Bonjour, Le mardi 22 août 2023 à 09:36 +0200, JP Guillonneau a écrit : > Le 18/08/23 10:28 JP a écrit : > > Le 14/08/23 13:06 Lucien a écrit : > > > [...] > > > RAS > > Dernier appel. > Fedora-39 a apporté quelques modifications à ce fichier. > Le voici avec le diff par rapport à la traduction précédente et la > construction > pour F39. > Merci d’avance pour vos relectures et commentaires. > Amicalement Broutilles et suppressions des chaînes périmées. Amicalement, jipege
--- /home/jpg1/Documents/traductions/l10n/manpage-fr/man7/pkeys.7/pkeys.7.po 2023-08-27 12:21:56.719994432 +0200 +++ /home/jpg1/Documents/traductions/l10n/manpage-fr/man7/pkeys.7/pkeys.7_jpg.po 2023-08-27 12:31:02.002914528 +0200 @@ -19,8 +19,8 @@ msgid "" msgstr "" "Project-Id-Version: manpages.fr\n" -"POT-Creation-Date: 2023-06-27 19:42+0200\n" -"PO-Revision-Date: 2023-08-22 09:28+0200\n" +"POT-Creation-Date: 2023-08-10 19:04+0200\n" +"PO-Revision-Date: 2023-08-27 12:30+0200\n" "Last-Translator: Jean-Paul Guillonneau <guillonneau.jeanpaul@free.fr>\n" "Language-Team: French <debian-l10n-french@lists.debian.org>\n" "Language: fr\n" @@ -105,11 +105,6 @@ #. type: Plain text #: archlinux debian-bookworm debian-unstable fedora-39 fedora-rawhide #: mageia-cauldron opensuse-tumbleweed -#| msgid "" -#| "Protection keys work in conjunction with the existing B<PROT_READ>/ " -#| "B<PROT_WRITE>/ B<PROT_EXEC> permissions passed to system calls such as " -#| "B<mprotect>(2) and B<mmap>(2), but always act to further restrict these " -#| "traditional permission mechanisms." msgid "" "Protection keys work in conjunction with the existing B<PROT_READ>, " "B<PROT_WRITE>, and B<PROT_EXEC> permissions passed to system calls such as " @@ -176,20 +171,6 @@ #. type: Plain text #: archlinux debian-bookworm debian-unstable fedora-39 fedora-rawhide #: mageia-cauldron opensuse-tumbleweed -#| msgid "" -#| "Applications should be very careful to ensure that they do not \"leak\" " -#| "protection keys. For instance, before calling B<pkey_free>(2), the " -#| "application should be sure that no memory has that pkey assigned. If the " -#| "application left the freed pkey assigned, a future user of that pkey " -#| "might inadvertently change the permissions of an unrelated data " -#| "structure, which could impact security or stability. The kernel " -#| "currently allows in-use pkeys to have B<pkey_free>(2) called on them " -#| "because it would have processor or memory performance implications to " -#| "perform the additional checks needed to disallow it. Implementation of " -#| "the necessary checks is left up to applications. Applications may " -#| "implement these checks by searching the I</proc/[pid]/smaps> file for " -#| "memory regions with the pkey assigned. Further details can be found in " -#| "B<proc>(5)." msgid "" "Applications should be very careful to ensure that they do not \"leak\" " "protection keys. For instance, before calling B<pkey_free>(2), the " @@ -211,7 +192,7 @@ "utilisateur de cette pkey peut par inadvertance modifier les permissions " "d’une structure de données étrangère, pouvant impacter la sécurité ou la " "stabilité. Le noyau permet actuellement aux pkeys en cours d’avoir " -"B<pkey_free>(2) appelée sur elles car cela pourrait avoir des implications " +"B<pkey_free>(2) appelée sur elles, car cela pourrait avoir des implications " "de performance de processeur ou de mémoire pour réaliser des vérifications " "supplémentaires