Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Jan 2009 18:46:38 GMT
From:      Rene Ladan <rene@FreeBSD.org>
To:        Perforce Change Reviews <perforce@FreeBSD.org>
Subject:   PERFORCE change 156752 for review
Message-ID:  <200901271846.n0RIkcXQ068617@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
http://perforce.freebsd.org/chv.cgi?CH=156752

Change 156752 by rene@rene_self on 2009/01/27 18:46:16

	IFC	

Affected files ...

.. //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/security/chapter.sgml#10 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/books/pmake/basics/chapter.sgml#2 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/books/porters-handbook/book.sgml#19 integrate
.. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml#17 integrate
.. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml#17 integrate
.. //depot/projects/docproj_nl/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent#13 integrate
.. //depot/projects/docproj_nl/share/pgpkeys/rafan.key#2 integrate
.. //depot/projects/docproj_nl/www/en/community.xsl#4 integrate
.. //depot/projects/docproj_nl/www/en/donations/wantlist.sgml#9 integrate
.. //depot/projects/docproj_nl/www/en/smp/index.sgml#3 integrate
.. //depot/projects/docproj_nl/www/share/sgml/events.xml#13 integrate
.. //depot/projects/docproj_nl/www/share/sgml/libcommon.xsl#4 integrate

Differences ...

==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/security/chapter.sgml#10 (text+ko) ====

@@ -1,7 +1,7 @@
 <!--
      The FreeBSD Documentation Project
 
-     $FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.332 2008/11/04 19:24:20 manolis Exp $
+     $FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.333 2009/01/27 16:23:45 keramida Exp $
 -->
 
 <chapter id="security">
@@ -594,25 +594,65 @@
 	use a KLD module to install his own <devicename>bpf</devicename>
 	device, or other sniffing
 	device, on a running kernel.  To avoid these problems you have to
-	run the kernel at a higher secure level, at least securelevel 1.
-	The securelevel can be set with a <command>sysctl</command> on
-	the <varname>kern.securelevel</varname> variable.  Once you have
-	set the securelevel to 1, write access to raw devices will be
-	denied and special <command>chflags</command> flags,
-	such as <literal>schg</literal>,
-	will be enforced.  You must also ensure that the
-	<literal>schg</literal> flag is set on critical startup binaries,
-	directories, and script files &mdash; everything that gets run up
-	to the point where the securelevel is set.  This might be overdoing
-	it, and upgrading the system is much more difficult when you
-	operate at a higher secure level.  You may compromise and run the
-	system at a higher secure level but not set the
-	<literal>schg</literal> flag for every system file and directory
-	under the sun.  Another possibility is to simply mount
-	<filename>/</filename> and <filename>/usr</filename> read-only.
-	It should be noted that being too draconian in what you attempt to
-	protect may prevent the all-important detection of an
-	intrusion.</para>
+	run the kernel at a higher secure level, at least securelevel 1.</para>
+
+      <para>The secure level of the kernel can be set in a variety of ways.
+	The simplest way of raising the secure level of a running kernel is
+	through a <command>sysctl</command> on
+	the <varname>kern.securelevel</varname> kernel variable:</para>
+
+      <screen>&prompt.root; <userinput>sysctl kern.securelevel=<replaceable>1</replaceable></userinput></screen>
+
+      <para>By default, the &os; kernel boots with a secure level of -1.  The
+	secure level will remain at -1 unless it is altered, either by the
+	administrator or by &man.init.8; because of a setting in the start up
+	scripts.  The secure level may be raised during system startup by
+	setting the <varname>kern_securelevel_enable</varname> variable to
+	<literal>YES</literal> in the <filename>/etc/rc.conf</filename> file,
+	and the value of the <varname>kern_securelevel</varname> variable to
+	the desired secure level.</para>
+
+      <para>The default secure level of an &os; system right after the startup
+	scripts are done is -1.  This is called <quote>insecure mode</quote>
+	because immutable file flags may be turned off, all devices may be
+	read from or written to, and so on.</para>
+
+      <para>Once the secure level is set to 1 or a higher value, the
+	append-only and immutable files are honored, they cannot be turned
+	off, and access to raw devices will be denied.  Higher levels restrict
+	even more operations.  For a full description of the effect of various
+	secure levels, please read the &man.security.7; manual page (or the
+	manual page of &man.init.8; in releases older than &os; 7.0).</para>
+
+      <note>
+	<para>Bumping the secure level to 1 or higher may cause a few problems
+	  to X11 (access to <filename>/dev/io</filename> will be blocked), or
+	  to the installation of &os; build from source
+	  (the <maketarget>installworld</maketarget> part of the process needs
+	  to temporarily reset the append-only and immutable flags of some
+	  files), and in a few other cases.  Sometimes, as in the case of X11,
+	  it may be possible to work around this by starting &man.xdm.1;
+	  pretty early in the boot process, when the securelevel is still low
+	  enough.  Workarounds like this may not be possible for all secure
+	  levels or for all the potential restrictions they enforce.  A bit of
+	  forward planning is a good idea.  Understanding the restrictions
+	  imposed by each secure level is important as they severly diminish
+	  the ease of system use.  It will also make choosing a default
+	  setting much simpler and prevent any surprises.</para>
+      </note>
+
+      <para>If the kernel's secure level is raised to 1 or a higher value, it
+	may be useful to set the <literal>schg</literal> flag on critical
+	startup binaries, directories, and script files (i.e. everything that
+	gets run up to the point where the securelevel is set).  This might be
+	overdoing it, and upgrading the system is much more difficult when it
+	operates at a high secure level.  A less strict compromise is to run
+	the system at a higher secure level but skip setting set
+	the <literal>schg</literal> flag for every system file and directory
+	under the sun.  Another possibility is to simply
+	mount <filename>/</filename> and <filename>/usr</filename> read-only.
+	It should be noted that being too draconian about what is permitted
+	may prevent the all-important detection of an intrusion.</para>
     </sect2>
 
