101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

483
active users

#runbsd

6 posts6 participants0 posts today

Hello to our friends in Singapore 🇸🇬!

We’re happy to announce that we just opened up a new POP in Sin1, SG to come even closer to you! What does it mean?! IP-Space in Singapore including GEO objects & lower latencies in your area 🥳

Thanks to Route64 and @gyptazy !

I have no option but to once again going to praise the #NetBSD on an amazing operating system.

Since I installed it on the Pi 4, the experience has been so smooth that I don't even realize I'm using a supposedly "cheap and underpowered computer" as it was the case with previous OSes. Nope, not anymore.

Instead, there are packages for everything, my architecture is treated as first-class, the performance is always high, and the more I learn about how to use it, the better my experience becomes. No other Linux or BSD met all of these points.

And to top it off? Booting up takes no more than 15-20 seconds. It's less than in my mom's Macbook Pro running Linux Mint!

Again, I can't praise the NetBSD team enough for such achievements. Thank you so much for your hard work that clearly shows that you dogfood your development!

Some time ago I tried to build my own blog using amazing #BSSG It was surprisingly easy.
I did it mostly for educational purposes. I never blogged in English or wrote any lengthy texts. And I never used BSSG, so I wanted to test that out too.
But I had some thoughts about our current state of affairs, so I wrote my musings called "Digital Doomsday is coming and we should prepare for it".
It's just some thoughts about the world where there is no more Internet (or worse).
Let me know what do you think about it.
iyer.ru/2025/08/09/digital-doo

P.S. My blog is still under construction, I'm still figuring out some things.

iyer.ruDigital Doomsday is coming and we should prepare for it | iyer.ruWhat would we do if the Internet disappeared?

Did you notice? The registration was temporary open today and we welcome all new users! 🥳

While we still have a plenty of free resources, we might switch from an open registration model to a recommendation / mentor model where already present users can invite new users.

This is not yet fix but a possibility to avoid misusage and abuse where our primary goal is still to provide resources for people interested into BSD based systems. Maybe also closer integrations with BSD communities like the BSD Cafe (@stefano) could be an approach.

#freevps #free #education #ipv6 #hosting #bhyve #proxmox #freebsd #netbsd #openbsd #runbsd #boxybsd @gyptazy

Thanks to SeaweedFS, I've set up two replicas of the BSD Cafe's media. One is on a backup server (for disaster recovery purposes only, also containing the hourly zfs-autobackup backups), and the other is on a Raspberry Pi 4 running FreeBSD, which is one of my home backup servers - just one meter away from my desk.
I've also configured Nginx in a jail, so when I'm at home, the BSD Cafe's media is served directly from the local replica.
The performance is lightning fast.

A new BSDCan video has posted:

Improvements to FreeBSD KASAN By Zhuo Ying Jiang Li

youtu.be/pwwSdQi0NUI

KASAN is a kernel sanitizer commonly combined with fuzzing techniques to detect memory corruption bugs, some of which could lead to security compromise. Currently, FreeBSD's KASAN can only detect a subset of temporal safety vulnerabilities due to the lack of a delayed freeing mechanism of freed items. Furthermore, the effectiveness of detecting spatial safety vulnerabilities is also limited because FreeBSD's KASAN does not add redzone padding around UMA allocations.

In this talk, I will present my current work on improving the effectiveness of KASAN by extending it with a quarantining mechanism and injecting redzones around UMA allocations. The development was done on CheriBSD, a fork of FreeBSD with CHERI support, to explore the synergy between CHERI and KASAN. I plan to upstream the relevant improvements to FreeBSD.

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

A new BSDCan video has been posted:

Sleep on FreeBSD: A bedtime story about S0ix By Aymeric Wibo

youtu.be/RCjPc4X2Edc

One of the main things still missing in FreeBSD for it to be usable on modern laptops is the ability to go to sleep. In the past, this was done using ACPI S3, but newer laptops have removed this in favour of S0ix, leaving FreeBSD without support for suspend on those machines.

