Security/Sandbox/2014-04-10

From MozillaWiki
< Security‎ | Sandbox
Revision as of 21:52, 24 October 2014 by Cpeterson (talk | contribs) (Created page with "<!-- Maybe don't screw with these links unless you've read this blog post: http://blog.johnath.com/2011/01/20/automatic-date-links-in-mediawiki/ Just copy them to new pages an...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search


« previous week | index | next week »

10 April 2014

B2G

  • arroway has been doing work to remove calls to open https://bugzilla.mozilla.org/show_bug.cgi?id=980924
    • but there are some problems with third party libraries
    • perhaps may need the policy compiler to make things more specific
    • there are some gecko calls to open - need to remote them (bugs are open)
  • QC graphics drivers run a network server in debug mode (983976)

Windows

  • bobowen adjusted the rights level so we don't break graphics code
    • to lower the integrity back where it was (lower than low), what can we do?
    • tabraldes will find out what's required.
  • spohl might be able to help with platform integration
  • tabraldes is going to start trying to sandbox a test plugin or the openh264 working code (from ekr)

Linux Mac OS

  • sid will talk to josh

Accessibility

  • dbolter spoke with tabraldes about how they can get accessiblity stuff working with e10s/sandboixng

jld is working on gc/cc logging enabled for e10s (FYI)