Subversion Repositories Kolibri OS

Rev

Go to most recent revision | Hide changed files | Details | Compare with Previous | Blame | RSS feed

Filtering Options

Rev Age Author Path Log message Diff Changes
8858 1054 d 7 h rgimad /kernel/trunk/ [KERNEL] Refactoring:
- optimize struct zeroing in sys32.inc
- set_app_param: delete setting completely unused APPDATA.event_filter (also make this field reserved)
- update some copyringhs
- other small fixes
 
/kernel/trunk/const.inc
/kernel/trunk/core/sys32.inc
/kernel/trunk/core/taskman.inc
/kernel/trunk/kernel.asm
8715 1091 d 9 h Doczom /kernel/trunk/ fixed vulnerability (kernel memory rewrite) in sysfn 4  
/kernel/trunk/kernel.asm
8714 1091 d 9 h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 7, 15.5 and 65  
/kernel/trunk/kernel.asm
8713 1091 d 10 h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 47  
/kernel/trunk/kernel.asm
8675 1108 d 3 h rgimad /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn25  
/kernel/trunk/kernel.asm
8598 1168 d 13 h rgimad /kernel/trunk/ fixed vulnerabilities in sysfn 18.11 and 36, now user applications cannot corrupt kernel memory via invalid buffer address  
/kernel/trunk/kernel.asm
8493 1222 d 9 h rgimad /kernel/trunk/ is_region_userspace: removed extra condition which caused incorrect behavior of boxlib menu in hexedit and rtfread (cuz it uses address 0 i didnt know:D )  
/kernel/trunk/kernel.asm
8329 1246 d 3 h rgimad /kernel/trunk/ is_region_userspace: refactoring and fix  
/kernel/trunk/kernel.asm
8270 1253 d 10 h dunkaist /kernel/trunk/ kernel: Protect OS threads from terminating by sf18.2.  
/kernel/trunk/kernel.asm
8249 1257 d 9 h rgimad /kernel/trunk/ fix return value from .addr_error in sysfn 26.2 , 9  
/kernel/trunk/kernel.asm
8248 1257 d 9 h rgimad /kernel/trunk/ fix prior  
/kernel/trunk/kernel.asm
8247 1257 d 10 h rgimad /kernel/trunk/ SysFn 18.13 security fix: now apps cannot destroy kernel memory via passing illegal address in ecx

Update docs on SysFn 18.13
 
/kernel/trunk/docs/sysfuncr.txt
/kernel/trunk/docs/sysfuncs.txt
/kernel/trunk/kernel.asm
8246 1258 d 4 h rgimad /kernel/trunk/ SysFn 9 security fix: now apps cannot destroy kernel memory via passing illegal address in ebx

Update docs on SysFn 9
 
/kernel/trunk/docs/sysfuncr.txt
/kernel/trunk/docs/sysfuncs.txt
/kernel/trunk/kernel.asm
8216 1264 d 3 h rgimad /kernel/trunk/ fix is_region_userspace (worked incorrectly for e.g 0xFFFFFFFF)  
/kernel/trunk/kernel.asm
8176 1270 d 0 h dunkaist /kernel/trunk/ Fix r8139: delay_ms was 10x slower when using HPET.  
/kernel/trunk/kernel.asm
8160 1274 d 6 h rgimad /kernel/trunk/ added is_region_userspace, fix sysfn 26.2 address security checks  
/kernel/trunk/kernel.asm
8158 1275 d 0 h rgimad /kernel/trunk/ SysFn 26.2 security fix: now apps cannot destroy kernel memory via passing illegal address to this sysfn  
/kernel/trunk/kernel.asm
8139 1276 d 3 h dunkaist /kernel/trunk/ kernel: Make delay_ms use HPET when available.

I got a laptop that has timer on channel 1 of PIT that doesn't tick.
 
/kernel/trunk/kernel.asm
8119 1285 d 3 h dunkaist /kernel/trunk/ fix r8111: Map acpi_apic_base page before access.  
/kernel/trunk/acpi/acpi.inc
/kernel/trunk/kernel.asm
8111 1291 d 9 h dunkaist /kernel/trunk/ kernel: Split acpi.inc and hpet.inc from init.inc.

Also, replace some hardcoded constants with macros.
 
/kernel/trunk/acpi
/kernel/trunk/acpi/acpi.inc
/kernel/trunk/core/hpet.inc
/kernel/trunk/boot/shutdown.inc
/kernel/trunk/const.inc
/kernel/trunk/core/apic.inc
/kernel/trunk/init.inc
/kernel/trunk/kernel.asm
/kernel/trunk/kernel32.inc

Show All