nerdculture.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
Be excellent to each other, live humanism, no nazis, no hate speech. Not only for nerds, but the domain is somewhat cool. ;) No bots in general. Languages: DE, EN, FR, NL, ES, IT

Administered by:

Server stats:

1.2K
active users

#openbsd

45 posts34 participants3 posts today
Felix Palmen :freebsd: :c64:<p>Meanwhile waiting for a <a href="https://mastodon.bsd.cafe/tags/git" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>git</span></a> <a href="https://mastodon.bsd.cafe/tags/clone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clone</span></a> of the whole <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/src" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>src</span></a> tree, to see whether I can integrate their bcrypt implementation 🙈</p>
Felix Palmen :freebsd: :c64:<p>I need some advise: Is there a good portable and free (really free, not GPL!) <a href="https://mastodon.bsd.cafe/tags/implementation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>implementation</span></a> of <a href="https://mastodon.bsd.cafe/tags/bcrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bcrypt</span></a> in <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> around?</p><p>There's <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> source I could use, but integrating that would probably be quite a hassle...</p><p>Background: I want to start creating a second credential checker for <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> using files. And it probably makes sense to support a sane subset of <a href="https://mastodon.bsd.cafe/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a>'s <a href="https://mastodon.bsd.cafe/tags/htpasswd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>htpasswd</span></a> format here. Looking at the docs:<br><a href="https://httpd.apache.org/docs/current/misc/password_encryptions.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">httpd.apache.org/docs/current/</span><span class="invisible">misc/password_encryptions.html</span></a><br>... the "sane subset" seems to be just bcrypt. *MAYBE* also this apache-specific flavor of "iterated" MD5, although that sounds a bit fishy ...</p>
Felix Palmen :freebsd: :c64:<p>Next <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> improvement: Make sure to <a href="https://mastodon.bsd.cafe/tags/wipe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wipe</span></a> <a href="https://mastodon.bsd.cafe/tags/passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a> from RAM directly after used. That's more of a <a href="https://mastodon.bsd.cafe/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> precaution, because there *should* be no way how an attacker can access a running process' memory, but you never know which bugs surface 🙈.</p><p>Unexpectedly, that posed <a href="https://mastodon.bsd.cafe/tags/portability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>portability</span></a> issues. <a href="https://mastodon.bsd.cafe/tags/C11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C11</span></a> has <a href="https://mastodon.bsd.cafe/tags/memset_s" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memset_s</span></a> ... a pretty weird function, but suitable for wiping. It's there on <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> and on <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>. Not on <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> though. But NetBSD offers the much saner <a href="https://mastodon.bsd.cafe/tags/C23" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C23</span></a> function <a href="https://mastodon.bsd.cafe/tags/memset_explicit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memset_explicit</span></a>. Looking at <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>, there's neither. But there is the (non-standard!) <a href="https://mastodon.bsd.cafe/tags/explicit_bzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>explicit_bzero</span></a> 🤯 .. and with glibc, it requires _DEFAULT_SOURCE to be defined as soon as you compile with a C standard version given to the compiler. This function exists on some other systems as well, but there's confusion whether it should be declared in string.h or strings.h. 🤪 </p><p>Here's the full set of compile-tests I'm now doing, only to find the best way to really erase memory:<br><a href="https://github.com/Zirias/swad/blob/master/src/bin/swad/swad.mk#L6" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Zirias/swad/blob/ma</span><span class="invisible">ster/src/bin/swad/swad.mk#L6</span></a></p><p>And if none of these functions is found, swad uses the "hacky" way that most likely works as well: Access the normal memset function via a volatile pointer.</p>
Felix Palmen :freebsd: :c64:<p>Today, I implemented the <a href="https://mastodon.bsd.cafe/tags/async" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>async</span></a> / <a href="https://mastodon.bsd.cafe/tags/await" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>await</span></a> pattern (as known from <a href="https://mastodon.bsd.cafe/tags/csharp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>csharp</span></a> and meanwhile quite some other languages) ...</p><p>... in good old <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a>! 😎 </p><p>Well, at least sort of.</p><p>* It requires some standard library support, namely <a href="https://mastodon.bsd.cafe/tags/POSIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>POSIX</span></a> user context switching with <a href="https://mastodon.bsd.cafe/tags/getcontext" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getcontext</span></a> and friends, which was deprecated in POSIX-1.2008. But it's still available on many systems, including <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> (with <a href="https://mastodon.bsd.cafe/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a>). It's NOT available e.g. on <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>, or Linux with some alternative libc.