PERFORCE change 156752 for review
Rene Ladan
rene at FreeBSD.org
Tue Jan 27 10:46:39 PST 2009
http://perforce.freebsd.org/chv.cgi?CH=156752
Change 156752 by rene at rene_self on 2009/01/27 18:46:16
IFC
Affected files ...
.. //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/security/chapter.sgml#10 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/books/pmake/basics/chapter.sgml#2 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/books/porters-handbook/book.sgml#19 integrate
.. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml#17 integrate
.. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml#17 integrate
.. //depot/projects/docproj_nl/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent#13 integrate
.. //depot/projects/docproj_nl/share/pgpkeys/rafan.key#2 integrate
.. //depot/projects/docproj_nl/www/en/community.xsl#4 integrate
.. //depot/projects/docproj_nl/www/en/donations/wantlist.sgml#9 integrate
.. //depot/projects/docproj_nl/www/en/smp/index.sgml#3 integrate
.. //depot/projects/docproj_nl/www/share/sgml/events.xml#13 integrate
.. //depot/projects/docproj_nl/www/share/sgml/libcommon.xsl#4 integrate
Differences ...
==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/security/chapter.sgml#10 (text+ko) ====
@@ -1,7 +1,7 @@
<!--
The FreeBSD Documentation Project
- $FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.332 2008/11/04 19:24:20 manolis Exp $
+ $FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.333 2009/01/27 16:23:45 keramida Exp $
-->
<chapter id="security">
@@ -594,25 +594,65 @@
use a KLD module to install his own <devicename>bpf</devicename>
device, or other sniffing
device, on a running kernel. To avoid these problems you have to
- run the kernel at a higher secure level, at least securelevel 1.
- The securelevel can be set with a <command>sysctl</command> on
- the <varname>kern.securelevel</varname> variable. Once you have
- set the securelevel to 1, write access to raw devices will be
- denied and special <command>chflags</command> flags,
- such as <literal>schg</literal>,
- will be enforced. You must also ensure that the
- <literal>schg</literal> flag is set on critical startup binaries,
- directories, and script files — everything that gets run up
- to the point where the securelevel is set. This might be overdoing
- it, and upgrading the system is much more difficult when you
- operate at a higher secure level. You may compromise and run the
- system at a higher secure level but not set the
- <literal>schg</literal> flag for every system file and directory
- under the sun. Another possibility is to simply mount
- <filename>/</filename> and <filename>/usr</filename> read-only.
- It should be noted that being too draconian in what you attempt to
- protect may prevent the all-important detection of an
- intrusion.</para>
+ run the kernel at a higher secure level, at least securelevel 1.</para>
+
+ <para>The secure level of the kernel can be set in a variety of ways.
+ The simplest way of raising the secure level of a running kernel is
+ through a <command>sysctl</command> on
+ the <varname>kern.securelevel</varname> kernel variable:</para>
+
+ <screen>&prompt.root; <userinput>sysctl kern.securelevel=<replaceable>1</replaceable></userinput></screen>
+
+ <para>By default, the &os; kernel boots with a secure level of -1. The
+ secure level will remain at -1 unless it is altered, either by the
+ administrator or by &man.init.8; because of a setting in the start up
+ scripts. The secure level may be raised during system startup by
+ setting the <varname>kern_securelevel_enable</varname> variable to
+ <literal>YES</literal> in the <filename>/etc/rc.conf</filename> file,
+ and the value of the <varname>kern_securelevel</varname> variable to
+ the desired secure level.</para>
+
+ <para>The default secure level of an &os; system right after the startup
+ scripts are done is -1. This is called <quote>insecure mode</quote>
+ because immutable file flags may be turned off, all devices may be
+ read from or written to, and so on.</para>
+
+ <para>Once the secure level is set to 1 or a higher value, the
