Népszerű fórum témák
FreeBSD Project News
The OpenBSD Community.
Frissült: 1 óra 2 perc
Mark Kettenis (kettenis@) posted to tech@ asking Firefox users and others to test a patch that changes the threadsafe malloc(3) strategy from spinlocks to mutexes. Mark writes,
Firefox makes a lot of concurrent malloc(3) calls. The locking to make malloc(3) thread-safe is a bit...suboptimal. This diff makes things better by using a mutex instead of spinlock. If you're running Firefox you want to try it; it makes video watchable on some machines. If you're not running Firefox you want to try it; to make sure it doesn't break things.
Testing this requires a recent -current (5.9-beta) system; grab the latest source, apply the patch, rebuild and report back any effects, good or bad.
This is the most serious bug you'll hear about this week: the issues identified and fixed in OpenSSH are dubbed CVE-2016-0777 and CVE-2016-0778.
An early heads up came from Theo de Raadt in this mailing list posting.
Until you are able to patch affected systems, the recommended workaround is to use
# echo -e 'Host *\nUseRoaming no' >> /etc/ssh/ssh_config
That is, add the option UseRoaming no to your /etc/ssh/ssh_config (or your user's ~/.ssh/config) file, or start your ssh client with -oUseRoaming=no included on the commandline.
We will be updating this article with more information as it becomes available. Read more...
Those of you who have been following OpenBSD commits have no doubt noticed the recent work on supporting OpenBSD as a guest on the Xen hypervisor.
Robert Nagy (robert@) has integrated quite a few patches to the OpenBSD port of the Chromium browser since its addition to the tree, but the latest one is quite significant. In his recent commit, pledge(2) support has been added. Read more...
In a continuing series of pledge(2) reports, Theo de Raadt (deraadt@) gives us the latest update before the 5.9 freeze. Read more...
Desktop users can feel just a bit safer now, as Alexandre Ratchov (ratchov@) has introduced some initial privilege separation to sndiod(1). Read more...
Fresh from the recently completed n2k15 hackathon, here comes Stefan Sperling's (stsp@) report:
I spent most of my time at n2k15 preparing and testing fixes for initial 802.11n support for OpenBSD.
The current goal of this project is to support mandatory 802.11n features:
Send and receive using data rates MCS 0-7. In terms of throughput these are essentially equivalent to 802.11a/g except for MCS 7 which sends up to 65 Mbit/s. Read more...
Next up in our continuing series of n2k15 hackathon reports comes one from Martin Pieuchot (mpi@), who writes:
We found two kind of MP bugs!
There are MP bugs that you fix without even understanding them, and there are MP bugs that you understand but can't fix. Read more...
Our next report comes from the hackathon organizer himself, Reyk Floeter (reyk@).
When I heard that Martin Pieuchot (mpi@) was looking for a place to hold another mini-hackathon for three to four people to work on multiprocessor (MP) enhancements of the network stack, I offered to come to our work place in Hannover, Northern Germany. We have space, gear, fast Internet and it is easy to reach for the involved people. Little did I know that it would quickly turn into n2k15, a network hackathon with 20 attendees from all over the world. Read more...
The next n2k15 hackathon report comes from Ken Westerback (krw@).
Much like tedu@, the perfidy of the airline industry left me some status miles short of the goal line as the year end approached. There must be a hackathon somewhere ... Hannover! Read more...
Just in, this report from Vincent Gross (vgross@) on the recent n2k15 hackathon:
First of all, I would like to thank reyk@ for hosting the hackathon
and mpi@ for inviting me. This hackathon was my first and I had a
great time in Hannover.
Next up in the ongoing series of n2k15 reports is Alexander Bluhm (bluhm@), who writes:
This hackathon I was sitting between mpi@ and sashan@ to work on multiprocessor networking.
The second n2k15 hackathon report comes from Ted Unangst (tedu@), who writes:
I don't usually get too involved with the network stack, but sometimes you find yourself at a network hackathon and have to go with the flow. With many developers working in the same area, it can be hard to find an appropriate project, but fortunately there are a few dusty corners in networking land that can be swept up without too much disturbance to others. Read more...
Our first n2k15 hackathon report comes from Alexandr Nedvedicky (sashan@), who writes:
I'd like to thank Reyk for hackroom and showing us a Christmas market. It was also my pleasure to meet Mr. Henning in person. Speaking of Henning, let's switch to PF hacking.
Ulf Brosziewski (bru@) writes to tech@: The diffs below contain a complete and extensive rewrite of the input-processing parts of wsmouse and the interface it provides to the hardware drivers. It prepares the support for various kinds of multitouch input, as well as an extended support for touchpads by wsmouse. Read more...
Two OpenBSD developers gave presentations at this year's Hackfest security conference in Quebec. The videos of both are now online for your viewing pleasure:
Renato Westphal (renato@) recently agreed to answer some questions in the wake of committing eigrpd(8): First off, thanks for agreeing to this interview. Tell us a little about yourself, your technical background, and how you came to the OpenBSD project. My name is Renato Westphal and I was born and live in the south of Brazil. Currently I work for Taghos Tecnologia developing web cache and CDN solutions and in my previous job I worked for a small network equipment manufacturer, which is where my background in routing protocols comes from. Read more...
The long-anticipated native OpenBSD amd64 and i386 hypervisor vmm(4) has been committed, with userland tools, to the public CVS repository. If you've been following source changes closely, you probably noticed the series of commits like this one from Mike Larkin (mlarkin@), supplemented with one by Reyk Floeter (reyk@). In an announcement and overview sent to tech@, Mike writes:
An early rough cut of the vmm subsystem is now in the tree. This includes both the kernel parts and userland parts.
In our ongoing series of ü2k15 hackathon reports, here is Mike Belopuhov's (mikeb@) entry:
My task at ü2k15 was to implement Chacha20-Poly1305 authenticated encryption mode for use in the IPsec stack within the Encapsulating Security Payload (ESP) protocol.
The Authenticated Encryption with Associated Data (AEAD) construction for Chacha20 stream cipher and Poly1305 polynomial Message Authentication Code (MAC) is described in the RFC7539 and its application in IPsec/ESP can be found in RFC7634.
The next hackathon report is from Florian Obser (florian@), who writes:
I'm not entirely sure if mg(1) has dedicated maintainers, but if there are it's probably lum@, jasper@ and me. When u2k15 was first discussed at c2k15 in Calgary someone said: "Florian, will you come? We need utf8 for mg!" Me: "For sure I will come, I will build myself an IT throne and mock anybody who touches mg(1)'s input handling." Read more...
HUP napi hírlevél
Legfrissebb HUP képek
Mi a kedvenc videólejátszód?
mplayer, mpv, mplayer forkok és frontendek
egyik sem, valami más...
Összes szavazat: 394