Date: Tue, 27 Jan 2009 18:46:38 GMT From: Rene Ladan <rene@FreeBSD.org> To: Perforce Change Reviews <perforce@FreeBSD.org> Subject: PERFORCE change 156752 for review Message-ID: <200901271846.n0RIkcXQ068617@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
http://perforce.freebsd.org/chv.cgi?CH=156752 Change 156752 by rene@rene_self on 2009/01/27 18:46:16 IFC Affected files ... .. //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/security/chapter.sgml#10 integrate .. //depot/projects/docproj_nl/en_US.ISO8859-1/books/pmake/basics/chapter.sgml#2 integrate .. //depot/projects/docproj_nl/en_US.ISO8859-1/books/porters-handbook/book.sgml#19 integrate .. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml#17 integrate .. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml#17 integrate .. //depot/projects/docproj_nl/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent#13 integrate .. //depot/projects/docproj_nl/share/pgpkeys/rafan.key#2 integrate .. //depot/projects/docproj_nl/www/en/community.xsl#4 integrate .. //depot/projects/docproj_nl/www/en/donations/wantlist.sgml#9 integrate .. //depot/projects/docproj_nl/www/en/smp/index.sgml#3 integrate .. //depot/projects/docproj_nl/www/share/sgml/events.xml#13 integrate .. //depot/projects/docproj_nl/www/share/sgml/libcommon.xsl#4 integrate Differences ... ==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/security/chapter.sgml#10 (text+ko) ==== @@ -1,7 +1,7 @@ <!-- The FreeBSD Documentation Project - $FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.332 2008/11/04 19:24:20 manolis Exp $ + $FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.333 2009/01/27 16:23:45 keramida Exp $ --> <chapter id="security"> @@ -594,25 +594,65 @@ use a KLD module to install his own <devicename>bpf</devicename> device, or other sniffing device, on a running kernel. To avoid these problems you have to - run the kernel at a higher secure level, at least securelevel 1. - The securelevel can be set with a <command>sysctl</command> on - the <varname>kern.securelevel</varname> variable. Once you have - set the securelevel to 1, write access to raw devices will be - denied and special <command>chflags</command> flags, - such as <literal>schg</literal>, - will be enforced. You must also ensure that the - <literal>schg</literal> flag is set on critical startup binaries, - directories, and script files — everything that gets run up - to the point where the securelevel is set. This might be overdoing - it, and upgrading the system is much more difficult when you - operate at a higher secure level. You may compromise and run the - system at a higher secure level but not set the - <literal>schg</literal> flag for every system file and directory - under the sun. Another possibility is to simply mount - <filename>/</filename> and <filename>/usr</filename> read-only. - It should be noted that being too draconian in what you attempt to - protect may prevent the all-important detection of an - intrusion.</para> + run the kernel at a higher secure level, at least securelevel 1.</para> + + <para>The secure level of the kernel can be set in a variety of ways. + The simplest way of raising the secure level of a running kernel is + through a <command>sysctl</command> on + the <varname>kern.securelevel</varname> kernel variable:</para> + + <screen>&prompt.root; <userinput>sysctl kern.securelevel=<replaceable>1</replaceable></userinput></screen> + + <para>By default, the &os; kernel boots with a secure level of -1. The + secure level will remain at -1 unless it is altered, either by the + administrator or by &man.init.8; because of a setting in the start up + scripts. The secure level may be raised during system startup by + setting the <varname>kern_securelevel_enable</varname> variable to + <literal>YES</literal> in the <filename>/etc/rc.conf</filename> file, + and the value of the <varname>kern_securelevel</varname> variable to + the desired secure level.