Bug 1567236: Drop Windows content sandbox level back to 5 on Nightly. r=gcp
authorBob Owen <bobowencode@gmail.com>
Fri, 19 Jul 2019 11:40:14 +0000
changeset 483474 eb7f4d56f54b3283fc15983ee859b5e62fcb9f3b
parent 483473 40d1a7318a944bcb1af9b48b52a2fc3a00c11248
child 483475 63ef0618ec9a07c438701e0357ef0d37abea0dd8
child 483476 abeee4a000ccc049a7404f2524f0faeec762ecbe
child 483595 882492b92644a77fef79c45168ab164c6581684f
push id36319
push userncsoregi@mozilla.com
push dateFri, 19 Jul 2019 15:30:41 +0000
treeherdermozilla-central@eb7f4d56f54b [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersgcp
bugs1567236
milestone70.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1567236: Drop Windows content sandbox level back to 5 on Nightly. r=gcp This is because of profiling and performance regressions, which we don't want to live with while we investigate. Differential Revision: https://phabricator.services.mozilla.com/D38645
browser/app/profile/firefox.js
--- a/browser/app/profile/firefox.js
+++ b/browser/app/profile/firefox.js
@@ -1033,17 +1033,17 @@ pref("dom.ipc.plugins.sandbox-level.flas
 pref("dom.ipc.plugins.sandbox-level.flash", 0);
 #endif
 
 // This controls the strength of the Windows content process sandbox for testing
 // purposes. This will require a restart.
 // On windows these levels are:
 // See - security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
 // SetSecurityLevelForContentProcess() for what the different settings mean.
-pref("security.sandbox.content.level", 6);
+pref("security.sandbox.content.level", 5);
 
 // This controls the depth of stack trace that is logged when Windows sandbox
 // logging is turned on.  This is only currently available for the content
 // process because the only other sandbox (for GMP) has too strict a policy to
 // allow stack tracing.  This does not require a restart to take effect.
 pref("security.sandbox.windows.log.stackTraceDepth", 0);
 
 // This controls the strength of the Windows GPU process sandbox.  Changes