</p><p>* I can't do anything about the basic language syntax, so some boilerplate comes with using it.</p><p>* It has some overhead (room for extra stacks, even extra syscalls as getcontext unfortunately also always saves/restores the signal mask)</p><p>But then ... async/await in C! 🥳 </p><p>Here are the docs:<br><a href="https://zirias.github.io/poser/api/latest/class_p_s_c___async_task.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zirias.github.io/poser/api/lat</span><span class="invisible">est/class_p_s_c___async_task.html</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Peter N. M. Hansteen<p>With this spring's (or autumn's) <a href="https://mastodon.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> release creeping ever closer (see <a href="https://www.openbsd.org/77.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">openbsd.org/77.html</span><span class="invisible"></span></a> filling out in near real time), you can prepare for the event by by reading "You Have Installed OpenBSD. Now For The Daily Tasks." <a href="https://nxdomain.no/~peter/openbsd_installed_now_for_the_daily_tasks.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/openbsd_ins</span><span class="invisible">talled_now_for_the_daily_tasks.html</span></a>.</p><p>Enjoy <a href="https://mastodon.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>!</p><p><a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.social/tags/unixlike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unixlike</span></a> <a href="https://mastodon.social/tags/newrelease" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newrelease</span></a> <a href="https://mastodon.social/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/sanity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sanity</span></a> <a href="https://mastodon.social/tags/qualitysoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qualitysoftware</span></a> <a href="https://mastodon.social/tags/securecode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securecode</span></a> <a href="https://mastodon.social/tags/correctcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>correctcode</span></a></p>
The ol' tealeg 🐡<p>One of my (very few) annoyances with <a href="https://mastodon.online/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> is that, in the event of total power failure, the filesystem can be left in an inconsistent state and require manual intervention to fix it before the machine will boot.</p><p>I'd find it more annoying, apart from the fact that I have to use the command `fsck_ffs` which perfectly mirrors my own sentiments when it occurs :-D</p>
Rafael Sadowski<p><a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> IO benchmarking: How Many Jobs Are Worth It?</p><p><a href="https://rsadowski.de/posts/2025/fio_simple_benckmarking/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rsadowski.de/posts/2025/fio_si</span><span class="invisible">mple_benckmarking/</span></a></p>
R.L. Dane :Debian: :OpenBSD: 🍵<p><span class="h-card"><a href="https://fosstodon.org/@spyro" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>spyro</span></a></span></p><p>I have 32GB RAM on my work machine, and never use it all XD</p><p>I'm quite happy with 8GB and 4GB on my home machines.</p><p>My <a href="https://polymaths.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> machine never even hits a single GB RAM usage. :D</p>
Compliance matters!<p><span class="h-card" translate="no"><a href="https://mastodon.social/@SilentForest" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SilentForest</span></a></span> Fromfaktor, Qualität, Verarbeitung, und das absolute <a href="https://23.social/tags/musthave" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>musthave</span></a>: <a href="https://23.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> Kernel booten ohne dass es abstürtzt :-) <br>Biometrie war für mich nie ein Kriterium. Ebensowenig wie "touch".</p>
screwlisp<p><a href="https://mastodon.sdf.org/tags/LispyGopherClimate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LispyGopherClimate</span></a> <a href="https://mastodon.sdf.org/tags/lisp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lisp</span></a> <a href="https://mastodon.sdf.org/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.sdf.org/tags/peertube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>peertube</span></a><br><a href="https://communitymedia.video/w/7KpDL8dmSMN7zH6TxEgQbb" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">communitymedia.video/w/7KpDL8d</span><span class="invisible">mSMN7zH6TxEgQbb</span></a></p><p><span class="h-card"><a href="https://climatejustice.social/@kentpitman" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kentpitman</span></a></span> <a href="https://mastodon.sdf.org/tags/haiku" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>haiku</span></a> </p><p>Resurrected Sandewall's <a href="https://mastodon.sdf.org/tags/softwareIndividuals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwareIndividuals</span></a> from 2014.</p><p>This episode is dedicated to general purpose interaction in the software individual / <a href="https://mastodon.sdf.org/tags/CAISOR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CAISOR</span></a> paradigm.</p><p>Next will be porting the dynamicwindows zetalisp zwei to McCLIM <a href="https://mastodon.sdf.org/tags/commonlisp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commonlisp</span></a>.</p><p><span class="h-card"><a href="https://merveilles.town/@prahou" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>prahou</span></a></span> <a href="https://mastodon.sdf.org/tags/unix_surrealism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unix_surrealism</span></a> next <a href="https://mastodon.sdf.org/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> release art??</p><p>Also <span class="h-card"><a href="https://chaos.social/@pesco" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pesco</span></a></span> and <span class="h-card"><a href="https://mathstodon.xyz/@dougmerritt" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dougmerritt</span></a></span> on IPE '84</p><p>co guest and join in on <a href="https://mastodon.sdf.org/tags/lambdaMOO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lambdaMOO</span></a> as always!</p><p><span class="h-card"><a href="https://appdot.net/@mdhughes" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mdhughes</span></a></span> <span class="h-card"><a href="https://hachyderm.io/@nosrednayduj" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nosrednayduj</span></a></span> <span class="h-card"><a href="https://social.sachachua.com/@sacha" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sacha</span></a></span></p>
