ProcessSuspension, "%{public}s has PID %d, host application PID : %d, isInBackground:%d", _UIApplicationIsExtension() ? "Extension" : "ViewService", getpid(), applicationPID, m_isInBackground);150 RELEASE_LOG(ProcessSuspension, "%{public}s has PID %d, host application PID=%d, isInBackground=%d", _UIApplicationIsExtension() ? "Extension" : "ViewService", getpid(), applicationPID, m_isInBackground); 151 151 152 152 m_didEnterBackgroundObserver = [notificationCenter addObserverForName:viewServiceBackgroundNotificationName object:serviceViewController queue:nil usingBlock:[this, applicationPID](NSNotification *) { 153 RELEASE_LOG(ProcessSuspension, "%{public}s has PID %d, host application PID :%d, didEnterBackground", _UIApplicationIsExtension() ? "Extension" : "ViewService", getpid(), applicationPID);153 RELEASE_LOG(ProcessSuspension, "%{public}s has PID %d, host application PID=%d, didEnterBackground", _UIApplicationIsExtension() ? "Extension" : "ViewService", getpid(), applicationPID); 154 154 applicationDidEnterBackground(); 155 155 }]; 156 156 m_willEnterForegroundObserver = [notificationCenter addObserverForName:viewServiceForegroundNotificationName object:serviceViewController queue:nil usingBlock:[this, applicationPID](NSNotification *) { 157 RELEASE_LOG(ProcessSuspension, "%{public}s has PID %d, host application PID :%d, willEnterForeground", _UIApplicationIsExtension() ? "Extension" : "ViewService", getpid(), applicationPID);157 RELEASE_LOG(ProcessSuspension, "%{public}s has PID %d, host application PID=%d, willEnterForeground", _UIApplicationIsExtension() ? "Extension" : "ViewService", getpid(), applicationPID); 158 158 applicationWillEnterForeground(); 159 159 }]; -
trunk/Source/WebKit/UIProcess/AuxiliaryProcessProxy.cpp
r272882 r273183 114 114 void AuxiliaryProcessProxy::terminate() 115 115 { 116 RELEASE_LOG(Process, "AuxiliaryProcessProxy::terminate: PID :%d", processIdentifier());116 RELEASE_LOG(Process, "AuxiliaryProcessProxy::terminate: PID=%d", processIdentifier()); 117 117 118 118 #if PLATFORM(COCOA) -
trunk/Source/WebKit/UIProcess/ProcessThrottler.cpp
r269934 r273183 127 127 return; 128 128 129 PROCESSTHROTTLER_RELEASE_LOG("setAssertionType: Updating process assertion type to %u (foregroundActivities : %u, backgroundActivities:%u)", newType, m_foregroundActivities.size(), m_backgroundActivities.size());129 PROCESSTHROTTLER_RELEASE_LOG("setAssertionType: Updating process assertion type to %u (foregroundActivities=%u, backgroundActivities=%u)", newType, m_foregroundActivities.size(), m_backgroundActivities.size()); 130 130 131 131 // Keep the previous assertion around until after the new one has been created so that we always hold … … 157 157 PROCESSTHROTTLER_RELEASE_LOG("updateAssertionIfNeeded: sending ProcessDidResume IPC because the process was suspended"); 158 158 else 159 PROCESSTHROTTLER_RELEASE_LOG("updateAssertionIfNeeded: sending ProcessDidResume IPC because the WebProcess is still processing request to suspend :%" PRIu64, *m_pendingRequestToSuspendID);159 PROCESSTHROTTLER_RELEASE_LOG("updateAssertionIfNeeded: sending ProcessDidResume IPC because the WebProcess is still processing request to suspend=%" PRIu64, *m_pendingRequestToSuspendID); 160 160 m_process.sendProcessDidResume(); 161 161 clearPendingRequestToSuspend(); … … 211 211 void ProcessThrottler::sendPrepareToSuspendIPC(IsSuspensionImminent isSuspensionImminent) 212 212 { 213 PROCESSTHROTTLER_RELEASE_LOG("sendPrepareToSuspendIPC: isSuspensionImminent :%d", isSuspensionImminent == IsSuspensionImminent::Yes);213 PROCESSTHROTTLER_RELEASE_LOG("sendPrepareToSuspendIPC: isSuspensionImminent=%d", isSuspensionImminent == IsSuspensionImminent::Yes); 214 214 if (m_pendingRequestToSuspendID) { 215 215 // Do not send a new PrepareToSuspend IPC for imminent suspension if we've already sent a non-imminent PrepareToSuspend IPC. … … 218 218 } else { 219 219 m_pendingRequestToSuspendID = generatePrepareToSuspendRequestID(); 220 PROCESSTHROTTLER_RELEASE_LOG("sendPrepareToSuspendIPC: Sending PrepareToSuspend(%" PRIu64 ", isSuspensionImminent :%d) IPC", *m_pendingRequestToSuspendID, isSuspensionImminent == IsSuspensionImminent::Yes);220 PROCESSTHROTTLER_RELEASE_LOG("sendPrepareToSuspendIPC: Sending PrepareToSuspend(%" PRIu64 ", isSuspensionImminent=%d) IPC", *m_pendingRequestToSuspendID, isSuspensionImminent == IsSuspensionImminent::Yes); 221 221 m_process.sendPrepareToSuspend(isSuspensionImminent, [this, weakThis = makeWeakPtr(*this), requestToSuspendID = *m_pendingRequestToSuspendID]() mutable { 222 222 if (weakThis && m_pendingRequestToSuspendID && *m_pendingRequestToSuspendID == requestToSuspendID) -
trunk/Source/WebKit/UIProcess/ProvisionalPageProxy.cpp
