Subversion Repositories Kolibri OS

Rev

Show changed files | Directory listing | RSS feed

Filtering Options

Rev Age Author Path Log message Diff
8671 4d 09h Coldy /kernel/trunk/ For DLL autoload  
8670 4d 22h Alex2003 /kernel/branches/kolibri-e/ roadmap for kolibri e 0.1  
8656 20d 22h dunkaist /kernel/trunk/bootloader/uefi4kos/ uefi4kos: Make sure 32bit trampoline is below 4GiB

This fixes booting via uefi64kos on some systems.
 
8599 59d 07h rgimad /kernel/trunk/gui/ fixed same vulnerability in sysfn 48.3  
8598 59d 08h rgimad /kernel/trunk/ fixed vulnerabilities in sysfn 18.11 and 36, now user applications cannot corrupt kernel memory via invalid buffer address  
8593 66d 05h rgimad /kernel/trunk/core/ taskman.inc: fixed two vulnerabilities which caused kernel memory corruption on attempt to run apps with illegal addresses in MENUET0x header  
8592 66d 18h rgimad /kernel/trunk/core/ taskman.inc: add comments for unobvious things, no code changes  
8552 85d 07h rgimad /kernel/trunk/gui/ fix bug in sysfn48 (by Kenshin)  
8534 99d 08h Coldy /kernel/trunk/core/ Fixed 69.4. Bug, call with PID=2 stops the system process thereby freezing the entire system!  
8493 113d 04h rgimad /kernel/trunk/ is_region_userspace: removed extra condition which caused incorrect behavior of boxlib menu in hexedit and rtfread (cuz it uses address 0 i didnt know:D )  
8329 136d 22h rgimad /kernel/trunk/ is_region_userspace: refactoring and fix  
8285 141d 17h leency / Move VMODE to ISO (as it is useless without drivers that are on ISO)  
8284 142d 01h dunkaist /kernel/trunk/ uefi4kos: Fix boot and mouse pointer on some configurations.

UEFI firmware doesn't use VESA mode codes, so disable this check
for UEFI boot.
 
8270 144d 05h dunkaist /kernel/trunk/ kernel: Protect OS threads from terminating by sf18.2.  
8249 148d 04h rgimad /kernel/trunk/ fix return value from .addr_error in sysfn 26.2 , 9  
8248 148d 04h rgimad /kernel/trunk/ fix prior  
8247 148d 05h rgimad /kernel/trunk/ SysFn 18.13 security fix: now apps cannot destroy kernel memory via passing illegal address in ecx

Update docs on SysFn 18.13
 
8246 148d 23h rgimad /kernel/trunk/ SysFn 9 security fix: now apps cannot destroy kernel memory via passing illegal address in ebx

Update docs on SysFn 9
 
8224 152d 14h dunkaist /kernel/trunk/ Fix hardcoded $Revision: XXXX$ values.  
8220 153d 22h dunkaist /kernel/trunk/bootloader/uefi4kos/ uefi4kos: Fix memmap conversion from uefi to e820 format.  

Show All