     <sect2 id="security-integrity">

==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/pmake/basics/chapter.sgml#2 (text+ko) ====

@@ -1,5 +1,5 @@
 <!--
-     $FreeBSD: doc/en_US.ISO8859-1/books/pmake/basics/chapter.sgml,v 1.5 2006/08/28 18:59:16 blackend Exp $
+     $FreeBSD: doc/en_US.ISO8859-1/books/pmake/basics/chapter.sgml,v 1.6 2009/01/24 22:13:12 danger Exp $
 -->
 
 <chapter id="basics">
@@ -83,9 +83,6 @@
 
     <informaltable frame="none">
       <tgroup cols="2">
-	<colspec colwidth="1*">
-	<colspec colwidth="10*">
-
 	<tbody>
 	  <row valign="top">
 	    <entry><literal>:</literal></entry>
@@ -178,9 +175,6 @@
 
     <informaltable frame="none">
       <tgroup cols="2">
-	<colspec colwidth="1*">
-	<colspec colwidth="10*">
-
 	<tbody>
 	  <row valign="top">
 	    <entry><literal>{}</literal></entry>
@@ -1019,9 +1013,6 @@
 
 	  <informaltable frame="none">
 	    <tgroup cols="2">
-	      <colspec colwidth="1*">
-	      <colspec colwidth="7*">
-
 	      <tbody>
 		<row valign="top">
 		  <entry><literal>a</literal></entry>

==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/porters-handbook/book.sgml#19 (text+ko) ====

@@ -1,7 +1,7 @@
 <!--
      The FreeBSD Documentation Project
 
-     $FreeBSD: doc/en_US.ISO8859-1/books/porters-handbook/book.sgml,v 1.970 2009/01/21 13:05:36 pav Exp $
+     $FreeBSD: doc/en_US.ISO8859-1/books/porters-handbook/book.sgml,v 1.971 2009/01/27 16:05:37 tabthorpe Exp $
 -->
 
 <!DOCTYPE BOOK PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN" [
@@ -2412,10 +2412,10 @@
 	  hereon.</para>
 