Tom Stepleton<p>Hoo boy, have an <a href="https://oldbytes.space/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> pf challenge and would love any hints.</p><p>On host_A, FooDaemon wants to send UDP packets from port 1234 to port 1234 on host_B. It also wants to receive packets on port 1234 from host_B.</p><p>I would like pf to intercept outbound FooDaemon packets from port 1234 and send them from port 4321 instead of 1234. I would also like pf to intercept inbound packets on port 4321 and pass them to FooDaemon listening on port 1234.</p><p>Does anyone have any idea of how to accomplish this? I'm stumped so far!</p>
Puffy Fan<p>What's the state of wi-fi 7? I could try to send someone an Intel be201 to write firmware and driver. <a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a></p>
h3artbl33d :openbsd: :ve:<p>The SSD in my mailserver has 19,782 power on hours (which is 825 days, little over two years) with 'just' 13 powercycles. And let me tell you, those 13 powercycles are solely because I rebooted the system (upgrade, maintenance).</p><p>That is how rock-stable <a href="https://exquisite.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> and <a href="https://exquisite.social/tags/OpenSMTPD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSMTPD</span></a> are.</p>
Felix Palmen :freebsd: :c64:<p>About the <a href="https://mastodon.bsd.cafe/tags/random" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>random</span></a> thingie ... I need random data in <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> to generate unpredictable <a href="https://mastodon.bsd.cafe/tags/session" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>session</span></a> IDs.</p><p>I previously had an implementation trying the <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>-originating <a href="https://mastodon.bsd.cafe/tags/getrandom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getrandom</span></a> if available, with a fallback to a stupid internal <a href="https://mastodon.bsd.cafe/tags/xorshift" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xorshift</span></a> <a href="https://mastodon.bsd.cafe/tags/PRNG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PRNG</span></a>, which could be disabled because it's obviously NOT cryptographically secure, and WAS disabled for the generation of session IDs.</p><p>Then I learned <a href="https://mastodon.bsd.cafe/tags/arc4random" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arc4random</span></a> is available on many systems nowadays (<a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a>, even Linux with a recent-enough glibc), so I decided to add a compile check for it and replace the whole mess with nothing but an arc4random call IF it is available.</p><p>arc4random originates from <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> and provides the only sane way to get cryptographically secure random data. It automatically and transparently (re-)seeds from OS entropy sources, but uses an internal CSPRNG most of the time (nowadays typically <a href="https://mastodon.bsd.cafe/tags/ChaCha20" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChaCha20</span></a>, so it's a misnomer, but hey ...). It never fails, it never blocks. It just works. Awesome.</p>
these machines will destroy US.<p>sometimes all you need is a terminal and cute dog videos </p><p><a href="https://infosec.exchange/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://infosec.exchange/tags/chromium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chromium</span></a> <a href="https://infosec.exchange/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a></p>
crc<p>The initial konilo-over-irc system is running in the <a href="https://mastodon.bsd.cafe/tags/retro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retro</span></a> and #<a href="https://mastodon.bsd.cafe/tags/forth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forth</span></a> channels on libera.chat. This provides a full <a href="https://mastodon.bsd.cafe/tags/Konilo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Konilo</span></a> <a href="https://mastodon.bsd.cafe/tags/Forth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forth</span></a> system, with separate memory, block storage, and stacks per user, and persistence between uses. It uses a lightly modified version of the standard VM, and runs on a stock <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> system.</p><p>The initial code snapshot has been released on my patreon, and a general release will be made in the next few weeks, after further testing, cleanups, and documenting.</p><p>I've also been working on a hosted shell-based system, which should be released to my patrons within a few days, and more broadly next month.</p>
