ºÝºÝߣshows by User: eurobsdcon / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: eurobsdcon / Sun, 11 Jan 2015 09:42:49 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: eurobsdcon EuroBSDCon 2014 Program Front /eurobsdcon/eurobsdcon-2014-program-front program-frontcopy-150111094249-conversion-gate02
EuroBSDCon 2014 Program Front]]>

EuroBSDCon 2014 Program Front]]>
Sun, 11 Jan 2015 09:42:49 GMT /eurobsdcon/eurobsdcon-2014-program-front eurobsdcon@slideshare.net(eurobsdcon) EuroBSDCon 2014 Program Front eurobsdcon EuroBSDCon 2014 Program Front <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/program-frontcopy-150111094249-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> EuroBSDCon 2014 Program Front
EuroBSDCon 2014 Program Front from eurobsdcon
]]>
688 2 https://cdn.slidesharecdn.com/ss_thumbnails/program-frontcopy-150111094249-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
EuroBSDCon 2014 tutorials program Thursday & Friday /slideshow/program-back-copy/43401078 program-backcopy-150111094143-conversion-gate02
EuroBSDCon 2014 tutorials program Thursday & Fridayeu]]>

EuroBSDCon 2014 tutorials program Thursday & Fridayeu]]>
Sun, 11 Jan 2015 09:41:43 GMT /slideshow/program-back-copy/43401078 eurobsdcon@slideshare.net(eurobsdcon) EuroBSDCon 2014 tutorials program Thursday & Friday eurobsdcon EuroBSDCon 2014 tutorials program Thursday & Fridayeu <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/program-backcopy-150111094143-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> EuroBSDCon 2014 tutorials program Thursday &amp; Fridayeu
EuroBSDCon 2014 tutorials program Thursday & Friday from eurobsdcon
]]>
428 4 https://cdn.slidesharecdn.com/ss_thumbnails/program-backcopy-150111094143-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
EuroBSDCon 2014 Sofia Welcome /slideshow/eurobsdcon-2014-sofia-welcome/43399772 eurobsdcon-welcome-150111082018-conversion-gate01
EuroBSDCon 2014 Sofia Welcome]]>

EuroBSDCon 2014 Sofia Welcome]]>
Sun, 11 Jan 2015 08:20:18 GMT /slideshow/eurobsdcon-2014-sofia-welcome/43399772 eurobsdcon@slideshare.net(eurobsdcon) EuroBSDCon 2014 Sofia Welcome eurobsdcon EuroBSDCon 2014 Sofia Welcome <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon-welcome-150111082018-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> EuroBSDCon 2014 Sofia Welcome
EuroBSDCon 2014 Sofia Welcome from eurobsdcon
]]>
491 4 https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon-welcome-150111082018-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
EuroBSDCon 2014 Sofia Closing talk /slideshow/eurobsdcon-2014-sofia-closing-talk/43399745 eurobsdcon-closing-talk-150111081845-conversion-gate01
EuroBSDCon 2014 Sofia Closing talk]]>

EuroBSDCon 2014 Sofia Closing talk]]>
Sun, 11 Jan 2015 08:18:45 GMT /slideshow/eurobsdcon-2014-sofia-closing-talk/43399745 eurobsdcon@slideshare.net(eurobsdcon) EuroBSDCon 2014 Sofia Closing talk eurobsdcon EuroBSDCon 2014 Sofia Closing talk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon-closing-talk-150111081845-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> EuroBSDCon 2014 Sofia Closing talk
EuroBSDCon 2014 Sofia Closing talk from eurobsdcon
]]>
1146 2 https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon-closing-talk-150111081845-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Submitting documents anonymously by Atanas Chobanov /slideshow/chobanov-euro-bsdcon2014/43399576 chobanov-eurobsdcon-2014-150111080828-conversion-gate02
Journalism and big data - how open source software helps investigation work]]>

Journalism and big data - how open source software helps investigation work]]>
Sun, 11 Jan 2015 08:08:28 GMT /slideshow/chobanov-euro-bsdcon2014/43399576 eurobsdcon@slideshare.net(eurobsdcon) Submitting documents anonymously by Atanas Chobanov eurobsdcon Journalism and big data - how open source software helps investigation work <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/chobanov-eurobsdcon-2014-150111080828-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Journalism and big data - how open source software helps investigation work
Submitting documents anonymously by Atanas Chobanov from eurobsdcon
]]>
862 1 https://cdn.slidesharecdn.com/ss_thumbnails/chobanov-eurobsdcon-2014-150111080828-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Porting the drm/kms graphic drivers to DragonFlyBSD by Francois Tigeot /slideshow/euro-bsd-con2014portingdrmkmsdriverstodragonflybsd/43399531 eurobsdcon2014-portingdrmkmsdriverstodragonflybsd-150111080522-conversion-gate01
Abstract Francois Tigeot has been trying to make DragonFly more useful by improving its performance, making it able to use some common technologies such as PAM/NSS and porting various pieces of software. One of these pieces of software was the new kms infrastructure and its associated drm/i915 driver. The talk about how it has been ported from FreeBSD, the difficulties with making it first run on DragonFly and its evolution from there. Speaker bio François Tigeot is an Independent consultant, sysadmin, XFree86/Xorg user since 1996, BSD user since 1999 and DragonFly developer since 2011]]>

Abstract Francois Tigeot has been trying to make DragonFly more useful by improving its performance, making it able to use some common technologies such as PAM/NSS and porting various pieces of software. One of these pieces of software was the new kms infrastructure and its associated drm/i915 driver. The talk about how it has been ported from FreeBSD, the difficulties with making it first run on DragonFly and its evolution from there. Speaker bio François Tigeot is an Independent consultant, sysadmin, XFree86/Xorg user since 1996, BSD user since 1999 and DragonFly developer since 2011]]>
Sun, 11 Jan 2015 08:05:22 GMT /slideshow/euro-bsd-con2014portingdrmkmsdriverstodragonflybsd/43399531 eurobsdcon@slideshare.net(eurobsdcon) Porting the drm/kms graphic drivers to DragonFlyBSD by Francois Tigeot eurobsdcon Abstract Francois Tigeot has been trying to make DragonFly more useful by improving its performance, making it able to use some common technologies such as PAM/NSS and porting various pieces of software. One of these pieces of software was the new kms infrastructure and its associated drm/i915 driver. The talk about how it has been ported from FreeBSD, the difficulties with making it first run on DragonFly and its evolution from there. Speaker bio François Tigeot is an Independent consultant, sysadmin, XFree86/Xorg user since 1996, BSD user since 1999 and DragonFly developer since 2011 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon2014-portingdrmkmsdriverstodragonflybsd-150111080522-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract Francois Tigeot has been trying to make DragonFly more useful by improving its performance, making it able to use some common technologies such as PAM/NSS and porting various pieces of software. One of these pieces of software was the new kms infrastructure and its associated drm/i915 driver. The talk about how it has been ported from FreeBSD, the difficulties with making it first run on DragonFly and its evolution from there. Speaker bio François Tigeot is an Independent consultant, sysadmin, XFree86/Xorg user since 1996, BSD user since 1999 and DragonFly developer since 2011
Porting the drm/kms graphic drivers to DragonFlyBSD by Francois Tigeot from eurobsdcon
]]>
1404 2 https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon2014-portingdrmkmsdriverstodragonflybsd-150111080522-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
University of Oslo's TSD service - storing sensitive & restricted data by Dag-Erling Smørgrav /slideshow/des-securing-sensitiveandrestricteddata/43399507 des-securingsensitiveandrestricteddata-150111080358-conversion-gate02
Abstract Researchers in many scientific fields routinely work with sensitive or restricted data such as patient records, human genetic sequences, or interviews with dissidents in oppressive regimes. Keeping this data secure while retaining the ability to process and analyse it is a non-trivial problem. The University of Oslo's TSD service is a "walled garden" environment for storing and processing this type of data. We present the architecture of TSD and describe how FreeBSD is used to control the interface between TSD and the world. Speaker bio Dag-Erling Smørgrav is a senior engineer at the University of Oslo, one of the developers of the TSD service and a member of the University's CERT and information security team. He has been a FreeBSD committer since 1998 and is currently serving as FreeBSD's Security Officer. He is also the author of OpenPAM.]]>