+ append-only and immutable files are honored, they cannot be turned
+ off, and access to raw devices will be denied. Higher levels restrict
+ even more operations. For a full description of the effect of various
+ secure levels, please read the &man.security.7; manual page (or the
+ manual page of &man.init.8; in releases older than &os; 7.0).</para>
+
+ <note>
+ <para>Bumping the secure level to 1 or higher may cause a few problems
+ to X11 (access to <filename>/dev/io</filename> will be blocked), or
+ to the installation of &os; build from source
+ (the <maketarget>installworld</maketarget> part of the process needs
+ to temporarily reset the append-only and immutable flags of some
+ files), and in a few other cases. Sometimes, as in the case of X11,
+ it may be possible to work around this by starting &man.xdm.1;
+ pretty early in the boot process, when the securelevel is still low
+ enough. Workarounds like this may not be possible for all secure
+ levels or for all the potential restrictions they enforce. A bit of
+ forward planning is a good idea. Understanding the restrictions
+ imposed by each secure level is important as they severly diminish
+ the ease of system use. It will also make choosing a default
+ setting much simpler and prevent any surprises.</para>
+ </note>
+
+ <para>If the kernel's secure level is raised to 1 or a higher value, it
+ may be useful to set the <literal>schg</literal> flag on critical
+ startup binaries, directories, and script files (i.e. everything that
+ gets run up to the point where the securelevel is set). This might be
+ overdoing it, and upgrading the system is much more difficult when it
+ operates at a high secure level. A less strict compromise is to run
+ the system at a higher secure level but skip setting set
+ the <literal>schg</literal> flag for every system file and directory
+ under the sun. Another possibility is to simply
+ mount <filename>/</filename> and <filename>/usr</filename> read-only.
+ It should be noted that being too draconian about what is permitted
+ may prevent the all-important detection of an intrusion.</para>
</sect2>
<sect2 id="security-integrity">
==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/pmake/basics/chapter.sgml#2 (text+ko) ====
@@ -1,5 +1,5 @@
<!--
- $FreeBSD: doc/en_US.ISO8859-1/books/pmake/basics/chapter.sgml,v 1.5 2006/08/28 18:59:16 blackend Exp $
+ $FreeBSD: doc/en_US.ISO8859-1/books/pmake/basics/chapter.sgml,v 1.6 2009/01/24 22:13:12 danger Exp $
-->
<chapter id="basics">
@@ -83,9 +83,6 @@
<informaltable frame="none">
<tgroup cols="2">
- <colspec colwidth="1*">
- <colspec colwidth="10*">
-
<tbody>
<row valign="top">
<entry><literal>:</literal></entry>
@@ -178,9 +175,6 @@
<informaltable frame="none">
<tgroup cols="2">
- <colspec colwidth="1*">
- <colspec colwidth="10*">
-
<tbody>
<row valign="top">
<entry><literal>{}</literal></entry>
@@ -1019,9 +1013,6 @@
<informaltable frame="none">
<tgroup cols="2">
- <colspec colwidth="1*">
- <colspec colwidth="7*">
-
<tbody>
<row valign="top">
<entry><literal>a</literal></entry>
==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/porters-handbook/book.sgml#19 (text+ko) ====
@@ -1,7 +1,7 @@
<!--
The FreeBSD Documentation Project
- $FreeBSD: doc/en_US.ISO8859-1/books/porters-handbook/book.sgml,v 1.970 2009/01/21 13:05:36 pav Exp $
+ $FreeBSD: doc/en_US.ISO8859-1/books/porters-handbook/book.sgml,v 1.971 2009/01/27 16:05:37 tabthorpe Exp $
-->
<!DOCTYPE BOOK PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN" [
@@ -2412,10 +2412,10 @@
hereon.</para>
<para>A little background first. OpenBSD has a neat feature
- inside both <makevar>DISTFILES</makevar> and
- <makevar>PATCHFILES</makevar> variables, both files and
- patches can be postfixed with <literal>:n</literal>
- identifiers where <literal>n</literal> both can be
+ inside the <makevar>DISTFILES</makevar> and
+ <makevar>PATCHFILES</makevar> variables which allows files and
+ patches to be postfixed with <literal>:n</literal>
+ identifiers. Here, <literal>n</literal> can be both
<literal>[0-9]</literal> and denote a group designation.
