Subversion Repositories Kolibri OS

Rev

Go to most recent revision | Show changed files | Directory listing | RSS feed

Filtering Options

Rev Age Author Path Log message Diff
8846 1052 d 22 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Implement very basic macro and struct documentation generation  
8845 1052 d 23 h Boppan /kernel/trunk/docs/doxygen/ [kernel][doxygen] Parse doxygen folder recursively  
8844 1052 d 23 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Add basic support for labels  
8843 1052 d 23 h Boppan /kernel/trunk/docs/doxygen/ [kernel][doxygen] Make doxygen page more beautiful  
8842 1052 d 23 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Add basic function support  
8841 1052 d 23 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Implement variable doxygen generation  
8840 1053 d 0 h rgimad /kernel/trunk/core/ Delete unused function check_region (it was commented out years ago) and stub calls of this function.  
8838 1053 d 12 h Boppan /kernel/trunk/docs/doxygen/ [kernel][doxygen] Finally make SVN ignore all doxygen contents  
8837 1053 d 12 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Configure behaviour using script arguments  
8836 1053 d 12 h Boppan /kernel/trunk/docs/doxygen/ [kernel][doxygen] Ignore asm files and generated html and latex files in the doxygen directory  
8835 1053 d 12 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Disable clean_generated_stuff flag by default  
8834 1053 d 12 h Boppan /kernel/trunk/ [kernel] Make asmxygen generate doxygen C-like files in docs/doxygen and implement very basic variable doxygen generation  
8825 1054 d 0 h Boppan /kernel/trunk/ [kernel] Prepare for kernel documentation (add asmxygen.py)  
8715 1088 d 6 h Doczom /kernel/trunk/ fixed vulnerability (kernel memory rewrite) in sysfn 4  
8714 1088 d 7 h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 7, 15.5 and 65  
8713 1088 d 7 h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 47  
8712 1088 d 8 h Doczom /kernel/trunk/gui/ fixed vulnerability (reading kernel memory from userspace) in sysfn 48.2  
8711 1088 d 11 h Doczom /kernel/trunk/core/ fixed vulnerability (reading kernel memory from userspace) in sysfn 54.2  
8709 1096 d 4 h Coldy / Dll autoload
Kernel
- removed unnecessary and rewrote/add some comments, no code changes
User (lib/dll.obj)
- Introduced new KX header as extension for existing formats
- Added staring KX header processing
- Improved import table test logic, no reason to kill app for import absence - skip
import processing (tnx ProMiNick)
- Add ReadMe.txt
 
8700 1099 d 14 h Coldy /kernel/trunk/network/ Fix vulnerabilitie in sysfn 74.1 (add sanity check for user buffer), now user applications can't corrupt kernel memory via invalid buffer address  
8680 1102 d 23 h rgimad /kernel/trunk/ fixed multiple vulnerabilities in sysfn70 caused by absence of user addresses check  
8676 1105 d 0 h rgimad /kernel/trunk/fs/ fixed vulnerability (kernel memory rewrite) in sysfn 30.2 and 30.5  
8675 1105 d 1 h rgimad /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn25  
8671 1110 d 12 h Coldy /kernel/trunk/ For DLL autoload  
8656 1127 d 1 h dunkaist /kernel/trunk/bootloader/uefi4kos/ uefi4kos: Make sure 32bit trampoline is below 4GiB

This fixes booting via uefi64kos on some systems.
 
8599 1165 d 10 h rgimad /kernel/trunk/gui/ fixed same vulnerability in sysfn 48.3  
8598 1165 d 11 h rgimad /kernel/trunk/ fixed vulnerabilities in sysfn 18.11 and 36, now user applications cannot corrupt kernel memory via invalid buffer address  
8593 1172 d 7 h rgimad /kernel/trunk/core/ taskman.inc: fixed two vulnerabilities which caused kernel memory corruption on attempt to run apps with illegal addresses in MENUET0x header  
8592 1172 d 21 h rgimad /kernel/trunk/core/ taskman.inc: add comments for unobvious things, no code changes  
8552 1191 d 10 h rgimad /kernel/trunk/gui/ fix bug in sysfn48 (by Kenshin)  
8534 1205 d 10 h Coldy /kernel/trunk/core/ Fixed 69.4. Bug, call with PID=2 stops the system process thereby freezing the entire system!  
8493 1219 d 7 h rgimad /kernel/trunk/ is_region_userspace: removed extra condition which caused incorrect behavior of boxlib menu in hexedit and rtfread (cuz it uses address 0 i didnt know:D )  
8329 1243 d 1 h rgimad /kernel/trunk/ is_region_userspace: refactoring and fix  
8285 1247 d 20 h leency / Move VMODE to ISO (as it is useless without drivers that are on ISO)  
8284 1248 d 3 h dunkaist /kernel/trunk/ uefi4kos: Fix boot and mouse pointer on some configurations.

UEFI firmware doesn't use VESA mode codes, so disable this check
for UEFI boot.
 
8270 1250 d 8 h dunkaist /kernel/trunk/ kernel: Protect OS threads from terminating by sf18.2.  
8249 1254 d 6 h rgimad /kernel/trunk/ fix return value from .addr_error in sysfn 26.2 , 9  
8248 1254 d 7 h rgimad /kernel/trunk/ fix prior  
8247 1254 d 8 h rgimad /kernel/trunk/ SysFn 18.13 security fix: now apps cannot destroy kernel memory via passing illegal address in ecx

Update docs on SysFn 18.13
 
8246 1255 d 2 h rgimad /kernel/trunk/ SysFn 9 security fix: now apps cannot destroy kernel memory via passing illegal address in ebx

Update docs on SysFn 9