Abstract Researchers in many scientific fields routinely work with sensitive or restricted data such as patient records, human genetic sequences, or interviews with dissidents in oppressive regimes. Keeping this data secure while retaining the ability to process and analyse it is a non-trivial problem. The University of Oslo's TSD service is a "walled garden" environment for storing and processing this type of data. We present the architecture of TSD and describe how FreeBSD is used to control the interface between TSD and the world. Speaker bio Dag-Erling Smørgrav is a senior engineer at the University of Oslo, one of the developers of the TSD service and a member of the University's CERT and information security team. He has been a FreeBSD committer since 1998 and is currently serving as FreeBSD's Security Officer. He is also the author of OpenPAM.]]>
Sun, 11 Jan 2015 08:03:58 GMT /slideshow/des-securing-sensitiveandrestricteddata/43399507 eurobsdcon@slideshare.net(eurobsdcon) University of Oslo's TSD service - storing sensitive & restricted data by Dag-Erling Smørgrav eurobsdcon Abstract Researchers in many scientific fields routinely work with sensitive or restricted data such as patient records, human genetic sequences, or interviews with dissidents in oppressive regimes. Keeping this data secure while retaining the ability to process and analyse it is a non-trivial problem. The University of Oslo's TSD service is a "walled garden" environment for storing and processing this type of data. We present the architecture of TSD and describe how FreeBSD is used to control the interface between TSD and the world. Speaker bio Dag-Erling Smørgrav is a senior engineer at the University of Oslo, one of the developers of the TSD service and a member of the University's CERT and information security team. He has been a FreeBSD committer since 1998 and is currently serving as FreeBSD's Security Officer. He is also the author of OpenPAM. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/des-securingsensitiveandrestricteddata-150111080358-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract Researchers in many scientific fields routinely work with sensitive or restricted data such as patient records, human genetic sequences, or interviews with dissidents in oppressive regimes. Keeping this data secure while retaining the ability to process and analyse it is a non-trivial problem. The University of Oslo&#39;s TSD service is a &quot;walled garden&quot; environment for storing and processing this type of data. We present the architecture of TSD and describe how FreeBSD is used to control the interface between TSD and the world. Speaker bio Dag-Erling Smørgrav is a senior engineer at the University of Oslo, one of the developers of the TSD service and a member of the University&#39;s CERT and information security team. He has been a FreeBSD committer since 1998 and is currently serving as FreeBSD&#39;s Security Officer. He is also the author of OpenPAM.
University of Oslo's TSD service - storing sensitive & restricted data by Dag-Erling Smæ·¡rgrav from eurobsdcon
]]>
706 4 https://cdn.slidesharecdn.com/ss_thumbnails/des-securingsensitiveandrestricteddata-150111080358-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
secure lazy binding, and the 64bit time_t development process by Philip Guenther /slideshow/tets-43399463/43399463 tets-150111080108-conversion-gate01
Abstract A common security measure is now to reduce or eliminate the presence of process memory that is both writable and executable. However, the dynamic linker needs to make changes to executable pages when binding lazy references. In multi-threaded programs this creates a window of vulnerability. Depending on the system architecture, it may also result in extra cache or TLB flushes to maintain coherency on multi-processor systems. I'll describe the implementation and use of kbind(), a machine-independent system call for secure and efficient binding of lazy references. Speaker bio Philip was initiated in UNIX system administration in 1992 as a student at Saint Olaf College, where he got involved in Open Source software including procmail and amd. In December 2000 he joined Sendmail Inc and worked on threaded IMAP/POP3/LMTP servers. He started using OpenBSD actively several years later but didn't join the project until July 2008 after the status of the threads implementation started to annoy him. Philip is currently a Director of Engineering at Proofpoint, Inc.]]>

Abstract A common security measure is now to reduce or eliminate the presence of process memory that is both writable and executable. However, the dynamic linker needs to make changes to executable pages when binding lazy references. In multi-threaded programs this creates a window of vulnerability. Depending on the system architecture, it may also result in extra cache or TLB flushes to maintain coherency on multi-processor systems. I'll describe the implementation and use of kbind(), a machine-independent system call for secure and efficient binding of lazy references. Speaker bio Philip was initiated in UNIX system administration in 1992 as a student at Saint Olaf College, where he got involved in Open Source software including procmail and amd. In December 2000 he joined Sendmail Inc and worked on threaded IMAP/POP3/LMTP servers. He started using OpenBSD actively several years later but didn't join the project until July 2008 after the status of the threads implementation started to annoy him. Philip is currently a Director of Engineering at Proofpoint, Inc.]]>
Sun, 11 Jan 2015 08:01:08 GMT /slideshow/tets-43399463/43399463 eurobsdcon@slideshare.net(eurobsdcon) secure lazy binding, and the 64bit time_t development process by Philip Guenther eurobsdcon Abstract A common security measure is now to reduce or eliminate the presence of process memory that is both writable and executable. However, the dynamic linker needs to make changes to executable pages when binding lazy references. In multi-threaded programs this creates a window of vulnerability. Depending on the system architecture, it may also result in extra cache or TLB flushes to maintain coherency on multi-processor systems. I'll describe the implementation and use of kbind(), a machine-independent system call for secure and efficient binding of lazy references. Speaker bio Philip was initiated in UNIX system administration in 1992 as a student at Saint Olaf College, where he got involved in Open Source software including procmail and amd. In December 2000 he joined Sendmail Inc and worked on threaded IMAP/POP3/LMTP servers. He started using OpenBSD actively several years later but didn't join the project until July 2008 after the status of the threads implementation started to annoy him. Philip is currently a Director of Engineering at Proofpoint, Inc. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tets-150111080108-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract A common security measure is now to reduce or eliminate the presence of process memory that is both writable and executable. However, the dynamic linker needs to make changes to executable pages when binding lazy references. In multi-threaded programs this creates a window of vulnerability. Depending on the system architecture, it may also result in extra cache or TLB flushes to maintain coherency on multi-processor systems. I&#39;ll describe the implementation and use of kbind(), a machine-independent system call for secure and efficient binding of lazy references. Speaker bio Philip was initiated in UNIX system administration in 1992 as a student at Saint Olaf College, where he got involved in Open Source software including procmail and amd. In December 2000 he joined Sendmail Inc and worked on threaded IMAP/POP3/LMTP servers. He started using OpenBSD actively several years later but didn&#39;t join the project until July 2008 after the status of the threads implementation started to annoy him. Philip is currently a Director of Engineering at Proofpoint, Inc.
secure lazy binding, and the 64bit time_t development process by Philip Guenther from eurobsdcon
]]>
656 7 https://cdn.slidesharecdn.com/ss_thumbnails/tets-150111080108-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The entropic principle: /dev/u?random and NetBSD by Taylor R Campbell /slideshow/devrandom/43399287 devrandom-150111075039-conversion-gate02
Abstract Programs that talk over the internet today require unpredictable secrets to thwart passive eavesdroppers and active men-in-the-middle. Unix folklore teaches that programs must acquire these secrets from a beast called `entropy' in the pantheon of information theory, who lives in /dev/random, and that in neighbouring /dev/urandom lives only a false idol. The truth, however, is not so mystical. I will discuss what /dev/random and /dev/urandom actually mean, what applications actually need, and how they should attain it. I will also discuss the implementation of /dev/u?random in NetBSD and the kernel's cryptographic pseudorandom number generation API. Speaker bio Taylor `Riastradh' Campbell is not a cryptographer, but has spent enough time scrutinizing crypto in the software he relies on to notice when it's done wrong. In 2011, Taylor found what may be Colin Percival's most embarrassing bug when he noticed the two missing characters `++' to increment the AES-CTR nonce in Tarsnap leading to reused -- and thereby decidedly predictable -- key streams. Taylor became afflicted with a NetBSD commit bit later in 2011 for unrelated reasons, and has since participated in rototilling the NetBSD kernel entropy subsystem.]]>

