Date: Sat, 11 Oct 2014 03:50:54 +0000 (UTC) From: Warren Block <wblock@FreeBSD.org> To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45790 - head/en_US.ISO8859-1/htdocs/news/status Message-ID: <201410110350.s9B3oslZ095714@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: wblock Date: Sat Oct 11 03:50:54 2014 New Revision: 45790 URL: https://svnweb.freebsd.org/changeset/doc/45790 Log: Whitespace cleanup, translators please ignore. Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml Sat Oct 11 03:47:08 2014 (r45789) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml Sat Oct 11 03:50:54 2014 (r45790) @@ -1841,7 +1841,7 @@ <p> The project to update the Intel graphics chipset driver (i915kms) to a recent snapshot of the Linux upstream code - continues. A patch with a large chunk of updates has been + continues. A patch with a large chunk of updates has been made available to check for regressions against current functionality, but is not yet expected to provide fully functional new functionality. The GEM I/O ioctl code path @@ -2038,6 +2038,7 @@ <p>Full support for thin provisioning, including capacity usage reporting and thresholds notifications.</p> </task> + <task> <p>Inter-host XCOPY operations.</p> </task> @@ -2086,15 +2087,19 @@ <task> <p>Large page support</p> </task> + <task> <p>SMP support</p> </task> + <task> <p>Debug and cleanup</p> </task> + <task> <p>Security vetting</p> </task> + <task> <p>Performance tweaks</p> </task> @@ -2134,34 +2139,34 @@ <body> <p>Address Space Layout Randomization (ASLR) is a computer security technique that aids in mitigating low-level - vulnerabilities such as buffer overflows. In order to + vulnerabilities such as buffer overflows. In order to prevent an attacker from knowing where a given exploitable vulnerability lies in memory, ASLR randomizes the memory layout of running applications.</p> <p>&os; lacks behind the industry in exploit mitigation - technologies. ASLR is a great first step in implementing - such technologies. Future exploit mitigation technologies + technologies. ASLR is a great first step in implementing + such technologies. Future exploit mitigation technologies will rely on ASLR.</p> - <p>A lot has happened in the last few months. Shawn Webb gave + <p>A lot has happened in the last few months. Shawn Webb gave presentations at both BSDCan 2014 and EuroBSDCon 2014. The presentations were met with a lot of support and backing. At the end of EuroBSDCon, an awesome developer named Ilya - Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter + Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter have submitted our patch to Phabricator, &os;'s new - code review utility. Shawn Webb added an API for allowing + code review utility. Shawn Webb added an API for allowing a debugger to disable ASLR in order to support deterministic debugging with applications such as lldb or - gdb. Oliver Pinter enhanced the performance of our ASLR - implementation. A package building exp-run was ran and came - out favorably in terms of performance. Shawn Webb bumped up + gdb. Oliver Pinter enhanced the performance of our ASLR + implementation. A package building exp-run was ran and came + out favorably in terms of performance. Shawn Webb bumped up the maximum number of bits allowed to be randomized to 20 and set the default to 14.</p> <p>To aid in the upstreaming process of the ASLR project and other security-related projects, Shawn Webb and Oliver Pinter - founded The HardenedBSD project. It exists primarily to + founded The HardenedBSD project. It exists primarily to serve as a staging area for bleeding-edge development of security-related projects for &os; prior to being merged upstream.</p> @@ -2174,15 +2179,19 @@ <task> <p>Get more people testing and reviewing our patch</p> </task> + <task> <p>Run more performance tests</p> </task> + <task> <p>Figure out why the two ports failed in the EXP-RUN. Involve the port maintainers.</p> </task> + <task> - <p>Test on different architectures (we need help with this)</p> + <p>Test on different architectures (we need help with + this)</p> </task> </help> </project>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410110350.s9B3oslZ095714>