Fresh from the just concluded
j2k25 hackathon
in Nara, Japan, Rafael Sadowski (rsadowski@) has published his report on his blog:
Week 2: The j2k25 Japan Hackathon
We arrived in Nara during the late afternoon. After checking into our hotel, goda@,
my wife and I headed straight to the hack room. My initial thought was to finally
do some ports hacking to warm up and create a plan for the upcoming week. I
hadn't had much opportunity for focused thinking during our busy week in Tokyo.
As soon as I booted OpenBSD, kn@ appeared. I was genuinely happy to see him
again, and we spent the first half hour catching up. Then he mentioned we were
about to head to the team event. This completely derailed my planned "first
day" approach - instead of keyboard and OpenBSD work, the evening was filled
with excellent food, beer, and funny conversations.
Contributed by
Peter N. M. Hansteen
on
from the best laid plans of pufferfish and ... dept.
Reining in file system access is hard to get right, even for
OpenBSD developers.
In a message to tech@ titled
openat(2) is mostly useless, sadly
Theo de Raadt (deraadt@) describes how the
openat(2)
family of system calls has failed to live up to expectations in practice,
and he proposes changes that may improve the situation.
Theo writes,
List: openbsd-tech
Subject: openat(2) is mostly useless, sadly
From: "Theo de Raadt" <deraadt () openbsd ! org>
Date: 2025-05-28 14:03:29
The family of system calls related to openat(2) are mostly useless in
practice, rarely used. When they are used it is often ineffectively or
even with performance-reducing results.
int
openat(int fd, const char *path, int flags, ...);
These are the others:
List: openbsd-cvs
Subject: CVS: cvs.openbsd.org: src
From: Theo de Raadt <deraadt () cvs ! openbsd ! org>
Date: 2025-05-24 6:49:17
CVSROOT: /cvs
Module name: src
Changes by: deraadt@cvs.openbsd.org 2025/05/24 00:49:17
Modified files:
include : unistd.h
sys/sys : exec.h exec_elf.h gmon.h proc.h systm.h
sys/kern : exec_elf.c init_sysent.c kern_exec.c
kern_exit.c kern_fork.c kern_pledge.c
subr_prof.c syscalls.master
Log message:
In the old gprof profiling subsystem, the simplistic profil() syscall
told the kernel about the sample buffer, and then the normal exit-time
_mcleanup() would finalize the buffer, open()'ed a file and write out
the details. This file opening has become increasingly impossible
because of our privsep / privdrop, chroot, setresuid uid-dropping,
pledge, unveil, and other efforts. So people stopped using gprof.
Programs which needed profiling needed substantial mitigation removal
changes to put them under test.
Contributed by
Peter N. M. Hansteen
on
from the testing needed, em(4)phatically dept.
Are you an OpenBSD user with a low power device such as a
PC EnginesAPU2,
with one or more
em(4)
network interfaces?
Darren Tucker (dtucker@) has a new diff out that may be of use to you,
posted in a
message
to tech@:
List: openbsd-tech
Subject: em(4) TX interrupt mitigation
From: Darren Tucker <dtucker () dtucker ! net>
Date: 2025-05-19 8:52:13
Hi.
TL;DR: if you use em(4), particularly on a low-power device such as a
pcengines APU2, please try this diff.
The em(4) driver has 5 interrupt mitigation timers[0].
Kirill A. Korinsky (kirill@)
writes in with his
guide
to setting up an
EdgeRouter 4
with
OpenBSD/octeon
to provide a failover gateway/router setup:
This article details the configuration process for setting up OpenBSD on an EdgeRouter 4 device to function as a home router, incorporating features such as private DNS resolution for clients and failover WAN connectivity.
Contributed by
rueda
on
from the pcaps happening dept.
erspan(4),
the ERSPAN collection driver created by
David Gwynne (dlg@)
[and about which we recently
reported]
has been
committed
to the tree:
CVSROOT: /cvs
Module name: src
Changes by: dlg@cvs.openbsd.org 2025/05/13 19:54:12
Modified files:
sys/net : if_gre.c
Log message:
add support for the ERSPAN Type II protocol
ERSPAN is a specific GRE 0 protocol id with GRE sequence numbers
enabled, with it's own shim header, and then an Ethernet payload.
We are constantly on the lookout for stories of how you put OpenBSD to work.
Please submit any informative articles on how OpenBSD is helping your company.