Abstract Programs that talk over the internet today require unpredictable secrets to thwart passive eavesdroppers and active men-in-the-middle. Unix folklore teaches that programs must acquire these secrets from a beast called `entropy' in the pantheon of information theory, who lives in /dev/random, and that in neighbouring /dev/urandom lives only a false idol. The truth, however, is not so mystical. I will discuss what /dev/random and /dev/urandom actually mean, what applications actually need, and how they should attain it. I will also discuss the implementation of /dev/u?random in NetBSD and the kernel's cryptographic pseudorandom number generation API. Speaker bio Taylor `Riastradh' Campbell is not a cryptographer, but has spent enough time scrutinizing crypto in the software he relies on to notice when it's done wrong. In 2011, Taylor found what may be Colin Percival's most embarrassing bug when he noticed the two missing characters `++' to increment the AES-CTR nonce in Tarsnap leading to reused -- and thereby decidedly predictable -- key streams. Taylor became afflicted with a NetBSD commit bit later in 2011 for unrelated reasons, and has since participated in rototilling the NetBSD kernel entropy subsystem.]]>
Sun, 11 Jan 2015 07:50:39 GMT /slideshow/devrandom/43399287 eurobsdcon@slideshare.net(eurobsdcon) The entropic principle: /dev/u?random and NetBSD by Taylor R Campbell eurobsdcon Abstract Programs that talk over the internet today require unpredictable secrets to thwart passive eavesdroppers and active men-in-the-middle. Unix folklore teaches that programs must acquire these secrets from a beast called `entropy' in the pantheon of information theory, who lives in /dev/random, and that in neighbouring /dev/urandom lives only a false idol. The truth, however, is not so mystical. I will discuss what /dev/random and /dev/urandom actually mean, what applications actually need, and how they should attain it. I will also discuss the implementation of /dev/u?random in NetBSD and the kernel's cryptographic pseudorandom number generation API. Speaker bio Taylor `Riastradh' Campbell is not a cryptographer, but has spent enough time scrutinizing crypto in the software he relies on to notice when it's done wrong. In 2011, Taylor found what may be Colin Percival's most embarrassing bug when he noticed the two missing characters `++' to increment the AES-CTR nonce in Tarsnap leading to reused -- and thereby decidedly predictable -- key streams. Taylor became afflicted with a NetBSD commit bit later in 2011 for unrelated reasons, and has since participated in rototilling the NetBSD kernel entropy subsystem. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/devrandom-150111075039-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract Programs that talk over the internet today require unpredictable secrets to thwart passive eavesdroppers and active men-in-the-middle. Unix folklore teaches that programs must acquire these secrets from a beast called `entropy&#39; in the pantheon of information theory, who lives in /dev/random, and that in neighbouring /dev/urandom lives only a false idol. The truth, however, is not so mystical. I will discuss what /dev/random and /dev/urandom actually mean, what applications actually need, and how they should attain it. I will also discuss the implementation of /dev/u?random in NetBSD and the kernel&#39;s cryptographic pseudorandom number generation API. Speaker bio Taylor `Riastradh&#39; Campbell is not a cryptographer, but has spent enough time scrutinizing crypto in the software he relies on to notice when it&#39;s done wrong. In 2011, Taylor found what may be Colin Percival&#39;s most embarrassing bug when he noticed the two missing characters `++&#39; to increment the AES-CTR nonce in Tarsnap leading to reused -- and thereby decidedly predictable -- key streams. Taylor became afflicted with a NetBSD commit bit later in 2011 for unrelated reasons, and has since participated in rototilling the NetBSD kernel entropy subsystem.
The entropic principle: /dev/u?random and NetBSD by Taylor R Campbell from eurobsdcon
]]>
800 2 https://cdn.slidesharecdn.com/ss_thumbnails/devrandom-150111075039-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The LLDB Debugger in FreeBSD by Ed Maste /slideshow/euro-bsd-con-2014-lldb/43399260 eurobsdcon2014lldb-150111074814-conversion-gate02
Abstract LLDB is a modern, high-performance debugger in the LLVM family of projects, and is built as a modular and reusable set of components on top of the Clang/LLVM foundation. It was originally developed for Mac OS X, but now supports FreeBSD and Linux as well, with ongoing work for Windows support. This presentation will provide an overview of the design of LLDB, compare it with the existing GNU debugger in the FreeBSD base system, and present the path to importing LLDB as FreeBSD's debugger. Speaker bio Ed Maste manages project development for the FreeBSD Foundation and works in an engineering support role with Robert Watson's research group at the University of Cambridge Computer Laboratory. He has been a FreeBSD committer since 2005.]]>

Abstract LLDB is a modern, high-performance debugger in the LLVM family of projects, and is built as a modular and reusable set of components on top of the Clang/LLVM foundation. It was originally developed for Mac OS X, but now supports FreeBSD and Linux as well, with ongoing work for Windows support. This presentation will provide an overview of the design of LLDB, compare it with the existing GNU debugger in the FreeBSD base system, and present the path to importing LLDB as FreeBSD's debugger. Speaker bio Ed Maste manages project development for the FreeBSD Foundation and works in an engineering support role with Robert Watson's research group at the University of Cambridge Computer Laboratory. He has been a FreeBSD committer since 2005.]]>
Sun, 11 Jan 2015 07:48:14 GMT /slideshow/euro-bsd-con-2014-lldb/43399260 eurobsdcon@slideshare.net(eurobsdcon) The LLDB Debugger in FreeBSD by Ed Maste eurobsdcon Abstract LLDB is a modern, high-performance debugger in the LLVM family of projects, and is built as a modular and reusable set of components on top of the Clang/LLVM foundation. It was originally developed for Mac OS X, but now supports FreeBSD and Linux as well, with ongoing work for Windows support. This presentation will provide an overview of the design of LLDB, compare it with the existing GNU debugger in the FreeBSD base system, and present the path to importing LLDB as FreeBSD's debugger. Speaker bio Ed Maste manages project development for the FreeBSD Foundation and works in an engineering support role with Robert Watson's research group at the University of Cambridge Computer Laboratory. He has been a FreeBSD committer since 2005. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon2014lldb-150111074814-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract LLDB is a modern, high-performance debugger in the LLVM family of projects, and is built as a modular and reusable set of components on top of the Clang/LLVM foundation. It was originally developed for Mac OS X, but now supports FreeBSD and Linux as well, with ongoing work for Windows support. This presentation will provide an overview of the design of LLDB, compare it with the existing GNU debugger in the FreeBSD base system, and present the path to importing LLDB as FreeBSD&#39;s debugger. Speaker bio Ed Maste manages project development for the FreeBSD Foundation and works in an engineering support role with Robert Watson&#39;s research group at the University of Cambridge Computer Laboratory. He has been a FreeBSD committer since 2005.
The LLDB Debugger in FreeBSD by Ed Maste from eurobsdcon
]]>
1634 3 https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon2014lldb-150111074814-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Porting Valgrind to NetBSD and OpenBSD by Masao Uebayashi /slideshow/eurobsdcon2014-valgrindpresentation/43399217 eurobsdcon2014-valgrind-presentation-150111074529-conversion-gate02
Abstract Valgrind is a proven opensource instrumentation framework Mainly known by its memory profiler Valgrind executes applications in virtual CPU and memory dynamically disassembling target code into intermediate representation (IR) and converting into native code (JIT). This Dynamic Binary Instrumentation (DBI) is useful for users in that no recompilation of target is needed. However, implementing that idea is difficult and code becomes complex. My talk will examine Valgrind's internal especially around platform dependent code, like system call wrapper, memory management, and signal handling. We also mention things that are needed to port Valgrind to a new platform/cpu, for example, how to debug and test Valgrind itself, and source code structure, etc. Speaker bio Masao Uebayashi is a the founder of Tombi Inc., a small company based in Yokohama, Japan, where he concentrates on *BSD only development consultation. In the past he worked for Brains Corp., who first ported NetBSD to Renesas SuperH platform, and later IIJ, where he brought up NetBSD on OCTEON MIPS64 processor. After having done PowerPC, SuperH, MIPS, and ARM in the last 15 years, he has finally started learning x86.]]>

