svn commit: r45790 - head/en_US.ISO8859-1/htdocs/news/status

Warren Block wblock at FreeBSD.org
Sat Oct 11 03:50:55 UTC 2014


Author: wblock
Date: Sat Oct 11 03:50:54 2014
New Revision: 45790
URL: https://svnweb.freebsd.org/changeset/doc/45790

Log:
  Whitespace cleanup, translators please ignore.

Modified:
  head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml

Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml	Sat Oct 11 03:47:08 2014	(r45789)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml	Sat Oct 11 03:50:54 2014	(r45790)
@@ -1841,7 +1841,7 @@
       <p>
 	The project to update the Intel graphics chipset driver
 	(i915kms) to a recent snapshot of the Linux upstream code
-	continues. A patch with a large chunk of updates has been
+	continues.  A patch with a large chunk of updates has been
 	made available to check for regressions against current
 	functionality, but is not yet expected to provide fully
 	functional new functionality.  The GEM I/O ioctl code path
@@ -2038,6 +2038,7 @@
 	<p>Full support for thin provisioning, including capacity
 	  usage reporting and thresholds notifications.</p>
       </task>
+
       <task>
 	<p>Inter-host XCOPY operations.</p>
       </task>
@@ -2086,15 +2087,19 @@
       <task>
 	<p>Large page support</p>
       </task>
+
       <task>
 	<p>SMP support</p>
       </task>
+
       <task>
 	<p>Debug and cleanup</p>
       </task>
+
       <task>
 	<p>Security vetting</p>
       </task>
+
       <task>
 	<p>Performance tweaks</p>
       </task>
@@ -2134,34 +2139,34 @@
     <body>
       <p>Address Space Layout Randomization (ASLR) is a computer
 	security technique that aids in mitigating low-level
-	vulnerabilities such as buffer overflows. In order to
+	vulnerabilities such as buffer overflows.  In order to
 	prevent an attacker from knowing where a given
 	exploitable vulnerability lies in memory, ASLR randomizes
 	the memory layout of running applications.</p>
 
       <p>&os; lacks behind the industry in exploit mitigation
-	technologies. ASLR is a great first step in implementing
-	such technologies. Future exploit mitigation technologies
+	technologies.  ASLR is a great first step in implementing
+	such technologies.  Future exploit mitigation technologies
 	will rely on ASLR.</p>
 
-      <p>A lot has happened in the last few months. Shawn Webb gave
+      <p>A lot has happened in the last few months.  Shawn Webb gave
 	presentations at both BSDCan 2014 and EuroBSDCon 2014. The
 	presentations were met with a lot of support and backing.
 	At the end of EuroBSDCon, an awesome developer named Ilya
-	Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter
+	Bakulin fixed our ARM bug.  Shawn Webb and Oliver Pinter
 	have submitted our patch to Phabricator, &os;'s new
-	code review utility. Shawn Webb added an API for allowing
+	code review utility.  Shawn Webb added an API for allowing
 	a debugger to disable ASLR in order to support
 	deterministic debugging with applications such as lldb or
-	gdb. Oliver Pinter enhanced the performance of our ASLR
-	implementation. A package building exp-run was ran and came
-	out favorably in terms of performance. Shawn Webb bumped up
+	gdb.  Oliver Pinter enhanced the performance of our ASLR
+	implementation.  A package building exp-run was ran and came
+	out favorably in terms of performance.  Shawn Webb bumped up
 	the maximum number of bits allowed to be randomized to 20
 	and set the default to 14.</p>
 
       <p>To aid in the upstreaming process of the ASLR project and
 	other security-related projects, Shawn Webb and Oliver Pinter
-	founded The HardenedBSD project. It exists primarily to
+	founded The HardenedBSD project.  It exists primarily to
 	serve as a staging area for bleeding-edge development of
 	security-related projects for &os; prior to being merged
 	upstream.</p>
@@ -2174,15 +2179,19 @@
       <task>
 	<p>Get more people testing and reviewing our patch</p>
       </task>
+
       <task>
 	<p>Run more performance tests</p>
       </task>
+
       <task>
 	<p>Figure out why the two ports failed in the EXP-RUN.
 	  Involve the port maintainers.</p>
       </task>
+
       <task>
-	<p>Test on different architectures (we need help with this)</p>
+	<p>Test on different architectures (we need help with
+	  this)</p>
       </task>
     </help>
   </project>


More information about the svn-doc-all mailing list