Subversion Repositories Kolibri OS

Rev

Go to most recent revision | Hide changed files | Directory listing | RSS feed

Filtering Options

Rev Age Author Path Log message Diff Changes
8846 1068 d 12 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Implement very basic macro and struct documentation generation  
/kernel/trunk/asmxygen.py
8845 1068 d 12 h Boppan /kernel/trunk/docs/doxygen/ [kernel][doxygen] Parse doxygen folder recursively  
/kernel/trunk/docs/doxygen/doxygen.cfg
8844 1068 d 12 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Add basic support for labels  
/kernel/trunk/asmxygen.py
8843 1068 d 12 h Boppan /kernel/trunk/docs/doxygen/ [kernel][doxygen] Make doxygen page more beautiful  
/kernel/trunk/docs/doxygen/doxygen.cfg
8842 1068 d 12 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Add basic function support  
/kernel/trunk/asmxygen.py
8841 1068 d 13 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Implement variable doxygen generation  
/kernel/trunk/asmxygen.py
8840 1068 d 13 h rgimad /kernel/trunk/core/ Delete unused function check_region (it was commented out years ago) and stub calls of this function.  
/kernel/trunk/core/debug.inc
/kernel/trunk/core/taskman.inc
8838 1069 d 1 h Boppan /kernel/trunk/docs/doxygen/ [kernel][doxygen] Finally make SVN ignore all doxygen contents  
/kernel/trunk/docs/doxygen
8837 1069 d 1 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Configure behaviour using script arguments  
/kernel/trunk/asmxygen.py
8836 1069 d 1 h Boppan /kernel/trunk/docs/doxygen/ [kernel][doxygen] Ignore asm files and generated html and latex files in the doxygen directory  
/kernel/trunk/docs/doxygen
8835 1069 d 2 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Disable clean_generated_stuff flag by default  
/kernel/trunk/asmxygen.py
8834 1069 d 2 h Boppan /kernel/trunk/ [kernel] Make asmxygen generate doxygen C-like files in docs/doxygen and implement very basic variable doxygen generation  
/kernel/trunk/docs/doxygen
/kernel/trunk/docs/doxygen/doxygen.cfg
/kernel/trunk/asmxygen.py
8825 1069 d 14 h Boppan /kernel/trunk/ [kernel] Prepare for kernel documentation (add asmxygen.py)  
/kernel/trunk/asmxygen.py
8715 1103 d 20 h Doczom /kernel/trunk/ fixed vulnerability (kernel memory rewrite) in sysfn 4  
/kernel/trunk/kernel.asm
8714 1103 d 20 h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 7, 15.5 and 65  
/kernel/trunk/kernel.asm
8713 1103 d 21 h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 47  
/kernel/trunk/kernel.asm
8712 1103 d 21 h Doczom /kernel/trunk/gui/ fixed vulnerability (reading kernel memory from userspace) in sysfn 48.2  
/kernel/trunk/gui/window.inc
8711 1104 d 1 h Doczom /kernel/trunk/core/ fixed vulnerability (reading kernel memory from userspace) in sysfn 54.2  
/kernel/trunk/core/clipboard.inc
8709 1111 d 18 h Coldy / Dll autoload
Kernel
- removed unnecessary and rewrote/add some comments, no code changes
User (lib/dll.obj)
- Introduced new KX header as extension for existing formats
- Added staring KX header processing
- Improved import table test logic, no reason to kill app for import absence - skip
import processing (tnx ProMiNick)
- Add ReadMe.txt
 
/programs/develop/libraries/dll/ReadMe.txt
/kernel/trunk/core/taskman.inc
/programs/develop/libraries/dll/dll.asm
8700 1115 d 3 h Coldy /kernel/trunk/network/ Fix vulnerabilitie in sysfn 74.1 (add sanity check for user buffer), now user applications can't corrupt kernel memory via invalid buffer address  
/kernel/trunk/network/stack.inc
8680 1118 d 13 h rgimad /kernel/trunk/ fixed multiple vulnerabilities in sysfn70 caused by absence of user addresses check  
/kernel/trunk/core/dll.inc
/kernel/trunk/core/syscall.inc
/kernel/trunk/fs/fs_lfn.inc
8676 1120 d 13 h rgimad /kernel/trunk/fs/ fixed vulnerability (kernel memory rewrite) in sysfn 30.2 and 30.5  
/kernel/trunk/fs/fs_lfn.inc
8675 1120 d 14 h rgimad /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn25  
/kernel/trunk/kernel.asm
8671 1126 d 1 h Coldy /kernel/trunk/ For DLL autoload  
/kernel/trunk/core/taskman.inc
/kernel/trunk/data32.inc
8656 1142 d 14 h dunkaist /kernel/trunk/bootloader/uefi4kos/ uefi4kos: Make sure 32bit trampoline is below 4GiB

This fixes booting via uefi64kos on some systems.
 