 	<para>A little background first.  OpenBSD has a neat feature
-	  inside both <makevar>DISTFILES</makevar> and
-	  <makevar>PATCHFILES</makevar> variables, both files and
-	  patches can be postfixed with <literal>:n</literal>
-	  identifiers where <literal>n</literal> both can be
+	  inside the <makevar>DISTFILES</makevar> and
+	  <makevar>PATCHFILES</makevar> variables which allows files and
+	  patches to be postfixed with <literal>:n</literal>
+	  identifiers. Here, <literal>n</literal> can be both 
 	  <literal>[0-9]</literal> and denote a group designation.
 	  For example:</para>
 
@@ -2436,7 +2436,7 @@
 	  as hell where <filename>beta</filename> is carried by all
 	  sites in <makevar>MASTER_SITES</makevar>, and
 	  <filename>alpha</filename> can only be found in the 20th
-	  site.  It would be such a waste to check all of them if
+	  site.  It would be such a waste to check all of them if the
 	  maintainer knew this beforehand, would it not?  Not a good
 	  start for that lovely weekend!</para>
 
@@ -3121,7 +3121,7 @@
 	  challenge for port maintainers</ulink> section.</para>
 
 	<para>Changes to the port will be sent to the maintainer of
-	  a port for a review and an approval before being committed.
+	  a port for review and approval before being committed.
 	  If the maintainer does not respond to an update
 	  request after two weeks (excluding major public
 	  holidays), then that is considered a maintainer timeout, and the
@@ -3137,8 +3137,8 @@
 	  to better match existing policies and style of the Ports
 	  Collection without explicit blessing from the submitter.
 	  Also, large infrastructural changes can result in
-	  a port being modified without maintainer's consent.
-	  This kind of changes will never affect the port's
+	  a port being modified without the maintainer's consent.
+	  These kinds of changes will never affect the port's
 	  functionality.</para>
 
 	<para>The &a.portmgr; reserves the right to revoke or override
@@ -4090,7 +4090,7 @@
 
 	<para>Two macros exists for this situation.  The advantage of using
 	  these macros instead of <command>cp</command> is that they guarantee
-	  proper file ownership and permissions on target files.  First macro,
+	  proper file ownership and permissions on target files.  The first macro,
 	  <makevar>COPYTREE_BIN</makevar>, will set all the installed files to
 	  be executable, thus being suitable for installing into
 	  <filename><makevar>PREFIX</makevar>/bin</filename>.  The second
@@ -8645,6 +8645,11 @@
       <para>The packing list still has to be tidied up by hand as
 	stated above.</para>
 
+      <para>Another tool that might be used to create an initial
+	<filename>pkg-plist</filename> is <filename
+	role="package">ports-mgmt/genplist</filename>.  As with any
+	automated tool, the resulting <filename>pkg-plist</filename>
+	should be checked and manually edited as needed.</para>
     </sect1>
 
     </chapter>
@@ -11882,7 +11887,7 @@
 		  <row>
 		    <entry>7.0-CURRENT after
 		      RFC 3678 API support added to the IPv4 stack.
-		      Legacy RFC 1724 behaviour of the IP_MULTICAST_IF
+		      Legacy RFC 1724 behavior of the IP_MULTICAST_IF
 		      ioctl has now been removed; 0.0.0.0/8 may no longer
 		      be used to specify an interface index.
 		      struct ipmreqn should be used instead.</entry>

==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml#17 (text+ko) ====

@@ -1,7 +1,7 @@
 <!--
      The FreeBSD Dutch Documentation Project
 
-     $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.12 2009/01/11 21:30:06 rene Exp $
+     $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.13 2009/01/23 16:50:43 rene Exp $
      $FreeBSDnl: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.47 2006/01/07 11:27:42 siebrand Exp $
 
      %SOURCE%	en_US.ISO8859-1/books/handbook/cutting-edge/chapter.sgml

==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml#17 (text+ko) ====

@@ -1,7 +1,7 @@
 <!--
      The FreeBSD Dutch Documentation Project
 
-     $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.16 2008/12/15 21:31:28 rene Exp $
+     $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.17 2009/01/23 16:46:10 rene Exp $
      $FreeBSDnl: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.35 2006/08/25 10:44:57 remko Exp $
      Vertaald door: Siebrand Mazeland
 

==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent#13 (text+ko) ====

@@ -1,7 +1,7 @@
 <!--
     Namen van FreeBSD mailinglijsten en gerelateerde software.
 
