archive-org.com » ORG » N » NETBSD.ORG

Total: 1243

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Per-user memory limits for tmpfs
    database Security Community Blogs Mailing lists List archives Developers Browse source Cross reference Release engineering Projects list Ports History Emulators Packages Browse packages Release engineering Wiki Home Edit Comment Source History New RecentChanges NetBSD Wiki projects project Per user memory limits for tmpfs Contact tech kern Duration estimate 2 months Add per user memory usage limits also known as quotas to tmpfs using the existing quota system infrastructure Add a

    Original URL path: http://wiki.netbsd.org/projects/project/tmpfs-quotas/ (2016-02-01)
    Open archived version from archive


  • Add snapshots to tmpfs
    kern Add memory efficient snapshots to tmpfs A snapshot is a view of the filesystem frozen at a particular point in time The snapshotted filesystem is not frozen only the view is That is you can continue to read write create delete files in the snapshotted filesystem The interface to snapshots may resemble the interface to null mounts e g mount t snapshot var db db snapshot makes a snapshot

    Original URL path: http://wiki.netbsd.org/projects/project/tmpfs-snapshot/ (2016-02-01)
    Open archived version from archive

  • Transparent full-disk encryption
    be encrypted this leads to some nontrivial bootstrapping problems Develop a scheme for mounting root on cgd that does not require explicit manual setup that passes cryptographic muster and that protects everything on the root volume except for what absolutely must be exposed Implement it The following is a non exhaustive list of issues to consider How should we tell when root should be on cgd perhaps in boot cfg When and how do we enter the passphrase needed to mount root at mount root time in the bootloader after mounting a fake root Key management for the encryption passphrase Where to keep the bootloader and or kernels Should the bootloader be able to read the cgd to get the boot kernel from it If the kernel is not on cgd should it be signed to allow the bootloader to verify it Integration with sysinst so all you need to do to get FDE is to hit a checkbox Perhaps making it easy or at least reasonably possible to migrate an unencrypted root volume to cgd Note that while init 8 currently has a scheme for mounting a temporary root and then chrooting to the real root afterwards it doesn

    Original URL path: http://wiki.netbsd.org/projects/project/transparent-cgd/ (2016-02-01)
    Open archived version from archive

  • BSD licensed troff/nroff replacement
    stamping Also many of the miscellaneous documents use various roff preprocessors and it isn t clear how much of this mandoc can handle None of these options is particularly appealing There are also some less decent ways forward Pick one of the existing roff macro packages for miscellaneous articles ms me and teach mandoc to handle it Unfortunately all of these macro packages are pretty ratty they re underpowered compared to mdoc and none of them support semantic markup Track down one of the other older roff implementations that are now probably more or less free e g ditroff then stick to the existing roff macro packages as above In addition to the drawbacks cited above any of these programs are likely to be old nasty code that needs a lot of work Teach the groff we have how to emit PDFs then stick to the existing roff macro packages as above In addition to the drawbacks cited above this will likely be pretty nasty work and it s still got the wrong license Rewrite groff as BSD licensed code and provide support for generating PDFs then stick to the existing roff macro packages as above In addition to the drawbacks cited above this is a horrific amount of work Try to make something else do what we want Unfortunately TeX is a nonstarter and the only other halfway realistic candidate is lout which is GPLv3 and at least at casual inspection looks like a horrible mess of its own These options are even less appealing Maybe someone can think of a better idea There are lots of choices if we give up on typeset output but that doesn t seem like a good plan either RSS Atom Halibut Halibut might be worth including in the mix of options to consider The source tarball is 919K it s written in portable ANSI C apart from requiring at least a 32 bit platform it has no dependencies and the license is MIT It can directly generate plain ASCII text HTML PDF PostScript Unix man pages i e nroff input to work with the mandoc macro package and Unix info Comment by J Lewis Wednesday evening February 4th 2015 Remove comment A book writer needs a Fountain pen Not a printing press Thoughts from a passers by Let the output formats we need most dictate the requirements of the tool Let us end up with building a printing press Let us forget a writer writes with a Fountain pen to concentrate on content To getaway with distractions Instead let us provide him a letter case To let him think about each single letter independently Instead of thinking of the content If he has kept up till now let us further distract him Let him set the printing press to output almost any book format available Of course none supports that letter combination he minutely composed earlier Let him think about which format to choose or which letters to loose A writer needs

    Original URL path: http://wiki.netbsd.org/projects/project/troff/ (2016-02-01)
    Open archived version from archive