Abstract Valgrind is a proven opensource instrumentation framework Mainly known by its memory profiler Valgrind executes applications in virtual CPU and memory dynamically disassembling target code into intermediate representation (IR) and converting into native code (JIT). This Dynamic Binary Instrumentation (DBI) is useful for users in that no recompilation of target is needed. However, implementing that idea is difficult and code becomes complex. My talk will examine Valgrind's internal especially around platform dependent code, like system call wrapper, memory management, and signal handling. We also mention things that are needed to port Valgrind to a new platform/cpu, for example, how to debug and test Valgrind itself, and source code structure, etc. Speaker bio Masao Uebayashi is a the founder of Tombi Inc., a small company based in Yokohama, Japan, where he concentrates on *BSD only development consultation. In the past he worked for Brains Corp., who first ported NetBSD to Renesas SuperH platform, and later IIJ, where he brought up NetBSD on OCTEON MIPS64 processor. After having done PowerPC, SuperH, MIPS, and ARM in the last 15 years, he has finally started learning x86.]]>
Sun, 11 Jan 2015 07:45:29 GMT /slideshow/eurobsdcon2014-valgrindpresentation/43399217 eurobsdcon@slideshare.net(eurobsdcon) Porting Valgrind to NetBSD and OpenBSD by Masao Uebayashi eurobsdcon Abstract Valgrind is a proven opensource instrumentation framework Mainly known by its memory profiler Valgrind executes applications in virtual CPU and memory dynamically disassembling target code into intermediate representation (IR) and converting into native code (JIT). This Dynamic Binary Instrumentation (DBI) is useful for users in that no recompilation of target is needed. However, implementing that idea is difficult and code becomes complex. My talk will examine Valgrind's internal especially around platform dependent code, like system call wrapper, memory management, and signal handling. We also mention things that are needed to port Valgrind to a new platform/cpu, for example, how to debug and test Valgrind itself, and source code structure, etc. Speaker bio Masao Uebayashi is a the founder of Tombi Inc., a small company based in Yokohama, Japan, where he concentrates on *BSD only development consultation. In the past he worked for Brains Corp., who first ported NetBSD to Renesas SuperH platform, and later IIJ, where he brought up NetBSD on OCTEON MIPS64 processor. After having done PowerPC, SuperH, MIPS, and ARM in the last 15 years, he has finally started learning x86. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon2014-valgrind-presentation-150111074529-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract Valgrind is a proven opensource instrumentation framework Mainly known by its memory profiler Valgrind executes applications in virtual CPU and memory dynamically disassembling target code into intermediate representation (IR) and converting into native code (JIT). This Dynamic Binary Instrumentation (DBI) is useful for users in that no recompilation of target is needed. However, implementing that idea is difficult and code becomes complex. My talk will examine Valgrind&#39;s internal especially around platform dependent code, like system call wrapper, memory management, and signal handling. We also mention things that are needed to port Valgrind to a new platform/cpu, for example, how to debug and test Valgrind itself, and source code structure, etc. Speaker bio Masao Uebayashi is a the founder of Tombi Inc., a small company based in Yokohama, Japan, where he concentrates on *BSD only development consultation. In the past he worked for Brains Corp., who first ported NetBSD to Renesas SuperH platform, and later IIJ, where he brought up NetBSD on OCTEON MIPS64 processor. After having done PowerPC, SuperH, MIPS, and ARM in the last 15 years, he has finally started learning x86.
Porting Valgrind to NetBSD and OpenBSD by Masao Uebayashi from eurobsdcon
]]>
1220 2 https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon2014-valgrind-presentation-150111074529-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Multiplatform JIT Code Generator for NetBSD by Alexander Nasonov /slideshow/jit-code-generator-for-net-bsd/43399106 jitcodegeneratorfornetbsd-150111073736-conversion-gate02
Abstract The next release of NetBSD will have a support for Just-In-Time (JIT) compilation of bpf programs in the kernel; this change will greatly speed-up traffic sniffing on multiple platforms. Unlike similar interface in other operating systems, bpfjit uses a unified programming interface for code generation which is based on Stack Less JIT Compiler library (SLJIT) and which supports x86, mips, arm, sparc and some other platforms. The speaker will give an overview of SLJIT API and discuss some implementation details of the bpfjit code with emphasis on supported optimizations of bpf programs by JIT engine. He will also touch on unit testing of dynamically generated code running inside the kernel and on other areas in the NetBSD project where bpfjit can help in boosting performance." Speaker bio Alex is a software developer working in the financial sector in the City of London. He often amuses fellow tube passengers with C or Lua coding in NetBSD console and sometimes even with the green kernel debugger prompt.]]>

Abstract The next release of NetBSD will have a support for Just-In-Time (JIT) compilation of bpf programs in the kernel; this change will greatly speed-up traffic sniffing on multiple platforms. Unlike similar interface in other operating systems, bpfjit uses a unified programming interface for code generation which is based on Stack Less JIT Compiler library (SLJIT) and which supports x86, mips, arm, sparc and some other platforms. The speaker will give an overview of SLJIT API and discuss some implementation details of the bpfjit code with emphasis on supported optimizations of bpf programs by JIT engine. He will also touch on unit testing of dynamically generated code running inside the kernel and on other areas in the NetBSD project where bpfjit can help in boosting performance." Speaker bio Alex is a software developer working in the financial sector in the City of London. He often amuses fellow tube passengers with C or Lua coding in NetBSD console and sometimes even with the green kernel debugger prompt.]]>
Sun, 11 Jan 2015 07:37:36 GMT /slideshow/jit-code-generator-for-net-bsd/43399106 eurobsdcon@slideshare.net(eurobsdcon) Multiplatform JIT Code Generator for NetBSD by Alexander Nasonov eurobsdcon Abstract The next release of NetBSD will have a support for Just-In-Time (JIT) compilation of bpf programs in the kernel; this change will greatly speed-up traffic sniffing on multiple platforms. Unlike similar interface in other operating systems, bpfjit uses a unified programming interface for code generation which is based on Stack Less JIT Compiler library (SLJIT) and which supports x86, mips, arm, sparc and some other platforms. The speaker will give an overview of SLJIT API and discuss some implementation details of the bpfjit code with emphasis on supported optimizations of bpf programs by JIT engine. He will also touch on unit testing of dynamically generated code running inside the kernel and on other areas in the NetBSD project where bpfjit can help in boosting performance." Speaker bio Alex is a software developer working in the financial sector in the City of London. He often amuses fellow tube passengers with C or Lua coding in NetBSD console and sometimes even with the green kernel debugger prompt. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jitcodegeneratorfornetbsd-150111073736-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract The next release of NetBSD will have a support for Just-In-Time (JIT) compilation of bpf programs in the kernel; this change will greatly speed-up traffic sniffing on multiple platforms. Unlike similar interface in other operating systems, bpfjit uses a unified programming interface for code generation which is based on Stack Less JIT Compiler library (SLJIT) and which supports x86, mips, arm, sparc and some other platforms. The speaker will give an overview of SLJIT API and discuss some implementation details of the bpfjit code with emphasis on supported optimizations of bpf programs by JIT engine. He will also touch on unit testing of dynamically generated code running inside the kernel and on other areas in the NetBSD project where bpfjit can help in boosting performance.&quot; Speaker bio Alex is a software developer working in the financial sector in the City of London. He often amuses fellow tube passengers with C or Lua coding in NetBSD console and sometimes even with the green kernel debugger prompt.
Multiplatform JIT Code Generator for NetBSD by Alexander Nasonov from eurobsdcon
]]>
871 3 https://cdn.slidesharecdn.com/ss_thumbnails/jitcodegeneratorfornetbsd-150111073736-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel /slideshow/michal-dubieleurobsd2014/43399075 michal-dubiel-eurobsd2014-150111073445-conversion-gate02
Abstract OpenStack and OpenContrail network virtualization solution form a complete suite able to successfully handle orchestration of resources and services of a contemporary cloud installations. These projects, however, have been only available for Linux hosted platforms by now. This talk is about a work underway that brings them into the FreeBSD world. It explains in greater details an architecture of an OpenStack system and shows how support for the FreeBSD bhyve hypervisor was brought up using the libvirt library. Details of the OpenContrail network virtualization solution is also provided, with special emphasis on the lower level system entities like a vRouter kernel module, which required most of the work while developing the FreeBSD version. Speaker bio Michal Dubiel, M.Sc. Eng., born 17th of September 1983 in Kraków, Poland. He graduated in 2009 from the faculty of Electrical Engineering, Automatics, Computer Science and Electronics of AGH University of Science and Technology in Kraków. Throughout his career he worked for ACK Cyfronet AGH on hardware-accelerated data mining systems and later for Motorola Electronics on DSP software for LTE base stations. Currently he is working for Semihalf on various software projects ranging from low level kernel development to Software Defined Networking systems. He is mainly interested in the computer science, especially the operating systems, programming languages, networks, and digital signal processing.]]>