-    $FreeBSD: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.15 2008/10/20 20:21:01 remko Exp $
+    $FreeBSD: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.16 2009/01/23 16:46:11 rene Exp $
     $FreeBSDnl: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.21 2006/08/25 10:40:41 remko Exp $
     Vertaald door: Siebrand Mazeland
 

==== //depot/projects/docproj_nl/share/pgpkeys/rafan.key#2 (text+ko) ====

@@ -1,15 +1,14 @@
-<!-- $FreeBSD: doc/share/pgpkeys/rafan.key,v 1.1 2006/06/26 03:21:58 rafan Exp $ -->
+<!-- $FreeBSD: doc/share/pgpkeys/rafan.key,v 1.2 2009/01/25 06:22:04 rafan Exp $ -->
 <!--
-sh ./addkey.sh rafan 86FD8C68;
+sh addkey.sh rafan 86FD8C68;
 -->
 <programlisting role="pgpfingerprint"><![CDATA[
 pub   1024D/86FD8C68 2004-06-04
       Key fingerprint = DC9E 5B4D 2DDA D5C7 B6F8  6E69 D78E 1091 86FD 8C68
 uid                  Rong-En Fan <rafan@infor.org>
 uid                  Rong-En Fan <rafan@csie.org>
-uid                  Rong-En Fan (CSIE, NTU) <b90098@csie.ntu.edu.tw>
 uid                  Rong-En Fan <rafan@FreeBSD.org>
-sub   2048g/CC9AC94F 2004-06-04 [expires: 2009-06-03]
+sub   2048g/42A8637E 2009-01-25 [expires: 2012-07-08]
 ]]></programlisting>
 <programlisting role="pgpkey"><![CDATA[
 -----BEGIN PGP PUBLIC KEY BLOCK-----
@@ -56,38 +55,37 @@
 6VBBBaIzLACgnyfZ68crJwlv+fRxPhlxdFhgLgaIRgQTEQIABgUCQNCjCgAKCRBD
 ZXPuA1v3XCeuAJwPrsSVVCrC29F3Xygr6QB3MS4a7QCfeOsqHEfwiXuxt2xjcF09
 r0H7/96IRgQTEQIABgUCQdOcWQAKCRCsxgFlEcAjgmKeAJ9dWtZYU93qkd6Cdpo8
-jKbYq4y+BwCdFbqSBm3EwGgfzQZfvF42tacT2pW0MFJvbmctRW4gRmFuIChDU0lF
-LCBOVFUpIDxiOTAwOThAY3NpZS5udHUuZWR1LnR3PoheBBMRAgAeAhsDBgsJCAcD
-AgMVAgMDFgIBAh4BAheABQJAv+zmAAoJENeOEJGG/YxortwAniGXfizNBB0FJqxY
-a9fwjQXuCqhDAKCVopA1UMEswlv/osv41TXWwOzS84hFBBMRAgAGBQJAzGqzAAoJ
-EEKmSwvz9BnIi1kAmJSIHlwK+ZixVVenJzWnw2E+62EAnRsRvLeETz7aikmh5Yvd
-pWUNwHu0iEYEExECAAYFAkDMf00ACgkQBbz5zdSySILkrQCfeAXv6CFk9GijNtYW
-L+/GPwkdmLIAnAgNUUUChGlslG6gcjGolSdY3zvIiEYEExECAAYFAkDNDC4ACgkQ
