Bug 1383841 - [Mac] Disable sandbox violation logging by default. r=Alex_Gaynor
authorHaik Aftandilian <haftandilian@mozilla.com>
Mon, 24 Jul 2017 12:47:02 -0700
changeset 419369 6981ac43cc156f29b46e0486bd14850351753484
parent 419368 ea313d4b3093a9ad9d014e8860fc00dd4ed59e40
child 419370 4322e8f2e455cfe8c83bad13ca718a38e90bf456
push id7566
push usermtabara@mozilla.com
push dateWed, 02 Aug 2017 08:25:16 +0000
treeherdermozilla-beta@86913f512c3c [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersAlex_Gaynor
bugs1383841
milestone56.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1383841 - [Mac] Disable sandbox violation logging by default. r=Alex_Gaynor MozReview-Commit-ID: D1ZyXISUVev
browser/app/profile/firefox.js
--- a/browser/app/profile/firefox.js
+++ b/browser/app/profile/firefox.js
@@ -1129,17 +1129,17 @@ pref("security.sandbox.content.syscall_w
 // when a temporary writable file is required in a level 1 sandbox.
 pref("security.sandbox.content.tempDirSuffix", "");
 #endif
 #endif
 
 #if defined(MOZ_SANDBOX)
 // This pref determines if messages relevant to sandbox violations are
 // logged.
-#if defined(XP_WIN)
+#if defined(XP_WIN) || defined(XP_MACOSX)
 pref("security.sandbox.logging.enabled", false);
 #else
 pref("security.sandbox.logging.enabled", true);
 #endif
 #endif
 
 // This pref governs whether we attempt to work around problems caused by
 // plugins using OS calls to manipulate the cursor while running out-of-