Abstract OpenStack and OpenContrail network virtualization solution form a complete suite able to successfully handle orchestration of resources and services of a contemporary cloud installations. These projects, however, have been only available for Linux hosted platforms by now. This talk is about a work underway that brings them into the FreeBSD world. It explains in greater details an architecture of an OpenStack system and shows how support for the FreeBSD bhyve hypervisor was brought up using the libvirt library. Details of the OpenContrail network virtualization solution is also provided, with special emphasis on the lower level system entities like a vRouter kernel module, which required most of the work while developing the FreeBSD version. Speaker bio Michal Dubiel, M.Sc. Eng., born 17th of September 1983 in Kraków, Poland. He graduated in 2009 from the faculty of Electrical Engineering, Automatics, Computer Science and Electronics of AGH University of Science and Technology in Kraków. Throughout his career he worked for ACK Cyfronet AGH on hardware-accelerated data mining systems and later for Motorola Electronics on DSP software for LTE base stations. Currently he is working for Semihalf on various software projects ranging from low level kernel development to Software Defined Networking systems. He is mainly interested in the computer science, especially the operating systems, programming languages, networks, and digital signal processing.]]>
Sun, 11 Jan 2015 07:34:45 GMT /slideshow/michal-dubieleurobsd2014/43399075 eurobsdcon@slideshare.net(eurobsdcon) OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel eurobsdcon Abstract OpenStack and OpenContrail network virtualization solution form a complete suite able to successfully handle orchestration of resources and services of a contemporary cloud installations. These projects, however, have been only available for Linux hosted platforms by now. This talk is about a work underway that brings them into the FreeBSD world. It explains in greater details an architecture of an OpenStack system and shows how support for the FreeBSD bhyve hypervisor was brought up using the libvirt library. Details of the OpenContrail network virtualization solution is also provided, with special emphasis on the lower level system entities like a vRouter kernel module, which required most of the work while developing the FreeBSD version. Speaker bio Michal Dubiel, M.Sc. Eng., born 17th of September 1983 in Kraków, Poland. He graduated in 2009 from the faculty of Electrical Engineering, Automatics, Computer Science and Electronics of AGH University of Science and Technology in Kraków. Throughout his career he worked for ACK Cyfronet AGH on hardware-accelerated data mining systems and later for Motorola Electronics on DSP software for LTE base stations. Currently he is working for Semihalf on various software projects ranging from low level kernel development to Software Defined Networking systems. He is mainly interested in the computer science, especially the operating systems, programming languages, networks, and digital signal processing. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/michal-dubiel-eurobsd2014-150111073445-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract OpenStack and OpenContrail network virtualization solution form a complete suite able to successfully handle orchestration of resources and services of a contemporary cloud installations. These projects, however, have been only available for Linux hosted platforms by now. This talk is about a work underway that brings them into the FreeBSD world. It explains in greater details an architecture of an OpenStack system and shows how support for the FreeBSD bhyve hypervisor was brought up using the libvirt library. Details of the OpenContrail network virtualization solution is also provided, with special emphasis on the lower level system entities like a vRouter kernel module, which required most of the work while developing the FreeBSD version. Speaker bio Michal Dubiel, M.Sc. Eng., born 17th of September 1983 in Kraków, Poland. He graduated in 2009 from the faculty of Electrical Engineering, Automatics, Computer Science and Electronics of AGH University of Science and Technology in Kraków. Throughout his career he worked for ACK Cyfronet AGH on hardware-accelerated data mining systems and later for Motorola Electronics on DSP software for LTE base stations. Currently he is working for Semihalf on various software projects ranging from low level kernel development to Software Defined Networking systems. He is mainly interested in the computer science, especially the operating systems, programming languages, networks, and digital signal processing.
OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel from eurobsdcon
]]>
2771 1 https://cdn.slidesharecdn.com/ss_thumbnails/michal-dubiel-eurobsd2014-150111073445-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Porting NetBSD to the LatticeMico32 open source CPU by Yann Sionneau /slideshow/yann-sionneau-eurobsdcon2014/43398944 yannsionneaueurobsdcon2014-150111072634-conversion-gate02
Abstract I will describe the work I did on the open source LatticeMico32 softcore CPU to add a MMU to its pipeline and then how I added support for this enhanced LM32 CPU in the NetBSD &lt;http: /> 6 kernel. I will quickly explain what a MMU is and how it works in LM32. I will then show an overview of the steps I followed to add support for this new CPU and this new System-on-Chip to the NetBSD kernel. Afterward I will explain some of the choices made for this port, especially those in relation with the MMU handling : the (machine-dependant) virtual memory system (aka pmap). I will demo the boot of the NetBSD kernel on QEMU emulating LM32 CPU and then on the Milkymist One VJ Station. Speaker bio Yann Sionneau is a 26 year-old French embedded software engineer passionate about learning how embedded systems work in general. Yann is part of the M-Labs &lt;http: /> (fka Milkymist) community that is working on developing open source digital designs on FPGAs as well as making it more and more easy to do so by providing a simple but yet powerful framework for System-on-Chip design. Yann contributed the original RTEMS Board Support Package of the Milkymist One video synthesizer, a Memory Management Unit (MMU) for the Open Source soft-core CPU LatticeMico32, and ported NetBSD kernel for the LM32 CPU and the Milkymist System-on-Chip. Yann recently became an EdgeBSD developer and his work on LM32 support is currently upstream in an EdgeBSD branch.]]>

Abstract I will describe the work I did on the open source LatticeMico32 softcore CPU to add a MMU to its pipeline and then how I added support for this enhanced LM32 CPU in the NetBSD &lt;http: /> 6 kernel. I will quickly explain what a MMU is and how it works in LM32. I will then show an overview of the steps I followed to add support for this new CPU and this new System-on-Chip to the NetBSD kernel. Afterward I will explain some of the choices made for this port, especially those in relation with the MMU handling : the (machine-dependant) virtual memory system (aka pmap). I will demo the boot of the NetBSD kernel on QEMU emulating LM32 CPU and then on the Milkymist One VJ Station. Speaker bio Yann Sionneau is a 26 year-old French embedded software engineer passionate about learning how embedded systems work in general. Yann is part of the M-Labs &lt;http: /> (fka Milkymist) community that is working on developing open source digital designs on FPGAs as well as making it more and more easy to do so by providing a simple but yet powerful framework for System-on-Chip design. Yann contributed the original RTEMS Board Support Package of the Milkymist One video synthesizer, a Memory Management Unit (MMU) for the Open Source soft-core CPU LatticeMico32, and ported NetBSD kernel for the LM32 CPU and the Milkymist System-on-Chip. Yann recently became an EdgeBSD developer and his work on LM32 support is currently upstream in an EdgeBSD branch.]]>
Sun, 11 Jan 2015 07:26:34 GMT /slideshow/yann-sionneau-eurobsdcon2014/43398944 eurobsdcon@slideshare.net(eurobsdcon) Porting NetBSD to the LatticeMico32 open source CPU by Yann Sionneau eurobsdcon Abstract I will describe the work I did on the open source LatticeMico32 softcore CPU to add a MMU to its pipeline and then how I added support for this enhanced LM32 CPU in the NetBSD &lt;http: /> 6 kernel. I will quickly explain what a MMU is and how it works in LM32. I will then show an overview of the steps I followed to add support for this new CPU and this new System-on-Chip to the NetBSD kernel. Afterward I will explain some of the choices made for this port, especially those in relation with the MMU handling : the (machine-dependant) virtual memory system (aka pmap). I will demo the boot of the NetBSD kernel on QEMU emulating LM32 CPU and then on the Milkymist One VJ Station. Speaker bio Yann Sionneau is a 26 year-old French embedded software engineer passionate about learning how embedded systems work in general. Yann is part of the M-Labs &lt;http: /> (fka Milkymist) community that is working on developing open source digital designs on FPGAs as well as making it more and more easy to do so by providing a simple but yet powerful framework for System-on-Chip design. Yann contributed the original RTEMS Board Support Package of the Milkymist One video synthesizer, a Memory Management Unit (MMU) for the Open Source soft-core CPU LatticeMico32, and ported NetBSD kernel for the LM32 CPU and the Milkymist System-on-Chip. Yann recently became an EdgeBSD developer and his work on LM32 support is currently upstream in an EdgeBSD branch. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/yannsionneaueurobsdcon2014-150111072634-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract I will describe the work I did on the open source LatticeMico32 softcore CPU to add a MMU to its pipeline and then how I added support for this enhanced LM32 CPU in the NetBSD &amp;lt;http: /&gt; 6 kernel. I will quickly explain what a MMU is and how it works in LM32. I will then show an overview of the steps I followed to add support for this new CPU and this new System-on-Chip to the NetBSD kernel. Afterward I will explain some of the choices made for this port, especially those in relation with the MMU handling : the (machine-dependant) virtual memory system (aka pmap). I will demo the boot of the NetBSD kernel on QEMU emulating LM32 CPU and then on the Milkymist One VJ Station. Speaker bio Yann Sionneau is a 26 year-old French embedded software engineer passionate about learning how embedded systems work in general. Yann is part of the M-Labs &amp;lt;http: /&gt; (fka Milkymist) community that is working on developing open source digital designs on FPGAs as well as making it more and more easy to do so by providing a simple but yet powerful framework for System-on-Chip design. Yann contributed the original RTEMS Board Support Package of the Milkymist One video synthesizer, a Memory Management Unit (MMU) for the Open Source soft-core CPU LatticeMico32, and ported NetBSD kernel for the LM32 CPU and the Milkymist System-on-Chip. Yann recently became an EdgeBSD developer and his work on LM32 support is currently upstream in an EdgeBSD branch.
Porting NetBSD to the LatticeMico32 open source CPU by Yann Sionneau from eurobsdcon
]]>
691 3 https://cdn.slidesharecdn.com/ss_thumbnails/yannsionneaueurobsdcon2014-150111072634-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Smartcom's control plane software, a customized version of FreeBSD by Boris Astardzhiev /slideshow/smartkom-eurobsdcon/43398895 smartkom-eurobsdcon-150111072400-conversion-gate02
Abstract Smartcom Bulgaria’s switching family consists of Ethernet switches targeted at offering access and aggregation layer L2 and L3 switching solutions for FTTX deployments that satisfy today’s requirements for delivering TriplePlay services with appropriate levels of QoS and security. The family offers fixed configuration (for the access layer), as well as modular configuration (for the aggregation layer) devices with up to 24x1GE + 4x10GE Ethernet ports. The switches run Smartcom's control plane software, a customized version of FreeBSD. The control plane software is modular, ensuring that, even in case of software problems, the switch will continue to operate with minimal or no service disruption.]]>