-z8H8hiDrxkE56ACfRTItJiynItOoNSOt9fZQPOo6SpQAoJGT/lO7RlCYmkeiP62A
-X7sX+DmViEYEExECAAYFAkDMgcUACgkQCQM7t5B2mhAlqwCfRFillUo/5PB7QzvY
-YmflEgSWCoYAn3u6t8jni4PEltvRVn6qg9CF0pU5iEYEExECAAYFAkDOnpAACgkQ
-4yBMH10rsRoW6gCfZ7o0wkHWbPgEkXV/fwzGHIvhI9QAn3nkgqFi7Fo2gbJrfhn9
-zTdIjrRTiEYEExECAAYFAkDMhHwACgkQVLe2nHfUM4MgUACfb8BW/GER+rQe49Xn
-CCM06HZPlcQAoKYldHWK4QxhTZbSIZ8qwqcj1l3OiEYEExECAAYFAkDQowoACgkQ
-Q2Vz7gNb91zzqACgoLhLxEyI6Kf49QHgc34KzqYGXxUAn2hHOlDEBvyX8IaI+TaK
-svFbGsgLiEYEExECAAYFAkHTnFkACgkQrMYBZRHAI4KJQACeJhAYTXUCUiQrcfcQ
-ntCi7QikU3wAnj4bgydk6k3zT+fiFytJNCIdAIOXtB9Sb25nLUVuIEZhbiA8cmFm
-YW5ARnJlZUJTRC5vcmc+iGAEExECACAFAkSfQfQCGwMGCwkIBwMCBBUCCAMEFgID
-AQIeAQIXgAAKCRDXjhCRhv2MaEwHAJ4oy/obTSGCioDxVB5c+51TU56t7wCeNjIE
-k7aOCyrrNcByfsl0FNcuIee5Ag0EQL/q2RAIAPXcIiQWiDDoGQoP1+l6i0VnMTwH
-UrBsuqviQE2FJ53a9ZjtUD+22vO+xuWdxPs3FLfH1yQrxM1QvvR4Tza/gkHFs6xc
-AOJeT0VLziqdWULvFK4WhFMg7ZE74ywgkg6TChb9dPfNFBpLZSy6hnAop/95rxSF
-7N/6+d423PDUFogEXbUvhgKQBGCzjhl5ScJhGoM3t/7LlVQqAD9wTkMXHDs8q9Ex
-/ZBMNmWwLv0p8qgz8v5uc6RytWaovlEItjXiQBpg5l8nRLbkvJZwrHaNz17OIuvs
-3DaBJ99JhKcyC+Bv4o/7g3ak5DHQRiXurbah762Pcvar+sl49R1+gy3MFGsAAwYH
-/RbgiCMc24EIYFusPEJ5dCV/D+ttWsTTeVzPisxcTSLkTACCJWv1JetFey/7jHJy
-vqpnc7wm2krqzFOg5t5h42V4MnJkoX1k0A9MylxwCCO4V6YeaJPachmSMaQ5WNcn
-Z2npke20ExRHkkVVXjV6LIiy1bLK7RqI/+PVzlu8TI+A9i1hKWIfBCE1nL0mMC55
-vJsOQ3i/1VVfP1i3LRNWqCwv2evQo2mFOXNN6egFFE5sCYFdigKV1ISvA3QC5i0P
-fj5mfWaw/nm3xvG/JAK1Yi3ASM9esPTka7jF1FLXdFdRvK1otgUlJCWD9eTeIodu
-1gNOHz08MiGY9RsOihGmgUOITwQYEQIADwUCQL/q2QIbDAUJCWYBgAAKCRDXjhCR
-hv2MaNQsAJ9xwOgnX1DE7kHQEhae7kOvcJ/JsgCcC9yPXelrbRzgga+1zZCnD+O5
-6D0=
-=ZFgs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+=1iVI
 -----END PGP PUBLIC KEY BLOCK-----
 ]]></programlisting>

==== //depot/projects/docproj_nl/www/en/community.xsl#4 (text+ko) ====

@@ -6,7 +6,7 @@
 <!ENTITY % navinclude.community "INCLUDE">
 ]>
 
-<!-- $FreeBSD: www/en/community.xsl,v 1.7 2008/12/30 08:58:50 murray Exp $ -->
+<!-- $FreeBSD: www/en/community.xsl,v 1.9 2009/01/25 06:33:06 danger Exp $ -->
 
