From owner-svn-doc-head@FreeBSD.ORG Sat Oct 11 03:50:55 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 171B34F1; Sat, 11 Oct 2014 03:50:55 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 028D9D3A; Sat, 11 Oct 2014 03:50:55 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9B3os2Y095715; Sat, 11 Oct 2014 03:50:54 GMT (envelope-from wblock@FreeBSD.org) Received: (from wblock@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9B3oslZ095714; Sat, 11 Oct 2014 03:50:54 GMT (envelope-from wblock@FreeBSD.org) Message-Id: <201410110350.s9B3oslZ095714@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: wblock set sender to wblock@FreeBSD.org using -f From: Warren Block Date: Sat, 11 Oct 2014 03:50:54 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45790 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Oct 2014 03:50:55 -0000 Author: wblock Date: Sat Oct 11 03:50:54 2014 New Revision: 45790 URL: https://svnweb.freebsd.org/changeset/doc/45790 Log: Whitespace cleanup, translators please ignore. Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml Sat Oct 11 03:47:08 2014 (r45789) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml Sat Oct 11 03:50:54 2014 (r45790) @@ -1841,7 +1841,7 @@

The project to update the Intel graphics chipset driver (i915kms) to a recent snapshot of the Linux upstream code - continues. A patch with a large chunk of updates has been + continues. A patch with a large chunk of updates has been made available to check for regressions against current functionality, but is not yet expected to provide fully functional new functionality. The GEM I/O ioctl code path @@ -2038,6 +2038,7 @@

Full support for thin provisioning, including capacity usage reporting and thresholds notifications.

+

Inter-host XCOPY operations.

@@ -2086,15 +2087,19 @@

Large page support

+

SMP support

+

Debug and cleanup

+

Security vetting

+

Performance tweaks

@@ -2134,34 +2139,34 @@

Address Space Layout Randomization (ASLR) is a computer security technique that aids in mitigating low-level - vulnerabilities such as buffer overflows. In order to + vulnerabilities such as buffer overflows. In order to prevent an attacker from knowing where a given exploitable vulnerability lies in memory, ASLR randomizes the memory layout of running applications.

&os; lacks behind the industry in exploit mitigation - technologies. ASLR is a great first step in implementing - such technologies. Future exploit mitigation technologies + technologies. ASLR is a great first step in implementing + such technologies. Future exploit mitigation technologies will rely on ASLR.

-

A lot has happened in the last few months. Shawn Webb gave +

A lot has happened in the last few months. Shawn Webb gave presentations at both BSDCan 2014 and EuroBSDCon 2014. The presentations were met with a lot of support and backing. At the end of EuroBSDCon, an awesome developer named Ilya - Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter + Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter have submitted our patch to Phabricator, &os;'s new - code review utility. Shawn Webb added an API for allowing + code review utility. Shawn Webb added an API for allowing a debugger to disable ASLR in order to support deterministic debugging with applications such as lldb or - gdb. Oliver Pinter enhanced the performance of our ASLR - implementation. A package building exp-run was ran and came - out favorably in terms of performance. Shawn Webb bumped up + gdb. Oliver Pinter enhanced the performance of our ASLR + implementation. A package building exp-run was ran and came + out favorably in terms of performance. Shawn Webb bumped up the maximum number of bits allowed to be randomized to 20 and set the default to 14.

To aid in the upstreaming process of the ASLR project and other security-related projects, Shawn Webb and Oliver Pinter - founded The HardenedBSD project. It exists primarily to + founded The HardenedBSD project. It exists primarily to serve as a staging area for bleeding-edge development of security-related projects for &os; prior to being merged upstream.

@@ -2174,15 +2179,19 @@

Get more people testing and reviewing our patch

+

Run more performance tests

+

Figure out why the two ports failed in the EXP-RUN. Involve the port maintainers.

+ -

Test on different architectures (we need help with this)

+

Test on different architectures (we need help with + this)