</para> + + <para>The default secure level of an &os; system right after the startup + scripts are done is -1. This is called <quote>insecure mode</quote> + because immutable file flags may be turned off, all devices may be + read from or written to, and so on.</para> + + <para>Once the secure level is set to 1 or a higher value, the + append-only and immutable files are honored, they cannot be turned + off, and access to raw devices will be denied. Higher levels restrict + even more operations. For a full description of the effect of various + secure levels, please read the &man.security.7; manual page (or the + manual page of &man.init.8; in releases older than &os; 7.0).</para> + + <note> + <para>Bumping the secure level to 1 or higher may cause a few problems + to X11 (access to <filename>/dev/io</filename> will be blocked), or + to the installation of &os; build from source + (the <maketarget>installworld</maketarget> part of the process needs + to temporarily reset the append-only and immutable flags of some + files), and in a few other cases. Sometimes, as in the case of X11, + it may be possible to work around this by starting &man.xdm.1; + pretty early in the boot process, when the securelevel is still low + enough. Workarounds like this may not be possible for all secure + levels or for all the potential restrictions they enforce. A bit of + forward planning is a good idea. Understanding the restrictions + imposed by each secure level is important as they severly diminish + the ease of system use. It will also make choosing a default + setting much simpler and prevent any surprises.</para> + </note> + + <para>If the kernel's secure level is raised to 1 or a higher value, it + may be useful to set the <literal>schg</literal> flag on critical + startup binaries, directories, and script files (i.e. everything that + gets run up to the point where the securelevel is set). This might be + overdoing it, and upgrading the system is much more difficult when it + operates at a high secure level. A less strict compromise is to run + the system at a higher secure level but skip setting set + the <literal>schg</literal> flag for every system file and directory + under the sun. Another possibility is to simply + mount <filename>/</filename> and <filename>/usr</filename> read-only. + It should be noted that being too draconian about what is permitted + may prevent the all-important detection of an intrusion.</para> </sect2> <sect2 id="security-integrity"> ==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/pmake/basics/chapter.sgml#2 (text+ko) ==== @@ -1,5 +1,5 @@ <!-- - $FreeBSD: doc/en_US.ISO8859-1/books/pmake/basics/chapter.sgml,v 1.5 2006/08/28 18:59:16 blackend Exp $ + $FreeBSD: doc/en_US.ISO8859-1/books/pmake/basics/chapter.sgml,v 1.6 2009/01/24 22:13:12 danger Exp $ --> <chapter id="basics"> @@ -83,9 +83,6 @@ <informaltable frame="none"> <tgroup cols="2"> - <colspec colwidth="1*"> - <colspec colwidth="10*"> - <tbody> <row valign="top"> <entry><literal>:</literal></entry> @@ -178,9 +175,6 @@ <informaltable frame="none"> <tgroup cols="2"> - <colspec colwidth="1*"> - <colspec colwidth="10*"> - <tbody> <row valign="top"> <entry><literal>{}</literal></entry> @@ -1019,9 +1013,6 @@ <informaltable frame="none"> <tgroup cols="2"> - <colspec colwidth="1*"> - <colspec colwidth="7*"> - <tbody> <row valign="top"> <entry><literal>a</literal></entry> ==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/porters-handbook/book.sgml#19 (text+ko) ==== @@ -1,7 +1,7 @@ <!