Whitespace cleanup, translators please ignore.

This commit is contained in:
Warren Block 2014-10-11 03:50:54 +00:00
parent b6edcea1ed
commit 3ee9f5f481
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=45790

View file

@ -1841,7 +1841,7 @@
<p>
The project to update the Intel graphics chipset driver
(i915kms) to a recent snapshot of the Linux upstream code
continues. A patch with a large chunk of updates has been
continues. A patch with a large chunk of updates has been
made available to check for regressions against current
functionality, but is not yet expected to provide fully
functional new functionality. The GEM I/O ioctl code path
@ -2038,6 +2038,7 @@
<p>Full support for thin provisioning, including capacity
usage reporting and thresholds notifications.</p>
</task>
<task>
<p>Inter-host XCOPY operations.</p>
</task>
@ -2086,15 +2087,19 @@
<task>
<p>Large page support</p>
</task>
<task>
<p>SMP support</p>
</task>
<task>
<p>Debug and cleanup</p>
</task>
<task>
<p>Security vetting</p>
</task>
<task>
<p>Performance tweaks</p>
</task>
@ -2134,34 +2139,34 @@
<body>
<p>Address Space Layout Randomization (ASLR) is a computer
security technique that aids in mitigating low-level
vulnerabilities such as buffer overflows. In order to
vulnerabilities such as buffer overflows. In order to
prevent an attacker from knowing where a given
exploitable vulnerability lies in memory, ASLR randomizes
the memory layout of running applications.</p>
<p>&os; lacks behind the industry in exploit mitigation
technologies. ASLR is a great first step in implementing
such technologies. Future exploit mitigation technologies
technologies. ASLR is a great first step in implementing
such technologies. Future exploit mitigation technologies
will rely on ASLR.</p>
<p>A lot has happened in the last few months. Shawn Webb gave
<p>A lot has happened in the last few months. Shawn Webb gave
presentations at both BSDCan 2014 and EuroBSDCon 2014. The
presentations were met with a lot of support and backing.
At the end of EuroBSDCon, an awesome developer named Ilya
Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter
Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter
have submitted our patch to Phabricator, &os;'s new
code review utility. Shawn Webb added an API for allowing
code review utility. Shawn Webb added an API for allowing
a debugger to disable ASLR in order to support
deterministic debugging with applications such as lldb or
gdb. Oliver Pinter enhanced the performance of our ASLR
implementation. A package building exp-run was ran and came
out favorably in terms of performance. Shawn Webb bumped up
gdb. Oliver Pinter enhanced the performance of our ASLR
implementation. A package building exp-run was ran and came
out favorably in terms of performance. Shawn Webb bumped up
the maximum number of bits allowed to be randomized to 20
and set the default to 14.</p>
<p>To aid in the upstreaming process of the ASLR project and
other security-related projects, Shawn Webb and Oliver Pinter
founded The HardenedBSD project. It exists primarily to
founded The HardenedBSD project. It exists primarily to
serve as a staging area for bleeding-edge development of
security-related projects for &os; prior to being merged
upstream.</p>
@ -2174,15 +2179,19 @@
<task>
<p>Get more people testing and reviewing our patch</p>
</task>
<task>
<p>Run more performance tests</p>
</task>
<task>
<p>Figure out why the two ports failed in the EXP-RUN.
Involve the port maintainers.</p>
</task>
<task>
<p>Test on different architectures (we need help with this)</p>
<p>Test on different architectures (we need help with
this)</p>
</task>
</help>
</project>