r268017 r273183 53 53 using namespace WebCore; 54 54 55 #define RELEASE_LOG_IF_ALLOWED(channel, fmt, ...) RELEASE_LOG_IF(m_page.isAlwaysOnLoggingAllowed(), channel, "%p - ProvisionalPageProxy::" fmt, this, ##__VA_ARGS__)56 #define RELEASE_LOG_ERROR_IF_ALLOWED(channel, fmt, ...) RELEASE_LOG_ERROR_IF(m_page.isAlwaysOnLoggingAllowed(), channel, "%p - ProvisionalPageProxy::" fmt, this, ##__VA_ARGS__)55 #define RELEASE_LOG_IF_ALLOWED(channel, fmt, ...) RELEASE_LOG_IF(m_page.isAlwaysOnLoggingAllowed(), channel, "%p - [pageProxyID=%" PRIu64 ", webPageID=%" PRIu64 ", PID=%i, navigationID=%" PRIu64 "] ProvisionalPageProxy::" fmt, this, m_page.identifier().toUInt64(), m_webPageID.toUInt64(), m_process->processIdentifier(), m_navigationID, ##__VA_ARGS__) 56 #define RELEASE_LOG_ERROR_IF_ALLOWED(channel, fmt, ...) RELEASE_LOG_ERROR_IF(m_page.isAlwaysOnLoggingAllowed(), channel, "%p - [pageProxyID=%" PRIu64 ", webPageID=%" PRIu64 ", PID=%i, navigationID=%" PRIu64 "] ProvisionalPageProxy::" fmt, this, m_page.identifier().toUInt64(), m_webPageID.toUInt64(), m_process->processIdentifier(), m_navigationID, ##__VA_ARGS__) 57 57 58 58 ProvisionalPageProxy::ProvisionalPageProxy(WebPageProxy& page, Ref<WebProcessProxy>&& process, std::unique_ptr<SuspendedPageProxy> suspendedPage, uint64_t navigationID, bool isServerRedirect, const WebCore::ResourceRequest& request, ProcessSwapRequestedByClient processSwapRequestedByClient, API::WebsitePolicies* websitePolicies) … … 71 71 #endif 72 72 { 73 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "ProvisionalPageProxy: pageProxyID=%" PRIu64 " webPageID=%" PRIu64 " navigationID=%" PRIu64 " suspendedPage: %p", m_page.identifier().toUInt64(), m_webPageID.toUInt64(), navigationID, suspendedPage.get());73 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "ProvisionalPageProxy: suspendedPage=%p", suspendedPage.get()); 74 74 75 75 m_process->addMessageReceiver(Messages::WebPageProxy::messageReceiverName(), m_webPageID, *this); … … 113 113 void ProvisionalPageProxy::processDidTerminate() 114 114 { 115 RELEASE_LOG_ERROR_IF_ALLOWED(ProcessSwapping, "processDidTerminate: pageProxyID=%" PRIu64 " webPageID=%" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64());115 RELEASE_LOG_ERROR_IF_ALLOWED(ProcessSwapping, "processDidTerminate:"); 116 116 m_page.provisionalProcessDidTerminate(); 117 117 } … … 130 130 ASSERT(m_process->state() == WebProcessProxy::State::Running); 131 131 132 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "cancel: Simulating a didFailProvisionalLoadForFrame for pageProxyID=%" PRIu64 " webPageID=%" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64());132 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "cancel: Simulating a didFailProvisionalLoadForFrame"); 133 133 ASSERT(m_mainFrame); 134 134 auto error = WebKit::cancelledError(m_request); … … 159 159 void ProvisionalPageProxy::loadData(API::Navigation& navigation, const IPC::DataReference& data, const String& MIMEType, const String& encoding, const String& baseURL, API::Object* userData, Optional<NavigatingToAppBoundDomain> isNavigatingToAppBoundDomain, Optional<WebsitePoliciesData>&& websitePolicies) 160 160 { 161 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "loadData: pageProxyID=%" PRIu64 " webPageID=%" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64());161 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "loadData:"); 162 162 163 163 m_page.loadDataWithNavigationShared(m_process.copyRef(), m_webPageID, navigation, data, MIMEType, encoding, baseURL, userData, WebCore::ShouldTreatAsContinuingLoad::Yes, isNavigatingToAppBoundDomain, WTFMove(websitePolicies), navigation.lastNavigationAction().shouldOpenExternalURLsPolicy); … … 166 166 void ProvisionalPageProxy::loadRequest(API::Navigation& navigation, WebCore::ResourceRequest&& request, API::Object* userData, Optional<NavigatingToAppBoundDomain> isNavigatingToAppBoundDomain, Optional<WebsitePoliciesData>&& websitePolicies) 167 167 { 168 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "loadRequest: pageProxyID=%" PRIu64 " webPageID=%" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64());168 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "loadRequest:"); 169 169 170 170 // If this is a client-side redirect continuing in a new process, then the new process will overwrite the fromItem's URL. In this case, … … 179 179 void ProvisionalPageProxy::goToBackForwardItem(API::Navigation& navigation, WebBackForwardListItem& item, RefPtr<API::WebsitePolicies>&& websitePolicies) 180 180 { 181 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "goToBackForwardItem: pageProxyID=%" PRIu64 " webPageID=%" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64());181 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "goToBackForwardItem:"); 182 182 183 183 auto itemStates = m_page.backForwardList().filteredItemStates([this, targetItem = &item](auto& item) { … … 209 209 void ProvisionalPageProxy::didCreateMainFrame(FrameIdentifier frameID) 210 210 { 211 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "didCreateMainFrame: pageProxyID=%" PRIu64 " webPageID=%" PRIu64 ", frameID=%" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64(), frameID.toUInt64());211 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "didCreateMainFrame: frameID=%" PRIu64, frameID.toUInt64()); 212 212 ASSERT(!m_mainFrame); 213 213 … … 247 247 return; 248 248 249 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "didStartProvisionalLoadForFrame: pageProxyID=%" PRIu64 " webPageID=%" PRIu64 ", frameID=%" PRIu64 ", navigationID=%" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64(), frameID.toUInt64(), navigationID);249 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "didStartProvisionalLoadForFrame: frameID=%" PRIu64, frameID.toUInt64()); 250 250 ASSERT(m_provisionalLoadURL.isNull()); 251 251 m_provisionalLoadURL = url; … … 267 267 return; 268 268 269 RELEASE_LOG_ERROR_IF_ALLOWED(ProcessSwapping, "didFailProvisionalLoadForFrame: pageProxyID=%" PRIu64 " webPageID=%" PRIu64 ", frameID=%" PRIu64 ", navigationID=%" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64(), frameID.toUInt64(), navigationID);269 RELEASE_LOG_ERROR_IF_ALLOWED(ProcessSwapping, "didFailProvisionalLoadForFrame: frameID=%" PRIu64, frameID.toUInt64()); 270 270 ASSERT(!m_provisionalLoadURL.isNull()); 271 271 m_provisionalLoadURL = { }; … … 283 283 return; 284 284 285 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "didCommitLoadForFrame: pageProxyID=%" PRIu64 " webPageID=%" PRIu64 ", frameID=%" PRIu64 ", navigationID = %" PRIu64, m_page.identifier().toUInt64(), m_webPageID.toUInt64(), frameID.toUInt64(), navigationID);285 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "didCommitLoadForFrame: frameID=%" PRIu64, frameID.toUInt64()); 286 286 m_provisionalLoadURL = { }; 287 287 m_process->removeMessageReceiver(Messages::WebPageProxy::messageReceiverName(), m_webPageID); … … 395 395 void ProvisionalPageProxy::didCreateContextForVisibilityPropagation(LayerHostingContextID contextID) 396 396 { 397 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "didCreateContextForVisibilityPropagation: contextID=%u pageProxyID=%" PRIu64 " webPageID=%" PRIu64, contextID, m_page.identifier().toUInt64(), m_webPageID.toUInt64());397 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "didCreateContextForVisibilityPropagation: contextID=%u", contextID); 398 398 m_contextIDForVisibilityPropagation = contextID; 399 399 } -
trunk/Source/WebKit/UIProcess/WebBackForwardCache.cpp
r251523 r273183 84 84 ASSERT(size() <= capacity()); 85 85 86 RELEASE_LOG(BackForwardCache, "WebBackForwardCache::addEntry: item : %s, hasSuspendedPage: %d, size: %u /%u", item.itemID().string().utf8().data(), !!item.suspendedPage(), size(), capacity());86 RELEASE_LOG(BackForwardCache, "WebBackForwardCache::addEntry: item=%s, hasSuspendedPage=%d, size=%u/%u", item.itemID().string().utf8().data(), !!item.suspendedPage(), size(), capacity()); 87 87 } 88 88 … … 102 102 m_itemsWithCachedPage.removeFirst(&item); 103 103 item.setBackForwardCacheEntry(nullptr); 104 RELEASE_LOG(BackForwardCache, "WebBackForwardCache::removeEntry: item : %s, size: %u /%u", item.itemID().string().utf8().data(), size(), capacity());104 RELEASE_LOG(BackForwardCache, "WebBackForwardCache::removeEntry: item=%s, size=%u/%u", item.itemID().string().utf8().data(), size(), capacity()); 105 105 } 106 106 … … 114 114 std::unique_ptr<SuspendedPageProxy> WebBackForwardCache::takeSuspendedPage(WebBackForwardListItem& item) 115 115 { 116 RELEASE_LOG(BackForwardCache, "WebBackForwardCache::takeSuspendedPage: item :%s", item.itemID().string().utf8().data());116 RELEASE_LOG(BackForwardCache, "WebBackForwardCache::takeSuspendedPage: item=%s", item.itemID().string().utf8().data()); 117 117 118 118 ASSERT(m_itemsWithCachedPage.contains(&item)); -
trunk/Source/WebKit/UIProcess/WebBackForwardCacheEntry.cpp
r261288 r273183 73 73 void WebBackForwardCacheEntry::expirationTimerFired() 74 74 { 75 RELEASE_LOG(BackForwardCache, "%p - WebBackForwardCacheEntry::expirationTimerFired backForwardItemID : %s, hasSuspendedPage?%d", this, m_backForwardItemID.string().utf8().data(), !!m_suspendedPage);75 RELEASE_LOG(BackForwardCache, "%p - WebBackForwardCacheEntry::expirationTimerFired backForwardItemID=%s, hasSuspendedPage=%d", this, m_backForwardItemID.string().utf8().data(), !!m_suspendedPage); 76 76 ASSERT(m_backForwardItemID); 77 77 auto* item = WebBackForwardListItem::itemForID(m_backForwardItemID); -
trunk/Source/WebKit/UIProcess/WebPageProxy.cpp