argv minus one<p>Do any operating systems other than <a href="https://mastodon.sdf.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> (<a href="https://mastodon.sdf.org/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a>, <a href="https://mastodon.sdf.org/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a>, <a href="https://mastodon.sdf.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.sdf.org/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>, etc) have an API for non-blocking file IO?</p><p>I know Linux has that in <a href="https://mastodon.sdf.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a>, which can do almost any IO operation (even fsync) in the background and tell you when it's done, but is that the only OS with such a feature?</p><p><a href="https://mastodon.sdf.org/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.sdf.org/tags/async" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>async</span></a></p>
these machines will destroy US.<p>I don't need to run openBSD on anything, but damn if that UX doesn't scratch an itch for me currently....</p><p><a href="https://infosec.exchange/tags/UX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UX</span></a> <a href="https://infosec.exchange/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://infosec.exchange/tags/desktop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>desktop</span></a> <a href="https://infosec.exchange/tags/simplicity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simplicity</span></a></p>
Bryan Steele :flan_beard:<p>With 7.7 on track, I think it's time for some OpenBSD <a href="https://bsd.network/tags/77HYPE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>77HYPE</span></a> :flan_hacker:​ :flan_cool:​</p><blockquote><p><a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> 7.7 adds ice(4), a new driver for Intel E810 based 100Gb Ethernet devices, and ixv(4), a driver for the virtual functions (SR-IOV) of the Intel 82598EB, 82559, and X540.</p></blockquote><p><a href="https://bsd.network/@brynet/113411620687454163" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1134116206</span><span class="invisible">87454163</span></a></p><blockquote><p>UEFI support improvements, such as preferring GPT in the installer over MBR when installing on modern machines... as well an initial UEFI boot manager support! :flan_cheer:​</p></blockquote><p><a href="https://bsd.network/@brynet/114001271669308309" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1140012716</span><span class="invisible">69308309</span></a></p><p><a href="https://bsd.network/@brynet/114032859758474770" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1140328597</span><span class="invisible">58474770</span></a></p><p><a href="https://bsd.network/@brynet/114291458529230770" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1142914585</span><span class="invisible">29230770</span></a></p><blockquote><p>Jonathan Gray (jsg@) updated the drm(4) graphics drivers (inteldrm/radeondrm/amdgpu) in <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> 7.7 to 6.12.y/6.12.21 longterm stable drivers, from 6.6.68.</p></blockquote><p><a href="https://bsd.network/@brynet/113960404744684278" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1139604047</span><span class="invisible">44684278</span></a></p><blockquote><p>OpenBSD 7.7 extends pf(4) HFSC Queues to support larger than 4Gbit/s values.</p></blockquote><p><a href="https://bsd.network/@brynet/113469322883795072" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1134693228</span><span class="invisible">83795072</span></a></p><blockquote><p>OpenBSD now has separate performance policies (hw.perfpolicy) for when on battery power vs. on AC power, extending the syntax for hw.perfpolicy=ac-policy,battery-policy.</p></blockquote><p><a href="https://bsd.network/@brynet/113520914552845426" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1135209145</span><span class="invisible">52845426</span></a></p><blockquote><p>AF_FRAME a new socket(4) type, intended for implementing low-overhead/data rate protocols, such as LLDP.</p></blockquote><p><a href="https://bsd.network/@brynet/113657729323839447" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1136577293</span><span class="invisible">23839447</span></a></p><blockquote><p>Many previously unsupported internal webcams now work on more laptops, numerous improvements to the uvideo(4) driver, USB3 speeds, and video(4), the V4L2 compat layer.</p></blockquote><p><a href="https://bsd.network/@brynet/113698420641534149" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1136984206</span><span class="invisible">41534149</span></a></p><p><a href="https://bsd.network/@brynet/114088125248117126" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1140881252</span><span class="invisible">48117126</span></a></p><blockquote><p>An issue with flaky PS/2 keyboards/trackpads on some laptops, such as chromebooks was fixed by Miod Vallat.</p></blockquote><p><a href="https://bsd.network/@brynet/113981026507464726" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1139810265</span><span class="invisible">07464726</span></a></p><blockquote><p>Support for the Radxa Orion O6 Armv9 motherboard was as added for OpenBSD 7.7.</p></blockquote><p><a href="https://bsd.network/@brynet/114000276863849190" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1140002768</span><span class="invisible">63849190</span></a></p><blockquote><p><a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>/arm64 now has SVE (Scalable Vector Extension) support.</p></blockquote><p><a href="https://bsd.network/@brynet/113987732150965462" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsd.network/@brynet/1139877321</span><span class="invisible">50965462</span></a></p><p>..and lots more for users to discover in the 7.7 release! Keep a look out for the announcement later this month! :flan_guns:​</p>
Bryan Steele :flan_beard:<p>Kevin Lo has added Realtek RTL8125D support to the <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> rge(4) driver in <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> -current.</p><p>This is an integrated 2.5Gb Ethernet chipset found on some more recent AM5 motherboards.</p><blockquote><p>kevlo@ modified src/*: Add support for the Realtek RTL8125D chip to the rge(4) driver and update microcode for RTL8125B.</p><p>The RTL8125D chip can be found on motherboards like MSI PRO B840-P WIFI.</p></blockquote>