This was backed-out while issues with EME and performance were addressed.

It should be re-enabled in the next Nightly.

If you find an issue that you suspect is caused by this, please retest 
after setting the pref back to 7 and restarting the browser.
Please file any bugs to block Bug 1403931 
<https://bugzilla.mozilla.org/show_bug.cgi?id=1403931>. 

Thanks,
Bob

On Friday 14 June 2024 at 23:49:22 UTC+1 Bob Owen wrote:

> In the next Nightly, content processes on Windows will be using a 
> USER_RESTRICTED access token level for the sandbox.
>
> This further restricts the SIDs in the process token and removes read 
> access to nearly all resources that are protected by an access control list.
>
> This is controlled by the new default of 8 for the pref: 
> security.sandbox.content.level
>
> If you find an issue that you suspect is caused by this, please retest 
> after setting the above pref back to 7 and restarting the browser.
> Please file any bugs to block Bug 1403931 
> <https://bugzilla.mozilla.org/show_bug.cgi?id=1403931>. 
>
> If you have certain default prefs that move processing out of the content 
> process flipped (e.g. webgl.out-of-process), then the effective level 
> will be 7 and USER_RESTRICTED will not be used. 
>
> Thanks, 
> Bob 

-- 
You received this message because you are subscribed to the Google Groups 
"dev-platform@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-platform+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/e4e7d1ea-a8a9-4295-89cd-2839849002e8n%40mozilla.org.

Reply via email to