r273133 r273183 3249 3249 void WebPageProxy::receivedNavigationPolicyDecision(PolicyAction policyAction, API::Navigation* navigation, Ref<API::NavigationAction>&& navigationAction, ProcessSwapRequestedByClient processSwapRequestedByClient, WebFrameProxy& frame, RefPtr<API::WebsitePolicies>&& policies, Ref<PolicyDecisionSender>&& sender) 3250 3250 { 3251 RELEASE_LOG_IF_ALLOWED(Loading, "receivedNavigationPolicyDecision: frameID : %llu, navigationID: %llu, policyAction:%u", frame.frameID().toUInt64(), navigation ? navigation->navigationID() : 0, (unsigned)policyAction);3251 RELEASE_LOG_IF_ALLOWED(Loading, "receivedNavigationPolicyDecision: frameID=%llu, navigationID=%llu, policyAction=%u", frame.frameID().toUInt64(), navigation ? navigation->navigationID() : 0, (unsigned)policyAction); 3252 3252 3253 3253 Ref<WebsiteDataStore> websiteDataStore = m_websiteDataStore.copyRef(); … … 3311 3311 if (shouldProcessSwap) { 3312 3312 policyAction = PolicyAction::StopAllLoads; 3313 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "decidePolicyForNavigationAction, swapping process %i with process %i for navigation, reason :%" PUBLIC_LOG_STRING, processIdentifier(), processForNavigation->processIdentifier(), reason.utf8().data());3313 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "decidePolicyForNavigationAction, swapping process %i with process %i for navigation, reason=%" PUBLIC_LOG_STRING, processIdentifier(), processForNavigation->processIdentifier(), reason.utf8().data()); 3314 3314 LOG(ProcessSwapping, "(ProcessSwapping) Switching from process %i to new process (%i) for navigation %" PRIu64 " '%s'", processIdentifier(), processForNavigation->processIdentifier(), navigation->navigationID(), navigation->loggingString()); 3315 3315 } else 3316 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "decidePolicyForNavigationAction: keep using process %i for navigation, reason :%" PUBLIC_LOG_STRING, processIdentifier(), reason.utf8().data());3316 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "decidePolicyForNavigationAction: keep using process %i for navigation, reason=%" PUBLIC_LOG_STRING, processIdentifier(), reason.utf8().data()); 3317 3317 3318 3318 Optional<SandboxExtension::Handle> optionalHandle; … … 3393 3393 { 3394 3394 ASSERT(m_provisionalPage); 3395 RELEASE_LOG_IF_ALLOWED(Loading, "commitProvisionalPage: newPID =%i", m_provisionalPage->process().processIdentifier());3395 RELEASE_LOG_IF_ALLOWED(Loading, "commitProvisionalPage: newPID=%i", m_provisionalPage->process().processIdentifier()); 3396 3396 3397 3397 Optional<FrameIdentifier> mainFrameIDInPreviousProcess = m_mainFrame ? makeOptional(m_mainFrame->frameID()) : WTF::nullopt; … … 3431 3431 void WebPageProxy::continueNavigationInNewProcess(API::Navigation& navigation, std::unique_ptr<SuspendedPageProxy>&& suspendedPage, Ref<WebProcessProxy>&& newProcess, ProcessSwapRequestedByClient processSwapRequestedByClient, RefPtr<API::WebsitePolicies>&& websitePolicies) 3432 3432 { 3433 RELEASE_LOG_IF_ALLOWED(Loading, "continueNavigationInNewProcess: newProcessPID = %i, hasSuspendedPage =%i", newProcess->processIdentifier(), !!suspendedPage);3433 RELEASE_LOG_IF_ALLOWED(Loading, "continueNavigationInNewProcess: newProcessPID=%i, hasSuspendedPage=%i", newProcess->processIdentifier(), !!suspendedPage); 3434 3434 LOG(Loading, "Continuing navigation %" PRIu64 " '%s' in a new web process", navigation.navigationID(), navigation.loggingString()); 3435 3435 RELEASE_ASSERT(!newProcess->isInProcessCache()); 3436 3436 3437 3437 if (m_provisionalPage) { 3438 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "continueNavigationInNewProcess: There is already a pending provisional load, cancelling it (provisonalNavigationID : %llu, navigationID:%llu)", m_provisionalPage->navigationID(), navigation.navigationID());3438 RELEASE_LOG_IF_ALLOWED(ProcessSwapping, "continueNavigationInNewProcess: There is already a pending provisional load, cancelling it (provisonalNavigationID=%llu, navigationID=%llu)", m_provisionalPage->navigationID(), navigation.navigationID()); 3439 3439 if (m_provisionalPage->navigationID() != navigation.navigationID()) 3440 3440 m_provisionalPage->cancel(); … … 4413 4413 4414 4414 LOG(Loading, "WebPageProxy %" PRIu64 " in process pid %i didStartProvisionalLoadForFrame to frameID %" PRIu64 ", navigationID %" PRIu64 ", url %s", m_identifier.toUInt64(), process->processIdentifier(), frameID.toUInt64(), navigationID, url.string().utf8().data()); 4415 RELEASE_LOG_IF_ALLOWED(Loading, "didStartProvisionalLoadForFrame: frameID =%" PRIu64, frameID.toUInt64());4415 RELEASE_LOG_IF_ALLOWED(Loading, "didStartProvisionalLoadForFrame: frameID=%" PRIu64, frameID.toUInt64()); 4416 4416 4417 4417 auto transaction = m_pageLoadState.transaction(); … … 4475 4475 { 4476 4476 LOG(Loading, "WebPageProxy::didReceiveServerRedirectForProvisionalLoadForFrame to frameID %" PRIu64 ", navigationID %" PRIu64 ", url %s", frameID.toUInt64(), navigationID, request.url().string().utf8().data()); 4477 RELEASE_LOG_IF_ALLOWED(Loading, "didReceiveServerRedirectForProvisionalLoadForFrame: frameID =%" PRIu64, frameID.toUInt64());4477 RELEASE_LOG_IF_ALLOWED(Loading, "didReceiveServerRedirectForProvisionalLoadForFrame: frameID=%" PRIu64, frameID.toUInt64()); 4478 4478 4479 4479 PageClientProtector protector(pageClient()); … … 4504 4504 void WebPageProxy::willPerformClientRedirectForFrame(FrameIdentifier frameID, const String& url, double delay, WebCore::LockBackForwardList) 4505 4505 { 4506 RELEASE_LOG_IF_ALLOWED(Loading, "willPerformClientRedirectForFrame: frameID =%" PRIu64, frameID.toUInt64());4506 RELEASE_LOG_IF_ALLOWED(Loading, "willPerformClientRedirectForFrame: frameID=%" PRIu64, frameID.toUInt64()); 4507 4507 4508 4508 PageClientProtector protector(pageClient()); … … 4517 4517 void WebPageProxy::didCancelClientRedirectForFrame(FrameIdentifier frameID) 4518 4518 { 4519 RELEASE_LOG_IF_ALLOWED(Loading, "didCancelClientRedirectForFrame: frameID =%" PRIu64, frameID.toUInt64());4519 RELEASE_LOG_IF_ALLOWED(Loading, "didCancelClientRedirectForFrame: frameID=%" PRIu64, frameID.toUInt64()); 4520 4520 4521 4521 PageClientProtector protector(pageClient()); … … 4565 4565 { 4566 4566 LOG(Loading, "(Loading) WebPageProxy %" PRIu64 " in web process pid %i didFailProvisionalLoadForFrame to provisionalURL %s", m_identifier.toUInt64(), process->processIdentifier(), provisionalURL.utf8().data()); 4567 RELEASE_LOG_ERROR_IF_ALLOWED(Process, "didFailProvisionalLoadForFrame: frameID = %" PRIu64 ", domain = %s, code =%d", frameID.toUInt64(), error.domain().utf8().data(), error.errorCode());4567 RELEASE_LOG_ERROR_IF_ALLOWED(Process, "didFailProvisionalLoadForFrame: frameID=%" PRIu64 ", domain=%s, code=%d", frameID.toUInt64(), error.domain().utf8().data(), error.errorCode()); 4568 4568 4569 4569 PageClientProtector protector(pageClient()); … … 4636 4636 LOG(Loading, "(Loading) WebPageProxy %" PRIu64 " didCommitLoadForFrame in navigation %" PRIu64, m_identifier.toUInt64(), navigationID); 4637 4637 LOG(BackForward, "(Back/Forward) After load commit, back/forward list is now:%s", m_backForwardList->loggingString()); 4638 RELEASE_LOG_IF_ALLOWED(Loading, "didCommitLoadForFrame: frameID =%" PRIu64, frameID.toUInt64());4638 RELEASE_LOG_IF_ALLOWED(Loading, "didCommitLoadForFrame: frameID=%" PRIu64, frameID.toUInt64()); 4639 4639 4640 4640 PageClientProtector protector(pageClient()); … … 4758 4758 void WebPageProxy::didFinishDocumentLoadForFrame(FrameIdentifier frameID, uint64_t navigationID, const UserData& userData) 4759 4759 { 4760 RELEASE_LOG_IF_ALLOWED(Loading, "didFinishDocumentLoadForFrame: frameID =%" PRIu64, frameID.toUInt64());4760 RELEASE_LOG_IF_ALLOWED(Loading, "didFinishDocumentLoadForFrame: frameID=%" PRIu64, frameID.toUInt64()); 4761 4761 4762 4762 PageClientProtector protector(pageClient()); … … 4786 4786 { 4787 4787 LOG(Loading, "WebPageProxy::didFinishLoadForFrame - WebPageProxy %p with navigationID %" PRIu64 " didFinishLoad", this, navigationID); 4788 RELEASE_LOG_IF_ALLOWED(Loading, "didFinishLoadForFrame: frameID =%" PRIu64, frameID.toUInt64());4788 RELEASE_LOG_IF_ALLOWED(Loading, "didFinishLoadForFrame: frameID=%" PRIu64, frameID.toUInt64()); 4789 4789 4790 4790 PageClientProtector protector(pageClient()); … … 4837 4837 void WebPageProxy::didFailLoadForFrame(FrameIdentifier frameID, FrameInfoData&& frameInfo, ResourceRequest&& request, uint64_t navigationID, const ResourceError& error, const UserData& userData) 4838 4838 { 4839 RELEASE_LOG_ERROR_IF_ALLOWED(Loading, "didFailLoadForFrame: frameID = %" PRIu64 ", domain = %s, code =%d", frameID.toUInt64(), error.domain().utf8().data(), error.errorCode());4839 RELEASE_LOG_ERROR_IF_ALLOWED(Loading, "didFailLoadForFrame: frameID=%" PRIu64 ", domain=%s, code=%d", frameID.toUInt64(), error.domain().utf8().data(), error.errorCode()); 4840 4840 4841 4841 PageClientProtector protector(pageClient()); … … 4882 4882 void WebPageProxy::didSameDocumentNavigationForFrame(FrameIdentifier frameID, uint64_t navigationID, uint32_t opaqueSameDocumentNavigationType, URL&& url, const UserData& userData) 4883 4883 { 4884 RELEASE_LOG_IF_ALLOWED(Loading, "didSameDocumentNavigationForFrame: frameID =%" PRIu64, frameID.toUInt64());4884 RELEASE_LOG_IF_ALLOWED(Loading, "didSameDocumentNavigationForFrame: frameID=%" PRIu64, frameID.toUInt64()); 4885 4885 4886 4886 PageClientProtector protector(pageClient()); … … 5068 5068 IPC::FormDataReference&& requestBody, WebCore::ResourceResponse&& redirectResponse, const UserData& userData, Ref<PolicyDecisionSender>&& sender) 5069 5069 { 5070 RELEASE_LOG_IF_ALLOWED(Loading, "decidePolicyForNavigationAction: frameID : %llu, navigationID:%llu", frame.frameID().toUInt64(), navigationID);5070 RELEASE_LOG_IF_ALLOWED(Loading, "decidePolicyForNavigationAction: frameID=%llu, navigationID=%llu", frame.frameID().toUInt64(), navigationID); 5071 5071 5072 5072 LOG(Loading, "WebPageProxy::decidePolicyForNavigationAction - Original URL %s, current target URL %s", originalRequest.url().string().utf8().data(), request.url().string().utf8().data()); … … 5165 5165 5166 5166 auto listener = makeRef(frame.setUpPolicyListenerProxy([this, protectedThis = makeRef(*this), frame = makeRef(frame), sender = WTFMove(sender), navigation, navigationAction, frameInfo, userDataObject = process->transformHandlesToObjects(userData.object()).get()] (PolicyAction policyAction, API::WebsitePolicies* policies, ProcessSwapRequestedByClient processSwapRequestedByClient, RefPtr<SafeBrowsingWarning>&& safeBrowsingWarning, Optional<NavigatingToAppBoundDomain> isAppBoundDomain) mutable { 5167 RELEASE_LOG_IF_ALLOWED(Loading, "decidePolicyForNavigationAction: listener called: frameID : %llu, navigationID: %llu, policyAction: %u, safeBrowsingWarning: %d, isAppBoundDomain:%d", frame->frameID().toUInt64(), navigation ? navigation->navigationID() : 0, (unsigned)policyAction, !!safeBrowsingWarning, !!isAppBoundDomain);5167 RELEASE_LOG_IF_ALLOWED(Loading, "decidePolicyForNavigationAction: listener called: frameID=%llu, navigationID=%llu, policyAction=%u, safeBrowsingWarning=%d, isAppBoundDomain=%d", frame->frameID().toUInt64(), navigation ? navigation->navigationID() : 0, (unsigned)policyAction, !!safeBrowsingWarning, !!isAppBoundDomain); 5168 5168 5169 5169 auto completionHandler = [this, protectedThis, frame, sender = WTFMove(sender), navigation, navigationAction = WTFMove(navigationAction), processSwapRequestedByClient, policies = makeRefPtr(policies)] (PolicyAction policyAction) mutable { … … 5477 5477 void WebPageProxy::didPerformClientRedirectShared(Ref<WebProcessProxy>&& process, const String& sourceURLString, const String& destinationURLString, FrameIdentifier frameID) 5478 5478 { 5479 RELEASE_LOG_IF_ALLOWED(Loading, "didPerformClientRedirectShared: frameID =%" PRIu64, frameID.toUInt64());5479 RELEASE_LOG_IF_ALLOWED(Loading, "didPerformClientRedirectShared: frameID=%" PRIu64, frameID.toUInt64()); 5480 5480 5481 5481 PageClientProtector protector(pageClient()); … … 7385 7385 void WebPageProxy::dispatchProcessDidTerminate(ProcessTerminationReason reason) 7386 7386 { 7387 RELEASE_LOG_ERROR_IF_ALLOWED(Loading, "dispatchProcessDidTerminate: reason =%d", reason);7387 RELEASE_LOG_ERROR_IF_ALLOWED(Loading, "dispatchProcessDidTerminate: reason=%d", reason); 7388 7388 7389 7389 bool handledByClient = false; -
trunk/Source/WebKit/UIProcess/WebProcessPool.cpp
r272550 r273183 495 495 void WebProcessPool::gpuProcessCrashed(ProcessID identifier) 496 496 { 497 WEBPROCESSPOOL_RELEASE_LOG_ERROR(Process, "gpuProcessCrashed: PID :%d", identifier);497 WEBPROCESSPOOL_RELEASE_LOG_ERROR(Process, "gpuProcessCrashed: PID=%d", identifier); 498 498 m_gpuProcess = nullptr; 499 499 -
trunk/Source/WebKit/UIProcess/WebProcessProxy.cpp
r272990 r273183 1851 1851 void WebProcessProxy::updateServiceWorkerProcessAssertion() 1852 1852 { 1853 RELEASE_LOG(ProcessSuspension, "%p - WebProcessProxy::updateServiceWorkerProcessAssertion() PID :%d", this, processIdentifier());1853 RELEASE_LOG(ProcessSuspension, "%p - WebProcessProxy::updateServiceWorkerProcessAssertion() PID=%d", this, processIdentifier()); 1854 1854 ASSERT(m_serviceWorkerInformation); 1855 1855 if (!m_serviceWorkerInformation) -
trunk/Source/WebKit/UIProcess/ios/ProcessAssertionIOS.mm
r271493 r273183 166 166 if (!_assertionsNeedingBackgroundTask.computesEmpty() && ![self _hasBackgroundTask]) { 167 167 if (processHasActiveRunTimeLimitation()) { 168 RELEASE_LOG _ERROR(ProcessSuspension, "%p - WKProcessAssertionBackgroundTaskManager: Ignored request to start a new background task because RunningBoard has already started the expiration timer", self);168 RELEASE_LOG(ProcessSuspension, "%p - WKProcessAssertionBackgroundTaskManager: Ignored request to start a new background task because RunningBoard has already started the expiration timer", self); 169 169 return; 170 170 } … … 205 205 { 206 206 auto remainingTime = [RBSProcessHandle currentProcess].activeLimitations.runTime; 207 RELEASE_LOG(ProcessSuspension, "WKProcessAssertionBackgroundTaskManager: Background task expired while holding WebKit ProcessAssertion (isMainThread : %d, remainingTime:%g).", RunLoop::isMain(), remainingTime);207 RELEASE_LOG(ProcessSuspension, "WKProcessAssertionBackgroundTaskManager: Background task expired while holding WebKit ProcessAssertion (isMainThread=%d, remainingTime=%g).", RunLoop::isMain(), remainingTime); 208 208 209 209 callOnMainRunLoopAndWait([self] { … … 217 217 218 218 auto remainingTime = [RBSProcessHandle currentProcess].activeLimitations.runTime; 219 RELEASE_LOG(ProcessSuspension, "WKProcessAssertionBackgroundTaskManager: _handleBackgroundTaskExpirationOnMainThread (remainingTime :%g).", remainingTime);219 RELEASE_LOG(ProcessSuspension, "WKProcessAssertionBackgroundTaskManager: _handleBackgroundTaskExpirationOnMainThread (remainingTime=%g).", remainingTime); 220 220 221 221 // If there is no time limitation, then it means that the process is now allowed to run again and the expiration notification … … 316 316 [m_rbsAssertion addObserver:m_delegate.get()]; 317 317 m_delegate.get().invalidationCallback = ^{ 318 RELEASE_LOG(ProcessSuspension, "%p - ProcessAssertion() RBS %{public}@ assertion for process with PID 318 RELEASE_LOG(ProcessSuspension, "%p - ProcessAssertion() RBS %{public}@ assertion for process with PID=%d was invalidated", this, runningBoardAssertionName, pid); 319 319 processAssertionWasInvalidated(); 320 320 }; … … 322 322 NSError *acquisitionError = nil; 323 323 if (![m_rbsAssertion acquireWithError:&acquisitionError]) { 324 RELEASE_LOG_ERROR(ProcessSuspension, "%p - ProcessAssertion: Failed to acquire RBS %{public}@ assertion '%{public}s' for process with PID 324 RELEASE_LOG_ERROR(ProcessSuspension, "%p - ProcessAssertion: Failed to acquire RBS %{public}@ assertion '%{public}s' for process with PID=%d, error: %{public}@", this, runningBoardAssertionName, reason.utf8().data(), pid, acquisitionError); 325 325 RunLoop::main().dispatch([weakThis = makeWeakPtr(*this)] { 326 326 if (weakThis) … … 328 328 }); 329 329 } else 330 RELEASE_LOG(ProcessSuspension, "%p - ProcessAssertion: Successfully took RBS %{public}@ assertion '%{public}s' for process with PID 330 RELEASE_LOG(ProcessSuspension, "%p - ProcessAssertion: Successfully took RBS %{public}@ assertion '%{public}s' for process with PID=%d", this, runningBoardAssertionName, reason.utf8().data(), pid); 331 331 } 332 332 333 333 ProcessAssertion::~ProcessAssertion() 334 334 { 335 RELEASE_LOG(ProcessSuspension, "%p - ~ProcessAssertion() Releasing process assertion for process with PID 335 RELEASE_LOG(ProcessSuspension, "%p - ~ProcessAssertion() Releasing process assertion for process with PID=%d", this, m_pid); 336 336 337 337 if (m_rbsAssertion) { … … 346 346 { 347 347 ASSERT(RunLoop::isMain()); 348 RELEASE_LOG(ProcessSuspension, "%p - ProcessAssertion::processAssertionWasInvalidated() PID :%d", this, m_pid);348 RELEASE_LOG(ProcessSuspension, "%p - ProcessAssertion::processAssertionWasInvalidated() PID=%d", this, m_pid); 349 349 350 350 if (m_invalidationHandler) -
trunk/Source/WebKit/UIProcess/ios/WKApplicationStateTrackingView.mm
r265623 r273183 56 56 57 57 auto page = [_webViewToTrack _page]; 58 RELEASE_LOG(ViewState, "%p - WKApplicationStateTrackingView: View with page [%p, pageProxyID : %" PRIu64 "] was removed from a window, _lastObservedStateWasBackground:%d", self, page.get(), page ? page->identifier().toUInt64() : 0, page ? page->lastObservedStateWasBackground() : false);58 RELEASE_LOG(ViewState, "%p - WKApplicationStateTrackingView: View with page [%p, pageProxyID=%" PRIu64 "] was removed from a window, _lastObservedStateWasBackground=%d", self, page.get(), page ? page->identifier().toUInt64() : 0, page ? page->lastObservedStateWasBackground() : false); 59 59 ASSERT(_applicationStateTracker); 60 60 _applicationStateTracker = nullptr; … … 70 70 71 71 _applicationStateTracker = makeUnique<WebKit::ApplicationStateTracker>(self, @selector(_applicationDidEnterBackground), @selector(_applicationDidFinishSnapshottingAfterEnteringBackground), @selector(_applicationWillEnterForeground), @selector(_willBeginSnapshotSequence), @selector(_didCompleteSnapshotSequence)); 72 RELEASE_LOG(ViewState, "%p - WKApplicationStateTrackingView: View with page [%p, pageProxyID : %" PRIu64 "] was added to a window, _lastObservedStateWasBackground: %d, isNowBackground:%d", self, page.get(), page ? page->identifier().toUInt64() : 0, lastObservedStateWasBackground, [self isBackground]);72 RELEASE_LOG(ViewState, "%p - WKApplicationStateTrackingView: View with page [%p, pageProxyID=%" PRIu64 "] was added to a window, _lastObservedStateWasBackground=%d, isNowBackground=%d", self, page.get(), page ? page->identifier().toUInt64() : 0, lastObservedStateWasBackground, [self isBackground]); 73 73 74 74 if (lastObservedStateWasBackground && ![self isBackground]) -
trunk/Source/WebKit/UIProcess/ios/WKContentView.mm