Abstract Smartcom Bulgaria’s switching family consists of Ethernet switches targeted at offering access and aggregation layer L2 and L3 switching solutions for FTTX deployments that satisfy today’s requirements for delivering TriplePlay services with appropriate levels of QoS and security. The family offers fixed configuration (for the access layer), as well as modular configuration (for the aggregation layer) devices with up to 24x1GE + 4x10GE Ethernet ports. The switches run Smartcom's control plane software, a customized version of FreeBSD. The control plane software is modular, ensuring that, even in case of software problems, the switch will continue to operate with minimal or no service disruption.]]>
Sun, 11 Jan 2015 07:24:00 GMT /slideshow/smartkom-eurobsdcon/43398895 eurobsdcon@slideshare.net(eurobsdcon) Smartcom's control plane software, a customized version of FreeBSD by Boris Astardzhiev eurobsdcon Abstract Smartcom Bulgaria’s switching family consists of Ethernet switches targeted at offering access and aggregation layer L2 and L3 switching solutions for FTTX deployments that satisfy today’s requirements for delivering TriplePlay services with appropriate levels of QoS and security. The family offers fixed configuration (for the access layer), as well as modular configuration (for the aggregation layer) devices with up to 24x1GE + 4x10GE Ethernet ports. The switches run Smartcom's control plane software, a customized version of FreeBSD. The control plane software is modular, ensuring that, even in case of software problems, the switch will continue to operate with minimal or no service disruption. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/smartkom-eurobsdcon-150111072400-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract Smartcom Bulgaria’s switching family consists of Ethernet switches targeted at offering access and aggregation layer L2 and L3 switching solutions for FTTX deployments that satisfy today’s requirements for delivering TriplePlay services with appropriate levels of QoS and security. The family offers fixed configuration (for the access layer), as well as modular configuration (for the aggregation layer) devices with up to 24x1GE + 4x10GE Ethernet ports. The switches run Smartcom&#39;s control plane software, a customized version of FreeBSD. The control plane software is modular, ensuring that, even in case of software problems, the switch will continue to operate with minimal or no service disruption.
Smartcom's control plane software, a customized version of FreeBSD by Boris Astardzhiev from eurobsdcon
]]>
1500 1 https://cdn.slidesharecdn.com/ss_thumbnails/smartkom-eurobsdcon-150111072400-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bugs Ex Ante by Kristaps Dzonsons /slideshow/kristaps-slides/43398792 kristaps-slides-150111071636-conversion-gate01
Abstract Application sandboxes allow developers to take an unusual stance: not that our systems will be bug-free, and that bugs should be considered the corner-case; but that in fact there will be bugs, bugs as the rule, bugs that will be exploited in the messiest, ugliest way. (I won't mention current events. But we'll know what they are...) For this talk, I propose speaking about the design of a CGI framework that assumes exactly that: that its network-touching components will be exploited. After all, CGI frameworks have a celestially vast attack surface: URL query strings; cookies and HTTP headers; and beneath and beyond it all, form parsing. Combine these attack vectors with validation--at best validation of simple types, and then more terrifyingly (and normally) via external libraries such as libpng. In reviewing CGI frameworks in C for some recent work, I noticed less a lack of security focus than a parade committee for exploits. Even given my own small demands for CGI security, I was led to asked myself: can I do better than this? The topic would necessarily focus on available sandbox techniques (e.g., systrace, Capsicum) and their practical pros and cons (portability, ease of implementation, documentation, etc.). After all, if we make mistakes in deploying our sandbox, it's just more ticker-tape for the parade. The CGI framework in question, kcgi, is one I use for my own small purposes. Obviously it's ISC-licensed, well-documented C code, and will be mentioned as little as possible beyond as an exemplar of how easy (or hard!) it can be to write portable sandboxes. In short, this isn't about kcgi, but about systrace, Capsicum, Darwin's sandbox, and so on. Speaker bio Most of my open-source work focusses on UNIX documentation, e.g., the mandoc suite (now captained by schwarze@) and its constellation of related tools, such as pod2mdoc, docbook2mdoc, etc. Earlier work focussed more on security, from the experimental mult kernel container on OpenBSD and NetBSD to sysjail. In general, I dislike computers and enjoy the sea.]]>

Abstract Application sandboxes allow developers to take an unusual stance: not that our systems will be bug-free, and that bugs should be considered the corner-case; but that in fact there will be bugs, bugs as the rule, bugs that will be exploited in the messiest, ugliest way. (I won't mention current events. But we'll know what they are...) For this talk, I propose speaking about the design of a CGI framework that assumes exactly that: that its network-touching components will be exploited. After all, CGI frameworks have a celestially vast attack surface: URL query strings; cookies and HTTP headers; and beneath and beyond it all, form parsing. Combine these attack vectors with validation--at best validation of simple types, and then more terrifyingly (and normally) via external libraries such as libpng. In reviewing CGI frameworks in C for some recent work, I noticed less a lack of security focus than a parade committee for exploits. Even given my own small demands for CGI security, I was led to asked myself: can I do better than this? The topic would necessarily focus on available sandbox techniques (e.g., systrace, Capsicum) and their practical pros and cons (portability, ease of implementation, documentation, etc.). After all, if we make mistakes in deploying our sandbox, it's just more ticker-tape for the parade. The CGI framework in question, kcgi, is one I use for my own small purposes. Obviously it's ISC-licensed, well-documented C code, and will be mentioned as little as possible beyond as an exemplar of how easy (or hard!) it can be to write portable sandboxes. In short, this isn't about kcgi, but about systrace, Capsicum, Darwin's sandbox, and so on. Speaker bio Most of my open-source work focusses on UNIX documentation, e.g., the mandoc suite (now captained by schwarze@) and its constellation of related tools, such as pod2mdoc, docbook2mdoc, etc. Earlier work focussed more on security, from the experimental mult kernel container on OpenBSD and NetBSD to sysjail. In general, I dislike computers and enjoy the sea.]]>
Sun, 11 Jan 2015 07:16:36 GMT /slideshow/kristaps-slides/43398792 eurobsdcon@slideshare.net(eurobsdcon) Bugs Ex Ante by Kristaps Dzonsons eurobsdcon Abstract Application sandboxes allow developers to take an unusual stance: not that our systems will be bug-free, and that bugs should be considered the corner-case; but that in fact there will be bugs, bugs as the rule, bugs that will be exploited in the messiest, ugliest way. (I won't mention current events. But we'll know what they are...) For this talk, I propose speaking about the design of a CGI framework that assumes exactly that: that its network-touching components will be exploited. After all, CGI frameworks have a celestially vast attack surface: URL query strings; cookies and HTTP headers; and beneath and beyond it all, form parsing. Combine these attack vectors with validation--at best validation of simple types, and then more terrifyingly (and normally) via external libraries such as libpng. In reviewing CGI frameworks in C for some recent work, I noticed less a lack of security focus than a parade committee for exploits. Even given my own small demands for CGI security, I was led to asked myself: can I do better than this? The topic would necessarily focus on available sandbox techniques (e.g., systrace, Capsicum) and their practical pros and cons (portability, ease of implementation, documentation, etc.). After all, if we make mistakes in deploying our sandbox, it's just more ticker-tape for the parade. The CGI framework in question, kcgi, is one I use for my own small purposes. Obviously it's ISC-licensed, well-documented C code, and will be mentioned as little as possible beyond as an exemplar of how easy (or hard!) it can be to write portable sandboxes. In short, this isn't about kcgi, but about systrace, Capsicum, Darwin's sandbox, and so on. Speaker bio Most of my open-source work focusses on UNIX documentation, e.g., the mandoc suite (now captained by schwarze@) and its constellation of related tools, such as pod2mdoc, docbook2mdoc, etc. Earlier work focussed more on security, from the experimental mult kernel container on OpenBSD and NetBSD to sysjail. In general, I dislike computers and enjoy the sea. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kristaps-slides-150111071636-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract Application sandboxes allow developers to take an unusual stance: not that our systems will be bug-free, and that bugs should be considered the corner-case; but that in fact there will be bugs, bugs as the rule, bugs that will be exploited in the messiest, ugliest way. (I won&#39;t mention current events. But we&#39;ll know what they are...) For this talk, I propose speaking about the design of a CGI framework that assumes exactly that: that its network-touching components will be exploited. After all, CGI frameworks have a celestially vast attack surface: URL query strings; cookies and HTTP headers; and beneath and beyond it all, form parsing. Combine these attack vectors with validation--at best validation of simple types, and then more terrifyingly (and normally) via external libraries such as libpng. In reviewing CGI frameworks in C for some recent work, I noticed less a lack of security focus than a parade committee for exploits. Even given my own small demands for CGI security, I was led to asked myself: can I do better than this? The topic would necessarily focus on available sandbox techniques (e.g., systrace, Capsicum) and their practical pros and cons (portability, ease of implementation, documentation, etc.). After all, if we make mistakes in deploying our sandbox, it&#39;s just more ticker-tape for the parade. The CGI framework in question, kcgi, is one I use for my own small purposes. Obviously it&#39;s ISC-licensed, well-documented C code, and will be mentioned as little as possible beyond as an exemplar of how easy (or hard!) it can be to write portable sandboxes. In short, this isn&#39;t about kcgi, but about systrace, Capsicum, Darwin&#39;s sandbox, and so on. Speaker bio Most of my open-source work focusses on UNIX documentation, e.g., the mandoc suite (now captained by schwarze@) and its constellation of related tools, such as pod2mdoc, docbook2mdoc, etc. Earlier work focussed more on security, from the experimental mult kernel container on OpenBSD and NetBSD to sysjail. In general, I dislike computers and enjoy the sea.
Bugs Ex Ante by Kristaps Dzonsons from eurobsdcon
]]>
501 1 https://cdn.slidesharecdn.com/ss_thumbnails/kristaps-slides-150111071636-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cross Building the FreeBSD ports tree by Baptiste Daroussin /slideshow/baptiste-daroussin-crosscompiling-ports/43398750 baptistedaroussin-cross-compilingports-150111071349-conversion-gate02
Abstract Building packages is a resource consuming task and can take very long on embedded devices or low power architectures. Being able to use the power of amd64 servers to build packages for arm or mips allows to make this task faster and less tedious. This talk will cover the following topic: State of art to build arm/mips packages on FreeBSD from a powerful amd64 box How to create a cross building environement How the ports tree does automatically handle cross building How dependencies are handled when cross building packages How to workaround non cross buildable or broken build system like perl and python Cross build monster ports: chromium, libreoffice, openjdk and firefox What are the current limitation Future directions for the cross building framework in the ports tree. Speaker bio Baptiste Daroussin is a unix system engineer, FreeBSD committer for both base and ports, a member of the port management team. He is responsible for a couple of the important changes that happened in the ports over the past few years: New options framework, pkgng, Stage support and more.]]>