/kernel/trunk/bootloader/uefi4kos/uefi64kos.asm
8599 1180 d 23 h rgimad /kernel/trunk/gui/ fixed same vulnerability in sysfn 48.3  
/kernel/trunk/gui/window.inc
8598 1181 d 0 h rgimad /kernel/trunk/ fixed vulnerabilities in sysfn 18.11 and 36, now user applications cannot corrupt kernel memory via invalid buffer address  
/kernel/trunk/kernel.asm
8593 1187 d 21 h rgimad /kernel/trunk/core/ taskman.inc: fixed two vulnerabilities which caused kernel memory corruption on attempt to run apps with illegal addresses in MENUET0x header  
/kernel/trunk/core/taskman.inc
8592 1188 d 10 h rgimad /kernel/trunk/core/ taskman.inc: add comments for unobvious things, no code changes  
/kernel/trunk/core/taskman.inc
8552 1206 d 23 h rgimad /kernel/trunk/gui/ fix bug in sysfn48 (by Kenshin)  
/kernel/trunk/gui/window.inc
8534 1221 d 0 h Coldy /kernel/trunk/core/ Fixed 69.4. Bug, call with PID=2 stops the system process thereby freezing the entire system!  
/kernel/trunk/core/debug.inc
8493 1234 d 20 h rgimad /kernel/trunk/ is_region_userspace: removed extra condition which caused incorrect behavior of boxlib menu in hexedit and rtfread (cuz it uses address 0 i didnt know:D )  
/kernel/trunk/kernel.asm
8329 1258 d 14 h rgimad /kernel/trunk/ is_region_userspace: refactoring and fix  
/kernel/trunk/kernel.asm
8285 1263 d 9 h leency / Move VMODE to ISO (as it is useless without drivers that are on ISO)  
/programs/cmm/downloader/compile_ru.bat
/data/Tupfile.lua
/data/ca/settings/menu.dat
/data/common/settings/syspanel.ini
/data/et/settings/menu.dat
/data/rus/docs/guide/hardware_support.htm
/data/rus/settings/syspanel.ini
/data/sp/settings/menu.dat
/kernel/trunk/data32.inc
8284 1263 d 17 h dunkaist /kernel/trunk/ uefi4kos: Fix boot and mouse pointer on some configurations.

UEFI firmware doesn't use VESA mode codes, so disable this check
for UEFI boot.
 
/kernel/trunk/bootloader/uefi4kos/uefi32kos.asm
/kernel/trunk/bootloader/uefi4kos/uefi64kos.asm
/kernel/trunk/init.inc
/kernel/trunk/video/cursors.inc
8270 1265 d 21 h dunkaist /kernel/trunk/ kernel: Protect OS threads from terminating by sf18.2.  
/kernel/trunk/kernel.asm
8249 1269 d 20 h rgimad /kernel/trunk/ fix return value from .addr_error in sysfn 26.2 , 9  
/kernel/trunk/kernel.asm
8248 1269 d 21 h rgimad /kernel/trunk/ fix prior  
/kernel/trunk/kernel.asm
8247 1269 d 21 h rgimad /kernel/trunk/ SysFn 18.13 security fix: now apps cannot destroy kernel memory via passing illegal address in ecx

Update docs on SysFn 18.13
 
/kernel/trunk/docs/sysfuncr.txt
/kernel/trunk/docs/sysfuncs.txt
/kernel/trunk/kernel.asm
8246 1270 d 15 h rgimad /kernel/trunk/ SysFn 9 security fix: now apps cannot destroy kernel memory via passing illegal address in ebx

Update docs on SysFn 9
 
/kernel/trunk/docs/sysfuncr.txt
/kernel/trunk/docs/sysfuncs.txt
/kernel/trunk/kernel.asm