This talk aims to get the casual user familiar enough with the terms and concepts behind power management, such that they can understand what's going on, what's already possible, what can be done, and be able to narrow down power management issues they might encounter.
Full description

This talk will cover:

The background and history of power management on FreeBSD, from APM, to ACPI S3, and finally to s2idle/S0ix, and how to know whether or not a given laptop supports S3 or S0ix or both.

What the full suspend process looks like with modern standby, going into details like ACPI D-states & power resources, SPMC DSMs (acpi_spmc), the AMD SMU (system management unit, amdsmu), etc. and some of the challenges encountered.

Specifics about sleep on AMD, such as USB4 power management in the HCM (host connection manager) and GPIO controller interrupt servicing.

Cover debugging with residency counters, with the SMU on AMD, _LPI objects, and LPIT on Intel.

Niceties and potential future work, such as idleness determination, a powertop equivalent, a built in amd_s2idle.py equivalent (for debugging sleep issues), etc.

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

A new BSDCan Video has been posted:

porch(1): it's not what you expect(1) By Kyle Evans

youtu.be/Drbk4rEH1sk

In a world ruled by expect(1) and TCL, we discuss an alternative that was developed based on scripting with lua instead. porch(1) was developed with a language already available and used in FreeBSD base in mind, with the aim of TTY testing via pts(4).

The overall aim of this project is to provide a simple subset of expect(1) functionality specifically aimed at developer and sysadmin automation in another popular language with many niceties for scripted interaction.

In this talk, we'll specifically discuss:

The motivation for writing porch

The underlying design/philosophy (with diagrams to describe the model)

Bundled-in functionality beyond script execution

Practical samples used in FreeBSD today

--

The author has been a FreeBSD src committer since 2017, working on many parts of the tree and gradually introducing lua into the base system. His most recent exploits include improving base system boot environment management with bectl(8) and excursions into the tty layer.

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Get ready for the European *BSD event of 2025! 😈⛳🐡

54 days to go!

BSDCan Videos are being published. It can give you a taste of the great content you can witness live in Zagreb.

Grab your tickets 🎟️ at tickets.eurobsdcon.org

The schedule 📅 is at events.eurobsdcon.org/2025/sch

For everything else, peek at 2025.eurobsdcon.org/
More information is added all the time.

EuroBSDCon 2025 in Zagreb, Croatia 🇭🇷
September 25-28, 2025

A new BSDCan video has been posted:

A packet's journey through pf By Kristof Provost

youtu.be/JtSg6ylDALo

A walkthrough of a packet's journey through (FreeBSD's) pf, concentrating on the big picture and its implications.

We'll cover when packets are inspected, when rules are evaluated and how states are used. Along the way we'll cover what DTrace probes can show us, what some of pfctl's counters mean and just how many times pf can look at a single packet.

This talk is intended for firewall admins looking for a deeper understanding and aspiring pf developers. It is not a "How to use pf" talk.

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Another record broken! Highest monthly donation to date, it tipped the scale even earlier for silver sponsorship again.

21 new VMs were added and 79 VMs were renewed.

We donated €1395 to the #OpenBSD Foundation, €55070 since we started.

Thank you, our users, and OpenBSD developers for an awesome OS!

Stay safe, healthy & sane!

#RUNBSD in 2025

New BSDCan Video Posted:

Hardware-accelerated program tracing on FreeBSD By Bojan Novković

youtu.be/NrBGw8N4qL4

Hardware tracing facilities are designed to capture various metrics and information about software execution with a minimal performance overhead, making them a valuable tool for performance analyses and debugging. FreeBSD recently gained a new in-kernel framework for hardware-accelerated tracing technologies (hwt(8) [1]) with support for ARM64 and Intel CPUs.

This talk will cover the work that went into adding support for Intel's Processor Trace technology in hwt(8). We'll start by covering several key concepts related to hardware-accelerated tracing and use them to explore the architecture of FreeBSD's hwt(8) framework. We'll then move on to a case study of Intel Processor Trace technology, giving a brief overview of its features before diving into key implementation details. The talk will also include a short demo of hwt(8)'s features on the Intel platform.

#runbsd #freebsd @bsdcan

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.