For example:</para>
@@ -2436,7 +2436,7 @@
as hell where <filename>beta</filename> is carried by all
sites in <makevar>MASTER_SITES</makevar>, and
<filename>alpha</filename> can only be found in the 20th
- site. It would be such a waste to check all of them if
+ site. It would be such a waste to check all of them if the
maintainer knew this beforehand, would it not? Not a good
start for that lovely weekend!</para>
@@ -3121,7 +3121,7 @@
challenge for port maintainers</ulink> section.</para>
<para>Changes to the port will be sent to the maintainer of
- a port for a review and an approval before being committed.
+ a port for review and approval before being committed.
If the maintainer does not respond to an update
request after two weeks (excluding major public
holidays), then that is considered a maintainer timeout, and the
@@ -3137,8 +3137,8 @@
to better match existing policies and style of the Ports
Collection without explicit blessing from the submitter.
Also, large infrastructural changes can result in
- a port being modified without maintainer's consent.
- This kind of changes will never affect the port's
+ a port being modified without the maintainer's consent.
+ These kinds of changes will never affect the port's
functionality.</para>
<para>The &a.portmgr; reserves the right to revoke or override
@@ -4090,7 +4090,7 @@
<para>Two macros exists for this situation. The advantage of using
these macros instead of <command>cp</command> is that they guarantee
- proper file ownership and permissions on target files. First macro,
+ proper file ownership and permissions on target files. The first macro,
<makevar>COPYTREE_BIN</makevar>, will set all the installed files to
be executable, thus being suitable for installing into
<filename><makevar>PREFIX</makevar>/bin</filename>. The second
@@ -8645,6 +8645,11 @@
<para>The packing list still has to be tidied up by hand as
stated above.</para>
+ <para>Another tool that might be used to create an initial
+ <filename>pkg-plist</filename> is <filename
+ role="package">ports-mgmt/genplist</filename>. As with any
+ automated tool, the resulting <filename>pkg-plist</filename>
+ should be checked and manually edited as needed.</para>
</sect1>
</chapter>
@@ -11882,7 +11887,7 @@
<row>
<entry>7.0-CURRENT after
RFC 3678 API support added to the IPv4 stack.
- Legacy RFC 1724 behaviour of the IP_MULTICAST_IF
+ Legacy RFC 1724 behavior of the IP_MULTICAST_IF
ioctl has now been removed; 0.0.0.0/8 may no longer
be used to specify an interface index.
struct ipmreqn should be used instead.</entry>
==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml#17 (text+ko) ====
@@ -1,7 +1,7 @@
<!--
The FreeBSD Dutch Documentation Project
- $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.12 2009/01/11 21:30:06 rene Exp $
+ $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.13 2009/01/23 16:50:43 rene Exp $
$FreeBSDnl: doc/nl_NL.ISO8859-1/books/handbook/cutting-edge/chapter.sgml,v 1.47 2006/01/07 11:27:42 siebrand Exp $
%SOURCE% en_US.ISO8859-1/books/handbook/cutting-edge/chapter.sgml
==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml#17 (text+ko) ====
@@ -1,7 +1,7 @@
<!--
The FreeBSD Dutch Documentation Project
- $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.16 2008/12/15 21:31:28 rene Exp $
+ $FreeBSD: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.17 2009/01/23 16:46:10 rene Exp $
$FreeBSDnl: doc/nl_NL.ISO8859-1/books/handbook/eresources/chapter.sgml,v 1.35 2006/08/25 10:44:57 remko Exp $
Vertaald door: Siebrand Mazeland
==== //depot/projects/docproj_nl/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent#13 (text+ko) ====
@@ -1,7 +1,7 @@
<!--
Namen van FreeBSD mailinglijsten en gerelateerde software.