-- The FreeBSD Documentation Project - $FreeBSD: doc/en_US.ISO8859-1/books/porters-handbook/book.sgml,v 1.970 2009/01/21 13:05:36 pav Exp $ + $FreeBSD: doc/en_US.ISO8859-1/books/porters-handbook/book.sgml,v 1.971 2009/01/27 16:05:37 tabthorpe Exp $ --> <!DOCTYPE BOOK PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN" [ @@ -2412,10 +2412,10 @@ hereon.</para> <para>A little background first. OpenBSD has a neat feature - inside both <makevar>DISTFILES</makevar> and - <makevar>PATCHFILES</makevar> variables, both files and - patches can be postfixed with <literal>:n</literal> - identifiers where <literal>n</literal> both can be + inside the <makevar>DISTFILES</makevar> and + <makevar>PATCHFILES</makevar> variables which allows files and + patches to be postfixed with <literal>:n</literal> + identifiers. Here, <literal>n</literal> can be both <literal>[0-9]</literal> and denote a group designation. For example:</para> @@ -2436,7 +2436,7 @@ as hell where <filename>beta</filename> is carried by all sites in <makevar>MASTER_SITES</makevar>, and <filename>alpha</filename> can only be found in the 20th - site. It would be such a waste to check all of them if + site. It would be such a waste to check all of them if the maintainer knew this beforehand, would it not? Not a good start for that lovely weekend!</para> @@ -3121,7 +3121,7 @@ challenge for port maintainers</ulink> section.</para> <para>Changes to the port will be sent to the maintainer of - a port for a review and an approval before being committed. + a port for review and approval before being committed. If the maintainer does not respond to an update request after two weeks (excluding major public holidays), then that is considered a maintainer timeout, and the @@ -3137,8 +3137,8 @@ to better match existing policies and style of the Ports Collection without explicit blessing from the submitter. Also, large infrastructural changes can result in - a port being modified without maintainer's consent. - This kind of changes will never affect the port's + a port being modified without the maintainer's consent. + These kinds of changes will never affect the port's functionality.</para> <para>The &a.portmgr; reserves the right to revoke or override @@ -4090,7 +4090,7 @@ <para>Two macros exists for this situation. The advantage of using these macros instead of <command>cp</command> is that they guarantee - proper file ownership and permissions on target files. First macro, + proper file ownership and permissions on target files. The first macro, <makevar>COPYTREE_BIN</makevar>, will set all the installed files to be executable, thus being suitable for installing into <filename><makevar>PREFIX</makevar>/bin</filename>. The second @@ -8645,6 +8645,11 @@ <para>The packing list still has to be tidied up by hand as stated above.</para> + <para>Another tool that might be used to create an initial + <filename>pkg-plist</filename> is <filename + role="package">ports-mgmt/genplist</filename>. As with any + automated tool, the resulting <filename>pkg-plist</filename> + should be checked and manually edited as needed.