nécessaires pour désactiver cet appel. L’implémentation des " "vérifications nécessaires est laissée aux applications. Celles-ci peuvent " @@ -402,12 +383,6 @@ #: archlinux debian-bookworm debian-unstable mageia-cauldron #: opensuse-tumbleweed #, no-wrap -#| msgid "" -#| "#define _GNU_SOURCE\n" -#| "#include E<lt>unistd.hE<gt>\n" -#| "#include E<lt>sys/syscall.hE<gt>\n" -#| "#include E<lt>stdio.hE<gt>\n" -#| "#include E<lt>sys/mman.hE<gt>\n" msgid "" "#define _GNU_SOURCE\n" "#include E<lt>err.hE<gt>\n" @@ -446,14 +421,6 @@ #: archlinux debian-bookworm debian-unstable mageia-cauldron #: opensuse-tumbleweed #, no-wrap -#| msgid "" -#| " /*\n" -#| " * Allocate one page of memory.\n" -#| " */\n" -#| " buffer = mmap(NULL, getpagesize(), PROT_READ | PROT_WRITE,\n" -#| " MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);\n" -#| " if (buffer == MAP_FAILED)\n" -#| " errExit(\"mmap\");\n" msgid "" " /*\n" " * Allocate one page of memory.\n" @@ -492,13 +459,6 @@ #: archlinux debian-bookworm debian-unstable mageia-cauldron #: opensuse-tumbleweed #, no-wrap -#| msgid "" -#| " /*\n" -#| " * Allocate a protection key:\n" -#| " */\n" -#| " pkey = pkey_alloc();\n" -#| " if (pkey == -1)\n" -#| " errExit(\"pkey_alloc\");\n" msgid "" " /*\n" " * Allocate a protection key:\n" @@ -518,14 +478,6 @@ #: archlinux debian-bookworm debian-unstable mageia-cauldron #: opensuse-tumbleweed #, no-wrap -#| msgid "" -#| " /*\n" -#| " * Disable access to any memory with \"pkey\" set,\n" -#| " * even though there is none right now.\n" -#| " */\n" -#| " status = pkey_set(pkey, PKEY_DISABLE_ACCESS, 0);\n" -#| " if (status)\n" -#| " errExit(\"pkey_set\");\n" msgid "" " /*\n" " * Disable access to any memory with \"pkey\" set,\n" @@ -547,16 +499,6 @@ #: archlinux debian-bookworm debian-unstable mageia-cauldron #: opensuse-tumbleweed #, no-wrap -#| msgid "" -#| " /*\n" -#| " * Set the protection key on \"buffer\".\n" -#| " * Note that it is still read/write as far as mprotect() is\n" -#| " * concerned and the previous pkey_set() overrides it.\n" -#| " */\n" -#| " status = pkey_mprotect(buffer, getpagesize(),\n" -#| " PROT_READ | PROT_WRITE, pkey);\n" -#| " if (status == -1)\n" -#| " errExit(\"pkey_mprotect\");\n" msgid "" " /*\n" " * Set the protection key on \"buffer\".\n" @@ -604,10 +546,6 @@ #: archlinux debian-bookworm debian-unstable mageia-cauldron #: opensuse-tumbleweed #, no-wrap -#| msgid "" -#| " status = pkey_free(pkey);\n" -#| " if (status == -1)\n" -#| " errExit(\"pkey_free\");\n" msgid "" " status = pkey_free(pkey);\n" " if (status == -1)\n" @@ -657,7 +595,6 @@ #. type: TH #: fedora-39 fedora-rawhide #, no-wrap -#| msgid "Linux man-pages 6.04" msgid "Linux man-pages 6.05" msgstr "Pages du manuel de Linux 6.05" @@ -859,7 +796,7 @@ "utilisateur de cette pkey peut par inadvertance modifier les permissions " "d’une structure de données étrangère, pouvant impacter la sécurité ou la " "stabilité. Le noyau permet actuellement aux pkeys en cours d’avoir " -"B<pkey_free>(2) appelée sur elles car cela pourrait avoir des implications " +"B<pkey_free>(2) appelée sur elles, car cela pourrait avoir des implications " "de performance de processeur ou de mémoire pour réaliser des vérifications " "supplémentaires nécessaires pour désactiver cet appel. L’implémentation des " "vérifications nécessaires est laissée aux applications. Celles-ci peuvent "
Attachment:
signature.asc
Description: This is a digitally signed message part