#openbsd X240 bios updated π
get the .iso for your model from https://support.lenovo.com/au/en/solutions/len-22133
pkg_add geteltorito
plug a blank USB stick (will be overwritten)
geteltorito file.iso | dd of=/dev/rsd<n>c bs=1024k (replace <n> by the actual device number for your USB stick - /!\ be careful to not overwrite anoter disk)
reboot from USB.
et voilΓ .
An oldie but a goodie, Ted Unangst describing the 2Q (two queues) algorithm that #OpenBSD uses for the buffer cache.
https://www.tedunangst.com/flak/post/2Q-buffer-cache-algorithm
I hope all my American pals have a great 4th of July tomorrow! βΊοΈππ
#OpenBSD #development poll
Which of the following Twitch streams/VODs would you watch of me:
1. Would you watch a Twitch stream of me doing routine ports work?
2. Would you watch a stream of me doing virtual porting workshops?
3. Something else?
4. All of the above?
Trying to think of new ways to get people involved.
Happy Canada Day!
π¨π¦
OpenBSD awesomeness: sqlite3 manpages! https://marc.info/?t=153019462600004&r=1&w=2 #sqlite3 #openbsd #manpages
My Mastopeeps will be the first to learn that I have a Patreon video.
I'm told it doesn't suck.
Year progress βββββββββββββββ 47% 2018 Fundraising Campaign βββββββββββββββ 14%
Seems like we need to catch up.
https://www.openbsdfoundation.org/donations.html
486 followers.. 
We're already nearly half-way through the year, don't forget to donate to the #OpenBSD Foundation 2018 campaign. Still a long way to go to reach its 300K goal! π
https://www.openbsdfoundation.org/campaign2018.html
https://www.openbsdfoundation.org/donations.html
Also don't forget to check the projects want.html page, which helps developers immensely βΊοΈ
Awesome modification for vmd(8) in #OpenBSD. Coming soon to a snapshot near you!
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/vmd/control.c?rev=1.24&content-type=text/x-cvsweb-markup
π π
"Why can't I find any episodes of Luke Cage S2!"
*Realizes he's searching for Luke Cake* 
Meltdown fix in for #OpenBSD/i386:
"Finish the last missing piece for the i386 meltdown fix:
- handle protection fault on iret properly
- handle NMI
- actually enable U-K in pmap_switch()
from hshoexer@; input guenther@; OK mlarkin@ deraadt@"
https://www.mail-archive.com/source-changes@openbsd.org/msg99194.html
Previous commits: https://www.mail-archive.com/source-changes@openbsd.org/msg98586.html
https://www.mail-archive.com/source-changes@openbsd.org/msg97523.html
https://www.mail-archive.com/source-changes@openbsd.org/msg97221.html
https://www.mail-archive.com/source-changes@openbsd.org/msg97220.html
"Our TLBleed exploit successfully leaks a 256-bit EdDSA key from libgcrypt (used in e.g. GPG) with a
98% success rate after just a single observation of signing operation on a co-resident hyperthread and just 17 seconds of analysis time."
https://www.blackhat.com/us-18/briefings.html#tlbleed-when-protecting-your-cpu-caches-is-not-enough
"Add support for simple one-off internal rewrites.
For example:
location match "/page/(%d+)/.*" {
request rewrite "/static/index.php?id=%1&$QUERY_STRING"
}
Requested by many."
#OpenBSD httpd(8)
https://www.mail-archive.com/source-changes@openbsd.org/msg99165.html
@canadianbryan Just learned that the vuln is semi-public: https://www.vusec.net/2018/05/tlbleed-blackhat-usa-2018/ and it will be described in 2 papers at USENIX Security.