- $FreeBSD: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.15 2008/10/20 20:21:01 remko Exp $
+ $FreeBSD: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.16 2009/01/23 16:46:11 rene Exp $
$FreeBSDnl: doc/nl_NL.ISO8859-1/share/sgml/mailing-lists.ent,v 1.21 2006/08/25 10:40:41 remko Exp $
Vertaald door: Siebrand Mazeland
==== //depot/projects/docproj_nl/share/pgpkeys/rafan.key#2 (text+ko) ====
@@ -1,15 +1,14 @@
-<!-- $FreeBSD: doc/share/pgpkeys/rafan.key,v 1.1 2006/06/26 03:21:58 rafan Exp $ -->
+<!-- $FreeBSD: doc/share/pgpkeys/rafan.key,v 1.2 2009/01/25 06:22:04 rafan Exp $ -->
<!--
-sh ./addkey.sh rafan 86FD8C68;
+sh addkey.sh rafan 86FD8C68;
-->
<programlisting role="pgpfingerprint"><![CDATA[
pub 1024D/86FD8C68 2004-06-04
Key fingerprint = DC9E 5B4D 2DDA D5C7 B6F8 6E69 D78E 1091 86FD 8C68
uid Rong-En Fan <rafan at infor.org>
uid Rong-En Fan <rafan at csie.org>
-uid Rong-En Fan (CSIE, NTU) <b90098 at csie.ntu.edu.tw>
uid Rong-En Fan <rafan at FreeBSD.org>
-sub 2048g/CC9AC94F 2004-06-04 [expires: 2009-06-03]
+sub 2048g/42A8637E 2009-01-25 [expires: 2012-07-08]
]]></programlisting>
<programlisting role="pgpkey"><![CDATA[
-----BEGIN PGP PUBLIC KEY BLOCK-----
@@ -56,38 +55,37 @@
6VBBBaIzLACgnyfZ68crJwlv+fRxPhlxdFhgLgaIRgQTEQIABgUCQNCjCgAKCRBD
ZXPuA1v3XCeuAJwPrsSVVCrC29F3Xygr6QB3MS4a7QCfeOsqHEfwiXuxt2xjcF09
r0H7/96IRgQTEQIABgUCQdOcWQAKCRCsxgFlEcAjgmKeAJ9dWtZYU93qkd6Cdpo8
-jKbYq4y+BwCdFbqSBm3EwGgfzQZfvF42tacT2pW0MFJvbmctRW4gRmFuIChDU0lF
-LCBOVFUpIDxiOTAwOThAY3NpZS5udHUuZWR1LnR3PoheBBMRAgAeAhsDBgsJCAcD
-AgMVAgMDFgIBAh4BAheABQJAv+zmAAoJENeOEJGG/YxortwAniGXfizNBB0FJqxY
-a9fwjQXuCqhDAKCVopA1UMEswlv/osv41TXWwOzS84hFBBMRAgAGBQJAzGqzAAoJ
-EEKmSwvz9BnIi1kAmJSIHlwK+ZixVVenJzWnw2E+62EAnRsRvLeETz7aikmh5Yvd
-pWUNwHu0iEYEExECAAYFAkDMf00ACgkQBbz5zdSySILkrQCfeAXv6CFk9GijNtYW
-L+/GPwkdmLIAnAgNUUUChGlslG6gcjGolSdY3zvIiEYEExECAAYFAkDNDC4ACgkQ
-z8H8hiDrxkE56ACfRTItJiynItOoNSOt9fZQPOo6SpQAoJGT/lO7RlCYmkeiP62A
-X7sX+DmViEYEExECAAYFAkDMgcUACgkQCQM7t5B2mhAlqwCfRFillUo/5PB7QzvY
-YmflEgSWCoYAn3u6t8jni4PEltvRVn6qg9CF0pU5iEYEExECAAYFAkDOnpAACgkQ
-4yBMH10rsRoW6gCfZ7o0wkHWbPgEkXV/fwzGHIvhI9QAn3nkgqFi7Fo2gbJrfhn9
-zTdIjrRTiEYEExECAAYFAkDMhHwACgkQVLe2nHfUM4MgUACfb8BW/GER+rQe49Xn
-CCM06HZPlcQAoKYldHWK4QxhTZbSIZ8qwqcj1l3OiEYEExECAAYFAkDQowoACgkQ
-Q2Vz7gNb91zzqACgoLhLxEyI6Kf49QHgc34KzqYGXxUAn2hHOlDEBvyX8IaI+TaK
-svFbGsgLiEYEExECAAYFAkHTnFkACgkQrMYBZRHAI4KJQACeJhAYTXUCUiQrcfcQ
-ntCi7QikU3wAnj4bgydk6k3zT+fiFytJNCIdAIOXtB9Sb25nLUVuIEZhbiA8cmFm
-YW5ARnJlZUJTRC5vcmc+iGAEExECACAFAkSfQfQCGwMGCwkIBwMCBBUCCAMEFgID
-AQIeAQIXgAAKCRDXjhCRhv2MaEwHAJ4oy/obTSGCioDxVB5c+51TU56t7wCeNjIE
-k7aOCyrrNcByfsl0FNcuIee5Ag0EQL/q2RAIAPXcIiQWiDDoGQoP1+l6i0VnMTwH
-UrBsuqviQE2FJ53a9ZjtUD+22vO+xuWdxPs3FLfH1yQrxM1QvvR4Tza/gkHFs6xc