  • Make u-boot compilable on NetBSD
    of devices including lots which run NetBSD The NetBSD TOOLDIR infrastructure even includes the mkubootimage program which is used to wrap binaries e g a kernel into a packet understood by U Boot While the TOOLDIR provides all toolchain bits needed cross compiler assembler linker and can be created by the build sh script automatically for any supported architecture U Boot itself needs to be compiled natively on a Linux machine The purpose of this project is to fix this and feed as much as possible of the resulting changes upstream to the U Boot developers If possible the result should be a pkgsrc package that only needs to be pointed at a pre populated tooldir for building But a simple bsd style makefile would be good enough as well An optional extension but unlikely to be doable within the GSoC timescale add support for loading from FFS file system to U Boot This would allow devices with SATA or USB disks to load the kernel directly from the root file system while currently a wrappd ub copy of the kernel has to be put into flash or on SD card Deliverables of this project Make U Boot build on

    Original URL path: http://wiki.netbsd.org/projects/project/u-boot-pkgsrc/ (2016-02-01)
    Open archived version from archive

  • User interface plugins for games
    a simple graphic interface The card games e g canfield cribbage are particularly pointed examples but quite a few others e g atc gomoku hunt and sail if anyone ever fixes its backend would benefit as well There are two parts to this project the first and basically mostly easy part is to pick a game and write an alternate user interface for it using SDL or gtk2 or tk or whatever seems appropriate The hard part is to arrange the system level infrastructure so that the new user interface appears as a plugin for the game that can be installed from pkgsrc but that gets found and run if appropriate when the game is invoked from usr games The infrastructure should be sufficiently general that lots of programs in base can have plugins Some things this entails possibly setting up a support library in the base system for program plugins if it appears warranted setting up infrastructure in the build system for programs with plugins if needed preferably also setting up infrastructure in the build system for building plugins choosing a place to put the header files needed to build external plugins choosing a place to put plugin libraries too as there isn t a common model out there yet establishing a canonical way for programs in base to find things in pkgsrc which is not technically difficult but will require a lot of wrangling to reach a community consensus setting up any pkgsrc infrastructure needed to build plugin packages for base this should take little or no work It is possible that plugins warrant a toplevel directory under each prefix rather than being stuffed in lib directories e g usr plugins usr pkg plugins usr local plugins so the pkgsrc installed plugins for e g rogue would go

    Original URL path: http://wiki.netbsd.org/projects/project/ui-plugins-for-games/ (2016-02-01)
    Open archived version from archive

  • User switching with a secure attention key
    slick as OS X provides and we probably don t care about Apple s compositing effects when switching but it s useful to be able to switch users as a way of managing least privilege and it would be nice to make it easy to do The nature of X servers makes this difficult for example it isn t in any way safe to use the same X server for more than one user It also isn t safe to connect a secure process to a user s X server to display things It seems that the way this would have to work is akin to job control you have a switching supervisor process which is akin to a shell that runs as root in order to do authentication and switches or starts X servers for one or more users The X servers would all be attached I guess to the same graphics backend device wsfb maybe wsdrmfb and be switched in and out of the foreground in much the way console processes get switched in and out of the foreground on a tty You have to be able to get back to the switching supervisor from whatever user and X server you re currently running in This is akin to Z to get back to your shell in job control However unlike in job control there are security concerns the key combination has to be something that a malicious application or even a malicious X server can t intercept This is the secure attention key Currently even the ctrl alt Fn sequences are handled by the X server supporting this will take quite a bit of hacking Note that the secure attention key will also be wanted for other desktop things any scheme that provides desktop level access to

    Original URL path: http://wiki.netbsd.org/projects/project/user-switching/ (2016-02-01)
    Open archived version from archive

  • Verification tool for NetBSD32
    RecentChanges NetBSD Wiki projects project Verification tool for NetBSD32 Contact tech toolchain Mentors Jörg Sonnenberger Duration estimate 3 months NetBSD supports a number of platforms where both 32bit and 64bit execution is possible The more well known example is the i386 AMD64 pair and the other important one is SPARC SPARC64 On this platforms it is highly desirable to allow running all 32bit applications with a 64bit kernel This is the purpose of the netbsd32 compatibility layer At the moment the netbsd32 layer consists of a number of system call stubs and structure definitions written and maintained by hand It is hard to ensure that the stubs and definitions are up to date and correct One complication is the difference in alignment rules On i386 uint64 t has a 32bit alignment but on AMD64 it uses natural 64bit alignment This and the resulting padding introduced by the compiler can create hard to find bugs goals milestones replace the manual labour with an automatic tool This tool should allow both verification generation of structure definitions for use in netbsd32 code allow generation of system call stubs and conversion functions Generated stubs should also ensure that no kernel stack data is leaked

    Original URL path: http://wiki.netbsd.org/projects/project/verify_netbsd32/ (2016-02-01)
    Open archived version from archive