Backed out changeset a6904ec3d1e0 (bug 1347710) for causing Bug 1630860 a=backout
authorDaniel Varga <dvarga@mozilla.com>
Fri, 17 Apr 2020 13:01:21 +0300
changeset 524547 48cefa8cc0584b7184747c73654d1ed3ba778cf3
parent 524546 24537fed53e6c2f29e2d39b4dba6fc8aca2a9c09
child 524585 b4b1d6f91ef0c115bed09a68c160ffa0e50177e3
push id37322
push userdvarga@mozilla.com
push dateFri, 17 Apr 2020 10:01:43 +0000
treeherdermozilla-central@48cefa8cc058 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersbackout
bugs1347710, 1630860
milestone77.0a1
backs outa6904ec3d1e0cf35865779c117eb9d081a815449
first release with
nightly linux32
48cefa8cc058 / 77.0a1 / 20200417100143 / files
nightly linux64
48cefa8cc058 / 77.0a1 / 20200417100143 / files
nightly mac
48cefa8cc058 / 77.0a1 / 20200417100143 / files
nightly win32
48cefa8cc058 / 77.0a1 / 20200417100143 / files
nightly win64
48cefa8cc058 / 77.0a1 / 20200417100143 / files
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
releases
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Backed out changeset a6904ec3d1e0 (bug 1347710) for causing Bug 1630860 a=backout
browser/app/profile/firefox.js
ipc/glue/GeckoChildProcessHost.cpp
--- a/browser/app/profile/firefox.js
+++ b/browser/app/profile/firefox.js
@@ -1025,17 +1025,17 @@ pref("dom.ipc.shims.enabledWarnings", fa
   // allow stack tracing.  This does not require a restart to take effect.
   pref("security.sandbox.windows.log.stackTraceDepth", 0);
 
   // This controls the strength of the Windows GPU process sandbox.  Changes
   // will require restart.
   // For information on what the level number means, see
   // SetSecurityLevelForGPUProcess() in
   // security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
-  pref("security.sandbox.gpu.level", 1);
+  pref("security.sandbox.gpu.level", 0);
 
   // Controls whether we disable win32k for the processes.
   // true means that win32k system calls are not permitted.
   pref("security.sandbox.rdd.win32k-disable", true);
   // Note: win32k is currently _not_ disabled for GMP due to intermittent test
   // failures, where the GMP process fails very early. See bug 1449348.
   pref("security.sandbox.gmp.win32k-disable", false);
 #endif
--- a/ipc/glue/GeckoChildProcessHost.cpp
+++ b/ipc/glue/GeckoChildProcessHost.cpp
@@ -575,17 +575,17 @@ void GeckoChildProcessHost::PrepareLaunc
 #  if defined(MOZ_SANDBOX)
   // For other process types we can't rely on them being launched on main
   // thread and they may not have access to prefs in the child process, so allow
   // them to turn on logging via an environment variable.
   mEnableSandboxLogging =
       mEnableSandboxLogging || !!PR_GetEnv("MOZ_SANDBOX_LOGGING");
 
   if (ShouldHaveDirectoryService() && mProcessType == GeckoProcessType_GPU) {
-    mozilla::Unused << NS_GetSpecialDirectory(NS_APP_PROFILE_DIR_STARTUP,
+    mozilla::Unused << NS_GetSpecialDirectory(NS_APP_USER_PROFILE_50_DIR,
                                               getter_AddRefs(mProfileDir));
   }
 #  endif
 #elif defined(XP_MACOSX)
 #  if defined(MOZ_SANDBOX)
   if (ShouldHaveDirectoryService() &&
       mProcessType != GeckoProcessType_GMPlugin) {
     mozilla::Unused << NS_GetSpecialDirectory(NS_APP_USER_PROFILE_50_DIR,