Abstract Building packages is a resource consuming task and can take very long on embedded devices or low power architectures. Being able to use the power of amd64 servers to build packages for arm or mips allows to make this task faster and less tedious. This talk will cover the following topic: State of art to build arm/mips packages on FreeBSD from a powerful amd64 box How to create a cross building environement How the ports tree does automatically handle cross building How dependencies are handled when cross building packages How to workaround non cross buildable or broken build system like perl and python Cross build monster ports: chromium, libreoffice, openjdk and firefox What are the current limitation Future directions for the cross building framework in the ports tree. Speaker bio Baptiste Daroussin is a unix system engineer, FreeBSD committer for both base and ports, a member of the port management team. He is responsible for a couple of the important changes that happened in the ports over the past few years: New options framework, pkgng, Stage support and more.]]>
Sun, 11 Jan 2015 07:13:49 GMT /slideshow/baptiste-daroussin-crosscompiling-ports/43398750 eurobsdcon@slideshare.net(eurobsdcon) Cross Building the FreeBSD ports tree by Baptiste Daroussin eurobsdcon Abstract Building packages is a resource consuming task and can take very long on embedded devices or low power architectures. Being able to use the power of amd64 servers to build packages for arm or mips allows to make this task faster and less tedious. This talk will cover the following topic: State of art to build arm/mips packages on FreeBSD from a powerful amd64 box How to create a cross building environement How the ports tree does automatically handle cross building How dependencies are handled when cross building packages How to workaround non cross buildable or broken build system like perl and python Cross build monster ports: chromium, libreoffice, openjdk and firefox What are the current limitation Future directions for the cross building framework in the ports tree. Speaker bio Baptiste Daroussin is a unix system engineer, FreeBSD committer for both base and ports, a member of the port management team. He is responsible for a couple of the important changes that happened in the ports over the past few years: New options framework, pkgng, Stage support and more. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/baptistedaroussin-cross-compilingports-150111071349-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract Building packages is a resource consuming task and can take very long on embedded devices or low power architectures. Being able to use the power of amd64 servers to build packages for arm or mips allows to make this task faster and less tedious. This talk will cover the following topic: State of art to build arm/mips packages on FreeBSD from a powerful amd64 box How to create a cross building environement How the ports tree does automatically handle cross building How dependencies are handled when cross building packages How to workaround non cross buildable or broken build system like perl and python Cross build monster ports: chromium, libreoffice, openjdk and firefox What are the current limitation Future directions for the cross building framework in the ports tree. Speaker bio Baptiste Daroussin is a unix system engineer, FreeBSD committer for both base and ports, a member of the port management team. He is responsible for a couple of the important changes that happened in the ports over the past few years: New options framework, pkgng, Stage support and more.
Cross Building the FreeBSD ports tree by Baptiste Daroussin from eurobsdcon
]]>
1351 1 https://cdn.slidesharecdn.com/ss_thumbnails/baptistedaroussin-cross-compilingports-150111071349-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Building packages through emulation by Sean Bruno /slideshow/sean-bruno-building-packages-through-emulation/43398712 seanbruno-buildingpackagesthroughemulation-150111071024-conversion-gate02
Abstract Explanation and use of QEMU user mode on FreeBSD in tandem with binmiscctl tools to create and manipulate arbitrary hardware architecture jails on AMD64/i386. Detailed setup of tools and use for creating and maintaining ports packages, initial prototype of disk images and testing of concepts on architectures without having real hardware in play. Examples of MIPS and ARM execution for the crowd and demonstration of setup and configuration on AMD64 hardware. Display use of poudriere to build PKG style repos for these architectures. Simple how with regards to rapid prototyping of compressed flash images to assist in the propagation of FreeBSD on other platforms. Speaker bio Sean Bruno is FreeBSD src committer, ports maintainer and member of the cluster administration team. He is the lead mirror manager interacting with external organizations in the installation of new style PKG and SVN mirrors around the world. Living in the San Francisco, CA, USA area, with his family, Sean is a FreeBSD developer working on several projects for various employers. Sean enjoys spinning records and has a shoutcast show on Radio KoL twice a week.]]>

Abstract Explanation and use of QEMU user mode on FreeBSD in tandem with binmiscctl tools to create and manipulate arbitrary hardware architecture jails on AMD64/i386. Detailed setup of tools and use for creating and maintaining ports packages, initial prototype of disk images and testing of concepts on architectures without having real hardware in play. Examples of MIPS and ARM execution for the crowd and demonstration of setup and configuration on AMD64 hardware. Display use of poudriere to build PKG style repos for these architectures. Simple how with regards to rapid prototyping of compressed flash images to assist in the propagation of FreeBSD on other platforms. Speaker bio Sean Bruno is FreeBSD src committer, ports maintainer and member of the cluster administration team. He is the lead mirror manager interacting with external organizations in the installation of new style PKG and SVN mirrors around the world. Living in the San Francisco, CA, USA area, with his family, Sean is a FreeBSD developer working on several projects for various employers. Sean enjoys spinning records and has a shoutcast show on Radio KoL twice a week.]]>
Sun, 11 Jan 2015 07:10:24 GMT /slideshow/sean-bruno-building-packages-through-emulation/43398712 eurobsdcon@slideshare.net(eurobsdcon) Building packages through emulation by Sean Bruno eurobsdcon Abstract Explanation and use of QEMU user mode on FreeBSD in tandem with binmiscctl tools to create and manipulate arbitrary hardware architecture jails on AMD64/i386. Detailed setup of tools and use for creating and maintaining ports packages, initial prototype of disk images and testing of concepts on architectures without having real hardware in play. Examples of MIPS and ARM execution for the crowd and demonstration of setup and configuration on AMD64 hardware. Display use of poudriere to build PKG style repos for these architectures. Simple how with regards to rapid prototyping of compressed flash images to assist in the propagation of FreeBSD on other platforms. Speaker bio Sean Bruno is FreeBSD src committer, ports maintainer and member of the cluster administration team. He is the lead mirror manager interacting with external organizations in the installation of new style PKG and SVN mirrors around the world. Living in the San Francisco, CA, USA area, with his family, Sean is a FreeBSD developer working on several projects for various employers. Sean enjoys spinning records and has a shoutcast show on Radio KoL twice a week. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seanbruno-buildingpackagesthroughemulation-150111071024-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract Explanation and use of QEMU user mode on FreeBSD in tandem with binmiscctl tools to create and manipulate arbitrary hardware architecture jails on AMD64/i386. Detailed setup of tools and use for creating and maintaining ports packages, initial prototype of disk images and testing of concepts on architectures without having real hardware in play. Examples of MIPS and ARM execution for the crowd and demonstration of setup and configuration on AMD64 hardware. Display use of poudriere to build PKG style repos for these architectures. Simple how with regards to rapid prototyping of compressed flash images to assist in the propagation of FreeBSD on other platforms. Speaker bio Sean Bruno is FreeBSD src committer, ports maintainer and member of the cluster administration team. He is the lead mirror manager interacting with external organizations in the installation of new style PKG and SVN mirrors around the world. Living in the San Francisco, CA, USA area, with his family, Sean is a FreeBSD developer working on several projects for various employers. Sean enjoys spinning records and has a shoutcast show on Radio KoL twice a week.
Building packages through emulation by Sean Bruno from eurobsdcon
]]>
1539 4 https://cdn.slidesharecdn.com/ss_thumbnails/seanbruno-buildingpackagesthroughemulation-150111071024-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Making OpenBSD Useful on the Octeon Network Gear by Paul Irofti /slideshow/paul-iroftieurobsdcon2014octeon-dsr500/43398702 paul-irofti-eurobsdcon2014-octeondsr500-150111070855-conversion-gate02
Abstract My work on the Octeon port made possible for OpenBSD to run on the D-Link DSR line of mid-range routers and also improved all supported models through the drivers I wrote. I'm continuing my work on improving the OpenBSD experience on the Octeon products by enhancing network support (including advanced switch support among other things) and adding disk support via USB and CFI. This presentation summarizes the developments I brought and the obstacles I faced. Speaker bio Paul is an OpenBSD developer since 2008, involved in ACPI, suspend and resume, power management, mips64, porting and currently with a keen interest in the Loongson and Octeon platforms. Currently he's a freelancer and also studying for his PhD in Parallel Algorithms for Signal Processing. In the past he worked for a telephony company developing VoIP, Voicemail and related software and after that as an antivirus engine developer and reverse engineer. In his spare time he enjoys a good game of Go, running or hiking.]]>

