Security/Sandbox/2014-05-15

< Security‎ | Sandbox
Revision as of 21:54, 24 October 2014 by Cpeterson (talk | contribs) (Created page with "<!-- Maybe don't screw with these links unless you've read this blog post: http://blog.johnath.com/2011/01/20/automatic-date-links-in-mediawiki/ Just copy them to new pages an...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)


« previous week | index | next week »

15 may 2014

Linux:

  • Maire is going to try and find some more help for LInux and Mac
  • We need good measurements about perf implications of ipdl
  • We need a file access story (OPEN).

Windows

  • Tim is queued up for this after the h264 stuff

OpenH264

  • (fx32/33 targetted for support of h264 on desktop for all major desktop platforms)
  • File access on linux may be more complicated due to the difference in framework
  • On windows, very close. Intermittent orange that goes permaorange with tim's patch
  • [tim] Also (forgot to mention) we're setting security token to USER_RESTRICTED_SAME_ACCESS but we should be able to lock down even further (USER_LOCKDOWN). We'll land as is but as a follow-up should investigate why anything lower than USER_RESTRICTED_SAME_ACCESS causes problems with IPC

B2G:

  • still working on the OPEN problem
    • Will need a good solution here for desktop linux for EME etc. (Good file access controls where we can whitelist specfic files)
  • open performance issues with libgenlock and remoting https://bugzilla.mozilla.org/show_bug.cgi?id=980924