</para> </sect1> </chapter> @@ -11882,7 +11887,7 @@ <row> <entry>7.0-CURRENT after RFC 3678 API support added to the IPv4 stack. - Legacy RFC 1724 behaviour of the IP_MULTICAST_IF + Legacy RFC 1724 behavior of the IP_MULTICAST_IF ioctl has now been removed; 0.0.0.0/8 may no longer be used to specify an interface index. struct ipmreqn should be used instead.</entry> ==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml#17 (text+ko) ==== @@ -1,7 +1,7 @@ <!-- The FreeBSD Dutch Documentation Project - $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.12 2009/01/11 21:30:06 rene Exp $ + $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.13 2009/01/23 16:50:43 rene Exp $ $FreeBSDnl: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.47 2006/01/07 11:27:42 siebrand Exp $ %SOURCE% en_US.ISO8859-1/books/handbook/cutting-edge/chapter.sgml ==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml#17 (text+ko) ==== @@ -1,7 +1,7 @@ <!-- The FreeBSD Dutch Documentation Project - $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.16 2008/12/15 21:31:28 rene Exp $ + $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.17 2009/01/23 16:46:10 rene Exp $ $FreeBSDnl: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.35 2006/08/25 10:44:57 remko Exp $ Vertaald door: Siebrand Mazeland ==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent#13 (text+ko) ==== @@ -1,7 +1,7 @@ <!-- Namen van FreeBSD mailinglijsten en gerelateerde software. - $FreeBSD: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.15 2008/10/20 20:21:01 remko Exp $ + $FreeBSD: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.16 2009/01/23 16:46:11 rene Exp $ $FreeBSDnl: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.21 2006/08/25 10:40:41 remko Exp $ Vertaald door: Siebrand Mazeland ==== //depot/projects/docproj_nl/share/pgpkeys/rafan.key#2 (text+ko) ==== @@ -1,15 +1,14 @@ -<!-- $FreeBSD: doc/share/pgpkeys/rafan.key,v 1.1 2006/06/26 03:21:58 rafan Exp $ --> +<!-- $FreeBSD: doc/share/pgpkeys/rafan.key,v 1.2 2009/01/25 06:22:04 rafan Exp $ --> <!-- -sh ./addkey.sh rafan 86FD8C68; +sh addkey.sh rafan 86FD8C68; --> <programlisting role="pgpfingerprint"><![CDATA[ pub 1024D/86FD8C68 2004-06-04 Key fingerprint = DC9E 5B4D 2DDA D5C7 B6F8 6E69 D78E 1091 86FD 8C68 uid Rong-En Fan <rafan@infor.org> uid Rong-En Fan <rafan@csie.org> -uid Rong-En Fan (CSIE, NTU) <b90098@csie.ntu.edu.tw> uid Rong-En Fan <rafan@FreeBSD.org> -sub 2048g/CC9AC94F 2004-06-04 [expires: 2009-06-03] +sub 2048g/42A8637E 2009-01-25 [expires: 2012-07-08] ]]></programlisting> <programlisting role="pgpkey"><![CDATA[ -----BEGIN PGP PUBLIC KEY BLOCK----- @@ -56,38 +55,37 @@ 6VBBBaIzLACgnyfZ68crJwlv+fRxPhlxdFhgLgaIRgQTEQIABgUCQNCjCgAKCRBD ZXPuA1v3XCeuAJwPrsSVVCrC29F3Xygr6QB3MS4a7QCfeOsqHEfwiXuxt2xjcF09 r0H7/96IRgQTEQIABgUCQdOcWQAKCRCsxgFlEcAjgmKeAJ9dWtZYU93qkd6Cdpo8 -jKbYq4y+BwCdFbqSBm3EwGgfzQZfvF42tacT2pW0MFJvbmctRW4gRmFuIChDU0lF -LCBOVFUpIDxiOTAwOThAY3NpZS5udHUuZWR1LnR3PoheBBMRAgAeAhsDBgsJCAcD -AgMVAgMDFgIBAh4BAheABQJAv+zmAAoJENeOEJGG/YxortwAniGXfizNBB0FJqxY -a9fwjQXuCqhDAKCVopA1UMEswlv/osv41TXWwOzS84hFBBMRAgAGBQJAzGqzAAoJ -EEKmSwvz9BnIi1kAmJSIHlwK+ZixVVenJzWnw2E+62EAnRsRvLeETz7aikmh5Yvd -pWUNwHu0iEYEExECAAYFAkDMf00ACgkQBbz5zdSySILkrQCfeAXv6CFk9GijNtYW -L+/GPwkdmLIAnAgNUUUChGlslG6gcjGolSdY3zvIiEYEExECAAYFAkDNDC4ACgkQ -z8H8hiDrxkE56ACfRTItJiynItOoNSOt9fZQPOo6SpQAoJGT/lO7RlCYmkeiP62A -X7sX+DmViEYEExECAAYFAkDMgcUACgkQCQM7t5B2mhAlqwCfRFillUo/5PB7QzvY -YmflEgSWCoYAn3u6t8jni4PEltvRVn6qg9CF0pU5iEYEExECAAYFAkDOnpAACgkQ -4yBMH10rsRoW6gCfZ7o0wkHWbPgEkXV/fwzGHIvhI9QAn3nkgqFi7Fo2gbJrfhn9 -zTdIjrRTiEYEExECAAYFAkDMhHwACgkQVLe2nHfUM4MgUACfb8BW/GER+rQe49Xn -CCM06HZPlcQAoKYldHWK4QxhTZbSIZ8qwqcj1l3OiEYEExECAAYFAkDQowoACgkQ -Q2Vz7gNb91zzqACgoLhLxEyI6Kf49QHgc34KzqYGXxUAn2hHOlDEBvyX8IaI+TaK -svFbGsgLiEYEExECAAYFAkHTnFkACgkQrMYBZRHAI4KJQACeJhAYTXUCUiQrcfcQ -ntCi7QikU3wAnj4bgydk6k3zT+fiFytJNCIdAIOXtB9Sb25nLUVuIEZhbiA8cmFm -YW5ARnJlZUJTRC5vcmc+iGAEExECACAFAkSfQfQCGwMGCwkIBwMCBBUCCAMEFgID -AQIeAQIXgAAKCRDXjhCRhv2MaEwHAJ4oy/obTSGCioDxVB5c+51TU56t7wCeNjIE -k7aOCyrrNcByfsl0FNcuIee5Ag0EQL/q2RAIAPXcIiQWiDDoGQoP1+l6i0VnMTwH -UrBsuqviQE2FJ53a9ZjtUD+22vO+xuWdxPs3FLfH1yQrxM1QvvR4Tza/gkHFs6xc -AOJeT0VLziqdWULvFK4WhFMg7ZE74ywgkg6TChb9dPfNFBpLZSy6hnAop/95rxSF -7N/6+d423PDUFogEXbUvhgKQBGCzjhl5ScJhGoM3t/7LlVQqAD9wTkMXHDs8q9Ex -/ZBMNmWwLv0p8qgz8v5uc6RytWaovlEItjXiQBpg5l8nRLbkvJZwrHaNz17OIuvs -3DaBJ99JhKcyC+Bv4o/7g3ak5DHQRiXurbah762Pcvar+sl49R1+gy3MFGsAAwYH -/RbgiCMc24EIYFusPEJ5dCV/D+ttWsTTeVzPisxcTSLkTACCJWv1JetFey/7jHJy -vqpnc7wm2krqzFOg5t5h42V4MnJkoX1k0A9MylxwCCO4V6YeaJPachmSMaQ5WNcn -Z2npke20ExRHkkVVXjV6LIiy1bLK7RqI/+PVzlu8TI+A9i1hKWIfBCE1nL0mMC55 -vJsOQ3i/1VVfP1i3LRNWqCwv2evQo2mFOXNN6egFFE5sCYFdigKV1ISvA3QC5i0P -fj5mfWaw/nm3xvG/JAK1Yi3ASM9esPTka7jF1FLXdFdRvK1otgUlJCWD9eTeIodu -1gNOHz08MiGY9RsOihGmgUOITwQYEQIADwUCQL/q2QIbDAUJCWYBgAAKCRDXjhCR -hv2MaNQsAJ9xwOgnX1DE7kHQEhae7kOvcJ/JsgCcC9yPXelrbRzgga+1zZCnD+O5 -6D0= -=ZFgs +jKbYq4y+BwCdFbqSBm3EwGgfzQZfvF42tacT2pW0H1JvbmctRW4gRmFuIDxyYWZh +bkBGcmVlQlNELm9yZz6IYAQTEQIAIAUCRJ9B9AIbAwYLCQgHAwIEFQIIAwQWAgMB +Ah4BAheAAAoJENeOEJGG/YxoTAcAnijL+htNIYKKgPFUHlz7nVNTnq3vAJ42MgST +to4LKus1wHJ+yXQU1y4h57kCDQRAv+rZEAgA9dwiJBaIMOgZCg/X6XqLRWcxPAdS +sGy6q+JATYUnndr1mO1QP7ba877G5Z3E+zcUt8fXJCvEzVC+9HhPNr+CQcWzrFwA +4l5PRUvOKp1ZQu8UrhaEUyDtkTvjLCCSDpMKFv10980UGktlLLqGcCin/3mvFIXs +3/r53jbc8NQWiARdtS+GApAEYLOOGXlJwmEagze3/suVVCoAP3BOQxccOzyr0TH9 +kEw2ZbAu/SnyqDPy/m5zpHK1Zqi+UQi2NeJAGmDmXydEtuS8lnCsdo3PXs4i6+zc +NoEn30mEpzIL4G/ij/uDdqTkMdBGJe6ttqHvrY9y9qv6yXj1HX6DLcwUawADBgf9 +FuCIIxzbgQhgW6w8Qnl0JX8P621axNN5XM+KzFxNIuRMAIIla/Ul60V7L/uMcnK+ +qmdzvCbaSurMU6Dm3mHjZXgycmShfWTQD0zKXHAII7hXph5ok9pyGZIxpDlY1ydn +aemR7bQTFEeSRVVeNXosiLLVssrtGoj/49XOW7xMj4D2LWEpYh8EITWcvSYwLnm8 +mw5DeL/VVV8/WLctE1aoLC/Z69CjaYU5c03p6AUUTmwJgV2KApXUhK8DdALmLQ9+ +PmZ9ZrD+ebfG8b8kArViLcBIz16w9ORruMXUUtd0V1G8rWi2BSUkJYP15N4ih27W +A04fPTwyIZj1Gw6KEaaBQ4hJBCgRAgAJBQJJfAG5Ah0DAAoJENeOEJGG/YxokRMA +oJeyIL8CUN7wj31nBuSuet6avyMEAKCRa/oyo1zNL21/N0qEhHgqHLsikIhPBBgR +AgAPBQJAv+rZAhsMBQkJZgGAAAoJENeOEJGG/Yxo1CwAn3HA6CdfUMTuQdASFp7u +Q69wn8myAJwL3I9d6WttHOCBr7XNkKcP47noPbkCDQRJfADSEAgAxrX3MYpg/UHs +Hwlju1XgoVIEzLhYVegcfcp1cWnJ/aoY+i/MJ3BQQs1AOTZ3D2eGKBXbr8BNYY9s +o9yW03B7nRcqeq4z9lTF1rDkUscKP76xEA8kcPmQEeYcA3L1GJ/qjt6zixlnJ1n3 +dmDqc/wNJe7rQ3XKBCe+GCEkj9EEcKuhpZNbyeBhfa3MRsAPpOl6qg1vXWUxWWsD +PfFJ9k5gKDUnfN7DiaEvZg84HzZYt6qNhzeR+LRKXt/BwmUIYqfi2IqucUefEkXA +y3wowsDpMeiA6paKkJFRGH8/dcZTGvAd/SYFwJV1vflwWCmDBpVbqq0Icf2pT/Js +uFd0RKs5NwADBQf8CcS8DFScqq+wXPDTVz0jjYH+7L/OcXuzLTVgjVgMH7CWSfCq +9zz+2q29sW5J3MJkclCtkCnZYit7DvKO1AijtUhR8UOR1qNSp8GE03jobWG2ZxNO +WC0xdRugK6vL5PBIKTBVDJFk/2rNpjgKUxwtHWWxu5GhD6H7iBAEu3SAixKyGo8S +a6/ZtOflZHb/5yHzk/5yEUuQzm2getqDogkrZa8HqirTaPjDahkDko0wmsl9wsdL +j73MuWdtnvLjhbhFaPlHro/sRxj5RfJu0x0UvXgdrrFbq+iXGNetT8A6p5rO2kiW +SiJ3FgSceto3Fk/xp8M/3L9odUoB0c9nPIugi4hPBBgRAgAPBQJJfADSAhsMBQkG +fSIAAAoJENeOEJGG/Yxo/xMAnisKbRWCpTgCq+VaAvfvJy/lsl+1AJ49pQg0txDL +D/Fet8nCx6Ef1M1J4Q== +=1iVI -----END PGP PUBLIC KEY BLOCK----- ]]></programlisting> ==== //depot/projects/docproj_nl/www/en/community.xsl#4 (text+ko) ==== @@ -6,7 +6,7 @@ <!ENTITY % navinclude.community "INCLUDE"> ]> -<!-- $FreeBSD: www/en/community.xsl,v 1.7 2008/12/30 08:58:50 murray Exp $ --> +<!