Pinned post

I'd like to replace my aging/noisy AMD Zen1+ desktop :flan_hacker:​ 

Not great timing, I know, but I'm thinking a Intel mini PC (e.g: N150, 11th Gen i5/i7) would work for my testing & hacking, Any help towards this would be greatly appreciated. :flan_heart:

paypal.com/donate/?hosted_butt

amazon.ca/hz/wishlist/ls/2E7N6

Pinned post

Please boost my shameless posts for pizza, rent, & ThinkPads. :flan_heart:​ 

I could use some help, friends. I'd really appreciate sharing. :flan_peek:

If you can help out with the occasional pizza, that would really mean a lot to me. Monthly gifts would take care of a lot of my financial stress/anxiety as well.

brynet.ca/wallofpizza.html

paypal.com/donate/?hosted_butt

Progress: $345 / $2500 CAD (monthly goal)

If you aren't able help with PayPal, I have an Amazon .ca wishlist with some odds & ends, computer hardware: amazon.ca/hz/wishlist/ls/2E7N6

(Native SegWit): bc1qzkchnc25yeqt9p24edsu5ln0mvh8hqdzdznlk2

Pinned post

A guaranteed $2500 CAD a month would go a long way towards solving a lot of my problems.. sigh. :flan_tired:

It would allow me to spend less time worrying about food, rent, bills, and more on open source. :flan_insomnia:

I'm looking for monthly/yearly "no-strings" sponsors, if any companies (or individuals) would like to help to support me so that I can focus on open source full time. Feel free to direct message or Email me.

Pinned post
Pinned post

Self-boosts 

If you find my shameless self boosts to be at all annoying, feel free to click on my profile, then the triple vertical dots next to my follow button, and finally "Hide boosts from @brynet

:flan_thumbs:

A early criticism heard of pledge(2) was that the kernel contained a small number of hardcoded path checks in order to avoid the broader rpath promise. This meant some paths were implicitly readable by programs in order to satisfy the needs of libc.

marc.info/?l=openbsd-cvs&m=177

OpenBSD is attempting to solve this by adding a new (non-public/non-exported*) __pledge_open(2) used by libc, which is like read-only open(2) whos file descriptors can not be written to, have attributes changed on them or passed with e.g: SCM_RIGHTS file descriptor passing.

marc.info/?l=openbsd-cvs&m=177

* Recall that OpenBSD has system call origin verification and no indirect syscall access.

This is still a WIP, some parts remain uncommitted, but an interesting semantic change, which _should_ be mostly transparent for applications using pledge(2) already with rpath, those relying on the implicit paths may need to add filesystem related promises and use unveil(2). :flan_thumbs:

Please boost my shameless posts for pizza, rent, & ThinkPads. :flan_heart:​ 

I could use some help, friends. I'd really appreciate sharing. :flan_peek:

If you can help out with the occasional pizza, that would really mean a lot to me. Monthly gifts would take care of a lot of my financial stress/anxiety as well.

brynet.ca/wallofpizza.html

paypal.com/donate/?hosted_butt

Progress: $345 / $2500 CAD (monthly goal)

If you aren't able help with PayPal, I have an Amazon .ca wishlist with some odds & ends, computer hardware: amazon.ca/hz/wishlist/ls/2E7N6

(Native SegWit): bc1qzkchnc25yeqt9p24edsu5ln0mvh8hqdzdznlk2

In addition to funding open source projects you use, if you can, consider extending support to the individual contributors/developers personally who work on those projects, many are volunteers and even a small monthly contribution could mean the difference. 🫶

#OpenSource #FOSS

BSDCan: North America’s largest BSD conference is open for registration!

Tutorials: June 17-18, 2026
Conference: June 19-20, 2026

Full list of talks here:
blog.bsdcan.org/blog/

Register before May 1 and the closing reception is free!

bsdcan.org/2026/registration.h

Good morning! Today, the last part of the #OpenBSD/sgi story is available.

In this episode, hardware conditions documented as "Can't happen" happen, and support for one particular CPU model "everyone agrees will never get supported by free software" gets nevertheless written.

Read it at:
miod.online.fr/software/openbs

You can also now read the whole story in one page:
miod.online.fr/software/openbs

I'll return to the usual "new material on wednesdays" schedule next week.

It turns out a laptop based around a iphone chip is underwhelming, who'da thunk it.

The A18 Pro being similar to the M2, at least in theory, makes me somewhat optimistic that the Asahi team will work out the missing chicken bits and device tree support to m1n1.

The OpenBSD project, being based in Canada for the past 30 years, is not subject to California law.

Now stop fucking asking. :flan_cleaver:

Note: Not speaking authoritatively on behalf of the project, yadda yadda.