r272592 r273183 234 234 // Propagate the view's visibility state to the WebContent process so that it is marked as "Foreground Running" when necessary. 235 235 _visibilityPropagationView = adoptNS([[_UILayerHostView alloc] initWithFrame:CGRectZero pid:processIdentifier contextID:contextID]); 236 RELEASE_LOG(Process, "Created visibility propagation view %p (contextID : %u) for WebContent process with PID%d", _visibilityPropagationView.get(), contextID, processIdentifier);236 RELEASE_LOG(Process, "Created visibility propagation view %p (contextID=%u) for WebContent process with PID=%d", _visibilityPropagationView.get(), contextID, processIdentifier); 237 237 [self addSubview:_visibilityPropagationView.get()]; 238 238 } … … 253 253 // Propagate the view's visibility state to the GPU process so that it is marked as "Foreground Running" when necessary. 254 254 _visibilityPropagationViewForGPUProcess = adoptNS([[_UILayerHostView alloc] initWithFrame:CGRectZero pid:processIdentifier contextID:contextID]); 255 RELEASE_LOG(Process, "Created visibility propagation view %p (contextID : %u) for GPU process with PID%d", _visibilityPropagationViewForGPUProcess.get(), contextID, processIdentifier);255 RELEASE_LOG(Process, "Created visibility propagation view %p (contextID=%u) for GPU process with PID=%d", _visibilityPropagationViewForGPUProcess.get(), contextID, processIdentifier); 256 256 [self addSubview:_visibilityPropagationViewForGPUProcess.get()]; 257 257 } -
trunk/Source/WebKit/WebAuthnProcess/WebAuthnProcess.cpp
r270616 r273183 99 99 void WebAuthnProcess::prepareToSuspend(bool isSuspensionImminent, CompletionHandler<void()>&& completionHandler) 100 100 { 101 RELEASE_LOG(ProcessSuspension, "%p - WebAuthnProcess::prepareToSuspend(), isSuspensionImminent :%d", this, isSuspensionImminent);101 RELEASE_LOG(ProcessSuspension, "%p - WebAuthnProcess::prepareToSuspend(), isSuspensionImminent=%d", this, isSuspensionImminent); 102 102 103 103 lowMemoryHandler(Critical::Yes); -
trunk/Source/WebKit/WebProcess/WebCoreSupport/WebResourceLoadObserver.cpp
r270912 r273183 385 385 auto counter = ++m_loggingCounter; 386 386 #define LOCAL_LOG(str, ...) \ 387 RELEASE_LOG(ResourceLoadStatistics, "ResourceLoadObserver::logUserInteraction: counter =%" PRIu64 ": " str, counter, ##__VA_ARGS__)387 RELEASE_LOG(ResourceLoadStatistics, "ResourceLoadObserver::logUserInteraction: counter=%" PRIu64 ": " str, counter, ##__VA_ARGS__) 388 388 389 389 auto escapeForJSON = [](String s) { -
trunk/Source/WebKit/WebProcess/WebPage/WebPage.cpp
r273102 r273183 3465 3465 3466 3466 WebFrame* frame = WebProcess::singleton().webFrame(frameID); 3467 RELEASE_LOG_IF_ALLOWED(Loading, "didReceivePolicyDecision: policyAction : %u - frameID: %llu - webFrame: %p - mainFrame:%d", (unsigned)policyDecision.policyAction, frameID.toUInt64(), frame, frame ? frame->isMainFrame() : 0);3467 RELEASE_LOG_IF_ALLOWED(Loading, "didReceivePolicyDecision: policyAction=%u - frameID=%llu - webFrame=%p - mainFrame=%d", (unsigned)policyDecision.policyAction, frameID.toUInt64(), frame, frame ? frame->isMainFrame() : 0); 3468 3468 3469 3469 if (!frame) -
trunk/Source/WebKit/WebProcess/WebProcess.cpp
r273074 r273183 509 509 #endif 510 510 511 RELEASE_LOG_IF_ALLOWED(Process, "initializeWebProcess: Presenting process =%d", WebCore::presentingApplicationPID());511 RELEASE_LOG_IF_ALLOWED(Process, "initializeWebProcess: Presenting processPID=%d", WebCore::presentingApplicationPID()); 512 512 } 513 513 … … 1380 1380 void WebProcess::prepareToSuspend(bool isSuspensionImminent, CompletionHandler<void()>&& completionHandler) 1381 1381 { 1382 RELEASE_LOG_IF_ALLOWED(ProcessSuspension, "prepareToSuspend: isSuspensionImminent :%d", isSuspensionImminent);1382 RELEASE_LOG_IF_ALLOWED(ProcessSuspension, "prepareToSuspend: isSuspensionImminent=%d", isSuspensionImminent); 1383 1383 SetForScope<bool> suspensionScope(m_isSuspending, true); 1384 1384 m_processIsSuspended = true; -
trunk/Source/WebKit/WebProcess/cocoa/WebProcessCocoa.mm
r273082 r273183 495 495 ASSERT(!error); 496 496 if (error) { 497 RELEASE_LOG_ERROR_IF_ALLOWED(Process, "updateProcessName: Failed to set the display name of the WebContent process, error code :%ld", static_cast<long>(error));497 RELEASE_LOG_ERROR_IF_ALLOWED(Process, "updateProcessName: Failed to set the display name of the WebContent process, error code=%ld", static_cast<long>(error)); 498 498 return; 499 499 } … … 975 975 auto result = memorystatus_control(MEMORYSTATUS_CMD_SET_PROCESS_IS_FREEZABLE, getpid(), isFreezable ? 1 : 0, nullptr, 0); 976 976 if (result) 977 RELEASE_LOG_ERROR_IF_ALLOWED(ProcessSuspension, "updateFreezerStatus: isFreezable : %d, error:%d", isFreezable, result);977 RELEASE_LOG_ERROR_IF_ALLOWED(ProcessSuspension, "updateFreezerStatus: isFreezable=%d, error=%d", isFreezable, result); 978 978 else 979 RELEASE_LOG_IF_ALLOWED(ProcessSuspension, "updateFreezerStatus: isFreezable :%d, success", isFreezable);979 RELEASE_LOG_IF_ALLOWED(ProcessSuspension, "updateFreezerStatus: isFreezable=%d, success", isFreezable); 980 980 } 981 981 #endif
Note: See TracChangeset
for help on using the changeset viewer.