Abstract My work on the Octeon port made possible for OpenBSD to run on the D-Link DSR line of mid-range routers and also improved all supported models through the drivers I wrote. I'm continuing my work on improving the OpenBSD experience on the Octeon products by enhancing network support (including advanced switch support among other things) and adding disk support via USB and CFI. This presentation summarizes the developments I brought and the obstacles I faced. Speaker bio Paul is an OpenBSD developer since 2008, involved in ACPI, suspend and resume, power management, mips64, porting and currently with a keen interest in the Loongson and Octeon platforms. Currently he's a freelancer and also studying for his PhD in Parallel Algorithms for Signal Processing. In the past he worked for a telephony company developing VoIP, Voicemail and related software and after that as an antivirus engine developer and reverse engineer. In his spare time he enjoys a good game of Go, running or hiking.]]>
Sun, 11 Jan 2015 07:08:55 GMT /slideshow/paul-iroftieurobsdcon2014octeon-dsr500/43398702 eurobsdcon@slideshare.net(eurobsdcon) Making OpenBSD Useful on the Octeon Network Gear by Paul Irofti eurobsdcon Abstract My work on the Octeon port made possible for OpenBSD to run on the D-Link DSR line of mid-range routers and also improved all supported models through the drivers I wrote. I'm continuing my work on improving the OpenBSD experience on the Octeon products by enhancing network support (including advanced switch support among other things) and adding disk support via USB and CFI. This presentation summarizes the developments I brought and the obstacles I faced. Speaker bio Paul is an OpenBSD developer since 2008, involved in ACPI, suspend and resume, power management, mips64, porting and currently with a keen interest in the Loongson and Octeon platforms. Currently he's a freelancer and also studying for his PhD in Parallel Algorithms for Signal Processing. In the past he worked for a telephony company developing VoIP, Voicemail and related software and after that as an antivirus engine developer and reverse engineer. In his spare time he enjoys a good game of Go, running or hiking. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/paul-irofti-eurobsdcon2014-octeondsr500-150111070855-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract My work on the Octeon port made possible for OpenBSD to run on the D-Link DSR line of mid-range routers and also improved all supported models through the drivers I wrote. I&#39;m continuing my work on improving the OpenBSD experience on the Octeon products by enhancing network support (including advanced switch support among other things) and adding disk support via USB and CFI. This presentation summarizes the developments I brought and the obstacles I faced. Speaker bio Paul is an OpenBSD developer since 2008, involved in ACPI, suspend and resume, power management, mips64, porting and currently with a keen interest in the Loongson and Octeon platforms. Currently he&#39;s a freelancer and also studying for his PhD in Parallel Algorithms for Signal Processing. In the past he worked for a telephony company developing VoIP, Voicemail and related software and after that as an antivirus engine developer and reverse engineer. In his spare time he enjoys a good game of Go, running or hiking.
Making OpenBSD Useful on the Octeon Network Gear by Paul Irofti from eurobsdcon
]]>
1100 2 https://cdn.slidesharecdn.com/ss_thumbnails/paul-irofti-eurobsdcon2014-octeondsr500-150111070855-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Reimplementation of NetBSD Based on a Microkernel by Andrew S. Tanenbaum /slideshow/andy-tanenbaum-euro-bsdcon2014v2/43398675 andytanenbaum-eurobsdcon-2014-v2-150111070632-conversion-gate02
Abstract The MINIX 3 microkernel has been used as a base to reimplement NetBSD. To application programs, MINIX 3 looks like NetBSD, with the NetBSD headers, libraries, package manager, etc. Thousands of NetBSD packages run on it on the x86 and ARM Cortex V8 (BeagleBones). Inside, however, it is a completely different architecture, with a tiny microkernel and independent servers for memory management, the file system, and each device driver. This architecture has many valuable properties which will be described in the talk, including better security and the ability to recover from many component crashes without running applications even noticing. Updating to a new version of the operating system while it is running and without a reboot is on the roadmap for the future.]]>

Abstract The MINIX 3 microkernel has been used as a base to reimplement NetBSD. To application programs, MINIX 3 looks like NetBSD, with the NetBSD headers, libraries, package manager, etc. Thousands of NetBSD packages run on it on the x86 and ARM Cortex V8 (BeagleBones). Inside, however, it is a completely different architecture, with a tiny microkernel and independent servers for memory management, the file system, and each device driver. This architecture has many valuable properties which will be described in the talk, including better security and the ability to recover from many component crashes without running applications even noticing. Updating to a new version of the operating system while it is running and without a reboot is on the roadmap for the future.]]>
Sun, 11 Jan 2015 07:06:31 GMT /slideshow/andy-tanenbaum-euro-bsdcon2014v2/43398675 eurobsdcon@slideshare.net(eurobsdcon) A Reimplementation of NetBSD Based on a Microkernel by Andrew S. Tanenbaum eurobsdcon Abstract The MINIX 3 microkernel has been used as a base to reimplement NetBSD. To application programs, MINIX 3 looks like NetBSD, with the NetBSD headers, libraries, package manager, etc. Thousands of NetBSD packages run on it on the x86 and ARM Cortex V8 (BeagleBones). Inside, however, it is a completely different architecture, with a tiny microkernel and independent servers for memory management, the file system, and each device driver. This architecture has many valuable properties which will be described in the talk, including better security and the ability to recover from many component crashes without running applications even noticing. Updating to a new version of the operating system while it is running and without a reboot is on the roadmap for the future. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/andytanenbaum-eurobsdcon-2014-v2-150111070632-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract The MINIX 3 microkernel has been used as a base to reimplement NetBSD. To application programs, MINIX 3 looks like NetBSD, with the NetBSD headers, libraries, package manager, etc. Thousands of NetBSD packages run on it on the x86 and ARM Cortex V8 (BeagleBones). Inside, however, it is a completely different architecture, with a tiny microkernel and independent servers for memory management, the file system, and each device driver. This architecture has many valuable properties which will be described in the talk, including better security and the ability to recover from many component crashes without running applications even noticing. Updating to a new version of the operating system while it is running and without a reboot is on the roadmap for the future.
A Reimplementation of NetBSD Based on a Microkernel by Andrew S. Tanenbaum from eurobsdcon
]]>
5677 1 https://cdn.slidesharecdn.com/ss_thumbnails/andytanenbaum-eurobsdcon-2014-v2-150111070632-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-eurobsdcon-48x48.jpg?cb=1523439186 https://cdn.slidesharecdn.com/ss_thumbnails/program-frontcopy-150111094249-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds eurobsdcon/eurobsdcon-2014-program-front EuroBSDCon 2014 Progra... https://cdn.slidesharecdn.com/ss_thumbnails/program-backcopy-150111094143-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/program-back-copy/43401078 EuroBSDCon 2014 tutori... https://cdn.slidesharecdn.com/ss_thumbnails/eurobsdcon-welcome-150111082018-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/eurobsdcon-2014-sofia-welcome/43399772 EuroBSDCon 2014 Sofia ...