Heads up: The recent pledge(2) "tmppath" removal has been backported to 7.7/7.8, and includes updated base system utilities as well as new -stable packages for software using pledge(2), such as web browsers.

openbsd.org/errata78.html#p015

openbsd.org/errata78.html#p016

openbsd.org/errata78.html#p017

openbsd.org/errata78.html#p018

Don't forget to run pkg_add -u before applying the kernel syspatch/errata to avoid errors with old binaries on the new kernel.

Show thread

Goodbye pledge "tmppath", hello unveil("/tmp", "rwc")! :flan_cheer:

Some observant users may have noticed developers removing the pledge(2) "tmppath" promise from all base utilities that were using it along with a handful of ports, because this promise, well.. it kinda sucks, and it predates a much better solution: unveil(2).

More info & some backstory in Theo de Raadt's commit.

deraadt@ modified src/{sys,lib}/*: pledge "tmppath" goes away because it sucks. The history is kind of
sad: unveil(2) was invented by Bob Beck and myself because a couple of us struggled and couldn't expand the "tmppath" mechanism to general use.
unveil(2) ended up being kind of "upside down" different, and so we never deleted "tmppath" because the refactorings seemed complicated.
However over the last two weeks, we're removed all the "tmppath" in base pretty easily, and the 18 ports using it have also been fixed.
The majority of situations now use unveil "/tmp" "rwc", unveil "/" "r" or similar, and then pledge "rpath wpath cpath", and this is generally needed to satisfy the mkstemp(3) family of functions in libc.
Use of "tmppath" will now cause pledge(2) to return EINVAL. There is no backwards compatible way of mimic the behaviour correctly using kernel-internal unveil hackery.
Prompted by a report from David Leadbeater; and extensive conversations with beck and semarie.

If any of my past work on , or my highlight posts here (or elsewhere) has been helpful, a small recurring monthly donation would be extremely appreciated. :flan_heart:

brynet.ca/wallofpizza.html

bsd.network/@brynet/1144589971

What's the most popular wiki software for BSDs? What do y'all use? #freebsd #openbsd #netbsd

(Edit to add: for a small team of mostly non-technical editors.)

Goodbye pledge "tmppath", hello unveil("/tmp", "rwc")! :flan_cheer:

Some observant users may have noticed developers removing the pledge(2) "tmppath" promise from all base utilities that were using it along with a handful of ports, because this promise, well.. it kinda sucks, and it predates a much better solution: unveil(2).

More info & some backstory in Theo de Raadt's commit.

deraadt@ modified src/{sys,lib}/*: pledge "tmppath" goes away because it sucks. The history is kind of
sad: unveil(2) was invented by Bob Beck and myself because a couple of us struggled and couldn't expand the "tmppath" mechanism to general use.
unveil(2) ended up being kind of "upside down" different, and so we never deleted "tmppath" because the refactorings seemed complicated.
However over the last two weeks, we're removed all the "tmppath" in base pretty easily, and the 18 ports using it have also been fixed.
The majority of situations now use unveil "/tmp" "rwc", unveil "/" "r" or similar, and then pledge "rpath wpath cpath", and this is generally needed to satisfy the mkstemp(3) family of functions in libc.
Use of "tmppath" will now cause pledge(2) to return EINVAL. There is no backwards compatible way of mimic the behaviour correctly using kernel-internal unveil hackery.
Prompted by a report from David Leadbeater; and extensive conversations with beck and semarie.

Heads up for 7.8 users, backports for chromium, iridium, ungoogled-chromium ports have been committed, updated -stable packages should be showing up in the next few days!

chromium has historically only received updates in -current, but it appears sthen@ has managed to backport them!

marc.info/?l=openbsd-ports-cvs

Dave Voutila (dv@) continues his work on multi-process device emulation for vmd(8), this time moving virtio scsi (CDROM) device emulation to a separate process, further reducing the amount of code running in-process for VMs.

dv@ modified src/usr.sbin/vmd/*: vmd(8): convert virtio scsi device to a subprocess.

Break the virtio scsi device (used as a cd-rom drive) into a subprocess like the virtio block and network devices. This leaves only the entropy device (viornd) and vmmci device running in-process with the vcpus.

ok mlarkin@

This follows up on work presented by Dave at EuroBSDCon 2024.

youtube.com/watch?v=qKrxVzS96B

openbsd.org/papers/eurobsdcon2

re: I'd like to replace my aging/noisy AMD Zen1+ desktop :flan_hacker:​ 

Here's my build from 2018, which I'm still using today. :flan_thumbs:

brynet.ca/article-ryzenbuild.h

Show thread

I'd like to replace my aging/noisy AMD Zen1+ desktop :flan_hacker:​ 

Not great timing, I know, but I'm thinking a Intel mini PC (e.g: N150, 11th Gen i5/i7) would work for my testing & hacking, Any help towards this would be greatly appreciated. :flan_heart:

paypal.com/donate/?hosted_butt

amazon.ca/hz/wishlist/ls/2E7N6

Show older
BSD Network

bsd.network is a *BSD-adjacent Mastodon Instance. We have a code of conduct.