-AOJeT0VLziqdWULvFK4WhFMg7ZE74ywgkg6TChb9dPfNFBpLZSy6hnAop/95rxSF
-7N/6+d423PDUFogEXbUvhgKQBGCzjhl5ScJhGoM3t/7LlVQqAD9wTkMXHDs8q9Ex
-/ZBMNmWwLv0p8qgz8v5uc6RytWaovlEItjXiQBpg5l8nRLbkvJZwrHaNz17OIuvs
-3DaBJ99JhKcyC+Bv4o/7g3ak5DHQRiXurbah762Pcvar+sl49R1+gy3MFGsAAwYH
-/RbgiCMc24EIYFusPEJ5dCV/D+ttWsTTeVzPisxcTSLkTACCJWv1JetFey/7jHJy
-vqpnc7wm2krqzFOg5t5h42V4MnJkoX1k0A9MylxwCCO4V6YeaJPachmSMaQ5WNcn
-Z2npke20ExRHkkVVXjV6LIiy1bLK7RqI/+PVzlu8TI+A9i1hKWIfBCE1nL0mMC55
-vJsOQ3i/1VVfP1i3LRNWqCwv2evQo2mFOXNN6egFFE5sCYFdigKV1ISvA3QC5i0P
-fj5mfWaw/nm3xvG/JAK1Yi3ASM9esPTka7jF1FLXdFdRvK1otgUlJCWD9eTeIodu
-1gNOHz08MiGY9RsOihGmgUOITwQYEQIADwUCQL/q2QIbDAUJCWYBgAAKCRDXjhCR
-hv2MaNQsAJ9xwOgnX1DE7kHQEhae7kOvcJ/JsgCcC9yPXelrbRzgga+1zZCnD+O5
-6D0=
-=ZFgs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+=1iVI
-----END PGP PUBLIC KEY BLOCK-----
]]></programlisting>
==== //depot/projects/docproj_nl/www/en/community.xsl#4 (text+ko) ====
@@ -6,7 +6,7 @@
<!ENTITY % navinclude.community "INCLUDE">
]>
-<!-- $FreeBSD: www/en/community.xsl,v 1.7 2008/12/30 08:58:50 murray Exp $ -->
+<!-- $FreeBSD: www/en/community.xsl,v 1.9 2009/01/25 06:33:06 danger Exp $ -->
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0"
xmlns:cvs="http://www.FreeBSD.org/XML/CVS">
@@ -47,7 +47,9 @@
<p>There are more than one hundred <a
href="&base;/community/mailinglists.html">mailing
- lists</a> and several <a
+ lists</a>, dozens of web-based <a
+ href="http://forums.FreeBSD.org/">forums</a>, and
+ several <a
href="&base;/community/newsgroups.html">newsgroups</a>
available. There are over <xsl:value-of
select="count(document($usergroups.xml)//entry)"
==== //depot/projects/docproj_nl/www/en/donations/wantlist.sgml#9 (text+ko) ====
@@ -1,6 +1,6 @@
<!DOCTYPE HTML PUBLIC "-//FreeBSD//DTD HTML 4.01 Transitional-Based Extension//EN" [
<!ENTITY base CDATA "..">
-<!ENTITY date "$FreeBSD: www/en/donations/wantlist.sgml,v 1.473 2008/12/21 18:34:24 wilko Exp $">
+<!ENTITY date "$FreeBSD: www/en/donations/wantlist.sgml,v 1.474 2009/01/26 15:22:33 tabthorpe Exp $">
<!ENTITY title "FreeBSD Developers Want List">
<!ENTITY email 'donations'>
<!ENTITY % navinclude.about "INCLUDE">
@@ -404,6 +404,13 @@
<td>802.11a (5GHz) accesspoint with WPA2</td>
<td>Hopefully improve WiFi in 2.4GHz-infested apartment building.</td>
</tr>
+
+ <tr>
+ <td>rui</td>
+ <td>Portugal</td>
+ <td>Intel Mac, possibly Mac Mini for a small shipment fee</td>
+ <td>EFI support under FreeBSD and other Mac development work.</td>
+ </tr>
</table>
&footer;
==== //depot/projects/docproj_nl/www/en/smp/index.sgml#3 (text+ko) ====
@@ -1,6 +1,6 @@
<!DOCTYPE HTML PUBLIC "-//FreeBSD//DTD HTML 4.01 Transitional-Based Extension//EN" [
<!ENTITY base CDATA "..">
-<!ENTITY date "$FreeBSD: www/en/smp/index.sgml,v 1.177 2008/08/20 21:59:45 ed Exp $">
