Bug 1415250 Part 2: Make level 4 the default for the Windows content process sandbox. r=jimm
authorBob Owen <bobowencode@gmail.com>
Wed, 08 Nov 2017 08:06:15 +0000
changeset 441517 c376bb034ca65153a99e06ddd5dd9e69885823a1
parent 441516 da41769f7553cec255fbb34352020d90328aeadf
child 441518 f63559d7e6a570e4e73ba367964099394248e18d
child 441519 8b64b1c8347b77450b44135ab1fe713caf79a4d6
push id8130
push userryanvm@gmail.com
push dateThu, 09 Nov 2017 00:28:20 +0000
treeherdermozilla-beta@a49a6fa54363 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersjimm
bugs1415250
milestone58.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1415250 Part 2: Make level 4 the default for the Windows content process sandbox. r=jimm
browser/app/profile/firefox.js
--- a/browser/app/profile/firefox.js
+++ b/browser/app/profile/firefox.js
@@ -1040,21 +1040,17 @@ pref("dom.ipc.plugins.sandbox-level.flas
 #endif
 
 #if defined(MOZ_CONTENT_SANDBOX)
 // This controls the strength of the Windows content process sandbox for testing
 // purposes. This will require a restart.
 // On windows these levels are:
 // See - security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
 // SetSecurityLevelForContentProcess() for what the different settings mean.
-#if defined(NIGHTLY_BUILD)
 pref("security.sandbox.content.level", 4);
-#else
-pref("security.sandbox.content.level", 3);
-#endif
 
 // This controls the depth of stack trace that is logged when Windows sandbox
 // logging is turned on.  This is only currently available for the content
 // process because the only other sandbox (for GMP) has too strict a policy to
 // allow stack tracing.  This does not require a restart to take effect.
 pref("security.sandbox.windows.log.stackTraceDepth", 0);
 #endif