 <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0"
   xmlns:cvs="http://www.FreeBSD.org/XML/CVS">;
@@ -47,7 +47,9 @@
 
 	      <p>There are more than one hundred <a
 		href="&base;/community/mailinglists.html">mailing
-		lists</a> and several <a
+		lists</a>, dozens of web-based <a
+		  href="http://forums.FreeBSD.org/">forums</a>, and
+		several <a
 		href="&base;/community/newsgroups.html">newsgroups</a>
 		available.  There are over <xsl:value-of
 		select="count(document($usergroups.xml)//entry)"

==== //depot/projects/docproj_nl/www/en/donations/wantlist.sgml#9 (text+ko) ====

@@ -1,6 +1,6 @@
 <!DOCTYPE HTML PUBLIC "-//FreeBSD//DTD HTML 4.01 Transitional-Based Extension//EN" [
 <!ENTITY base CDATA "..">
-<!ENTITY date "$FreeBSD: www/en/donations/wantlist.sgml,v 1.473 2008/12/21 18:34:24 wilko Exp $">
+<!ENTITY date "$FreeBSD: www/en/donations/wantlist.sgml,v 1.474 2009/01/26 15:22:33 tabthorpe Exp $">
 <!ENTITY title "FreeBSD Developers Want List">
 <!ENTITY email 'donations'>
 <!ENTITY % navinclude.about "INCLUDE">
@@ -404,6 +404,13 @@
 	<td>802.11a (5GHz) accesspoint with WPA2</td>
 	<td>Hopefully improve WiFi in 2.4GHz-infested apartment building.</td>
       </tr>
+
+      <tr>
+	<td>rui</td>
+	<td>Portugal</td>
+	<td>Intel Mac, possibly Mac Mini for a small shipment fee</td>
+	<td>EFI support under FreeBSD and other Mac development work.</td>
+      </tr>
     </table>
 
   &footer;

==== //depot/projects/docproj_nl/www/en/smp/index.sgml#3 (text+ko) ====

@@ -1,6 +1,6 @@
 <!DOCTYPE HTML PUBLIC "-//FreeBSD//DTD HTML 4.01 Transitional-Based Extension//EN" [
 <!ENTITY base CDATA "..">
-<!ENTITY date "$FreeBSD: www/en/smp/index.sgml,v 1.177 2008/08/20 21:59:45 ed Exp $">
+<!ENTITY date "$FreeBSD: www/en/smp/index.sgml,v 1.178 2009/01/25 21:08:22 danger Exp $">
 <!ENTITY title "FreeBSD SMPng Project">
 <!ENTITY email 'freebsd-smp'>
 <!ENTITY % navinclude.developers "INCLUDE">
@@ -201,29 +201,29 @@
 	  primitives can be found here:</p>
 
 	    <ul>
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mutex&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Kernel Mutexes (mutex(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mutex&amp;apropos=0&amp;sektion=9">Kernel Mutexes (mutex(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mtx_pool&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Kernel Mutex Pools (mtx_pool(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mtx_pool&amp;apropos=0&amp;sektion=9">Kernel Mutex Pools (mtx_pool(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=critical&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Kernel Critical Sections (critical(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=critical&amp;apropos=0&amp;sektion=9">Kernel Critical Sections (critical(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sx&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Kernel Shared/Exclusive Locks (sx(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sx&amp;apropos=0&amp;sektion=9">Kernel Shared/Exclusive Locks (sx(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=condvar&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Kernel Condition Variables (condvar(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=condvar&amp;apropos=0&amp;sektion=9">Kernel Condition Variables (condvar(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sema&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Kernel Semaphores (sema(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sema&amp;apropos=0&amp;sektion=9">Kernel Semaphores (sema(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sleep&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Kernel sleep/wakeup API (sleep(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sleep&amp;apropos=0&amp;sektion=9">Kernel sleep/wakeup API (sleep(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=kthread&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Kernel Threads (kthread(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=kthread&amp;apropos=0&amp;sektion=9">Kernel Threads (kthread(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=ithread&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Interrupt Threads (ithread(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=ithread&amp;apropos=0&amp;sektion=9">Interrupt Threads (ithread(9))</a></li>
 