+<!ENTITY date "$FreeBSD: www/en/smp/index.sgml,v 1.178 2009/01/25 21:08:22 danger Exp $">
<!ENTITY title "FreeBSD SMPng Project">
<!ENTITY email 'freebsd-smp'>
<!ENTITY % navinclude.developers "INCLUDE">
@@ -201,29 +201,29 @@
primitives can be found here:</p>
<ul>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mutex&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Mutexes (mutex(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mutex&apropos=0&sektion=9">Kernel Mutexes (mutex(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mtx_pool&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Mutex Pools (mtx_pool(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=mtx_pool&apropos=0&sektion=9">Kernel Mutex Pools (mtx_pool(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=critical&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Critical Sections (critical(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=critical&apropos=0&sektion=9">Kernel Critical Sections (critical(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sx&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Shared/Exclusive Locks (sx(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sx&apropos=0&sektion=9">Kernel Shared/Exclusive Locks (sx(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=condvar&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Condition Variables (condvar(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=condvar&apropos=0&sektion=9">Kernel Condition Variables (condvar(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sema&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Semaphores (sema(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sema&apropos=0&sektion=9">Kernel Semaphores (sema(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sleep&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel sleep/wakeup API (sleep(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=sleep&apropos=0&sektion=9">Kernel sleep/wakeup API (sleep(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=kthread&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Kernel Threads (kthread(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=kthread&apropos=0&sektion=9">Kernel Threads (kthread(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=ithread&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Interrupt Threads (ithread(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=ithread&apropos=0&sektion=9">Interrupt Threads (ithread(9))</a></li>
- <li><a href="http://www.freebsd.org/cgi/man.cgi?query=swi&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">Software Interrupt Threads (swi(9))</a></li>