-- $FreeBSD: www/en/community.xsl,v 1.9 2009/01/25 06:33:06 danger Exp $ --> <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0" xmlns:cvs="http://www.FreeBSD.org/XML/CVS"> @@ -47,7 +47,9 @@ <p>There are more than one hundred <a href="&base;/community/mailinglists.html">mailing - lists</a> and several <a + lists</a>, dozens of web-based <a + href="http://forums.FreeBSD.org/">forums</a>, and + several <a href="&base;/community/newsgroups.html">newsgroups</a> available. There are over <xsl:value-of select="count(document($usergroups.xml)//entry)" ==== //depot/projects/docproj_nl/www/en/donations/wantlist.sgml#9 (text+ko) ==== @@ -1,6 +1,6 @@ <!DOCTYPE HTML PUBLIC "-//FreeBSD//DTD HTML 4.01 Transitional-Based Extension//EN" [ <!ENTITY base CDATA ".."> -<!ENTITY date "$FreeBSD: www/en/donations/wantlist.sgml,v 1.473 2008/12/21 18:34:24 wilko Exp $"> +<!ENTITY date "$FreeBSD: www/en/donations/wantlist.sgml,v 1.474 2009/01/26 15:22:33 tabthorpe Exp $"> <!ENTITY title "FreeBSD Developers Want List"> <!ENTITY email 'donations'> <!ENTITY % navinclude.about "INCLUDE"> @@ -404,6 +404,13 @@ <td>802.11a (5GHz) accesspoint with WPA2</td> <td>Hopefully improve WiFi in 2.4GHz-infested apartment building.</td> </tr> + + <tr> + <td>rui</td> + <td>Portugal</td> + <td>Intel Mac, possibly Mac Mini for a small shipment fee</td> + <td>EFI support under FreeBSD and other Mac development work.</td> + </tr> </table> &footer; ==== //depot/projects/docproj_nl/www/en/smp/index.sgml#3 (text+ko) ==== @@ -1,6 +1,6 @@ <!DOCTYPE HTML PUBLIC "-//FreeBSD//DTD HTML 4.01 Transitional-Based Extension//EN" [ <!ENTITY base CDATA ".."> -<!ENTITY date "$FreeBSD: www/en/smp/index.sgml,v 1.177 2008/08/20 21:59:45 ed Exp $"> +<!ENTITY date "$FreeBSD: www/en/smp/index.sgml,v 1.178 2009/01/25 21:08:22 danger Exp $"> <!ENTITY title "FreeBSD SMPng Project"> <!ENTITY email 'freebsd-smp'> <!ENTITY % navinclude.developers "INCLUDE"> @@ -201,29 +201,29 @@ primitives can be found here:</p> <ul> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mutex&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Mutexes (mutex(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mutex&apropos=0&sektion=9">Kernel Mutexes (mutex(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mtx_pool&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Mutex Pools (mtx_pool(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mtx_pool&apropos=0&sektion=9">Kernel Mutex Pools (mtx_pool(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=critical&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Critical Sections (critical(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=critical&apropos=0&sektion=9">Kernel Critical Sections (critical(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sx&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Shared/Exclusive Locks (sx(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sx&apropos=0&sektion=9">Kernel Shared/Exclusive Locks (sx(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=condvar&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Condition Variables (condvar(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=condvar&apropos=0&sektion=9">Kernel Condition Variables (condvar(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sema&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Semaphores (sema(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sema&apropos=0&sektion=9">Kernel Semaphores (sema(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sleep&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel sleep/wakeup API (sleep(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sleep&apropos=0&sektion=9">Kernel sleep/wakeup API (sleep(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=kthread&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Threads (kthread(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=kthread&apropos=0&sektion=9">Kernel Threads (kthread(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=ithread&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Interrupt Threads (ithread(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=ithread&apropos=0&sektion=9">Interrupt Threads (ithread(9))</a></li> - <li><a href="http://www.freebsd.org/cgi/man.cgi?query=swi&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Software Interrupt Threads (swi(9))</a></li> + <li><a href="http://www.freebsd.org/cgi/man.cgi?query=swi&apropos=0&sektion=9">Software Interrupt Threads (swi(9))</a></li> </ul> <br> - <p>In addition, the old <a href="http://www.freebsd.org/cgi/man.cgi?query=spl&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">SPL man page</a> may be of interest, as it reflects the previous SMP synchronization model.</p> + <p>In addition, the old <a href="http://www.freebsd.org/cgi/man.cgi?query=spl&apropos=0&sektion=9">SPL man page</a> may be of interest, as it reflects the previous SMP synchronization model.</p> </li> <li><p> ==== //depot/projects/docproj_nl/www/share/sgml/events.xml#13 (text+ko) ==== @@ -10,10 +10,34 @@ <events> <cvs:keywords xmlns:cvs="http://www.FreeBSD.org/XML/CVS" version="1.0"> <cvs:keyword name="freebsd"> - $FreeBSD: www/share/sgml/events.xml,v 1.66 2009/01/06 13:45:10 danger Exp $ + $FreeBSD: www/share/sgml/events.xml,v 1.67 2009/01/24 19:07:08 danger Exp $ </cvs:keyword> </cvs:keywords> + <event id="bugathon-jan09"> + <name>Network-related Bugathon #6</name> + <url>http://wiki.freebsd.org/Bugathons/January2009</url> + <startdate> + <year>2009</year> + <month>1</month> + <day>30</day> + </startdate> + <enddate> + <year>2009</year> + <month>2</month> + <day>1</day> + </enddate> + + <description>A bugathon is an event coordinated by the &os; + bugbusting team. Bugathons are held on IRC (in the + #freebsd-bugbusters channel of EFnet), and are attended by any + interested &os; developers and contributors during a week-end. + They focus on closing as many problem reports and fixing as many + bugs as possible. The plan for the sixth bugathon is to work + through the all network-related problem reports in &os;'s GNATS + database.</description> + </event> + <event id="fosdem-2009"> <name>FOSDEM '09</name> <url>http://fosdem.org/2009/</url> ==== //depot/projects/docproj_nl/www/share/sgml/libcommon.xsl#4 (text+ko) ==== @@ -1,7 +1,7 @@ <?xml version="1.0" encoding="ISO-8859-1" ?> <!DOCTYPE xsl:stylesheet PUBLIC "-//FreeBSD//DTD FreeBSD XSLT 1.0 DTD//EN" "http://www.FreeBSD.org/XML/www/share/sgml/xslt10-freebsd.dtd"> -<!-- $FreeBSD: www/share/sgml/libcommon.xsl,v 1.25 2009/01/13 22:44:00 lwhsu Exp $ --> +<!-- $FreeBSD: www/share/sgml/libcommon.xsl,v 1.26 2009/01/25 10:12:01 danger Exp $ --> <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0" @@ -1428,7 +1428,9 @@ <xsl:value-of select="name"/> <br /> - (<xsl:value-of select='location/city' />, <xsl:value-of select='location/country' />) + <xsl:if test="location/city!='' and location/country!=''"> + (<xsl:value-of select='location/city' />, <xsl:value-of select='location/country' />) + </xsl:if> </a></p> </xsl:if> </xsl:for-each>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200901271846.n0RIkcXQ068617>