-	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=swi&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">Software Interrupt Threads (swi(9))</a></li>
+	      <li><a href="http://www.freebsd.org/cgi/man.cgi?query=swi&amp;apropos=0&amp;sektion=9">Software Interrupt Threads (swi(9))</a></li>
 	    </ul>
 
 	  <br>
-	  <p>In addition, the old <a href="http://www.freebsd.org/cgi/man.cgi?query=spl&amp;apropos=0&amp;sektion=9&amp;manpath=FreeBSD+6.0-current">SPL man page</a> may be of interest, as it reflects the previous SMP synchronization model.</p>
+	  <p>In addition, the old <a href="http://www.freebsd.org/cgi/man.cgi?query=spl&amp;apropos=0&amp;sektion=9">SPL man page</a> may be of interest, as it reflects the previous SMP synchronization model.</p>
 	</li>
 
       <li><p>

==== //depot/projects/docproj_nl/www/share/sgml/events.xml#13 (text+ko) ====

@@ -10,10 +10,34 @@
 <events>
   <cvs:keywords xmlns:cvs="http://www.FreeBSD.org/XML/CVS" version="1.0">
     <cvs:keyword name="freebsd">
-      $FreeBSD: www/share/sgml/events.xml,v 1.66 2009/01/06 13:45:10 danger Exp $
+      $FreeBSD: www/share/sgml/events.xml,v 1.67 2009/01/24 19:07:08 danger Exp $
     </cvs:keyword>
   </cvs:keywords>
 
+  <event id="bugathon-jan09">
+    <name>Network-related Bugathon #6</name>
+    <url>http://wiki.freebsd.org/Bugathons/January2009</url>;
+    <startdate>
+      <year>2009</year>
+      <month>1</month>
+      <day>30</day>
+    </startdate>
+    <enddate>
+      <year>2009</year>
+      <month>2</month>
+      <day>1</day>
+    </enddate>
+
+    <description>A bugathon is an event coordinated by the &os;
+      bugbusting team.  Bugathons are held on IRC (in the
+      #freebsd-bugbusters channel of EFnet), and are attended by any
+      interested &os; developers and contributors during a week-end.
+      They focus on closing as many problem reports and fixing as many
+      bugs as possible.  The plan for the sixth bugathon is to work
+      through the all network-related problem reports in &os;'s GNATS
+      database.</description>
+  </event>
+
   <event id="fosdem-2009">
     <name>FOSDEM '09</name>
     <url>http://fosdem.org/2009/</url>;

==== //depot/projects/docproj_nl/www/share/sgml/libcommon.xsl#4 (text+ko) ====

@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="ISO-8859-1" ?>
 <!DOCTYPE xsl:stylesheet PUBLIC "-//FreeBSD//DTD FreeBSD XSLT 1.0 DTD//EN"
 				"http://www.FreeBSD.org/XML/www/share/sgml/xslt10-freebsd.dtd">;
-<!-- $FreeBSD: www/share/sgml/libcommon.xsl,v 1.25 2009/01/13 22:44:00 lwhsu Exp $ -->
+<!-- $FreeBSD: www/share/sgml/libcommon.xsl,v 1.26 2009/01/25 10:12:01 danger Exp $ -->
 
 <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
   version="1.0"
@@ -1428,7 +1428,9 @@
         <xsl:value-of select="name"/>
 
 	<br />
-	(<xsl:value-of select='location/city' />, <xsl:value-of select='location/country' />)
+	<xsl:if test="location/city!='' and location/country!=''">
+	  (<xsl:value-of select='location/city' />, <xsl:value-of select='location/country' />)
+	</xsl:if>
       </a></p>
     </xsl:if>
     </xsl:for-each>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200901271846.n0RIkcXQ068617>