+ <li><a href="http://www.freebsd.org/cgi/man.cgi?query=swi&apropos=0&sektion=9">Software Interrupt Threads (swi(9))</a></li>
</ul>
<br>
- <p>In addition, the old <a href="http://www.freebsd.org/cgi/man.cgi?query=spl&apropos=0&sektion=9&manpath=FreeBSD+6.0-current">SPL man page</a> may be of interest, as it reflects the previous SMP synchronization model.</p>
+ <p>In addition, the old <a href="http://www.freebsd.org/cgi/man.cgi?query=spl&apropos=0&sektion=9">SPL man page</a> may be of interest, as it reflects the previous SMP synchronization model.</p>
</li>
<li><p>
==== //depot/projects/docproj_nl/www/share/sgml/events.xml#13 (text+ko) ====
@@ -10,10 +10,34 @@
<events>
<cvs:keywords xmlns:cvs="http://www.FreeBSD.org/XML/CVS" version="1.0">
<cvs:keyword name="freebsd">
- $FreeBSD: www/share/sgml/events.xml,v 1.66 2009/01/06 13:45:10 danger Exp $
+ $FreeBSD: www/share/sgml/events.xml,v 1.67 2009/01/24 19:07:08 danger Exp $
</cvs:keyword>
</cvs:keywords>
+ <event id="bugathon-jan09">
+ <name>Network-related Bugathon #6</name>
+ <url>http://wiki.freebsd.org/Bugathons/January2009</url>
+ <startdate>
+ <year>2009</year>
+ <month>1</month>
+ <day>30</day>
+ </startdate>
+ <enddate>
+ <year>2009</year>
+ <month>2</month>
+ <day>1</day>
+ </enddate>
+
+ <description>A bugathon is an event coordinated by the &os;
+ bugbusting team. Bugathons are held on IRC (in the
+ #freebsd-bugbusters channel of EFnet), and are attended by any
+ interested &os; developers and contributors during a week-end.
+ They focus on closing as many problem reports and fixing as many
+ bugs as possible. The plan for the sixth bugathon is to work
+ through the all network-related problem reports in &os;'s GNATS
+ database.</description>
+ </event>
+
<event id="fosdem-2009">
<name>FOSDEM '09</name>
<url>http://fosdem.org/2009/</url>
==== //depot/projects/docproj_nl/www/share/sgml/libcommon.xsl#4 (text+ko) ====
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="ISO-8859-1" ?>
<!DOCTYPE xsl:stylesheet PUBLIC "-//FreeBSD//DTD FreeBSD XSLT 1.0 DTD//EN"
"http://www.FreeBSD.org/XML/www/share/sgml/xslt10-freebsd.dtd">
-<!-- $FreeBSD: www/share/sgml/libcommon.xsl,v 1.25 2009/01/13 22:44:00 lwhsu Exp $ -->
+<!-- $FreeBSD: www/share/sgml/libcommon.xsl,v 1.26 2009/01/25 10:12:01 danger Exp $ -->
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
version="1.0"
@@ -1428,7 +1428,9 @@
<xsl:value-of select="name"/>
<br />
- (<xsl:value-of select='location/city' />, <xsl:value-of select='location/country' />)
+ <xsl:if test="location/city!='' and location/country!=''">
+ (<xsl:value-of select='location/city' />, <xsl:value-of select='location/country' />)
+ </xsl:if>
</a></p>
</xsl:if>
</xsl:for-each>
More information about the p4-projects
mailing list