author | Ryan VanderMeulen <ryanvm@gmail.com> |
Tue, 10 Feb 2015 09:32:26 -0500 | |
changeset 231891 | ec41cc2959b5889310a1b499f7790bfb7c2b5cae |
parent 231890 | 6dfab0f84d52708d4be83453961c4fea1050e60a |
child 231892 | 4e1809fa5a22da91ec82c6627b2daf6296a5b338 |
push id | 28362 |
push user | ryanvm@gmail.com |
push date | Wed, 04 Mar 2015 21:35:51 +0000 |
treeherder | mozilla-central@56492f7244a9 [default view] [failures only] |
perfherder | [talos] [build metrics] [platform microbench] (compared to previous push) |
reviewers | lmandel |
bugs | 1120993, 1125891, 1119941 |
milestone | 39.0a1 |
first release with | nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
|
last release without | nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
|
--- a/browser/app/profile/firefox.js +++ b/browser/app/profile/firefox.js @@ -1158,18 +1158,17 @@ pref("browser.bookmarks.editDialog.first // Whether to use a panel that looks like an OS X sheet for customization #ifdef XP_MACOSX pref("toolbar.customization.usesheet", true); #else pref("toolbar.customization.usesheet", false); #endif -// Disable Flash protected mode to reduce hang/crash rates. -pref("dom.ipc.plugins.flash.disable-protected-mode", true); +pref("dom.ipc.plugins.flash.disable-protected-mode", false); // Feature-disable the protected-mode auto-flip pref("browser.flash-protected-mode-flip.enable", true); // Whether we've already flipped protected mode automatically pref("browser.flash-protected-mode-flip.done", false); #ifdef XP_MACOSX @@ -1196,17 +1195,16 @@ pref("security.sandbox.windows.log", fal // the plugin's nice file name, see: nsPluginTag::GetNiceFileName. // On windows these levels are: // 0 - no sandbox // 1 - sandbox with USER_NON_ADMIN access token level // 2 - a more strict sandbox, which might cause functionality issues // 3 - the strongest settings we seem to be able to use without breaking // everything, but will definitely cause some functionality restrictions pref("dom.ipc.plugins.sandbox-level.default", 0); -pref("dom.ipc.plugins.sandbox-level.flash", 1); #if defined(MOZ_CONTENT_SANDBOX) // This controls whether the Windows content process sandbox is using a more // strict sandboxing policy. This will require a restart. pref("security.sandbox.windows.content.moreStrict", false); #if defined(MOZ_STACKWALKING) // This controls the depth of stack trace that is logged when Windows sandbox